text stringlengths 9 39.2M | dir stringlengths 26 295 | lang stringclasses 185
values | created_date timestamp[us] | updated_date timestamp[us] | repo_name stringlengths 1 97 | repo_full_name stringlengths 7 106 | star int64 1k 183k | len_tokens int64 1 13.8M |
|---|---|---|---|---|---|---|---|---|
```xml
<shapes name="mxgraph.mockup.controls">
<shape name="Horizontal Slidebar" h="23" w="219" aspect="1">
<foreground>
<strokecolor color="#000000"/>
<strokecolor color="#818181"/>
<path>
<move x="31" y="0"/>
<line x="31" y="23"/>
</path>
<stroke/>
<path>
<move x="57" y="0"/>
<line x="57" y="23"/>
</path>
<stroke/>
<path>
<move x="84" y="0"/>
<line x="84" y="23"/>
</path>
<stroke/>
<path>
<move x="109" y="0.401"/>
<line x="109" y="23"/>
</path>
<stroke/>
<path>
<move x="135" y="0"/>
<line x="135" y="23"/>
</path>
<stroke/>
<path>
<move x="161" y="0"/>
<line x="161" y="23"/>
</path>
<stroke/>
<path>
<move x="188" y="0"/>
<line x="188" y="23"/>
</path>
<stroke/>
<fillcolor color="#f2f2f2"/>
<roundrect x="0" y="9" w="219" h="9" arcsize="26.142"/>
<fillstroke/>
<strokecolor color="#333333"/>
<fillcolor color="#7f7f7f"/>
<path>
<move x="109" y="5"/>
<line x="114" y="9"/>
<line x="114" y="23"/>
<line x="104" y="23"/>
<line x="104" y="9"/>
<close/>
</path>
<fillstroke/>
</foreground>
</shape>
<shape name="On-Off Button 4" h="31" w="130" aspect="1">
<foreground>
<strokecolor color="#000000"/>
<strokecolor color="#333333"/>
<fillcolor color="#4342a9"/>
<roundrect x="0" y="0" w="130" h="31" arcsize="5.993"/>
<fillstroke/>
<fillcolor color="#c7c7c7"/>
<roundrect x="65" y="0" w="65" h="31" arcsize="7.147"/>
<fillstroke/>
<fontsize size="16"/>
<fontstyle style="1"/>
<fontcolor color="#ffffff"/>
<text str="ON" x="32.5" y="15.5" align="center" valign="middle"/>
</foreground>
</shape>
<shape name="Knob 1" h="110" w="105" aspect="1">
<foreground>
<strokecolor color="#000000"/>
<strokecolor color="#000000"/>
<path>
<move x="52.5" y="52.83"/>
<line x="19.33" y="74.17"/>
</path>
<stroke/>
<path>
<move x="53.5" y="52.67"/>
<line x="17.67" y="34.5"/>
</path>
<stroke/>
<path>
<move x="52.33" y="52.83"/>
<line x="87.17" y="73"/>
</path>
<stroke/>
<path>
<move x="53.17" y="53"/>
<line x="87.5" y="34.17"/>
</path>
<stroke/>
<path>
<move x="52.5" y="52.5"/>
<line x="52.5" y="14.5"/>
</path>
<stroke/>
<fillcolor color="#bbbbbb"/>
<ellipse x="18.5" y="19" w="68" h="68"/>
<fillstroke/>
<strokecolor color="#ffffff"/>
<fillcolor color="#404040"/>
<path>
<move x="24.46" y="41.09"/>
<line x="51.55" y="54.55"/>
<arc rx="2" ry="2" x-axis-rotation="-63.57" large-arc-flag="0" sweep-flag="0" x="54.23" y="53.65"/>
<line x="54.31" y="53.49"/>
<arc rx="2" ry="2" x-axis-rotation="-63.57" large-arc-flag="0" sweep-flag="0" x="53.41" y="50.81"/>
<line x="26.32" y="37.35"/>
<arc rx="2" ry="2" x-axis-rotation="-63.571" large-arc-flag="0" sweep-flag="0" x="23.64" y="38.25"/>
<line x="23.56" y="38.41"/>
<arc rx="2" ry="2" x-axis-rotation="-63.57" large-arc-flag="0" sweep-flag="0" x="24.46" y="41.09"/>
<close/>
</path>
<fillstroke/>
<strokewidth width="1.5"/>
<fillcolor color="none"/>
<ellipse x="17.5" y="18" w="70.5" h="70"/>
<stroke/>
<fontsize size="12"/>
<fontstyle style="1"/>
<text str="Knob Label" x="52.5" y="100" align="center" valign="middle"/>
<fontsize size="8"/>
<text str="0" x="15" y="75" align="center" valign="middle"/>
<text str="50" x="12" y="33" align="center" valign="middle"/>
<text str="50" x="52.5" y="10" align="center" valign="middle"/>
<text str="75" x="93" y="33" align="center" valign="middle"/>
<text str="100" x="95" y="75" align="center" valign="middle"/>
</foreground>
</shape>
<shape name="Knob 2" h="110" w="104.69" aspect="1">
<foreground>
<strokecolor color="#000000"/>
<fillcolor color="#bbbbbb"/>
<ellipse x="19.09" y="20.42" w="68" h="68"/>
<fillstroke/>
<strokecolor color="#ffffff"/>
<fillcolor color="#404040"/>
<path>
<move x="25.05" y="42.51"/>
<line x="52.13" y="55.97"/>
<arc rx="2" ry="2" x-axis-rotation="-63.57" large-arc-flag="0" sweep-flag="0" x="54.82" y="55.07"/>
<line x="54.9" y="54.91"/>
<arc rx="2" ry="2" x-axis-rotation="-63.57" large-arc-flag="0" sweep-flag="0" x="53.99" y="52.23"/>
<line x="26.91" y="38.76"/>
<arc rx="2" ry="2" x-axis-rotation="-63.57" large-arc-flag="0" sweep-flag="0" x="24.23" y="39.67"/>
<line x="24.15" y="39.83"/>
<arc rx="2" ry="2" x-axis-rotation="-63.57" large-arc-flag="0" sweep-flag="0" x="25.05" y="42.51"/>
<close/>
</path>
<fillstroke/>
<strokecolor color="none"/>
<fillcolor color="#b50c0b"/>
<path>
<move x="86.09" y="87.92"/>
<line x="79.09" y="80.42"/>
<arc rx="37.7" ry="37.7" x-axis-rotation="0" large-arc-flag="0" sweep-flag="0" x="30.09" y="23.42"/>
<arc rx="47" ry="47" x-axis-rotation="0" large-arc-flag="0" sweep-flag="1" x="80.09" y="13.42"/>
<arc rx="48" ry="48" x-axis-rotation="0" large-arc-flag="0" sweep-flag="1" x="86.09" y="87.92"/>
<close/>
</path>
<fillstroke/>
<fillcolor color="#13008f"/>
<path>
<move x="26.09" y="79.42"/>
<line x="18.09" y="87.42"/>
<arc rx="48.5" ry="48.5" x-axis-rotation="0" large-arc-flag="0" sweep-flag="1" x="76.09" y="11.22"/>
<arc rx="46.6" ry="46.6" x-axis-rotation="0" large-arc-flag="0" sweep-flag="0" x="29.42" y="22.42"/>
<arc rx="40" ry="40" x-axis-rotation="0" large-arc-flag="0" sweep-flag="0" x="25.75" y="79.08"/>
<close/>
</path>
<fillstroke/>
<strokecolor color="#ffffff"/>
<strokewidth width="2"/>
<fillcolor color="none"/>
<path>
<move x="26.59" y="79.42"/>
<line x="18.09" y="87.92"/>
<arc rx="48.5" ry="48.5" x-axis-rotation="0" large-arc-flag="1" sweep-flag="1" x="86.09" y="88.42"/>
<line x="78.59" y="80.42"/>
<arc rx="37" ry="37" x-axis-rotation="0" large-arc-flag="1" sweep-flag="0" x="26.59" y="79.42"/>
<close/>
</path>
<stroke/>
<linecap cap="round"/>
<path>
<move x="76.09" y="11.42"/>
<arc rx="48" ry="48" x-axis-rotation="0" large-arc-flag="0" sweep-flag="0" x="27.09" y="25.42"/>
<arc rx="39" ry="39" x-axis-rotation="0" large-arc-flag="0" sweep-flag="0" x="26.69" y="79.42"/>
</path>
<stroke/>
<fontsize size="12"/>
<fontstyle style="1"/>
<text str="Knob Label" x="52.5" y="100" align="center" valign="middle"/>
</foreground>
</shape>
<shape name="Horizontal Interval Bar 1" h="23" w="219" aspect="1">
<foreground>
<strokecolor color="#000000"/>
<strokecolor color="#818181"/>
<path>
<move x="31" y="0"/>
<line x="31" y="23"/>
</path>
<stroke/>
<path>
<move x="57" y="0"/>
<line x="57" y="23"/>
</path>
<stroke/>
<path>
<move x="84" y="0"/>
<line x="84" y="23"/>
</path>
<stroke/>
<path>
<move x="109" y="0.401"/>
<line x="109" y="23"/>
</path>
<stroke/>
<path>
<move x="135" y="0"/>
<line x="135" y="23"/>
</path>
<stroke/>
<path>
<move x="161" y="0"/>
<line x="161" y="23"/>
</path>
<stroke/>
<path>
<move x="188" y="0"/>
<line x="188" y="23"/>
</path>
<stroke/>
<fillcolor color="#f2f2f2"/>
<roundrect x="0" y="9" w="219" h="9" arcsize="26.142"/>
<fillstroke/>
<fillcolor color="#4a3ca7"/>
<rect x="60" y="9" w="100" h="9"/>
<fillstroke/>
<strokecolor color="#333333"/>
<fillcolor color="#7f7f7f"/>
<path>
<move x="57" y="5"/>
<line x="62" y="9"/>
<line x="62" y="23"/>
<line x="52" y="23"/>
<line x="52" y="9"/>
<close/>
</path>
<fillstroke/>
<path>
<move x="161.2" y="5"/>
<line x="166.2" y="9"/>
<line x="166.2" y="23"/>
<line x="156.2" y="23"/>
<line x="156.2" y="9"/>
<close/>
</path>
<fillstroke/>
</foreground>
</shape>
<shape name="Horizontal Interval Bar 2" h="23" w="219" aspect="1">
<foreground>
<strokecolor color="#000000"/>
<strokecolor color="#818181"/>
<path>
<move x="31" y="0"/>
<line x="31" y="23"/>
</path>
<stroke/>
<path>
<move x="57" y="0"/>
<line x="57" y="23"/>
</path>
<stroke/>
<path>
<move x="84" y="0"/>
<line x="84" y="23"/>
</path>
<stroke/>
<path>
<move x="109" y="0.401"/>
<line x="109" y="23"/>
</path>
<stroke/>
<path>
<move x="135" y="0"/>
<line x="135" y="23"/>
</path>
<stroke/>
<path>
<move x="161" y="0"/>
<line x="161" y="23"/>
</path>
<stroke/>
<path>
<move x="188" y="0"/>
<line x="188" y="23"/>
</path>
<stroke/>
<fillcolor color="#f2f2f2"/>
<roundrect x="0" y="9" w="219" h="9" arcsize="26.142"/>
<fillstroke/>
<fillcolor color="#4a3ca7"/>
<rect x="60" y="9" w="49.2" h="9"/>
<fillstroke/>
<strokecolor color="#333333"/>
<fillcolor color="#7f7f7f"/>
<path>
<move x="57" y="5"/>
<line x="62" y="9"/>
<line x="62" y="23"/>
<line x="52" y="23"/>
<line x="52" y="9"/>
<close/>
</path>
<fillstroke/>
<strokecolor color="#818181"/>
<fillcolor color="#6ba745"/>
<rect x="109" y="9" w="50" h="9"/>
<fillstroke/>
<strokecolor color="#333333"/>
<fillcolor color="#7f7f7f"/>
<path>
<move x="161.2" y="5"/>
<line x="166.2" y="9"/>
<line x="166.2" y="23"/>
<line x="156.2" y="23"/>
<line x="156.2" y="9"/>
<close/>
</path>
<fillstroke/>
<path>
<move x="109" y="5"/>
<line x="114" y="9"/>
<line x="114" y="23"/>
<line x="104" y="23"/>
<line x="104" y="9"/>
<close/>
</path>
<fillstroke/>
</foreground>
</shape>
<shape name="Vertical Interval Bar 2" h="219" w="23" aspect="1">
<foreground>
<strokecolor color="#000000"/>
<strokecolor color="#818181"/>
<path>
<move x="23" y="31"/>
<line x="0" y="31"/>
</path>
<stroke/>
<path>
<move x="23" y="57"/>
<line x="0" y="57"/>
</path>
<stroke/>
<path>
<move x="23" y="84"/>
<line x="0" y="84"/>
</path>
<stroke/>
<path>
<move x="22.6" y="109"/>
<line x="0" y="109"/>
</path>
<stroke/>
<path>
<move x="23" y="135"/>
<line x="0" y="135"/>
</path>
<stroke/>
<path>
<move x="23" y="161"/>
<line x="0" y="161"/>
</path>
<stroke/>
<path>
<move x="23" y="188"/>
<line x="0" y="188"/>
</path>
<stroke/>
<fillcolor color="#f2f2f2"/>
<path>
<move x="9" y="0"/>
<line x="10" y="0"/>
<arc rx="5" ry="5" x-axis-rotation="90" large-arc-flag="0" sweep-flag="0" x="5" y="5"/>
<line x="5" y="214"/>
<arc rx="5" ry="5" x-axis-rotation="90" large-arc-flag="0" sweep-flag="0" x="10" y="219"/>
<line x="9" y="219"/>
<arc rx="5" ry="5" x-axis-rotation="90" large-arc-flag="0" sweep-flag="0" x="14" y="214"/>
<line x="14" y="5"/>
<arc rx="5" ry="5" x-axis-rotation="90" large-arc-flag="0" sweep-flag="0" x="9" y="0"/>
<close/>
</path>
<fillstroke/>
<fillcolor color="#4a3ca7"/>
<path>
<move x="14" y="60"/>
<line x="5" y="60"/>
<line x="5" y="109.2"/>
<line x="14" y="109.2"/>
<close/>
</path>
<fillstroke/>
<strokecolor color="#333333"/>
<fillcolor color="#7f7f7f"/>
<path>
<move x="18" y="57"/>
<line x="14" y="62"/>
<line x="0" y="62"/>
<line x="0" y="52"/>
<line x="14" y="52"/>
<close/>
</path>
<fillstroke/>
<strokecolor color="#818181"/>
<fillcolor color="#6ba745"/>
<path>
<move x="14" y="109"/>
<line x="5" y="109"/>
<line x="5" y="159"/>
<line x="14" y="159"/>
<close/>
</path>
<fillstroke/>
<strokecolor color="#333333"/>
<fillcolor color="#7f7f7f"/>
<path>
<move x="18" y="161.2"/>
<line x="14" y="166.2"/>
<line x="0" y="166.2"/>
<line x="0" y="156.2"/>
<line x="14" y="156.2"/>
<close/>
</path>
<fillstroke/>
<path>
<move x="18" y="109"/>
<line x="14" y="114"/>
<line x="0" y="114"/>
<line x="0" y="104"/>
<line x="14" y="104"/>
<close/>
</path>
<fillstroke/>
</foreground>
</shape>
<shape name="Vertical Interval Bar 1" h="219" w="23" aspect="1">
<foreground>
<strokecolor color="#818181"/>
<path>
<move x="23" y="31"/>
<line x="0" y="31"/>
</path>
<stroke/>
<path>
<move x="23" y="57"/>
<line x="0" y="57"/>
</path>
<stroke/>
<path>
<move x="23" y="84"/>
<line x="0" y="84"/>
</path>
<stroke/>
<path>
<move x="22.6" y="109"/>
<line x="0" y="109"/>
</path>
<stroke/>
<path>
<move x="23" y="135"/>
<line x="0" y="135"/>
</path>
<stroke/>
<path>
<move x="23" y="161"/>
<line x="0" y="161"/>
</path>
<stroke/>
<path>
<move x="23" y="188"/>
<line x="0" y="188"/>
</path>
<stroke/>
<fillcolor color="#f2f2f2"/>
<path>
<move x="9" y="0"/>
<line x="10" y="0"/>
<arc rx="5" ry="5" x-axis-rotation="90" large-arc-flag="0" sweep-flag="0" x="5" y="5"/>
<line x="5" y="214"/>
<arc rx="5" ry="5" x-axis-rotation="90" large-arc-flag="0" sweep-flag="0" x="10" y="219"/>
<line x="9" y="219"/>
<arc rx="5" ry="5" x-axis-rotation="90" large-arc-flag="0" sweep-flag="0" x="14" y="214"/>
<line x="14" y="5"/>
<arc rx="5" ry="5" x-axis-rotation="90" large-arc-flag="0" sweep-flag="0" x="9" y="0"/>
<close/>
</path>
<fillstroke/>
<fillcolor color="#4a3ca7"/>
<path>
<move x="14" y="60"/>
<line x="5" y="60"/>
<line x="5" y="160"/>
<line x="14" y="160"/>
<close/>
</path>
<fillstroke/>
<strokecolor color="#333333"/>
<fillcolor color="#7f7f7f"/>
<path>
<move x="18" y="57"/>
<line x="14" y="62"/>
<line x="0" y="62"/>
<line x="0" y="52"/>
<line x="14" y="52"/>
<close/>
</path>
<fillstroke/>
<path>
<move x="18" y="161.2"/>
<line x="14" y="166.2"/>
<line x="0" y="166.2"/>
<line x="0" y="156.2"/>
<line x="14" y="156.2"/>
<close/>
</path>
<fillstroke/>
</foreground>
</shape>
<shape name="Vertical Slidebar" h="219" w="23" aspect="1">
<foreground>
<strokecolor color="#818181"/>
<path>
<move x="23" y="31"/>
<line x="0" y="31"/>
</path>
<stroke/>
<path>
<move x="23" y="57"/>
<line x="0" y="57"/>
</path>
<stroke/>
<path>
<move x="23" y="84"/>
<line x="0" y="84"/>
</path>
<stroke/>
<path>
<move x="22.6" y="109"/>
<line x="0" y="109"/>
</path>
<stroke/>
<path>
<move x="23" y="135"/>
<line x="0" y="135"/>
</path>
<stroke/>
<path>
<move x="23" y="161"/>
<line x="0" y="161"/>
</path>
<stroke/>
<path>
<move x="23" y="188"/>
<line x="0" y="188"/>
</path>
<stroke/>
<fillcolor color="#f2f2f2"/>
<path>
<move x="9" y="0"/>
<line x="10" y="0"/>
<arc rx="5" ry="5" x-axis-rotation="90" large-arc-flag="0" sweep-flag="0" x="5" y="5"/>
<line x="5" y="214"/>
<arc rx="5" ry="5" x-axis-rotation="90" large-arc-flag="0" sweep-flag="0" x="10" y="219"/>
<line x="9" y="219"/>
<arc rx="5" ry="5" x-axis-rotation="90" large-arc-flag="0" sweep-flag="0" x="14" y="214"/>
<line x="14" y="5"/>
<arc rx="5" ry="5" x-axis-rotation="90" large-arc-flag="0" sweep-flag="0" x="9" y="0"/>
<close/>
</path>
<fillstroke/>
<strokecolor color="#333333"/>
<fillcolor color="#7f7f7f"/>
<path>
<move x="18" y="109"/>
<line x="14" y="114"/>
<line x="0" y="114"/>
<line x="0" y="104"/>
<line x="14" y="104"/>
<close/>
</path>
<fillstroke/>
</foreground>
</shape>
<shape name="On-Off Button 1" h="31" w="130" aspect="1">
<foreground>
<strokecolor color="#000000"/>
<strokecolor color="#333333"/>
<fillcolor color="#ffffff"/>
<roundrect x="0" y="0" w="130" h="31" arcsize="5.993"/>
<fillstroke/>
<fillcolor color="#c7c7c7"/>
<roundrect x="0" y="0" w="65" h="31" arcsize="7.147"/>
<fillstroke/>
<fontsize size="16"/>
<fontstyle style="1"/>
<text str="OFF" x="97.5" y="15.5" align="center" valign="middle"/>
</foreground>
</shape>
<shape name="On-Off Button 2" h="31" w="130" aspect="1">
<foreground>
<strokecolor color="#333333"/>
<fillcolor color="#772222"/>
<roundrect x="0" y="0" w="130" h="31" arcsize="5.993"/>
<fillstroke/>
<fillcolor color="#c7c7c7"/>
<roundrect x="0" y="0" w="65" h="31" arcsize="7.147"/>
<fillstroke/>
<fontsize size="16"/>
<fontstyle style="1"/>
<fontcolor color="#ffffff"/>
<text str="OFF" x="97.5" y="15.5" align="center" valign="middle"/>
</foreground>
</shape>
<shape name="On-Off Button 3" h="31" w="130" aspect="1">
<foreground>
<strokecolor color="#000000"/>
<strokecolor color="#333333"/>
<fillcolor color="#ffffff"/>
<roundrect x="0" y="0" w="130" h="31" arcsize="5.993"/>
<fillstroke/>
<fillcolor color="#c7c7c7"/>
<roundrect x="65" y="0" w="65" h="31" arcsize="7.147"/>
<fillstroke/>
<fontsize size="16"/>
<fontstyle style="1"/>
<text str="ON" x="32.5" y="15.5" align="center" valign="middle"/>
</foreground>
</shape>
</shapes>
``` | /content/code_sandbox/src/main/webapp/stencils/mockup/controls.xml | xml | 2016-09-06T12:59:15 | 2024-08-16T13:28:41 | drawio | jgraph/drawio | 40,265 | 6,638 |
```xml
// Native
import path from 'path';
// Packages
import test from 'ava';
import fs from 'fs-extra';
import {_electron} from 'playwright';
import type {ElectronApplication} from 'playwright';
let app: ElectronApplication;
test.before(async () => {
let pathToBinary;
switch (process.platform) {
case 'linux':
pathToBinary = path.join(__dirname, '../dist/linux-unpacked/hyper');
break;
case 'darwin':
pathToBinary = path.join(__dirname, '../dist/mac/Hyper.app/Contents/MacOS/Hyper');
break;
case 'win32':
pathToBinary = path.join(__dirname, '../dist/win-unpacked/Hyper.exe');
break;
default:
throw new Error('Path to the built binary needs to be defined for this platform in test/index.js');
}
app = await _electron.launch({
executablePath: pathToBinary
});
await app.firstWindow();
await new Promise((resolve) => setTimeout(resolve, 5000));
});
test.after(async () => {
await app
.evaluate(({BrowserWindow}) =>
BrowserWindow.getFocusedWindow()
?.capturePage()
.then((img) => img.toPNG().toString('base64'))
)
.then((img) => Buffer.from(img || '', 'base64'))
.then(async (imageBuffer) => {
await fs.writeFile(`dist/tmp/${process.platform}_test.png`, imageBuffer);
});
await app.close();
});
test('see if dev tools are open', async (t) => {
t.false(await app.evaluate(({webContents}) => !!webContents.getFocusedWebContents()?.isDevToolsOpened()));
});
``` | /content/code_sandbox/test/index.ts | xml | 2016-07-01T06:01:21 | 2024-08-16T16:05:22 | hyper | vercel/hyper | 43,095 | 364 |
```xml
<!--
path_to_url
Unless required by applicable law or agreed to in writing, software
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
-->
<animated-selector
xmlns:android="path_to_url"
xmlns:tools="path_to_url"
tools:ignore="NewApi">
<item
android:id="@+id/state_on"
android:drawable="@drawable/vd_clock_alarm"
android:state_checked="true"/>
<item
android:id="@+id/state_off"
android:drawable="@drawable/vd_clock_alarm"/>
<transition
android:drawable="@drawable/avd_clock_alarm"
android:fromId="@id/state_off"
android:toId="@id/state_on"/>
</animated-selector>
``` | /content/code_sandbox/catalog/java/io/material/catalog/assets/res/drawable/asld_clock_alarm.xml | xml | 2016-12-05T16:11:29 | 2024-08-16T17:51:42 | material-components-android | material-components/material-components-android | 16,176 | 164 |
```xml
import { ElementUIComponent } from './component'
/** Checkbox Button Component */
export declare class ElCheckboxButton extends ElementUIComponent {
/** Value of the checkbox when used inside a checkbox-group */
label: string | number | boolean
/** Value of the checkbox if it's checked */
trueLabel: string | number
/** Value of the checkbox if it's not checked */
falseLabel: string | number
/** Native 'name' attribute */
name: string
/** If the checkbox is disabled */
disabled: boolean
/** If the checkbox is checked */
checked: boolean
}
``` | /content/code_sandbox/types/checkbox-button.d.ts | xml | 2016-09-03T06:19:26 | 2024-08-16T02:26:18 | element | ElemeFE/element | 54,066 | 128 |
```xml
declare interface IMyAwardsWebPartStrings {
PropertyPaneDescription: string;
BasicGroupName: string;
DescriptionFieldLabel: string;
AppLocalEnvironmentSharePoint: string;
AppLocalEnvironmentTeams: string;
AppSharePointEnvironment: string;
AppTeamsTabEnvironment: string;
}
declare module 'MyAwardsWebPartStrings' {
const strings: IMyAwardsWebPartStrings;
export = strings;
}
``` | /content/code_sandbox/samples/react-graph-profile-awards/src/webparts/myAwards/loc/mystrings.d.ts | xml | 2016-08-30T17:21:43 | 2024-08-16T18:41:32 | sp-dev-fx-webparts | pnp/sp-dev-fx-webparts | 2,027 | 94 |
```xml
<UserControl
xmlns="path_to_url"
xmlns:x="path_to_url"
xmlns:mc="path_to_url"
xmlns:d="path_to_url"
xmlns:local="clr-namespace:Aurora.Settings.Layers"
xmlns:xctk="path_to_url"
xmlns:Controls="clr-namespace:Aurora.Controls"
xmlns:logic="clr-namespace:Aurora.Settings.Overrides.Logic" x:Class="Aurora.Settings.Layers.Control_AnimationLayer"
mc:Ignorable="d" Loaded="UserControl_Loaded">
<Grid>
<GroupBox Header="Animation" Height="49" Width="590" HorizontalAlignment="Left" VerticalAlignment="Top">
<Grid>
<Button x:Name="btnEditAnimation" Content="Edit Animation" HorizontalAlignment="Left" VerticalAlignment="Top" Click="btnEditAnimation_Click" Width="142" Height="23"/>
<Label Content="Animation Duration:" Margin="0,-1,261,0" HorizontalAlignment="Right" VerticalAlignment="Top" Width="118"/>
<xctk:DoubleUpDown x:Name="updownAnimationDuration" HorizontalAlignment="Right" Height="20" Margin="0,2,201,0" VerticalAlignment="Top" Width="60" Value="0" Minimum="0.1" Maximum="1024" Increment="0.1" ValueChanged="updownAnimationDuration_ValueChanged" />
<Label Content="secs" Margin="0,-1,169,0" HorizontalAlignment="Right" VerticalAlignment="Top"/>
<Label Content="Repeat Times:" VerticalAlignment="Center" HorizontalAlignment="Right" Margin="0,-1,68,0" />
<xctk:IntegerUpDown x:Name="updownAnimationRepeat" HorizontalAlignment="Right" VerticalAlignment="Top" Margin="0,2,4,0" Width="60" Minimum="0" Maximum="1024" Increment="1" ValueChanged="updownAnimationRepeat_ValueChanged" />
</Grid>
</GroupBox>
<GroupBox Header="Keys" Margin="0,53,0,0" Width="242" HorizontalAlignment="Left">
<Grid>
<CheckBox x:Name="chkboxForceKeySequence" Content="Display Only on Key Sequence keys" HorizontalAlignment="Left" Margin="0,0,0,0" VerticalAlignment="Top" Checked="chkboxForceKeySequence_Checked" Unchecked="chkboxForceKeySequence_Checked"/>
<CheckBox x:Name="chkboxScaleToKeySequence" Content="Scale to Key Sequence bounds" HorizontalAlignment="Left" Margin="0,21,0,0" VerticalAlignment="Top" Checked="chkboxScaleToKeySequence_Checked" Unchecked="chkboxScaleToKeySequence_Checked"/>
<Controls:KeySequence x:Name="KeySequence_keys" Margin="0,42,0,0" HorizontalAlignment="Left" Width="230" RecordingTag="SolidColorLayer" Title="Affected Keys" SequenceUpdated="KeySequence_keys_SequenceUpdated"/>
</Grid>
</GroupBox>
<GroupBox x:Name="triggerGroupbox" Header="Trigger" Margin="257,53,0,0" Width="333" MinHeight="299" HorizontalAlignment="Left">
<ScrollViewer>
<Grid>
<Grid x:Name="triggerGridLayout">
<Grid.ColumnDefinitions>
<ColumnDefinition Width="85px" />
<ColumnDefinition Width="1*" />
</Grid.ColumnDefinitions>
<Grid.RowDefinitions>
<RowDefinition Height="28px" />
<RowDefinition Height="28px" />
<RowDefinition Height="Auto"/>
<RowDefinition Height="160px" />
<RowDefinition Height="28px" />
<RowDefinition Height="28px" />
<RowDefinition Height="28px" />
<RowDefinition Height="1*" />
</Grid.RowDefinitions>
<Label Content="Trigger:" Grid.Row="0" VerticalAlignment="Center" HorizontalAlignment="Right" />
<ComboBox x:Name="triggerModeCb" Grid.Row="0" Grid.Column="1" Margin="2,4" VerticalAlignment="Center" HorizontalAlignment="Stretch" DisplayMemberPath="Key" SelectedValuePath="Value" SelectionChanged="triggerMode_SelectionChanged">
<ComboBox.GroupStyle>
<GroupStyle>
<GroupStyle.HeaderTemplate>
<DataTemplate>
<TextBlock Text="{Binding Name}" Background="#1FFF" FontWeight="Bold" Margin="0,4,0,0" Padding="4,0,4,2" />
</DataTemplate>
</GroupStyle.HeaderTemplate>
</GroupStyle>
</ComboBox.GroupStyle>
</ComboBox>
<Label Content="Trigger path:" Grid.Row="1" VerticalAlignment="Center" HorizontalAlignment="Right" />
<ComboBox x:Name="triggerPath" Grid.Row="1" Grid.Column="1" Margin="2,4" VerticalAlignment="Center" Height="20" HorizontalAlignment="Stretch" IsEditable="True" TextBoxBase.TextChanged="triggerPath_TextChanged" />
<Label Content="Trigger expr:" Grid.Row="2" VerticalAlignment="Center" HorizontalAlignment="Right" />
<DockPanel Grid.Row="2" Grid.Column="1" LastChildFill="True">
<logic:Control_EvaluatableToolbox DockPanel.Dock="Bottom" Height="180" />
<logic:Control_EvaluatablePresenter x:Name="triggerEvaluatable" VerticalAlignment="Center" ExpressionChanged="triggerEvaluatable_ExpressionChanged" />
</DockPanel>
<Label Content="Trigger keys:" Grid.Row="3" VerticalAlignment="Top" HorizontalAlignment="Right" />
<CheckBox x:Name="triggerAnyKey" Grid.Row="3" Grid.Column="1" Content="Trigger for any key" Margin="-6,6" Checked="triggerAnyKey_Checked" Unchecked="triggerAnyKey_Checked" />
<Controls:KeySequence x:Name="triggerKeys" Margin="0,28,0,0" Grid.Row="3" Grid.Column="1" RecordingTag="AnimationTriggerKeys" Title="Trigger keys" FreestyleEnabled="False" SequenceUpdated="triggerKeys_SequenceUpdated" />
<Label Content="Stack mode:" Grid.Row="5" VerticalAlignment="Center" HorizontalAlignment="Right" />
<CheckBox x:Name="translateToKey" Grid.Row="4" Grid.Column="1" Content="Translate to pressed key" Margin="-6,6" Checked="translateToKey_Checked" Unchecked="translateToKey_Checked" />
<TextBlock Text="?" Grid.Row="4" Grid.Column="4" ToolTip="Moves the top-left (0,0) of the animation to the location of the key. When using this option, ensure your animations are centered around 0,0." Cursor="Help" Opacity=".8" TextDecorations="Underline" Margin="12,6" VerticalAlignment="Center" HorizontalAlignment="Right" />
<ComboBox x:Name="stackModeCb" Grid.Row="5" Grid.Column="1" Margin="2,4" VerticalAlignment="Center" HorizontalAlignment="Stretch" SelectionChanged="stackModeCb_SelectionChanged" DisplayMemberPath="Key" SelectedValuePath="Value" />
<CheckBox x:Name="whileKeyHeldTerminate" Grid.Row="6" Grid.Column="1" Content="Stop as soon as key released" ToolTip="If true, this setting will stop the animation started by a key press as soon as that key press is released. If false, the animation started by a key will keep going until complete before stopping when the key is released." Margin="-6,6" Checked="whileKeyHeldTerminate_Checked" Unchecked="whileKeyHeldTerminate_Checked" />
</Grid>
<Button Content=" i " Margin="0" HorizontalAlignment="Left" VerticalAlignment="Top" ToolTip="Open documentation page" Click="btnInfo_Click" />
</Grid>
</ScrollViewer>
</GroupBox>
</Grid>
</UserControl>
``` | /content/code_sandbox/Project-Aurora/Project-Aurora/Settings/Layers/Control_AnimationLayer.xaml | xml | 2016-04-04T05:18:18 | 2024-08-03T10:11:45 | Aurora | antonpup/Aurora | 1,824 | 1,705 |
```xml
import {
Column,
Entity,
JoinColumn,
ManyToOne,
PrimaryGeneratedColumn,
} from "../../../../src"
import { Parent } from "./Parent"
@Entity("test_child")
export class Child {
@PrimaryGeneratedColumn({
name: "id",
type: "int",
})
public id: number
@Column({
name: "parent_id",
type: "int",
})
public parentId: number
@ManyToOne((type) => Parent, (parent) => parent.children)
@JoinColumn({
name: "parent_id",
referencedColumnName: "id",
})
public parent: Parent
@Column({
name: "data",
type: "int",
})
public data: number
constructor(_data: number) {
this.data = _data
}
}
``` | /content/code_sandbox/test/github-issues/3105/entity/Child.ts | xml | 2016-02-29T07:41:14 | 2024-08-16T18:28:52 | typeorm | typeorm/typeorm | 33,875 | 178 |
```xml
import { ContentState, Modifier, SelectionState } from 'draft-js';
export default function removeBlock(
contentState: ContentState,
blockKey: string
): ContentState {
const afterKey = contentState.getKeyAfter(blockKey);
const afterBlock = contentState.getBlockForKey(afterKey);
let targetRange;
// Only if the following block the last with no text then the whole block
// should be removed. Otherwise the block should be reduced to an unstyled block
// without any characters.
if (
afterBlock &&
afterBlock.getType() === 'unstyled' &&
afterBlock.getLength() === 0 &&
afterBlock === contentState.getBlockMap().last()
) {
targetRange = new SelectionState({
anchorKey: blockKey,
anchorOffset: 0,
focusKey: afterKey,
focusOffset: 0,
});
} else {
targetRange = new SelectionState({
anchorKey: blockKey,
anchorOffset: 0,
focusKey: blockKey,
focusOffset: 1,
});
}
// change the blocktype and remove the characterList entry with the block
const newContentState = Modifier.setBlockType(
contentState,
targetRange,
'unstyled'
);
return Modifier.removeRange(newContentState, targetRange, 'backward');
}
``` | /content/code_sandbox/packages/drag-n-drop/src/modifiers/removeBlock.ts | xml | 2016-02-26T09:54:56 | 2024-08-16T18:16:31 | draft-js-plugins | draft-js-plugins/draft-js-plugins | 4,087 | 290 |
```xml
<?xml version="1.0" encoding="UTF-8"?>
<!--***********************************************************************-->
<!-- $Id: vera.xml 6 2008-12-07 21:19:40Z seanoboyle $ -->
<!--***********************************************************************-->
<!-- This program is free software: you can redistribute it and/or modify -->
<!-- (at your option) any later version. -->
<!-- -->
<!-- This program is distributed in the hope that it will be useful, -->
<!-- but WITHOUT ANY WARRANTY; without even the implied warranty of -->
<!-- MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the -->
<!-- -->
<!-- along with this program. If not, see <path_to_url
<!-- -->
<!--***********************************************************************-->
<!-- Title: Vera Language Keywords File for Kate Editor -->
<!-- Description: This file contains the Vera keywords defined in the -->
<!-- OpenVera LRM: Testbench Ver 1.4.4 in the format expected-->
<!-- by the Kate Editor. -->
<!-- -->
<!-- Original Author: Sean O'Boyle -->
<!-- Contact: seanoboyle@intelligentdv.com -->
<!-- Company: Intelligent Design Verification -->
<!-- Company URL: path_to_url -->
<!-- -->
<!-- Download the most recent version here: -->
<!-- path_to_url -->
<!-- -->
<!-- File Bugs Here: path_to_url -->
<!-- Project: SyntaxKateVera -->
<!-- -->
<!-- File: vera.xml -->
<!-- $LastChangedBy: seanoboyle $ -->
<!-- $LastChangedDate: 2008-12-07 13:19:40 -0800 (Sun, 07 Dec 2008) $ -->
<!-- $LastChangedRevision: 6 $ -->
<!-- -->
<!--***********************************************************************-->
<!DOCTYPE language SYSTEM "language.dtd">
<language name="Vera" version="5" kateversion="5.0" section="Hardware" extensions="*.vr;*.vri;*.vrh" mimetype="text/x-vera-src" author="Sean O'Boyle (seanoboyle@intelligentdv.com)" license="GPLv3+">
<highlighting>
<list name="keywords">
<item>after</item>
<item>all</item>
<item>any</item>
<item>around</item>
<item>assoc_index</item>
<item>assoc_size</item>
<item>async</item>
<item>bad_state</item>
<item>bad_trans</item>
<item>before</item>
<item>begin</item>
<item>big_endian</item>
<item>bind</item>
<item>bin_activation</item>
<item>bit_normal</item>
<item>bit_reverse</item>
<item>break</item>
<item>breakpoint</item>
<item>case</item>
<item>casex</item>
<item>casez</item>
<item>class</item>
<item>constraint</item>
<item>continue</item>
<item>coverage</item>
<item>coverage_block</item>
<item>coverage_def</item>
<item>coverage_depth</item>
<item>coverage_goal</item>
<item>coverage_group</item>
<item>coverage_option</item>
<item>coverage_val</item>
<item>cross_num_print_missing</item>
<item>cross_auto_bin_max</item>
<item>cov_comment</item>
<item>default</item>
<item>depth</item>
<item>dist</item>
<item>do</item>
<item>else</item>
<item>end</item>
<item>enum</item>
<item>exhaustive</item>
<item>export</item>
<item>extends</item>
<item>extern</item>
<item>for</item>
<item>foreach</item>
<item>fork</item>
<item>function</item>
<item>hdl_task</item>
<item>hdl_node</item>
<item>hide</item>
<item>if</item>
<item>illegal_self_transition</item>
<item>illegal_state</item>
<item>illegal_transition</item>
<item>in</item>
<item>interface</item>
<item>invisible</item>
<item>join</item>
<item>little_endian</item>
<item>local</item>
<item>m_bad_state</item>
<item>m_bad_trans</item>
<item>m_state</item>
<item>m_trans</item>
<item>negedge</item>
<item>new</item>
<item>newcov</item>
<item>non_rand</item>
<item>none</item>
<item>not</item>
<item>null</item>
<item>or</item>
<item>ordered</item>
<item>packed</item>
<item>port</item>
<item>posedge</item>
<item>proceed</item>
<item>prod</item>
<item>prodget</item>
<item>prodset</item>
<item>program</item>
<item>protected</item>
<item>public</item>
<item>rand</item>
<item>randc</item>
<item>randcase</item>
<item>randseq</item>
<item>repeat</item>
<item>return</item>
<item>rules</item>
<item>sample</item>
<item>sample_event</item>
<item>shadow</item>
<item>soft</item>
<item>state</item>
<item>static</item>
<item>super</item>
<item>task</item>
<item>terminate</item>
<item>this</item>
<item>trans</item>
<item>typedef</item>
<item>unpacked</item>
<item>var</item>
<item>vca</item>
<item>vector</item>
<item>verilog_node</item>
<item>verilog_task</item>
<item>vhdl_node</item>
<item>vhdl_task</item>
<item>virtual</item>
<item>virtuals</item>
<item>visible</item>
<item>void</item>
<item>while</item>
<item>wildcard</item>
<item>with</item>
</list>
<list name="types">
<item>integer</item>
<item>bit</item>
<item>reg</item>
<item>string</item>
<item>bind_var</item>
<item>event</item>
<item>inout</item>
<item>input</item>
<item>output</item>
<item>ASYNC</item>
<item>CLOCK</item>
<item>NDRIVE</item>
<item>NHOLD</item>
<item>NRX</item>
<item>NRZ</item>
<item>NR0</item>
<item>NR1</item>
<item>NSAMPLE</item>
<item>PDRIVE</item>
<item>PHOLD</item>
<item>PRX</item>
<item>PRZ</item>
<item>PR0</item>
<item>PR1</item>
<item>PSAMPLE</item>
</list>
<list name="q_values">
<item>gnr</item>
<item>grx</item>
<item>grz</item>
<item>gr0</item>
<item>gr1</item>
<item>nr</item>
<item>rx</item>
<item>rz</item>
<item>r0</item>
<item>r1</item>
<item>snr</item>
<item>srx</item>
<item>srz</item>
<item>sr0</item>
<item>sr1</item>
</list>
<list name="methods">
<!-- system functions and tasks -->
<item>alloc</item>
<item>call_func</item>
<item>call_task</item>
<item>cast_assign</item>
<item>close_conn</item>
<item>cm_coverage</item>
<item>cm_get_coverage</item>
<item>cm_get_limit</item>
<item>coverage_backup_database_file</item>
<item>coverage_save_database</item>
<item>delay</item>
<item>error</item>
<item>error_mode</item>
<item>error_wait</item>
<item>exit</item>
<item>fclose</item>
<item>feof</item>
<item>ferror</item>
<item>fflush</item>
<item>flag</item>
<item>fopen</item>
<item>fprintf</item>
<item>freadb</item>
<item>freadb</item>
<item>freadh</item>
<item>freadstr</item>
<item>get_bind</item>
<item>get_bind_id</item>
<item>get_conn_err</item>
<item>get_cycle</item>
<item>get_env</item>
<item>get_memsize</item>
<item>get_plus_arg</item>
<item>get_systime</item>
<item>get_time</item>
<item>get_time_unit</item>
<item>getstate</item>
<item>initstate</item>
<item>lock_file</item>
<item>mailbox_get</item>
<item>mailbox_put</item>
<item>mailbox_receive</item>
<item>mailbox_send</item>
<item>make_client</item>
<item>make_server</item>
<item>os_command</item>
<item>printf</item>
<item>psprintf</item>
<item>query</item>
<item>query_str</item>
<item>query_x</item>
<item>rand48</item>
<item>random</item>
<item>region_enter</item>
<item>region_exit</item>
<item>rewind</item>
<item>semaphore_get</item>
<item>semaphore_put</item>
<item>setstate</item>
<item>signal_connect</item>
<item>simwave_plot</item>
<item>srandom</item>
<item>sprintf</item>
<item>sscanf</item>
<item>stop</item>
<item>suspend_thread</item>
<item>sync</item>
<item>timeout</item>
<item>trace</item>
<item>trigger</item>
<item>unit_delay</item>
<item>unlock_file</item>
<item>up_connections</item>
<item>urand48</item>
<item>urandom</item>
<item>urandom_range</item>
<item>vera_bit_reverse</item>
<item>vera_crc</item>
<item>vera_pack</item>
<item>vera_pack_big_endian</item>
<item>vera_plot</item>
<item>vera_report_profile</item>
<item>vera_unpack</item>
<item>vera_unpack_big_endian</item>
<item>vsv_call_func</item>
<item>vsv_call_task</item>
<item>vsv_close_conn</item>
<item>vsv_get_conn_err</item>
<item>vsv_make_client</item>
<item>vsv_make_server</item>
<item>vsv_up_connections</item>
<item>vsv_wait_for_done</item>
<item>vsv_wait_for_input</item>
<item>wait_child</item>
<item>wait_var</item>
<!-- class methods -->
<item>Configure</item>
<item>DisableTrigger</item>
<item>DoAction</item>
<item>EnableCount</item>
<item>EnableTrigger</item>
<item>Event</item>
<item>GetAssert</item>
<item>GetCount</item>
<item>GetFirstAssert</item>
<item>GetName</item>
<item>GetNextAssert</item>
<item>Wait</item>
<item>atobin</item>
<item>atohex</item>
<item>atoi</item>
<item>atooct</item>
<item>backref</item>
<item>bittostr</item>
<item>capacity</item>
<item>compare</item>
<item>constraint_mode</item>
<item>delete</item>
<item>empty</item>
<item>find</item>
<item>find_index</item>
<item>first</item>
<item>first_index</item>
<item>get_at_least</item>
<item>get_auto_bin</item>
<item>get_cov_weight</item>
<item>get_coverage_goal</item>
<item>get_cross_bin_max</item>
<item>get_status</item>
<item>get_status_msg</item>
<item>getc</item>
<item>hash</item>
<item>icompare</item>
<item>insert</item>
<item>inst_get_at_least</item>
<item>inst_get_auto_bin_max</item>
<item>inst_get_collect</item>
<item>inst_get_cov_weight</item>
<item>inst_get_coverage_goal</item>
<item>inst_getcross_bin_max</item>
<item>inst_query</item>
<item>inst_set_at_least</item>
<item>inst_set_auto_bin_max</item>
<item>inst_set_bin_activiation</item>
<item>inst_set_collect</item>
<item>inst_set_cov_weight</item>
<item>inst_set_coverage_goal</item>
<item>inst_set_cross_bin_max</item>
<item>itoa</item>
<item>last</item>
<item>last_index</item>
<item>len</item>
<item>load</item>
<item>match</item>
<item>max</item>
<item>max_index</item>
<item>min</item>
<item>min_index</item>
<item>object_compare</item>
<item>object_copy</item>
<item>object_print</item>
<item>pack</item>
<item>pick_index</item>
<item>pop_back</item>
<item>pop_front</item>
<item>post_pack</item>
<item>post_randomize</item>
<item>post_unpack</item>
<item>postmatch</item>
<item>pre_pack</item>
<item>pre_randomize</item>
<item>prematch</item>
<item>push_back</item>
<item>push_front</item>
<item>putc</item>
<item>query</item>
<item>query_str</item>
<item>rand_mode</item>
<item>randomize</item>
<item>reserve</item>
<item>reverse</item>
<item>rsort</item>
<item>search</item>
<item>set_at_least</item>
<item>set_auto_bin_max</item>
<item>set_bin_activiation</item>
<item>set_cov_weight</item>
<item>set_coverage_goal</item>
<item>set_cross_bin_max</item>
<item>set_name</item>
<item>size</item>
<item>sort</item>
<item>substr</item>
<item>sum</item>
<item>thismatch</item>
<item>tolower</item>
<item>toupper</item>
<item>unique_index</item>
<item>unpack</item>
<!-- empty methods -->
<item>new</item>
<item>object_compare</item>
<item>post_boundary</item>
<item>post_pack</item>
<item>post_randomize</item>
<item>post_unpack</item>
<item>pre-randomize</item>
<item>pre_boundary</item>
<item>pre_pack</item>
<item>pre_unpack</item>
<!-- vera-constants -->
<item>ALL</item>
<item>ANY</item>
<item>BAD_STATE</item>
<item>BAD_TRANS</item>
<item>CALL</item>
<item>CHECK</item>
<item>CHGEDGE</item>
<item>CLEAR</item>
<item>COPY_NO_WAIT</item>
<item>COPY_WAIT</item>
<item>CROSS</item>
<item>CROSS_TRANS</item>
<item>DEBUG</item>
<item>DELETE</item>
<item>EC_ARRAYX</item>
<item>EC_CODE_END</item>
<item>EC_CONFLICT</item>
<item>EC_EVNTIMOUT</item>
<item>EC_EXPECT</item>
<item>EC_FULLEXPECT</item>
<item>EC_MBXTMOUT</item>
<item>EC_NEXPECT</item>
<item>EC_RETURN</item>
<item>EC_RGNTMOUT</item>
<item>EC_SCONFLICT</item>
<item>EC_SEMTMOUT</item>
<item>EC_SEXPECT</item>
<item>EC_SFULLEXPECT</item>
<item>EC_SNEXTPECT</item>
<item>EC_USERSET</item>
<item>EQ</item>
<item>EVENT</item>
<item>FAIL</item>
<item>FIRST</item>
<item>FORK</item>
<item>GE</item>
<item>GOAL</item>
<item>GT</item>
<item>HAND_SHAKE</item>
<item>HI</item>
<item>HIGH</item>
<item>HNUM</item>
<item>LE</item>
<item>LIC_EXIT</item>
<item>LIC_PRERR</item>
<item>LIC_PRWARN</item>
<item>LIC_WAIT</item>
<item>LO</item>
<item>LOAD</item>
<item>LOW</item>
<item>LT</item>
<item>MAILBOX</item>
<item>MAX_COM</item>
<item>NAME</item>
<item>NE</item>
<item>NEGEDGE</item>
<item>NEXT</item>
<item>NO_OVERLAP</item>
<item>NO_OVERLAP_STATE</item>
<item>NO_OVERLAP_TRANS</item>
<item>NO_VARS</item>
<item>NO_WAIT</item>
<item>NUM</item>
<item>NUM_BIN</item>
<item>NUM_DET</item>
<item>OFF</item>
<item>OK</item>
<item>OK_LAST</item>
<item>ON</item>
<item>ONE_BLAST</item>
<item>ONE_SHOT</item>
<item>ORDER</item>
<item>PAST_IT</item>
<item>PERCENT</item>
<item>POSEDGE</item>
<item>PROGRAM</item>
<item>RAWIN</item>
<item>REGION</item>
<item>REPORT</item>
<item>SAMPLE</item>
<item>SAVE</item>
<item>SEMAPHORE</item>
<item>SET</item>
<item>SILENT</item>
<item>STATE</item>
<item>STR</item>
<item>STR_ERR_OUT_OF_RANGE</item>
<item>STR_ERR_REGEXP_SYNTAX</item>
<item>SUM</item>
<item>TRANS</item>
<item>VERBOSE</item>
<item>WAIT</item>
<item>stderr</item>
<item>stdin</item>
<item>stdout</item>
</list>
<contexts>
<context attribute="Normal Text" lineEndContext="#stay" name="Normal">
<DetectSpaces />
<RegExpr attribute="Preprocessor" context="Outscoped" String="#\s*if\s+0" beginRegion="PP" firstNonSpace="true" />
<DetectChar context="AfterHash" char="#" firstNonSpace="true" lookAhead="true" />
<keyword attribute="Keyword" context="#stay" String="keywords"/>
<keyword attribute="Data Type" context="#stay" String="types"/>
<keyword attribute="Q Values" context="#stay" String="q_values"/>
<keyword attribute="Methods" context="#stay" String="methods"/>
<DetectChar attribute="String" context="String" char="""/>
<RegExpr attribute="Decimal" context="#stay" String="[\d_]*'d[\d_]+"/>
<RegExpr attribute="Octal" context="#stay" String="[\d_]*'o[0-7xXzZ_]+"/>
<RegExpr attribute="Hex" context="#stay" String="[\d_]*'h[\da-fA-FxXzZ_]+"/>
<RegExpr attribute="Binary" context="#stay" String="[\d_]*'b[01_zZxX]+"/>
<Float attribute="Float" context="#stay"/>
<Int attribute="Decimal" context="#stay"/>
<IncludeRules context="##Doxygen" />
<Detect2Chars attribute="Comment" context="Commentar 1" char="/" char1="/"/>
<Detect2Chars attribute="Comment" context="Commentar 2" char="/" char1="*" beginRegion="Comment"/>
<DetectChar attribute="Symbol" context="#stay" char="{" beginRegion="Brace1" />
<DetectChar attribute="Symbol" context="#stay" char="}" endRegion="Brace1" />
<AnyChar attribute="Symbol" context="#stay" String=":!%&()+,-/.*<=>?[]{|}~^;"/>
</context>
<context attribute="String" lineEndContext="#pop" name="String">
<LineContinue attribute="String" context="#stay"/>
<HlCStringChar attribute="String Char" context="#stay"/>
<DetectChar attribute="String" context="#pop" char="""/>
</context>
<context attribute="Comment" lineEndContext="#pop" name="Commentar 1">
<LineContinue attribute="Comment" context="#stay"/>
<DetectSpaces />
<IncludeRules context="##Alerts" />
<DetectIdentifier />
</context>
<context attribute="Comment" lineEndContext="#stay" name="Commentar 2">
<DetectSpaces />
<Detect2Chars attribute="Comment" context="#pop" char="*" char1="/" endRegion="Comment"/>
<IncludeRules context="##Alerts" />
<DetectIdentifier />
</context>
<context attribute="Error" lineEndContext="#pop" name="AfterHash">
<!-- define, elif, else, endif, error, if, ifdef, ifndef, include, include_next, line, pragma, undef, warning -->
<RegExpr attribute="Preprocessor" context="Preprocessor" String="#\s*if(?:def|ndef)?(?=\s+\S)" insensitive="true" beginRegion="PP" firstNonSpace="true" />
<RegExpr attribute="Preprocessor" context="Preprocessor" String="#\s*endif" insensitive="true" endRegion="PP" firstNonSpace="true" />
<RegExpr attribute="Preprocessor" context="Define" String="#\s*define.*((?=\\))" insensitive="true" firstNonSpace="true" />
<RegExpr attribute="Preprocessor" context="Preprocessor" String="#\s*(?:el(?:se|if)|include(?:_next)?|define|undef|line|error|warning|pragma)" insensitive="true" firstNonSpace="true" />
<RegExpr attribute="Preprocessor" context="Preprocessor" String="#\s+[0-9]+" insensitive="true" firstNonSpace="true" />
</context>
<context attribute="Preprocessor" lineEndContext="#pop" name="Preprocessor">
<LineContinue attribute="Preprocessor" context="#stay"/>
<RangeDetect attribute="Prep. Lib" context="#stay" char=""" char1="""/>
<RangeDetect attribute="Prep. Lib" context="#stay" char="<" char1=">"/>
<IncludeRules context="##Doxygen" />
<Detect2Chars attribute="Comment" context="Commentar/Preprocessor" char="/" char1="*" beginRegion="Comment2" />
<Detect2Chars attribute="Comment" context="Commentar 1" char="/" char1="/"/>
</context>
<context attribute="Preprocessor" lineEndContext="#pop" name="Define">
<LineContinue attribute="Preprocessor" context="#stay"/>
</context>
<context attribute="Comment" lineEndContext="#stay" name="Commentar/Preprocessor">
<DetectSpaces />
<Detect2Chars attribute="Comment" context="#pop" char="*" char1="/" endRegion="Comment2" />
<DetectIdentifier />
</context>
<context attribute="Comment" lineEndContext="#stay" name="Outscoped" >
<DetectSpaces />
<IncludeRules context="##Alerts" />
<DetectIdentifier />
<DetectChar attribute="String" context="String" char="""/>
<IncludeRules context="##Doxygen" />
<Detect2Chars attribute="Comment" context="Commentar 1" char="/" char1="/"/>
<Detect2Chars attribute="Comment" context="Commentar 2" char="/" char1="*" beginRegion="Comment"/>
<RegExpr attribute="Comment" context="Outscoped intern" String="#\s*if" beginRegion="PP" firstNonSpace="true" />
<RegExpr attribute="Preprocessor" context="#pop" String="#\s*el(?:se|if)" firstNonSpace="true" />
<RegExpr attribute="Preprocessor" context="#pop" String="#\s*endif" endRegion="PP" firstNonSpace="true" />
</context>
<context attribute="Comment" lineEndContext="#stay" name="Outscoped intern">
<DetectSpaces />
<IncludeRules context="##Alerts" />
<DetectIdentifier />
<DetectChar attribute="String" context="String" char="""/>
<IncludeRules context="##Doxygen" />
<Detect2Chars attribute="Comment" context="Commentar 1" char="/" char1="/"/>
<Detect2Chars attribute="Comment" context="Commentar 2" char="/" char1="*" beginRegion="Comment"/>
<RegExpr attribute="Comment" context="Outscoped intern" String="#\s*if" beginRegion="PP" firstNonSpace="true" />
<RegExpr attribute="Comment" context="#pop" String="#\s*endif" endRegion="PP" firstNonSpace="true" />
</context>
</contexts>
<itemDatas>
<itemData name="Normal Text" defStyleNum="dsNormal"/>
<itemData name="Keyword" defStyleNum="dsKeyword"/>
<itemData name="Q Values" defStyleNum="dsKeyword"/>
<itemData name="Methods" defStyleNum="dsKeyword"/>
<itemData name="Data Type" defStyleNum="dsDataType"/>
<itemData name="Decimal" defStyleNum="dsDecVal"/>
<itemData name="Octal" defStyleNum="dsBaseN"/>
<itemData name="Hex" defStyleNum="dsBaseN"/>
<itemData name="Float" defStyleNum="dsFloat"/>
<itemData name="Binary" defStyleNum="dsOthers"/>
<itemData name="String" defStyleNum="dsString"/>
<itemData name="String Char" defStyleNum="dsSpecialChar"/>
<itemData name="Comment" defStyleNum="dsComment"/>
<itemData name="Symbol" defStyleNum="dsNormal"/>
<itemData name="Preprocessor" defStyleNum="dsPreprocessor"/>
<itemData name="Prep. Lib" defStyleNum="dsPreprocessor"/>
<itemData name="Error" defStyleNum="dsError" />
</itemDatas>
</highlighting>
<general>
<comments>
<comment name="singleLine" start="//" />
<comment name="multiLine" start="/*" end="*/" region="Comment"/>
</comments>
<keywords casesensitive="1"/>
</general>
</language>
``` | /content/code_sandbox/src/data/extra/syntax-highlighting/syntax/vera.xml | xml | 2016-10-05T07:24:54 | 2024-08-16T05:03:40 | vnote | vnotex/vnote | 11,687 | 6,586 |
```xml
/* your_sha256_hash-------------
|your_sha256_hash------------*/
/**
* @packageDocumentation
* @module apputils-extension
*/
import {
ILayoutRestorer,
IRouter,
JupyterFrontEnd,
JupyterFrontEndPlugin
} from '@jupyterlab/application';
import {
Dialog,
ICommandPalette,
ISanitizer,
ISessionContextDialogs,
ISplashScreen,
IWindowResolver,
MainAreaWidget,
Printing,
Sanitizer,
SessionContextDialogs,
WindowResolver
} from '@jupyterlab/apputils';
import { PageConfig, PathExt, URLExt } from '@jupyterlab/coreutils';
import { ISettingRegistry } from '@jupyterlab/settingregistry';
import { IStateDB, StateDB } from '@jupyterlab/statedb';
import { ITranslator, nullTranslator } from '@jupyterlab/translation';
import { jupyterFaviconIcon } from '@jupyterlab/ui-components';
import { PromiseDelegate } from '@lumino/coreutils';
import { DisposableDelegate } from '@lumino/disposable';
import { Debouncer, Throttler } from '@lumino/polling';
import { announcements } from './announcements';
import { notificationPlugin } from './notificationplugin';
import { Palette } from './palette';
import { settingsPlugin } from './settingsplugin';
import { kernelStatus, runningSessionsStatus } from './statusbarplugin';
import { themesPaletteMenuPlugin, themesPlugin } from './themesplugins';
import { toolbarRegistry } from './toolbarregistryplugin';
import { workspacesPlugin } from './workspacesplugin';
import { IRenderMime } from '@jupyterlab/rendermime-interfaces';
import { displayShortcuts } from './shortcuts';
/**
* The interval in milliseconds before recover options appear during splash.
*/
const SPLASH_RECOVER_TIMEOUT = 12000;
/**
* The command IDs used by the apputils plugin.
*/
namespace CommandIDs {
export const loadState = 'apputils:load-statedb';
export const print = 'apputils:print';
export const reset = 'apputils:reset';
export const resetOnLoad = 'apputils:reset-on-load';
export const runFirstEnabled = 'apputils:run-first-enabled';
export const runAllEnabled = 'apputils:run-all-enabled';
export const toggleHeader = 'apputils:toggle-header';
export const displayShortcuts = 'apputils:display-shortcuts';
}
/**
* The default command palette extension.
*/
const palette: JupyterFrontEndPlugin<ICommandPalette> = {
id: '@jupyterlab/apputils-extension:palette',
description: 'Provides the command palette.',
autoStart: true,
requires: [ITranslator],
provides: ICommandPalette,
optional: [ISettingRegistry],
activate: (
app: JupyterFrontEnd,
translator: ITranslator,
settingRegistry: ISettingRegistry | null
) => {
return Palette.activate(app, translator, settingRegistry);
}
};
/**
* The default command palette's restoration extension.
*
* #### Notes
* The command palette's restoration logic is handled separately from the
* command palette provider extension because the layout restorer dependency
* causes the command palette to be unavailable to other extensions earlier
* in the application load cycle.
*/
const paletteRestorer: JupyterFrontEndPlugin<void> = {
id: '@jupyterlab/apputils-extension:palette-restorer',
description: 'Restores the command palette.',
autoStart: true,
requires: [ILayoutRestorer, ITranslator],
activate: (
app: JupyterFrontEnd,
restorer: ILayoutRestorer,
translator: ITranslator
) => {
Palette.restore(app, restorer, translator);
}
};
/**
* The default window name resolver provider.
*/
const resolver: JupyterFrontEndPlugin<IWindowResolver> = {
id: '@jupyterlab/apputils-extension:resolver',
description: 'Provides the window name resolver.',
autoStart: true,
provides: IWindowResolver,
requires: [JupyterFrontEnd.IPaths, IRouter],
activate: async (
app: JupyterFrontEnd,
paths: JupyterFrontEnd.IPaths,
router: IRouter
) => {
const { hash, search } = router.current;
const query = URLExt.queryStringToObject(search || '');
const solver = new WindowResolver();
const workspace = PageConfig.getOption('workspace');
const treePath = PageConfig.getOption('treePath');
const mode =
PageConfig.getOption('mode') === 'multiple-document' ? 'lab' : 'doc';
// This is used as a key in local storage to refer to workspaces, either the name
// of the workspace or the string PageConfig.defaultWorkspace. Both lab and doc modes share the same workspace.
const candidate = workspace ? workspace : PageConfig.defaultWorkspace;
const rest = treePath ? URLExt.join('tree', treePath) : '';
try {
await solver.resolve(candidate);
return solver;
} catch (error) {
// Window resolution has failed so the URL must change. Return a promise
// that never resolves to prevent the application from loading plugins
// that rely on `IWindowResolver`.
return new Promise<IWindowResolver>(() => {
const { base } = paths.urls;
const pool =
'abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789';
const random = pool[Math.floor(Math.random() * pool.length)];
let path = URLExt.join(base, mode, 'workspaces', `auto-${random}`);
path = rest ? URLExt.join(path, URLExt.encodeParts(rest)) : path;
// Reset the workspace on load.
query['reset'] = '';
const url = path + URLExt.objectToQueryString(query) + (hash || '');
router.navigate(url, { hard: true });
});
}
}
};
/**
* The default splash screen provider.
*/
const splash: JupyterFrontEndPlugin<ISplashScreen> = {
id: '@jupyterlab/apputils-extension:splash',
description: 'Provides the splash screen.',
autoStart: true,
requires: [ITranslator],
provides: ISplashScreen,
activate: (app: JupyterFrontEnd, translator: ITranslator) => {
const trans = translator.load('jupyterlab');
const { commands, restored } = app;
// Create splash element and populate it.
const splash = document.createElement('div');
const galaxy = document.createElement('div');
const logo = document.createElement('div');
splash.id = 'jupyterlab-splash';
galaxy.id = 'galaxy';
logo.id = 'main-logo';
jupyterFaviconIcon.element({
container: logo,
stylesheet: 'splash'
});
galaxy.appendChild(logo);
['1', '2', '3'].forEach(id => {
const moon = document.createElement('div');
const planet = document.createElement('div');
moon.id = `moon${id}`;
moon.className = 'moon orbit';
planet.id = `planet${id}`;
planet.className = 'planet';
moon.appendChild(planet);
galaxy.appendChild(moon);
});
splash.appendChild(galaxy);
// Create debounced recovery dialog function.
let dialog: Dialog<unknown> | null;
const recovery = new Throttler(
async () => {
if (dialog) {
return;
}
dialog = new Dialog({
title: trans.__('Loading'),
body: trans.__(`The loading screen is taking a long time.
Would you like to clear the workspace or keep waiting?`),
buttons: [
Dialog.cancelButton({ label: trans.__('Keep Waiting') }),
Dialog.warnButton({ label: trans.__('Clear Workspace') })
]
});
try {
const result = await dialog.launch();
dialog.dispose();
dialog = null;
if (result.button.accept && commands.hasCommand(CommandIDs.reset)) {
return commands.execute(CommandIDs.reset);
}
// Re-invoke the recovery timer in the next frame.
requestAnimationFrame(() => {
// Because recovery can be stopped, handle invocation rejection.
void recovery.invoke().catch(_ => undefined);
});
} catch (error) {
/* no-op */
}
},
{ limit: SPLASH_RECOVER_TIMEOUT, edge: 'trailing' }
);
// Return ISplashScreen.
let splashCount = 0;
return {
show: (light = true) => {
splash.classList.remove('splash-fade');
splash.classList.toggle('light', light);
splash.classList.toggle('dark', !light);
splashCount++;
document.body.appendChild(splash);
// Because recovery can be stopped, handle invocation rejection.
void recovery.invoke().catch(_ => undefined);
return new DisposableDelegate(async () => {
await restored;
if (--splashCount === 0) {
void recovery.stop();
if (dialog) {
dialog.dispose();
dialog = null;
}
splash.classList.add('splash-fade');
window.setTimeout(() => {
document.body.removeChild(splash);
}, 200);
}
});
}
};
}
};
const print: JupyterFrontEndPlugin<void> = {
id: '@jupyterlab/apputils-extension:print',
description: 'Add the print capability',
autoStart: true,
requires: [ITranslator],
activate: (app: JupyterFrontEnd, translator: ITranslator) => {
const trans = translator.load('jupyterlab');
app.commands.addCommand(CommandIDs.print, {
label: trans.__('Print'),
isEnabled: () => {
const widget = app.shell.currentWidget;
return Printing.getPrintFunction(widget) !== null;
},
execute: async () => {
const widget = app.shell.currentWidget;
const printFunction = Printing.getPrintFunction(widget);
if (printFunction) {
await printFunction();
}
}
});
app.shell.currentChanged?.connect(() => {
app.commands.notifyCommandChanged(CommandIDs.print);
});
}
};
export const toggleHeader: JupyterFrontEndPlugin<void> = {
id: '@jupyterlab/apputils-extension:toggle-header',
description: 'Adds a command to display the main area widget content header.',
autoStart: true,
requires: [ITranslator],
optional: [ICommandPalette],
activate: (
app: JupyterFrontEnd,
translator: ITranslator,
palette: ICommandPalette | null
) => {
const trans = translator.load('jupyterlab');
const category: string = trans.__('Main Area');
app.commands.addCommand(CommandIDs.toggleHeader, {
label: trans.__('Show Header Above Content'),
isEnabled: () =>
app.shell.currentWidget instanceof MainAreaWidget &&
!app.shell.currentWidget.contentHeader.isDisposed &&
app.shell.currentWidget.contentHeader.widgets.length > 0,
isToggled: () => {
const widget = app.shell.currentWidget;
return widget instanceof MainAreaWidget
? !widget.contentHeader.isHidden
: false;
},
execute: async () => {
const widget = app.shell.currentWidget;
if (widget instanceof MainAreaWidget) {
widget.contentHeader.setHidden(!widget.contentHeader.isHidden);
}
}
});
app.shell.currentChanged?.connect(() => {
app.commands.notifyCommandChanged(CommandIDs.toggleHeader);
});
if (palette) {
palette.addItem({ command: CommandIDs.toggleHeader, category });
}
}
};
/**
* Update the browser title based on the workspace and the current
* active item.
*/
async function updateTabTitle(workspace: string, db: IStateDB, name: string) {
const data: any = await db.toJSON();
let current: string = data['layout-restorer:data']?.main?.current;
if (current === undefined) {
document.title = `${PageConfig.getOption('appName') || 'JupyterLab'}${
workspace.startsWith('auto-') ? ` (${workspace})` : ``
}`;
} else {
// File name from current path
let currentFile: string = PathExt.basename(
decodeURIComponent(window.location.href)
);
// Truncate to first 12 characters of current document name + ... if length > 15
currentFile =
currentFile.length > 15
? currentFile.slice(0, 12).concat(``)
: currentFile;
// Number of restorable items that are either notebooks or editors
const count: number = Object.keys(data).filter(
item => item.startsWith('notebook') || item.startsWith('editor')
).length;
if (workspace.startsWith('auto-')) {
document.title = `${currentFile} (${workspace}${
count > 1 ? ` : ${count}` : ``
}) - ${name}`;
} else {
document.title = `${currentFile}${
count > 1 ? ` (${count})` : ``
} - ${name}`;
}
}
}
/**
* The default state database for storing application state.
*
* #### Notes
* If this extension is loaded with a window resolver, it will automatically add
* state management commands, URL support for `clone` and `reset`, and workspace
* auto-saving. Otherwise, it will return a simple in-memory state database.
*/
const state: JupyterFrontEndPlugin<IStateDB> = {
id: '@jupyterlab/apputils-extension:state',
description: 'Provides the application state. It is stored per workspaces.',
autoStart: true,
provides: IStateDB,
requires: [JupyterFrontEnd.IPaths, IRouter, ITranslator],
optional: [IWindowResolver],
activate: (
app: JupyterFrontEnd,
paths: JupyterFrontEnd.IPaths,
router: IRouter,
translator: ITranslator,
resolver: IWindowResolver | null
) => {
const trans = translator.load('jupyterlab');
if (resolver === null) {
return new StateDB();
}
let resolved = false;
const { commands, name, serviceManager } = app;
const { workspaces } = serviceManager;
const workspace = resolver.name;
const transform = new PromiseDelegate<StateDB.DataTransform>();
const db = new StateDB({ transform: transform.promise });
const save = new Debouncer(async () => {
const id = workspace;
const metadata = { id };
const data = await db.toJSON();
await workspaces.save(id, { data, metadata });
});
// Any time the local state database changes, save the workspace.
db.changed.connect(() => void save.invoke(), db);
db.changed.connect(() => updateTabTitle(workspace, db, name));
commands.addCommand(CommandIDs.loadState, {
label: trans.__('Load state for the current workspace.'),
execute: async (args: IRouter.ILocation) => {
// Since the command can be executed an arbitrary number of times, make
// sure it is safe to call multiple times.
if (resolved) {
return;
}
const { hash, path, search } = args;
const query = URLExt.queryStringToObject(search || '');
const clone =
typeof query['clone'] === 'string'
? query['clone'] === ''
? PageConfig.defaultWorkspace
: query['clone']
: null;
const source = clone || workspace || null;
if (source === null) {
console.error(`${CommandIDs.loadState} cannot load null workspace.`);
return;
}
try {
const saved = await workspaces.fetch(source);
// If this command is called after a reset, the state database
// will already be resolved.
if (!resolved) {
resolved = true;
transform.resolve({ type: 'overwrite', contents: saved.data });
}
} catch ({ message }) {
console.warn(`Fetching workspace "${workspace}" failed.`, message);
// If the workspace does not exist, cancel the data transformation
// and save a workspace with the current user state data.
if (!resolved) {
resolved = true;
transform.resolve({ type: 'cancel', contents: null });
}
}
if (source === clone) {
// Maintain the query string parameters but remove `clone`.
delete query['clone'];
const url = path + URLExt.objectToQueryString(query) + hash;
const cloned = save.invoke().then(() => router.stop);
// After the state has been cloned, navigate to the URL.
void cloned.then(() => {
router.navigate(url);
});
return cloned;
}
// After the state database has finished loading, save it.
await save.invoke();
}
});
commands.addCommand(CommandIDs.reset, {
label: trans.__('Reset Application State'),
execute: async ({ reload }: { reload: boolean }) => {
await db.clear();
await save.invoke();
if (reload) {
router.reload();
}
}
});
commands.addCommand(CommandIDs.resetOnLoad, {
label: trans.__('Reset state when loading for the workspace.'),
execute: (args: IRouter.ILocation) => {
const { hash, path, search } = args;
const query = URLExt.queryStringToObject(search || '');
const reset = 'reset' in query;
const clone = 'clone' in query;
if (!reset) {
return;
}
// If the state database has already been resolved, resetting is
// impossible without reloading.
if (resolved) {
return router.reload();
}
// Empty the state database.
resolved = true;
transform.resolve({ type: 'clear', contents: null });
// Maintain the query string parameters but remove `reset`.
delete query['reset'];
const url = path + URLExt.objectToQueryString(query) + hash;
const cleared = db.clear().then(() => save.invoke());
// After the state has been reset, navigate to the URL.
if (clone) {
void cleared.then(() => {
router.navigate(url, { hard: true });
});
} else {
void cleared.then(() => {
router.navigate(url);
});
}
return cleared;
}
});
router.register({
command: CommandIDs.loadState,
pattern: /.?/,
rank: 30 // High priority: 30:100.
});
router.register({
command: CommandIDs.resetOnLoad,
pattern: /(\?reset|\&reset)($|&)/,
rank: 20 // High priority: 20:100.
});
return db;
}
};
/**
* The default session context dialogs extension.
*/
const sessionDialogs: JupyterFrontEndPlugin<ISessionContextDialogs> = {
id: '@jupyterlab/apputils-extension:sessionDialogs',
description: 'Provides the session context dialogs.',
provides: ISessionContextDialogs,
optional: [ITranslator, ISettingRegistry],
autoStart: true,
activate: async (
app: JupyterFrontEnd,
translator: ITranslator | null,
settingRegistry: ISettingRegistry | null
) => {
return new SessionContextDialogs({
translator: translator ?? nullTranslator,
settingRegistry: settingRegistry ?? null
});
}
};
/**
* Utility commands
*/
const utilityCommands: JupyterFrontEndPlugin<void> = {
id: '@jupyterlab/apputils-extension:utilityCommands',
description: 'Adds meta commands to run set of other commands.',
requires: [ITranslator],
optional: [ICommandPalette],
autoStart: true,
activate: (
app: JupyterFrontEnd,
translator: ITranslator,
palette: ICommandPalette | null
) => {
const trans = translator.load('jupyterlab');
const { commands } = app;
commands.addCommand(CommandIDs.runFirstEnabled, {
label: trans.__('Run First Enabled Command'),
execute: args => {
const commands: string[] = args.commands as string[];
const commandArgs: any = args.args;
const argList = Array.isArray(args);
for (let i = 0; i < commands.length; i++) {
const cmd = commands[i];
const arg = argList ? commandArgs[i] : commandArgs;
if (app.commands.isEnabled(cmd, arg)) {
return app.commands.execute(cmd, arg);
}
}
}
});
// Add a command for taking lists of commands and command arguments
// and running all the enabled commands.
commands.addCommand(CommandIDs.runAllEnabled, {
label: trans.__('Run All Enabled Commands Passed as Args'),
execute: async args => {
const commands: string[] = (args.commands as string[]) ?? [];
const commandArgs: any = args.args;
const argList = Array.isArray(args);
const errorIfNotEnabled: boolean =
(args.errorIfNotEnabled as boolean) ?? false;
for (let i = 0; i < commands.length; i++) {
const cmd = commands[i];
const arg = argList ? commandArgs[i] : commandArgs;
if (app.commands.isEnabled(cmd, arg)) {
await app.commands.execute(cmd, arg);
} else {
if (errorIfNotEnabled) {
console.error(`${cmd} is not enabled.`);
}
}
}
},
isEnabled: args => {
const commands: string[] = (args.commands as string[]) ?? [];
const commandArgs: any = args.args;
const argList = Array.isArray(args);
return commands.some((cmd, idx) =>
app.commands.isEnabled(cmd, argList ? commandArgs[idx] : commandArgs)
);
}
});
commands.addCommand(CommandIDs.displayShortcuts, {
label: trans.__('Show Keyboard Shortcuts'),
caption: trans.__(
'Show relevant keyboard shortcuts for the current active widget'
),
execute: args => {
const currentWidget = app.shell.currentWidget;
const included = currentWidget?.node.contains(document.activeElement);
if (!included && currentWidget instanceof MainAreaWidget) {
const currentNode = currentWidget.content.node ?? currentWidget?.node;
currentNode?.focus();
}
const options = { commands, trans };
return displayShortcuts(options);
}
});
if (palette) {
const category: string = trans.__('Help');
palette.addItem({ command: CommandIDs.displayShortcuts, category });
}
}
};
/**
* The default HTML sanitizer.
*/
const sanitizer: JupyterFrontEndPlugin<IRenderMime.ISanitizer> = {
id: '@jupyterlab/apputils-extension:sanitizer',
description: 'Provides the HTML sanitizer.',
autoStart: true,
provides: ISanitizer,
requires: [ISettingRegistry],
activate: (
app: JupyterFrontEnd,
settings: ISettingRegistry
): IRenderMime.ISanitizer => {
const sanitizer = new Sanitizer();
const loadSetting = (setting: ISettingRegistry.ISettings): void => {
const allowedSchemes = setting.get('allowedSchemes')
.composite as Array<string>;
const autolink = setting.get('autolink').composite as boolean;
if (allowedSchemes) {
sanitizer.setAllowedSchemes(allowedSchemes);
}
sanitizer.setAutolink(autolink);
};
// Wait for the application to be restored and
// for the settings for this plugin to be loaded
settings
.load('@jupyterlab/apputils-extension:sanitizer')
.then(setting => {
// Read the settings
loadSetting(setting);
// Listen for your plugin setting changes using Signal
setting.changed.connect(loadSetting);
})
.catch(reason => {
console.error(`Failed to load sanitizer settings:`, reason);
});
return sanitizer;
}
};
/**
* Export the plugins as default.
*/
const plugins: JupyterFrontEndPlugin<any>[] = [
announcements,
kernelStatus,
notificationPlugin,
palette,
paletteRestorer,
print,
resolver,
runningSessionsStatus,
sanitizer,
settingsPlugin,
state,
splash,
sessionDialogs,
themesPlugin,
themesPaletteMenuPlugin,
toggleHeader,
toolbarRegistry,
utilityCommands,
workspacesPlugin
];
export default plugins;
``` | /content/code_sandbox/packages/apputils-extension/src/index.ts | xml | 2016-06-03T20:09:17 | 2024-08-16T19:12:44 | jupyterlab | jupyterlab/jupyterlab | 14,019 | 5,235 |
```xml
<?xml version="1.0" encoding="utf-8"?>
<!--
~
~
~ path_to_url
~
~ Unless required by applicable law or agreed to in writing, software
~ WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
-->
<resources>
<string name="item_view_role_description">Guia</string>
</resources>
``` | /content/code_sandbox/lib/java/com/google/android/material/resources/res/values-pt-rBR/strings.xml | xml | 2016-12-05T16:11:29 | 2024-08-16T17:51:42 | material-components-android | material-components/material-components-android | 16,176 | 84 |
```xml
<Documentation>
<Docs DocId="T:CoreImage.CISixfoldRotatedTile">
<summary>A <see cref="T:CoreImage.CITileFilter" /> that rotates the image in 60-degree increments.</summary>
<remarks>
<para>The following example shows this filter in use</para>
<example>
<code lang="csharp lang-csharp"><![CDATA[
// Create the CIImage from a file
CIImage flower = CIImage.FromCGImage (UIImage.FromFile ("flower.png").CGImage);
// Create a CISixfoldRotatedTile filter with the input image
var sixfold_rotated_tile = new CISixfoldRotatedTile () {
Image = flower
};
// Get the altered image from the filter
var output = new CICrop {
Image = sixfold_rotated_tile.OutputImage,
Rectangle = new CIVector (0, 0, 400, 300)
}.OutputImage;
// To render the results, we need to create a context, and then
// use one of the context rendering APIs, in this case, we render the
// result into a CoreGraphics image, which is merely a useful representation
//
var context = CIContext.FromOptions (null);
var cgimage = context.CreateCGImage (output, output.Extent);
// The above cgimage can be added to a screen view, for example, this
// would add it to a UIImageView on the screen:
myImageView.Image = UIImage.FromImage (cgimage);
]]></code>
</example>
<para>
With the following image input:
</para>
<para>
<img href="~/CoreImage/_images/flower.png" alt="Photograph of a sunflower." />
</para>
<para>
Produces the following output:
</para>
<para>
<img href="~/CoreImage/_images/sixfold_rotated_tile.png" alt="Result of applying the filter." />
</para>
<para>
"Flower" 2012 Milica Sekulic, used under a Creative Commons Attribution-ShareAlike license: path_to_url
</para>
</remarks>
</Docs>
</Documentation>
``` | /content/code_sandbox/docs/api/CoreImage/CISixfoldRotatedTile.xml | xml | 2016-04-20T18:24:26 | 2024-08-16T13:29:19 | xamarin-macios | xamarin/xamarin-macios | 2,436 | 474 |
```xml
/*
* This software is released under MIT license.
* The full license information can be found in LICENSE in the root directory of this project.
*/
import { renderIcon } from '../icon.renderer.js';
import { IconShapeTuple } from '../interfaces/icon.interfaces.js';
const icon = {
outline:
'<circle cx="12" cy="24" r="1.5"/><circle cx="18" cy="24" r="1.5"/><circle cx="18" cy="18" r="1.5"/><circle cx="24" cy="12" r="1.5"/><circle cx="24" cy="24" r="1.5"/><circle cx="24" cy="18" r="1.5"/>',
};
export const dragHandleCornerIconName = 'drag-handle-corner';
export const dragHandleCornerIcon: IconShapeTuple = [dragHandleCornerIconName, renderIcon(icon)];
``` | /content/code_sandbox/packages/core/src/icon/shapes/drag-handle-corner.ts | xml | 2016-09-29T17:24:17 | 2024-08-11T17:06:15 | clarity | vmware-archive/clarity | 6,431 | 190 |
```xml
import { AbortController } from "./AbortController";
import { HttpError, TimeoutError } from "./Errors";
import { HttpClient, HttpRequest } from "./HttpClient";
import { ILogger, LogLevel } from "./ILogger";
import { ITransport, TransferFormat } from "./ITransport";
import { Arg, getDataDetail, sendMessage } from "./Utils";
// Not exported from 'index', this type is internal.
/** @private */
export class LongPollingTransport implements ITransport {
private readonly httpClient: HttpClient;
private readonly accessTokenFactory: (() => string | Promise<string>) | undefined;
private readonly logger: ILogger;
private readonly logMessageContent: boolean;
private readonly pollAbort: AbortController;
private url?: string;
private running: boolean;
private receiving?: Promise<void>;
private closeError?: Error;
public onreceive: ((data: string | ArrayBuffer) => void) | null;
public onclose: ((error?: Error) => void) | null;
// This is an internal type, not exported from 'index' so this is really just internal.
public get pollAborted() {
return this.pollAbort.aborted;
}
constructor(httpClient: HttpClient, accessTokenFactory: (() => string | Promise<string>) | undefined, logger: ILogger, logMessageContent: boolean) {
this.httpClient = httpClient;
this.accessTokenFactory = accessTokenFactory;
this.logger = logger;
this.pollAbort = new AbortController();
this.logMessageContent = logMessageContent;
this.running = false;
this.onreceive = null;
this.onclose = null;
}
public async connect(url: string, transferFormat: TransferFormat): Promise<void> {
Arg.isRequired(url, "url");
Arg.isRequired(transferFormat, "transferFormat");
Arg.isIn(transferFormat, TransferFormat, "transferFormat");
this.url = url;
this.logger.log(LogLevel.Trace, "(LongPolling transport) Connecting.");
// Allow binary format on Node and Browsers that support binary content (indicated by the presence of responseType property)
if (transferFormat === TransferFormat.Binary &&
(typeof XMLHttpRequest !== "undefined" && typeof new XMLHttpRequest().responseType !== "string")) {
throw new Error("Binary protocols over XmlHttpRequest not implementing advanced features are not supported.");
}
const pollOptions: HttpRequest = {
abortSignal: this.pollAbort.signal,
headers: {},
timeout: 100000,
};
if (transferFormat === TransferFormat.Binary) {
pollOptions.responseType = "arraybuffer";
}
const token = await this.getAccessToken();
this.updateHeaderToken(pollOptions, token);
// Make initial long polling request
// Server uses first long polling request to finish initializing connection and it returns without data
const pollUrl = `${url}&_=${Date.now()}`;
this.logger.log(LogLevel.Trace, `(LongPolling transport) polling: ${pollUrl}.`);
const response = await this.httpClient.get(pollUrl, pollOptions);
if (response.statusCode !== 200) {
this.logger.log(LogLevel.Error, `(LongPolling transport) Unexpected response code: ${response.statusCode}.`);
// Mark running as false so that the poll immediately ends and runs the close logic
this.closeError = new HttpError(response.statusText || "", response.statusCode);
this.running = false;
} else {
this.running = true;
}
this.receiving = this.poll(this.url, pollOptions);
}
private async getAccessToken(): Promise<string | null> {
if (this.accessTokenFactory) {
return await this.accessTokenFactory();
}
return null;
}
private updateHeaderToken(request: HttpRequest, token: string | null) {
if (!request.headers) {
request.headers = {};
}
if (token) {
// tslint:disable-next-line:no-string-literal
request.headers["Authorization"] = `Bearer ${token}`;
return;
}
// tslint:disable-next-line:no-string-literal
if (request.headers["Authorization"]) {
// tslint:disable-next-line:no-string-literal
delete request.headers["Authorization"];
}
}
private async poll(url: string, pollOptions: HttpRequest): Promise<void> {
try {
while (this.running) {
// We have to get the access token on each poll, in case it changes
const token = await this.getAccessToken();
this.updateHeaderToken(pollOptions, token);
try {
const pollUrl = `${url}&_=${Date.now()}`;
this.logger.log(LogLevel.Trace, `(LongPolling transport) polling: ${pollUrl}.`);
const response = await this.httpClient.get(pollUrl, pollOptions);
if (response.statusCode === 204) {
this.logger.log(LogLevel.Information, "(LongPolling transport) Poll terminated by server.");
this.running = false;
} else if (response.statusCode !== 200) {
this.logger.log(LogLevel.Error, `(LongPolling transport) Unexpected response code: ${response.statusCode}.`);
// Unexpected status code
this.closeError = new HttpError(response.statusText || "", response.statusCode);
this.running = false;
} else {
// Process the response
if (response.content) {
this.logger.log(LogLevel.Trace, `(LongPolling transport) data received. ${getDataDetail(response.content, this.logMessageContent)}.`);
if (this.onreceive) {
this.onreceive(response.content);
}
} else {
// This is another way timeout manifest.
this.logger.log(LogLevel.Trace, "(LongPolling transport) Poll timed out, reissuing.");
}
}
} catch (e) {
if (!this.running) {
// Log but disregard errors that occur after stopping
this.logger.log(LogLevel.Trace, `(LongPolling transport) Poll errored after shutdown: ${e.message}`);
} else {
if (e instanceof TimeoutError) {
// Ignore timeouts and reissue the poll.
this.logger.log(LogLevel.Trace, "(LongPolling transport) Poll timed out, reissuing.");
} else {
// Close the connection with the error as the result.
this.closeError = e;
this.running = false;
}
}
}
}
} finally {
this.logger.log(LogLevel.Trace, "(LongPolling transport) Polling complete.");
// We will reach here with pollAborted==false when the server returned a response causing the transport to stop.
// If pollAborted==true then client initiated the stop and the stop method will raise the close event after DELETE is sent.
if (!this.pollAborted) {
this.raiseOnClose();
}
}
}
public async send(data: any): Promise<void> {
if (!this.running) {
return Promise.reject(new Error("Cannot send until the transport is connected"));
}
return sendMessage(this.logger, "LongPolling", this.httpClient, this.url!, this.accessTokenFactory, data, this.logMessageContent);
}
public async stop(): Promise<void> {
this.logger.log(LogLevel.Trace, "(LongPolling transport) Stopping polling.");
// Tell receiving loop to stop, abort any current request, and then wait for it to finish
this.running = false;
this.pollAbort.abort();
try {
await this.receiving;
// Send DELETE to clean up long polling on the server
this.logger.log(LogLevel.Trace, `(LongPolling transport) sending DELETE request to ${this.url}.`);
const deleteOptions: HttpRequest = {
headers: {},
};
const token = await this.getAccessToken();
this.updateHeaderToken(deleteOptions, token);
await this.httpClient.delete(this.url!, deleteOptions);
this.logger.log(LogLevel.Trace, "(LongPolling transport) DELETE request sent.");
} finally {
this.logger.log(LogLevel.Trace, "(LongPolling transport) Stop finished.");
// Raise close event here instead of in polling
// It needs to happen after the DELETE request is sent
this.raiseOnClose();
}
}
private raiseOnClose() {
if (this.onclose) {
let logMessage = "(LongPolling transport) Firing onclose event.";
if (this.closeError) {
logMessage += " Error: " + this.closeError;
}
this.logger.log(LogLevel.Trace, logMessage);
this.onclose(this.closeError);
}
}
}
``` | /content/code_sandbox/clients/ts/signalr/src/LongPollingTransport.ts | xml | 2016-10-17T16:39:15 | 2024-08-15T16:33:14 | SignalR | aspnet/SignalR | 2,383 | 1,766 |
```xml
/*
* Squidex Headless CMS
*
* @license
*/
import { Component } from '@angular/core';
import { RouterLink, RouterLinkActive, RouterOutlet } from '@angular/router';
import { AppsState, ExternalLinkDirective, LayoutComponent, TitleComponent, TourStepDirective, TranslatePipe } from '@app/shared';
@Component({
standalone: true,
selector: 'sqx-api-area',
styleUrls: ['./api-area.component.scss'],
templateUrl: './api-area.component.html',
imports: [
ExternalLinkDirective,
LayoutComponent,
RouterLink,
RouterLinkActive,
RouterOutlet,
TitleComponent,
TourStepDirective,
TranslatePipe,
],
})
export class ApiAreaComponent {
constructor(
public readonly appsState: AppsState,
) {
}
}
``` | /content/code_sandbox/frontend/src/app/features/api/api-area.component.ts | xml | 2016-08-29T05:53:40 | 2024-08-16T17:39:38 | squidex | Squidex/squidex | 2,222 | 169 |
```xml
import React from 'react';
import { render } from '../../test/test-react-testing-library';
import LinkExternal from './LinkExternal';
describe('<LinkExternal /> component', () => {
test('should render the component in default state', () => {
const { container } = render(<LinkExternal to={'/'} />);
expect(container.firstChild).toMatchSnapshot();
});
test('should render the component with external link', () => {
const { container } = render(
<LinkExternal to={'path_to_url}>{'Example'}</LinkExternal>
);
expect(container.firstChild).toMatchSnapshot();
});
});
``` | /content/code_sandbox/packages/ui-components/src/components/LinkExternal/LinkExternal.test.tsx | xml | 2016-04-15T16:21:12 | 2024-08-16T09:38:01 | verdaccio | verdaccio/verdaccio | 16,189 | 126 |
```xml
export const breakpointToNumber = (str: string): number =>
parseInt(str.substring(0, str.indexOf('px')), 10);
``` | /content/code_sandbox/src/theme/helpers.ts | xml | 2016-12-04T01:35:27 | 2024-08-14T21:41:58 | MyCrypto | MyCryptoHQ/MyCrypto | 1,347 | 29 |
```xml
import { expect } from 'chai';
import { Model } from '../../../src/model/model/model';
describe('model', () => {
describe('constructor', () => {
it('should equal Model class', () => {
expect(Model.prototype.constructor).to.equal(Model);
});
});
});
``` | /content/code_sandbox/test/specs/models/model.spec.ts | xml | 2016-01-27T11:25:52 | 2024-08-13T16:56:45 | sequelize-typescript | sequelize/sequelize-typescript | 2,768 | 61 |
```xml
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "path_to_url">
<plist version="1.0">
<dict>
<key>CFBundleIdentifier</key>
<string>com.jazzy.katana</string>
<key>CFBundleName</key>
<string>Katana</string>
<key>DocSetPlatformFamily</key>
<string>katana</string>
<key>isDashDocset</key>
<true/>
<key>dashIndexFilePath</key>
<string>index.html</string>
<key>isJavaScriptEnabled</key>
<true/>
<key>DashDocSetFamily</key>
<string>dashtoc</string>
</dict>
</plist>
``` | /content/code_sandbox/docs/latest/docsets/Katana.docset/Contents/Info.plist | xml | 2016-08-09T08:09:22 | 2024-08-10T03:34:45 | katana-swift | BendingSpoons/katana-swift | 2,251 | 188 |
```xml
/*
Use of this source code is governed by an MIT-style
license that can be found in the LICENSE file or at
path_to_url
*/
import {logger} from 'workbox-core/_private/logger.js';
import {
RouteHandlerCallback,
RouteHandlerCallbackOptions,
} from 'workbox-core/types.js';
import {createHeaders} from './utils/createHeaders.js';
import {concatenateToResponse} from './concatenateToResponse.js';
import {isSupported} from './isSupported.js';
import {StreamSource} from './_types.js';
import './_version.js';
export interface StreamsHandlerCallback {
({url, request, event, params}: RouteHandlerCallbackOptions):
| Promise<StreamSource>
| StreamSource;
}
/**
* A shortcut to create a strategy that could be dropped-in to Workbox's router.
*
* On browsers that do not support constructing new `ReadableStream`s, this
* strategy will automatically wait for all the `sourceFunctions` to complete,
* and create a final response that concatenates their values together.
*
* @param {Array<function({event, request, url, params})>} sourceFunctions
* An array of functions similar to {@link workbox-routing~handlerCallback}
* but that instead return a {@link workbox-streams.StreamSource} (or a
* Promise which resolves to one).
* @param {HeadersInit} [headersInit] If there's no `Content-Type` specified,
* `'text/html'` will be used by default.
* @return {workbox-routing~handlerCallback}
* @memberof workbox-streams
*/
function strategy(
sourceFunctions: StreamsHandlerCallback[],
headersInit: HeadersInit,
): RouteHandlerCallback {
return async ({event, request, url, params}: RouteHandlerCallbackOptions) => {
const sourcePromises = sourceFunctions.map((fn) => {
// Ensure the return value of the function is always a promise.
return Promise.resolve(fn({event, request, url, params}));
});
if (isSupported()) {
const {done, response} = concatenateToResponse(
sourcePromises,
headersInit,
);
if (event) {
event.waitUntil(done);
}
return response;
}
if (process.env.NODE_ENV !== 'production') {
logger.log(
`The current browser doesn't support creating response ` +
`streams. Falling back to non-streaming response instead.`,
);
}
// Fallback to waiting for everything to finish, and concatenating the
// responses.
const blobPartsPromises = sourcePromises.map(async (sourcePromise) => {
const source = await sourcePromise;
if (source instanceof Response) {
return source.blob();
} else {
// Technically, a `StreamSource` object can include any valid
// `BodyInit` type, including `FormData` and `URLSearchParams`, which
// cannot be passed to the Blob constructor directly, so we have to
// convert them to actual Blobs first.
return new Response(source).blob();
}
});
const blobParts = await Promise.all(blobPartsPromises);
const headers = createHeaders(headersInit);
// Constructing a new Response from a Blob source is well-supported.
// So is constructing a new Blob from multiple source Blobs or strings.
return new Response(new Blob(blobParts), {headers});
};
}
export {strategy};
``` | /content/code_sandbox/packages/workbox-streams/src/strategy.ts | xml | 2016-04-04T15:55:19 | 2024-08-16T08:33:26 | workbox | GoogleChrome/workbox | 12,245 | 728 |
```xml
import { LangCz } from "./lang-cz.js";
import { LangEn } from "./lang-en.js";
import { LangEs } from "./lang-es.js";
import { LangFr } from "./lang-fr.js";
import { LangJa } from "./lang-ja.js";
import { LangKo } from "./lang-ko.js";
import { LangIt } from "./lang-it.js";
import { LangPt } from "./lang-pt.js";
import { LangZh } from "./lang-zh.js";
import type { Wordlist } from "./wordlist.js";
/**
* The available Wordlists by their
* [ISO 639-1 Language Code](link-wiki-iso639).
*
* (**i.e.** [cz](LangCz), [en](LangEn), [es](LangEs), [fr](LangFr),
* [ja](LangJa), [ko](LangKo), [it](LangIt), [pt](LangPt),
* [zh_cn](LangZh), [zh_tw](LangZh))
*
* The dist files (in the ``/dist`` folder) have had all languages
* except English stripped out, which reduces the library size by
* about 80kb. If required, they are available by importing the
* included ``wordlists-extra.min.js`` file.
*/
export const wordlists: Record<string, Wordlist> = {
cz: LangCz.wordlist(),
en: LangEn.wordlist(),
es: LangEs.wordlist(),
fr: LangFr.wordlist(),
it: LangIt.wordlist(),
pt: LangPt.wordlist(),
ja: LangJa.wordlist(),
ko: LangKo.wordlist(),
zh_cn: LangZh.wordlist("cn"),
zh_tw: LangZh.wordlist("tw"),
};
``` | /content/code_sandbox/src.ts/wordlists/wordlists.ts | xml | 2016-07-16T04:35:37 | 2024-08-16T13:37:46 | ethers.js | ethers-io/ethers.js | 7,843 | 389 |
```xml
import { Entity } from "../../../../../src/decorator/entity/Entity"
import { Column } from "../../../../../src/decorator/columns/Column"
import { PrimaryGeneratedColumn } from "../../../../../src/decorator/columns/PrimaryGeneratedColumn"
@Entity({ database: "secondDB", schema: "answers" })
export class Answer {
@PrimaryGeneratedColumn()
id: number
@Column()
text: string
@Column()
questionId: number
}
``` | /content/code_sandbox/test/functional/multi-schema-and-database/multi-schema-and-database-basic-functionality/entity/Answer.ts | xml | 2016-02-29T07:41:14 | 2024-08-16T18:28:52 | typeorm | typeorm/typeorm | 33,875 | 101 |
```xml
import { saveRecording } from "backend/sessionRecording/saveRecording";
import { compressEvents, getSessionEventsToSave } from "../../../utils/sessionEvents";
import { getRecordingOptionsToSave } from "features/sessionBook/utils/sessionFile";
import { toast } from "utils/Toast";
import { trackDraftSessionSaveFailed, trackDraftSessionSaved } from "features/sessionBook/analytics";
import { SessionRecordingMetadata, SessionSaveMode } from "../../../types";
import { IncentivizeEvent, UserIncentiveEvent } from "features/incentivization/types";
import { Dispatch } from "@reduxjs/toolkit";
import { incentivizationActions } from "store/features/incentivization/slice";
import { IncentivizationModal } from "store/features/incentivization/types";
import PATHS from "config/constants/sub/paths";
import { CONSTANTS as GLOBAL_CONSTANTS } from "@requestly/requestly-core";
import { NavigateFunction } from "react-router-dom";
import { CheckboxValueType } from "antd/lib/checkbox/Group";
export const generateDraftSessionTitle = (url: string) => {
const hostname = new URL(url).hostname.split(".").slice(0, -1).join(".");
const date = new Date();
const month = date.toLocaleString("default", { month: "short" });
const formattedDate = `${date.getDate()}${month}${date.getFullYear()}`;
return `${hostname}@${formattedDate}`;
};
export const saveDraftSession = async (
user: any,
userAttributes: any,
appMode: string,
dispatch: Dispatch,
navigate: NavigateFunction,
workspaceId: string,
sessionRecordingMetadata: SessionRecordingMetadata,
sessionEvents: any,
recordingOptions: CheckboxValueType[],
source: string,
claimIncentiveRewards: (event: UserIncentiveEvent) => Promise<unknown>,
isOpenedInIframe?: boolean
) => {
const isDraftSession = window.location.pathname.includes("draft") || appMode === GLOBAL_CONSTANTS.APP_MODES.DESKTOP;
const recordingOptionsToSave = getRecordingOptionsToSave(recordingOptions);
if (isOpenedInIframe) {
window.parent.postMessage({ action: "draftSessionSaveClicked", source: "requestly:client" }, "*");
}
return saveRecording(
user?.details?.profile?.uid,
workspaceId,
sessionRecordingMetadata,
compressEvents(getSessionEventsToSave(sessionEvents, recordingOptionsToSave)),
recordingOptionsToSave,
source,
null
).then((response) => {
if (response?.success) {
toast.success("Recording saved successfully");
trackDraftSessionSaved({
session_length: sessionRecordingMetadata?.sessionAttributes?.duration,
options: recordingOptionsToSave,
type: SessionSaveMode.ONLINE,
source,
recording_mode: sessionRecordingMetadata?.recordingMode,
});
if (isDraftSession) {
claimIncentiveRewards({
type: IncentivizeEvent.SESSION_RECORDED,
metadata: { num_sessions: userAttributes?.num_sessions || 1 },
})?.then((response: any) => {
if (response.data?.success) {
dispatch(
incentivizationActions.setUserMilestoneAndRewardDetails({
userMilestoneAndRewardDetails: response.data?.data,
})
);
dispatch(
incentivizationActions.toggleActiveModal({
modalName: IncentivizationModal.TASK_COMPLETED_MODAL,
newValue: true,
newProps: { event: IncentivizeEvent.SESSION_RECORDED },
})
);
}
});
}
if (isOpenedInIframe) {
window.parent.postMessage(
{ action: "draftSessionSaved", source: "requestly:client", payload: { sessionId: response?.firestoreId } },
"*"
);
} else {
let path = "/" + PATHS.SESSIONS.RELATIVE + "/saved/" + response?.firestoreId;
if (appMode === GLOBAL_CONSTANTS.APP_MODES.DESKTOP)
path = PATHS.SESSIONS.DESKTOP.SAVED_WEB_SESSION_VIEWER.ABSOLUTE + `/${response?.firestoreId}`;
navigate(path, {
state: { fromApp: true, viewAfterSave: true },
});
}
} else {
toast.error(response?.message);
trackDraftSessionSaveFailed(response?.message);
}
});
};
``` | /content/code_sandbox/app/src/features/sessionBook/screens/DraftSessionScreen/utils/index.ts | xml | 2016-12-01T04:36:06 | 2024-08-16T19:12:19 | requestly | requestly/requestly | 2,121 | 936 |
```xml
<TS language="gl" version="2.1">
<context>
<name>AddressBookPage</name>
<message>
<source>Create a new address</source>
<translation>Crear unha nova direccin</translation>
</message>
<message>
<source>&New</source>
<translation>&Novo</translation>
</message>
<message>
<source>Copy the currently selected address to the system clipboard</source>
<translation>Copiar a direccin seleccionada ao cartafol</translation>
</message>
<message>
<source>&Copy</source>
<translation>&Copiar</translation>
</message>
<message>
<source>C&lose</source>
<translation>&Pechar</translation>
</message>
<message>
<source>Delete the currently selected address from the list</source>
<translation>Borrar a direccin actualmente seleccionada da listaxe</translation>
</message>
<message>
<source>Export the data in the current tab to a file</source>
<translation>Exportar os datos da pestaa actual a un arquivo.</translation>
</message>
<message>
<source>&Export</source>
<translation>&Exportar</translation>
</message>
<message>
<source>&Delete</source>
<translation>&Borrar</translation>
</message>
</context>
<context>
<name>AddressTableModel</name>
</context>
<context>
<name>AskPasswordDialog</name>
<message>
<source>Password Dialog</source>
<translation>Dilogo de Contrasinal</translation>
</message>
<message>
<source>Enter password</source>
<translation>Introduce contrasinal</translation>
</message>
<message>
<source>New password</source>
<translation>Novo contrasinal</translation>
</message>
<message>
<source>Repeat new password</source>
<translation>Repite novo contrasinal</translation>
</message>
</context>
<context>
<name>BanTableModel</name>
</context>
<context>
<name>VERGEGUI</name>
<message>
<source>Sign &message...</source>
<translation>&Asinar mensaxe...</translation>
</message>
<message>
<source>Synchronizing with network...</source>
<translation>Sincronizando coa rede...</translation>
</message>
<message>
<source>&Overview</source>
<translation>&Vista xeral</translation>
</message>
<message>
<source>Show general overview of wallet</source>
<translation>Amosar vista xeral do moedeiro</translation>
</message>
<message>
<source>&Transactions</source>
<translation>&Transacciones</translation>
</message>
<message>
<source>Browse transaction history</source>
<translation>Navegar historial de transaccins</translation>
</message>
<message>
<source>E&xit</source>
<translation>&Sar</translation>
</message>
<message>
<source>Quit application</source>
<translation>Sar da aplicacin</translation>
</message>
<message>
<source>About &Qt</source>
<translation>Acerca de &Qt</translation>
</message>
<message>
<source>Show information about Qt</source>
<translation>Amosar informacin acerca de Qt</translation>
</message>
<message>
<source>&Options...</source>
<translation>&Opcins...</translation>
</message>
<message>
<source>&Encrypt Wallet...</source>
<translation>&Encriptar Moedeiro...</translation>
</message>
<message>
<source>&Backup Wallet...</source>
<translation>Copia de &Seguridade do Moedeiro...</translation>
</message>
<message>
<source>&Change Password...</source>
<translation>&Cambiar contrasinal...</translation>
</message>
<message>
<source>&Receiving addresses...</source>
<translation>Direccins para recibir</translation>
</message>
<message>
<source>Reindexing blocks on disk...</source>
<translation>Reindexando bloques no disco...</translation>
</message>
<message>
<source>Send coins to a VERGE address</source>
<translation>Enviar moedas a unha direccin VERGE</translation>
</message>
<message>
<source>Backup wallet to another location</source>
<translation>Facer copia de seguridade do moedeiro noutra localizacin</translation>
</message>
<message>
<source>Change the password used for wallet encryption</source>
<translation>Cambiar o contrasinal empregado para a encriptacin do moedeiro</translation>
</message>
<message>
<source>&Debug window</source>
<translation>Ventana de &Depuracin</translation>
</message>
<message>
<source>Open debugging and diagnostic console</source>
<translation>Abrir consola de depuracin e diagnstico</translation>
</message>
<message>
<source>&Verify message...</source>
<translation>&Verificar mensaxe...</translation>
</message>
<message>
<source>VERGE</source>
<translation>VERGE</translation>
</message>
<message>
<source>Wallet</source>
<translation>Moedeiro</translation>
</message>
<message>
<source>&Send</source>
<translation>&Enviar</translation>
</message>
<message>
<source>&Receive</source>
<translation>&Recibir</translation>
</message>
<message>
<source>&Show / Hide</source>
<translation>&Amosar/Agachar</translation>
</message>
<message>
<source>Show or hide the main Window</source>
<translation>Amosar ou agachar a ventana principal</translation>
</message>
<message>
<source>Encrypt the private keys that belong to your wallet</source>
<translation>Encriptar as claves privadas que pertencen ao teu moedeiro</translation>
</message>
<message>
<source>Sign messages with your VERGE addresses to prove you own them</source>
<translation>Asina mensaxes coas tas direccins VERGE para probar que te pertencen</translation>
</message>
<message>
<source>Verify messages to ensure they were signed with specified VERGE addresses</source>
<translation>Verificar mensaxes para asegurar que foron asinados con direccins VERGE dadas.</translation>
</message>
<message>
<source>&File</source>
<translation>&Arquivo</translation>
</message>
<message>
<source>&Settings</source>
<translation>Axus&tes</translation>
</message>
<message>
<source>&Help</source>
<translation>A&xuda</translation>
</message>
<message>
<source>Tabs toolbar</source>
<translation>Barra de ferramentas</translation>
</message>
<message>
<source>Request payments (generates QR codes and verge: URIs)</source>
<translation>Solicitar pagos (xenera cdigos QR e verge: URIs)</translation>
</message>
<message>
<source>Show the list of used sending addresses and labels</source>
<translation>Amosar a listaxe de direccins e etiquetas para enviar empregadas</translation>
</message>
<message>
<source>Show the list of used receiving addresses and labels</source>
<translation>Amosar a listaxe de etiquetas e direccins para recibir empregadas</translation>
</message>
<message>
<source>Open a verge: URI or payment request</source>
<translation>Abrir un verge: URI ou solicitude de pago</translation>
</message>
<message>
<source>&Command-line options</source>
<translation>Opcins da lia de comandos</translation>
</message>
<message>
<source>%1 behind</source>
<translation>%1 detrs</translation>
</message>
<message>
<source>Last received block was generated %1 ago.</source>
<translation>O ltimo bloque recibido foi xerado fai %1.</translation>
</message>
<message>
<source>Transactions after this will not yet be visible.</source>
<translation>As transaccins despois desta non sern todava visibles.</translation>
</message>
<message>
<source>Error</source>
<translation>Erro</translation>
</message>
<message>
<source>Warning</source>
<translation>Precaucin</translation>
</message>
<message>
<source>Information</source>
<translation>Informacin</translation>
</message>
<message>
<source>Up to date</source>
<translation>Actualizado</translation>
</message>
<message>
<source>Catching up...</source>
<translation>Poendo ao da...</translation>
</message>
<message>
<source>Sent transaction</source>
<translation>Transaccin enviada</translation>
</message>
<message>
<source>Incoming transaction</source>
<translation>Transaccin entrante</translation>
</message>
<message>
<source>Wallet is <b>encrypted</b> and currently <b>unlocked</b></source>
<translation>O moedeiro est <b>encriptado</b> e actualmente <b>desbloqueado</b></translation>
</message>
<message>
<source>Wallet is <b>encrypted</b> and currently <b>locked</b></source>
<translation>O moedeiro est <b>encriptado</b> e actualmente <b>bloqueado</b></translation>
</message>
</context>
<context>
<name>CoinControlDialog</name>
<message>
<source>Quantity:</source>
<translation>Cantidade:</translation>
</message>
<message>
<source>Bytes:</source>
<translation>Bytes:</translation>
</message>
<message>
<source>Amount:</source>
<translation>Importe:</translation>
</message>
<message>
<source>Fee:</source>
<translation>Pago:</translation>
</message>
<message>
<source>Change:</source>
<translation>Cambiar:</translation>
</message>
<message>
<source>(un)select all</source>
<translation>(des)selecciona todo</translation>
</message>
<message>
<source>Tree mode</source>
<translation>Modo rbore</translation>
</message>
<message>
<source>List mode</source>
<translation>Modo lista</translation>
</message>
<message>
<source>Amount</source>
<translation>Cantidade</translation>
</message>
<message>
<source>Date</source>
<translation>Data</translation>
</message>
<message>
<source>Confirmations</source>
<translation>Confirmacins</translation>
</message>
<message>
<source>Confirmed</source>
<translation>Confirmado</translation>
</message>
</context>
<context>
<name>EditAddressDialog</name>
<message>
<source>Edit Address</source>
<translation>Modificar Direccin</translation>
</message>
<message>
<source>&Label</source>
<translation>&Etiqueta</translation>
</message>
<message>
<source>The label associated with this address list entry</source>
<translation>A etiqueta asociada con esta entrada da listaxe de direccins</translation>
</message>
<message>
<source>The address associated with this address list entry. This can only be modified for sending addresses.</source>
<translation>A direccin asociada con esta entrada na listaxe de direccin. Esta so pode ser modificada por direccins para enviar.</translation>
</message>
<message>
<source>&Address</source>
<translation>&Direccin</translation>
</message>
</context>
<context>
<name>FreespaceChecker</name>
<message>
<source>A new data directory will be created.</source>
<translation>Crearse un novo directorio de datos.</translation>
</message>
<message>
<source>name</source>
<translation>nome</translation>
</message>
<message>
<source>Directory already exists. Add %1 if you intend to create a new directory here.</source>
<translation>O directorio xa existe. Engade %1 se queres crear un novo directorio aqu.</translation>
</message>
<message>
<source>Path already exists, and is not a directory.</source>
<translation>A ruta xa existe e non un directorio.</translation>
</message>
<message>
<source>Cannot create data directory here.</source>
<translation>Non se pode crear directorio de datos aqu</translation>
</message>
</context>
<context>
<name>HelpMessageDialog</name>
<message>
<source>version</source>
<translation>versin</translation>
</message>
<message>
<source>Command-line options</source>
<translation>Opcins da lia de comandos</translation>
</message>
<message>
<source>Usage:</source>
<translation>Emprego:</translation>
</message>
<message>
<source>command-line options</source>
<translation>opcins da lia de comandos</translation>
</message>
</context>
<context>
<name>Intro</name>
<message>
<source>Welcome</source>
<translation>Benvido</translation>
</message>
<message>
<source>Use the default data directory</source>
<translation>Empregar o directorio de datos por defecto</translation>
</message>
<message>
<source>Use a custom data directory:</source>
<translation>Empregar un directorio de datos personalizado</translation>
</message>
<message>
<source>VERGE</source>
<translation>VERGE</translation>
</message>
<message>
<source>Error</source>
<translation>Erro</translation>
</message>
</context>
<context>
<name>ModalOverlay</name>
<message>
<source>Form</source>
<translation>Formulario</translation>
</message>
<message>
<source>Last block time</source>
<translation>Hora do ltimo bloque</translation>
</message>
</context>
<context>
<name>OpenURIDialog</name>
<message>
<source>Open URI</source>
<translation>Abrir URI</translation>
</message>
<message>
<source>Open payment request from URI or file</source>
<translation>Abrir solicitude de pago dende URI ou ficheiro</translation>
</message>
<message>
<source>URI:</source>
<translation>URI:</translation>
</message>
<message>
<source>Select payment request file</source>
<translation>Seleccionar ficheiro de solicitude de pago</translation>
</message>
</context>
<context>
<name>OptionsDialog</name>
<message>
<source>Options</source>
<translation>Opcins</translation>
</message>
<message>
<source>&Main</source>
<translation>&Principal</translation>
</message>
<message>
<source>Reset all client options to default.</source>
<translation>Restaurar todas as opcins de cliente s por defecto</translation>
</message>
<message>
<source>&Reset Options</source>
<translation>Opcins de &Restaurar</translation>
</message>
<message>
<source>&Network</source>
<translation>&Rede</translation>
</message>
<message>
<source>W&allet</source>
<translation>Moedeiro</translation>
</message>
<message>
<source>Automatically open the VERGE client port on the router. This only works when your router supports UPnP and it is enabled.</source>
<translation>Abrir automticamente o porto do cliente VERGE no router. Esto so funciona se o teu router soporta UPnP e est habilitado.</translation>
</message>
<message>
<source>Map port using &UPnP</source>
<translation>Mapear porto empregando &UPnP</translation>
</message>
<message>
<source>Proxy &IP:</source>
<translation>&IP do Proxy:</translation>
</message>
<message>
<source>&Port:</source>
<translation>&Porto:</translation>
</message>
<message>
<source>Port of the proxy (e.g. 9050)</source>
<translation>Porto do proxy (exemplo: 9050)</translation>
</message>
<message>
<source>&Window</source>
<translation>&Xanela</translation>
</message>
<message>
<source>Show only a tray icon after minimizing the window.</source>
<translation>Amosar so un icono na bandexa tras minimiza-la xanela.</translation>
</message>
<message>
<source>&Minimize to the tray instead of the taskbar</source>
<translation>&Minimizar bandexa en lugar de barra de tarefas.</translation>
</message>
<message>
<source>M&inimize on close</source>
<translation>M&inimizar ao pechar</translation>
</message>
<message>
<source>&Display</source>
<translation>&Visualizacin</translation>
</message>
<message>
<source>User Interface &language:</source>
<translation>&Linguaxe de interface de usuario:</translation>
</message>
<message>
<source>&Unit to show amounts in:</source>
<translation>&Unidade na que amosar as cantidades:</translation>
</message>
<message>
<source>Choose the default subdivision unit to show in the interface and when sending coins.</source>
<translation>Escolle a unidade de subdivisin por defecto para amosar na interface e ao enviar moedas.</translation>
</message>
<message>
<source>&OK</source>
<translation>&OK</translation>
</message>
<message>
<source>&Cancel</source>
<translation>&Cancelar</translation>
</message>
<message>
<source>default</source>
<translation>por defecto</translation>
</message>
<message>
<source>Confirm options reset</source>
<translation>Confirmar opcins de restaurar</translation>
</message>
<message>
<source>Error</source>
<translation>Erro</translation>
</message>
<message>
<source>The supplied proxy address is invalid.</source>
<translation>A direccin de proxy suministrada invlida.</translation>
</message>
</context>
<context>
<name>OverviewPage</name>
<message>
<source>Form</source>
<translation>Formulario</translation>
</message>
<message>
<source>The displayed information may be out of date. Your wallet automatically synchronizes with the VERGE network after a connection is established, but this process has not completed yet.</source>
<translation>A informacin amosada por estar desactualizada. O teu moedeiro sincronzase automticamente coa rede VERGE despois de que se estableza unha conexin, pero este proceso non est todava rematado.</translation>
</message>
<message>
<source>Your current spendable balance</source>
<translation>O teu balance actualmente dispoible</translation>
</message>
<message>
<source>Total of transactions that have yet to be confirmed, and do not yet count toward the spendable balance</source>
<translation>Total de transaccins que anda teen que ser confirmadas, e non contan todava dentro do balance gastable</translation>
</message>
<message>
<source>Immature:</source>
<translation>Inmaduro:</translation>
</message>
<message>
<source>Mined balance that has not yet matured</source>
<translation>O balance minado todava non madurou</translation>
</message>
<message>
<source>Total:</source>
<translation>Total:</translation>
</message>
<message>
<source>Your current total balance</source>
<translation>O teu balance actual total</translation>
</message>
</context>
<context>
<name>PaymentServer</name>
</context>
<context>
<name>PeerTableModel</name>
</context>
<context>
<name>QObject</name>
<message>
<source>Amount</source>
<translation>Cantidade</translation>
</message>
<message>
<source>%1 h</source>
<translation>%1 h</translation>
</message>
<message>
<source>%1 m</source>
<translation>%1 m</translation>
</message>
<message>
<source>N/A</source>
<translation>N/A</translation>
</message>
<message>
<source>%1 B</source>
<translation>%1 B</translation>
</message>
<message>
<source>%1 KB</source>
<translation>%1 KB</translation>
</message>
<message>
<source>%1 MB</source>
<translation>%1 MB</translation>
</message>
<message>
<source>%1 GB</source>
<translation>%1 GB</translation>
</message>
<message>
<source>unknown</source>
<translation>descoecido</translation>
</message>
</context>
<context>
<name>QObject::QObject</name>
</context>
<context>
<name>QRImageWidget</name>
</context>
<context>
<name>RPCConsole</name>
<message>
<source>N/A</source>
<translation>N/A</translation>
</message>
<message>
<source>Client version</source>
<translation>Versin do cliente</translation>
</message>
<message>
<source>&Information</source>
<translation>&Informacin</translation>
</message>
<message>
<source>Debug window</source>
<translation>Ventana de Depuracin</translation>
</message>
<message>
<source>Startup time</source>
<translation>Tempo de arranque</translation>
</message>
<message>
<source>Network</source>
<translation>Rede</translation>
</message>
<message>
<source>Number of connections</source>
<translation>Nmero de conexins</translation>
</message>
<message>
<source>Block chain</source>
<translation>Cadea de bloques</translation>
</message>
<message>
<source>Current number of blocks</source>
<translation>Nmero actual de bloques</translation>
</message>
<message>
<source>Last block time</source>
<translation>Hora do ltimo bloque</translation>
</message>
<message>
<source>&Open</source>
<translation>&Abrir</translation>
</message>
<message>
<source>&Console</source>
<translation>&Consola</translation>
</message>
<message>
<source>&Network Traffic</source>
<translation>&Trfico de Rede</translation>
</message>
<message>
<source>Totals</source>
<translation>Totais</translation>
</message>
<message>
<source>In:</source>
<translation>Dentro:</translation>
</message>
<message>
<source>Out:</source>
<translation>Fra:</translation>
</message>
<message>
<source>Debug log file</source>
<translation>Arquivo de log de depuracin</translation>
</message>
<message>
<source>Clear console</source>
<translation>Limpar consola</translation>
</message>
</context>
<context>
<name>ReceiveCoinsDialog</name>
<message>
<source>&Amount:</source>
<translation>&Cantidade:</translation>
</message>
<message>
<source>&Label:</source>
<translation>&Etiqueta:</translation>
</message>
<message>
<source>&Message:</source>
<translation>&Mensaxe:</translation>
</message>
<message>
<source>Clear all fields of the form.</source>
<translation>Limpar tdolos campos do formulario</translation>
</message>
<message>
<source>Clear</source>
<translation>Limpar</translation>
</message>
<message>
<source>&Request payment</source>
<translation>&Solicitar pago</translation>
</message>
</context>
<context>
<name>ReceiveRequestDialog</name>
<message>
<source>QR Code</source>
<translation>Cdigo QR</translation>
</message>
<message>
<source>Copy &URI</source>
<translation>Copiar &URI</translation>
</message>
<message>
<source>Copy &Address</source>
<translation>Copiar &Direccin</translation>
</message>
<message>
<source>&Save Image...</source>
<translation>&Gardar Imaxe...</translation>
</message>
</context>
<context>
<name>RecentRequestsTableModel</name>
</context>
<context>
<name>SendCoinsDialog</name>
<message>
<source>Send Coins</source>
<translation>Moedas Enviadas</translation>
</message>
<message>
<source>Insufficient funds!</source>
<translation>Fondos insuficientes</translation>
</message>
<message>
<source>Quantity:</source>
<translation>Cantidade:</translation>
</message>
<message>
<source>Bytes:</source>
<translation>Bytes:</translation>
</message>
<message>
<source>Amount:</source>
<translation>Importe:</translation>
</message>
<message>
<source>Fee:</source>
<translation>Pago:</translation>
</message>
<message>
<source>Change:</source>
<translation>Cambiar:</translation>
</message>
<message>
<source>Transaction Fee:</source>
<translation>Tarifa de transaccin:</translation>
</message>
<message>
<source>Send to multiple recipients at once</source>
<translation>Enviar a mltiples receptores vez</translation>
</message>
<message>
<source>Add &Recipient</source>
<translation>Engadir &Receptor</translation>
</message>
<message>
<source>Clear all fields of the form.</source>
<translation>Limpar tdolos campos do formulario</translation>
</message>
<message>
<source>Clear &All</source>
<translation>Limpar &Todo</translation>
</message>
<message>
<source>Balance:</source>
<translation>Balance:</translation>
</message>
<message>
<source>Confirm the send action</source>
<translation>Confirmar a accin de envo</translation>
</message>
<message>
<source>S&end</source>
<translation>&Enviar</translation>
</message>
</context>
<context>
<name>SendCoinsEntry</name>
<message>
<source>A&mount:</source>
<translation>&Cantidade:</translation>
</message>
<message>
<source>Pay &To:</source>
<translation>Pagar &A:</translation>
</message>
<message>
<source>&Label:</source>
<translation>&Etiqueta:</translation>
</message>
<message>
<source>Choose previously used address</source>
<translation>Escoller direccin previamente empregada</translation>
</message>
<message>
<source>This is a normal payment.</source>
<translation>Este un pago normal</translation>
</message>
<message>
<source>Alt+A</source>
<translation>Alt+A</translation>
</message>
<message>
<source>Paste address from clipboard</source>
<translation>Pegar direccin dende portapapeis</translation>
</message>
<message>
<source>Alt+P</source>
<translation>Alt+P</translation>
</message>
<message>
<source>Remove this entry</source>
<translation>Eliminar esta entrada</translation>
</message>
<message>
<source>Message:</source>
<translation>Mensaxe:</translation>
</message>
<message>
<source>Enter a label for this address to add it to the list of used addresses</source>
<translation>Introduce unha etiqueta para esta direccin para engadila listaxe de direccins empregadas</translation>
</message>
<message>
<source>Pay To:</source>
<translation>Pagar A:</translation>
</message>
<message>
<source>Memo:</source>
<translation>Memo:</translation>
</message>
</context>
<context>
<name>SendConfirmationDialog</name>
</context>
<context>
<name>ShutdownWindow</name>
</context>
<context>
<name>SignVerifyMessageDialog</name>
<message>
<source>Signatures - Sign / Verify a Message</source>
<translation>Sinaturas - Asinar / Verificar unha Mensaxe</translation>
</message>
<message>
<source>&Sign Message</source>
<translation>&Asinar Mensaxe</translation>
</message>
<message>
<source>Choose previously used address</source>
<translation>Escoller direccin previamente empregada</translation>
</message>
<message>
<source>Alt+A</source>
<translation>Alt+A</translation>
</message>
<message>
<source>Paste address from clipboard</source>
<translation>Pegar direccin dende portapapeis</translation>
</message>
<message>
<source>Alt+P</source>
<translation>Alt+P</translation>
</message>
<message>
<source>Enter the message you want to sign here</source>
<translation>Introduce a mensaxe que queres asinar aqu</translation>
</message>
<message>
<source>Signature</source>
<translation>Sinatura</translation>
</message>
<message>
<source>Copy the current signature to the system clipboard</source>
<translation>Copiar a sinatura actual ao portapapeis do sistema</translation>
</message>
<message>
<source>Sign the message to prove you own this VERGE address</source>
<translation>Asina a mensaxe para probar que posees esta direccin VERGE</translation>
</message>
<message>
<source>Sign &Message</source>
<translation>Asinar &Mensaxe</translation>
</message>
<message>
<source>Reset all sign message fields</source>
<translation>Restaurar todos os campos de sinatura de mensaxe</translation>
</message>
<message>
<source>Clear &All</source>
<translation>Limpar &Todo</translation>
</message>
<message>
<source>&Verify Message</source>
<translation>&Verificar Mensaxe</translation>
</message>
<message>
<source>Verify the message to ensure it was signed with the specified VERGE address</source>
<translation>Verificar a mensaxe para asegurar que foi asinada coa direccin VERGE especificada</translation>
</message>
<message>
<source>Verify &Message</source>
<translation>Verificar &Mensaxe</translation>
</message>
<message>
<source>Reset all verify message fields</source>
<translation>Restaurar todos os campos de verificacin de mensaxe</translation>
</message>
</context>
<context>
<name>SplashScreen</name>
<message>
<source>[testnet]</source>
<translation>[testnet]</translation>
</message>
</context>
<context>
<name>TrafficGraphWidget</name>
<message>
<source>KB/s</source>
<translation>KB/s</translation>
</message>
</context>
<context>
<name>TransactionDesc</name>
</context>
<context>
<name>TransactionDescDialog</name>
<message>
<source>This pane shows a detailed description of the transaction</source>
<translation>Este panel amosa unha descripcin detallada da transaccin</translation>
</message>
</context>
<context>
<name>TransactionTableModel</name>
</context>
<context>
<name>TransactionView</name>
</context>
<context>
<name>UnitDisplayStatusBarControl</name>
</context>
<context>
<name>WalletFrame</name>
</context>
<context>
<name>WalletModel</name>
</context>
<context>
<name>WalletView</name>
</context>
<context>
<name>verge-core</name>
<message>
<source>Options:</source>
<translation>Opcins:</translation>
</message>
<message>
<source>Specify data directory</source>
<translation>Especificar directorio de datos</translation>
</message>
<message>
<source>Connect to a node to retrieve peer addresses, and disconnect</source>
<translation>Conectar a nodo para recuperar direccins de pares, e desconectar</translation>
</message>
<message>
<source>Specify your own public address</source>
<translation>Especificar a ta propia direccin pblica</translation>
</message>
<message>
<source>Accept command line and JSON-RPC commands</source>
<translation>Aceptar lia de comandos e comandos JSON-RPC</translation>
</message>
<message>
<source>Run in the background as a daemon and accept commands</source>
<translation>Executar no fondo como un demo e aceptar comandos</translation>
</message>
<message>
<source>VERGE Core</source>
<translation>Core de VERGE</translation>
</message>
<message>
<source>Bind to given address and always listen on it. Use [host]:port notation for IPv6</source>
<translation>Enlazar a unha direccin dada e escoitar sempre nela. Emprega a notacin [host]:post para IPv6</translation>
</message>
<message>
<source>Execute command when a wallet transaction changes (%s in cmd is replaced by TxID)</source>
<translation>Executar comando cando unha transaccin do moedeiro cambia (%s no comando substitudo por TxID)</translation>
</message>
<message>
<source><category> can be:</source>
<translation><categora> pode ser:</translation>
</message>
<message>
<source>Accept connections from outside (default: 1 if no -proxy or -connect)</source>
<translation>Aceptar conexins de fra (por defecto: 1 se non -proxy ou -connect)</translation>
</message>
<message>
<source>Block creation options:</source>
<translation>Opcins de creacin de bloque:</translation>
</message>
<message>
<source>Corrupted block database detected</source>
<translation>Detectada base de datos de bloques corrupta.</translation>
</message>
<message>
<source>Do you want to rebuild the block database now?</source>
<translation>Queres reconstrur a base de datos de bloques agora?</translation>
</message>
<message>
<source>Error initializing block database</source>
<translation>Erro inicializando a base de datos de bloques</translation>
</message>
<message>
<source>Error initializing wallet database environment %s!</source>
<translation>Erro inicializando entorno de base de datos de moedeiro %s!</translation>
</message>
<message>
<source>Error loading block database</source>
<translation>Erro cargando base de datos do bloque</translation>
</message>
<message>
<source>Error opening block database</source>
<translation>Erro abrindo base de datos de bloques</translation>
</message>
<message>
<source>Error: Disk space is low!</source>
<translation>Erro: Espacio en disco escaso!</translation>
</message>
<message>
<source>Failed to listen on any port. Use -listen=0 if you want this.</source>
<translation>Fallou escoitar en calquera porto. Emprega -listen=0 se queres esto.</translation>
</message>
<message>
<source>Incorrect or no genesis block found. Wrong datadir for network?</source>
<translation>Bloque genesis incorrecto o no existente. Datadir errneo para a rede?</translation>
</message>
<message>
<source>Not enough file descriptors available.</source>
<translation>Non hai suficientes descritores de arquivo dispoibles.</translation>
</message>
<message>
<source>Specify wallet file (within data directory)</source>
<translation>Especificar arquivo do moedeiro (dentro do directorio de datos)</translation>
</message>
<message>
<source>Verifying blocks...</source>
<translation>Verificando bloques...</translation>
</message>
<message>
<source>Execute command when a relevant alert is received or we see a really long fork (%s in cmd is replaced by message)</source>
<translation>Executar comando cando se recibe unha alerta relevante ou vemos un fork realmente longo (%s no cmd substitudo pola mensaxe)</translation>
</message>
<message>
<source>Information</source>
<translation>Informacin</translation>
</message>
<message>
<source>Send trace/debug info to console instead of debug.log file</source>
<translation>Enviar traza/informacin de depuracin consola en lugar de ao arquivo debug.log</translation>
</message>
<message>
<source>Shrink debug.log file on client startup (default: 1 when no -debug)</source>
<translation>Recortar o arquivo debug.log ao arrancar o cliente (por defecto: 1 cando no-debug)</translation>
</message>
<message>
<source>Signing transaction failed</source>
<translation>Fallou a sinatura da transaccin</translation>
</message>
<message>
<source>Transaction amount too small</source>
<translation>A cantidade da transaccin demasiado pequena</translation>
</message>
<message>
<source>Transaction too large</source>
<translation>A transaccin demasiado grande</translation>
</message>
<message>
<source>Username for JSON-RPC connections</source>
<translation>Nome de usuario para conexins JSON-RPC</translation>
</message>
<message>
<source>Warning</source>
<translation>Precaucin</translation>
</message>
<message>
<source>You need to rebuild the database using -reindex to change -txindex</source>
<translation>Precisas reconstrur a base de datos empregando -reindex para cambiar -txindex</translation>
</message>
<message>
<source>Password for JSON-RPC connections</source>
<translation>Contrasinal para conexins JSON-RPC</translation>
</message>
<message>
<source>Execute command when the best block changes (%s in cmd is replaced by block hash)</source>
<translation>Executar comando cando o mellor bloque cambie (%s no comando sustitudo polo hash do bloque)</translation>
</message>
<message>
<source>Allow DNS lookups for -addnode, -seednode and -connect</source>
<translation>Permitir lookup de DNS para -addnote, -seednote e -connect</translation>
</message>
<message>
<source>Unknown network specified in -onlynet: '%s'</source>
<translation>Rede descoecida especificada en -onlynet: '%s'</translation>
</message>
<message>
<source>Insufficient funds</source>
<translation>Fondos insuficientes</translation>
</message>
<message>
<source>Loading block index...</source>
<translation>Cargando ndice de bloques...</translation>
</message>
<message>
<source>Loading wallet...</source>
<translation>Cargando moedeiro...</translation>
</message>
<message>
<source>Cannot downgrade wallet</source>
<translation>Non se pode desactualizar o moedeiro</translation>
</message>
<message>
<source>Rescanning...</source>
<translation>Rescaneando...</translation>
</message>
<message>
<source>Done loading</source>
<translation>Carga completa</translation>
</message>
<message>
<source>Error</source>
<translation>Erro</translation>
</message>
</context>
</TS>
``` | /content/code_sandbox/src/qt/locale/verge_gl.ts | xml | 2016-01-23T04:20:14 | 2024-08-13T18:07:31 | verge | vergecurrency/verge | 1,402 | 9,835 |
```xml
<?xml version="1.0" encoding="utf-8"?>
<!--
/*
**
**
**
** path_to_url
**
** Unless required by applicable law or agreed to in writing, software
** WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
*/
-->
<resources xmlns:xliff="urn:oasis:names:tc:xliff:document:1.2">
<!-- Symbols that are commonly considered word separators in this language -->
<string name="word_separators">.\u0009\u0020,;:!?\'\n()[]*&@{}/<>_+=|\u0022</string>
<!-- Symbols that are sentence separators, for purposes of making it hug the last sentence. -->
<string name="sentence_separators">.,</string>
</resources>
``` | /content/code_sandbox/app/src/main/res/values-fr/donottranslate.xml | xml | 2016-01-22T21:40:54 | 2024-08-16T11:54:30 | hackerskeyboard | klausw/hackerskeyboard | 1,807 | 175 |
```xml
import { CommonModule } from '@angular/common';
import { AfterContentInit, ChangeDetectionStrategy, ChangeDetectorRef, Component, ContentChild, ContentChildren, ElementRef, Input, NgModule, QueryList, SimpleChange, TemplateRef, ViewEncapsulation, signal } from '@angular/core';
import { BlockableUI, Footer, Header, PrimeTemplate, SharedModule } from 'primeng/api';
import { ObjectUtils } from 'primeng/utils';
/**
* Card is a flexible container component.
* @group Components
*/
@Component({
selector: 'p-card',
template: `
<div [ngClass]="'p-card p-component'" [ngStyle]="_style()" [class]="styleClass" [attr.data-pc-name]="'card'">
<div class="p-card-header" *ngIf="headerFacet || headerTemplate">
<ng-content select="p-header"></ng-content>
<ng-container *ngTemplateOutlet="headerTemplate"></ng-container>
</div>
<div class="p-card-body">
<div class="p-card-title" *ngIf="header || titleTemplate">
{{ header }}
<ng-container *ngTemplateOutlet="titleTemplate"></ng-container>
</div>
<div class="p-card-subtitle" *ngIf="subheader || subtitleTemplate">
{{ subheader }}
<ng-container *ngTemplateOutlet="subtitleTemplate"></ng-container>
</div>
<div class="p-card-content">
<ng-content></ng-content>
<ng-container *ngTemplateOutlet="contentTemplate"></ng-container>
</div>
<div class="p-card-footer" *ngIf="footerFacet || footerTemplate">
<ng-content select="p-footer"></ng-content>
<ng-container *ngTemplateOutlet="footerTemplate"></ng-container>
</div>
</div>
</div>
`,
changeDetection: ChangeDetectionStrategy.OnPush,
encapsulation: ViewEncapsulation.None,
styleUrls: ['./card.css'],
host: {
class: 'p-element'
}
})
export class Card implements AfterContentInit, BlockableUI {
/**
* Header of the card.
* @group Props
*/
@Input() header: string | undefined;
/**
* Subheader of the card.
* @group Props
*/
@Input() subheader: string | undefined;
/**
* Inline style of the element.
* @group Props
*/
@Input() set style(value: { [klass: string]: any } | null | undefined) {
if (!ObjectUtils.equals(this._style(), value)) {
this._style.set(value);
}
}
/**
* Class of the element.
* @group Props
*/
@Input() styleClass: string | undefined;
@ContentChild(Header) headerFacet: TemplateRef<any> | undefined;
@ContentChild(Footer) footerFacet: TemplateRef<any> | undefined;
@ContentChildren(PrimeTemplate) templates: QueryList<PrimeTemplate> | undefined;
headerTemplate: TemplateRef<any> | undefined;
titleTemplate: TemplateRef<any> | undefined;
subtitleTemplate: TemplateRef<any> | undefined;
contentTemplate: TemplateRef<any> | undefined;
footerTemplate: TemplateRef<any> | undefined;
_style = signal<{ [klass: string]: any } | null | undefined>(null);
constructor(private el: ElementRef) {}
ngAfterContentInit() {
(this.templates as QueryList<PrimeTemplate>).forEach((item) => {
switch (item.getType()) {
case 'header':
this.headerTemplate = item.template;
break;
case 'title':
this.titleTemplate = item.template;
break;
case 'subtitle':
this.subtitleTemplate = item.template;
break;
case 'content':
this.contentTemplate = item.template;
break;
case 'footer':
this.footerTemplate = item.template;
break;
default:
this.contentTemplate = item.template;
break;
}
});
}
getBlockableElement(): HTMLElement {
return this.el.nativeElement.children[0];
}
}
@NgModule({
imports: [CommonModule],
exports: [Card, SharedModule],
declarations: [Card]
})
export class CardModule {}
``` | /content/code_sandbox/src/app/components/card/card.ts | xml | 2016-01-16T09:23:28 | 2024-08-16T19:58:20 | primeng | primefaces/primeng | 9,969 | 915 |
```xml
import {UserRoles} from '../../common/entities/UserDTO';
import {AuthenticationMWs} from '../middlewares/user/AuthenticationMWs';
import {RenderingMWs} from '../middlewares/RenderingMWs';
import {NotificationMWs} from '../middlewares/NotificationMWs';
import {Express} from 'express';
import {VersionMWs} from '../middlewares/VersionMWs';
import {ServerTimingMWs} from '../middlewares/ServerTimingMWs';
import {Config} from '../../common/config/private/Config';
export class NotificationRouter {
public static route(app: Express): void {
this.addGetNotifications(app);
}
private static addGetNotifications(app: Express): void {
app.get(
Config.Server.apiPath + '/notifications',
AuthenticationMWs.authenticate,
AuthenticationMWs.authorise(UserRoles.Guest),
VersionMWs.injectGalleryVersion,
NotificationMWs.list,
ServerTimingMWs.addServerTiming,
RenderingMWs.renderResult
);
}
}
``` | /content/code_sandbox/src/backend/routes/NotificationRouter.ts | xml | 2016-03-12T11:46:41 | 2024-08-16T19:56:44 | pigallery2 | bpatrik/pigallery2 | 1,727 | 207 |
```xml
import { G2Spec } from '../../../src';
export function irisPointShapes(): G2Spec {
return {
type: 'point',
width: 1152,
height: 600,
data: {
type: 'fetch',
value: 'data/iris.csv',
},
encode: {
x: 'x',
y: 'y',
shape: 'category',
color: 'category',
size: 5,
},
scale: {
shape: { range: ['point', 'plus', 'diamond'] },
},
};
}
``` | /content/code_sandbox/__tests__/plots/static/iris-point-shapes.ts | xml | 2016-05-26T09:21:04 | 2024-08-15T16:11:17 | G2 | antvis/G2 | 12,060 | 125 |
```xml
<?xml version="1.0" encoding="UTF-8"?>
<!--
or more contributor license agreements. See the NOTICE file
distributed with this work for additional information
regarding copyright ownership. The ASF licenses this file
path_to_url
Unless required by applicable law or agreed to in writing,
"AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
specific language governing permissions and limitations
-->
<!DOCTYPE concept PUBLIC "-//OASIS//DTD DITA Concept//EN" "concept.dtd">
<concept rev="1.3.0" id="admission_control">
<title>Admission Control and Query Queuing</title>
<prolog>
<metadata>
<data name="Category" value="Impala"/>
<data name="Category" value="Querying"/>
<data name="Category" value="Admission Control"/>
<data name="Category" value="Resource Management"/>
</metadata>
</prolog>
<conbody>
<p id="admission_control_intro"> Admission control is an Impala feature that
imposes limits on concurrent SQL queries, to avoid resource usage spikes
and out-of-memory conditions on busy clusters. The admission control
feature lets you set an upper limit on the number of concurrent Impala
queries and on the memory used by those queries. Any additional queries
are queued until the earlier ones finish, rather than being cancelled or
running slowly and causing contention. As other queries finish, the queued
queries are allowed to proceed. </p>
<p rev="2.5.0"> In <keyword keyref="impala25_full"/> and higher, you can
specify these limits and thresholds for each pool rather than globally.
That way, you can balance the resource usage and throughput between steady
well-defined workloads, rare resource-intensive queries, and ad-hoc
exploratory queries. </p>
<p> In addition to the threshold values for currently executing queries, you
can place limits on the maximum number of queries that are queued
(waiting) and a limit on the amount of time they might wait before
returning with an error. These queue settings let you ensure that queries
do not wait indefinitely so that you can detect and correct
<q>starvation</q> scenarios. </p>
<p> Queries, DML statements, and some DDL statements, including
<codeph>CREATE TABLE AS SELECT</codeph> and <codeph>COMPUTE
STATS</codeph> are affected by admission control. </p>
<p> On a busy cluster, you might find there is an optimal number of Impala
queries that run concurrently. For example, when the I/O capacity is fully
utilized by I/O-intensive queries, you might not find any throughput
benefit in running more concurrent queries. By allowing some queries to
run at full speed while others wait, rather than having all queries
contend for resources and run slowly, admission control can result in
higher overall throughput. </p>
<p> For another example, consider a memory-bound workload such as many large
joins or aggregation queries. Each such query could briefly use many
gigabytes of memory to process intermediate results. Because Impala by
default cancels queries that exceed the specified memory limit, running
multiple large-scale queries at once might require re-running some queries
that are cancelled. In this case, admission control improves the
reliability and stability of the overall workload by only allowing as many
concurrent queries as the overall memory of the cluster can accommodate. </p>
<p outputclass="toc inpage"/>
</conbody>
<concept id="admission_concurrency">
<title>Concurrent Queries and Admission Control</title>
<conbody>
<p> One way to limit resource usage through admission control is to set an
upper limit on the number of concurrent queries. This is the initial
technique you might use when you do not have extensive information about
memory usage for your workload. The settings can be specified separately
for each dynamic resource pool. </p>
<dl>
<dlentry>
<dt> Max Running Queries </dt>
<dd><p>Maximum number of concurrently running queries in this pool.
The default value is unlimited for Impala 2.5 or higher.
(optional)</p> The maximum number of queries that can run
concurrently in this pool. The default value is unlimited. Any
queries for this pool that exceed <uicontrol>Max Running
Queries</uicontrol> are added to the admission control queue until
other queries finish. You can use <uicontrol>Max Running
Queries</uicontrol> in the early stages of resource management,
when you do not have extensive data about query memory usage, to
determine if the cluster performs better overall if throttling is
applied to Impala queries. <p> For a workload with many small
queries, you typically specify a high value for this setting, or
leave the default setting of <q>unlimited</q>. For a workload with
expensive queries, where some number of concurrent queries
saturate the memory, I/O, CPU, or network capacity of the cluster,
set the value low enough that the cluster resources are not
overcommitted for Impala. </p><p>Once you have enabled
memory-based admission control using other pool settings, you can
still use <uicontrol>Max Running Queries</uicontrol> as a
safeguard. If queries exceed either the total estimated memory or
the maximum number of concurrent queries, they are added to the
queue. </p>
</dd>
</dlentry>
</dl>
<dl>
<dlentry>
<dt> Max Queued Queries </dt>
<dd> Maximum number of queries that can be queued in this pool. The
default value is 200 for Impala 2.1 or higher and 50 for previous
versions of Impala. (optional)</dd>
</dlentry>
</dl>
<dl>
<dlentry>
<dt> Queue Timeout </dt>
<dd> The amount of time, in milliseconds, that a query waits in the
admission control queue for this pool before being canceled. The
default value is 60,000 milliseconds. <p>In the following cases,
<uicontrol>Queue Timeout</uicontrol> is not significant, and you
can specify a high value to avoid canceling queries
unexpectedly:<ul id="ul_kzr_rbg_gw">
<li>In a low-concurrency workload where few or no queries are
queued</li>
<li>In an environment without a strict SLA, where it does not
matter if queries occasionally take longer than usual because
they are held in admission control</li>
</ul>You might also need to increase the value to use Impala with
some business intelligence tools that have their own timeout
intervals for queries. </p><p>In a high-concurrency workload,
especially for queries with a tight SLA, long wait times in
admission control can cause a serious problem. For example, if a
query needs to run in 10 seconds, and you have tuned it so that it
runs in 8 seconds, it violates its SLA if it waits in the
admission control queue longer than 2 seconds. In a case like
this, set a low timeout value and monitor how many queries are
cancelled because of timeouts. This technique helps you to
discover capacity, tuning, and scaling problems early, and helps
avoid wasting resources by running expensive queries that have
already missed their SLA. </p><p> If you identify some queries
that can have a high timeout value, and others that benefit from a
low timeout value, you can create separate pools with different
values for this setting. </p>
</dd>
</dlentry>
</dl>
<p> You can combine these settings with the memory-based approach
described in <xref href="impala_admission.xml#admission_memory"/>. If
either the maximum number of or the expected memory usage of the
concurrent queries is exceeded, subsequent queries are queued until the
concurrent workload falls below the threshold again. </p>
</conbody>
</concept>
<concept id="admission_memory">
<title>Memory Limits and Admission Control</title>
<conbody>
<p>
Each dynamic resource pool can have an upper limit on the cluster-wide memory used by queries executing in that pool.
This is the technique to use once you have a stable workload with well-understood memory requirements.
</p>
<p>Use the following settings to manage memory-based admission
control.</p>
<dl>
<dlentry>
<dt>Max Memory</dt>
<dd>
<p>
The maximum amount of aggregate memory available across the
cluster to all queries executing in this pool. This should be a
portion of the aggregate configured memory for Impala daemons,
which will be shown in the settings dialog next to this option for
convenience. Setting this to a non-zero value enables memory based
admission control.
</p>
<p>
Impala determines the expected maximum memory used by all
queries in the pool and holds back any further queries that would
result in Max Memory being exceeded.
</p>
<p>
You set Max Memory in <codeph>fair-scheduler.xml</codeph> file
with the <codeph>maxResources</codeph> tag. For example:
<codeph><maxResources>2500 mb</maxResources></codeph>
</p>
<p>
If you specify Max Memory, you should specify the amount of
memory to allocate to each query in this pool. You can do this in
two ways:
</p>
<ul>
<li>By setting Maximum Query Memory Limit and Minimum Query Memory
Limit. This is preferred in <keyword keyref="impala31_full"/>
and greater and gives Impala flexibility to set aside more
memory to queries that are expected to be memory-hungry.</li>
<li>By setting Default Query Memory Limit to the exact amount of
memory that Impala should set aside for queries in that
pool.</li>
</ul>
<p>
Note that in the following cases, Impala will rely entirely on
memory estimates to determine how much memory to set aside for
each query. This is not recommended because it can result in
queries not running or being starved for memory if the estimates
are inaccurate. And it can affect other queries running on the
same node.
<ul>
<li>Max Memory, Maximum Query Memory Limit, and Minimum Query
Memory Limit are not set, and the <codeph>MEM_LIMIT</codeph>
query option is not set for the query.</li>
<li>Default Query Memory Limit is set to 0, and the
<codeph>MEM_LIMIT</codeph> query option is not set for the
query.</li>
</ul>
</p>
</dd>
</dlentry>
<dlentry>
<dt>Minimum Query Memory Limit and Maximum Query Memory Limit</dt>
<dd>
<p>These are
<codeph>impala.admission-control.min-query-mem-limit.*</codeph>
and <codeph>impala.admission-control.max-query-mem-limit.*</codeph>
configurations in <filepath>llama-site.xml</filepath> (See
<xref href="impala_admission_config.xml#concept_cz4_vxz_jgb"/>).
They determine the minimum and maximum per-host
memory limit that will be chosen by Impala Admission control for
queries in this resource pool. If set, Impala Admission Control
will choose a memory limit between the minimum and maximum values
based on the per-host memory estimate for the query. The memory
limit chosen determines the amount of memory that Impala Admission
control will set aside for this query on each host that the query
is running on. The aggregate memory across all of the hosts that
the query is running on is counted against the pools Max
Memory.</p>
<p>Minimum Query Memory Limit must be less than or equal to Maximum
Query Memory Limit and Max Memory.</p>
<p>A user can override Impalas choice of memory limit by setting
the <codeph>MEM_LIMIT</codeph> query option. If the Clamp
MEM_LIMIT Query Option setting is set to <codeph>TRUE</codeph> and
the user sets <codeph>MEM_LIMIT</codeph> to a value that is
outside of the range specified by these two options, then the
effective memory limit will be either the minimum or maximum,
depending on whether <codeph>MEM_LIMIT</codeph> is lower than or
higher the range.</p>
<p>For example, assume a resource pool with the following parameters
set: <ul>
<li>Minimum Query Memory Limit = 2GB</li>
<li>Maximum Query Memory Limit = 10GB</li>
</ul>If a user tries to submit a query with the
<codeph>MEM_LIMIT</codeph> query option set to 14 GB, the
following would happen:<ul>
<li>If Clamp MEM_LIMIT Query Option = true, admission controller
would override <codeph>MEM_LIMIT</codeph> with 10 GB and
attempt admission using that value.</li>
<li>If Clamp MEM_LIMIT Query Option = false, the admission
controller will retain the <codeph>MEM_LIMIT</codeph> of 14 GB
set by the user and will attempt admission using the
value.</li>
</ul></p>
</dd>
</dlentry>
<dlentry>
<dt>Default Query Memory Limit</dt>
<dd>The default memory limit applied to queries executing in this pool
when no explicit <codeph>MEM_LIMIT</codeph> query option is set. The
memory limit chosen determines the amount of memory that Impala
Admission control will set aside for this query on each host that
the query is running on. The aggregate memory across all of the
hosts that the query is running on is counted against the pools Max
Memory. This option is deprecated in <keyword keyref="impala31_full"
/> and higher and is replaced by Maximum Query Memory Limit and
Minimum Query Memory Limit. Do not set this if either Maximum Query
Memory Limit or Minimum Query Memory Limit is set.</dd>
</dlentry>
</dl>
<dl>
<dlentry>
<dt> Clamp MEM_LIMIT Query Option</dt>
<dd>This is
<codeph>impala.admission-control.clamp-mem-limit-query-option.*</codeph>
configuration in <filepath>llama-site.xml</filepath>.
If this configuration is set to <codeph>false</codeph>,
the <codeph>MEM_LIMIT</codeph> query option will not be bounded by the
<b>Maximum Query Memory Limit</b> and the <b>Minimum Query Memory Limit</b>
values specified for this resource pool. By default, this configuration is
set to <codeph>true</codeph> in Impala 3.1 and higher. This configuration
is ignored if both <b>Minimum Query Memory Limit</b> and
<b>Maximum Query Memory Limit</b> are not set.</dd>
</dlentry>
</dl>
<p
conref="../shared/impala_common.xml#common/admission_control_mem_limit_interaction"/>
<p>
You can combine the memory-based settings with the upper limit on concurrent queries described in
<xref href="impala_admission.xml#admission_concurrency"/>. If either the maximum number of
or the expected memory usage of the concurrent queries is exceeded, subsequent queries
are queued until the concurrent workload falls below the threshold again.
</p>
</conbody>
</concept>
<concept id="set_per_query_memory_limits">
<title>Setting Per-query Memory Limits</title>
<conbody>
<p>Use per-query memory limits to prevent queries from consuming excessive
memory resources that impact other queries. We recommend that you set
the query memory limits whenever possible.</p>
<p>If you set the <b>Max Memory</b> for a resource pool, Impala attempts
to throttle queries if there is not enough memory to run them within the
specified resources.</p>
<p>Only use admission control with maximum memory resources if you can
ensure there are query memory limits. Set the pool <b>Maximum Query
Memory Limit</b> to be certain. You can override this setting with the
<codeph>MEM_LIMIT</codeph> query option, if necessary.</p>
<p>Typically, you set query memory limits using the <codeph>set
MEM_LIMIT=Xg;</codeph> query option. When you find the right value for
your business case, memory-based admission control works well. The
potential downside is that queries that attempt to use more memory might
perform poorly or even be cancelled.</p>
</conbody>
</concept>
<concept id="examples_of_query_rejection_by_admission_control">
<title>Examples of Query Rejection by Admission Control</title>
<conbody>
<dl>
<dlentry>
<dt>The minimum memory to start a query is not satisfied</dt>
<dd>
<p>Impala will attempt to start a query as long as the minimum memory
requirement to run that query can be satisfied by all executor nodes.
In the event where Admission Control determines that the minimum memory
requirement can not be satisfied by existing memory limit configurations
(<codeph>MEM_LIMIT</codeph> query option or other memory limit
configurations at request pool) or available system memory in one or more
executor nodes, it will reject the query and the query will not execute
at all. Admission Control will return an error message describing what is
happening and recommend which configuration to adjust so that the query
can pass Admission Control. Take a look at the last query examples from
<xref href="impala_mem_limit.xml"/></p>
<codeblock rev="">
[localhost:21000] > set mem_limit=15mb;
MEM_LIMIT set to 15mb
[localhost:21000] > select count(distinct c_name) from customer;
Query: select count(distinct c_name) from customer
ERROR:
Rejected query from pool default-pool: minimum memory reservation is greater than memory available to the query
for buffer reservations. Memory reservation needed given the current plan: 38.00 MB. Adjust MEM_LIMIT option
for the query to allow the query memory limit to be at least 70.00 MB. Note that changing the memory limit may
also change the plan. See 'Per Host Min Memory Reservation' in the query profile for more information about the
per-node memory requirements.</codeblock>
<p>Admission Control rejects this query because <codeph>MEM_LIMIT</codeph>
is set too low such that it is insufficient to start the query, which
requires 70.00 MB (38.00 MB + 32.00 MB overhead) at minimum for one or more
executor nodes. The error message contains recommendations on what
configuration to adjust depending on which limitation causes rejection.
In this case, Admission Controller recommends raising query option
<codeph>MEM_LIMIT</codeph> >= 70mb so that the minimum memory
requirement is satisfied to start the query.
Users can also inspect 'Per Host Min Memory Reservation' info at the query
profile to check which executor node(s) require 38.00 MB minimum memory
reservation.</p>
</dd>
</dlentry>
</dl>
</conbody>
</concept>
<concept id="admission_yarn">
<title>How Impala Admission Control Relates to Other Resource Management Tools</title>
<prolog>
<metadata>
<data name="Category" value="Concepts"/>
</metadata>
</prolog>
<conbody>
<p>
The admission control feature is similar in some ways to the YARN resource management framework. These features
can be used separately or together. This section describes some similarities and differences, to help you
decide which combination of resource management features to use for Impala.
</p>
<p>
Admission control is a lightweight, decentralized system that is suitable for workloads consisting
primarily of Impala queries and other SQL statements. It sets <q>soft</q> limits that smooth out Impala
memory usage during times of heavy load, rather than taking an all-or-nothing approach that cancels jobs
that are too resource-intensive.
</p>
<p>
Because the admission control system does not interact with other Hadoop workloads such as MapReduce jobs, you
might use YARN with static service pools on clusters where resources are shared between
Impala and other Hadoop components. This configuration is recommended when using Impala in a
<term>multitenant</term> cluster. Devote a percentage of cluster resources to Impala, and allocate another
percentage for MapReduce and other batch-style workloads. Let admission control handle the concurrency and
memory usage for the Impala work within the cluster, and let YARN manage the work for other components within the
cluster. In this scenario, Impala's resources are not managed by YARN.
</p>
<p>
The Impala admission control feature uses the same configuration mechanism as the YARN resource manager to map users to
pools and authenticate them.
</p>
<p>
Although the Impala admission control feature uses a <codeph>fair-scheduler.xml</codeph> configuration file
behind the scenes, this file does not depend on which scheduler is used for YARN. You still use this file
even when YARN is using the capacity scheduler.
</p>
</conbody>
</concept>
<concept id="admission_architecture">
<title>How Impala Schedules and Enforces Limits on Concurrent Queries</title>
<prolog>
<metadata>
<data name="Category" value="Concepts"/>
<data name="Category" value="Scheduling"/>
</metadata>
</prolog>
<conbody>
<p>
The admission control system is decentralized, embedded in each Impala daemon and communicating through the
statestore mechanism. Although the limits you set for memory usage and number of concurrent queries apply
cluster-wide, each Impala daemon makes its own decisions about whether to allow each query to run
immediately or to queue it for a less-busy time. These decisions are fast, meaning the admission control
mechanism is low-overhead, but might be imprecise during times of heavy load across many coordinators. There could be times when the
more queries were queued (in aggregate across the cluster) than the specified limit, or when number of admitted queries
exceeds the expected number. Thus, you typically err on the
high side for the size of the queue, because there is not a big penalty for having a large number of queued
queries; and you typically err on the low side for configuring memory resources, to leave some headroom in case more
queries are admitted than expected, without running out of memory and being cancelled as a result.
</p>
<p>
To avoid a large backlog of queued requests, you can set an upper limit on the size of the queue for
queries that are queued. When the number of queued queries exceeds this limit, further queries are
cancelled rather than being queued. You can also configure a timeout period per pool, after which queued queries are
cancelled, to avoid indefinite waits. If a cluster reaches this state where queries are cancelled due to
too many concurrent requests or long waits for query execution to begin, that is a signal for an
administrator to take action, either by provisioning more resources, scheduling work on the cluster to
smooth out the load, or by doing <xref href="impala_performance.xml#performance">Impala performance
tuning</xref> to enable higher throughput.
</p>
</conbody>
</concept>
<concept id="admission_jdbc_odbc">
<title>How Admission Control works with Impala Clients (JDBC, ODBC, HiveServer2)</title>
<prolog>
<metadata>
<data name="Category" value="JDBC"/>
<data name="Category" value="ODBC"/>
<data name="Category" value="HiveServer2"/>
<data name="Category" value="Concepts"/>
</metadata>
</prolog>
<conbody>
<p>
Most aspects of admission control work transparently with client interfaces such as JDBC and ODBC:
</p>
<ul>
<li>
If a SQL statement is put into a queue rather than running immediately, the API call blocks until the
statement is dequeued and begins execution. At that point, the client program can request to fetch
results, which might also block until results become available.
</li>
<li>
If a SQL statement is cancelled because it has been queued for too long or because it exceeded the memory
limit during execution, the error is returned to the client program with a descriptive error message.
</li>
</ul>
<p rev=""> In Impala 2.0 and higher, you can submit a SQL
<codeph>SET</codeph> statement from the client application to change
the <codeph>REQUEST_POOL</codeph> query option. This option lets you
submit queries to different resource pools, as described in <xref
href="impala_request_pool.xml#request_pool"/>. </p>
<p>
At any time, the set of queued queries could include queries submitted through multiple different Impala
daemon hosts. All the queries submitted through a particular host will be executed in order, so a
<codeph>CREATE TABLE</codeph> followed by an <codeph>INSERT</codeph> on the same table would succeed.
Queries submitted through different hosts are not guaranteed to be executed in the order they were
received. Therefore, if you are using load-balancing or other round-robin scheduling where different
statements are submitted through different hosts, set up all table structures ahead of time so that the
statements controlled by the queuing system are primarily queries, where order is not significant. Or, if a
sequence of statements needs to happen in strict order (such as an <codeph>INSERT</codeph> followed by a
<codeph>SELECT</codeph>), submit all those statements through a single session, while connected to the same
Impala daemon host.
</p>
<p>
Admission control has the following limitations or special behavior when used with JDBC or ODBC
applications:
</p>
<ul>
<li>
The other resource-related query options,
<codeph>RESERVATION_REQUEST_TIMEOUT</codeph> and <codeph>V_CPU_CORES</codeph>, are no longer used. Those query options only
applied to using Impala with Llama, which is no longer supported.
</li>
</ul>
</conbody>
</concept>
<concept id="admission_schema_config">
<title>SQL and Schema Considerations for Admission Control</title>
<conbody>
<p>
When queries complete quickly and are tuned for optimal memory usage, there is less chance of
performance or capacity problems during times of heavy load. Before setting up admission control,
tune your Impala queries to ensure that the query plans are efficient and the memory estimates
are accurate. Understanding the nature of your workload, and which queries are the most
resource-intensive, helps you to plan how to divide the queries into different pools and
decide what limits to define for each pool.
</p>
<p>
For large tables, especially those involved in join queries, keep their statistics up to date
after loading substantial amounts of new data or adding new partitions.
Use the <codeph>COMPUTE STATS</codeph> statement for unpartitioned tables, and
<codeph>COMPUTE INCREMENTAL STATS</codeph> for partitioned tables.
</p>
<p>
When you use dynamic resource pools with a <uicontrol>Max Memory</uicontrol> setting enabled,
you typically override the memory estimates that Impala makes based on the statistics from the
<codeph>COMPUTE STATS</codeph> statement.
You either set the <codeph>MEM_LIMIT</codeph> query option within a particular session to
set an upper memory limit for queries within that session, or a default <codeph>MEM_LIMIT</codeph>
setting for all queries processed by the <cmdname>impalad</cmdname> instance, or
a default <codeph>MEM_LIMIT</codeph> setting for all queries assigned to a particular
dynamic resource pool. By designating a consistent memory limit for a set of similar queries
that use the same resource pool, you avoid unnecessary query queuing or out-of-memory conditions
that can arise during high-concurrency workloads when memory estimates for some queries are inaccurate.
</p>
<p>
Follow other steps from <xref href="impala_performance.xml#performance"/> to tune your queries.
</p>
</conbody>
</concept>
<concept id="admission_guidelines">
<title>Guidelines for Using Admission Control</title>
<prolog>
<metadata>
<data name="Category" value="Planning"/>
<data name="Category" value="Guidelines"/>
<data name="Category" value="Best Practices"/>
</metadata>
</prolog>
<conbody>
<p> The limits imposed by admission control are de-centrally managed
<q>soft</q> limits. Each Impala coordinator node makes its own
decisions about whether to allow queries to run immediately or to queue
them. These decisions rely on information passed back and forth between
nodes by the StateStore service. If a sudden surge in requests causes
more queries than anticipated to run concurrently, then the throughput
could decrease due to queries spilling to disk or contending for
resources. Or queries could be cancelled if they exceed the
<codeph>MEM_LIMIT</codeph> setting while running. </p>
<p> In <cmdname>impala-shell</cmdname>, you can also specify which
resource pool to direct queries to by setting the
<codeph>REQUEST_POOL</codeph> query option. </p>
<p> To see how admission control works for particular queries, examine the
profile output or the summary output for the query. <ul>
<li>Profile<p>The information is available through the
<codeph>PROFILE</codeph> statement in
<cmdname>impala-shell</cmdname> immediately after running a
query in the shell, on the <uicontrol>queries</uicontrol> page of
the Impala debug web UI, or in the Impala log file (basic
information at log level 1, more detailed information at log level
2). </p><p>The profile output contains details about the admission
decision, such as whether the query was queued or not and which
resource pool it was assigned to. It also includes the estimated
and actual memory usage for the query, so you can fine-tune the
configuration for the memory limits of the resource pools.
</p></li>
<li>Summary<p>Starting in <keyword keyref="impala31"/>, the
information is available in <cmdname>impala-shell</cmdname> when
the <codeph>LIVE_PROGRESS</codeph> or
<codeph>LIVE_SUMMARY</codeph> query option is set to
<codeph>TRUE</codeph>.</p><p>You can also start an
<codeph>impala-shell</codeph> session with the
<codeph>--live_progress</codeph> or
<codeph>--live_summary</codeph> flags to monitor all queries in
that <codeph>impala-shell</codeph> session.</p><p>The summary
output includes the queuing status consisting of whether the query
was queued and what was the latest queuing reason.</p></li>
</ul></p>
<p> For details about all the Fair Scheduler configuration settings, see
<xref keyref="FairScheduler">Fair Scheduler Configuration</xref>, in
particular the tags such as <codeph><queue></codeph> and
<codeph><aclSubmitApps></codeph> to map users and groups to
particular resource pools (queues). </p>
</conbody>
</concept>
</concept>
``` | /content/code_sandbox/docs/topics/impala_admission.xml | xml | 2016-04-13T07:00:08 | 2024-08-16T10:10:44 | impala | apache/impala | 1,115 | 7,296 |
```xml
<clickhouse>
<keeper_server>
<tcp_port>9181</tcp_port>
<server_id>1</server_id>
<log_storage_path>/var/lib/clickhouse/coordination/log</log_storage_path>
<snapshot_storage_path>/var/lib/clickhouse/coordination/snapshots</snapshot_storage_path>
<enable_reconfiguration>true</enable_reconfiguration>
<coordination_settings>
<operation_timeout_ms>5000</operation_timeout_ms>
<session_timeout_ms>10000</session_timeout_ms>
<raft_logs_level>trace</raft_logs_level>
</coordination_settings>
<raft_configuration>
<server>
<id>1</id>
<hostname>node1</hostname>
<port>9234</port>
</server>
<server>
<id>2</id>
<hostname>node2</hostname>
<port>9234</port>
<start_as_follower>true</start_as_follower>
</server>
<server>
<id>3</id>
<hostname>node3</hostname>
<port>9234</port>
<start_as_follower>true</start_as_follower>
</server>
</raft_configuration>
</keeper_server>
</clickhouse>
``` | /content/code_sandbox/tests/integration/test_keeper_reconfig_replace_leader/configs/keeper1.xml | xml | 2016-06-02T08:28:18 | 2024-08-16T18:39:33 | ClickHouse | ClickHouse/ClickHouse | 36,234 | 281 |
```xml
import * as React from 'react';
import { TelemetryPosition } from './useTelemetryState';
import { CellAlign } from './useTelemetryColumns';
type CellColor = { backgroundColor: string; color: string };
const CELL_COLORS_STYLES: CellColor[] = [
{ backgroundColor: '#ffffff', color: '#000000' },
{ backgroundColor: '#ffffcc', color: '#000000' },
{ backgroundColor: '#ffeda0', color: '#000000' },
{ backgroundColor: '#fed976', color: '#000000' },
{ backgroundColor: '#feb24c', color: '#000000' },
{ backgroundColor: '#fd8d3c', color: '#000000' },
{ backgroundColor: '#fc4e2a', color: '#000000' },
{ backgroundColor: '#e31a1c', color: '#ffffff' },
{ backgroundColor: '#bd0026', color: '#ffffff' },
{ backgroundColor: '#800026', color: '#ffffff' },
];
const getCellColorStyles = (p: number): CellColor =>
CELL_COLORS_STYLES[Math.round((CELL_COLORS_STYLES.length - 1) * p)];
export const controls = (): React.CSSProperties => ({
border: '1px solid #e5e5e4',
borderBottom: 'none',
alignItems: 'center',
display: 'grid',
gridTemplateColumns: '1fr auto',
gridGap: 5,
padding: 4,
});
export const panel = ({ position }: { position: TelemetryPosition }): React.CSSProperties => ({
background: 'rgba(245, 245, 245)',
color: '#565554',
fontSize: '12px',
position: 'fixed',
minWidth: 500,
zIndex: 1000,
...(position === 'bottom-left' && {
left: 0,
bottom: 0,
}),
...(position === 'bottom-right' && {
right: 0,
bottom: 0,
}),
...(position === 'top-left' && {
left: 0,
top: 0,
}),
...(position === 'top-right' && {
right: 0,
top: 0,
}),
});
export const help = (): React.CSSProperties => ({
background: '#fff',
border: '1px solid #e5e5e4',
borderBottom: 'none',
});
export const performanceFlags = (): React.CSSProperties => ({
border: '1px solid #e5e5e4',
borderBottom: 'none',
flex: 1,
padding: 10,
});
export const performanceFlag = (): React.CSSProperties => ({
display: 'flex',
});
export const performanceFlagLabel = (): React.CSSProperties => ({
marginLeft: 5,
});
export const tabs = (): React.CSSProperties => ({
border: '1px solid #e5e5e4',
display: 'flex',
});
export const tab = ({ active }: { active?: boolean }): React.CSSProperties => ({
background: 'transparent',
borderColor: 'transparent',
borderRadius: 0,
borderWidth: '0 0 2px 0',
padding: '4px 8px',
outline: 0,
...(active && { borderColor: '#052ffb' }),
});
export const table = (): React.CSSProperties => ({
background: '#fff',
border: '1px solid #e5e5e4',
borderBottom: 'none',
borderCollapse: 'collapse',
width: '100%',
});
export const tableCell = ({
align,
percentageRatio,
}: {
align?: CellAlign;
percentageRatio?: number;
}): React.CSSProperties => ({
border: '1px solid #e5e5e4',
padding: 2,
textAlign: 'right',
...(align && { textAlign: align }),
...(percentageRatio && getCellColorStyles(percentageRatio)),
});
export const tableFooterCell = ({ align }: { align?: CellAlign }): React.CSSProperties => ({
fontWeight: 'bold',
textAlign: 'right',
...(align && { textAlign: align }),
});
export const tableCheckbox = (): React.CSSProperties => ({
marginLeft: 5,
});
export const tableControls = (): React.CSSProperties => ({
border: '1px solid #e5e5e4',
borderBottom: 'none',
alignItems: 'center',
display: 'grid',
gridTemplateColumns: 'auto 100px 1fr auto auto',
gridGap: 5,
padding: 6,
});
export const tableFilter = (): React.CSSProperties => ({
marginLeft: 5,
width: 100,
});
export const tableHeader = ({
isFirstInSubgroup,
isLastInSubgroup,
subgroup,
}: {
isFirstInSubgroup: boolean;
isLastInSubgroup: boolean;
subgroup: 'styles' | 'timers';
}): React.CSSProperties => ({
border: '1px solid #e5e5e4',
padding: 4,
...(subgroup && {
background: 'rgba(245, 245, 245, 0.75)',
borderBottomStyle: 'solid',
borderBottomWidth: '2px',
borderLeftColor: 'transparent',
borderRightColor: 'transparent',
fontWeight: 'normal',
...(isFirstInSubgroup && {
background: 'transparent',
fontWeight: 'bold',
}),
...(isLastInSubgroup && { borderRightColor: '#e5e5e4' }),
}),
...(subgroup === 'timers' && {
borderBottomColor: 'cornflowerblue',
}),
...(subgroup === 'styles' && {
borderBottomColor: 'salmon',
}),
});
export const tableSort = (): React.CSSProperties => ({ fontSize: 10 });
``` | /content/code_sandbox/packages/fluentui/react-telemetry/src/styles.ts | xml | 2016-06-06T15:03:44 | 2024-08-16T18:49:29 | fluentui | microsoft/fluentui | 18,221 | 1,249 |
```xml
<?xml version="1.0" encoding="utf-8"?>
<Project ToolsVersion="4.0" xmlns="path_to_url">
<ItemGroup>
<Filter Include="Header Files">
<UniqueIdentifier>{ba5fa1b8-1783-4b3b-9a41-31d363b52841}</UniqueIdentifier>
</Filter>
</ItemGroup>
<ItemGroup>
<ClInclude Include="..\..\sparsepp\spp.h">
<Filter>Header Files</Filter>
</ClInclude>
</ItemGroup>
</Project>
``` | /content/code_sandbox/examples/vsprojects/serialize_stream.vcxproj.filters | xml | 2016-08-21T21:33:02 | 2024-08-12T19:24:29 | sparsepp | greg7mdp/sparsepp | 1,240 | 126 |
```xml
import {nameOf} from "@tsed/core";
import {Controller} from "../decorators/controller.js";
import {Module1} from "./__mock__/module1/Module1.js";
import {Module2} from "./__mock__/module2/Module2.js";
import {M1Ctrl1} from "./__mock__/module1/controllers/M1Ctrl1.js";
import {M2Ctrl} from "./__mock__/module2/controllers/M2Ctrl.js";
import {resolveControllers} from "./resolveControllers.js";
@Controller("/root")
class TestCtrl {}
describe("resolveControllers", () => {
it("should load providers and merge configuration", () => {
const configuration = {
mount: {
"/rest": [TestCtrl]
},
imports: [Module1, Module2]
};
const result = resolveControllers(configuration);
const routes = result.map((item) => ({...item, token: nameOf(item.token)}));
expect(routes).toEqual([
{
route: "/m1",
token: "M1Ctrl1"
},
{
route: "/mod2",
token: "M2Ctrl"
},
{
route: "/rest",
token: "TestCtrl"
}
]);
});
});
``` | /content/code_sandbox/packages/di/src/common/utils/resolveControllers.spec.ts | xml | 2016-02-21T18:38:47 | 2024-08-14T21:19:48 | tsed | tsedio/tsed | 2,817 | 264 |
```xml
import { createSlice, PayloadAction } from "@reduxjs/toolkit";
import { RQSessionEvents } from "@requestly/web-sdk";
import { ReducerKeys } from "store/constants";
import { SessionRecordingMetadata, Visibility } from "views/features/sessions/SessionViewer/types";
export interface SessionRecordingState {
metadata?: SessionRecordingMetadata;
events?: RQSessionEvents;
trimmedSessionData?: {
duration: number;
events: RQSessionEvents;
};
}
const initialState: SessionRecordingState = {
metadata: null,
events: null,
trimmedSessionData: null,
};
const slice = createSlice({
name: ReducerKeys.SESSION_RECORDING,
initialState,
reducers: {
resetState: () => initialState,
setSessionRecordingMetadata: (state, action: PayloadAction<SessionRecordingMetadata>) => {
state.metadata = action.payload;
},
setEvents: (state, action: PayloadAction<RQSessionEvents>) => {
state.events = action.payload;
},
setVisibility: (state, action: PayloadAction<Visibility>) => {
state.metadata.visibility = action.payload;
},
setName: (state, action: PayloadAction<string>) => {
state.metadata.name = action.payload;
},
setStartTimeOffset: (state, action: PayloadAction<number>) => {
state.metadata.startTimeOffset = action.payload;
},
setDescription: (state, action: PayloadAction<string>) => {
state.metadata.description = action.payload;
},
setTrimmedSessiondata: (state, action: PayloadAction<{ duration: number; events: RQSessionEvents }>) => {
state.trimmedSessionData = action.payload;
},
},
});
export const { actions: sessionRecordingActions, reducer: sessionRecordingReducer } = slice;
``` | /content/code_sandbox/app/src/store/features/session-recording/slice.ts | xml | 2016-12-01T04:36:06 | 2024-08-16T19:12:19 | requestly | requestly/requestly | 2,121 | 380 |
```xml
/*
* @license Apache-2.0
*
*
*
* path_to_url
*
* Unless required by applicable law or agreed to in writing, software
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
*/
import itercugmean = require( './index' );
/**
* Returns an iterator protocol-compliant object.
*
* @returns iterator protocol-compliant object
*/
function iterator() {
return {
'next': next
};
/**
* Implements the iterator protocol `next` method.
*
* @returns iterator protocol-compliant object
*/
function next() {
return {
'value': true,
'done': false
};
}
}
// TESTS //
// The function returns an iterator...
{
itercugmean( iterator() ); // $ExpectType Iterator
}
// The compiler throws an error if the function is provided a value other than an iterator protocol-compliant object...
{
itercugmean( '5' ); // $ExpectError
itercugmean( 5 ); // $ExpectError
itercugmean( true ); // $ExpectError
itercugmean( false ); // $ExpectError
itercugmean( null ); // $ExpectError
itercugmean( undefined ); // $ExpectError
itercugmean( [] ); // $ExpectError
itercugmean( {} ); // $ExpectError
itercugmean( ( x: number ): number => x ); // $ExpectError
}
// The compiler throws an error if the function is provided insufficient arguments...
{
itercugmean(); // $ExpectError
}
``` | /content/code_sandbox/lib/node_modules/@stdlib/stats/iter/cugmean/docs/types/test.ts | xml | 2016-03-24T04:19:52 | 2024-08-16T09:03:19 | stdlib | stdlib-js/stdlib | 4,266 | 346 |
```xml
export * from './layout';
export * from './WalletCreationModal';
export * from './BitcoinSendModal';
export * from './Balance';
export * from './DataList';
export * from './MetricsAndCtas';
``` | /content/code_sandbox/applications/wallet/src/app/components/index.ts | xml | 2016-06-08T11:16:51 | 2024-08-16T14:14:27 | WebClients | ProtonMail/WebClients | 4,300 | 45 |
```xml
// See LICENSE in the project root for license information.
import * as semver from 'semver';
import type { IScopedLogger } from '@rushstack/heft';
import { FileError, InternalError } from '@rushstack/node-core-library';
import type { ITerminal } from '@rushstack/terminal';
import type * as TApiExtractor from '@microsoft/api-extractor';
export interface IApiExtractorRunnerConfiguration {
/**
* The root folder of the build.
*/
buildFolder: string;
/**
* The loaded and prepared Extractor config file ("api-extractor.json")
*/
apiExtractorConfiguration: TApiExtractor.ExtractorConfig;
/**
* The imported @microsoft/api-extractor package
*/
apiExtractor: typeof TApiExtractor;
/**
* The path to the typescript package
*
* For example, /home/username/code/repo/project/node_modules/typescript
*/
typescriptPackagePath: string | undefined;
/**
* If set to true, run API Extractor in production mode
*/
production: boolean;
/**
* The scoped logger to use for logging
*/
scopedLogger: IScopedLogger;
}
const MIN_SUPPORTED_MAJOR_VERSION: number = 7;
const MIN_SUPPORTED_MINOR_VERSION: number = 10;
export class ApiExtractorRunner {
private readonly _configuration: IApiExtractorRunnerConfiguration;
private readonly _scopedLogger: IScopedLogger;
private readonly _terminal: ITerminal;
private readonly _apiExtractor: typeof TApiExtractor;
public constructor(configuration: IApiExtractorRunnerConfiguration) {
this._configuration = configuration;
this._apiExtractor = configuration.apiExtractor;
this._scopedLogger = configuration.scopedLogger;
this._terminal = configuration.scopedLogger.terminal;
}
public async invokeAsync(): Promise<void> {
this._scopedLogger.terminal.writeLine(
`Using API Extractor version ${this._apiExtractor.Extractor.version}`
);
const apiExtractorVersion: semver.SemVer | null = semver.parse(this._apiExtractor.Extractor.version);
if (
!apiExtractorVersion ||
apiExtractorVersion.major < MIN_SUPPORTED_MAJOR_VERSION ||
(apiExtractorVersion.major === MIN_SUPPORTED_MAJOR_VERSION &&
apiExtractorVersion.minor < MIN_SUPPORTED_MINOR_VERSION)
) {
this._scopedLogger.emitWarning(new Error(`Heft requires API Extractor version 7.10.0 or newer`));
}
const extractorConfig: TApiExtractor.ExtractorConfig = this._configuration.apiExtractorConfiguration;
const extractorOptions: TApiExtractor.IExtractorInvokeOptions = {
localBuild: !this._configuration.production,
typescriptCompilerFolder: this._configuration.typescriptPackagePath,
messageCallback: (message: TApiExtractor.ExtractorMessage) => {
switch (message.logLevel) {
case this._apiExtractor.ExtractorLogLevel.Error:
case this._apiExtractor.ExtractorLogLevel.Warning: {
let errorToEmit: Error | undefined;
if (message.sourceFilePath) {
errorToEmit = new FileError(`(${message.messageId}) ${message.text}`, {
absolutePath: message.sourceFilePath,
projectFolder: this._configuration.buildFolder,
line: message.sourceFileLine,
column: message.sourceFileColumn
});
} else {
errorToEmit = new Error(message.text);
}
if (message.logLevel === this._apiExtractor.ExtractorLogLevel.Error) {
this._scopedLogger.emitError(errorToEmit);
} else if (message.logLevel === this._apiExtractor.ExtractorLogLevel.Warning) {
this._scopedLogger.emitWarning(errorToEmit);
} else {
// Should never happen, but just in case
throw new InternalError(`Unexpected log level: ${message.logLevel}`);
}
break;
}
case this._apiExtractor.ExtractorLogLevel.Verbose: {
this._terminal.writeVerboseLine(message.text);
break;
}
case this._apiExtractor.ExtractorLogLevel.Info: {
this._terminal.writeLine(message.text);
break;
}
case this._apiExtractor.ExtractorLogLevel.None: {
// Ignore messages with ExtractorLogLevel.None
break;
}
default:
this._scopedLogger.emitError(
new Error(`Unexpected API Extractor log level: ${message.logLevel}`)
);
}
message.handled = true;
}
};
const apiExtractorResult: TApiExtractor.ExtractorResult = this._apiExtractor.Extractor.invoke(
extractorConfig,
extractorOptions
);
if (!apiExtractorResult.succeeded) {
this._scopedLogger.emitError(new Error('API Extractor failed.'));
} else if (apiExtractorResult.apiReportChanged && this._configuration.production) {
this._scopedLogger.emitError(new Error('API Report changed while in production mode.'));
}
}
}
``` | /content/code_sandbox/heft-plugins/heft-api-extractor-plugin/src/ApiExtractorRunner.ts | xml | 2016-09-30T00:28:20 | 2024-08-16T18:54:35 | rushstack | microsoft/rushstack | 5,790 | 1,035 |
```xml
import { render, within } from '@testing-library/react';
import EncryptionStatusIcon from './EncryptionStatusIcon';
describe('EncryptionStatusIcon', () => {
describe('when loading is true', () => {
it('should render loader', () => {
const { getByTestId, getByText } = render(<EncryptionStatusIcon loading />);
getByTestId('circle-loader');
getByText('Loading');
});
});
describe('when fill or encrypted is undefined', () => {
it('should not render anything', () => {
const { container } = render(<EncryptionStatusIcon fill={undefined} loading={false} />);
expect(container.firstChild).toBeNull();
});
it('should not render anything', () => {
const { container } = render(<EncryptionStatusIcon isEncrypted={undefined} loading={false} />);
expect(container.firstChild).toBeNull();
});
});
describe('when isDetailsModal is true', () => {
it('should not render icon in span', () => {
const props = {
isEncrypted: true,
fill: 2,
text: 'End to End encrypted',
loading: false,
isDetailsModal: true,
};
const { queryByTestId, getByTestId, getByText } = render(<EncryptionStatusIcon {...props} />);
getByTestId('encryption-icon');
getByText('End to End encrypted');
expect(queryByTestId('encryption-icon-tooltip')).toBeNull();
});
});
describe('when there is a href', () => {
it('should render inside <a> tag and tooltip', () => {
const props = {
isEncrypted: false,
fill: 2,
loading: false,
text: 'This email adress is invalid',
};
const { getByTestId } = render(<EncryptionStatusIcon {...props} />);
const tooltip = getByTestId('encryption-icon-tooltip');
// workaround to be able to get by tag
const href = within(tooltip).getByText((_, el) => el?.tagName.toLowerCase() === 'a');
within(href).getByText('This email adress is invalid');
within(href).getByTestId('encryption-icon');
});
});
describe('when shouldHaveHref is false', () => {
it('should render only inside tooltip', () => {
const props = {
isEncrypted: false,
fill: 2,
loading: false,
text: 'This email adress is invalid',
shouldHaveHref: false,
};
const { getByTestId } = render(<EncryptionStatusIcon {...props} />);
const tooltip = getByTestId('encryption-icon-tooltip');
within(tooltip).getByText('This email adress is invalid');
within(tooltip).getByTestId('encryption-icon');
expect(within(tooltip).queryByText((_, el) => el?.tagName.toLowerCase() === 'a')).toBeNull();
});
});
});
``` | /content/code_sandbox/applications/mail/src/app/components/message/EncryptionStatusIcon.test.tsx | xml | 2016-06-08T11:16:51 | 2024-08-16T14:14:27 | WebClients | ProtonMail/WebClients | 4,300 | 615 |
```xml
<?xml version="1.0" encoding="utf-8"?>
<shape xmlns:android="path_to_url">
<solid android:color="@color/colorAccent" />
<!--border color and border width-->
<stroke
android:width="3dp"
android:color="@color/white" />
<!--border radius in dp-->
<corners android:radius="30dp" />
</shape>
``` | /content/code_sandbox/Android/app/src/main/res/drawable/round_shape.xml | xml | 2016-01-30T13:42:30 | 2024-08-12T19:21:10 | Travel-Mate | project-travel-mate/Travel-Mate | 1,292 | 89 |
```xml
// import { ReactLib } from "./react-lib";
import {
declareSubApp as dsa,
SubAppDef,
SubAppOptions,
SubAppFeatureFactory,
PipelineFactoryParams
} from "@xarc/subapp";
import { __createDynamicComponent, CreateComponentOptions } from "../common/create-component";
import { BrowserReactLib } from "./react-lib-browser";
import { __reactFrameworkFeature, __addFeature } from "../common/internal";
import { appContextFeature } from "./feat-app-context-browser";
import { ReactClientRenderPipeline } from "./react-render-pipeline";
//
// re-exports
//
export * from "../common";
export * from "./feat-static-props-browser";
export * from "./subapp-as-component";
export { AppContext } from "../common/app-context";
export { appContextFeature };
/**
* Add React framework feature to a subapp (browser version)
*
* This is added as default if you use `declareSubApp` or `createDynamicComponent` from `@xarc/react`
*/
export function reactFrameworkFeature(): SubAppFeatureFactory {
return __reactFrameworkFeature((...args) => new BrowserReactLib(...args));
}
/**
* declare a subapp to use React framework (browser version)
*
* @param options - subapp options
*/
function __declareSubApp(options: SubAppOptions): SubAppDef {
// add framework feature if it's not exist
let opts = __addFeature(options, "framework", reactFrameworkFeature);
opts = __addFeature(opts, "app-context-provider", appContextFeature);
const def = dsa(opts);
def._pipelineFactory = function ({ csrData }: PipelineFactoryParams) {
return new ReactClientRenderPipeline(csrData);
};
return def;
}
export { __declareSubApp as declareSubApp };
/**
* create a dynamic component for the React framework (browser version)
*
* @param optDef - SubAppOptions or SubAppDef
* @param options - create component options
*
* @returns a React component that will be dynamic import
*/
export function createDynamicComponent(
optDef: SubAppDef | SubAppOptions,
options: CreateComponentOptions = {}
) {
return __createDynamicComponent(optDef, options, __declareSubApp);
}
``` | /content/code_sandbox/packages/xarc-react/src/browser/index.tsx | xml | 2016-09-06T19:02:39 | 2024-08-11T11:43:11 | electrode | electrode-io/electrode | 2,103 | 479 |
```xml
// Modified version of: path_to_url
import electron, { BrowserWindow, Rectangle } from 'electron'
import jsonfile from 'jsonfile'
import mkdirp from 'mkdirp'
import path from 'path'
export interface WindowStateOptions {
/** The height that should be returned if no file exists yet. Defaults to `600`. */
defaultHeight?: number
/** The width that should be returned if no file exists yet. Defaults to `800`. */
defaultWidth?: number
/** Should we automatically restore the window to full screen, if it was last closed full screen. Defaults to `true`. */
fullScreen?: boolean
/** The path where the state file should be written to. Defaults to `app.getPath('userData')`. */
path?: string
/** The name of file. Defaults to `window-state.json`. */
file?: string
/** Should we automatically maximize the window, if it was last closed maximized. Defaults to `true`. */
maximize?: boolean
}
export interface WindowInternalState {
displayBounds: {
height: number
width: number
}
/** The saved height of loaded state. `defaultHeight` if the state has not been saved yet. */
height: number
/** true if the window state was saved while the window was in full screen mode. `undefined` if the state has not been saved yet. */
isFullScreen: boolean
/** `true` if the window state was saved while the window was maximized. `undefined` if the state has not been saved yet. */
isMaximized: boolean
/** The saved width of loaded state. `defaultWidth` if the state has not been saved yet. */
width: number
/** The saved x coordinate of the loaded state. `undefined` if the state has not been saved yet. */
x: number
/** The saved y coordinate of the loaded state. `undefined` if the state has not been saved yet. */
y: number
}
export interface WindowState extends WindowInternalState {
/** Register listeners on the given `BrowserWindow` for events that are related to size or position changes (resize, move). It will also restore the window's maximized or full screen state. When the window is closed we automatically remove the listeners and save the state. */
manage: (window: BrowserWindow) => void
/** Removes all listeners of the managed `BrowserWindow` in case it does not need to be managed anymore. */
unmanage: () => void
}
export function windowStateKeeper(options: WindowStateOptions): WindowState {
const app = electron.app || electron.remote.app
const screen = electron.screen || electron.remote.screen
let state: WindowInternalState
let winRef: BrowserWindow | null = null
let updateStateTimer: number
let saveStateTimer: number
const updateStateDelay = 100
const saveStateDelay = 500
const config = Object.assign(
{
file: 'window-state.json',
path: app.getPath('userData'),
maximize: true,
fullScreen: true,
},
options,
)
const fullStoreFileName = path.join(config.path, config.file)
function isNormal(win: BrowserWindow) {
return !win.isMaximized() && !win.isMinimized() && !win.isFullScreen()
}
function hasBounds() {
return (
state &&
Number.isInteger(state.x) &&
Number.isInteger(state.y) &&
Number.isInteger(state.width) &&
state.width > 0 &&
Number.isInteger(state.height) &&
state.height > 0
)
}
function resetStateToDefault() {
const displayBounds = screen.getPrimaryDisplay().bounds
// Reset state to default values on the primary display
state = {
displayBounds,
x: 0,
y: 0,
width: config.defaultWidth || 800,
height: config.defaultHeight || 600,
isFullScreen: false,
isMaximized: false,
}
}
function windowWithinBounds(bounds: Rectangle) {
return (
state.x >= bounds.x &&
state.y >= bounds.y &&
state.x + state.width <= bounds.x + bounds.width &&
state.y + state.height <= bounds.y + bounds.height
)
}
function ensureWindowVisibleOnSomeDisplay() {
const visible = screen.getAllDisplays().some((display) => {
return windowWithinBounds(display.bounds)
})
if (!visible) {
// Window is partially or fully not visible now.
// Reset it to safe defaults.
return resetStateToDefault()
}
}
function validateState() {
const isValid =
state && (hasBounds() || state.isMaximized || state.isFullScreen)
if (!isValid) {
resetStateToDefault()
return
}
if (hasBounds() && state.displayBounds) {
ensureWindowVisibleOnSomeDisplay()
}
}
function updateState(_win?: BrowserWindow) {
const win = _win || winRef
if (!win) {
return
}
// Don't throw an error when window was closed
try {
const winBounds = win.getBounds()
if (isNormal(win)) {
state.x = winBounds.x
state.y = winBounds.y
state.width = winBounds.width
state.height = winBounds.height
}
state.isMaximized = win.isMaximized()
state.isFullScreen = win.isFullScreen()
state.displayBounds = screen.getDisplayMatching(winBounds).bounds
} catch (err) {
//
}
}
function saveState(win?: BrowserWindow) {
// Update window state only if it was provided
if (win) {
updateState(win)
}
// Save state
try {
mkdirp.sync(path.dirname(fullStoreFileName))
jsonfile.writeFileSync(fullStoreFileName, state)
} catch (err) {
//
}
}
function stateChangeHandler() {
// Handles both 'resize' and 'move'
clearTimeout(updateStateTimer)
clearTimeout(saveStateTimer)
updateStateTimer = setTimeout(updateState, updateStateDelay)
saveStateTimer = setTimeout(saveState, saveStateDelay)
}
function closeHandler() {
updateState()
}
function closedHandler() {
// Unregister listeners and save state
unmanage()
saveState()
}
function manage(win: BrowserWindow) {
winRef = win
if (config.maximize && state.isMaximized) {
win.maximize()
}
if (config.fullScreen && state.isFullScreen) {
win.setFullScreen(true)
}
win.on('resize', stateChangeHandler)
win.on('move', stateChangeHandler)
win.on('close', closeHandler)
win.on('closed', closedHandler)
}
function unmanage() {
if (winRef) {
clearTimeout(updateStateTimer)
winRef.removeListener('resize', stateChangeHandler)
winRef.removeListener('move', stateChangeHandler)
winRef.removeListener('close', closeHandler)
winRef.removeListener('closed', closedHandler)
winRef = null
}
}
// Load previous state
try {
state = jsonfile.readFileSync(fullStoreFileName)
} catch (err) {
//
}
// Check state validity
validateState()
// Set state fallback values
state = Object.assign(
{
width: config.defaultWidth || 800,
height: config.defaultHeight || 600,
},
state!,
)
return {
get x() {
return state.x
},
get y() {
return state.y
},
get width() {
return state.width
},
get height() {
return state.height
},
get displayBounds() {
return state.displayBounds
},
get isMaximized() {
return state.isMaximized
},
get isFullScreen() {
return state.isFullScreen
},
manage,
unmanage,
}
}
``` | /content/code_sandbox/packages/desktop/src/libs/electron-window-state/index.ts | xml | 2016-11-30T23:24:21 | 2024-08-16T00:24:59 | devhub | devhubapp/devhub | 9,652 | 1,728 |
```xml
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "path_to_url">
<plist version="1.0">
<dict>
<key>SchemeUserState</key>
<dict>
<key>Cycript-Reveal.xcscheme</key>
<dict>
<key>orderHint</key>
<integer>0</integer>
</dict>
</dict>
<key>SuppressBuildableAutocreation</key>
<dict>
<key>BBDBFFF41D2EF8B60096EB26</key>
<dict>
<key>primary</key>
<true/>
</dict>
</dict>
</dict>
</plist>
``` | /content/code_sandbox/Cycript-Reveal/Cycript-Reveal.xcodeproj/xcuserdata/eular.xcuserdatad/xcschemes/xcschememanagement.plist | xml | 2016-06-14T12:50:00 | 2024-08-16T17:14:23 | iOSAppHook | Urinx/iOSAppHook | 2,364 | 182 |
```xml
import { CdsTextarea as Textarea } from '@cds/core/textarea';
import '@cds/core/textarea/register';
import { createComponent } from '@lit-labs/react';
import * as React from 'react';
import { logReactVersion } from '../utils/index.js';
export const CdsTextarea = createComponent(React, 'cds-textarea', Textarea, {}, 'CdsTextarea');
logReactVersion(React);
``` | /content/code_sandbox/packages/react/src/textarea/index.tsx | xml | 2016-09-29T17:24:17 | 2024-08-11T17:06:15 | clarity | vmware-archive/clarity | 6,431 | 91 |
```xml
import React from 'react'
export function Hello() {
return <>Hello</>
}
``` | /content/code_sandbox/test/integration/typescript-paths/components/hello.tsx | xml | 2016-10-05T23:32:51 | 2024-08-16T19:44:30 | next.js | vercel/next.js | 124,056 | 19 |
```xml
import * as React from 'react';
import { ThemeProvider, DefaultButton, PartialTheme, getTheme } from '@fluentui/react';
import { useBoolean } from '@fluentui/react-hooks';
import { ContextualMenuExample } from './components';
// This app is here as a simple sandbox to render v8 controls inside of an React 18 environment.
export const App = () => {
const { palette } = getTheme();
const lightTheme: PartialTheme = {
semanticColors: {
bodyBackground: palette.white,
bodyText: palette.black,
menuBackground: palette.white,
},
};
const darkTheme: PartialTheme = {
semanticColors: {
bodyBackground: palette.black,
bodyText: palette.white,
menuBackground: palette.black,
},
};
const [isLight, { toggle: toggleIsLight }] = useBoolean(true);
const ToggleButton: React.FunctionComponent = () => {
// eslint-disable-next-line @typescript-eslint/ban-ts-comment
// @ts-ignore typing error caused by monorepo being on @types/react version 17 and this app being on react 18.
// Seems to be caused by certain v8 components (like Button) still being class components.
// Error goes away when monorepo is migrated to react 18 types OR when @fluentui/react increases peer dependency
// range to include react 18.
return <DefaultButton onClick={toggleIsLight}>Toggle theme</DefaultButton>;
};
return (
<ThemeProvider style={{ padding: '8px' }} theme={isLight ? lightTheme : darkTheme}>
<ToggleButton />
<ContextualMenuExample />
</ThemeProvider>
);
};
``` | /content/code_sandbox/apps/react-18-tests-v8/src/App.tsx | xml | 2016-06-06T15:03:44 | 2024-08-16T18:49:29 | fluentui | microsoft/fluentui | 18,221 | 362 |
```xml
import { ChangeDetectionStrategy, ChangeDetectorRef, Component, OnDestroy, OnInit } from '@angular/core';
import { ActivatedRoute, Router } from '@angular/router';
import { TranslateService } from '@ngx-translate/core';
import { Subscription } from 'rxjs';
import { finalize } from 'rxjs/operators';
import { Action } from 'app/model/action.model';
import { Group } from 'app/model/group.model';
import { Job } from 'app/model/job.model';
import { Pipeline } from 'app/model/pipeline.model';
import { Stage } from 'app/model/stage.model';
import { ActionService } from 'app/service/action/action.service';
import { GroupService } from 'app/service/group/group.service';
import { PipelineService } from 'app/service/pipeline/pipeline.service';
import { PathItem } from 'app/shared/breadcrumb/breadcrumb.component';
import { AutoUnsubscribe } from 'app/shared/decorator/autoUnsubscribe';
import { ToastService } from 'app/shared/toast/ToastService';
@Component({
selector: 'app-action-add',
templateUrl: './action.add.html',
styleUrls: ['./action.add.scss'],
changeDetection: ChangeDetectionStrategy.OnPush
})
@AutoUnsubscribe()
export class ActionAddComponent implements OnInit, OnDestroy {
action: Action;
groups: Array<Group>;
loading: boolean;
path: Array<PathItem>;
queryParamsSub: Subscription;
projectKey: string;
pipeline: Pipeline;
stage: Stage;
job: Job;
constructor(
private _actionService: ActionService,
private _pipelineService: PipelineService,
private _toast: ToastService, private _translate: TranslateService,
private _router: Router,
private _groupService: GroupService,
private _route: ActivatedRoute,
private _cd: ChangeDetectorRef
) {
this.action = <Action>{ editable: true };
this.getGroups();
this.path = [<PathItem>{
translate: 'common_settings'
}, <PathItem>{
translate: 'action_list_title',
routerLink: ['/', 'settings', 'action']
}, <PathItem>{
translate: 'common_create'
}];
}
ngOnDestroy(): void {} // Should be set to use @AutoUnsubscribe with AOT
ngOnInit() {
this.queryParamsSub = this._route.queryParams.subscribe(params => {
if (params['from']) {
let path = params['from'].split('/');
if (path.length === 4) {
this.initFromJob(path[0], path[1], Number(path[2]), path[3]);
}
this._cd.markForCheck();
}
});
}
initFromJob(projectKey: string, pipelineName: string, stageID: number, jobName: string) {
this.projectKey = projectKey;
this._pipelineService.getPipeline(projectKey, pipelineName)
.pipe(finalize(() => this._cd.markForCheck()))
.subscribe(p => {
this.pipeline = p;
this.stage = this.pipeline.stages.find((s: Stage) => s.id === stageID);
if (this.stage) {
this.job = this.stage.jobs.find((j: Job) => j.action.name === jobName);
if (this.job) {
this.action = <Action>{
editable: true,
description: this.job.action.description,
requirements: this.job.action.requirements,
actions: this.job.action.actions
};
}
}
});
}
getGroups() {
this.loading = true;
this._groupService.getAll()
.pipe(finalize(() => {
this.loading = false;
this._cd.markForCheck();
}))
.subscribe(gs => {
this.groups = gs;
});
}
actionSave(action: Action): void {
this.action.loading = true;
if (action.actions) {
action.actions.forEach(a => {
if (a.parameters) {
a.parameters.forEach(p => {
if (p.type === 'boolean' && !p.value) {
p.value = 'false';
}
p.value = p.value.toString();
});
}
});
}
if (action.parameters) {
action.parameters.forEach(p => {
if (p.type === 'boolean' && !p.value) {
p.value = 'false';
}
p.value = p.value.toString();
});
}
this._actionService.add(action)
.pipe(finalize(() => this._cd.markForCheck()))
.subscribe(a => {
this._toast.success('', this._translate.instant('action_saved'));
// navigate to have action name in url
this._router.navigate(['settings', 'action', a.group.name, a.name]);
}, () => {
this.action.loading = false;
});
}
}
``` | /content/code_sandbox/ui/src/app/views/settings/action/add/action.add.component.ts | xml | 2016-10-11T08:28:23 | 2024-08-16T01:55:31 | cds | ovh/cds | 4,535 | 1,011 |
```xml
import typeDefs from './graphql/typeDefs';
import resolvers from './graphql/resolvers';
import * as permissions from './permissions';
import { generateModels } from './connectionResolver';
import { setupMessageConsumers } from './messageBroker';
import { getSubdomain } from '@erxes/api-utils/src/core';
export let debug: any;
export let graphqlPubsub: any;
export let mainDb: any;
export default {
name: 'salesplans',
permissions,
graphql: async () => {
return {
typeDefs: await typeDefs(),
resolvers,
};
},
apolloServerContext: async (context: any, req: any) => {
const subdomain = getSubdomain(req);
context.subdomain = subdomain;
context.models = await generateModels(subdomain);
return context;
},
onServerInit: async (options: any) => {},
setupMessageConsumers,
meta: {
permissions,
},
};
``` | /content/code_sandbox/packages/plugin-salesplans-api/src/configs.ts | xml | 2016-11-11T06:54:50 | 2024-08-16T10:26:06 | erxes | erxes/erxes | 3,479 | 205 |
```xml
import { NgModule } from '@angular/core';
import { RouterModule, ROUTES, Routes } from '@angular/router';
import { marker as gettext } from '@ngneat/transloco-keys-manager/marker';
import { NavigationPageComponent } from '~/app/core/pages/navigation-page/navigation-page.component';
import { RouteConfigService } from '~/app/core/services/route-config.service';
import { NfsSettingsFormPageComponent } from '~/app/pages/services/nfs/nfs-settings-form-page.component';
import { NfsShareDatatablePageComponent } from '~/app/pages/services/nfs/nfs-share-datatable-page.component';
import { NfsShareFormPageComponent } from '~/app/pages/services/nfs/nfs-share-form-page.component';
import { RsyncModuleDatatablePageComponent } from '~/app/pages/services/rsync/rsync-module-datatable-page.component';
import { RsyncModuleFormPageComponent } from '~/app/pages/services/rsync/rsync-module-form-page.component';
import { RsyncModuleSettingsFormPageComponent } from '~/app/pages/services/rsync/rsync-module-settings-form-page.component';
import { RsyncTaskDatatablePageComponent } from '~/app/pages/services/rsync/rsync-task-datatable-page.component';
import { RsyncTaskFormPageComponent } from '~/app/pages/services/rsync/rsync-task-form-page.component';
import { SmbSettingsFormPageComponent } from '~/app/pages/services/smb/smb-settings-form-page.component';
import { SmbShareDatatablePageComponent } from '~/app/pages/services/smb/smb-share-datatable-page.component';
import { SmbShareFormPageComponent } from '~/app/pages/services/smb/smb-share-form-page.component';
import { SshFormPageComponent } from '~/app/pages/services/ssh/ssh-form-page.component';
import { IsDirtyGuardService } from '~/app/shared/services/is-dirty-guard.service';
const routes: Routes = [
{
path: '',
component: NavigationPageComponent
},
{
path: 'ssh',
component: SshFormPageComponent,
canDeactivate: [IsDirtyGuardService],
data: {
title: gettext('SSH'),
editing: true,
notificationTitle: gettext('Updated SSH settings.')
}
},
{
path: 'rsync',
data: { title: gettext('Rsync') },
children: [
{ path: '', component: NavigationPageComponent },
{
path: 'tasks',
data: { title: gettext('Tasks') },
children: [
{ path: '', component: RsyncTaskDatatablePageComponent },
{
path: 'create',
component: RsyncTaskFormPageComponent,
canDeactivate: [IsDirtyGuardService],
data: {
title: gettext('Create'),
editing: false,
notificationTitle: gettext('Created Rsync task.')
}
},
{
path: 'edit/:uuid',
component: RsyncTaskFormPageComponent,
canDeactivate: [IsDirtyGuardService],
data: {
title: gettext('Edit'),
editing: true,
notificationTitle: gettext('Updated Rsync task.')
}
}
]
},
{
path: 'server',
data: { title: gettext('Server') },
children: [
{ path: '', component: NavigationPageComponent },
{
path: 'settings',
component: RsyncModuleSettingsFormPageComponent,
canDeactivate: [IsDirtyGuardService],
data: {
title: gettext('Settings'),
editing: true,
notificationTitle: gettext('Updated Rsync Server settings.')
}
},
{
path: 'modules',
data: { title: gettext('Modules') },
children: [
{ path: '', component: RsyncModuleDatatablePageComponent },
{
path: 'create',
component: RsyncModuleFormPageComponent,
canDeactivate: [IsDirtyGuardService],
data: {
title: gettext('Create'),
editing: false,
notificationTitle: gettext('Created Rsync server module "{{ name }}".')
}
},
{
path: 'edit/:uuid',
component: RsyncModuleFormPageComponent,
canDeactivate: [IsDirtyGuardService],
data: {
title: gettext('Edit'),
editing: true,
notificationTitle: gettext('Updated Rsync server module "{{ name }}".')
}
}
]
}
]
}
]
},
{
path: 'smb',
data: { title: gettext('SMB/CIFS') },
children: [
{ path: '', component: NavigationPageComponent },
{
path: 'settings',
component: SmbSettingsFormPageComponent,
data: {
title: gettext('Settings'),
editing: true,
notificationTitle: gettext('Updated SMB/CIFS settings.')
}
},
{
path: 'shares',
data: { title: gettext('Shares') },
children: [
{ path: '', component: SmbShareDatatablePageComponent },
{
path: 'create',
component: SmbShareFormPageComponent,
canDeactivate: [IsDirtyGuardService],
data: {
title: gettext('Create'),
editing: false,
notificationTitle: gettext('Created SMB/CIFS share.')
}
},
{
path: 'edit/:uuid',
component: SmbShareFormPageComponent,
canDeactivate: [IsDirtyGuardService],
data: {
title: gettext('Edit'),
editing: true,
notificationTitle: gettext('Updated SMB/CIFS share.')
}
}
]
}
]
},
{
path: 'nfs',
data: { title: gettext('NFS') },
children: [
{ path: '', component: NavigationPageComponent },
{
path: 'settings',
component: NfsSettingsFormPageComponent,
canDeactivate: [IsDirtyGuardService],
data: {
title: gettext('Settings'),
editing: true,
notificationTitle: gettext('Updated NFS settings.')
}
},
{
path: 'shares',
data: { title: gettext('Shares') },
children: [
{ path: '', component: NfsShareDatatablePageComponent },
{
path: 'create',
component: NfsShareFormPageComponent,
canDeactivate: [IsDirtyGuardService],
data: {
title: gettext('Create'),
editing: false,
notificationTitle: gettext('Created NFS share.')
}
},
{
path: 'edit/:uuid',
component: NfsShareFormPageComponent,
canDeactivate: [IsDirtyGuardService],
data: {
title: gettext('Edit'),
editing: true,
notificationTitle: gettext('Updated NFS share.')
}
}
]
}
]
}
];
@NgModule({
exports: [RouterModule],
imports: [RouterModule.forChild(routes)],
providers: [
{
provide: ROUTES,
multi: true,
useFactory: (routeConfigService: RouteConfigService): Routes => {
routeConfigService.inject('services', routes);
return routes;
},
deps: [RouteConfigService]
}
]
})
export class ServicesRoutingModule {}
``` | /content/code_sandbox/deb/openmediavault/workbench/src/app/pages/services/services-routing.module.ts | xml | 2016-05-03T10:35:34 | 2024-08-16T08:03:04 | openmediavault | openmediavault/openmediavault | 4,954 | 1,538 |
```xml
import {
Entity,
PrimaryGeneratedColumn,
Column,
OneToMany,
OneToOne,
JoinColumn,
} from "../../../../src"
import { Photo } from "./Photo"
import { Profile } from "./Profile"
@Entity()
export class User {
@PrimaryGeneratedColumn()
id: number
@Column()
name: string
@OneToMany("Photo", "user")
photos: Photo[]
@OneToOne("Profile")
@JoinColumn()
profile: Profile
}
``` | /content/code_sandbox/test/github-issues/4190/entity/User.ts | xml | 2016-02-29T07:41:14 | 2024-08-16T18:28:52 | typeorm | typeorm/typeorm | 33,875 | 105 |
```xml
import { DefaultTheme, DarkTheme } from '@fluentui/theme-samples';
import { Fluent2WebLightTheme, Fluent2WebDarkTheme } from '@fluentui/fluent2-theme';
import { IAppThemes, IExampleCardTheme } from '@fluentui/react-docsite-components';
const exampleCardTheme: IExampleCardTheme[] = [
{ title: 'Default', theme: DefaultTheme },
{ title: 'Dark', theme: DarkTheme },
{ title: 'Fluent 2 Web Light', theme: Fluent2WebLightTheme },
{ title: 'Fluent 2 Web Dark', theme: Fluent2WebDarkTheme },
];
export const AppThemes: IAppThemes = {
exampleCardTheme,
hideSchemes: true,
};
``` | /content/code_sandbox/apps/public-docsite/src/components/Site/AppThemes.ts | xml | 2016-06-06T15:03:44 | 2024-08-16T18:49:29 | fluentui | microsoft/fluentui | 18,221 | 163 |
```xml
export const findUpwards = (target: HTMLElement, outOfBoundsElement: HTMLElement, cb: (el: HTMLElement) => boolean) => {
let current: HTMLElement | null = target;
do {
if (!current) {
return;
}
if (cb(current)) {
return current;
}
if (current === outOfBoundsElement) {
return;
}
current = current.parentElement;
// eslint-disable-next-line no-constant-condition
} while (true);
};
export const findContainingParent = (container: HTMLElement | ChildNode, target: HTMLElement) => {
for (let i = 0; i < container.childNodes.length; ++i) {
const node = container.childNodes[i];
if (node.contains(target)) {
return i;
}
}
return -1;
};
export const blockClick = () => {
let cancel: () => void;
const block = (e: MouseEvent) => {
e.stopPropagation();
e.preventDefault();
cancel();
};
let done = false;
const handleMouseUp = () => {
if (done) {
return;
}
done = true;
setTimeout(() => {
cancel();
}, 1);
};
document.addEventListener('mouseup', handleMouseUp, true);
document.addEventListener('click', block, true);
cancel = () => {
document.removeEventListener('mouseup', handleMouseUp, true);
document.removeEventListener('click', block, true);
};
return cancel;
};
export const createAutoScroll = (container: HTMLElement, { marginTop = 5, marginBottom = 5, speed = 5 } = {}) => {
const rect = container.getBoundingClientRect();
let stopScrolling: (() => void) | undefined;
const startScrolling = (direction: 1 | -1) => {
let stop = false;
const cb = () => {
if (stop) {
return;
}
const pre = container.scrollTop;
container.scrollTop = pre + direction * speed;
if (container.scrollTop === pre) {
return;
}
requestAnimationFrame(cb);
};
cb();
return () => {
stop = true;
};
};
const onMouseMove = ({ pageY }: MouseEvent) => {
if (pageY <= rect.top + marginTop) {
if (!stopScrolling) {
stopScrolling = startScrolling(-1);
}
return;
}
if (pageY >= rect.bottom - marginBottom) {
if (!stopScrolling) {
stopScrolling = startScrolling(+1);
}
return;
}
if (stopScrolling) {
stopScrolling();
stopScrolling = undefined;
}
};
const onMouseUp = () => {
if (stopScrolling) {
stopScrolling();
stopScrolling = undefined;
}
};
return {
onMouseMove,
onMouseUp,
};
};
export const createRafUpdater = () => {
let last: (() => void) | undefined;
const run = () => {
if (last) {
last();
last = undefined;
}
};
return (cb: () => void) => {
const prevLast = last;
last = cb;
// If the prev raf has not been consumed, schedule it to run
if (!prevLast) {
requestAnimationFrame(run);
}
};
};
``` | /content/code_sandbox/applications/calendar/src/app/components/calendar/mouseHelpers/domHelpers.ts | xml | 2016-06-08T11:16:51 | 2024-08-16T14:14:27 | WebClients | ProtonMail/WebClients | 4,300 | 729 |
```xml
import {
useEffect,
useContext,
useMemo,
useState,
useCallback,
useRef,
} from "react";
import { AppStateContext } from "../State/AppStateContext";
import { KioskState } from "../Types";
const Background = () => {
const { state: kiosk } = useContext(AppStateContext);
const [myRef, setMyRef] = useState<HTMLElement | null>(null);
const canvas = useRef<HTMLCanvasElement>(document.createElement("canvas"));
const image = useRef<HTMLImageElement>(document.createElement("img"));
const timer = useRef<NodeJS.Timeout | null>(null);
// TODO: Store cached background URLs in local storage instead of in memory.
const dataUrlCache = useRef<Map<string, string>>(new Map());
const selectedGame = useMemo(
() => kiosk.allGames.find(g => g.id === kiosk.selectedGameId),
[kiosk.selectedGameId]
);
const handleRef = useCallback((node: HTMLElement | null) => {
setMyRef(node);
}, []);
useEffect(() => {
// debounce so we don't update when continuously scrolling games
if (timer.current) {
clearTimeout(timer.current);
}
if (kiosk.kioskState === KioskState.PlayingGame) {
if (myRef) {
myRef.style.backgroundImage = "";
}
return;
}
timer.current = setTimeout(() => {
if (selectedGame && kiosk.kioskState !== KioskState.PlayingGame) {
if (dataUrlCache.current.has(selectedGame.id)) {
if (myRef) {
myRef.style.backgroundImage = `url(${dataUrlCache.current.get(
selectedGame.id
)})`;
}
return;
}
image.current.crossOrigin = "anonymous";
image.current.src = `path_to_url{selectedGame.id}/thumb`;
image.current.onload = () => {
canvas.current.width = 80;
canvas.current.height = 60;
const ctx = canvas.current.getContext("2d");
if (ctx) {
// TODO: Apply blur and opacity filters to image here, not in CSS
ctx.drawImage(
image.current,
0,
0,
image.current.width,
image.current.height,
0,
0,
canvas.current.width,
canvas.current.height
);
const url = canvas.current.toDataURL("image/png");
if (myRef) {
dataUrlCache.current.set(selectedGame.id, url);
myRef.style.backgroundImage = `url(${url})`;
}
}
};
} else {
if (myRef) {
myRef.style.backgroundImage = "";
}
}
}, 750);
}, [selectedGame, kiosk.kioskState, myRef]);
const className = useMemo(() => {
if (kiosk.kioskState === KioskState.PlayingGame) {
return "background-flat";
} else {
return "background-acrylic";
}
}, [kiosk.kioskState]);
return <div className={className} ref={handleRef} />;
};
export default Background;
``` | /content/code_sandbox/kiosk/src/Components/Background.tsx | xml | 2016-01-24T19:35:52 | 2024-08-16T16:39:39 | pxt | microsoft/pxt | 2,069 | 664 |
```xml
'use client';
import { RouterFactory, StackRouter, useNavigationBuilder } from '@react-navigation/native';
import * as React from 'react';
import { SafeAreaView } from 'react-native-safe-area-context';
import { Screen } from './Screen';
import { useContextKey } from '../Route';
import { useFilterScreenChildren } from '../layouts/withLayoutContext';
import { useSortedScreens } from '../useScreens';
type NavigatorTypes = ReturnType<typeof useNavigationBuilder>;
// TODO: This might already exist upstream, maybe something like `useCurrentRender` ?
export const NavigatorContext = React.createContext<{
contextKey: string;
state: NavigatorTypes['state'];
navigation: NavigatorTypes['navigation'];
descriptors: NavigatorTypes['descriptors'];
router: RouterFactory<any, any, any>;
} | null>(null);
if (process.env.NODE_ENV !== 'production') {
NavigatorContext.displayName = 'NavigatorContext';
}
export type NavigatorProps = {
initialRouteName?: Parameters<typeof useNavigationBuilder>[1]['initialRouteName'];
screenOptions?: Parameters<typeof useNavigationBuilder>[1]['screenOptions'];
children?: Parameters<typeof useNavigationBuilder>[1]['children'];
router?: Parameters<typeof useNavigationBuilder>[0];
};
/** An unstyled custom navigator. Good for basic web layouts */
export function Navigator({ initialRouteName, screenOptions, children, router }: NavigatorProps) {
const contextKey = useContextKey();
// Allows adding Screen components as children to configure routes.
const { screens, children: otherSlot } = useFilterScreenChildren(children, {
isCustomNavigator: true,
contextKey,
});
const sorted = useSortedScreens(screens ?? []);
if (!sorted.length) {
console.warn(`Navigator at "${contextKey}" has no children.`);
return null;
}
return (
<QualifiedNavigator
initialRouteName={initialRouteName}
screenOptions={screenOptions}
screens={sorted}
contextKey={contextKey}
router={router}>
{otherSlot}
</QualifiedNavigator>
);
}
function QualifiedNavigator({
initialRouteName,
screenOptions,
children,
screens,
contextKey,
router = StackRouter,
}: NavigatorProps & { contextKey: string; screens: React.ReactNode[] }) {
const { state, navigation, descriptors, NavigationContent } = useNavigationBuilder(router, {
// Used for getting the parent with navigation.getParent('/normalized/path')
id: contextKey,
children: screens,
screenOptions,
initialRouteName,
});
return (
<NavigatorContext.Provider
value={{
contextKey,
state,
navigation,
descriptors,
router,
}}>
<NavigationContent>{children}</NavigationContent>
</NavigatorContext.Provider>
);
}
export function useNavigatorContext() {
const context = React.useContext(NavigatorContext);
if (!context) {
throw new Error('useNavigatorContext must be used within a <Navigator />');
}
return context;
}
export function useSlot() {
const context = useNavigatorContext();
const { state, descriptors } = context;
const current = state.routes.find((route, i) => {
return state.index === i;
});
if (!current) {
return null;
}
return descriptors[current.key]?.render() ?? null;
}
/** Renders the currently selected content. */
export function Slot(props: Omit<NavigatorProps, 'children'>) {
const contextKey = useContextKey();
const context = React.useContext(NavigatorContext);
// Ensure the context is for the current contextKey
if (context?.contextKey !== contextKey) {
// Qualify the content and re-export.
return (
<Navigator {...props}>
<QualifiedSlot />
</Navigator>
);
}
return <QualifiedSlot />;
}
export function QualifiedSlot() {
return useSlot();
}
export function DefaultNavigator() {
return (
<SafeAreaView style={{ flex: 1 }}>
<Navigator>
<QualifiedSlot />
</Navigator>
</SafeAreaView>
);
}
Navigator.Slot = Slot;
Navigator.useContext = useNavigatorContext;
/** Used to configure route settings. */
Navigator.Screen = Screen;
``` | /content/code_sandbox/packages/expo-router/src/views/Navigator.tsx | xml | 2016-08-15T17:14:25 | 2024-08-16T19:54:44 | expo | expo/expo | 32,004 | 885 |
```xml
import { createHash } from 'crypto';
import { getCssModulesLocalIdent as getIdentByRust } from '@ice/bundles';
export default function getCSSModuleLocalIdent(filename: string, localName: string, localIdentName: string): string {
// path_to_url#localidentname
if (localIdentName) {
return getIdentByRust(filename, localName, localIdentName);
}
const hash = createHash('md5');
hash.update(Buffer.from(filename + localName, 'utf8'));
const localIdentHash = hash.digest('base64')
// Remove all leading digits
.replace(/^\d+/, '')
// Replace all slashes with underscores (same as in base64url)
.replace(/\//g, '_')
// Remove everything that is not an alphanumeric or underscore
.replace(/[^A-Za-z0-9_]+/g, '')
.slice(0, 8);
return `${localName}--${localIdentHash}`;
}
``` | /content/code_sandbox/packages/shared-config/src/getCSSModuleLocalIdent.ts | xml | 2016-11-03T06:59:15 | 2024-08-16T10:11:29 | ice | alibaba/ice | 17,815 | 217 |
```xml
import { runtime } from 'webextension-polyfill'
import { Readability } from '@mozilla/readability'
import { RuntimeMessage, RuntimeMessageTypes } from '../types/message'
let isSelectingNodeForClipping = false
let isScreenshotMode = false
runtime.onMessage.addListener(async (message: RuntimeMessage) => {
switch (message.type) {
case RuntimeMessageTypes.StartNodeSelection: {
isSelectingNodeForClipping = true
return
}
case RuntimeMessageTypes.ToggleScreenshotMode: {
isScreenshotMode = message.enabled
return
}
case RuntimeMessageTypes.HasSelection: {
const selection = window.getSelection()
if (!selection) {
return false
}
if (selection.rangeCount < 1) {
return false
}
const range = selection.getRangeAt(0)
return !range.collapsed
}
case RuntimeMessageTypes.GetSelection: {
const selection = window.getSelection()
if (!selection || selection.rangeCount < 1) {
return
}
const range = selection.getRangeAt(0)
const result = document.createElement('div')
result.appendChild(range.cloneContents())
return { title: document.title, content: result.innerHTML, url: window.location.href }
}
case RuntimeMessageTypes.GetFullPage: {
if (isScreenshotMode) {
const content = await runtime.sendMessage({
type: RuntimeMessageTypes.CaptureVisibleTab,
})
return { title: document.title, content: content, url: window.location.href, isScreenshot: true }
}
return { title: document.title, content: document.body.innerHTML, url: window.location.href }
}
case RuntimeMessageTypes.GetArticle: {
const documentClone = document.cloneNode(true) as Document
const article = new Readability(documentClone).parse()
if (!article) {
return
}
return { title: article.title, content: article.content, url: window.location.href }
}
default:
return
}
})
const nodeOverlayElement = document.createElement('div')
nodeOverlayElement.style.border = '2px solid #086dd6'
nodeOverlayElement.style.position = 'fixed'
nodeOverlayElement.style.top = '0'
nodeOverlayElement.style.left = '0'
nodeOverlayElement.style.zIndex = '69420'
nodeOverlayElement.style.width = window.innerWidth + 'px'
nodeOverlayElement.style.height = window.innerHeight - 4 + 'px'
nodeOverlayElement.style.pointerEvents = 'none'
nodeOverlayElement.style.visibility = 'hidden'
nodeOverlayElement.id = 'sn-clipper-node-overlay'
document.body.appendChild(nodeOverlayElement)
window.addEventListener('mousemove', (event) => {
if (!isSelectingNodeForClipping) {
nodeOverlayElement.style.visibility = 'hidden'
return
}
nodeOverlayElement.style.visibility = ''
const { target } = event
if (!target || !(target instanceof HTMLElement)) {
return
}
const targetRect = target.getBoundingClientRect()
nodeOverlayElement.style.width = targetRect.width + 'px'
nodeOverlayElement.style.height = targetRect.height + 'px'
nodeOverlayElement.style.transform = `translate3d(${targetRect.x}px, ${targetRect.y}px, 0)`
})
const disableNodeSelection = () => {
isSelectingNodeForClipping = false
nodeOverlayElement.style.visibility = 'hidden'
}
const imageFromBase64 = (base64: string) => {
return new Promise<HTMLImageElement>((resolve, reject) => {
const image = new Image()
image.onload = () => {
resolve(image)
}
image.onerror = reject
image.src = base64
})
}
const toPng = async (element: HTMLElement) => {
const visibleTab: string = await runtime.sendMessage({
type: RuntimeMessageTypes.CaptureVisibleTab,
})
const image = await imageFromBase64(visibleTab)
const canvas = document.createElement('canvas')
canvas.width = image.width
canvas.height = image.height
const context = canvas.getContext('2d')
if (!context) {
throw new Error('Could not get canvas context')
}
context.drawImage(image, 0, 0)
const elementRect = element.getBoundingClientRect()
const x = elementRect.x
const y = elementRect.y
const width = elementRect.width
const height = elementRect.height
const imageData = context.getImageData(x, y, width, height)
canvas.width = width
canvas.height = height
context.putImageData(imageData, 0, 0)
return canvas.toDataURL('image/png')
}
window.addEventListener('click', async (event) => {
if (!isSelectingNodeForClipping) {
return
}
disableNodeSelection()
event.preventDefault()
event.stopPropagation()
const { target } = event
if (!target || !(target instanceof HTMLElement)) {
return
}
const title = document.title
const content = isScreenshotMode ? await toPng(target) : target.outerHTML
void runtime.sendMessage({
type: RuntimeMessageTypes.OpenPopupWithSelection,
payload: { title, content, url: window.location.href, isScreenshot: isScreenshotMode },
} as RuntimeMessage)
})
window.addEventListener('keydown', (event) => {
if (!isSelectingNodeForClipping) {
return
}
if (event.key === 'Escape') {
disableNodeSelection()
}
})
``` | /content/code_sandbox/packages/clipper/src/content/content.ts | xml | 2016-12-05T23:31:33 | 2024-08-16T06:51:19 | app | standardnotes/app | 5,180 | 1,170 |
```xml
import React from 'react';
import {
Button,
Panel,
PanelGroup,
Table,
Grid,
Row,
Col,
Placeholder,
Stack,
ButtonGroup
} from 'rsuite';
import DefaultPage from '@/components/Page';
import ImportGuide from '@/components/ImportGuide';
const inDocsComponents = {
'import-guide': () => <ImportGuide components={['Panel', 'PanelGroup']} />
};
export default function Page() {
return (
<DefaultPage
inDocsComponents={inDocsComponents}
dependencies={{
Table,
PanelGroup,
Panel,
Stack,
ButtonGroup,
Button,
Grid,
Row,
Col,
Placeholder
}}
/>
);
}
``` | /content/code_sandbox/docs/pages/components/panel/index.tsx | xml | 2016-06-06T02:27:46 | 2024-08-16T16:41:54 | rsuite | rsuite/rsuite | 8,263 | 156 |
```xml
import {
AfterViewInit,
Directive,
ElementRef,
EventEmitter,
HostListener,
Input,
NgZone,
OnDestroy,
Output,
Renderer2
} from '@angular/core';
import { TreeDraggedElement } from '../models/tree-dragged-element.model';
const DRAG_OVER_CLASS = 'is-dragging-over';
const DRAG_DISABLED_CLASS = 'is-dragging-over-disabled';
@Directive({
selector: '[treeDrop]'
})
export class TreeDropDirective implements AfterViewInit, OnDestroy {
@Input() allowDragoverStyling = true;
@Output('treeDrop') onDropCallback = new EventEmitter();
@Output('treeDropDragOver') onDragOverCallback = new EventEmitter();
@Output('treeDropDragLeave') onDragLeaveCallback = new EventEmitter();
@Output('treeDropDragEnter') onDragEnterCallback = new EventEmitter();
private readonly dragOverEventHandler: (ev: DragEvent) => void;
private readonly dragEnterEventHandler: (ev: DragEvent) => void;
private readonly dragLeaveEventHandler: (ev: DragEvent) => void;
private _allowDrop = (element, $event) => true;
@Input() set treeAllowDrop(allowDrop) {
if (allowDrop instanceof Function) {
this._allowDrop = allowDrop;
}
else this._allowDrop = (element, $event) => allowDrop;
}
allowDrop($event) {
return this._allowDrop(this.treeDraggedElement.get(), $event);
}
constructor(private el: ElementRef, private renderer: Renderer2, private treeDraggedElement: TreeDraggedElement, private ngZone: NgZone) {
this.dragOverEventHandler = this.onDragOver.bind(this);
this.dragEnterEventHandler = this.onDragEnter.bind(this);
this.dragLeaveEventHandler = this.onDragLeave.bind(this);
}
ngAfterViewInit() {
let el: HTMLElement = this.el.nativeElement;
this.ngZone.runOutsideAngular(() => {
el.addEventListener('dragover', this.dragOverEventHandler);
el.addEventListener('dragenter', this.dragEnterEventHandler);
el.addEventListener('dragleave', this.dragLeaveEventHandler);
});
}
ngOnDestroy() {
let el: HTMLElement = this.el.nativeElement;
el.removeEventListener('dragover', this.dragOverEventHandler);
el.removeEventListener('dragenter', this.dragEnterEventHandler);
el.removeEventListener('dragleave', this.dragLeaveEventHandler);
}
onDragOver($event) {
if (!this.allowDrop($event)) {
if (this.allowDragoverStyling) {
return this.addDisabledClass();
}
return;
}
this.onDragOverCallback.emit({event: $event, element: this.treeDraggedElement.get()});
$event.preventDefault();
if (this.allowDragoverStyling) {
this.addClass();
}
}
onDragEnter($event) {
if (!this.allowDrop($event)) return;
$event.preventDefault();
this.onDragEnterCallback.emit({event: $event, element: this.treeDraggedElement.get()});
}
onDragLeave($event) {
if (!this.allowDrop($event)) {
if (this.allowDragoverStyling) {
return this.removeDisabledClass();
}
return;
}
this.onDragLeaveCallback.emit({event: $event, element: this.treeDraggedElement.get()});
if (this.allowDragoverStyling) {
this.removeClass();
}
}
@HostListener('drop', ['$event']) onDrop($event) {
if (!this.allowDrop($event)) return;
$event.preventDefault();
this.onDropCallback.emit({event: $event, element: this.treeDraggedElement.get()});
if (this.allowDragoverStyling) {
this.removeClass();
}
this.treeDraggedElement.set(null);
}
private addClass() {
this.renderer.addClass(this.el.nativeElement, DRAG_OVER_CLASS);
}
private removeClass() {
this.renderer.removeClass(this.el.nativeElement, DRAG_OVER_CLASS);
}
private addDisabledClass() {
this.renderer.addClass(this.el.nativeElement, DRAG_DISABLED_CLASS);
}
private removeDisabledClass() {
this.renderer.removeClass(this.el.nativeElement, DRAG_DISABLED_CLASS);
}
}
``` | /content/code_sandbox/projects/angular-tree-component/src/lib/directives/tree-drop.directive.ts | xml | 2016-03-10T21:29:15 | 2024-08-15T07:07:30 | angular-tree-component | CirclonGroup/angular-tree-component | 1,093 | 909 |
```xml
import { defineConfig } from 'cypress'
import vitePreprocessor from 'cypress-vite'
import axios from 'axios'
export default defineConfig({
fixturesFolder: 'tests/e2e/fixtures',
screenshotsFolder: 'tests/e2e/screenshots',
videosFolder: 'tests/e2e/videos',
downloadsFolder: 'tests/e2e/downloads',
e2e: {
baseUrl: 'path_to_url
// We've imported your old cypress plugins here.
// You may want to clean this up later by importing these.
setupNodeEvents (on) {
on('task', {
async 'db:reset' () {
await axios.get('path_to_url
return true
},
})
on('file:preprocessor', vitePreprocessor())
},
specPattern: 'tests/e2e/specs/**/*.cy.{js,jsx,ts,tsx}',
supportFile: 'tests/e2e/support/index.ts',
},
})
``` | /content/code_sandbox/packages/test-e2e-composable-vue3/cypress.config.ts | xml | 2016-09-18T18:44:06 | 2024-08-14T21:22:24 | apollo | vuejs/apollo | 6,009 | 210 |
```xml
<cobra document="path_to_url">
<cve id="CVE-2016-5100" level="LOW">
<product>froxlor:0.9.34.2</product>
</cve>
<cve id="CVE-2016-5101" level="MEDIUM">
<product>opera_mail:-</product>
</cve>
<cve id="CVE-2016-5102" level="MEDIUM">
<product>libtiff:4.0.6</product>
</cve>
<cve id="CVE-2016-5109" level="LOW">
<product>worx_home:10.3.0</product>
<product>worx_home:10.3.1</product>
<product>worx_home:10.3.5</product>
<product>xenmobile_mdx_toolkit:10.3.0</product>
<product>xenmobile_mdx_toolkit:10.3.5</product>
</cve>
<cve id="CVE-2016-0770" level="MEDIUM">
<product>connections_business_directory_plugin:8.5.8</product>
</cve>
<cve id="CVE-2016-0772" level="MEDIUM">
<product>python:2.7.11</product>
<product>python:3.0</product>
<product>python:3.0.1</product>
<product>python:3.1.0</product>
<product>python:3.1.1</product>
<product>python:3.1.2</product>
<product>python:3.1.3</product>
<product>python:3.1.4</product>
<product>python:3.1.5</product>
<product>python:3.2.0</product>
<product>python:3.2.1</product>
<product>python:3.2.2</product>
<product>python:3.2.3</product>
<product>python:3.2.4</product>
<product>python:3.2.5</product>
<product>python:3.2.6</product>
<product>python:3.3.0</product>
<product>python:3.3.1</product>
<product>python:3.3.2</product>
<product>python:3.3.3</product>
<product>python:3.3.4</product>
<product>python:3.3.5</product>
<product>python:3.3.6</product>
<product>python:3.4.0</product>
<product>python:3.4.1</product>
<product>python:3.4.2</product>
<product>python:3.4.3</product>
<product>python:3.4.4</product>
<product>python:3.5.0</product>
<product>python:3.5.1</product>
</cve>
<cve id="CVE-2016-0779" level="LOW">
<product>tomee:1.7.3</product>
<product>tomee:7.0.0</product>
</cve>
<cve id="CVE-2016-9360" level="MEDIUM">
<product>cimplicity:9.0</product>
<product>historian:6.0</product>
<product>ifix:5.8</product>
</cve>
<cve id="CVE-2016-9361" level="LOW">
<product>nport_5600-8-dtl_series_firmware:2.3</product>
<product>nport_5100_series_firmware:2.5</product>
<product>nport_5100_series_firmware:3.5</product>
<product>nport_5100a_series_firmware:1.2</product>
<product>nport_5200_series_firmware:2.7</product>
<product>nport_5200a_series_firmware:1.2</product>
<product>nport_5400_series_firmware:3.10</product>
<product>nport_5600_series_firmware:3.6</product>
<product>nport_5x50a1-m12_series_firmware:1.1</product>
<product>nport_6100_series_firmware:1.13</product>
<product>nport_p5150a_series_firmware:1.2</product>
</cve>
<cve id="CVE-2016-9362" level="LOW">
<product>750-xxxx_series_firmware:-</product>
<product>758-xxxx_series_firmware:-</product>
<product>pfc200_firmware:-</product>
</cve>
<cve id="CVE-2016-9363" level="LOW">
<product>nport_5600-8-dtl_series_firmware:2.3</product>
<product>nport_5100_series_firmware:2.5</product>
<product>nport_5100_series_firmware:3.5</product>
<product>nport_5100a_series_firmware:1.2</product>
<product>nport_5200_series_firmware:2.7</product>
<product>nport_5200a_series_firmware:1.2</product>
<product>nport_5400_series_firmware:3.10</product>
<product>nport_5600_series_firmware:3.6</product>
<product>nport_5x50a1-m12_series_firmware:1.1</product>
<product>nport_6100_series_firmware:1.13</product>
<product>nport_p5150a_series_firmware:1.2</product>
</cve>
<cve id="CVE-2016-9812" level="LOW">
<product>gstreamer:1.10.1</product>
</cve>
<cve id="CVE-2016-9365" level="MEDIUM">
<product>nport_5600-8-dtl_series_firmware:2.3</product>
<product>nport_5100_series_firmware:2.5</product>
<product>nport_5100_series_firmware:3.5</product>
<product>nport_5100a_series_firmware:1.2</product>
<product>nport_5200_series_firmware:2.7</product>
<product>nport_5200a_series_firmware:1.2</product>
<product>nport_5400_series_firmware:3.10</product>
<product>nport_5600_series_firmware:3.6</product>
<product>nport_5x50a1-m12_series_firmware:1.1</product>
<product>nport_6100_series_firmware:1.13</product>
<product>nport_p5150a_series_firmware:1.2</product>
</cve>
<cve id="CVE-2016-9366" level="LOW">
<product>nport_5600-8-dtl_series_firmware:2.3</product>
<product>nport_5100_series_firmware:2.5</product>
<product>nport_5100_series_firmware:3.5</product>
<product>nport_5100a_series_firmware:1.2</product>
<product>nport_5200_series_firmware:2.7</product>
<product>nport_5200a_series_firmware:1.2</product>
<product>nport_5400_series_firmware:3.10</product>
<product>nport_5600_series_firmware:3.6</product>
<product>nport_5x50a1-m12_series_firmware:1.1</product>
<product>nport_6100_series_firmware:1.13</product>
<product>nport_p5150a_series_firmware:1.2</product>
</cve>
<cve id="CVE-2016-9367" level="LOW">
<product>nport_5600-8-dtl_series_firmware:2.3</product>
<product>nport_5100_series_firmware:2.5</product>
<product>nport_5100_series_firmware:3.5</product>
<product>nport_5100a_series_firmware:1.2</product>
<product>nport_5200_series_firmware:2.7</product>
<product>nport_5200a_series_firmware:1.2</product>
<product>nport_5400_series_firmware:3.10</product>
<product>nport_5600_series_firmware:3.6</product>
<product>nport_5x50a1-m12_series_firmware:1.1</product>
<product>nport_6100_series_firmware:1.13</product>
<product>nport_p5150a_series_firmware:1.2</product>
</cve>
<cve id="CVE-2016-9368" level="LOW">
<product>xcomfort_ethernet_communication_interface:1.07</product>
</cve>
<cve id="CVE-2016-9369" level="LOW">
<product>nport_5600-8-dtl_series_firmware:2.3</product>
<product>nport_5100_series_firmware:2.5</product>
<product>nport_5100_series_firmware:3.5</product>
<product>nport_5100a_series_firmware:1.2</product>
<product>nport_5200_series_firmware:2.7</product>
<product>nport_5200a_series_firmware:1.2</product>
<product>nport_5400_series_firmware:3.10</product>
<product>nport_5600_series_firmware:3.6</product>
<product>nport_5x50a1-m12_series_firmware:1.1</product>
<product>nport_6100_series_firmware:1.13</product>
<product>nport_p5150a_series_firmware:1.2</product>
</cve>
<cve id="CVE-2016-9818" level="LOW">
<product>xen:4.7.0</product>
<product>xen:4.7.1</product>
</cve>
<cve id="CVE-2016-9819" level="MEDIUM">
<product>libav:11.8</product>
</cve>
<cve id="CVE-2016-10125" level="MEDIUM">
<product>dgs-1100_firmware:1.01.018</product>
</cve>
<cve id="CVE-2016-10124" level="LOW">
<product>lxc:2.0.0</product>
</cve>
<cve id="CVE-2016-10127" level="MEDIUM">
<product>pysaml2:-</product>
</cve>
<cve id="CVE-2016-10126" level="LOW">
<product>splunk:5.0.0</product>
<product>splunk:5.0.1</product>
<product>splunk:5.0.2</product>
<product>splunk:5.0.3</product>
<product>splunk:5.0.4</product>
<product>splunk:5.0.5</product>
<product>splunk:5.0.6</product>
<product>splunk:5.0.7</product>
<product>splunk:5.0.8</product>
<product>splunk:5.0.9</product>
<product>splunk:5.0.10</product>
<product>splunk:5.0.11</product>
<product>splunk:5.0.12</product>
<product>splunk:5.0.13</product>
<product>splunk:5.0.14</product>
<product>splunk:5.0.15</product>
<product>splunk:5.0.16</product>
<product>splunk:6.0.0</product>
<product>splunk:6.0.1</product>
<product>splunk:6.0.2</product>
<product>splunk:6.0.3</product>
<product>splunk:6.0.4</product>
<product>splunk:6.0.5</product>
<product>splunk:6.0.6</product>
<product>splunk:6.0.7</product>
<product>splunk:6.0.8</product>
<product>splunk:6.0.9</product>
<product>splunk:6.0.10</product>
<product>splunk:6.0.11</product>
<product>splunk:6.0.12</product>
<product>splunk:6.1.0</product>
<product>splunk:6.1.1</product>
<product>splunk:6.1.2</product>
<product>splunk:6.1.3</product>
<product>splunk:6.1.4</product>
<product>splunk:6.1.5</product>
<product>splunk:6.1.6</product>
<product>splunk:6.1.7</product>
<product>splunk:6.1.8</product>
<product>splunk:6.1.9</product>
<product>splunk:6.1.10</product>
<product>splunk:6.1.11</product>
<product>splunk:6.2.0</product>
<product>splunk:6.2.1</product>
<product>splunk:6.2.2</product>
<product>splunk:6.2.3</product>
<product>splunk:6.2.4</product>
<product>splunk:6.2.5</product>
<product>splunk:6.2.6</product>
<product>splunk:6.2.7</product>
<product>splunk:6.2.8</product>
<product>splunk:6.2.9</product>
<product>splunk:6.2.10</product>
<product>splunk:6.2.11</product>
<product>splunk:6.3.0</product>
<product>splunk:6.3.1</product>
<product>splunk:6.3.2</product>
<product>splunk:6.3.3</product>
<product>splunk:6.3.4</product>
<product>splunk:6.3.5</product>
<product>splunk:6.3.6</product>
<product>splunk:6.3.7</product>
<product>splunk:6.4.0</product>
<product>splunk:6.4.1</product>
<product>splunk:6.4.2</product>
<product>splunk:6.4.3</product>
</cve>
<cve id="CVE-2016-10121" level="LOW">
<product>firejail:-</product>
</cve>
<cve id="CVE-2016-10120" level="LOW">
<product>firejail:-</product>
</cve>
<cve id="CVE-2016-10123" level="LOW">
<product>firejail:-</product>
</cve>
<cve id="CVE-2016-10122" level="LOW">
<product>firejail:-</product>
</cve>
<cve id="CVE-2016-10129" level="LOW">
<product>libgit2:0.24.5</product>
<product>libgit2:0.25.0</product>
<product>libgit2:0.25.0</product>
<product>libgit2:0.25.0</product>
</cve>
<cve id="CVE-2016-10128" level="LOW">
<product>libgit2:0.24.5</product>
<product>libgit2:0.25.0</product>
<product>libgit2:0.25.0</product>
<product>libgit2:0.25.0</product>
</cve>
<cve id="CVE-2016-10699" level="MEDIUM">
<product>dsl-2740e_firmware:1.00_bg_20150720</product>
</cve>
<cve id="CVE-2016-10698" level="MEDIUM">
<product>mystem-fix:0.0.5</product>
</cve>
<cve id="CVE-2016-5812" level="LOW">
<product>oncell_g3001_firmware:1.6</product>
<product>oncell_g3100v2_firmware:2.7</product>
</cve>
<cve id="CVE-2016-5813" level="LOW">
<product>powerlink2_firmware:-</product>
</cve>
<cve id="CVE-2016-5810" level="LOW">
<product>webaccess:8.1</product>
</cve>
<cve id="CVE-2016-5811" level="MEDIUM">
<product>powerlink2_firmware:-</product>
</cve>
<cve id="CVE-2016-5816" level="LOW">
<product>mrd-305-din_firmware:-</product>
<product>mrd-315-din_firmware:-</product>
<product>mrd-355-din_firmware:-</product>
<product>mrd-455-din_firmware:-</product>
</cve>
<cve id="CVE-2016-5817" level="LOW">
<product>webaccess:2016-08-09</product>
</cve>
<cve id="CVE-2016-5814" level="MEDIUM">
<product>rslogix_500_professional_edition:-</product>
<product>rslogix_500_standard_edition:-</product>
<product>rslogix_500_starter_edition:-</product>
<product>rslogix_micro_developer:-</product>
<product>rslogix_micro_starter_lite:-</product>
</cve>
<cve id="CVE-2016-5815" level="LOW">
<product>ion5000:-</product>
<product>ion7300:-</product>
<product>ion7500:-</product>
<product>ion7600:-</product>
<product>ion8650:-</product>
<product>ion8800:-</product>
</cve>
<cve id="CVE-2016-5818" level="LOW">
<product>powerlogic_pm8ecc_firmware:2.651</product>
</cve>
<cve id="CVE-2016-4457" level="LOW">
<product>cloudforms_management_engine:5.7</product>
</cve>
<cve id="CVE-2016-4456" level="LOW">
<product>gnutls:3.4.12</product>
</cve>
<cve id="CVE-2016-10345" level="LOW">
<product>passenger:5.0.30</product>
</cve>
<cve id="CVE-2016-10349" level="MEDIUM">
<product>libarchive:3.2.2</product>
</cve>
<cve id="CVE-2016-9816" level="LOW">
<product>xen:4.7.0</product>
<product>xen:4.7.1</product>
</cve>
<cve id="CVE-2016-9817" level="LOW">
<product>xen:4.7.0</product>
<product>xen:4.7.1</product>
</cve>
<cve id="CVE-2016-9814" level="LOW">
<product>saml2:1.9</product>
<product>saml2:1.10</product>
<product>saml2:1.10.1</product>
<product>saml2:1.10.2</product>
<product>saml2:2.0.0</product>
<product>saml2:2.0.1</product>
<product>saml2:2.1</product>
<product>saml2:2.2</product>
<product>saml2:2.3</product>
<product>saml2:2.3.1</product>
<product>saml2:2.3.2</product>
<product>simplesamlphp:1.10</product>
<product>simplesamlphp:1.14.9</product>
</cve>
<cve id="CVE-2016-9815" level="LOW">
<product>xen:4.7.0</product>
<product>xen:4.7.1</product>
</cve>
<cve id="CVE-2016-9364" level="LOW">
<product>fx-2030a-basic_firmware:11.50.18</product>
<product>fx-2030a_firmware:11.50.18</product>
</cve>
<cve id="CVE-2016-9813" level="MEDIUM">
<product>gstreamer:1.10.1</product>
</cve>
<cve id="CVE-2016-9810" level="MEDIUM">
<product>gstreamer:1.10.1</product>
</cve>
<cve id="CVE-2016-9811" level="MEDIUM">
<product>gstreamer:1.10.1</product>
</cve>
<cve id="CVE-2016-6045" level="MEDIUM">
<product>tivoli_storage_manager:6.4.1</product>
<product>tivoli_storage_manager:6.4.1.1</product>
<product>tivoli_storage_manager:6.4.2</product>
<product>tivoli_storage_manager:6.4.2.1</product>
<product>tivoli_storage_manager:6.4.2.2</product>
<product>tivoli_storage_manager:6.4.2.3</product>
<product>tivoli_storage_manager:6.4.2.4</product>
<product>tivoli_storage_manager:7.1</product>
<product>tivoli_storage_manager:7.1.0.1</product>
<product>tivoli_storage_manager:7.1.0.2</product>
<product>tivoli_storage_manager:7.1.1.1</product>
<product>tivoli_storage_manager:7.1.1.2</product>
<product>tivoli_storage_manager:7.1.3</product>
<product>tivoli_storage_manager:7.1.3.1</product>
<product>tivoli_storage_manager:7.1.3.2</product>
<product>tivoli_storage_manager:7.1.4</product>
<product>tivoli_storage_manager:7.1.4.1</product>
<product>tivoli_storage_manager:7.1.4.2</product>
<product>tivoli_storage_manager:7.1.7</product>
</cve>
<cve id="CVE-2016-10697" level="MEDIUM">
<product>react-native-baidu-voice-synthesizer:1.0.0</product>
</cve>
<cve id="CVE-2016-1000307" level="MEDIUM">
<product>clipbucket:2.8.1</product>
</cve>
<cve id="CVE-2016-10695" level="MEDIUM">
<product>npm-test-sqlite3-trunk:4.0.1</product>
</cve>
<cve id="CVE-2016-10693" level="MEDIUM">
<product>pm2-kafka:1.0.0</product>
</cve>
<cve id="CVE-2016-10692" level="MEDIUM">
<product>haxeshim:0.12.4</product>
</cve>
<cve id="CVE-2016-10690" level="MEDIUM">
<product>openframe-ascii-image:0.1.0</product>
</cve>
<cve id="CVE-2016-3425" level="LOW">
<product>jdk:1.6.0</product>
<product>jdk:1.7.0</product>
<product>jdk:1.8.0</product>
<product>jre:1.6.0</product>
<product>jre:1.7.0</product>
<product>jre:1.8.0</product>
<product>jrockit:r28.3.9</product>
</cve>
<cve id="CVE-2016-0949" level="LOW">
<product>connect:9.5.2</product>
</cve>
<cve id="CVE-2016-0948" level="MEDIUM">
<product>connect:9.5</product>
</cve>
<cve id="CVE-2016-0943" level="MEDIUM">
<product>acrobat:11.0.0</product>
<product>acrobat:11.0.1</product>
<product>acrobat:11.0.2</product>
<product>acrobat:11.0.3</product>
<product>acrobat:11.0.4</product>
<product>acrobat:11.0.5</product>
<product>acrobat:11.0.6</product>
<product>acrobat:11.0.7</product>
<product>acrobat:11.0.8</product>
<product>acrobat:11.0.9</product>
<product>acrobat:11.0.10</product>
<product>acrobat:11.0.11</product>
<product>acrobat:11.0.12</product>
<product>acrobat:11.0.13</product>
<product>acrobat_dc:15.006.30097</product>
<product>acrobat_dc:15.009.20077</product>
<product>acrobat_reader:11.0.0</product>
<product>acrobat_reader:11.0.1</product>
<product>acrobat_reader:11.0.2</product>
<product>acrobat_reader:11.0.3</product>
<product>acrobat_reader:11.0.4</product>
<product>acrobat_reader:11.0.5</product>
<product>acrobat_reader:11.0.6</product>
<product>acrobat_reader:11.0.7</product>
<product>acrobat_reader:11.0.8</product>
<product>acrobat_reader:11.0.9</product>
<product>acrobat_reader:11.0.10</product>
<product>acrobat_reader:11.0.11</product>
<product>acrobat_reader:11.0.12</product>
<product>acrobat_reader:11.0.13</product>
<product>acrobat_reader_dc:15.006.30097</product>
<product>acrobat_reader_dc:15.009.20077</product>
</cve>
<cve id="CVE-2016-0942" level="LOW">
<product>acrobat:11.0.0</product>
<product>acrobat:11.0.1</product>
<product>acrobat:11.0.2</product>
<product>acrobat:11.0.3</product>
<product>acrobat:11.0.4</product>
<product>acrobat:11.0.5</product>
<product>acrobat:11.0.6</product>
<product>acrobat:11.0.7</product>
<product>acrobat:11.0.8</product>
<product>acrobat:11.0.9</product>
<product>acrobat:11.0.10</product>
<product>acrobat:11.0.11</product>
<product>acrobat:11.0.12</product>
<product>acrobat:11.0.13</product>
<product>acrobat_dc:15.006.30097</product>
<product>acrobat_dc:15.009.20077</product>
<product>acrobat_reader:11.0.0</product>
<product>acrobat_reader:11.0.1</product>
<product>acrobat_reader:11.0.2</product>
<product>acrobat_reader:11.0.3</product>
<product>acrobat_reader:11.0.4</product>
<product>acrobat_reader:11.0.5</product>
<product>acrobat_reader:11.0.6</product>
<product>acrobat_reader:11.0.7</product>
<product>acrobat_reader:11.0.8</product>
<product>acrobat_reader:11.0.9</product>
<product>acrobat_reader:11.0.10</product>
<product>acrobat_reader:11.0.11</product>
<product>acrobat_reader:11.0.12</product>
<product>acrobat_reader:11.0.13</product>
<product>acrobat_reader_dc:15.006.30097</product>
<product>acrobat_reader_dc:15.009.20077</product>
</cve>
<cve id="CVE-2016-0941" level="MEDIUM">
<product>acrobat:11.0.0</product>
<product>acrobat:11.0.1</product>
<product>acrobat:11.0.2</product>
<product>acrobat:11.0.3</product>
<product>acrobat:11.0.4</product>
<product>acrobat:11.0.5</product>
<product>acrobat:11.0.6</product>
<product>acrobat:11.0.7</product>
<product>acrobat:11.0.8</product>
<product>acrobat:11.0.9</product>
<product>acrobat:11.0.10</product>
<product>acrobat:11.0.11</product>
<product>acrobat:11.0.12</product>
<product>acrobat:11.0.13</product>
<product>acrobat_dc:15.006.30097</product>
<product>acrobat_dc:15.009.20077</product>
<product>acrobat_reader:11.0.0</product>
<product>acrobat_reader:11.0.1</product>
<product>acrobat_reader:11.0.2</product>
<product>acrobat_reader:11.0.3</product>
<product>acrobat_reader:11.0.4</product>
<product>acrobat_reader:11.0.5</product>
<product>acrobat_reader:11.0.6</product>
<product>acrobat_reader:11.0.7</product>
<product>acrobat_reader:11.0.8</product>
<product>acrobat_reader:11.0.9</product>
<product>acrobat_reader:11.0.10</product>
<product>acrobat_reader:11.0.11</product>
<product>acrobat_reader:11.0.12</product>
<product>acrobat_reader:11.0.13</product>
<product>acrobat_reader_dc:15.006.30097</product>
<product>acrobat_reader_dc:15.009.20077</product>
</cve>
<cve id="CVE-2016-0940" level="LOW">
<product>acrobat:11.0.0</product>
<product>acrobat:11.0.1</product>
<product>acrobat:11.0.2</product>
<product>acrobat:11.0.3</product>
<product>acrobat:11.0.4</product>
<product>acrobat:11.0.5</product>
<product>acrobat:11.0.6</product>
<product>acrobat:11.0.7</product>
<product>acrobat:11.0.8</product>
<product>acrobat:11.0.9</product>
<product>acrobat:11.0.10</product>
<product>acrobat:11.0.11</product>
<product>acrobat:11.0.12</product>
<product>acrobat:11.0.13</product>
<product>acrobat_dc:15.006.30097</product>
<product>acrobat_dc:15.009.20077</product>
<product>acrobat_reader:11.0.0</product>
<product>acrobat_reader:11.0.1</product>
<product>acrobat_reader:11.0.2</product>
<product>acrobat_reader:11.0.3</product>
<product>acrobat_reader:11.0.4</product>
<product>acrobat_reader:11.0.5</product>
<product>acrobat_reader:11.0.6</product>
<product>acrobat_reader:11.0.7</product>
<product>acrobat_reader:11.0.8</product>
<product>acrobat_reader:11.0.9</product>
<product>acrobat_reader:11.0.10</product>
<product>acrobat_reader:11.0.11</product>
<product>acrobat_reader:11.0.12</product>
<product>acrobat_reader:11.0.13</product>
<product>acrobat_reader_dc:15.006.30097</product>
<product>acrobat_reader_dc:15.009.20077</product>
</cve>
<cve id="CVE-2016-0947" level="LOW">
<product>acrobat:11.0.0</product>
<product>acrobat:11.0.1</product>
<product>acrobat:11.0.2</product>
<product>acrobat:11.0.3</product>
<product>acrobat:11.0.4</product>
<product>acrobat:11.0.5</product>
<product>acrobat:11.0.6</product>
<product>acrobat:11.0.7</product>
<product>acrobat:11.0.8</product>
<product>acrobat:11.0.9</product>
<product>acrobat:11.0.10</product>
<product>acrobat:11.0.11</product>
<product>acrobat:11.0.12</product>
<product>acrobat:11.0.13</product>
<product>acrobat_dc:15.006.30097</product>
<product>acrobat_dc:15.009.20077</product>
<product>acrobat_reader:11.0.0</product>
<product>acrobat_reader:11.0.1</product>
<product>acrobat_reader:11.0.2</product>
<product>acrobat_reader:11.0.3</product>
<product>acrobat_reader:11.0.4</product>
<product>acrobat_reader:11.0.5</product>
<product>acrobat_reader:11.0.6</product>
<product>acrobat_reader:11.0.7</product>
<product>acrobat_reader:11.0.8</product>
<product>acrobat_reader:11.0.9</product>
<product>acrobat_reader:11.0.10</product>
<product>acrobat_reader:11.0.11</product>
<product>acrobat_reader:11.0.12</product>
<product>acrobat_reader:11.0.13</product>
<product>acrobat_reader_dc:15.006.30097</product>
<product>acrobat_reader_dc:15.009.20077</product>
</cve>
<cve id="CVE-2016-0946" level="LOW">
<product>acrobat:11.0.0</product>
<product>acrobat:11.0.1</product>
<product>acrobat:11.0.2</product>
<product>acrobat:11.0.3</product>
<product>acrobat:11.0.4</product>
<product>acrobat:11.0.5</product>
<product>acrobat:11.0.6</product>
<product>acrobat:11.0.7</product>
<product>acrobat:11.0.8</product>
<product>acrobat:11.0.9</product>
<product>acrobat:11.0.10</product>
<product>acrobat:11.0.11</product>
<product>acrobat:11.0.12</product>
<product>acrobat:11.0.13</product>
<product>acrobat_dc:15.006.30097</product>
<product>acrobat_dc:15.009.20077</product>
<product>acrobat_reader:11.0.0</product>
<product>acrobat_reader:11.0.1</product>
<product>acrobat_reader:11.0.2</product>
<product>acrobat_reader:11.0.3</product>
<product>acrobat_reader:11.0.4</product>
<product>acrobat_reader:11.0.5</product>
<product>acrobat_reader:11.0.6</product>
<product>acrobat_reader:11.0.7</product>
<product>acrobat_reader:11.0.8</product>
<product>acrobat_reader:11.0.9</product>
<product>acrobat_reader:11.0.10</product>
<product>acrobat_reader:11.0.11</product>
<product>acrobat_reader:11.0.12</product>
<product>acrobat_reader:11.0.13</product>
<product>acrobat_reader_dc:15.006.30097</product>
<product>acrobat_reader_dc:15.009.20077</product>
</cve>
<cve id="CVE-2016-0945" level="LOW">
<product>acrobat:11.0.0</product>
<product>acrobat:11.0.1</product>
<product>acrobat:11.0.2</product>
<product>acrobat:11.0.3</product>
<product>acrobat:11.0.4</product>
<product>acrobat:11.0.5</product>
<product>acrobat:11.0.6</product>
<product>acrobat:11.0.7</product>
<product>acrobat:11.0.8</product>
<product>acrobat:11.0.9</product>
<product>acrobat:11.0.10</product>
<product>acrobat:11.0.11</product>
<product>acrobat:11.0.12</product>
<product>acrobat:11.0.13</product>
<product>acrobat_dc:15.006.30097</product>
<product>acrobat_dc:15.009.20077</product>
<product>acrobat_reader:11.0.0</product>
<product>acrobat_reader:11.0.1</product>
<product>acrobat_reader:11.0.2</product>
<product>acrobat_reader:11.0.3</product>
<product>acrobat_reader:11.0.4</product>
<product>acrobat_reader:11.0.5</product>
<product>acrobat_reader:11.0.6</product>
<product>acrobat_reader:11.0.7</product>
<product>acrobat_reader:11.0.8</product>
<product>acrobat_reader:11.0.9</product>
<product>acrobat_reader:11.0.10</product>
<product>acrobat_reader:11.0.11</product>
<product>acrobat_reader:11.0.12</product>
<product>acrobat_reader:11.0.13</product>
<product>acrobat_reader_dc:15.006.30097</product>
<product>acrobat_reader_dc:15.009.20077</product>
</cve>
<cve id="CVE-2016-0944" level="LOW">
<product>acrobat:11.0.0</product>
<product>acrobat:11.0.1</product>
<product>acrobat:11.0.2</product>
<product>acrobat:11.0.3</product>
<product>acrobat:11.0.4</product>
<product>acrobat:11.0.5</product>
<product>acrobat:11.0.6</product>
<product>acrobat:11.0.7</product>
<product>acrobat:11.0.8</product>
<product>acrobat:11.0.9</product>
<product>acrobat:11.0.10</product>
<product>acrobat:11.0.11</product>
<product>acrobat:11.0.12</product>
<product>acrobat:11.0.13</product>
<product>acrobat_dc:15.006.30097</product>
<product>acrobat_dc:15.009.20077</product>
<product>acrobat_reader:11.0.0</product>
<product>acrobat_reader:11.0.1</product>
<product>acrobat_reader:11.0.2</product>
<product>acrobat_reader:11.0.3</product>
<product>acrobat_reader:11.0.4</product>
<product>acrobat_reader:11.0.5</product>
<product>acrobat_reader:11.0.6</product>
<product>acrobat_reader:11.0.7</product>
<product>acrobat_reader:11.0.8</product>
<product>acrobat_reader:11.0.9</product>
<product>acrobat_reader:11.0.10</product>
<product>acrobat_reader:11.0.11</product>
<product>acrobat_reader:11.0.12</product>
<product>acrobat_reader:11.0.13</product>
<product>acrobat_reader_dc:15.006.30097</product>
<product>acrobat_reader_dc:15.009.20077</product>
</cve>
<cve id="CVE-2016-1876" level="LOW">
<product>solution_center:3.3.0001</product>
</cve>
<cve id="CVE-2016-10594" level="MEDIUM">
<product>ipip:-</product>
</cve>
<cve id="CVE-2016-10595" level="MEDIUM">
<product>node-sass:1.0.18</product>
</cve>
<cve id="CVE-2016-10596" level="MEDIUM">
<product>imageoptim:0.5.0</product>
</cve>
<cve id="CVE-2016-10597" level="MEDIUM">
<product>cobalt-cli:2.2.0</product>
</cve>
<cve id="CVE-2016-10590" level="MEDIUM">
<product>cue-sdk-node:1.2.0</product>
</cve>
<cve id="CVE-2016-10592" level="MEDIUM">
<product>jser-stat:4.0.3</product>
</cve>
<cve id="CVE-2016-10593" level="MEDIUM">
<product>ibapi:2.4.2</product>
</cve>
<cve id="CVE-2016-10598" level="MEDIUM">
<product>arrayfire-js:0.21.4</product>
</cve>
<cve id="CVE-2016-10599" level="MEDIUM">
<product>sauce-connect:0.1.1</product>
</cve>
<cve id="CVE-2016-8779" level="LOW">
<product>fusionaccess:v100r005c10</product>
<product>fusionaccess:v100r005c20</product>
</cve>
<cve id="CVE-2016-8774" level="LOW">
<product>mate_8_firmware:-</product>
<product>mate_s_firmware:-</product>
<product>p8_firmware:-</product>
<product>p9_firmware:-</product>
</cve>
<cve id="CVE-2016-8775" level="LOW">
<product>nem-al10_firmware:-</product>
<product>nem-l21_firmware:-</product>
<product>nem-l22_firmware:-</product>
<product>nem-l51_firmware:-</product>
</cve>
<cve id="CVE-2016-8776" level="LOW">
<product>p9_firmware:eva-al10c00</product>
<product>p9_firmware:eva-cl10c00</product>
<product>p9_firmware:eva-dl10c00</product>
<product>p9_firmware:eva-tl10c00</product>
<product>p9_lite_firmware:vns-l21c185</product>
</cve>
<cve id="CVE-2016-8773" level="LOW">
<product>s12700_firmware:v200r007c00</product>
<product>s12700_firmware:v200r007c01</product>
<product>s12700_firmware:v200r008c00</product>
<product>s12700_firmware:v200r009c00</product>
<product>s5300_firmware:v200r003c00</product>
<product>s5300_firmware:v200r007c00</product>
<product>s5300_firmware:v200r008c00</product>
<product>s5300_firmware:v200r009c00</product>
<product>s5700_firmware:v200r001c00</product>
<product>s5700_firmware:v200r002c00</product>
<product>s5700_firmware:v200r003c00</product>
<product>s5700_firmware:v200r005c00</product>
<product>s5700_firmware:v200r005c03</product>
<product>s5700_firmware:v200r007c00</product>
<product>s5700_firmware:v200r008c00</product>
<product>s5700_firmware:v200r009c00</product>
<product>s6300_firmware:v200r003c00</product>
<product>s6300_firmware:v200r005c00</product>
<product>s6300_firmware:v200r008c00</product>
<product>s6300_firmware:v200r009c00</product>
<product>s6700_firmware:v200r001c00</product>
<product>s6700_firmware:v200r001c01</product>
<product>s6700_firmware:v200r002c00</product>
<product>s6700_firmware:v200r003c00</product>
<product>s6700_firmware:v200r005c00</product>
<product>s6700_firmware:v200r007c00</product>
<product>s6700_firmware:v200r008c00</product>
<product>s6700_firmware:v200r009c00</product>
<product>s7700_firmware:v200r007c00</product>
<product>s7700_firmware:v200r008c00</product>
<product>s7700_firmware:v200r009c00</product>
<product>s9300_firmware:v200r007c00</product>
<product>s9300_firmware:v200r008c00</product>
<product>s9300_firmware:v200r009c00</product>
<product>s9700_firmware:v200r007c00</product>
<product>s9700_firmware:v200r008c00</product>
<product>s9700_firmware:v200r009c00</product>
</cve>
<cve id="CVE-2016-0569" level="LOW">
<product>e-business_intelligence:11.5.10.2</product>
<product>e-business_intelligence:12.1.1</product>
<product>e-business_intelligence:12.1.2</product>
<product>e-business_intelligence:12.1.3</product>
</cve>
<cve id="CVE-2016-0568" level="LOW">
<product>email_center:12.1.1</product>
<product>email_center:12.1.2</product>
<product>email_center:12.1.3</product>
</cve>
<cve id="CVE-2016-0561" level="LOW">
<product>e-business_intelligence:11.5.10.2</product>
<product>e-business_intelligence:12.1.1</product>
<product>e-business_intelligence:12.1.2</product>
<product>e-business_intelligence:12.1.3</product>
</cve>
<cve id="CVE-2016-0560" level="LOW">
<product>customer_intelligence:11.5.10.2</product>
<product>customer_intelligence:12.1.1</product>
<product>customer_intelligence:12.1.2</product>
<product>customer_intelligence:12.1.3</product>
<product>customer_intelligence:12.2.3</product>
<product>customer_intelligence:12.2.4</product>
<product>customer_intelligence:12.2.5</product>
</cve>
<cve id="CVE-2016-0563" level="LOW">
<product>crm_technical_foundation:11.5.10.2</product>
<product>crm_technical_foundation:12.1.3</product>
</cve>
<cve id="CVE-2016-0562" level="LOW">
<product>common_applications:11.5.10.2</product>
<product>common_applications:12.1.1</product>
<product>common_applications:12.1.2</product>
<product>common_applications:12.1.3</product>
</cve>
<cve id="CVE-2016-0565" level="LOW">
<product>marketing:11.5.10.2</product>
<product>marketing:12.1.1</product>
<product>marketing:12.1.2</product>
<product>marketing:12.1.3</product>
</cve>
<cve id="CVE-2016-0564" level="LOW">
<product>e-business_intelligence:11.5.10.2</product>
<product>e-business_intelligence:12.1.1</product>
<product>e-business_intelligence:12.1.2</product>
<product>e-business_intelligence:12.1.3</product>
</cve>
<cve id="CVE-2016-0567" level="LOW">
<product>e-business_intelligence:11.5.10.2</product>
<product>e-business_intelligence:12.1.1</product>
<product>e-business_intelligence:12.1.2</product>
<product>e-business_intelligence:12.1.3</product>
</cve>
<cve id="CVE-2016-0566" level="LOW">
<product>marketing:11.5.10.2</product>
<product>marketing:12.1.1</product>
<product>marketing:12.1.2</product>
<product>marketing:12.1.3</product>
<product>marketing:12.2.3</product>
<product>marketing:12.2.4</product>
<product>marketing:12.2.5</product>
</cve>
<cve id="CVE-2016-1168" level="MEDIUM">
<product>wf800hp_firmware:1.0.17</product>
</cve>
<cve id="CVE-2016-1169" level="MEDIUM">
<product>casebook_plugin:0.9.3</product>
</cve>
<cve id="CVE-2016-4442" level="LOW">
<product>rack-mini-profiler:0.9.9.2</product>
</cve>
<cve id="CVE-2016-4443" level="LOW">
<product>enterprise_virtualization:3.6</product>
</cve>
<cve id="CVE-2016-1160" level="MEDIUM">
<product>_wp_favorite_posts:1.6.2</product>
</cve>
<cve id="CVE-2016-1161" level="MEDIUM">
<product>password_manager_pro:8.5</product>
</cve>
<cve id="CVE-2016-1167" level="MEDIUM">
<product>wg300hp_firmware:1.0.8</product>
</cve>
<cve id="CVE-2016-1386" level="LOW">
<product>application_policy_infrastructure_controller_enterprise_module:1.0.%281%29</product>
</cve>
<cve id="CVE-2016-1387" level="LOW">
<product>telepresence_tc_software:7.2.0</product>
<product>telepresence_tc_software:7.2.1</product>
<product>telepresence_tc_software:7.3.0</product>
<product>telepresence_tc_software:7.3.1</product>
<product>telepresence_tc_software:7.3.2</product>
<product>telepresence_tc_software:7.3.3</product>
</cve>
<cve id="CVE-2016-1385" level="LOW">
<product>adaptive_security_appliance_software:8.4.0</product>
<product>adaptive_security_appliance_software:8.4.1</product>
<product>adaptive_security_appliance_software:8.4.1.3</product>
<product>adaptive_security_appliance_software:8.4.1.11</product>
<product>adaptive_security_appliance_software:8.4.2</product>
<product>adaptive_security_appliance_software:8.4.2.1</product>
<product>adaptive_security_appliance_software:8.4.2.8</product>
<product>adaptive_security_appliance_software:8.4.3</product>
<product>adaptive_security_appliance_software:8.4.3.8</product>
<product>adaptive_security_appliance_software:8.4.3.9</product>
<product>adaptive_security_appliance_software:8.4.4</product>
<product>adaptive_security_appliance_software:8.4.4.1</product>
<product>adaptive_security_appliance_software:8.4.4.3</product>
<product>adaptive_security_appliance_software:8.4.4.5</product>
<product>adaptive_security_appliance_software:8.4.4.9</product>
<product>adaptive_security_appliance_software:8.4.5</product>
<product>adaptive_security_appliance_software:8.4.5.6</product>
<product>adaptive_security_appliance_software:8.4.6</product>
<product>adaptive_security_appliance_software:8.4.7</product>
<product>adaptive_security_appliance_software:8.4.7.3</product>
<product>adaptive_security_appliance_software:8.4.7.15</product>
<product>adaptive_security_appliance_software:8.4.7.22</product>
<product>adaptive_security_appliance_software:8.4.7.23</product>
<product>adaptive_security_appliance_software:8.4.7.26</product>
<product>adaptive_security_appliance_software:8.4.7.28</product>
<product>adaptive_security_appliance_software:8.4.7.29</product>
<product>adaptive_security_appliance_software:8.5.1</product>
<product>adaptive_security_appliance_software:8.5.1.1</product>
<product>adaptive_security_appliance_software:8.5.1.6</product>
<product>adaptive_security_appliance_software:8.5.1.7</product>
<product>adaptive_security_appliance_software:8.5.1.14</product>
<product>adaptive_security_appliance_software:8.5.1.17</product>
<product>adaptive_security_appliance_software:8.5.1.18</product>
<product>adaptive_security_appliance_software:8.5.1.19</product>
<product>adaptive_security_appliance_software:8.5.1.21</product>
<product>adaptive_security_appliance_software:8.5.1.24</product>
<product>adaptive_security_appliance_software:8.6.1</product>
<product>adaptive_security_appliance_software:8.6.1.1</product>
<product>adaptive_security_appliance_software:8.6.1.2</product>
<product>adaptive_security_appliance_software:8.6.1.5</product>
<product>adaptive_security_appliance_software:8.6.1.10</product>
<product>adaptive_security_appliance_software:8.6.1.12</product>
<product>adaptive_security_appliance_software:8.6.1.13</product>
<product>adaptive_security_appliance_software:8.6.1.14</product>
<product>adaptive_security_appliance_software:8.6.1.17</product>
<product>adaptive_security_appliance_software:8.7.1</product>
<product>adaptive_security_appliance_software:8.7.1.1</product>
<product>adaptive_security_appliance_software:8.7.1.3</product>
<product>adaptive_security_appliance_software:8.7.1.4</product>
<product>adaptive_security_appliance_software:8.7.1.7</product>
<product>adaptive_security_appliance_software:8.7.1.8</product>
<product>adaptive_security_appliance_software:8.7.1.11</product>
<product>adaptive_security_appliance_software:8.7.1.13</product>
<product>adaptive_security_appliance_software:8.7.1.16</product>
<product>adaptive_security_appliance_software:8.7.1.17</product>
<product>adaptive_security_appliance_software:9.0.1</product>
<product>adaptive_security_appliance_software:9.0.2</product>
<product>adaptive_security_appliance_software:9.0.2.10</product>
<product>adaptive_security_appliance_software:9.0.3</product>
<product>adaptive_security_appliance_software:9.0.3.6</product>
<product>adaptive_security_appliance_software:9.0.3.8</product>
<product>adaptive_security_appliance_software:9.0.4</product>
<product>adaptive_security_appliance_software:9.0.4.1</product>
<product>adaptive_security_appliance_software:9.0.4.5</product>
<product>adaptive_security_appliance_software:9.0.4.7</product>
<product>adaptive_security_appliance_software:9.0.4.17</product>
<product>adaptive_security_appliance_software:9.0.4.20</product>
<product>adaptive_security_appliance_software:9.0.4.24</product>
<product>adaptive_security_appliance_software:9.0.4.26</product>
<product>adaptive_security_appliance_software:9.0.4.29</product>
<product>adaptive_security_appliance_software:9.0.4.33</product>
<product>adaptive_security_appliance_software:9.0.4.35</product>
<product>adaptive_security_appliance_software:9.0.4.37</product>
<product>adaptive_security_appliance_software:9.1.1</product>
<product>adaptive_security_appliance_software:9.1.1.4</product>
<product>adaptive_security_appliance_software:9.1.2</product>
<product>adaptive_security_appliance_software:9.1.2.8</product>
<product>adaptive_security_appliance_software:9.1.3</product>
<product>adaptive_security_appliance_software:9.1.3.2</product>
<product>adaptive_security_appliance_software:9.1.4</product>
<product>adaptive_security_appliance_software:9.1.4.5</product>
<product>adaptive_security_appliance_software:9.1.5</product>
<product>adaptive_security_appliance_software:9.1.5.10</product>
<product>adaptive_security_appliance_software:9.1.5.12</product>
<product>adaptive_security_appliance_software:9.1.5.15</product>
<product>adaptive_security_appliance_software:9.1.5.21</product>
<product>adaptive_security_appliance_software:9.1.6</product>
<product>adaptive_security_appliance_software:9.1.6.1</product>
<product>adaptive_security_appliance_software:9.1.6.4</product>
<product>adaptive_security_appliance_software:9.1.6.6</product>
<product>adaptive_security_appliance_software:9.1.6.8</product>
<product>adaptive_security_appliance_software:9.1.6.10</product>
<product>adaptive_security_appliance_software:9.2%280.0%29</product>
<product>adaptive_security_appliance_software:9.2%280.104%29</product>
<product>adaptive_security_appliance_software:9.2%283.1%29</product>
<product>adaptive_security_appliance_software:9.2.1</product>
<product>adaptive_security_appliance_software:9.2.2</product>
<product>adaptive_security_appliance_software:9.2.2.4</product>
<product>adaptive_security_appliance_software:9.2.2.7</product>
<product>adaptive_security_appliance_software:9.2.2.8</product>
<product>adaptive_security_appliance_software:9.2.3</product>
<product>adaptive_security_appliance_software:9.2.3.3</product>
<product>adaptive_security_appliance_software:9.2.3.4</product>
<product>adaptive_security_appliance_software:9.2.4</product>
<product>adaptive_security_appliance_software:9.2.4.2</product>
<product>adaptive_security_appliance_software:9.2.4.4</product>
<product>adaptive_security_appliance_software:9.3%281.50%29</product>
<product>adaptive_security_appliance_software:9.3%281.105%29</product>
<product>adaptive_security_appliance_software:9.3%282.100%29</product>
<product>adaptive_security_appliance_software:9.3%282.243%29</product>
<product>adaptive_security_appliance_software:9.3.1</product>
<product>adaptive_security_appliance_software:9.3.1.1</product>
<product>adaptive_security_appliance_software:9.3.2</product>
<product>adaptive_security_appliance_software:9.3.2.2</product>
<product>adaptive_security_appliance_software:9.3.3</product>
<product>adaptive_security_appliance_software:9.3.3.1</product>
<product>adaptive_security_appliance_software:9.3.3.2</product>
<product>adaptive_security_appliance_software:9.3.3.5</product>
<product>adaptive_security_appliance_software:9.3.3.6</product>
<product>adaptive_security_appliance_software:9.3.5</product>
<product>adaptive_security_appliance_software:9.4.0.115</product>
<product>adaptive_security_appliance_software:9.4.1</product>
<product>adaptive_security_appliance_software:9.4.1.1</product>
<product>adaptive_security_appliance_software:9.4.1.2</product>
<product>adaptive_security_appliance_software:9.4.1.3</product>
<product>adaptive_security_appliance_software:9.4.1.5</product>
<product>adaptive_security_appliance_software:9.4.2</product>
<product>adaptive_security_appliance_software:9.4.2.3</product>
<product>adaptive_security_appliance_software:9.5.1</product>
<product>adaptive_security_appliance_software:9.5.2</product>
</cve>
<cve id="CVE-2016-1382" level="LOW">
<product>web_security_appliance_%28wsa%29:5.6.0-623</product>
<product>web_security_appliance_%28wsa%29:6.0.0-000</product>
<product>web_security_appliance_%28wsa%29:7.1.0</product>
<product>web_security_appliance_%28wsa%29:7.1.1</product>
<product>web_security_appliance_%28wsa%29:7.1.2</product>
<product>web_security_appliance_%28wsa%29:7.1.3</product>
<product>web_security_appliance_%28wsa%29:7.1.4</product>
<product>web_security_appliance_%28wsa%29:7.5.0-000</product>
<product>web_security_appliance_%28wsa%29:7.5.0-825</product>
<product>web_security_appliance_%28wsa%29:7.5.1-000</product>
<product>web_security_appliance_%28wsa%29:7.5.2-000</product>
<product>web_security_appliance_%28wsa%29:7.7.0-000</product>
<product>web_security_appliance_%28wsa%29:7.7.1-000</product>
<product>web_security_appliance_%28wsa%29:8.0.0-000</product>
<product>web_security_appliance_%28wsa%29:8.0.5</product>
<product>web_security_appliance_%28wsa%29:8.0.6</product>
<product>web_security_appliance_%28wsa%29:8.0.6-078</product>
<product>web_security_appliance_%28wsa%29:8.0.6-119</product>
<product>web_security_appliance_%28wsa%29:8.0.7</product>
<product>web_security_appliance_%28wsa%29:8.0.7-142</product>
<product>web_security_appliance_%28wsa%29:8.0.8-mr-113</product>
<product>web_security_appliance_%28wsa%29:8.5.0-497</product>
<product>web_security_appliance_%28wsa%29:8.5.0.000</product>
<product>web_security_appliance_%28wsa%29:8.5.1-021</product>
<product>web_security_appliance_%28wsa%29:8.5.2-024</product>
<product>web_security_appliance_%28wsa%29:8.5.2-027</product>
<product>web_security_appliance_%28wsa%29:8.5.3-055</product>
</cve>
<cve id="CVE-2016-1383" level="LOW">
<product>web_security_appliance_%28wsa%29:5.6.0-623</product>
<product>web_security_appliance_%28wsa%29:6.0.0-000</product>
<product>web_security_appliance_%28wsa%29:7.1.0</product>
<product>web_security_appliance_%28wsa%29:7.1.1</product>
<product>web_security_appliance_%28wsa%29:7.1.2</product>
<product>web_security_appliance_%28wsa%29:7.1.3</product>
<product>web_security_appliance_%28wsa%29:7.1.4</product>
<product>web_security_appliance_%28wsa%29:7.5.0-000</product>
<product>web_security_appliance_%28wsa%29:7.5.0-825</product>
<product>web_security_appliance_%28wsa%29:7.5.1-000</product>
<product>web_security_appliance_%28wsa%29:7.5.2-000</product>
<product>web_security_appliance_%28wsa%29:7.7.0-000</product>
<product>web_security_appliance_%28wsa%29:7.7.1-000</product>
<product>web_security_appliance_%28wsa%29:8.0.0-000</product>
<product>web_security_appliance_%28wsa%29:8.0.5</product>
<product>web_security_appliance_%28wsa%29:8.0.6</product>
<product>web_security_appliance_%28wsa%29:8.0.6-078</product>
<product>web_security_appliance_%28wsa%29:8.0.6-119</product>
<product>web_security_appliance_%28wsa%29:8.0.7</product>
<product>web_security_appliance_%28wsa%29:8.0.7-142</product>
<product>web_security_appliance_%28wsa%29:8.0.8-mr-113</product>
<product>web_security_appliance_%28wsa%29:8.5.0-497</product>
<product>web_security_appliance_%28wsa%29:8.5.0.000</product>
<product>web_security_appliance_%28wsa%29:8.5.1-021</product>
<product>web_security_appliance_%28wsa%29:8.5.2-024</product>
<product>web_security_appliance_%28wsa%29:8.5.2-027</product>
<product>web_security_appliance_%28wsa%29:8.5.3-055</product>
</cve>
<cve id="CVE-2016-1380" level="LOW">
<product>web_security_appliance:8.0.0-000</product>
<product>web_security_appliance:8.0.5</product>
<product>web_security_appliance:8.0.6</product>
<product>web_security_appliance:8.0.6-078</product>
<product>web_security_appliance:8.0.6-119</product>
<product>web_security_appliance:8.0.7</product>
<product>web_security_appliance:8.0.7-142</product>
<product>web_security_appliance:8.0.8-mr-113</product>
<product>web_security_appliance:8.5.0-000</product>
<product>web_security_appliance:8.5.0-497</product>
<product>web_security_appliance:8.5.1-021</product>
<product>web_security_appliance:8.5.2-024</product>
<product>web_security_appliance:8.5.2-027</product>
<product>web_security_appliance:8.5.3-055</product>
</cve>
<cve id="CVE-2016-1381" level="LOW">
<product>web_security_appliance:8.5.0-497</product>
<product>web_security_appliance:8.5.0.000</product>
<product>web_security_appliance:8.5.1-021</product>
<product>web_security_appliance:8.5.2-024</product>
<product>web_security_appliance:8.5.2-027</product>
<product>web_security_appliance:8.5.3-055</product>
<product>web_security_appliance:9.0.0-193</product>
<product>web_security_appliance:9.0_base</product>
<product>web_security_appliance:9.1.0-000</product>
<product>web_security_appliance:9.1_base</product>
</cve>
<cve id="CVE-2016-0255" level="MEDIUM">
<product>marketing_platform:9.1</product>
<product>marketing_platform:9.1.1</product>
<product>marketing_platform:9.1.2</product>
<product>marketing_platform:10.0</product>
</cve>
<cve id="CVE-2016-1388" level="LOW">
<product>prime_network_analysis_module_software:5.0.0</product>
<product>prime_network_analysis_module_software:5.0.1</product>
<product>prime_network_analysis_module_software:5.0.2</product>
<product>prime_network_analysis_module_software:5.1.0</product>
<product>prime_network_analysis_module_software:5.1.2</product>
<product>prime_network_analysis_module_software:6.0.2</product>
<product>prime_network_analysis_module_software:6.1.0</product>
<product>prime_network_analysis_module_software:6.1.1</product>
<product>prime_network_analysis_module_software:6.2.0</product>
<product>prime_virtual_network_analysis_module_software:6.0.0</product>
<product>prime_virtual_network_analysis_module_software:6.1.0</product>
<product>prime_virtual_network_analysis_module_software:6.2.0</product>
<product>network_analysis_module</product>
</cve>
<cve id="CVE-2016-1389" level="MEDIUM">
<product>webex_meetings_server:2.6.0</product>
</cve>
<cve id="CVE-2016-0389" level="LOW">
<product>websphere_application_server:8.5.5.2</product>
<product>websphere_application_server:8.5.5.3</product>
<product>websphere_application_server:8.5.5.4</product>
<product>websphere_application_server:8.5.5.5</product>
<product>websphere_application_server:8.5.5.6</product>
<product>websphere_application_server:8.5.5.7</product>
<product>websphere_application_server:8.5.5.8</product>
<product>websphere_application_server:8.5.5.9</product>
</cve>
<cve id="CVE-2016-0385" level="MEDIUM">
<product>websphere_application_server:7.0</product>
<product>websphere_application_server:7.0.0.0</product>
<product>websphere_application_server:7.0.0.1</product>
<product>websphere_application_server:7.0.0.2</product>
<product>websphere_application_server:7.0.0.3</product>
<product>websphere_application_server:7.0.0.4</product>
<product>websphere_application_server:7.0.0.5</product>
<product>websphere_application_server:7.0.0.6</product>
<product>websphere_application_server:7.0.0.7</product>
<product>websphere_application_server:7.0.0.8</product>
<product>websphere_application_server:7.0.0.9</product>
<product>websphere_application_server:7.0.0.10</product>
<product>websphere_application_server:7.0.0.11</product>
<product>websphere_application_server:7.0.0.12</product>
<product>websphere_application_server:7.0.0.13</product>
<product>websphere_application_server:7.0.0.14</product>
<product>websphere_application_server:7.0.0.15</product>
<product>websphere_application_server:7.0.0.16</product>
<product>websphere_application_server:7.0.0.17</product>
<product>websphere_application_server:7.0.0.18</product>
<product>websphere_application_server:7.0.0.19</product>
<product>websphere_application_server:7.0.0.21</product>
<product>websphere_application_server:7.0.0.22</product>
<product>websphere_application_server:7.0.0.23</product>
<product>websphere_application_server:7.0.0.24</product>
<product>websphere_application_server:7.0.0.25</product>
<product>websphere_application_server:7.0.0.27</product>
<product>websphere_application_server:7.0.0.28</product>
<product>websphere_application_server:7.0.0.29</product>
<product>websphere_application_server:7.0.0.31</product>
<product>websphere_application_server:7.0.0.32</product>
<product>websphere_application_server:7.0.0.33</product>
<product>websphere_application_server:7.0.0.34</product>
<product>websphere_application_server:7.0.0.35</product>
<product>websphere_application_server:7.0.0.36</product>
<product>websphere_application_server:7.0.0.37</product>
<product>websphere_application_server:7.0.0.38</product>
<product>websphere_application_server:7.0.0.39</product>
<product>websphere_application_server:7.0.0.41</product>
<product>websphere_application_server:8.0</product>
<product>websphere_application_server:8.0.0.0</product>
<product>websphere_application_server:8.0.0.1</product>
<product>websphere_application_server:8.0.0.2</product>
<product>websphere_application_server:8.0.0.3</product>
<product>websphere_application_server:8.0.0.4</product>
<product>websphere_application_server:8.0.0.5</product>
<product>websphere_application_server:8.0.0.6</product>
<product>websphere_application_server:8.0.0.7</product>
<product>websphere_application_server:8.0.0.8</product>
<product>websphere_application_server:8.0.0.9</product>
<product>websphere_application_server:8.0.0.10</product>
<product>websphere_application_server:8.0.0.11</product>
<product>websphere_application_server:8.0.0.12</product>
<product>websphere_application_server:8.5.0.0</product>
<product>websphere_application_server:8.5.0.0</product>
<product>websphere_application_server:8.5.0.1</product>
<product>websphere_application_server:8.5.0.2</product>
<product>websphere_application_server:8.5.5.0</product>
<product>websphere_application_server:8.5.5.1</product>
<product>websphere_application_server:8.5.5.2</product>
<product>websphere_application_server:8.5.5.4</product>
<product>websphere_application_server:8.5.5.5</product>
<product>websphere_application_server:8.5.5.6</product>
<product>websphere_application_server:8.5.5.7</product>
<product>websphere_application_server:8.5.5.8</product>
<product>websphere_application_server:8.5.5.9</product>
<product>websphere_application_server:9.0.0.0</product>
</cve>
<cve id="CVE-2016-0387" level="MEDIUM">
<product>tririga_application_platform:3.3.0.0</product>
<product>tririga_application_platform:3.3.0.1</product>
<product>tririga_application_platform:3.3.1.0</product>
<product>tririga_application_platform:3.3.1.1</product>
<product>tririga_application_platform:3.3.1.2</product>
<product>tririga_application_platform:3.3.2.0</product>
<product>tririga_application_platform:3.3.2.1</product>
<product>tririga_application_platform:3.3.2.2</product>
<product>tririga_application_platform:3.3.2.3</product>
<product>tririga_application_platform:3.3.2.4</product>
<product>tririga_application_platform:3.3.2.5</product>
<product>tririga_application_platform:3.4.0.0</product>
<product>tririga_application_platform:3.4.0.1</product>
<product>tririga_application_platform:3.4.1.0</product>
<product>tririga_application_platform:3.4.1.1</product>
<product>tririga_application_platform:3.4.1.2</product>
<product>tririga_application_platform:3.4.1.3</product>
<product>tririga_application_platform:3.4.2.0</product>
<product>tririga_application_platform:3.4.2.1</product>
<product>tririga_application_platform:3.4.2.2</product>
<product>tririga_application_platform:3.4.2.3</product>
<product>tririga_application_platform:3.5.0.0</product>
<product>tririga_application_platform:3.5.0.1</product>
</cve>
<cve id="CVE-2016-0386" level="MEDIUM">
<product>tririga_application_platform:3.3.0.0</product>
<product>tririga_application_platform:3.3.0.1</product>
<product>tririga_application_platform:3.3.0.2</product>
<product>tririga_application_platform:3.3.1.0</product>
<product>tririga_application_platform:3.3.1.1</product>
<product>tririga_application_platform:3.3.1.2</product>
<product>tririga_application_platform:3.3.1.3</product>
<product>tririga_application_platform:3.3.2.0</product>
<product>tririga_application_platform:3.3.2.1</product>
<product>tririga_application_platform:3.3.2.3</product>
<product>tririga_application_platform:3.3.2.4</product>
<product>tririga_application_platform:3.3.2.5</product>
<product>tririga_application_platform:3.4.0.0</product>
<product>tririga_application_platform:3.4.1.1</product>
<product>tririga_application_platform:3.4.1.2</product>
<product>tririga_application_platform:3.4.1.3</product>
<product>tririga_application_platform:3.4.2.0</product>
<product>tririga_application_platform:3.4.2.1</product>
<product>tririga_application_platform:3.4.2.2</product>
<product>tririga_application_platform:3.4.2.3</product>
<product>tririga_application_platform:3.5.0.0</product>
<product>tririga_application_platform:3.5.0.1</product>
</cve>
<cve id="CVE-2016-0381" level="LOW">
<product>cognos_tm1:10.2.2</product>
</cve>
<cve id="CVE-2016-0380" level="LOW">
<product>sterling_connect_direct:4.1.0.0</product>
<product>sterling_connect_direct:4.1.0.1</product>
<product>sterling_connect_direct:4.1.0.2</product>
<product>sterling_connect_direct:4.1.0.3</product>
<product>sterling_connect_direct:4.1.0.4</product>
<product>sterling_connect_direct:4.2.0.0</product>
<product>sterling_connect_direct:4.2.0.1</product>
<product>sterling_connect_direct:4.2.0.2</product>
<product>sterling_connect_direct:4.2.0.3</product>
<product>sterling_connect_direct:4.2.0.4</product>
</cve>
<cve id="CVE-2016-0382" level="LOW">
<product>tealeaf_consumer_experience:8.7</product>
<product>tealeaf_consumer_experience:8.7.0</product>
<product>tealeaf_consumer_experience:8.7.1</product>
<product>tealeaf_consumer_experience:8.8</product>
<product>tealeaf_consumer_experience:8.8.0</product>
<product>tealeaf_consumer_experience:8.8.1</product>
<product>tealeaf_consumer_experience:8.8.2</product>
<product>tealeaf_consumer_experience:9.0</product>
<product>tealeaf_consumer_experience:9.0.1</product>
<product>tealeaf_consumer_experience:9.0.2</product>
</cve>
<cve id="CVE-2016-5715" level="MEDIUM">
<product>puppet:2015.2.0</product>
<product>puppet:2015.2.1</product>
<product>puppet:2015.2.2</product>
<product>puppet:2015.2.3</product>
<product>puppet:2015.3.0</product>
<product>puppet:2015.3.1</product>
<product>puppet:2015.3.2</product>
<product>puppet:2015.3.3</product>
<product>puppet:2016.1.1</product>
<product>puppet:2016.1.2</product>
<product>puppet:2016.2.0</product>
<product>puppet:2016.2.1</product>
<product>puppet:2016.4.0</product>
</cve>
<cve id="CVE-2016-5714" level="LOW">
<product>puppet_agent:1.3.6</product>
<product>puppet_agent:1.4.0</product>
<product>puppet_agent:1.4.1</product>
<product>puppet_agent:1.4.2</product>
<product>puppet_agent:1.5.0</product>
<product>puppet_agent:1.5.1</product>
<product>puppet_agent:1.5.2</product>
<product>puppet_agent:1.5.3</product>
<product>puppet_agent:1.6.0</product>
<product>puppet_agent:1.6.1</product>
<product>puppet_agent:1.6.2</product>
<product>puppet_agent:1.7.0</product>
<product>puppet_enterprise:2015.3.3</product>
<product>puppet_enterprise:2016.1.1</product>
<product>puppet_enterprise:2016.1.2</product>
<product>puppet_enterprise:2016.2.0</product>
<product>puppet_enterprise:2016.2.1</product>
</cve>
<cve id="CVE-2016-5716" level="LOW">
<product>puppet_enterprise:2015.2.0</product>
<product>puppet_enterprise:2015.2.1</product>
<product>puppet_enterprise:2015.2.2</product>
<product>puppet_enterprise:2015.2.3</product>
<product>puppet_enterprise:2015.3.0</product>
<product>puppet_enterprise:2015.3.1</product>
<product>puppet_enterprise:2015.3.2</product>
<product>puppet_enterprise:2015.3.3</product>
<product>puppet_enterprise:2016.1.1</product>
<product>puppet_enterprise:2016.1.2</product>
<product>puppet_enterprise:2016.2.0</product>
<product>puppet_enterprise:2016.2.1</product>
</cve>
<cve id="CVE-2016-5711" level="MEDIUM">
<product>virtual_storage_console_for_vmware_vsphere:6.2</product>
</cve>
<cve id="CVE-2016-0252" level="MEDIUM">
<product>control_center:6.0.0.0</product>
<product>sterling_control_center:5.4.0.0</product>
<product>sterling_control_center:5.4.0.1</product>
<product>sterling_control_center:5.4.1</product>
<product>sterling_control_center:5.4.1.0</product>
<product>sterling_control_center:5.4.2</product>
<product>sterling_control_center:5.4.2.0</product>
</cve>
<cve id="CVE-2016-2840" level="MEDIUM">
<product>open-xchange_appsuite:7.8.0</product>
</cve>
<cve id="CVE-2016-2842" level="LOW">
<product>openssl:1.0.1</product>
<product>openssl:1.0.1</product>
<product>openssl:1.0.1</product>
<product>openssl:1.0.1</product>
<product>openssl:1.0.1a</product>
<product>openssl:1.0.1b</product>
<product>openssl:1.0.1c</product>
<product>openssl:1.0.1d</product>
<product>openssl:1.0.1e</product>
<product>openssl:1.0.1f</product>
<product>openssl:1.0.1g</product>
<product>openssl:1.0.1h</product>
<product>openssl:1.0.1i</product>
<product>openssl:1.0.1j</product>
<product>openssl:1.0.1k</product>
<product>openssl:1.0.1l</product>
<product>openssl:1.0.1m</product>
<product>openssl:1.0.1n</product>
<product>openssl:1.0.1o</product>
<product>openssl:1.0.1p</product>
<product>openssl:1.0.1q</product>
<product>openssl:1.0.1r</product>
<product>openssl:1.0.2</product>
<product>openssl:1.0.2</product>
<product>openssl:1.0.2</product>
<product>openssl:1.0.2</product>
<product>openssl:1.0.2a</product>
<product>openssl:1.0.2b</product>
<product>openssl:1.0.2c</product>
<product>openssl:1.0.2d</product>
<product>openssl:1.0.2e</product>
<product>openssl:1.0.2f</product>
</cve>
<cve id="CVE-2016-2846" level="LOW">
<product>simatic_s7_cpu_1200_firmware:3.0.2</product>
</cve>
<cve id="CVE-2016-2848" level="LOW">
<product>bind:9.1</product>
<product>bind:9.1.0</product>
<product>bind:9.1.1</product>
<product>bind:9.1.1</product>
<product>bind:9.1.1</product>
<product>bind:9.1.1</product>
<product>bind:9.1.1</product>
<product>bind:9.1.1</product>
<product>bind:9.1.1</product>
<product>bind:9.1.1</product>
<product>bind:9.1.2</product>
<product>bind:9.1.2</product>
<product>bind:9.1.3</product>
<product>bind:9.1.3</product>
<product>bind:9.1.3</product>
<product>bind:9.1.3</product>
<product>bind:9.2</product>
<product>bind:9.2.0</product>
<product>bind:9.2.0</product>
<product>bind:9.2.0</product>
<product>bind:9.2.0</product>
<product>bind:9.2.0</product>
<product>bind:9.2.0</product>
<product>bind:9.2.0</product>
<product>bind:9.2.0</product>
<product>bind:9.2.0</product>
<product>bind:9.2.0</product>
<product>bind:9.2.0</product>
<product>bind:9.2.0</product>
<product>bind:9.2.0</product>
<product>bind:9.2.0</product>
<product>bind:9.2.0</product>
<product>bind:9.2.0</product>
<product>bind:9.2.1</product>
<product>bind:9.2.1</product>
<product>bind:9.2.1</product>
<product>bind:9.2.2</product>
<product>bind:9.2.2</product>
<product>bind:9.2.2</product>
<product>bind:9.2.2</product>
<product>bind:9.2.3</product>
<product>bind:9.2.3</product>
<product>bind:9.2.3</product>
<product>bind:9.2.3</product>
<product>bind:9.2.3</product>
<product>bind:9.2.4</product>
<product>bind:9.2.4</product>
<product>bind:9.2.4</product>
<product>bind:9.2.4</product>
<product>bind:9.2.4</product>
<product>bind:9.2.4</product>
<product>bind:9.2.4</product>
<product>bind:9.2.4</product>
<product>bind:9.2.5</product>
<product>bind:9.2.5</product>
<product>bind:9.2.5</product>
<product>bind:9.2.6</product>
<product>bind:9.2.6</product>
<product>bind:9.2.7</product>
<product>bind:9.2.7</product>
<product>bind:9.2.7</product>
<product>bind:9.2.7</product>
<product>bind:9.2.8</product>
<product>bind:9.2.9</product>
<product>bind:9.2.9</product>
<product>bind:9.3</product>
<product>bind:9.3.0</product>
<product>bind:9.3.0</product>
<product>bind:9.3.0</product>
<product>bind:9.3.0</product>
<product>bind:9.3.0</product>
<product>bind:9.3.0</product>
<product>bind:9.3.0</product>
<product>bind:9.3.0</product>
<product>bind:9.3.1</product>
<product>bind:9.3.1</product>
<product>bind:9.3.1</product>
<product>bind:9.3.2</product>
<product>bind:9.3.2</product>
<product>bind:9.3.3</product>
<product>bind:9.3.3</product>
<product>bind:9.3.3</product>
<product>bind:9.3.3</product>
<product>bind:9.3.4</product>
<product>bind:9.3.5</product>
<product>bind:9.3.5</product>
<product>bind:9.3.5</product>
<product>bind:9.3.6</product>
<product>bind:9.3.6</product>
<product>bind:9.4</product>
<product>bind:9.4.0</product>
<product>bind:9.4.0</product>
<product>bind:9.4.0</product>
<product>bind:9.4.0</product>
<product>bind:9.4.0</product>
<product>bind:9.4.0</product>
<product>bind:9.4.0</product>
<product>bind:9.4.0</product>
<product>bind:9.4.0</product>
<product>bind:9.4.0</product>
<product>bind:9.4.0</product>
<product>bind:9.4.0</product>
<product>bind:9.4.0</product>
<product>bind:9.4.1</product>
<product>bind:9.4.2</product>
<product>bind:9.4.2</product>
<product>bind:9.4.2</product>
<product>bind:9.4.3</product>
<product>bind:9.4.3</product>
<product>bind:9.4.3</product>
<product>bind:9.4.3</product>
<product>bind:9.4.3</product>
<product>bind:9.4.3</product>
<product>bind:9.5</product>
<product>bind:9.5.0</product>
<product>bind:9.5.0</product>
<product>bind:9.5.0</product>
<product>bind:9.5.0</product>
<product>bind:9.5.0</product>
<product>bind:9.5.0</product>
<product>bind:9.5.0</product>
<product>bind:9.5.0</product>
<product>bind:9.5.0</product>
<product>bind:9.5.0</product>
<product>bind:9.5.0</product>
<product>bind:9.5.0</product>
<product>bind:9.5.0</product>
<product>bind:9.5.0</product>
<product>bind:9.5.0</product>
<product>bind:9.5.0</product>
<product>bind:9.5.1</product>
<product>bind:9.5.1</product>
<product>bind:9.5.1</product>
<product>bind:9.5.1</product>
<product>bind:9.5.1</product>
<product>bind:9.5.1</product>
<product>bind:9.5.2</product>
<product>bind:9.5.2</product>
<product>bind:9.5.2</product>
<product>bind:9.5.2</product>
<product>bind:9.5.2</product>
<product>bind:9.5.2</product>
<product>bind:9.5.2</product>
<product>bind:9.5.3</product>
<product>bind:9.5.3</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6.0</product>
<product>bind:9.6.0</product>
<product>bind:9.6.0</product>
<product>bind:9.6.0</product>
<product>bind:9.6.0</product>
<product>bind:9.6.0</product>
<product>bind:9.6.1</product>
<product>bind:9.6.1</product>
<product>bind:9.6.1</product>
<product>bind:9.6.1</product>
<product>bind:9.6.1</product>
<product>bind:9.6.1</product>
<product>bind:9.6.2</product>
<product>bind:9.6.2</product>
<product>bind:9.6.2</product>
<product>bind:9.6.2</product>
<product>bind:9.6.2</product>
<product>bind:9.6.2</product>
<product>bind:9.6.3</product>
<product>bind:9.6.3</product>
<product>bind:9.6.3</product>
<product>bind:9.7.0</product>
<product>bind:9.7.0</product>
<product>bind:9.7.0</product>
<product>bind:9.7.0</product>
<product>bind:9.7.0</product>
<product>bind:9.7.0</product>
<product>bind:9.7.0</product>
<product>bind:9.7.0</product>
<product>bind:9.7.0</product>
<product>bind:9.7.0</product>
<product>bind:9.7.0</product>
<product>bind:9.7.1</product>
<product>bind:9.7.1</product>
<product>bind:9.7.1</product>
<product>bind:9.7.1</product>
<product>bind:9.7.1</product>
<product>bind:9.7.2</product>
<product>bind:9.7.2</product>
<product>bind:9.7.2</product>
<product>bind:9.7.2</product>
<product>bind:9.7.2</product>
<product>bind:9.7.3</product>
<product>bind:9.7.3</product>
<product>bind:9.7.3</product>
<product>bind:9.7.3</product>
<product>bind:9.7.4</product>
<product>bind:9.7.4</product>
<product>bind:9.7.4</product>
<product>bind:9.7.4</product>
<product>bind:9.7.5</product>
<product>bind:9.7.5</product>
<product>bind:9.7.5</product>
<product>bind:9.7.5</product>
<product>bind:9.7.6</product>
<product>bind:9.7.6</product>
<product>bind:9.7.6</product>
<product>bind:9.7.6</product>
<product>bind:9.7.6</product>
<product>bind:9.7.7</product>
<product>bind:9.8.0</product>
<product>bind:9.8.0</product>
<product>bind:9.8.0</product>
<product>bind:9.8.0</product>
<product>bind:9.8.0</product>
<product>bind:9.8.0</product>
<product>bind:9.8.0</product>
<product>bind:9.8.1</product>
<product>bind:9.8.1</product>
<product>bind:9.8.1</product>
<product>bind:9.8.1</product>
<product>bind:9.8.1</product>
<product>bind:9.8.1</product>
<product>bind:9.8.2</product>
<product>bind:9.8.2</product>
<product>bind:9.8.2</product>
<product>bind:9.8.2</product>
<product>bind:9.8.3</product>
<product>bind:9.8.3</product>
<product>bind:9.8.3</product>
<product>bind:9.8.3</product>
<product>bind:9.8.3</product>
<product>bind:9.8.4</product>
<product>bind:9.9.0</product>
<product>bind:9.9.0</product>
<product>bind:9.9.0</product>
<product>bind:9.9.0</product>
<product>bind:9.9.0</product>
<product>bind:9.9.0</product>
<product>bind:9.9.0</product>
<product>bind:9.9.0</product>
<product>bind:9.9.0</product>
<product>bind:9.9.0</product>
<product>bind:9.9.1</product>
<product>bind:9.9.1</product>
<product>bind:9.9.1</product>
<product>bind:9.9.1</product>
<product>bind:9.9.1</product>
<product>bind:9.9.2</product>
<product>bind:9.9.2</product>
<product>bind:9.9.2</product>
</cve>
<cve id="CVE-2016-9602" level="LOW">
<product>qemu:-</product>
<product>qemu:0.1</product>
<product>qemu:0.1.0</product>
<product>qemu:0.1.1</product>
<product>qemu:0.1.2</product>
<product>qemu:0.1.3</product>
<product>qemu:0.1.4</product>
<product>qemu:0.1.5</product>
<product>qemu:0.1.6</product>
<product>qemu:0.2</product>
<product>qemu:0.2.0</product>
<product>qemu:0.3</product>
<product>qemu:0.3.0</product>
<product>qemu:0.4</product>
<product>qemu:0.4.0</product>
<product>qemu:0.4.1</product>
<product>qemu:0.4.2</product>
<product>qemu:0.4.3</product>
<product>qemu:0.4.4</product>
<product>qemu:0.5.0</product>
<product>qemu:0.5.1</product>
<product>qemu:0.5.2</product>
<product>qemu:0.5.3</product>
<product>qemu:0.5.4</product>
<product>qemu:0.5.5</product>
<product>qemu:0.6.0</product>
<product>qemu:0.6.1</product>
<product>qemu:0.7.0</product>
<product>qemu:0.7.1</product>
<product>qemu:0.7.2</product>
<product>qemu:0.8.0</product>
<product>qemu:0.8.1</product>
<product>qemu:0.8.2</product>
<product>qemu:0.9.0</product>
<product>qemu:0.9.1</product>
<product>qemu:0.9.1-5</product>
<product>qemu:0.10.0</product>
<product>qemu:0.10.1</product>
<product>qemu:0.10.2</product>
<product>qemu:0.10.3</product>
<product>qemu:0.10.4</product>
<product>qemu:0.10.5</product>
<product>qemu:0.10.6</product>
<product>qemu:0.11.0</product>
<product>qemu:0.11.0</product>
<product>qemu:0.11.0</product>
<product>qemu:0.11.0</product>
<product>qemu:0.11.0-rc0</product>
<product>qemu:0.11.0-rc1</product>
<product>qemu:0.11.0-rc2</product>
<product>qemu:0.11.1</product>
<product>qemu:0.12.0</product>
<product>qemu:0.12.0</product>
<product>qemu:0.12.0</product>
<product>qemu:0.12.1</product>
<product>qemu:0.12.2</product>
<product>qemu:0.12.3</product>
<product>qemu:0.12.4</product>
<product>qemu:0.12.5</product>
<product>qemu:0.13.0</product>
<product>qemu:0.13.0</product>
<product>qemu:0.13.0</product>
<product>qemu:0.14.0</product>
<product>qemu:0.14.0</product>
<product>qemu:0.14.0</product>
<product>qemu:0.14.0</product>
<product>qemu:0.14.1</product>
<product>qemu:0.15.0</product>
<product>qemu:0.15.0</product>
<product>qemu:0.15.0</product>
<product>qemu:0.15.1</product>
<product>qemu:0.15.2</product>
<product>qemu:1.0</product>
<product>qemu:1.0</product>
<product>qemu:1.0</product>
<product>qemu:1.0</product>
<product>qemu:1.0</product>
<product>qemu:1.0.1</product>
<product>qemu:1.1</product>
<product>qemu:1.1</product>
<product>qemu:1.1</product>
<product>qemu:1.1</product>
<product>qemu:1.1</product>
<product>qemu:1.1.0</product>
<product>qemu:1.1.1</product>
<product>qemu:1.1.2</product>
<product>qemu:1.2.0</product>
<product>qemu:1.2.1</product>
<product>qemu:1.2.2</product>
<product>qemu:1.3.0</product>
<product>qemu:1.3.1</product>
<product>qemu:1.4.0</product>
<product>qemu:1.4.1</product>
<product>qemu:1.4.2</product>
<product>qemu:1.5.0</product>
<product>qemu:1.5.0</product>
<product>qemu:1.5.0</product>
<product>qemu:1.5.0</product>
<product>qemu:1.5.1</product>
<product>qemu:1.5.2</product>
<product>qemu:1.5.3</product>
<product>qemu:1.6.0</product>
<product>qemu:1.6.0</product>
<product>qemu:1.6.0</product>
<product>qemu:1.6.0</product>
<product>qemu:1.6.1</product>
<product>qemu:1.6.2</product>
<product>qemu:1.7.0</product>
<product>qemu:1.7.1</product>
<product>qemu:1.7.2</product>
<product>qemu:2.0.0</product>
<product>qemu:2.0.0</product>
<product>qemu:2.0.0</product>
<product>qemu:2.0.0</product>
<product>qemu:2.0.0</product>
<product>qemu:2.0.0</product>
<product>qemu:2.0.1</product>
<product>qemu:2.0.2</product>
<product>qemu:2.1.0</product>
<product>qemu:2.1.0</product>
<product>qemu:2.1.0</product>
<product>qemu:2.1.0</product>
<product>qemu:2.1.0</product>
<product>qemu:2.1.0</product>
<product>qemu:2.1.1</product>
<product>qemu:2.1.2</product>
<product>qemu:2.1.3</product>
<product>qemu:2.2.0</product>
<product>qemu:2.2.1</product>
<product>qemu:2.3.0</product>
<product>qemu:2.3.1</product>
<product>qemu:2.4.0</product>
<product>qemu:2.4.0.1</product>
<product>qemu:2.4.1</product>
<product>qemu:2.5.0</product>
<product>qemu:2.5.1</product>
<product>qemu:2.5.1.1</product>
<product>qemu:2.6.0</product>
<product>qemu:2.6.1</product>
<product>qemu:2.6.2</product>
<product>qemu:2.7.0</product>
<product>qemu:2.7.1</product>
<product>qemu:2.8.0</product>
<product>qemu:2.8.1</product>
<product>qemu:2.8.1.1</product>
</cve>
<cve id="CVE-2016-9600" level="MEDIUM">
<product>jasper:1.900.1</product>
<product>jasper:1.900.3</product>
<product>jasper:1.900.5</product>
<product>jasper:1.900.7</product>
<product>jasper:1.900.8</product>
<product>jasper:1.900.9</product>
<product>jasper:1.900.10</product>
<product>jasper:1.900.11</product>
<product>jasper:1.900.12</product>
<product>jasper:1.900.13</product>
<product>jasper:1.900.14</product>
<product>jasper:1.900.16</product>
<product>jasper:1.900.17</product>
<product>jasper:1.900.19</product>
<product>jasper:1.900.21</product>
<product>jasper:1.900.22</product>
<product>jasper:1.900.24</product>
<product>jasper:1.900.29</product>
<product>jasper:2.0.6</product>
<product>jasper:2.0.9</product>
</cve>
<cve id="CVE-2016-9606" level="MEDIUM">
<product>resteasy:3.1.1</product>
</cve>
<cve id="CVE-2016-2152" level="MEDIUM">
<product>moodle:2.6.11</product>
<product>moodle:2.7</product>
<product>moodle:2.7.1</product>
<product>moodle:2.7.2</product>
<product>moodle:2.7.3</product>
<product>moodle:2.7.4</product>
<product>moodle:2.7.5</product>
<product>moodle:2.7.6</product>
<product>moodle:2.7.7</product>
<product>moodle:2.7.8</product>
<product>moodle:2.7.9</product>
<product>moodle:2.7.10</product>
<product>moodle:2.7.11</product>
<product>moodle:2.7.12</product>
<product>moodle:2.8</product>
<product>moodle:2.8.1</product>
<product>moodle:2.8.2</product>
<product>moodle:2.8.3</product>
<product>moodle:2.8.4</product>
<product>moodle:2.8.5</product>
<product>moodle:2.8.6</product>
<product>moodle:2.8.7</product>
<product>moodle:2.8.8</product>
<product>moodle:2.8.9</product>
<product>moodle:2.8.10</product>
<product>moodle:2.9</product>
<product>moodle:2.9.1</product>
<product>moodle:2.9.2</product>
<product>moodle:2.9.3</product>
<product>moodle:2.9.4</product>
<product>moodle:3.0</product>
<product>moodle:3.0.1</product>
<product>moodle:3.0.2</product>
</cve>
<cve id="CVE-2016-2153" level="MEDIUM">
<product>moodle:2.6.11</product>
<product>moodle:2.7</product>
<product>moodle:2.7.1</product>
<product>moodle:2.7.2</product>
<product>moodle:2.7.3</product>
<product>moodle:2.7.4</product>
<product>moodle:2.7.5</product>
<product>moodle:2.7.6</product>
<product>moodle:2.7.7</product>
<product>moodle:2.7.8</product>
<product>moodle:2.7.9</product>
<product>moodle:2.7.10</product>
<product>moodle:2.7.11</product>
<product>moodle:2.7.12</product>
<product>moodle:2.8</product>
<product>moodle:2.8.1</product>
<product>moodle:2.8.2</product>
<product>moodle:2.8.3</product>
<product>moodle:2.8.4</product>
<product>moodle:2.8.5</product>
<product>moodle:2.8.6</product>
<product>moodle:2.8.7</product>
<product>moodle:2.8.8</product>
<product>moodle:2.8.9</product>
<product>moodle:2.8.10</product>
<product>moodle:2.9</product>
<product>moodle:2.9.1</product>
<product>moodle:2.9.2</product>
<product>moodle:2.9.3</product>
<product>moodle:2.9.4</product>
<product>moodle:3.0</product>
<product>moodle:3.0.1</product>
<product>moodle:3.0.2</product>
</cve>
<cve id="CVE-2016-2151" level="LOW">
<product>moodle:2.6.11</product>
<product>moodle:2.7</product>
<product>moodle:2.7.1</product>
<product>moodle:2.7.2</product>
<product>moodle:2.7.3</product>
<product>moodle:2.7.4</product>
<product>moodle:2.7.5</product>
<product>moodle:2.7.6</product>
<product>moodle:2.7.7</product>
<product>moodle:2.7.8</product>
<product>moodle:2.7.9</product>
<product>moodle:2.7.10</product>
<product>moodle:2.7.11</product>
<product>moodle:2.7.12</product>
<product>moodle:2.8</product>
<product>moodle:2.8.1</product>
<product>moodle:2.8.2</product>
<product>moodle:2.8.3</product>
<product>moodle:2.8.4</product>
<product>moodle:2.8.5</product>
<product>moodle:2.8.6</product>
<product>moodle:2.8.7</product>
<product>moodle:2.8.8</product>
<product>moodle:2.8.9</product>
<product>moodle:2.8.10</product>
<product>moodle:2.9</product>
<product>moodle:2.9.1</product>
<product>moodle:2.9.2</product>
<product>moodle:2.9.3</product>
<product>moodle:2.9.4</product>
<product>moodle:3.0</product>
<product>moodle:3.0.1</product>
<product>moodle:3.0.2</product>
</cve>
<cve id="CVE-2016-2156" level="LOW">
<product>moodle:2.6.11</product>
<product>moodle:2.7</product>
<product>moodle:2.7.1</product>
<product>moodle:2.7.2</product>
<product>moodle:2.7.3</product>
<product>moodle:2.7.4</product>
<product>moodle:2.7.5</product>
<product>moodle:2.7.6</product>
<product>moodle:2.7.7</product>
<product>moodle:2.7.8</product>
<product>moodle:2.7.9</product>
<product>moodle:2.7.10</product>
<product>moodle:2.7.11</product>
<product>moodle:2.7.12</product>
<product>moodle:2.8</product>
<product>moodle:2.8.1</product>
<product>moodle:2.8.2</product>
<product>moodle:2.8.3</product>
<product>moodle:2.8.4</product>
<product>moodle:2.8.5</product>
<product>moodle:2.8.6</product>
<product>moodle:2.8.7</product>
<product>moodle:2.8.8</product>
<product>moodle:2.8.9</product>
<product>moodle:2.8.10</product>
<product>moodle:2.9</product>
<product>moodle:2.9.1</product>
<product>moodle:2.9.2</product>
<product>moodle:2.9.3</product>
<product>moodle:2.9.4</product>
<product>moodle:3.0</product>
<product>moodle:3.0.1</product>
<product>moodle:3.0.2</product>
</cve>
<cve id="CVE-2016-2157" level="MEDIUM">
<product>moodle:2.6.11</product>
<product>moodle:2.7</product>
<product>moodle:2.7.1</product>
<product>moodle:2.7.2</product>
<product>moodle:2.7.3</product>
<product>moodle:2.7.4</product>
<product>moodle:2.7.5</product>
<product>moodle:2.7.6</product>
<product>moodle:2.7.7</product>
<product>moodle:2.7.8</product>
<product>moodle:2.7.9</product>
<product>moodle:2.7.10</product>
<product>moodle:2.7.11</product>
<product>moodle:2.7.12</product>
<product>moodle:2.8</product>
<product>moodle:2.8.1</product>
<product>moodle:2.8.2</product>
<product>moodle:2.8.3</product>
<product>moodle:2.8.4</product>
<product>moodle:2.8.5</product>
<product>moodle:2.8.6</product>
<product>moodle:2.8.7</product>
<product>moodle:2.8.8</product>
<product>moodle:2.8.9</product>
<product>moodle:2.8.10</product>
<product>moodle:2.9</product>
<product>moodle:2.9.1</product>
<product>moodle:2.9.2</product>
<product>moodle:2.9.3</product>
<product>moodle:2.9.4</product>
<product>moodle:3.0</product>
<product>moodle:3.0.1</product>
<product>moodle:3.0.2</product>
</cve>
<cve id="CVE-2016-2154" level="LOW">
<product>moodle:2.8</product>
<product>moodle:2.8.1</product>
<product>moodle:2.8.2</product>
<product>moodle:2.8.3</product>
<product>moodle:2.8.4</product>
<product>moodle:2.8.5</product>
<product>moodle:2.8.6</product>
<product>moodle:2.8.7</product>
<product>moodle:2.8.8</product>
<product>moodle:2.8.9</product>
<product>moodle:2.8.10</product>
<product>moodle:2.9</product>
<product>moodle:2.9.1</product>
<product>moodle:2.9.2</product>
<product>moodle:2.9.3</product>
<product>moodle:2.9.4</product>
<product>moodle:3.0</product>
<product>moodle:3.0.1</product>
<product>moodle:3.0.2</product>
</cve>
<cve id="CVE-2016-2155" level="LOW">
<product>moodle:2.8</product>
<product>moodle:2.8.1</product>
<product>moodle:2.8.2</product>
<product>moodle:2.8.3</product>
<product>moodle:2.8.4</product>
<product>moodle:2.8.5</product>
<product>moodle:2.8.6</product>
<product>moodle:2.8.7</product>
<product>moodle:2.8.8</product>
<product>moodle:2.8.9</product>
<product>moodle:2.8.10</product>
<product>moodle:2.9</product>
<product>moodle:2.9.1</product>
<product>moodle:2.9.2</product>
<product>moodle:2.9.3</product>
<product>moodle:2.9.4</product>
<product>moodle:3.0</product>
<product>moodle:3.0.1</product>
<product>moodle:3.0.2</product>
</cve>
<cve id="CVE-2016-2158" level="LOW">
<product>moodle:2.6.11</product>
<product>moodle:2.7</product>
<product>moodle:2.7.1</product>
<product>moodle:2.7.2</product>
<product>moodle:2.7.3</product>
<product>moodle:2.7.4</product>
<product>moodle:2.7.5</product>
<product>moodle:2.7.6</product>
<product>moodle:2.7.7</product>
<product>moodle:2.7.8</product>
<product>moodle:2.7.9</product>
<product>moodle:2.7.10</product>
<product>moodle:2.7.11</product>
<product>moodle:2.7.12</product>
<product>moodle:2.8</product>
<product>moodle:2.8.1</product>
<product>moodle:2.8.2</product>
<product>moodle:2.8.3</product>
<product>moodle:2.8.4</product>
<product>moodle:2.8.5</product>
<product>moodle:2.8.6</product>
<product>moodle:2.8.7</product>
<product>moodle:2.8.8</product>
<product>moodle:2.8.9</product>
<product>moodle:2.8.10</product>
<product>moodle:2.9</product>
<product>moodle:2.9.1</product>
<product>moodle:2.9.2</product>
<product>moodle:2.9.3</product>
<product>moodle:2.9.4</product>
<product>moodle:3.0</product>
<product>moodle:3.0.1</product>
<product>moodle:3.0.2</product>
</cve>
<cve id="CVE-2016-2159" level="LOW">
<product>moodle:2.6.11</product>
<product>moodle:2.7</product>
<product>moodle:2.7.1</product>
<product>moodle:2.7.2</product>
<product>moodle:2.7.3</product>
<product>moodle:2.7.4</product>
<product>moodle:2.7.5</product>
<product>moodle:2.7.6</product>
<product>moodle:2.7.7</product>
<product>moodle:2.7.8</product>
<product>moodle:2.7.9</product>
<product>moodle:2.7.10</product>
<product>moodle:2.7.11</product>
<product>moodle:2.7.12</product>
<product>moodle:2.8</product>
<product>moodle:2.8.1</product>
<product>moodle:2.8.2</product>
<product>moodle:2.8.3</product>
<product>moodle:2.8.4</product>
<product>moodle:2.8.5</product>
<product>moodle:2.8.6</product>
<product>moodle:2.8.7</product>
<product>moodle:2.8.8</product>
<product>moodle:2.8.9</product>
<product>moodle:2.8.10</product>
<product>moodle:2.9</product>
<product>moodle:2.9.1</product>
<product>moodle:2.9.2</product>
<product>moodle:2.9.3</product>
<product>moodle:2.9.4</product>
<product>moodle:3.0</product>
<product>moodle:3.0.1</product>
<product>moodle:3.0.2</product>
</cve>
<cve id="CVE-2016-3155" level="LOW">
<product>apogee_insight:-</product>
</cve>
<cve id="CVE-2016-3154" level="LOW">
<product>spip:2.0.0</product>
<product>spip:2.0.1</product>
<product>spip:2.0.2</product>
<product>spip:2.0.3</product>
<product>spip:2.0.4</product>
<product>spip:2.0.5</product>
<product>spip:2.0.6</product>
<product>spip:2.0.7</product>
<product>spip:2.0.8</product>
<product>spip:2.0.9</product>
<product>spip:2.0.10</product>
<product>spip:2.0.11</product>
<product>spip:2.0.12</product>
<product>spip:2.0.13</product>
<product>spip:2.0.14</product>
<product>spip:2.0.15</product>
<product>spip:2.0.16</product>
<product>spip:2.0.17</product>
<product>spip:2.0.18</product>
<product>spip:2.0.19</product>
<product>spip:2.0.20</product>
<product>spip:2.0.21</product>
<product>spip:2.0.22</product>
<product>spip:2.1.1</product>
<product>spip:2.1.2</product>
<product>spip:2.1.3</product>
<product>spip:2.1.4</product>
<product>spip:2.1.5</product>
<product>spip:2.1.6</product>
<product>spip:2.1.7</product>
<product>spip:2.1.8</product>
<product>spip:2.1.9</product>
<product>spip:2.1.10</product>
<product>spip:2.1.11</product>
<product>spip:2.1.12</product>
<product>spip:2.1.13</product>
<product>spip:2.1.14</product>
<product>spip:2.1.15</product>
<product>spip:2.1.16</product>
<product>spip:2.1.17</product>
<product>spip:2.1.18</product>
<product>spip:2.1.19</product>
<product>spip:3.0.0</product>
<product>spip:3.0.1</product>
<product>spip:3.0.2</product>
<product>spip:3.0.3</product>
<product>spip:3.0.4</product>
<product>spip:3.0.5</product>
<product>spip:3.0.6</product>
<product>spip:3.0.7</product>
<product>spip:3.0.8</product>
<product>spip:3.0.9</product>
<product>spip:3.0.10</product>
<product>spip:3.0.11</product>
<product>spip:3.0.13</product>
<product>spip:3.0.14</product>
<product>spip:3.0.15</product>
<product>spip:3.0.16</product>
<product>spip:3.0.17</product>
<product>spip:3.0.19</product>
<product>spip:3.0.20</product>
<product>spip:3.1.0</product>
</cve>
<cve id="CVE-2016-3405" level="LOW">
<product>zimbra_collaboration_suite:8.6.0</product>
</cve>
<cve id="CVE-2016-3404" level="LOW">
<product>zimbra_collaboration_suite:8.6.0</product>
</cve>
<cve id="CVE-2016-3151" level="LOW">
<product>clickshare_csc-1_firmware:01.09.02.03</product>
<product>clickshare_cse-200_firmware:01.03.01.05</product>
<product>clickshare_csm-1_firmware:01.06.01.04</product>
</cve>
<cve id="CVE-2016-3402" level="LOW">
<product>zimbra_collaboration_suite:8.6.0</product>
</cve>
<cve id="CVE-2016-3401" level="LOW">
<product>zimbra_collaboration_suite:8.6.0</product>
</cve>
<cve id="CVE-2016-3152" level="LOW">
<product>clickshare_csc-1_firmware:01.09.02.03</product>
</cve>
<cve id="CVE-2016-6439" level="MEDIUM">
<product>firepower_management_center:5.3.0</product>
<product>firepower_management_center:5.3.0.2</product>
<product>firepower_management_center:5.3.0.3</product>
<product>firepower_management_center:5.3.0.4</product>
<product>firepower_management_center:5.3.1</product>
<product>firepower_management_center:5.3.1.3</product>
<product>firepower_management_center:5.3.1.4</product>
<product>firepower_management_center:5.3.1.5</product>
<product>firepower_management_center:5.3.1.6</product>
<product>firepower_management_center:5.4.0</product>
<product>firepower_management_center:5.4.0.2</product>
<product>firepower_management_center:5.4.1</product>
<product>firepower_management_center:5.4.1.1</product>
<product>firepower_management_center:5.4.1.2</product>
<product>firepower_management_center:5.4.1.3</product>
<product>firepower_management_center:5.4.1.4</product>
<product>firepower_management_center:5.4.1.5</product>
<product>firepower_management_center:5.4.1.6</product>
<product>firepower_management_center:5.4_base</product>
<product>firepower_management_center:6.0.0</product>
<product>firepower_management_center:6.0.0.0</product>
<product>firepower_management_center:6.0.0.1</product>
<product>firepower_management_center:6.0.1</product>
<product>firepower_management_center:6.0_base</product>
</cve>
<cve id="CVE-2016-3158" level="LOW">
<product>fedora:22</product>
<product>fedora:23</product>
<product>vm_server:3.3</product>
<product>vm_server:3.4</product>
<product>xen:4.4.0</product>
</cve>
<cve id="CVE-2016-3409" level="MEDIUM">
<product>zimbra_collaboration_suite:8.6.0</product>
</cve>
<cve id="CVE-2016-3408" level="MEDIUM">
<product>zimbra_collaboration_suite:8.6.0</product>
</cve>
<cve id="CVE-2016-7520" level="MEDIUM">
<product>imagemagick:-</product>
</cve>
<cve id="CVE-2016-7521" level="MEDIUM">
<product>imagemagick:-</product>
</cve>
<cve id="CVE-2016-7522" level="MEDIUM">
<product>imagemagick:-</product>
</cve>
<cve id="CVE-2016-7525" level="MEDIUM">
<product>imagemagick:-</product>
</cve>
<cve id="CVE-2016-7526" level="MEDIUM">
<product>imagemagick:-</product>
</cve>
<cve id="CVE-2016-7527" level="MEDIUM">
<product>imagemagick:-</product>
</cve>
<cve id="CVE-2016-7528" level="MEDIUM">
<product>imagemagick:-</product>
</cve>
<cve id="CVE-2016-7529" level="MEDIUM">
<product>imagemagick:-</product>
</cve>
<cve id="CVE-2016-0237" level="LOW">
<product>security_guardium_database_activity_monitor:10.0</product>
</cve>
<cve id="CVE-2016-0236" level="LOW">
<product>security_guardium_database_activity_monitor:8.2</product>
<product>security_guardium_database_activity_monitor:9.0</product>
<product>security_guardium_database_activity_monitor:9.1</product>
<product>security_guardium_database_activity_monitor:9.5</product>
<product>security_guardium_database_activity_monitor:10.0</product>
<product>security_guardium_database_activity_monitor:10.1</product>
</cve>
<cve id="CVE-2016-6651" level="LOW">
<product>cloud_foundry:242.0</product>
<product>cloud_foundry_elastic_runtime:1.6.0</product>
<product>cloud_foundry_elastic_runtime:1.6.1</product>
<product>cloud_foundry_elastic_runtime:1.6.2</product>
<product>cloud_foundry_elastic_runtime:1.6.3</product>
<product>cloud_foundry_elastic_runtime:1.6.4</product>
<product>cloud_foundry_elastic_runtime:1.6.5</product>
<product>cloud_foundry_elastic_runtime:1.6.6</product>
<product>cloud_foundry_elastic_runtime:1.6.7</product>
<product>cloud_foundry_elastic_runtime:1.6.8</product>
<product>cloud_foundry_elastic_runtime:1.6.9</product>
<product>cloud_foundry_elastic_runtime:1.6.10</product>
<product>cloud_foundry_elastic_runtime:1.6.11</product>
<product>cloud_foundry_elastic_runtime:1.6.12</product>
<product>cloud_foundry_elastic_runtime:1.6.13</product>
<product>cloud_foundry_elastic_runtime:1.6.14</product>
<product>cloud_foundry_elastic_runtime:1.6.15</product>
<product>cloud_foundry_elastic_runtime:1.6.17</product>
<product>cloud_foundry_elastic_runtime:1.6.18</product>
<product>cloud_foundry_elastic_runtime:1.6.19</product>
<product>cloud_foundry_elastic_runtime:1.6.20</product>
<product>cloud_foundry_elastic_runtime:1.6.21</product>
<product>cloud_foundry_elastic_runtime:1.6.22</product>
<product>cloud_foundry_elastic_runtime:1.6.23</product>
<product>cloud_foundry_elastic_runtime:1.6.25</product>
<product>cloud_foundry_elastic_runtime:1.6.26</product>
<product>cloud_foundry_elastic_runtime:1.6.27</product>
<product>cloud_foundry_elastic_runtime:1.6.28</product>
<product>cloud_foundry_elastic_runtime:1.6.29</product>
<product>cloud_foundry_elastic_runtime:1.6.30</product>
<product>cloud_foundry_elastic_runtime:1.6.31</product>
<product>cloud_foundry_elastic_runtime:1.6.32</product>
<product>cloud_foundry_elastic_runtime:1.6.33</product>
<product>cloud_foundry_elastic_runtime:1.6.34</product>
<product>cloud_foundry_elastic_runtime:1.6.35</product>
<product>cloud_foundry_elastic_runtime:1.6.36</product>
<product>cloud_foundry_elastic_runtime:1.6.37</product>
<product>cloud_foundry_elastic_runtime:1.6.38</product>
<product>cloud_foundry_elastic_runtime:1.6.39</product>
<product>cloud_foundry_elastic_runtime:1.7.0</product>
<product>cloud_foundry_elastic_runtime:1.7.1</product>
<product>cloud_foundry_elastic_runtime:1.7.2</product>
<product>cloud_foundry_elastic_runtime:1.7.3</product>
<product>cloud_foundry_elastic_runtime:1.7.4</product>
<product>cloud_foundry_elastic_runtime:1.7.5</product>
<product>cloud_foundry_elastic_runtime:1.7.6</product>
<product>cloud_foundry_elastic_runtime:1.7.7</product>
<product>cloud_foundry_elastic_runtime:1.7.8</product>
<product>cloud_foundry_elastic_runtime:1.7.9</product>
<product>cloud_foundry_elastic_runtime:1.7.10</product>
<product>cloud_foundry_elastic_runtime:1.7.11</product>
<product>cloud_foundry_elastic_runtime:1.7.12</product>
<product>cloud_foundry_elastic_runtime:1.7.13</product>
<product>cloud_foundry_elastic_runtime:1.7.14</product>
<product>cloud_foundry_elastic_runtime:1.7.15</product>
<product>cloud_foundry_elastic_runtime:1.7.16</product>
<product>cloud_foundry_elastic_runtime:1.7.17</product>
<product>cloud_foundry_elastic_runtime:1.7.18</product>
<product>cloud_foundry_elastic_runtime:1.7.19</product>
<product>cloud_foundry_elastic_runtime:1.7.20</product>
<product>cloud_foundry_elastic_runtime:1.8.0</product>
<product>cloud_foundry_ops_manager:1.7.0</product>
<product>cloud_foundry_ops_manager:1.7.1</product>
<product>cloud_foundry_ops_manager:1.7.2</product>
<product>cloud_foundry_ops_manager:1.7.3</product>
<product>cloud_foundry_ops_manager:1.7.4</product>
<product>cloud_foundry_ops_manager:1.7.5</product>
<product>cloud_foundry_ops_manager:1.7.6</product>
<product>cloud_foundry_ops_manager:1.7.7</product>
<product>cloud_foundry_ops_manager:1.7.8</product>
<product>cloud_foundry_ops_manager:1.7.9</product>
<product>cloud_foundry_ops_manager:1.7.10</product>
<product>cloud_foundry_ops_manager:1.7.11</product>
<product>cloud_foundry_ops_manager:1.7.12</product>
<product>cloud_foundry_ops_manager:1.8.0</product>
<product>cloud_foundry_uaa:3.7.0</product>
<product>cloud_foundry_uaa_bosh:16.0</product>
</cve>
<cve id="CVE-2016-6650" level="HIGH">
<product>recoverpoint:4.4.1.1</product>
<product>recoverpoint_for_virtual_machines:4.4.1.1</product>
</cve>
<cve id="CVE-2016-6653" level="LOW">
<product>cloud_foundry_cf_mysql:27.0</product>
<product>cloud_foundry_cf_mysql:28.0</product>
</cve>
<cve id="CVE-2016-6652" level="MEDIUM">
<product>spring_data_jpa:1.9.4</product>
<product>spring_data_jpa:1.10.2</product>
</cve>
<cve id="CVE-2016-6655" level="LOW">
<product>cf-mysql-release:30</product>
<product>cf-release:244</product>
</cve>
<cve id="CVE-2016-6657" level="MEDIUM">
<product>cloud_foundry_elastic_runtime:1.8.0</product>
<product>cloud_foundry_elastic_runtime:1.8.1</product>
<product>cloud_foundry_elastic_runtime:1.8.2</product>
<product>cloud_foundry_elastic_runtime:1.8.3</product>
<product>cloud_foundry_elastic_runtime:1.8.4</product>
<product>cloud_foundry_elastic_runtime:1.8.5</product>
<product>cloud_foundry_elastic_runtime:1.8.6</product>
<product>cloud_foundry_elastic_runtime:1.8.7</product>
<product>cloud_foundry_elastic_runtime:1.8.8</product>
<product>cloud_foundry_elastic_runtime:1.8.9</product>
<product>cloud_foundry_elastic_runtime:1.8.10</product>
<product>cloud_foundry_elastic_runtime:1.8.11</product>
<product>cloud_foundry_elastic_runtime:1.8.12</product>
<product>cloud_foundry_ops_manager:1.7.0</product>
<product>cloud_foundry_ops_manager:1.7.1</product>
<product>cloud_foundry_ops_manager:1.7.2</product>
<product>cloud_foundry_ops_manager:1.7.3</product>
<product>cloud_foundry_ops_manager:1.7.4</product>
<product>cloud_foundry_ops_manager:1.7.5</product>
<product>cloud_foundry_ops_manager:1.7.6</product>
<product>cloud_foundry_ops_manager:1.7.7</product>
<product>cloud_foundry_ops_manager:1.7.8</product>
<product>cloud_foundry_ops_manager:1.7.9</product>
<product>cloud_foundry_ops_manager:1.7.10</product>
<product>cloud_foundry_ops_manager:1.7.11</product>
<product>cloud_foundry_ops_manager:1.7.12</product>
<product>cloud_foundry_ops_manager:1.7.13</product>
<product>cloud_foundry_ops_manager:1.7.14</product>
<product>cloud_foundry_ops_manager:1.7.15</product>
<product>cloud_foundry_ops_manager:1.7.16</product>
<product>cloud_foundry_ops_manager:1.7.17</product>
<product>cloud_foundry_ops_manager:1.7.18</product>
<product>cloud_foundry_ops_manager:1.8.0</product>
<product>cloud_foundry_ops_manager:1.8.1</product>
<product>cloud_foundry_ops_manager:1.8.2</product>
<product>cloud_foundry_ops_manager:1.8.3</product>
<product>cloud_foundry_ops_manager:1.8.4</product>
<product>cloud_foundry_ops_manager:1.8.5</product>
<product>cloud_foundry_ops_manager:1.8.6</product>
<product>cloud_foundry_ops_manager:1.8.7</product>
<product>cloud_foundry_ops_manager:1.8.8</product>
<product>cloud_foundry_ops_manager:1.8.9</product>
<product>cloud_foundry_ops_manager:1.8.10</product>
</cve>
<cve id="CVE-2016-6656" level="LOW">
<product>greenplum:4.3.9.1</product>
</cve>
<cve id="CVE-2016-6659" level="HIGH">
<product>cloud_foundry:247.0</product>
<product>cloud_foundry_uaa:3.9.2</product>
<product>cloud_foundry_uaa_bosh:23.0</product>
</cve>
<cve id="CVE-2016-6658" level="LOW">
<product>cf-release:141</product>
<product>cf-release:142</product>
<product>cf-release:143</product>
<product>cf-release:144</product>
<product>cf-release:145</product>
<product>cf-release:146</product>
<product>cf-release:147</product>
<product>cf-release:148</product>
<product>cf-release:149</product>
<product>cf-release:150</product>
<product>cf-release:151</product>
<product>cf-release:152</product>
<product>cf-release:153</product>
<product>cf-release:154</product>
<product>cf-release:155</product>
<product>cf-release:156</product>
<product>cf-release:157</product>
<product>cf-release:158</product>
<product>cf-release:159</product>
<product>cf-release:160</product>
<product>cf-release:161</product>
<product>cf-release:162</product>
<product>cf-release:163</product>
<product>cf-release:164</product>
<product>cf-release:165</product>
<product>cf-release:166</product>
<product>cf-release:167</product>
<product>cf-release:168</product>
<product>cf-release:169</product>
<product>cf-release:170</product>
<product>cf-release:171</product>
<product>cf-release:172</product>
<product>cf-release:173</product>
<product>cf-release:174</product>
<product>cf-release:175</product>
<product>cf-release:176</product>
<product>cf-release:177</product>
<product>cf-release:178</product>
<product>cf-release:179</product>
<product>cf-release:180</product>
<product>cf-release:181</product>
<product>cf-release:182</product>
<product>cf-release:183</product>
<product>cf-release:184</product>
<product>cf-release:185</product>
<product>cf-release:186</product>
<product>cf-release:187</product>
<product>cf-release:188</product>
<product>cf-release:189</product>
<product>cf-release:190</product>
<product>cf-release:191</product>
<product>cf-release:192</product>
<product>cf-release:193</product>
<product>cf-release:194</product>
<product>cf-release:195</product>
<product>cf-release:196</product>
<product>cf-release:197</product>
<product>cf-release:198</product>
<product>cf-release:199</product>
<product>cf-release:200</product>
<product>cf-release:201</product>
<product>cf-release:202</product>
<product>cf-release:203</product>
<product>cf-release:204</product>
<product>cf-release:205</product>
<product>cf-release:206</product>
<product>cf-release:207</product>
<product>cf-release:208</product>
<product>cf-release:209</product>
<product>cf-release:210</product>
<product>cf-release:211</product>
<product>cf-release:212</product>
<product>cf-release:213</product>
<product>cf-release:214</product>
<product>cf-release:215</product>
<product>cf-release:216</product>
<product>cf-release:217</product>
<product>cf-release:218</product>
<product>cf-release:219</product>
<product>cf-release:220</product>
<product>cf-release:221</product>
<product>cf-release:222</product>
<product>cf-release:223</product>
<product>cf-release:224</product>
<product>cf-release:225</product>
<product>cf-release:226</product>
<product>cf-release:227</product>
<product>cf-release:228</product>
<product>cloud_foundry_elastic_runtime:1.6.0</product>
<product>cloud_foundry_elastic_runtime:1.6.1</product>
<product>cloud_foundry_elastic_runtime:1.6.2</product>
<product>cloud_foundry_elastic_runtime:1.6.3</product>
<product>cloud_foundry_elastic_runtime:1.6.4</product>
<product>cloud_foundry_elastic_runtime:1.6.5</product>
<product>cloud_foundry_elastic_runtime:1.6.6</product>
<product>cloud_foundry_elastic_runtime:1.6.7</product>
<product>cloud_foundry_elastic_runtime:1.6.8</product>
<product>cloud_foundry_elastic_runtime:1.6.9</product>
<product>cloud_foundry_elastic_runtime:1.6.10</product>
<product>cloud_foundry_elastic_runtime:1.6.11</product>
<product>cloud_foundry_elastic_runtime:1.6.12</product>
<product>cloud_foundry_elastic_runtime:1.6.13</product>
<product>cloud_foundry_elastic_runtime:1.6.14</product>
<product>cloud_foundry_elastic_runtime:1.6.15</product>
<product>cloud_foundry_elastic_runtime:1.6.17</product>
<product>cloud_foundry_elastic_runtime:1.6.18</product>
<product>cloud_foundry_elastic_runtime:1.6.19</product>
<product>cloud_foundry_elastic_runtime:1.6.20</product>
<product>cloud_foundry_elastic_runtime:1.6.21</product>
<product>cloud_foundry_elastic_runtime:1.6.22</product>
<product>cloud_foundry_elastic_runtime:1.6.23</product>
<product>cloud_foundry_elastic_runtime:1.6.24</product>
<product>cloud_foundry_elastic_runtime:1.6.25</product>
<product>cloud_foundry_elastic_runtime:1.6.26</product>
<product>cloud_foundry_elastic_runtime:1.6.27</product>
<product>cloud_foundry_elastic_runtime:1.6.28</product>
<product>cloud_foundry_elastic_runtime:1.6.29</product>
<product>cloud_foundry_elastic_runtime:1.6.30</product>
<product>cloud_foundry_elastic_runtime:1.6.31</product>
<product>cloud_foundry_elastic_runtime:1.6.32</product>
<product>cloud_foundry_elastic_runtime:1.6.33</product>
<product>cloud_foundry_elastic_runtime:1.6.34</product>
<product>cloud_foundry_elastic_runtime:1.6.35</product>
<product>cloud_foundry_elastic_runtime:1.6.36</product>
<product>cloud_foundry_elastic_runtime:1.6.37</product>
<product>cloud_foundry_elastic_runtime:1.6.38</product>
<product>cloud_foundry_elastic_runtime:1.6.39</product>
<product>cloud_foundry_elastic_runtime:1.6.40</product>
<product>cloud_foundry_elastic_runtime:1.6.41</product>
<product>cloud_foundry_elastic_runtime:1.6.42</product>
<product>cloud_foundry_elastic_runtime:1.6.43</product>
<product>cloud_foundry_elastic_runtime:1.6.44</product>
<product>cloud_foundry_elastic_runtime:1.6.45</product>
<product>cloud_foundry_elastic_runtime:1.6.46</product>
<product>cloud_foundry_elastic_runtime:1.6.47</product>
<product>cloud_foundry_elastic_runtime:1.6.48</product>
<product>cloud_foundry_elastic_runtime:1.7.0</product>
<product>cloud_foundry_elastic_runtime:1.7.1</product>
<product>cloud_foundry_elastic_runtime:1.7.2</product>
<product>cloud_foundry_elastic_runtime:1.7.3</product>
<product>cloud_foundry_elastic_runtime:1.7.4</product>
<product>cloud_foundry_elastic_runtime:1.7.5</product>
<product>cloud_foundry_elastic_runtime:1.7.6</product>
<product>cloud_foundry_elastic_runtime:1.7.7</product>
<product>cloud_foundry_elastic_runtime:1.7.8</product>
<product>cloud_foundry_elastic_runtime:1.7.9</product>
<product>cloud_foundry_elastic_runtime:1.7.10</product>
<product>cloud_foundry_elastic_runtime:1.7.11</product>
<product>cloud_foundry_elastic_runtime:1.7.12</product>
<product>cloud_foundry_elastic_runtime:1.7.13</product>
<product>cloud_foundry_elastic_runtime:1.7.14</product>
<product>cloud_foundry_elastic_runtime:1.7.15</product>
<product>cloud_foundry_elastic_runtime:1.7.16</product>
<product>cloud_foundry_elastic_runtime:1.7.17</product>
<product>cloud_foundry_elastic_runtime:1.7.18</product>
<product>cloud_foundry_elastic_runtime:1.7.19</product>
<product>cloud_foundry_elastic_runtime:1.7.20</product>
<product>cloud_foundry_elastic_runtime:1.7.21</product>
<product>cloud_foundry_elastic_runtime:1.7.22</product>
<product>cloud_foundry_elastic_runtime:1.7.23</product>
<product>cloud_foundry_elastic_runtime:1.7.24</product>
<product>cloud_foundry_elastic_runtime:1.7.25</product>
<product>cloud_foundry_elastic_runtime:1.7.26</product>
<product>cloud_foundry_elastic_runtime:1.7.27</product>
<product>cloud_foundry_elastic_runtime:1.7.28</product>
<product>cloud_foundry_elastic_runtime:1.7.29</product>
<product>cloud_foundry_elastic_runtime:1.7.30</product>
<product>cloud_foundry_elastic_runtime:1.8.0</product>
<product>cloud_foundry_elastic_runtime:1.8.1</product>
<product>cloud_foundry_elastic_runtime:1.8.2</product>
<product>cloud_foundry_elastic_runtime:1.8.3</product>
<product>cloud_foundry_elastic_runtime:1.8.4</product>
<product>cloud_foundry_elastic_runtime:1.8.5</product>
<product>cloud_foundry_elastic_runtime:1.8.6</product>
<product>cloud_foundry_elastic_runtime:1.8.7</product>
<product>cloud_foundry_elastic_runtime:1.8.8</product>
<product>cloud_foundry_elastic_runtime:1.8.9</product>
<product>cloud_foundry_elastic_runtime:1.8.10</product>
</cve>
<cve id="CVE-2016-1211" level="MEDIUM">
<product>web_mailing_list:0.31</product>
</cve>
<cve id="CVE-2016-0239" level="LOW">
<product>security_guardium_database_activity_monitor:9.0</product>
<product>security_guardium_database_activity_monitor:9.1</product>
<product>security_guardium_database_activity_monitor:9.5</product>
<product>security_guardium_database_activity_monitor:10.0</product>
<product>security_guardium_database_activity_monitor:10.0.1</product>
</cve>
<cve id="CVE-2016-1212" level="LOW">
<product>mp_form_mail_cgi:3.2.3</product>
</cve>
<cve id="CVE-2016-0238" level="MEDIUM">
<product>security_guardium:9.0</product>
<product>security_guardium:9.1</product>
<product>security_guardium:9.5</product>
<product>security_guardium:10.0</product>
<product>security_guardium:10.1</product>
<product>security_guardium:10.1.2</product>
</cve>
<cve id="CVE-2016-9639" level="LOW">
<product>salt:2015.8.10</product>
</cve>
<cve id="CVE-2016-7384" level="LOW">
<product>gpu_driver:341.98</product>
<product>gpu_driver:373.06</product>
</cve>
<cve id="CVE-2016-7385" level="LOW">
<product>gpu_driver:341.98</product>
<product>gpu_driver:373.06</product>
</cve>
<cve id="CVE-2016-7386" level="LOW">
<product>gpu_driver:341.98</product>
<product>gpu_driver:373.06</product>
</cve>
<cve id="CVE-2016-7387" level="LOW">
<product>gpu_driver:341.98</product>
<product>gpu_driver:373.06</product>
</cve>
<cve id="CVE-2016-7381" level="LOW">
<product>gpu_driver:341.98</product>
<product>gpu_driver:373.06</product>
</cve>
<cve id="CVE-2016-7382" level="LOW">
<product>gpu_driver:304.131</product>
<product>gpu_driver:340.98</product>
<product>gpu_driver:361.93.02</product>
<product>gpu_driver:367.44</product>
<product>gpu_driver:367.54</product>
<product>gpu_driver:370.23</product>
</cve>
<cve id="CVE-2016-7383" level="LOW">
<product>gpu_driver:341.98</product>
<product>gpu_driver:373.06</product>
</cve>
<cve id="CVE-2016-7388" level="LOW">
<product>gpu_driver:341.98</product>
<product>gpu_driver:373.06</product>
</cve>
<cve id="CVE-2016-7389" level="LOW">
<product>gpu_driver:304.79</product>
<product>gpu_driver:340.52</product>
<product>gpu_driver:361.91</product>
<product>gpu_driver:365.19</product>
<product>gpu_driver:368.81</product>
</cve>
<cve id="CVE-2016-1214" level="MEDIUM">
<product>garoon:4.2.1</product>
</cve>
<cve id="CVE-2016-4877" level="MEDIUM">
<product>basercms:3.0.10</product>
<product>mail_form:3.0.10</product>
</cve>
<cve id="CVE-2016-4876" level="MEDIUM">
<product>basercms:3.0.10</product>
</cve>
<cve id="CVE-2016-4875" level="MEDIUM">
<product>assist_plugin:1.1.0</product>
<product>databox_plugin:0..0.0.20150609</product>
<product>userbox_plugin:0.0.0.20150918</product>
</cve>
<cve id="CVE-2016-4879" level="MEDIUM">
<product>basercms:3.0.10</product>
<product>mail_view:3.0.10</product>
</cve>
<cve id="CVE-2016-9631" level="MEDIUM">
<product>w3m:0.5.3-32</product>
</cve>
<cve id="CVE-2016-0712" level="MEDIUM">
<product>jetspeed:2.3.0</product>
</cve>
<cve id="CVE-2016-0713" level="HIGH">
<product>cf-release:141</product>
<product>cf-release:142</product>
<product>cf-release:143</product>
<product>cf-release:144</product>
<product>cf-release:145</product>
<product>cf-release:146</product>
<product>cf-release:147</product>
<product>cf-release:148</product>
<product>cf-release:149</product>
<product>cf-release:150</product>
<product>cf-release:151</product>
<product>cf-release:152</product>
<product>cf-release:153</product>
<product>cf-release:154</product>
<product>cf-release:155</product>
<product>cf-release:156</product>
<product>cf-release:157</product>
<product>cf-release:158</product>
<product>cf-release:159</product>
<product>cf-release:160</product>
<product>cf-release:161</product>
<product>cf-release:162</product>
<product>cf-release:163</product>
<product>cf-release:164</product>
<product>cf-release:165</product>
<product>cf-release:166</product>
<product>cf-release:167</product>
<product>cf-release:168</product>
<product>cf-release:169</product>
<product>cf-release:170</product>
<product>cf-release:171</product>
<product>cf-release:172</product>
<product>cf-release:173</product>
<product>cf-release:174</product>
<product>cf-release:175</product>
<product>cf-release:176</product>
<product>cf-release:177</product>
<product>cf-release:178</product>
<product>cf-release:179</product>
<product>cf-release:180</product>
<product>cf-release:181</product>
<product>cf-release:182</product>
<product>cf-release:183</product>
<product>cf-release:184</product>
<product>cf-release:185</product>
<product>cf-release:186</product>
<product>cf-release:187</product>
<product>cf-release:188</product>
<product>cf-release:189</product>
<product>cf-release:190</product>
<product>cf-release:191</product>
<product>cf-release:192</product>
<product>cf-release:193</product>
<product>cf-release:194</product>
<product>cf-release:195</product>
<product>cf-release:196</product>
<product>cf-release:197</product>
<product>cf-release:198</product>
<product>cf-release:199</product>
<product>cf-release:200</product>
<product>cf-release:201</product>
<product>cf-release:202</product>
<product>cf-release:203</product>
<product>cf-release:204</product>
<product>cf-release:205</product>
<product>cf-release:206</product>
<product>cf-release:207</product>
<product>cf-release:208</product>
<product>cf-release:209</product>
<product>cf-release:210</product>
<product>cf-release:211</product>
<product>cf-release:212</product>
<product>cf-release:213</product>
<product>cf-release:214</product>
<product>cf-release:215</product>
<product>cf-release:216</product>
<product>cf-release:217</product>
<product>cf-release:218</product>
<product>cf-release:219</product>
<product>cf-release:220</product>
<product>cf-release:221</product>
<product>cf-release:222</product>
<product>cf-release:223</product>
<product>cf-release:224</product>
<product>cf-release:225</product>
<product>cf-release:226</product>
<product>cf-release:227</product>
<product>cf-release:228</product>
</cve>
<cve id="CVE-2016-0710" level="LOW">
<product>jetspeed:2.3.0</product>
</cve>
<cve id="CVE-2016-0711" level="MEDIUM">
<product>jetspeed:2.3.0</product>
</cve>
<cve id="CVE-2016-9838" level="LOW">
<product>joomla%21:3.6.4</product>
</cve>
<cve id="CVE-2016-9839" level="LOW">
<product>mapserver:7.0.2</product>
</cve>
<cve id="CVE-2016-9834" level="MEDIUM">
<product>cyberoam_firmware:10.6.4</product>
</cve>
<cve id="CVE-2016-9835" level="LOW">
<product>zikula_application_framework:1.3.0</product>
<product>zikula_application_framework:1.3.1</product>
<product>zikula_application_framework:1.3.2</product>
<product>zikula_application_framework:1.3.3</product>
<product>zikula_application_framework:1.3.4</product>
<product>zikula_application_framework:1.3.5</product>
<product>zikula_application_framework:1.3.6</product>
<product>zikula_application_framework:1.3.7</product>
<product>zikula_application_framework:1.3.8</product>
<product>zikula_application_framework:1.3.9</product>
<product>zikula_application_framework:1.3.10</product>
<product>zikula_application_framework:1.3.10</product>
<product>zikula_application_framework:1.4.0</product>
<product>zikula_application_framework:1.4.0</product>
<product>zikula_application_framework:1.4.0</product>
<product>zikula_application_framework:1.4.0</product>
<product>zikula_application_framework:1.4.0</product>
<product>zikula_application_framework:1.4.0</product>
<product>zikula_application_framework:1.4.1</product>
<product>zikula_application_framework:1.4.2</product>
<product>zikula_application_framework:1.4.3</product>
<product>zikula_application_framework:1.4.3</product>
<product>zikula_application_framework:1.4.3</product>
<product>zikula_application_framework:1.4.3</product>
</cve>
<cve id="CVE-2016-9836" level="LOW">
<product>joomla%21:3.6.4</product>
</cve>
<cve id="CVE-2016-9837" level="LOW">
<product>joomla%21:3.6.4</product>
</cve>
<cve id="CVE-2016-9831" level="MEDIUM">
<product>libming:0.4.7</product>
</cve>
<cve id="CVE-2016-9832" level="LOW">
<product>ace-advanced_business_application_programming:8.10.304</product>
</cve>
<cve id="CVE-2016-1216" level="MEDIUM">
<product>garoon:4.2.1</product>
</cve>
<cve id="CVE-2016-10108" level="LOW">
<product>mycloud_nas:2.11.142</product>
</cve>
<cve id="CVE-2016-10107" level="LOW">
<product>mycloud_nas:2.11.142</product>
</cve>
<cve id="CVE-2016-10106" level="LOW">
<product>fvs318gv2_firmware:4.3-3.6</product>
<product>fvs318n_firmware:4.3-3.6</product>
<product>fvs336gv3_firmware:4.3-3.6</product>
<product>srx5308_firmware:4.3-3.6</product>
</cve>
<cve id="CVE-2016-10105" level="LOW">
<product>piwigo:2.8.3</product>
</cve>
<cve id="CVE-2016-10104" level="MEDIUM">
<product>automize:10.00</product>
<product>automize:10.01</product>
<product>automize:10.02</product>
<product>automize:10.03</product>
<product>automize:10.04</product>
<product>automize:10.05</product>
<product>automize:10.06</product>
<product>automize:10.07</product>
<product>automize:10.08</product>
<product>automize:10.09</product>
<product>automize:10.11</product>
<product>automize:10.12</product>
<product>automize:10.13</product>
<product>automize:10.14</product>
<product>automize:10.15</product>
<product>automize:10.16</product>
<product>automize:10.17</product>
<product>automize:10.18</product>
<product>automize:10.19</product>
<product>automize:10.20</product>
<product>automize:10.21</product>
<product>automize:10.22</product>
<product>automize:10.23</product>
<product>automize:10.24</product>
<product>automize:10.25</product>
<product>automize:11.00</product>
<product>automize:11.01</product>
<product>automize:11.02</product>
<product>automize:11.03</product>
<product>automize:11.04</product>
<product>automize:11.05</product>
<product>automize:11.06</product>
<product>automize:11.07</product>
<product>automize:11.08</product>
<product>automize:11.09</product>
<product>automize:11.11</product>
<product>automize:11.12</product>
<product>automize:11.13</product>
<product>automize:11.14</product>
</cve>
<cve id="CVE-2016-10103" level="MEDIUM">
<product>automize:10.00</product>
<product>automize:10.01</product>
<product>automize:10.02</product>
<product>automize:10.03</product>
<product>automize:10.04</product>
<product>automize:10.05</product>
<product>automize:10.06</product>
<product>automize:10.07</product>
<product>automize:10.08</product>
<product>automize:10.09</product>
<product>automize:10.11</product>
<product>automize:10.12</product>
<product>automize:10.13</product>
<product>automize:10.14</product>
<product>automize:10.15</product>
<product>automize:10.16</product>
<product>automize:10.17</product>
<product>automize:10.18</product>
<product>automize:10.19</product>
<product>automize:10.20</product>
<product>automize:10.21</product>
<product>automize:10.22</product>
<product>automize:10.23</product>
<product>automize:10.24</product>
<product>automize:10.25</product>
<product>automize:11.00</product>
<product>automize:11.01</product>
<product>automize:11.02</product>
<product>automize:11.03</product>
<product>automize:11.04</product>
<product>automize:11.05</product>
<product>automize:11.06</product>
<product>automize:11.07</product>
<product>automize:11.08</product>
<product>automize:11.09</product>
<product>automize:11.11</product>
<product>automize:11.12</product>
<product>automize:11.13</product>
<product>automize:11.14</product>
</cve>
<cve id="CVE-2016-10102" level="MEDIUM">
<product>automize:10.00</product>
<product>automize:10.01</product>
<product>automize:10.02</product>
<product>automize:10.03</product>
<product>automize:10.04</product>
<product>automize:10.05</product>
<product>automize:10.06</product>
<product>automize:10.07</product>
<product>automize:10.08</product>
<product>automize:10.09</product>
<product>automize:10.11</product>
<product>automize:10.12</product>
<product>automize:10.13</product>
<product>automize:10.14</product>
<product>automize:10.15</product>
<product>automize:10.16</product>
<product>automize:10.17</product>
<product>automize:10.18</product>
<product>automize:10.19</product>
<product>automize:10.20</product>
<product>automize:10.21</product>
<product>automize:10.22</product>
<product>automize:10.23</product>
<product>automize:10.24</product>
<product>automize:10.25</product>
<product>automize:11.00</product>
<product>automize:11.01</product>
<product>automize:11.02</product>
<product>automize:11.03</product>
<product>automize:11.04</product>
<product>automize:11.05</product>
<product>automize:11.06</product>
<product>automize:11.07</product>
<product>automize:11.08</product>
<product>automize:11.09</product>
<product>automize:11.11</product>
<product>automize:11.12</product>
<product>automize:11.13</product>
<product>automize:11.14</product>
</cve>
<cve id="CVE-2016-10101" level="MEDIUM">
<product>automize:10.00</product>
<product>automize:10.01</product>
<product>automize:10.02</product>
<product>automize:10.03</product>
<product>automize:10.04</product>
<product>automize:10.05</product>
<product>automize:10.06</product>
<product>automize:10.07</product>
<product>automize:10.08</product>
<product>automize:10.09</product>
<product>automize:10.11</product>
<product>automize:10.12</product>
<product>automize:10.13</product>
<product>automize:10.14</product>
<product>automize:10.15</product>
<product>automize:10.16</product>
<product>automize:10.17</product>
<product>automize:10.18</product>
<product>automize:10.19</product>
<product>automize:10.20</product>
<product>automize:10.21</product>
<product>automize:10.22</product>
<product>automize:10.23</product>
<product>automize:10.24</product>
<product>automize:10.25</product>
<product>automize:11.00</product>
<product>automize:11.01</product>
<product>automize:11.02</product>
<product>automize:11.03</product>
<product>automize:11.04</product>
<product>automize:11.05</product>
<product>automize:11.06</product>
<product>automize:11.07</product>
<product>automize:11.08</product>
<product>automize:11.09</product>
<product>automize:11.11</product>
<product>automize:11.12</product>
<product>automize:11.13</product>
<product>automize:11.14</product>
<product>automize:11.15</product>
</cve>
<cve id="CVE-2016-10100" level="LOW">
<product>borg:1.0.8</product>
</cve>
<cve id="CVE-2016-1217" level="MEDIUM">
<product>garoon:4.2.1</product>
</cve>
<cve id="CVE-2016-4381" level="MEDIUM">
<product>xp7_command_view:8.4.1</product>
</cve>
<cve id="CVE-2016-4380" level="MEDIUM">
<product>operations_manager:9.21</product>
<product>operations_manager:9.21</product>
<product>operations_manager:9.21</product>
</cve>
<cve id="CVE-2016-10369" level="LOW">
<product>lxterminal:0.3.0</product>
</cve>
<cve id="CVE-2016-10368" level="MEDIUM">
<product>opsview:4.5.0</product>
<product>opsview:4.6.4</product>
<product>opsview:5.0.2</product>
<product>opsview:5.1.0</product>
</cve>
<cve id="CVE-2016-4385" level="LOW">
<product>network_automation:9.10</product>
<product>network_automation:9.20</product>
<product>network_automation:9.22</product>
<product>network_automation:9.22.01</product>
<product>network_automation:9.22.02</product>
<product>network_automation:10.00</product>
<product>network_automation:10.00.01</product>
<product>network_automation:10.00.02</product>
<product>network_automation:10.10</product>
<product>network_automation:10.11</product>
</cve>
<cve id="CVE-2016-4384" level="LOW">
<product>loadrunner:12.02</product>
<product>performance_center:12.20</product>
</cve>
<cve id="CVE-2016-4387" level="MEDIUM">
<product>keyview:10.18.0.0</product>
<product>keyview:10.19.0.0</product>
<product>keyview:10.20.0.0</product>
<product>keyview:10.21.0.0</product>
<product>keyview:10.22.0.0</product>
<product>keyview:10.23.0.0</product>
<product>keyview:10.24.0.0</product>
</cve>
<cve id="CVE-2016-4386" level="MEDIUM">
<product>network_automation:10.10</product>
</cve>
<cve id="CVE-2016-10363" level="LOW">
<product>logstash:2.3.2</product>
</cve>
<cve id="CVE-2016-10362" level="LOW">
<product>output_plugin:5.0.0</product>
</cve>
<cve id="CVE-2016-10367" level="LOW">
<product>opsview:4.5.0</product>
<product>opsview:4.6.4</product>
<product>opsview:5.0.2</product>
<product>opsview:5.1.0</product>
</cve>
<cve id="CVE-2016-10366" level="MEDIUM">
<product>kibana:4.3.0</product>
<product>kibana:4.3.1</product>
<product>kibana:4.3.2</product>
<product>kibana:4.3.3</product>
<product>kibana:4.4.0</product>
<product>kibana:4.4.1</product>
<product>kibana:4.4.2</product>
<product>kibana:4.5.0</product>
<product>kibana:4.5.1</product>
<product>kibana:4.5.2</product>
<product>kibana:4.5.3</product>
<product>kibana:4.5.4</product>
<product>kibana:4.6.0</product>
<product>kibana:4.6.1</product>
</cve>
<cve id="CVE-2016-10365" level="MEDIUM">
<product>kibana:4.6.2</product>
<product>kibana:5.0.0</product>
</cve>
<cve id="CVE-2016-10364" level="LOW">
<product>kibana:5.0.0</product>
<product>kibana:5.0.1</product>
</cve>
<cve id="CVE-2016-1449" level="MEDIUM">
<product>webex_meetings_server:2.6.0</product>
<product>webex_meetings_server:2.6.1.39</product>
</cve>
<cve id="CVE-2016-1448" level="MEDIUM">
<product>webex_meetings_server:2.7.1</product>
<product>webex_meetings_server:2.7_base</product>
</cve>
<cve id="CVE-2016-1445" level="MEDIUM">
<product>adaptive_security_appliance_software:8.2</product>
<product>adaptive_security_appliance_software:8.2%281%29</product>
<product>adaptive_security_appliance_software:8.2%282%29</product>
<product>adaptive_security_appliance_software:8.2%283%29</product>
<product>adaptive_security_appliance_software:8.2%283.9%29</product>
<product>adaptive_security_appliance_software:8.2%284%29</product>
<product>adaptive_security_appliance_software:8.2%284.1%29</product>
<product>adaptive_security_appliance_software:8.2%284.4%29</product>
<product>adaptive_security_appliance_software:8.2%285%29</product>
<product>adaptive_security_appliance_software:8.2%285.35%29</product>
<product>adaptive_security_appliance_software:8.2%285.38%29</product>
<product>adaptive_security_appliance_software:8.2.1</product>
<product>adaptive_security_appliance_software:8.2.1.11</product>
<product>adaptive_security_appliance_software:8.2.2</product>
<product>adaptive_security_appliance_software:8.2.2</product>
<product>adaptive_security_appliance_software:8.2.3</product>
<product>adaptive_security_appliance_software:8.2.5.52</product>
<product>adaptive_security_appliance_software:8.2.5.55</product>
<product>adaptive_security_appliance_software:8.2.5.57</product>
<product>adaptive_security_appliance_software:8.3%281%29</product>
<product>adaptive_security_appliance_software:8.3%282%29</product>
<product>adaptive_security_appliance_software:8.3%282.34%29</product>
<product>adaptive_security_appliance_software:8.3%282.37%29</product>
<product>adaptive_security_appliance_software:8.3.1</product>
<product>adaptive_security_appliance_software:8.3.1</product>
<product>adaptive_security_appliance_software:8.3.2</product>
<product>adaptive_security_appliance_software:8.3.2.44</product>
<product>adaptive_security_appliance_software:8.4%28.2%29</product>
<product>adaptive_security_appliance_software:8.4%28.2.1%29</product>
<product>adaptive_security_appliance_software:8.4%28.2.8%29</product>
<product>adaptive_security_appliance_software:8.4%28.3%29</product>
<product>adaptive_security_appliance_software:8.4%28.3.8%29</product>
<product>adaptive_security_appliance_software:8.4%28.3.9%29</product>
<product>adaptive_security_appliance_software:8.4%28.4%29</product>
<product>adaptive_security_appliance_software:8.4%28.4.1%29</product>
<product>adaptive_security_appliance_software:8.4%28.4.3%29</product>
<product>adaptive_security_appliance_software:8.4%28.4.5%29</product>
<product>adaptive_security_appliance_software:8.4%28.4.9%29</product>
<product>adaptive_security_appliance_software:8.4%28.5%29</product>
<product>adaptive_security_appliance_software:8.4%28.5.6%29</product>
<product>adaptive_security_appliance_software:8.4%28.6%29</product>
<product>adaptive_security_appliance_software:8.4%28.7%29</product>
<product>adaptive_security_appliance_software:8.4%28.7.3%29</product>
<product>adaptive_security_appliance_software:8.4%28.7.15%29</product>
<product>adaptive_security_appliance_software:8.4%281%29</product>
<product>adaptive_security_appliance_software:8.4%281.11%29</product>
<product>adaptive_security_appliance_software:8.4%282%29</product>
<product>adaptive_security_appliance_software:8.4%282.11%29</product>
<product>adaptive_security_appliance_software:8.4%283%29</product>
<product>adaptive_security_appliance_software:8.4%284.11%29</product>
<product>adaptive_security_appliance_software:8.4%285%29</product>
<product>adaptive_security_appliance_software:8.4%286%29</product>
<product>adaptive_security_appliance_software:8.4.0</product>
<product>adaptive_security_appliance_software:8.4.1</product>
<product>adaptive_security_appliance_software:8.4.1.3</product>
<product>adaptive_security_appliance_software:8.4.1.11</product>
<product>adaptive_security_appliance_software:8.4.2</product>
<product>adaptive_security_appliance_software:8.4.2.1</product>
<product>adaptive_security_appliance_software:8.4.2.8</product>
<product>adaptive_security_appliance_software:8.4.3</product>
<product>adaptive_security_appliance_software:8.4.3.8</product>
<product>adaptive_security_appliance_software:8.4.3.9</product>
<product>adaptive_security_appliance_software:8.4.4</product>
<product>adaptive_security_appliance_software:8.4.4.1</product>
<product>adaptive_security_appliance_software:8.4.4.3</product>
<product>adaptive_security_appliance_software:8.4.4.5</product>
<product>adaptive_security_appliance_software:8.4.4.9</product>
<product>adaptive_security_appliance_software:8.4.5</product>
<product>adaptive_security_appliance_software:8.4.5.6</product>
<product>adaptive_security_appliance_software:8.4.6</product>
<product>adaptive_security_appliance_software:8.4.7</product>
<product>adaptive_security_appliance_software:8.4.7.3</product>
<product>adaptive_security_appliance_software:8.4.7.15</product>
<product>adaptive_security_appliance_software:8.4.7.22</product>
<product>adaptive_security_appliance_software:8.4.7.23</product>
<product>adaptive_security_appliance_software:8.4.7.26</product>
<product>adaptive_security_appliance_software:8.4.7.28</product>
<product>adaptive_security_appliance_software:8.4.7.29</product>
<product>adaptive_security_appliance_software:8.5</product>
<product>adaptive_security_appliance_software:8.5%281%29</product>
<product>adaptive_security_appliance_software:8.5%281.4%29</product>
<product>adaptive_security_appliance_software:8.5%281.17%29</product>
<product>adaptive_security_appliance_software:8.6</product>
<product>adaptive_security_appliance_software:8.6%281%29</product>
<product>adaptive_security_appliance_software:8.6%281.2%29</product>
<product>adaptive_security_appliance_software:8.6%281.3%29</product>
<product>adaptive_security_appliance_software:8.6%281.10%29</product>
<product>adaptive_security_appliance_software:8.7</product>
<product>adaptive_security_appliance_software:8.7%281.1%29</product>
<product>adaptive_security_appliance_software:8.7%281.3%29</product>
<product>adaptive_security_appliance_software:8.7.1</product>
<product>adaptive_security_appliance_software:8.7.1.1</product>
<product>adaptive_security_appliance_software:8.7.1.3</product>
<product>adaptive_security_appliance_software:8.7.1.8</product>
<product>adaptive_security_appliance_software:8.7.1.17</product>
<product>adaptive_security_appliance_software:9.0%28.3.6%29</product>
<product>adaptive_security_appliance_software:9.0%28.3.8%29</product>
<product>adaptive_security_appliance_software:9.0%28.4%29</product>
<product>adaptive_security_appliance_software:9.0%28.4.1%29</product>
<product>adaptive_security_appliance_software:9.0%281%29</product>
<product>adaptive_security_appliance_software:9.0%282%29</product>
<product>adaptive_security_appliance_software:9.0%283%29</product>
<product>adaptive_security_appliance_software:9.0.3%286%29</product>
<product>adaptive_security_appliance_software:9.0.4.24</product>
<product>adaptive_security_appliance_software:9.0.4.26</product>
<product>adaptive_security_appliance_software:9.0.4.29</product>
<product>adaptive_security_appliance_software:9.0.4.37</product>
<product>adaptive_security_appliance_software:9.1</product>
<product>adaptive_security_appliance_software:9.1%28.2%29</product>
<product>adaptive_security_appliance_software:9.1%28.5%29</product>
<product>adaptive_security_appliance_software:9.1%281%29</product>
<product>adaptive_security_appliance_software:9.1%281.7%29</product>
<product>adaptive_security_appliance_software:9.1%282%29</product>
<product>adaptive_security_appliance_software:9.1%283%29</product>
<product>adaptive_security_appliance_software:9.1.1</product>
<product>adaptive_security_appliance_software:9.1.4.5</product>
<product>adaptive_security_appliance_software:9.1.5.12</product>
<product>adaptive_security_appliance_software:9.1.5.21</product>
<product>adaptive_security_appliance_software:9.1.6</product>
<product>adaptive_security_appliance_software:9.1.6.8</product>
<product>adaptive_security_appliance_software:9.1.6.10</product>
<product>adaptive_security_appliance_software:9.2%283.1%29</product>
<product>adaptive_security_appliance_software:9.2.2.7</product>
<product>adaptive_security_appliance_software:9.2.2.8</product>
<product>adaptive_security_appliance_software:9.2.3.3</product>
<product>adaptive_security_appliance_software:9.2.4</product>
<product>adaptive_security_appliance_software:9.2.4.2</product>
<product>adaptive_security_appliance_software:9.2.4.4</product>
<product>adaptive_security_appliance_software:9.2%5c%280.0%5c%29</product>
<product>adaptive_security_appliance_software:9.2%5c%280.104%5c%29</product>
<product>adaptive_security_appliance_software:9.2%5c%283.1%5c%29</product>
<product>adaptive_security_appliance_software:9.3%28.2%29</product>
<product>adaptive_security_appliance_software:9.3%281.50%29</product>
<product>adaptive_security_appliance_software:9.3%282.243%29</product>
<product>adaptive_security_appliance_software:9.3%283%29</product>
<product>adaptive_security_appliance_software:9.3.1.1</product>
<product>adaptive_security_appliance_software:9.3.2</product>
<product>adaptive_security_appliance_software:9.3.2.2</product>
<product>adaptive_security_appliance_software:9.3.3.5</product>
<product>adaptive_security_appliance_software:9.3.3.6</product>
<product>adaptive_security_appliance_software:9.3.5</product>
<product>adaptive_security_appliance_software:9.4%281%29</product>
<product>adaptive_security_appliance_software:9.4%281.1%29</product>
<product>adaptive_security_appliance_software:9.4.1</product>
<product>adaptive_security_appliance_software:9.4.1.1</product>
<product>adaptive_security_appliance_software:9.4.1.2</product>
<product>adaptive_security_appliance_software:9.4.1.3</product>
<product>adaptive_security_appliance_software:9.4.1.5</product>
<product>adaptive_security_appliance_software:9.4.2</product>
<product>adaptive_security_appliance_software:9.4.2.3</product>
<product>adaptive_security_appliance_software:9.4.3.3</product>
<product>adaptive_security_appliance_software:8.6.1.12</product>
<product>adaptive_security_appliance_software:9.1.1</product>
<product>adaptive_security_appliance_software:9.1.1.4</product>
<product>adaptive_security_appliance_software:9.1.2</product>
<product>adaptive_security_appliance_software:9.1.2.8</product>
<product>adaptive_security_appliance_software:9.1.3</product>
<product>adaptive_security_appliance_software:9.1.3.2</product>
<product>adaptive_security_appliance_software:9.1.4</product>
<product>adaptive_security_appliance_software:9.1.4.5</product>
<product>adaptive_security_appliance_software:9.1.5</product>
<product>adaptive_security_appliance_software:9.1.5.10</product>
<product>adaptive_security_appliance_software:9.1.5.12</product>
<product>adaptive_security_appliance_software:9.1.5.15</product>
<product>adaptive_security_appliance_software:9.1.5.21</product>
<product>adaptive_security_appliance_software:9.2.1</product>
<product>adaptive_security_appliance_software:9.2.2</product>
<product>adaptive_security_appliance_software:9.2.2.4</product>
<product>adaptive_security_appliance_software:9.2.2.7</product>
<product>adaptive_security_appliance_software:9.2.2.8</product>
<product>adaptive_security_appliance_software:9.2.3</product>
<product>adaptive_security_appliance_software:9.3.1</product>
<product>adaptive_security_appliance_software:9.3.1.1</product>
<product>adaptive_security_appliance_software:9.3.2</product>
<product>adaptive_security_appliance_software:9.3.2.2</product>
</cve>
<cve id="CVE-2016-1444" level="MEDIUM">
<product>telepresence_video_communication_server:x8.1.1</product>
<product>telepresence_video_communication_server:x8.1.2</product>
<product>telepresence_video_communication_server:x8.1_base</product>
<product>telepresence_video_communication_server:x8.2.1</product>
<product>telepresence_video_communication_server:x8.2.2</product>
<product>telepresence_video_communication_server:x8.2_base</product>
<product>telepresence_video_communication_server:x8.5</product>
<product>telepresence_video_communication_server:x8.5.0</product>
<product>telepresence_video_communication_server:x8.5.1</product>
<product>telepresence_video_communication_server:x8.5.2</product>
<product>telepresence_video_communication_server:x8.5.3</product>
<product>telepresence_video_communication_server:x8.6.0</product>
<product>telepresence_video_communication_server:x8.6.1</product>
<product>telepresence_video_communication_server:x8.7_base</product>
<product>telepresence_video_communication_server_software:x8.5.1</product>
<product>telepresence_video_communication_server_software:x8.5.2</product>
<product>telepresence_video_communication_server_software:x8.5.3</product>
<product>telepresence_video_communication_server_software:x8.6</product>
</cve>
<cve id="CVE-2016-1447" level="MEDIUM">
<product>webex_meetings_server:2.6.0</product>
<product>webex_meetings_server:2.6.1.39</product>
</cve>
<cve id="CVE-2016-1446" level="LOW">
<product>webex_meetings_server:2.6.0</product>
<product>webex_meetings_server:2.6.1.39</product>
</cve>
<cve id="CVE-2016-1441" level="LOW">
<product>cloud_network_automation_provisioner:1.0%280%29</product>
</cve>
<cve id="CVE-2016-1440" level="LOW">
<product>web_security_appliance:5.6.0-623</product>
<product>web_security_appliance:6.0.0-000</product>
<product>web_security_appliance:7.1.0</product>
<product>web_security_appliance:7.1.1</product>
<product>web_security_appliance:7.1.2</product>
<product>web_security_appliance:7.1.3</product>
<product>web_security_appliance:7.1.4</product>
<product>web_security_appliance:7.5.0-000</product>
<product>web_security_appliance:7.5.0-825</product>
<product>web_security_appliance:7.5.1-000</product>
<product>web_security_appliance:7.5.2-000</product>
<product>web_security_appliance:7.5.2-hp2-303</product>
<product>web_security_appliance:7.7.0-000</product>
<product>web_security_appliance:7.7.0-608</product>
<product>web_security_appliance:7.7.1-000</product>
<product>web_security_appliance:7.7.5-835</product>
<product>web_security_appliance:8.0.0-000</product>
<product>web_security_appliance:8.0.5</product>
<product>web_security_appliance:8.0.5_hp1</product>
<product>web_security_appliance:8.0.6</product>
<product>web_security_appliance:8.0.6-078</product>
<product>web_security_appliance:8.0.6-119</product>
<product>web_security_appliance:8.0.7</product>
<product>web_security_appliance:8.0.7-142</product>
<product>web_security_appliance:8.0.8-mr-113</product>
<product>web_security_appliance:8.5.0-497</product>
<product>web_security_appliance:8.5.0.000</product>
<product>web_security_appliance:8.5.1-021</product>
<product>web_security_appliance:8.5.2-024</product>
<product>web_security_appliance:8.5.2-027</product>
<product>web_security_appliance:8.5.3-055</product>
<product>web_security_appliance:8.8.0-000</product>
<product>web_security_appliance:8.8.0-085</product>
<product>web_security_appliance:9.0.0-193</product>
<product>web_security_appliance:9.0_base</product>
<product>web_security_appliance:9.1.0-000</product>
<product>web_security_appliance:9.1.0-070</product>
</cve>
<cve id="CVE-2016-1443" level="MEDIUM">
<product>amp_threat_grid_appliance:1.0_base</product>
<product>amp_threat_grid_appliance:1.1_base</product>
<product>amp_threat_grid_appliance:1.2.1</product>
<product>amp_threat_grid_appliance:1.2_base</product>
<product>amp_threat_grid_appliance:1.3_base</product>
<product>amp_threat_grid_appliance:1.4.1</product>
<product>amp_threat_grid_appliance:1.4.2</product>
<product>amp_threat_grid_appliance:1.4.3</product>
<product>amp_threat_grid_appliance:1.4.4</product>
<product>amp_threat_grid_appliance:1.4.5</product>
<product>amp_threat_grid_appliance:1.4.6</product>
<product>amp_threat_grid_appliance:1.4_base</product>
<product>amp_threat_grid_appliance:2.0.1</product>
<product>amp_threat_grid_appliance:2.0.2</product>
<product>amp_threat_grid_appliance:2.0.3</product>
<product>amp_threat_grid_appliance:2.0.4</product>
<product>amp_threat_grid_appliance:2.0_base</product>
<product>amp_threat_grid_appliance:2.1_base</product>
</cve>
<cve id="CVE-2016-1442" level="LOW">
<product>prime_infrastructure:3.0.0</product>
<product>prime_infrastructure:3.0_base</product>
<product>prime_infrastructure:3.1.0</product>
</cve>
<cve id="CVE-2016-1052" level="LOW">
<product>acrobat:11.0.15</product>
<product>acrobat_dc:15.006.30121</product>
<product>acrobat_dc:15.010.20060</product>
<product>acrobat_reader_dc:15.006.30121</product>
<product>acrobat_reader_dc:15.010.20060</product>
<product>reader:11.0.15</product>
</cve>
<cve id="CVE-2016-1053" level="LOW">
<product>acrobat:11.0.15</product>
<product>acrobat_dc:15.006.30121</product>
<product>acrobat_dc:15.010.20060</product>
<product>acrobat_reader_dc:15.006.30121</product>
<product>acrobat_reader_dc:15.010.20060</product>
<product>reader:11.0.15</product>
</cve>
<cve id="CVE-2016-5383" level="LOW">
<product>cloudforms:4.1</product>
</cve>
<cve id="CVE-2016-1050" level="LOW">
<product>acrobat:11.0.15</product>
<product>acrobat_dc:15.006.30121</product>
<product>acrobat_dc:15.010.20060</product>
<product>acrobat_reader_dc:15.006.30121</product>
<product>acrobat_reader_dc:15.010.20060</product>
<product>reader:11.0.15</product>
</cve>
<cve id="CVE-2016-2387" level="MEDIUM">
<product>netweaver:7.40</product>
</cve>
<cve id="CVE-2016-2386" level="LOW">
<product>netweaver:7.40</product>
</cve>
<cve id="CVE-2016-1056" level="LOW">
<product>acrobat:11.0.15</product>
<product>acrobat_dc:15.006.30121</product>
<product>acrobat_dc:15.010.20060</product>
<product>acrobat_reader_dc:15.006.30121</product>
<product>acrobat_reader_dc:15.010.20060</product>
<product>reader:11.0.15</product>
</cve>
<cve id="CVE-2016-2389" level="LOW">
<product>netweaver:7.40</product>
</cve>
<cve id="CVE-2016-2388" level="LOW">
<product>netweaver:7.40</product>
</cve>
<cve id="CVE-2016-1054" level="LOW">
<product>acrobat:11.0.15</product>
<product>acrobat_dc:15.006.30121</product>
<product>acrobat_dc:15.010.20060</product>
<product>acrobat_reader_dc:15.006.30121</product>
<product>acrobat_reader_dc:15.010.20060</product>
<product>reader:11.0.15</product>
</cve>
<cve id="CVE-2016-1055" level="LOW">
<product>acrobat:11.0.15</product>
<product>acrobat_dc:15.006.30121</product>
<product>acrobat_dc:15.010.20060</product>
<product>acrobat_reader_dc:15.006.30121</product>
<product>acrobat_reader_dc:15.010.20060</product>
<product>reader:11.0.15</product>
</cve>
<cve id="CVE-2016-3664" level="MEDIUM">
<product>mobile_security:3.1</product>
</cve>
<cve id="CVE-2016-5528" level="MEDIUM">
<product>glassfish_server:2.1.1</product>
<product>glassfish_server:3.0.1</product>
<product>glassfish_server:3.1.2</product>
</cve>
<cve id="CVE-2016-5529" level="MEDIUM">
<product>peoplesoft_enterprise_peopletools:8.54</product>
<product>peoplesoft_enterprise_peopletools:8.55</product>
</cve>
<cve id="CVE-2016-5526" level="LOW">
<product>agile_product_lifecycle_management_framework:9.3.4</product>
<product>agile_product_lifecycle_management_framework:9.3.5</product>
</cve>
<cve id="CVE-2016-5527" level="MEDIUM">
<product>agile_product_lifecycle_management_framework:9.3.4</product>
<product>agile_product_lifecycle_management_framework:9.3.5</product>
</cve>
<cve id="CVE-2016-5524" level="LOW">
<product>agile_product_lifecycle_management_framework:9.3.4</product>
<product>agile_product_lifecycle_management_framework:9.3.5</product>
</cve>
<cve id="CVE-2016-5522" level="LOW">
<product>agile_product_lifecycle_management_framework:9.3.4</product>
<product>agile_product_lifecycle_management_framework:9.3.5</product>
</cve>
<cve id="CVE-2016-5523" level="LOW">
<product>agile_product_lifecycle_management_framework:9.3.4</product>
<product>agile_product_lifecycle_management_framework:9.3.5</product>
</cve>
<cve id="CVE-2016-5521" level="LOW">
<product>agile_product_lifecycle_management_framework:9.3.4</product>
<product>agile_product_lifecycle_management_framework:9.3.5</product>
</cve>
<cve id="CVE-2016-0921" level="MEDIUM">
<product>avamar_server:7.3.0</product>
</cve>
<cve id="CVE-2016-0920" level="LOW">
<product>avamar_server:7.3.0</product>
</cve>
<cve id="CVE-2016-0923" level="HIGH">
<product>rsa_bsafe:4.0.0</product>
<product>rsa_bsafe:4.0.1</product>
<product>rsa_bsafe:4.0.2</product>
<product>rsa_bsafe:4.0.3</product>
<product>rsa_bsafe:4.0.4</product>
<product>rsa_bsafe:4.0.5</product>
<product>rsa_bsafe:4.0.6</product>
<product>rsa_bsafe:4.0.7</product>
<product>rsa_bsafe:4.0.8</product>
<product>rsa_bsafe:4.1.0</product>
<product>rsa_bsafe:4.1.1</product>
<product>rsa_bsafe:4.1.2</product>
<product>rsa_bsafe:4.1.3</product>
<product>rsa_bsafe:4.1.4</product>
</cve>
<cve id="CVE-2016-0922" level="LOW">
<product>vipr_srm:3.7.1</product>
</cve>
<cve id="CVE-2016-0925" level="MEDIUM">
<product>rsa_adaptive_authentication_on-premise:7.2</product>
</cve>
<cve id="CVE-2016-0927" level="MEDIUM">
<product>cloud_foundry_elastic_runtime:1.6.0</product>
<product>cloud_foundry_elastic_runtime:1.6.1</product>
<product>cloud_foundry_elastic_runtime:1.6.2</product>
<product>cloud_foundry_elastic_runtime:1.6.3</product>
<product>cloud_foundry_elastic_runtime:1.6.4</product>
<product>cloud_foundry_elastic_runtime:1.6.5</product>
<product>cloud_foundry_elastic_runtime:1.6.6</product>
<product>cloud_foundry_elastic_runtime:1.6.7</product>
<product>cloud_foundry_elastic_runtime:1.6.8</product>
<product>cloud_foundry_elastic_runtime:1.6.9</product>
<product>cloud_foundry_elastic_runtime:1.6.10</product>
<product>cloud_foundry_elastic_runtime:1.6.11</product>
<product>cloud_foundry_elastic_runtime:1.6.12</product>
<product>cloud_foundry_elastic_runtime:1.6.13</product>
<product>cloud_foundry_elastic_runtime:1.6.14</product>
<product>cloud_foundry_elastic_runtime:1.6.15</product>
</cve>
<cve id="CVE-2016-0926" level="MEDIUM">
<product>cloud_foundry_elastic_runtime:1.6.31</product>
<product>cloud_foundry_elastic_runtime:1.7.7</product>
</cve>
<cve id="CVE-2016-0929" level="LOW">
<product>rabbitmq:1.6.0</product>
<product>rabbitmq:1.6.1</product>
<product>rabbitmq:1.6.2</product>
<product>rabbitmq:1.6.3</product>
</cve>
<cve id="CVE-2016-0928" level="MEDIUM">
<product>cloud_foundry_elastic_runtime:1.6.29</product>
<product>cloud_foundry_elastic_runtime:1.7.0</product>
<product>cloud_foundry_elastic_runtime:1.7.1</product>
<product>cloud_foundry_elastic_runtime:1.7.2</product>
<product>cloud_foundry_elastic_runtime:1.7.3</product>
<product>cloud_foundry_elastic_runtime:1.7.4</product>
<product>cloud_foundry_elastic_runtime:1.7.5</product>
<product>cloud_foundry_elastic_runtime:1.7.6</product>
<product>cloud_foundry_elastic_runtime:1.7.7</product>
</cve>
<cve id="CVE-2016-10024" level="LOW">
<product>xenserver:6.0.2</product>
<product>xenserver:6.2.0</product>
<product>xenserver:6.5</product>
<product>xenserver:7.0</product>
<product>xen:4.8.0</product>
</cve>
<cve id="CVE-2016-10537" level="MEDIUM">
<product>backbone:0.3.3</product>
</cve>
<cve id="CVE-2016-10535" level="MEDIUM">
<product>csrf-lite:0.1.1</product>
</cve>
<cve id="CVE-2016-3366" level="MEDIUM">
<product>outlook:2007</product>
<product>outlook:2010</product>
<product>outlook:2013</product>
<product>outlook:2016</product>
<product>outlook_2013_rt:-</product>
</cve>
<cve id="CVE-2016-3367" level="MEDIUM">
<product>silverlight:5.0</product>
</cve>
<cve id="CVE-2016-3364" level="MEDIUM">
<product>visio:2016</product>
</cve>
<cve id="CVE-2016-3361" level="MEDIUM">
<product>excel:2010</product>
</cve>
<cve id="CVE-2016-8718" level="MEDIUM">
<product>awk-3131a_firmware:1.1</product>
</cve>
<cve id="CVE-2016-8719" level="MEDIUM">
<product>awk-3131a_firmware:1.1</product>
</cve>
<cve id="CVE-2016-8712" level="MEDIUM">
<product>awk-3131a_firmware:1.1</product>
</cve>
<cve id="CVE-2016-8713" level="MEDIUM">
<product>nitro_pro:10.5.5.9</product>
</cve>
<cve id="CVE-2016-8710" level="MEDIUM">
<product>libbpg:0.9.4</product>
<product>libbpg:0.9.7</product>
</cve>
<cve id="CVE-2016-8711" level="MEDIUM">
<product>nitro_pro:10.5.9.9</product>
</cve>
<cve id="CVE-2016-8716" level="LOW">
<product>awk-3131a_firmware:1.1</product>
</cve>
<cve id="CVE-2016-8717" level="LOW">
<product>awk-3131a_firmware:1.1</product>
</cve>
<cve id="CVE-2016-8714" level="MEDIUM">
<product>r:3.3.0</product>
<product>r:3.3.2</product>
</cve>
<cve id="CVE-2016-8715" level="MEDIUM">
<product>argus:6.6.05</product>
</cve>
<cve id="CVE-2016-0547" level="LOW">
<product>e-business_intelligence:11.5.10.2</product>
</cve>
<cve id="CVE-2016-0545" level="LOW">
<product>customer_intelligence:11.5.10.2</product>
<product>customer_intelligence:12.1.1</product>
<product>customer_intelligence:12.1.2</product>
<product>customer_intelligence:12.1.3</product>
<product>customer_intelligence:12.2.3</product>
<product>customer_intelligence:12.2.4</product>
<product>customer_intelligence:12.2.5</product>
</cve>
<cve id="CVE-2016-0544" level="LOW">
<product>marketing:11.5.10.2</product>
</cve>
<cve id="CVE-2016-0543" level="LOW">
<product>marketing:11.5.10.2</product>
</cve>
<cve id="CVE-2016-0542" level="MEDIUM">
<product>field_service:12.1.1</product>
<product>field_service:12.1.2</product>
<product>field_service:12.1.3</product>
<product>field_service:12.2.3</product>
<product>field_service:12.2.4</product>
<product>field_service:12.2.5</product>
</cve>
<cve id="CVE-2016-0541" level="LOW">
<product>configurator:11.5.10.2</product>
<product>configurator:12.1</product>
<product>configurator:12.2</product>
</cve>
<cve id="CVE-2016-0540" level="LOW">
<product>configurator:11.5.10.2</product>
<product>configurator:12.1</product>
<product>configurator:12.2</product>
</cve>
<cve id="CVE-2016-0549" level="LOW">
<product>e-business_intelligence:11.5.10.2</product>
</cve>
<cve id="CVE-2016-0548" level="LOW">
<product>e-business_intelligence:11.5.10.2</product>
</cve>
<cve id="CVE-2016-1140" level="MEDIUM">
<product>home_spot_cube_firmware:2.0</product>
</cve>
<cve id="CVE-2016-1141" level="LOW">
<product>home_spot_cube_firmware:2.0</product>
</cve>
<cve id="CVE-2016-1142" level="LOW">
<product>acmailer:3.8.20</product>
<product>acmailer:3.9.14</product>
</cve>
<cve id="CVE-2016-1143" level="MEDIUM">
<product>vine_mv:2015-09-09</product>
</cve>
<cve id="CVE-2016-1144" level="MEDIUM">
<product>job_web_system:1.0.6</product>
<product>job_web_system:1.2.1</product>
</cve>
<cve id="CVE-2016-1145" level="LOW">
<product>expresscluster_x:3.3</product>
<product>expresscluster_x:3.3</product>
</cve>
<cve id="CVE-2016-4467" level="MEDIUM">
<product>qpid_proton:0.8.0</product>
<product>qpid_proton:0.9.0</product>
<product>qpid_proton:0.9.1</product>
<product>qpid_proton:0.10.0</product>
<product>qpid_proton:0.11.0</product>
<product>qpid_proton:0.11.1</product>
<product>qpid_proton:0.12.0</product>
<product>qpid_proton:0.12.1</product>
<product>qpid_proton:0.12.2</product>
<product>qpid_proton:0.13.0</product>
</cve>
<cve id="CVE-2016-1148" level="MEDIUM">
<product>smart_lock_robot:1.2.3</product>
</cve>
<cve id="CVE-2016-4469" level="MEDIUM">
<product>archiva:1.3.9</product>
</cve>
<cve id="CVE-2016-9150" level="LOW">
<product>pan-os:5.0.19</product>
<product>pan-os:5.1.12</product>
<product>pan-os:6.0.14</product>
<product>pan-os:6.1.14</product>
<product>pan-os:7.0.10</product>
<product>pan-os:7.1.5</product>
</cve>
<cve id="CVE-2016-7843" level="MEDIUM">
<product>attachecase_for_java:0.6.0</product>
<product>attachecase_lite:1.4.6</product>
<product>attachecase_pro:1.5.7</product>
</cve>
<cve id="CVE-2016-7842" level="MEDIUM">
<product>attachecase:2.8.2.8</product>
<product>attachecase:3.2.0.4</product>
</cve>
<cve id="CVE-2016-7841" level="MEDIUM">
<product>olive_diary_dx:-</product>
</cve>
<cve id="CVE-2016-7840" level="MEDIUM">
<product>olive_blog:-</product>
</cve>
<cve id="CVE-2016-7845" level="LOW">
<product>gigacc_office:2.3</product>
</cve>
<cve id="CVE-2016-7844" level="MEDIUM">
<product>gigacc_office:2.3</product>
</cve>
<cve id="CVE-2016-9445" level="LOW">
<product>gstreamer_plugin:1.10</product>
</cve>
<cve id="CVE-2016-9444" level="LOW">
<product>bind:9.0</product>
<product>bind:9.0.0</product>
<product>bind:9.0.0</product>
<product>bind:9.0.0</product>
<product>bind:9.0.0</product>
<product>bind:9.0.0</product>
<product>bind:9.0.0</product>
<product>bind:9.0.1</product>
<product>bind:9.0.1</product>
<product>bind:9.0.1</product>
<product>bind:9.1</product>
<product>bind:9.1.0</product>
<product>bind:9.1.1</product>
<product>bind:9.1.1</product>
<product>bind:9.1.1</product>
<product>bind:9.1.1</product>
<product>bind:9.1.1</product>
<product>bind:9.1.1</product>
<product>bind:9.1.1</product>
<product>bind:9.1.1</product>
<product>bind:9.1.2</product>
<product>bind:9.1.2</product>
<product>bind:9.1.3</product>
<product>bind:9.1.3</product>
<product>bind:9.1.3</product>
<product>bind:9.1.3</product>
<product>bind:9.2</product>
<product>bind:9.2.0</product>
<product>bind:9.2.0</product>
<product>bind:9.2.0</product>
<product>bind:9.2.0</product>
<product>bind:9.2.0</product>
<product>bind:9.2.0</product>
<product>bind:9.2.0</product>
<product>bind:9.2.0</product>
<product>bind:9.2.0</product>
<product>bind:9.2.0</product>
<product>bind:9.2.0</product>
<product>bind:9.2.0</product>
<product>bind:9.2.0</product>
<product>bind:9.2.0</product>
<product>bind:9.2.0</product>
<product>bind:9.2.0</product>
<product>bind:9.2.1</product>
<product>bind:9.2.1</product>
<product>bind:9.2.1</product>
<product>bind:9.2.2</product>
<product>bind:9.2.2</product>
<product>bind:9.2.2</product>
<product>bind:9.2.2</product>
<product>bind:9.2.3</product>
<product>bind:9.2.3</product>
<product>bind:9.2.3</product>
<product>bind:9.2.3</product>
<product>bind:9.2.3</product>
<product>bind:9.2.4</product>
<product>bind:9.2.4</product>
<product>bind:9.2.4</product>
<product>bind:9.2.4</product>
<product>bind:9.2.4</product>
<product>bind:9.2.4</product>
<product>bind:9.2.4</product>
<product>bind:9.2.4</product>
<product>bind:9.2.5</product>
<product>bind:9.2.5</product>
<product>bind:9.2.5</product>
<product>bind:9.2.6</product>
<product>bind:9.2.6</product>
<product>bind:9.2.7</product>
<product>bind:9.2.7</product>
<product>bind:9.2.7</product>
<product>bind:9.2.7</product>
<product>bind:9.2.8</product>
<product>bind:9.2.9</product>
<product>bind:9.2.9</product>
<product>bind:9.3</product>
<product>bind:9.3.0</product>
<product>bind:9.3.0</product>
<product>bind:9.3.0</product>
<product>bind:9.3.0</product>
<product>bind:9.3.0</product>
<product>bind:9.3.0</product>
<product>bind:9.3.0</product>
<product>bind:9.3.0</product>
<product>bind:9.3.1</product>
<product>bind:9.3.1</product>
<product>bind:9.3.1</product>
<product>bind:9.3.2</product>
<product>bind:9.3.2</product>
<product>bind:9.3.3</product>
<product>bind:9.3.3</product>
<product>bind:9.3.3</product>
<product>bind:9.3.3</product>
<product>bind:9.3.4</product>
<product>bind:9.3.5</product>
<product>bind:9.3.5</product>
<product>bind:9.3.5</product>
<product>bind:9.3.5</product>
<product>bind:9.3.6</product>
<product>bind:9.3.6</product>
<product>bind:9.4</product>
<product>bind:9.4</product>
<product>bind:9.4</product>
<product>bind:9.4</product>
<product>bind:9.4</product>
<product>bind:9.4</product>
<product>bind:9.4</product>
<product>bind:9.4</product>
<product>bind:9.4</product>
<product>bind:9.4</product>
<product>bind:9.4</product>
<product>bind:9.4</product>
<product>bind:9.4.0</product>
<product>bind:9.4.0</product>
<product>bind:9.4.0</product>
<product>bind:9.4.0</product>
<product>bind:9.4.0</product>
<product>bind:9.4.0</product>
<product>bind:9.4.0</product>
<product>bind:9.4.0</product>
<product>bind:9.4.0</product>
<product>bind:9.4.0</product>
<product>bind:9.4.0</product>
<product>bind:9.4.0</product>
<product>bind:9.4.0</product>
<product>bind:9.4.1</product>
<product>bind:9.4.2</product>
<product>bind:9.4.2</product>
<product>bind:9.4.2</product>
<product>bind:9.4.2</product>
<product>bind:9.4.3</product>
<product>bind:9.4.3</product>
<product>bind:9.4.3</product>
<product>bind:9.4.3</product>
<product>bind:9.4.3</product>
<product>bind:9.4.3</product>
<product>bind:9.4.3</product>
<product>bind:9.4.3</product>
<product>bind:9.4.3</product>
<product>bind:9.4.3</product>
<product>bind:9.5</product>
<product>bind:9.5.0</product>
<product>bind:9.5.0</product>
<product>bind:9.5.0</product>
<product>bind:9.5.0</product>
<product>bind:9.5.0</product>
<product>bind:9.5.0</product>
<product>bind:9.5.0</product>
<product>bind:9.5.0</product>
<product>bind:9.5.0</product>
<product>bind:9.5.0</product>
<product>bind:9.5.0</product>
<product>bind:9.5.0</product>
<product>bind:9.5.0</product>
<product>bind:9.5.0</product>
<product>bind:9.5.0</product>
<product>bind:9.5.0</product>
<product>bind:9.5.1</product>
<product>bind:9.5.1</product>
<product>bind:9.5.1</product>
<product>bind:9.5.1</product>
<product>bind:9.5.1</product>
<product>bind:9.5.1</product>
<product>bind:9.5.2</product>
<product>bind:9.5.2</product>
<product>bind:9.5.2</product>
<product>bind:9.5.2</product>
<product>bind:9.5.2</product>
<product>bind:9.5.2</product>
<product>bind:9.5.2</product>
<product>bind:9.5.3</product>
<product>bind:9.5.3</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6.0</product>
<product>bind:9.6.0</product>
<product>bind:9.6.0</product>
<product>bind:9.6.0</product>
<product>bind:9.6.0</product>
<product>bind:9.6.0</product>
<product>bind:9.6.1</product>
<product>bind:9.6.1</product>
<product>bind:9.6.1</product>
<product>bind:9.6.1</product>
<product>bind:9.6.1</product>
<product>bind:9.6.1</product>
<product>bind:9.6.2</product>
<product>bind:9.6.2</product>
<product>bind:9.6.2</product>
<product>bind:9.6.2</product>
<product>bind:9.6.2</product>
<product>bind:9.6.2</product>
<product>bind:9.6.3</product>
<product>bind:9.6.3</product>
<product>bind:9.6.3</product>
<product>bind:9.7.0</product>
<product>bind:9.7.0</product>
<product>bind:9.7.0</product>
<product>bind:9.7.0</product>
<product>bind:9.7.0</product>
<product>bind:9.7.0</product>
<product>bind:9.7.0</product>
<product>bind:9.7.0</product>
<product>bind:9.7.0</product>
<product>bind:9.7.0</product>
<product>bind:9.7.0</product>
<product>bind:9.7.1</product>
<product>bind:9.7.1</product>
<product>bind:9.7.1</product>
<product>bind:9.7.1</product>
<product>bind:9.7.1</product>
<product>bind:9.7.2</product>
<product>bind:9.7.2</product>
<product>bind:9.7.2</product>
<product>bind:9.7.2</product>
<product>bind:9.7.2</product>
<product>bind:9.7.3</product>
<product>bind:9.7.3</product>
<product>bind:9.7.3</product>
<product>bind:9.7.3</product>
<product>bind:9.7.4</product>
<product>bind:9.7.4</product>
<product>bind:9.7.4</product>
<product>bind:9.7.4</product>
<product>bind:9.7.5</product>
<product>bind:9.7.5</product>
<product>bind:9.7.5</product>
<product>bind:9.7.5</product>
<product>bind:9.7.6</product>
<product>bind:9.7.6</product>
<product>bind:9.7.6</product>
<product>bind:9.7.6</product>
<product>bind:9.7.6</product>
<product>bind:9.7.7</product>
<product>bind:9.8.0</product>
<product>bind:9.8.0</product>
<product>bind:9.8.0</product>
<product>bind:9.8.0</product>
<product>bind:9.8.0</product>
<product>bind:9.8.0</product>
<product>bind:9.8.0</product>
<product>bind:9.8.1</product>
<product>bind:9.9.8</product>
<product>bind:9.9.8</product>
<product>bind:9.9.8</product>
<product>bind:9.9.8</product>
<product>bind:9.9.8</product>
<product>bind:9.9.8</product>
<product>bind:9.9.8</product>
<product>bind:9.9.8</product>
<product>bind:9.9.8</product>
<product>bind:9.9.8</product>
<product>bind:9.9.9</product>
<product>bind:9.9.9</product>
<product>bind:9.9.9</product>
<product>bind:9.9.9</product>
<product>bind:9.9.9</product>
<product>bind:9.9.9</product>
<product>bind:9.10.0</product>
<product>bind:9.10.0</product>
<product>bind:9.10.0</product>
<product>bind:9.10.0</product>
<product>bind:9.10.0</product>
<product>bind:9.10.0</product>
<product>bind:9.10.0</product>
<product>bind:9.10.0</product>
<product>bind:9.10.0</product>
<product>bind:9.10.1</product>
<product>bind:9.10.1</product>
<product>bind:9.10.1</product>
<product>bind:9.10.1</product>
<product>bind:9.10.1</product>
<product>bind:9.10.1</product>
<product>bind:9.10.1</product>
<product>bind:9.10.2</product>
<product>bind:9.10.2</product>
<product>bind:9.10.2</product>
<product>bind:9.10.2</product>
<product>bind:9.10.2</product>
<product>bind:9.10.2</product>
<product>bind:9.10.2</product>
<product>bind:9.10.3</product>
<product>bind:9.10.3</product>
<product>bind:9.10.3</product>
<product>bind:9.10.3</product>
<product>bind:9.10.3</product>
<product>bind:9.10.3</product>
<product>bind:9.10.3</product>
<product>bind:9.10.4</product>
<product>bind:9.10.4</product>
<product>bind:9.10.4</product>
<product>bind:9.10.4</product>
<product>bind:9.10.4</product>
<product>bind:9.10.4</product>
<product>bind:9.11.0</product>
<product>bind:9.11.0</product>
<product>bind:9.11.0</product>
<product>bind:9.11.0</product>
<product>bind:9.11.0</product>
<product>bind:9.11.0</product>
<product>bind:9.11.0</product>
<product>bind:9.11.0</product>
</cve>
<cve id="CVE-2016-9447" level="MEDIUM">
<product>gstreamer:0.10.0</product>
<product>gstreamer:0.10.1</product>
<product>gstreamer:0.10.2</product>
<product>gstreamer:0.10.3</product>
<product>gstreamer:0.10.4</product>
<product>gstreamer:0.10.5</product>
<product>gstreamer:0.10.6</product>
<product>gstreamer:0.10.7</product>
<product>gstreamer:0.10.8</product>
<product>gstreamer:0.10.9</product>
<product>gstreamer:0.10.10</product>
<product>gstreamer:0.10.11</product>
<product>gstreamer:0.10.12</product>
<product>gstreamer:0.10.13</product>
<product>gstreamer:0.10.14</product>
<product>gstreamer:0.10.15</product>
<product>gstreamer:0.10.16</product>
<product>gstreamer:0.10.17</product>
<product>gstreamer:0.10.18</product>
<product>gstreamer:0.10.19</product>
<product>gstreamer:0.10.20</product>
<product>gstreamer:0.10.21</product>
<product>gstreamer:0.10.22</product>
<product>gstreamer:0.10.23</product>
<product>gstreamer:0.10.24</product>
<product>gstreamer:0.10.25</product>
<product>gstreamer:0.10.26</product>
<product>gstreamer:0.10.27</product>
<product>gstreamer:0.10.28</product>
<product>gstreamer:0.10.29</product>
<product>gstreamer:0.10.30</product>
<product>gstreamer:0.10.31</product>
<product>gstreamer:0.10.32</product>
<product>gstreamer:0.10.33</product>
<product>gstreamer:0.10.34</product>
<product>gstreamer:0.10.35</product>
<product>gstreamer:0.10.36</product>
</cve>
<cve id="CVE-2016-9446" level="LOW">
<product>gstreamer</product>
</cve>
<cve id="CVE-2016-9441" level="MEDIUM">
<product>w3m:0.5.3-30</product>
</cve>
<cve id="CVE-2016-9440" level="MEDIUM">
<product>w3m:0.5.3-30</product>
</cve>
<cve id="CVE-2016-9443" level="MEDIUM">
<product>w3m:0.5.3-30</product>
</cve>
<cve id="CVE-2016-9442" level="MEDIUM">
<product>w3m:0.5.3-30</product>
</cve>
<cve id="CVE-2016-9993" level="LOW">
<product>kenexa_lcms_premier:9.0</product>
<product>kenexa_lcms_premier:9.1</product>
<product>kenexa_lcms_premier:9.2</product>
<product>kenexa_lcms_premier:9.2.1</product>
<product>kenexa_lcms_premier:9.3</product>
<product>kenexa_lcms_premier:9.4</product>
<product>kenexa_lcms_premier:9.5</product>
<product>kenexa_lcms_premier:10.0</product>
<product>kenexa_lcms_premier:10.1</product>
<product>kenexa_lcms_premier:10.2</product>
</cve>
<cve id="CVE-2016-9992" level="LOW">
<product>kenexa_lcms_premier:9.0</product>
<product>kenexa_lcms_premier:9.1</product>
<product>kenexa_lcms_premier:9.2</product>
<product>kenexa_lcms_premier:9.2.1</product>
<product>kenexa_lcms_premier:9.3</product>
<product>kenexa_lcms_premier:9.4</product>
<product>kenexa_lcms_premier:9.5</product>
<product>kenexa_lcms_premier:10.0</product>
<product>kenexa_lcms_premier:10.1</product>
<product>kenexa_lcms_premier:10.2</product>
</cve>
<cve id="CVE-2016-9991" level="MEDIUM">
<product>sterling_selling_and_fulfillment_foundation:9.2.0</product>
<product>sterling_selling_and_fulfillment_foundation:9.2.1</product>
<product>sterling_selling_and_fulfillment_foundation:9.3.0</product>
<product>sterling_selling_and_fulfillment_foundation:9.4.0</product>
<product>sterling_selling_and_fulfillment_foundation:9.5.0</product>
</cve>
<cve id="CVE-2016-9990" level="MEDIUM">
<product>inotes:8.5.0.0</product>
<product>inotes:8.5.0.1</product>
<product>inotes:8.5.1.0</product>
<product>inotes:8.5.1.1</product>
<product>inotes:8.5.1.2</product>
<product>inotes:8.5.1.3</product>
<product>inotes:8.5.1.4</product>
<product>inotes:8.5.1.5</product>
<product>inotes:8.5.2.0</product>
<product>inotes:8.5.2.1</product>
<product>inotes:8.5.2.2</product>
<product>inotes:8.5.2.3</product>
<product>inotes:8.5.3.0</product>
<product>inotes:8.5.3.1</product>
<product>inotes:8.5.3.2</product>
<product>inotes:8.5.3.3</product>
<product>inotes:8.5.3.4</product>
<product>inotes:8.5.3.5</product>
<product>inotes:8.5.3.6</product>
<product>inotes:9.0.0.0</product>
<product>inotes:9.0.1.0</product>
<product>inotes:9.0.1.1</product>
<product>inotes:9.0.1.2</product>
<product>inotes:9.0.1.3</product>
<product>inotes:9.0.1.4</product>
<product>inotes:9.0.1.5</product>
<product>inotes:9.0.1.6</product>
</cve>
<cve id="CVE-2016-9449" level="LOW">
<product>drupal:7.0</product>
<product>drupal:7.0</product>
<product>drupal:7.0</product>
<product>drupal:7.0</product>
<product>drupal:7.0</product>
<product>drupal:7.0</product>
<product>drupal:7.0</product>
<product>drupal:7.0</product>
<product>drupal:7.0</product>
<product>drupal:7.0</product>
<product>drupal:7.0</product>
<product>drupal:7.0</product>
<product>drupal:7.0</product>
<product>drupal:7.0</product>
<product>drupal:7.0</product>
<product>drupal:7.0</product>
<product>drupal:7.1</product>
<product>drupal:7.2</product>
<product>drupal:7.3</product>
<product>drupal:7.4</product>
<product>drupal:7.10</product>
<product>drupal:7.11</product>
<product>drupal:7.12</product>
<product>drupal:7.13</product>
<product>drupal:7.14</product>
<product>drupal:7.15</product>
<product>drupal:7.16</product>
<product>drupal:7.17</product>
<product>drupal:7.18</product>
<product>drupal:7.19</product>
<product>drupal:7.20</product>
<product>drupal:7.21</product>
<product>drupal:7.22</product>
<product>drupal:7.23</product>
<product>drupal:7.24</product>
<product>drupal:7.25</product>
<product>drupal:7.26</product>
<product>drupal:7.27</product>
<product>drupal:7.28</product>
<product>drupal:7.29</product>
<product>drupal:7.30</product>
<product>drupal:7.31</product>
<product>drupal:7.32</product>
<product>drupal:7.33</product>
<product>drupal:7.34</product>
<product>drupal:7.35</product>
<product>drupal:7.36</product>
<product>drupal:7.37</product>
<product>drupal:7.38</product>
<product>drupal:7.40</product>
<product>drupal:7.41</product>
<product>drupal:7.42</product>
<product>drupal:7.43</product>
<product>drupal:7.44</product>
<product>drupal:7.50</product>
<product>drupal:7.51</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.1</product>
<product>drupal:8.0.2</product>
<product>drupal:8.0.3</product>
<product>drupal:8.0.4</product>
<product>drupal:8.0.5</product>
<product>drupal:8.0.6</product>
<product>drupal:8.1.0</product>
<product>drupal:8.1.0</product>
<product>drupal:8.1.0</product>
<product>drupal:8.1.0</product>
<product>drupal:8.1.1</product>
<product>drupal:8.1.2</product>
<product>drupal:8.1.3</product>
<product>drupal:8.1.4</product>
<product>drupal:8.1.5</product>
<product>drupal:8.1.6</product>
<product>drupal:8.1.7</product>
<product>drupal:8.1.8</product>
<product>drupal:8.1.9</product>
<product>drupal:8.1.10</product>
<product>drupal:8.2.0</product>
<product>drupal:8.2.0</product>
<product>drupal:8.2.0</product>
<product>drupal:8.2.0</product>
<product>drupal:8.2.0</product>
<product>drupal:8.2.0</product>
<product>drupal:8.2.1</product>
<product>drupal:8.2.2</product>
</cve>
<cve id="CVE-2016-9448" level="LOW">
<product>libtiff:4.0.6</product>
<product>opensuse:13.2</product>
</cve>
<cve id="CVE-2016-9994" level="LOW">
<product>kenexa_lcms_premier:9.0</product>
<product>kenexa_lcms_premier:9.1</product>
<product>kenexa_lcms_premier:9.2</product>
<product>kenexa_lcms_premier:9.2.1</product>
<product>kenexa_lcms_premier:9.3</product>
<product>kenexa_lcms_premier:9.4</product>
<product>kenexa_lcms_premier:9.5</product>
<product>kenexa_lcms_premier:10.0</product>
</cve>
<cve id="CVE-2016-5733" level="MEDIUM">
<product>phpmyadmin:4.0.0</product>
<product>phpmyadmin:4.0.1</product>
<product>phpmyadmin:4.0.2</product>
<product>phpmyadmin:4.0.3</product>
<product>phpmyadmin:4.0.4</product>
<product>phpmyadmin:4.0.4.1</product>
<product>phpmyadmin:4.0.4.2</product>
<product>phpmyadmin:4.0.5</product>
<product>phpmyadmin:4.0.6</product>
<product>phpmyadmin:4.0.7</product>
<product>phpmyadmin:4.0.8</product>
<product>phpmyadmin:4.0.9</product>
<product>phpmyadmin:4.0.10</product>
<product>phpmyadmin:4.0.10.1</product>
<product>phpmyadmin:4.0.10.2</product>
<product>phpmyadmin:4.0.10.3</product>
<product>phpmyadmin:4.0.10.4</product>
<product>phpmyadmin:4.0.10.5</product>
<product>phpmyadmin:4.0.10.6</product>
<product>phpmyadmin:4.0.10.7</product>
<product>phpmyadmin:4.0.10.8</product>
<product>phpmyadmin:4.0.10.9</product>
<product>phpmyadmin:4.0.10.10</product>
<product>phpmyadmin:4.0.10.11</product>
<product>phpmyadmin:4.0.10.12</product>
<product>phpmyadmin:4.0.10.13</product>
<product>phpmyadmin:4.0.10.14</product>
<product>phpmyadmin:4.0.10.15</product>
<product>phpmyadmin:4.4.0</product>
<product>phpmyadmin:4.4.1</product>
<product>phpmyadmin:4.4.1.1</product>
<product>phpmyadmin:4.4.2</product>
<product>phpmyadmin:4.4.3</product>
<product>phpmyadmin:4.4.4</product>
<product>phpmyadmin:4.4.5</product>
<product>phpmyadmin:4.4.6</product>
<product>phpmyadmin:4.4.6.1</product>
<product>phpmyadmin:4.4.7</product>
<product>phpmyadmin:4.4.8</product>
<product>phpmyadmin:4.4.9</product>
<product>phpmyadmin:4.4.10</product>
<product>phpmyadmin:4.4.11</product>
<product>phpmyadmin:4.4.12</product>
<product>phpmyadmin:4.4.13</product>
<product>phpmyadmin:4.4.13.1</product>
<product>phpmyadmin:4.4.14.1</product>
<product>phpmyadmin:4.4.15</product>
<product>phpmyadmin:4.4.15.1</product>
<product>phpmyadmin:4.4.15.2</product>
<product>phpmyadmin:4.4.15.3</product>
<product>phpmyadmin:4.4.15.4</product>
<product>phpmyadmin:4.4.15.5</product>
<product>phpmyadmin:4.4.15.6</product>
<product>phpmyadmin:4.6.0</product>
<product>phpmyadmin:4.6.0</product>
<product>phpmyadmin:4.6.0</product>
<product>phpmyadmin:4.6.0</product>
<product>phpmyadmin:4.6.1</product>
<product>phpmyadmin:4.6.2</product>
<product>leap:42.1</product>
<product>opensuse:13.1</product>
<product>opensuse:13.2</product>
</cve>
<cve id="CVE-2016-5732" level="MEDIUM">
<product>phpmyadmin:4.6.0</product>
<product>phpmyadmin:4.6.0</product>
<product>phpmyadmin:4.6.0</product>
<product>phpmyadmin:4.6.0</product>
<product>phpmyadmin:4.6.1</product>
<product>phpmyadmin:4.6.2</product>
</cve>
<cve id="CVE-2016-5731" level="MEDIUM">
<product>phpmyadmin:4.0.0</product>
<product>phpmyadmin:4.0.1</product>
<product>phpmyadmin:4.0.2</product>
<product>phpmyadmin:4.0.3</product>
<product>phpmyadmin:4.0.4</product>
<product>phpmyadmin:4.0.4.1</product>
<product>phpmyadmin:4.0.4.2</product>
<product>phpmyadmin:4.0.5</product>
<product>phpmyadmin:4.0.6</product>
<product>phpmyadmin:4.0.7</product>
<product>phpmyadmin:4.0.8</product>
<product>phpmyadmin:4.0.9</product>
<product>phpmyadmin:4.0.10</product>
<product>phpmyadmin:4.0.10.1</product>
<product>phpmyadmin:4.0.10.2</product>
<product>phpmyadmin:4.0.10.3</product>
<product>phpmyadmin:4.0.10.4</product>
<product>phpmyadmin:4.0.10.5</product>
<product>phpmyadmin:4.0.10.6</product>
<product>phpmyadmin:4.0.10.7</product>
<product>phpmyadmin:4.0.10.8</product>
<product>phpmyadmin:4.0.10.9</product>
<product>phpmyadmin:4.0.10.10</product>
<product>phpmyadmin:4.0.10.11</product>
<product>phpmyadmin:4.0.10.12</product>
<product>phpmyadmin:4.0.10.13</product>
<product>phpmyadmin:4.0.10.14</product>
<product>phpmyadmin:4.0.10.15</product>
<product>phpmyadmin:4.4.0</product>
<product>phpmyadmin:4.4.1</product>
<product>phpmyadmin:4.4.1.1</product>
<product>phpmyadmin:4.4.2</product>
<product>phpmyadmin:4.4.3</product>
<product>phpmyadmin:4.4.4</product>
<product>phpmyadmin:4.4.5</product>
<product>phpmyadmin:4.4.6</product>
<product>phpmyadmin:4.4.6.1</product>
<product>phpmyadmin:4.4.7</product>
<product>phpmyadmin:4.4.8</product>
<product>phpmyadmin:4.4.9</product>
<product>phpmyadmin:4.4.10</product>
<product>phpmyadmin:4.4.11</product>
<product>phpmyadmin:4.4.12</product>
<product>phpmyadmin:4.4.13</product>
<product>phpmyadmin:4.4.13.1</product>
<product>phpmyadmin:4.4.14.1</product>
<product>phpmyadmin:4.4.15</product>
<product>phpmyadmin:4.4.15.1</product>
<product>phpmyadmin:4.4.15.2</product>
<product>phpmyadmin:4.4.15.3</product>
<product>phpmyadmin:4.4.15.4</product>
<product>phpmyadmin:4.4.15.5</product>
<product>phpmyadmin:4.4.15.6</product>
<product>phpmyadmin:4.6.0</product>
<product>phpmyadmin:4.6.0</product>
<product>phpmyadmin:4.6.0</product>
<product>phpmyadmin:4.6.0</product>
<product>phpmyadmin:4.6.1</product>
<product>phpmyadmin:4.6.2</product>
<product>leap:42.1</product>
<product>opensuse:13.1</product>
<product>opensuse:13.2</product>
</cve>
<cve id="CVE-2016-5730" level="LOW">
<product>phpmyadmin:4.0.0</product>
<product>phpmyadmin:4.0.1</product>
<product>phpmyadmin:4.0.2</product>
<product>phpmyadmin:4.0.3</product>
<product>phpmyadmin:4.0.4</product>
<product>phpmyadmin:4.0.4.1</product>
<product>phpmyadmin:4.0.4.2</product>
<product>phpmyadmin:4.0.5</product>
<product>phpmyadmin:4.0.6</product>
<product>phpmyadmin:4.0.7</product>
<product>phpmyadmin:4.0.8</product>
<product>phpmyadmin:4.0.9</product>
<product>phpmyadmin:4.0.10</product>
<product>phpmyadmin:4.0.10.1</product>
<product>phpmyadmin:4.0.10.2</product>
<product>phpmyadmin:4.0.10.3</product>
<product>phpmyadmin:4.0.10.4</product>
<product>phpmyadmin:4.0.10.5</product>
<product>phpmyadmin:4.0.10.6</product>
<product>phpmyadmin:4.0.10.7</product>
<product>phpmyadmin:4.0.10.8</product>
<product>phpmyadmin:4.0.10.9</product>
<product>phpmyadmin:4.0.10.10</product>
<product>phpmyadmin:4.0.10.11</product>
<product>phpmyadmin:4.0.10.12</product>
<product>phpmyadmin:4.0.10.13</product>
<product>phpmyadmin:4.0.10.14</product>
<product>phpmyadmin:4.0.10.15</product>
<product>phpmyadmin:4.4.0</product>
<product>phpmyadmin:4.4.1</product>
<product>phpmyadmin:4.4.1.1</product>
<product>phpmyadmin:4.4.2</product>
<product>phpmyadmin:4.4.3</product>
<product>phpmyadmin:4.4.4</product>
<product>phpmyadmin:4.4.5</product>
<product>phpmyadmin:4.4.6</product>
<product>phpmyadmin:4.4.6.1</product>
<product>phpmyadmin:4.4.7</product>
<product>phpmyadmin:4.4.8</product>
<product>phpmyadmin:4.4.9</product>
<product>phpmyadmin:4.4.10</product>
<product>phpmyadmin:4.4.11</product>
<product>phpmyadmin:4.4.12</product>
<product>phpmyadmin:4.4.13</product>
<product>phpmyadmin:4.4.13.1</product>
<product>phpmyadmin:4.4.14.1</product>
<product>phpmyadmin:4.4.15</product>
<product>phpmyadmin:4.4.15.1</product>
<product>phpmyadmin:4.4.15.2</product>
<product>phpmyadmin:4.4.15.3</product>
<product>phpmyadmin:4.4.15.4</product>
<product>phpmyadmin:4.4.15.5</product>
<product>phpmyadmin:4.4.15.6</product>
<product>phpmyadmin:4.6.0</product>
<product>phpmyadmin:4.6.0</product>
<product>phpmyadmin:4.6.0</product>
<product>phpmyadmin:4.6.0</product>
<product>phpmyadmin:4.6.1</product>
<product>phpmyadmin:4.6.2</product>
<product>leap:42.1</product>
<product>opensuse:13.1</product>
<product>opensuse:13.2</product>
</cve>
<cve id="CVE-2016-5737" level="MEDIUM">
<product>puppet-gerrit:-</product>
</cve>
<cve id="CVE-2016-5736" level="LOW">
<product>big-ip_access_policy_manager:11.2.1</product>
<product>big-ip_access_policy_manager:11.4.0</product>
<product>big-ip_access_policy_manager:11.4.1</product>
<product>big-ip_access_policy_manager:11.5.0</product>
<product>big-ip_access_policy_manager:11.5.1</product>
<product>big-ip_access_policy_manager:11.5.2</product>
<product>big-ip_access_policy_manager:11.5.3</product>
<product>big-ip_access_policy_manager:11.5.4</product>
<product>big-ip_access_policy_manager:11.6.0</product>
<product>big-ip_access_policy_manager:12.0.0</product>
<product>big-ip_advanced_firewall_manager:11.4.0</product>
<product>big-ip_advanced_firewall_manager:11.4.1</product>
<product>big-ip_advanced_firewall_manager:11.5.0</product>
<product>big-ip_advanced_firewall_manager:11.5.1</product>
<product>big-ip_advanced_firewall_manager:11.5.2</product>
<product>big-ip_advanced_firewall_manager:11.5.3</product>
<product>big-ip_advanced_firewall_manager:11.5.4</product>
<product>big-ip_advanced_firewall_manager:11.6.0</product>
<product>big-ip_advanced_firewall_manager:12.0.0</product>
<product>big-ip_analytics:11.2.1</product>
<product>big-ip_analytics:11.4.0</product>
<product>big-ip_analytics:11.4.1</product>
<product>big-ip_analytics:11.5.0</product>
<product>big-ip_analytics:11.5.1</product>
<product>big-ip_analytics:11.5.2</product>
<product>big-ip_analytics:11.5.3</product>
<product>big-ip_analytics:11.5.4</product>
<product>big-ip_analytics:11.6.0</product>
<product>big-ip_analytics:12.0.0</product>
<product>big-ip_application_acceleration_manager:11.4.0</product>
<product>big-ip_application_acceleration_manager:11.4.1</product>
<product>big-ip_application_acceleration_manager:11.5.0</product>
<product>big-ip_application_acceleration_manager:11.5.1</product>
<product>big-ip_application_acceleration_manager:11.5.2</product>
<product>big-ip_application_acceleration_manager:11.5.3</product>
<product>big-ip_application_acceleration_manager:11.5.4</product>
<product>big-ip_application_acceleration_manager:11.6.0</product>
<product>big-ip_application_acceleration_manager:12.0.0</product>
<product>big-ip_application_security_manager:11.2.1</product>
<product>big-ip_application_security_manager:11.4.0</product>
<product>big-ip_application_security_manager:11.4.1</product>
<product>big-ip_application_security_manager:11.5.0</product>
<product>big-ip_application_security_manager:11.5.1</product>
<product>big-ip_application_security_manager:11.5.2</product>
<product>big-ip_application_security_manager:11.5.3</product>
<product>big-ip_application_security_manager:11.5.4</product>
<product>big-ip_application_security_manager:11.6.0</product>
<product>big-ip_application_security_manager:12.0.0</product>
<product>big-ip_domain_name_system:12.0.0</product>
<product>big-ip_edge_gateway:11.2.1</product>
<product>big-ip_global_traffic_manager:11.2.1</product>
<product>big-ip_global_traffic_manager:11.4.0</product>
<product>big-ip_global_traffic_manager:11.4.1</product>
<product>big-ip_global_traffic_manager:11.5.0</product>
<product>big-ip_global_traffic_manager:11.5.1</product>
<product>big-ip_global_traffic_manager:11.5.2</product>
<product>big-ip_global_traffic_manager:11.5.3</product>
<product>big-ip_global_traffic_manager:11.5.4</product>
<product>big-ip_global_traffic_manager:11.6.0</product>
<product>big-ip_link_controller:11.2.1</product>
<product>big-ip_link_controller:11.4.0</product>
<product>big-ip_link_controller:11.4.1</product>
<product>big-ip_link_controller:11.5.0</product>
<product>big-ip_link_controller:11.5.1</product>
<product>big-ip_link_controller:11.5.2</product>
<product>big-ip_link_controller:11.5.3</product>
<product>big-ip_link_controller:11.5.4</product>
<product>big-ip_link_controller:11.6.0</product>
<product>big-ip_link_controller:12.0.0</product>
<product>big-ip_local_traffic_manager:11.2.1</product>
<product>big-ip_local_traffic_manager:11.4.0</product>
<product>big-ip_local_traffic_manager:11.4.1</product>
<product>big-ip_local_traffic_manager:11.5.0</product>
<product>big-ip_local_traffic_manager:11.5.1</product>
<product>big-ip_local_traffic_manager:11.5.2</product>
<product>big-ip_local_traffic_manager:11.5.3</product>
<product>big-ip_local_traffic_manager:11.5.4</product>
<product>big-ip_local_traffic_manager:11.6.0</product>
<product>big-ip_local_traffic_manager:12.0.0</product>
<product>big-ip_policy_enforcement_manager:11.4.0</product>
<product>big-ip_policy_enforcement_manager:11.4.1</product>
<product>big-ip_policy_enforcement_manager:11.5.0</product>
<product>big-ip_policy_enforcement_manager:11.5.1</product>
<product>big-ip_policy_enforcement_manager:11.5.2</product>
<product>big-ip_policy_enforcement_manager:11.5.3</product>
<product>big-ip_policy_enforcement_manager:11.5.4</product>
<product>big-ip_policy_enforcement_manager:11.6.0</product>
<product>big-ip_policy_enforcement_manager:12.0.0</product>
<product>big-ip_wan_optimization_manager:11.2.1</product>
<product>big-ip_webaccelerator:11.2.1</product>
<product>big-ip_websafe:11.6.0</product>
<product>big-ip_websafe:12.0.0</product>
<product>big-ip_protocol_security_manager:11.4.0</product>
<product>big-ip_protocol_security_manager:11.4.1</product>
</cve>
<cve id="CVE-2016-5735" level="MEDIUM">
<product>pngquant:2.7.0</product>
</cve>
<cve id="CVE-2016-5734" level="LOW">
<product>phpmyadmin:4.0.0</product>
<product>phpmyadmin:4.0.1</product>
<product>phpmyadmin:4.0.2</product>
<product>phpmyadmin:4.0.3</product>
<product>phpmyadmin:4.0.4</product>
<product>phpmyadmin:4.0.4.1</product>
<product>phpmyadmin:4.0.4.2</product>
<product>phpmyadmin:4.0.5</product>
<product>phpmyadmin:4.0.6</product>
<product>phpmyadmin:4.0.7</product>
<product>phpmyadmin:4.0.8</product>
<product>phpmyadmin:4.0.9</product>
<product>phpmyadmin:4.0.10</product>
<product>phpmyadmin:4.0.10.1</product>
<product>phpmyadmin:4.0.10.2</product>
<product>phpmyadmin:4.0.10.3</product>
<product>phpmyadmin:4.0.10.4</product>
<product>phpmyadmin:4.0.10.5</product>
<product>phpmyadmin:4.0.10.6</product>
<product>phpmyadmin:4.0.10.7</product>
<product>phpmyadmin:4.0.10.8</product>
<product>phpmyadmin:4.0.10.9</product>
<product>phpmyadmin:4.0.10.10</product>
<product>phpmyadmin:4.0.10.11</product>
<product>phpmyadmin:4.0.10.12</product>
<product>phpmyadmin:4.0.10.13</product>
<product>phpmyadmin:4.0.10.14</product>
<product>phpmyadmin:4.0.10.15</product>
<product>phpmyadmin:4.4.0</product>
<product>phpmyadmin:4.4.1</product>
<product>phpmyadmin:4.4.1.1</product>
<product>phpmyadmin:4.4.2</product>
<product>phpmyadmin:4.4.3</product>
<product>phpmyadmin:4.4.4</product>
<product>phpmyadmin:4.4.5</product>
<product>phpmyadmin:4.4.6</product>
<product>phpmyadmin:4.4.6.1</product>
<product>phpmyadmin:4.4.7</product>
<product>phpmyadmin:4.4.8</product>
<product>phpmyadmin:4.4.9</product>
<product>phpmyadmin:4.4.10</product>
<product>phpmyadmin:4.4.11</product>
<product>phpmyadmin:4.4.12</product>
<product>phpmyadmin:4.4.13</product>
<product>phpmyadmin:4.4.13.1</product>
<product>phpmyadmin:4.4.14.1</product>
<product>phpmyadmin:4.4.15</product>
<product>phpmyadmin:4.4.15.1</product>
<product>phpmyadmin:4.4.15.2</product>
<product>phpmyadmin:4.4.15.3</product>
<product>phpmyadmin:4.4.15.4</product>
<product>phpmyadmin:4.4.15.5</product>
<product>phpmyadmin:4.4.15.6</product>
<product>phpmyadmin:4.6.0</product>
<product>phpmyadmin:4.6.0</product>
<product>phpmyadmin:4.6.0</product>
<product>phpmyadmin:4.6.0</product>
<product>phpmyadmin:4.6.1</product>
<product>phpmyadmin:4.6.2</product>
</cve>
<cve id="CVE-2016-5739" level="LOW">
<product>phpmyadmin:4.0.0</product>
<product>phpmyadmin:4.0.1</product>
<product>phpmyadmin:4.0.2</product>
<product>phpmyadmin:4.0.3</product>
<product>phpmyadmin:4.0.4</product>
<product>phpmyadmin:4.0.4.1</product>
<product>phpmyadmin:4.0.4.2</product>
<product>phpmyadmin:4.0.5</product>
<product>phpmyadmin:4.0.6</product>
<product>phpmyadmin:4.0.7</product>
<product>phpmyadmin:4.0.8</product>
<product>phpmyadmin:4.0.9</product>
<product>phpmyadmin:4.0.10</product>
<product>phpmyadmin:4.0.10.1</product>
<product>phpmyadmin:4.0.10.2</product>
<product>phpmyadmin:4.0.10.3</product>
<product>phpmyadmin:4.0.10.4</product>
<product>phpmyadmin:4.0.10.5</product>
<product>phpmyadmin:4.0.10.6</product>
<product>phpmyadmin:4.0.10.7</product>
<product>phpmyadmin:4.0.10.8</product>
<product>phpmyadmin:4.0.10.9</product>
<product>phpmyadmin:4.0.10.10</product>
<product>phpmyadmin:4.0.10.11</product>
<product>phpmyadmin:4.0.10.12</product>
<product>phpmyadmin:4.0.10.13</product>
<product>phpmyadmin:4.0.10.14</product>
<product>phpmyadmin:4.0.10.15</product>
<product>phpmyadmin:4.4.0</product>
<product>phpmyadmin:4.4.1</product>
<product>phpmyadmin:4.4.1.1</product>
<product>phpmyadmin:4.4.2</product>
<product>phpmyadmin:4.4.3</product>
<product>phpmyadmin:4.4.4</product>
<product>phpmyadmin:4.4.5</product>
<product>phpmyadmin:4.4.6</product>
<product>phpmyadmin:4.4.6.1</product>
<product>phpmyadmin:4.4.7</product>
<product>phpmyadmin:4.4.8</product>
<product>phpmyadmin:4.4.9</product>
<product>phpmyadmin:4.4.10</product>
<product>phpmyadmin:4.4.11</product>
<product>phpmyadmin:4.4.12</product>
<product>phpmyadmin:4.4.13</product>
<product>phpmyadmin:4.4.13.1</product>
<product>phpmyadmin:4.4.14.1</product>
<product>phpmyadmin:4.4.15</product>
<product>phpmyadmin:4.4.15.1</product>
<product>phpmyadmin:4.4.15.2</product>
<product>phpmyadmin:4.4.15.3</product>
<product>phpmyadmin:4.4.15.4</product>
<product>phpmyadmin:4.4.15.5</product>
<product>phpmyadmin:4.4.15.6</product>
<product>phpmyadmin:4.6.0</product>
<product>phpmyadmin:4.6.0</product>
<product>phpmyadmin:4.6.0</product>
<product>phpmyadmin:4.6.0</product>
<product>phpmyadmin:4.6.1</product>
<product>phpmyadmin:4.6.2</product>
<product>leap:42.1</product>
<product>opensuse:13.1</product>
<product>opensuse:13.2</product>
</cve>
<cve id="CVE-2016-9193" level="LOW">
<product>firepower_management_center:6.0.0</product>
<product>firepower_management_center:6.0.0.0</product>
<product>firepower_management_center:6.0.0.1</product>
<product>firepower_management_center:6.0.1</product>
<product>firepower_management_center:6.0.1.1</product>
<product>firepower_management_center:6.1.0</product>
<product>firesight_system_software:6.0.0</product>
<product>firesight_system_software:6.0.0.0</product>
<product>firesight_system_software:6.0.0.1</product>
<product>firesight_system_software:6.0.1</product>
<product>firesight_system_software:6.0.1.1</product>
<product>firesight_system_software:6.1.0</product>
</cve>
<cve id="CVE-2016-9192" level="LOW">
<product>anyconnect_secure_mobility_client:3.1%2860%29</product>
<product>anyconnect_secure_mobility_client:3.1.0</product>
<product>anyconnect_secure_mobility_client:3.1.02043</product>
<product>anyconnect_secure_mobility_client:3.1.05182</product>
<product>anyconnect_secure_mobility_client:3.1.05187</product>
<product>anyconnect_secure_mobility_client:3.1.06073</product>
<product>anyconnect_secure_mobility_client:3.1.07021</product>
<product>anyconnect_secure_mobility_client:4.0%2848%29</product>
<product>anyconnect_secure_mobility_client:4.0%2864%29</product>
<product>anyconnect_secure_mobility_client:4.0%282049%29</product>
<product>anyconnect_secure_mobility_client:4.0.0</product>
<product>anyconnect_secure_mobility_client:4.0.00048</product>
<product>anyconnect_secure_mobility_client:4.0.00051</product>
<product>anyconnect_secure_mobility_client:4.1%288%29</product>
<product>anyconnect_secure_mobility_client:4.1.0</product>
<product>anyconnect_secure_mobility_client:4.2.0</product>
<product>anyconnect_secure_mobility_client:4.2.04039</product>
<product>anyconnect_secure_mobility_client:4.3.0</product>
<product>anyconnect_secure_mobility_client:4.3.00748</product>
<product>anyconnect_secure_mobility_client:4.3.01095</product>
</cve>
<cve id="CVE-2016-9197" level="LOW">
<product>mobility_services_engine:8.3.102.0</product>
</cve>
<cve id="CVE-2016-9196" level="LOW">
<product>aironet_access_point:8.1%2815.14%29</product>
<product>aironet_access_point:8.1%28112.3%29</product>
<product>aironet_access_point:8.1%28112.4%29</product>
<product>aironet_access_point:8.1%28131.0%29</product>
<product>aironet_access_point:8.2%28100.0%29</product>
<product>aironet_access_point:8.2%28102.43%29</product>
<product>aironet_access_point:8.2_base</product>
</cve>
<cve id="CVE-2016-9195" level="LOW">
<product>wireless_lan_controller:8.3.102.0</product>
</cve>
<cve id="CVE-2016-9194" level="LOW">
<product>wireless_lan_controller:5.2.157.0</product>
<product>wireless_lan_controller:5.2.169.0</product>
<product>wireless_lan_controller:6.0_base</product>
<product>wireless_lan_controller:7.0_base</product>
<product>wireless_lan_controller:7.1_base</product>
<product>wireless_lan_controller:7.2_base</product>
<product>wireless_lan_controller:7.3.101.0</product>
<product>wireless_lan_controller:7.3.103.8</product>
<product>wireless_lan_controller:7.3.112</product>
<product>wireless_lan_controller:7.3_base</product>
<product>wireless_lan_controller:7.4.1.1</product>
<product>wireless_lan_controller:7.4.100</product>
<product>wireless_lan_controller:7.4.100.60</product>
<product>wireless_lan_controller:7.4.110.0</product>
<product>wireless_lan_controller:7.4.121.0</product>
<product>wireless_lan_controller:7.4_base</product>
<product>wireless_lan_controller:7.5.102.0</product>
<product>wireless_lan_controller:7.5.102.11</product>
<product>wireless_lan_controller:7.5_base</product>
<product>wireless_lan_controller:7.6.1.62</product>
<product>wireless_lan_controller:7.6.100.0</product>
<product>wireless_lan_controller:7.6.110.0</product>
<product>wireless_lan_controller:7.6.120.0</product>
<product>wireless_lan_controller:7.6.130.0</product>
<product>wireless_lan_controller:8.0.0</product>
<product>wireless_lan_controller:8.0.0.30220.385</product>
<product>wireless_lan_controller:8.0.72.140</product>
<product>wireless_lan_controller:8.0.100</product>
<product>wireless_lan_controller:8.0.115.0</product>
<product>wireless_lan_controller:8.0.120.0</product>
<product>wireless_lan_controller:8.0.121.0</product>
<product>wireless_lan_controller:8.1.0</product>
<product>wireless_lan_controller:8.1.104.37</product>
<product>wireless_lan_controller:8.1.111.0</product>
<product>wireless_lan_controller:8.1.122.0</product>
<product>wireless_lan_controller:8.1.130.0</product>
<product>wireless_lan_controller_6.0:182.0</product>
<product>wireless_lan_controller_6.0:188.0</product>
<product>wireless_lan_controller_6.0:196.0</product>
<product>wireless_lan_controller_6.0:199.4</product>
<product>wireless_lan_controller_6.0:202.0</product>
<product>wireless_lan_controller_7.0:98.0</product>
<product>wireless_lan_controller_7.0:98.218</product>
<product>wireless_lan_controller_7.0:116.0</product>
<product>wireless_lan_controller_7.0:220.0</product>
<product>wireless_lan_controller_7.0:240.0</product>
<product>wireless_lan_controller_7.0:250.0</product>
<product>wireless_lan_controller_7.0:252.0</product>
<product>wireless_lan_controller_7.1:91.0</product>
<product>wireless_lan_controller_7.2:103.0</product>
<product>wireless_lan_controller_7.4:1.19</product>
<product>wireless_lan_controller_7.4:1.54</product>
<product>wireless_lan_controller_7.4:140.0</product>
</cve>
<cve id="CVE-2016-9199" level="LOW">
<product>iox:1.1.0</product>
</cve>
<cve id="CVE-2016-9198" level="LOW">
<product>identity_services_engine:1.2%281.199%29</product>
</cve>
<cve id="CVE-2016-10676" level="MEDIUM">
<product>rs-brightcove:0.0.2</product>
</cve>
<cve id="CVE-2016-1057" level="LOW">
<product>acrobat:11.0.15</product>
<product>acrobat_dc:15.006.30121</product>
<product>acrobat_dc:15.010.20060</product>
<product>acrobat_reader_dc:15.006.30121</product>
<product>acrobat_reader_dc:15.010.20060</product>
<product>reader:11.0.15</product>
</cve>
<cve id="CVE-2016-2170" level="LOW">
<product>ofbiz:12.04.01</product>
<product>ofbiz:12.04.02</product>
<product>ofbiz:12.04.03</product>
<product>ofbiz:12.04.04</product>
<product>ofbiz:12.04.05</product>
<product>ofbiz:13.07.01</product>
<product>ofbiz:13.07.02</product>
</cve>
<cve id="CVE-2016-2171" level="LOW">
<product>jetspeed:2.3.0</product>
</cve>
<cve id="CVE-2016-2173" level="LOW">
<product>spring-amqp:1.5.4</product>
<product>fedora:22</product>
<product>fedora:23</product>
<product>fedora:24</product>
</cve>
<cve id="CVE-2016-2174" level="LOW">
<product>ranger:0.5.0</product>
<product>ranger:0.5.1</product>
<product>ranger:0.5.2</product>
</cve>
<cve id="CVE-2016-2176" level="LOW">
<product>openssl:1.0.1s</product>
<product>openssl:1.0.2</product>
<product>openssl:1.0.2</product>
<product>openssl:1.0.2</product>
<product>openssl:1.0.2</product>
<product>openssl:1.0.2a</product>
<product>openssl:1.0.2b</product>
<product>openssl:1.0.2c</product>
<product>openssl:1.0.2d</product>
<product>openssl:1.0.2e</product>
<product>openssl:1.0.2f</product>
<product>openssl:1.0.2g</product>
</cve>
<cve id="CVE-2016-0469" level="LOW">
<product>micros_c2:9.89.0.0</product>
</cve>
<cve id="CVE-2016-3173" level="MEDIUM">
<product>open-xchange_appsuite:7.8.0</product>
</cve>
<cve id="CVE-2016-3172" level="LOW">
<product>cacti:0.8.8g</product>
</cve>
<cve id="CVE-2016-6411" level="LOW">
<product>firesight_system_software:6.0.1</product>
</cve>
<cve id="CVE-2016-3177" level="LOW">
<product>giflib:5.1.2</product>
</cve>
<cve id="CVE-2016-3176" level="MEDIUM">
<product>salt:2015.5.9</product>
<product>salt:2015.8.0</product>
<product>salt:2015.8.1</product>
<product>salt:2015.8.2</product>
<product>salt:2015.8.3</product>
<product>salt:2015.8.4</product>
<product>salt:2015.8.5</product>
<product>salt:2015.8.7</product>
</cve>
<cve id="CVE-2016-3174" level="MEDIUM">
<product>open-xchange_appsuite:7.8.0</product>
</cve>
<cve id="CVE-2016-3179" level="LOW">
<product>minisspd:1.2.20130907-3</product>
</cve>
<cve id="CVE-2016-3178" level="LOW">
<product>minisspd:1.2.20130907-3</product>
</cve>
<cve id="CVE-2016-1993" level="LOW">
<product>system_management_homepage:7.5.3.1</product>
</cve>
<cve id="CVE-2016-1992" level="LOW">
<product>enterprise_security_manager:6.8</product>
<product>enterprise_security_manager_express:6.9.0</product>
</cve>
<cve id="CVE-2016-1991" level="MEDIUM">
<product>arcsight_enterprise_security_manager:5.6</product>
<product>arcsight_enterprise_security_manager:6.0</product>
<product>arcsight_enterprise_security_manager:6.5</product>
<product>arcsight_enterprise_security_manager:6.8</product>
<product>arcsight_enterprise_security_manager:6.9</product>
</cve>
<cve id="CVE-2016-1990" level="LOW">
<product>arcsight_enterprise_security_manager:5.6</product>
<product>arcsight_enterprise_security_manager:6.0</product>
<product>arcsight_enterprise_security_manager:6.5</product>
<product>arcsight_enterprise_security_manager:6.8</product>
<product>arcsight_enterprise_security_manager:6.9</product>
</cve>
<cve id="CVE-2016-1997" level="LOW">
<product>operations_orchestration:10.0</product>
<product>operations_orchestration:10.01</product>
<product>operations_orchestration:10.02</product>
<product>operations_orchestration:10.10</product>
<product>operations_orchestration:10.20</product>
<product>operations_orchestration:10.21</product>
<product>operations_orchestration:10.22</product>
<product>operations_orchestration:10.22.1</product>
<product>operations_orchestration:10.50</product>
<product>operations_orchestration_content:1.5.3</product>
</cve>
<cve id="CVE-2016-1996" level="LOW">
<product>system_management_homepage:7.5.3.1</product>
</cve>
<cve id="CVE-2016-1995" level="LOW">
<product>system_management_homepage:7.5.3.1</product>
</cve>
<cve id="CVE-2016-1994" level="LOW">
<product>system_management_homepage:7.5.3.1</product>
</cve>
<cve id="CVE-2016-0460" level="LOW">
<product>peoplesoft_enterprise_peopletools:8.55</product>
</cve>
<cve id="CVE-2016-1999" level="LOW">
<product>release_control:9.13</product>
<product>release_control:9.20</product>
<product>release_control:9.21</product>
</cve>
<cve id="CVE-2016-1998" level="LOW">
<product>service_manager:9.30</product>
<product>service_manager:9.31</product>
<product>service_manager:9.32</product>
<product>service_manager:9.33</product>
<product>service_manager:9.34</product>
<product>service_manager:9.35</product>
<product>service_manager:9.40</product>
<product>service_manager:9.41</product>
</cve>
<cve id="CVE-2016-1229" level="MEDIUM">
<product>humhub:0.20.0</product>
<product>humhub:0.20.0</product>
<product>humhub:0.20.0</product>
<product>humhub:0.20.1</product>
<product>humhub:1.0.0</product>
<product>humhub:1.0.0</product>
</cve>
<cve id="CVE-2016-1221" level="MEDIUM">
<product>jetstar:2.4.1</product>
</cve>
<cve id="CVE-2016-1220" level="LOW">
<product>garoon:4.2.1</product>
</cve>
<cve id="CVE-2016-0158" level="MEDIUM">
<product>edge:-</product>
</cve>
<cve id="CVE-2016-0159" level="HIGH">
<product>internet_explorer:9</product>
</cve>
<cve id="CVE-2016-0154" level="HIGH">
<product>edge:-</product>
<product>internet_explorer:9</product>
<product>internet_explorer:10</product>
<product>internet_explorer:11</product>
</cve>
<cve id="CVE-2016-0155" level="HIGH">
<product>edge:-</product>
</cve>
<cve id="CVE-2016-0156" level="HIGH">
<product>edge:-</product>
</cve>
<cve id="CVE-2016-0157" level="HIGH">
<product>edge:-</product>
</cve>
<cve id="CVE-2016-1224" level="MEDIUM">
<product>business_security:9.0</product>
<product>business_security_services:5.0</product>
</cve>
<cve id="CVE-2016-0482" level="LOW">
<product>application_testing_suite:12.4.0.2</product>
<product>application_testing_suite:12.5.0.2</product>
</cve>
<cve id="CVE-2016-0480" level="LOW">
<product>application_testing_suite:12.4.0.2</product>
<product>application_testing_suite:12.5.0.2</product>
</cve>
<cve id="CVE-2016-0481" level="LOW">
<product>enterprise_manager_grid_control:12.4.0.2</product>
<product>enterprise_manager_grid_control:12.5.0.2</product>
</cve>
<cve id="CVE-2016-0486" level="LOW">
<product>application_testing_suite:12.4.0.2</product>
<product>application_testing_suite:12.5.0.2</product>
</cve>
<cve id="CVE-2016-0487" level="LOW">
<product>application_testing_suite:12.4.0.2</product>
<product>application_testing_suite:12.5.0.2</product>
</cve>
<cve id="CVE-2016-0484" level="LOW">
<product>application_testing_suite:12.4.0.2</product>
<product>application_testing_suite:12.5.0.2</product>
</cve>
<cve id="CVE-2016-0485" level="LOW">
<product>application_testing_suite:12.4.0.2</product>
<product>application_testing_suite:12.5.0.2</product>
</cve>
<cve id="CVE-2016-0488" level="LOW">
<product>application_testing_suite:12.4.0.2</product>
<product>application_testing_suite:12.5.0.2</product>
</cve>
<cve id="CVE-2016-0489" level="LOW">
<product>application_testing_suite:12.4.0.2</product>
<product>application_testing_suite:12.5.0.2</product>
</cve>
<cve id="CVE-2016-4819" level="LOW">
<product>dx_library:3.16b</product>
<product>dx_library:3.16b</product>
<product>dx_library:3.16b</product>
</cve>
<cve id="CVE-2016-4818" level="MEDIUM">
<product>dmmfx_demo_trade:1.5.0</product>
<product>dmmfx_trade:1.5.0</product>
<product>gaitamejapan_fx_trade:1.4.0</product>
</cve>
<cve id="CVE-2016-4811" level="HIGH">
<product>japan_connected-free_wi-fi:1.13.0</product>
<product>japan_connected-free_wi-fi:1.15.1</product>
</cve>
<cve id="CVE-2016-4810" level="LOW">
<product>xenapp:7.5</product>
<product>xenapp:7.6</product>
<product>xendesktop:7.0</product>
<product>xendesktop:7.1</product>
<product>xendesktop:7.5</product>
<product>xendesktop:7.6</product>
<product>xendesktop:7.6</product>
<product>xendesktop:7.6</product>
<product>xendesktop:7.6</product>
<product>xendesktop:7.6</product>
</cve>
<cve id="CVE-2016-4813" level="LOW">
<product>netcommons:2.4.2.1</product>
</cve>
<cve id="CVE-2016-4812" level="MEDIUM">
<product>markdown_on_saved_improved:2.5</product>
</cve>
<cve id="CVE-2016-4815" level="LOW">
<product>wzr-600dhp2_firmware:1.13</product>
<product>wzr-600dhp3_firmware:2.16</product>
<product>wzr-900dhp2_firmware:2.16</product>
<product>wzr-900dhp_firmware:1.11</product>
<product>wzr-s600dhp_firmware:2.16</product>
<product>wzr-s900dhp_firmware:2.16</product>
</cve>
<cve id="CVE-2016-4814" level="LOW">
<product>old_gsi_maps:-</product>
</cve>
<cve id="CVE-2016-4817" level="LOW">
<product>h2o:1.7.2</product>
<product>h2o:2.0.0</product>
</cve>
<cve id="CVE-2016-4816" level="MEDIUM">
<product>bhr-4grv_firmware:1.96</product>
<product>dwr-hp-g300nh_firmware:1.81</product>
<product>fs-600dhp_firmware:3.34</product>
<product>hw-450hp-zwe_firmware:1.91</product>
<product>wapm-ag300n_firmware:2.62</product>
<product>wapm-apg300n_firmware:2.62</product>
<product>wcr-300_firmware:1.86</product>
<product>whr-300_firmware:1.96</product>
<product>whr-300hp_firmware:1.96</product>
<product>whr-hp-g300n_firmware:1.96</product>
<product>wpl-05g300_firmware:1.86</product>
<product>wxr-1750dhp_firmware:2.42</product>
<product>wxr-1900dhp_firmware:2.34</product>
<product>wzr-1166dhp2_firmware:2.13</product>
<product>wzr-1166dhp_firmware:2.13</product>
<product>wzr-1750dhp2_firmware:2.28</product>
<product>wzr-1750dhp_firmware:2.28</product>
<product>wzr-300hp_firmware:1.96</product>
<product>wzr-450hp-cwt_firmware:1.92</product>
<product>wzr-450hp-ub_firmware:1.96</product>
<product>wzr-450hp_firmware:1.97</product>
<product>wzr-600dhp3_firmware:2.16</product>
<product>wzr-600dhp_firmware:1.97</product>
<product>wzr-900dhp2_firmware:1.13</product>
<product>wzr-900dhp2_firmware:2.16</product>
<product>wzr-900dhp_firmware:1.11</product>
<product>wzr-d1100h_firmware:1.96</product>
<product>wzr-hp-ag300h_firmware:1.73</product>
<product>wzr-hp-g300nh_firmware:1.81</product>
<product>wzr-hp-g301nh_firmware:1.81</product>
<product>wzr-hp-g302h_firmware:1.83</product>
<product>wzr-hp-g450h_firmware:1.87</product>
<product>wzr-s1750dhp_firmware:2.28</product>
<product>wzr-s600dhp_firmware:2.16</product>
<product>wzr-s900dhp_firmware:2.16</product>
</cve>
<cve id="CVE-2016-3289" level="HIGH">
<product>edge</product>
<product>internet_explorer:11</product>
</cve>
<cve id="CVE-2016-3288" level="HIGH">
<product>internet_explorer:11</product>
</cve>
<cve id="CVE-2016-6670" level="LOW">
<product>s7700_firmware:v200r003c00</product>
<product>s7700_firmware:v200r005c00</product>
<product>s9300_firmware:v200r003c00</product>
<product>s9300_firmware:v200r005c00</product>
<product>s9700_firmware:v200r003c00</product>
<product>s9700_firmware:v200r005c00</product>
<product>s12700:v200r005c00</product>
</cve>
<cve id="CVE-2016-0738" level="LOW">
<product>swift:2.3.0</product>
<product>swift:2.4.0</product>
<product>swift:2.5.0</product>
</cve>
<cve id="CVE-2016-7108" level="LOW">
<product>uma:v200r001c00spc200</product>
</cve>
<cve id="CVE-2016-7109" level="LOW">
<product>uma:v200r001c00spc100</product>
</cve>
<cve id="CVE-2016-7107" level="LOW">
<product>uma:v200r001c00spc200</product>
</cve>
<cve id="CVE-2016-0732" level="LOW">
<product>cloud_foundry:208</product>
<product>cloud_foundry:229</product>
<product>elastic_runtime:1.6.0</product>
<product>elastic_runtime:1.6.1</product>
<product>elastic_runtime:1.6.2</product>
<product>elastic_runtime:1.6.3</product>
<product>elastic_runtime:1.6.4</product>
<product>elastic_runtime:1.6.5</product>
<product>elastic_runtime:1.6.6</product>
<product>elastic_runtime:1.6.7</product>
<product>elastic_runtime:1.6.8</product>
<product>elastic_runtime:1.6.9</product>
<product>elastic_runtime:1.6.10</product>
<product>elastic_runtime:1.6.11</product>
<product>elastic_runtime:1.6.12</product>
<product>elastic_runtime:1.6.13</product>
<product>uaa:2.0.0</product>
<product>uaa:2.0.1</product>
<product>uaa:2.0.2</product>
<product>uaa:2.0.3</product>
<product>uaa:2.1.0</product>
<product>uaa:2.2.0</product>
<product>uaa:2.2.1</product>
<product>uaa:2.2.2</product>
<product>uaa:2.2.3</product>
<product>uaa:2.2.4</product>
<product>uaa:2.2.4.1</product>
<product>uaa:2.2.5</product>
<product>uaa:2.2.5.2</product>
<product>uaa:2.2.5.3</product>
<product>uaa:2.2.6</product>
<product>uaa:2.3.0</product>
<product>uaa:2.3.1</product>
<product>uaa:2.3.1.1</product>
<product>uaa:2.4.0</product>
<product>uaa:2.4.1</product>
<product>uaa:2.5.0</product>
<product>uaa:2.5.1</product>
<product>uaa:2.5.2</product>
<product>uaa:2.6.0</product>
<product>uaa:2.6.1</product>
<product>uaa:2.6.2</product>
<product>uaa:2.7.0</product>
<product>uaa:2.7.0.1</product>
<product>uaa:2.7.0.2</product>
<product>uaa:2.7.0.3</product>
<product>uaa:2.7.1</product>
<product>uaa:2.7.2</product>
<product>uaa:2.7.3</product>
<product>uaa-release:2</product>
<product>uaa-release:3</product>
<product>uaa-release:4</product>
</cve>
<cve id="CVE-2016-0733" level="LOW">
<product>ranger:0.5.0</product>
</cve>
<cve id="CVE-2016-0734" level="MEDIUM">
<product>activemq:5.0.0</product>
<product>activemq:5.1.0</product>
<product>activemq:5.2.0</product>
<product>activemq:5.3.0</product>
<product>activemq:5.3.1</product>
<product>activemq:5.3.2</product>
<product>activemq:5.4.0</product>
<product>activemq:5.4.1</product>
<product>activemq:5.4.2</product>
<product>activemq:5.4.3</product>
<product>activemq:5.5.0</product>
<product>activemq:5.5.1</product>
<product>activemq:5.6.0</product>
<product>activemq:5.7.0</product>
<product>activemq:5.8.0</product>
<product>activemq:5.9.0</product>
<product>activemq:5.9.1</product>
<product>activemq:5.10.0</product>
<product>activemq:5.10.1</product>
<product>activemq:5.10.2</product>
<product>activemq:5.11.0</product>
<product>activemq:5.11.1</product>
<product>activemq:5.11.2</product>
<product>activemq:5.12.0</product>
<product>activemq:5.12.1</product>
<product>activemq:5.12.2</product>
<product>activemq:5.13.0</product>
</cve>
<cve id="CVE-2016-0735" level="LOW">
<product>ranger:0.5.0</product>
<product>ranger:0.5.1</product>
</cve>
<cve id="CVE-2016-0737" level="LOW">
<product>swift:2.3.0</product>
</cve>
<cve id="CVE-2016-9858" level="LOW">
<product>phpmyadmin:4.0.0</product>
<product>phpmyadmin:4.0.1</product>
<product>phpmyadmin:4.0.2</product>
<product>phpmyadmin:4.0.3</product>
<product>phpmyadmin:4.0.4</product>
<product>phpmyadmin:4.0.4.1</product>
<product>phpmyadmin:4.0.4.2</product>
<product>phpmyadmin:4.0.5</product>
<product>phpmyadmin:4.0.6</product>
<product>phpmyadmin:4.0.7</product>
<product>phpmyadmin:4.0.8</product>
<product>phpmyadmin:4.0.9</product>
<product>phpmyadmin:4.0.10</product>
<product>phpmyadmin:4.0.10.1</product>
<product>phpmyadmin:4.0.10.2</product>
<product>phpmyadmin:4.0.10.3</product>
<product>phpmyadmin:4.0.10.4</product>
<product>phpmyadmin:4.0.10.5</product>
<product>phpmyadmin:4.0.10.6</product>
<product>phpmyadmin:4.0.10.7</product>
<product>phpmyadmin:4.0.10.8</product>
<product>phpmyadmin:4.0.10.9</product>
<product>phpmyadmin:4.0.10.10</product>
<product>phpmyadmin:4.0.10.11</product>
<product>phpmyadmin:4.0.10.12</product>
<product>phpmyadmin:4.0.10.13</product>
<product>phpmyadmin:4.0.10.14</product>
<product>phpmyadmin:4.0.10.15</product>
<product>phpmyadmin:4.0.10.16</product>
<product>phpmyadmin:4.0.10.17</product>
<product>phpmyadmin:4.4.0</product>
<product>phpmyadmin:4.4.1</product>
<product>phpmyadmin:4.4.1.1</product>
<product>phpmyadmin:4.4.2</product>
<product>phpmyadmin:4.4.3</product>
<product>phpmyadmin:4.4.4</product>
<product>phpmyadmin:4.4.5</product>
<product>phpmyadmin:4.4.6</product>
<product>phpmyadmin:4.4.6.1</product>
<product>phpmyadmin:4.4.7</product>
<product>phpmyadmin:4.4.8</product>
<product>phpmyadmin:4.4.9</product>
<product>phpmyadmin:4.4.10</product>
<product>phpmyadmin:4.4.11</product>
<product>phpmyadmin:4.4.12</product>
<product>phpmyadmin:4.4.13</product>
<product>phpmyadmin:4.4.13.1</product>
<product>phpmyadmin:4.4.14</product>
<product>phpmyadmin:4.4.14.1</product>
<product>phpmyadmin:4.4.15</product>
<product>phpmyadmin:4.4.15.1</product>
<product>phpmyadmin:4.4.15.2</product>
<product>phpmyadmin:4.4.15.3</product>
<product>phpmyadmin:4.4.15.4</product>
<product>phpmyadmin:4.4.15.5</product>
<product>phpmyadmin:4.4.15.6</product>
<product>phpmyadmin:4.4.15.7</product>
<product>phpmyadmin:4.4.15.8</product>
<product>phpmyadmin:4.6.0</product>
<product>phpmyadmin:4.6.1</product>
<product>phpmyadmin:4.6.2</product>
<product>phpmyadmin:4.6.3</product>
<product>phpmyadmin:4.6.4</product>
</cve>
<cve id="CVE-2016-9859" level="LOW">
<product>phpmyadmin:4.0.0</product>
<product>phpmyadmin:4.0.1</product>
<product>phpmyadmin:4.0.2</product>
<product>phpmyadmin:4.0.3</product>
<product>phpmyadmin:4.0.4</product>
<product>phpmyadmin:4.0.4.1</product>
<product>phpmyadmin:4.0.4.2</product>
<product>phpmyadmin:4.0.5</product>
<product>phpmyadmin:4.0.6</product>
<product>phpmyadmin:4.0.7</product>
<product>phpmyadmin:4.0.8</product>
<product>phpmyadmin:4.0.9</product>
<product>phpmyadmin:4.0.10</product>
<product>phpmyadmin:4.0.10.1</product>
<product>phpmyadmin:4.0.10.2</product>
<product>phpmyadmin:4.0.10.3</product>
<product>phpmyadmin:4.0.10.4</product>
<product>phpmyadmin:4.0.10.5</product>
<product>phpmyadmin:4.0.10.6</product>
<product>phpmyadmin:4.0.10.7</product>
<product>phpmyadmin:4.0.10.8</product>
<product>phpmyadmin:4.0.10.9</product>
<product>phpmyadmin:4.0.10.10</product>
<product>phpmyadmin:4.0.10.11</product>
<product>phpmyadmin:4.0.10.12</product>
<product>phpmyadmin:4.0.10.13</product>
<product>phpmyadmin:4.0.10.14</product>
<product>phpmyadmin:4.0.10.15</product>
<product>phpmyadmin:4.0.10.16</product>
<product>phpmyadmin:4.0.10.17</product>
<product>phpmyadmin:4.4.0</product>
<product>phpmyadmin:4.4.1</product>
<product>phpmyadmin:4.4.1.1</product>
<product>phpmyadmin:4.4.2</product>
<product>phpmyadmin:4.4.3</product>
<product>phpmyadmin:4.4.4</product>
<product>phpmyadmin:4.4.5</product>
<product>phpmyadmin:4.4.6</product>
<product>phpmyadmin:4.4.6.1</product>
<product>phpmyadmin:4.4.7</product>
<product>phpmyadmin:4.4.8</product>
<product>phpmyadmin:4.4.9</product>
<product>phpmyadmin:4.4.10</product>
<product>phpmyadmin:4.4.11</product>
<product>phpmyadmin:4.4.12</product>
<product>phpmyadmin:4.4.13</product>
<product>phpmyadmin:4.4.13.1</product>
<product>phpmyadmin:4.4.14</product>
<product>phpmyadmin:4.4.14.1</product>
<product>phpmyadmin:4.4.15</product>
<product>phpmyadmin:4.4.15.1</product>
<product>phpmyadmin:4.4.15.2</product>
<product>phpmyadmin:4.4.15.3</product>
<product>phpmyadmin:4.4.15.4</product>
<product>phpmyadmin:4.4.15.5</product>
<product>phpmyadmin:4.4.15.6</product>
<product>phpmyadmin:4.4.15.7</product>
<product>phpmyadmin:4.4.15.8</product>
<product>phpmyadmin:4.6.0</product>
<product>phpmyadmin:4.6.1</product>
<product>phpmyadmin:4.6.2</product>
<product>phpmyadmin:4.6.3</product>
<product>phpmyadmin:4.6.4</product>
</cve>
<cve id="CVE-2016-1919" level="MEDIUM">
<product>knox:1.0</product>
</cve>
<cve id="CVE-2016-9852" level="LOW">
<product>phpmyadmin:4.4.0</product>
<product>phpmyadmin:4.4.1</product>
<product>phpmyadmin:4.4.1.1</product>
<product>phpmyadmin:4.4.2</product>
<product>phpmyadmin:4.4.3</product>
<product>phpmyadmin:4.4.4</product>
<product>phpmyadmin:4.4.5</product>
<product>phpmyadmin:4.4.6</product>
<product>phpmyadmin:4.4.6.1</product>
<product>phpmyadmin:4.4.7</product>
<product>phpmyadmin:4.4.8</product>
<product>phpmyadmin:4.4.9</product>
<product>phpmyadmin:4.4.10</product>
<product>phpmyadmin:4.4.11</product>
<product>phpmyadmin:4.4.12</product>
<product>phpmyadmin:4.4.13</product>
<product>phpmyadmin:4.4.13.1</product>
<product>phpmyadmin:4.4.14</product>
<product>phpmyadmin:4.4.14.1</product>
<product>phpmyadmin:4.4.15</product>
<product>phpmyadmin:4.4.15.1</product>
<product>phpmyadmin:4.4.15.2</product>
<product>phpmyadmin:4.4.15.3</product>
<product>phpmyadmin:4.4.15.4</product>
<product>phpmyadmin:4.4.15.5</product>
<product>phpmyadmin:4.4.15.6</product>
<product>phpmyadmin:4.4.15.7</product>
<product>phpmyadmin:4.4.15.8</product>
<product>phpmyadmin:4.6.0</product>
<product>phpmyadmin:4.6.1</product>
<product>phpmyadmin:4.6.2</product>
<product>phpmyadmin:4.6.3</product>
<product>phpmyadmin:4.6.4</product>
</cve>
<cve id="CVE-2016-9853" level="LOW">
<product>phpmyadmin:4.4.0</product>
<product>phpmyadmin:4.4.1</product>
<product>phpmyadmin:4.4.1.1</product>
<product>phpmyadmin:4.4.2</product>
<product>phpmyadmin:4.4.3</product>
<product>phpmyadmin:4.4.4</product>
<product>phpmyadmin:4.4.5</product>
<product>phpmyadmin:4.4.6</product>
<product>phpmyadmin:4.4.6.1</product>
<product>phpmyadmin:4.4.7</product>
<product>phpmyadmin:4.4.8</product>
<product>phpmyadmin:4.4.9</product>
<product>phpmyadmin:4.4.10</product>
<product>phpmyadmin:4.4.11</product>
<product>phpmyadmin:4.4.12</product>
<product>phpmyadmin:4.4.13</product>
<product>phpmyadmin:4.4.13.1</product>
<product>phpmyadmin:4.4.14</product>
<product>phpmyadmin:4.4.14.1</product>
<product>phpmyadmin:4.4.15</product>
<product>phpmyadmin:4.4.15.1</product>
<product>phpmyadmin:4.4.15.2</product>
<product>phpmyadmin:4.4.15.3</product>
<product>phpmyadmin:4.4.15.4</product>
<product>phpmyadmin:4.4.15.5</product>
<product>phpmyadmin:4.4.15.6</product>
<product>phpmyadmin:4.4.15.7</product>
<product>phpmyadmin:4.4.15.8</product>
<product>phpmyadmin:4.6.0</product>
<product>phpmyadmin:4.6.1</product>
<product>phpmyadmin:4.6.2</product>
<product>phpmyadmin:4.6.3</product>
<product>phpmyadmin:4.6.4</product>
</cve>
<cve id="CVE-2016-9850" level="LOW">
<product>phpmyadmin:4.0.0</product>
<product>phpmyadmin:4.0.1</product>
<product>phpmyadmin:4.0.2</product>
<product>phpmyadmin:4.0.3</product>
<product>phpmyadmin:4.0.4</product>
<product>phpmyadmin:4.0.4.1</product>
<product>phpmyadmin:4.0.4.2</product>
<product>phpmyadmin:4.0.5</product>
<product>phpmyadmin:4.0.6</product>
<product>phpmyadmin:4.0.7</product>
<product>phpmyadmin:4.0.8</product>
<product>phpmyadmin:4.0.9</product>
<product>phpmyadmin:4.0.10</product>
<product>phpmyadmin:4.0.10.1</product>
<product>phpmyadmin:4.0.10.2</product>
<product>phpmyadmin:4.0.10.3</product>
<product>phpmyadmin:4.0.10.4</product>
<product>phpmyadmin:4.0.10.5</product>
<product>phpmyadmin:4.0.10.6</product>
<product>phpmyadmin:4.0.10.7</product>
<product>phpmyadmin:4.0.10.8</product>
<product>phpmyadmin:4.0.10.9</product>
<product>phpmyadmin:4.0.10.10</product>
<product>phpmyadmin:4.0.10.11</product>
<product>phpmyadmin:4.0.10.12</product>
<product>phpmyadmin:4.0.10.13</product>
<product>phpmyadmin:4.0.10.14</product>
<product>phpmyadmin:4.0.10.15</product>
<product>phpmyadmin:4.0.10.16</product>
<product>phpmyadmin:4.0.10.17</product>
<product>phpmyadmin:4.4.0</product>
<product>phpmyadmin:4.4.1</product>
<product>phpmyadmin:4.4.1.1</product>
<product>phpmyadmin:4.4.2</product>
<product>phpmyadmin:4.4.3</product>
<product>phpmyadmin:4.4.4</product>
<product>phpmyadmin:4.4.5</product>
<product>phpmyadmin:4.4.6</product>
<product>phpmyadmin:4.4.6.1</product>
<product>phpmyadmin:4.4.7</product>
<product>phpmyadmin:4.4.8</product>
<product>phpmyadmin:4.4.9</product>
<product>phpmyadmin:4.4.10</product>
<product>phpmyadmin:4.4.11</product>
<product>phpmyadmin:4.4.12</product>
<product>phpmyadmin:4.4.13</product>
<product>phpmyadmin:4.4.13.1</product>
<product>phpmyadmin:4.4.14</product>
<product>phpmyadmin:4.4.14.1</product>
<product>phpmyadmin:4.4.15</product>
<product>phpmyadmin:4.4.15.1</product>
<product>phpmyadmin:4.4.15.2</product>
<product>phpmyadmin:4.4.15.3</product>
<product>phpmyadmin:4.4.15.4</product>
<product>phpmyadmin:4.4.15.5</product>
<product>phpmyadmin:4.4.15.6</product>
<product>phpmyadmin:4.4.15.7</product>
<product>phpmyadmin:4.4.15.8</product>
<product>phpmyadmin:4.6.0</product>
<product>phpmyadmin:4.6.1</product>
<product>phpmyadmin:4.6.2</product>
<product>phpmyadmin:4.6.3</product>
<product>phpmyadmin:4.6.4</product>
</cve>
<cve id="CVE-2016-9851" level="LOW">
<product>phpmyadmin:4.4.0</product>
<product>phpmyadmin:4.4.1</product>
<product>phpmyadmin:4.4.1.1</product>
<product>phpmyadmin:4.4.2</product>
<product>phpmyadmin:4.4.3</product>
<product>phpmyadmin:4.4.4</product>
<product>phpmyadmin:4.4.5</product>
<product>phpmyadmin:4.4.6</product>
<product>phpmyadmin:4.4.6.1</product>
<product>phpmyadmin:4.4.7</product>
<product>phpmyadmin:4.4.8</product>
<product>phpmyadmin:4.4.9</product>
<product>phpmyadmin:4.4.10</product>
<product>phpmyadmin:4.4.11</product>
<product>phpmyadmin:4.4.12</product>
<product>phpmyadmin:4.4.13</product>
<product>phpmyadmin:4.4.13.1</product>
<product>phpmyadmin:4.4.14</product>
<product>phpmyadmin:4.4.14.1</product>
<product>phpmyadmin:4.4.15</product>
<product>phpmyadmin:4.4.15.1</product>
<product>phpmyadmin:4.4.15.2</product>
<product>phpmyadmin:4.4.15.3</product>
<product>phpmyadmin:4.4.15.4</product>
<product>phpmyadmin:4.4.15.5</product>
<product>phpmyadmin:4.4.15.6</product>
<product>phpmyadmin:4.4.15.7</product>
<product>phpmyadmin:4.4.15.8</product>
<product>phpmyadmin:4.6.0</product>
<product>phpmyadmin:4.6.1</product>
<product>phpmyadmin:4.6.2</product>
<product>phpmyadmin:4.6.3</product>
<product>phpmyadmin:4.6.4</product>
</cve>
<cve id="CVE-2016-9856" level="MEDIUM">
<product>phpmyadmin:4.0.0</product>
<product>phpmyadmin:4.0.1</product>
<product>phpmyadmin:4.0.2</product>
<product>phpmyadmin:4.0.3</product>
<product>phpmyadmin:4.0.4</product>
<product>phpmyadmin:4.0.4.1</product>
<product>phpmyadmin:4.0.4.2</product>
<product>phpmyadmin:4.0.5</product>
<product>phpmyadmin:4.0.6</product>
<product>phpmyadmin:4.0.7</product>
<product>phpmyadmin:4.0.8</product>
<product>phpmyadmin:4.0.9</product>
<product>phpmyadmin:4.0.10</product>
<product>phpmyadmin:4.0.10.1</product>
<product>phpmyadmin:4.0.10.2</product>
<product>phpmyadmin:4.0.10.3</product>
<product>phpmyadmin:4.0.10.4</product>
<product>phpmyadmin:4.0.10.5</product>
<product>phpmyadmin:4.0.10.6</product>
<product>phpmyadmin:4.0.10.7</product>
<product>phpmyadmin:4.0.10.8</product>
<product>phpmyadmin:4.0.10.9</product>
<product>phpmyadmin:4.0.10.10</product>
<product>phpmyadmin:4.0.10.11</product>
<product>phpmyadmin:4.0.10.12</product>
<product>phpmyadmin:4.0.10.13</product>
<product>phpmyadmin:4.0.10.14</product>
<product>phpmyadmin:4.0.10.15</product>
<product>phpmyadmin:4.0.10.16</product>
<product>phpmyadmin:4.0.10.17</product>
<product>phpmyadmin:4.4.0</product>
<product>phpmyadmin:4.4.1</product>
<product>phpmyadmin:4.4.1.1</product>
<product>phpmyadmin:4.4.2</product>
<product>phpmyadmin:4.4.3</product>
<product>phpmyadmin:4.4.4</product>
<product>phpmyadmin:4.4.5</product>
<product>phpmyadmin:4.4.6</product>
<product>phpmyadmin:4.4.6.1</product>
<product>phpmyadmin:4.4.7</product>
<product>phpmyadmin:4.4.8</product>
<product>phpmyadmin:4.4.9</product>
<product>phpmyadmin:4.4.10</product>
<product>phpmyadmin:4.4.11</product>
<product>phpmyadmin:4.4.12</product>
<product>phpmyadmin:4.4.13</product>
<product>phpmyadmin:4.4.13.1</product>
<product>phpmyadmin:4.4.14</product>
<product>phpmyadmin:4.4.14.1</product>
<product>phpmyadmin:4.4.15</product>
<product>phpmyadmin:4.4.15.1</product>
<product>phpmyadmin:4.4.15.2</product>
<product>phpmyadmin:4.4.15.3</product>
<product>phpmyadmin:4.4.15.4</product>
<product>phpmyadmin:4.4.15.5</product>
<product>phpmyadmin:4.4.15.6</product>
<product>phpmyadmin:4.4.15.7</product>
<product>phpmyadmin:4.4.15.8</product>
<product>phpmyadmin:4.6.0</product>
<product>phpmyadmin:4.6.1</product>
<product>phpmyadmin:4.6.2</product>
<product>phpmyadmin:4.6.3</product>
<product>phpmyadmin:4.6.4</product>
</cve>
<cve id="CVE-2016-9857" level="MEDIUM">
<product>phpmyadmin:4.0.0</product>
<product>phpmyadmin:4.0.1</product>
<product>phpmyadmin:4.0.2</product>
<product>phpmyadmin:4.0.3</product>
<product>phpmyadmin:4.0.4</product>
<product>phpmyadmin:4.0.4.1</product>
<product>phpmyadmin:4.0.4.2</product>
<product>phpmyadmin:4.0.5</product>
<product>phpmyadmin:4.0.6</product>
<product>phpmyadmin:4.0.7</product>
<product>phpmyadmin:4.0.8</product>
<product>phpmyadmin:4.0.9</product>
<product>phpmyadmin:4.0.10</product>
<product>phpmyadmin:4.0.10.1</product>
<product>phpmyadmin:4.0.10.2</product>
<product>phpmyadmin:4.0.10.3</product>
<product>phpmyadmin:4.0.10.4</product>
<product>phpmyadmin:4.0.10.5</product>
<product>phpmyadmin:4.0.10.6</product>
<product>phpmyadmin:4.0.10.7</product>
<product>phpmyadmin:4.0.10.8</product>
<product>phpmyadmin:4.0.10.9</product>
<product>phpmyadmin:4.0.10.10</product>
<product>phpmyadmin:4.0.10.11</product>
<product>phpmyadmin:4.0.10.12</product>
<product>phpmyadmin:4.0.10.13</product>
<product>phpmyadmin:4.0.10.14</product>
<product>phpmyadmin:4.0.10.15</product>
<product>phpmyadmin:4.0.10.16</product>
<product>phpmyadmin:4.0.10.17</product>
<product>phpmyadmin:4.4.0</product>
<product>phpmyadmin:4.4.1</product>
<product>phpmyadmin:4.4.1.1</product>
<product>phpmyadmin:4.4.2</product>
<product>phpmyadmin:4.4.3</product>
<product>phpmyadmin:4.4.4</product>
<product>phpmyadmin:4.4.5</product>
<product>phpmyadmin:4.4.6</product>
<product>phpmyadmin:4.4.6.1</product>
<product>phpmyadmin:4.4.7</product>
<product>phpmyadmin:4.4.8</product>
<product>phpmyadmin:4.4.9</product>
<product>phpmyadmin:4.4.10</product>
<product>phpmyadmin:4.4.11</product>
<product>phpmyadmin:4.4.12</product>
<product>phpmyadmin:4.4.13</product>
<product>phpmyadmin:4.4.13.1</product>
<product>phpmyadmin:4.4.14</product>
<product>phpmyadmin:4.4.14.1</product>
<product>phpmyadmin:4.4.15</product>
<product>phpmyadmin:4.4.15.1</product>
<product>phpmyadmin:4.4.15.2</product>
<product>phpmyadmin:4.4.15.3</product>
<product>phpmyadmin:4.4.15.4</product>
<product>phpmyadmin:4.4.15.5</product>
<product>phpmyadmin:4.4.15.6</product>
<product>phpmyadmin:4.4.15.7</product>
<product>phpmyadmin:4.4.15.8</product>
<product>phpmyadmin:4.6.0</product>
<product>phpmyadmin:4.6.1</product>
<product>phpmyadmin:4.6.2</product>
<product>phpmyadmin:4.6.3</product>
<product>phpmyadmin:4.6.4</product>
</cve>
<cve id="CVE-2016-9854" level="LOW">
<product>phpmyadmin:4.4.0</product>
<product>phpmyadmin:4.4.1</product>
<product>phpmyadmin:4.4.1.1</product>
<product>phpmyadmin:4.4.2</product>
<product>phpmyadmin:4.4.3</product>
<product>phpmyadmin:4.4.4</product>
<product>phpmyadmin:4.4.5</product>
<product>phpmyadmin:4.4.6</product>
<product>phpmyadmin:4.4.6.1</product>
<product>phpmyadmin:4.4.7</product>
<product>phpmyadmin:4.4.8</product>
<product>phpmyadmin:4.4.9</product>
<product>phpmyadmin:4.4.10</product>
<product>phpmyadmin:4.4.11</product>
<product>phpmyadmin:4.4.12</product>
<product>phpmyadmin:4.4.13</product>
<product>phpmyadmin:4.4.13.1</product>
<product>phpmyadmin:4.4.14</product>
<product>phpmyadmin:4.4.14.1</product>
<product>phpmyadmin:4.4.15</product>
<product>phpmyadmin:4.4.15.1</product>
<product>phpmyadmin:4.4.15.2</product>
<product>phpmyadmin:4.4.15.3</product>
<product>phpmyadmin:4.4.15.4</product>
<product>phpmyadmin:4.4.15.5</product>
<product>phpmyadmin:4.4.15.6</product>
<product>phpmyadmin:4.4.15.7</product>
<product>phpmyadmin:4.4.15.8</product>
<product>phpmyadmin:4.6.0</product>
<product>phpmyadmin:4.6.1</product>
<product>phpmyadmin:4.6.2</product>
<product>phpmyadmin:4.6.3</product>
<product>phpmyadmin:4.6.4</product>
</cve>
<cve id="CVE-2016-9855" level="LOW">
<product>phpmyadmin:4.4.0</product>
<product>phpmyadmin:4.4.1</product>
<product>phpmyadmin:4.4.1.1</product>
<product>phpmyadmin:4.4.2</product>
<product>phpmyadmin:4.4.3</product>
<product>phpmyadmin:4.4.4</product>
<product>phpmyadmin:4.4.5</product>
<product>phpmyadmin:4.4.6</product>
<product>phpmyadmin:4.4.6.1</product>
<product>phpmyadmin:4.4.7</product>
<product>phpmyadmin:4.4.8</product>
<product>phpmyadmin:4.4.9</product>
<product>phpmyadmin:4.4.10</product>
<product>phpmyadmin:4.4.11</product>
<product>phpmyadmin:4.4.12</product>
<product>phpmyadmin:4.4.13</product>
<product>phpmyadmin:4.4.13.1</product>
<product>phpmyadmin:4.4.14</product>
<product>phpmyadmin:4.4.14.1</product>
<product>phpmyadmin:4.4.15</product>
<product>phpmyadmin:4.4.15.1</product>
<product>phpmyadmin:4.4.15.2</product>
<product>phpmyadmin:4.4.15.3</product>
<product>phpmyadmin:4.4.15.4</product>
<product>phpmyadmin:4.4.15.5</product>
<product>phpmyadmin:4.4.15.6</product>
<product>phpmyadmin:4.4.15.7</product>
<product>phpmyadmin:4.4.15.8</product>
<product>phpmyadmin:4.6.0</product>
<product>phpmyadmin:4.6.1</product>
<product>phpmyadmin:4.6.2</product>
<product>phpmyadmin:4.6.3</product>
<product>phpmyadmin:4.6.4</product>
</cve>
<cve id="CVE-2016-10169" level="MEDIUM">
<product>wavpack:5.0.0</product>
</cve>
<cve id="CVE-2016-10168" level="MEDIUM">
<product>libgd:2.2.3</product>
</cve>
<cve id="CVE-2016-2971" level="LOW">
<product>sametime:8.5.2.0</product>
<product>sametime:8.5.2.1</product>
<product>sametime:9.0.0.0</product>
<product>sametime:9.0.0.1</product>
<product>sametime:9.0.1</product>
</cve>
<cve id="CVE-2016-10163" level="LOW">
<product>virglrenderer:0.5.0</product>
</cve>
<cve id="CVE-2016-10164" level="LOW">
<product>libxpm:3.5.11</product>
</cve>
<cve id="CVE-2016-10167" level="MEDIUM">
<product>libgd:2.2.3</product>
</cve>
<cve id="CVE-2016-10166" level="LOW">
<product>libgd:2.2.3</product>
</cve>
<cve id="CVE-2016-6912" level="LOW">
<product>libgd:2.2.3</product>
</cve>
<cve id="CVE-2016-9086" level="LOW">
<product>gitlab:8.9.0</product>
<product>gitlab:8.9.1</product>
<product>gitlab:8.9.2</product>
<product>gitlab:8.9.3</product>
<product>gitlab:8.9.4</product>
<product>gitlab:8.9.5</product>
<product>gitlab:8.9.6</product>
<product>gitlab:8.9.7</product>
<product>gitlab:8.9.8</product>
<product>gitlab:8.9.9</product>
<product>gitlab:8.9.10</product>
<product>gitlab:8.9.11</product>
<product>gitlab:8.10.0</product>
<product>gitlab:8.10.1</product>
<product>gitlab:8.10.2</product>
<product>gitlab:8.10.3</product>
<product>gitlab:8.10.4</product>
<product>gitlab:8.10.5</product>
<product>gitlab:8.10.6</product>
<product>gitlab:8.10.7</product>
<product>gitlab:8.10.8</product>
<product>gitlab:8.10.9</product>
<product>gitlab:8.10.10</product>
<product>gitlab:8.10.11</product>
<product>gitlab:8.10.12</product>
<product>gitlab:8.11.0</product>
<product>gitlab:8.11.1</product>
<product>gitlab:8.11.2</product>
<product>gitlab:8.11.3</product>
<product>gitlab:8.11.4</product>
<product>gitlab:8.11.5</product>
<product>gitlab:8.11.6</product>
<product>gitlab:8.11.7</product>
<product>gitlab:8.11.8</product>
<product>gitlab:8.11.9</product>
<product>gitlab:8.12.0</product>
<product>gitlab:8.12.1</product>
<product>gitlab:8.12.2</product>
<product>gitlab:8.12.3</product>
<product>gitlab:8.12.4</product>
<product>gitlab:8.12.5</product>
<product>gitlab:8.12.6</product>
<product>gitlab:8.12.7</product>
<product>gitlab:8.13.0</product>
<product>gitlab:8.13.1</product>
<product>gitlab:8.13.2</product>
</cve>
<cve id="CVE-2016-6913" level="MEDIUM">
<product>open_source_security_information_and_event_management:5.2</product>
<product>unified_security_management:5.2</product>
</cve>
<cve id="CVE-2016-2974" level="LOW">
<product>sametime:8.5.2.0</product>
<product>sametime:8.5.2.1</product>
<product>sametime:9.0.0.0</product>
<product>sametime:9.0.0.1</product>
<product>sametime:9.0.1</product>
</cve>
<cve id="CVE-2016-6911" level="MEDIUM">
<product>libgd:2.2.3</product>
</cve>
<cve id="CVE-2016-6916" level="LOW">
<product>video_driver:-</product>
<product>shield_tablet_firmware:4.3.0</product>
<product>shield_tablet_tk1_firmware:1.4.0</product>
<product>shield_tv_firmware:3.2</product>
</cve>
<cve id="CVE-2016-2977" level="LOW">
<product>sametime:8.5.2.0</product>
<product>sametime:8.5.2.1</product>
<product>sametime:9.0.0.0</product>
<product>sametime:9.0.0.1</product>
<product>sametime:9.0.1</product>
</cve>
<cve id="CVE-2016-9924" level="LOW">
<product>zimbra_collaboration_suite:8.7.3</product>
</cve>
<cve id="CVE-2016-3437" level="MEDIUM">
<product>crm_technical_foundation:12.1.3</product>
</cve>
<cve id="CVE-2016-3434" level="MEDIUM">
<product>application_object_library:12.1.3</product>
<product>application_object_library:12.2.3</product>
<product>application_object_library:12.2.4</product>
<product>application_object_library:12.2.5</product>
</cve>
<cve id="CVE-2016-1289" level="LOW">
<product>evolved_programmable_network_manager:1.2.0</product>
<product>prime_infrastructure:1.2.0</product>
<product>prime_infrastructure:1.2.0.103</product>
<product>prime_infrastructure:1.2.1</product>
<product>prime_infrastructure:1.3.0</product>
<product>prime_infrastructure:1.3.0.20</product>
<product>prime_infrastructure:1.4.0</product>
<product>prime_infrastructure:1.4.0.45</product>
<product>prime_infrastructure:1.4.1</product>
<product>prime_infrastructure:1.4.2</product>
<product>prime_infrastructure:2.0.0</product>
<product>prime_infrastructure:2.1.0</product>
<product>prime_infrastructure:2.2%282%29</product>
<product>prime_infrastructure:2.2.0</product>
</cve>
<cve id="CVE-2016-1288" level="LOW">
<product>web_security_appliance:8.5.0-497</product>
<product>web_security_appliance:9.0.0-193</product>
</cve>
<cve id="CVE-2016-1287" level="LOW">
<product>adaptive_security_appliance_software:7.2.1</product>
<product>adaptive_security_appliance_software:7.2.1.9</product>
<product>adaptive_security_appliance_software:7.2.1.13</product>
<product>adaptive_security_appliance_software:7.2.1.19</product>
<product>adaptive_security_appliance_software:7.2.1.24</product>
<product>adaptive_security_appliance_software:7.2.2</product>
<product>adaptive_security_appliance_software:7.2.2.6</product>
<product>adaptive_security_appliance_software:7.2.2.10</product>
<product>adaptive_security_appliance_software:7.2.2.14</product>
<product>adaptive_security_appliance_software:7.2.2.18</product>
<product>adaptive_security_appliance_software:7.2.2.19</product>
<product>adaptive_security_appliance_software:7.2.2.22</product>
<product>adaptive_security_appliance_software:7.2.2.34</product>
<product>adaptive_security_appliance_software:7.2.3</product>
<product>adaptive_security_appliance_software:7.2.3.1</product>
<product>adaptive_security_appliance_software:7.2.3.12</product>
<product>adaptive_security_appliance_software:7.2.3.16</product>
<product>adaptive_security_appliance_software:7.2.4</product>
<product>adaptive_security_appliance_software:7.2.4.6</product>
<product>adaptive_security_appliance_software:7.2.4.9</product>
<product>adaptive_security_appliance_software:7.2.4.18</product>
<product>adaptive_security_appliance_software:7.2.4.25</product>
<product>adaptive_security_appliance_software:7.2.4.27</product>
<product>adaptive_security_appliance_software:7.2.4.30</product>
<product>adaptive_security_appliance_software:7.2.4.33</product>
<product>adaptive_security_appliance_software:7.2.5</product>
<product>adaptive_security_appliance_software:7.2.5.2</product>
<product>adaptive_security_appliance_software:7.2.5.4</product>
<product>adaptive_security_appliance_software:7.2.5.7</product>
<product>adaptive_security_appliance_software:7.2.5.8</product>
<product>adaptive_security_appliance_software:7.2.5.10</product>
<product>adaptive_security_appliance_software:7.2.5.12</product>
<product>adaptive_security_appliance_software:7.2.5.16</product>
<product>adaptive_security_appliance_software:8.2.0.45</product>
<product>adaptive_security_appliance_software:8.2.1</product>
<product>adaptive_security_appliance_software:8.2.1.11</product>
<product>adaptive_security_appliance_software:8.2.2</product>
<product>adaptive_security_appliance_software:8.2.2.9</product>
<product>adaptive_security_appliance_software:8.2.2.10</product>
<product>adaptive_security_appliance_software:8.2.2.12</product>
<product>adaptive_security_appliance_software:8.2.2.16</product>
<product>adaptive_security_appliance_software:8.2.2.17</product>
<product>adaptive_security_appliance_software:8.2.3</product>
<product>adaptive_security_appliance_software:8.2.4</product>
<product>adaptive_security_appliance_software:8.2.4.1</product>
<product>adaptive_security_appliance_software:8.2.4.4</product>
<product>adaptive_security_appliance_software:8.2.5</product>
<product>adaptive_security_appliance_software:8.2.5.13</product>
<product>adaptive_security_appliance_software:8.2.5.22</product>
<product>adaptive_security_appliance_software:8.2.5.26</product>
<product>adaptive_security_appliance_software:8.2.5.33</product>
<product>adaptive_security_appliance_software:8.2.5.40</product>
<product>adaptive_security_appliance_software:8.2.5.41</product>
<product>adaptive_security_appliance_software:8.2.5.46</product>
<product>adaptive_security_appliance_software:8.2.5.48</product>
<product>adaptive_security_appliance_software:8.2.5.50</product>
<product>adaptive_security_appliance_software:8.2.5.52</product>
<product>adaptive_security_appliance_software:8.2.5.55</product>
<product>adaptive_security_appliance_software:8.2.5.57</product>
<product>adaptive_security_appliance_software:8.3.1</product>
<product>adaptive_security_appliance_software:8.3.1.1</product>
<product>adaptive_security_appliance_software:8.3.1.4</product>
<product>adaptive_security_appliance_software:8.3.1.6</product>
<product>adaptive_security_appliance_software:8.3.2</product>
<product>adaptive_security_appliance_software:8.3.2.4</product>
<product>adaptive_security_appliance_software:8.3.2.13</product>
<product>adaptive_security_appliance_software:8.3.2.23</product>
<product>adaptive_security_appliance_software:8.3.2.25</product>
<product>adaptive_security_appliance_software:8.3.2.31</product>
<product>adaptive_security_appliance_software:8.3.2.33</product>
<product>adaptive_security_appliance_software:8.3.2.34</product>
<product>adaptive_security_appliance_software:8.3.2.37</product>
<product>adaptive_security_appliance_software:8.3.2.39</product>
<product>adaptive_security_appliance_software:8.3.2.40</product>
<product>adaptive_security_appliance_software:8.3.2.41</product>
<product>adaptive_security_appliance_software:8.3.2.44</product>
<product>adaptive_security_appliance_software:8.4.0</product>
<product>adaptive_security_appliance_software:8.4.1</product>
<product>adaptive_security_appliance_software:8.4.1.3</product>
<product>adaptive_security_appliance_software:8.4.1.11</product>
<product>adaptive_security_appliance_software:8.4.2</product>
<product>adaptive_security_appliance_software:8.4.2.1</product>
<product>adaptive_security_appliance_software:8.4.2.8</product>
<product>adaptive_security_appliance_software:8.4.3</product>
<product>adaptive_security_appliance_software:8.4.3.8</product>
<product>adaptive_security_appliance_software:8.4.3.9</product>
<product>adaptive_security_appliance_software:8.4.4</product>
<product>adaptive_security_appliance_software:8.4.4.1</product>
<product>adaptive_security_appliance_software:8.4.4.3</product>
<product>adaptive_security_appliance_software:8.4.4.5</product>
<product>adaptive_security_appliance_software:8.4.4.9</product>
<product>adaptive_security_appliance_software:8.4.5</product>
<product>adaptive_security_appliance_software:8.4.5.6</product>
<product>adaptive_security_appliance_software:8.4.6</product>
<product>adaptive_security_appliance_software:8.4.7</product>
<product>adaptive_security_appliance_software:8.4.7.3</product>
<product>adaptive_security_appliance_software:8.4.7.15</product>
<product>adaptive_security_appliance_software:8.4.7.22</product>
<product>adaptive_security_appliance_software:8.4.7.23</product>
<product>adaptive_security_appliance_software:8.4.7.26</product>
<product>adaptive_security_appliance_software:8.4.7.28</product>
<product>adaptive_security_appliance_software:8.4.7.29</product>
<product>adaptive_security_appliance_software:8.5.1</product>
<product>adaptive_security_appliance_software:8.5.1.1</product>
<product>adaptive_security_appliance_software:8.5.1.6</product>
<product>adaptive_security_appliance_software:8.5.1.7</product>
<product>adaptive_security_appliance_software:8.5.1.14</product>
<product>adaptive_security_appliance_software:8.5.1.17</product>
<product>adaptive_security_appliance_software:8.5.1.18</product>
<product>adaptive_security_appliance_software:8.5.1.19</product>
<product>adaptive_security_appliance_software:8.5.1.21</product>
<product>adaptive_security_appliance_software:8.5.1.24</product>
<product>adaptive_security_appliance_software:8.6.1</product>
<product>adaptive_security_appliance_software:8.6.1.1</product>
<product>adaptive_security_appliance_software:8.6.1.2</product>
<product>adaptive_security_appliance_software:8.6.1.5</product>
<product>adaptive_security_appliance_software:8.6.1.10</product>
<product>adaptive_security_appliance_software:8.6.1.12</product>
<product>adaptive_security_appliance_software:8.6.1.13</product>
<product>adaptive_security_appliance_software:8.6.1.14</product>
<product>adaptive_security_appliance_software:8.6.1.17</product>
<product>adaptive_security_appliance_software:8.7.1</product>
<product>adaptive_security_appliance_software:8.7.1.1</product>
<product>adaptive_security_appliance_software:8.7.1.3</product>
<product>adaptive_security_appliance_software:8.7.1.4</product>
<product>adaptive_security_appliance_software:8.7.1.7</product>
<product>adaptive_security_appliance_software:8.7.1.8</product>
<product>adaptive_security_appliance_software:8.7.1.11</product>
<product>adaptive_security_appliance_software:8.7.1.13</product>
<product>adaptive_security_appliance_software:8.7.1.16</product>
<product>adaptive_security_appliance_software:8.7.1.17</product>
<product>adaptive_security_appliance_software:9.0.1</product>
<product>adaptive_security_appliance_software:9.0.2</product>
<product>adaptive_security_appliance_software:9.0.2.10</product>
<product>adaptive_security_appliance_software:9.0.3</product>
<product>adaptive_security_appliance_software:9.0.3.6</product>
<product>adaptive_security_appliance_software:9.0.3.8</product>
<product>adaptive_security_appliance_software:9.0.4</product>
<product>adaptive_security_appliance_software:9.0.4.1</product>
<product>adaptive_security_appliance_software:9.0.4.5</product>
<product>adaptive_security_appliance_software:9.0.4.7</product>
<product>adaptive_security_appliance_software:9.0.4.17</product>
<product>adaptive_security_appliance_software:9.0.4.20</product>
<product>adaptive_security_appliance_software:9.0.4.24</product>
<product>adaptive_security_appliance_software:9.0.4.26</product>
<product>adaptive_security_appliance_software:9.0.4.29</product>
<product>adaptive_security_appliance_software:9.0.4.33</product>
<product>adaptive_security_appliance_software:9.0.4.35</product>
<product>adaptive_security_appliance_software:9.0.4.37</product>
<product>adaptive_security_appliance_software:9.1.1</product>
<product>adaptive_security_appliance_software:9.1.1.4</product>
<product>adaptive_security_appliance_software:9.1.2</product>
<product>adaptive_security_appliance_software:9.1.2.8</product>
<product>adaptive_security_appliance_software:9.1.3</product>
<product>adaptive_security_appliance_software:9.1.3.2</product>
<product>adaptive_security_appliance_software:9.1.4</product>
<product>adaptive_security_appliance_software:9.1.4.5</product>
<product>adaptive_security_appliance_software:9.1.5</product>
<product>adaptive_security_appliance_software:9.1.5.10</product>
<product>adaptive_security_appliance_software:9.1.5.12</product>
<product>adaptive_security_appliance_software:9.1.5.15</product>
<product>adaptive_security_appliance_software:9.1.5.21</product>
<product>adaptive_security_appliance_software:9.1.6</product>
<product>adaptive_security_appliance_software:9.1.6.1</product>
<product>adaptive_security_appliance_software:9.1.6.4</product>
<product>adaptive_security_appliance_software:9.1.6.6</product>
<product>adaptive_security_appliance_software:9.1.6.8</product>
<product>adaptive_security_appliance_software:9.1.6.10</product>
<product>adaptive_security_appliance_software:9.2.1</product>
<product>adaptive_security_appliance_software:9.2.2</product>
<product>adaptive_security_appliance_software:9.2.2.4</product>
<product>adaptive_security_appliance_software:9.2.2.7</product>
<product>adaptive_security_appliance_software:9.2.2.8</product>
<product>adaptive_security_appliance_software:9.2.3</product>
<product>adaptive_security_appliance_software:9.2.3.3</product>
<product>adaptive_security_appliance_software:9.2.3.4</product>
<product>adaptive_security_appliance_software:9.2.4</product>
<product>adaptive_security_appliance_software:9.2.4.2</product>
<product>adaptive_security_appliance_software:9.2.4.4</product>
<product>adaptive_security_appliance_software:9.3.1</product>
<product>adaptive_security_appliance_software:9.3.1.1</product>
<product>adaptive_security_appliance_software:9.3.2</product>
<product>adaptive_security_appliance_software:9.3.2.2</product>
<product>adaptive_security_appliance_software:9.3.3</product>
<product>adaptive_security_appliance_software:9.3.3.1</product>
<product>adaptive_security_appliance_software:9.3.3.2</product>
<product>adaptive_security_appliance_software:9.3.3.5</product>
<product>adaptive_security_appliance_software:9.3.3.6</product>
<product>adaptive_security_appliance_software:9.3.5</product>
<product>adaptive_security_appliance_software:9.4.0.115</product>
<product>adaptive_security_appliance_software:9.4.1</product>
<product>adaptive_security_appliance_software:9.4.1.1</product>
<product>adaptive_security_appliance_software:9.4.1.2</product>
<product>adaptive_security_appliance_software:9.4.1.3</product>
<product>adaptive_security_appliance_software:9.4.1.5</product>
<product>adaptive_security_appliance_software:9.4.2</product>
<product>adaptive_security_appliance_software:9.4.2.3</product>
<product>adaptive_security_appliance_software:9.5.1</product>
<product>adaptive_security_appliance_software:9.5.2</product>
</cve>
<cve id="CVE-2016-1286" level="LOW">
<product>bind:9.0</product>
<product>bind:9.0.0</product>
<product>bind:9.0.0</product>
<product>bind:9.0.0</product>
<product>bind:9.0.0</product>
<product>bind:9.0.0</product>
<product>bind:9.0.0</product>
<product>bind:9.0.1</product>
<product>bind:9.0.1</product>
<product>bind:9.0.1</product>
<product>bind:9.1</product>
<product>bind:9.1.0</product>
<product>bind:9.1.1</product>
<product>bind:9.1.1</product>
<product>bind:9.1.1</product>
<product>bind:9.1.1</product>
<product>bind:9.1.1</product>
<product>bind:9.1.1</product>
<product>bind:9.1.1</product>
<product>bind:9.1.1</product>
<product>bind:9.1.2</product>
<product>bind:9.1.2</product>
<product>bind:9.1.3</product>
<product>bind:9.1.3</product>
<product>bind:9.1.3</product>
<product>bind:9.1.3</product>
<product>bind:9.2</product>
<product>bind:9.2.0</product>
<product>bind:9.2.0</product>
<product>bind:9.2.0</product>
<product>bind:9.2.0</product>
<product>bind:9.2.0</product>
<product>bind:9.2.0</product>
<product>bind:9.2.0</product>
<product>bind:9.2.0</product>
<product>bind:9.2.0</product>
<product>bind:9.2.0</product>
<product>bind:9.2.0</product>
<product>bind:9.2.0</product>
<product>bind:9.2.0</product>
<product>bind:9.2.0</product>
<product>bind:9.2.0</product>
<product>bind:9.2.0</product>
<product>bind:9.2.1</product>
<product>bind:9.2.1</product>
<product>bind:9.2.1</product>
<product>bind:9.2.2</product>
<product>bind:9.2.2</product>
<product>bind:9.2.2</product>
<product>bind:9.2.2</product>
<product>bind:9.2.3</product>
<product>bind:9.2.3</product>
<product>bind:9.2.3</product>
<product>bind:9.2.3</product>
<product>bind:9.2.3</product>
<product>bind:9.2.4</product>
<product>bind:9.2.4</product>
<product>bind:9.2.4</product>
<product>bind:9.2.4</product>
<product>bind:9.2.4</product>
<product>bind:9.2.4</product>
<product>bind:9.2.4</product>
<product>bind:9.2.4</product>
<product>bind:9.2.5</product>
<product>bind:9.2.5</product>
<product>bind:9.2.5</product>
<product>bind:9.2.6</product>
<product>bind:9.2.6</product>
<product>bind:9.2.7</product>
<product>bind:9.2.7</product>
<product>bind:9.2.7</product>
<product>bind:9.2.7</product>
<product>bind:9.2.8</product>
<product>bind:9.2.9</product>
<product>bind:9.2.9</product>
<product>bind:9.3</product>
<product>bind:9.3.0</product>
<product>bind:9.3.0</product>
<product>bind:9.3.0</product>
<product>bind:9.3.0</product>
<product>bind:9.3.0</product>
<product>bind:9.3.0</product>
<product>bind:9.3.0</product>
<product>bind:9.3.0</product>
<product>bind:9.3.1</product>
<product>bind:9.3.1</product>
<product>bind:9.3.1</product>
<product>bind:9.3.2</product>
<product>bind:9.3.2</product>
<product>bind:9.3.3</product>
<product>bind:9.3.3</product>
<product>bind:9.3.3</product>
<product>bind:9.3.3</product>
<product>bind:9.3.4</product>
<product>bind:9.3.5</product>
<product>bind:9.3.5</product>
<product>bind:9.3.5</product>
<product>bind:9.3.6</product>
<product>bind:9.3.6</product>
<product>bind:9.4</product>
<product>bind:9.4.0</product>
<product>bind:9.4.0</product>
<product>bind:9.4.0</product>
<product>bind:9.4.0</product>
<product>bind:9.4.0</product>
<product>bind:9.4.0</product>
<product>bind:9.4.0</product>
<product>bind:9.4.0</product>
<product>bind:9.4.0</product>
<product>bind:9.4.0</product>
<product>bind:9.4.0</product>
<product>bind:9.4.0</product>
<product>bind:9.4.0</product>
<product>bind:9.4.1</product>
<product>bind:9.4.2</product>
<product>bind:9.4.2</product>
<product>bind:9.4.2</product>
<product>bind:9.4.3</product>
<product>bind:9.4.3</product>
<product>bind:9.4.3</product>
<product>bind:9.4.3</product>
<product>bind:9.4.3</product>
<product>bind:9.4.3</product>
<product>bind:9.5</product>
<product>bind:9.5.0</product>
<product>bind:9.5.0</product>
<product>bind:9.5.0</product>
<product>bind:9.5.0</product>
<product>bind:9.5.0</product>
<product>bind:9.5.0</product>
<product>bind:9.5.0</product>
<product>bind:9.5.0</product>
<product>bind:9.5.0</product>
<product>bind:9.5.0</product>
<product>bind:9.5.0</product>
<product>bind:9.5.0</product>
<product>bind:9.5.0</product>
<product>bind:9.5.0</product>
<product>bind:9.5.0</product>
<product>bind:9.5.0</product>
<product>bind:9.5.1</product>
<product>bind:9.5.1</product>
<product>bind:9.5.1</product>
<product>bind:9.5.1</product>
<product>bind:9.5.1</product>
<product>bind:9.5.1</product>
<product>bind:9.5.2</product>
<product>bind:9.5.2</product>
<product>bind:9.5.2</product>
<product>bind:9.5.2</product>
<product>bind:9.5.2</product>
<product>bind:9.5.2</product>
<product>bind:9.5.2</product>
<product>bind:9.5.3</product>
<product>bind:9.5.3</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6.0</product>
<product>bind:9.6.0</product>
<product>bind:9.6.0</product>
<product>bind:9.6.0</product>
<product>bind:9.6.0</product>
<product>bind:9.6.0</product>
<product>bind:9.6.1</product>
<product>bind:9.6.1</product>
<product>bind:9.6.1</product>
<product>bind:9.6.1</product>
<product>bind:9.6.1</product>
<product>bind:9.6.1</product>
<product>bind:9.6.2</product>
<product>bind:9.6.2</product>
<product>bind:9.6.2</product>
<product>bind:9.6.2</product>
<product>bind:9.6.2</product>
<product>bind:9.6.2</product>
<product>bind:9.6.3</product>
<product>bind:9.6.3</product>
<product>bind:9.6.3</product>
<product>bind:9.7.0</product>
<product>bind:9.7.0</product>
<product>bind:9.7.0</product>
<product>bind:9.7.0</product>
<product>bind:9.7.0</product>
<product>bind:9.7.0</product>
<product>bind:9.7.0</product>
<product>bind:9.7.0</product>
<product>bind:9.7.0</product>
<product>bind:9.7.0</product>
<product>bind:9.7.0</product>
<product>bind:9.7.1</product>
<product>bind:9.7.1</product>
<product>bind:9.7.1</product>
<product>bind:9.7.1</product>
<product>bind:9.7.1</product>
<product>bind:9.7.2</product>
<product>bind:9.7.2</product>
<product>bind:9.7.2</product>
<product>bind:9.7.2</product>
<product>bind:9.7.2</product>
<product>bind:9.7.3</product>
<product>bind:9.7.3</product>
<product>bind:9.7.3</product>
<product>bind:9.7.3</product>
<product>bind:9.7.4</product>
<product>bind:9.7.4</product>
<product>bind:9.7.4</product>
<product>bind:9.7.4</product>
<product>bind:9.7.5</product>
<product>bind:9.7.5</product>
<product>bind:9.7.5</product>
<product>bind:9.7.5</product>
<product>bind:9.7.6</product>
<product>bind:9.7.6</product>
<product>bind:9.7.6</product>
<product>bind:9.7.6</product>
<product>bind:9.7.6</product>
<product>bind:9.7.7</product>
<product>bind:9.8.0</product>
<product>bind:9.8.0</product>
<product>bind:9.8.0</product>
<product>bind:9.8.0</product>
<product>bind:9.8.0</product>
<product>bind:9.8.0</product>
<product>bind:9.8.0</product>
<product>bind:9.8.1</product>
<product>bind:9.8.1</product>
<product>bind:9.8.1</product>
<product>bind:9.8.1</product>
<product>bind:9.8.1</product>
<product>bind:9.8.1</product>
<product>bind:9.8.2</product>
<product>bind:9.8.2</product>
<product>bind:9.8.2</product>
<product>bind:9.8.2</product>
<product>bind:9.8.3</product>
<product>bind:9.8.3</product>
<product>bind:9.8.3</product>
<product>bind:9.8.3</product>
<product>bind:9.8.3</product>
<product>bind:9.8.4</product>
<product>bind:9.8.5</product>
<product>bind:9.8.5</product>
<product>bind:9.8.5</product>
<product>bind:9.8.5</product>
<product>bind:9.8.5</product>
<product>bind:9.8.5</product>
<product>bind:9.8.5</product>
<product>bind:9.8.6</product>
<product>bind:9.8.6</product>
<product>bind:9.8.6</product>
<product>bind:9.9.0</product>
<product>bind:9.9.0</product>
<product>bind:9.9.0</product>
<product>bind:9.9.0</product>
<product>bind:9.9.0</product>
<product>bind:9.9.0</product>
<product>bind:9.9.0</product>
<product>bind:9.9.0</product>
<product>bind:9.9.0</product>
<product>bind:9.9.0</product>
<product>bind:9.9.1</product>
<product>bind:9.9.1</product>
<product>bind:9.9.1</product>
<product>bind:9.9.1</product>
<product>bind:9.9.1</product>
<product>bind:9.9.2</product>
<product>bind:9.9.3</product>
<product>bind:9.9.3</product>
<product>bind:9.9.3</product>
<product>bind:9.9.3</product>
<product>bind:9.9.3</product>
<product>bind:9.9.3</product>
<product>bind:9.9.3</product>
<product>bind:9.9.4</product>
<product>bind:9.9.5</product>
<product>bind:9.9.6</product>
<product>bind:9.9.6</product>
<product>bind:9.9.7</product>
<product>bind:9.9.7</product>
<product>bind:9.9.7</product>
<product>bind:9.9.7</product>
<product>bind:9.9.8</product>
<product>bind:9.9.8</product>
<product>bind:9.9.8</product>
<product>bind:9.9.8</product>
<product>bind:9.10.0</product>
<product>bind:9.10.0</product>
<product>bind:9.10.0</product>
<product>bind:9.10.0</product>
<product>bind:9.10.0</product>
<product>bind:9.10.0</product>
<product>bind:9.10.0</product>
<product>bind:9.10.0</product>
<product>bind:9.10.0</product>
<product>bind:9.10.1</product>
<product>bind:9.10.1</product>
<product>bind:9.10.1</product>
<product>bind:9.10.1</product>
<product>bind:9.10.1</product>
<product>bind:9.10.1</product>
<product>bind:9.10.1</product>
<product>bind:9.10.2</product>
<product>bind:9.10.2</product>
<product>bind:9.10.2</product>
<product>bind:9.10.2</product>
<product>bind:9.10.2</product>
<product>bind:9.10.2</product>
<product>bind:9.10.2</product>
<product>bind:9.10.2</product>
<product>bind:9.10.3</product>
<product>bind:9.10.3</product>
<product>bind:9.10.3</product>
<product>bind:9.10.3</product>
<product>bind:9.10.3</product>
<product>suse_manager:2.1</product>
<product>suse_manager_proxy:2.1</product>
<product>suse_openstack_cloud:5</product>
</cve>
<cve id="CVE-2016-1285" level="MEDIUM">
<product>bind:9.0</product>
<product>bind:9.0.0</product>
<product>bind:9.0.0</product>
<product>bind:9.0.0</product>
<product>bind:9.0.0</product>
<product>bind:9.0.0</product>
<product>bind:9.0.0</product>
<product>bind:9.0.1</product>
<product>bind:9.0.1</product>
<product>bind:9.0.1</product>
<product>bind:9.1</product>
<product>bind:9.1.0</product>
<product>bind:9.1.1</product>
<product>bind:9.1.1</product>
<product>bind:9.1.1</product>
<product>bind:9.1.1</product>
<product>bind:9.1.1</product>
<product>bind:9.1.1</product>
<product>bind:9.1.1</product>
<product>bind:9.1.1</product>
<product>bind:9.1.2</product>
<product>bind:9.1.2</product>
<product>bind:9.1.3</product>
<product>bind:9.1.3</product>
<product>bind:9.1.3</product>
<product>bind:9.1.3</product>
<product>bind:9.2</product>
<product>bind:9.2.0</product>
<product>bind:9.2.0</product>
<product>bind:9.2.0</product>
<product>bind:9.2.0</product>
<product>bind:9.2.0</product>
<product>bind:9.2.0</product>
<product>bind:9.2.0</product>
<product>bind:9.2.0</product>
<product>bind:9.2.0</product>
<product>bind:9.2.0</product>
<product>bind:9.2.0</product>
<product>bind:9.2.0</product>
<product>bind:9.2.0</product>
<product>bind:9.2.0</product>
<product>bind:9.2.0</product>
<product>bind:9.2.0</product>
<product>bind:9.2.1</product>
<product>bind:9.2.1</product>
<product>bind:9.2.1</product>
<product>bind:9.2.2</product>
<product>bind:9.2.2</product>
<product>bind:9.2.2</product>
<product>bind:9.2.2</product>
<product>bind:9.2.3</product>
<product>bind:9.2.3</product>
<product>bind:9.2.3</product>
<product>bind:9.2.3</product>
<product>bind:9.2.3</product>
<product>bind:9.2.4</product>
<product>bind:9.2.4</product>
<product>bind:9.2.4</product>
<product>bind:9.2.4</product>
<product>bind:9.2.4</product>
<product>bind:9.2.4</product>
<product>bind:9.2.4</product>
<product>bind:9.2.4</product>
<product>bind:9.2.5</product>
<product>bind:9.2.5</product>
<product>bind:9.2.5</product>
<product>bind:9.2.6</product>
<product>bind:9.2.6</product>
<product>bind:9.2.7</product>
<product>bind:9.2.7</product>
<product>bind:9.2.7</product>
<product>bind:9.2.7</product>
<product>bind:9.2.8</product>
<product>bind:9.2.9</product>
<product>bind:9.2.9</product>
<product>bind:9.3</product>
<product>bind:9.3.0</product>
<product>bind:9.3.0</product>
<product>bind:9.3.0</product>
<product>bind:9.3.0</product>
<product>bind:9.3.0</product>
<product>bind:9.3.0</product>
<product>bind:9.3.0</product>
<product>bind:9.3.0</product>
<product>bind:9.3.1</product>
<product>bind:9.3.1</product>
<product>bind:9.3.1</product>
<product>bind:9.3.2</product>
<product>bind:9.3.2</product>
<product>bind:9.3.3</product>
<product>bind:9.3.3</product>
<product>bind:9.3.3</product>
<product>bind:9.3.3</product>
<product>bind:9.3.4</product>
<product>bind:9.3.5</product>
<product>bind:9.3.5</product>
<product>bind:9.3.5</product>
<product>bind:9.3.6</product>
<product>bind:9.3.6</product>
<product>bind:9.4</product>
<product>bind:9.4.0</product>
<product>bind:9.4.0</product>
<product>bind:9.4.0</product>
<product>bind:9.4.0</product>
<product>bind:9.4.0</product>
<product>bind:9.4.0</product>
<product>bind:9.4.0</product>
<product>bind:9.4.0</product>
<product>bind:9.4.0</product>
<product>bind:9.4.0</product>
<product>bind:9.4.0</product>
<product>bind:9.4.0</product>
<product>bind:9.4.0</product>
<product>bind:9.4.1</product>
<product>bind:9.4.2</product>
<product>bind:9.4.2</product>
<product>bind:9.4.2</product>
<product>bind:9.4.3</product>
<product>bind:9.4.3</product>
<product>bind:9.4.3</product>
<product>bind:9.4.3</product>
<product>bind:9.4.3</product>
<product>bind:9.4.3</product>
<product>bind:9.5</product>
<product>bind:9.5.0</product>
<product>bind:9.5.0</product>
<product>bind:9.5.0</product>
<product>bind:9.5.0</product>
<product>bind:9.5.0</product>
<product>bind:9.5.0</product>
<product>bind:9.5.0</product>
<product>bind:9.5.0</product>
<product>bind:9.5.0</product>
<product>bind:9.5.0</product>
<product>bind:9.5.0</product>
<product>bind:9.5.0</product>
<product>bind:9.5.0</product>
<product>bind:9.5.0</product>
<product>bind:9.5.0</product>
<product>bind:9.5.0</product>
<product>bind:9.5.1</product>
<product>bind:9.5.1</product>
<product>bind:9.5.1</product>
<product>bind:9.5.1</product>
<product>bind:9.5.1</product>
<product>bind:9.5.1</product>
<product>bind:9.5.2</product>
<product>bind:9.5.2</product>
<product>bind:9.5.2</product>
<product>bind:9.5.2</product>
<product>bind:9.5.2</product>
<product>bind:9.5.2</product>
<product>bind:9.5.2</product>
<product>bind:9.5.3</product>
<product>bind:9.5.3</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6.0</product>
<product>bind:9.6.0</product>
<product>bind:9.6.0</product>
<product>bind:9.6.0</product>
<product>bind:9.6.0</product>
<product>bind:9.6.0</product>
<product>bind:9.6.1</product>
<product>bind:9.6.1</product>
<product>bind:9.6.1</product>
<product>bind:9.6.1</product>
<product>bind:9.6.1</product>
<product>bind:9.6.1</product>
<product>bind:9.6.2</product>
<product>bind:9.6.2</product>
<product>bind:9.6.2</product>
<product>bind:9.6.2</product>
<product>bind:9.6.2</product>
<product>bind:9.6.2</product>
<product>bind:9.6.3</product>
<product>bind:9.6.3</product>
<product>bind:9.6.3</product>
<product>bind:9.7.0</product>
<product>bind:9.7.0</product>
<product>bind:9.7.0</product>
<product>bind:9.7.0</product>
<product>bind:9.7.0</product>
<product>bind:9.7.0</product>
<product>bind:9.7.0</product>
<product>bind:9.7.0</product>
<product>bind:9.7.0</product>
<product>bind:9.7.0</product>
<product>bind:9.7.0</product>
<product>bind:9.7.1</product>
<product>bind:9.7.1</product>
<product>bind:9.7.1</product>
<product>bind:9.7.1</product>
<product>bind:9.7.1</product>
<product>bind:9.7.2</product>
<product>bind:9.7.2</product>
<product>bind:9.7.2</product>
<product>bind:9.7.2</product>
<product>bind:9.7.2</product>
<product>bind:9.7.3</product>
<product>bind:9.7.3</product>
<product>bind:9.7.3</product>
<product>bind:9.7.3</product>
<product>bind:9.7.4</product>
<product>bind:9.7.4</product>
<product>bind:9.7.4</product>
<product>bind:9.7.4</product>
<product>bind:9.7.5</product>
<product>bind:9.7.5</product>
<product>bind:9.7.5</product>
<product>bind:9.7.5</product>
<product>bind:9.7.6</product>
<product>bind:9.7.6</product>
<product>bind:9.7.6</product>
<product>bind:9.7.6</product>
<product>bind:9.7.6</product>
<product>bind:9.7.7</product>
<product>bind:9.8.0</product>
<product>bind:9.8.0</product>
<product>bind:9.8.0</product>
<product>bind:9.8.0</product>
<product>bind:9.8.0</product>
<product>bind:9.8.0</product>
<product>bind:9.8.0</product>
<product>bind:9.8.1</product>
<product>bind:9.8.1</product>
<product>bind:9.8.1</product>
<product>bind:9.8.1</product>
<product>bind:9.8.1</product>
<product>bind:9.8.1</product>
<product>bind:9.8.2</product>
<product>bind:9.8.2</product>
<product>bind:9.8.2</product>
<product>bind:9.8.2</product>
<product>bind:9.8.3</product>
<product>bind:9.8.3</product>
<product>bind:9.8.3</product>
<product>bind:9.8.3</product>
<product>bind:9.8.3</product>
<product>bind:9.8.4</product>
<product>bind:9.8.5</product>
<product>bind:9.8.5</product>
<product>bind:9.8.5</product>
<product>bind:9.8.5</product>
<product>bind:9.8.5</product>
<product>bind:9.8.5</product>
<product>bind:9.8.5</product>
<product>bind:9.8.6</product>
<product>bind:9.8.6</product>
<product>bind:9.8.6</product>
<product>bind:9.9.0</product>
<product>bind:9.9.0</product>
<product>bind:9.9.0</product>
<product>bind:9.9.0</product>
<product>bind:9.9.0</product>
<product>bind:9.9.0</product>
<product>bind:9.9.0</product>
<product>bind:9.9.0</product>
<product>bind:9.9.0</product>
<product>bind:9.9.0</product>
<product>bind:9.9.1</product>
<product>bind:9.9.1</product>
<product>bind:9.9.1</product>
<product>bind:9.9.1</product>
<product>bind:9.9.1</product>
<product>bind:9.9.2</product>
<product>bind:9.9.3</product>
<product>bind:9.9.3</product>
<product>bind:9.9.3</product>
<product>bind:9.9.3</product>
<product>bind:9.9.3</product>
<product>bind:9.9.3</product>
<product>bind:9.9.3</product>
<product>bind:9.9.4</product>
<product>bind:9.9.5</product>
<product>bind:9.9.6</product>
<product>bind:9.9.6</product>
<product>bind:9.9.7</product>
<product>bind:9.9.7</product>
<product>bind:9.9.7</product>
<product>bind:9.9.7</product>
<product>bind:9.9.8</product>
<product>bind:9.9.8</product>
<product>bind:9.9.8</product>
<product>bind:9.9.8</product>
<product>bind:9.10.0</product>
<product>bind:9.10.0</product>
<product>bind:9.10.0</product>
<product>bind:9.10.0</product>
<product>bind:9.10.0</product>
<product>bind:9.10.0</product>
<product>bind:9.10.0</product>
<product>bind:9.10.0</product>
<product>bind:9.10.0</product>
<product>bind:9.10.1</product>
<product>bind:9.10.1</product>
<product>bind:9.10.1</product>
<product>bind:9.10.1</product>
<product>bind:9.10.1</product>
<product>bind:9.10.1</product>
<product>bind:9.10.1</product>
<product>bind:9.10.2</product>
<product>bind:9.10.2</product>
<product>bind:9.10.2</product>
<product>bind:9.10.2</product>
<product>bind:9.10.2</product>
<product>bind:9.10.2</product>
<product>bind:9.10.2</product>
<product>bind:9.10.2</product>
<product>bind:9.10.3</product>
<product>bind:9.10.3</product>
<product>bind:9.10.3</product>
<product>bind:9.10.3</product>
<product>bind:9.10.3</product>
<product>suse_manager:2.1</product>
<product>suse_manager_proxy:2.1</product>
<product>suse_openstack_cloud:5</product>
</cve>
<cve id="CVE-2016-1284" level="HIGH">
<product>bind:9.9.8</product>
<product>bind:9.9.8</product>
<product>bind:9.9.8</product>
<product>bind:9.9.8</product>
</cve>
<cve id="CVE-2016-1283" level="LOW">
<product>perl_compatible_regular_expression_library:8.38</product>
</cve>
<cve id="CVE-2016-1281" level="MEDIUM">
<product>truecrypt:7.1</product>
<product>truecrypt:7.2</product>
<product>veracrypt:1.16</product>
</cve>
<cve id="CVE-2016-1280" level="LOW">
<product>junos:12.1x44</product>
<product>junos:12.1x46</product>
<product>junos:12.1x46</product>
<product>junos:12.1x46</product>
<product>junos:12.1x46</product>
<product>junos:12.1x46</product>
<product>junos:12.1x46</product>
<product>junos:12.1x46</product>
<product>junos:12.1x47</product>
<product>junos:12.1x47</product>
<product>junos:12.1x47</product>
<product>junos:12.1x47</product>
<product>junos:12.1x47</product>
<product>junos:12.3</product>
<product>junos:12.3</product>
<product>junos:12.3</product>
<product>junos:12.3</product>
<product>junos:12.3</product>
<product>junos:12.3</product>
<product>junos:12.3</product>
<product>junos:12.3</product>
<product>junos:12.3</product>
<product>junos:12.3</product>
<product>junos:12.3</product>
<product>junos:12.3</product>
<product>junos:12.3x48</product>
<product>junos:12.3x48</product>
<product>junos:12.3x50</product>
<product>junos:13.3</product>
<product>junos:13.3</product>
<product>junos:13.3</product>
<product>junos:13.3</product>
<product>junos:13.3</product>
<product>junos:13.3</product>
<product>junos:13.3</product>
<product>junos:13.3</product>
<product>junos:13.3</product>
<product>junos:13.3</product>
<product>junos:13.3</product>
<product>junos:14.1</product>
<product>junos:14.1</product>
<product>junos:14.1</product>
<product>junos:14.1</product>
<product>junos:14.1</product>
<product>junos:14.1</product>
<product>junos:14.1</product>
<product>junos:14.1</product>
<product>junos:14.1x53</product>
<product>junos:14.1x53</product>
<product>junos:14.1x53</product>
<product>junos:14.1x53</product>
<product>junos:14.1x53</product>
<product>junos:14.1x53</product>
<product>junos:14.1x53</product>
<product>junos:14.1x53</product>
<product>junos:14.2</product>
<product>junos:14.2</product>
<product>junos:14.2</product>
<product>junos:14.2</product>
<product>junos:14.2</product>
<product>junos:14.2</product>
<product>junos:14.2</product>
<product>junos:15.1</product>
<product>junos:15.1</product>
<product>junos:15.1</product>
<product>junos:15.1x49</product>
<product>junos:15.1x53</product>
<product>junos:15.1x53</product>
<product>junos:15.1x53</product>
<product>junos:15.1x53</product>
<product>junos:15.1x53</product>
<product>junos:15.1x53</product>
<product>junos:15.1x53</product>
<product>junos:16.1</product>
</cve>
<cve id="CVE-2016-9920" level="MEDIUM">
<product>webmail:1.1.6</product>
<product>webmail:1.2.0</product>
<product>webmail:1.2.1</product>
<product>webmail:1.2.2</product>
</cve>
<cve id="CVE-2016-9921" level="LOW">
<product>qemu:-</product>
</cve>
<cve id="CVE-2016-8106" level="MEDIUM">
<product>ethernet_10gb_2-port_562flr-sfp%2b</product>
<product>ethernet_10gb_2-port_562sfp%2b</product>
<product>ethernet_10gb_4-port_563sfp%2b</product>
<product>proliant_xl260a_g9_server</product>
<product>converged_hx5500_appliance:5.05</product>
<product>converged_hx5510_appliance:5.05</product>
<product>converged_hx7500_appliance:5.05</product>
<product>converged_hx7510_appliance:5.05</product>
<product>converged_hx_series:5.05</product>
<product>nextscale_nx360_m5:5.05</product>
<product>system_x3250_m5:5.05</product>
<product>system_x3500_m5:5.05</product>
<product>system_x3550_m5:5.05</product>
<product>system_x3650_m5:5.05</product>
<product>system_x3750_m4:5.05</product>
<product>system_x3850_x6:5.05</product>
<product>system_x3950_x6:5.05</product>
<product>thinkagile_cx2200:5.05</product>
<product>thinkagile_cx4200:5.05</product>
<product>thinkagile_cx4600:5.05</product>
<product>thinkserver_rd350:5.05</product>
<product>thinkserver_rd450:5.05</product>
<product>thinkserver_rd550:5.05</product>
<product>thinkserver_rd650:5.05</product>
<product>thinkserver_sd350:5.05</product>
<product>thinkserver_td350:5.05</product>
<product>ethernet_controller_x710_firmware:5.04</product>
<product>ethernet_controller_xl710_firmware:5.04</product>
</cve>
<cve id="CVE-2016-8105" level="LOW">
<product>x710_series_driver:21.3</product>
<product>xl710_series_driver:21.3</product>
</cve>
<cve id="CVE-2016-8104" level="LOW">
<product>proset%2fwireless_software_and_drivers:19.20.0</product>
</cve>
<cve id="CVE-2016-8103" level="LOW">
<product>canyon_bios:fybyt10h.86a</product>
<product>canyon_bios:kyskli70.86a</product>
<product>canyon_bios:mybdwi5v.86a</product>
<product>canyon_bios:mybdwi30.86a</product>
<product>canyon_bios:pybwcel.86a</product>
<product>canyon_bios:rybdwi35.86a</product>
<product>citry_bios:scchtax5.86a</product>
<product>city_bios:ccsklm5v.86a</product>
<product>city_bios:ccsklm30.86a</product>
<product>city_bios:scchtax5.86a</product>
<product>swift_canyon_bios:syskli35.86a</product>
</cve>
<cve id="CVE-2016-8102" level="LOW">
<product>wireless_bluetooth_drivers:16.0</product>
<product>wireless_bluetooth_drivers:17.0</product>
<product>wireless_bluetooth_drivers:18.0</product>
<product>wireless_bluetooth_drivers:18.1</product>
</cve>
<cve id="CVE-2016-8101" level="LOW">
<product>solid-state_drive_toolbox:3.3.6</product>
</cve>
<cve id="CVE-2016-8100" level="LOW">
<product>integrated_performance_primitives:9.0.3</product>
</cve>
<cve id="CVE-2016-9278" level="LOW">
<product>exynos_fimg2d_driver:-</product>
</cve>
<cve id="CVE-2016-9279" level="LOW">
<product>exynos_fimg2d_driver:-</product>
</cve>
<cve id="CVE-2016-9276" level="LOW">
<product>libdwarf:2016-10-21</product>
</cve>
<cve id="CVE-2016-9277" level="LOW">
<product>samsung_mobile:4.4</product>
<product>samsung_mobile:5.0</product>
<product>samsung_mobile:5.1</product>
</cve>
<cve id="CVE-2016-9274" level="MEDIUM">
<product>git_for_windows:1.0.0</product>
<product>git_for_windows:1.0.0</product>
<product>git_for_windows:1.0.0</product>
<product>git_for_windows:1.0.0</product>
<product>git_for_windows:1.0.0</product>
<product>git_for_windows:1.0.0</product>
<product>git_for_windows:1.0.0</product>
<product>git_for_windows:1.0.0</product>
<product>git_for_windows:1.0.0</product>
<product>git_for_windows:1.0.1</product>
<product>git_for_windows:1.0.2</product>
<product>git_for_windows:1.0.3</product>
<product>git_for_windows:1.0.4</product>
<product>git_for_windows:1.0.5</product>
<product>git_for_windows:1.0.6</product>
<product>git_for_windows:1.0.7</product>
<product>git_for_windows:1.0.8</product>
<product>git_for_windows:1.0.9</product>
<product>git_for_windows:1.0.10</product>
<product>git_for_windows:1.0.11</product>
<product>git_for_windows:1.0.12</product>
<product>git_for_windows:1.0.13</product>
<product>git_for_windows:1.1.0</product>
<product>git_for_windows:1.1.1</product>
<product>git_for_windows:1.1.2</product>
<product>git_for_windows:1.1.3</product>
<product>git_for_windows:1.1.4</product>
<product>git_for_windows:1.1.5</product>
<product>git_for_windows:1.1.6</product>
<product>git_for_windows:1.2.0</product>
<product>git_for_windows:1.2.1</product>
<product>git_for_windows:1.2.2</product>
<product>git_for_windows:1.2.3</product>
<product>git_for_windows:1.2.4</product>
<product>git_for_windows:1.2.5</product>
<product>git_for_windows:1.2.6</product>
<product>git_for_windows:1.3.0</product>
<product>git_for_windows:1.3.0</product>
<product>git_for_windows:1.3.0</product>
<product>git_for_windows:1.3.0</product>
<product>git_for_windows:1.3.0</product>
<product>git_for_windows:1.3.1</product>
<product>git_for_windows:1.3.2</product>
<product>git_for_windows:1.3.3</product>
<product>git_for_windows:1.4.0</product>
<product>git_for_windows:1.4.0</product>
<product>git_for_windows:1.4.0</product>
<product>git_for_windows:1.4.1</product>
<product>git_for_windows:1.4.1</product>
<product>git_for_windows:1.4.1</product>
<product>git_for_windows:1.4.1.1</product>
<product>git_for_windows:1.4.2</product>
<product>git_for_windows:1.4.2</product>
<product>git_for_windows:1.4.2</product>
<product>git_for_windows:1.4.2</product>
<product>git_for_windows:1.4.2</product>
<product>git_for_windows:1.4.2.1</product>
<product>git_for_windows:1.4.2.2</product>
<product>git_for_windows:1.4.2.3</product>
<product>git_for_windows:1.4.2.4</product>
<product>git_for_windows:1.4.3</product>
<product>git_for_windows:1.4.3</product>
<product>git_for_windows:1.4.3</product>
<product>git_for_windows:1.4.3</product>
<product>git_for_windows:1.4.3.1</product>
<product>git_for_windows:1.4.3.2</product>
<product>git_for_windows:1.4.3.3</product>
<product>git_for_windows:1.4.3.4</product>
<product>git_for_windows:1.4.3.5</product>
<product>git_for_windows:1.4.4</product>
<product>git_for_windows:1.4.4</product>
<product>git_for_windows:1.4.4</product>
<product>git_for_windows:1.4.4.1</product>
<product>git_for_windows:1.4.4.2</product>
<product>git_for_windows:1.4.4.3</product>
<product>git_for_windows:1.4.4.4</product>
<product>git_for_windows:1.4.4.5</product>
<product>git_for_windows:1.5.0</product>
<product>git_for_windows:1.5.0</product>
<product>git_for_windows:1.5.0</product>
<product>git_for_windows:1.5.0</product>
<product>git_for_windows:1.5.0</product>
<product>git_for_windows:1.5.0</product>
<product>git_for_windows:1.5.0.1</product>
<product>git_for_windows:1.5.0.2</product>
<product>git_for_windows:1.5.0.3</product>
<product>git_for_windows:1.5.0.4</product>
<product>git_for_windows:1.5.0.5</product>
<product>git_for_windows:1.5.0.6</product>
<product>git_for_windows:1.5.0.7</product>
<product>git_for_windows:1.5.1</product>
<product>git_for_windows:1.5.1</product>
<product>git_for_windows:1.5.1</product>
<product>git_for_windows:1.5.1</product>
<product>git_for_windows:1.5.1.1</product>
<product>git_for_windows:1.5.1.2</product>
<product>git_for_windows:1.5.1.3</product>
<product>git_for_windows:1.5.1.4</product>
<product>git_for_windows:1.5.1.5</product>
<product>git_for_windows:1.5.1.6</product>
<product>git_for_windows:1.5.2</product>
<product>git_for_windows:1.5.2</product>
<product>git_for_windows:1.5.2</product>
<product>git_for_windows:1.5.2</product>
<product>git_for_windows:1.5.2</product>
<product>git_for_windows:1.5.2.1</product>
<product>git_for_windows:1.5.2.2</product>
<product>git_for_windows:1.5.2.3</product>
<product>git_for_windows:1.5.2.4</product>
<product>git_for_windows:1.5.2.5</product>
<product>git_for_windows:1.5.3</product>
<product>git_for_windows:1.5.3</product>
<product>git_for_windows:1.5.3</product>
<product>git_for_windows:1.5.3</product>
<product>git_for_windows:1.5.3</product>
<product>git_for_windows:1.5.3</product>
<product>git_for_windows:1.5.3</product>
<product>git_for_windows:1.5.3</product>
<product>git_for_windows:1.5.3</product>
<product>git_for_windows:1.5.3.1</product>
<product>git_for_windows:1.5.3.2</product>
<product>git_for_windows:1.5.3.3</product>
<product>git_for_windows:1.5.3.4</product>
<product>git_for_windows:1.5.3.5</product>
<product>git_for_windows:1.5.3.6</product>
<product>git_for_windows:1.5.3.7</product>
<product>git_for_windows:1.5.3.8</product>
<product>git_for_windows:1.5.4</product>
<product>git_for_windows:1.5.4</product>
<product>git_for_windows:1.5.4</product>
<product>git_for_windows:1.5.4</product>
<product>git_for_windows:1.5.4</product>
<product>git_for_windows:1.5.4</product>
<product>git_for_windows:1.5.4</product>
<product>git_for_windows:1.5.4.1</product>
<product>git_for_windows:1.5.4.2</product>
<product>git_for_windows:1.5.4.3</product>
<product>git_for_windows:1.5.4.4</product>
<product>git_for_windows:1.5.4.5</product>
<product>git_for_windows:1.5.4.6</product>
<product>git_for_windows:1.5.4.7</product>
<product>git_for_windows:1.5.5</product>
<product>git_for_windows:1.5.5</product>
<product>git_for_windows:1.5.5</product>
<product>git_for_windows:1.5.5</product>
<product>git_for_windows:1.5.5</product>
<product>git_for_windows:1.5.5.1</product>
<product>git_for_windows:1.5.5.2</product>
<product>git_for_windows:1.5.5.3</product>
<product>git_for_windows:1.5.5.4</product>
<product>git_for_windows:1.5.5.5</product>
<product>git_for_windows:1.5.5.6</product>
<product>git_for_windows:1.5.6</product>
<product>git_for_windows:1.5.6</product>
<product>git_for_windows:1.5.6</product>
<product>git_for_windows:1.5.6</product>
<product>git_for_windows:1.5.6</product>
<product>git_for_windows:1.5.6.1</product>
<product>git_for_windows:1.5.6.2</product>
<product>git_for_windows:1.5.6.3</product>
<product>git_for_windows:1.5.6.4</product>
<product>git_for_windows:1.5.6.5</product>
<product>git_for_windows:1.5.6.6</product>
<product>git_for_windows:1.6.0</product>
<product>git_for_windows:1.6.0</product>
<product>git_for_windows:1.6.0</product>
<product>git_for_windows:1.6.0</product>
<product>git_for_windows:1.6.0</product>
<product>git_for_windows:1.6.0.1</product>
<product>git_for_windows:1.6.0.2</product>
<product>git_for_windows:1.6.0.3</product>
<product>git_for_windows:1.6.0.4</product>
<product>git_for_windows:1.6.0.5</product>
<product>git_for_windows:1.6.0.6</product>
<product>git_for_windows:1.6.1</product>
<product>git_for_windows:1.6.1</product>
<product>git_for_windows:1.6.1</product>
<product>git_for_windows:1.6.1</product>
<product>git_for_windows:1.6.1</product>
<product>git_for_windows:1.6.1.1</product>
<product>git_for_windows:1.6.1.2</product>
<product>git_for_windows:1.6.1.3</product>
<product>git_for_windows:1.6.1.4</product>
<product>git_for_windows:1.6.2</product>
<product>git_for_windows:1.6.2</product>
<product>git_for_windows:1.6.2</product>
<product>git_for_windows:1.6.2</product>
<product>git_for_windows:1.6.2.1</product>
<product>git_for_windows:1.6.2.2</product>
<product>git_for_windows:1.6.2.3</product>
<product>git_for_windows:1.6.2.4</product>
<product>git_for_windows:1.6.2.5</product>
<product>git_for_windows:1.6.3</product>
<product>git_for_windows:1.6.3</product>
<product>git_for_windows:1.6.3</product>
<product>git_for_windows:1.6.3</product>
<product>git_for_windows:1.6.3</product>
<product>git_for_windows:1.6.3</product>
<product>git_for_windows:1.6.3.1</product>
<product>git_for_windows:1.6.3.2</product>
<product>git_for_windows:1.6.3.3</product>
<product>git_for_windows:1.6.3.4</product>
<product>git_for_windows:1.6.4</product>
<product>git_for_windows:1.6.4</product>
<product>git_for_windows:1.6.4</product>
<product>git_for_windows:1.6.4</product>
<product>git_for_windows:1.6.4</product>
<product>git_for_windows:1.6.4.1</product>
<product>git_for_windows:1.6.4.2</product>
<product>git_for_windows:1.6.4.3</product>
<product>git_for_windows:1.6.4.4</product>
<product>git_for_windows:1.6.4.5</product>
<product>git_for_windows:1.6.5</product>
<product>git_for_windows:1.6.5</product>
<product>git_for_windows:1.6.5</product>
<product>git_for_windows:1.6.5</product>
<product>git_for_windows:1.6.5</product>
<product>git_for_windows:1.6.5.1</product>
<product>git_for_windows:1.6.5.2</product>
<product>git_for_windows:1.6.5.3</product>
<product>git_for_windows:1.6.5.4</product>
<product>git_for_windows:1.6.5.5</product>
<product>git_for_windows:1.6.5.6</product>
<product>git_for_windows:1.6.5.7</product>
<product>git_for_windows:1.6.5.8</product>
<product>git_for_windows:1.6.5.9</product>
<product>git_for_windows:1.6.6</product>
<product>git_for_windows:1.6.6</product>
<product>git_for_windows:1.6.6</product>
<product>git_for_windows:1.6.6</product>
<product>git_for_windows:1.6.6</product>
<product>git_for_windows:1.6.6</product>
<product>git_for_windows:1.6.6.1</product>
<product>git_for_windows:1.6.6.2</product>
<product>git_for_windows:1.6.6.3</product>
<product>git_for_windows:1.7.0</product>
<product>git_for_windows:1.7.0</product>
<product>git_for_windows:1.7.0</product>
<product>git_for_windows:1.7.0</product>
<product>git_for_windows:1.7.0.1</product>
<product>git_for_windows:1.7.0.2</product>
<product>git_for_windows:1.7.0.3</product>
<product>git_for_windows:1.7.0.4</product>
<product>git_for_windows:1.7.0.5</product>
<product>git_for_windows:1.7.0.6</product>
<product>git_for_windows:1.7.0.7</product>
<product>git_for_windows:1.7.0.8</product>
<product>git_for_windows:1.7.0.9</product>
<product>git_for_windows:1.7.1</product>
<product>git_for_windows:1.7.1</product>
<product>git_for_windows:1.7.1</product>
<product>git_for_windows:1.7.1</product>
<product>git_for_windows:1.7.1.1</product>
<product>git_for_windows:1.7.1.2</product>
<product>git_for_windows:1.7.1.3</product>
<product>git_for_windows:1.7.1.4</product>
<product>git_for_windows:1.7.2</product>
<product>git_for_windows:1.7.2</product>
<product>git_for_windows:1.7.2</product>
<product>git_for_windows:1.7.2</product>
<product>git_for_windows:1.7.2</product>
<product>git_for_windows:1.7.2.1</product>
<product>git_for_windows:1.7.2.2</product>
<product>git_for_windows:1.7.2.3</product>
<product>git_for_windows:1.7.2.4</product>
<product>git_for_windows:1.7.2.5</product>
<product>git_for_windows:1.7.3</product>
<product>git_for_windows:1.7.3</product>
<product>git_for_windows:1.7.3</product>
<product>git_for_windows:1.7.3</product>
<product>git_for_windows:1.7.3.1</product>
<product>git_for_windows:1.7.3.2</product>
<product>git_for_windows:1.7.3.3</product>
<product>git_for_windows:1.7.3.4</product>
<product>git_for_windows:1.7.3.5</product>
<product>git_for_windows:1.7.4</product>
<product>git_for_windows:1.7.4</product>
<product>git_for_windows:1.7.4</product>
<product>git_for_windows:1.7.4</product>
<product>git_for_windows:1.7.4</product>
<product>git_for_windows:1.7.4.1</product>
<product>git_for_windows:1.7.4.2</product>
<product>git_for_windows:1.7.4.3</product>
<product>git_for_windows:1.7.4.4</product>
<product>git_for_windows:1.7.4.5</product>
<product>git_for_windows:1.7.5</product>
<product>git_for_windows:1.7.5</product>
<product>git_for_windows:1.7.5</product>
<product>git_for_windows:1.7.5</product>
<product>git_for_windows:1.7.5</product>
<product>git_for_windows:1.7.5.1</product>
<product>git_for_windows:1.7.5.2</product>
<product>git_for_windows:1.7.5.3</product>
<product>git_for_windows:1.7.5.4</product>
<product>git_for_windows:1.7.6</product>
<product>git_for_windows:1.7.6</product>
<product>git_for_windows:1.7.6</product>
<product>git_for_windows:1.7.6</product>
<product>git_for_windows:1.7.6</product>
<product>git_for_windows:1.7.6.1</product>
<product>git_for_windows:1.7.6.2</product>
<product>git_for_windows:1.7.6.3</product>
<product>git_for_windows:1.7.6.4</product>
<product>git_for_windows:1.7.7</product>
<product>git_for_windows:1.7.7</product>
<product>git_for_windows:1.7.7</product>
<product>git_for_windows:1.7.7</product>
<product>git_for_windows:1.7.7</product>
<product>git_for_windows:1.7.7.1</product>
<product>git_for_windows:1.7.7.2</product>
<product>git_for_windows:1.7.7.3</product>
<product>git_for_windows:1.7.7.4</product>
<product>git_for_windows:1.7.8</product>
<product>git_for_windows:1.7.8</product>
<product>git_for_windows:1.7.8</product>
<product>git_for_windows:1.7.8</product>
<product>git_for_windows:1.7.8</product>
<product>git_for_windows:1.7.8</product>
<product>git_for_windows:1.7.8.1</product>
<product>git_for_windows:1.7.8.2</product>
<product>git_for_windows:1.7.8.3</product>
<product>git_for_windows:1.7.8.4</product>
<product>git_for_windows:1.7.8.5</product>
<product>git_for_windows:1.7.9</product>
<product>git_for_windows:1.7.9</product>
<product>git_for_windows:1.7.9</product>
<product>git_for_windows:1.7.9</product>
<product>git_for_windows:1.7.9.1</product>
<product>git_for_windows:1.7.9.2</product>
<product>git_for_windows:1.7.9.3</product>
<product>git_for_windows:1.7.9.4</product>
<product>git_for_windows:1.7.9.5</product>
<product>git_for_windows:1.7.9.6</product>
<product>git_for_windows:1.7.10</product>
<product>git_for_windows:1.7.10</product>
<product>git_for_windows:1.7.10</product>
<product>git_for_windows:1.7.10</product>
<product>git_for_windows:1.7.10</product>
<product>git_for_windows:1.7.10</product>
<product>git_for_windows:1.7.10.1</product>
<product>git_for_windows:1.7.10.2</product>
<product>git_for_windows:1.7.10.3</product>
<product>git_for_windows:1.7.10.4</product>
<product>git_for_windows:1.7.10.5</product>
<product>git_for_windows:1.7.11</product>
<product>git_for_windows:1.7.11</product>
<product>git_for_windows:1.7.11</product>
<product>git_for_windows:1.7.11</product>
<product>git_for_windows:1.7.11</product>
<product>git_for_windows:1.7.11.1</product>
<product>git_for_windows:1.7.11.2</product>
<product>git_for_windows:1.7.11.3</product>
<product>git_for_windows:1.7.11.4</product>
<product>git_for_windows:1.7.11.5</product>
<product>git_for_windows:1.7.11.6</product>
<product>git_for_windows:1.7.11.7</product>
<product>git_for_windows:1.7.12</product>
<product>git_for_windows:1.7.12</product>
<product>git_for_windows:1.7.12</product>
<product>git_for_windows:1.7.12</product>
<product>git_for_windows:1.7.12</product>
<product>git_for_windows:1.7.12.1</product>
<product>git_for_windows:1.7.12.2</product>
<product>git_for_windows:1.7.12.3</product>
<product>git_for_windows:1.7.12.4</product>
<product>git_for_windows:1.8.0</product>
<product>git_for_windows:1.8.0</product>
<product>git_for_windows:1.8.0</product>
<product>git_for_windows:1.8.0</product>
<product>git_for_windows:1.8.0</product>
<product>git_for_windows:1.8.0.1</product>
<product>git_for_windows:1.8.0.2</product>
<product>git_for_windows:1.8.1</product>
<product>git_for_windows:1.8.1</product>
<product>git_for_windows:1.8.1</product>
<product>git_for_windows:1.8.1</product>
<product>git_for_windows:1.8.1</product>
<product>git_for_windows:1.8.1.1</product>
<product>git_for_windows:1.8.1.2</product>
<product>git_for_windows:1.8.1.3</product>
<product>git_for_windows:1.8.1.4</product>
<product>git_for_windows:1.8.1.5</product>
<product>git_for_windows:1.8.1.6</product>
<product>git_for_windows:1.8.2</product>
<product>git_for_windows:1.8.2</product>
<product>git_for_windows:1.8.2</product>
<product>git_for_windows:1.8.2</product>
<product>git_for_windows:1.8.2</product>
<product>git_for_windows:1.8.2.1</product>
<product>git_for_windows:1.8.2.2</product>
<product>git_for_windows:1.8.2.3</product>
<product>git_for_windows:1.8.3</product>
<product>git_for_windows:1.8.3</product>
<product>git_for_windows:1.8.3</product>
<product>git_for_windows:1.8.3</product>
<product>git_for_windows:1.8.3</product>
<product>git_for_windows:1.8.3.1</product>
<product>git_for_windows:1.8.3.2</product>
<product>git_for_windows:1.8.3.3</product>
<product>git_for_windows:1.8.3.4</product>
<product>git_for_windows:1.8.4</product>
<product>git_for_windows:1.8.4</product>
<product>git_for_windows:1.8.4</product>
<product>git_for_windows:1.8.4</product>
<product>git_for_windows:1.8.4</product>
<product>git_for_windows:1.8.4</product>
<product>git_for_windows:1.8.4.1</product>
<product>git_for_windows:1.8.4.2</product>
<product>git_for_windows:1.8.4.3</product>
<product>git_for_windows:1.8.4.4</product>
<product>git_for_windows:1.8.5</product>
<product>git_for_windows:1.8.5</product>
<product>git_for_windows:1.8.5</product>
<product>git_for_windows:1.8.5</product>
<product>git_for_windows:1.8.5</product>
<product>git_for_windows:1.8.5.1</product>
<product>git_for_windows:1.8.5.2</product>
<product>git_for_windows:1.8.5.3</product>
<product>git_for_windows:1.8.5.4</product>
<product>git_for_windows:1.8.5.5</product>
<product>git_for_windows:1.9.0</product>
<product>git_for_windows:1.9.0</product>
<product>git_for_windows:1.9.0</product>
<product>git_for_windows:1.9.0</product>
<product>git_for_windows:1.9.0</product>
<product>git_for_windows:1.9.1</product>
<product>git_for_windows:1.9.2</product>
<product>git_for_windows:1.9.3</product>
<product>git_for_windows:1.9.4</product>
</cve>
<cve id="CVE-2016-9275" level="LOW">
<product>libdwarf:2016-10-21</product>
</cve>
<cve id="CVE-2016-9272" level="LOW">
<product>exponent_cms:2.4.0</product>
</cve>
<cve id="CVE-2016-9273" level="MEDIUM">
<product>libtiff:4.0.6</product>
</cve>
<cve id="CVE-2016-1469" level="LOW">
<product>spa300_series_ip_phone_firmware:7.5.7%286%29</product>
<product>spa500_series_ip_phone_firmware:7.5.7%286%29</product>
</cve>
<cve id="CVE-2016-1468" level="LOW">
<product>telepresence_video_communication_server:x8.5.2</product>
</cve>
<cve id="CVE-2016-4103" level="LOW">
<product>acrobat:11.0.15</product>
<product>acrobat_dc:15.006.30121</product>
<product>acrobat_dc:15.010.20060</product>
<product>acrobat_reader_dc:15.006.30121</product>
<product>acrobat_reader_dc:15.010.20060</product>
<product>reader:11.0.15</product>
</cve>
<cve id="CVE-2016-1462" level="MEDIUM">
<product>prime_service_catalog:11.0_base</product>
</cve>
<cve id="CVE-2016-1461" level="LOW">
<product>email_security_appliance:7.1.0</product>
<product>email_security_appliance:7.1.1</product>
<product>email_security_appliance:7.1.2</product>
<product>email_security_appliance:7.1.3</product>
<product>email_security_appliance:7.1.4</product>
<product>email_security_appliance:7.1.5</product>
<product>email_security_appliance:7.3.0</product>
<product>email_security_appliance:7.3.1</product>
<product>email_security_appliance:7.3.2</product>
<product>email_security_appliance:7.5.0</product>
<product>email_security_appliance:7.5.1</product>
<product>email_security_appliance:7.5.2</product>
<product>email_security_appliance:7.5.2-201</product>
<product>email_security_appliance:7.6.0</product>
<product>email_security_appliance:7.6.1-000</product>
<product>email_security_appliance:7.6.1-gpl-022</product>
<product>email_security_appliance:7.6.2</product>
<product>email_security_appliance:7.6.3-000</product>
<product>email_security_appliance:7.6.3-025</product>
<product>email_security_appliance:7.7.0-000</product>
<product>email_security_appliance:7.7.1-000</product>
<product>email_security_appliance:7.8.0</product>
<product>email_security_appliance:7.8.0-311</product>
<product>email_security_appliance:8.0.1-023</product>
<product>email_security_appliance:8.0_base</product>
<product>email_security_appliance:8.5.0-000</product>
<product>email_security_appliance:8.5.0-er1-198</product>
<product>email_security_appliance:8.5.6-052</product>
<product>email_security_appliance:8.5.6-073</product>
<product>email_security_appliance:8.5.6-074</product>
<product>email_security_appliance:8.5.6-106</product>
<product>email_security_appliance:8.5.6-113</product>
<product>email_security_appliance:8.5.7-042</product>
<product>email_security_appliance:8.6.0</product>
<product>email_security_appliance:8.6.0-011</product>
<product>email_security_appliance:8.9.0</product>
<product>email_security_appliance:8.9.1-000</product>
<product>email_security_appliance:8.9.2-032</product>
<product>email_security_appliance:9.0.0</product>
<product>email_security_appliance:9.0.0-212</product>
<product>email_security_appliance:9.0.0-461</product>
<product>email_security_appliance:9.0.5-000</product>
<product>email_security_appliance:9.1.0</product>
<product>email_security_appliance:9.1.0-011</product>
<product>email_security_appliance:9.1.0-032</product>
<product>email_security_appliance:9.1.0-101</product>
<product>email_security_appliance:9.1.1-000</product>
<product>email_security_appliance:9.4.0</product>
<product>email_security_appliance:9.4.4-000</product>
<product>email_security_appliance:9.5.0-000</product>
<product>email_security_appliance:9.5.0-201</product>
<product>email_security_appliance:9.6.0-000</product>
<product>email_security_appliance:9.6.0-042</product>
<product>email_security_appliance:9.6.0-051</product>
<product>email_security_appliance:9.7.0-125</product>
</cve>
<cve id="CVE-2016-1460" level="LOW">
<product>wireless_lan_controller_software:7.4.121.0</product>
<product>wireless_lan_controller_software:8.0.0.30220.385</product>
</cve>
<cve id="CVE-2016-1467" level="LOW">
<product>videoscape_session_resource_manager:-</product>
</cve>
<cve id="CVE-2016-1466" level="LOW">
<product>unified_communications_manager_im_and_presence_service:9.1%281%29</product>
<product>unified_communications_manager_im_and_presence_service:10.5%282%29</product>
<product>unified_communications_manager_im_and_presence_service:11.0%281%29</product>
<product>unified_communications_manager_im_and_presence_service:11.5%281%29</product>
</cve>
<cve id="CVE-2016-1465" level="LOW">
<product>nx-os:4.0%284%29sv1%281%29</product>
<product>nx-os:4.0%284%29sv1%282%29</product>
<product>nx-os:4.0%284%29sv1%283%29</product>
<product>nx-os:4.0%284%29sv1%283a%29</product>
<product>nx-os:4.0%284%29sv1%283b%29</product>
<product>nx-os:4.0%284%29sv1%283c%29</product>
<product>nx-os:4.0%284%29sv1%283d%29</product>
<product>nx-os:4.2%281%29sv1%284%29</product>
<product>nx-os:4.2%281%29sv1%284a%29</product>
<product>nx-os:4.2%281%29sv1%284b%29</product>
<product>nx-os:4.2%281%29sv1%285.1%29</product>
<product>nx-os:4.2%281%29sv1%285.1a%29</product>
<product>nx-os:4.2%281%29sv1%285.2%29</product>
<product>nx-os:4.2%281%29sv1%285.2b%29</product>
<product>nx-os:4.2%281%29sv2%281.1%29</product>
<product>nx-os:4.2%281%29sv2%281.1a%29</product>
<product>nx-os:4.2%281%29sv2%282.1%29</product>
<product>nx-os:4.2%281%29sv2%282.1a%29</product>
<product>nx-os:5.2%281%29sv3%281.1%29</product>
<product>nx-os:5.2%281%29sv3%281.3%29</product>
<product>nx-os:5.2%281%29sv3%281.4%29</product>
</cve>
<cve id="CVE-2016-1464" level="MEDIUM">
<product>webex_wrf_player_t29:sp10_base</product>
</cve>
<cve id="CVE-2016-0792" level="LOW">
<product>jenkins:1.642.1</product>
<product>jenkins:1.649</product>
<product>openshift:3.1</product>
</cve>
<cve id="CVE-2016-0793" level="LOW">
<product>jboss_wildfly_application_server:10.0.0</product>
</cve>
<cve id="CVE-2016-1233" level="LOW">
<product>fuse:2.9.3-14</product>
</cve>
<cve id="CVE-2016-1000129" level="MEDIUM">
<product>defa-online-image-protector:3.3</product>
</cve>
<cve id="CVE-2016-1000128" level="MEDIUM">
<product>anti-plagiarism:3.60</product>
</cve>
<cve id="CVE-2016-1000123" level="LOW">
<product>video_gallery:1.0.9</product>
</cve>
<cve id="CVE-2016-1000122" level="LOW">
<product>slider:1.0.9</product>
</cve>
<cve id="CVE-2016-1000121" level="MEDIUM">
<product>slider:1.0.9</product>
</cve>
<cve id="CVE-2016-1000120" level="LOW">
<product>catalog:1.0.4</product>
</cve>
<cve id="CVE-2016-1000127" level="MEDIUM">
<product>ajax-random-post:2.00</product>
</cve>
<cve id="CVE-2016-1000126" level="MEDIUM">
<product>admin-font-editor:1.8</product>
</cve>
<cve id="CVE-2016-1000125" level="LOW">
<product>huge-it_catalog:1.0.7</product>
</cve>
<cve id="CVE-2016-1000124" level="LOW">
<product>portfolio_gallery:1.0.6</product>
</cve>
<cve id="CVE-2016-5920" level="MEDIUM">
<product>financial_transaction_manager:3.0.0.0</product>
<product>financial_transaction_manager:3.0.0.0</product>
<product>financial_transaction_manager:3.0.0.0</product>
<product>financial_transaction_manager:3.0.0.1</product>
<product>financial_transaction_manager:3.0.0.1</product>
<product>financial_transaction_manager:3.0.0.1</product>
<product>financial_transaction_manager:3.0.0.2</product>
<product>financial_transaction_manager:3.0.0.2</product>
<product>financial_transaction_manager:3.0.0.2</product>
<product>financial_transaction_manager:3.0.0.3</product>
<product>financial_transaction_manager:3.0.0.3</product>
<product>financial_transaction_manager:3.0.0.3</product>
<product>financial_transaction_manager:3.0.0.4</product>
<product>financial_transaction_manager:3.0.0.4</product>
<product>financial_transaction_manager:3.0.0.4</product>
<product>financial_transaction_manager:3.0.0.5</product>
<product>financial_transaction_manager:3.0.0.5</product>
<product>financial_transaction_manager:3.0.0.5</product>
<product>financial_transaction_manager:3.0.0.6</product>
<product>financial_transaction_manager:3.0.0.6</product>
<product>financial_transaction_manager:3.0.0.6</product>
<product>financial_transaction_manager:3.0.0.7</product>
<product>financial_transaction_manager:3.0.0.7</product>
<product>financial_transaction_manager:3.0.0.7</product>
<product>financial_transaction_manager:3.0.0.8</product>
<product>financial_transaction_manager:3.0.0.8</product>
<product>financial_transaction_manager:3.0.0.8</product>
<product>financial_transaction_manager:3.0.0.9</product>
<product>financial_transaction_manager:3.0.0.9</product>
<product>financial_transaction_manager:3.0.0.9</product>
<product>financial_transaction_manager:3.0.0.10</product>
<product>financial_transaction_manager:3.0.0.10</product>
<product>financial_transaction_manager:3.0.0.10</product>
<product>financial_transaction_manager:3.0.0.11</product>
<product>financial_transaction_manager:3.0.0.11</product>
<product>financial_transaction_manager:3.0.0.11</product>
<product>financial_transaction_manager:3.0.0.12</product>
<product>financial_transaction_manager:3.0.0.12</product>
<product>financial_transaction_manager:3.0.0.12</product>
<product>financial_transaction_manager:3.0.0.13</product>
<product>financial_transaction_manager:3.0.0.13</product>
<product>financial_transaction_manager:3.0.0.13</product>
<product>financial_transaction_manager:3.0.0.14</product>
<product>financial_transaction_manager:3.0.0.14</product>
<product>financial_transaction_manager:3.0.0.14</product>
<product>financial_transaction_manager:3.0.1.0</product>
<product>financial_transaction_manager:3.0.1.0</product>
</cve>
<cve id="CVE-2016-8344" level="MEDIUM">
<product>experion_process_knowledge_system:311</product>
<product>experion_process_knowledge_system:400</product>
<product>experion_process_knowledge_system:410</product>
<product>experion_process_knowledge_system:430</product>
<product>experion_process_knowledge_system:431</product>
</cve>
<cve id="CVE-2016-5504" level="MEDIUM">
<product>agile_product_supplier_collaboration_for_process:6.1.0.4</product>
<product>agile_product_supplier_collaboration_for_process:6.1.1.6</product>
<product>agile_product_supplier_collaboration_for_process:6.2.0.0</product>
</cve>
<cve id="CVE-2016-5506" level="MEDIUM">
<product>identity_manager:-</product>
</cve>
<cve id="CVE-2016-5500" level="LOW">
<product>discoverer:11.1.1.7.0</product>
</cve>
<cve id="CVE-2016-5501" level="LOW">
<product>vm_virtualbox:5.0.27</product>
<product>vm_virtualbox:5.1.7</product>
</cve>
<cve id="CVE-2016-5502" level="LOW">
<product>flexcube_universal_banking:11.3.0</product>
<product>flexcube_universal_banking:11.4.0</product>
<product>flexcube_universal_banking:12.0.1</product>
<product>flexcube_universal_banking:12.0.2</product>
<product>flexcube_universal_banking:12.0.3</product>
</cve>
<cve id="CVE-2016-5503" level="LOW">
<product>sun_zfs_storage_appliance_kit:ak_2013</product>
</cve>
<cve id="CVE-2016-1000344" level="MEDIUM">
<product>legion-of-the-bouncy-castle-java-crytography-api:1.55</product>
</cve>
<cve id="CVE-2016-5509" level="MEDIUM">
<product>flexcube_investor_servicing:12.0.1</product>
<product>flexcube_investor_servicing:12.0.2</product>
<product>flexcube_investor_servicing:12.0.4</product>
<product>flexcube_investor_servicing:12.1.0</product>
<product>flexcube_investor_servicing:12.3.0</product>
</cve>
<cve id="CVE-2016-1000340" level="LOW">
<product>legion-of-the-bouncy-castle-java-crytography-api:1.54</product>
</cve>
<cve id="CVE-2016-0909" level="LOW">
<product>avamar_data_store:7.3</product>
<product>avamar_server_virtual_edition:7.3</product>
</cve>
<cve id="CVE-2016-0908" level="LOW">
<product>isilon_onefs:7.1.0.0</product>
<product>isilon_onefs:7.1.0.1</product>
<product>isilon_onefs:7.1.0.2</product>
<product>isilon_onefs:7.1.0.3</product>
<product>isilon_onefs:7.1.0.4</product>
<product>isilon_onefs:7.1.0.5</product>
<product>isilon_onefs:7.1.0.6</product>
<product>isilon_onefs:7.1.1.0</product>
<product>isilon_onefs:7.1.1.1</product>
<product>isilon_onefs:7.1.1.2</product>
<product>isilon_onefs:7.1.1.3</product>
<product>isilon_onefs:7.1.1.4</product>
<product>isilon_onefs:7.1.1.5</product>
<product>isilon_onefs:7.1.1.6</product>
<product>isilon_onefs:7.1.1.7</product>
<product>isilon_onefs:7.1.1.8</product>
<product>isilon_onefs:7.2.0.0</product>
<product>isilon_onefs:7.2.0.1</product>
<product>isilon_onefs:7.2.0.2</product>
<product>isilon_onefs:7.2.0.3</product>
<product>isilon_onefs:7.2.0.4</product>
<product>isilon_onefs:7.2.0.5</product>
<product>isilon_onefs:7.2.1.0</product>
<product>isilon_onefs:7.2.1.1</product>
</cve>
<cve id="CVE-2016-0907" level="MEDIUM">
<product>isilon_onefs:7.1.0.0</product>
<product>isilon_onefs:7.1.0.1</product>
<product>isilon_onefs:7.1.0.2</product>
<product>isilon_onefs:7.1.0.3</product>
<product>isilon_onefs:7.1.0.4</product>
<product>isilon_onefs:7.1.0.5</product>
<product>isilon_onefs:7.1.0.6</product>
<product>isilon_onefs:7.1.1.0</product>
<product>isilon_onefs:7.1.1.1</product>
<product>isilon_onefs:7.1.1.2</product>
<product>isilon_onefs:7.1.1.3</product>
<product>isilon_onefs:7.1.1.4</product>
<product>isilon_onefs:7.1.1.5</product>
<product>isilon_onefs:7.1.1.6</product>
<product>isilon_onefs:7.1.1.7</product>
<product>isilon_onefs:7.1.1.8</product>
<product>isilon_onefs:7.1.1.9</product>
<product>isilon_onefs:7.2.0.0</product>
<product>isilon_onefs:7.2.1.0</product>
<product>isilon_onefs:7.2.1.1</product>
<product>isilon_onefs:7.2.1.2</product>
<product>isilon_onefs:8.0.0.0</product>
<product>isilonsd_edge_onefs:8.0.0.0</product>
</cve>
<cve id="CVE-2016-0906" level="LOW">
<product>avamar:7.2.1</product>
</cve>
<cve id="CVE-2016-0905" level="LOW">
<product>avamar_server:7.3.0</product>
</cve>
<cve id="CVE-2016-0904" level="LOW">
<product>avamar_server:7.3.0</product>
</cve>
<cve id="CVE-2016-0903" level="LOW">
<product>avamar_server:7.3.0</product>
</cve>
<cve id="CVE-2016-0902" level="LOW">
<product>rsa_authentication_manager:8.1</product>
</cve>
<cve id="CVE-2016-0901" level="MEDIUM">
<product>rsa_authentication_manager:8.1</product>
</cve>
<cve id="CVE-2016-0900" level="MEDIUM">
<product>rsa_authentication_manager:8.1</product>
</cve>
<cve id="CVE-2016-6080" level="LOW">
<product>websphere_message_broker:8.0</product>
</cve>
<cve id="CVE-2016-6082" level="LOW">
<product>bigfix_platform:9.0</product>
<product>bigfix_platform:9.1</product>
<product>bigfix_platform:9.2</product>
<product>bigfix_platform:9.5</product>
</cve>
<cve id="CVE-2016-6083" level="LOW">
<product>tivoli_monitoring:6.2.2</product>
<product>tivoli_monitoring:6.2.2.0</product>
<product>tivoli_monitoring:6.2.2.1</product>
<product>tivoli_monitoring:6.2.2.2</product>
<product>tivoli_monitoring:6.2.2.3</product>
<product>tivoli_monitoring:6.2.2.4</product>
<product>tivoli_monitoring:6.2.2.5</product>
<product>tivoli_monitoring:6.2.2.6</product>
<product>tivoli_monitoring:6.2.2.7</product>
<product>tivoli_monitoring:6.2.2.8</product>
<product>tivoli_monitoring:6.2.2.9</product>
<product>tivoli_monitoring:6.2.3</product>
<product>tivoli_monitoring:6.2.3.0</product>
<product>tivoli_monitoring:6.2.3.1</product>
<product>tivoli_monitoring:6.2.3.2</product>
<product>tivoli_monitoring:6.2.3.3</product>
<product>tivoli_monitoring:6.2.3.4</product>
<product>tivoli_monitoring:6.2.3.5</product>
<product>tivoli_monitoring:6.3.0</product>
<product>tivoli_monitoring:6.3.0.1</product>
<product>tivoli_monitoring:6.3.0.2</product>
<product>tivoli_monitoring:6.3.0.3</product>
<product>tivoli_monitoring:6.3.0.4</product>
<product>tivoli_monitoring:6.3.0.5</product>
<product>tivoli_monitoring:6.3.0.6</product>
<product>tivoli_monitoring:6.3.0.7</product>
</cve>
<cve id="CVE-2016-6084" level="LOW">
<product>bigfix_platform:9.0</product>
<product>bigfix_platform:9.1</product>
</cve>
<cve id="CVE-2016-6085" level="LOW">
<product>bigfix_platform:9.0</product>
<product>bigfix_platform:9.1</product>
<product>bigfix_platform:9.2</product>
<product>bigfix_platform:9.5</product>
</cve>
<cve id="CVE-2016-6087" level="LOW">
<product>domino:8.5.1.0</product>
<product>domino:8.5.1.1</product>
<product>domino:8.5.1.2</product>
<product>domino:8.5.1.3</product>
<product>domino:8.5.1.4</product>
<product>domino:8.5.1.5</product>
<product>domino:8.5.2.0</product>
<product>domino:8.5.2.1</product>
<product>domino:8.5.2.2</product>
<product>domino:8.5.2.3</product>
<product>domino:8.5.2.4</product>
<product>domino:8.5.3.0</product>
<product>domino:8.5.3.1</product>
<product>domino:8.5.3.2</product>
<product>domino:8.5.3.3</product>
<product>domino:8.5.3.4</product>
<product>domino:8.5.3.5</product>
<product>domino:8.5.3.6</product>
<product>domino:9.0</product>
<product>domino:9.0.1.0</product>
<product>domino:9.0.1.1</product>
<product>domino:9.0.1.2</product>
<product>domino:9.0.1.3</product>
<product>domino:9.0.1.4</product>
<product>domino:9.0.1.5</product>
<product>domino:9.0.1.6</product>
<product>domino:9.0.1.7</product>
</cve>
<cve id="CVE-2016-6089" level="LOW">
<product>websphere_mq:9.0.0.0</product>
<product>websphere_mq:9.0.1</product>
</cve>
<cve id="CVE-2016-6888" level="LOW">
<product>qemu:-</product>
</cve>
<cve id="CVE-2016-6882" level="MEDIUM">
<product>matrixssl:3.8.6</product>
</cve>
<cve id="CVE-2016-6883" level="MEDIUM">
<product>matrixssl:3.8.2</product>
</cve>
<cve id="CVE-2016-6884" level="MEDIUM">
<product>matrixssl:3.8.2</product>
</cve>
<cve id="CVE-2016-6885" level="LOW">
<product>matrixssl:3.8.3</product>
</cve>
<cve id="CVE-2016-6886" level="LOW">
<product>matrixssl:3.8.3</product>
</cve>
<cve id="CVE-2016-6887" level="MEDIUM">
<product>matrixssl:3.8.6</product>
</cve>
<cve id="CVE-2016-3612" level="MEDIUM">
<product>vm_virtualbox:5.0.20</product>
</cve>
<cve id="CVE-2016-3613" level="LOW">
<product>secure_global_desktop:4.63</product>
<product>secure_global_desktop:4.71</product>
<product>secure_global_desktop:5.2</product>
</cve>
<cve id="CVE-2016-3611" level="MEDIUM">
<product>retail_order_broker_cloud_service:15.0</product>
</cve>
<cve id="CVE-2016-3619" level="MEDIUM">
<product>libtiff:4.0.6</product>
</cve>
<cve id="CVE-2016-8730" level="MEDIUM">
<product>coreldraw_photo_paint_x8:18.1.0.661</product>
</cve>
<cve id="CVE-2016-8731" level="LOW">
<product>c1_webcam_firmware:1.9.1.12</product>
</cve>
<cve id="CVE-2016-8732" level="LOW">
<product>invincea_dell_protected_workspace:5.1.1-22303</product>
</cve>
<cve id="CVE-2016-8733" level="LOW">
<product>smartos:20161110t013148z</product>
</cve>
<cve id="CVE-2016-8734" level="LOW">
<product>subversion:1.4.0</product>
<product>subversion:1.4.1</product>
<product>subversion:1.4.2</product>
<product>subversion:1.4.3</product>
<product>subversion:1.4.4</product>
<product>subversion:1.4.5</product>
<product>subversion:1.4.6</product>
<product>subversion:1.5.0</product>
<product>subversion:1.5.1</product>
<product>subversion:1.5.2</product>
<product>subversion:1.5.3</product>
<product>subversion:1.5.4</product>
<product>subversion:1.5.5</product>
<product>subversion:1.5.6</product>
<product>subversion:1.5.7</product>
<product>subversion:1.5.8</product>
<product>subversion:1.6.0</product>
<product>subversion:1.6.1</product>
<product>subversion:1.6.2</product>
<product>subversion:1.6.3</product>
<product>subversion:1.6.4</product>
<product>subversion:1.6.5</product>
<product>subversion:1.6.6</product>
<product>subversion:1.6.7</product>
<product>subversion:1.6.8</product>
<product>subversion:1.6.9</product>
<product>subversion:1.6.10</product>
<product>subversion:1.6.11</product>
<product>subversion:1.6.12</product>
<product>subversion:1.6.13</product>
<product>subversion:1.6.14</product>
<product>subversion:1.6.15</product>
<product>subversion:1.6.16</product>
<product>subversion:1.6.17</product>
<product>subversion:1.6.18</product>
<product>subversion:1.6.19</product>
<product>subversion:1.6.20</product>
<product>subversion:1.6.21</product>
<product>subversion:1.6.23</product>
<product>subversion:1.7.0</product>
<product>subversion:1.7.1</product>
<product>subversion:1.7.2</product>
<product>subversion:1.7.3</product>
<product>subversion:1.7.4</product>
<product>subversion:1.7.5</product>
<product>subversion:1.7.6</product>
<product>subversion:1.7.7</product>
<product>subversion:1.7.8</product>
<product>subversion:1.7.9</product>
<product>subversion:1.7.10</product>
<product>subversion:1.7.11</product>
<product>subversion:1.7.12</product>
<product>subversion:1.7.13</product>
<product>subversion:1.7.14</product>
<product>subversion:1.7.15</product>
<product>subversion:1.7.16</product>
<product>subversion:1.7.17</product>
<product>subversion:1.7.18</product>
<product>subversion:1.7.19</product>
<product>subversion:1.7.20</product>
<product>subversion:1.8.0</product>
<product>subversion:1.8.1</product>
<product>subversion:1.8.2</product>
<product>subversion:1.8.3</product>
<product>subversion:1.8.4</product>
<product>subversion:1.8.5</product>
<product>subversion:1.8.6</product>
<product>subversion:1.8.7</product>
<product>subversion:1.8.8</product>
<product>subversion:1.8.9</product>
<product>subversion:1.8.10</product>
<product>subversion:1.8.11</product>
<product>subversion:1.8.12</product>
<product>subversion:1.8.13</product>
<product>subversion:1.8.14</product>
<product>subversion:1.8.15</product>
<product>subversion:1.8.16</product>
<product>subversion:1.9.0</product>
<product>subversion:1.9.1</product>
<product>subversion:1.9.2</product>
<product>subversion:1.9.3</product>
<product>subversion:1.9.4</product>
</cve>
<cve id="CVE-2016-8736" level="LOW">
<product>openmeetings:3.1.1</product>
</cve>
<cve id="CVE-2016-8737" level="MEDIUM">
<product>brooklyn:0.9.0</product>
</cve>
<cve id="CVE-2016-8738" level="MEDIUM">
<product>struts:2.5</product>
<product>struts:2.5.1</product>
<product>struts:2.5.2</product>
<product>struts:2.5.3</product>
<product>struts:2.5.4</product>
<product>struts:2.5.5</product>
</cve>
<cve id="CVE-2016-8739" level="LOW">
<product>cxf:3.0.11</product>
<product>cxf:3.1.0</product>
<product>cxf:3.1.1</product>
<product>cxf:3.1.2</product>
<product>cxf:3.1.3</product>
<product>cxf:3.1.4</product>
<product>cxf:3.1.5</product>
<product>cxf:3.1.6</product>
<product>cxf:3.1.7</product>
<product>cxf:3.1.8</product>
</cve>
<cve id="CVE-2016-8598" level="LOW">
<product>libcsp:1.4</product>
</cve>
<cve id="CVE-2016-8596" level="LOW">
<product>libcsp:1.4</product>
</cve>
<cve id="CVE-2016-8597" level="LOW">
<product>libcsp:1.4</product>
</cve>
<cve id="CVE-2016-8590" level="LOW">
<product>threat_discovery_appliance:2.6.1062</product>
</cve>
<cve id="CVE-2016-8591" level="LOW">
<product>threat_discovery_appliance:2.6.1062</product>
</cve>
<cve id="CVE-2016-8592" level="LOW">
<product>threat_discovery_appliance:2.6.1062</product>
</cve>
<cve id="CVE-2016-8593" level="LOW">
<product>threat_discovery_appliance:2.6.1062</product>
</cve>
<cve id="CVE-2016-7821" level="MEDIUM">
<product>wnc01wh_firmware:1.0.0.8</product>
</cve>
<cve id="CVE-2016-7820" level="LOW">
<product>ts-wrla_firmware:1.01.02</product>
<product>ts-wrlp_firmware:1.01.02</product>
</cve>
<cve id="CVE-2016-7823" level="MEDIUM">
<product>wnc01wh_firmware:1.0.0.8</product>
</cve>
<cve id="CVE-2016-7822" level="MEDIUM">
<product>wnc01wh_firmware:1.0.0.8</product>
</cve>
<cve id="CVE-2016-7825" level="LOW">
<product>wnc01wh_firmware:1.0.0.8</product>
</cve>
<cve id="CVE-2016-7824" level="LOW">
<product>wnc01wh_firmware:1.0.0.8</product>
</cve>
<cve id="CVE-2016-7826" level="LOW">
<product>wnc01wh_firmware:1.0.0.8</product>
</cve>
<cve id="CVE-2016-9463" level="MEDIUM">
<product>nextcloud:9.0.53</product>
<product>nextcloud:10.0.0</product>
<product>owncloud:8.2.8</product>
<product>owncloud:9.0.5</product>
<product>owncloud:9.1.1</product>
</cve>
<cve id="CVE-2016-9462" level="LOW">
<product>nextcloud:9.0.51</product>
<product>owncloud:8.0.13</product>
<product>owncloud:8.1.8</product>
<product>owncloud:8.2.6</product>
<product>owncloud:9.0.3</product>
</cve>
<cve id="CVE-2016-9461" level="LOW">
<product>nextcloud:9.0.51</product>
<product>owncloud:8.0.13</product>
<product>owncloud:8.1.8</product>
<product>owncloud:8.2.6</product>
<product>owncloud:9.0.3</product>
</cve>
<cve id="CVE-2016-9460" level="LOW">
<product>nextcloud:9.0.51</product>
<product>owncloud:9.0.3</product>
</cve>
<cve id="CVE-2016-9467" level="LOW">
<product>nextcloud:9.0.53</product>
<product>nextcloud:10.0.0</product>
<product>owncloud:9.0.5</product>
<product>owncloud:9.1.1</product>
</cve>
<cve id="CVE-2016-9466" level="MEDIUM">
<product>nextcloud:10.0.0</product>
<product>owncloud:9.0.5</product>
<product>owncloud:9.1.1</product>
</cve>
<cve id="CVE-2016-9465" level="MEDIUM">
<product>nextcloud:10.0.0</product>
<product>owncloud:9.0.5</product>
<product>owncloud:9.1.1</product>
</cve>
<cve id="CVE-2016-9464" level="LOW">
<product>nextcloud_server:9.0.53</product>
<product>nextcloud_server:9.1.1</product>
</cve>
<cve id="CVE-2016-9469" level="LOW">
<product>gitlab:8.13.0</product>
<product>gitlab:8.13.0</product>
<product>gitlab:8.13.1</product>
<product>gitlab:8.13.1</product>
<product>gitlab:8.13.2</product>
<product>gitlab:8.13.2</product>
<product>gitlab:8.13.3</product>
<product>gitlab:8.13.3</product>
<product>gitlab:8.13.4</product>
<product>gitlab:8.13.4</product>
<product>gitlab:8.13.5</product>
<product>gitlab:8.13.5</product>
<product>gitlab:8.13.6</product>
<product>gitlab:8.13.6</product>
<product>gitlab:8.13.7</product>
<product>gitlab:8.13.7</product>
<product>gitlab:8.14.0</product>
<product>gitlab:8.14.0</product>
<product>gitlab:8.14.1</product>
<product>gitlab:8.14.1</product>
<product>gitlab:8.14.2</product>
<product>gitlab:8.14.2</product>
</cve>
<cve id="CVE-2016-9468" level="LOW">
<product>nextcloud_server:9.0.53</product>
<product>nextcloud_server:10.0.0</product>
<product>owncloud:9.0.5</product>
<product>owncloud:9.1.1</product>
</cve>
<cve id="CVE-2016-1610" level="LOW">
<product>filr:1.2</product>
<product>filr:2.0</product>
</cve>
<cve id="CVE-2016-1611" level="LOW">
<product>filr:1.2</product>
<product>filr:2.0</product>
</cve>
<cve id="CVE-2016-5759" level="MEDIUM">
<product>leap:42.1</product>
<product>suse_linux_enterprise_desktop:12.0</product>
<product>suse_linux_enterprise_server:12.0</product>
</cve>
<cve id="CVE-2016-5758" level="MEDIUM">
<product>access_manager:4.1</product>
<product>access_manager:4.1</product>
<product>access_manager:4.1</product>
<product>access_manager:4.2</product>
<product>access_manager:4.2</product>
</cve>
<cve id="CVE-2016-5979" level="LOW">
<product>distributed_marketing:8.6.0.0</product>
<product>distributed_marketing:8.6.0.2</product>
<product>distributed_marketing:8.6.0.3</product>
<product>distributed_marketing:8.6.0.4</product>
<product>distributed_marketing:8.6.0.5</product>
<product>distributed_marketing:8.6.0.6</product>
<product>distributed_marketing:8.6.0.7</product>
<product>distributed_marketing:8.6.0.8</product>
<product>distributed_marketing:8.6.0.9</product>
<product>distributed_marketing:8.6.0.10</product>
<product>distributed_marketing:9.1.0.0</product>
<product>distributed_marketing:9.1.0.2</product>
<product>distributed_marketing:9.1.0.3</product>
<product>distributed_marketing:9.1.0.4</product>
<product>distributed_marketing:9.1.0.5</product>
<product>distributed_marketing:9.1.0.6</product>
<product>distributed_marketing:9.1.0.7</product>
<product>distributed_marketing:9.1.0.8</product>
<product>distributed_marketing:9.1.0.9</product>
<product>distributed_marketing:9.1.0.10</product>
<product>distributed_marketing:9.1.0.11</product>
<product>distributed_marketing:9.1.2.0</product>
<product>distributed_marketing:9.1.2.1</product>
<product>distributed_marketing:9.1.2.2</product>
<product>distributed_marketing:9.1.2.3</product>
<product>distributed_marketing:10.0.0.0</product>
<product>distributed_marketing:10.0.0.1</product>
</cve>
<cve id="CVE-2016-5978" level="MEDIUM">
<product>tealeaf_customer_experience:8.7</product>
<product>tealeaf_customer_experience:8.8</product>
<product>tealeaf_customer_experience:9.0.0</product>
<product>tealeaf_customer_experience:9.0.0a</product>
<product>tealeaf_customer_experience:9.0.1</product>
<product>tealeaf_customer_experience:9.0.1a</product>
<product>tealeaf_customer_experience:9.0.2</product>
<product>tealeaf_customer_experience:9.0.2a</product>
</cve>
<cve id="CVE-2016-1566" level="MEDIUM">
<product>guacamole:0.9.8</product>
<product>guacamole:0.9.9</product>
</cve>
<cve id="CVE-2016-5751" level="MEDIUM">
<product>access_manager:4.1</product>
<product>access_manager:4.1</product>
<product>access_manager:4.1</product>
<product>access_manager:4.2</product>
<product>access_manager:4.2</product>
</cve>
<cve id="CVE-2016-5750" level="LOW">
<product>access_manager:4.1</product>
<product>access_manager:4.1</product>
<product>access_manager:4.1</product>
<product>access_manager:4.2</product>
<product>access_manager:4.2</product>
</cve>
<cve id="CVE-2016-5977" level="MEDIUM">
<product>tealeaf_customer_experience:8.7</product>
<product>tealeaf_customer_experience:8.8</product>
<product>tealeaf_customer_experience:9.0.0</product>
<product>tealeaf_customer_experience:9.0.1</product>
<product>tealeaf_customer_experience:9.0.1a</product>
<product>tealeaf_customer_experience:9.0.2</product>
<product>tealeaf_customer_experience:9.0.2a</product>
</cve>
<cve id="CVE-2016-5752" level="LOW">
<product>access_manager:4.1</product>
<product>access_manager:4.1</product>
<product>access_manager:4.1</product>
<product>access_manager:4.2</product>
<product>access_manager:4.2</product>
</cve>
<cve id="CVE-2016-5755" level="MEDIUM">
<product>access_manager:4.1</product>
<product>access_manager:4.1</product>
<product>access_manager:4.1</product>
<product>access_manager:4.2</product>
<product>access_manager:4.2</product>
</cve>
<cve id="CVE-2016-5970" level="LOW">
<product>security_privileged_identity_manager_virtual_appliance:2.0.2</product>
</cve>
<cve id="CVE-2016-5757" level="LOW">
<product>access_manager:4.1</product>
<product>access_manager:4.1</product>
<product>access_manager:4.1</product>
<product>access_manager:4.2</product>
<product>access_manager:4.2</product>
</cve>
<cve id="CVE-2016-5756" level="MEDIUM">
<product>access_manager:4.1</product>
<product>access_manager:4.1</product>
<product>access_manager:4.1</product>
<product>access_manager:4.2</product>
<product>access_manager:4.2</product>
</cve>
<cve id="CVE-2016-1567" level="MEDIUM">
<product>chrony:1.31.1</product>
<product>chrony:2.0</product>
<product>chrony:2.1</product>
<product>chrony:2.1.1</product>
<product>chrony:2.2</product>
</cve>
<cve id="CVE-2016-9645" level="LOW">
<product>ikiwiki:1.0</product>
<product>ikiwiki:1.1</product>
<product>ikiwiki:1.1.47</product>
<product>ikiwiki:1.2</product>
<product>ikiwiki:1.3</product>
<product>ikiwiki:1.4</product>
<product>ikiwiki:1.5</product>
<product>ikiwiki:1.6</product>
<product>ikiwiki:1.7</product>
<product>ikiwiki:1.8</product>
<product>ikiwiki:1.9</product>
<product>ikiwiki:1.10</product>
<product>ikiwiki:1.11</product>
<product>ikiwiki:1.12</product>
<product>ikiwiki:1.13</product>
<product>ikiwiki:1.14</product>
<product>ikiwiki:1.15</product>
<product>ikiwiki:1.16</product>
<product>ikiwiki:1.17</product>
<product>ikiwiki:1.18</product>
<product>ikiwiki:1.19</product>
<product>ikiwiki:1.20</product>
<product>ikiwiki:1.21</product>
<product>ikiwiki:1.22</product>
<product>ikiwiki:1.23</product>
<product>ikiwiki:1.24</product>
<product>ikiwiki:1.25</product>
<product>ikiwiki:1.26</product>
<product>ikiwiki:1.27</product>
<product>ikiwiki:1.28</product>
<product>ikiwiki:1.29</product>
<product>ikiwiki:1.30</product>
<product>ikiwiki:1.31</product>
<product>ikiwiki:1.32</product>
<product>ikiwiki:1.33.3</product>
<product>ikiwiki:1.34</product>
<product>ikiwiki:1.34.1</product>
<product>ikiwiki:1.34.2</product>
<product>ikiwiki:1.35</product>
<product>ikiwiki:1.36</product>
<product>ikiwiki:1.37</product>
<product>ikiwiki:1.38</product>
<product>ikiwiki:1.39</product>
<product>ikiwiki:1.40</product>
<product>ikiwiki:1.41</product>
<product>ikiwiki:1.42</product>
<product>ikiwiki:1.43</product>
<product>ikiwiki:1.44</product>
<product>ikiwiki:1.45</product>
<product>ikiwiki:1.46</product>
<product>ikiwiki:1.47</product>
<product>ikiwiki:1.48</product>
<product>ikiwiki:1.49</product>
<product>ikiwiki:1.50</product>
<product>ikiwiki:1.51</product>
<product>ikiwiki:2.0</product>
<product>ikiwiki:2.1</product>
<product>ikiwiki:2.2</product>
<product>ikiwiki:2.3</product>
<product>ikiwiki:2.4</product>
<product>ikiwiki:2.5</product>
<product>ikiwiki:2.6</product>
<product>ikiwiki:2.6.1</product>
<product>ikiwiki:2.7</product>
</cve>
<cve id="CVE-2016-9643" level="LOW">
<product>webkit:2.4.11</product>
</cve>
<cve id="CVE-2016-9642" level="MEDIUM">
<product>webkit:-</product>
</cve>
<cve id="CVE-2016-10448" level="LOW">
<product>mdm9206_firmware:-</product>
<product>mdm9607_firmware:-</product>
<product>mdm9615_firmware:-</product>
<product>mdm9625_firmware:-</product>
<product>mdm9635m_firmware:-</product>
<product>mdm9640_firmware:-</product>
<product>mdm9645_firmware:-</product>
<product>mdm9650_firmware:-</product>
<product>mdm9655_firmware:-</product>
<product>msm8909w_firmware:-</product>
<product>sd_205_firmware:-</product>
<product>sd_210_firmware:-</product>
<product>sd_212_firmware:-</product>
<product>sd_400_firmware:-</product>
<product>sd_410_firmware:-</product>
<product>sd_412_firmware:-</product>
<product>sd_415_firmware:-</product>
<product>sd_425_firmware:-</product>
<product>sd_430_firmware:-</product>
<product>sd_450_firmware:-</product>
<product>sd_615_firmware:-</product>
<product>sd_616_firmware:-</product>
<product>sd_617_firmware:-</product>
<product>sd_625_firmware:-</product>
<product>sd_650_firmware:-</product>
<product>sd_652_firmware:-</product>
<product>sd_800_firmware:-</product>
<product>sd_808_firmware:-</product>
<product>sd_810_firmware:-</product>
<product>sd_820_firmware:-</product>
<product>sd_835_firmware:-</product>
<product>sd_845_firmware:-</product>
<product>sd_850_firmware:-</product>
<product>sdx20_firmware:-</product>
</cve>
<cve id="CVE-2016-10449" level="LOW">
<product>mdm9206_firmware:-</product>
<product>mdm9607_firmware:-</product>
<product>mdm9640_firmware:-</product>
<product>mdm9650_firmware:-</product>
<product>msm8909w_firmware:-</product>
<product>sd_205_firmware:-</product>
<product>sd_210_firmware:-</product>
<product>sd_212_firmware:-</product>
<product>sd_400_firmware:-</product>
<product>sd_410_firmware:-</product>
<product>sd_412_firmware:-</product>
<product>sd_415_firmware:-</product>
<product>sd_425_firmware:-</product>
<product>sd_430_firmware:-</product>
<product>sd_450_firmware:-</product>
<product>sd_615_firmware:-</product>
<product>sd_616_firmware:-</product>
<product>sd_625_firmware:-</product>
<product>sd_650_firmware:-</product>
<product>sd_652_firmware:-</product>
<product>sd_800_firmware:-</product>
<product>sd_810_firmware:-</product>
<product>sd_820_firmware:-</product>
<product>sd_835_firmware:-</product>
</cve>
<cve id="CVE-2016-10446" level="LOW">
<product>mdm9206_firmware:-</product>
<product>mdm9650_firmware:-</product>
<product>sd_205_firmware:-</product>
<product>sd_210_firmware:-</product>
<product>sd_212_firmware:-</product>
<product>sd_820_firmware:-</product>
<product>sd_820a_firmware:-</product>
<product>sd_835_firmware:-</product>
</cve>
<cve id="CVE-2016-10447" level="LOW">
<product>mdm9206_firmware:-</product>
<product>mdm9607_firmware:-</product>
<product>mdm9650_firmware:-</product>
<product>sd_205_firmware:-</product>
<product>sd_210_firmware:-</product>
<product>sd_212_firmware:-</product>
<product>sd_410_firmware:-</product>
<product>sd_412_firmware:-</product>
<product>sd_415_firmware:-</product>
<product>sd_425_firmware:-</product>
<product>sd_430_firmware:-</product>
<product>sd_450_firmware:-</product>
<product>sd_615_firmware:-</product>
<product>sd_616_firmware:-</product>
<product>sd_625_firmware:-</product>
<product>sd_650_firmware:-</product>
<product>sd_652_firmware:-</product>
<product>sd_820_firmware:-</product>
<product>sd_835_firmware:-</product>
<product>sdx20_firmware:-</product>
</cve>
<cve id="CVE-2016-10444" level="LOW">
<product>mdm9206_firmware:-</product>
<product>sd_205_firmware:-</product>
<product>sd_210_firmware:-</product>
<product>sd_212_firmware:-</product>
<product>sd_425_firmware:-</product>
<product>sd_430_firmware:-</product>
<product>sd_450_firmware:-</product>
<product>sd_625_firmware:-</product>
<product>sd_820_firmware:-</product>
<product>sd_820a_firmware:-</product>
<product>sd_835_firmware:-</product>
</cve>
<cve id="CVE-2016-10445" level="LOW">
<product>sd_410_firmware:-</product>
<product>sd_412_firmware:-</product>
<product>sd_415_firmware:-</product>
<product>sd_425_firmware:-</product>
<product>sd_427_firmware:-</product>
<product>sd_430_firmware:-</product>
<product>sd_435_firmware:-</product>
<product>sd_450_firmware:-</product>
<product>sd_615_firmware:-</product>
<product>sd_616_firmware:-</product>
<product>sd_625_firmware:-</product>
<product>sd_820_firmware:-</product>
<product>sd_820a_firmware:-</product>
<product>sd_835_firmware:-</product>
<product>sd_845_firmware:-</product>
<product>sd_850_firmware:-</product>
<product>sdm630_firmware:-</product>
<product>sdm636_firmware:-</product>
<product>sdm660_firmware:-</product>
</cve>
<cve id="CVE-2016-10442" level="LOW">
<product>mdm9640_firmware:-</product>
<product>mdm9650_firmware:-</product>
<product>msm8937_firmware:-</product>
<product>msm8952_firmware:-</product>
<product>msm8976_firmware:-</product>
<product>sdm630_firmware:-</product>
<product>sdm845_firmware:-</product>
</cve>
<cve id="CVE-2016-10443" level="HIGH">
<product>mdm9206_firmware:-</product>
<product>mdm9607_firmware:-</product>
<product>mdm9635m_firmware:-</product>
<product>mdm9640_firmware:-</product>
<product>mdm9645_firmware:-</product>
<product>mdm9650_firmware:-</product>
<product>msm8909w_firmware:-</product>
<product>sd_205_firmware:-</product>
<product>sd_210_firmware:-</product>
<product>sd_212_firmware:-</product>
<product>sd_410_firmware:-</product>
<product>sd_412_firmware:-</product>
<product>sd_415_firmware:-</product>
<product>sd_425_firmware:-</product>
<product>sd_430_firmware:-</product>
<product>sd_450_firmware:-</product>
<product>sd_615_firmware:-</product>
<product>sd_616_firmware:-</product>
<product>sd_617_firmware:-</product>
<product>sd_625_firmware:-</product>
<product>sd_650_firmware:-</product>
<product>sd_652_firmware:-</product>
<product>sd_808_firmware:-</product>
<product>sd_810_firmware:-</product>
<product>sd_820_firmware:-</product>
<product>sd_820a_firmware:-</product>
<product>sd_835_firmware:-</product>
<product>sd_845_firmware:-</product>
<product>sd_850_firmware:-</product>
</cve>
<cve id="CVE-2016-10440" level="LOW">
<product>sd_425_firmware:-</product>
<product>sd_430_firmware:-</product>
<product>sd_450_firmware:-</product>
<product>sd_625_firmware:-</product>
<product>sd_650_firmware:-</product>
<product>sd_652_firmware:-</product>
</cve>
<cve id="CVE-2016-10441" level="LOW">
<product>mdm9206_firmware:-</product>
<product>mdm9607_firmware:-</product>
<product>mdm9650_firmware:-</product>
<product>sd_205_firmware:-</product>
<product>sd_210_firmware:-</product>
<product>sd_212_firmware:-</product>
<product>sd_400_firmware:-</product>
<product>sd_410_firmware:-</product>
<product>sd_412_firmware:-</product>
<product>sd_415_firmware:-</product>
<product>sd_425_firmware:-</product>
<product>sd_430_firmware:-</product>
<product>sd_450_firmware:-</product>
<product>sd_600_firmware:-</product>
<product>sd_615_firmware:-</product>
<product>sd_616_firmware:-</product>
<product>sd_617_firmware:-</product>
<product>sd_625_firmware:-</product>
<product>sd_650_firmware:-</product>
<product>sd_652_firmware:-</product>
<product>sd_800_firmware:-</product>
<product>sd_808_firmware:-</product>
<product>sd_810_firmware:-</product>
<product>sd_820_firmware:-</product>
<product>sd_835_firmware:-</product>
<product>sdx20_firmware:-</product>
</cve>
<cve id="CVE-2016-1565" level="MEDIUM">
<product>field_group:7.x-1.0</product>
<product>field_group:7.x-1.0</product>
<product>field_group:7.x-1.0</product>
<product>field_group:7.x-1.1</product>
<product>field_group:7.x-1.2</product>
<product>field_group:7.x-1.3</product>
<product>field_group:7.x-1.4</product>
</cve>
<cve id="CVE-2016-1562" level="LOW">
<product>insight:1.7.7</product>
</cve>
<cve id="CVE-2016-2998" level="MEDIUM">
<product>connections:4.0.0.0</product>
<product>connections:4.5.0.0</product>
<product>connections:5.0.0.0</product>
<product>connections:5.5.0.0</product>
</cve>
<cve id="CVE-2016-2999" level="LOW">
<product>connections:5.5.0.0</product>
</cve>
<cve id="CVE-2016-2996" level="LOW">
<product>security_privileged_identity_manager:2.0.0</product>
<product>security_privileged_identity_manager:2.0.1</product>
<product>security_privileged_identity_manager:2.0.2</product>
</cve>
<cve id="CVE-2016-2997" level="MEDIUM">
<product>connections:4.0.0.0</product>
<product>connections:4.5.0.0</product>
<product>connections:5.0.0.0</product>
<product>connections:5.5.0.0</product>
</cve>
<cve id="CVE-2016-2994" level="MEDIUM">
<product>urbancode_deploy:6.2.0.0</product>
<product>urbancode_deploy:6.2.0.1</product>
<product>urbancode_deploy:6.2.0.2</product>
<product>urbancode_deploy:6.2.0.201</product>
<product>urbancode_deploy:6.2.1</product>
<product>urbancode_deploy:6.2.1.1</product>
</cve>
<cve id="CVE-2016-2995" level="MEDIUM">
<product>connections:4.0.0.0</product>
<product>connections:4.5.0.0</product>
<product>connections:5.0.0.0</product>
<product>connections:5.5.0.0</product>
</cve>
<cve id="CVE-2016-2992" level="MEDIUM">
<product>biginsights:4.2</product>
</cve>
<cve id="CVE-2016-2991" level="MEDIUM">
<product>lotus_protector_for_mail_security:2.8</product>
<product>lotus_protector_for_mail_security:2.8.1</product>
</cve>
<cve id="CVE-2016-1560" level="LOW">
<product>ex10000e_firmware:4.8</product>
<product>ex13000e_firmware:4.8</product>
<product>ex21000e_firmware:4.8</product>
<product>ex3000_firmware:4.8</product>
<product>ex32000e_firmware:4.8</product>
<product>ex40000e_firmware:4.8</product>
<product>ex5000_firmware:4.8</product>
<product>ex7000_firmware:4.8</product>
</cve>
<cve id="CVE-2016-2196" level="LOW">
<product>botan:1.11.0</product>
<product>botan:1.11.1</product>
<product>botan:1.11.2</product>
<product>botan:1.11.3</product>
<product>botan:1.11.4</product>
<product>botan:1.11.5</product>
<product>botan:1.11.6</product>
<product>botan:1.11.7</product>
<product>botan:1.11.8</product>
<product>botan:1.11.9</product>
<product>botan:1.11.10</product>
<product>botan:1.11.11</product>
<product>botan:1.11.12</product>
<product>botan:1.11.13</product>
<product>botan:1.11.14</product>
<product>botan:1.11.15</product>
<product>botan:1.11.16</product>
<product>botan:1.11.17</product>
<product>botan:1.11.18</product>
<product>botan:1.11.19</product>
<product>botan:1.11.20</product>
<product>botan:1.11.21</product>
<product>botan:1.11.22</product>
<product>botan:1.11.23</product>
<product>botan:1.11.24</product>
<product>botan:1.11.25</product>
<product>botan:1.11.26</product>
</cve>
<cve id="CVE-2016-2197" level="LOW">
<product>qemu</product>
</cve>
<cve id="CVE-2016-2192" level="LOW">
<product>postgre_sql_pl%2fjava:1.4.3</product>
</cve>
<cve id="CVE-2016-2190" level="LOW">
<product>moodle:2.6.11</product>
<product>moodle:2.7</product>
<product>moodle:2.7.1</product>
<product>moodle:2.7.2</product>
<product>moodle:2.7.3</product>
<product>moodle:2.7.4</product>
<product>moodle:2.7.5</product>
<product>moodle:2.7.6</product>
<product>moodle:2.7.7</product>
<product>moodle:2.7.8</product>
<product>moodle:2.7.9</product>
<product>moodle:2.7.10</product>
<product>moodle:2.7.11</product>
<product>moodle:2.7.12</product>
<product>moodle:2.8</product>
<product>moodle:2.8.1</product>
<product>moodle:2.8.2</product>
<product>moodle:2.8.3</product>
<product>moodle:2.8.4</product>
<product>moodle:2.8.5</product>
<product>moodle:2.8.6</product>
<product>moodle:2.8.7</product>
<product>moodle:2.8.8</product>
<product>moodle:2.8.9</product>
<product>moodle:2.8.10</product>
<product>moodle:2.9</product>
<product>moodle:2.9.1</product>
<product>moodle:2.9.2</product>
<product>moodle:2.9.3</product>
<product>moodle:2.9.4</product>
<product>moodle:3.0</product>
<product>moodle:3.0.1</product>
<product>moodle:3.0.2</product>
</cve>
<cve id="CVE-2016-2198" level="LOW">
<product>qemu</product>
</cve>
<cve id="CVE-2016-2199" level="MEDIUM">
<product>vulnerability_manager:7.5.9</product>
</cve>
<cve id="CVE-2016-9210" level="LOW">
<product>unified_communications_manager:11.5%281.11007.2%29</product>
</cve>
<cve id="CVE-2016-9747" level="MEDIUM">
<product>rational_collaborative_lifecycle_management:4.0.0</product>
<product>rational_collaborative_lifecycle_management:4.0.1</product>
<product>rational_collaborative_lifecycle_management:4.0.2</product>
<product>rational_collaborative_lifecycle_management:4.0.3</product>
<product>rational_collaborative_lifecycle_management:4.0.4</product>
<product>rational_collaborative_lifecycle_management:4.0.5</product>
<product>rational_collaborative_lifecycle_management:4.0.6</product>
<product>rational_collaborative_lifecycle_management:4.0.7</product>
<product>rational_collaborative_lifecycle_management:5.0.0</product>
<product>rational_collaborative_lifecycle_management:5.0.1</product>
<product>rational_collaborative_lifecycle_management:5.0.2</product>
<product>rational_collaborative_lifecycle_management:6.0.0</product>
<product>rational_collaborative_lifecycle_management:6.0.1</product>
<product>rational_collaborative_lifecycle_management:6.0.2</product>
<product>rational_engineering_lifecycle_manager:4.0.3</product>
<product>rational_engineering_lifecycle_manager:4.0.4</product>
<product>rational_engineering_lifecycle_manager:4.0.5</product>
<product>rational_engineering_lifecycle_manager:4.0.6</product>
<product>rational_engineering_lifecycle_manager:4.0.7</product>
<product>rational_engineering_lifecycle_manager:5.0.0</product>
<product>rational_engineering_lifecycle_manager:5.0.1</product>
<product>rational_engineering_lifecycle_manager:5.0.2</product>
<product>rational_engineering_lifecycle_manager:6.0.0</product>
<product>rational_engineering_lifecycle_manager:6.0.1</product>
<product>rational_engineering_lifecycle_manager:6.0.2</product>
</cve>
<cve id="CVE-2016-1000147" level="MEDIUM">
<product>recipes-writer:1.0.4</product>
</cve>
<cve id="CVE-2016-1000141" level="MEDIUM">
<product>page-layout-builder:1.9.3</product>
</cve>
<cve id="CVE-2016-1000143" level="MEDIUM">
<product>photoxhibit:2.1.8</product>
</cve>
<cve id="CVE-2016-1000142" level="MEDIUM">
<product>parsi-font:4.2.5</product>
</cve>
<cve id="CVE-2016-3119" level="MEDIUM">
<product>kerberos:5-1.1</product>
<product>kerberos:5-1.2</product>
<product>kerberos:5-1.2.1</product>
<product>kerberos:5-1.2.2</product>
<product>kerberos:5-1.2.3</product>
<product>kerberos:5-1.2.4</product>
<product>kerberos:5-1.2.5</product>
<product>kerberos:5-1.2.6</product>
<product>kerberos:5-1.2.7</product>
<product>kerberos:5-1.2.8</product>
<product>kerberos:5-1.3</product>
<product>kerberos:5-1.3</product>
<product>kerberos:5-1.3.1</product>
<product>kerberos:5-1.3.2</product>
<product>kerberos:5-1.3.3</product>
<product>kerberos:5-1.3.4</product>
<product>kerberos:5-1.3.5</product>
<product>kerberos:5-1.3.6</product>
<product>kerberos:5-1.4</product>
<product>kerberos:5-1.4.1</product>
<product>kerberos:5-1.4.2</product>
<product>kerberos:5-1.4.3</product>
<product>kerberos:5-1.4.4</product>
<product>kerberos:5-1.5</product>
<product>kerberos:5-1.5.1</product>
<product>kerberos:5-1.5.2</product>
<product>kerberos:5-1.5.3</product>
<product>kerberos:5-1.6</product>
<product>kerberos:5-1.6.1</product>
<product>kerberos:5-1.6.2</product>
<product>kerberos:5-1.7</product>
<product>kerberos:5-1.7.1</product>
<product>kerberos:5-1.8</product>
<product>kerberos:5-1.8.1</product>
<product>kerberos:5-1.8.2</product>
<product>kerberos:5-1.8.3</product>
<product>kerberos:5-1.8.4</product>
<product>kerberos:5-1.8.5</product>
<product>kerberos:5-1.8.6</product>
<product>kerberos:5-1.9</product>
<product>kerberos:5-1.9.1</product>
<product>kerberos:5-1.9.2</product>
<product>kerberos:5-1.9.3</product>
<product>kerberos:5-1.9.4</product>
<product>kerberos:5-1.10</product>
<product>kerberos:5-1.10.1</product>
<product>kerberos:5-1.10.2</product>
<product>kerberos:5-1.10.3</product>
<product>kerberos:5-1.10.4</product>
<product>kerberos:5-1.11</product>
<product>kerberos:5-1.11.1</product>
<product>kerberos:5-1.11.2</product>
<product>kerberos:5-1.11.3</product>
<product>kerberos:5-1.11.4</product>
<product>kerberos:5-1.11.5</product>
<product>kerberos:5-1.12</product>
<product>kerberos:5-1.12.1</product>
<product>kerberos:5-1.12.2</product>
<product>kerberos:5-1.12.3</product>
<product>kerberos:5-1.13</product>
<product>kerberos:5-1.13.1</product>
<product>kerberos:5-1.13.2</product>
<product>kerberos:5-1.13.3</product>
<product>kerberos:5-1.13.4</product>
<product>kerberos:5-1.14</product>
<product>kerberos:5-1.14</product>
<product>kerberos:5-1.14</product>
<product>kerberos:5-1.14.0</product>
<product>kerberos:5-1.14.1</product>
<product>kerberos:5_1.0</product>
<product>kerberos:5_1.0.6</product>
<product>kerberos:5_1.1</product>
<product>kerberos:5_1.1.1</product>
<product>kerberos:5_1.2</product>
<product>kerberos:5_1.2</product>
<product>kerberos:5_1.3.3</product>
<product>leap:42.1</product>
<product>opensuse:13.2</product>
</cve>
<cve id="CVE-2016-3118" level="LOW">
<product>api_gateway:7.1</product>
<product>api_gateway:8.0</product>
<product>api_gateway:8.1</product>
<product>api_gateway:8.2</product>
<product>api_gateway:8.3</product>
<product>api_gateway:8.4</product>
</cve>
<cve id="CVE-2016-3111" level="LOW">
<product>pulp:2.8.2-1</product>
</cve>
<cve id="CVE-2016-3110" level="LOW">
<product>jboss_enterprise_web_server:2.1</product>
</cve>
<cve id="CVE-2016-3113" level="MEDIUM">
<product>ovirt:-</product>
</cve>
<cve id="CVE-2016-3112" level="LOW">
<product>pulp:2.8.2-1</product>
</cve>
<cve id="CVE-2016-3115" level="LOW">
<product>openssh:7.2</product>
<product>vm_server:3.2</product>
</cve>
<cve id="CVE-2016-3114" level="LOW">
<product>kallithea:0.3.1</product>
</cve>
<cve id="CVE-2016-4843" level="MEDIUM">
<product>mailwise:5.0.0</product>
<product>mailwise:5.0.1</product>
<product>mailwise:5.0.4</product>
<product>mailwise:5.0.5</product>
<product>mailwise:5.0.6</product>
<product>mailwise:5.1.0</product>
<product>mailwise:5.1.1</product>
<product>mailwise:5.1.2</product>
<product>mailwise:5.1.4</product>
<product>mailwise:5.2.0</product>
<product>mailwise:5.2.1</product>
<product>mailwise:5.3.0</product>
<product>mailwise:5.3.1</product>
<product>mailwise:5.3.2</product>
</cve>
<cve id="CVE-2016-0138" level="LOW">
<product>exchange_server:2007</product>
<product>exchange_server:2010</product>
<product>exchange_server:2013</product>
<product>exchange_server:2013</product>
<product>exchange_server:2013</product>
<product>exchange_server:2016</product>
<product>exchange_server:2016</product>
</cve>
<cve id="CVE-2016-0130" level="HIGH">
<product>edge</product>
</cve>
<cve id="CVE-2016-7241" level="HIGH">
<product>edge</product>
<product>internet_explorer:11</product>
</cve>
<cve id="CVE-2016-7240" level="HIGH">
<product>edge</product>
</cve>
<cve id="CVE-2016-7243" level="HIGH">
<product>edge</product>
</cve>
<cve id="CVE-2016-4837" level="LOW">
<product>coupon_plugin:1.5</product>
</cve>
<cve id="CVE-2016-4834" level="LOW">
<product>crm:6.4.0</product>
</cve>
<cve id="CVE-2016-4833" level="MEDIUM">
<product>nofollow_links:1.0.10</product>
</cve>
<cve id="CVE-2016-4832" level="MEDIUM">
<product>waon:1.4.1</product>
</cve>
<cve id="CVE-2016-4831" level="LOW">
<product>line:4.7.0</product>
<product>line_installer:4.7.0</product>
</cve>
<cve id="CVE-2016-4830" level="MEDIUM">
<product>sushiro:2.1.16</product>
<product>sushiro:2.1.16.1</product>
</cve>
<cve id="CVE-2016-4839" level="MEDIUM">
<product>money_forward_for_apppass:-</product>
<product>money_forward_for_au_smartpass:-</product>
<product>money_forward_for_chou_houdai:-</product>
<product>money_forward_for_sbi_sumishin_net_bank:-</product>
<product>money_forward_for_shiga_bank:-</product>
<product>money_forward_for_shizuoka_bank:-</product>
<product>money_forward_for_the_gunma_bank:-</product>
<product>money_forward_for_the_toho_bank:-</product>
<product>money_forward_for_tokai_tokyo_securities:-</product>
<product>money_forward_for_ymfg:-</product>
</cve>
<cve id="CVE-2016-4838" level="MEDIUM">
<product>money_forward_for_apppass:-</product>
<product>money_forward_for_au_smartpass:-</product>
<product>money_forward_for_chou_houdai:-</product>
<product>money_forward_for_sbi_sumishin_net_bank:-</product>
<product>money_forward_for_shiga_bank:-</product>
<product>money_forward_for_shizuoka_bank:-</product>
<product>money_forward_for_the_gunma_bank:-</product>
<product>money_forward_for_the_toho_bank:-</product>
<product>money_forward_for_tokai_tokyo_securities:-</product>
<product>money_forward_for_ymfg:-</product>
</cve>
<cve id="CVE-2016-7123" level="MEDIUM">
<product>mailman:2.1.14</product>
</cve>
<cve id="CVE-2016-9870" level="LOW">
<product>isilon_onefs:7.1.0.0</product>
<product>isilon_onefs:7.1.0.1</product>
<product>isilon_onefs:7.1.0.2</product>
<product>isilon_onefs:7.1.0.3</product>
<product>isilon_onefs:7.1.0.4</product>
<product>isilon_onefs:7.1.0.5</product>
<product>isilon_onefs:7.1.0.6</product>
<product>isilon_onefs:7.1.1.0</product>
<product>isilon_onefs:7.1.1.1</product>
<product>isilon_onefs:7.1.1.2</product>
<product>isilon_onefs:7.1.1.3</product>
<product>isilon_onefs:7.1.1.4</product>
<product>isilon_onefs:7.1.1.5</product>
<product>isilon_onefs:7.1.1.6</product>
<product>isilon_onefs:7.1.1.7</product>
<product>isilon_onefs:7.1.1.8</product>
<product>isilon_onefs:7.2.0.0</product>
<product>isilon_onefs:7.2.0.1</product>
<product>isilon_onefs:7.2.0.2</product>
<product>isilon_onefs:7.2.0.3</product>
<product>isilon_onefs:7.2.0.4</product>
<product>isilon_onefs:7.2.0.5</product>
<product>isilon_onefs:7.2.1.0</product>
<product>isilon_onefs:7.2.1.1</product>
<product>isilon_onefs:7.2.1.2</product>
<product>isilon_onefs:8.0.0.0</product>
</cve>
<cve id="CVE-2016-9871" level="LOW">
<product>isilon_onefs:7.1.0.0</product>
<product>isilon_onefs:7.1.0.5</product>
<product>isilon_onefs:7.1.0.6</product>
<product>isilon_onefs:7.1.1.0</product>
<product>isilon_onefs:7.1.1.1</product>
<product>isilon_onefs:7.1.1.2</product>
<product>isilon_onefs:7.1.1.3</product>
<product>isilon_onefs:7.1.1.4</product>
<product>isilon_onefs:7.1.1.5</product>
<product>isilon_onefs:7.1.1.6</product>
<product>isilon_onefs:7.1.1.7</product>
<product>isilon_onefs:7.1.1.8</product>
<product>isilon_onefs:7.1.1.9</product>
<product>isilon_onefs:7.1.1.10</product>
<product>isilon_onefs:7.2.0.0</product>
<product>isilon_onefs:7.2.0.1</product>
<product>isilon_onefs:7.2.0.2</product>
<product>isilon_onefs:7.2.0.3</product>
<product>isilon_onefs:7.2.0.4</product>
<product>isilon_onefs:7.2.1.0</product>
<product>isilon_onefs:7.2.1.1</product>
<product>isilon_onefs:7.2.1.2</product>
<product>isilon_onefs:7.2.1.3</product>
</cve>
<cve id="CVE-2016-9872" level="MEDIUM">
<product>documentum_d2:4.5</product>
<product>documentum_d2:4.6</product>
</cve>
<cve id="CVE-2016-9873" level="LOW">
<product>documentum_d2:4.5</product>
<product>documentum_d2:4.6</product>
</cve>
<cve id="CVE-2016-9877" level="LOW">
<product>rabbitmq:1.5.0</product>
<product>rabbitmq:1.5.1</product>
<product>rabbitmq:1.5.2</product>
<product>rabbitmq:1.5.3</product>
<product>rabbitmq:1.5.4</product>
<product>rabbitmq:1.5.5</product>
<product>rabbitmq:1.5.6</product>
<product>rabbitmq:1.5.7</product>
<product>rabbitmq:1.5.8</product>
<product>rabbitmq:1.5.9</product>
<product>rabbitmq:1.5.10</product>
<product>rabbitmq:1.5.11</product>
<product>rabbitmq:1.5.12</product>
<product>rabbitmq:1.5.13</product>
<product>rabbitmq:1.5.14</product>
<product>rabbitmq:1.5.15</product>
<product>rabbitmq:1.5.17</product>
<product>rabbitmq:1.5.18</product>
<product>rabbitmq:1.6.0</product>
<product>rabbitmq:1.6.1</product>
<product>rabbitmq:1.6.2</product>
<product>rabbitmq:1.6.3</product>
<product>rabbitmq:1.6.4</product>
<product>rabbitmq:1.6.5</product>
<product>rabbitmq:1.6.6</product>
<product>rabbitmq:1.6.7</product>
<product>rabbitmq:1.6.8</product>
<product>rabbitmq:1.6.9</product>
<product>rabbitmq:1.6.10</product>
<product>rabbitmq:1.7.0</product>
<product>rabbitmq:1.7.2</product>
<product>rabbitmq:1.7.3</product>
<product>rabbitmq:1.7.4</product>
<product>rabbitmq:1.7.5</product>
<product>rabbitmq:1.7.6</product>
<product>rabbitmq:3.0.0</product>
<product>rabbitmq:3.0.1</product>
<product>rabbitmq:3.0.2</product>
<product>rabbitmq:3.0.3</product>
<product>rabbitmq:3.0.4</product>
<product>rabbitmq:3.1.0</product>
<product>rabbitmq:3.1.1</product>
<product>rabbitmq:3.1.2</product>
<product>rabbitmq:3.1.3</product>
<product>rabbitmq:3.1.4</product>
<product>rabbitmq:3.1.5</product>
<product>rabbitmq:3.2.0</product>
<product>rabbitmq:3.2.1</product>
<product>rabbitmq:3.2.2</product>
<product>rabbitmq:3.2.3</product>
<product>rabbitmq:3.2.4</product>
<product>rabbitmq:3.3.0</product>
<product>rabbitmq:3.3.1</product>
<product>rabbitmq:3.3.2</product>
<product>rabbitmq:3.3.3</product>
<product>rabbitmq:3.3.4</product>
<product>rabbitmq:3.3.5</product>
<product>rabbitmq:3.4.0</product>
<product>rabbitmq:3.4.1</product>
<product>rabbitmq:3.4.2</product>
<product>rabbitmq:3.4.3</product>
<product>rabbitmq:3.4.4</product>
<product>rabbitmq:3.5.0</product>
<product>rabbitmq:3.5.1</product>
<product>rabbitmq:3.5.2</product>
<product>rabbitmq:3.5.3</product>
<product>rabbitmq:3.5.4</product>
<product>rabbitmq:3.5.5</product>
<product>rabbitmq:3.5.6</product>
<product>rabbitmq:3.5.7</product>
<product>rabbitmq:3.6.0</product>
<product>rabbitmq:3.6.1</product>
<product>rabbitmq:3.6.2</product>
<product>rabbitmq:3.6.3</product>
<product>rabbitmq:3.6.4</product>
<product>rabbitmq:3.6.5</product>
</cve>
<cve id="CVE-2016-9878" level="LOW">
<product>spring_framework:3.2.0</product>
<product>spring_framework:3.2.1</product>
<product>spring_framework:3.2.2</product>
<product>spring_framework:3.2.3</product>
<product>spring_framework:3.2.4</product>
<product>spring_framework:3.2.5</product>
<product>spring_framework:3.2.6</product>
<product>spring_framework:3.2.7</product>
<product>spring_framework:3.2.8</product>
<product>spring_framework:3.2.9</product>
<product>spring_framework:3.2.10</product>
<product>spring_framework:3.2.11</product>
<product>spring_framework:3.2.12</product>
<product>spring_framework:3.2.13</product>
<product>spring_framework:3.2.14</product>
<product>spring_framework:3.2.15</product>
<product>spring_framework:3.2.16</product>
<product>spring_framework:3.2.17</product>
<product>spring_framework:4.2.0</product>
<product>spring_framework:4.2.1</product>
<product>spring_framework:4.2.2</product>
<product>spring_framework:4.2.3</product>
<product>spring_framework:4.2.4</product>
<product>spring_framework:4.2.5</product>
<product>spring_framework:4.2.6</product>
<product>spring_framework:4.2.7</product>
<product>spring_framework:4.2.8</product>
<product>spring_framework:4.3.0</product>
<product>spring_framework:4.3.1</product>
<product>spring_framework:4.3.2</product>
<product>spring_framework:4.3.3</product>
<product>spring_framework:4.3.4</product>
</cve>
<cve id="CVE-2016-9879" level="LOW">
<product>websphere_application_server:8.5.0.0</product>
<product>websphere_application_server:8.5.0.1</product>
<product>websphere_application_server:8.5.0.2</product>
<product>websphere_application_server:8.5.5.0</product>
<product>websphere_application_server:8.5.5.1</product>
<product>websphere_application_server:8.5.5.2</product>
<product>websphere_application_server:8.5.5.3</product>
<product>websphere_application_server:8.5.5.4</product>
<product>websphere_application_server:8.5.5.5</product>
<product>websphere_application_server:8.5.5.6</product>
<product>websphere_application_server:8.5.5.7</product>
<product>websphere_application_server:8.5.5.8</product>
<product>websphere_application_server:8.5.5.9</product>
<product>spring_security:3.2.0</product>
<product>spring_security:3.2.1</product>
<product>spring_security:3.2.2</product>
<product>spring_security:3.2.3</product>
<product>spring_security:3.2.4</product>
<product>spring_security:3.2.5</product>
<product>spring_security:3.2.6</product>
<product>spring_security:3.2.7</product>
<product>spring_security:3.2.8</product>
<product>spring_security:3.2.9</product>
<product>spring_security:4.1.0</product>
<product>spring_security:4.1.1</product>
<product>spring_security:4.1.2</product>
<product>spring_security:4.1.3</product>
<product>spring_security:4.2.0</product>
</cve>
<cve id="CVE-2016-10143" level="LOW">
<product>tikiwiki_cms%2fgroupware:15.2</product>
</cve>
<cve id="CVE-2016-10634" level="MEDIUM">
<product>scalajs-standalone-bin:0.4.3</product>
</cve>
<cve id="CVE-2016-10637" level="MEDIUM">
<product>haxe-dev:-</product>
</cve>
<cve id="CVE-2016-10636" level="MEDIUM">
<product>grunt-ccompiler:-</product>
</cve>
<cve id="CVE-2016-10631" level="MEDIUM">
<product>jvminstall:0.1.0</product>
</cve>
<cve id="CVE-2016-10630" level="MEDIUM">
<product>install-g-test:2.0.12</product>
</cve>
<cve id="CVE-2016-10633" level="MEDIUM">
<product>dwebp-bin:0.1.6</product>
</cve>
<cve id="CVE-2016-10144" level="LOW">
<product>imagemagick</product>
</cve>
<cve id="CVE-2016-10639" level="MEDIUM">
<product>redis-srvr:-</product>
</cve>
<cve id="CVE-2016-10638" level="MEDIUM">
<product>js-given:-</product>
</cve>
<cve id="CVE-2016-8699" level="MEDIUM">
<product>potrace:1.12</product>
</cve>
<cve id="CVE-2016-8698" level="MEDIUM">
<product>potrace:1.12</product>
</cve>
<cve id="CVE-2016-8697" level="MEDIUM">
<product>potrace:1.12</product>
</cve>
<cve id="CVE-2016-8696" level="MEDIUM">
<product>potrace:1.12</product>
</cve>
<cve id="CVE-2016-8695" level="MEDIUM">
<product>potrace:1.12</product>
</cve>
<cve id="CVE-2016-8694" level="MEDIUM">
<product>potrace:1.12</product>
</cve>
<cve id="CVE-2016-8693" level="MEDIUM">
<product>jasper:1.900.5</product>
<product>fedora:23</product>
<product>opensuse:13.2</product>
</cve>
<cve id="CVE-2016-8690" level="MEDIUM">
<product>jasper:1.900.29</product>
<product>fedora:23</product>
</cve>
<cve id="CVE-2016-1265" level="LOW">
<product>junos_space:15.1r2</product>
</cve>
<cve id="CVE-2016-1264" level="LOW">
<product>junos:12.1x44</product>
<product>junos:12.1x46</product>
<product>junos:12.1x46</product>
<product>junos:12.1x46</product>
<product>junos:12.1x46</product>
<product>junos:12.1x46</product>
<product>junos:12.1x46</product>
<product>junos:12.1x46</product>
<product>junos:12.1x47</product>
<product>junos:12.1x47</product>
<product>junos:12.1x47</product>
<product>junos:12.1x47</product>
<product>junos:12.3</product>
<product>junos:12.3</product>
<product>junos:12.3</product>
<product>junos:12.3</product>
<product>junos:12.3</product>
<product>junos:12.3</product>
<product>junos:12.3</product>
<product>junos:12.3</product>
<product>junos:12.3</product>
<product>junos:12.3</product>
<product>junos:12.3</product>
<product>junos:12.3x48</product>
<product>junos:12.3x48</product>
<product>junos:12.3x50</product>
<product>junos:12.3x50</product>
<product>junos:12.3x50</product>
<product>junos:12.3x50</product>
<product>junos:12.3x50</product>
<product>junos:12.3x50</product>
<product>junos:13.2</product>
<product>junos:13.2</product>
<product>junos:13.2</product>
<product>junos:13.2</product>
<product>junos:13.2</product>
<product>junos:13.2</product>
<product>junos:13.2</product>
<product>junos:13.2</product>
<product>junos:13.2</product>
<product>junos:13.2</product>
<product>junos:13.2x51</product>
<product>junos:13.2x51</product>
<product>junos:13.2x51</product>
<product>junos:13.2x51</product>
<product>junos:13.2x51</product>
<product>junos:13.2x51</product>
<product>junos:13.2x51</product>
<product>junos:13.2x52</product>
<product>junos:13.2x52</product>
<product>junos:13.2x52</product>
<product>junos:13.2x52</product>
<product>junos:13.2x52</product>
<product>junos:13.3</product>
<product>junos:13.3</product>
<product>junos:13.3</product>
<product>junos:13.3</product>
<product>junos:13.3</product>
<product>junos:13.3</product>
<product>junos:13.3</product>
<product>junos:13.3</product>
<product>junos:14.1</product>
<product>junos:14.1</product>
<product>junos:14.1</product>
<product>junos:14.1</product>
<product>junos:14.1</product>
<product>junos:14.1</product>
<product>junos:14.1x53</product>
<product>junos:14.1x53</product>
<product>junos:14.1x53</product>
<product>junos:14.1x53</product>
<product>junos:14.1x53</product>
<product>junos:14.1x53</product>
<product>junos:14.2</product>
<product>junos:14.2</product>
<product>junos:14.2</product>
<product>junos:15.1</product>
<product>junos:15.1x49</product>
<product>junos:16.1</product>
</cve>
<cve id="CVE-2016-1267" level="MEDIUM">
<product>junos:12.1x44</product>
<product>junos:12.1x46</product>
<product>junos:12.1x46</product>
<product>junos:12.1x46</product>
<product>junos:12.1x46</product>
<product>junos:12.1x46</product>
<product>junos:12.1x46</product>
<product>junos:12.1x46</product>
<product>junos:12.1x47</product>
<product>junos:12.1x47</product>
<product>junos:12.1x47</product>
<product>junos:12.1x47</product>
<product>junos:12.3</product>
<product>junos:12.3</product>
<product>junos:12.3</product>
<product>junos:12.3</product>
<product>junos:12.3</product>
<product>junos:12.3</product>
<product>junos:12.3</product>
<product>junos:12.3</product>
<product>junos:12.3</product>
<product>junos:12.3</product>
<product>junos:12.3</product>
<product>junos:12.3x48</product>
<product>junos:12.3x48</product>
<product>junos:13.2</product>
<product>junos:13.2</product>
<product>junos:13.2</product>
<product>junos:13.2</product>
<product>junos:13.2</product>
<product>junos:13.2</product>
<product>junos:13.2</product>
<product>junos:13.2</product>
<product>junos:13.2</product>
<product>junos:13.2</product>
<product>junos:13.2x51</product>
<product>junos:13.2x51</product>
<product>junos:13.2x51</product>
<product>junos:13.2x51</product>
<product>junos:13.2x51</product>
<product>junos:13.2x51</product>
<product>junos:13.2x51</product>
<product>junos:13.3</product>
<product>junos:13.3</product>
<product>junos:13.3</product>
<product>junos:13.3</product>
<product>junos:13.3</product>
<product>junos:13.3</product>
<product>junos:13.3</product>
<product>junos:13.3</product>
<product>junos:14.1</product>
<product>junos:14.1</product>
<product>junos:14.1</product>
<product>junos:14.1</product>
<product>junos:14.1</product>
<product>junos:14.1</product>
<product>junos:14.1x53</product>
<product>junos:14.1x53</product>
<product>junos:14.1x53</product>
<product>junos:14.1x53</product>
<product>junos:14.1x53</product>
<product>junos:14.1x53</product>
<product>junos:14.2</product>
<product>junos:14.2</product>
<product>junos:14.2</product>
<product>junos:15.1</product>
<product>junos:15.1x49</product>
<product>junos:16.1</product>
</cve>
<cve id="CVE-2016-1261" level="MEDIUM">
<product>junos:12.1x44</product>
<product>junos:12.1x46</product>
<product>junos:12.1x47</product>
<product>junos:12.3</product>
<product>junos:12.3x48</product>
<product>junos:13.2x51</product>
<product>junos:13.3</product>
<product>junos:14.1</product>
<product>junos:14.1x53</product>
<product>junos:14.2</product>
<product>junos:15.1</product>
<product>junos:15.1x49</product>
</cve>
<cve id="CVE-2016-1260" level="LOW">
<product>junos:13.2x51</product>
<product>junos:13.2x51</product>
<product>junos:13.2x51</product>
<product>junos:13.2x51</product>
<product>junos:13.2x51</product>
<product>junos:13.2x51</product>
<product>junos:13.2x51</product>
<product>junos:14.1x53</product>
<product>junos:14.1x53</product>
<product>junos:14.1x53</product>
<product>junos:14.1x53</product>
<product>junos:14.1x53</product>
<product>junos:15.2</product>
</cve>
<cve id="CVE-2016-1263" level="LOW">
<product>junos:12.1x46</product>
<product>junos:12.1x47</product>
<product>junos:12.1x47</product>
<product>junos:12.1x47</product>
<product>junos:12.1x47</product>
<product>junos:12.1x47</product>
<product>junos:12.1x47</product>
<product>junos:12.3x48</product>
<product>junos:12.3x48</product>
<product>junos:12.3x48</product>
<product>junos:13.3</product>
<product>junos:13.3</product>
<product>junos:13.3</product>
<product>junos:13.3</product>
<product>junos:13.3</product>
<product>junos:13.3</product>
<product>junos:13.3</product>
<product>junos:13.3</product>
<product>junos:13.3</product>
<product>junos:13.3</product>
<product>junos:14.1</product>
<product>junos:14.1</product>
<product>junos:14.1</product>
<product>junos:14.1</product>
<product>junos:14.1</product>
<product>junos:14.1</product>
<product>junos:14.1</product>
<product>junos:14.2</product>
<product>junos:14.2</product>
<product>junos:14.2</product>
<product>junos:14.2</product>
<product>junos:14.2</product>
<product>junos:15.1</product>
<product>junos:15.1</product>
<product>junos:15.1</product>
<product>junos:15.1</product>
<product>junos:15.1</product>
<product>junos:15.1</product>
<product>junos:15.1</product>
<product>junos:15.1</product>
<product>junos:15.1</product>
<product>junos:15.1x49</product>
<product>junos:15.1x49</product>
<product>junos:15.1x49</product>
</cve>
<cve id="CVE-2016-1262" level="MEDIUM">
<product>junos:12.1x46</product>
<product>junos:12.1x47</product>
<product>junos:12.1x47</product>
<product>junos:12.1x47</product>
<product>junos:12.1x47</product>
<product>junos:12.3x48</product>
<product>junos:12.3x48</product>
<product>junos:15.1x49</product>
<product>junos:15.1x49</product>
</cve>
<cve id="CVE-2016-1269" level="LOW">
<product>junos:12.1x44</product>
<product>junos:12.1x46</product>
<product>junos:12.1x46</product>
<product>junos:12.1x46</product>
<product>junos:12.1x46</product>
<product>junos:12.1x46</product>
<product>junos:12.1x46</product>
<product>junos:12.1x46</product>
<product>junos:12.1x47</product>
<product>junos:12.1x47</product>
<product>junos:12.1x47</product>
<product>junos:12.1x47</product>
<product>junos:12.1x47</product>
<product>junos:12.3</product>
<product>junos:12.3</product>
<product>junos:12.3</product>
<product>junos:12.3</product>
<product>junos:12.3</product>
<product>junos:12.3</product>
<product>junos:12.3</product>
<product>junos:12.3</product>
<product>junos:12.3</product>
<product>junos:12.3</product>
<product>junos:12.3</product>
<product>junos:12.3x48</product>
<product>junos:12.3x48</product>
<product>junos:13.2</product>
<product>junos:13.2</product>
<product>junos:13.2</product>
<product>junos:13.2</product>
<product>junos:13.2</product>
<product>junos:13.2</product>
<product>junos:13.2</product>
<product>junos:13.2</product>
<product>junos:13.2</product>
<product>junos:13.2</product>
<product>junos:13.2</product>
<product>junos:13.2x51</product>
<product>junos:13.2x51</product>
<product>junos:13.2x51</product>
<product>junos:13.2x51</product>
<product>junos:13.2x51</product>
<product>junos:13.2x51</product>
<product>junos:13.2x51</product>
<product>junos:13.3</product>
<product>junos:13.3</product>
<product>junos:13.3</product>
<product>junos:13.3</product>
<product>junos:13.3</product>
<product>junos:13.3</product>
<product>junos:13.3</product>
<product>junos:13.3</product>
<product>junos:13.3</product>
<product>junos:14.1</product>
<product>junos:14.1</product>
<product>junos:14.1</product>
<product>junos:14.1</product>
<product>junos:14.1</product>
<product>junos:14.1</product>
<product>junos:14.1x53</product>
<product>junos:14.1x53</product>
<product>junos:14.1x53</product>
<product>junos:14.1x53</product>
<product>junos:14.1x53</product>
<product>junos:14.1x53</product>
<product>junos:14.2</product>
<product>junos:14.2</product>
<product>junos:14.2</product>
<product>junos:14.2</product>
<product>junos:15.1</product>
<product>junos:15.1</product>
<product>junos:15.1</product>
</cve>
<cve id="CVE-2016-1268" level="LOW">
<product>screenos:6.3.0</product>
</cve>
<cve id="CVE-2016-9256" level="MEDIUM">
<product>big-ip_access_policy_manager:12.0.0</product>
<product>big-ip_access_policy_manager:12.1.0</product>
<product>big-ip_access_policy_manager:12.1.1</product>
<product>big-ip_access_policy_manager:12.1.2</product>
<product>big-ip_advanced_firewall_manager:12.0.0</product>
<product>big-ip_advanced_firewall_manager:12.1.0</product>
<product>big-ip_advanced_firewall_manager:12.1.1</product>
<product>big-ip_advanced_firewall_manager:12.1.2</product>
<product>big-ip_analytics:12.0.0</product>
<product>big-ip_analytics:12.1.0</product>
<product>big-ip_analytics:12.1.1</product>
<product>big-ip_analytics:12.1.2</product>
<product>big-ip_application_acceleration_manager:12.0.0</product>
<product>big-ip_application_acceleration_manager:12.1.0</product>
<product>big-ip_application_acceleration_manager:12.1.1</product>
<product>big-ip_application_acceleration_manager:12.1.2</product>
<product>big-ip_application_security_manager:12.0.0</product>
<product>big-ip_application_security_manager:12.1.0</product>
<product>big-ip_application_security_manager:12.1.1</product>
<product>big-ip_application_security_manager:12.1.2</product>
<product>big-ip_domain_name_system:12.0.0</product>
<product>big-ip_domain_name_system:12.1.0</product>
<product>big-ip_domain_name_system:12.1.1</product>
<product>big-ip_domain_name_system:12.1.2</product>
<product>big-ip_link_controller:12.0.0</product>
<product>big-ip_link_controller:12.1.0</product>
<product>big-ip_link_controller:12.1.1</product>
<product>big-ip_link_controller:12.1.2</product>
<product>big-ip_local_traffic_manager:12.0.0</product>
<product>big-ip_local_traffic_manager:12.1.0</product>
<product>big-ip_local_traffic_manager:12.1.1</product>
<product>big-ip_local_traffic_manager:12.1.2</product>
<product>big-ip_policy_enforcement_manager:12.0.0</product>
<product>big-ip_policy_enforcement_manager:12.1.0</product>
<product>big-ip_policy_enforcement_manager:12.1.1</product>
<product>big-ip_policy_enforcement_manager:12.1.2</product>
<product>big-ip_websafe:12.0.0</product>
<product>big-ip_websafe:12.1.0</product>
<product>big-ip_websafe:12.1.1</product>
<product>big-ip_websafe:12.1.2</product>
</cve>
<cve id="CVE-2016-9257" level="MEDIUM">
<product>big-ip_access_policy_manager:12.0.0</product>
<product>big-ip_access_policy_manager:12.1.0</product>
<product>big-ip_access_policy_manager:12.1.1</product>
<product>big-ip_access_policy_manager:12.1.2</product>
</cve>
<cve id="CVE-2016-9250" level="LOW">
<product>big-ip_access_policy_manager:11.2.1</product>
<product>big-ip_access_policy_manager:11.4.0</product>
<product>big-ip_access_policy_manager:11.4.1</product>
<product>big-ip_access_policy_manager:11.5.0</product>
<product>big-ip_access_policy_manager:11.5.1</product>
<product>big-ip_access_policy_manager:11.5.2</product>
<product>big-ip_access_policy_manager:11.5.3</product>
<product>big-ip_access_policy_manager:11.5.4</product>
<product>big-ip_access_policy_manager:11.6.0</product>
<product>big-ip_access_policy_manager:11.6.1</product>
<product>big-ip_access_policy_manager:12.0.0</product>
<product>big-ip_access_policy_manager:12.1.0</product>
<product>big-ip_access_policy_manager:12.1.1</product>
<product>big-ip_access_policy_manager:12.1.2</product>
<product>big-ip_advanced_firewall_manager:11.2.1</product>
<product>big-ip_advanced_firewall_manager:11.4.0</product>
<product>big-ip_advanced_firewall_manager:11.4.1</product>
<product>big-ip_advanced_firewall_manager:11.5.0</product>
<product>big-ip_advanced_firewall_manager:11.5.1</product>
<product>big-ip_advanced_firewall_manager:11.5.2</product>
<product>big-ip_advanced_firewall_manager:11.5.3</product>
<product>big-ip_advanced_firewall_manager:11.5.4</product>
<product>big-ip_advanced_firewall_manager:11.6.0</product>
<product>big-ip_advanced_firewall_manager:11.6.1</product>
<product>big-ip_advanced_firewall_manager:12.0.0</product>
<product>big-ip_advanced_firewall_manager:12.1.0</product>
<product>big-ip_advanced_firewall_manager:12.1.1</product>
<product>big-ip_advanced_firewall_manager:12.1.2</product>
<product>big-ip_analytics:11.2.1</product>
<product>big-ip_analytics:11.4.0</product>
<product>big-ip_analytics:11.4.1</product>
<product>big-ip_analytics:11.5.0</product>
<product>big-ip_analytics:11.5.1</product>
<product>big-ip_analytics:11.5.2</product>
<product>big-ip_analytics:11.5.3</product>
<product>big-ip_analytics:11.5.4</product>
<product>big-ip_analytics:11.6.0</product>
<product>big-ip_analytics:11.6.1</product>
<product>big-ip_analytics:12.0.0</product>
<product>big-ip_analytics:12.1.0</product>
<product>big-ip_analytics:12.1.1</product>
<product>big-ip_analytics:12.1.2</product>
<product>big-ip_application_acceleration_manager:11.4.0</product>
<product>big-ip_application_acceleration_manager:11.4.1</product>
<product>big-ip_application_acceleration_manager:11.5.0</product>
<product>big-ip_application_acceleration_manager:11.5.1</product>
<product>big-ip_application_acceleration_manager:11.5.2</product>
<product>big-ip_application_acceleration_manager:11.5.3</product>
<product>big-ip_application_acceleration_manager:11.5.4</product>
<product>big-ip_application_acceleration_manager:11.6.0</product>
<product>big-ip_application_acceleration_manager:11.6.1</product>
<product>big-ip_application_acceleration_manager:12.0.0</product>
<product>big-ip_application_acceleration_manager:12.1.0</product>
<product>big-ip_application_acceleration_manager:12.1.1</product>
<product>big-ip_application_acceleration_manager:12.1.2</product>
<product>big-ip_application_security_manager:11.2.1</product>
<product>big-ip_application_security_manager:11.4.0</product>
<product>big-ip_application_security_manager:11.4.1</product>
<product>big-ip_application_security_manager:11.5.0</product>
<product>big-ip_application_security_manager:11.5.1</product>
<product>big-ip_application_security_manager:11.5.2</product>
<product>big-ip_application_security_manager:11.5.3</product>
<product>big-ip_application_security_manager:11.5.4</product>
<product>big-ip_application_security_manager:11.6.0</product>
<product>big-ip_application_security_manager:11.6.1</product>
<product>big-ip_application_security_manager:12.0.0</product>
<product>big-ip_application_security_manager:12.1.0</product>
<product>big-ip_application_security_manager:12.1.1</product>
<product>big-ip_application_security_manager:12.1.2</product>
<product>big-ip_domain_name_system:12.0.0</product>
<product>big-ip_domain_name_system:12.1.0</product>
<product>big-ip_domain_name_system:12.1.1</product>
<product>big-ip_domain_name_system:12.1.2</product>
<product>big-ip_edge_gateway:11.2.1</product>
<product>big-ip_global_traffic_manager:11.2.1</product>
<product>big-ip_global_traffic_manager:11.4.0</product>
<product>big-ip_global_traffic_manager:11.4.1</product>
<product>big-ip_global_traffic_manager:11.5.0</product>
<product>big-ip_global_traffic_manager:11.5.1</product>
<product>big-ip_global_traffic_manager:11.5.2</product>
<product>big-ip_global_traffic_manager:11.5.3</product>
<product>big-ip_global_traffic_manager:11.5.4</product>
<product>big-ip_global_traffic_manager:11.6.0</product>
<product>big-ip_global_traffic_manager:11.6.1</product>
<product>big-ip_link_controller:11.2.1</product>
<product>big-ip_link_controller:11.4.0</product>
<product>big-ip_link_controller:11.4.1</product>
<product>big-ip_link_controller:11.5.0</product>
<product>big-ip_link_controller:11.5.1</product>
<product>big-ip_link_controller:11.5.2</product>
<product>big-ip_link_controller:11.5.3</product>
<product>big-ip_link_controller:11.5.4</product>
<product>big-ip_link_controller:11.6.0</product>
<product>big-ip_link_controller:11.6.1</product>
<product>big-ip_link_controller:12.0.0</product>
<product>big-ip_link_controller:12.1.0</product>
<product>big-ip_link_controller:12.1.1</product>
<product>big-ip_link_controller:12.1.2</product>
<product>big-ip_local_traffic_manager:11.2.1</product>
<product>big-ip_local_traffic_manager:11.4.0</product>
<product>big-ip_local_traffic_manager:11.4.1</product>
<product>big-ip_local_traffic_manager:11.5.0</product>
<product>big-ip_local_traffic_manager:11.5.1</product>
<product>big-ip_local_traffic_manager:11.5.2</product>
<product>big-ip_local_traffic_manager:11.5.3</product>
<product>big-ip_local_traffic_manager:11.5.4</product>
<product>big-ip_local_traffic_manager:11.6.0</product>
<product>big-ip_local_traffic_manager:11.6.1</product>
<product>big-ip_local_traffic_manager:12.0.0</product>
<product>big-ip_local_traffic_manager:12.1.0</product>
<product>big-ip_local_traffic_manager:12.1.1</product>
<product>big-ip_local_traffic_manager:12.1.2</product>
<product>big-ip_policy_enforcement_manager:11.4.0</product>
<product>big-ip_policy_enforcement_manager:11.4.1</product>
<product>big-ip_policy_enforcement_manager:11.5.0</product>
<product>big-ip_policy_enforcement_manager:11.5.1</product>
<product>big-ip_policy_enforcement_manager:11.5.2</product>
<product>big-ip_policy_enforcement_manager:11.5.3</product>
<product>big-ip_policy_enforcement_manager:11.5.4</product>
<product>big-ip_policy_enforcement_manager:11.6.0</product>
<product>big-ip_policy_enforcement_manager:11.6.1</product>
<product>big-ip_policy_enforcement_manager:12.0.0</product>
<product>big-ip_policy_enforcement_manager:12.1.0</product>
<product>big-ip_policy_enforcement_manager:12.1.1</product>
<product>big-ip_policy_enforcement_manager:12.1.2</product>
<product>big-ip_webaccelerator:11.2.1</product>
<product>big-ip_websafe:11.6.0</product>
<product>big-ip_websafe:11.6.1</product>
<product>big-ip_websafe:12.0.0</product>
<product>big-ip_websafe:12.1.0</product>
<product>big-ip_websafe:12.1.1</product>
<product>big-ip_websafe:12.1.2</product>
<product>big-ip_protocol_security_manager:11.4.0</product>
<product>big-ip_protocol_security_manager:11.4.1</product>
</cve>
<cve id="CVE-2016-9251" level="LOW">
<product>big-ip_access_policy_manager:12.0.0</product>
<product>big-ip_access_policy_manager:12.1.0</product>
<product>big-ip_access_policy_manager:12.1.1</product>
<product>big-ip_access_policy_manager:12.1.2</product>
<product>big-ip_advanced_firewall_manager:12.0.0</product>
<product>big-ip_advanced_firewall_manager:12.1.0</product>
<product>big-ip_advanced_firewall_manager:12.1.1</product>
<product>big-ip_advanced_firewall_manager:12.1.2</product>
<product>big-ip_analytics:12.0.0</product>
<product>big-ip_analytics:12.1.0</product>
<product>big-ip_analytics:12.1.1</product>
<product>big-ip_analytics:12.1.2</product>
<product>big-ip_application_acceleration_manager:12.0.0</product>
<product>big-ip_application_acceleration_manager:12.1.0</product>
<product>big-ip_application_acceleration_manager:12.1.1</product>
<product>big-ip_application_acceleration_manager:12.1.2</product>
<product>big-ip_application_security_manager:12.0.0</product>
<product>big-ip_application_security_manager:12.1.0</product>
<product>big-ip_application_security_manager:12.1.1</product>
<product>big-ip_application_security_manager:12.1.2</product>
<product>big-ip_domain_name_system:12.0.0</product>
<product>big-ip_domain_name_system:12.1.0</product>
<product>big-ip_domain_name_system:12.1.1</product>
<product>big-ip_domain_name_system:12.1.2</product>
<product>big-ip_link_controller:12.0.0</product>
<product>big-ip_link_controller:12.1.0</product>
<product>big-ip_link_controller:12.1.1</product>
<product>big-ip_link_controller:12.1.2</product>
<product>big-ip_local_traffic_manager:12.0.0</product>
<product>big-ip_local_traffic_manager:12.1.0</product>
<product>big-ip_local_traffic_manager:12.1.1</product>
<product>big-ip_local_traffic_manager:12.1.2</product>
<product>big-ip_policy_enforcement_manager:12.0.0</product>
<product>big-ip_policy_enforcement_manager:12.1.0</product>
<product>big-ip_policy_enforcement_manager:12.1.1</product>
<product>big-ip_policy_enforcement_manager:12.1.2</product>
<product>big-ip_websafe:12.0.0</product>
<product>big-ip_websafe:12.1.0</product>
<product>big-ip_websafe:12.1.1</product>
<product>big-ip_websafe:12.1.2</product>
</cve>
<cve id="CVE-2016-9252" level="LOW">
<product>big-ip_access_policy_manager:10.2.1</product>
<product>big-ip_access_policy_manager:10.2.2</product>
<product>big-ip_access_policy_manager:10.2.3</product>
<product>big-ip_access_policy_manager:10.2.4</product>
<product>big-ip_access_policy_manager:11.2.1</product>
<product>big-ip_access_policy_manager:11.4.0</product>
<product>big-ip_access_policy_manager:11.4.1</product>
<product>big-ip_access_policy_manager:11.5.0</product>
<product>big-ip_access_policy_manager:11.5.1</product>
<product>big-ip_access_policy_manager:11.5.2</product>
<product>big-ip_access_policy_manager:11.5.3</product>
<product>big-ip_access_policy_manager:11.5.4</product>
<product>big-ip_access_policy_manager:11.6.0</product>
<product>big-ip_access_policy_manager:11.6.1</product>
<product>big-ip_access_policy_manager:12.0.0</product>
<product>big-ip_access_policy_manager:12.1.0</product>
<product>big-ip_access_policy_manager:12.1.1</product>
<product>big-ip_advanced_firewall_manager:11.4.0</product>
<product>big-ip_advanced_firewall_manager:11.4.1</product>
<product>big-ip_advanced_firewall_manager:11.5.0</product>
<product>big-ip_advanced_firewall_manager:11.5.1</product>
<product>big-ip_advanced_firewall_manager:11.5.2</product>
<product>big-ip_advanced_firewall_manager:11.5.3</product>
<product>big-ip_advanced_firewall_manager:11.5.4</product>
<product>big-ip_advanced_firewall_manager:11.6.0</product>
<product>big-ip_advanced_firewall_manager:11.6.1</product>
<product>big-ip_advanced_firewall_manager:12.0.0</product>
<product>big-ip_advanced_firewall_manager:12.1.0</product>
<product>big-ip_advanced_firewall_manager:12.1.1</product>
<product>big-ip_analytics:11.2.1</product>
<product>big-ip_analytics:11.4.0</product>
<product>big-ip_analytics:11.4.1</product>
<product>big-ip_analytics:11.5.0</product>
<product>big-ip_analytics:11.5.1</product>
<product>big-ip_analytics:11.5.2</product>
<product>big-ip_analytics:11.5.3</product>
<product>big-ip_analytics:11.5.4</product>
<product>big-ip_analytics:11.6.0</product>
<product>big-ip_analytics:11.6.1</product>
<product>big-ip_analytics:12.0.0</product>
<product>big-ip_analytics:12.1.0</product>
<product>big-ip_analytics:12.1.1</product>
<product>big-ip_application_acceleration_manager:11.4.0</product>
<product>big-ip_application_acceleration_manager:11.4.1</product>
<product>big-ip_application_acceleration_manager:11.5.0</product>
<product>big-ip_application_acceleration_manager:11.5.1</product>
<product>big-ip_application_acceleration_manager:11.5.2</product>
<product>big-ip_application_acceleration_manager:11.5.3</product>
<product>big-ip_application_acceleration_manager:11.5.4</product>
<product>big-ip_application_acceleration_manager:11.6.0</product>
<product>big-ip_application_acceleration_manager:11.6.1</product>
<product>big-ip_application_acceleration_manager:12.0.0</product>
<product>big-ip_application_acceleration_manager:12.1.0</product>
<product>big-ip_application_acceleration_manager:12.1.1</product>
<product>big-ip_application_security_manager:10.2.1</product>
<product>big-ip_application_security_manager:10.2.2</product>
<product>big-ip_application_security_manager:10.2.3</product>
<product>big-ip_application_security_manager:10.2.4</product>
<product>big-ip_application_security_manager:11.2.1</product>
<product>big-ip_application_security_manager:11.4.0</product>
<product>big-ip_application_security_manager:11.4.1</product>
<product>big-ip_application_security_manager:11.5.0</product>
<product>big-ip_application_security_manager:11.5.1</product>
<product>big-ip_application_security_manager:11.5.2</product>
<product>big-ip_application_security_manager:11.5.3</product>
<product>big-ip_application_security_manager:11.5.4</product>
<product>big-ip_application_security_manager:11.6.0</product>
<product>big-ip_application_security_manager:11.6.1</product>
<product>big-ip_application_security_manager:12.0.0</product>
<product>big-ip_application_security_manager:12.1.0</product>
<product>big-ip_application_security_manager:12.1.1</product>
<product>big-ip_domain_name_system:12.0.0</product>
<product>big-ip_domain_name_system:12.1.0</product>
<product>big-ip_domain_name_system:12.1.1</product>
<product>big-ip_edge_gateway:10.2.1</product>
<product>big-ip_edge_gateway:10.2.2</product>
<product>big-ip_edge_gateway:10.2.3</product>
<product>big-ip_edge_gateway:10.2.4</product>
<product>big-ip_edge_gateway:11.2.1</product>
<product>big-ip_global_traffic_manager:10.2.1</product>
<product>big-ip_global_traffic_manager:10.2.2</product>
<product>big-ip_global_traffic_manager:10.2.3</product>
<product>big-ip_global_traffic_manager:10.2.4</product>
<product>big-ip_global_traffic_manager:11.2.1</product>
<product>big-ip_global_traffic_manager:11.4.0</product>
<product>big-ip_global_traffic_manager:11.4.1</product>
<product>big-ip_global_traffic_manager:11.5.0</product>
<product>big-ip_global_traffic_manager:11.5.1</product>
<product>big-ip_global_traffic_manager:11.5.2</product>
<product>big-ip_global_traffic_manager:11.5.3</product>
<product>big-ip_global_traffic_manager:11.5.4</product>
<product>big-ip_global_traffic_manager:11.6.0</product>
<product>big-ip_global_traffic_manager:11.6.1</product>
<product>big-ip_link_controller:10.2.1</product>
<product>big-ip_link_controller:10.2.2</product>
<product>big-ip_link_controller:10.2.3</product>
<product>big-ip_link_controller:10.2.4</product>
<product>big-ip_link_controller:11.2.1</product>
<product>big-ip_link_controller:11.4.0</product>
<product>big-ip_link_controller:11.4.1</product>
<product>big-ip_link_controller:11.5.0</product>
<product>big-ip_link_controller:11.5.1</product>
<product>big-ip_link_controller:11.5.2</product>
<product>big-ip_link_controller:11.5.3</product>
<product>big-ip_link_controller:11.5.4</product>
<product>big-ip_link_controller:11.6.0</product>
<product>big-ip_link_controller:11.6.1</product>
<product>big-ip_link_controller:12.0.0</product>
<product>big-ip_link_controller:12.1.0</product>
<product>big-ip_link_controller:12.1.1</product>
<product>big-ip_local_traffic_manager:10.2.1</product>
<product>big-ip_local_traffic_manager:10.2.2</product>
<product>big-ip_local_traffic_manager:10.2.3</product>
<product>big-ip_local_traffic_manager:10.2.4</product>
<product>big-ip_local_traffic_manager:11.2.1</product>
<product>big-ip_local_traffic_manager:11.4.0</product>
<product>big-ip_local_traffic_manager:11.4.1</product>
<product>big-ip_local_traffic_manager:11.5.0</product>
<product>big-ip_local_traffic_manager:11.5.1</product>
<product>big-ip_local_traffic_manager:11.5.2</product>
<product>big-ip_local_traffic_manager:11.5.3</product>
<product>big-ip_local_traffic_manager:11.5.4</product>
<product>big-ip_local_traffic_manager:11.6.0</product>
<product>big-ip_local_traffic_manager:11.6.1</product>
<product>big-ip_local_traffic_manager:12.0.0</product>
<product>big-ip_local_traffic_manager:12.1.0</product>
<product>big-ip_local_traffic_manager:12.1.1</product>
<product>big-ip_policy_enforcement_manager:11.4.0</product>
<product>big-ip_policy_enforcement_manager:11.4.1</product>
<product>big-ip_policy_enforcement_manager:11.5.0</product>
<product>big-ip_policy_enforcement_manager:11.5.1</product>
<product>big-ip_policy_enforcement_manager:11.5.2</product>
<product>big-ip_policy_enforcement_manager:11.5.3</product>
<product>big-ip_policy_enforcement_manager:11.5.4</product>
<product>big-ip_policy_enforcement_manager:11.6.0</product>
<product>big-ip_policy_enforcement_manager:11.6.1</product>
<product>big-ip_policy_enforcement_manager:12.0.0</product>
<product>big-ip_policy_enforcement_manager:12.1.0</product>
<product>big-ip_policy_enforcement_manager:12.1.1</product>
<product>big-ip_webaccelerator:10.2.1</product>
<product>big-ip_webaccelerator:10.2.2</product>
<product>big-ip_webaccelerator:10.2.3</product>
<product>big-ip_webaccelerator:10.2.4</product>
<product>big-ip_webaccelerator:11.2.1</product>
<product>big-ip_websafe:11.6.0</product>
<product>big-ip_websafe:11.6.1</product>
<product>big-ip_websafe:12.0.0</product>
<product>big-ip_websafe:12.1.0</product>
<product>big-ip_websafe:12.1.1</product>
<product>big-ip_protocol_security_manager:10.2.1</product>
<product>big-ip_protocol_security_manager:10.2.2</product>
<product>big-ip_protocol_security_manager:10.2.3</product>
<product>big-ip_protocol_security_manager:10.2.4</product>
<product>big-ip_protocol_security_manager:11.2.1</product>
<product>big-ip_protocol_security_manager:11.4.0</product>
<product>big-ip_protocol_security_manager:11.4.1</product>
</cve>
<cve id="CVE-2016-9253" level="LOW">
<product>big-ip_access_policy_manager:12.1.0</product>
<product>big-ip_access_policy_manager:12.1.1</product>
<product>big-ip_access_policy_manager:12.1.2</product>
<product>big-ip_advanced_firewall_manager:12.1.0</product>
<product>big-ip_advanced_firewall_manager:12.1.1</product>
<product>big-ip_advanced_firewall_manager:12.1.2</product>
<product>big-ip_analytics:12.1.0</product>
<product>big-ip_analytics:12.1.1</product>
<product>big-ip_analytics:12.1.2</product>
<product>big-ip_application_acceleration_manager:12.1.0</product>
<product>big-ip_application_acceleration_manager:12.1.1</product>
<product>big-ip_application_acceleration_manager:12.1.2</product>
<product>big-ip_application_security_manager:12.1.0</product>
<product>big-ip_application_security_manager:12.1.1</product>
<product>big-ip_application_security_manager:12.1.2</product>
<product>big-ip_domain_name_system:12.1.0</product>
<product>big-ip_domain_name_system:12.1.1</product>
<product>big-ip_domain_name_system:12.1.2</product>
<product>big-ip_link_controller:12.1.0</product>
<product>big-ip_link_controller:12.1.1</product>
<product>big-ip_link_controller:12.1.2</product>
<product>big-ip_local_traffic_manager:12.1.0</product>
<product>big-ip_local_traffic_manager:12.1.1</product>
<product>big-ip_local_traffic_manager:12.1.2</product>
<product>big-ip_policy_enforcement_manager:12.1.0</product>
<product>big-ip_policy_enforcement_manager:12.1.1</product>
<product>big-ip_policy_enforcement_manager:12.1.2</product>
<product>big-ip_websafe:12.1.0</product>
<product>big-ip_websafe:12.1.1</product>
<product>big-ip_websafe:12.1.2</product>
</cve>
<cve id="CVE-2016-9259" level="MEDIUM">
<product>nessus:6.8</product>
<product>nessus:6.8.1</product>
<product>nessus:6.8.2</product>
<product>nessus:6.9</product>
</cve>
<cve id="CVE-2016-1401" level="MEDIUM">
<product>unified_computing_system_central_software:1.4%281a%29</product>
</cve>
<cve id="CVE-2016-1400" level="LOW">
<product>telepresence_video_communication_server:x8.1.1</product>
<product>telepresence_video_communication_server:x8.1.2</product>
<product>telepresence_video_communication_server:x8.1_base</product>
<product>telepresence_video_communication_server:x8.2.1</product>
<product>telepresence_video_communication_server:x8.2.2</product>
<product>telepresence_video_communication_server:x8.2_base</product>
<product>telepresence_video_communication_server:x8.5</product>
<product>telepresence_video_communication_server:x8.5.0</product>
<product>telepresence_video_communication_server:x8.5.1</product>
<product>telepresence_video_communication_server:x8.5.2</product>
<product>telepresence_video_communication_server:x8.5.3</product>
<product>telepresence_video_communication_server:x8.6.0</product>
<product>telepresence_video_communication_server:x8.6.1</product>
</cve>
<cve id="CVE-2016-1403" level="LOW">
<product>ip_phone_8800_series_firmware:10.2%281%29</product>
<product>ip_phone_8800_series_firmware:10.2%282%29</product>
<product>ip_phone_8800_series_firmware:10.3</product>
<product>ip_phone_8800_series_firmware:10.3%282%29</product>
<product>ip_phone_8800_series_firmware:11.0%281%29</product>
</cve>
<cve id="CVE-2016-1402" level="LOW">
<product>identity_services_engine_software:1.2.0.899</product>
<product>identity_services_engine_software:1.2.0.899</product>
<product>identity_services_engine_software:1.2.0.899</product>
<product>identity_services_engine_software:1.2.0.899</product>
<product>identity_services_engine_software:1.2.0.899</product>
<product>identity_services_engine_software:1.2.0.899</product>
</cve>
<cve id="CVE-2016-1405" level="LOW">
<product>email_security_appliance:9.6.0-042</product>
<product>web_security_appliance:8.8.0-085</product>
<product>web_security_appliance:9.1.0-070</product>
<product>web_security_appliance:9.5.0-284</product>
<product>clamav</product>
</cve>
<cve id="CVE-2016-1404" level="LOW">
<product>ucs_invicta_c3124sa_appliance:4.3.1</product>
<product>ucs_invicta_c3124sa_appliance:4.3_base</product>
<product>ucs_invicta_c3124sa_appliance:4.5.0</product>
<product>ucs_invicta_c3124sa_appliance:4.5_base</product>
<product>ucs_invicta_c3124sa_appliance:5.0.1</product>
<product>ucs_invicta_c3124sa_appliance:5.0_base</product>
</cve>
<cve id="CVE-2016-4167" level="LOW">
<product>dng_software_development_kit:1.4.2012</product>
</cve>
<cve id="CVE-2016-1406" level="LOW">
<product>evolved_programmable_network_manager:1.2.0</product>
<product>evolved_programmable_network_manager:1.2.1.3</product>
<product>evolved_programmable_network_manager:1.2.200</product>
<product>evolved_programmable_network_manager:1.2.300</product>
<product>prime_infrastructure:1.2.0</product>
<product>prime_infrastructure:1.2.0.103</product>
<product>prime_infrastructure:1.2.1</product>
<product>prime_infrastructure:1.3.0</product>
<product>prime_infrastructure:1.3.0.20</product>
<product>prime_infrastructure:1.4.0</product>
<product>prime_infrastructure:1.4.0.45</product>
<product>prime_infrastructure:1.4.1</product>
<product>prime_infrastructure:1.4.2</product>
<product>prime_infrastructure:2.0.0</product>
<product>prime_infrastructure:2.1.0</product>
<product>prime_infrastructure:2.2%282%29</product>
<product>prime_infrastructure:2.2.0</product>
<product>prime_infrastructure:3.0.0</product>
<product>prime_infrastructure:3.0_base</product>
</cve>
<cve id="CVE-2016-4169" level="LOW">
<product>experience_manager:6.0.0</product>
<product>experience_manager:6.1.0</product>
<product>experience_manager:6.2.0</product>
</cve>
<cve id="CVE-2016-1408" level="LOW">
<product>evolved_programmable_network_manager:1.2.0</product>
<product>evolved_programmable_network_manager:1.2.1.3</product>
<product>evolved_programmable_network_manager:1.2.200</product>
<product>evolved_programmable_network_manager:1.2.300</product>
<product>evolved_programmable_network_manager:1.2.400</product>
<product>evolved_programmable_network_manager:1.2.500</product>
<product>prime_infrastructure:1.2.0</product>
<product>prime_infrastructure:1.2.0.103</product>
<product>prime_infrastructure:1.2.1</product>
<product>prime_infrastructure:1.3.0</product>
<product>prime_infrastructure:1.3.0.20</product>
<product>prime_infrastructure:1.4.0</product>
<product>prime_infrastructure:1.4.0.45</product>
<product>prime_infrastructure:1.4.1</product>
<product>prime_infrastructure:1.4.2</product>
<product>prime_infrastructure:2.0.0</product>
<product>prime_infrastructure:2.1.0</product>
<product>prime_infrastructure:2.2%282%29</product>
<product>prime_infrastructure:2.2.0</product>
<product>prime_infrastructure:3.0.0</product>
<product>prime_infrastructure:3.0_base</product>
<product>prime_infrastructure:3.1.0</product>
<product>prime_infrastructure:3.1_base</product>
</cve>
<cve id="CVE-2016-6500" level="MEDIUM">
<product>racf_connector:1.1.0.0</product>
</cve>
<cve id="CVE-2016-3028" level="LOW">
<product>security_access_manager:9.0.0</product>
<product>security_access_manager:9.0.0.1</product>
<product>security_access_manager:9.0.1.0</product>
<product>security_access_manager_for_web:7.0.0</product>
<product>security_access_manager_for_web:8.0.0</product>
<product>security_access_manager_for_web:8.0.0.2</product>
<product>security_access_manager_for_web:8.0.0.4</product>
<product>security_access_manager_for_web:8.0.0.5</product>
<product>security_access_manager_for_web:8.0.1</product>
<product>security_access_manager_for_web:8.0.1.2</product>
<product>security_access_manager_for_web:8.0.1.3</product>
<product>security_access_manager_for_web:8.0.1.4</product>
</cve>
<cve id="CVE-2016-5562" level="MEDIUM">
<product>iprocurement:12.1.1</product>
<product>iprocurement:12.1.2</product>
<product>iprocurement:12.1.3</product>
<product>iprocurement:12.2.3</product>
<product>iprocurement:12.2.4</product>
<product>iprocurement:12.2.5</product>
<product>iprocurement:12.2.6</product>
</cve>
<cve id="CVE-2016-5563" level="MEDIUM">
<product>hospitality_opera_5_property_services:5.4.0.0</product>
<product>hospitality_opera_5_property_services:5.4.1.0</product>
<product>hospitality_opera_5_property_services:5.4.2.0</product>
<product>hospitality_opera_5_property_services:5.4.3.0</product>
<product>hospitality_opera_5_property_services:5.5.0.0</product>
<product>hospitality_opera_5_property_services:5.5.1.0</product>
</cve>
<cve id="CVE-2016-5560" level="LOW">
<product>siebel_customer_order_management:16.1</product>
</cve>
<cve id="CVE-2016-5567" level="LOW">
<product>applications_dba:12.1.3</product>
<product>applications_dba:12.2.3</product>
<product>applications_dba:12.2.4</product>
<product>applications_dba:12.2.5</product>
<product>applications_dba:12.2.6</product>
</cve>
<cve id="CVE-2016-5564" level="LOW">
<product>hospitality_opera_5_property_services:5.4.0.0</product>
<product>hospitality_opera_5_property_services:5.4.1.0</product>
<product>hospitality_opera_5_property_services:5.4.2.0</product>
<product>hospitality_opera_5_property_services:5.4.3.0</product>
<product>hospitality_opera_5_property_services:5.5.0.0</product>
<product>hospitality_opera_5_property_services:5.5.1.0</product>
</cve>
<cve id="CVE-2016-5565" level="LOW">
<product>hospitality_opera_5_property_services:5.4.0.0</product>
<product>hospitality_opera_5_property_services:5.4.1.0</product>
<product>hospitality_opera_5_property_services:5.4.2.0</product>
<product>hospitality_opera_5_property_services:5.4.3.0</product>
<product>hospitality_opera_5_property_services:5.5.0.0</product>
<product>hospitality_opera_5_property_services:5.5.1.0</product>
</cve>
<cve id="CVE-2016-5568" level="MEDIUM">
<product>jdk:1.6.0</product>
<product>jdk:1.7.0</product>
<product>jdk:1.8.0</product>
<product>jre:1.6.0</product>
<product>jre:1.7.0</product>
<product>jre:1.8.0</product>
</cve>
<cve id="CVE-2016-5569" level="LOW">
<product>flexcube_enterprise_limits_and_collateral_management:12.0.0</product>
<product>flexcube_enterprise_limits_and_collateral_management:12.1.0</product>
</cve>
<cve id="CVE-2016-3474" level="MEDIUM">
<product>business_intelligence_publisher:11.1.1.7.0</product>
<product>business_intelligence_publisher:11.1.1.9.0</product>
<product>business_intelligence_publisher:12.2.1.0.0</product>
</cve>
<cve id="CVE-2016-2039" level="LOW">
<product>phpmyadmin:4.0.0</product>
<product>phpmyadmin:4.0.0</product>
<product>phpmyadmin:4.0.0</product>
<product>phpmyadmin:4.0.1</product>
<product>phpmyadmin:4.0.10</product>
<product>phpmyadmin:4.0.10.1</product>
<product>phpmyadmin:4.0.10.2</product>
<product>phpmyadmin:4.0.10.3</product>
<product>phpmyadmin:4.0.10.4</product>
<product>phpmyadmin:4.0.10.5</product>
<product>phpmyadmin:4.0.10.6</product>
<product>phpmyadmin:4.0.10.7</product>
<product>phpmyadmin:4.0.10.8</product>
<product>phpmyadmin:4.0.10.9</product>
<product>phpmyadmin:4.0.10.10</product>
<product>phpmyadmin:4.0.10.11</product>
<product>phpmyadmin:4.0.10.12</product>
<product>phpmyadmin:4.4.0</product>
<product>phpmyadmin:4.4.1</product>
<product>phpmyadmin:4.4.1.1</product>
<product>phpmyadmin:4.4.2</product>
<product>phpmyadmin:4.4.3</product>
<product>phpmyadmin:4.4.4</product>
<product>phpmyadmin:4.4.5</product>
<product>phpmyadmin:4.4.6</product>
<product>phpmyadmin:4.4.6.1</product>
<product>phpmyadmin:4.4.7</product>
<product>phpmyadmin:4.4.8</product>
<product>phpmyadmin:4.4.9</product>
<product>phpmyadmin:4.4.10</product>
<product>phpmyadmin:4.4.11</product>
<product>phpmyadmin:4.4.12</product>
<product>phpmyadmin:4.4.13</product>
<product>phpmyadmin:4.4.13.1</product>
<product>phpmyadmin:4.4.14.1</product>
<product>phpmyadmin:4.4.15</product>
<product>phpmyadmin:4.4.15.1</product>
<product>phpmyadmin:4.4.15.2</product>
<product>phpmyadmin:4.4.15.3</product>
<product>phpmyadmin:4.5.0</product>
<product>phpmyadmin:4.5.0.1</product>
<product>phpmyadmin:4.5.0.2</product>
<product>phpmyadmin:4.5.1</product>
<product>phpmyadmin:4.5.2</product>
<product>phpmyadmin:4.5.3</product>
<product>fedora:23</product>
<product>fedora:24</product>
<product>leap:42.1</product>
<product>opensuse:13.1</product>
<product>opensuse:13.2</product>
</cve>
<cve id="CVE-2016-2038" level="LOW">
<product>phpmyadmin:4.0.0</product>
<product>phpmyadmin:4.0.0</product>
<product>phpmyadmin:4.0.0</product>
<product>phpmyadmin:4.0.1</product>
<product>phpmyadmin:4.0.10</product>
<product>phpmyadmin:4.0.10.1</product>
<product>phpmyadmin:4.0.10.2</product>
<product>phpmyadmin:4.0.10.3</product>
<product>phpmyadmin:4.0.10.4</product>
<product>phpmyadmin:4.0.10.5</product>
<product>phpmyadmin:4.0.10.6</product>
<product>phpmyadmin:4.0.10.7</product>
<product>phpmyadmin:4.0.10.8</product>
<product>phpmyadmin:4.0.10.9</product>
<product>phpmyadmin:4.0.10.10</product>
<product>phpmyadmin:4.0.10.11</product>
<product>phpmyadmin:4.0.10.12</product>
<product>phpmyadmin:4.4.0</product>
<product>phpmyadmin:4.4.1</product>
<product>phpmyadmin:4.4.1.1</product>
<product>phpmyadmin:4.4.2</product>
<product>phpmyadmin:4.4.3</product>
<product>phpmyadmin:4.4.4</product>
<product>phpmyadmin:4.4.5</product>
<product>phpmyadmin:4.4.6</product>
<product>phpmyadmin:4.4.6.1</product>
<product>phpmyadmin:4.4.7</product>
<product>phpmyadmin:4.4.8</product>
<product>phpmyadmin:4.4.9</product>
<product>phpmyadmin:4.4.10</product>
<product>phpmyadmin:4.4.11</product>
<product>phpmyadmin:4.4.12</product>
<product>phpmyadmin:4.4.13</product>
<product>phpmyadmin:4.4.13.1</product>
<product>phpmyadmin:4.4.14.1</product>
<product>phpmyadmin:4.4.15</product>
<product>phpmyadmin:4.4.15.1</product>
<product>phpmyadmin:4.4.15.2</product>
<product>phpmyadmin:4.4.15.3</product>
<product>phpmyadmin:4.5.0</product>
<product>phpmyadmin:4.5.0.1</product>
<product>phpmyadmin:4.5.0.2</product>
<product>phpmyadmin:4.5.1</product>
<product>phpmyadmin:4.5.2</product>
<product>phpmyadmin:4.5.3</product>
<product>fedora:22</product>
<product>fedora:23</product>
<product>leap:42.1</product>
<product>opensuse:13.1</product>
<product>opensuse:13.2</product>
</cve>
<cve id="CVE-2016-2034" level="LOW">
<product>clearpass:6.5.0</product>
<product>clearpass:6.5.1</product>
<product>clearpass:6.5.2</product>
<product>clearpass:6.5.3</product>
<product>clearpass:6.5.4</product>
<product>clearpass:6.5.5</product>
<product>clearpass:6.5.6</product>
<product>clearpass:6.6.0</product>
</cve>
<cve id="CVE-2016-2036" level="LOW">
<product>galaxy_note_3_firmware:n9005xxugbob6</product>
<product>galaxy_s6_firmware:g920fxxu2coh2</product>
</cve>
<cve id="CVE-2016-2030" level="LOW">
<product>matrix_operating_environment:7.5</product>
<product>systems_insight_manager:7.5</product>
</cve>
<cve id="CVE-2016-6866" level="LOW">
<product>slock:1.3</product>
<product>fedora:24</product>
<product>fedora:25</product>
</cve>
<cve id="CVE-2016-7278" level="HIGH">
<product>internet_explorer:9</product>
<product>internet_explorer:10</product>
<product>internet_explorer:11</product>
</cve>
<cve id="CVE-2016-5966" level="MEDIUM">
<product>security_privileged_identity_manager:2.0.2</product>
<product>security_privileged_identity_manager:2.1</product>
</cve>
<cve id="CVE-2016-3638" level="LOW">
<product>sld_registration:-</product>
</cve>
<cve id="CVE-2016-3639" level="LOW">
<product>hana_db:1.00.091.00.1418659308</product>
</cve>
<cve id="CVE-2016-3634" level="LOW">
<product>libtiff:4.0.6</product>
</cve>
<cve id="CVE-2016-3635" level="MEDIUM">
<product>netweaver:7.40</product>
</cve>
<cve id="CVE-2016-3631" level="LOW">
<product>libtiff:4.0.6</product>
</cve>
<cve id="CVE-2016-3632" level="MEDIUM">
<product>libtiff:4.0.6</product>
<product>vm_server:3.3</product>
<product>vm_server:3.4</product>
</cve>
<cve id="CVE-2016-3633" level="LOW">
<product>libtiff:4.0.6</product>
</cve>
<cve id="CVE-2016-3322" level="HIGH">
<product>edge</product>
<product>internet_explorer:11</product>
</cve>
<cve id="CVE-2016-3321" level="MEDIUM">
<product>internet_explorer:10</product>
<product>internet_explorer:11</product>
</cve>
<cve id="CVE-2016-3326" level="HIGH">
<product>edge</product>
<product>internet_explorer:9</product>
<product>internet_explorer:10</product>
<product>internet_explorer:11</product>
</cve>
<cve id="CVE-2016-3327" level="HIGH">
<product>edge</product>
<product>internet_explorer:9</product>
<product>internet_explorer:10</product>
<product>internet_explorer:11</product>
</cve>
<cve id="CVE-2016-3324" level="MEDIUM">
<product>internet_explorer:9</product>
<product>internet_explorer:10</product>
<product>internet_explorer:11</product>
</cve>
<cve id="CVE-2016-3325" level="HIGH">
<product>edge:-</product>
<product>internet_explorer:11</product>
</cve>
<cve id="CVE-2016-3329" level="HIGH">
<product>edge:-</product>
<product>internet_explorer:9</product>
<product>internet_explorer:10</product>
<product>internet_explorer:11</product>
</cve>
<cve id="CVE-2016-5963" level="LOW">
<product>security_privileged_identity_manager_virtual_appliance:2.0</product>
</cve>
<cve id="CVE-2016-7866" level="LOW">
<product>animate:15.2.1.95</product>
</cve>
<cve id="CVE-2016-0679" level="LOW">
<product>peoplesoft_enterprise_peopletools:8</product>
<product>peoplesoft_enterprise_peopletools:8.53</product>
<product>peoplesoft_enterprise_peopletools:8.55</product>
<product>peoplesoft_enterprise_peopletools:54</product>
</cve>
<cve id="CVE-2016-0678" level="MEDIUM">
<product>vm_virtualbox:5.0.18</product>
</cve>
<cve id="CVE-2016-7809" level="MEDIUM">
<product>cg-wlr300nx_firmware:1.20</product>
</cve>
<cve id="CVE-2016-7808" level="MEDIUM">
<product>cg-wlbaragm_firmware:-</product>
<product>cg-wlbargnl_firmware:-</product>
</cve>
<cve id="CVE-2016-7807" level="LOW">
<product>wfs-sr01_firmware:1.10</product>
</cve>
<cve id="CVE-2016-7806" level="LOW">
<product>wfs-sr01_firmware:1.10</product>
</cve>
<cve id="CVE-2016-7805" level="MEDIUM">
<product>mobigate:2.2.1.2</product>
<product>mobigate:2.2.4.1</product>
</cve>
<cve id="CVE-2016-7804" level="MEDIUM">
<product>7-zip:16.02</product>
</cve>
<cve id="CVE-2016-7803" level="LOW">
<product>garoon:3.0.0</product>
<product>garoon:3.0.1</product>
<product>garoon:3.0.2</product>
<product>garoon:3.0.3</product>
<product>garoon:3.1.0</product>
<product>garoon:3.1.1</product>
<product>garoon:3.1.2</product>
<product>garoon:3.1.3</product>
<product>garoon:3.5.0</product>
<product>garoon:3.5.1</product>
<product>garoon:3.5.2</product>
<product>garoon:3.5.3</product>
<product>garoon:3.5.4</product>
<product>garoon:3.5.5</product>
<product>garoon:3.7.0</product>
<product>garoon:3.7.1</product>
<product>garoon:3.7.2</product>
<product>garoon:3.7.3</product>
<product>garoon:3.7.4</product>
<product>garoon:3.7.5</product>
<product>garoon:4.0.0</product>
<product>garoon:4.0.1</product>
<product>garoon:4.0.2</product>
<product>garoon:4.0.3</product>
<product>garoon:4.2.0</product>
<product>garoon:4.2.1</product>
<product>garoon:4.2.2</product>
</cve>
<cve id="CVE-2016-7802" level="LOW">
<product>garoon:3.0.0</product>
<product>garoon:3.0.1</product>
<product>garoon:3.0.2</product>
<product>garoon:3.0.3</product>
<product>garoon:3.1.0</product>
<product>garoon:3.1.1</product>
<product>garoon:3.1.2</product>
<product>garoon:3.1.3</product>
<product>garoon:3.5.0</product>
<product>garoon:3.5.1</product>
<product>garoon:3.5.2</product>
<product>garoon:3.5.3</product>
<product>garoon:3.5.4</product>
<product>garoon:3.5.5</product>
<product>garoon:3.7.0</product>
<product>garoon:3.7.1</product>
<product>garoon:3.7.2</product>
<product>garoon:3.7.3</product>
<product>garoon:3.7.4</product>
<product>garoon:3.7.5</product>
<product>garoon:4.0.0</product>
<product>garoon:4.0.1</product>
<product>garoon:4.0.2</product>
<product>garoon:4.0.3</product>
<product>garoon:4.2.0</product>
<product>garoon:4.2.1</product>
<product>garoon:4.2.2</product>
</cve>
<cve id="CVE-2016-0673" level="MEDIUM">
<product>siebel_ui_framework:8.1.1</product>
<product>siebel_ui_framework:8.2.2</product>
</cve>
<cve id="CVE-2016-0672" level="LOW">
<product>flexcube_direct_banking:12.0.2</product>
<product>flexcube_direct_banking:12.0.3</product>
</cve>
<cve id="CVE-2016-9409" level="MEDIUM">
<product>merge_system:1.8.6</product>
<product>mybb:1.8.6</product>
</cve>
<cve id="CVE-2016-9408" level="MEDIUM">
<product>merge_system:1.8.6</product>
<product>mybb:1.8.6</product>
</cve>
<cve id="CVE-2016-9401" level="LOW">
<product>bash</product>
</cve>
<cve id="CVE-2016-9400" level="LOW">
<product>teeworlds:0.6.3</product>
<product>fedora:23</product>
</cve>
<cve id="CVE-2016-9403" level="LOW">
<product>merge_system:1.8.6</product>
<product>mybb:1.8.6</product>
</cve>
<cve id="CVE-2016-9402" level="LOW">
<product>merge_system:1.8.6</product>
<product>mybb:1.8.6</product>
</cve>
<cve id="CVE-2016-9405" level="MEDIUM">
<product>merge_system:1.8.6</product>
<product>mybb:1.8.6</product>
</cve>
<cve id="CVE-2016-9404" level="MEDIUM">
<product>merge_system:1.8.6</product>
<product>mybb:1.8.6</product>
</cve>
<cve id="CVE-2016-9407" level="MEDIUM">
<product>merge_system:1.8.6</product>
<product>mybb:1.8.6</product>
</cve>
<cve id="CVE-2016-9406" level="MEDIUM">
<product>merge_system:1.8.6</product>
<product>mybb:1.8.6</product>
</cve>
<cve id="CVE-2016-5959" level="LOW">
<product>security_privileged_identity_manager:2.0.2</product>
<product>security_privileged_identity_manager:2.1</product>
</cve>
<cve id="CVE-2016-5774" level="MEDIUM">
<product>packetshaper_s-series:11.5.1</product>
<product>packetshaper_s-series:11.5.1.2</product>
<product>packetshaper_s-series:11.5.1.3</product>
<product>packetshaper_s-series:11.5.2</product>
<product>packetshaper_s-series:11.5.3</product>
</cve>
<cve id="CVE-2016-8319" level="MEDIUM">
<product>flexcube_investor_servicing:12.0.1</product>
<product>flexcube_investor_servicing:12.0.2</product>
<product>flexcube_investor_servicing:12.0.4</product>
<product>flexcube_investor_servicing:12.1.0</product>
<product>flexcube_investor_servicing:12.3.0</product>
</cve>
<cve id="CVE-2016-8316" level="MEDIUM">
<product>flexcube_investor_servicing:12.0.1</product>
<product>flexcube_investor_servicing:12.0.2</product>
<product>flexcube_investor_servicing:12.0.4</product>
<product>flexcube_investor_servicing:12.1.0</product>
<product>flexcube_investor_servicing:12.3.0</product>
</cve>
<cve id="CVE-2016-8317" level="MEDIUM">
<product>flexcube_investor_servicing:12.0.1</product>
<product>flexcube_investor_servicing:12.0.2</product>
<product>flexcube_investor_servicing:12.0.4</product>
<product>flexcube_investor_servicing:12.1.0</product>
<product>flexcube_investor_servicing:12.3.0</product>
</cve>
<cve id="CVE-2016-8314" level="MEDIUM">
<product>flexcube_core_banking:5.1.0</product>
<product>flexcube_core_banking:5.2.0</product>
<product>flexcube_core_banking:11.5.0</product>
</cve>
<cve id="CVE-2016-8315" level="LOW">
<product>flexcube_investor_servicing:12.0.1</product>
<product>flexcube_investor_servicing:12.0.2</product>
<product>flexcube_investor_servicing:12.0.4</product>
<product>flexcube_investor_servicing:12.1.0</product>
<product>flexcube_investor_servicing:12.3.0</product>
</cve>
<cve id="CVE-2016-8312" level="MEDIUM">
<product>flexcube_private_banking:2.0.1</product>
<product>flexcube_private_banking:2.2.0</product>
<product>flexcube_private_banking:12.0.1</product>
</cve>
<cve id="CVE-2016-8313" level="MEDIUM">
<product>flexcube_private_banking:2.0.1</product>
<product>flexcube_private_banking:2.2.0</product>
<product>flexcube_private_banking:12.0.1</product>
</cve>
<cve id="CVE-2016-8310" level="LOW">
<product>flexcube_universal_banking:11.3.0</product>
<product>flexcube_universal_banking:11.4.0</product>
<product>flexcube_universal_banking:12.0.1</product>
<product>flexcube_universal_banking:12.0.2</product>
<product>flexcube_universal_banking:12.0.3</product>
<product>flexcube_universal_banking:12.1.0</product>
<product>flexcube_universal_banking:12.2.0</product>
</cve>
<cve id="CVE-2016-5954" level="LOW">
<product>websphere_portal:6.1.0.0</product>
<product>websphere_portal:6.1.0.1</product>
<product>websphere_portal:6.1.0.2</product>
<product>websphere_portal:6.1.0.3</product>
<product>websphere_portal:6.1.0.4</product>
<product>websphere_portal:6.1.0.5</product>
<product>websphere_portal:6.1.0.6</product>
<product>websphere_portal:6.1.5.0</product>
<product>websphere_portal:6.1.5.1</product>
<product>websphere_portal:6.1.5.2</product>
<product>websphere_portal:6.1.5.3</product>
<product>websphere_portal:7.0.0.0</product>
<product>websphere_portal:7.0.0.1</product>
<product>websphere_portal:7.0.0.2</product>
<product>websphere_portal:8.0.0.0</product>
<product>websphere_portal:8.0.0.1</product>
<product>websphere_portal:8.5.0.0</product>
</cve>
<cve id="CVE-2016-3479" level="LOW">
<product>database:11.2.0.4</product>
<product>database:12.1.0.2</product>
</cve>
<cve id="CVE-2016-10469" level="LOW">
<product>mdm9206_firmware:-</product>
<product>mdm9607_firmware:-</product>
<product>mdm9650_firmware:-</product>
<product>msm8909w_firmware:-</product>
<product>sd_205_firmware:-</product>
<product>sd_210_firmware:-</product>
<product>sd_212_firmware:-</product>
<product>sd_410_firmware:-</product>
<product>sd_412_firmware:-</product>
<product>sd_415_firmware:-</product>
<product>sd_425_firmware:-</product>
<product>sd_430_firmware:-</product>
<product>sd_450_firmware:-</product>
<product>sd_615_firmware:-</product>
<product>sd_616_firmware:-</product>
<product>sd_617_firmware:-</product>
<product>sd_625_firmware:-</product>
<product>sd_650_firmware:-</product>
<product>sd_652_firmware:-</product>
<product>sd_808_firmware:-</product>
<product>sd_810_firmware:-</product>
<product>sd_820_firmware:-</product>
<product>sd_820a_firmware:-</product>
<product>sd_835_firmware:-</product>
<product>sd_845_firmware:-</product>
<product>sd_850_firmware:-</product>
</cve>
<cve id="CVE-2016-10460" level="LOW">
<product>sd_835_firmware:-</product>
<product>sd_845_firmware:-</product>
<product>sd_850_firmware:-</product>
</cve>
<cve id="CVE-2016-10461" level="LOW">
<product>mdm9650_firmware:-</product>
<product>sd_650_firmware:-</product>
<product>sd_652_firmware:-</product>
<product>sd_808_firmware:-</product>
<product>sd_810_firmware:-</product>
<product>sd_820_firmware:-</product>
<product>sdx20_firmware:-</product>
</cve>
<cve id="CVE-2016-10462" level="LOW">
<product>sd_410_firmware:-</product>
<product>sd_412_firmware:-</product>
<product>sd_415_firmware:-</product>
<product>sd_425_firmware:-</product>
<product>sd_427_firmware:-</product>
<product>sd_430_firmware:-</product>
<product>sd_435_firmware:-</product>
<product>sd_450_firmware:-</product>
<product>sd_615_firmware:-</product>
<product>sd_616_firmware:-</product>
<product>sd_625_firmware:-</product>
<product>sd_650_firmware:-</product>
<product>sd_652_firmware:-</product>
<product>sd_808_firmware:-</product>
<product>sd_810_firmware:-</product>
<product>sd_820_firmware:-</product>
<product>sd_820a_firmware:-</product>
<product>sd_835_firmware:-</product>
<product>sd_845_firmware:-</product>
<product>sd_850_firmware:-</product>
<product>sdm630_firmware:-</product>
<product>sdm636_firmware:-</product>
<product>sdm660_firmware:-</product>
</cve>
<cve id="CVE-2016-10464" level="LOW">
<product>mdm9206_firmware:-</product>
<product>mdm9607_firmware:-</product>
<product>mdm9640_firmware:-</product>
<product>mdm9650_firmware:-</product>
<product>qca6174a_firmware:-</product>
<product>qca6574au_firmware:-</product>
<product>qca9377_firmware:-</product>
<product>sd_205_firmware:-</product>
<product>sd_210_firmware:-</product>
<product>sd_212_firmware:-</product>
<product>sd_425_firmware:-</product>
<product>sd_600_firmware:-</product>
<product>sd_650_firmware:-</product>
<product>sd_652_firmware:-</product>
<product>sd_808_firmware:-</product>
<product>sd_810_firmware:-</product>
<product>sd_820_firmware:-</product>
</cve>
<cve id="CVE-2016-10466" level="LOW">
<product>mdm9206_firmware:-</product>
<product>mdm9607_firmware:-</product>
<product>mdm9625_firmware:-</product>
<product>mdm9635m_firmware:-</product>
<product>mdm9640_firmware:-</product>
<product>mdm9645_firmware:-</product>
<product>mdm9650_firmware:-</product>
<product>mdm9655_firmware:-</product>
<product>msm8909w_firmware:-</product>
<product>sd_205_firmware:-</product>
<product>sd_210_firmware:-</product>
<product>sd_212_firmware:-</product>
<product>sd_400_firmware:-</product>
<product>sd_410_firmware:-</product>
<product>sd_412_firmware:-</product>
<product>sd_415_firmware:-</product>
<product>sd_425_firmware:-</product>
<product>sd_430_firmware:-</product>
<product>sd_450_firmware:-</product>
<product>sd_615_firmware:-</product>
<product>sd_616_firmware:-</product>
<product>sd_617_firmware:-</product>
<product>sd_625_firmware:-</product>
<product>sd_650_firmware:-</product>
<product>sd_652_firmware:-</product>
<product>sd_800_firmware:-</product>
<product>sd_808_firmware:-</product>
<product>sd_810_firmware:-</product>
<product>sd_820_firmware:-</product>
<product>sd_835_firmware:-</product>
<product>sd_845_firmware:-</product>
<product>sd_850_firmware:-</product>
<product>sdx20_firmware:-</product>
</cve>
<cve id="CVE-2016-10467" level="LOW">
<product>sd_205_firmware:-</product>
<product>sd_210_firmware:-</product>
<product>sd_212_firmware:-</product>
<product>sd_400_firmware:-</product>
<product>sd_410_firmware:-</product>
<product>sd_412_firmware:-</product>
<product>sd_415_firmware:-</product>
<product>sd_615_firmware:-</product>
<product>sd_616_firmware:-</product>
<product>sd_617_firmware:-</product>
<product>sd_650_firmware:-</product>
<product>sd_652_firmware:-</product>
<product>sd_800_firmware:-</product>
<product>sd_808_firmware:-</product>
<product>sd_820_firmware:-</product>
<product>sd_820a_firmware:-</product>
</cve>
<cve id="CVE-2016-4576" level="LOW">
<product>ips_module_firmware:v500r001c00</product>
<product>ngfw_module_firmware:v500r001c00</product>
<product>nip6300_firmware:v500r001c00</product>
<product>nip6600_firmware:v500r001c00</product>
<product>secospace_antiddos8000_firmware:v500r001c00</product>
<product>secospace_usg6300_firmware:v500r001c00</product>
<product>secospace_usg6500_firmware:v500r001c00</product>
<product>secospace_usg6600_firmware:v500r001c00</product>
<product>usg9500_firmware:v500r001c00</product>
</cve>
<cve id="CVE-2016-4577" level="HIGH">
<product>ngfw_module_firmware:v500r001c00</product>
<product>secospace_usg6300_firmware:v500r001c00</product>
<product>secospace_usg6500_firmware:v500r001c00</product>
<product>secospace_usg6600_firmware:v500r001c00</product>
<product>usg9500_firmware:v500r001c00</product>
</cve>
<cve id="CVE-2016-1094" level="LOW">
<product>acrobat_dc:15.006.30121</product>
<product>acrobat_dc:15.010.20060</product>
<product>acrobat_reader_dc:15.006.30121</product>
<product>acrobat_reader_dc:15.010.20060</product>
<product>acrobat_xi:11.0.15</product>
<product>reader_xi:11.0.15</product>
</cve>
<cve id="CVE-2016-4575" level="MEDIUM">
<product>ath:-</product>
<product>cherryplus:-</product>
<product>ath_firmware:al00c00</product>
<product>ath_firmware:cl00c92</product>
<product>ath_firmware:tl00hc01</product>
<product>ath_firmware:ul00c00</product>
<product>cherryplus_firmware:tl00c00</product>
<product>cherryplus_firmware:tl00mc01</product>
<product>cherryplus_firmware:ul00c00</product>
<product>plk_firmware:al10c00</product>
<product>plk_firmware:al10c92</product>
<product>rio_firmware:al00c00</product>
</cve>
<cve id="CVE-2016-1092" level="LOW">
<product>acrobat:11.0.15</product>
<product>acrobat_dc:15.006.30121</product>
<product>acrobat_dc:15.010.20060</product>
<product>acrobat_reader_dc:15.006.30121</product>
<product>acrobat_reader_dc:15.010.20060</product>
<product>reader:11.0.15</product>
</cve>
<cve id="CVE-2016-4573" level="LOW">
<product>fortiswitch:3.4.1</product>
</cve>
<cve id="CVE-2016-4570" level="MEDIUM">
<product>mini-xml:2.7</product>
<product>mini-xml:2.9</product>
</cve>
<cve id="CVE-2016-4571" level="MEDIUM">
<product>mini-xml:2.7</product>
<product>mini-xml:2.9</product>
</cve>
<cve id="CVE-2016-2206" level="LOW">
<product>workspace_streaming:7.5.0</product>
<product>workspace_streaming:7.5.0</product>
<product>workspace_streaming:7.6.0</product>
<product>workspace_virtualization:7.5.0</product>
<product>workspace_virtualization:7.5.0</product>
<product>workspace_virtualization:7.6.0</product>
</cve>
<cve id="CVE-2016-2207" level="LOW">
<product>advanced_threat_protection:2.0.3</product>
<product>csapi:10.0.4</product>
<product>data_center_security_server:6.0</product>
<product>data_center_security_server:6.0</product>
<product>data_center_security_server:6.5</product>
<product>data_center_security_server:6.5</product>
<product>data_center_security_server:6.6</product>
<product>data_center_security_server:6.6</product>
<product>endpoint_protection:12.1.6</product>
<product>endpoint_protection:12.1.6</product>
<product>endpoint_protection:12.1.6</product>
<product>mail_security_for_domino:8.0.9</product>
<product>mail_security_for_domino:8.1.3</product>
<product>mail_security_for_microsoft_exchange:6.5.8</product>
<product>mail_security_for_microsoft_exchange:7.0.4</product>
<product>mail_security_for_microsoft_exchange:7.5.4</product>
<product>message_gateway:10.6.1-3</product>
<product>message_gateway_for_service_providers:10.5</product>
<product>message_gateway_for_service_providers:10.6</product>
<product>ngc:22.6</product>
<product>norton_360</product>
<product>norton_antivirus</product>
<product>norton_bootable_removal_tool:2016.0</product>
<product>norton_internet_security</product>
<product>norton_power_eraser:5.0</product>
<product>norton_security</product>
<product>norton_security:13.0.1</product>
<product>norton_security_with_backup</product>
<product>protection_engine:7.0.5</product>
<product>protection_engine:7.5.4</product>
<product>protection_engine:7.8.0</product>
<product>protection_for_sharepoint_servers:6.03</product>
<product>protection_for_sharepoint_servers:6.04</product>
<product>protection_for_sharepoint_servers:6.05</product>
<product>protection_for_sharepoint_servers:6.06</product>
</cve>
<cve id="CVE-2016-2204" level="LOW">
<product>messaging_gateway:10.6.0</product>
<product>messaging_gateway:10.6.0</product>
<product>messaging_gateway:10.6.0</product>
<product>messaging_gateway:10.6.0</product>
<product>messaging_gateway:10.6.0</product>
<product>messaging_gateway:10.6.0</product>
<product>messaging_gateway:10.6.0</product>
</cve>
<cve id="CVE-2016-2205" level="LOW">
<product>workspace_streaming:7.5.0</product>
<product>workspace_streaming:7.5.0</product>
<product>workspace_streaming:7.6.0</product>
<product>workspace_virtualization:7.5.0</product>
<product>workspace_virtualization:7.5.0</product>
<product>workspace_virtualization:7.6.0</product>
</cve>
<cve id="CVE-2016-2202" level="LOW">
<product>altiris_it_management_suite:7.6</product>
</cve>
<cve id="CVE-2016-2203" level="LOW">
<product>messaging_gateway:10.6.0</product>
<product>messaging_gateway:10.6.0</product>
<product>messaging_gateway:10.6.0</product>
<product>messaging_gateway:10.6.0</product>
<product>messaging_gateway:10.6.0</product>
<product>messaging_gateway:10.6.0</product>
<product>messaging_gateway:10.6.0</product>
</cve>
<cve id="CVE-2016-2200" level="LOW">
<product>simatic_s7-1500_cpu_firmware:1.8.2</product>
</cve>
<cve id="CVE-2016-2201" level="LOW">
<product>simatic_s7-1500_cpu_firmware:1.8.2</product>
</cve>
<cve id="CVE-2016-2208" level="LOW">
<product>anti-virus_engine:20151.1.0.32</product>
</cve>
<cve id="CVE-2016-2209" level="LOW">
<product>advanced_threat_protection:2.0.3</product>
<product>csapi:10.0.4</product>
<product>data_center_security_server:6.0</product>
<product>data_center_security_server:6.0</product>
<product>data_center_security_server:6.5</product>
<product>data_center_security_server:6.5</product>
<product>data_center_security_server:6.6</product>
<product>data_center_security_server:6.6</product>
<product>endpoint_protection:12.1.6</product>
<product>endpoint_protection:12.1.6</product>
<product>endpoint_protection:12.1.6</product>
<product>mail_security_for_domino:8.0.9</product>
<product>mail_security_for_domino:8.1.3</product>
<product>mail_security_for_microsoft_exchange:6.5.8</product>
<product>mail_security_for_microsoft_exchange:7.0.4</product>
<product>mail_security_for_microsoft_exchange:7.5.4</product>
<product>message_gateway:10.6.1-3</product>
<product>message_gateway_for_service_providers:10.5</product>
<product>message_gateway_for_service_providers:10.6</product>
<product>ngc:22.6</product>
<product>norton_360</product>
<product>norton_antivirus</product>
<product>norton_bootable_removal_tool:2016.0</product>
<product>norton_internet_security</product>
<product>norton_power_eraser:5.0</product>
<product>norton_security</product>
<product>norton_security:13.0.1</product>
<product>norton_security_with_backup</product>
<product>protection_engine:7.0.5</product>
<product>protection_engine:7.5.4</product>
<product>protection_engine:7.8.0</product>
<product>protection_for_sharepoint_servers:6.03</product>
<product>protection_for_sharepoint_servers:6.04</product>
<product>protection_for_sharepoint_servers:6.05</product>
<product>protection_for_sharepoint_servers:6.06</product>
</cve>
<cve id="CVE-2016-7012" level="LOW">
<product>acrobat:11.0.17</product>
<product>acrobat_dc:15.006.30201</product>
<product>acrobat_dc:15.017.20053</product>
<product>acrobat_reader_dc:15.006.30201</product>
<product>acrobat_reader_dc:15.017.20053</product>
<product>reader:11.0.17</product>
</cve>
<cve id="CVE-2016-6430" level="MEDIUM">
<product>ip_interoperability_and_collaboration_system:4.0%281%29</product>
<product>ip_interoperability_and_collaboration_system:4.5%281%29</product>
<product>ip_interoperability_and_collaboration_system:4.6%281%29</product>
<product>ip_interoperability_and_collaboration_system:4.7%281%29</product>
<product>ip_interoperability_and_collaboration_system:4.8%281%29</product>
<product>ip_interoperability_and_collaboration_system:4.8%282%29</product>
<product>ip_interoperability_and_collaboration_system:4.9%281%29</product>
<product>ip_interoperability_and_collaboration_system:4.9%282%29</product>
<product>ip_interoperability_and_collaboration_system:4.10%281%29</product>
</cve>
<cve id="CVE-2016-1116" level="LOW">
<product>acrobat:11.0.15</product>
<product>acrobat_dc:15.006.30121</product>
<product>acrobat_dc:15.010.20060</product>
<product>acrobat_reader_dc:15.006.30121</product>
<product>acrobat_reader_dc:15.010.20060</product>
<product>reader:11.0.15</product>
</cve>
<cve id="CVE-2016-7906" level="MEDIUM">
<product>imagemagick:7.0.3-2</product>
</cve>
<cve id="CVE-2016-0227" level="MEDIUM">
<product>business_process_manager:8.0.0.0</product>
<product>business_process_manager:8.0.0.0</product>
<product>business_process_manager:8.0.0.0</product>
<product>business_process_manager:8.0.1.0</product>
<product>business_process_manager:8.0.1.0</product>
<product>business_process_manager:8.0.1.0</product>
<product>business_process_manager:8.0.1.1</product>
<product>business_process_manager:8.0.1.1</product>
<product>business_process_manager:8.0.1.1</product>
<product>business_process_manager:8.0.1.2</product>
<product>business_process_manager:8.0.1.2</product>
<product>business_process_manager:8.0.1.2</product>
<product>business_process_manager:8.0.1.3</product>
<product>business_process_manager:8.0.1.3</product>
<product>business_process_manager:8.0.1.3</product>
<product>business_process_manager:8.5.0.0</product>
<product>business_process_manager:8.5.0.0</product>
<product>business_process_manager:8.5.0.0</product>
<product>business_process_manager:8.5.0.1</product>
<product>business_process_manager:8.5.0.1</product>
<product>business_process_manager:8.5.0.1</product>
<product>business_process_manager:8.5.0.2</product>
<product>business_process_manager:8.5.0.2</product>
<product>business_process_manager:8.5.0.2</product>
<product>business_process_manager:8.5.5.0</product>
<product>business_process_manager:8.5.5.0</product>
<product>business_process_manager:8.5.5.0</product>
<product>business_process_manager:8.5.6.0</product>
<product>business_process_manager:8.5.6.0</product>
<product>business_process_manager:8.5.6.0</product>
<product>business_process_manager:8.5.6.2</product>
<product>business_process_manager:8.5.6.2</product>
<product>business_process_manager:8.5.6.2</product>
</cve>
<cve id="CVE-2016-0224" level="LOW">
<product>marketing_platform:8.5.0.0</product>
<product>marketing_platform:8.5.0.1</product>
<product>marketing_platform:8.5.0.2</product>
<product>marketing_platform:8.5.0.3</product>
<product>marketing_platform:8.5.0.4</product>
<product>marketing_platform:8.5.0.5</product>
<product>marketing_platform:8.5.0.6</product>
<product>marketing_platform:8.5.0.7</product>
<product>marketing_platform:8.6.0.0</product>
<product>marketing_platform:8.6.0.1</product>
<product>marketing_platform:8.6.0.2</product>
<product>marketing_platform:8.6.0.3</product>
<product>marketing_platform:8.6.0.4</product>
<product>marketing_platform:8.6.0.5</product>
<product>marketing_platform:8.6.0.6</product>
<product>marketing_platform:8.6.0.7</product>
<product>marketing_platform:8.6.0.8</product>
<product>marketing_platform:8.6.0.9</product>
<product>marketing_platform:8.6.0.10</product>
<product>marketing_platform:8.6.0.11</product>
<product>marketing_platform:9.0.0.0</product>
<product>marketing_platform:9.0.0.1</product>
<product>marketing_platform:9.0.0.2</product>
<product>marketing_platform:9.0.0.3</product>
<product>marketing_platform:9.0.0.4</product>
<product>marketing_platform:9.1.0.0</product>
<product>marketing_platform:9.1.0.1</product>
<product>marketing_platform:9.1.0.2</product>
<product>marketing_platform:9.1.0.3</product>
<product>marketing_platform:9.1.0.4</product>
<product>marketing_platform:9.1.0.5</product>
<product>marketing_platform:9.1.0.6</product>
<product>marketing_platform:9.1.0.7</product>
<product>marketing_platform:9.1.0.8</product>
<product>marketing_platform:9.1.0.9</product>
<product>marketing_platform:9.1.0.10</product>
<product>marketing_platform:9.1.1.0</product>
<product>marketing_platform:9.1.1.1</product>
<product>marketing_platform:9.1.1.2</product>
<product>marketing_platform:9.1.1.3</product>
<product>marketing_platform:9.1.1.4</product>
<product>marketing_platform:9.1.2.0</product>
</cve>
<cve id="CVE-2016-0590" level="MEDIUM">
<product>peoplesoft_supply_chain_management_order_management:9.1</product>
<product>peoplesoft_supply_chain_management_order_management:9.2</product>
</cve>
<cve id="CVE-2016-7903" level="MEDIUM">
<product>dotclear:2.10.2</product>
</cve>
<cve id="CVE-2016-7017" level="LOW">
<product>acrobat:11.0.17</product>
<product>acrobat_dc:15.006.30201</product>
<product>acrobat_dc:15.017.20053</product>
<product>acrobat_reader_dc:15.006.30201</product>
<product>acrobat_reader_dc:15.017.20053</product>
<product>reader:11.0.17</product>
</cve>
<cve id="CVE-2016-6457" level="LOW">
<product>application_policy_infrastructure_controller:1.2%282%29</product>
<product>application_policy_infrastructure_controller:1.2%283%29</product>
<product>application_policy_infrastructure_controller:1.3%281%29</product>
<product>application_policy_infrastructure_controller:1.3%282%29</product>
<product>application_policy_infrastructure_controller:2.0%281%29</product>
<product>nx-os:11.2%282g%29</product>
<product>nx-os:11.2%282h%29</product>
<product>nx-os:11.2%282i%29</product>
<product>nx-os:11.2%283c%29</product>
<product>nx-os:11.2%283e%29</product>
<product>nx-os:11.2%283h%29</product>
<product>nx-os:11.3%281i%29</product>
<product>nx-os:11.3%282f%29</product>
<product>nx-os:11.3%282h%29</product>
<product>nx-os:11.3%282i%29</product>
<product>nx-os:12.0%281m%29</product>
<product>nx-os:12.0%281n%29</product>
<product>nx-os:12.0%281o%29</product>
<product>nx-os:12.0%281p%29</product>
<product>nx-os:12.0%281q%29</product>
</cve>
<cve id="CVE-2016-6455" level="LOW">
<product>asr_5000_software:18.0.0</product>
<product>asr_5000_software:18.0.0.57828</product>
<product>asr_5000_software:18.0.0.59167</product>
<product>asr_5000_software:18.0.0.59211</product>
<product>asr_5000_software:18.0.l0.59219</product>
<product>asr_5000_software:18.1.0</product>
<product>asr_5000_software:18.1.0.59776</product>
<product>asr_5000_software:18.1.0.59780</product>
<product>asr_5000_software:18.1_base</product>
<product>asr_5000_software:18.3.0</product>
<product>asr_5000_software:18.3_base</product>
<product>asr_5000_software:18.4.0</product>
<product>asr_5000_software:19.0.1</product>
<product>asr_5000_software:19.0.m0.60737</product>
<product>asr_5000_software:19.0.m0.60828</product>
<product>asr_5000_software:19.0.m0.61045</product>
<product>asr_5000_software:19.1.0</product>
<product>asr_5000_software:19.1.0.61559</product>
<product>asr_5000_software:19.2.0</product>
<product>asr_5000_software:19.3.0</product>
<product>asr_5000_software:20.0.0</product>
</cve>
<cve id="CVE-2016-6454" level="MEDIUM">
<product>hosted_collaboration_mediation_fulfillment:10.6%281%29.0</product>
<product>hosted_collaboration_mediation_fulfillment:10.6%282%29.0</product>
<product>hosted_collaboration_mediation_fulfillment:10.6%283%29.0</product>
<product>hosted_collaboration_mediation_fulfillment:11.5%281%29.0</product>
</cve>
<cve id="CVE-2016-6453" level="MEDIUM">
<product>identity_services_engine:1.3%280.876%29</product>
</cve>
<cve id="CVE-2016-6320" level="MEDIUM">
<product>foreman:1.12.1</product>
</cve>
<cve id="CVE-2016-6451" level="MEDIUM">
<product>prime_collaboration_provisioning:10.6.0</product>
</cve>
<cve id="CVE-2016-6322" level="LOW">
<product>quickstart_cloud_installer:-</product>
</cve>
<cve id="CVE-2016-7909" level="LOW">
<product>qemu</product>
</cve>
<cve id="CVE-2016-6329" level="MEDIUM">
<product>openvpn:2.3.14</product>
</cve>
<cve id="CVE-2016-6459" level="LOW">
<product>telepresence_tc_software:7.1.0</product>
<product>telepresence_tc_software:7.1.1</product>
<product>telepresence_tc_software:7.1.2</product>
<product>telepresence_tc_software:7.1.3</product>
<product>telepresence_tc_software:7.1.4</product>
<product>telepresence_tc_software:7.3.0</product>
<product>telepresence_tc_software:7.3.1</product>
<product>telepresence_tc_software:7.3.2</product>
<product>telepresence_tc_software:7.3.3</product>
<product>telepresence_tc_software:8.0.0</product>
<product>telepresence_tc_software:8.1.0</product>
</cve>
<cve id="CVE-2016-6458" level="LOW">
<product>email_security_appliance_firmware:9.7.1-066</product>
<product>email_security_appliance_firmware:9.7.2-046</product>
<product>email_security_appliance_firmware:9.7.2-047</product>
<product>email_security_appliance_firmware:9.7.2-054</product>
<product>email_security_appliance_firmware:9.9.6-026</product>
<product>email_security_appliance_firmware:9.9_base</product>
<product>email_security_appliance_firmware:10.0.0-124</product>
<product>email_security_appliance_firmware:10.0.0-125</product>
</cve>
<cve id="CVE-2016-0110" level="HIGH">
<product>edge</product>
<product>internet_explorer:10</product>
<product>internet_explorer:11</product>
</cve>
<cve id="CVE-2016-0111" level="HIGH">
<product>edge</product>
<product>internet_explorer:9</product>
<product>internet_explorer:10</product>
<product>internet_explorer:11</product>
</cve>
<cve id="CVE-2016-0112" level="HIGH">
<product>internet_explorer:9</product>
<product>internet_explorer:10</product>
<product>internet_explorer:11</product>
</cve>
<cve id="CVE-2016-0113" level="HIGH">
<product>internet_explorer:9</product>
<product>internet_explorer:10</product>
<product>internet_explorer:11</product>
</cve>
<cve id="CVE-2016-7490" level="LOW">
<product>studio_express:15.12.00.00</product>
</cve>
<cve id="CVE-2016-0443" level="MEDIUM">
<product>enterprise_manager_grid_control:11.1.0.1</product>
<product>enterprise_manager_grid_control:12.1.0.4</product>
<product>enterprise_manager_grid_control:12.1.0.5</product>
</cve>
<cve id="CVE-2016-0116" level="HIGH">
<product>edge</product>
</cve>
<cve id="CVE-2016-0441" level="HIGH">
<product>fusion_middleware:3.1.2</product>
</cve>
<cve id="CVE-2016-7498" level="LOW">
<product>compute_%28nova%29:13.0.0</product>
</cve>
<cve id="CVE-2016-7499" level="MEDIUM">
<product>libav:11.7</product>
</cve>
<cve id="CVE-2016-0449" level="LOW">
<product>enterprise_manager_grid_control:11.1.0.1</product>
<product>enterprise_manager_grid_control:11.2.0.4</product>
<product>enterprise_manager_grid_control:12.1.0.4</product>
<product>enterprise_manager_grid_control:12.1.0.5</product>
</cve>
<cve id="CVE-2016-5391" level="LOW">
<product>libreswan:3.17</product>
<product>fedora:23</product>
<product>fedora:24</product>
</cve>
<cve id="CVE-2016-5826" level="LOW">
<product>libical:0.47</product>
<product>libical:1.0</product>
</cve>
<cve id="CVE-2016-5825" level="MEDIUM">
<product>libical:0.47</product>
<product>libical:1.0</product>
</cve>
<cve id="CVE-2016-5824" level="MEDIUM">
<product>libical:1.0</product>
</cve>
<cve id="CVE-2016-5823" level="MEDIUM">
<product>libical:0.47</product>
<product>libical:1.0</product>
</cve>
<cve id="CVE-2016-5822" level="LOW">
<product>oceanstor_5800_v3:v300r002c10</product>
</cve>
<cve id="CVE-2016-5821" level="LOW">
<product>hisuite:4.0.3.301</product>
</cve>
<cve id="CVE-2016-7140" level="MEDIUM">
<product>plone:3.3</product>
<product>plone:3.3.1</product>
<product>plone:3.3.2</product>
<product>plone:3.3.3</product>
<product>plone:3.3.4</product>
<product>plone:3.3.5</product>
<product>plone:3.3.6</product>
<product>plone:4.0</product>
<product>plone:4.0.1</product>
<product>plone:4.0.2</product>
<product>plone:4.0.3</product>
<product>plone:4.0.4</product>
<product>plone:4.0.5</product>
<product>plone:4.0.7</product>
<product>plone:4.0.8</product>
<product>plone:4.0.9</product>
<product>plone:4.0.10</product>
<product>plone:4.1</product>
<product>plone:4.1.1</product>
<product>plone:4.1.2</product>
<product>plone:4.1.3</product>
<product>plone:4.1.4</product>
<product>plone:4.1.5</product>
<product>plone:4.1.6</product>
<product>plone:4.2</product>
<product>plone:4.2.1</product>
<product>plone:4.2.2</product>
<product>plone:4.2.3</product>
<product>plone:4.2.4</product>
<product>plone:4.2.5</product>
<product>plone:4.2.6</product>
<product>plone:4.2.7</product>
<product>plone:4.3</product>
<product>plone:4.3.1</product>
<product>plone:4.3.2</product>
<product>plone:4.3.3</product>
<product>plone:4.3.4</product>
<product>plone:4.3.5</product>
<product>plone:4.3.6</product>
<product>plone:4.3.7</product>
<product>plone:4.3.8</product>
<product>plone:4.3.9</product>
<product>plone:4.3.10</product>
<product>plone:4.3.11</product>
<product>plone:5.0</product>
<product>plone:5.0</product>
<product>plone:5.0</product>
<product>plone:5.0</product>
<product>plone:5.0</product>
<product>plone:5.0.1</product>
<product>plone:5.0.2</product>
<product>plone:5.0.3</product>
<product>plone:5.0.4</product>
<product>plone:5.0.5</product>
<product>plone:5.0.6</product>
<product>plone:5.1a1</product>
</cve>
<cve id="CVE-2016-7141" level="LOW">
<product>libcurl:7.50.1</product>
<product>leap:42.1</product>
</cve>
<cve id="CVE-2016-7146" level="MEDIUM">
<product>moinmoin:1.9.8</product>
</cve>
<cve id="CVE-2016-7147" level="MEDIUM">
<product>plone:2.5.5</product>
<product>plone:3.3</product>
<product>plone:3.3.1</product>
<product>plone:3.3.2</product>
<product>plone:3.3.3</product>
<product>plone:3.3.4</product>
<product>plone:3.3.5</product>
<product>plone:3.3.6</product>
<product>plone:4.0</product>
<product>plone:4.0.1</product>
<product>plone:4.0.2</product>
<product>plone:4.0.3</product>
<product>plone:4.0.4</product>
<product>plone:4.0.5</product>
<product>plone:4.0.7</product>
<product>plone:4.0.8</product>
<product>plone:4.0.9</product>
<product>plone:4.0.10</product>
<product>plone:4.1</product>
<product>plone:4.1.1</product>
<product>plone:4.1.2</product>
<product>plone:4.1.3</product>
<product>plone:4.1.4</product>
<product>plone:4.1.5</product>
<product>plone:4.1.6</product>
<product>plone:4.2</product>
<product>plone:4.2.1</product>
<product>plone:4.2.2</product>
<product>plone:4.2.3</product>
<product>plone:4.2.4</product>
<product>plone:4.2.5</product>
<product>plone:4.2.6</product>
<product>plone:4.2.7</product>
<product>plone:4.3</product>
<product>plone:4.3.1</product>
<product>plone:4.3.2</product>
<product>plone:4.3.3</product>
<product>plone:4.3.4</product>
<product>plone:4.3.5</product>
<product>plone:4.3.6</product>
<product>plone:4.3.7</product>
<product>plone:4.3.8</product>
<product>plone:4.3.9</product>
<product>plone:4.3.10</product>
<product>plone:4.3.11</product>
<product>plone:5.0</product>
<product>plone:5.0</product>
<product>plone:5.0</product>
<product>plone:5.0</product>
<product>plone:5.0.1</product>
<product>plone:5.0.2</product>
<product>plone:5.0.3</product>
<product>plone:5.0.4</product>
<product>plone:5.0.5</product>
<product>plone:5.0.6</product>
<product>plone:5.1</product>
<product>plone:5.1</product>
</cve>
<cve id="CVE-2016-7144" level="MEDIUM">
<product>unrealircd:3.2.10.5</product>
<product>unrealircd:4.0.0</product>
<product>unrealircd:4.0.1</product>
<product>unrealircd:4.0.2</product>
<product>unrealircd:4.0.3</product>
<product>unrealircd:4.0.3.1</product>
<product>unrealircd:4.0.4</product>
<product>unrealircd:4.0.5</product>
</cve>
<cve id="CVE-2016-7145" level="LOW">
<product>nefarious2:2.0</product>
</cve>
<cve id="CVE-2016-7148" level="MEDIUM">
<product>moinmoin:1.9.8</product>
</cve>
<cve id="CVE-2016-7149" level="MEDIUM">
<product>b2evolution:6.7.5</product>
</cve>
<cve id="CVE-2016-10619" level="MEDIUM">
<product>pennyworth:1.0.1</product>
</cve>
<cve id="CVE-2016-10618" level="MEDIUM">
<product>node-browser:0.0.3</product>
</cve>
<cve id="CVE-2016-10617" level="MEDIUM">
<product>box2d-native:0.0.8</product>
</cve>
<cve id="CVE-2016-10616" level="MEDIUM">
<product>openframe-image:0.2.0</product>
</cve>
<cve id="CVE-2016-10615" level="MEDIUM">
<product>curses:0.0.10</product>
</cve>
<cve id="CVE-2016-10614" level="MEDIUM">
<product>httpsync:-</product>
</cve>
<cve id="CVE-2016-10613" level="MEDIUM">
<product>bionode-sra:1.0.3</product>
</cve>
<cve id="CVE-2016-10612" level="MEDIUM">
<product>dalekjs:0.0.5</product>
</cve>
<cve id="CVE-2016-10611" level="MEDIUM">
<product>strider-sauce:0.6.3</product>
</cve>
<cve id="CVE-2016-8675" level="MEDIUM">
<product>libav:11.8</product>
</cve>
<cve id="CVE-2016-8674" level="MEDIUM">
<product>mupdf:1.9a</product>
</cve>
<cve id="CVE-2016-8676" level="MEDIUM">
<product>libav:11.8</product>
</cve>
<cve id="CVE-2016-8671" level="MEDIUM">
<product>matrixssl:3.8.6</product>
</cve>
<cve id="CVE-2016-8670" level="LOW">
<product>libgd:2.2.3</product>
</cve>
<cve id="CVE-2016-8673" level="MEDIUM">
<product>simatic_cp_343-1_firmware:-</product>
<product>simatic_cp_443-1_firmware:-</product>
<product>simatic_s7_300_cpu_firmware:-</product>
<product>simatic_s7_400_cpu_firmware:-</product>
</cve>
<cve id="CVE-2016-8672" level="LOW">
<product>simatic_cp_343-1_firmware:-</product>
<product>simatic_cp_443-1_firmware:-</product>
<product>simatic_s7_300_cpu_firmware:-</product>
<product>simatic_s7_400_cpu_firmware:-</product>
</cve>
<cve id="CVE-2016-8679" level="MEDIUM">
<product>libdwarf:20161124</product>
</cve>
<cve id="CVE-2016-8678" level="MEDIUM">
<product>imagemagick:7.0.3-0</product>
</cve>
<cve id="CVE-2016-4363" level="MEDIUM">
<product>insight_control_server_deployment:-</product>
</cve>
<cve id="CVE-2016-1242" level="LOW">
<product>tryton:3.2.0</product>
<product>tryton:3.2.16</product>
<product>tryton:3.4.0</product>
<product>tryton:3.4.1</product>
<product>tryton:3.4.2</product>
<product>tryton:3.4.3</product>
<product>tryton:3.4.4</product>
<product>tryton:3.4.5</product>
<product>tryton:3.4.6</product>
<product>tryton:3.4.7</product>
<product>tryton:3.4.8</product>
<product>tryton:3.4.9</product>
<product>tryton:3.4.10</product>
<product>tryton:3.4.11</product>
<product>tryton:3.4.12</product>
<product>tryton:3.4.13</product>
<product>tryton:3.6.0</product>
<product>tryton:3.6.1</product>
<product>tryton:3.6.2</product>
<product>tryton:3.6.3</product>
<product>tryton:3.6.4</product>
<product>tryton:3.6.5</product>
<product>tryton:3.6.6</product>
<product>tryton:3.6.7</product>
<product>tryton:3.6.8</product>
<product>tryton:3.6.9</product>
<product>tryton:3.6.10</product>
<product>tryton:3.6.11</product>
<product>tryton:3.8.0</product>
<product>tryton:3.8.1</product>
<product>tryton:3.8.2</product>
<product>tryton:3.8.3</product>
<product>tryton:3.8.4</product>
<product>tryton:3.8.5</product>
<product>tryton:3.8.6</product>
<product>tryton:3.8.7</product>
<product>tryton:4.0.0</product>
<product>tryton:4.0.1</product>
<product>tryton:4.0.2</product>
<product>tryton:4.0.3</product>
</cve>
<cve id="CVE-2016-4361" level="LOW">
<product>loadrunner:11.52</product>
<product>loadrunner:12.00</product>
<product>loadrunner:12.01</product>
<product>loadrunner:12.02</product>
<product>loadrunner:12.50</product>
<product>performance_center:11.52</product>
<product>performance_center:12.00</product>
<product>performance_center:12.01</product>
<product>performance_center:12.20</product>
<product>performance_center:12.50</product>
</cve>
<cve id="CVE-2016-4360" level="LOW">
<product>loadrunner:11.52</product>
<product>loadrunner:12.00</product>
<product>loadrunner:12.01</product>
<product>loadrunner:12.02</product>
<product>loadrunner:12.50</product>
<product>performance_center:11.52</product>
<product>performance_center:12.00</product>
<product>performance_center:12.01</product>
<product>performance_center:12.20</product>
<product>performance_center:12.50</product>
</cve>
<cve id="CVE-2016-4367" level="LOW">
<product>universal_cmbd_foundation:10.0</product>
<product>universal_cmbd_foundation:10.01</product>
<product>universal_cmbd_foundation:10.10</product>
<product>universal_cmbd_foundation:10.11</product>
<product>universal_cmbd_foundation:10.20</product>
<product>universal_cmbd_foundation:10.21</product>
</cve>
<cve id="CVE-2016-4366" level="LOW">
<product>systems_insight_manager:7.5</product>
</cve>
<cve id="CVE-2016-4365" level="LOW">
<product>insight_control_server_deployment:-</product>
</cve>
<cve id="CVE-2016-4364" level="LOW">
<product>insight_control_server_deployment:-</product>
</cve>
<cve id="CVE-2016-4369" level="LOW">
<product>discovery_and_dependency_mapping_inventory:9.30</product>
<product>discovery_and_dependency_mapping_inventory:9.31</product>
<product>discovery_and_dependency_mapping_inventory:9.32</product>
</cve>
<cve id="CVE-2016-4368" level="LOW">
<product>universal_cmbd_configuration_manager:10.0</product>
<product>universal_cmbd_configuration_manager:10.01</product>
<product>universal_cmbd_configuration_manager:10.10</product>
<product>universal_cmbd_configuration_manager:10.11</product>
<product>universal_cmbd_configuration_manager:10.20</product>
<product>universal_cmbd_configuration_manager:10.21</product>
<product>universal_cmbd_foundation:10.0</product>
<product>universal_cmbd_foundation:10.01</product>
<product>universal_cmbd_foundation:10.10</product>
<product>universal_cmbd_foundation:10.11</product>
<product>universal_cmbd_foundation:10.20</product>
<product>universal_cmbd_foundation:10.21</product>
<product>universal_discovery:10.0</product>
<product>universal_discovery:10.01</product>
<product>universal_discovery:10.10</product>
<product>universal_discovery:10.11</product>
<product>universal_discovery:10.20</product>
<product>universal_discovery:10.21</product>
</cve>
<cve id="CVE-2016-4587" level="MEDIUM">
<product>webkit</product>
</cve>
<cve id="CVE-2016-1429" level="LOW">
<product>rv180_vpn_router_firmware</product>
<product>rv180w_wireless-n_multifunction_vpn_router_firmware</product>
</cve>
<cve id="CVE-2016-4586" level="MEDIUM">
<product>webkit</product>
</cve>
<cve id="CVE-2016-1427" level="LOW">
<product>prime_network_registrar:8.2.0</product>
<product>prime_network_registrar:8.2.0.1</product>
<product>prime_network_registrar:8.2.0.2</product>
<product>prime_network_registrar:8.2.1</product>
<product>prime_network_registrar:8.2.1.1</product>
<product>prime_network_registrar:8.2.2</product>
<product>prime_network_registrar:8.2.2.1</product>
<product>prime_network_registrar:8.2.3</product>
<product>prime_network_registrar:8.3.0</product>
<product>prime_network_registrar:8.3.1</product>
</cve>
<cve id="CVE-2016-1423" level="MEDIUM">
<product>email_security_appliance:8.9.0</product>
<product>email_security_appliance:8.9.1-000</product>
<product>email_security_appliance:8.9.2-032</product>
<product>email_security_appliance:9.0.0</product>
<product>email_security_appliance:9.0.0-212</product>
<product>email_security_appliance:9.0.0-461</product>
<product>email_security_appliance:9.0.5-000</product>
<product>email_security_appliance:9.1.0</product>
<product>email_security_appliance:9.1.0-011</product>
<product>email_security_appliance:9.1.0-032</product>
<product>email_security_appliance:9.1.0-101</product>
</cve>
<cve id="CVE-2016-4585" level="MEDIUM">
<product>webkit</product>
</cve>
<cve id="CVE-2016-1421" level="LOW">
<product>ip_phone_8800_series_firmware:11.0%281%29</product>
</cve>
<cve id="CVE-2016-1420" level="LOW">
<product>application_infrastructure_controller:-</product>
<product>application_policy_infrastructure_controller_firmware:1.0%281e%29</product>
<product>application_policy_infrastructure_controller_firmware:1.0%281h%29</product>
<product>application_policy_infrastructure_controller_firmware:1.0%281k%29</product>
<product>application_policy_infrastructure_controller_firmware:1.0%281n%29</product>
<product>application_policy_infrastructure_controller_firmware:1.0%282j%29</product>
<product>application_policy_infrastructure_controller_firmware:1.0%282m%29</product>
<product>application_policy_infrastructure_controller_firmware:1.0%283f%29</product>
<product>application_policy_infrastructure_controller_firmware:1.0%283i%29</product>
<product>application_policy_infrastructure_controller_firmware:1.0%283k%29</product>
<product>application_policy_infrastructure_controller_firmware:1.0%283n%29</product>
<product>application_policy_infrastructure_controller_firmware:1.0%284h%29</product>
<product>application_policy_infrastructure_controller_firmware:1.0%284o%29</product>
<product>application_policy_infrastructure_controller_firmware:1.1%280.920a%29</product>
<product>application_policy_infrastructure_controller_firmware:1.1%281j%29</product>
<product>application_policy_infrastructure_controller_firmware:1.1%283f%29</product>
</cve>
<cve id="CVE-2016-4584" level="MEDIUM">
<product>webkit</product>
</cve>
<cve id="CVE-2016-4583" level="MEDIUM">
<product>webkit</product>
</cve>
<cve id="CVE-2016-5898" level="LOW">
<product>jazz_reporting_service:5.0</product>
<product>jazz_reporting_service:5.0.1</product>
<product>jazz_reporting_service:5.0.2</product>
<product>jazz_reporting_service:6.0</product>
<product>jazz_reporting_service:6.0.1</product>
<product>jazz_reporting_service:6.0.2</product>
</cve>
<cve id="CVE-2016-5899" level="MEDIUM">
<product>jazz_reporting_service:5.0</product>
<product>jazz_reporting_service:5.0.1</product>
<product>jazz_reporting_service:5.0.2</product>
<product>jazz_reporting_service:6.0</product>
<product>jazz_reporting_service:6.0.1</product>
<product>jazz_reporting_service:6.0.2</product>
</cve>
<cve id="CVE-2016-5892" level="MEDIUM">
<product>b2b_advanced_communications:1.0.0.5_1</product>
<product>multi-enterprise_integration_gateway:1.0.0</product>
<product>multi-enterprise_integration_gateway:1.0.0.1</product>
</cve>
<cve id="CVE-2016-5893" level="LOW">
<product>sterling_b2b_integrator:5.2</product>
</cve>
<cve id="CVE-2016-5890" level="MEDIUM">
<product>sterling_b2b_integrator:5.2</product>
</cve>
<cve id="CVE-2016-5896" level="LOW">
<product>maximo_asset_management:7.6</product>
<product>maximo_for_aviation:7.6</product>
<product>maximo_for_life_sciences:7.6</product>
<product>maximo_for_nuclear_power:7.6</product>
<product>maximo_for_oil_and_gas:7.6</product>
<product>maximo_for_transportation:7.6</product>
</cve>
<cve id="CVE-2016-5897" level="MEDIUM">
<product>jazz_reporting_service:6.0</product>
<product>jazz_reporting_service:6.0.1</product>
<product>jazz_reporting_service:6.0.2</product>
</cve>
<cve id="CVE-2016-5894" level="MEDIUM">
<product>websphere_commerce:7.0</product>
<product>websphere_commerce:7.0.0.1</product>
<product>websphere_commerce:7.0.0.2</product>
<product>websphere_commerce:7.0.0.3</product>
<product>websphere_commerce:7.0.0.4</product>
<product>websphere_commerce:7.0.0.5</product>
<product>websphere_commerce:7.0.0.6</product>
<product>websphere_commerce:7.0.0.7</product>
<product>websphere_commerce:7.0.0.8</product>
<product>websphere_commerce:7.0.0.9</product>
<product>websphere_commerce:8.0</product>
<product>websphere_commerce:8.0.0.1</product>
<product>websphere_commerce:8.0.0.2</product>
<product>websphere_commerce:8.0.0.3</product>
<product>websphere_commerce:8.0.0.4</product>
<product>websphere_commerce:8.0.0.5</product>
<product>websphere_commerce:8.0.0.6</product>
<product>websphere_commerce:8.0.0.7</product>
<product>websphere_commerce:8.0.0.8</product>
<product>websphere_commerce:8.0.0.9</product>
<product>websphere_commerce:8.0.0.10</product>
<product>websphere_commerce:8.0.0.11</product>
<product>websphere_commerce:8.0.0.12</product>
<product>websphere_commerce:8.0.0.13</product>
<product>websphere_commerce:8.0.0.14</product>
<product>websphere_commerce:8.0.0.15</product>
<product>websphere_commerce:8.0.0.16</product>
<product>websphere_commerce:8.0.0.17</product>
<product>websphere_commerce:8.0.0.18</product>
<product>websphere_commerce:8.0.0.19</product>
<product>websphere_commerce:8.0.1.0</product>
<product>websphere_commerce:8.0.1.1</product>
<product>websphere_commerce:8.0.1.2</product>
<product>websphere_commerce:8.0.1.3</product>
<product>websphere_commerce:8.0.1.4</product>
<product>websphere_commerce:8.0.1.5</product>
<product>websphere_commerce:8.0.1.6</product>
<product>websphere_commerce:8.0.1.7</product>
<product>websphere_commerce:8.0.1.8</product>
<product>websphere_commerce:8.0.1.9</product>
<product>websphere_commerce:8.0.1.11</product>
<product>websphere_commerce:8.0.1.12</product>
</cve>
<cve id="CVE-2016-4589" level="MEDIUM">
<product>webkit</product>
</cve>
<cve id="CVE-2016-4588" level="MEDIUM">
<product>webkit</product>
</cve>
<cve id="CVE-2016-5092" level="LOW">
<product>fortiweb:5.5.2</product>
</cve>
<cve id="CVE-2016-5091" level="MEDIUM">
<product>typo3:6.2.23</product>
<product>typo3:7.0.0</product>
<product>typo3:7.0.2</product>
<product>typo3:7.1.0</product>
<product>typo3:7.2.0</product>
<product>typo3:7.3.0</product>
<product>typo3:7.3.1</product>
<product>typo3:7.4.0</product>
<product>typo3:7.5.0</product>
<product>typo3:7.6.0</product>
<product>typo3:7.6.1</product>
<product>typo3:7.6.2</product>
<product>typo3:7.6.3</product>
<product>typo3:7.6.4</product>
<product>typo3:7.6.5</product>
<product>typo3:7.6.6</product>
<product>typo3:7.6.7</product>
<product>typo3:7.6.8</product>
<product>typo3:8.1.1</product>
</cve>
<cve id="CVE-2016-5097" level="LOW">
<product>phpmyadmin:4.6.1</product>
<product>opensuse:13.1</product>
</cve>
<cve id="CVE-2016-5098" level="LOW">
<product>phpmyadmin:4.6.2</product>
<product>opensuse:13.1</product>
</cve>
<cve id="CVE-2016-5099" level="MEDIUM">
<product>phpmyadmin:4.4.0</product>
<product>phpmyadmin:4.4.1</product>
<product>phpmyadmin:4.4.1.1</product>
<product>phpmyadmin:4.4.2</product>
<product>phpmyadmin:4.4.3</product>
<product>phpmyadmin:4.4.4</product>
<product>phpmyadmin:4.4.5</product>
<product>phpmyadmin:4.4.6</product>
<product>phpmyadmin:4.4.6.1</product>
<product>phpmyadmin:4.4.7</product>
<product>phpmyadmin:4.4.8</product>
<product>phpmyadmin:4.4.9</product>
<product>phpmyadmin:4.4.10</product>
<product>phpmyadmin:4.4.11</product>
<product>phpmyadmin:4.4.12</product>
<product>phpmyadmin:4.4.13</product>
<product>phpmyadmin:4.4.13.1</product>
<product>phpmyadmin:4.4.14.1</product>
<product>phpmyadmin:4.4.15</product>
<product>phpmyadmin:4.4.15.1</product>
<product>phpmyadmin:4.4.15.2</product>
<product>phpmyadmin:4.4.15.3</product>
<product>phpmyadmin:4.4.15.4</product>
<product>phpmyadmin:4.4.15.5</product>
<product>phpmyadmin:4.6.0</product>
<product>phpmyadmin:4.6.0</product>
<product>phpmyadmin:4.6.0</product>
<product>phpmyadmin:4.6.0</product>
<product>phpmyadmin:4.6.1</product>
<product>opensuse:13.1</product>
</cve>
<cve id="CVE-2016-5548" level="MEDIUM">
<product>jdk:1.6</product>
<product>jdk:1.7</product>
<product>jdk:1.8</product>
<product>jdk:1.8</product>
<product>jre:1.6</product>
<product>jre:1.7</product>
<product>jre:1.8</product>
<product>jre:1.8</product>
</cve>
<cve id="CVE-2016-5549" level="MEDIUM">
<product>jdk:1.7</product>
<product>jdk:1.8</product>
<product>jdk:1.8</product>
<product>jre:1.7</product>
<product>jre:1.8</product>
<product>jre:1.8</product>
</cve>
<cve id="CVE-2016-5239" level="LOW">
<product>imagemagick:6.9.3-9</product>
</cve>
<cve id="CVE-2016-5540" level="MEDIUM">
<product>micros_xstore_payment:1.0</product>
</cve>
<cve id="CVE-2016-5237" level="MEDIUM">
<product>steamos:3.42.16.13</product>
</cve>
<cve id="CVE-2016-5542" level="MEDIUM">
<product>jdk:1.6.0</product>
<product>jdk:1.7.0</product>
<product>jdk:1.8.0</product>
<product>jdk:1.8.0</product>
<product>jre:1.6.0</product>
<product>jre:1.7.0</product>
<product>jre:1.8.0</product>
<product>jre:1.8.0</product>
</cve>
<cve id="CVE-2016-5543" level="MEDIUM">
<product>flexcube_enterprise_limits_and_collateral_management:12.0.0</product>
<product>flexcube_enterprise_limits_and_collateral_management:12.1.0</product>
</cve>
<cve id="CVE-2016-5232" level="MEDIUM">
<product>mate_8_firmware:nxt</product>
</cve>
<cve id="CVE-2016-5545" level="MEDIUM">
<product>vm_virtualbox:5.0.30</product>
<product>vm_virtualbox:5.1.12</product>
</cve>
<cve id="CVE-2016-5230" level="MEDIUM">
<product>mate_8_firmware:nxt</product>
</cve>
<cve id="CVE-2016-5231" level="LOW">
<product>mate_8_firmware:nxt</product>
</cve>
<cve id="CVE-2016-3676" level="LOW">
<product>e3276s_firmware:e3276s-150tcpu-v200r002b250d04sp00c00</product>
</cve>
<cve id="CVE-2016-3677" level="MEDIUM">
<product>hilink_app:-</product>
<product>wear_app:-</product>
</cve>
<cve id="CVE-2016-2019" level="LOW">
<product>matrix_operating_environment:7.5</product>
<product>systems_insight_manager:7.5</product>
</cve>
<cve id="CVE-2016-2018" level="LOW">
<product>matrix_operating_environment:7.5</product>
<product>systems_insight_manager:7.5</product>
</cve>
<cve id="CVE-2016-2013" level="LOW">
<product>network_node_manager_i:9.20</product>
<product>network_node_manager_i:9.23</product>
<product>network_node_manager_i:9.24</product>
<product>network_node_manager_i:9.25</product>
<product>network_node_manager_i:10.00</product>
<product>network_node_manager_i:10.01</product>
</cve>
<cve id="CVE-2016-2012" level="LOW">
<product>network_node_manager_i:9.20</product>
<product>network_node_manager_i:9.23</product>
<product>network_node_manager_i:9.24</product>
<product>network_node_manager_i:9.25</product>
<product>network_node_manager_i:10.00</product>
<product>network_node_manager_i:10.01</product>
</cve>
<cve id="CVE-2016-2011" level="MEDIUM">
<product>network_node_manager_i:9.20</product>
<product>network_node_manager_i:9.23</product>
<product>network_node_manager_i:9.24</product>
<product>network_node_manager_i:9.25</product>
<product>network_node_manager_i:10.00</product>
<product>network_node_manager_i:10.01</product>
</cve>
<cve id="CVE-2016-2010" level="MEDIUM">
<product>network_node_manager_i:9.20</product>
<product>network_node_manager_i:9.23</product>
<product>network_node_manager_i:9.24</product>
<product>network_node_manager_i:9.25</product>
<product>network_node_manager_i:10.00</product>
<product>network_node_manager_i:10.01</product>
</cve>
<cve id="CVE-2016-2017" level="LOW">
<product>matrix_operating_environment:7.5</product>
<product>systems_insight_manager:7.5</product>
</cve>
<cve id="CVE-2016-2016" level="LOW">
<product>base-vxfs-50:b.05.00.01</product>
<product>base-vxfs-50:b.05.00.02</product>
<product>base-vxfs-501:b.05.01.0</product>
<product>base-vxfs-501:b.05.01.01</product>
<product>base-vxfs-501:b.05.01.03</product>
<product>base-vxfs-51:b.05.10.00</product>
<product>base-vxfs-51:b.05.10.02</product>
</cve>
<cve id="CVE-2016-2015" level="LOW">
<product>system_management_homepage:7.5.4.3</product>
</cve>
<cve id="CVE-2016-2014" level="LOW">
<product>network_node_manager_i:9.20</product>
<product>network_node_manager_i:9.23</product>
<product>network_node_manager_i:9.24</product>
<product>network_node_manager_i:9.25</product>
<product>network_node_manager_i:10.00</product>
<product>network_node_manager_i:10.01</product>
</cve>
<cve id="CVE-2016-6848" level="MEDIUM">
<product>open-xchange_appsuite:7.8.2</product>
</cve>
<cve id="CVE-2016-6844" level="MEDIUM">
<product>open-xchange_appsuite:7.8.2</product>
</cve>
<cve id="CVE-2016-6845" level="MEDIUM">
<product>open-xchange_appsuite:7.8.2</product>
</cve>
<cve id="CVE-2016-6847" level="MEDIUM">
<product>open-xchange_appsuite:7.8.2</product>
</cve>
<cve id="CVE-2016-6840" level="MEDIUM">
<product>oceanstor_ism:v200r001c01</product>
<product>oceanstor_ism:v200r001c02</product>
<product>oceanstor_ism:v200r001c03</product>
</cve>
<cve id="CVE-2016-6842" level="MEDIUM">
<product>open-xchange_appsuite:7.8.2</product>
</cve>
<cve id="CVE-2016-6843" level="MEDIUM">
<product>open-xchange_appsuite:7.8.2</product>
</cve>
<cve id="CVE-2016-3658" level="LOW">
<product>libtiff:4.0.6</product>
</cve>
<cve id="CVE-2016-3659" level="LOW">
<product>cacti:0.8.8g</product>
</cve>
<cve id="CVE-2016-6158" level="HIGH">
<product>ws331a_router_firmware:ws331a-10_v100r001c02b017sp01</product>
</cve>
<cve id="CVE-2016-6159" level="HIGH">
<product>ws331a_router_firmware:ws331a-10_v100r001c02b017sp01</product>
</cve>
<cve id="CVE-2016-3652" level="MEDIUM">
<product>endpoint_protection_manager:12.1.6</product>
</cve>
<cve id="CVE-2016-3653" level="MEDIUM">
<product>endpoint_protection_manager:12.1.6</product>
</cve>
<cve id="CVE-2016-3650" level="LOW">
<product>endpoint_protection_manager:12.1.6</product>
</cve>
<cve id="CVE-2016-3651" level="MEDIUM">
<product>endpoint_protection_manager:12.1.6</product>
</cve>
<cve id="CVE-2016-3656" level="LOW">
<product>pan-os:5.0.17</product>
<product>pan-os:6.0.12</product>
<product>pan-os:6.1.9</product>
<product>pan-os:7.0.5</product>
</cve>
<cve id="CVE-2016-3657" level="LOW">
<product>pan-os:5.0.17</product>
<product>pan-os:6.0.12</product>
<product>pan-os:6.1.9</product>
<product>pan-os:7.0.4</product>
</cve>
<cve id="CVE-2016-3654" level="LOW">
<product>pan-os:5.0.17</product>
<product>pan-os:5.1.10</product>
<product>pan-os:6.0.12</product>
<product>pan-os:6.1.9</product>
<product>pan-os:7.0.5</product>
</cve>
<cve id="CVE-2016-3655" level="LOW">
<product>pan-os:5.0.17</product>
<product>pan-os:6.0.12</product>
<product>pan-os:6.1.9</product>
<product>pan-os:7.0.4</product>
</cve>
<cve id="CVE-2016-7794" level="LOW">
<product>git-hub:0.10.2</product>
</cve>
<cve id="CVE-2016-7793" level="MEDIUM">
<product>git-hub:0.10.2</product>
</cve>
<cve id="CVE-2016-7792" level="LOW">
<product>unifi_ap_ac_lite_firmware:5.2.7</product>
</cve>
<cve id="CVE-2016-7791" level="LOW">
<product>exponent_cms:2.3.9</product>
</cve>
<cve id="CVE-2016-7790" level="LOW">
<product>exponent_cms:2.3.9</product>
</cve>
<cve id="CVE-2016-7799" level="MEDIUM">
<product>imagemagick:7.0.3-1</product>
</cve>
<cve id="CVE-2016-7798" level="LOW">
<product>openssl:2.3.1</product>
</cve>
<cve id="CVE-2016-7908" level="LOW">
<product>qemu</product>
</cve>
<cve id="CVE-2016-0305" level="MEDIUM">
<product>connections:4.0.0.0</product>
<product>connections:4.5.0.0</product>
<product>connections:5.0.0.0</product>
<product>connections:5.5.0.0</product>
</cve>
<cve id="CVE-2016-0304" level="MEDIUM">
<product>domino:8.5.0</product>
<product>domino:8.5.1</product>
<product>domino:8.5.1.1</product>
<product>domino:8.5.1.2</product>
<product>domino:8.5.1.3</product>
<product>domino:8.5.1.4</product>
<product>domino:8.5.1.5</product>
<product>domino:8.5.2</product>
<product>domino:8.5.2.1</product>
<product>domino:8.5.2.2</product>
<product>domino:8.5.2.3</product>
<product>domino:8.5.2.4</product>
<product>domino:8.5.3</product>
<product>domino:8.5.3.1</product>
<product>domino:8.5.3.2</product>
<product>domino:8.5.3.3</product>
<product>domino:8.5.3.4</product>
<product>domino:8.5.3.5</product>
<product>domino:8.5.3.6</product>
<product>domino:9.0.0</product>
<product>domino:9.0.1</product>
<product>domino:9.0.1.1</product>
<product>domino:9.0.1.2</product>
<product>domino:9.0.1.3</product>
<product>domino:9.0.1.4</product>
<product>domino:9.0.1.5</product>
</cve>
<cve id="CVE-2016-0307" level="LOW">
<product>connections:4.0.0.0</product>
<product>connections:4.5.0.0</product>
<product>connections:5.0.0.0</product>
<product>connections:5.5.0.0</product>
</cve>
<cve id="CVE-2016-0306" level="MEDIUM">
<product>websphere_application_server:7.0.0.0</product>
<product>websphere_application_server:7.0.0.1</product>
<product>websphere_application_server:7.0.0.2</product>
<product>websphere_application_server:7.0.0.3</product>
<product>websphere_application_server:7.0.0.4</product>
<product>websphere_application_server:7.0.0.5</product>
<product>websphere_application_server:7.0.0.7</product>
<product>websphere_application_server:7.0.0.9</product>
<product>websphere_application_server:7.0.0.11</product>
<product>websphere_application_server:7.0.0.13</product>
<product>websphere_application_server:7.0.0.15</product>
<product>websphere_application_server:7.0.0.17</product>
<product>websphere_application_server:7.0.0.19</product>
<product>websphere_application_server:7.0.0.21</product>
<product>websphere_application_server:7.0.0.23</product>
<product>websphere_application_server:7.0.0.25</product>
<product>websphere_application_server:7.0.0.27</product>
<product>websphere_application_server:7.0.0.29</product>
<product>websphere_application_server:7.0.0.31</product>
<product>websphere_application_server:7.0.0.33</product>
<product>websphere_application_server:7.0.0.35</product>
<product>websphere_application_server:7.0.0.37</product>
<product>websphere_application_server:7.0.0.39</product>
<product>websphere_application_server:8.0.0.0</product>
<product>websphere_application_server:8.0.0.1</product>
<product>websphere_application_server:8.0.0.2</product>
<product>websphere_application_server:8.0.0.3</product>
<product>websphere_application_server:8.0.0.4</product>
<product>websphere_application_server:8.0.0.5</product>
<product>websphere_application_server:8.0.0.6</product>
<product>websphere_application_server:8.0.0.7</product>
<product>websphere_application_server:8.0.0.8</product>
<product>websphere_application_server:8.0.0.9</product>
<product>websphere_application_server:8.0.0.10</product>
<product>websphere_application_server:8.0.0.11</product>
<product>websphere_application_server:8.0.0.12</product>
<product>websphere_application_server:8.5.0.0</product>
<product>websphere_application_server:8.5.0.1</product>
<product>websphere_application_server:8.5.0.2</product>
<product>websphere_application_server:8.5.5.0</product>
<product>websphere_application_server:8.5.5.1</product>
<product>websphere_application_server:8.5.5.2</product>
<product>websphere_application_server:8.5.5.3</product>
<product>websphere_application_server:8.5.5.4</product>
<product>websphere_application_server:8.5.5.5</product>
<product>websphere_application_server:8.5.5.6</product>
<product>websphere_application_server:8.5.5.7</product>
<product>websphere_application_server:8.5.5.8</product>
<product>websphere_application_server:8.5.5.9</product>
</cve>
<cve id="CVE-2016-0301" level="MEDIUM">
<product>domino:8.5.0</product>
<product>domino:8.5.1</product>
<product>domino:8.5.1.1</product>
<product>domino:8.5.1.2</product>
<product>domino:8.5.1.3</product>
<product>domino:8.5.1.4</product>
<product>domino:8.5.2</product>
<product>domino:8.5.2.1</product>
<product>domino:8.5.2.2</product>
<product>domino:8.5.2.3</product>
<product>domino:8.5.3</product>
<product>domino:8.5.3.1</product>
<product>domino:8.5.3.2</product>
<product>domino:8.5.3.3</product>
<product>domino:8.5.3.4</product>
<product>domino:8.5.3.5</product>
<product>domino:9.0.0</product>
<product>domino:9.0.1</product>
<product>domino:9.0.1.1</product>
<product>domino:9.0.1.2</product>
<product>domino:9.0.1.3</product>
<product>domino:9.0.1.4</product>
<product>domino:9.0.1.5</product>
</cve>
<cve id="CVE-2016-5533" level="LOW">
<product>primavera_p6_enterprise_project_portfolio_management:8.4</product>
<product>primavera_p6_enterprise_project_portfolio_management:15.0</product>
<product>primavera_p6_enterprise_project_portfolio_management:15.1</product>
<product>primavera_p6_enterprise_project_portfolio_management:15.2</product>
<product>primavera_p6_enterprise_project_portfolio_management:16.0</product>
<product>primavera_p6_enterprise_project_portfolio_management:16.1</product>
<product>primavera_p6_enterprise_project_portfolio_management:16.2</product>
</cve>
<cve id="CVE-2016-0303" level="MEDIUM">
<product>tivoli_integrated_portal:2.2.0.0</product>
<product>tivoli_integrated_portal:2.2.0.1</product>
<product>tivoli_integrated_portal:2.2.0.3</product>
<product>tivoli_integrated_portal:2.2.0.5</product>
<product>tivoli_integrated_portal:2.2.0.7</product>
<product>tivoli_integrated_portal:2.2.0.9</product>
<product>tivoli_integrated_portal:2.2.0.11</product>
<product>tivoli_integrated_portal:2.2.0.13</product>
<product>tivoli_integrated_portal:2.2.0.15</product>
</cve>
<cve id="CVE-2016-0308" level="LOW">
<product>connections:4.0.0.0</product>
<product>connections:4.5.0.0</product>
<product>connections:5.0.0.0</product>
<product>connections:5.5.0.0</product>
</cve>
<cve id="CVE-2016-9427" level="LOW">
<product>bdwgc:7.4.4</product>
</cve>
<cve id="CVE-2016-9426" level="MEDIUM">
<product>w3m:0.5.3-30</product>
</cve>
<cve id="CVE-2016-9425" level="MEDIUM">
<product>w3m:0.5.3-30</product>
</cve>
<cve id="CVE-2016-9424" level="MEDIUM">
<product>w3m:0.5.3-30</product>
</cve>
<cve id="CVE-2016-9423" level="MEDIUM">
<product>w3m:0.5.3-30</product>
</cve>
<cve id="CVE-2016-9422" level="MEDIUM">
<product>w3m:0.5.3-30</product>
</cve>
<cve id="CVE-2016-9421" level="MEDIUM">
<product>merge_system:1.8.7</product>
<product>mybb:1.8.7</product>
</cve>
<cve id="CVE-2016-9420" level="LOW">
<product>merge_system:1.8.7</product>
<product>mybb:1.8.7</product>
</cve>
<cve id="CVE-2016-9938" level="LOW">
<product>asterisk:11.0.0</product>
<product>asterisk:11.0.0</product>
<product>asterisk:11.0.0</product>
<product>asterisk:11.0.0</product>
<product>asterisk:11.0.0</product>
<product>asterisk:11.0.1</product>
<product>asterisk:11.0.2</product>
<product>asterisk:11.1.0</product>
<product>asterisk:11.1.0</product>
<product>asterisk:11.1.0</product>
<product>asterisk:11.1.1</product>
<product>asterisk:11.1.2</product>
<product>asterisk:11.2.0</product>
<product>asterisk:11.2.0</product>
<product>asterisk:11.2.0</product>
<product>asterisk:11.2.1</product>
<product>asterisk:11.2.2</product>
<product>asterisk:11.3.0</product>
<product>asterisk:11.4.0</product>
<product>asterisk:11.5.0</product>
<product>asterisk:11.5.1</product>
<product>asterisk:11.6.0</product>
<product>asterisk:11.6.1</product>
<product>asterisk:11.7.0</product>
<product>asterisk:11.8.0</product>
<product>asterisk:11.8.1</product>
<product>asterisk:11.9.0</product>
<product>asterisk:11.10.0</product>
<product>asterisk:11.10.1</product>
<product>asterisk:11.10.2</product>
<product>asterisk:11.11.0</product>
<product>asterisk:11.12.0</product>
<product>asterisk:11.12.1</product>
<product>asterisk:11.13.0</product>
<product>asterisk:11.13.1</product>
<product>asterisk:11.14.0</product>
<product>asterisk:11.14.1</product>
<product>asterisk:11.14.2</product>
<product>asterisk:11.15.0</product>
<product>asterisk:11.15.1</product>
<product>asterisk:11.16.0</product>
<product>asterisk:11.17.0</product>
<product>asterisk:11.17.1</product>
<product>asterisk:11.18.0</product>
<product>asterisk:11.19.0</product>
<product>asterisk:11.20.0</product>
<product>asterisk:11.21.0</product>
<product>asterisk:11.21.1</product>
<product>asterisk:11.21.2</product>
<product>asterisk:11.22.0</product>
<product>asterisk:11.22.0</product>
<product>asterisk:11.23.0</product>
<product>asterisk:11.23.0</product>
<product>asterisk:11.23.1</product>
<product>asterisk:11.24.0</product>
<product>asterisk:11.24.1</product>
<product>asterisk:11.25.0</product>
<product>asterisk:13.0.0</product>
<product>asterisk:13.0.0</product>
<product>asterisk:13.0.0</product>
<product>asterisk:13.0.0</product>
<product>asterisk:13.0.1</product>
<product>asterisk:13.0.2</product>
<product>asterisk:13.1.0</product>
<product>asterisk:13.1.1</product>
<product>asterisk:13.2.0</product>
<product>asterisk:13.2.1</product>
<product>asterisk:13.3.0</product>
<product>asterisk:13.3.1</product>
<product>asterisk:13.3.2</product>
<product>asterisk:13.4.0</product>
<product>asterisk:13.5.0</product>
<product>asterisk:13.6.0</product>
<product>asterisk:13.7.0</product>
<product>asterisk:13.7.1</product>
<product>asterisk:13.7.2</product>
<product>asterisk:13.8.0</product>
<product>asterisk:13.8.0</product>
<product>asterisk:13.8.1</product>
<product>asterisk:13.8.2</product>
<product>asterisk:13.9.0</product>
<product>asterisk:13.9.1</product>
<product>asterisk:13.10.0</product>
<product>asterisk:13.10.0</product>
<product>asterisk:13.11.0</product>
<product>asterisk:13.11.1</product>
<product>asterisk:13.11.2</product>
<product>asterisk:13.12.0</product>
<product>asterisk:13.12.1</product>
<product>asterisk:13.12.2</product>
<product>asterisk:13.13.0</product>
<product>asterisk:14.0.0</product>
<product>asterisk:14.0.0</product>
<product>asterisk:14.0.0</product>
<product>asterisk:14.0.0</product>
<product>asterisk:14.0.0</product>
<product>asterisk:14.0.1</product>
<product>asterisk:14.0.2</product>
<product>asterisk:14.1.0</product>
<product>asterisk:14.1.1</product>
<product>asterisk:14.1.2</product>
<product>asterisk:14.2.0</product>
<product>certified_asterisk:11.0.0</product>
<product>certified_asterisk:11.0.0</product>
<product>certified_asterisk:11.0.0</product>
<product>certified_asterisk:11.1.0</product>
<product>certified_asterisk:11.1.0</product>
<product>certified_asterisk:11.1.0</product>
<product>certified_asterisk:11.1.0</product>
<product>certified_asterisk:11.2.0</product>
<product>certified_asterisk:11.2.0</product>
<product>certified_asterisk:11.2.0</product>
<product>certified_asterisk:11.3.0</product>
<product>certified_asterisk:11.3.0</product>
<product>certified_asterisk:11.3.0</product>
<product>certified_asterisk:11.4.0</product>
<product>certified_asterisk:11.4.0</product>
<product>certified_asterisk:11.4.0</product>
<product>certified_asterisk:11.4.0</product>
<product>certified_asterisk:11.5.0</product>
<product>certified_asterisk:11.5.0</product>
<product>certified_asterisk:11.5.0</product>
<product>certified_asterisk:11.6</product>
<product>certified_asterisk:11.6</product>
<product>certified_asterisk:11.6</product>
<product>certified_asterisk:11.6</product>
<product>certified_asterisk:11.6</product>
<product>certified_asterisk:11.6</product>
<product>certified_asterisk:11.6</product>
<product>certified_asterisk:11.6</product>
<product>certified_asterisk:11.6</product>
<product>certified_asterisk:11.6</product>
<product>certified_asterisk:11.6</product>
<product>certified_asterisk:11.6</product>
<product>certified_asterisk:11.6</product>
<product>certified_asterisk:11.6</product>
<product>certified_asterisk:11.6</product>
<product>certified_asterisk:11.6</product>
<product>certified_asterisk:11.6</product>
<product>certified_asterisk:11.6</product>
<product>certified_asterisk:11.6</product>
<product>certified_asterisk:11.6</product>
<product>certified_asterisk:11.6.0</product>
<product>certified_asterisk:11.6.0</product>
<product>certified_asterisk:11.6.0</product>
<product>certified_asterisk:11.6.0</product>
</cve>
<cve id="CVE-2016-9429" level="MEDIUM">
<product>w3m:0.5.3-30</product>
</cve>
<cve id="CVE-2016-9428" level="MEDIUM">
<product>w3m:0.5.3-30</product>
</cve>
<cve id="CVE-2016-10266" level="MEDIUM">
<product>libtiff:4.0.7</product>
</cve>
<cve id="CVE-2016-10267" level="MEDIUM">
<product>libtiff:4.0.7</product>
</cve>
<cve id="CVE-2016-10268" level="MEDIUM">
<product>libtiff:4.0.7</product>
</cve>
<cve id="CVE-2016-10269" level="MEDIUM">
<product>libtiff:4.0.7</product>
</cve>
<cve id="CVE-2016-8334" level="MEDIUM">
<product>reader:8.0.2.805</product>
</cve>
<cve id="CVE-2016-8335" level="MEDIUM">
<product>argus:6.6.04</product>
<product>argus:6.6.04</product>
</cve>
<cve id="CVE-2016-5933" level="MEDIUM">
<product>tivoli_monitoring:6.2.2</product>
<product>tivoli_monitoring:6.2.2.2</product>
<product>tivoli_monitoring:6.2.2.3</product>
<product>tivoli_monitoring:6.2.2.4</product>
<product>tivoli_monitoring:6.2.2.5</product>
<product>tivoli_monitoring:6.2.2.6</product>
<product>tivoli_monitoring:6.2.2.7</product>
<product>tivoli_monitoring:6.2.2.8</product>
<product>tivoli_monitoring:6.2.2.9</product>
<product>tivoli_monitoring:6.2.3</product>
<product>tivoli_monitoring:6.2.3.1</product>
<product>tivoli_monitoring:6.2.3.2</product>
<product>tivoli_monitoring:6.2.3.3</product>
<product>tivoli_monitoring:6.2.3.4</product>
<product>tivoli_monitoring:6.2.3.5</product>
<product>tivoli_monitoring:6.3.0</product>
<product>tivoli_monitoring:6.3.0.1</product>
<product>tivoli_monitoring:6.3.0.2</product>
<product>tivoli_monitoring:6.3.0.3</product>
<product>tivoli_monitoring:6.3.0.4</product>
<product>tivoli_monitoring:6.3.0.5</product>
<product>tivoli_monitoring:6.3.0.6</product>
<product>tivoli_monitoring:6.3.0.7</product>
</cve>
<cve id="CVE-2016-5932" level="MEDIUM">
<product>connections:4.0</product>
<product>connections:4.5</product>
<product>connections:5.0</product>
<product>connections:5.5.0.0</product>
</cve>
<cve id="CVE-2016-5935" level="MEDIUM">
<product>dashboard_application_services_hub:3.1.3</product>
</cve>
<cve id="CVE-2016-5934" level="MEDIUM">
<product>tivoli_storage_manager_fastback:</product>
</cve>
<cve id="CVE-2016-5937" level="MEDIUM">
<product>kenexa_lcms_premier:9.0</product>
<product>kenexa_lcms_premier:9.2</product>
<product>kenexa_lcms_premier:9.2.1</product>
<product>kenexa_lcms_premier:9.3</product>
<product>kenexa_lcms_premier:9.4</product>
<product>kenexa_lcms_premier:9.5</product>
<product>kenexa_lcms_premier:10.0</product>
<product>kenexa_lcms_premier:10.1</product>
<product>kenexa_lcms_premier:10.2</product>
</cve>
<cve id="CVE-2016-8333" level="MEDIUM">
<product>argus:6.6.04</product>
</cve>
<cve id="CVE-2016-5939" level="LOW">
<product>kenexa_lms_on_cloud:4.1</product>
<product>kenexa_lms_on_cloud:4.2</product>
<product>kenexa_lms_on_cloud:4.2.2</product>
<product>kenexa_lms_on_cloud:4.2.3</product>
<product>kenexa_lms_on_cloud:4.2.4</product>
<product>kenexa_lms_on_cloud:5.0</product>
<product>kenexa_lms_on_cloud:5.1</product>
<product>kenexa_lms_on_cloud:5.2</product>
</cve>
<cve id="CVE-2016-5938" level="LOW">
<product>kenexa_lms:4.1</product>
<product>kenexa_lms:4.2</product>
<product>kenexa_lms:4.2.2</product>
<product>kenexa_lms:4.2.3</product>
<product>kenexa_lms:4.2.4</product>
<product>kenexa_lms:5.0</product>
<product>kenexa_lms:5.1</product>
<product>kenexa_lms:5.2</product>
</cve>
<cve id="CVE-2016-8339" level="LOW">
<product>redis:3.2.0</product>
<product>redis:3.2.1</product>
<product>redis:3.2.2</product>
<product>redis:3.2.3</product>
</cve>
<cve id="CVE-2016-9683" level="LOW">
<product>sonicwall_secure_remote_access_server:8.1.0.2-14sv</product>
</cve>
<cve id="CVE-2016-9682" level="LOW">
<product>sonicwall_secure_remote_access_server:8.1.0.2-14sv</product>
</cve>
<cve id="CVE-2016-9681" level="MEDIUM">
<product>serendipity:2.0.4</product>
</cve>
<cve id="CVE-2016-9680" level="LOW">
<product>provisioning_services:7.0</product>
<product>provisioning_services:7.1</product>
<product>provisioning_services:7.6</product>
<product>provisioning_services:7.7</product>
<product>provisioning_services:7.8</product>
<product>provisioning_services:7.9</product>
<product>provisioning_services:7.11</product>
</cve>
<cve id="CVE-2016-9686" level="LOW">
<product>puppet_enterprise:2015.3.3</product>
<product>puppet_enterprise:2016.4.2</product>
<product>puppet_enterprise:2016.5.1</product>
</cve>
<cve id="CVE-2016-9684" level="LOW">
<product>sonicwall_secure_remote_access_server:8.1.0.2-14sv</product>
</cve>
<cve id="CVE-2016-10402" level="MEDIUM">
<product>antivirus:8.3.36.59</product>
</cve>
<cve id="CVE-2016-10400" level="LOW">
<product>atutor:2.2.1</product>
</cve>
<cve id="CVE-2016-10401" level="LOW">
<product>pk5001z_firmware:-</product>
</cve>
<cve id="CVE-2016-10406" level="LOW">
<product>mdm9650_firmware:-</product>
<product>sd_205_firmware:-</product>
<product>sd_210_firmware:-</product>
<product>sd_212_firmware:-</product>
<product>sd_410_firmware:-</product>
<product>sd_412_firmware:-</product>
<product>sd_415_firmware:-</product>
<product>sd_430_firmware:-</product>
<product>sd_450_firmware:-</product>
<product>sd_615_firmware:-</product>
<product>sd_616_firmware:-</product>
<product>sd_617_firmware:-</product>
<product>sd_625_firmware:-</product>
<product>sd_650_firmware:-</product>
<product>sd_652_firmware:-</product>
<product>sd_808_firmware:-</product>
<product>sd_810_firmware:-</product>
<product>sd_820_firmware:-</product>
<product>sd_835_firmware:-</product>
</cve>
<cve id="CVE-2016-10407" level="LOW">
<product>sd_205_firmware:-</product>
<product>sd_210_firmware:-</product>
<product>sd_212_firmware:-</product>
<product>sd_400_firmware:-</product>
<product>sd_410_firmware:-</product>
<product>sd_412_firmware:-</product>
<product>sd_415_firmware:-</product>
<product>sd_430_firmware:-</product>
<product>sd_450_firmware:-</product>
<product>sd_615_firmware:-</product>
<product>sd_616_firmware:-</product>
<product>sd_617_firmware:-</product>
<product>sd_625_firmware:-</product>
<product>sd_650_firmware:-</product>
<product>sd_652_firmware:-</product>
<product>sd_800_firmware:-</product>
<product>sd_808_firmware:-</product>
<product>sd_810_firmware:-</product>
<product>sd_820_firmware:-</product>
<product>sd_835_firmware:-</product>
</cve>
<cve id="CVE-2016-10404" level="MEDIUM">
<product>liferay_portal:7.0</product>
</cve>
<cve id="CVE-2016-10405" level="LOW">
<product>dir-600l_firmware:1.16</product>
</cve>
<cve id="CVE-2016-10409" level="MEDIUM">
<product>sd_425_firmware:-</product>
<product>sd_430_firmware:-</product>
<product>sd_450_firmware:-</product>
<product>sd_625_firmware:-</product>
<product>sd_650_firmware:-</product>
<product>sd_652_firmware:-</product>
<product>sd_820_firmware:-</product>
<product>sd_820a_firmware:-</product>
<product>sd_835_firmware:-</product>
</cve>
<cve id="CVE-2016-4551" level="LOW">
<product>netweaver:2004s</product>
<product>sap_aba:7.00</product>
<product>sap_basis:7.00</product>
</cve>
<cve id="CVE-2016-4552" level="MEDIUM">
<product>webmail:1.2</product>
</cve>
<cve id="CVE-2016-2224" level="LOW">
<product>uclibc-ng:1.0.11</product>
</cve>
<cve id="CVE-2016-2225" level="LOW">
<product>uclibc-ng:1.0.11</product>
</cve>
<cve id="CVE-2016-2226" level="MEDIUM">
<product>libiberty</product>
</cve>
<cve id="CVE-2016-6795" level="LOW">
<product>struts:2.3.20</product>
<product>struts:2.3.20.1</product>
<product>struts:2.3.20.2</product>
<product>struts:2.3.20.3</product>
<product>struts:2.3.21</product>
<product>struts:2.3.22</product>
<product>struts:2.3.23</product>
<product>struts:2.3.24</product>
<product>struts:2.3.24.1</product>
<product>struts:2.3.24.2</product>
<product>struts:2.3.24.3</product>
<product>struts:2.3.25</product>
<product>struts:2.3.26</product>
<product>struts:2.3.27</product>
<product>struts:2.3.28</product>
<product>struts:2.3.28.1</product>
<product>struts:2.3.29</product>
<product>struts:2.3.30</product>
</cve>
<cve id="CVE-2016-0888" level="LOW">
<product>documentum_d2:4.5</product>
</cve>
<cve id="CVE-2016-0889" level="LOW">
<product>unisphere:8.1</product>
</cve>
<cve id="CVE-2016-0886" level="LOW">
<product>documentum_xcp:2.1</product>
<product>documentum_xcp:2.2</product>
</cve>
<cve id="CVE-2016-0887" level="HIGH">
<product>rsa_bsafe:4.0.8</product>
<product>rsa_bsafe:4.1.4</product>
<product>rsa_bsafe_crypto-c:4.0.4</product>
<product>rsa_bsafe_crypto-c:4.1.2</product>
<product>rsa_bsafe_crypto-j:6.2.0.1</product>
<product>rsa_bsafe_ssl-c:2.8.8</product>
<product>rsa_bsafe_ssl-j:6.2</product>
</cve>
<cve id="CVE-2016-0882" level="LOW">
<product>documentum_xcp:2.1</product>
<product>documentum_xcp:2.2</product>
</cve>
<cve id="CVE-2016-0883" level="LOW">
<product>operations_manager:1.5.13</product>
<product>operations_manager:1.6.0</product>
<product>operations_manager:1.6.1</product>
<product>operations_manager:1.6.2</product>
<product>operations_manager:1.6.3</product>
<product>operations_manager:1.6.4</product>
<product>operations_manager:1.6.5</product>
<product>operations_manager:1.6.6</product>
<product>operations_manager:1.6.7</product>
<product>operations_manager:1.6.8</product>
</cve>
<cve id="CVE-2016-0881" level="LOW">
<product>documentum_xcp:2.1</product>
<product>documentum_xcp:2.2</product>
</cve>
<cve id="CVE-2016-6303" level="LOW">
<product>node.js:6.6.0</product>
<product>openssl:1.0.1</product>
<product>openssl:1.0.1a</product>
<product>openssl:1.0.1b</product>
<product>openssl:1.0.1c</product>
<product>openssl:1.0.1d</product>
<product>openssl:1.0.1e</product>
<product>openssl:1.0.1f</product>
<product>openssl:1.0.1g</product>
<product>openssl:1.0.1h</product>
<product>openssl:1.0.1i</product>
<product>openssl:1.0.1j</product>
<product>openssl:1.0.1k</product>
<product>openssl:1.0.1l</product>
<product>openssl:1.0.1m</product>
<product>openssl:1.0.1n</product>
<product>openssl:1.0.1o</product>
<product>openssl:1.0.1p</product>
<product>openssl:1.0.1q</product>
<product>openssl:1.0.1r</product>
<product>openssl:1.0.1s</product>
<product>openssl:1.0.1t</product>
<product>openssl:1.0.2</product>
<product>openssl:1.0.2a</product>
<product>openssl:1.0.2b</product>
<product>openssl:1.0.2c</product>
<product>openssl:1.0.2d</product>
<product>openssl:1.0.2e</product>
<product>openssl:1.0.2f</product>
<product>openssl:1.0.2g</product>
<product>openssl:1.0.2h</product>
</cve>
<cve id="CVE-2016-6301" level="LOW">
<product>busybox:1.5.2</product>
<product>busybox:1.6.2</product>
<product>busybox:1.7.4</product>
<product>busybox:1.7.5</product>
<product>busybox:1.8.3</product>
<product>busybox:1.19.1</product>
<product>busybox:1.21.0</product>
<product>busybox:1.21.1</product>
<product>busybox:1.22.0</product>
<product>busybox:1.22.1</product>
<product>busybox:1.23.0</product>
<product>busybox:1.23.1</product>
<product>busybox:1.23.2</product>
<product>busybox:1.24.0</product>
<product>busybox:1.24.1</product>
<product>busybox:1.24.2</product>
<product>busybox:1.25.0</product>
</cve>
<cve id="CVE-2016-6307" level="MEDIUM">
<product>openssl:1.1.0</product>
</cve>
<cve id="CVE-2016-6306" level="MEDIUM">
<product>icewall_federation_agent:3.0</product>
<product>icewall_mcrp:3.0</product>
<product>icewall_sso:10.0</product>
<product>icewall_sso:10.0</product>
<product>icewall_sso_agent_option:10.0</product>
<product>node.js:6.6.0</product>
<product>openssl:1.0.1</product>
<product>openssl:1.0.1</product>
<product>openssl:1.0.1</product>
<product>openssl:1.0.1</product>
<product>openssl:1.0.1a</product>
<product>openssl:1.0.1b</product>
<product>openssl:1.0.1c</product>
<product>openssl:1.0.1d</product>
<product>openssl:1.0.1e</product>
<product>openssl:1.0.1f</product>
<product>openssl:1.0.1g</product>
<product>openssl:1.0.1h</product>
<product>openssl:1.0.1i</product>
<product>openssl:1.0.1j</product>
<product>openssl:1.0.1k</product>
<product>openssl:1.0.1l</product>
<product>openssl:1.0.1m</product>
<product>openssl:1.0.1n</product>
<product>openssl:1.0.1o</product>
<product>openssl:1.0.1p</product>
<product>openssl:1.0.1q</product>
<product>openssl:1.0.1r</product>
<product>openssl:1.0.1s</product>
<product>openssl:1.0.1t</product>
<product>openssl:1.0.2</product>
<product>openssl:1.0.2</product>
<product>openssl:1.0.2</product>
<product>openssl:1.0.2</product>
<product>openssl:1.0.2a</product>
<product>openssl:1.0.2b</product>
<product>openssl:1.0.2c</product>
<product>openssl:1.0.2d</product>
<product>openssl:1.0.2e</product>
<product>openssl:1.0.2f</product>
<product>openssl:1.0.2h</product>
<product>suse_linux_enterprise_module_for_web_scripting:12.0</product>
</cve>
<cve id="CVE-2016-6305" level="LOW">
<product>openssl:1.1.0</product>
</cve>
<cve id="CVE-2016-6304" level="LOW">
<product>node.js:6.6.0</product>
<product>openssl:1.0.1</product>
<product>openssl:1.0.1</product>
<product>openssl:1.0.1</product>
<product>openssl:1.0.1</product>
<product>openssl:1.0.1a</product>
<product>openssl:1.0.1b</product>
<product>openssl:1.0.1c</product>
<product>openssl:1.0.1d</product>
<product>openssl:1.0.1e</product>
<product>openssl:1.0.1f</product>
<product>openssl:1.0.1g</product>
<product>openssl:1.0.1h</product>
<product>openssl:1.0.1i</product>
<product>openssl:1.0.1j</product>
<product>openssl:1.0.1k</product>
<product>openssl:1.0.1l</product>
<product>openssl:1.0.1m</product>
<product>openssl:1.0.1n</product>
<product>openssl:1.0.1o</product>
<product>openssl:1.0.1p</product>
<product>openssl:1.0.1q</product>
<product>openssl:1.0.1r</product>
<product>openssl:1.0.1s</product>
<product>openssl:1.0.1t</product>
<product>openssl:1.0.2</product>
<product>openssl:1.0.2</product>
<product>openssl:1.0.2</product>
<product>openssl:1.0.2</product>
<product>openssl:1.0.2a</product>
<product>openssl:1.0.2b</product>
<product>openssl:1.0.2c</product>
<product>openssl:1.0.2d</product>
<product>openssl:1.0.2e</product>
<product>openssl:1.0.2f</product>
<product>openssl:1.0.2h</product>
<product>openssl:1.1.0</product>
<product>suse_linux_enterprise_module_for_web_scripting:12.0</product>
</cve>
<cve id="CVE-2016-6309" level="LOW">
<product>openssl:1.1.0a</product>
</cve>
<cve id="CVE-2016-6308" level="MEDIUM">
<product>openssl:1.1.0</product>
</cve>
<cve id="CVE-2016-4314" level="LOW">
<product>carbon:4.4.5</product>
</cve>
<cve id="CVE-2016-0327" level="LOW">
<product>security_identity_manager_virtual_appliance:7.0.0.0</product>
<product>security_identity_manager_virtual_appliance:7.0.0.1</product>
<product>security_identity_manager_virtual_appliance:7.0.0.2</product>
<product>security_identity_manager_virtual_appliance:7.0.0.3</product>
<product>security_identity_manager_virtual_appliance:7.0.1.0</product>
</cve>
<cve id="CVE-2016-0326" level="LOW">
<product>rational_collaborative_lifecycle_management:4.0.0</product>
<product>rational_collaborative_lifecycle_management:4.0.1</product>
<product>rational_collaborative_lifecycle_management:4.0.2</product>
<product>rational_collaborative_lifecycle_management:4.0.3</product>
<product>rational_collaborative_lifecycle_management:4.0.4</product>
<product>rational_collaborative_lifecycle_management:4.0.5</product>
<product>rational_collaborative_lifecycle_management:4.0.6</product>
<product>rational_collaborative_lifecycle_management:4.0.7</product>
<product>rational_collaborative_lifecycle_management:5.0.0</product>
<product>rational_collaborative_lifecycle_management:5.0.1</product>
<product>rational_collaborative_lifecycle_management:5.0.2</product>
<product>rational_collaborative_lifecycle_management:6.0.0</product>
<product>rational_collaborative_lifecycle_management:6.0.1</product>
<product>rational_quality_manager:3.0.1.6</product>
<product>rational_quality_manager:4.0</product>
<product>rational_quality_manager:4.0.0.1</product>
<product>rational_quality_manager:4.0.0.2</product>
<product>rational_quality_manager:4.0.1</product>
<product>rational_quality_manager:4.0.2</product>
<product>rational_quality_manager:4.0.3</product>
<product>rational_quality_manager:4.0.4</product>
<product>rational_quality_manager:4.0.5</product>
<product>rational_quality_manager:4.0.6</product>
<product>rational_quality_manager:4.0.7</product>
<product>rational_quality_manager:5.0.0</product>
<product>rational_quality_manager:5.0.1</product>
<product>rational_quality_manager:5.0.2</product>
<product>rational_quality_manager:6.0.0</product>
<product>rational_quality_manager:6.0.1</product>
</cve>
<cve id="CVE-2016-6435" level="LOW">
<product>firepower_management_center:6.0.1</product>
</cve>
<cve id="CVE-2016-6434" level="LOW">
<product>firepower_management_center:6.0.1</product>
</cve>
<cve id="CVE-2016-6437" level="MEDIUM">
<product>wide_area_application_services:5.3.1</product>
<product>wide_area_application_services:5.3.3</product>
<product>wide_area_application_services:5.3.5</product>
<product>wide_area_application_services:5.3.5a</product>
<product>wide_area_application_services:5.3.5b</product>
<product>wide_area_application_services:5.3.5c</product>
<product>wide_area_application_services:5.3.5d</product>
<product>wide_area_application_services:5.3.5e</product>
<product>wide_area_application_services:5.3.5f</product>
<product>wide_area_application_services:6.1.0</product>
<product>wide_area_application_services:6.1.1</product>
<product>wide_area_application_services:6.2.1</product>
<product>wide_area_application_services:6.2.1a</product>
</cve>
<cve id="CVE-2016-10679" level="MEDIUM">
<product>selenium-standalone-painful:2.39.0-2.7.0</product>
</cve>
<cve id="CVE-2016-10678" level="MEDIUM">
<product>serc.js:0.0.1</product>
</cve>
<cve id="CVE-2016-6436" level="MEDIUM">
<product>hostscan_engine:3.0.08062</product>
<product>hostscan_engine:3.0.08066</product>
<product>hostscan_engine:3.1.01065</product>
<product>hostscan_engine:3.1.02016</product>
<product>hostscan_engine:3.1.02026</product>
<product>hostscan_engine:3.1.02040</product>
<product>hostscan_engine:3.1.02043</product>
<product>hostscan_engine:3.1.03103</product>
<product>hostscan_engine:3.1.03104</product>
<product>hostscan_engine:3.1.04060</product>
<product>hostscan_engine:3.1.04063</product>
<product>hostscan_engine:3.1.04075</product>
<product>hostscan_engine:3.1.04082</product>
<product>hostscan_engine:3.1.05152</product>
<product>hostscan_engine:3.1.05160</product>
<product>hostscan_engine:3.1.05163</product>
<product>hostscan_engine:3.1.05170</product>
<product>hostscan_engine:3.1.05178</product>
<product>hostscan_engine:3.1.05182</product>
<product>hostscan_engine:3.1.05183</product>
<product>hostscan_engine:3.1.06073</product>
<product>hostscan_engine:3.1.14018</product>
</cve>
<cve id="CVE-2016-10671" level="MEDIUM">
<product>mystem-wrapper:0.2.0</product>
</cve>
<cve id="CVE-2016-6431" level="MEDIUM">
<product>adaptive_security_appliance_software:8.0.2.11</product>
<product>adaptive_security_appliance_software:8.0.2.15</product>
<product>adaptive_security_appliance_software:8.0.3</product>
<product>adaptive_security_appliance_software:8.0.3.6</product>
<product>adaptive_security_appliance_software:8.0.3.12</product>
<product>adaptive_security_appliance_software:8.0.3.19</product>
<product>adaptive_security_appliance_software:8.0.4</product>
<product>adaptive_security_appliance_software:8.0.4.3</product>
<product>adaptive_security_appliance_software:8.0.4.9</product>
<product>adaptive_security_appliance_software:8.0.4.16</product>
<product>adaptive_security_appliance_software:8.0.4.23</product>
<product>adaptive_security_appliance_software:8.0.4.25</product>
<product>adaptive_security_appliance_software:8.0.4.28</product>
<product>adaptive_security_appliance_software:8.0.4.31</product>
<product>adaptive_security_appliance_software:8.0.4.32</product>
<product>adaptive_security_appliance_software:8.0.4.33</product>
<product>adaptive_security_appliance_software:8.0.5</product>
<product>adaptive_security_appliance_software:8.0.5.20</product>
<product>adaptive_security_appliance_software:8.0.5.23</product>
<product>adaptive_security_appliance_software:8.0.5.25</product>
<product>adaptive_security_appliance_software:8.0.5.27</product>
<product>adaptive_security_appliance_software:8.0.5.28</product>
<product>adaptive_security_appliance_software:8.0.5.31</product>
<product>adaptive_security_appliance_software:8.1.0.104</product>
<product>adaptive_security_appliance_software:8.1.1</product>
<product>adaptive_security_appliance_software:8.1.1.6</product>
<product>adaptive_security_appliance_software:8.1.2</product>
<product>adaptive_security_appliance_software:8.1.2.13</product>
<product>adaptive_security_appliance_software:8.1.2.15</product>
<product>adaptive_security_appliance_software:8.1.2.16</product>
<product>adaptive_security_appliance_software:8.1.2.19</product>
<product>adaptive_security_appliance_software:8.1.2.23</product>
<product>adaptive_security_appliance_software:8.1.2.24</product>
<product>adaptive_security_appliance_software:8.1.2.49</product>
<product>adaptive_security_appliance_software:8.1.2.50</product>
<product>adaptive_security_appliance_software:8.1.2.55</product>
<product>adaptive_security_appliance_software:8.1.2.56</product>
<product>adaptive_security_appliance_software:8.2.0.45</product>
<product>adaptive_security_appliance_software:8.2.1</product>
<product>adaptive_security_appliance_software:8.2.1.11</product>
<product>adaptive_security_appliance_software:8.2.2</product>
<product>adaptive_security_appliance_software:8.2.2.9</product>
<product>adaptive_security_appliance_software:8.2.2.10</product>
<product>adaptive_security_appliance_software:8.2.2.12</product>
<product>adaptive_security_appliance_software:8.2.2.16</product>
<product>adaptive_security_appliance_software:8.2.2.17</product>
<product>adaptive_security_appliance_software:8.2.3</product>
<product>adaptive_security_appliance_software:8.2.4</product>
<product>adaptive_security_appliance_software:8.2.4.1</product>
<product>adaptive_security_appliance_software:8.2.4.4</product>
<product>adaptive_security_appliance_software:8.2.5</product>
<product>adaptive_security_appliance_software:8.2.5.13</product>
<product>adaptive_security_appliance_software:8.2.5.22</product>
<product>adaptive_security_appliance_software:8.2.5.26</product>
<product>adaptive_security_appliance_software:8.2.5.33</product>
<product>adaptive_security_appliance_software:8.2.5.40</product>
<product>adaptive_security_appliance_software:8.2.5.41</product>
<product>adaptive_security_appliance_software:8.2.5.46</product>
<product>adaptive_security_appliance_software:8.2.5.48</product>
<product>adaptive_security_appliance_software:8.2.5.50</product>
<product>adaptive_security_appliance_software:8.2.5.52</product>
<product>adaptive_security_appliance_software:8.2.5.55</product>
<product>adaptive_security_appliance_software:8.2.5.57</product>
<product>adaptive_security_appliance_software:8.2.5.59</product>
<product>adaptive_security_appliance_software:8.3.1</product>
<product>adaptive_security_appliance_software:8.3.1.1</product>
<product>adaptive_security_appliance_software:8.3.1.4</product>
<product>adaptive_security_appliance_software:8.3.1.6</product>
<product>adaptive_security_appliance_software:8.3.2</product>
<product>adaptive_security_appliance_software:8.3.2.4</product>
<product>adaptive_security_appliance_software:8.3.2.13</product>
<product>adaptive_security_appliance_software:8.3.2.23</product>
<product>adaptive_security_appliance_software:8.3.2.25</product>
<product>adaptive_security_appliance_software:8.3.2.31</product>
<product>adaptive_security_appliance_software:8.3.2.33</product>
<product>adaptive_security_appliance_software:8.3.2.34</product>
<product>adaptive_security_appliance_software:8.3.2.37</product>
<product>adaptive_security_appliance_software:8.3.2.39</product>
<product>adaptive_security_appliance_software:8.3.2.40</product>
<product>adaptive_security_appliance_software:8.3.2.41</product>
<product>adaptive_security_appliance_software:8.3.2.44</product>
<product>adaptive_security_appliance_software:8.4.0</product>
<product>adaptive_security_appliance_software:8.4.1</product>
<product>adaptive_security_appliance_software:8.4.1.3</product>
<product>adaptive_security_appliance_software:8.4.1.11</product>
<product>adaptive_security_appliance_software:8.4.2</product>
<product>adaptive_security_appliance_software:8.4.2.1</product>
<product>adaptive_security_appliance_software:8.4.2.8</product>
<product>adaptive_security_appliance_software:8.4.3</product>
<product>adaptive_security_appliance_software:8.4.3.8</product>
<product>adaptive_security_appliance_software:8.4.3.9</product>
<product>adaptive_security_appliance_software:8.4.4</product>
<product>adaptive_security_appliance_software:8.4.4.1</product>
<product>adaptive_security_appliance_software:8.4.4.3</product>
<product>adaptive_security_appliance_software:8.4.4.5</product>
<product>adaptive_security_appliance_software:8.4.4.9</product>
<product>adaptive_security_appliance_software:8.4.5</product>
<product>adaptive_security_appliance_software:8.4.5.6</product>
<product>adaptive_security_appliance_software:8.4.6</product>
<product>adaptive_security_appliance_software:8.4.7</product>
<product>adaptive_security_appliance_software:8.4.7.3</product>
<product>adaptive_security_appliance_software:8.4.7.15</product>
<product>adaptive_security_appliance_software:8.4.7.22</product>
<product>adaptive_security_appliance_software:8.4.7.23</product>
<product>adaptive_security_appliance_software:8.4.7.26</product>
<product>adaptive_security_appliance_software:8.4.7.28</product>
<product>adaptive_security_appliance_software:8.4.7.29</product>
<product>adaptive_security_appliance_software:8.6.1</product>
<product>adaptive_security_appliance_software:8.6.1.1</product>
<product>adaptive_security_appliance_software:8.6.1.2</product>
<product>adaptive_security_appliance_software:8.6.1.5</product>
<product>adaptive_security_appliance_software:8.6.1.10</product>
<product>adaptive_security_appliance_software:8.6.1.12</product>
<product>adaptive_security_appliance_software:8.6.1.13</product>
<product>adaptive_security_appliance_software:8.6.1.14</product>
<product>adaptive_security_appliance_software:8.6.1.17</product>
<product>adaptive_security_appliance_software:9.0.1</product>
<product>adaptive_security_appliance_software:9.0.2</product>
<product>adaptive_security_appliance_software:9.0.2.10</product>
<product>adaptive_security_appliance_software:9.0.3</product>
<product>adaptive_security_appliance_software:9.0.3.6</product>
<product>adaptive_security_appliance_software:9.0.3.8</product>
<product>adaptive_security_appliance_software:9.0.4</product>
<product>adaptive_security_appliance_software:9.0.4.1</product>
<product>adaptive_security_appliance_software:9.0.4.5</product>
<product>adaptive_security_appliance_software:9.0.4.7</product>
<product>adaptive_security_appliance_software:9.0.4.17</product>
<product>adaptive_security_appliance_software:9.0.4.20</product>
<product>adaptive_security_appliance_software:9.0.4.24</product>
<product>adaptive_security_appliance_software:9.0.4.26</product>
<product>adaptive_security_appliance_software:9.0.4.29</product>
<product>adaptive_security_appliance_software:9.0.4.33</product>
<product>adaptive_security_appliance_software:9.0.4.35</product>
<product>adaptive_security_appliance_software:9.0.4.37</product>
<product>adaptive_security_appliance_software:9.0.4.40</product>
<product>adaptive_security_appliance_software:9.1.1</product>
<product>adaptive_security_appliance_software:9.1.1.4</product>
<product>adaptive_security_appliance_software:9.1.2</product>
<product>adaptive_security_appliance_software:9.1.2.8</product>
<product>adaptive_security_appliance_software:9.1.3</product>
<product>adaptive_security_appliance_software:9.1.3.2</product>
<product>adaptive_security_appliance_software:9.1.4</product>
<product>adaptive_security_appliance_software:9.1.4.5</product>
<product>adaptive_security_appliance_software:9.1.5</product>
<product>adaptive_security_appliance_software:9.1.5.10</product>
<product>adaptive_security_appliance_software:9.1.5.12</product>
<product>adaptive_security_appliance_software:9.1.5.15</product>
<product>adaptive_security_appliance_software:9.1.5.21</product>
<product>adaptive_security_appliance_software:9.1.6</product>
<product>adaptive_security_appliance_software:9.1.6.1</product>
<product>adaptive_security_appliance_software:9.1.6.4</product>
<product>adaptive_security_appliance_software:9.1.6.6</product>
<product>adaptive_security_appliance_software:9.1.6.8</product>
<product>adaptive_security_appliance_software:9.1.6.10</product>
<product>adaptive_security_appliance_software:9.1.7.4</product>
<product>adaptive_security_appliance_software:9.1.7.6</product>
<product>adaptive_security_appliance_software:9.2%280.0%29</product>
<product>adaptive_security_appliance_software:9.2%280.104%29</product>
<product>adaptive_security_appliance_software:9.2%283.1%29</product>
<product>adaptive_security_appliance_software:9.2.1</product>
<product>adaptive_security_appliance_software:9.2.2</product>
<product>adaptive_security_appliance_software:9.2.2.4</product>
<product>adaptive_security_appliance_software:9.2.2.7</product>
<product>adaptive_security_appliance_software:9.2.2.8</product>
<product>adaptive_security_appliance_software:9.2.3</product>
<product>adaptive_security_appliance_software:9.2.3.3</product>
<product>adaptive_security_appliance_software:9.2.3.4</product>
<product>adaptive_security_appliance_software:9.2.4</product>
<product>adaptive_security_appliance_software:9.2.4.2</product>
<product>adaptive_security_appliance_software:9.2.4.4</product>
<product>adaptive_security_appliance_software:9.2.4.8</product>
<product>adaptive_security_appliance_software:9.2.4.10</product>
<product>adaptive_security_appliance_software:9.3%281.50%29</product>
<product>adaptive_security_appliance_software:9.3%281.105%29</product>
<product>adaptive_security_appliance_software:9.3%282.100%29</product>
<product>adaptive_security_appliance_software:9.3%282.243%29</product>
<product>adaptive_security_appliance_software:9.3.1</product>
<product>adaptive_security_appliance_software:9.3.1.1</product>
<product>adaptive_security_appliance_software:9.3.2</product>
<product>adaptive_security_appliance_software:9.3.2.2</product>
<product>adaptive_security_appliance_software:9.3.3</product>
<product>adaptive_security_appliance_software:9.3.3.1</product>
<product>adaptive_security_appliance_software:9.3.3.2</product>
<product>adaptive_security_appliance_software:9.3.3.5</product>
<product>adaptive_security_appliance_software:9.3.3.6</product>
<product>adaptive_security_appliance_software:9.3.3.9</product>
<product>adaptive_security_appliance_software:9.3.3.10</product>
<product>adaptive_security_appliance_software:9.4.0.115</product>
<product>adaptive_security_appliance_software:9.4.1</product>
<product>adaptive_security_appliance_software:9.4.1.1</product>
<product>adaptive_security_appliance_software:9.4.1.2</product>
<product>adaptive_security_appliance_software:9.4.1.3</product>
<product>adaptive_security_appliance_software:9.4.1.5</product>
<product>adaptive_security_appliance_software:9.4.2</product>
<product>adaptive_security_appliance_software:9.4.2.3</product>
<product>adaptive_security_appliance_software:9.4.3</product>
<product>adaptive_security_appliance_software:9.4.3.3</product>
<product>adaptive_security_appliance_software:9.4.3.4</product>
<product>adaptive_security_appliance_software:9.5.1</product>
<product>adaptive_security_appliance_software:9.5.2</product>
<product>adaptive_security_appliance_software:9.5.2.6</product>
<product>adaptive_security_appliance_software:9.5.2.10</product>
<product>adaptive_security_appliance_software:9.5.2.14</product>
<product>adaptive_security_appliance_software:9.6.0</product>
<product>adaptive_security_appliance_software:9.6.1</product>
<product>adaptive_security_appliance_software:9.6.1.3</product>
</cve>
<cve id="CVE-2016-10673" level="MEDIUM">
<product>ipip-coffee:1.0.9</product>
</cve>
<cve id="CVE-2016-10672" level="MEDIUM">
<product>cloudpub-redis:2.4.5</product>
</cve>
<cve id="CVE-2016-10675" level="MEDIUM">
<product>libsbmlsim:0.0.2</product>
</cve>
<cve id="CVE-2016-10677" level="MEDIUM">
<product>google-closure-tools-latest:0.1.1</product>
</cve>
<cve id="CVE-2016-3150" level="MEDIUM">
<product>clickshare_csc-1_firmware:01.09.05.02</product>
<product>clickshare_cse-200_firmware:01.09.02.05</product>
</cve>
<cve id="CVE-2016-6433" level="LOW">
<product>firepower_management_center:5.2.0</product>
<product>firepower_management_center:5.2_base</product>
<product>firepower_management_center:5.3.0</product>
<product>firepower_management_center:5.3.0.2</product>
<product>firepower_management_center:5.3.0.3</product>
<product>firepower_management_center:5.3.0.4</product>
<product>firepower_management_center:5.3.1</product>
<product>firepower_management_center:5.3.1.3</product>
<product>firepower_management_center:5.3.1.4</product>
<product>firepower_management_center:5.3.1.5</product>
<product>firepower_management_center:5.3.1.6</product>
<product>firepower_management_center:5.4.0</product>
<product>firepower_management_center:5.4.0.2</product>
<product>firepower_management_center:5.4.1</product>
<product>firepower_management_center:5.4.1.1</product>
<product>firepower_management_center:5.4.1.2</product>
<product>firepower_management_center:5.4.1.3</product>
<product>firepower_management_center:5.4.1.4</product>
<product>firepower_management_center:5.4.1.5</product>
<product>firepower_management_center:5.4.1.6</product>
<product>firepower_management_center:5.4_base</product>
<product>firepower_management_center:6.0.1</product>
</cve>
<cve id="CVE-2016-6432" level="MEDIUM">
<product>adaptive_security_appliance_software:8.4.0</product>
<product>adaptive_security_appliance_software:8.4.2</product>
<product>adaptive_security_appliance_software:8.4.2.1</product>
<product>adaptive_security_appliance_software:8.4.2.8</product>
<product>adaptive_security_appliance_software:8.4.3</product>
<product>adaptive_security_appliance_software:8.4.3.8</product>
<product>adaptive_security_appliance_software:8.4.3.9</product>
<product>adaptive_security_appliance_software:8.4.4</product>
<product>adaptive_security_appliance_software:8.4.4.1</product>
<product>adaptive_security_appliance_software:8.4.4.3</product>
<product>adaptive_security_appliance_software:8.4.4.5</product>
<product>adaptive_security_appliance_software:8.4.4.9</product>
<product>adaptive_security_appliance_software:8.4.5</product>
<product>adaptive_security_appliance_software:8.4.5.6</product>
<product>adaptive_security_appliance_software:8.4.6</product>
<product>adaptive_security_appliance_software:8.4.7</product>
<product>adaptive_security_appliance_software:8.4.7.3</product>
<product>adaptive_security_appliance_software:8.4.7.15</product>
<product>adaptive_security_appliance_software:8.4.7.22</product>
<product>adaptive_security_appliance_software:8.4.7.23</product>
<product>adaptive_security_appliance_software:8.4.7.26</product>
<product>adaptive_security_appliance_software:8.4.7.28</product>
<product>adaptive_security_appliance_software:8.4.7.29</product>
<product>adaptive_security_appliance_software:8.5.1</product>
<product>adaptive_security_appliance_software:8.5.1.1</product>
<product>adaptive_security_appliance_software:8.5.1.6</product>
<product>adaptive_security_appliance_software:8.5.1.7</product>
<product>adaptive_security_appliance_software:8.5.1.14</product>
<product>adaptive_security_appliance_software:8.5.1.17</product>
<product>adaptive_security_appliance_software:8.5.1.18</product>
<product>adaptive_security_appliance_software:8.5.1.19</product>
<product>adaptive_security_appliance_software:8.5.1.21</product>
<product>adaptive_security_appliance_software:8.5.1.24</product>
<product>adaptive_security_appliance_software:8.6.1</product>
<product>adaptive_security_appliance_software:8.6.1.1</product>
<product>adaptive_security_appliance_software:8.6.1.2</product>
<product>adaptive_security_appliance_software:8.6.1.5</product>
<product>adaptive_security_appliance_software:8.6.1.10</product>
<product>adaptive_security_appliance_software:8.6.1.12</product>
<product>adaptive_security_appliance_software:8.6.1.13</product>
<product>adaptive_security_appliance_software:8.6.1.14</product>
<product>adaptive_security_appliance_software:8.6.1.17</product>
<product>adaptive_security_appliance_software:8.7.1</product>
<product>adaptive_security_appliance_software:8.7.1.1</product>
<product>adaptive_security_appliance_software:8.7.1.3</product>
<product>adaptive_security_appliance_software:8.7.1.4</product>
<product>adaptive_security_appliance_software:8.7.1.7</product>
<product>adaptive_security_appliance_software:8.7.1.8</product>
<product>adaptive_security_appliance_software:8.7.1.11</product>
<product>adaptive_security_appliance_software:8.7.1.13</product>
<product>adaptive_security_appliance_software:8.7.1.16</product>
<product>adaptive_security_appliance_software:8.7.1.17</product>
<product>adaptive_security_appliance_software:9.0.1</product>
<product>adaptive_security_appliance_software:9.0.2</product>
<product>adaptive_security_appliance_software:9.0.2.10</product>
<product>adaptive_security_appliance_software:9.0.3</product>
<product>adaptive_security_appliance_software:9.0.3.6</product>
<product>adaptive_security_appliance_software:9.0.3.8</product>
<product>adaptive_security_appliance_software:9.0.4</product>
<product>adaptive_security_appliance_software:9.0.4.1</product>
<product>adaptive_security_appliance_software:9.0.4.5</product>
<product>adaptive_security_appliance_software:9.0.4.7</product>
<product>adaptive_security_appliance_software:9.0.4.17</product>
<product>adaptive_security_appliance_software:9.0.4.20</product>
<product>adaptive_security_appliance_software:9.0.4.24</product>
<product>adaptive_security_appliance_software:9.0.4.26</product>
<product>adaptive_security_appliance_software:9.0.4.29</product>
<product>adaptive_security_appliance_software:9.0.4.33</product>
<product>adaptive_security_appliance_software:9.0.4.35</product>
<product>adaptive_security_appliance_software:9.0.4.37</product>
<product>adaptive_security_appliance_software:9.1.1</product>
<product>adaptive_security_appliance_software:9.1.1.4</product>
<product>adaptive_security_appliance_software:9.1.2</product>
<product>adaptive_security_appliance_software:9.1.2.8</product>
<product>adaptive_security_appliance_software:9.1.3</product>
<product>adaptive_security_appliance_software:9.1.3.2</product>
<product>adaptive_security_appliance_software:9.1.4</product>
<product>adaptive_security_appliance_software:9.1.4.5</product>
<product>adaptive_security_appliance_software:9.1.5</product>
<product>adaptive_security_appliance_software:9.1.5.10</product>
<product>adaptive_security_appliance_software:9.1.5.12</product>
<product>adaptive_security_appliance_software:9.1.5.15</product>
<product>adaptive_security_appliance_software:9.1.5.21</product>
<product>adaptive_security_appliance_software:9.1.6</product>
<product>adaptive_security_appliance_software:9.1.6.1</product>
<product>adaptive_security_appliance_software:9.1.6.4</product>
<product>adaptive_security_appliance_software:9.1.6.6</product>
<product>adaptive_security_appliance_software:9.1.6.8</product>
<product>adaptive_security_appliance_software:9.1.6.10</product>
<product>adaptive_security_appliance_software:9.1.7.4</product>
<product>adaptive_security_appliance_software:9.2%280.0%29</product>
<product>adaptive_security_appliance_software:9.2%280.104%29</product>
<product>adaptive_security_appliance_software:9.2%283.1%29</product>
<product>adaptive_security_appliance_software:9.2.1</product>
<product>adaptive_security_appliance_software:9.2.2</product>
<product>adaptive_security_appliance_software:9.2.2.4</product>
<product>adaptive_security_appliance_software:9.2.2.7</product>
<product>adaptive_security_appliance_software:9.2.2.8</product>
<product>adaptive_security_appliance_software:9.2.3</product>
<product>adaptive_security_appliance_software:9.2.3.3</product>
<product>adaptive_security_appliance_software:9.2.3.4</product>
<product>adaptive_security_appliance_software:9.2.4</product>
<product>adaptive_security_appliance_software:9.2.4.2</product>
<product>adaptive_security_appliance_software:9.2.4.4</product>
<product>adaptive_security_appliance_software:9.3%281.50%29</product>
<product>adaptive_security_appliance_software:9.3%281.105%29</product>
<product>adaptive_security_appliance_software:9.3%282.100%29</product>
<product>adaptive_security_appliance_software:9.3%282.243%29</product>
<product>adaptive_security_appliance_software:9.3.1</product>
<product>adaptive_security_appliance_software:9.3.1.1</product>
<product>adaptive_security_appliance_software:9.3.2</product>
<product>adaptive_security_appliance_software:9.3.2.2</product>
<product>adaptive_security_appliance_software:9.3.3</product>
<product>adaptive_security_appliance_software:9.3.3.1</product>
<product>adaptive_security_appliance_software:9.3.3.2</product>
<product>adaptive_security_appliance_software:9.3.3.5</product>
<product>adaptive_security_appliance_software:9.3.3.6</product>
<product>adaptive_security_appliance_software:9.3.5</product>
<product>adaptive_security_appliance_software:9.4.0.115</product>
<product>adaptive_security_appliance_software:9.4.1</product>
<product>adaptive_security_appliance_software:9.4.1.1</product>
<product>adaptive_security_appliance_software:9.4.1.2</product>
<product>adaptive_security_appliance_software:9.4.1.3</product>
<product>adaptive_security_appliance_software:9.4.1.5</product>
<product>adaptive_security_appliance_software:9.4.2</product>
<product>adaptive_security_appliance_software:9.4.2.3</product>
<product>adaptive_security_appliance_software:9.5.1</product>
<product>adaptive_security_appliance_software:9.5.2</product>
<product>adaptive_security_appliance_software:9.6.0</product>
<product>adaptive_security_appliance_software:9.6.1</product>
</cve>
<cve id="CVE-2016-8652" level="MEDIUM">
<product>dovecot:2.2.27</product>
</cve>
<cve id="CVE-2016-0468" level="MEDIUM">
<product>business_intelligence:11.1.1.7.0</product>
<product>business_intelligence:11.1.1.9.0</product>
<product>business_intelligence:12.2.1.0.0</product>
</cve>
<cve id="CVE-2016-8656" level="LOW">
<product>jboss_enterprise_application_platform:5.0.0</product>
<product>jboss_enterprise_application_platform:6.0.0</product>
<product>jboss_enterprise_application_platform:6.4.0</product>
<product>jboss_enterprise_application_platform:7.0.0</product>
<product>jboss_enterprise_application_platform:7.1.0</product>
</cve>
<cve id="CVE-2016-0464" level="MEDIUM">
<product>fusion_middleware:10.3.6</product>
<product>fusion_middleware:12.1.2.0</product>
<product>fusion_middleware:12.1.3.0</product>
</cve>
<cve id="CVE-2016-0465" level="LOW">
<product>oracle_and_sun_systems_product_suite:3.3</product>
<product>oracle_and_sun_systems_product_suite:4.0</product>
</cve>
<cve id="CVE-2016-8659" level="MEDIUM">
<product>bubblewrap:0.1.1</product>
</cve>
<cve id="CVE-2016-7300" level="LOW">
<product>auto_updater_for_mac:-</product>
</cve>
<cve id="CVE-2016-0462" level="LOW">
<product>peoplesoft_enterprise_peopletools:8.53</product>
<product>peoplesoft_enterprise_peopletools:8.54</product>
</cve>
<cve id="CVE-2016-0463" level="MEDIUM">
<product>peoplesoft_enterprise_peopletools:8.53</product>
<product>peoplesoft_enterprise_peopletools:8.54</product>
<product>peoplesoft_enterprise_peopletools:8.55</product>
</cve>
<cve id="CVE-2016-4309" level="HIGH">
<product>symphony_cms:2.6.7</product>
</cve>
<cve id="CVE-2016-1228" level="MEDIUM">
<product>pr-400mi:-</product>
<product>pr-400mi_firmware:07.00.1006</product>
<product>rt-400mi_firmware:07.00.1006</product>
<product>rv-440mi_firmware:07.00.1006</product>
<product>pr-400mi_firmware:07.00.1005</product>
<product>rt-400mi_firmware:07.00.1005</product>
<product>rv-440mi_firmware:07.00.1005</product>
</cve>
<cve id="CVE-2016-4301" level="MEDIUM">
<product>libarchive:3.2.0</product>
</cve>
<cve id="CVE-2016-3159" level="LOW">
<product>fedora:22</product>
<product>fedora:23</product>
<product>vm_server:3.3</product>
<product>vm_server:3.4</product>
<product>xen:4.3.4</product>
<product>xen:4.4.4</product>
<product>xen:4.5.3</product>
<product>xen:4.6.1</product>
</cve>
<cve id="CVE-2016-4303" level="LOW">
<product>iperf:3.0.11</product>
<product>iperf:3.1.2</product>
<product>suse_package_hub_for_suse_linux_enterprise:12</product>
<product>leap:42.1</product>
<product>opensuse:13.2</product>
</cve>
<cve id="CVE-2016-1222" level="MEDIUM">
<product>php-contact-form:20151231</product>
</cve>
<cve id="CVE-2016-4305" level="LOW">
<product>internet_security:16.0.0</product>
</cve>
<cve id="CVE-2016-4304" level="LOW">
<product>internet_security:16.0.0</product>
</cve>
<cve id="CVE-2016-4307" level="LOW">
<product>internet_security:16.0.0</product>
</cve>
<cve id="CVE-2016-4306" level="LOW">
<product>total_security:16.0.0.614</product>
</cve>
<cve id="CVE-2016-3519" level="MEDIUM">
<product>agile_product_lifecycle_management_framework:9.3.4</product>
<product>agile_product_lifecycle_management_framework:9.3.5</product>
</cve>
<cve id="CVE-2016-3515" level="LOW">
<product>enterprise_communications_broker:2.0.041</product>
</cve>
<cve id="CVE-2016-3514" level="LOW">
<product>enterprise_communications_broker:2.0.041</product>
</cve>
<cve id="CVE-2016-3517" level="MEDIUM">
<product>agile_product_lifecycle_management_framework:9.3.4</product>
<product>agile_product_lifecycle_management_framework:9.3.5</product>
</cve>
<cve id="CVE-2016-3516" level="LOW">
<product>enterprise_communications_broker:2.0.041</product>
</cve>
<cve id="CVE-2016-3511" level="MEDIUM">
<product>jdk:1.7.0</product>
<product>jdk:1.8.0</product>
<product>jre:1.7.0</product>
<product>jre:1.8.0</product>
</cve>
<cve id="CVE-2016-3513" level="LOW">
<product>communications_operations_monitor:3.3.92.0.0</product>
</cve>
<cve id="CVE-2016-3512" level="MEDIUM">
<product>customer_interaction_history:12.1.1</product>
<product>customer_interaction_history:12.1.2</product>
<product>customer_interaction_history:12.1.3</product>
</cve>
<cve id="CVE-2016-0798" level="LOW">
<product>openssl:1.0.1</product>
<product>openssl:1.0.1</product>
<product>openssl:1.0.1</product>
<product>openssl:1.0.1</product>
<product>openssl:1.0.1a</product>
<product>openssl:1.0.1b</product>
<product>openssl:1.0.1c</product>
<product>openssl:1.0.1d</product>
<product>openssl:1.0.1e</product>
<product>openssl:1.0.1f</product>
<product>openssl:1.0.1g</product>
<product>openssl:1.0.1h</product>
<product>openssl:1.0.1i</product>
<product>openssl:1.0.1j</product>
<product>openssl:1.0.1k</product>
<product>openssl:1.0.1l</product>
<product>openssl:1.0.1m</product>
<product>openssl:1.0.1n</product>
<product>openssl:1.0.1o</product>
<product>openssl:1.0.1p</product>
<product>openssl:1.0.1q</product>
<product>openssl:1.0.1r</product>
<product>openssl:1.0.2</product>
<product>openssl:1.0.2</product>
<product>openssl:1.0.2</product>
<product>openssl:1.0.2</product>
<product>openssl:1.0.2a</product>
<product>openssl:1.0.2b</product>
<product>openssl:1.0.2c</product>
<product>openssl:1.0.2d</product>
<product>openssl:1.0.2e</product>
<product>openssl:1.0.2f</product>
</cve>
<cve id="CVE-2016-0799" level="LOW">
<product>openssl:1.0.1</product>
<product>openssl:1.0.1</product>
<product>openssl:1.0.1</product>
<product>openssl:1.0.1</product>
<product>openssl:1.0.1a</product>
<product>openssl:1.0.1b</product>
<product>openssl:1.0.1c</product>
<product>openssl:1.0.1d</product>
<product>openssl:1.0.1e</product>
<product>openssl:1.0.1f</product>
<product>openssl:1.0.1g</product>
<product>openssl:1.0.1h</product>
<product>openssl:1.0.1i</product>
<product>openssl:1.0.1j</product>
<product>openssl:1.0.1k</product>
<product>openssl:1.0.1l</product>
<product>openssl:1.0.1m</product>
<product>openssl:1.0.1n</product>
<product>openssl:1.0.1o</product>
<product>openssl:1.0.1p</product>
<product>openssl:1.0.1q</product>
<product>openssl:1.0.1r</product>
<product>openssl:1.0.2</product>
<product>openssl:1.0.2</product>
<product>openssl:1.0.2</product>
<product>openssl:1.0.2</product>
<product>openssl:1.0.2a</product>
<product>openssl:1.0.2b</product>
<product>openssl:1.0.2c</product>
<product>openssl:1.0.2d</product>
<product>openssl:1.0.2e</product>
<product>openssl:1.0.2f</product>
<product>client:-</product>
<product>client:-</product>
<product>steel_belted_radius:-</product>
</cve>
<cve id="CVE-2016-7160" level="LOW">
<product>samsung_mobile:6.0</product>
</cve>
<cve id="CVE-2016-7161" level="LOW">
<product>qemu</product>
</cve>
<cve id="CVE-2016-0790" level="LOW">
<product>jenkins:1.642.1</product>
<product>jenkins:1.649</product>
<product>openshift:3.1</product>
</cve>
<cve id="CVE-2016-0791" level="LOW">
<product>jenkins:1.642.1</product>
<product>jenkins:1.649</product>
<product>openshift:3.1</product>
</cve>
<cve id="CVE-2016-7164" level="LOW">
<product>libtorrent:1.1</product>
</cve>
<cve id="CVE-2016-7165" level="MEDIUM">
<product>primary_setup_tool:-</product>
<product>security_configuration_tool:-</product>
<product>simatic_it_production_suite:-</product>
<product>simatic_net_pc_software:14.0</product>
<product>simatic_pcs7:8.0</product>
<product>simatic_pcs7:8.1</product>
<product>simatic_pcs7:8.2</product>
<product>simatic_pcs_7:7.1</product>
<product>simatic_step_7:5.5</product>
<product>simatic_step_7_%28tia_portal%29:14.0</product>
<product>simatic_winac_rtx_2010:-</product>
<product>simatic_winac_rtx_f_2010:-</product>
<product>simatic_wincc:7.0</product>
<product>simatic_wincc:7.0</product>
<product>simatic_wincc:7.2</product>
<product>simatic_wincc:7.3</product>
<product>simatic_wincc:7.4</product>
<product>simatic_wincc_%28tia_portal%29:-</product>
<product>simatic_wincc_%28tia_portal%29:14.0</product>
<product>simatic_wincc_%28tia_portal%29:14.0</product>
<product>simatic_wincc_%28tia_portal%29:14.0</product>
<product>simatic_wincc_runtime:-</product>
<product>simit:9.0</product>
<product>sinema_remote_connect:-</product>
<product>sinema_server:13.0</product>
<product>softnet_security_client:5.0</product>
<product>telecontrol_basic:3.0</product>
</cve>
<cve id="CVE-2016-7167" level="LOW">
<product>libcurl:7.50.2</product>
<product>fedora:23</product>
<product>fedora:24</product>
<product>fedora:25</product>
</cve>
<cve id="CVE-2016-10099" level="LOW">
<product>borg:1.0.8</product>
</cve>
<cve id="CVE-2016-10098" level="LOW">
<product>avera_sms_gateway_firmware:-</product>
<product>entera_sms_gateway_firmware:-</product>
</cve>
<cve id="CVE-2016-10095" level="MEDIUM">
<product>libtiff:4.0.7</product>
</cve>
<cve id="CVE-2016-10094" level="MEDIUM">
<product>libtiff:4.0.7</product>
</cve>
<cve id="CVE-2016-10097" level="LOW">
<product>openam:10.1.0</product>
</cve>
<cve id="CVE-2016-10096" level="LOW">
<product>genixcms:0.0.8</product>
</cve>
<cve id="CVE-2016-10091" level="LOW">
<product>unrtf:0.21.9</product>
</cve>
<cve id="CVE-2016-10093" level="MEDIUM">
<product>libtiff:4.0.7</product>
</cve>
<cve id="CVE-2016-10092" level="MEDIUM">
<product>libtiff:4.0.7</product>
</cve>
<cve id="CVE-2016-6147" level="LOW">
<product>trex:7.10</product>
</cve>
<cve id="CVE-2016-9218" level="MEDIUM">
<product>hybrid_meeting_server:1.0_base</product>
</cve>
<cve id="CVE-2016-9219" level="LOW">
<product>wireless_lan_controller_firmware:8.2.121.0</product>
<product>wireless_lan_controller_firmware:8.3.102.0</product>
</cve>
<cve id="CVE-2016-1000149" level="MEDIUM">
<product>simpel-reserveren:3.5.2</product>
</cve>
<cve id="CVE-2016-1000148" level="MEDIUM">
<product>s3-video:0.983</product>
</cve>
<cve id="CVE-2016-9748" level="LOW">
<product>rational_doors_next_generation:5.0</product>
<product>rational_doors_next_generation:5.0.0</product>
<product>rational_doors_next_generation:5.0.1</product>
<product>rational_doors_next_generation:5.0.2</product>
<product>rational_doors_next_generation:6.0.0</product>
<product>rational_doors_next_generation:6.0.1</product>
<product>rational_doors_next_generation:6.0.2</product>
<product>rational_requirements_composer:4.0.7</product>
</cve>
<cve id="CVE-2016-1000145" level="MEDIUM">
<product>pondol-carousel:1.0</product>
</cve>
<cve id="CVE-2016-9211" level="LOW">
<product>ons_15454_sdh_multiservice_platform_software:10.51.0</product>
</cve>
<cve id="CVE-2016-9212" level="LOW">
<product>web_security_appliance:9.0.1-162</product>
<product>web_security_appliance:9.1.1-074</product>
</cve>
<cve id="CVE-2016-1000146" level="MEDIUM">
<product>pondol-formmail:1.1</product>
</cve>
<cve id="CVE-2016-9214" level="MEDIUM">
<product>identity_services_engine_software:2.0%281.130%29</product>
</cve>
<cve id="CVE-2016-1000140" level="MEDIUM">
<product>new-year-firework:1.1.9</product>
</cve>
<cve id="CVE-2016-9216" level="LOW">
<product>asr_5000_series_software:20.0.0</product>
<product>asr_5000_series_software:20.0.1.0</product>
<product>asr_5000_series_software:20.0.1.a0</product>
<product>asr_5000_series_software:20.0.1.v0</product>
<product>asr_5000_series_software:20.0.m0.62842</product>
<product>asr_5000_series_software:20.0.m0.63229</product>
<product>asr_5000_series_software:20.0.v0</product>
<product>asr_5000_series_software:21.0.0</product>
</cve>
<cve id="CVE-2016-9217" level="LOW">
<product>intercloud_fabric:2.2.1_base</product>
<product>intercloud_fabric:2.3.1_base</product>
<product>intercloud_fabric:3.1.1_base</product>
</cve>
<cve id="CVE-2016-2071" level="LOW">
<product>netscaler:10.5</product>
<product>netscaler:10.5e</product>
<product>netscaler:11.0</product>
</cve>
<cve id="CVE-2016-2072" level="MEDIUM">
<product>netscaler:10.1</product>
<product>netscaler:10.5</product>
<product>netscaler:10.5e</product>
<product>netscaler:11.0</product>
</cve>
<cve id="CVE-2016-2075" level="MEDIUM">
<product>vrealize_business:8.0</product>
<product>vrealize_business:8.0.1</product>
<product>vrealize_business:8.0.2</product>
<product>vrealize_business:8.1</product>
<product>vrealize_business:8.2</product>
<product>vrealize_business:8.2.1</product>
<product>vrealize_business:8.2.2</product>
<product>vrealize_business:8.2.3</product>
<product>vrealize_business:8.2.4</product>
</cve>
<cve id="CVE-2016-2074" level="LOW">
<product>openvswitch:2.2.0</product>
<product>openvswitch:2.3.0</product>
<product>openvswitch:2.3.1</product>
<product>openvswitch:2.3.2</product>
<product>openvswitch:2.4.0</product>
<product>openshift:3.1</product>
</cve>
<cve id="CVE-2016-2077" level="LOW">
<product>player:7.0</product>
<product>player:7.1</product>
<product>player:7.1.1</product>
<product>player:7.1.2</product>
<product>workstation:11.0</product>
<product>workstation:11.1</product>
<product>workstation:11.1.1</product>
<product>workstation:11.1.2</product>
</cve>
<cve id="CVE-2016-2076" level="MEDIUM">
<product>vcenter_server:5.5</product>
<product>vcenter_server:5.5</product>
<product>vcenter_server:5.5</product>
<product>vcenter_server:6.0</product>
<product>vcloud_automation_identity_appliance:6.2.4</product>
<product>vcloud_director:5.5.5</product>
</cve>
<cve id="CVE-2016-2079" level="MEDIUM">
<product>nsx_edge:6.1.0</product>
<product>nsx_edge:6.1.1</product>
<product>nsx_edge:6.1.2</product>
<product>nsx_edge:6.1.4</product>
<product>nsx_edge:6.1.5</product>
<product>nsx_edge:6.1.6</product>
<product>nsx_edge:6.2.0</product>
<product>nsx_edge:6.2.1</product>
<product>nsx_edge:6.2.2</product>
<product>vcloud_networking_and_security_edge:5.5.0</product>
<product>vcloud_networking_and_security_edge:5.5.2.1</product>
<product>vcloud_networking_and_security_edge:5.5.3</product>
<product>vcloud_networking_and_security_edge:5.5.3.1</product>
<product>vcloud_networking_and_security_edge:5.5.4</product>
<product>vcloud_networking_and_security_edge:5.5.4.1</product>
<product>vcloud_networking_and_security_edge:5.5.4.2</product>
</cve>
<cve id="CVE-2016-2078" level="MEDIUM">
<product>vcenter_server:5.0</product>
<product>vcenter_server:5.1</product>
<product>vcenter_server:5.5</product>
<product>vcenter_server:6.0</product>
</cve>
<cve id="CVE-2016-6798" level="LOW">
<product>sling:1.0.10</product>
</cve>
<cve id="CVE-2016-6799" level="LOW">
<product>cordova:5.2.2</product>
</cve>
<cve id="CVE-2016-6829" level="LOW">
<product>barclamp-trove:-</product>
<product>crowbar-openstack:-</product>
</cve>
<cve id="CVE-2016-6823" level="LOW">
<product>imagemagick:7.0.2-9</product>
</cve>
<cve id="CVE-2016-6820" level="LOW">
<product>metrocluster_tiebreaker:1.1</product>
</cve>
<cve id="CVE-2016-6793" level="LOW">
<product>wicket:1.5.0</product>
<product>wicket:1.5.1</product>
<product>wicket:1.5.2</product>
<product>wicket:1.5.3</product>
<product>wicket:1.5.4</product>
<product>wicket:1.5.5</product>
<product>wicket:1.5.6</product>
<product>wicket:6.0.0</product>
<product>wicket:6.1.0</product>
<product>wicket:6.2.0</product>
<product>wicket:6.3.0</product>
<product>wicket:6.4.0</product>
<product>wicket:6.5.0</product>
<product>wicket:6.6.0</product>
<product>wicket:6.7.0</product>
<product>wicket:6.8.0</product>
<product>wicket:6.9.0</product>
<product>wicket:6.10.0</product>
<product>wicket:6.11.0</product>
<product>wicket:6.12.0</product>
<product>wicket:6.13.0</product>
<product>wicket:6.14.0</product>
<product>wicket:6.15.0</product>
<product>wicket:6.16.0</product>
<product>wicket:6.17.0</product>
<product>wicket:6.18.0</product>
<product>wicket:6.19.0</product>
<product>wicket:6.20.0</product>
<product>wicket:6.21.0</product>
<product>wicket:6.22.0</product>
<product>wicket:6.23.0</product>
<product>wicket:6.24.0</product>
</cve>
<cve id="CVE-2016-6826" level="MEDIUM">
<product>anyoffice_secureapp:2.5.0301.0190</product>
<product>anyoffice_secureapp:2.5.0501.0190</product>
</cve>
<cve id="CVE-2016-6827" level="LOW">
<product>fusioncompute:v100r003c10</product>
</cve>
<cve id="CVE-2016-6824" level="LOW">
<product>ac6003_firmware:v200r005c10</product>
<product>ac6003_firmware:v200r006c00</product>
<product>ac6005_firmware:v200r005c10</product>
<product>ac6005_firmware:v200r006c00</product>
<product>ac6605_firmware:v200r005c10</product>
<product>ac6605_firmware:v200r006c00</product>
<product>acu2_firmware:v200r005c10</product>
<product>acu2_firmware:v200r006c00</product>
</cve>
<cve id="CVE-2016-6825" level="LOW">
<product>rh1288_v3_server_firmware:v100r003c00</product>
<product>rh2288_v3_server_firmware:v100r003c00</product>
<product>rh2288h_v3_server_firmware:v100r003c00</product>
<product>xh620_v3_server_firmware:v100r003c00</product>
<product>xh622_v3_server_firmware:v100r003c00</product>
<product>xh628_v3_server_firmware:v100r003c00</product>
</cve>
<cve id="CVE-2016-3670" level="MEDIUM">
<product>liferay_portal:6.2</product>
</cve>
<cve id="CVE-2016-6175" level="LOW">
<product>php-gettext:1.0.12</product>
</cve>
<cve id="CVE-2016-6177" level="LOW">
<product>oceanstor_5800_v3_firmware:v300r003c00</product>
</cve>
<cve id="CVE-2016-6170" level="LOW">
<product>bind:9.0</product>
<product>bind:9.0.0</product>
<product>bind:9.0.0</product>
<product>bind:9.0.0</product>
<product>bind:9.0.0</product>
<product>bind:9.0.0</product>
<product>bind:9.0.0</product>
<product>bind:9.0.1</product>
<product>bind:9.0.1</product>
<product>bind:9.0.1</product>
<product>bind:9.1</product>
<product>bind:9.1.0</product>
<product>bind:9.1.1</product>
<product>bind:9.1.1</product>
<product>bind:9.1.1</product>
<product>bind:9.1.1</product>
<product>bind:9.1.1</product>
<product>bind:9.1.1</product>
<product>bind:9.1.1</product>
<product>bind:9.1.1</product>
<product>bind:9.1.2</product>
<product>bind:9.1.2</product>
<product>bind:9.1.3</product>
<product>bind:9.1.3</product>
<product>bind:9.1.3</product>
<product>bind:9.1.3</product>
<product>bind:9.2</product>
<product>bind:9.2.0</product>
<product>bind:9.2.0</product>
<product>bind:9.2.0</product>
<product>bind:9.2.0</product>
<product>bind:9.2.0</product>
<product>bind:9.2.0</product>
<product>bind:9.2.0</product>
<product>bind:9.2.0</product>
<product>bind:9.2.0</product>
<product>bind:9.2.0</product>
<product>bind:9.2.0</product>
<product>bind:9.2.0</product>
<product>bind:9.2.0</product>
<product>bind:9.2.0</product>
<product>bind:9.2.0</product>
<product>bind:9.2.0</product>
<product>bind:9.2.1</product>
<product>bind:9.2.1</product>
<product>bind:9.2.1</product>
<product>bind:9.2.2</product>
<product>bind:9.2.2</product>
<product>bind:9.2.2</product>
<product>bind:9.2.2</product>
<product>bind:9.2.3</product>
<product>bind:9.2.3</product>
<product>bind:9.2.3</product>
<product>bind:9.2.3</product>
<product>bind:9.2.3</product>
<product>bind:9.2.4</product>
<product>bind:9.2.4</product>
<product>bind:9.2.4</product>
<product>bind:9.2.4</product>
<product>bind:9.2.4</product>
<product>bind:9.2.4</product>
<product>bind:9.2.4</product>
<product>bind:9.2.4</product>
<product>bind:9.2.5</product>
<product>bind:9.2.5</product>
<product>bind:9.2.5</product>
<product>bind:9.2.6</product>
<product>bind:9.2.6</product>
<product>bind:9.2.7</product>
<product>bind:9.2.7</product>
<product>bind:9.2.7</product>
<product>bind:9.2.7</product>
<product>bind:9.2.8</product>
<product>bind:9.2.9</product>
<product>bind:9.2.9</product>
<product>bind:9.3</product>
<product>bind:9.3.0</product>
<product>bind:9.3.0</product>
<product>bind:9.3.0</product>
<product>bind:9.3.0</product>
<product>bind:9.3.0</product>
<product>bind:9.3.0</product>
<product>bind:9.3.0</product>
<product>bind:9.3.0</product>
<product>bind:9.3.1</product>
<product>bind:9.3.1</product>
<product>bind:9.3.1</product>
<product>bind:9.3.2</product>
<product>bind:9.3.2</product>
<product>bind:9.3.3</product>
<product>bind:9.3.3</product>
<product>bind:9.3.3</product>
<product>bind:9.3.3</product>
<product>bind:9.3.4</product>
<product>bind:9.3.5</product>
<product>bind:9.3.5</product>
<product>bind:9.3.5</product>
<product>bind:9.3.5</product>
<product>bind:9.3.6</product>
<product>bind:9.3.6</product>
<product>bind:9.4</product>
<product>bind:9.4</product>
<product>bind:9.4</product>
<product>bind:9.4</product>
<product>bind:9.4</product>
<product>bind:9.4</product>
<product>bind:9.4</product>
<product>bind:9.4</product>
<product>bind:9.4</product>
<product>bind:9.4</product>
<product>bind:9.4</product>
<product>bind:9.4</product>
<product>bind:9.4.0</product>
<product>bind:9.4.0</product>
<product>bind:9.4.0</product>
<product>bind:9.4.0</product>
<product>bind:9.4.0</product>
<product>bind:9.4.0</product>
<product>bind:9.4.0</product>
<product>bind:9.4.0</product>
<product>bind:9.4.0</product>
<product>bind:9.4.0</product>
<product>bind:9.4.0</product>
<product>bind:9.4.0</product>
<product>bind:9.4.0</product>
<product>bind:9.4.1</product>
<product>bind:9.4.2</product>
<product>bind:9.4.2</product>
<product>bind:9.4.2</product>
<product>bind:9.4.2</product>
<product>bind:9.4.3</product>
<product>bind:9.4.3</product>
<product>bind:9.4.3</product>
<product>bind:9.4.3</product>
<product>bind:9.4.3</product>
<product>bind:9.4.3</product>
<product>bind:9.4.3</product>
<product>bind:9.4.3</product>
<product>bind:9.4.3</product>
<product>bind:9.4.3</product>
<product>bind:9.5</product>
<product>bind:9.5.0</product>
<product>bind:9.5.0</product>
<product>bind:9.5.0</product>
<product>bind:9.5.0</product>
<product>bind:9.5.0</product>
<product>bind:9.5.0</product>
<product>bind:9.5.0</product>
<product>bind:9.5.0</product>
<product>bind:9.5.0</product>
<product>bind:9.5.0</product>
<product>bind:9.5.0</product>
<product>bind:9.5.0</product>
<product>bind:9.5.0</product>
<product>bind:9.5.0</product>
<product>bind:9.5.0</product>
<product>bind:9.5.0</product>
<product>bind:9.5.1</product>
<product>bind:9.5.1</product>
<product>bind:9.5.1</product>
<product>bind:9.5.1</product>
<product>bind:9.5.1</product>
<product>bind:9.5.1</product>
<product>bind:9.5.2</product>
<product>bind:9.5.2</product>
<product>bind:9.5.2</product>
<product>bind:9.5.2</product>
<product>bind:9.5.2</product>
<product>bind:9.5.2</product>
<product>bind:9.5.2</product>
<product>bind:9.5.3</product>
<product>bind:9.5.3</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6.0</product>
<product>bind:9.6.0</product>
<product>bind:9.6.0</product>
<product>bind:9.6.0</product>
<product>bind:9.6.0</product>
<product>bind:9.6.0</product>
<product>bind:9.6.1</product>
<product>bind:9.6.1</product>
<product>bind:9.6.1</product>
<product>bind:9.6.1</product>
<product>bind:9.6.1</product>
<product>bind:9.6.1</product>
<product>bind:9.6.2</product>
<product>bind:9.6.2</product>
<product>bind:9.6.2</product>
<product>bind:9.6.2</product>
<product>bind:9.6.2</product>
<product>bind:9.6.2</product>
<product>bind:9.6.3</product>
<product>bind:9.6.3</product>
<product>bind:9.6.3</product>
<product>bind:9.7.0</product>
<product>bind:9.7.0</product>
<product>bind:9.7.0</product>
<product>bind:9.7.0</product>
<product>bind:9.7.0</product>
<product>bind:9.7.0</product>
<product>bind:9.7.0</product>
<product>bind:9.7.0</product>
<product>bind:9.7.0</product>
<product>bind:9.7.0</product>
<product>bind:9.7.0</product>
<product>bind:9.7.1</product>
<product>bind:9.7.1</product>
<product>bind:9.7.1</product>
<product>bind:9.7.1</product>
<product>bind:9.7.1</product>
<product>bind:9.7.2</product>
<product>bind:9.7.2</product>
<product>bind:9.7.2</product>
<product>bind:9.7.2</product>
<product>bind:9.7.2</product>
<product>bind:9.7.3</product>
<product>bind:9.7.3</product>
<product>bind:9.7.3</product>
<product>bind:9.7.3</product>
<product>bind:9.7.4</product>
<product>bind:9.7.4</product>
<product>bind:9.7.4</product>
<product>bind:9.7.4</product>
<product>bind:9.7.5</product>
<product>bind:9.7.5</product>
<product>bind:9.7.5</product>
<product>bind:9.7.5</product>
<product>bind:9.7.6</product>
<product>bind:9.7.6</product>
<product>bind:9.7.6</product>
<product>bind:9.7.6</product>
<product>bind:9.7.6</product>
<product>bind:9.7.7</product>
<product>bind:9.8.0</product>
<product>bind:9.8.0</product>
<product>bind:9.8.0</product>
<product>bind:9.8.0</product>
<product>bind:9.8.0</product>
<product>bind:9.8.0</product>
<product>bind:9.8.0</product>
<product>bind:9.8.1</product>
<product>bind:9.8.1</product>
<product>bind:9.8.1</product>
<product>bind:9.8.1</product>
<product>bind:9.8.1</product>
<product>bind:9.8.1</product>
<product>bind:9.8.2</product>
<product>bind:9.8.2</product>
<product>bind:9.8.2</product>
<product>bind:9.8.2</product>
<product>bind:9.8.3</product>
<product>bind:9.8.3</product>
<product>bind:9.8.3</product>
<product>bind:9.8.3</product>
<product>bind:9.8.3</product>
<product>bind:9.8.4</product>
<product>bind:9.8.5</product>
<product>bind:9.8.5</product>
<product>bind:9.8.5</product>
<product>bind:9.8.5</product>
<product>bind:9.8.5</product>
<product>bind:9.8.5</product>
<product>bind:9.8.5</product>
<product>bind:9.8.6</product>
<product>bind:9.8.6</product>
<product>bind:9.8.6</product>
<product>bind:9.9.0</product>
<product>bind:9.9.0</product>
<product>bind:9.9.0</product>
<product>bind:9.9.0</product>
<product>bind:9.9.0</product>
<product>bind:9.9.0</product>
<product>bind:9.9.0</product>
<product>bind:9.9.0</product>
<product>bind:9.9.0</product>
<product>bind:9.9.0</product>
<product>bind:9.9.1</product>
<product>bind:9.9.1</product>
<product>bind:9.9.1</product>
<product>bind:9.9.1</product>
<product>bind:9.9.1</product>
<product>bind:9.9.2</product>
<product>bind:9.9.3</product>
<product>bind:9.9.3</product>
<product>bind:9.9.3</product>
<product>bind:9.9.3</product>
<product>bind:9.9.3</product>
<product>bind:9.9.3</product>
<product>bind:9.9.3</product>
<product>bind:9.9.4</product>
<product>bind:9.9.5</product>
<product>bind:9.9.6</product>
<product>bind:9.9.6</product>
<product>bind:9.9.7</product>
<product>bind:9.9.7</product>
<product>bind:9.9.7</product>
<product>bind:9.9.7</product>
<product>bind:9.9.8</product>
<product>bind:9.9.8</product>
<product>bind:9.9.8</product>
<product>bind:9.9.8</product>
<product>bind:9.9.8</product>
<product>bind:9.9.8</product>
<product>bind:9.9.8</product>
<product>bind:9.9.8</product>
<product>bind:9.10.0</product>
<product>bind:9.10.0</product>
<product>bind:9.10.0</product>
<product>bind:9.10.0</product>
<product>bind:9.10.0</product>
<product>bind:9.10.0</product>
<product>bind:9.10.0</product>
<product>bind:9.10.0</product>
<product>bind:9.10.0</product>
<product>bind:9.10.1</product>
<product>bind:9.10.1</product>
<product>bind:9.10.1</product>
<product>bind:9.10.1</product>
<product>bind:9.10.1</product>
<product>bind:9.10.1</product>
<product>bind:9.10.1</product>
<product>bind:9.10.2</product>
<product>bind:9.10.2</product>
<product>bind:9.10.2</product>
<product>bind:9.10.2</product>
<product>bind:9.10.2</product>
<product>bind:9.10.2</product>
<product>bind:9.10.2</product>
<product>bind:9.10.3</product>
<product>bind:9.10.3</product>
<product>bind:9.10.3</product>
<product>bind:9.10.3</product>
<product>bind:9.10.3</product>
<product>bind:9.10.3</product>
<product>bind:9.10.4</product>
<product>bind:9.10.4</product>
<product>bind:9.11.0</product>
<product>bind:9.11.0</product>
<product>bind:9.11.0</product>
<product>bind:9.11.0</product>
</cve>
<cve id="CVE-2016-6171" level="LOW">
<product>knot_dns:2.2.1</product>
</cve>
<cve id="CVE-2016-6172" level="MEDIUM">
<product>authoritative_server:4.0.0</product>
<product>leap:42.1</product>
<product>opensuse:13.2</product>
</cve>
<cve id="CVE-2016-6173" level="LOW">
<product>nsd:4.1.10</product>
</cve>
<cve id="CVE-2016-3678" level="LOW">
<product>s5300_firmware:v200r003c00spc500</product>
<product>s5700_firmware:v200r003c00spc500</product>
<product>s7700_firmware:v200r003c00spc500</product>
<product>s9300_firmware:v200r003c00spc500</product>
<product>s9700_firmware:v200r003c00spc500</product>
</cve>
<cve id="CVE-2016-6178" level="LOW">
<product>cloudengine_12800_firmware:v100r003c00</product>
<product>cloudengine_12800_firmware:v100r003c10</product>
<product>cloudengine_12800_firmware:v100r005c00</product>
<product>cloudengine_12800_firmware:v100r005c10</product>
<product>cx600_firmware:v600r008c20</product>
<product>cx600_firmware:v800r006c00</product>
<product>cx600_firmware:v800r006c20</product>
<product>cx600_firmware:v800r007c00</product>
<product>ne40e_firmware:v600r008c20</product>
<product>ne40e_firmware:v800r006c00</product>
<product>ne40e_firmware:v800r006c20</product>
<product>ne40e_firmware:v800r006c30</product>
<product>ne40e_firmware:v800r007c00</product>
<product>ne5000e_firmware:v800r006c00</product>
<product>ptn_6900-2-m8_firmware:v800r007c00</product>
</cve>
<cve id="CVE-2016-6179" level="MEDIUM">
<product>honor_6_firmware:h60-l01c00b850</product>
<product>honor_6_firmware:h60-l02c00b850</product>
<product>honor_6_firmware:h60-l03c01b850</product>
<product>honor_6_firmware:h60-l11c00b850</product>
<product>honor_6_firmware:h60-l12c00b850</product>
<product>honor_6_firmware:h60-l21c00b850</product>
</cve>
<cve id="CVE-2016-0323" level="LOW">
<product>bluemix:-</product>
</cve>
<cve id="CVE-2016-0322" level="MEDIUM">
<product>connections:4.0.0.0</product>
<product>connections:4.5.0.0</product>
<product>connections:5.0.0.0</product>
<product>connections:5.5.0.0</product>
</cve>
<cve id="CVE-2016-0321" level="LOW">
<product>personal_communications:6.0.0</product>
<product>personal_communications:6.0.1</product>
<product>personal_communications:6.0.2</product>
<product>personal_communications:6.0.3</product>
<product>personal_communications:6.0.4</product>
<product>personal_communications:6.0.5</product>
<product>personal_communications:6.0.6</product>
<product>personal_communications:6.0.7</product>
<product>personal_communications:6.0.8</product>
<product>personal_communications:6.0.9</product>
<product>personal_communications:6.0.10</product>
<product>personal_communications:6.0.11</product>
<product>personal_communications:6.0.12</product>
<product>personal_communications:6.0.13</product>
<product>personal_communications:6.0.14</product>
<product>personal_communications:6.0.15</product>
<product>personal_communications:6.0.16</product>
<product>personal_communications:12.0.0</product>
</cve>
<cve id="CVE-2016-0320" level="LOW">
<product>urbancode_deploy:6.0</product>
<product>urbancode_deploy:6.0.1</product>
<product>urbancode_deploy:6.0.1.1</product>
<product>urbancode_deploy:6.0.1.2</product>
<product>urbancode_deploy:6.0.1.3</product>
<product>urbancode_deploy:6.0.1.4</product>
<product>urbancode_deploy:6.0.1.5</product>
<product>urbancode_deploy:6.0.1.6</product>
<product>urbancode_deploy:6.0.1.7</product>
<product>urbancode_deploy:6.0.1.8</product>
<product>urbancode_deploy:6.0.1.9</product>
<product>urbancode_deploy:6.0.1.10</product>
<product>urbancode_deploy:6.0.1.11</product>
<product>urbancode_deploy:6.0.1.12</product>
<product>urbancode_deploy:6.0.1.13</product>
<product>urbancode_deploy:6.0.1.14</product>
<product>urbancode_deploy:6.1</product>
<product>urbancode_deploy:6.1.0.1</product>
<product>urbancode_deploy:6.1.0.2</product>
<product>urbancode_deploy:6.1.0.3</product>
<product>urbancode_deploy:6.1.0.4</product>
<product>urbancode_deploy:6.1.1</product>
<product>urbancode_deploy:6.1.1.1</product>
<product>urbancode_deploy:6.1.1.2</product>
<product>urbancode_deploy:6.1.1.3</product>
<product>urbancode_deploy:6.1.1.4</product>
<product>urbancode_deploy:6.1.1.5</product>
<product>urbancode_deploy:6.1.1.6</product>
<product>urbancode_deploy:6.1.1.7</product>
<product>urbancode_deploy:6.1.1.8</product>
<product>urbancode_deploy:6.1.2</product>
<product>urbancode_deploy:6.1.3</product>
<product>urbancode_deploy:6.1.3.1</product>
<product>urbancode_deploy:6.1.3.2</product>
<product>urbancode_deploy:6.1.3.3</product>
<product>urbancode_deploy:6.2.0.0</product>
<product>urbancode_deploy:6.2.0.1</product>
<product>urbancode_deploy:6.2.0.2</product>
<product>urbancode_deploy:6.2.1</product>
<product>urbancode_deploy:6.2.1.1</product>
<product>urbancode_deploy:6.2.2</product>
<product>urbancode_deploy:6.2.2.1</product>
</cve>
<cve id="CVE-2016-0635" level="LOW">
<product>documaker:12.5</product>
<product>enterprise_manager_ops_center:12.1.4</product>
<product>enterprise_manager_ops_center:12.2.2</product>
<product>enterprise_manager_ops_center:12.3.2</product>
<product>health_sciences_information_manager:1.2.8.3</product>
<product>health_sciences_information_manager:2.0.2.3</product>
<product>health_sciences_information_manager:3.0.1.0</product>
<product>healthcare_master_person_index:2.0.12</product>
<product>healthcare_master_person_index:3.0.0</product>
<product>healthcare_master_person_index:4.0.1</product>
<product>insurance_calculation_engine:9.7.1</product>
<product>insurance_calculation_engine:10.1.2</product>
<product>insurance_calculation_engine:10.2.2</product>
<product>insurance_policy_administration_j2ee:9.6.1</product>
<product>insurance_policy_administration_j2ee:9.7.1</product>
<product>insurance_policy_administration_j2ee:10.0.1</product>
<product>insurance_policy_administration_j2ee:10.1.2</product>
<product>insurance_policy_administration_j2ee:10.2.0</product>
<product>insurance_policy_administration_j2ee:10.2.2</product>
<product>insurance_rules_palette:9.6.1</product>
<product>insurance_rules_palette:9.7.1</product>
<product>insurance_rules_palette:10.0.1</product>
<product>insurance_rules_palette:10.1.2</product>
<product>insurance_rules_palette:10.2.0</product>
<product>insurance_rules_palette:10.2.2</product>
<product>primavera_contract_management:14.2</product>
<product>primavera_p6_enterprise_project_portfolio_management:8.2</product>
<product>primavera_p6_enterprise_project_portfolio_management:8.3</product>
<product>primavera_p6_enterprise_project_portfolio_management:8.4</product>
<product>primavera_p6_enterprise_project_portfolio_management:15.1</product>
<product>primavera_p6_enterprise_project_portfolio_management:15.2</product>
<product>primavera_p6_enterprise_project_portfolio_management:16.1</product>
<product>retail_integration_bus:15.0</product>
<product>retail_order_broker_cloud_service:5.1</product>
<product>retail_order_broker_cloud_service:5.2</product>
<product>retail_order_broker_cloud_service:15.0</product>
</cve>
<cve id="CVE-2016-0634" level="MEDIUM">
<product>bash:4.3</product>
</cve>
<cve id="CVE-2016-0325" level="LOW">
<product>rational_team_concert:3.0.1.6</product>
<product>rational_team_concert:4.0.0</product>
<product>rational_team_concert:4.0.1</product>
<product>rational_team_concert:4.0.2</product>
<product>rational_team_concert:4.0.3</product>
<product>rational_team_concert:4.0.4</product>
<product>rational_team_concert:4.0.5</product>
<product>rational_team_concert:4.0.6</product>
<product>rational_team_concert:4.0.7</product>
<product>rational_team_concert:5.0.0</product>
<product>rational_team_concert:5.0.1</product>
<product>rational_team_concert:5.0.2</product>
<product>rational_team_concert:6.0.0</product>
<product>rational_team_concert:6.0.1</product>
<product>rational_team_concert:6.0.2</product>
</cve>
<cve id="CVE-2016-0324" level="LOW">
<product>security_identity_manager_virtual_appliance:7.0.0.0</product>
<product>security_identity_manager_virtual_appliance:7.0.0.1</product>
<product>security_identity_manager_virtual_appliance:7.0.0.2</product>
<product>security_identity_manager_virtual_appliance:7.0.0.3</product>
<product>security_identity_manager_virtual_appliance:7.0.1.0</product>
</cve>
<cve id="CVE-2016-0329" level="MEDIUM">
<product>emptoris_sourcing:10.0.2.0</product>
<product>emptoris_sourcing:10.0.2.2</product>
<product>emptoris_sourcing:10.0.2.3</product>
<product>emptoris_sourcing:10.0.2.5</product>
<product>emptoris_sourcing:10.0.2.6</product>
<product>emptoris_sourcing:10.0.2.7</product>
<product>emptoris_sourcing:10.0.4.0</product>
</cve>
<cve id="CVE-2016-0328" level="LOW">
<product>security_guardium_database_activity_monitor:8.2</product>
<product>security_guardium_database_activity_monitor:9.0</product>
<product>security_guardium_database_activity_monitor:9.1</product>
<product>security_guardium_database_activity_monitor:9.5</product>
<product>security_guardium_database_activity_monitor:10.0</product>
<product>security_guardium_database_activity_monitor:10.1</product>
</cve>
<cve id="CVE-2016-9913" level="LOW">
<product>qemu</product>
</cve>
<cve id="CVE-2016-9912" level="LOW">
<product>qemu:-</product>
</cve>
<cve id="CVE-2016-9911" level="LOW">
<product>qemu:-</product>
</cve>
<cve id="CVE-2016-9910" level="MEDIUM">
<product>html5lib:0.99999999</product>
</cve>
<cve id="CVE-2016-9917" level="LOW">
<product>bluez:5.42</product>
</cve>
<cve id="CVE-2016-9916" level="LOW">
<product>qemu</product>
</cve>
<cve id="CVE-2016-9915" level="LOW">
<product>qemu</product>
</cve>
<cve id="CVE-2016-9914" level="LOW">
<product>qemu</product>
</cve>
<cve id="CVE-2016-9918" level="LOW">
<product>bluez:5.42</product>
</cve>
<cve id="CVE-2016-10246" level="MEDIUM">
<product>mupdf:1.10</product>
</cve>
<cve id="CVE-2016-10247" level="MEDIUM">
<product>mupdf:1.10</product>
</cve>
<cve id="CVE-2016-10248" level="LOW">
<product>jasper:1.900.8</product>
</cve>
<cve id="CVE-2016-10249" level="MEDIUM">
<product>jasper:1.900.11</product>
</cve>
<cve id="CVE-2016-8352" level="LOW">
<product>connexium_firmware:-</product>
</cve>
<cve id="CVE-2016-8353" level="LOW">
<product>pi_web_api_2015_r2:1.5.1</product>
</cve>
<cve id="CVE-2016-8350" level="MEDIUM">
<product>e1200_series_firmware:2.3</product>
<product>e1200_series_firmware:2.4</product>
<product>e1200_series_firmware:2.5</product>
<product>e2200_series_firmware:3.11</product>
<product>e2200_series_firmware:3.12</product>
<product>e2200_series_firmware:3.13</product>
</cve>
<cve id="CVE-2016-8356" level="MEDIUM">
<product>webdatorcentral:-</product>
</cve>
<cve id="CVE-2016-8357" level="LOW">
<product>jenesys_bas_bridge:1.1.8</product>
</cve>
<cve id="CVE-2016-8354" level="HIGH">
<product>unity_pro:11.0</product>
</cve>
<cve id="CVE-2016-8355" level="LOW">
<product>cadd-solis_medication_safety_software:1.0</product>
<product>cadd-solis_medication_safety_software:2.0</product>
<product>cadd-solis_medication_safety_software:3.0</product>
<product>cadd-solis_medication_safety_software:3.1</product>
</cve>
<cve id="CVE-2016-8358" level="MEDIUM">
<product>cadd-solis_medication_safety_software:1.0</product>
<product>cadd-solis_medication_safety_software:2.0</product>
<product>cadd-solis_medication_safety_software:3.0</product>
<product>cadd-solis_medication_safety_software:3.1</product>
</cve>
<cve id="CVE-2016-8359" level="MEDIUM">
<product>e1200_series_firmware:2.3</product>
<product>e1200_series_firmware:2.4</product>
<product>e1200_series_firmware:2.5</product>
<product>e2200_series_firmware:3.11</product>
<product>e2200_series_firmware:3.12</product>
<product>e2200_series_firmware:3.13</product>
</cve>
<cve id="CVE-2016-10428" level="LOW">
<product>sd_425_firmware:-</product>
<product>sd_430_firmware:-</product>
<product>sd_450_firmware:-</product>
<product>sd_625_firmware:-</product>
<product>sd_650_firmware:-</product>
<product>sd_652_firmware:-</product>
<product>sd_820_firmware:-</product>
<product>sd_820a_firmware:-</product>
</cve>
<cve id="CVE-2016-10429" level="LOW">
<product>fsm9055_firmware:-</product>
<product>ipq4019_firmware:-</product>
<product>mdm9206_firmware:-</product>
<product>mdm9607_firmware:-</product>
<product>mdm9635m_firmware:-</product>
<product>mdm9640_firmware:-</product>
<product>mdm9645_firmware:-</product>
<product>mdm9650_firmware:-</product>
<product>mdm9655_firmware:-</product>
<product>msm8909w_firmware:-</product>
<product>sd_205_firmware:-</product>
<product>sd_210_firmware:-</product>
<product>sd_212_firmware:-</product>
<product>sd_400_firmware:-</product>
<product>sd_410_firmware:-</product>
<product>sd_412_firmware:-</product>
<product>sd_415_firmware:-</product>
<product>sd_425_firmware:-</product>
<product>sd_430_firmware:-</product>
<product>sd_450_firmware:-</product>
<product>sd_615_firmware:-</product>
<product>sd_616_firmware:-</product>
<product>sd_617_firmware:-</product>
<product>sd_625_firmware:-</product>
<product>sd_650_firmware:-</product>
<product>sd_652_firmware:-</product>
<product>sd_800_firmware:-</product>
<product>sd_808_firmware:-</product>
<product>sd_810_firmware:-</product>
<product>sd_820_firmware:-</product>
<product>sd_820a_firmware:-</product>
<product>sdx20_firmware:-</product>
</cve>
<cve id="CVE-2016-10424" level="LOW">
<product>mdm9206_firmware:-</product>
<product>mdm9650_firmware:-</product>
<product>sd_205_firmware:-</product>
<product>sd_210_firmware:-</product>
<product>sd_212_firmware:-</product>
<product>sd_410_firmware:-</product>
<product>sd_412_firmware:-</product>
<product>sd_415_firmware:-</product>
<product>sd_425_firmware:-</product>
<product>sd_430_firmware:-</product>
<product>sd_450_firmware:-</product>
<product>sd_615_firmware:-</product>
<product>sd_616_firmware:-</product>
<product>sd_617_firmware:-</product>
<product>sd_625_firmware:-</product>
<product>sd_650_firmware:-</product>
<product>sd_652_firmware:-</product>
<product>sd_800_firmware:-</product>
<product>sd_808_firmware:-</product>
<product>sd_820_firmware:-</product>
<product>sd_820a_firmware:-</product>
<product>sd_835_firmware:-</product>
<product>sd_845_firmware:-</product>
<product>sd_850_firmware:-</product>
</cve>
<cve id="CVE-2016-10425" level="LOW">
<product>mdm9206_firmware:-</product>
<product>sd_205_firmware:-</product>
<product>sd_210_firmware:-</product>
<product>sd_212_firmware:-</product>
<product>sd_400_firmware:-</product>
<product>sd_410_firmware:-</product>
<product>sd_412_firmware:-</product>
<product>sd_415_firmware:-</product>
<product>sd_425_firmware:-</product>
<product>sd_430_firmware:-</product>
<product>sd_450_firmware:-</product>
<product>sd_615_firmware:-</product>
<product>sd_616_firmware:-</product>
<product>sd_617_firmware:-</product>
<product>sd_625_firmware:-</product>
<product>sd_650_firmware:-</product>
<product>sd_652_firmware:-</product>
<product>sd_800_firmware:-</product>
<product>sd_808_firmware:-</product>
<product>sd_810_firmware:-</product>
<product>sd_820_firmware:-</product>
<product>sd_820a_firmware:-</product>
<product>sd_835_firmware:-</product>
</cve>
<cve id="CVE-2016-10426" level="LOW">
<product>sd_410_firmware:-</product>
<product>sd_412_firmware:-</product>
<product>sd_425_firmware:-</product>
<product>sd_430_firmware:-</product>
<product>sd_450_firmware:-</product>
<product>sd_617_firmware:-</product>
<product>sd_625_firmware:-</product>
<product>sd_650_firmware:-</product>
<product>sd_652_firmware:-</product>
<product>sd_810_firmware:-</product>
<product>sd_820_firmware:-</product>
<product>sd_820a_firmware:-</product>
</cve>
<cve id="CVE-2016-10427" level="LOW">
<product>mdm9206_firmware:-</product>
<product>mdm9607_firmware:-</product>
<product>mdm9615_firmware:-</product>
<product>mdm9625_firmware:-</product>
<product>mdm9635m_firmware:-</product>
<product>mdm9640_firmware:-</product>
<product>mdm9645_firmware:-</product>
<product>mdm9650_firmware:-</product>
<product>mdm9655_firmware:-</product>
<product>msm8909w_firmware:-</product>
<product>sd_205_firmware:-</product>
<product>sd_210_firmware:-</product>
<product>sd_212_firmware:-</product>
<product>sd_400_firmware:-</product>
<product>sd_410_firmware:-</product>
<product>sd_412_firmware:-</product>
<product>sd_415_firmware:-</product>
<product>sd_425_firmware:-</product>
<product>sd_430_firmware:-</product>
<product>sd_450_firmware:-</product>
<product>sd_615_firmware:-</product>
<product>sd_616_firmware:-</product>
<product>sd_617_firmware:-</product>
<product>sd_625_firmware:-</product>
<product>sd_650_firmware:-</product>
<product>sd_652_firmware:-</product>
<product>sd_800_firmware:-</product>
<product>sd_808_firmware:-</product>
<product>sd_810_firmware:-</product>
<product>sd_820_firmware:-</product>
<product>sd_835_firmware:-</product>
<product>sd_845_firmware:-</product>
<product>sd_850_firmware:-</product>
<product>sdx20_firmware:-</product>
</cve>
<cve id="CVE-2016-10420" level="MEDIUM">
<product>mdm9206_firmware:-</product>
<product>mdm9607_firmware:-</product>
<product>mdm9650_firmware:-</product>
<product>sd_205_firmware:-</product>
<product>sd_210_firmware:-</product>
<product>sd_212_firmware:-</product>
<product>sd_400_firmware:-</product>
<product>sd_410_firmware:-</product>
<product>sd_412_firmware:-</product>
<product>sd_415_firmware:-</product>
<product>sd_425_firmware:-</product>
<product>sd_430_firmware:-</product>
<product>sd_450_firmware:-</product>
<product>sd_600_firmware:-</product>
<product>sd_615_firmware:-</product>
<product>sd_616_firmware:-</product>
<product>sd_617_firmware:-</product>
<product>sd_625_firmware:-</product>
<product>sd_650_firmware:-</product>
<product>sd_652_firmware:-</product>
<product>sd_800_firmware:-</product>
<product>sd_808_firmware:-</product>
<product>sd_810_firmware:-</product>
<product>sd_820_firmware:-</product>
<product>sd_835_firmware:-</product>
<product>sdx20_firmware:-</product>
</cve>
<cve id="CVE-2016-10421" level="LOW">
<product>mdm9206_firmware:-</product>
<product>mdm9607_firmware:-</product>
<product>mdm9615_firmware:-</product>
<product>mdm9625_firmware:-</product>
<product>mdm9635m_firmware:-</product>
<product>mdm9640_firmware:-</product>
<product>mdm9645_firmware:-</product>
<product>mdm9650_firmware:-</product>
<product>mdm9655_firmware:-</product>
<product>msm8909w_firmware:-</product>
<product>sd_205_firmware:-</product>
<product>sd_210_firmware:-</product>
<product>sd_212_firmware:-</product>
<product>sd_400_firmware:-</product>
<product>sd_410_firmware:-</product>
<product>sd_412_firmware:-</product>
<product>sd_415_firmware:-</product>
<product>sd_425_firmware:-</product>
<product>sd_430_firmware:-</product>
<product>sd_450_firmware:-</product>
<product>sd_615_firmware:-</product>
<product>sd_616_firmware:-</product>
<product>sd_617_firmware:-</product>
<product>sd_625_firmware:-</product>
<product>sd_650_firmware:-</product>
<product>sd_652_firmware:-</product>
<product>sd_800_firmware:-</product>
<product>sd_808_firmware:-</product>
<product>sd_810_firmware:-</product>
<product>sd_820_firmware:-</product>
<product>sd_835_firmware:-</product>
<product>sd_845_firmware:-</product>
<product>sd_850_firmware:-</product>
<product>sdx20_firmware:-</product>
</cve>
<cve id="CVE-2016-10422" level="LOW">
<product>fsm9055_firmware:-</product>
<product>ipq4019_firmware:-</product>
<product>mdm9206_firmware:-</product>
<product>mdm9635m_firmware:-</product>
<product>mdm9640_firmware:-</product>
<product>mdm9645_firmware:-</product>
<product>mdm9650_firmware:-</product>
<product>mdm9655_firmware:-</product>
<product>sd_205_firmware:-</product>
<product>sd_210_firmware:-</product>
<product>sd_212_firmware:-</product>
<product>sd_400_firmware:-</product>
<product>sd_410_firmware:-</product>
<product>sd_412_firmware:-</product>
<product>sd_425_firmware:-</product>
<product>sd_430_firmware:-</product>
<product>sd_450_firmware:-</product>
<product>sd_617_firmware:-</product>
<product>sd_625_firmware:-</product>
<product>sd_650_firmware:-</product>
<product>sd_652_firmware:-</product>
<product>sd_800_firmware:-</product>
<product>sd_808_firmware:-</product>
<product>sd_810_firmware:-</product>
<product>sd_820_firmware:-</product>
<product>sd_820a_firmware:-</product>
<product>sd_835_firmware:-</product>
<product>sd_845_firmware:-</product>
<product>sd_850_firmware:-</product>
<product>sdx20_firmware:-</product>
</cve>
<cve id="CVE-2016-10423" level="LOW">
<product>sd_425_firmware:-</product>
<product>sd_430_firmware:-</product>
<product>sd_450_firmware:-</product>
<product>sd_625_firmware:-</product>
<product>sd_650_firmware:-</product>
<product>sd_652_firmware:-</product>
<product>sd_820_firmware:-</product>
<product>sd_820a_firmware:-</product>
</cve>
<cve id="CVE-2016-4194" level="LOW">
<product>acrobat:11.0.16</product>
<product>acrobat_dc:15.006.30174</product>
<product>acrobat_dc:15.016.20045</product>
<product>acrobat_reader_dc:15.006.30174</product>
<product>acrobat_reader_dc:15.016.20045</product>
<product>reader:11.0.16</product>
</cve>
<cve id="CVE-2016-4532" level="LOW">
<product>vtscada:8.0.05</product>
<product>vtscada:8.0.12</product>
<product>vtscada:8.0.16</product>
<product>vtscada:8.0.18</product>
<product>vtscada:8.1.05</product>
<product>vtscada:8.1.06</product>
<product>vtscada:9.0.02</product>
<product>vtscada:9.0.03</product>
<product>vtscada:9.0.08</product>
<product>vtscada:9.1.02</product>
<product>vtscada:9.1.03</product>
<product>vtscada:9.1.05</product>
<product>vtscada:9.1.09</product>
<product>vtscada:9.1.11</product>
<product>vtscada:9.1.14</product>
<product>vtscada:9.1.20</product>
<product>vtscada:10.0.11</product>
<product>vtscada:10.0.13</product>
<product>vtscada:10.0.14</product>
<product>vtscada:10.0.16</product>
<product>vtscada:10.0.17</product>
<product>vtscada:10.1.05</product>
<product>vtscada:10.1.06</product>
<product>vtscada:10.1.07</product>
<product>vtscada:10.1.12</product>
<product>vtscada:10.2.05</product>
<product>vtscada:10.2.07</product>
<product>vtscada:10.2.08</product>
<product>vtscada:10.2.11</product>
<product>vtscada:10.2.13</product>
<product>vtscada:10.2.14</product>
<product>vtscada:10.2.15</product>
<product>vtscada:10.2.17</product>
<product>vtscada:10.2.19</product>
<product>vtscada:10.2.20</product>
<product>vtscada:10.2.21</product>
<product>vtscada:10.2.22</product>
<product>vtscada:11.0.05</product>
<product>vtscada:11.0.07</product>
<product>vtscada:11.1.05</product>
<product>vtscada:11.1.06</product>
<product>vtscada:11.1.09</product>
<product>vtscada:11.1.10</product>
<product>vtscada:11.1.13</product>
<product>vtscada:11.1.14</product>
<product>vtscada:11.1.15</product>
<product>vtscada:11.1.16</product>
<product>vtscada:11.1.17</product>
<product>vtscada:11.1.18</product>
<product>vtscada:11.1.19</product>
<product>vtscada:11.1.20</product>
<product>vtscada:11.1.21</product>
<product>vtscada:11.1.22</product>
<product>vtscada:11.1.24</product>
</cve>
<cve id="CVE-2016-4533" level="MEDIUM">
<product>levistudio:-</product>
</cve>
<cve id="CVE-2016-4530" level="LOW">
<product>pi_sql_data_access_server_2016:1.5</product>
</cve>
<cve id="CVE-2016-4531" level="LOW">
<product>factorytalk_energrymetrix:2.10.00</product>
</cve>
<cve id="CVE-2016-4536" level="LOW">
<product>openafs:1.6.16</product>
</cve>
<cve id="CVE-2016-4195" level="MEDIUM">
<product>acrobat:11.0.16</product>
<product>acrobat_dc:15.006.30174</product>
<product>acrobat_dc:15.016.20045</product>
<product>acrobat_reader_dc:15.006.30174</product>
<product>acrobat_reader_dc:15.016.20045</product>
<product>reader:11.0.16</product>
</cve>
<cve id="CVE-2016-4535" level="LOW">
<product>livesafe:14.0</product>
</cve>
<cve id="CVE-2016-5919" level="LOW">
<product>security_access_manager_for_mobile</product>
<product>security_access_manager_9.0_firmware</product>
<product>security_access_manager_for_web_7.0_firmware</product>
<product>security_access_manager_for_web_8.0_firmware</product>
</cve>
<cve id="CVE-2016-5918" level="MEDIUM">
<product>tivoli_storage_manager_for_space_management:6.3</product>
<product>tivoli_storage_manager_for_space_management:6.4.0.0</product>
<product>tivoli_storage_manager_for_space_management:6.4.3.0</product>
<product>tivoli_storage_manager_for_space_management:7.1.0.0</product>
<product>tivoli_storage_manager_for_space_management:7.1.4.1</product>
</cve>
<cve id="CVE-2016-9009" level="LOW">
<product>websphere_mq:8.0</product>
<product>websphere_mq:8.0.0.0</product>
<product>websphere_mq:8.0.0.1</product>
<product>websphere_mq:8.0.0.2</product>
<product>websphere_mq:8.0.0.3</product>
<product>websphere_mq:8.0.0.4</product>
<product>websphere_mq:8.0.0.5</product>
</cve>
<cve id="CVE-2016-9008" level="LOW">
<product>urbancode_deploy:6.0</product>
<product>urbancode_deploy:6.0.1</product>
<product>urbancode_deploy:6.0.1.1</product>
<product>urbancode_deploy:6.0.1.2</product>
<product>urbancode_deploy:6.0.1.3</product>
<product>urbancode_deploy:6.0.1.4</product>
<product>urbancode_deploy:6.0.1.5</product>
<product>urbancode_deploy:6.0.1.6</product>
<product>urbancode_deploy:6.0.1.7</product>
<product>urbancode_deploy:6.0.1.8</product>
<product>urbancode_deploy:6.0.1.9</product>
<product>urbancode_deploy:6.0.1.10</product>
<product>urbancode_deploy:6.0.1.11</product>
<product>urbancode_deploy:6.0.1.12</product>
<product>urbancode_deploy:6.0.1.13</product>
<product>urbancode_deploy:6.0.1.14</product>
<product>urbancode_deploy:6.1</product>
<product>urbancode_deploy:6.1.0.1</product>
<product>urbancode_deploy:6.1.0.2</product>
<product>urbancode_deploy:6.1.0.3</product>
<product>urbancode_deploy:6.1.0.4</product>
<product>urbancode_deploy:6.1.1</product>
<product>urbancode_deploy:6.1.1.1</product>
<product>urbancode_deploy:6.1.1.2</product>
<product>urbancode_deploy:6.1.1.3</product>
<product>urbancode_deploy:6.1.1.4</product>
<product>urbancode_deploy:6.1.1.5</product>
<product>urbancode_deploy:6.1.1.6</product>
<product>urbancode_deploy:6.1.1.7</product>
<product>urbancode_deploy:6.1.1.8</product>
<product>urbancode_deploy:6.1.2</product>
<product>urbancode_deploy:6.1.3</product>
<product>urbancode_deploy:6.1.3.1</product>
<product>urbancode_deploy:6.1.3.2</product>
<product>urbancode_deploy:6.1.3.3</product>
<product>urbancode_deploy:6.2.0.0</product>
<product>urbancode_deploy:6.2.0.1</product>
<product>urbancode_deploy:6.2.0.2</product>
<product>urbancode_deploy:6.2.1</product>
<product>urbancode_deploy:6.2.1.1</product>
<product>urbancode_deploy:6.2.2</product>
<product>urbancode_deploy:6.2.2.1</product>
</cve>
<cve id="CVE-2016-2242" level="LOW">
<product>exponent_cms:2.0.0</product>
<product>exponent_cms:2.0.1</product>
<product>exponent_cms:2.0.2</product>
<product>exponent_cms:2.0.3</product>
<product>exponent_cms:2.0.4</product>
<product>exponent_cms:2.0.4</product>
<product>exponent_cms:2.0.5</product>
<product>exponent_cms:2.0.5</product>
<product>exponent_cms:2.0.6</product>
<product>exponent_cms:2.0.6</product>
<product>exponent_cms:2.0.7</product>
<product>exponent_cms:2.0.8</product>
<product>exponent_cms:2.0.8</product>
<product>exponent_cms:2.0.9</product>
<product>exponent_cms:2.0.9</product>
<product>exponent_cms:2.1.0</product>
<product>exponent_cms:2.1.1</product>
<product>exponent_cms:2.1.2</product>
<product>exponent_cms:2.1.3</product>
<product>exponent_cms:2.1.4</product>
<product>exponent_cms:2.1.4</product>
<product>exponent_cms:2.2.0</product>
<product>exponent_cms:2.2.0</product>
<product>exponent_cms:2.2.1</product>
<product>exponent_cms:2.2.2</product>
<product>exponent_cms:2.2.2</product>
<product>exponent_cms:2.2.3</product>
<product>exponent_cms:2.2.3</product>
<product>exponent_cms:2.3.0</product>
<product>exponent_cms:2.3.0</product>
<product>exponent_cms:2.3.1</product>
<product>exponent_cms:2.3.1</product>
<product>exponent_cms:2.3.2</product>
<product>exponent_cms:2.3.2</product>
<product>exponent_cms:2.3.3</product>
<product>exponent_cms:2.3.3</product>
<product>exponent_cms:2.3.4</product>
<product>exponent_cms:2.3.4</product>
<product>exponent_cms:2.3.5</product>
<product>exponent_cms:2.3.5</product>
<product>exponent_cms:2.3.7</product>
<product>exponent_cms:2.3.8</product>
</cve>
<cve id="CVE-2016-2243" level="MEDIUM">
<product>elitebook_folio_1012_x2_g2:-</product>
<product>1000_series_firmware:1.1</product>
<product>1000_series_firmware:1.04</product>
<product>700_series_firmware:1.05</product>
<product>700_series_firmware:1.08</product>
<product>700_series_firmware:2.05</product>
<product>700_series_firmware:2.07</product>
<product>700_series_firmware:2.09</product>
<product>800_series_firmware:2.1</product>
<product>800_series_firmware:2.09</product>
<product>z238_firmware:1.11</product>
<product>z240_firmware:1.11</product>
<product>zbook_firmware:1.03</product>
<product>zbook_firmware:1.04</product>
</cve>
<cve id="CVE-2016-9006" level="MEDIUM">
<product>urbancode_deploy:6.1</product>
<product>urbancode_deploy:6.1.0.1</product>
<product>urbancode_deploy:6.1.0.2</product>
<product>urbancode_deploy:6.1.0.3</product>
<product>urbancode_deploy:6.1.0.4</product>
<product>urbancode_deploy:6.1.1</product>
<product>urbancode_deploy:6.1.1.1</product>
<product>urbancode_deploy:6.1.1.2</product>
<product>urbancode_deploy:6.1.1.3</product>
<product>urbancode_deploy:6.1.1.4</product>
<product>urbancode_deploy:6.1.1.5</product>
<product>urbancode_deploy:6.1.1.6</product>
<product>urbancode_deploy:6.1.1.7</product>
<product>urbancode_deploy:6.1.1.8</product>
<product>urbancode_deploy:6.1.2</product>
<product>urbancode_deploy:6.1.3</product>
<product>urbancode_deploy:6.1.3.1</product>
<product>urbancode_deploy:6.1.3.2</product>
<product>urbancode_deploy:6.1.3.3</product>
<product>urbancode_deploy:6.2.0.0</product>
<product>urbancode_deploy:6.2.0.1</product>
<product>urbancode_deploy:6.2.0.2</product>
<product>urbancode_deploy:6.2.1</product>
<product>urbancode_deploy:6.2.1.1</product>
<product>urbancode_deploy:6.2.1.2</product>
<product>urbancode_deploy:6.2.2</product>
<product>urbancode_deploy:6.2.2.1</product>
<product>urbancode_deploy:6.2.3.0</product>
<product>urbancode_deploy:6.2.3.1</product>
</cve>
<cve id="CVE-2016-2246" level="LOW">
<product>thinpro:4.4</product>
<product>thinpro:5.0</product>
<product>thinpro:5.1</product>
<product>thinpro:5.2</product>
<product>thinpro:5.2.1</product>
<product>thinpro:6.0</product>
<product>thinpro:6.1</product>
</cve>
<cve id="CVE-2016-9000" level="MEDIUM">
<product>infosphere_datastage:8.7</product>
<product>infosphere_datastage:9.1</product>
<product>infosphere_datastage:11.3</product>
<product>infosphere_datastage:11.5</product>
<product>infosphere_information_server_on_cloud:11.5</product>
</cve>
<cve id="CVE-2016-2244" level="LOW">
<product>futuresmart_firmware:3.7</product>
</cve>
<cve id="CVE-2016-2245" level="LOW">
<product>support_assistant:8.1.40.3</product>
</cve>
<cve id="CVE-2016-4036" level="LOW">
<product>leap:42.1</product>
<product>opensuse:13.2</product>
</cve>
<cve id="CVE-2016-3379" level="MEDIUM">
<product>exchange_server:2016</product>
<product>exchange_server:2016</product>
</cve>
<cve id="CVE-2016-3377" level="HIGH">
<product>edge:-</product>
</cve>
<cve id="CVE-2016-5669" level="LOW">
<product>dm-txrx-100-str_firmware:1.2866.00026</product>
</cve>
<cve id="CVE-2016-5668" level="LOW">
<product>dm-txrx-100-str_firmware:1.2866.00026</product>
</cve>
<cve id="CVE-2016-5664" level="LOW">
<product>kiteworks_appliance:kw2016.03.00</product>
</cve>
<cve id="CVE-2016-5667" level="LOW">
<product>dm-txrx-100-str_firmware:1.2866.00026</product>
</cve>
<cve id="CVE-2016-5666" level="LOW">
<product>dm-txrx-100-str_firmware:1.2866.00026</product>
</cve>
<cve id="CVE-2016-5661" level="LOW">
<product>civic_platform_citizen_access_portal:-</product>
</cve>
<cve id="CVE-2016-5660" level="MEDIUM">
<product>civic_platform_citizen_access_portal:-</product>
</cve>
<cve id="CVE-2016-5663" level="MEDIUM">
<product>kiteworks_appliance:kw2016.03.00</product>
</cve>
<cve id="CVE-2016-5662" level="LOW">
<product>kiteworks_appliance:kw2016.03.00</product>
</cve>
<cve id="CVE-2016-8876" level="MEDIUM">
<product>phantompdf:8.0.5</product>
<product>reader:8.0.5</product>
</cve>
<cve id="CVE-2016-6369" level="LOW">
<product>anyconnect_secure_mobility_client:2.0.0343</product>
<product>anyconnect_secure_mobility_client:2.1.0148</product>
<product>anyconnect_secure_mobility_client:2.2.0133</product>
<product>anyconnect_secure_mobility_client:2.2.0136</product>
<product>anyconnect_secure_mobility_client:2.2.0140</product>
<product>anyconnect_secure_mobility_client:2.3.0185</product>
<product>anyconnect_secure_mobility_client:2.3.0254</product>
<product>anyconnect_secure_mobility_client:2.3.1003</product>
<product>anyconnect_secure_mobility_client:2.3.2016</product>
<product>anyconnect_secure_mobility_client:2.4.0202</product>
<product>anyconnect_secure_mobility_client:2.4.1012</product>
<product>anyconnect_secure_mobility_client:2.5.0217</product>
<product>anyconnect_secure_mobility_client:2.5.2006</product>
<product>anyconnect_secure_mobility_client:2.5.2010</product>
<product>anyconnect_secure_mobility_client:2.5.2011</product>
<product>anyconnect_secure_mobility_client:2.5.2014</product>
<product>anyconnect_secure_mobility_client:2.5.2017</product>
<product>anyconnect_secure_mobility_client:2.5.2018</product>
<product>anyconnect_secure_mobility_client:2.5.2019</product>
<product>anyconnect_secure_mobility_client:2.5.3041</product>
<product>anyconnect_secure_mobility_client:2.5.3046</product>
<product>anyconnect_secure_mobility_client:2.5.3051</product>
<product>anyconnect_secure_mobility_client:2.5.3054</product>
<product>anyconnect_secure_mobility_client:2.5.3055</product>
<product>anyconnect_secure_mobility_client:2.5_base</product>
<product>anyconnect_secure_mobility_client:3.0.0</product>
<product>anyconnect_secure_mobility_client:3.0.0629</product>
<product>anyconnect_secure_mobility_client:3.0.1047</product>
<product>anyconnect_secure_mobility_client:3.0.2052</product>
<product>anyconnect_secure_mobility_client:3.0.3050</product>
<product>anyconnect_secure_mobility_client:3.0.3054</product>
<product>anyconnect_secure_mobility_client:3.0.4235</product>
<product>anyconnect_secure_mobility_client:3.0.5075</product>
<product>anyconnect_secure_mobility_client:3.0.5080</product>
<product>anyconnect_secure_mobility_client:3.0.09231</product>
<product>anyconnect_secure_mobility_client:3.0.09266</product>
<product>anyconnect_secure_mobility_client:3.0.09353</product>
<product>anyconnect_secure_mobility_client:3.1%2860%29</product>
<product>anyconnect_secure_mobility_client:3.1.0</product>
<product>anyconnect_secure_mobility_client:3.1.02043</product>
<product>anyconnect_secure_mobility_client:3.1.05182</product>
<product>anyconnect_secure_mobility_client:3.1.05187</product>
<product>anyconnect_secure_mobility_client:3.1.06073</product>
<product>anyconnect_secure_mobility_client:3.1.07021</product>
<product>anyconnect_secure_mobility_client:4.0%2848%29</product>
<product>anyconnect_secure_mobility_client:4.0%2864%29</product>
<product>anyconnect_secure_mobility_client:4.0%282049%29</product>
<product>anyconnect_secure_mobility_client:4.0.0</product>
<product>anyconnect_secure_mobility_client:4.0.00048</product>
<product>anyconnect_secure_mobility_client:4.0.00051</product>
<product>anyconnect_secure_mobility_client:4.1%288%29</product>
<product>anyconnect_secure_mobility_client:4.1.0</product>
<product>anyconnect_secure_mobility_client:4.2.0</product>
<product>anyconnect_secure_mobility_client:4.2.04039</product>
<product>anyconnect_secure_mobility_client:4.3.0</product>
<product>anyconnect_secure_mobility_client:4.3.00748</product>
<product>anyconnect_secure_mobility_client:4.3.01095</product>
</cve>
<cve id="CVE-2016-6368" level="LOW">
<product>firepower_management_center:6.0.0</product>
<product>firepower_management_center:6.0.0.0</product>
<product>firepower_management_center:6.0.0.1</product>
<product>firepower_management_center:6.0.1</product>
</cve>
<cve id="CVE-2016-6361" level="LOW">
<product>aironet_access_point_software:8.1%2815.14%29</product>
<product>aironet_access_point_software:8.1%28112.3%29</product>
<product>aironet_access_point_software:8.1%28112.4%29</product>
<product>aironet_access_point_software:8.1%28131.0%29</product>
<product>aironet_access_point_software:8.2%28100.0%29</product>
<product>aironet_access_point_software:8.2%28102.43%29</product>
<product>aironet_access_point_software:8.3.0</product>
</cve>
<cve id="CVE-2016-6360" level="LOW">
<product>email_security_appliance:9.5.0-000</product>
<product>email_security_appliance:9.5.0-201</product>
<product>email_security_appliance:9.6.0-000</product>
<product>email_security_appliance:9.6.0-042</product>
<product>email_security_appliance:9.6.0-051</product>
<product>email_security_appliance:9.7.0-125</product>
<product>web_security_appliance:8.8.0-085</product>
<product>web_security_appliance:9.0.0-193</product>
<product>web_security_appliance:9.0_base</product>
<product>web_security_appliance:9.1.0-000</product>
<product>web_security_appliance:9.1.0-070</product>
<product>web_security_appliance:9.1_base</product>
<product>web_security_appliance:9.5.0-235</product>
<product>web_security_appliance:9.5.0-284</product>
<product>web_security_appliance:9.5.0-444</product>
<product>web_security_appliance:9.5_base</product>
</cve>
<cve id="CVE-2016-6363" level="LOW">
<product>aironet_access_point_software:8.1%2815.14%29</product>
<product>aironet_access_point_software:8.1%28112.3%29</product>
<product>aironet_access_point_software:8.1%28112.4%29</product>
<product>aironet_access_point_software:8.1%28131.0%29</product>
<product>aironet_access_point_software:8.2%28100.0%29</product>
<product>aironet_access_point_software:8.2%28102.43%29</product>
<product>aironet_access_point_software:8.3.0</product>
</cve>
<cve id="CVE-2016-6362" level="LOW">
<product>aironet_access_point_software:8.1%2815.14%29</product>
<product>aironet_access_point_software:8.1%28112.3%29</product>
<product>aironet_access_point_software:8.1%28112.4%29</product>
<product>aironet_access_point_software:8.1%28131.0%29</product>
<product>aironet_access_point_software:8.2%28100.0%29</product>
<product>aironet_access_point_software:8.2%28102.43%29</product>
<product>aironet_access_point_software:8.3.0</product>
</cve>
<cve id="CVE-2016-6365" level="MEDIUM">
<product>firepower_management_center:4.10.3</product>
<product>firepower_management_center:5.2.0</product>
<product>firepower_management_center:5.3.0</product>
<product>firepower_management_center:5.3.0.2</product>
<product>firepower_management_center:5.3.1</product>
<product>firepower_management_center:5.4.0</product>
</cve>
<cve id="CVE-2016-6364" level="LOW">
<product>unified_communications_manager:11.5.0</product>
</cve>
<cve id="CVE-2016-6367" level="LOW">
<product>adaptive_security_appliance_software:7.0.1</product>
<product>adaptive_security_appliance_software:7.0.1.4</product>
<product>adaptive_security_appliance_software:7.0.2</product>
<product>adaptive_security_appliance_software:7.0.3</product>
<product>adaptive_security_appliance_software:7.0.4</product>
<product>adaptive_security_appliance_software:7.0.4.2</product>
<product>adaptive_security_appliance_software:7.0.5</product>
<product>adaptive_security_appliance_software:7.0.5.12</product>
<product>adaptive_security_appliance_software:7.0.6</product>
<product>adaptive_security_appliance_software:7.0.6.4</product>
<product>adaptive_security_appliance_software:7.0.6.8</product>
<product>adaptive_security_appliance_software:7.0.6.18</product>
<product>adaptive_security_appliance_software:7.0.6.22</product>
<product>adaptive_security_appliance_software:7.0.6.26</product>
<product>adaptive_security_appliance_software:7.0.6.29</product>
<product>adaptive_security_appliance_software:7.0.6.32</product>
<product>adaptive_security_appliance_software:7.0.7</product>
<product>adaptive_security_appliance_software:7.0.7.1</product>
<product>adaptive_security_appliance_software:7.0.7.4</product>
<product>adaptive_security_appliance_software:7.0.7.9</product>
<product>adaptive_security_appliance_software:7.0.7.12</product>
<product>adaptive_security_appliance_software:7.0.8</product>
<product>adaptive_security_appliance_software:7.0.8.2</product>
<product>adaptive_security_appliance_software:7.0.8.8</product>
<product>adaptive_security_appliance_software:7.0.8.12</product>
<product>adaptive_security_appliance_software:7.0.8.13</product>
<product>adaptive_security_appliance_software:7.1.2</product>
<product>adaptive_security_appliance_software:7.1.2.16</product>
<product>adaptive_security_appliance_software:7.1.2.20</product>
<product>adaptive_security_appliance_software:7.1.2.24</product>
<product>adaptive_security_appliance_software:7.1.2.28</product>
<product>adaptive_security_appliance_software:7.1.2.38</product>
<product>adaptive_security_appliance_software:7.1.2.42</product>
<product>adaptive_security_appliance_software:7.1.2.46</product>
<product>adaptive_security_appliance_software:7.1.2.49</product>
<product>adaptive_security_appliance_software:7.1.2.53</product>
<product>adaptive_security_appliance_software:7.1.2.61</product>
<product>adaptive_security_appliance_software:7.1.2.64</product>
<product>adaptive_security_appliance_software:7.1.2.72</product>
<product>adaptive_security_appliance_software:7.1.2.81</product>
<product>adaptive_security_appliance_software:7.2.1</product>
<product>adaptive_security_appliance_software:7.2.1.9</product>
<product>adaptive_security_appliance_software:7.2.1.13</product>
<product>adaptive_security_appliance_software:7.2.1.19</product>
<product>adaptive_security_appliance_software:7.2.1.24</product>
<product>adaptive_security_appliance_software:7.2.2</product>
<product>adaptive_security_appliance_software:7.2.2.6</product>
<product>adaptive_security_appliance_software:7.2.2.10</product>
<product>adaptive_security_appliance_software:7.2.2.14</product>
<product>adaptive_security_appliance_software:7.2.2.18</product>
<product>adaptive_security_appliance_software:7.2.2.19</product>
<product>adaptive_security_appliance_software:7.2.2.22</product>
<product>adaptive_security_appliance_software:7.2.2.34</product>
<product>adaptive_security_appliance_software:7.2.3</product>
<product>adaptive_security_appliance_software:7.2.3.1</product>
<product>adaptive_security_appliance_software:7.2.3.12</product>
<product>adaptive_security_appliance_software:7.2.3.16</product>
<product>adaptive_security_appliance_software:7.2.4</product>
<product>adaptive_security_appliance_software:7.2.4.6</product>
<product>adaptive_security_appliance_software:7.2.4.9</product>
<product>adaptive_security_appliance_software:7.2.4.18</product>
<product>adaptive_security_appliance_software:7.2.4.25</product>
<product>adaptive_security_appliance_software:7.2.4.27</product>
<product>adaptive_security_appliance_software:7.2.4.30</product>
<product>adaptive_security_appliance_software:7.2.4.33</product>
<product>adaptive_security_appliance_software:7.2.5</product>
<product>adaptive_security_appliance_software:7.2.5.2</product>
<product>adaptive_security_appliance_software:7.2.5.4</product>
<product>adaptive_security_appliance_software:7.2.5.7</product>
<product>adaptive_security_appliance_software:7.2.5.8</product>
<product>adaptive_security_appliance_software:7.2.5.10</product>
<product>adaptive_security_appliance_software:7.2.5.12</product>
<product>adaptive_security_appliance_software:7.2.5.16</product>
<product>adaptive_security_appliance_software:8.0.1.2</product>
<product>adaptive_security_appliance_software:8.0.2</product>
<product>adaptive_security_appliance_software:8.0.2.11</product>
<product>adaptive_security_appliance_software:8.0.2.15</product>
<product>adaptive_security_appliance_software:8.0.3</product>
<product>adaptive_security_appliance_software:8.0.3.6</product>
<product>adaptive_security_appliance_software:8.0.3.12</product>
<product>adaptive_security_appliance_software:8.0.3.19</product>
<product>adaptive_security_appliance_software:8.0.4</product>
<product>adaptive_security_appliance_software:8.0.4.3</product>
<product>adaptive_security_appliance_software:8.0.4.9</product>
<product>adaptive_security_appliance_software:8.0.4.16</product>
<product>adaptive_security_appliance_software:8.0.4.23</product>
<product>adaptive_security_appliance_software:8.0.4.25</product>
<product>adaptive_security_appliance_software:8.0.4.28</product>
<product>adaptive_security_appliance_software:8.0.4.31</product>
<product>adaptive_security_appliance_software:8.0.4.32</product>
<product>adaptive_security_appliance_software:8.0.4.33</product>
<product>adaptive_security_appliance_software:8.0.5</product>
<product>adaptive_security_appliance_software:8.0.5.20</product>
<product>adaptive_security_appliance_software:8.0.5.23</product>
<product>adaptive_security_appliance_software:8.0.5.25</product>
<product>adaptive_security_appliance_software:8.0.5.27</product>
<product>adaptive_security_appliance_software:8.0.5.28</product>
<product>adaptive_security_appliance_software:8.0.5.31</product>
<product>adaptive_security_appliance_software:8.1.0.104</product>
<product>adaptive_security_appliance_software:8.1.1</product>
<product>adaptive_security_appliance_software:8.1.1.6</product>
<product>adaptive_security_appliance_software:8.1.2</product>
<product>adaptive_security_appliance_software:8.1.2.13</product>
<product>adaptive_security_appliance_software:8.1.2.15</product>
<product>adaptive_security_appliance_software:8.1.2.16</product>
<product>adaptive_security_appliance_software:8.1.2.19</product>
<product>adaptive_security_appliance_software:8.1.2.23</product>
<product>adaptive_security_appliance_software:8.1.2.24</product>
<product>adaptive_security_appliance_software:8.1.2.49</product>
<product>adaptive_security_appliance_software:8.1.2.50</product>
<product>adaptive_security_appliance_software:8.1.2.55</product>
<product>adaptive_security_appliance_software:8.1.2.56</product>
<product>adaptive_security_appliance_software:8.2.0.45</product>
<product>adaptive_security_appliance_software:8.2.1</product>
<product>adaptive_security_appliance_software:8.2.1.11</product>
<product>adaptive_security_appliance_software:8.2.2</product>
<product>adaptive_security_appliance_software:8.2.2.9</product>
<product>adaptive_security_appliance_software:8.2.2.10</product>
<product>adaptive_security_appliance_software:8.2.2.12</product>
<product>adaptive_security_appliance_software:8.2.2.16</product>
<product>adaptive_security_appliance_software:8.2.2.17</product>
<product>adaptive_security_appliance_software:8.2.3</product>
<product>adaptive_security_appliance_software:8.2.4</product>
<product>adaptive_security_appliance_software:8.2.4.1</product>
<product>adaptive_security_appliance_software:8.2.4.4</product>
<product>adaptive_security_appliance_software:8.2.5</product>
<product>adaptive_security_appliance_software:8.2.5.13</product>
<product>adaptive_security_appliance_software:8.2.5.22</product>
<product>adaptive_security_appliance_software:8.2.5.26</product>
<product>adaptive_security_appliance_software:8.2.5.33</product>
<product>adaptive_security_appliance_software:8.2.5.40</product>
<product>adaptive_security_appliance_software:8.2.5.41</product>
<product>adaptive_security_appliance_software:8.2.5.46</product>
<product>adaptive_security_appliance_software:8.2.5.48</product>
<product>adaptive_security_appliance_software:8.2.5.50</product>
<product>adaptive_security_appliance_software:8.2.5.52</product>
<product>adaptive_security_appliance_software:8.2.5.55</product>
<product>adaptive_security_appliance_software:8.2.5.57</product>
<product>adaptive_security_appliance_software:8.3.1</product>
<product>adaptive_security_appliance_software:8.3.1.1</product>
<product>adaptive_security_appliance_software:8.3.1.4</product>
<product>adaptive_security_appliance_software:8.3.1.6</product>
<product>adaptive_security_appliance_software:8.3.2</product>
<product>adaptive_security_appliance_software:8.3.2.4</product>
<product>adaptive_security_appliance_software:8.3.2.13</product>
<product>adaptive_security_appliance_software:8.3.2.23</product>
<product>adaptive_security_appliance_software:8.3.2.25</product>
<product>adaptive_security_appliance_software:8.3.2.31</product>
<product>adaptive_security_appliance_software:8.3.2.33</product>
<product>adaptive_security_appliance_software:8.3.2.34</product>
<product>adaptive_security_appliance_software:8.3.2.37</product>
<product>adaptive_security_appliance_software:8.3.2.39</product>
<product>adaptive_security_appliance_software:8.3.2.40</product>
<product>adaptive_security_appliance_software:8.3.2.41</product>
<product>adaptive_security_appliance_software:8.3.2.44</product>
</cve>
<cve id="CVE-2016-6366" level="MEDIUM">
<product>adaptive_security_appliance_software:7.0.1</product>
<product>adaptive_security_appliance_software:7.0.1.4</product>
<product>adaptive_security_appliance_software:7.0.2</product>
<product>adaptive_security_appliance_software:7.0.3</product>
<product>adaptive_security_appliance_software:7.0.4</product>
<product>adaptive_security_appliance_software:7.0.4.2</product>
<product>adaptive_security_appliance_software:7.0.5</product>
<product>adaptive_security_appliance_software:7.0.5.12</product>
<product>adaptive_security_appliance_software:7.0.6</product>
<product>adaptive_security_appliance_software:7.0.6.4</product>
<product>adaptive_security_appliance_software:7.0.6.8</product>
<product>adaptive_security_appliance_software:7.0.6.18</product>
<product>adaptive_security_appliance_software:7.0.6.22</product>
<product>adaptive_security_appliance_software:7.0.6.26</product>
<product>adaptive_security_appliance_software:7.0.6.29</product>
<product>adaptive_security_appliance_software:7.0.6.32</product>
<product>adaptive_security_appliance_software:7.0.7</product>
<product>adaptive_security_appliance_software:7.0.7.1</product>
<product>adaptive_security_appliance_software:7.0.7.4</product>
<product>adaptive_security_appliance_software:7.0.7.9</product>
<product>adaptive_security_appliance_software:7.0.7.12</product>
<product>adaptive_security_appliance_software:7.0.8</product>
<product>adaptive_security_appliance_software:7.0.8.2</product>
<product>adaptive_security_appliance_software:7.0.8.8</product>
<product>adaptive_security_appliance_software:7.0.8.12</product>
<product>adaptive_security_appliance_software:7.0.8.13</product>
<product>adaptive_security_appliance_software:7.1.2</product>
<product>adaptive_security_appliance_software:7.1.2.16</product>
<product>adaptive_security_appliance_software:7.1.2.20</product>
<product>adaptive_security_appliance_software:7.1.2.24</product>
<product>adaptive_security_appliance_software:7.1.2.28</product>
<product>adaptive_security_appliance_software:7.1.2.38</product>
<product>adaptive_security_appliance_software:7.1.2.42</product>
<product>adaptive_security_appliance_software:7.1.2.46</product>
<product>adaptive_security_appliance_software:7.1.2.49</product>
<product>adaptive_security_appliance_software:7.1.2.53</product>
<product>adaptive_security_appliance_software:7.1.2.61</product>
<product>adaptive_security_appliance_software:7.1.2.64</product>
<product>adaptive_security_appliance_software:7.1.2.72</product>
<product>adaptive_security_appliance_software:7.1.2.81</product>
<product>adaptive_security_appliance_software:7.2.1</product>
<product>adaptive_security_appliance_software:7.2.1.9</product>
<product>adaptive_security_appliance_software:7.2.1.13</product>
<product>adaptive_security_appliance_software:7.2.1.19</product>
<product>adaptive_security_appliance_software:7.2.1.24</product>
<product>adaptive_security_appliance_software:7.2.2</product>
<product>adaptive_security_appliance_software:7.2.2.6</product>
<product>adaptive_security_appliance_software:7.2.2.10</product>
<product>adaptive_security_appliance_software:7.2.2.14</product>
<product>adaptive_security_appliance_software:7.2.2.18</product>
<product>adaptive_security_appliance_software:7.2.2.19</product>
<product>adaptive_security_appliance_software:7.2.2.22</product>
<product>adaptive_security_appliance_software:7.2.2.34</product>
<product>adaptive_security_appliance_software:7.2.3</product>
<product>adaptive_security_appliance_software:7.2.3.1</product>
<product>adaptive_security_appliance_software:7.2.3.12</product>
<product>adaptive_security_appliance_software:7.2.3.16</product>
<product>adaptive_security_appliance_software:7.2.4</product>
<product>adaptive_security_appliance_software:7.2.4.6</product>
<product>adaptive_security_appliance_software:7.2.4.9</product>
<product>adaptive_security_appliance_software:7.2.4.18</product>
<product>adaptive_security_appliance_software:7.2.4.25</product>
<product>adaptive_security_appliance_software:7.2.4.27</product>
<product>adaptive_security_appliance_software:7.2.4.30</product>
<product>adaptive_security_appliance_software:7.2.4.33</product>
<product>adaptive_security_appliance_software:7.2.5</product>
<product>adaptive_security_appliance_software:7.2.5.2</product>
<product>adaptive_security_appliance_software:7.2.5.4</product>
<product>adaptive_security_appliance_software:7.2.5.7</product>
<product>adaptive_security_appliance_software:7.2.5.8</product>
<product>adaptive_security_appliance_software:7.2.5.10</product>
<product>adaptive_security_appliance_software:7.2.5.12</product>
<product>adaptive_security_appliance_software:7.2.5.16</product>
<product>adaptive_security_appliance_software:8.0.1.2</product>
<product>adaptive_security_appliance_software:8.0.2</product>
<product>adaptive_security_appliance_software:8.0.2.11</product>
<product>adaptive_security_appliance_software:8.0.2.15</product>
<product>adaptive_security_appliance_software:8.0.3</product>
<product>adaptive_security_appliance_software:8.0.3.6</product>
<product>adaptive_security_appliance_software:8.0.3.12</product>
<product>adaptive_security_appliance_software:8.0.3.19</product>
<product>adaptive_security_appliance_software:8.0.4</product>
<product>adaptive_security_appliance_software:8.0.4.3</product>
<product>adaptive_security_appliance_software:8.0.4.9</product>
<product>adaptive_security_appliance_software:8.0.4.16</product>
<product>adaptive_security_appliance_software:8.0.4.23</product>
<product>adaptive_security_appliance_software:8.0.4.25</product>
<product>adaptive_security_appliance_software:8.0.4.28</product>
<product>adaptive_security_appliance_software:8.0.4.31</product>
<product>adaptive_security_appliance_software:8.0.4.32</product>
<product>adaptive_security_appliance_software:8.0.4.33</product>
<product>adaptive_security_appliance_software:8.0.5</product>
<product>adaptive_security_appliance_software:8.0.5.20</product>
<product>adaptive_security_appliance_software:8.0.5.23</product>
<product>adaptive_security_appliance_software:8.0.5.25</product>
<product>adaptive_security_appliance_software:8.0.5.27</product>
<product>adaptive_security_appliance_software:8.0.5.28</product>
<product>adaptive_security_appliance_software:8.0.5.31</product>
<product>adaptive_security_appliance_software:8.1.0.104</product>
<product>adaptive_security_appliance_software:8.1.1</product>
<product>adaptive_security_appliance_software:8.1.1.6</product>
<product>adaptive_security_appliance_software:8.1.2</product>
<product>adaptive_security_appliance_software:8.1.2.13</product>
<product>adaptive_security_appliance_software:8.1.2.15</product>
<product>adaptive_security_appliance_software:8.1.2.16</product>
<product>adaptive_security_appliance_software:8.1.2.19</product>
<product>adaptive_security_appliance_software:8.1.2.23</product>
<product>adaptive_security_appliance_software:8.1.2.24</product>
<product>adaptive_security_appliance_software:8.1.2.49</product>
<product>adaptive_security_appliance_software:8.1.2.50</product>
<product>adaptive_security_appliance_software:8.1.2.55</product>
<product>adaptive_security_appliance_software:8.1.2.56</product>
<product>adaptive_security_appliance_software:8.2.0.45</product>
<product>adaptive_security_appliance_software:8.2.1</product>
<product>adaptive_security_appliance_software:8.2.1.11</product>
<product>adaptive_security_appliance_software:8.2.2</product>
<product>adaptive_security_appliance_software:8.2.2.9</product>
<product>adaptive_security_appliance_software:8.2.2.10</product>
<product>adaptive_security_appliance_software:8.2.2.12</product>
<product>adaptive_security_appliance_software:8.2.2.16</product>
<product>adaptive_security_appliance_software:8.2.2.17</product>
<product>adaptive_security_appliance_software:8.2.3</product>
<product>adaptive_security_appliance_software:8.2.4</product>
<product>adaptive_security_appliance_software:8.2.4.1</product>
<product>adaptive_security_appliance_software:8.2.4.4</product>
<product>adaptive_security_appliance_software:8.2.5</product>
<product>adaptive_security_appliance_software:8.2.5.13</product>
<product>adaptive_security_appliance_software:8.2.5.22</product>
<product>adaptive_security_appliance_software:8.2.5.26</product>
<product>adaptive_security_appliance_software:8.2.5.33</product>
<product>adaptive_security_appliance_software:8.2.5.40</product>
<product>adaptive_security_appliance_software:8.2.5.41</product>
<product>adaptive_security_appliance_software:8.2.5.46</product>
<product>adaptive_security_appliance_software:8.2.5.48</product>
<product>adaptive_security_appliance_software:8.2.5.50</product>
<product>adaptive_security_appliance_software:8.2.5.52</product>
<product>adaptive_security_appliance_software:8.2.5.55</product>
<product>adaptive_security_appliance_software:8.2.5.57</product>
<product>adaptive_security_appliance_software:8.3.1</product>
<product>adaptive_security_appliance_software:8.3.1.1</product>
<product>adaptive_security_appliance_software:8.3.1.4</product>
<product>adaptive_security_appliance_software:8.3.1.6</product>
<product>adaptive_security_appliance_software:8.3.2</product>
<product>adaptive_security_appliance_software:8.3.2.4</product>
<product>adaptive_security_appliance_software:8.3.2.13</product>
<product>adaptive_security_appliance_software:8.3.2.23</product>
<product>adaptive_security_appliance_software:8.3.2.25</product>
<product>adaptive_security_appliance_software:8.3.2.31</product>
<product>adaptive_security_appliance_software:8.3.2.33</product>
<product>adaptive_security_appliance_software:8.3.2.34</product>
<product>adaptive_security_appliance_software:8.3.2.37</product>
<product>adaptive_security_appliance_software:8.3.2.39</product>
<product>adaptive_security_appliance_software:8.3.2.40</product>
<product>adaptive_security_appliance_software:8.3.2.41</product>
<product>adaptive_security_appliance_software:8.3.2.44</product>
<product>adaptive_security_appliance_software:8.4.0</product>
<product>adaptive_security_appliance_software:8.4.1</product>
<product>adaptive_security_appliance_software:8.4.1.3</product>
<product>adaptive_security_appliance_software:8.4.1.11</product>
<product>adaptive_security_appliance_software:8.4.2</product>
<product>adaptive_security_appliance_software:8.4.2.1</product>
<product>adaptive_security_appliance_software:8.4.2.8</product>
<product>adaptive_security_appliance_software:8.4.3</product>
<product>adaptive_security_appliance_software:8.4.3.8</product>
<product>adaptive_security_appliance_software:8.4.3.9</product>
<product>adaptive_security_appliance_software:8.4.4</product>
<product>adaptive_security_appliance_software:8.4.4.1</product>
<product>adaptive_security_appliance_software:8.4.4.3</product>
<product>adaptive_security_appliance_software:8.4.4.5</product>
<product>adaptive_security_appliance_software:8.4.4.9</product>
<product>adaptive_security_appliance_software:8.4.5</product>
<product>adaptive_security_appliance_software:8.4.5.6</product>
<product>adaptive_security_appliance_software:8.4.6</product>
<product>adaptive_security_appliance_software:8.4.7</product>
<product>adaptive_security_appliance_software:8.4.7.3</product>
<product>adaptive_security_appliance_software:8.4.7.15</product>
<product>adaptive_security_appliance_software:8.4.7.22</product>
<product>adaptive_security_appliance_software:8.4.7.23</product>
<product>adaptive_security_appliance_software:8.4.7.26</product>
<product>adaptive_security_appliance_software:8.4.7.28</product>
<product>adaptive_security_appliance_software:8.4.7.29</product>
<product>adaptive_security_appliance_software:8.5.1</product>
<product>adaptive_security_appliance_software:8.5.1.1</product>
<product>adaptive_security_appliance_software:8.5.1.6</product>
<product>adaptive_security_appliance_software:8.5.1.7</product>
<product>adaptive_security_appliance_software:8.5.1.14</product>
<product>adaptive_security_appliance_software:8.5.1.17</product>
<product>adaptive_security_appliance_software:8.5.1.18</product>
<product>adaptive_security_appliance_software:8.5.1.19</product>
<product>adaptive_security_appliance_software:8.5.1.21</product>
<product>adaptive_security_appliance_software:8.5.1.24</product>
<product>adaptive_security_appliance_software:8.6.1</product>
<product>adaptive_security_appliance_software:8.6.1.1</product>
<product>adaptive_security_appliance_software:8.6.1.2</product>
<product>adaptive_security_appliance_software:8.6.1.5</product>
<product>adaptive_security_appliance_software:8.6.1.10</product>
<product>adaptive_security_appliance_software:8.6.1.12</product>
<product>adaptive_security_appliance_software:8.6.1.13</product>
<product>adaptive_security_appliance_software:8.6.1.14</product>
<product>adaptive_security_appliance_software:8.6.1.17</product>
<product>adaptive_security_appliance_software:8.7.1</product>
<product>adaptive_security_appliance_software:8.7.1.1</product>
<product>adaptive_security_appliance_software:8.7.1.3</product>
<product>adaptive_security_appliance_software:8.7.1.4</product>
<product>adaptive_security_appliance_software:8.7.1.7</product>
<product>adaptive_security_appliance_software:8.7.1.8</product>
<product>adaptive_security_appliance_software:8.7.1.11</product>
<product>adaptive_security_appliance_software:8.7.1.13</product>
<product>adaptive_security_appliance_software:8.7.1.16</product>
<product>adaptive_security_appliance_software:8.7.1.17</product>
<product>adaptive_security_appliance_software:9.0.1</product>
<product>adaptive_security_appliance_software:9.0.2</product>
<product>adaptive_security_appliance_software:9.0.2.10</product>
<product>adaptive_security_appliance_software:9.0.3</product>
<product>adaptive_security_appliance_software:9.0.3.6</product>
<product>adaptive_security_appliance_software:9.0.3.8</product>
<product>adaptive_security_appliance_software:9.0.4</product>
<product>adaptive_security_appliance_software:9.0.4.1</product>
<product>adaptive_security_appliance_software:9.0.4.5</product>
<product>adaptive_security_appliance_software:9.0.4.7</product>
<product>adaptive_security_appliance_software:9.0.4.17</product>
<product>adaptive_security_appliance_software:9.0.4.20</product>
<product>adaptive_security_appliance_software:9.0.4.24</product>
<product>adaptive_security_appliance_software:9.0.4.26</product>
<product>adaptive_security_appliance_software:9.0.4.29</product>
<product>adaptive_security_appliance_software:9.0.4.33</product>
<product>adaptive_security_appliance_software:9.0.4.35</product>
<product>adaptive_security_appliance_software:9.0.4.37</product>
<product>adaptive_security_appliance_software:9.1.1</product>
<product>adaptive_security_appliance_software:9.1.1.4</product>
<product>adaptive_security_appliance_software:9.1.2</product>
<product>adaptive_security_appliance_software:9.1.2.8</product>
<product>adaptive_security_appliance_software:9.1.3</product>
<product>adaptive_security_appliance_software:9.1.3.2</product>
<product>adaptive_security_appliance_software:9.1.4</product>
<product>adaptive_security_appliance_software:9.1.4.5</product>
<product>adaptive_security_appliance_software:9.1.5</product>
<product>adaptive_security_appliance_software:9.1.5.10</product>
<product>adaptive_security_appliance_software:9.1.5.12</product>
<product>adaptive_security_appliance_software:9.1.5.15</product>
<product>adaptive_security_appliance_software:9.1.5.21</product>
<product>adaptive_security_appliance_software:9.1.6</product>
<product>adaptive_security_appliance_software:9.1.6.1</product>
<product>adaptive_security_appliance_software:9.1.6.4</product>
<product>adaptive_security_appliance_software:9.1.6.6</product>
<product>adaptive_security_appliance_software:9.1.6.8</product>
<product>adaptive_security_appliance_software:9.1.6.10</product>
<product>adaptive_security_appliance_software:9.2%280.0%29</product>
<product>adaptive_security_appliance_software:9.2%280.104%29</product>
<product>adaptive_security_appliance_software:9.2%283.1%29</product>
<product>adaptive_security_appliance_software:9.2.1</product>
<product>adaptive_security_appliance_software:9.2.2</product>
<product>adaptive_security_appliance_software:9.2.2.4</product>
<product>adaptive_security_appliance_software:9.2.2.7</product>
<product>adaptive_security_appliance_software:9.2.2.8</product>
<product>adaptive_security_appliance_software:9.2.3</product>
<product>adaptive_security_appliance_software:9.2.3.3</product>
<product>adaptive_security_appliance_software:9.2.3.4</product>
<product>adaptive_security_appliance_software:9.2.4</product>
<product>adaptive_security_appliance_software:9.2.4.2</product>
<product>adaptive_security_appliance_software:9.2.4.4</product>
<product>adaptive_security_appliance_software:9.3%281.50%29</product>
<product>adaptive_security_appliance_software:9.3%281.105%29</product>
<product>adaptive_security_appliance_software:9.3%282.100%29</product>
<product>adaptive_security_appliance_software:9.3%282.243%29</product>
<product>adaptive_security_appliance_software:9.3.1</product>
<product>adaptive_security_appliance_software:9.3.1.1</product>
<product>adaptive_security_appliance_software:9.3.2</product>
<product>adaptive_security_appliance_software:9.3.2.2</product>
<product>adaptive_security_appliance_software:9.3.3</product>
<product>adaptive_security_appliance_software:9.3.3.1</product>
<product>adaptive_security_appliance_software:9.3.3.2</product>
<product>adaptive_security_appliance_software:9.3.3.5</product>
<product>adaptive_security_appliance_software:9.3.3.6</product>
<product>adaptive_security_appliance_software:9.3.5</product>
<product>adaptive_security_appliance_software:9.4.0.115</product>
<product>adaptive_security_appliance_software:9.4.1</product>
<product>adaptive_security_appliance_software:9.4.1.1</product>
<product>adaptive_security_appliance_software:9.4.1.2</product>
<product>adaptive_security_appliance_software:9.4.1.3</product>
<product>adaptive_security_appliance_software:9.4.1.5</product>
<product>adaptive_security_appliance_software:9.4.2</product>
<product>adaptive_security_appliance_software:9.4.2.3</product>
<product>firepower_services_software_for_asa:5.4.0</product>
<product>firepower_services_software_for_asa:5.4.1</product>
<product>firepower_services_software_for_asa:5.4.1.1</product>
<product>firepower_services_software_for_asa:5.4.1.2</product>
<product>firepower_services_software_for_asa:5.4.1.3</product>
<product>firepower_services_software_for_asa:5.4.1.4</product>
<product>firepower_services_software_for_asa:5.4.1.5</product>
<product>firepower_services_software_for_asa:5.4.1.6</product>
<product>firepower_services_software_for_asa:5.4.1.7</product>
<product>firepower_threat_defense_software:6.0.0</product>
<product>firepower_threat_defense_software:6.0.1</product>
<product>asa_1000v_cloud_firewall_software:8.7.1</product>
<product>asa_1000v_cloud_firewall_software:8.7.1.1</product>
<product>pix_firewall:501_base</product>
<product>pix_firewall:506_base</product>
<product>pix_firewall:515_base</product>
<product>pix_firewall:515e_base</product>
<product>pix_firewall:520_base</product>
<product>pix_firewall:525_6.3</product>
<product>pix_firewall:525_base</product>
<product>pix_firewall:535_base</product>
<product>pix_firewall:base</product>
</cve>
<cve id="CVE-2016-9005" level="LOW">
<product>system_storage_ts3100-ts3200_tape_library:d.60</product>
</cve>
<cve id="CVE-2016-8870" level="MEDIUM">
<product>joomla%21:3.6.3</product>
</cve>
<cve id="CVE-2016-4878" level="MEDIUM">
<product>basercms:3.0.10</product>
</cve>
<cve id="CVE-2016-1156" level="MEDIUM">
<product>line:4.3.0.724</product>
<product>line:4.3.1</product>
</cve>
<cve id="CVE-2016-10653" level="MEDIUM">
<product>xd-testing:-</product>
</cve>
<cve id="CVE-2016-10652" level="MEDIUM">
<product>prebuild-lwip:0.0.4</product>
</cve>
<cve id="CVE-2016-10651" level="MEDIUM">
<product>webdriver-launcher:-</product>
</cve>
<cve id="CVE-2016-1154" level="LOW">
<product>ec-cube_help_plugin:1.3.5</product>
</cve>
<cve id="CVE-2016-10657" level="MEDIUM">
<product>co-cli-installer:-</product>
</cve>
<cve id="CVE-2016-10656" level="MEDIUM">
<product>qbs:-</product>
</cve>
<cve id="CVE-2016-10655" level="MEDIUM">
<product>clang-extra:-</product>
</cve>
<cve id="CVE-2016-10654" level="MEDIUM">
<product>sfml:0.0.3</product>
</cve>
<cve id="CVE-2016-10659" level="MEDIUM">
<product>poco:1.7.7</product>
</cve>
<cve id="CVE-2016-10658" level="MEDIUM">
<product>native-opencv:3.0.0b</product>
</cve>
<cve id="CVE-2016-6581" level="LOW">
<product>hpack:1.0</product>
<product>hpack:2.0</product>
<product>hpack:2.0.1</product>
<product>hpack:2.1.1</product>
<product>hpack:2.2</product>
<product>hyper:0.4</product>
<product>hyper:0.6</product>
</cve>
<cve id="CVE-2016-6580" level="LOW">
<product>python_priority_library:1.0.0</product>
<product>python_priority_library:1.1.0</product>
<product>python_priority_library:1.1.1</product>
</cve>
<cve id="CVE-2016-6582" level="LOW">
<product>doorkeeper:4.1.0</product>
</cve>
<cve id="CVE-2016-8638" level="LOW">
<product>ipsilon:1.0.0</product>
<product>ipsilon:1.0.1</product>
<product>ipsilon:1.0.2</product>
<product>ipsilon:1.1.0</product>
<product>ipsilon:1.1.1</product>
<product>ipsilon:1.2.0</product>
<product>ipsilon:2.0.0</product>
<product>ipsilon:2.0.1</product>
</cve>
<cve id="CVE-2016-8987" level="LOW">
<product>maximo_asset_management:7.1</product>
<product>maximo_asset_management:7.5</product>
<product>maximo_asset_management:7.6</product>
</cve>
<cve id="CVE-2016-8986" level="LOW">
<product>websphere_mq:8.0</product>
<product>websphere_mq:8.0.0.0</product>
<product>websphere_mq:8.0.0.1</product>
<product>websphere_mq:8.0.0.2</product>
<product>websphere_mq:8.0.0.3</product>
<product>websphere_mq:8.0.0.4</product>
<product>websphere_mq:8.0.0.5</product>
</cve>
<cve id="CVE-2016-8982" level="LOW">
<product>infosphere_datastage:8.7</product>
<product>infosphere_datastage:9.1</product>
<product>infosphere_datastage:11.3</product>
</cve>
<cve id="CVE-2016-8981" level="LOW">
<product>bigfix_inventory:9.2</product>
<product>license_metric_tool:9.2.0</product>
</cve>
<cve id="CVE-2016-8980" level="LOW">
<product>bigfix_inventory:9.2</product>
<product>license_metric_tool:9.2.0</product>
</cve>
<cve id="CVE-2016-0408" level="MEDIUM">
<product>peoplesoft_enterprise_peopletools:8.53</product>
<product>peoplesoft_enterprise_peopletools:8.54</product>
<product>peoplesoft_enterprise_peopletools:8.55</product>
</cve>
<cve id="CVE-2016-0409" level="LOW">
<product>peoplesoft_products:9.1</product>
<product>peoplesoft_products:9.2</product>
</cve>
<cve id="CVE-2016-0400" level="MEDIUM">
<product>websphere_extreme_scale:7.1.0</product>
<product>websphere_extreme_scale:7.1.0.2</product>
<product>websphere_extreme_scale:7.1.1</product>
<product>websphere_extreme_scale:8.5.0</product>
<product>websphere_extreme_scale:8.5.0.1</product>
<product>websphere_extreme_scale:8.5.0.2</product>
<product>websphere_extreme_scale:8.6.0.0</product>
<product>websphere_extreme_scale:8.6.0.1</product>
<product>websphere_extreme_scale:8.6.0.2</product>
<product>websphere_extreme_scale:8.6.0.3</product>
<product>websphere_extreme_scale:8.6.0.4</product>
<product>websphere_extreme_scale:8.6.0.5</product>
<product>websphere_extreme_scale:8.6.0.6</product>
<product>websphere_extreme_scale:8.6.0.7</product>
</cve>
<cve id="CVE-2016-0401" level="MEDIUM">
<product>fusion_middleware:11.1.1.7.0</product>
<product>fusion_middleware:11.1.1.9</product>
</cve>
<cve id="CVE-2016-0407" level="LOW">
<product>peoplesoft_enterprise_human_capital_management_human_resources:9.1</product>
<product>peoplesoft_enterprise_human_capital_management_human_resources:9.2</product>
</cve>
<cve id="CVE-2016-0404" level="MEDIUM">
<product>fusion_middleware:11.1.2.2</product>
</cve>
<cve id="CVE-2016-0405" level="LOW">
<product>oracle_and_sun_systems_product_suite:3.3</product>
<product>oracle_and_sun_systems_product_suite:4.0</product>
</cve>
<cve id="CVE-2016-4327" level="MEDIUM">
<product>enablement_server_for_java:6.6-20090827-1616</product>
</cve>
<cve id="CVE-2016-4326" level="LOW">
<product>chef_manage:1.11.4</product>
</cve>
<cve id="CVE-2016-4325" level="LOW">
<product>xprintserver_firmware:3.3.0</product>
</cve>
<cve id="CVE-2016-4988" level="MEDIUM">
<product>build_failure_analyzer:1.15.0</product>
</cve>
<cve id="CVE-2016-1202" level="LOW">
<product>electron:0.33.4</product>
</cve>
<cve id="CVE-2016-1201" level="MEDIUM">
<product>ec-cube:3.0.0</product>
<product>ec-cube:3.0.1</product>
<product>ec-cube:3.0.2</product>
<product>ec-cube:3.0.3</product>
<product>ec-cube:3.0.4</product>
<product>ec-cube:3.0.5</product>
<product>ec-cube:3.0.6</product>
<product>ec-cube:3.0.7</product>
<product>ec-cube:3.0.8</product>
<product>ec-cube:3.0.9</product>
</cve>
<cve id="CVE-2016-4320" level="LOW">
<product>bitbucket:4.7</product>
</cve>
<cve id="CVE-2016-4982" level="MEDIUM">
<product>authd:-</product>
</cve>
<cve id="CVE-2016-4987" level="LOW">
<product>image_gallery_plugin:1.3</product>
</cve>
<cve id="CVE-2016-4986" level="LOW">
<product>tap_plugin:1.24</product>
</cve>
<cve id="CVE-2016-4329" level="LOW">
<product>anti-virus:16.0.0.614</product>
<product>internet_security:16.0.0.614</product>
<product>total_security:16.0.0.614</product>
</cve>
<cve id="CVE-2016-4984" level="MEDIUM">
<product>openldap-servers</product>
</cve>
<cve id="CVE-2016-3539" level="LOW">
<product>agile_product_lifecycle_management_framework:9.3.4</product>
<product>agile_product_lifecycle_management_framework:9.3.5</product>
</cve>
<cve id="CVE-2016-3538" level="LOW">
<product>agile_product_lifecycle_management_framework:9.3.4</product>
<product>agile_product_lifecycle_management_framework:9.3.5</product>
</cve>
<cve id="CVE-2016-3533" level="MEDIUM">
<product>knowledge_management:12.1.1</product>
<product>knowledge_management:12.1.2</product>
<product>knowledge_management:12.1.3</product>
<product>knowledge_management:12.2.3</product>
<product>knowledge_management:12.2.4</product>
<product>knowledge_management:12.2.5</product>
</cve>
<cve id="CVE-2016-3532" level="MEDIUM">
<product>advanced_inbound_telephony:12.1.1</product>
<product>advanced_inbound_telephony:12.1.2</product>
<product>advanced_inbound_telephony:12.1.3</product>
</cve>
<cve id="CVE-2016-3531" level="MEDIUM">
<product>agile_product_lifecycle_management_framework:9.3.4</product>
<product>agile_product_lifecycle_management_framework:9.3.5</product>
</cve>
<cve id="CVE-2016-3530" level="LOW">
<product>agile_product_lifecycle_management_framework:9.3.4</product>
<product>agile_product_lifecycle_management_framework:9.3.5</product>
</cve>
<cve id="CVE-2016-3537" level="LOW">
<product>agile_product_lifecycle_management_framework:9.3.4</product>
<product>agile_product_lifecycle_management_framework:9.3.5</product>
</cve>
<cve id="CVE-2016-3536" level="MEDIUM">
<product>marketing:12.1.1</product>
<product>marketing:12.1.2</product>
<product>marketing:12.1.3</product>
</cve>
<cve id="CVE-2016-3535" level="MEDIUM">
<product>crm_technical_foundation:12.1.3</product>
</cve>
<cve id="CVE-2016-3534" level="MEDIUM">
<product>installed_base:12.1.1</product>
<product>installed_base:12.1.2</product>
<product>installed_base:12.1.3</product>
<product>installed_base:12.2.3</product>
<product>installed_base:12.2.4</product>
<product>installed_base:12.2.5</product>
</cve>
<cve id="CVE-2016-7181" level="HIGH">
<product>edge</product>
</cve>
<cve id="CVE-2016-7189" level="MEDIUM">
<product>edge:-</product>
</cve>
<cve id="CVE-2016-3036" level="LOW">
<product>cognos_business_intelligence:10.1</product>
<product>cognos_business_intelligence:10.2</product>
<product>cognos_business_intelligence:10.2.2</product>
</cve>
<cve id="CVE-2016-3037" level="MEDIUM">
<product>cognos_business_intelligence:10.1</product>
<product>cognos_business_intelligence:10.2</product>
<product>cognos_business_intelligence:10.2.2</product>
</cve>
<cve id="CVE-2016-6046" level="MEDIUM">
<product>tivoli_storage_manager:6.4.1</product>
<product>tivoli_storage_manager:6.4.1.1</product>
<product>tivoli_storage_manager:6.4.2</product>
<product>tivoli_storage_manager:6.4.2.1</product>
<product>tivoli_storage_manager:6.4.2.2</product>
<product>tivoli_storage_manager:6.4.2.3</product>
<product>tivoli_storage_manager:6.4.2.4</product>
<product>tivoli_storage_manager:7.1</product>
<product>tivoli_storage_manager:7.1.0.1</product>
<product>tivoli_storage_manager:7.1.0.2</product>
<product>tivoli_storage_manager:7.1.1.1</product>
<product>tivoli_storage_manager:7.1.1.2</product>
<product>tivoli_storage_manager:7.1.3</product>
<product>tivoli_storage_manager:7.1.3.1</product>
<product>tivoli_storage_manager:7.1.3.2</product>
<product>tivoli_storage_manager:7.1.4</product>
<product>tivoli_storage_manager:7.1.4.1</product>
<product>tivoli_storage_manager:7.1.4.2</product>
<product>tivoli_storage_manager:7.1.7</product>
</cve>
<cve id="CVE-2016-6515" level="LOW">
<product>openssh:7.2</product>
<product>fedora:24</product>
</cve>
<cve id="CVE-2016-3032" level="MEDIUM">
<product>cognos_analytics:11.0.0</product>
<product>cognos_analytics:11.0.1</product>
<product>cognos_analytics:11.0.2</product>
<product>cognos_analytics:11.0.3</product>
<product>cognos_analytics:11.0.4</product>
<product>cognos_analytics:11.0.5</product>
<product>cognos_analytics:11.0.6</product>
</cve>
<cve id="CVE-2016-7986" level="LOW">
<product>tcpdump:4.8.1</product>
</cve>
<cve id="CVE-2016-7987" level="LOW">
<product>eta2_firmware:11.0</product>
<product>eta4_firmware:07</product>
</cve>
<cve id="CVE-2016-7984" level="LOW">
<product>tcpdump:4.8.1</product>
</cve>
<cve id="CVE-2016-7985" level="LOW">
<product>tcpdump:4.8.1</product>
</cve>
<cve id="CVE-2016-7982" level="LOW">
<product>spip:3.1.2</product>
</cve>
<cve id="CVE-2016-7983" level="LOW">
<product>tcpdump:4.8.1</product>
</cve>
<cve id="CVE-2016-7980" level="MEDIUM">
<product>spip:3.1.2</product>
</cve>
<cve id="CVE-2016-7981" level="MEDIUM">
<product>spip:3.1.2</product>
</cve>
<cve id="CVE-2016-9589" level="LOW">
<product>jboss_wildfly_application_server:10.1.0</product>
<product>jboss_wildfly_application_server:11.0.0</product>
</cve>
<cve id="CVE-2016-9584" level="LOW">
<product>libical:2.0</product>
</cve>
<cve id="CVE-2016-9585" level="HIGH">
<product>jboss_enterprise_application_platform:5.0.0</product>
</cve>
<cve id="CVE-2016-9586" level="MEDIUM">
<product>curl:6.0</product>
<product>curl:6.1</product>
<product>curl:6.1</product>
<product>curl:6.2</product>
<product>curl:6.3</product>
<product>curl:6.3.1</product>
<product>curl:6.4</product>
<product>curl:6.5</product>
<product>curl:6.5.1</product>
<product>curl:6.5.2</product>
<product>curl:7.1</product>
<product>curl:7.1.1</product>
<product>curl:7.2</product>
<product>curl:7.2.1</product>
<product>curl:7.3</product>
<product>curl:7.4</product>
<product>curl:7.4.1</product>
<product>curl:7.4.2</product>
<product>curl:7.5</product>
<product>curl:7.5.1</product>
<product>curl:7.5.2</product>
<product>curl:7.6</product>
<product>curl:7.6.1</product>
<product>curl:7.7</product>
<product>curl:7.7.1</product>
<product>curl:7.7.2</product>
<product>curl:7.7.3</product>
<product>curl:7.8</product>
<product>curl:7.8.1</product>
<product>curl:7.9</product>
<product>curl:7.9.1</product>
<product>curl:7.9.2</product>
<product>curl:7.9.3</product>
<product>curl:7.9.4</product>
<product>curl:7.9.5</product>
<product>curl:7.9.6</product>
<product>curl:7.9.7</product>
<product>curl:7.9.8</product>
<product>curl:7.10</product>
<product>curl:7.10.1</product>
<product>curl:7.10.2</product>
<product>curl:7.10.3</product>
<product>curl:7.10.4</product>
<product>curl:7.10.5</product>
<product>curl:7.10.6</product>
<product>curl:7.10.7</product>
<product>curl:7.10.8</product>
<product>curl:7.11.0</product>
<product>curl:7.11.1</product>
<product>curl:7.11.2</product>
<product>curl:7.12.0</product>
<product>curl:7.12.1</product>
<product>curl:7.12.2</product>
<product>curl:7.12.3</product>
<product>curl:7.13.0</product>
<product>curl:7.13.1</product>
<product>curl:7.13.2</product>
<product>curl:7.14.0</product>
<product>curl:7.14.1</product>
<product>curl:7.15.0</product>
<product>curl:7.15.1</product>
<product>curl:7.15.2</product>
<product>curl:7.15.3</product>
<product>curl:7.15.4</product>
<product>curl:7.15.5</product>
<product>curl:7.16.0</product>
<product>curl:7.16.1</product>
<product>curl:7.16.2</product>
<product>curl:7.16.3</product>
<product>curl:7.16.4</product>
<product>curl:7.17.0</product>
<product>curl:7.17.1</product>
<product>curl:7.18.0</product>
<product>curl:7.18.1</product>
<product>curl:7.18.2</product>
<product>curl:7.19.0</product>
<product>curl:7.19.1</product>
<product>curl:7.19.2</product>
<product>curl:7.19.3</product>
<product>curl:7.19.4</product>
<product>curl:7.19.5</product>
<product>curl:7.19.6</product>
<product>curl:7.19.7</product>
<product>curl:7.20.0</product>
<product>curl:7.20.1</product>
<product>curl:7.21.0</product>
<product>curl:7.21.1</product>
<product>curl:7.21.2</product>
<product>curl:7.21.3</product>
<product>curl:7.21.4</product>
<product>curl:7.21.5</product>
<product>curl:7.21.6</product>
<product>curl:7.21.7</product>
<product>curl:7.22.0</product>
<product>curl:7.23.0</product>
<product>curl:7.23.1</product>
<product>curl:7.24.0</product>
<product>curl:7.25.0</product>
<product>curl:7.26.0</product>
<product>curl:7.27.0</product>
<product>curl:7.28.0</product>
<product>curl:7.28.1</product>
<product>curl:7.29.0</product>
<product>curl:7.30.0</product>
<product>curl:7.31.0</product>
<product>curl:7.32.0</product>
<product>curl:7.33.0</product>
<product>curl:7.34.0</product>
<product>curl:7.35.0</product>
<product>curl:7.36.0</product>
<product>curl:7.37.0</product>
<product>curl:7.37.1</product>
<product>curl:7.38.0</product>
<product>curl:7.39.0</product>
<product>curl:7.40.0</product>
<product>curl:7.41.0</product>
<product>curl:7.42.0</product>
<product>curl:7.42.1</product>
<product>curl:7.43.0</product>
<product>curl:7.44.0</product>
<product>curl:7.45.0</product>
<product>curl:7.46.0</product>
<product>curl:7.47.0</product>
<product>curl:7.47.1</product>
<product>curl:7.48.0</product>
<product>curl:7.49.0</product>
<product>curl:7.49.1</product>
<product>curl:7.50.0</product>
<product>curl:7.50.1</product>
<product>curl:7.50.2</product>
<product>curl:7.50.3</product>
<product>curl:7.51.0</product>
</cve>
<cve id="CVE-2016-9587" level="MEDIUM">
<product>openstack:11.0</product>
</cve>
<cve id="CVE-2016-5056" level="LOW">
<product>lightify_pro:-</product>
</cve>
<cve id="CVE-2016-5057" level="LOW">
<product>lightify_pro:-</product>
</cve>
<cve id="CVE-2016-5054" level="LOW">
<product>lightify_home:1.6.1</product>
</cve>
<cve id="CVE-2016-5055" level="MEDIUM">
<product>lightify_pro:-</product>
</cve>
<cve id="CVE-2016-5052" level="LOW">
<product>lightify_home:1.6.1</product>
</cve>
<cve id="CVE-2016-5053" level="LOW">
<product>lightify_home:1.6.1</product>
</cve>
<cve id="CVE-2016-5050" level="LOW">
<product>readydesk:9.1</product>
</cve>
<cve id="CVE-2016-5051" level="LOW">
<product>lightify_home:1.6.1</product>
</cve>
<cve id="CVE-2016-3039" level="LOW">
<product>traveler:8.5.3</product>
<product>traveler:9.0</product>
<product>traveler:9.0.1</product>
</cve>
<cve id="CVE-2016-5058" level="LOW">
<product>lightify_pro:-</product>
</cve>
<cve id="CVE-2016-5059" level="LOW">
<product>lightify_pro:-</product>
</cve>
<cve id="CVE-2016-5588" level="LOW">
<product>outside_in_technology:8.4.0</product>
<product>outside_in_technology:8.5.1</product>
<product>outside_in_technology:8.5.2</product>
<product>outside_in_technology:8.5.3</product>
</cve>
<cve id="CVE-2016-5589" level="LOW">
<product>customer_relationship_management_technical_foundation:12.1.1</product>
<product>customer_relationship_management_technical_foundation:12.1.2</product>
<product>customer_relationship_management_technical_foundation:12.1.3</product>
<product>customer_relationship_management_technical_foundation:12.2.3</product>
<product>customer_relationship_management_technical_foundation:12.2.4</product>
<product>customer_relationship_management_technical_foundation:12.2.5</product>
<product>customer_relationship_management_technical_foundation:12.2.6</product>
</cve>
<cve id="CVE-2016-5585" level="LOW">
<product>interaction_center_intelligence:12.1.1</product>
<product>interaction_center_intelligence:12.1.2</product>
<product>interaction_center_intelligence:12.1.3</product>
</cve>
<cve id="CVE-2016-5586" level="LOW">
<product>email_center:12.1.1</product>
<product>email_center:12.1.2</product>
<product>email_center:12.1.3</product>
<product>email_center:12.2.3</product>
<product>email_center:12.2.4</product>
<product>email_center:12.2.5</product>
<product>email_center:12.2.6</product>
</cve>
<cve id="CVE-2016-5587" level="LOW">
<product>customer_interaction_history:12.1.1</product>
<product>customer_interaction_history:12.1.2</product>
<product>customer_interaction_history:12.1.3</product>
<product>customer_interaction_history:12.2.3</product>
<product>customer_interaction_history:12.2.4</product>
</cve>
<cve id="CVE-2016-5580" level="LOW">
<product>secure_global_desktop:4.7</product>
<product>secure_global_desktop:5.2</product>
</cve>
<cve id="CVE-2016-5581" level="LOW">
<product>irecruitment:12.1.1</product>
<product>irecruitment:12.1.2</product>
<product>irecruitment:12.1.3</product>
<product>irecruitment:12.2.3</product>
<product>irecruitment:12.2.4</product>
<product>irecruitment:12.2.5</product>
<product>irecruitment:12.2.6</product>
</cve>
<cve id="CVE-2016-5582" level="MEDIUM">
<product>jdk:1.6.0</product>
<product>jdk:1.7.0</product>
<product>jdk:1.8.0</product>
<product>jdk:1.8.0</product>
<product>jre:1.6.0</product>
<product>jre:1.7.0</product>
<product>jre:1.8.0</product>
<product>jre:1.8.0</product>
</cve>
<cve id="CVE-2016-5583" level="LOW">
<product>one-to-one_fulfillment:12.1.1</product>
<product>one-to-one_fulfillment:12.1.2</product>
<product>one-to-one_fulfillment:12.1.3</product>
<product>one-to-one_fulfillment:12.2.3</product>
<product>one-to-one_fulfillment:12.2.4</product>
<product>one-to-one_fulfillment:12.2.5</product>
<product>one-to-one_fulfillment:12.2.6</product>
</cve>
<cve id="CVE-2016-7964" level="MEDIUM">
<product>dokuwiki:2016-06-26a</product>
</cve>
<cve id="CVE-2016-7965" level="MEDIUM">
<product>dokuwiki:2016-06-26a</product>
</cve>
<cve id="CVE-2016-2050" level="MEDIUM">
<product>libdwarf:20151114</product>
</cve>
<cve id="CVE-2016-7967" level="MEDIUM">
<product>kmail:5.3.0</product>
</cve>
<cve id="CVE-2016-6800" level="MEDIUM">
<product>ofbiz:11.04</product>
<product>ofbiz:11.04.01</product>
<product>ofbiz:11.04.02</product>
<product>ofbiz:11.04.03</product>
<product>ofbiz:11.04.04</product>
<product>ofbiz:11.04.05</product>
<product>ofbiz:11.04.06</product>
<product>ofbiz:12.04</product>
<product>ofbiz:12.04.01</product>
<product>ofbiz:12.04.02</product>
<product>ofbiz:12.04.03</product>
<product>ofbiz:12.04.04</product>
<product>ofbiz:12.04.05</product>
<product>ofbiz:12.04.06</product>
<product>ofbiz:13.07</product>
<product>ofbiz:13.07.01</product>
<product>ofbiz:13.07.02</product>
<product>ofbiz:13.07.03</product>
</cve>
<cve id="CVE-2016-6802" level="LOW">
<product>shiro:1.3.1</product>
</cve>
<cve id="CVE-2016-6803" level="MEDIUM">
<product>openoffice:4.1.2</product>
</cve>
<cve id="CVE-2016-6804" level="MEDIUM">
<product>openoffice:4.1.2</product>
</cve>
<cve id="CVE-2016-6805" level="MEDIUM">
<product>ignite:1.8</product>
</cve>
<cve id="CVE-2016-6806" level="MEDIUM">
<product>wicket:6.20.0</product>
<product>wicket:6.21.0</product>
<product>wicket:6.22.0</product>
<product>wicket:6.23.0</product>
<product>wicket:6.24.0</product>
<product>wicket:7.0.0</product>
<product>wicket:7.1.0</product>
<product>wicket:7.2.0</product>
<product>wicket:7.3.0</product>
<product>wicket:7.4.0</product>
<product>wicket:8.0.0</product>
</cve>
<cve id="CVE-2016-6807" level="LOW">
<product>ambari:2.4.0</product>
<product>ambari:2.4.1</product>
</cve>
<cve id="CVE-2016-6809" level="LOW">
<product>tika:1.13</product>
</cve>
<cve id="CVE-2016-7968" level="LOW">
<product>kmail:5.3.0</product>
</cve>
<cve id="CVE-2016-6112" level="LOW">
<product>distributed_marketing:8.6.0.0</product>
<product>distributed_marketing:9.0.0.0</product>
<product>distributed_marketing:9.1.0.0</product>
<product>distributed_marketing:10.0.0.0</product>
<product>marketing_operations:8.6.0.0</product>
<product>marketing_operations:9.0.0.0</product>
<product>marketing_operations:9.1.0.0</product>
<product>marketing_operations:10.0.0.0</product>
<product>marketing_platform:8.6.0.0</product>
<product>marketing_platform:9.0.0.0</product>
<product>marketing_platform:9.1.0.0</product>
<product>marketing_platform:9.1.2.0</product>
<product>marketing_platform:10.0</product>
</cve>
<cve id="CVE-2016-6113" level="MEDIUM">
<product>domino:8.5.1.0</product>
<product>domino:8.5.1.1</product>
<product>domino:8.5.1.2</product>
<product>domino:8.5.1.3</product>
<product>domino:8.5.1.4</product>
<product>domino:8.5.1.5</product>
<product>domino:8.5.2.0</product>
<product>domino:8.5.2.1</product>
<product>domino:8.5.2.2</product>
<product>domino:8.5.2.3</product>
<product>domino:8.5.2.4</product>
<product>domino:8.5.3.0</product>
<product>domino:8.5.3.1</product>
<product>domino:8.5.3.2</product>
<product>domino:8.5.3.3</product>
<product>domino:8.5.3.4</product>
<product>domino:8.5.3.5</product>
<product>domino:8.5.3.6</product>
<product>domino:9.0.0.0</product>
<product>domino:9.0.1.0</product>
<product>domino:9.0.1.1</product>
<product>domino:9.0.1.2</product>
<product>domino:9.0.1.3</product>
<product>domino:9.0.1.4</product>
<product>domino:9.0.1.5</product>
<product>domino:9.0.1.6</product>
<product>inotes:8.5.1.0</product>
<product>inotes:8.5.1.1</product>
<product>inotes:8.5.1.2</product>
<product>inotes:8.5.1.3</product>
<product>inotes:8.5.1.4</product>
<product>inotes:8.5.1.5</product>
<product>inotes:8.5.2.0</product>
<product>inotes:8.5.2.1</product>
<product>inotes:8.5.2.2</product>
<product>inotes:8.5.2.3</product>
<product>inotes:8.5.3.0</product>
<product>inotes:8.5.3.1</product>
<product>inotes:8.5.3.2</product>
<product>inotes:8.5.3.3</product>
<product>inotes:8.5.3.4</product>
<product>inotes:8.5.3.5</product>
<product>inotes:8.5.3.6</product>
<product>inotes:9.0.0.0</product>
<product>inotes:9.0.1.0</product>
<product>inotes:9.0.1.1</product>
<product>inotes:9.0.1.2</product>
<product>inotes:9.0.1.3</product>
<product>inotes:9.0.1.4</product>
<product>inotes:9.0.1.5</product>
<product>inotes:9.0.1.6</product>
</cve>
<cve id="CVE-2016-6110" level="LOW">
<product>tivoli_storage_manager:7.1.0.0</product>
<product>tivoli_storage_manager:7.1.6.3</product>
<product>your_sha256_hashfor_vmware:7.1.0.0</product>
<product>your_sha256_hashfor_vmware:7.1.6.3</product>
</cve>
<cve id="CVE-2016-6111" level="LOW">
<product>curam_social_program_management:5.2</product>
<product>curam_social_program_management:5.2</product>
<product>curam_social_program_management:5.2</product>
<product>curam_social_program_management:6.0</product>
<product>curam_social_program_management:6.0</product>
<product>curam_social_program_management:6.0.0</product>
<product>curam_social_program_management:6.0.4.0</product>
<product>curam_social_program_management:6.0.4.1</product>
<product>curam_social_program_management:6.0.4.2</product>
<product>curam_social_program_management:6.0.4.3</product>
<product>curam_social_program_management:6.0.4.4</product>
<product>curam_social_program_management:6.0.4.5</product>
<product>curam_social_program_management:6.0.4.6</product>
<product>curam_social_program_management:6.0.4.7</product>
<product>curam_social_program_management:6.0.4.8</product>
<product>curam_social_program_management:6.0.5</product>
<product>curam_social_program_management:6.0.5.0</product>
<product>curam_social_program_management:6.0.5.1</product>
<product>curam_social_program_management:6.0.5.2</product>
<product>curam_social_program_management:6.0.5.3</product>
<product>curam_social_program_management:6.0.5.4</product>
<product>curam_social_program_management:6.0.5.5</product>
<product>curam_social_program_management:6.0.5.6</product>
<product>curam_social_program_management:6.0.5.7</product>
<product>curam_social_program_management:6.0.5.8</product>
<product>curam_social_program_management:6.0.5.9</product>
<product>curam_social_program_management:6.1.0.0</product>
<product>curam_social_program_management:6.1.0.1</product>
<product>curam_social_program_management:6.1.0.2</product>
<product>curam_social_program_management:6.1.0.3</product>
<product>curam_social_program_management:6.1.1.0</product>
<product>curam_social_program_management:6.1.1.1</product>
<product>curam_social_program_management:6.1.1.2</product>
<product>curam_social_program_management:6.1.1.3</product>
<product>curam_social_program_management:6.2.0.0</product>
<product>curam_social_program_management:6.2.0.1</product>
<product>curam_social_program_management:6.2.0.2</product>
<product>curam_social_program_management:6.2.0.3</product>
<product>curam_social_program_management:7.0.0.0</product>
</cve>
<cve id="CVE-2016-6116" level="MEDIUM">
<product>security_key_lifecycle_manager:2.5.0</product>
<product>security_key_lifecycle_manager:2.5.0.0</product>
<product>security_key_lifecycle_manager:2.5.0.1</product>
<product>security_key_lifecycle_manager:2.5.0.2</product>
<product>security_key_lifecycle_manager:2.5.0.3</product>
<product>security_key_lifecycle_manager:2.5.0.4</product>
<product>security_key_lifecycle_manager:2.5.0.5</product>
<product>security_key_lifecycle_manager:2.5.0.6</product>
<product>security_key_lifecycle_manager:2.5.0.7</product>
<product>security_key_lifecycle_manager:2.6.0</product>
<product>security_key_lifecycle_manager:2.6.0.1</product>
<product>security_key_lifecycle_manager:2.6.0.2</product>
</cve>
<cve id="CVE-2016-6117" level="LOW">
<product>security_key_lifecycle_manager:2.5.0</product>
<product>security_key_lifecycle_manager:2.5.0.0</product>
<product>security_key_lifecycle_manager:2.5.0.1</product>
<product>security_key_lifecycle_manager:2.5.0.2</product>
<product>security_key_lifecycle_manager:2.5.0.3</product>
<product>security_key_lifecycle_manager:2.5.0.4</product>
<product>security_key_lifecycle_manager:2.5.0.5</product>
<product>security_key_lifecycle_manager:2.5.0.6</product>
<product>security_key_lifecycle_manager:2.5.0.7</product>
<product>security_key_lifecycle_manager:2.6.0</product>
<product>security_key_lifecycle_manager:2.6.0.1</product>
<product>security_key_lifecycle_manager:2.6.0.2</product>
</cve>
<cve id="CVE-2016-6114" level="MEDIUM">
<product>emptoris_sourcing:9.5</product>
<product>emptoris_sourcing:10.0.0</product>
<product>emptoris_sourcing:10.0.1</product>
<product>emptoris_sourcing:10.0.2</product>
<product>emptoris_sourcing:10.0.4</product>
<product>emptoris_sourcing:10.1.0</product>
<product>emptoris_sourcing:10.1.1</product>
</cve>
<cve id="CVE-2016-6115" level="LOW">
<product>general_parallel_file_system:4.1.0.0</product>
<product>general_parallel_file_system:4.1.0.1</product>
<product>general_parallel_file_system:4.1.0.2</product>
<product>general_parallel_file_system:4.1.0.3</product>
<product>general_parallel_file_system:4.1.0.4</product>
<product>general_parallel_file_system:4.1.0.5</product>
<product>general_parallel_file_system:4.1.0.6</product>
<product>general_parallel_file_system:4.1.0.7</product>
<product>general_parallel_file_system:4.1.0.8</product>
<product>spectrum_scale:4.1.0.0</product>
<product>spectrum_scale:4.1.1.0</product>
<product>spectrum_scale:4.1.1.1</product>
<product>spectrum_scale:4.1.1.2</product>
<product>spectrum_scale:4.1.1.3</product>
<product>spectrum_scale:4.1.1.4</product>
<product>spectrum_scale:4.1.1.5</product>
<product>spectrum_scale:4.1.1.6</product>
<product>spectrum_scale:4.1.1.7</product>
<product>spectrum_scale:4.1.1.8</product>
<product>spectrum_scale:4.1.1.9</product>
<product>spectrum_scale:4.1.1.10</product>
<product>spectrum_scale:4.2.0.0</product>
<product>spectrum_scale:4.2.0.1</product>
<product>spectrum_scale:4.2.0.2</product>
<product>spectrum_scale:4.2.0.3</product>
<product>spectrum_scale:4.2.1</product>
<product>spectrum_scale:4.2.2.0</product>
</cve>
<cve id="CVE-2016-6118" level="MEDIUM">
<product>emptoris_strategic_supply_management:10.1.1.0</product>
<product>emptoris_strategic_supply_management:10.1.1.1</product>
<product>emptoris_strategic_supply_management:10.1.1.2</product>
<product>emptoris_strategic_supply_management:10.1.1.3</product>
<product>emptoris_strategic_supply_management:10.1.1.4</product>
<product>emptoris_strategic_supply_management:10.1.1.5</product>
<product>emptoris_strategic_supply_management:10.1.1.6</product>
<product>emptoris_strategic_supply_management:10.1.1.7</product>
<product>emptoris_strategic_supply_management:10.1.1.8</product>
<product>emptoris_strategic_supply_management:10.1.1.9</product>
<product>emptoris_strategic_supply_management:10.1.1.10</product>
<product>emptoris_strategic_supply_management:10.1.1.11</product>
</cve>
<cve id="CVE-2016-4383" level="MEDIUM">
<product>helion_openstack_glance:-</product>
</cve>
<cve id="CVE-2016-4382" level="MEDIUM">
<product>performance_center:11.52</product>
<product>performance_center:12.00</product>
<product>performance_center:12.01</product>
<product>performance_center:12.20</product>
<product>performance_center:12.50</product>
</cve>
<cve id="CVE-2016-6544" level="LOW">
<product>itrack_easy:-</product>
</cve>
<cve id="CVE-2016-4389" level="MEDIUM">
<product>keyview:10.18.0.0</product>
<product>keyview:10.19.0.0</product>
<product>keyview:10.20.0.0</product>
<product>keyview:10.21.0.0</product>
<product>keyview:10.22.0.0</product>
<product>keyview:10.23.0.0</product>
<product>keyview:10.24.0.0</product>
</cve>
<cve id="CVE-2016-4388" level="MEDIUM">
<product>keyview:10.18.0.0</product>
<product>keyview:10.19.0.0</product>
<product>keyview:10.20.0.0</product>
<product>keyview:10.21.0.0</product>
<product>keyview:10.22.0.0</product>
<product>keyview:10.23.0.0</product>
<product>keyview:10.24.0.0</product>
</cve>
<cve id="CVE-2016-0349" level="LOW">
<product>business_process_manager:8.5.6.0</product>
<product>business_process_manager:8.5.7.0</product>
</cve>
<cve id="CVE-2016-0348" level="MEDIUM">
<product>tririga_application_platform:3.3.0.0</product>
<product>tririga_application_platform:3.3.1.0</product>
<product>tririga_application_platform:3.3.2.0</product>
<product>tririga_application_platform:3.4.0.0</product>
</cve>
<cve id="CVE-2016-0341" level="LOW">
<product>b2b_advanced_communications:1.0</product>
<product>b2b_advanced_communications:1.0.0.1</product>
<product>b2b_advanced_communications:1.0.0.2</product>
<product>b2b_advanced_communications:1.0.0.3</product>
<product>multi-enterprise_integration_gateway:1.0.0</product>
</cve>
<cve id="CVE-2016-0340" level="MEDIUM">
<product>security_identity_manager_adapter:7.0.0.0</product>
<product>security_identity_manager_adapter:7.0.0.1</product>
<product>security_identity_manager_adapter:7.0.0.2</product>
<product>security_identity_manager_adapter:7.0.0.3</product>
<product>security_identity_manager_adapter:7.0.1.0</product>
<product>security_identity_manager_adapter:7.0.1.1</product>
</cve>
<cve id="CVE-2016-0343" level="LOW">
<product>tririga_application_platform:3.3.0.0</product>
<product>tririga_application_platform:3.3.0.1</product>
<product>tririga_application_platform:3.3.0.2</product>
<product>tririga_application_platform:3.3.1.0</product>
<product>tririga_application_platform:3.3.1.1</product>
<product>tririga_application_platform:3.3.1.2</product>
<product>tririga_application_platform:3.3.1.3</product>
<product>tririga_application_platform:3.3.2.0</product>
<product>tririga_application_platform:3.3.2.1</product>
<product>tririga_application_platform:3.3.2.3</product>
<product>tririga_application_platform:3.3.2.4</product>
<product>tririga_application_platform:3.3.2.5</product>
<product>tririga_application_platform:3.4.0.0</product>
<product>tririga_application_platform:3.4.1.1</product>
<product>tririga_application_platform:3.4.1.2</product>
<product>tririga_application_platform:3.4.1.3</product>
<product>tririga_application_platform:3.4.2.0</product>
<product>tririga_application_platform:3.4.2.1</product>
<product>tririga_application_platform:3.4.2.2</product>
<product>tririga_application_platform:3.5.0.0</product>
</cve>
<cve id="CVE-2016-0342" level="LOW">
<product>tririga_application_platform:3.3.0.0</product>
<product>tririga_application_platform:3.3.0.1</product>
<product>tririga_application_platform:3.3.0.2</product>
<product>tririga_application_platform:3.3.1.0</product>
<product>tririga_application_platform:3.3.1.1</product>
<product>tririga_application_platform:3.3.1.2</product>
<product>tririga_application_platform:3.3.1.3</product>
<product>tririga_application_platform:3.3.2.0</product>
<product>tririga_application_platform:3.3.2.1</product>
<product>tririga_application_platform:3.3.2.3</product>
<product>tririga_application_platform:3.3.2.4</product>
<product>tririga_application_platform:3.3.2.5</product>
<product>tririga_application_platform:3.4.0.0</product>
<product>tririga_application_platform:3.4.1.1</product>
<product>tririga_application_platform:3.4.1.2</product>
<product>tririga_application_platform:3.4.1.3</product>
<product>tririga_application_platform:3.4.2.0</product>
<product>tririga_application_platform:3.4.2.1</product>
<product>tririga_application_platform:3.4.2.2</product>
<product>tririga_application_platform:3.5.0.0</product>
</cve>
<cve id="CVE-2016-0345" level="LOW">
<product>tririga_application_platform:3.3.0.0</product>
<product>tririga_application_platform:3.3.0.1</product>
<product>tririga_application_platform:3.3.0.2</product>
<product>tririga_application_platform:3.3.1.0</product>
<product>tririga_application_platform:3.3.1.1</product>
<product>tririga_application_platform:3.3.1.2</product>
<product>tririga_application_platform:3.3.1.3</product>
<product>tririga_application_platform:3.3.2.0</product>
<product>tririga_application_platform:3.3.2.1</product>
<product>tririga_application_platform:3.3.2.3</product>
<product>tririga_application_platform:3.3.2.4</product>
<product>tririga_application_platform:3.3.2.5</product>
<product>tririga_application_platform:3.4.0.0</product>
<product>tririga_application_platform:3.4.1.1</product>
<product>tririga_application_platform:3.4.1.2</product>
<product>tririga_application_platform:3.4.1.3</product>
<product>tririga_application_platform:3.4.2.0</product>
<product>tririga_application_platform:3.4.2.1</product>
<product>tririga_application_platform:3.4.2.2</product>
<product>tririga_application_platform:3.5.0.0</product>
</cve>
<cve id="CVE-2016-0344" level="MEDIUM">
<product>tririga_application_platform:3.3.0.0</product>
<product>tririga_application_platform:3.3.0.1</product>
<product>tririga_application_platform:3.3.0.2</product>
<product>tririga_application_platform:3.3.1.0</product>
<product>tririga_application_platform:3.3.1.1</product>
<product>tririga_application_platform:3.3.1.2</product>
<product>tririga_application_platform:3.3.1.3</product>
<product>tririga_application_platform:3.3.2.0</product>
<product>tririga_application_platform:3.3.2.1</product>
<product>tririga_application_platform:3.3.2.3</product>
<product>tririga_application_platform:3.3.2.4</product>
<product>tririga_application_platform:3.3.2.5</product>
<product>tririga_application_platform:3.4.0.0</product>
<product>tririga_application_platform:3.4.1.1</product>
<product>tririga_application_platform:3.4.1.2</product>
<product>tririga_application_platform:3.4.1.3</product>
<product>tririga_application_platform:3.4.2.0</product>
<product>tririga_application_platform:3.4.2.1</product>
<product>tririga_application_platform:3.4.2.2</product>
<product>tririga_application_platform:3.4.2.3</product>
<product>tririga_application_platform:3.5.0.0</product>
</cve>
<cve id="CVE-2016-0346" level="MEDIUM">
<product>cognos_business_intelligence:10.1.1</product>
<product>cognos_business_intelligence:10.2</product>
<product>cognos_business_intelligence:10.2.1</product>
<product>cognos_business_intelligence:10.2.1.1</product>
<product>cognos_business_intelligence:10.2.2</product>
</cve>
<cve id="CVE-2016-9979" level="MEDIUM">
<product>curam_social_program_management:6.0.4.0</product>
<product>curam_social_program_management:6.0.4.1</product>
<product>curam_social_program_management:6.0.4.2</product>
<product>curam_social_program_management:6.0.4.3</product>
<product>curam_social_program_management:6.0.4.4</product>
<product>curam_social_program_management:6.0.4.5</product>
<product>curam_social_program_management:6.0.4.6</product>
<product>curam_social_program_management:6.0.4.7</product>
<product>curam_social_program_management:6.0.4.8</product>
<product>curam_social_program_management:6.0.5</product>
<product>curam_social_program_management:6.0.5.0</product>
<product>curam_social_program_management:6.0.5.1</product>
<product>curam_social_program_management:6.0.5.2</product>
<product>curam_social_program_management:6.0.5.3</product>
<product>curam_social_program_management:6.0.5.4</product>
<product>curam_social_program_management:6.0.5.5</product>
<product>curam_social_program_management:6.0.5.6</product>
<product>curam_social_program_management:6.0.5.7</product>
<product>curam_social_program_management:6.0.5.8</product>
<product>curam_social_program_management:6.0.5.9</product>
<product>curam_social_program_management:6.1.0.0</product>
<product>curam_social_program_management:6.1.0.1</product>
<product>curam_social_program_management:6.1.0.2</product>
<product>curam_social_program_management:6.1.0.3</product>
<product>curam_social_program_management:6.1.1.0</product>
<product>curam_social_program_management:6.1.1.1</product>
<product>curam_social_program_management:6.1.1.2</product>
<product>curam_social_program_management:6.1.1.3</product>
<product>curam_social_program_management:6.2.0.0</product>
<product>curam_social_program_management:6.2.0.1</product>
<product>curam_social_program_management:6.2.0.2</product>
<product>curam_social_program_management:6.2.0.3</product>
<product>curam_social_program_management:7.0.0.0</product>
</cve>
<cve id="CVE-2016-9978" level="LOW">
<product>curam_social_program_management:5.2</product>
<product>curam_social_program_management:5.2</product>
<product>curam_social_program_management:5.2</product>
<product>curam_social_program_management:6.0</product>
<product>curam_social_program_management:6.0</product>
<product>curam_social_program_management:6.0.0</product>
<product>curam_social_program_management:6.0.4.0</product>
<product>curam_social_program_management:6.0.4.1</product>
<product>curam_social_program_management:6.0.4.2</product>
<product>curam_social_program_management:6.0.4.3</product>
<product>curam_social_program_management:6.0.4.4</product>
<product>curam_social_program_management:6.0.4.5</product>
<product>curam_social_program_management:6.0.4.6</product>
<product>curam_social_program_management:6.0.4.7</product>
<product>curam_social_program_management:6.0.4.8</product>
<product>curam_social_program_management:6.0.5</product>
<product>curam_social_program_management:6.0.5.0</product>
<product>curam_social_program_management:6.0.5.1</product>
<product>curam_social_program_management:6.0.5.2</product>
<product>curam_social_program_management:6.0.5.3</product>
<product>curam_social_program_management:6.0.5.4</product>
<product>curam_social_program_management:6.0.5.5</product>
<product>curam_social_program_management:6.0.5.6</product>
<product>curam_social_program_management:6.0.5.7</product>
<product>curam_social_program_management:6.0.5.8</product>
<product>curam_social_program_management:6.0.5.9</product>
<product>curam_social_program_management:6.1.0.0</product>
<product>curam_social_program_management:6.1.0.1</product>
<product>curam_social_program_management:6.1.0.2</product>
<product>curam_social_program_management:6.1.0.3</product>
<product>curam_social_program_management:6.1.1.0</product>
<product>curam_social_program_management:6.1.1.1</product>
<product>curam_social_program_management:6.1.1.2</product>
<product>curam_social_program_management:6.1.1.3</product>
<product>curam_social_program_management:6.2.0.0</product>
<product>curam_social_program_management:6.2.0.1</product>
<product>curam_social_program_management:6.2.0.2</product>
<product>curam_social_program_management:6.2.0.3</product>
<product>curam_social_program_management:7.0.0.0</product>
</cve>
<cve id="CVE-2016-9973" level="MEDIUM">
<product>rational_collaborative_lifecycle_management:4.0</product>
<product>rational_collaborative_lifecycle_management:4.0.1</product>
<product>rational_collaborative_lifecycle_management:4.0.2</product>
<product>rational_collaborative_lifecycle_management:4.0.3</product>
<product>rational_collaborative_lifecycle_management:4.0.4</product>
<product>rational_collaborative_lifecycle_management:4.0.5</product>
<product>rational_collaborative_lifecycle_management:4.0.6</product>
<product>rational_collaborative_lifecycle_management:4.0.7</product>
<product>rational_collaborative_lifecycle_management:5.0</product>
<product>rational_collaborative_lifecycle_management:5.0.1</product>
<product>rational_collaborative_lifecycle_management:5.0.2</product>
<product>rational_collaborative_lifecycle_management:6.0</product>
<product>rational_collaborative_lifecycle_management:6.0.1</product>
<product>rational_collaborative_lifecycle_management:6.0.2</product>
<product>rational_collaborative_lifecycle_management:6.0.3</product>
<product>rational_doors_next_generation:4.0</product>
<product>rational_doors_next_generation:4.0.1</product>
<product>rational_doors_next_generation:4.0.2</product>
<product>rational_doors_next_generation:4.0.3</product>
<product>rational_doors_next_generation:4.0.4</product>
<product>rational_doors_next_generation:4.0.5</product>
<product>rational_doors_next_generation:4.0.6</product>
<product>rational_doors_next_generation:4.0.7</product>
<product>rational_doors_next_generation:5.0</product>
<product>rational_doors_next_generation:5.0.1</product>
<product>rational_doors_next_generation:5.0.2</product>
<product>rational_doors_next_generation:6.0</product>
<product>rational_doors_next_generation:6.0.1</product>
<product>rational_doors_next_generation:6.0.2</product>
<product>rational_doors_next_generation:6.0.3</product>
<product>rational_engineering_lifecycle_manager:4.0.3</product>
<product>rational_engineering_lifecycle_manager:4.0.4</product>
<product>rational_engineering_lifecycle_manager:4.0.5</product>
<product>rational_engineering_lifecycle_manager:4.0.6</product>
<product>rational_engineering_lifecycle_manager:4.0.7</product>
<product>rational_engineering_lifecycle_manager:5.0</product>
<product>rational_engineering_lifecycle_manager:5.0.1</product>
<product>rational_engineering_lifecycle_manager:5.0.2</product>
<product>rational_engineering_lifecycle_manager:6.0</product>
<product>rational_engineering_lifecycle_manager:6.0.1</product>
<product>rational_engineering_lifecycle_manager:6.0.2</product>
<product>rational_engineering_lifecycle_manager:6.0.3</product>
<product>rational_quality_manager:4.0</product>
<product>rational_quality_manager:4.0.1</product>
<product>rational_quality_manager:4.0.2</product>
<product>rational_quality_manager:4.0.3</product>
<product>rational_quality_manager:4.0.4</product>
<product>rational_quality_manager:4.0.5</product>
<product>rational_quality_manager:4.0.6</product>
<product>rational_quality_manager:4.0.7</product>
<product>rational_quality_manager:5.0</product>
<product>rational_quality_manager:5.0.1</product>
<product>rational_quality_manager:5.0.2</product>
<product>rational_quality_manager:6.0</product>
<product>rational_quality_manager:6.0.1</product>
<product>rational_quality_manager:6.0.2</product>
<product>rational_quality_manager:6.0.3</product>
<product>rational_rhapsody_design_manager:4.0</product>
<product>rational_rhapsody_design_manager:4.0.1</product>
<product>rational_rhapsody_design_manager:4.0.2</product>
<product>rational_rhapsody_design_manager:4.0.3</product>
<product>rational_rhapsody_design_manager:4.0.4</product>
<product>rational_rhapsody_design_manager:4.0.5</product>
<product>rational_rhapsody_design_manager:4.0.6</product>
<product>rational_rhapsody_design_manager:4.0.7</product>
<product>rational_rhapsody_design_manager:5.0</product>
<product>rational_rhapsody_design_manager:5.0.1</product>
<product>rational_rhapsody_design_manager:5.0.2</product>
<product>rational_rhapsody_design_manager:6.0</product>
<product>rational_rhapsody_design_manager:6.0.1</product>
<product>rational_rhapsody_design_manager:6.0.2</product>
<product>rational_rhapsody_design_manager:6.0.3</product>
<product>rational_software_architect_design_manager:4.0</product>
<product>rational_software_architect_design_manager:4.0.1</product>
<product>rational_software_architect_design_manager:4.0.2</product>
<product>rational_software_architect_design_manager:4.0.3</product>
<product>rational_software_architect_design_manager:4.0.4</product>
<product>rational_software_architect_design_manager:4.0.5</product>
<product>rational_software_architect_design_manager:4.0.6</product>
<product>rational_software_architect_design_manager:4.0.7</product>
<product>rational_software_architect_design_manager:5.0</product>
<product>rational_software_architect_design_manager:5.0.1</product>
<product>rational_software_architect_design_manager:5.0.2</product>
<product>rational_software_architect_design_manager:6.0</product>
<product>rational_software_architect_design_manager:6.0.1</product>
<product>rational_software_architect_design_manager:6.0.2</product>
<product>rational_software_architect_design_manager:6.0.3</product>
<product>rational_team_concert:4.0</product>
<product>rational_team_concert:4.0.1</product>
<product>rational_team_concert:4.0.2</product>
<product>rational_team_concert:4.0.3</product>
<product>rational_team_concert:4.0.4</product>
<product>rational_team_concert:4.0.5</product>
<product>rational_team_concert:4.0.6</product>
<product>rational_team_concert:4.0.7</product>
<product>rational_team_concert:5.0</product>
<product>rational_team_concert:5.0.1</product>
<product>rational_team_concert:5.0.2</product>
<product>rational_team_concert:6.0</product>
<product>rational_team_concert:6.0.1</product>
<product>rational_team_concert:6.0.2</product>
<product>rational_team_concert:6.0.3</product>
</cve>
<cve id="CVE-2016-9972" level="MEDIUM">
<product>qradar_security_information_and_event_manager:7.2.0</product>
<product>qradar_security_information_and_event_manager:7.2.1</product>
<product>qradar_security_information_and_event_manager:7.2.2</product>
<product>qradar_security_information_and_event_manager:7.2.3</product>
<product>qradar_security_information_and_event_manager:7.2.4</product>
<product>qradar_security_information_and_event_manager:7.2.5</product>
<product>qradar_security_information_and_event_manager:7.2.6</product>
<product>qradar_security_information_and_event_manager:7.2.7</product>
<product>qradar_security_information_and_event_manager:7.2.8</product>
<product>qradar_security_information_and_event_manager:7.2.8</product>
<product>qradar_security_information_and_event_manager:7.2.8</product>
<product>qradar_security_information_and_event_manager:7.2.8</product>
<product>qradar_security_information_and_event_manager:7.2.8</product>
<product>qradar_security_information_and_event_manager:7.2.8</product>
<product>qradar_security_information_and_event_manager:7.2.8</product>
<product>qradar_security_information_and_event_manager:7.3.0</product>
<product>qradar_security_information_and_event_manager:7.3.0</product>
</cve>
<cve id="CVE-2016-9975" level="MEDIUM">
<product>dashboard_application_services_hub:3.1.2.1</product>
<product>dashboard_application_services_hub:3.1.3</product>
</cve>
<cve id="CVE-2016-9977" level="LOW">
<product>maximo_asset_management:7.1</product>
<product>maximo_asset_management:7.5</product>
<product>maximo_asset_management:7.6</product>
<product>maximo_asset_management_essentials:7.1</product>
<product>maximo_asset_management_essentials:7.5</product>
</cve>
<cve id="CVE-2016-9976" level="MEDIUM">
<product>maximo_asset_management:7.1</product>
<product>maximo_asset_management:7.5</product>
<product>maximo_asset_management:7.6</product>
<product>maximo_asset_management_essentials:7.1</product>
<product>maximo_asset_management_essentials:7.5</product>
</cve>
<cve id="CVE-2016-10228" level="MEDIUM">
<product>glibc:2.25</product>
</cve>
<cve id="CVE-2016-10223" level="MEDIUM">
<product>bigtree_cms:4.2.14</product>
</cve>
<cve id="CVE-2016-10220" level="MEDIUM">
<product>ghostscript:9.20</product>
</cve>
<cve id="CVE-2016-10221" level="MEDIUM">
<product>mupdf:1.10a</product>
</cve>
<cve id="CVE-2016-10227" level="LOW">
<product>nwa3560-n_firmware:-</product>
<product>usg50_firmware:-</product>
</cve>
<cve id="CVE-2016-10224" level="LOW">
<product>novaweb_web_hmi</product>
</cve>
<cve id="CVE-2016-9399" level="LOW">
<product>jasper:1.900.22</product>
</cve>
<cve id="CVE-2016-9395" level="MEDIUM">
<product>jasper:1.900.24</product>
</cve>
<cve id="CVE-2016-9394" level="MEDIUM">
<product>jasper:1.900.16</product>
</cve>
<cve id="CVE-2016-9397" level="LOW">
<product>jasper:1.900.13</product>
</cve>
<cve id="CVE-2016-9396" level="LOW">
<product>jasper:1.900.11</product>
</cve>
<cve id="CVE-2016-9391" level="LOW">
<product>jasper:2.0.6</product>
</cve>
<cve id="CVE-2016-9390" level="MEDIUM">
<product>jasper:1.900.13</product>
</cve>
<cve id="CVE-2016-9393" level="MEDIUM">
<product>jasper:1.900.17</product>
</cve>
<cve id="CVE-2016-9392" level="MEDIUM">
<product>jasper:1.900.16</product>
</cve>
<cve id="CVE-2016-4518" level="LOW">
<product>pi_af_server_2016:2.7.0</product>
</cve>
<cve id="CVE-2016-4519" level="LOW">
<product>visilogic_oplc_ide:9.8.22</product>
</cve>
<cve id="CVE-2016-4048" level="MEDIUM">
<product>open-xchange_appsuite:7.8.1</product>
</cve>
<cve id="CVE-2016-4049" level="LOW">
<product>quagga:-</product>
<product>leap:42.1</product>
<product>opensuse:13.2</product>
</cve>
<cve id="CVE-2016-4046" level="LOW">
<product>open-xchange_appsuite:7.8.1</product>
</cve>
<cve id="CVE-2016-4511" level="MEDIUM">
<product>pcm600:2.6</product>
</cve>
<cve id="CVE-2016-4512" level="LOW">
<product>elcsoft:2.4.01</product>
</cve>
<cve id="CVE-2016-4045" level="MEDIUM">
<product>open-xchange_appsuite:7.8.1</product>
</cve>
<cve id="CVE-2016-4514" level="HIGH">
<product>pt-7728_firmware:3.4</product>
<product>pt-7728:-</product>
</cve>
<cve id="CVE-2016-4043" level="MEDIUM">
<product>plone:5.0</product>
<product>plone:5.0</product>
<product>plone:5.0</product>
<product>plone:5.0</product>
<product>plone:5.0.1</product>
<product>plone:5.0.2</product>
<product>plone:5.0.3</product>
<product>plone:5.0.4</product>
<product>plone:5.1a1</product>
</cve>
<cve id="CVE-2016-4516" level="LOW">
<product>pcm600:2.6</product>
</cve>
<cve id="CVE-2016-4041" level="LOW">
<product>plone:4.0</product>
<product>plone:4.0.1</product>
<product>plone:4.0.2</product>
<product>plone:4.0.3</product>
<product>plone:4.0.4</product>
<product>plone:4.0.5</product>
<product>plone:4.0.7</product>
<product>plone:4.0.8</product>
<product>plone:4.0.9</product>
<product>plone:4.0.10</product>
<product>plone:4.1</product>
<product>plone:4.1.1</product>
<product>plone:4.1.2</product>
<product>plone:4.1.3</product>
<product>plone:4.1.4</product>
<product>plone:4.1.5</product>
<product>plone:4.1.6</product>
<product>plone:4.2</product>
<product>plone:4.2.1</product>
<product>plone:4.2.2</product>
<product>plone:4.2.3</product>
<product>plone:4.2.4</product>
<product>plone:4.2.5</product>
<product>plone:4.2.6</product>
<product>plone:4.2.7</product>
<product>plone:4.3</product>
<product>plone:4.3.1</product>
<product>plone:4.3.2</product>
<product>plone:4.3.3</product>
<product>plone:4.3.4</product>
<product>plone:4.3.5</product>
<product>plone:4.3.6</product>
<product>plone:4.3.7</product>
<product>plone:4.3.8</product>
<product>plone:4.3.9</product>
<product>plone:5.0</product>
<product>plone:5.0</product>
<product>plone:5.0</product>
<product>plone:5.0</product>
<product>plone:5.0</product>
<product>plone:5.0.1</product>
<product>plone:5.0.2</product>
<product>plone:5.0.3</product>
<product>plone:5.0.4</product>
</cve>
<cve id="CVE-2016-8378" level="LOW">
<product>jenesys_bas_bridge:1.1.8</product>
</cve>
<cve id="CVE-2016-8379" level="MEDIUM">
<product>e1200_series_firmware:2.3</product>
<product>e1200_series_firmware:2.4</product>
<product>e1200_series_firmware:2.5</product>
<product>e2200_series_firmware:3.11</product>
<product>e2200_series_firmware:3.12</product>
<product>e2200_series_firmware:3.13</product>
</cve>
<cve id="CVE-2016-8370" level="LOW">
<product>qj71e71-100_firmware:-</product>
<product>qj71e71-b2_firmware:-</product>
<product>qj71e71-b5_firmware:-</product>
</cve>
<cve id="CVE-2016-8371" level="LOW">
<product>ilc_plcs_firmware:-</product>
</cve>
<cve id="CVE-2016-8372" level="MEDIUM">
<product>e1200_series_firmware:2.3</product>
<product>e1200_series_firmware:2.4</product>
<product>e1200_series_firmware:2.5</product>
<product>e2200_series_firmware:3.11</product>
<product>e2200_series_firmware:3.12</product>
<product>e2200_series_firmware:3.13</product>
</cve>
<cve id="CVE-2016-8374" level="LOW">
<product>magelis_gto_advanced_optimum_panel_firmware:-</product>
<product>magelis_gtu_universal_panel_firmware:-</product>
<product>magelis_sto5_small_panel_firmware:-</product>
<product>magelis_stu_small_panel_firmware:-</product>
<product>magelis_xbt_gh_advanced_hand-held_panel_firmware:-</product>
<product>your_sha256_hash:-</product>
<product>magelis_xbt_gt_advanced_touchscreen_panel_firmware:-</product>
<product>magelis_xbt_gtw_advanced_open_touchscreen_panel_firmware:-</product>
</cve>
<cve id="CVE-2016-8375" level="MEDIUM">
<product>alaris_8015_pc_unit:9.5</product>
<product>alaris_8015_pc_unit:9.7</product>
</cve>
<cve id="CVE-2016-8376" level="MEDIUM">
<product>webdatorcentral:-</product>
</cve>
<cve id="CVE-2016-8377" level="MEDIUM">
<product>plc_winproladder_firmware:3.11</product>
</cve>
<cve id="CVE-2016-2917" level="LOW">
<product>tririga_application_platform:10.4</product>
<product>tririga_application_platform:10.5</product>
</cve>
<cve id="CVE-2016-2914" level="LOW">
<product>rational_publishing_engine:2.0.1</product>
</cve>
<cve id="CVE-2016-9028" level="MEDIUM">
<product>netscaler_application_delivery_controller_firmware:10.1</product>
<product>netscaler_application_delivery_controller_firmware:10.5</product>
<product>netscaler_application_delivery_controller_firmware:11.0</product>
<product>netscaler_application_delivery_controller_firmware:11.1</product>
</cve>
<cve id="CVE-2016-2912" level="MEDIUM">
<product>rational_publishing_engine:2.0.1</product>
</cve>
<cve id="CVE-2016-2268" level="MEDIUM">
<product>secureworks:2.0.6</product>
</cve>
<cve id="CVE-2016-9020" level="LOW">
<product>exponent_cms:2.3.9</product>
</cve>
<cve id="CVE-2016-5648" level="MEDIUM">
<product>acer_portal:3.9.3.2006</product>
</cve>
<cve id="CVE-2016-5642" level="MEDIUM">
<product>network_management_information_system:8.5.10g</product>
</cve>
<cve id="CVE-2016-5640" level="LOW">
<product>airmedia_am-100_firmware:1.2.1</product>
</cve>
<cve id="CVE-2016-5647" level="LOW">
<product>graphics_driver:15.33.42.4358</product>
<product>graphics_driver:15.36.30.4385</product>
<product>graphics_driver:15.40.4404</product>
</cve>
<cve id="CVE-2016-5646" level="MEDIUM">
<product>perceptive_document_filters:11.2.0.1732</product>
</cve>
<cve id="CVE-2016-5645" level="LOW">
<product>1766-l32awa:-</product>
<product>1766-l32awaa:-</product>
<product>1766-l32bwa:-</product>
<product>1766-l32bwaa:-</product>
<product>1766-l32bxb:-</product>
<product>1766-l32bxba:-</product>
</cve>
<cve id="CVE-2016-7933" level="LOW">
<product>tcpdump:4.8.1</product>
</cve>
<cve id="CVE-2016-0212" level="LOW">
<product>tivoli_storage_manager_fastback:5.5.0</product>
<product>tivoli_storage_manager_fastback:6.1.0</product>
<product>tivoli_storage_manager_fastback:6.1.0.0</product>
<product>tivoli_storage_manager_fastback:6.1.0.1</product>
<product>tivoli_storage_manager_fastback:6.1.1</product>
<product>tivoli_storage_manager_fastback:6.1.1.0</product>
<product>tivoli_storage_manager_fastback:6.1.2</product>
<product>tivoli_storage_manager_fastback:6.1.2.0</product>
<product>tivoli_storage_manager_fastback:6.1.3</product>
<product>tivoli_storage_manager_fastback:6.1.3.0</product>
<product>tivoli_storage_manager_fastback:6.1.4</product>
<product>tivoli_storage_manager_fastback:6.1.4.0</product>
<product>tivoli_storage_manager_fastback:6.1.5</product>
<product>tivoli_storage_manager_fastback:6.1.5.0</product>
<product>tivoli_storage_manager_fastback:6.1.5.2</product>
<product>tivoli_storage_manager_fastback:6.1.6</product>
<product>tivoli_storage_manager_fastback:6.1.6.0</product>
<product>tivoli_storage_manager_fastback:6.1.6.1</product>
<product>tivoli_storage_manager_fastback:6.1.6.2</product>
<product>tivoli_storage_manager_fastback:6.1.7</product>
<product>tivoli_storage_manager_fastback:6.1.7.0</product>
<product>tivoli_storage_manager_fastback:6.1.7.1</product>
<product>tivoli_storage_manager_fastback:6.1.7.2</product>
<product>tivoli_storage_manager_fastback:6.1.8</product>
<product>tivoli_storage_manager_fastback:6.1.8.0</product>
<product>tivoli_storage_manager_fastback:6.1.8.1</product>
<product>tivoli_storage_manager_fastback:6.1.9</product>
<product>tivoli_storage_manager_fastback:6.1.9.0</product>
<product>tivoli_storage_manager_fastback:6.1.9.1</product>
<product>tivoli_storage_manager_fastback:6.1.10</product>
<product>tivoli_storage_manager_fastback:6.1.10.0</product>
<product>tivoli_storage_manager_fastback:6.1.10.1</product>
<product>tivoli_storage_manager_fastback:6.1.11</product>
<product>tivoli_storage_manager_fastback:6.1.11.0</product>
<product>tivoli_storage_manager_fastback:6.1.11.1</product>
</cve>
<cve id="CVE-2016-7931" level="LOW">
<product>tcpdump:4.8.1</product>
</cve>
<cve id="CVE-2016-7930" level="LOW">
<product>tcpdump:4.8.1</product>
</cve>
<cve id="CVE-2016-0217" level="MEDIUM">
<product>cognos_analytics:11.0.0.0</product>
<product>cognos_analytics:11.0.1.0</product>
<product>cognos_analytics:11.0.2.0</product>
<product>cognos_analytics:11.0.3.0</product>
<product>cognos_analytics:11.0.4.0</product>
</cve>
<cve id="CVE-2016-7936" level="LOW">
<product>tcpdump:4.8.1</product>
</cve>
<cve id="CVE-2016-7935" level="LOW">
<product>tcpdump:4.8.1</product>
</cve>
<cve id="CVE-2016-0214" level="MEDIUM">
<product>bigfix_platform:9.0</product>
<product>bigfix_platform:9.1</product>
<product>bigfix_platform:9.2</product>
<product>bigfix_platform:9.5</product>
</cve>
<cve id="CVE-2016-7939" level="LOW">
<product>tcpdump:4.8.1</product>
</cve>
<cve id="CVE-2016-6347" level="MEDIUM">
<product>resteasy:-</product>
</cve>
<cve id="CVE-2016-6346" level="LOW">
<product>resteasy:-</product>
</cve>
<cve id="CVE-2016-6345" level="LOW">
<product>resteasy:-</product>
</cve>
<cve id="CVE-2016-0218" level="MEDIUM">
<product>cognos_business_intelligence:10.1.1</product>
<product>cognos_business_intelligence:10.2</product>
<product>cognos_business_intelligence:10.2.1</product>
<product>cognos_business_intelligence:10.2.1.1</product>
<product>cognos_business_intelligence:10.2.2</product>
</cve>
<cve id="CVE-2016-6342" level="LOW">
<product>elog:3.1.1</product>
<product>fedora:24</product>
</cve>
<cve id="CVE-2016-6341" level="LOW">
<product>ovirt:4.0.2</product>
</cve>
<cve id="CVE-2016-6340" level="LOW">
<product>quickstart_cloud_installer:-</product>
</cve>
<cve id="CVE-2016-6349" level="LOW">
<product>oci-register-machine:-</product>
</cve>
<cve id="CVE-2016-6348" level="MEDIUM">
<product>resteasy:-</product>
</cve>
<cve id="CVE-2016-3734" level="MEDIUM">
<product>moodle:2.7</product>
<product>moodle:2.7.0</product>
<product>moodle:2.7.0</product>
<product>moodle:2.7.0</product>
<product>moodle:2.7.1</product>
<product>moodle:2.7.2</product>
<product>moodle:2.7.3</product>
<product>moodle:2.7.4</product>
<product>moodle:2.7.5</product>
<product>moodle:2.7.6</product>
<product>moodle:2.7.7</product>
<product>moodle:2.7.8</product>
<product>moodle:2.7.9</product>
<product>moodle:2.7.10</product>
<product>moodle:2.7.11</product>
<product>moodle:2.7.12</product>
<product>moodle:2.7.13</product>
<product>moodle:2.8</product>
<product>moodle:2.8.1</product>
<product>moodle:2.8.2</product>
<product>moodle:2.8.3</product>
<product>moodle:2.8.4</product>
<product>moodle:2.8.5</product>
<product>moodle:2.8.6</product>
<product>moodle:2.8.7</product>
<product>moodle:2.8.8</product>
<product>moodle:2.8.9</product>
<product>moodle:2.8.10</product>
<product>moodle:2.8.11</product>
<product>moodle:2.9</product>
<product>moodle:2.9.1</product>
<product>moodle:2.9.2</product>
<product>moodle:2.9.3</product>
<product>moodle:2.9.4</product>
<product>moodle:2.9.5</product>
<product>moodle:3.0</product>
<product>moodle:3.0.0</product>
<product>moodle:3.0.0</product>
<product>moodle:3.0.0</product>
<product>moodle:3.0.0</product>
<product>moodle:3.0.0</product>
<product>moodle:3.0.1</product>
<product>moodle:3.0.2</product>
<product>moodle:3.0.3</product>
</cve>
<cve id="CVE-2016-3737" level="LOW">
<product>jboss_operations_network:3.3.5</product>
</cve>
<cve id="CVE-2016-3088" level="LOW">
<product>activemq:5.13.3</product>
</cve>
<cve id="CVE-2016-3731" level="LOW">
<product>moodle:2.8</product>
<product>moodle:2.8.1</product>
<product>moodle:2.8.2</product>
<product>moodle:2.8.3</product>
<product>moodle:2.8.4</product>
<product>moodle:2.8.5</product>
<product>moodle:2.8.6</product>
<product>moodle:2.8.7</product>
<product>moodle:2.8.8</product>
<product>moodle:2.8.9</product>
<product>moodle:2.8.10</product>
<product>moodle:2.8.11</product>
<product>moodle:2.9</product>
<product>moodle:2.9.1</product>
<product>moodle:2.9.2</product>
<product>moodle:2.9.3</product>
<product>moodle:2.9.4</product>
<product>moodle:2.9.5</product>
<product>moodle:3.0</product>
<product>moodle:3.0.0</product>
<product>moodle:3.0.0</product>
<product>moodle:3.0.0</product>
<product>moodle:3.0.0</product>
<product>moodle:3.0.0</product>
<product>moodle:3.0.1</product>
<product>moodle:3.0.2</product>
<product>moodle:3.0.3</product>
</cve>
<cve id="CVE-2016-3733" level="LOW">
<product>moodle:2.7</product>
<product>moodle:2.7.0</product>
<product>moodle:2.7.0</product>
<product>moodle:2.7.0</product>
<product>moodle:2.7.1</product>
<product>moodle:2.7.2</product>
<product>moodle:2.7.3</product>
<product>moodle:2.7.4</product>
<product>moodle:2.7.5</product>
<product>moodle:2.7.6</product>
<product>moodle:2.7.7</product>
<product>moodle:2.7.8</product>
<product>moodle:2.7.9</product>
<product>moodle:2.7.10</product>
<product>moodle:2.7.11</product>
<product>moodle:2.7.12</product>
<product>moodle:2.7.13</product>
<product>moodle:2.8</product>
<product>moodle:2.8.1</product>
<product>moodle:2.8.2</product>
<product>moodle:2.8.3</product>
<product>moodle:2.8.4</product>
<product>moodle:2.8.5</product>
<product>moodle:2.8.6</product>
<product>moodle:2.8.7</product>
<product>moodle:2.8.8</product>
<product>moodle:2.8.9</product>
<product>moodle:2.8.10</product>
<product>moodle:2.8.11</product>
<product>moodle:2.9</product>
<product>moodle:2.9.1</product>
<product>moodle:2.9.2</product>
<product>moodle:2.9.3</product>
<product>moodle:2.9.4</product>
<product>moodle:2.9.5</product>
<product>moodle:3.0</product>
<product>moodle:3.0.0</product>
<product>moodle:3.0.0</product>
<product>moodle:3.0.0</product>
<product>moodle:3.0.0</product>
<product>moodle:3.0.0</product>
<product>moodle:3.0.1</product>
<product>moodle:3.0.2</product>
<product>moodle:3.0.3</product>
</cve>
<cve id="CVE-2016-3732" level="LOW">
<product>moodle:2.7</product>
<product>moodle:2.7.0</product>
<product>moodle:2.7.0</product>
<product>moodle:2.7.0</product>
<product>moodle:2.7.1</product>
<product>moodle:2.7.2</product>
<product>moodle:2.7.3</product>
<product>moodle:2.7.4</product>
<product>moodle:2.7.5</product>
<product>moodle:2.7.6</product>
<product>moodle:2.7.7</product>
<product>moodle:2.7.8</product>
<product>moodle:2.7.9</product>
<product>moodle:2.7.10</product>
<product>moodle:2.7.11</product>
<product>moodle:2.7.12</product>
<product>moodle:2.7.13</product>
<product>moodle:2.8</product>
<product>moodle:2.8.1</product>
<product>moodle:2.8.2</product>
<product>moodle:2.8.3</product>
<product>moodle:2.8.4</product>
<product>moodle:2.8.5</product>
<product>moodle:2.8.6</product>
<product>moodle:2.8.7</product>
<product>moodle:2.8.8</product>
<product>moodle:2.8.9</product>
<product>moodle:2.8.10</product>
<product>moodle:2.8.11</product>
<product>moodle:2.9</product>
<product>moodle:2.9.1</product>
<product>moodle:2.9.2</product>
<product>moodle:2.9.3</product>
<product>moodle:2.9.4</product>
<product>moodle:2.9.5</product>
<product>moodle:3.0</product>
<product>moodle:3.0.0</product>
<product>moodle:3.0.0</product>
<product>moodle:3.0.0</product>
<product>moodle:3.0.0</product>
<product>moodle:3.0.0</product>
<product>moodle:3.0.1</product>
<product>moodle:3.0.2</product>
<product>moodle:3.0.3</product>
</cve>
<cve id="CVE-2016-3083" level="LOW">
<product>hive:0.13.0</product>
<product>hive:0.13.1</product>
<product>hive:0.14.0</product>
<product>hive:1.0.0</product>
<product>hive:1.0.1</product>
<product>hive:1.1.0</product>
<product>hive:1.1.1</product>
<product>hive:1.2.0</product>
<product>hive:1.2.1</product>
</cve>
<cve id="CVE-2016-3082" level="LOW">
<product>struts:2.0.0</product>
<product>struts:2.0.1</product>
<product>struts:2.0.2</product>
<product>struts:2.0.3</product>
<product>struts:2.0.4</product>
<product>struts:2.0.5</product>
<product>struts:2.0.6</product>
<product>struts:2.0.7</product>
<product>struts:2.0.8</product>
<product>struts:2.0.9</product>
<product>struts:2.0.10</product>
<product>struts:2.0.11</product>
<product>struts:2.0.11.1</product>
<product>struts:2.0.11.2</product>
<product>struts:2.0.12</product>
<product>struts:2.0.13</product>
<product>struts:2.0.14</product>
<product>struts:2.1.0</product>
<product>struts:2.1.1</product>
<product>struts:2.1.2</product>
<product>struts:2.1.3</product>
<product>struts:2.1.4</product>
<product>struts:2.1.5</product>
<product>struts:2.1.6</product>
<product>struts:2.1.8</product>
<product>struts:2.1.8.1</product>
<product>struts:2.2.1</product>
<product>struts:2.2.1.1</product>
<product>struts:2.2.3</product>
<product>struts:2.2.3.1</product>
<product>struts:2.3.1</product>
<product>struts:2.3.1.1</product>
<product>struts:2.3.1.2</product>
<product>struts:2.3.3</product>
<product>struts:2.3.4</product>
<product>struts:2.3.4.1</product>
<product>struts:2.3.7</product>
<product>struts:2.3.8</product>
<product>struts:2.3.12</product>
<product>struts:2.3.14</product>
<product>struts:2.3.14.1</product>
<product>struts:2.3.14.2</product>
<product>struts:2.3.14.3</product>
<product>struts:2.3.15</product>
<product>struts:2.3.15.1</product>
<product>struts:2.3.15.2</product>
<product>struts:2.3.15.3</product>
<product>struts:2.3.16</product>
<product>struts:2.3.16.1</product>
<product>struts:2.3.16.2</product>
<product>struts:2.3.16.3</product>
<product>struts:2.3.20</product>
<product>struts:2.3.20.1</product>
<product>struts:2.3.24</product>
<product>struts:2.3.24.1</product>
<product>struts:2.3.28</product>
</cve>
<cve id="CVE-2016-3081" level="MEDIUM">
<product>struts:2.0.0</product>
<product>struts:2.0.1</product>
<product>struts:2.0.2</product>
<product>struts:2.0.3</product>
<product>struts:2.0.4</product>
<product>struts:2.0.5</product>
<product>struts:2.0.6</product>
<product>struts:2.0.7</product>
<product>struts:2.0.8</product>
<product>struts:2.0.9</product>
<product>struts:2.0.10</product>
<product>struts:2.0.11</product>
<product>struts:2.0.11.1</product>
<product>struts:2.0.11.2</product>
<product>struts:2.0.12</product>
<product>struts:2.0.13</product>
<product>struts:2.0.14</product>
<product>struts:2.1.0</product>
<product>struts:2.1.1</product>
<product>struts:2.1.2</product>
<product>struts:2.1.3</product>
<product>struts:2.1.4</product>
<product>struts:2.1.5</product>
<product>struts:2.1.6</product>
<product>struts:2.1.8</product>
<product>struts:2.1.8.1</product>
<product>struts:2.2.1</product>
<product>struts:2.2.1.1</product>
<product>struts:2.2.3</product>
<product>struts:2.2.3.1</product>
<product>struts:2.3.1</product>
<product>struts:2.3.1.1</product>
<product>struts:2.3.1.2</product>
<product>struts:2.3.3</product>
<product>struts:2.3.4</product>
<product>struts:2.3.4.1</product>
<product>struts:2.3.7</product>
<product>struts:2.3.8</product>
<product>struts:2.3.12</product>
<product>struts:2.3.14</product>
<product>struts:2.3.14.1</product>
<product>struts:2.3.14.2</product>
<product>struts:2.3.14.3</product>
<product>struts:2.3.15</product>
<product>struts:2.3.15.1</product>
<product>struts:2.3.15.2</product>
<product>struts:2.3.15.3</product>
<product>struts:2.3.16</product>
<product>struts:2.3.16.1</product>
<product>struts:2.3.16.2</product>
<product>struts:2.3.16.3</product>
<product>struts:2.3.20</product>
<product>struts:2.3.20.1</product>
<product>struts:2.3.24</product>
<product>struts:2.3.24.1</product>
<product>struts:2.3.28</product>
<product>siebel_e-billing:7.1</product>
</cve>
<cve id="CVE-2016-3080" level="MEDIUM">
<product>network_satellite:5.7</product>
</cve>
<cve id="CVE-2016-3739" level="HIGH">
<product>curl:7.21.0</product>
<product>curl:7.21.1</product>
<product>curl:7.21.2</product>
<product>curl:7.21.3</product>
<product>curl:7.21.4</product>
<product>curl:7.21.5</product>
<product>curl:7.21.6</product>
<product>curl:7.21.7</product>
<product>curl:7.22.0</product>
<product>curl:7.23.0</product>
<product>curl:7.23.1</product>
<product>curl:7.24.0</product>
<product>curl:7.25.0</product>
<product>curl:7.26.0</product>
<product>curl:7.27.0</product>
<product>curl:7.28.0</product>
<product>curl:7.28.1</product>
<product>curl:7.29.0</product>
<product>curl:7.30.0</product>
<product>curl:7.31.0</product>
<product>curl:7.32.0</product>
<product>curl:7.33.0</product>
<product>curl:7.34.0</product>
<product>curl:7.35.0</product>
<product>curl:7.36.0</product>
<product>curl:7.38.0</product>
<product>curl:7.39.0</product>
<product>curl:7.40.0</product>
<product>curl:7.41.0</product>
<product>curl:7.42.0</product>
<product>curl:7.42.1</product>
<product>curl:7.43.0</product>
<product>curl:7.44.0</product>
<product>curl:7.45.0</product>
<product>curl:7.46.0</product>
<product>curl:7.47.0</product>
<product>curl:7.48.0</product>
</cve>
<cve id="CVE-2016-3738" level="LOW">
<product>openshift:3.2</product>
</cve>
<cve id="CVE-2016-3085" level="MEDIUM">
<product>cloudstack:4.5.1</product>
<product>cloudstack:4.5.2</product>
<product>cloudstack:4.6.0</product>
<product>cloudstack:4.6.1</product>
<product>cloudstack:4.6.2</product>
<product>cloudstack:4.7.0</product>
<product>cloudstack:4.8</product>
</cve>
<cve id="CVE-2016-3084" level="MEDIUM">
<product>cloud_foundry:236</product>
<product>cloud_foundry_elastic_runtime:1.7.1</product>
<product>cloud_foundry_uaa:3.3.0</product>
<product>cloud_foundry_uaa_release:10</product>
<product>login-server:-</product>
</cve>
<cve id="CVE-2016-8964" level="LOW">
<product>bigfix_inventory:9.2</product>
</cve>
<cve id="CVE-2016-8967" level="LOW">
<product>bigfix_inventory:9.2</product>
<product>license_metric_tool:9.2.0</product>
</cve>
<cve id="CVE-2016-8966" level="MEDIUM">
<product>bigfix_inventory:9.2</product>
<product>license_metric_tool:9.2.0</product>
</cve>
<cve id="CVE-2016-8961" level="MEDIUM">
<product>bigfix_inventory:9.2</product>
<product>license_metric_tool:9.2.0</product>
</cve>
<cve id="CVE-2016-8960" level="LOW">
<product>cognos_business_intelligence:10.2</product>
<product>cognos_business_intelligence:10.2.1</product>
<product>cognos_business_intelligence:10.2.1.1</product>
<product>cognos_business_intelligence:10.2.2</product>
</cve>
<cve id="CVE-2016-8963" level="LOW">
<product>bigfix_inventory:9.2</product>
<product>license_metric_tool:9.2.0</product>
</cve>
<cve id="CVE-2016-8962" level="MEDIUM">
<product>bigfix_inventory:9.2</product>
</cve>
<cve id="CVE-2016-8968" level="MEDIUM">
<product>rational_collaborative_lifecycle_management:6.0.0</product>
<product>rational_collaborative_lifecycle_management:6.0.1</product>
<product>rational_collaborative_lifecycle_management:6.0.2</product>
</cve>
<cve id="CVE-2016-0420" level="LOW">
<product>jd_edwards_products:9.1</product>
<product>jd_edwards_products:9.2</product>
</cve>
<cve id="CVE-2016-7437" level="LOW">
<product>netweaver:7.40</product>
</cve>
<cve id="CVE-2016-0422" level="MEDIUM">
<product>jd_edwards_products:9.1</product>
<product>jd_edwards_products:9.2</product>
</cve>
<cve id="CVE-2016-7435" level="LOW">
<product>netweaver:7.40</product>
</cve>
<cve id="CVE-2016-0424" level="MEDIUM">
<product>jd_edwards_products:9.1</product>
<product>jd_edwards_products:9.2</product>
</cve>
<cve id="CVE-2016-0425" level="MEDIUM">
<product>jd_edwards_products:9.1</product>
<product>jd_edwards_products:9.2</product>
</cve>
<cve id="CVE-2016-0427" level="LOW">
<product>enterprise_manager_grid_control:11.1.0.1</product>
<product>enterprise_manager_grid_control:11.2.0.4</product>
<product>enterprise_manager_grid_control:12.4.0.2</product>
<product>enterprise_manager_grid_control:12.5.0.2</product>
</cve>
<cve id="CVE-2016-0429" level="MEDIUM">
<product>fusion_middleware:11.1.1.7.0</product>
<product>fusion_middleware:11.1.1.9</product>
</cve>
<cve id="CVE-2016-7438" level="LOW">
<product>wolfssl:3.9.8</product>
</cve>
<cve id="CVE-2016-7439" level="LOW">
<product>wolfssl:3.9.8</product>
</cve>
<cve id="CVE-2016-3553" level="LOW">
<product>agile_product_lifecycle_management_framework:9.3.4</product>
<product>agile_product_lifecycle_management_framework:9.3.5</product>
</cve>
<cve id="CVE-2016-3552" level="HIGH">
<product>jdk:1.8.0</product>
<product>jre:1.8.0</product>
</cve>
<cve id="CVE-2016-3555" level="MEDIUM">
<product>agile_product_lifecycle_management_framework:9.3.4</product>
<product>agile_product_lifecycle_management_framework:9.3.5</product>
</cve>
<cve id="CVE-2016-3554" level="LOW">
<product>agile_product_lifecycle_management_framework:9.3.4</product>
<product>agile_product_lifecycle_management_framework:9.3.5</product>
</cve>
<cve id="CVE-2016-3557" level="MEDIUM">
<product>agile_product_lifecycle_management_framework:9.3.4</product>
<product>agile_product_lifecycle_management_framework:9.3.5</product>
</cve>
<cve id="CVE-2016-3556" level="LOW">
<product>agile_product_lifecycle_management_framework:9.3.4</product>
<product>agile_product_lifecycle_management_framework:9.3.5</product>
</cve>
<cve id="CVE-2016-3559" level="MEDIUM">
<product>email_center:12.1.1</product>
<product>email_center:12.1.2</product>
<product>email_center:12.1.3</product>
<product>email_center:12.2.3</product>
<product>email_center:12.2.4</product>
<product>email_center:12.2.5</product>
</cve>
<cve id="CVE-2016-3558" level="MEDIUM">
<product>email_center:12.1.1</product>
<product>email_center:12.1.2</product>
<product>email_center:12.1.3</product>
<product>email_center:12.2.3</product>
<product>email_center:12.2.4</product>
<product>email_center:12.2.5</product>
</cve>
<cve id="CVE-2016-10198" level="MEDIUM">
<product>gstreamer:1.10.2</product>
</cve>
<cve id="CVE-2016-10199" level="LOW">
<product>gstreamer:1.10.2</product>
</cve>
<cve id="CVE-2016-4592" level="MEDIUM">
<product>webkit</product>
</cve>
<cve id="CVE-2016-0284" level="LOW">
<product>rational_collaborative_lifecycle_management:3.0.1.6</product>
<product>rational_collaborative_lifecycle_management:4.0.0</product>
<product>rational_collaborative_lifecycle_management:4.0.1</product>
<product>rational_collaborative_lifecycle_management:4.0.2</product>
<product>rational_collaborative_lifecycle_management:4.0.3</product>
<product>rational_collaborative_lifecycle_management:4.0.4</product>
<product>rational_collaborative_lifecycle_management:4.0.5</product>
<product>rational_collaborative_lifecycle_management:4.0.6</product>
<product>rational_collaborative_lifecycle_management:4.0.7</product>
<product>rational_collaborative_lifecycle_management:5.0.0</product>
<product>rational_collaborative_lifecycle_management:5.0.1</product>
<product>rational_collaborative_lifecycle_management:5.0.2</product>
<product>rational_collaborative_lifecycle_management:6.0.0</product>
<product>rational_collaborative_lifecycle_management:6.0.1</product>
<product>rational_collaborative_lifecycle_management:6.0.2</product>
<product>rational_doors_next_generation:4.0.0</product>
<product>rational_doors_next_generation:4.0.1</product>
<product>rational_doors_next_generation:4.0.2</product>
<product>rational_doors_next_generation:4.0.3</product>
<product>rational_doors_next_generation:4.0.4</product>
<product>rational_doors_next_generation:4.0.5</product>
<product>rational_doors_next_generation:4.0.6</product>
<product>rational_doors_next_generation:4.0.7</product>
<product>rational_doors_next_generation:5.0.0</product>
<product>rational_doors_next_generation:5.0.1</product>
<product>rational_doors_next_generation:5.0.2</product>
<product>rational_doors_next_generation:6.0.0</product>
<product>rational_doors_next_generation:6.0.1</product>
<product>rational_doors_next_generation:6.0.2</product>
<product>rational_engineering_lifecycle_manager:4.0.0</product>
<product>rational_engineering_lifecycle_manager:4.0.1</product>
<product>rational_engineering_lifecycle_manager:4.0.2</product>
<product>rational_engineering_lifecycle_manager:4.0.3</product>
<product>rational_engineering_lifecycle_manager:4.0.4</product>
<product>rational_engineering_lifecycle_manager:4.0.5</product>
<product>rational_engineering_lifecycle_manager:4.0.6</product>
<product>rational_engineering_lifecycle_manager:4.0.7</product>
<product>rational_engineering_lifecycle_manager:5.0.0</product>
<product>rational_engineering_lifecycle_manager:5.0.1</product>
<product>rational_engineering_lifecycle_manager:5.0.2</product>
<product>rational_engineering_lifecycle_manager:6.0.0</product>
<product>rational_engineering_lifecycle_manager:6.0.1</product>
<product>rational_engineering_lifecycle_manager:6.0.2</product>
<product>rational_quality_manager:3.0.1.6</product>
<product>rational_quality_manager:4.0.0</product>
<product>rational_quality_manager:4.0.1</product>
<product>rational_quality_manager:4.0.2</product>
<product>rational_quality_manager:4.0.3</product>
<product>rational_quality_manager:4.0.4</product>
<product>rational_quality_manager:4.0.5</product>
<product>rational_quality_manager:4.0.6</product>
<product>rational_quality_manager:4.0.7</product>
<product>rational_quality_manager:5.0.0</product>
<product>rational_quality_manager:5.0.1</product>
<product>rational_quality_manager:5.0.2</product>
<product>rational_quality_manager:6.0.0</product>
<product>rational_quality_manager:6.0.1</product>
<product>rational_quality_manager:6.0.2</product>
<product>rational_rhapsody_design_manager:4.0</product>
<product>rational_rhapsody_design_manager:4.0.1</product>
<product>rational_rhapsody_design_manager:4.0.2</product>
<product>rational_rhapsody_design_manager:4.0.3</product>
<product>rational_rhapsody_design_manager:4.0.4</product>
<product>rational_rhapsody_design_manager:4.0.5</product>
<product>rational_rhapsody_design_manager:4.0.6</product>
<product>rational_rhapsody_design_manager:4.0.7</product>
<product>rational_rhapsody_design_manager:5.0.0</product>
<product>rational_rhapsody_design_manager:5.0.1</product>
<product>rational_rhapsody_design_manager:5.0.2</product>
<product>rational_rhapsody_design_manager:6.0.0</product>
<product>rational_rhapsody_design_manager:6.0.1</product>
<product>rational_rhapsody_design_manager:6.0.2</product>
<product>rational_software_architect_design_manager:4.0.0</product>
<product>rational_software_architect_design_manager:4.0.1</product>
<product>rational_software_architect_design_manager:4.0.2</product>
<product>rational_software_architect_design_manager:4.0.3</product>
<product>rational_software_architect_design_manager:4.0.4</product>
<product>rational_software_architect_design_manager:4.0.5</product>
<product>rational_software_architect_design_manager:4.0.6</product>
<product>rational_software_architect_design_manager:4.0.7</product>
<product>rational_software_architect_design_manager:5.0.0</product>
<product>rational_software_architect_design_manager:5.0.1</product>
<product>rational_software_architect_design_manager:5.0.2</product>
<product>rational_software_architect_design_manager:6.0.0</product>
<product>rational_software_architect_design_manager:6.0.1</product>
<product>rational_software_architect_design_manager:6.0.2</product>
<product>rational_team_concert:3.0.1.6</product>
<product>rational_team_concert:4.0.0</product>
<product>rational_team_concert:4.0.1</product>
<product>rational_team_concert:4.0.2</product>
<product>rational_team_concert:4.0.3</product>
<product>rational_team_concert:4.0.4</product>
<product>rational_team_concert:4.0.5</product>
<product>rational_team_concert:4.0.6</product>
<product>rational_team_concert:4.0.7</product>
<product>rational_team_concert:5.0.0</product>
<product>rational_team_concert:5.0.1</product>
<product>rational_team_concert:5.0.2</product>
<product>rational_team_concert:6.0.0</product>
<product>rational_team_concert:6.0.1</product>
<product>rational_team_concert:6.0.2</product>
</cve>
<cve id="CVE-2016-0285" level="MEDIUM">
<product>rational_team_concert:3.0.1.6</product>
<product>rational_team_concert:4.0.0</product>
<product>rational_team_concert:4.0.1</product>
<product>rational_team_concert:4.0.2</product>
<product>rational_team_concert:4.0.3</product>
<product>rational_team_concert:4.0.4</product>
<product>rational_team_concert:4.0.5</product>
<product>rational_team_concert:4.0.6</product>
<product>rational_team_concert:4.0.7</product>
<product>rational_team_concert:5.0.0</product>
<product>rational_team_concert:5.0.1</product>
<product>rational_team_concert:5.0.2</product>
<product>rational_team_concert:6.0.0</product>
<product>rational_team_concert:6.0.1</product>
<product>rational_team_concert:6.0.2</product>
</cve>
<cve id="CVE-2016-0286" level="LOW">
<product>tivoli_business_service_manager:6.1.0</product>
<product>tivoli_business_service_manager:6.1.1</product>
</cve>
<cve id="CVE-2016-0287" level="LOW">
<product>i_access:7.1</product>
</cve>
<cve id="CVE-2016-0280" level="MEDIUM">
<product>information_server_framework:8.5</product>
<product>information_server_framework:8.7</product>
<product>information_server_framework:9.1</product>
<product>information_server_framework:11.3</product>
<product>information_server_framework:11.5</product>
<product>infosphere_information_governance_catalog:11.3</product>
<product>infosphere_information_governance_catalog:11.5</product>
<product>infosphere_information_server_business_glossary:8.7</product>
<product>infosphere_information_server_business_glossary:9.1</product>
</cve>
<cve id="CVE-2016-0281" level="MEDIUM">
<product>vios:2.2.0.10</product>
<product>vios:2.2.0.11</product>
<product>vios:2.2.0.12</product>
<product>vios:2.2.0.13</product>
<product>vios:2.2.1.0</product>
<product>vios:2.2.1.1</product>
<product>vios:2.2.1.3</product>
<product>aix:5.3</product>
<product>aix:6.1</product>
<product>aix:7.1</product>
<product>aix:7.2</product>
<product>vios:2.2.0.10</product>
<product>vios:2.2.0.11</product>
<product>vios:2.2.0.12</product>
<product>vios:2.2.0.13</product>
<product>vios:2.2.1.0</product>
<product>vios:2.2.1.1</product>
<product>vios:2.2.1.3</product>
<product>vios:2.2.1.4</product>
<product>vios:2.2.1.5</product>
<product>vios:2.2.1.6</product>
<product>vios:2.2.1.7</product>
<product>vios:2.2.1.8</product>
<product>vios:2.2.1.9</product>
<product>vios:2.2.2.0</product>
<product>vios:2.2.2.1</product>
<product>vios:2.2.2.2</product>
<product>vios:2.2.2.3</product>
<product>vios:2.2.2.4</product>
<product>vios:2.2.2.5</product>
<product>vios:2.2.3.0</product>
<product>vios:2.2.3.1</product>
<product>vios:2.2.3.2</product>
<product>vios:2.2.3.3</product>
<product>vios:2.2.3.4</product>
</cve>
<cve id="CVE-2016-0282" level="MEDIUM">
<product>lotus_inotes:8.5.0.0</product>
<product>lotus_inotes:8.5.0.1</product>
<product>lotus_inotes:8.5.1.0</product>
<product>lotus_inotes:8.5.1.1</product>
<product>lotus_inotes:8.5.1.2</product>
<product>lotus_inotes:8.5.1.3</product>
<product>lotus_inotes:8.5.1.4</product>
<product>lotus_inotes:8.5.1.5</product>
<product>lotus_inotes:8.5.2.0</product>
<product>lotus_inotes:8.5.2.1</product>
<product>lotus_inotes:8.5.2.2</product>
<product>lotus_inotes:8.5.2.3</product>
<product>lotus_inotes:8.5.2.4</product>
<product>lotus_inotes:8.5.3.0</product>
<product>lotus_inotes:8.5.3.1</product>
<product>lotus_inotes:8.5.3.2</product>
<product>lotus_inotes:8.5.3.3</product>
<product>lotus_inotes:8.5.3.4</product>
<product>lotus_inotes:8.5.3.5</product>
<product>lotus_inotes:8.5.3.6</product>
</cve>
<cve id="CVE-2016-0283" level="MEDIUM">
<product>websphere_application_server:8.5.5.0</product>
<product>websphere_application_server:8.5.5.1</product>
<product>websphere_application_server:8.5.5.2</product>
<product>websphere_application_server:8.5.5.3</product>
<product>websphere_application_server:8.5.5.4</product>
<product>websphere_application_server:8.5.5.5</product>
<product>websphere_application_server:8.5.5.6</product>
<product>websphere_application_server:8.5.5.7</product>
<product>websphere_application_server:8.5.5.8</product>
</cve>
<cve id="CVE-2016-0288" level="LOW">
<product>security_appscan:8.7.0.0</product>
<product>security_appscan:8.7.0.1</product>
<product>security_appscan:8.8.0.0</product>
<product>security_appscan:9.0.0.0</product>
<product>security_appscan:9.0.0.1</product>
<product>security_appscan:9.0.1.0</product>
<product>security_appscan:9.0.1.1</product>
<product>security_appscan:9.0.2.0</product>
<product>security_appscan:9.0.2.1</product>
<product>security_appscan:9.0.3.0</product>
<product>security_appscan:9.0.3.1</product>
</cve>
<cve id="CVE-2016-0289" level="LOW">
<product>maximo_asset_management:7.1</product>
<product>maximo_asset_management:7.5</product>
<product>maximo_asset_management:7.5.0.0</product>
<product>maximo_asset_management:7.5.0.1</product>
<product>maximo_asset_management:7.5.0.2</product>
<product>maximo_asset_management:7.5.0.3</product>
<product>maximo_asset_management:7.5.0.4</product>
<product>maximo_asset_management:7.5.0.5</product>
<product>maximo_asset_management:7.5.0.6</product>
<product>maximo_asset_management:7.5.0.7</product>
<product>maximo_asset_management:7.5.0.8</product>
<product>maximo_asset_management:7.5.0.9</product>
<product>maximo_asset_management:7.6</product>
<product>maximo_asset_management:7.6.0.0</product>
<product>maximo_asset_management:7.6.0.1</product>
<product>maximo_asset_management:7.6.0.2</product>
<product>maximo_asset_management:7.6.0.3</product>
</cve>
<cve id="CVE-2016-9566" level="LOW">
<product>nagios:4.2.3</product>
</cve>
<cve id="CVE-2016-9567" level="MEDIUM">
<product>samsung_mobile:6.0</product>
</cve>
<cve id="CVE-2016-9564" level="LOW">
<product>boa:0.92r</product>
</cve>
<cve id="CVE-2016-9565" level="LOW">
<product>nagios:4.2.1</product>
</cve>
<cve id="CVE-2016-9562" level="LOW">
<product>netweaver:7.40</product>
</cve>
<cve id="CVE-2016-9563" level="MEDIUM">
<product>netweaver:7.50</product>
</cve>
<cve id="CVE-2016-9560" level="MEDIUM">
<product>jasper:1.900.22</product>
</cve>
<cve id="CVE-2016-9568" level="LOW">
<product>carbon_black:5.1.1.60603</product>
</cve>
<cve id="CVE-2016-9569" level="LOW">
<product>carbon_black:5.1.1.60603</product>
</cve>
<cve id="CVE-2016-5078" level="MEDIUM">
<product>prtg:16.2.24.3791</product>
</cve>
<cve id="CVE-2016-5074" level="LOW">
<product>cloudview_nms:2.09b</product>
</cve>
<cve id="CVE-2016-5075" level="MEDIUM">
<product>cloudview_nms:2.09b</product>
</cve>
<cve id="CVE-2016-5076" level="LOW">
<product>cloudview_nms:2.09b</product>
</cve>
<cve id="CVE-2016-5077" level="MEDIUM">
<product>eventsentry:3.2.1.8</product>
<product>eventsentry:3.2.1.22</product>
<product>eventsentry:3.2.1.30</product>
</cve>
<cve id="CVE-2016-5070" level="LOW">
<product>aleos_firmware:4.3.2</product>
</cve>
<cve id="CVE-2016-5071" level="LOW">
<product>aleos_firmware:4.3.2</product>
</cve>
<cve id="CVE-2016-5072" level="LOW">
<product>oxid_eshop:4.9.8</product>
<product>oxid_eshop:4.9.8</product>
<product>oxid_eshop:5.2.8</product>
</cve>
<cve id="CVE-2016-5073" level="MEDIUM">
<product>cloudview_nms:2.09b</product>
</cve>
<cve id="CVE-2016-1489" level="MEDIUM">
<product>shareit:2.5.1.1</product>
<product>shareit:3.0.18_ww</product>
</cve>
<cve id="CVE-2016-1488" level="MEDIUM">
<product>ozw672_firmware:5.2</product>
<product>ozw772_firmware:5.2</product>
</cve>
<cve id="CVE-2016-9700" level="LOW">
<product>rational_collaborative_lifecycle_management:4.0</product>
<product>rational_collaborative_lifecycle_management:4.0.0</product>
<product>rational_collaborative_lifecycle_management:4.0.1</product>
<product>rational_collaborative_lifecycle_management:4.0.2</product>
<product>rational_collaborative_lifecycle_management:4.0.3</product>
<product>rational_collaborative_lifecycle_management:4.0.4</product>
<product>rational_collaborative_lifecycle_management:4.0.5</product>
<product>rational_collaborative_lifecycle_management:4.0.6</product>
<product>rational_collaborative_lifecycle_management:4.0.7</product>
<product>rational_collaborative_lifecycle_management:5.0</product>
<product>rational_collaborative_lifecycle_management:5.0.0</product>
<product>rational_collaborative_lifecycle_management:5.0.1</product>
<product>rational_collaborative_lifecycle_management:5.0.2</product>
<product>rational_collaborative_lifecycle_management:6.0</product>
<product>rational_collaborative_lifecycle_management:6.0.0</product>
<product>rational_collaborative_lifecycle_management:6.0.1</product>
<product>rational_collaborative_lifecycle_management:6.0.3</product>
<product>rational_doors_next_generation:4.0</product>
<product>rational_doors_next_generation:4.0.0</product>
<product>rational_doors_next_generation:4.0.1</product>
<product>rational_doors_next_generation:4.0.2</product>
<product>rational_doors_next_generation:4.0.3</product>
<product>rational_doors_next_generation:4.0.4</product>
<product>rational_doors_next_generation:4.0.5</product>
<product>rational_doors_next_generation:4.0.6</product>
<product>rational_doors_next_generation:4.0.7</product>
<product>rational_doors_next_generation:5.0</product>
<product>rational_doors_next_generation:5.0.0</product>
<product>rational_doors_next_generation:5.0.1</product>
<product>rational_doors_next_generation:5.0.2</product>
<product>rational_doors_next_generation:6.0.0</product>
<product>rational_doors_next_generation:6.0.1</product>
<product>rational_doors_next_generation:6.0.2</product>
<product>rational_doors_next_generation:6.0.3</product>
<product>rational_engineering_lifecycle_manager:4.0.3</product>
<product>rational_engineering_lifecycle_manager:4.0.4</product>
<product>rational_engineering_lifecycle_manager:4.0.5</product>
<product>rational_engineering_lifecycle_manager:4.0.6</product>
<product>rational_engineering_lifecycle_manager:4.0.7</product>
<product>rational_engineering_lifecycle_manager:5.0</product>
<product>rational_engineering_lifecycle_manager:5.0.0</product>
<product>rational_engineering_lifecycle_manager:5.0.1</product>
<product>rational_engineering_lifecycle_manager:5.0.2</product>
<product>rational_engineering_lifecycle_manager:6.0.0</product>
<product>rational_engineering_lifecycle_manager:6.0.1</product>
<product>rational_engineering_lifecycle_manager:6.0.2</product>
<product>rational_engineering_lifecycle_manager:6.0.3</product>
<product>rational_quality_manager:4.0</product>
<product>rational_quality_manager:4.0.0</product>
<product>rational_quality_manager:4.0.0.1</product>
<product>rational_quality_manager:4.0.0.2</product>
<product>rational_quality_manager:4.0.1</product>
<product>rational_quality_manager:4.0.2</product>
<product>rational_quality_manager:4.0.3</product>
<product>rational_quality_manager:4.0.4</product>
<product>rational_quality_manager:4.0.5</product>
<product>rational_quality_manager:4.0.6</product>
<product>rational_quality_manager:4.0.7</product>
<product>rational_quality_manager:5.0</product>
<product>rational_quality_manager:5.0.0</product>
<product>rational_quality_manager:5.0.1</product>
<product>rational_quality_manager:5.0.2</product>
<product>rational_quality_manager:6.0.0</product>
<product>rational_quality_manager:6.0.1</product>
<product>rational_quality_manager:6.0.2</product>
<product>rational_quality_manager:6.0.3</product>
<product>rational_rhapsody_design_manager:4.0</product>
<product>rational_rhapsody_design_manager:4.0.1</product>
<product>rational_rhapsody_design_manager:4.0.2</product>
<product>rational_rhapsody_design_manager:4.0.3</product>
<product>rational_rhapsody_design_manager:4.0.4</product>
<product>rational_rhapsody_design_manager:4.0.5</product>
<product>rational_rhapsody_design_manager:4.0.6</product>
<product>rational_rhapsody_design_manager:4.0.7</product>
<product>rational_rhapsody_design_manager:5.0</product>
<product>rational_rhapsody_design_manager:5.0.0</product>
<product>rational_rhapsody_design_manager:5.0.1</product>
<product>rational_rhapsody_design_manager:5.0.2</product>
<product>rational_rhapsody_design_manager:6.0</product>
<product>rational_rhapsody_design_manager:6.0.0</product>
<product>rational_rhapsody_design_manager:6.0.1</product>
<product>rational_rhapsody_design_manager:6.0.2</product>
<product>rational_rhapsody_design_manager:6.0.3</product>
<product>rational_software_architect_design_manager:4.0</product>
<product>rational_software_architect_design_manager:4.0.0</product>
<product>rational_software_architect_design_manager:4.0.1</product>
<product>rational_software_architect_design_manager:4.0.2</product>
<product>rational_software_architect_design_manager:4.0.3</product>
<product>rational_software_architect_design_manager:4.0.4</product>
<product>rational_software_architect_design_manager:4.0.5</product>
<product>rational_software_architect_design_manager:4.0.6</product>
<product>rational_software_architect_design_manager:4.0.7</product>
<product>rational_software_architect_design_manager:5.0</product>
<product>rational_software_architect_design_manager:5.0.0</product>
<product>rational_software_architect_design_manager:5.0.1</product>
<product>rational_software_architect_design_manager:5.0.2</product>
<product>rational_software_architect_design_manager:6.0.0</product>
<product>rational_software_architect_design_manager:6.0.1</product>
<product>rational_team_concert:4.0</product>
<product>rational_team_concert:4.0.0</product>
<product>rational_team_concert:4.0.0.1</product>
<product>rational_team_concert:4.0.0.2</product>
<product>rational_team_concert:4.0.1</product>
<product>rational_team_concert:4.0.2</product>
<product>rational_team_concert:4.0.3</product>
<product>rational_team_concert:4.0.4</product>
<product>rational_team_concert:4.0.5</product>
<product>rational_team_concert:4.0.6</product>
<product>rational_team_concert:4.0.7</product>
<product>rational_team_concert:5.0</product>
<product>rational_team_concert:5.0.0</product>
<product>rational_team_concert:5.0.1</product>
<product>rational_team_concert:5.0.2</product>
<product>rational_team_concert:6.0</product>
<product>rational_team_concert:6.0.0</product>
<product>rational_team_concert:6.0.1</product>
<product>rational_team_concert:6.0.2</product>
<product>rational_team_concert:6.0.3</product>
</cve>
<cve id="CVE-2016-9701" level="MEDIUM">
<product>rational_collaborative_lifecycle_management:4.0</product>
<product>rational_collaborative_lifecycle_management:4.0.0</product>
<product>rational_collaborative_lifecycle_management:4.0.1</product>
<product>rational_collaborative_lifecycle_management:4.0.2</product>
<product>rational_collaborative_lifecycle_management:4.0.3</product>
<product>rational_collaborative_lifecycle_management:4.0.4</product>
<product>rational_collaborative_lifecycle_management:4.0.5</product>
<product>rational_collaborative_lifecycle_management:4.0.6</product>
<product>rational_collaborative_lifecycle_management:4.0.7</product>
<product>rational_collaborative_lifecycle_management:5.0</product>
<product>rational_collaborative_lifecycle_management:5.0.0</product>
<product>rational_collaborative_lifecycle_management:5.0.1</product>
<product>rational_collaborative_lifecycle_management:5.0.2</product>
<product>rational_collaborative_lifecycle_management:6.0</product>
<product>rational_collaborative_lifecycle_management:6.0.0</product>
<product>rational_collaborative_lifecycle_management:6.0.1</product>
<product>rational_collaborative_lifecycle_management:6.0.3</product>
<product>rational_team_concert:4.0</product>
<product>rational_team_concert:4.0.0</product>
<product>rational_team_concert:4.0.0.1</product>
<product>rational_team_concert:4.0.0.2</product>
<product>rational_team_concert:4.0.1</product>
<product>rational_team_concert:4.0.2</product>
<product>rational_team_concert:4.0.3</product>
<product>rational_team_concert:4.0.4</product>
<product>rational_team_concert:4.0.5</product>
<product>rational_team_concert:4.0.6</product>
<product>rational_team_concert:4.0.7</product>
<product>rational_team_concert:5.0</product>
<product>rational_team_concert:5.0.0</product>
<product>rational_team_concert:5.0.1</product>
<product>rational_team_concert:5.0.2</product>
<product>rational_team_concert:6.0</product>
<product>rational_team_concert:6.0.0</product>
<product>rational_team_concert:6.0.1</product>
<product>rational_team_concert:6.0.2</product>
<product>rational_team_concert:6.0.3</product>
</cve>
<cve id="CVE-2016-9706" level="LOW">
<product>integration_bus:9.0</product>
<product>integration_bus:10.0</product>
<product>websphere_message_broker:8.0</product>
</cve>
<cve id="CVE-2016-9707" level="LOW">
<product>rational_collaborative_lifecycle_management:4.0</product>
<product>rational_collaborative_lifecycle_management:4.0.1</product>
<product>rational_collaborative_lifecycle_management:4.0.2</product>
<product>rational_collaborative_lifecycle_management:4.0.3</product>
<product>rational_collaborative_lifecycle_management:4.0.4</product>
<product>rational_collaborative_lifecycle_management:4.0.5</product>
<product>rational_collaborative_lifecycle_management:4.0.6</product>
<product>rational_collaborative_lifecycle_management:4.0.7</product>
<product>rational_collaborative_lifecycle_management:5.0</product>
<product>rational_collaborative_lifecycle_management:5.0.1</product>
<product>rational_collaborative_lifecycle_management:5.0.2</product>
<product>rational_collaborative_lifecycle_management:6.0</product>
<product>rational_collaborative_lifecycle_management:6.0.1</product>
<product>rational_collaborative_lifecycle_management:6.0.2</product>
<product>rational_collaborative_lifecycle_management:6.0.3</product>
<product>rational_doors_next_generation:4.0</product>
<product>rational_doors_next_generation:4.0.1</product>
<product>rational_doors_next_generation:4.0.2</product>
<product>rational_doors_next_generation:4.0.3</product>
<product>rational_doors_next_generation:4.0.4</product>
<product>rational_doors_next_generation:4.0.5</product>
<product>rational_doors_next_generation:4.0.6</product>
<product>rational_doors_next_generation:4.0.7</product>
<product>rational_doors_next_generation:5.0</product>
<product>rational_doors_next_generation:5.0.1</product>
<product>rational_doors_next_generation:5.0.2</product>
<product>rational_doors_next_generation:6.0</product>
<product>rational_doors_next_generation:6.0.1</product>
<product>rational_doors_next_generation:6.0.2</product>
<product>rational_doors_next_generation:6.0.3</product>
<product>rational_engineering_lifecycle_manager:4.0</product>
<product>rational_engineering_lifecycle_manager:4.0.1</product>
<product>rational_engineering_lifecycle_manager:4.0.2</product>
<product>rational_engineering_lifecycle_manager:4.0.3</product>
<product>rational_engineering_lifecycle_manager:4.0.4</product>
<product>rational_engineering_lifecycle_manager:4.0.5</product>
<product>rational_engineering_lifecycle_manager:4.0.6</product>
<product>rational_engineering_lifecycle_manager:4.0.7</product>
<product>rational_engineering_lifecycle_manager:5.0</product>
<product>rational_engineering_lifecycle_manager:5.0.1</product>
<product>rational_engineering_lifecycle_manager:5.0.2</product>
<product>rational_engineering_lifecycle_manager:6.0</product>
<product>rational_engineering_lifecycle_manager:6.0.1</product>
<product>rational_engineering_lifecycle_manager:6.0.2</product>
<product>rational_engineering_lifecycle_manager:6.0.3</product>
<product>rational_quality_manager:4.0</product>
<product>rational_quality_manager:4.0.0.1</product>
<product>rational_quality_manager:4.0.0.2</product>
<product>rational_quality_manager:4.0.1</product>
<product>rational_quality_manager:4.0.2</product>
<product>rational_quality_manager:4.0.3</product>
<product>rational_quality_manager:4.0.4</product>
<product>rational_quality_manager:4.0.5</product>
<product>rational_quality_manager:4.0.6</product>
<product>rational_quality_manager:4.0.7</product>
<product>rational_quality_manager:5.0</product>
<product>rational_quality_manager:5.0.1</product>
<product>rational_quality_manager:5.0.2</product>
<product>rational_quality_manager:6.0</product>
<product>rational_quality_manager:6.0.1</product>
<product>rational_quality_manager:6.0.2</product>
<product>rational_quality_manager:6.0.3</product>
<product>rational_rhapsody_design_manager:4.0</product>
<product>rational_rhapsody_design_manager:4.0.1</product>
<product>rational_rhapsody_design_manager:4.0.2</product>
<product>rational_rhapsody_design_manager:4.0.3</product>
<product>rational_rhapsody_design_manager:4.0.4</product>
<product>rational_rhapsody_design_manager:4.0.5</product>
<product>rational_rhapsody_design_manager:4.0.6</product>
<product>rational_rhapsody_design_manager:4.0.7</product>
<product>rational_rhapsody_design_manager:5.0</product>
<product>rational_rhapsody_design_manager:5.0.1</product>
<product>rational_rhapsody_design_manager:5.0.2</product>
<product>rational_rhapsody_design_manager:6.0</product>
<product>rational_rhapsody_design_manager:6.0.1</product>
<product>rational_rhapsody_design_manager:6.0.2</product>
<product>rational_rhapsody_design_manager:6.0.3</product>
<product>rational_software_architect_design_manager:4.0</product>
<product>rational_software_architect_design_manager:4.0.1</product>
<product>rational_software_architect_design_manager:4.0.2</product>
<product>rational_software_architect_design_manager:4.0.3</product>
<product>rational_software_architect_design_manager:4.0.4</product>
<product>rational_software_architect_design_manager:4.0.5</product>
<product>rational_software_architect_design_manager:4.0.6</product>
<product>rational_software_architect_design_manager:4.0.7</product>
<product>rational_software_architect_design_manager:5.0</product>
<product>rational_software_architect_design_manager:5.0.1</product>
<product>rational_software_architect_design_manager:5.0.2</product>
<product>rational_software_architect_design_manager:6.0</product>
<product>rational_software_architect_design_manager:6.0.1</product>
<product>rational_software_architect_design_manager:6.0.2</product>
<product>rational_software_architect_design_manager:6.0.3</product>
<product>rational_team_concert:4.0</product>
<product>rational_team_concert:4.0.0.1</product>
<product>rational_team_concert:4.0.0.2</product>
<product>rational_team_concert:4.0.1</product>
<product>rational_team_concert:4.0.2</product>
<product>rational_team_concert:4.0.3</product>
<product>rational_team_concert:4.0.4</product>
<product>rational_team_concert:4.0.5</product>
<product>rational_team_concert:4.0.6</product>
<product>rational_team_concert:4.0.7</product>
<product>rational_team_concert:5.0</product>
<product>rational_team_concert:5.0.1</product>
<product>rational_team_concert:5.0.2</product>
<product>rational_team_concert:6.0</product>
<product>rational_team_concert:6.0.1</product>
<product>rational_team_concert:6.0.2</product>
<product>rational_team_concert:6.0.3</product>
</cve>
<cve id="CVE-2016-9704" level="MEDIUM">
<product>security_identity_manager_virtual_appliance:7.0.0.0</product>
<product>security_identity_manager_virtual_appliance:7.0.0.1</product>
<product>security_identity_manager_virtual_appliance:7.0.0.2</product>
<product>security_identity_manager_virtual_appliance:7.0.0.3</product>
<product>security_identity_manager_virtual_appliance:7.0.1.0</product>
<product>security_identity_manager_virtual_appliance:7.0.1.1</product>
<product>security_identity_manager_virtual_appliance:7.0.1.2</product>
<product>security_identity_manager_virtual_appliance:7.0.1.3</product>
<product>security_identity_manager_virtual_appliance:7.0.1.4</product>
</cve>
<cve id="CVE-2016-1481" level="LOW">
<product>email_security_appliance:8.5.0-000</product>
<product>email_security_appliance:8.5.0-er1-198</product>
<product>email_security_appliance:8.5.6-052</product>
<product>email_security_appliance:8.5.6-073</product>
<product>email_security_appliance:8.5.6-074</product>
<product>email_security_appliance:8.5.6-106</product>
<product>email_security_appliance:8.5.6-113</product>
<product>email_security_appliance:8.5.7-042</product>
<product>email_security_appliance:8.6.0</product>
<product>email_security_appliance:8.6.0-011</product>
<product>email_security_appliance:8.9.0</product>
<product>email_security_appliance:8.9.1-000</product>
<product>email_security_appliance:8.9.2-032</product>
<product>email_security_appliance:9.0.0</product>
<product>email_security_appliance:9.0.0-212</product>
<product>email_security_appliance:9.0.0-461</product>
<product>email_security_appliance:9.0.5-000</product>
<product>email_security_appliance:9.1.0</product>
<product>email_security_appliance:9.1.0-011</product>
<product>email_security_appliance:9.1.0-032</product>
<product>email_security_appliance:9.1.0-101</product>
<product>email_security_appliance:9.1.1-000</product>
<product>email_security_appliance:9.4.0</product>
<product>email_security_appliance:9.4.4-000</product>
<product>email_security_appliance:9.5.0-000</product>
<product>email_security_appliance:9.5.0-201</product>
<product>email_security_appliance:9.6.0-000</product>
<product>email_security_appliance:9.6.0-042</product>
<product>email_security_appliance:9.6.0-051</product>
<product>email_security_appliance:9.7.0-125</product>
</cve>
<cve id="CVE-2016-1480" level="LOW">
<product>email_security_appliance:8.0.1-023</product>
<product>email_security_appliance:8.0_base</product>
<product>email_security_appliance:8.5.0-000</product>
<product>email_security_appliance:8.5.0-er1-198</product>
<product>email_security_appliance:8.5.6-052</product>
<product>email_security_appliance:8.5.6-073</product>
<product>email_security_appliance:8.5.6-074</product>
<product>email_security_appliance:8.5.6-106</product>
<product>email_security_appliance:8.5.6-113</product>
<product>email_security_appliance:8.5.7-042</product>
<product>email_security_appliance:8.6.0</product>
<product>email_security_appliance:8.6.0-011</product>
<product>email_security_appliance:8.9.0</product>
<product>email_security_appliance:8.9.1-000</product>
<product>email_security_appliance:8.9.2-032</product>
<product>email_security_appliance:9.0.0</product>
<product>email_security_appliance:9.0.0-212</product>
<product>email_security_appliance:9.0.0-461</product>
<product>email_security_appliance:9.0.5-000</product>
<product>email_security_appliance:9.1.0</product>
<product>email_security_appliance:9.1.0-011</product>
<product>email_security_appliance:9.1.0-032</product>
<product>email_security_appliance:9.1.0-101</product>
<product>email_security_appliance:9.1.1-000</product>
<product>email_security_appliance:9.4.0</product>
<product>email_security_appliance:9.4.4-000</product>
<product>email_security_appliance:9.5.0-000</product>
<product>email_security_appliance:9.5.0-201</product>
<product>email_security_appliance:9.6.0-000</product>
<product>email_security_appliance:9.6.0-042</product>
<product>email_security_appliance:9.7.0-125</product>
</cve>
<cve id="CVE-2016-1483" level="LOW">
<product>webex_meetings_server:2.6.0</product>
</cve>
<cve id="CVE-2016-1482" level="MEDIUM">
<product>webex_meetings_server:2.6.0</product>
</cve>
<cve id="CVE-2016-1485" level="MEDIUM">
<product>identity_services_engine_software:1.3%280.876%29</product>
</cve>
<cve id="CVE-2016-1484" level="LOW">
<product>webex_meetings_server:2.6.0</product>
<product>webex_meetings_server:2.6.1.39</product>
</cve>
<cve id="CVE-2016-1486" level="LOW">
<product>email_security_appliance:8.5.0-000</product>
<product>email_security_appliance:8.5.0-er1-198</product>
<product>email_security_appliance:8.5.6-052</product>
<product>email_security_appliance:8.5.6-073</product>
<product>email_security_appliance:8.5.6-074</product>
<product>email_security_appliance:8.5.6-106</product>
<product>email_security_appliance:8.5.6-113</product>
<product>email_security_appliance:8.5.7-042</product>
<product>email_security_appliance:8.6.0</product>
<product>email_security_appliance:8.6.0-011</product>
<product>email_security_appliance:8.9.0</product>
<product>email_security_appliance:8.9.1-000</product>
<product>email_security_appliance:8.9.2-032</product>
<product>email_security_appliance:9.0.0</product>
<product>email_security_appliance:9.0.0-212</product>
<product>email_security_appliance:9.0.0-461</product>
<product>email_security_appliance:9.0.5-000</product>
<product>email_security_appliance:9.1.0</product>
<product>email_security_appliance:9.1.0-011</product>
<product>email_security_appliance:9.1.0-032</product>
<product>email_security_appliance:9.1.0-101</product>
<product>email_security_appliance:9.1.1-000</product>
<product>email_security_appliance:9.4.0</product>
<product>email_security_appliance:9.4.4-000</product>
<product>email_security_appliance:9.5.0-000</product>
<product>email_security_appliance:9.5.0-201</product>
<product>email_security_appliance:9.6.0-000</product>
<product>email_security_appliance:9.6.0-042</product>
<product>email_security_appliance:9.6.0-051</product>
<product>email_security_appliance:9.7.0-125</product>
</cve>
<cve id="CVE-2016-4705" level="LOW">
<product>xcode:7.3.1</product>
</cve>
<cve id="CVE-2016-4704" level="LOW">
<product>xcode:7.3.1</product>
</cve>
<cve id="CVE-2016-10042" level="LOW">
<product>swisscom_internet-box_firmware:-</product>
</cve>
<cve id="CVE-2016-10043" level="LOW">
<product>web_panel:9.0.1</product>
</cve>
<cve id="CVE-2016-10040" level="MEDIUM">
<product>qxmlsimplereader:4.8.5</product>
</cve>
<cve id="CVE-2016-10041" level="HIGH">
<product>sprecon-e_service_program:3.42</product>
</cve>
<cve id="CVE-2016-10510" level="MEDIUM">
<product>kohana:3.3.5</product>
</cve>
<cve id="CVE-2016-10047" level="MEDIUM">
<product>imagemagick:6.9.4-6</product>
</cve>
<cve id="CVE-2016-10045" level="LOW">
<product>phpmailer:5.2.19</product>
</cve>
<cve id="CVE-2016-6283" level="MEDIUM">
<product>confluence:5.10.5</product>
</cve>
<cve id="CVE-2016-6286" level="LOW">
<product>http-client:0.4.2</product>
</cve>
<cve id="CVE-2016-6287" level="LOW">
<product>http-client:0.9</product>
</cve>
<cve id="CVE-2016-6285" level="MEDIUM">
<product>jira:7.2.1</product>
</cve>
<cve id="CVE-2016-7089" level="LOW">
<product>rapidstream:-</product>
</cve>
<cve id="CVE-2016-7087" level="LOW">
<product>horizon_view:5.0</product>
<product>horizon_view:5.0.1</product>
<product>horizon_view:5.1</product>
<product>horizon_view:5.1.3</product>
<product>horizon_view:5.2.0</product>
<product>horizon_view:5.3</product>
<product>horizon_view:6.0</product>
<product>horizon_view:6.0.2</product>
<product>horizon_view:6.1</product>
<product>horizon_view:6.1.1</product>
<product>horizon_view:6.2</product>
<product>horizon_view:7.0</product>
</cve>
<cve id="CVE-2016-7086" level="LOW">
<product>workstation_player:12.0.0</product>
<product>workstation_player:12.0.1</product>
<product>workstation_player:12.1.0</product>
<product>workstation_player:12.1.1</product>
<product>workstation_pro:12.0.0</product>
<product>workstation_pro:12.0.1</product>
<product>workstation_pro:12.1.0</product>
<product>workstation_pro:12.1.1</product>
</cve>
<cve id="CVE-2016-7085" level="LOW">
<product>workstation_player:12.0.0</product>
<product>workstation_player:12.0.1</product>
<product>workstation_player:12.1.0</product>
<product>workstation_player:12.1.1</product>
<product>workstation_pro:12.0.0</product>
<product>workstation_pro:12.0.1</product>
<product>workstation_pro:12.1.0</product>
<product>workstation_pro:12.1.1</product>
</cve>
<cve id="CVE-2016-7084" level="MEDIUM">
<product>workstation_player:12.0.0</product>
<product>workstation_player:12.0.1</product>
<product>workstation_player:12.1.0</product>
<product>workstation_player:12.1.1</product>
<product>workstation_pro:12.0.0</product>
<product>workstation_pro:12.0.1</product>
<product>workstation_pro:12.1.0</product>
<product>workstation_pro:12.1.1</product>
</cve>
<cve id="CVE-2016-7083" level="MEDIUM">
<product>workstation_player:12.0.0</product>
<product>workstation_player:12.0.1</product>
<product>workstation_player:12.1.0</product>
<product>workstation_player:12.1.1</product>
<product>workstation_pro:12.0.0</product>
<product>workstation_pro:12.0.1</product>
<product>workstation_pro:12.1.0</product>
<product>workstation_pro:12.1.1</product>
</cve>
<cve id="CVE-2016-7082" level="MEDIUM">
<product>workstation_player:12.0.0</product>
<product>workstation_player:12.0.1</product>
<product>workstation_player:12.1.0</product>
<product>workstation_player:12.1.1</product>
<product>workstation_pro:12.0.0</product>
<product>workstation_pro:12.0.1</product>
<product>workstation_pro:12.1.0</product>
<product>workstation_pro:12.1.1</product>
</cve>
<cve id="CVE-2016-7081" level="MEDIUM">
<product>workstation_player:12.0.0</product>
<product>workstation_player:12.0.1</product>
<product>workstation_player:12.1.0</product>
<product>workstation_player:12.1.1</product>
<product>workstation_pro:12.0.0</product>
<product>workstation_pro:12.0.1</product>
<product>workstation_pro:12.1.0</product>
<product>workstation_pro:12.1.1</product>
</cve>
<cve id="CVE-2016-7080" level="LOW">
<product>tools:9.0.0</product>
<product>tools:9.0.1</product>
<product>tools:9.0.5</product>
<product>tools:9.0.10</product>
<product>tools:9.0.11</product>
<product>tools:9.0.12</product>
<product>tools:9.0.13</product>
<product>tools:9.0.15</product>
<product>tools:9.0.16</product>
<product>tools:9.0.17</product>
<product>tools:9.4.0</product>
<product>tools:9.4.5</product>
<product>tools:9.4.10</product>
<product>tools:9.4.11</product>
<product>tools:9.4.12</product>
<product>tools:9.4.15</product>
<product>tools:9.10.0</product>
<product>tools:9.10.1</product>
<product>tools:9.10.5</product>
<product>tools:10.0.0</product>
<product>tools:10.0.5</product>
<product>tools:10.0.6</product>
<product>tools:10.0.8</product>
</cve>
<cve id="CVE-2016-6138" level="LOW">
<product>trex:7.10</product>
</cve>
<cve id="CVE-2016-6139" level="HIGH">
<product>trex:7.10</product>
</cve>
<cve id="CVE-2016-5763" level="LOW">
<product>open_enterprise_server_11:</product>
<product>open_enterprise_server_11:</product>
<product>open_enterprise_server_2015</product>
<product>open_enterprise_server_2015:</product>
</cve>
<cve id="CVE-2016-6131" level="LOW">
<product>libiberty:-</product>
</cve>
<cve id="CVE-2016-6133" level="MEDIUM">
<product>ektron_content_management_system:9.10</product>
</cve>
<cve id="CVE-2016-6137" level="LOW">
<product>trex:7.10</product>
</cve>
<cve id="CVE-2016-0367" level="LOW">
<product>security_identity_manager_virtual_appliance:7.0.0.0</product>
<product>security_identity_manager_virtual_appliance:7.0.0.1</product>
<product>security_identity_manager_virtual_appliance:7.0.0.2</product>
<product>security_identity_manager_virtual_appliance:7.0.0.3</product>
<product>security_identity_manager_virtual_appliance:7.0.1.0</product>
<product>security_identity_manager_virtual_appliance:7.0.1.1</product>
<product>security_identity_manager_virtual_appliance:7.0.1.3</product>
</cve>
<cve id="CVE-2016-0366" level="MEDIUM">
<product>security_privileged_identity_manager:2.0</product>
</cve>
<cve id="CVE-2016-0365" level="MEDIUM">
<product>urbancode_deploy:6.0</product>
<product>urbancode_deploy:6.0.1.0</product>
<product>urbancode_deploy:6.0.1.1</product>
<product>urbancode_deploy:6.0.1.2</product>
<product>urbancode_deploy:6.0.1.3</product>
<product>urbancode_deploy:6.0.1.4</product>
<product>urbancode_deploy:6.0.1.5</product>
<product>urbancode_deploy:6.0.1.6</product>
<product>urbancode_deploy:6.0.1.7</product>
<product>urbancode_deploy:6.0.1.8</product>
<product>urbancode_deploy:6.0.1.9</product>
<product>urbancode_deploy:6.0.1.10</product>
<product>urbancode_deploy:6.0.1.11</product>
<product>urbancode_deploy:6.0.1.12</product>
<product>urbancode_deploy:6.1</product>
<product>urbancode_deploy:6.1.0.1</product>
<product>urbancode_deploy:6.1.0.2</product>
<product>urbancode_deploy:6.1.0.3</product>
<product>urbancode_deploy:6.1.0.4</product>
<product>urbancode_deploy:6.1.1.0</product>
<product>urbancode_deploy:6.1.1.1</product>
<product>urbancode_deploy:6.1.1.2</product>
<product>urbancode_deploy:6.1.1.3</product>
<product>urbancode_deploy:6.1.1.4</product>
<product>urbancode_deploy:6.1.1.5</product>
<product>urbancode_deploy:6.1.1.6</product>
<product>urbancode_deploy:6.1.1.7</product>
<product>urbancode_deploy:6.1.1.8</product>
<product>urbancode_deploy:6.1.2</product>
<product>urbancode_deploy:6.1.3</product>
<product>urbancode_deploy:6.1.3.1</product>
<product>urbancode_deploy:6.1.3.2</product>
<product>urbancode_deploy:6.2.0.0</product>
<product>urbancode_deploy:6.2.0.1</product>
<product>urbancode_deploy:6.2.0.2</product>
<product>urbancode_deploy:6.2.1</product>
</cve>
<cve id="CVE-2016-7884" level="MEDIUM">
<product>experience_manager:6.1.0</product>
</cve>
<cve id="CVE-2016-7883" level="MEDIUM">
<product>experience_manager:6.2.0</product>
</cve>
<cve id="CVE-2016-0362" level="LOW">
<product>tririga_application_platform:3.3.0.0</product>
<product>tririga_application_platform:3.3.0.1</product>
<product>tririga_application_platform:3.3.0.2</product>
<product>tririga_application_platform:3.3.1.0</product>
<product>tririga_application_platform:3.3.1.1</product>
<product>tririga_application_platform:3.3.1.2</product>
<product>tririga_application_platform:3.3.1.3</product>
<product>tririga_application_platform:3.3.2.0</product>
<product>tririga_application_platform:3.3.2.1</product>
<product>tririga_application_platform:3.3.2.2</product>
<product>tririga_application_platform:3.3.2.3</product>
<product>tririga_application_platform:3.3.2.4</product>
<product>tririga_application_platform:3.3.2.5</product>
<product>tririga_application_platform:3.4.0.0</product>
<product>tririga_application_platform:3.4.0.1</product>
<product>tririga_application_platform:3.4.1.0</product>
<product>tririga_application_platform:3.4.1.1</product>
<product>tririga_application_platform:3.4.1.2</product>
<product>tririga_application_platform:3.4.1.3</product>
<product>tririga_application_platform:3.4.2.0</product>
<product>tririga_application_platform:3.4.2.1</product>
<product>tririga_application_platform:3.4.2.2</product>
<product>tririga_application_platform:3.4.2.3</product>
<product>tririga_application_platform:3.5.0.0</product>
<product>tririga_application_platform:3.5.0.1</product>
</cve>
<cve id="CVE-2016-0361" level="LOW">
<product>general_parallel_file_system:3.5</product>
<product>general_parallel_file_system:3.5.0.3</product>
<product>general_parallel_file_system:3.5.0.7</product>
<product>general_parallel_file_system:3.5.0.9</product>
<product>general_parallel_file_system:3.5.0.11</product>
<product>general_parallel_file_system:3.5.0.16</product>
<product>general_parallel_file_system:4.1.0.1</product>
</cve>
<cve id="CVE-2016-0360" level="LOW">
<product>websphere_mq_jms:7.0.1</product>
<product>websphere_mq_jms:7.1</product>
<product>websphere_mq_jms:7.5</product>
<product>websphere_mq_jms:8.0</product>
<product>websphere_mq_jms:9.0</product>
</cve>
<cve id="CVE-2016-7666" level="MEDIUM">
<product>transporter:1.9.1</product>
</cve>
<cve id="CVE-2016-0369" level="LOW">
<product>forms_experience_builder:8.5</product>
<product>forms_experience_builder:8.5.1</product>
<product>forms_experience_builder:8.6.0</product>
</cve>
<cve id="CVE-2016-7888" level="LOW">
<product>digital_editions:4.5.2</product>
</cve>
<cve id="CVE-2016-9955" level="HIGH">
<product>simplesamlphp:1.4.10</product>
</cve>
<cve id="CVE-2016-9954" level="LOW">
<product>irregex:0.9.5</product>
</cve>
<cve id="CVE-2016-9953" level="LOW">
<product>curl:7.30.0</product>
<product>curl:7.31.0</product>
<product>curl:7.32.0</product>
<product>curl:7.33.0</product>
<product>curl:7.34.0</product>
<product>curl:7.35.0</product>
<product>curl:7.36.0</product>
<product>curl:7.37.0</product>
<product>curl:7.37.1</product>
<product>curl:7.38.0</product>
<product>curl:7.39.0</product>
<product>curl:7.40.0</product>
<product>curl:7.41.0</product>
<product>curl:7.42.0</product>
<product>curl:7.42.1</product>
<product>curl:7.43.0</product>
<product>curl:7.44.0</product>
<product>curl:7.45.0</product>
<product>curl:7.46.0</product>
<product>curl:7.47.0</product>
<product>curl:7.47.1</product>
<product>curl:7.48.0</product>
<product>curl:7.49.0</product>
<product>curl:7.49.1</product>
<product>curl:7.50.0</product>
<product>curl:7.50.1</product>
<product>curl:7.50.2</product>
<product>curl:7.50.3</product>
<product>curl:7.51.0</product>
</cve>
<cve id="CVE-2016-9952" level="MEDIUM">
<product>curl:7.30.0</product>
<product>curl:7.31.0</product>
<product>curl:7.32.0</product>
<product>curl:7.33.0</product>
<product>curl:7.34.0</product>
<product>curl:7.35.0</product>
<product>curl:7.36.0</product>
<product>curl:7.37.0</product>
<product>curl:7.37.1</product>
<product>curl:7.38.0</product>
<product>curl:7.39.0</product>
<product>curl:7.40.0</product>
<product>curl:7.41.0</product>
<product>curl:7.42.0</product>
<product>curl:7.42.1</product>
<product>curl:7.43.0</product>
<product>curl:7.44.0</product>
<product>curl:7.45.0</product>
<product>curl:7.46.0</product>
<product>curl:7.47.0</product>
<product>curl:7.47.1</product>
<product>curl:7.48.0</product>
<product>curl:7.49.0</product>
<product>curl:7.49.1</product>
<product>curl:7.50.0</product>
<product>curl:7.50.1</product>
<product>curl:7.50.2</product>
<product>curl:7.50.3</product>
<product>curl:7.51.0</product>
</cve>
<cve id="CVE-2016-9951" level="MEDIUM">
<product>apport:2.20.3</product>
</cve>
<cve id="CVE-2016-10204" level="LOW">
<product>zoneminder:1.30.0</product>
</cve>
<cve id="CVE-2016-10205" level="LOW">
<product>zoneminder:1.30.0</product>
</cve>
<cve id="CVE-2016-10206" level="MEDIUM">
<product>zoneminder:1.30.0</product>
</cve>
<cve id="CVE-2016-10207" level="LOW">
<product>tigervnc:0.0.90</product>
<product>tigervnc:0.0.91</product>
<product>tigervnc:1.0</product>
<product>tigervnc:1.0.1</product>
<product>tigervnc:1.1.0</product>
<product>tigervnc:1.3</product>
<product>tigervnc:1.3.1</product>
<product>tigervnc:1.7</product>
<product>leap:42.1</product>
<product>leap:42.2</product>
</cve>
<cve id="CVE-2016-10201" level="MEDIUM">
<product>zoneminder:1.30.0</product>
</cve>
<cve id="CVE-2016-10202" level="MEDIUM">
<product>zoneminder:1.30.0</product>
</cve>
<cve id="CVE-2016-10203" level="MEDIUM">
<product>zoneminder:1.30.0</product>
</cve>
<cve id="CVE-2016-10209" level="MEDIUM">
<product>libarchive:3.2.2</product>
</cve>
<cve id="CVE-2016-4119" level="LOW">
<product>acrobat:11.0.16</product>
<product>acrobat_dc:15.006.30174</product>
<product>acrobat_dc:15.016.20045</product>
<product>acrobat_reader_dc:15.006.30174</product>
<product>acrobat_reader_dc:15.016.20045</product>
<product>reader:11.0.16</product>
</cve>
<cve id="CVE-2016-4288" level="LOW">
<product>bluestacks:2.1.3.5650</product>
</cve>
<cve id="CVE-2016-3948" level="LOW">
<product>squid:3.0</product>
<product>squid:3.0</product>
<product>squid:3.0</product>
<product>squid:3.0</product>
<product>squid:3.0</product>
<product>squid:3.0</product>
<product>squid:3.0</product>
<product>squid:3.0</product>
<product>squid:3.0</product>
<product>squid:3.0.stable1</product>
<product>squid:3.0.stable2</product>
<product>squid:3.0.stable3</product>
<product>squid:3.0.stable4</product>
<product>squid:3.0.stable5</product>
<product>squid:3.0.stable6</product>
<product>squid:3.0.stable7</product>
<product>squid:3.0.stable8</product>
<product>squid:3.0.stable9</product>
<product>squid:3.0.stable10</product>
<product>squid:3.0.stable11</product>
<product>squid:3.0.stable11</product>
<product>squid:3.0.stable12</product>
<product>squid:3.0.stable13</product>
<product>squid:3.0.stable14</product>
<product>squid:3.0.stable15</product>
<product>squid:3.0.stable16</product>
<product>squid:3.0.stable16</product>
<product>squid:3.0.stable17</product>
<product>squid:3.0.stable18</product>
<product>squid:3.0.stable19</product>
<product>squid:3.0.stable20</product>
<product>squid:3.0.stable21</product>
<product>squid:3.0.stable22</product>
<product>squid:3.0.stable23</product>
<product>squid:3.0.stable24</product>
<product>squid:3.0.stable25</product>
<product>squid:3.1</product>
<product>squid:3.1.0.1</product>
<product>squid:3.1.0.2</product>
<product>squid:3.1.0.3</product>
<product>squid:3.1.0.4</product>
<product>squid:3.1.0.5</product>
<product>squid:3.1.0.6</product>
<product>squid:3.1.0.7</product>
<product>squid:3.1.0.8</product>
<product>squid:3.1.0.9</product>
<product>squid:3.1.0.10</product>
<product>squid:3.1.0.11</product>
<product>squid:3.1.0.12</product>
<product>squid:3.1.0.13</product>
<product>squid:3.1.0.14</product>
<product>squid:3.1.0.15</product>
<product>squid:3.1.0.16</product>
<product>squid:3.1.0.17</product>
<product>squid:3.1.0.18</product>
<product>squid:3.1.1</product>
<product>squid:3.1.2</product>
<product>squid:3.1.3</product>
<product>squid:3.1.4</product>
<product>squid:3.1.5</product>
<product>squid:3.1.5.1</product>
<product>squid:3.1.6</product>
<product>squid:3.1.7</product>
<product>squid:3.1.8</product>
<product>squid:3.1.9</product>
<product>squid:3.1.10</product>
<product>squid:3.1.11</product>
<product>squid:3.1.12</product>
<product>squid:3.1.13</product>
<product>squid:3.1.14</product>
<product>squid:3.1.15</product>
<product>squid:3.2.0.1</product>
<product>squid:3.2.0.2</product>
<product>squid:3.2.0.3</product>
<product>squid:3.2.0.4</product>
<product>squid:3.2.0.5</product>
<product>squid:3.2.0.6</product>
<product>squid:3.2.0.7</product>
<product>squid:3.2.0.8</product>
<product>squid:3.2.0.9</product>
<product>squid:3.2.0.10</product>
<product>squid:3.2.0.11</product>
<product>squid:3.2.0.12</product>
<product>squid:3.2.0.13</product>
<product>squid:3.2.0.14</product>
<product>squid:3.2.0.15</product>
<product>squid:3.2.0.16</product>
<product>squid:3.2.0.17</product>
<product>squid:3.2.0.18</product>
<product>squid:3.2.0.19</product>
<product>squid:3.2.1</product>
<product>squid:3.2.2</product>
<product>squid:3.2.3</product>
<product>squid:3.2.4</product>
<product>squid:3.2.5</product>
<product>squid:3.2.6</product>
<product>squid:3.2.7</product>
<product>squid:3.2.8</product>
<product>squid:3.2.9</product>
<product>squid:3.2.10</product>
<product>squid:3.2.11</product>
<product>squid:3.2.12</product>
<product>squid:3.2.13</product>
<product>squid:3.3.0</product>
<product>squid:3.3.0.2</product>
<product>squid:3.3.0.3</product>
<product>squid:3.3.1</product>
<product>squid:3.3.2</product>
<product>squid:3.3.3</product>
<product>squid:3.3.4</product>
<product>squid:3.3.5</product>
<product>squid:3.3.6</product>
<product>squid:3.3.7</product>
<product>squid:3.3.8</product>
<product>squid:3.3.9</product>
<product>squid:3.3.10</product>
<product>squid:3.3.11</product>
<product>squid:3.3.12</product>
<product>squid:3.3.13</product>
<product>squid:3.4.0.1</product>
<product>squid:3.4.0.2</product>
<product>squid:3.4.0.3</product>
<product>squid:3.4.1</product>
<product>squid:3.4.2</product>
<product>squid:3.4.3</product>
<product>squid:3.4.4</product>
<product>squid:3.4.8</product>
<product>squid:3.4.9</product>
<product>squid:3.4.10</product>
<product>squid:3.4.11</product>
<product>squid:3.4.12</product>
<product>squid:3.4.13</product>
<product>squid:3.5.0.1</product>
<product>squid:3.5.0.2</product>
<product>squid:3.5.0.3</product>
<product>squid:3.5.0.4</product>
<product>squid:3.5.1</product>
<product>squid:3.5.2</product>
<product>squid:3.5.3</product>
<product>squid:3.5.4</product>
<product>squid:3.5.5</product>
<product>squid:3.5.6</product>
<product>squid:3.5.7</product>
<product>squid:3.5.8</product>
<product>squid:3.5.9</product>
<product>squid:3.5.10</product>
<product>squid:3.5.11</product>
<product>squid:3.5.12</product>
<product>squid:3.5.13</product>
<product>squid:3.5.14</product>
<product>squid:3.5.15</product>
<product>squid:4.0.1</product>
<product>squid:4.0.2</product>
<product>squid:4.0.3</product>
<product>squid:4.0.4</product>
<product>squid:4.0.5</product>
<product>squid:4.0.6</product>
<product>squid:4.0.7</product>
</cve>
<cve id="CVE-2016-3949" level="LOW">
<product>simatic_s7-300_with_profitnet_support_firmware:3.2.11</product>
<product>simatic_s7-300_without_profitnet_support_firmware:3.3.11</product>
</cve>
<cve id="CVE-2016-3946" level="LOW">
<product>sapconsole:7.30</product>
</cve>
<cve id="CVE-2016-3944" level="MEDIUM">
<product>accelerator_application:-</product>
</cve>
<cve id="CVE-2016-3945" level="MEDIUM">
<product>libtiff:4.0.6</product>
<product>vm_server:3.3</product>
<product>vm_server:3.4</product>
</cve>
<cve id="CVE-2016-3943" level="LOW">
<product>panda_endpoint_administration_agent:7.49</product>
</cve>
<cve id="CVE-2016-10650" level="MEDIUM">
<product>ntfserver:0.0.18</product>
</cve>
<cve id="CVE-2016-4064" level="MEDIUM">
<product>foxit_reader:7.3.0.118</product>
<product>phantompdf:7.3.0.118</product>
</cve>
<cve id="CVE-2016-4065" level="MEDIUM">
<product>foxit_reader:7.3.0.118</product>
<product>phantompdf:7.3.0.118</product>
</cve>
<cve id="CVE-2016-4066" level="MEDIUM">
<product>fortiweb:5.5.2</product>
</cve>
<cve id="CVE-2016-4060" level="LOW">
<product>foxit_reader:7.3.0.118</product>
<product>phantompdf:7.3.0.118</product>
</cve>
<cve id="CVE-2016-1541" level="MEDIUM">
<product>libarchive:3.1.901a</product>
</cve>
<cve id="CVE-2016-1542" level="LOW">
<product>bladelogic_server_automation_console:8.2.02</product>
<product>bladelogic_server_automation_console:8.2.03</product>
<product>bladelogic_server_automation_console:8.2.04</product>
<product>bladelogic_server_automation_console:8.3.00</product>
<product>bladelogic_server_automation_console:8.3.01</product>
<product>bladelogic_server_automation_console:8.3.02</product>
<product>bladelogic_server_automation_console:8.3.03</product>
<product>bladelogic_server_automation_console:8.5.00</product>
<product>bladelogic_server_automation_console:8.5.01</product>
<product>bladelogic_server_automation_console:8.6.00</product>
<product>bladelogic_server_automation_console:8.7.00</product>
</cve>
<cve id="CVE-2016-1543" level="LOW">
<product>bladelogic_server_automation_console:8.2.02</product>
<product>bladelogic_server_automation_console:8.2.03</product>
<product>bladelogic_server_automation_console:8.2.04</product>
<product>bladelogic_server_automation_console:8.3.00</product>
<product>bladelogic_server_automation_console:8.3.01</product>
<product>bladelogic_server_automation_console:8.3.02</product>
<product>bladelogic_server_automation_console:8.3.03</product>
<product>bladelogic_server_automation_console:8.5.00</product>
<product>bladelogic_server_automation_console:8.5.01</product>
<product>bladelogic_server_automation_console:8.6.00</product>
<product>bladelogic_server_automation_console:8.7.00</product>
</cve>
<cve id="CVE-2016-4068" level="MEDIUM">
<product>roundcube_webmail:1.0.8</product>
<product>roundcube_webmail:1.1</product>
<product>roundcube_webmail:1.1</product>
<product>roundcube_webmail:1.1</product>
<product>roundcube_webmail:1.1.1</product>
<product>roundcube_webmail:1.1.2</product>
<product>roundcube_webmail:1.1.3</product>
<product>roundcube_webmail:1.1.4</product>
<product>leap:42.1</product>
<product>opensuse:13.1</product>
<product>opensuse:13.2</product>
</cve>
<cve id="CVE-2016-4069" level="MEDIUM">
<product>webmail:1.1.4</product>
<product>leap:42.1</product>
</cve>
<cve id="CVE-2016-8390" level="MEDIUM">
<product>hopper_disassembler:3.11.20</product>
</cve>
<cve id="CVE-2016-9043" level="MEDIUM">
<product>coreldraw:x8</product>
</cve>
<cve id="CVE-2016-5621" level="LOW">
<product>flexcube_universal_banking:11.3.0</product>
<product>flexcube_universal_banking:11.4.0</product>
<product>flexcube_universal_banking:12.0.1</product>
<product>flexcube_universal_banking:12.0.2</product>
<product>flexcube_universal_banking:12.0.3</product>
<product>flexcube_universal_banking:12.1.0</product>
<product>flexcube_universal_banking:12.2.0</product>
</cve>
<cve id="CVE-2016-5620" level="LOW">
<product>flexcube_universal_banking:11.3.0</product>
<product>flexcube_universal_banking:11.4.0</product>
<product>flexcube_universal_banking:12.0.1</product>
<product>flexcube_universal_banking:12.0.2</product>
<product>flexcube_universal_banking:12.0.3</product>
<product>flexcube_universal_banking:12.1.0</product>
<product>flexcube_universal_banking:12.2.0</product>
</cve>
<cve id="CVE-2016-5623" level="LOW">
<product>flexcube_private_banking:2.0.1</product>
<product>flexcube_private_banking:2.2.0</product>
<product>flexcube_private_banking:12.0.1</product>
</cve>
<cve id="CVE-2016-5622" level="MEDIUM">
<product>flexcube_universal_banking:11.3.0</product>
<product>flexcube_universal_banking:11.4.0</product>
<product>flexcube_universal_banking:12.0.1</product>
<product>flexcube_universal_banking:12.0.2</product>
<product>flexcube_universal_banking:12.0.3</product>
<product>flexcube_universal_banking:12.1.0</product>
<product>flexcube_universal_banking:12.2.0</product>
</cve>
<cve id="CVE-2016-2512" level="MEDIUM">
<product>django:1.8.9</product>
<product>django:1.9</product>
<product>django:1.9.1</product>
<product>django:1.9.2</product>
</cve>
<cve id="CVE-2016-2938" level="MEDIUM">
<product>domino:8.5.1.0</product>
<product>domino:8.5.1.1</product>
<product>domino:8.5.1.2</product>
<product>domino:8.5.1.3</product>
<product>domino:8.5.1.4</product>
<product>domino:8.5.1.5</product>
<product>domino:8.5.2.0</product>
<product>domino:8.5.2.1</product>
<product>domino:8.5.2.2</product>
<product>domino:8.5.2.3</product>
<product>domino:8.5.2.4</product>
<product>domino:8.5.3.0</product>
<product>domino:8.5.3.1</product>
<product>domino:8.5.3.2</product>
<product>domino:8.5.3.3</product>
<product>domino:8.5.3.4</product>
<product>domino:8.5.3.5</product>
<product>domino:8.5.3.6</product>
<product>domino:9.0.0.0</product>
<product>domino:9.0.1.0</product>
<product>domino:9.0.1.1</product>
<product>domino:9.0.1.2</product>
<product>domino:9.0.1.3</product>
<product>domino:9.0.1.4</product>
<product>domino:9.0.1.5</product>
<product>domino:9.0.1.6</product>
<product>inotes:8.5.1.0</product>
<product>inotes:8.5.1.1</product>
<product>inotes:8.5.1.2</product>
<product>inotes:8.5.1.3</product>
<product>inotes:8.5.1.4</product>
<product>inotes:8.5.1.5</product>
<product>inotes:8.5.2.0</product>
<product>inotes:8.5.2.1</product>
<product>inotes:8.5.2.2</product>
<product>inotes:8.5.2.3</product>
<product>inotes:8.5.3.0</product>
<product>inotes:8.5.3.1</product>
<product>inotes:8.5.3.2</product>
<product>inotes:8.5.3.3</product>
<product>inotes:8.5.3.4</product>
<product>inotes:8.5.3.5</product>
<product>inotes:8.5.3.6</product>
<product>inotes:9.0.0.0</product>
<product>inotes:9.0.1.0</product>
<product>inotes:9.0.1.1</product>
<product>inotes:9.0.1.2</product>
<product>inotes:9.0.1.3</product>
<product>inotes:9.0.1.4</product>
<product>inotes:9.0.1.5</product>
<product>inotes:9.0.1.6</product>
</cve>
<cve id="CVE-2016-2939" level="MEDIUM">
<product>domino:8.5.1.0</product>
<product>domino:8.5.1.1</product>
<product>domino:8.5.1.2</product>
<product>domino:8.5.1.3</product>
<product>domino:8.5.1.4</product>
<product>domino:8.5.1.5</product>
<product>domino:8.5.2.0</product>
<product>domino:8.5.2.1</product>
<product>domino:8.5.2.2</product>
<product>domino:8.5.2.3</product>
<product>domino:8.5.2.4</product>
<product>domino:8.5.3.0</product>
<product>domino:8.5.3.1</product>
<product>domino:8.5.3.2</product>
<product>domino:8.5.3.3</product>
<product>domino:8.5.3.4</product>
<product>domino:8.5.3.5</product>
<product>domino:8.5.3.6</product>
<product>domino:9.0.0.0</product>
<product>domino:9.0.1.0</product>
<product>domino:9.0.1.1</product>
<product>domino:9.0.1.2</product>
<product>domino:9.0.1.3</product>
<product>domino:9.0.1.4</product>
<product>domino:9.0.1.5</product>
<product>domino:9.0.1.6</product>
<product>inotes:8.5.1.0</product>
<product>inotes:8.5.1.1</product>
<product>inotes:8.5.1.2</product>
<product>inotes:8.5.1.3</product>
<product>inotes:8.5.1.4</product>
<product>inotes:8.5.1.5</product>
<product>inotes:8.5.2.0</product>
<product>inotes:8.5.2.1</product>
<product>inotes:8.5.2.2</product>
<product>inotes:8.5.2.3</product>
<product>inotes:8.5.3.0</product>
<product>inotes:8.5.3.1</product>
<product>inotes:8.5.3.2</product>
<product>inotes:8.5.3.3</product>
<product>inotes:8.5.3.4</product>
<product>inotes:8.5.3.5</product>
<product>inotes:8.5.3.6</product>
<product>inotes:9.0.0.0</product>
<product>inotes:9.0.1.0</product>
<product>inotes:9.0.1.1</product>
<product>inotes:9.0.1.2</product>
<product>inotes:9.0.1.3</product>
<product>inotes:9.0.1.4</product>
<product>inotes:9.0.1.5</product>
<product>inotes:9.0.1.6</product>
</cve>
<cve id="CVE-2016-2513" level="HIGH">
<product>django:1.8.9</product>
<product>django:1.9</product>
<product>django:1.9.1</product>
<product>django:1.9.2</product>
</cve>
<cve id="CVE-2016-2934" level="MEDIUM">
<product>bigfix_remote_control:9.1.2</product>
</cve>
<cve id="CVE-2016-2935" level="LOW">
<product>bigfix_remote_control:9.1.2</product>
</cve>
<cve id="CVE-2016-2936" level="LOW">
<product>bigfix_remote_control:9.1.2</product>
</cve>
<cve id="CVE-2016-2937" level="LOW">
<product>bigfix_remote_control:9.1.2</product>
</cve>
<cve id="CVE-2016-2930" level="LOW">
<product>bigfix_remote_control:9.1.3</product>
</cve>
<cve id="CVE-2016-2931" level="LOW">
<product>bigfix_remote_control:9.1.2</product>
</cve>
<cve id="CVE-2016-2932" level="LOW">
<product>bigfix_remote_control:9.1.2</product>
</cve>
<cve id="CVE-2016-2933" level="LOW">
<product>bigfix_remote_control:9.1.2</product>
</cve>
<cve id="CVE-2016-2515" level="LOW">
<product>hawk:3.1.2</product>
<product>hawk:4.1.0</product>
</cve>
<cve id="CVE-2016-3463" level="LOW">
<product>flexcube_direct_banking:12.0.3</product>
</cve>
<cve id="CVE-2016-1207" level="MEDIUM">
<product>wn-g300r2_firmware:1.12</product>
<product>wn-g300r3_firmware:1.01</product>
<product>wn-g300r_firmware:1.12</product>
</cve>
<cve id="CVE-2016-1206" level="LOW">
<product>wn-gdn%2fr3_firmware:-</product>
</cve>
<cve id="CVE-2016-1205" level="MEDIUM">
<product>category_freearea_addition:1.0</product>
<product>itemdetail_freearea_addition:1.0</product>
</cve>
<cve id="CVE-2016-4322" level="LOW">
<product>bladelogic_server_automation_console:8.7.00</product>
</cve>
<cve id="CVE-2016-1200" level="LOW">
<product>ec-cube:3.0.7</product>
<product>ec-cube:3.0.8</product>
<product>ec-cube:3.0.9</product>
</cve>
<cve id="CVE-2016-4985" level="LOW">
<product>openstack_ironic:4.2.4</product>
<product>openstack_ironic:5.1.0</product>
<product>openstack_ironic:5.1.1</product>
<product>openstack:7.0</product>
<product>openstack:8.0</product>
</cve>
<cve id="CVE-2016-4328" level="LOW">
<product>perioperative_information_management_system:-</product>
</cve>
<cve id="CVE-2016-8808" level="LOW">
<product>gpu_driver:341.98</product>
<product>gpu_driver:373.06</product>
</cve>
<cve id="CVE-2016-8809" level="LOW">
<product>gpu_driver:341.98</product>
<product>gpu_driver:373.06</product>
</cve>
<cve id="CVE-2016-8806" level="LOW">
<product>gpu_driver:341.98</product>
<product>gpu_driver:373.06</product>
</cve>
<cve id="CVE-2016-8807" level="LOW">
<product>gpu_driver:341.98</product>
<product>gpu_driver:373.06</product>
</cve>
<cve id="CVE-2016-8805" level="LOW">
<product>gpu_driver:341.98</product>
<product>gpu_driver:373.06</product>
</cve>
<cve id="CVE-2016-8802" level="LOW">
<product>secospace_usg6300_firmware:v500r001c20spc100</product>
<product>secospace_usg6300_firmware:v500r001c20spc101</product>
<product>secospace_usg6300_firmware:v500r001c20spc200</product>
<product>secospace_usg6500_firmware:v500r001c20spc100</product>
<product>secospace_usg6500_firmware:v500r001c20spc101</product>
<product>secospace_usg6500_firmware:v500r001c20spc200</product>
<product>secospace_usg6600_firmware:v500r001c20spc100</product>
<product>secospace_usg6600_firmware:v500r001c20spc101</product>
<product>secospace_usg6600_firmware:v500r001c20spc200</product>
</cve>
<cve id="CVE-2016-8803" level="MEDIUM">
<product>fusionstorage:v100r003c30u1</product>
</cve>
<cve id="CVE-2016-8801" level="LOW">
<product>oceanstor_5600_v3_firmware:v300r003c00c10</product>
</cve>
<cve id="CVE-2016-3410" level="MEDIUM">
<product>zimbra_collaboration_suite:8.6.0</product>
</cve>
<cve id="CVE-2016-3411" level="MEDIUM">
<product>zimbra_collaboration_suite:8.6.0</product>
</cve>
<cve id="CVE-2016-3412" level="MEDIUM">
<product>zimbra_collaboration_suite:8.6.0</product>
</cve>
<cve id="CVE-2016-3711" level="LOW">
<product>openshift:3.2</product>
<product>openshift_origin:-</product>
</cve>
<cve id="CVE-2016-6397" level="LOW">
<product>ip_interoperability_and_collaboration_system:4.8%281%29</product>
<product>ip_interoperability_and_collaboration_system:4.8%282%29</product>
<product>ip_interoperability_and_collaboration_system:4.9%281%29</product>
<product>ip_interoperability_and_collaboration_system:4.9%282%29</product>
<product>ip_interoperability_and_collaboration_system:4.10%281%29</product>
</cve>
<cve id="CVE-2016-10688" level="MEDIUM">
<product>haxe3:3.4.7</product>
</cve>
<cve id="CVE-2016-3414" level="LOW">
<product>zimbra_collaboration_suite:8.6.0</product>
</cve>
<cve id="CVE-2016-3415" level="LOW">
<product>zimbra_collaboration_suite:8.6.0</product>
</cve>
<cve id="CVE-2016-8943" level="MEDIUM">
<product>spectrum_control:5.2.8</product>
<product>spectrum_control:5.2.9</product>
<product>spectrum_control:5.2.10</product>
<product>spectrum_control:5.2.11</product>
<product>tivoli_storage_productivity_center:5.2.0</product>
<product>tivoli_storage_productivity_center:5.2.0.0</product>
<product>tivoli_storage_productivity_center:5.2.1.0</product>
<product>tivoli_storage_productivity_center:5.2.1.1</product>
<product>tivoli_storage_productivity_center:5.2.2.0</product>
<product>tivoli_storage_productivity_center:5.2.3.0</product>
<product>tivoli_storage_productivity_center:5.2.4.0</product>
<product>tivoli_storage_productivity_center:5.2.4.1</product>
<product>tivoli_storage_productivity_center:5.2.4.1_%2b</product>
<product>tivoli_storage_productivity_center:5.2.5.0</product>
<product>tivoli_storage_productivity_center:5.2.5.1</product>
<product>tivoli_storage_productivity_center:5.2.6.0</product>
<product>tivoli_storage_productivity_center:5.2.7.0</product>
<product>tivoli_storage_productivity_center:5.2.7.1</product>
</cve>
<cve id="CVE-2016-8942" level="MEDIUM">
<product>spectrum_control:5.2.8</product>
<product>spectrum_control:5.2.9</product>
<product>spectrum_control:5.2.10</product>
<product>spectrum_control:5.2.11</product>
<product>tivoli_storage_productivity_center:5.2.0</product>
<product>tivoli_storage_productivity_center:5.2.0.0</product>
<product>tivoli_storage_productivity_center:5.2.1.0</product>
<product>tivoli_storage_productivity_center:5.2.1.1</product>
<product>tivoli_storage_productivity_center:5.2.2.0</product>
<product>tivoli_storage_productivity_center:5.2.3.0</product>
<product>tivoli_storage_productivity_center:5.2.4.0</product>
<product>tivoli_storage_productivity_center:5.2.4.1</product>
<product>tivoli_storage_productivity_center:5.2.4.1_%2b</product>
<product>tivoli_storage_productivity_center:5.2.5.0</product>
<product>tivoli_storage_productivity_center:5.2.5.1</product>
<product>tivoli_storage_productivity_center:5.2.6.0</product>
<product>tivoli_storage_productivity_center:5.2.7.0</product>
<product>tivoli_storage_productivity_center:5.2.7.1</product>
</cve>
<cve id="CVE-2016-8941" level="MEDIUM">
<product>spectrum_control:5.2.8</product>
<product>spectrum_control:5.2.9</product>
<product>spectrum_control:5.2.10</product>
<product>spectrum_control:5.2.11</product>
<product>tivoli_storage_productivity_center:5.2.0</product>
<product>tivoli_storage_productivity_center:5.2.0.0</product>
<product>tivoli_storage_productivity_center:5.2.1.0</product>
<product>tivoli_storage_productivity_center:5.2.1.1</product>
<product>tivoli_storage_productivity_center:5.2.2.0</product>
<product>tivoli_storage_productivity_center:5.2.3.0</product>
<product>tivoli_storage_productivity_center:5.2.4.0</product>
<product>tivoli_storage_productivity_center:5.2.4.1</product>
<product>tivoli_storage_productivity_center:5.2.5.0</product>
<product>tivoli_storage_productivity_center:5.2.5.1</product>
<product>tivoli_storage_productivity_center:5.2.6.0</product>
<product>tivoli_storage_productivity_center:5.2.7.0</product>
<product>tivoli_storage_productivity_center:5.2.7.1</product>
</cve>
<cve id="CVE-2016-8940" level="LOW">
<product>tivoli_storage_manager:6.1</product>
<product>tivoli_storage_manager:6.1.0</product>
<product>tivoli_storage_manager:6.1.1</product>
<product>tivoli_storage_manager:6.1.2</product>
<product>tivoli_storage_manager:6.1.3</product>
<product>tivoli_storage_manager:6.1.4</product>
<product>tivoli_storage_manager:6.1.5</product>
<product>tivoli_storage_manager:6.1.5.4</product>
<product>tivoli_storage_manager:6.1.5.5</product>
<product>tivoli_storage_manager:6.1.5.6</product>
<product>tivoli_storage_manager:6.2.0</product>
<product>tivoli_storage_manager:6.2.1</product>
<product>tivoli_storage_manager:6.2.2</product>
<product>tivoli_storage_manager:6.2.3</product>
<product>tivoli_storage_manager:6.2.4</product>
<product>tivoli_storage_manager:6.3</product>
<product>tivoli_storage_manager:6.3.0.5</product>
<product>tivoli_storage_manager:6.3.0.15</product>
<product>tivoli_storage_manager:6.3.0.17</product>
<product>tivoli_storage_manager:6.3.1</product>
<product>tivoli_storage_manager:6.3.1.2</product>
<product>tivoli_storage_manager:6.3.2.2</product>
<product>tivoli_storage_manager:6.3.3</product>
<product>tivoli_storage_manager:6.3.4</product>
<product>tivoli_storage_manager:6.3.5</product>
<product>tivoli_storage_manager:6.3.5.1</product>
<product>tivoli_storage_manager:6.3.6</product>
<product>tivoli_storage_manager:7.1</product>
<product>tivoli_storage_manager:7.1..5.100</product>
<product>tivoli_storage_manager:7.1.0.1</product>
<product>tivoli_storage_manager:7.1.0.2</product>
<product>tivoli_storage_manager:7.1.0.3</product>
<product>tivoli_storage_manager:7.1.1</product>
<product>tivoli_storage_manager:7.1.1.1</product>
<product>tivoli_storage_manager:7.1.1.2</product>
<product>tivoli_storage_manager:7.1.1.100</product>
<product>tivoli_storage_manager:7.1.1.200</product>
<product>tivoli_storage_manager:7.1.1.300</product>
<product>tivoli_storage_manager:7.1.3</product>
<product>tivoli_storage_manager:7.1.3.000</product>
<product>tivoli_storage_manager:7.1.3.1</product>
<product>tivoli_storage_manager:7.1.3.2</product>
<product>tivoli_storage_manager:7.1.3.100</product>
<product>tivoli_storage_manager:7.1.4</product>
<product>tivoli_storage_manager:7.1.4.1</product>
<product>tivoli_storage_manager:7.1.4.2</product>
<product>tivoli_storage_manager:7.1.5</product>
<product>tivoli_storage_manager:7.1.5.200</product>
<product>tivoli_storage_manager:7.1.6</product>
<product>tivoli_storage_manager:7.1.7</product>
</cve>
<cve id="CVE-2016-8947" level="MEDIUM">
<product>emptoris_sourcing:9.5</product>
<product>emptoris_sourcing:9.5.0.1</product>
<product>emptoris_sourcing:9.5.1.1</product>
<product>emptoris_sourcing:9.5.1.2</product>
<product>emptoris_sourcing:9.5.1.3</product>
<product>emptoris_sourcing:10.0.0</product>
<product>emptoris_sourcing:10.0.1</product>
<product>emptoris_sourcing:10.0.2</product>
<product>emptoris_sourcing:10.0.4</product>
<product>emptoris_sourcing:10.1.0</product>
<product>emptoris_sourcing:10.1.1</product>
</cve>
<cve id="CVE-2016-6420" level="LOW">
<product>firesight_system_software:4.10.3</product>
<product>firesight_system_software:5.2.0</product>
<product>firesight_system_software:5.3.0</product>
<product>firesight_system_software:5.3.1</product>
<product>firesight_system_software:5.4.0</product>
</cve>
<cve id="CVE-2016-8944" level="LOW">
<product>aix:7.1</product>
<product>aix:7.2</product>
</cve>
<cve id="CVE-2016-7415" level="LOW">
<product>international_components_for_unicode:57.1</product>
</cve>
<cve id="CVE-2016-8949" level="MEDIUM">
<product>emptoris_strategic_supply_management:10.0.0.0</product>
<product>emptoris_strategic_supply_management:10.0.0.1</product>
<product>emptoris_strategic_supply_management:10.0.0.2</product>
<product>emptoris_strategic_supply_management:10.0.0.3</product>
<product>emptoris_strategic_supply_management:10.0.1.0</product>
<product>emptoris_strategic_supply_management:10.0.1.1</product>
<product>emptoris_strategic_supply_management:10.0.1.2</product>
<product>emptoris_strategic_supply_management:10.0.1.3</product>
<product>emptoris_strategic_supply_management:10.0.1.4</product>
<product>emptoris_strategic_supply_management:10.0.2.0</product>
<product>emptoris_strategic_supply_management:10.0.2.1</product>
<product>emptoris_strategic_supply_management:10.0.2.2</product>
<product>emptoris_strategic_supply_management:10.0.2.3</product>
<product>emptoris_strategic_supply_management:10.0.2.4</product>
<product>emptoris_strategic_supply_management:10.0.2.5</product>
<product>emptoris_strategic_supply_management:10.0.2.6</product>
<product>emptoris_strategic_supply_management:10.0.2.7</product>
<product>emptoris_strategic_supply_management:10.0.2.8</product>
<product>emptoris_strategic_supply_management:10.0.2.9</product>
<product>emptoris_strategic_supply_management:10.0.2.10</product>
<product>emptoris_strategic_supply_management:10.0.2.11</product>
<product>emptoris_strategic_supply_management:10.0.2.12</product>
<product>emptoris_strategic_supply_management:10.0.2.13</product>
<product>emptoris_strategic_supply_management:10.0.2.14</product>
<product>emptoris_strategic_supply_management:10.0.2.15</product>
<product>emptoris_strategic_supply_management:10.0.2.16</product>
<product>emptoris_strategic_supply_management:10.0.2.17</product>
<product>emptoris_strategic_supply_management:10.0.4.0</product>
<product>emptoris_strategic_supply_management:10.1.0.0</product>
<product>emptoris_strategic_supply_management:10.1.0.1</product>
<product>emptoris_strategic_supply_management:10.1.0.2</product>
<product>emptoris_strategic_supply_management:10.1.0.3</product>
<product>emptoris_strategic_supply_management:10.1.0.4</product>
<product>emptoris_strategic_supply_management:10.1.0.5</product>
<product>emptoris_strategic_supply_management:10.1.0.6</product>
<product>emptoris_strategic_supply_management:10.1.0.7</product>
<product>emptoris_strategic_supply_management:10.1.0.8</product>
<product>emptoris_strategic_supply_management:10.1.0.9</product>
<product>emptoris_strategic_supply_management:10.1.0.10</product>
<product>emptoris_strategic_supply_management:10.1.0.11</product>
<product>emptoris_strategic_supply_management:10.1.1.0</product>
<product>emptoris_strategic_supply_management:10.1.1.1</product>
<product>emptoris_strategic_supply_management:10.1.1.2</product>
<product>emptoris_strategic_supply_management:10.1.1.3</product>
<product>emptoris_strategic_supply_management:10.1.1.4</product>
<product>emptoris_strategic_supply_management:10.1.1.5</product>
<product>emptoris_strategic_supply_management:10.1.1.6</product>
<product>emptoris_strategic_supply_management:10.1.1.7</product>
<product>emptoris_strategic_supply_management:10.1.1.8</product>
<product>emptoris_strategic_supply_management:10.1.1.9</product>
<product>emptoris_strategic_supply_management:10.1.1.10</product>
<product>emptoris_supplier_lifecycle_management:10.0.0.0</product>
<product>emptoris_supplier_lifecycle_management:10.0.0.1</product>
<product>emptoris_supplier_lifecycle_management:10.0.0.2</product>
<product>emptoris_supplier_lifecycle_management:10.0.0.3</product>
<product>emptoris_supplier_lifecycle_management:10.0.1.0</product>
<product>emptoris_supplier_lifecycle_management:10.0.1.1</product>
<product>emptoris_supplier_lifecycle_management:10.0.1.2</product>
<product>emptoris_supplier_lifecycle_management:10.0.2.0</product>
<product>emptoris_supplier_lifecycle_management:10.0.2.2</product>
<product>emptoris_supplier_lifecycle_management:10.0.2.3</product>
<product>emptoris_supplier_lifecycle_management:10.0.2.5</product>
<product>emptoris_supplier_lifecycle_management:10.0.2.6</product>
<product>emptoris_supplier_lifecycle_management:10.0.2.7</product>
</cve>
<cve id="CVE-2016-8948" level="MEDIUM">
<product>emptoris_sourcing:9.5</product>
<product>emptoris_sourcing:9.5.0.1</product>
<product>emptoris_sourcing:9.5.1.1</product>
<product>emptoris_sourcing:9.5.1.2</product>
<product>emptoris_sourcing:9.5.1.3</product>
<product>emptoris_sourcing:10.0.0</product>
<product>emptoris_sourcing:10.0.1</product>
<product>emptoris_sourcing:10.0.2</product>
<product>emptoris_sourcing:10.0.4</product>
<product>emptoris_sourcing:10.1.0</product>
<product>emptoris_sourcing:10.1.1</product>
</cve>
<cve id="CVE-2016-7410" level="MEDIUM">
<product>libdwarf:20160613</product>
</cve>
<cve id="CVE-2016-3418" level="MEDIUM">
<product>oracle_berkeley_db:11.2.5.0.32</product>
<product>oracle_berkeley_db:11.2.5.1.29</product>
<product>oracle_berkeley_db:11.2.5.2.42</product>
<product>oracle_berkeley_db:11.2.5.3.28</product>
<product>oracle_berkeley_db:12.1.6.0.35</product>
<product>oracle_berkeley_db:12.1.6.1.26</product>
</cve>
<cve id="CVE-2016-3579" level="LOW">
<product>outside_in_technology:8.5.0</product>
<product>outside_in_technology:8.5.1</product>
<product>outside_in_technology:8.5.2</product>
</cve>
<cve id="CVE-2016-3578" level="LOW">
<product>outside_in_technology:8.5.0</product>
<product>outside_in_technology:8.5.1</product>
<product>outside_in_technology:8.5.2</product>
</cve>
<cve id="CVE-2016-3577" level="LOW">
<product>outside_in_technology:8.5.0</product>
<product>outside_in_technology:8.5.1</product>
<product>outside_in_technology:8.5.2</product>
</cve>
<cve id="CVE-2016-3576" level="LOW">
<product>outside_in_technology:8.5.0</product>
<product>outside_in_technology:8.5.1</product>
<product>outside_in_technology:8.5.2</product>
</cve>
<cve id="CVE-2016-3575" level="LOW">
<product>outside_in_technology:8.5.0</product>
<product>outside_in_technology:8.5.1</product>
<product>outside_in_technology:8.5.2</product>
</cve>
<cve id="CVE-2016-3574" level="LOW">
<product>outside_in_technology:8.5.0</product>
<product>outside_in_technology:8.5.1</product>
<product>outside_in_technology:8.5.2</product>
</cve>
<cve id="CVE-2016-3573" level="MEDIUM">
<product>primavera_p6_enterprise_project_portfolio_management:8.3</product>
<product>primavera_p6_enterprise_project_portfolio_management:8.4</product>
<product>primavera_p6_enterprise_project_portfolio_management:15.1</product>
<product>primavera_p6_enterprise_project_portfolio_management:15.2</product>
<product>primavera_p6_enterprise_project_portfolio_management:16.1</product>
</cve>
<cve id="CVE-2016-3572" level="LOW">
<product>primavera_p6_enterprise_project_portfolio_management:8.3</product>
<product>primavera_p6_enterprise_project_portfolio_management:8.4</product>
<product>primavera_p6_enterprise_project_portfolio_management:15.1</product>
<product>primavera_p6_enterprise_project_portfolio_management:15.2</product>
<product>primavera_p6_enterprise_project_portfolio_management:16.1</product>
</cve>
<cve id="CVE-2016-3571" level="MEDIUM">
<product>primavera_p6_enterprise_project_portfolio_management:8.3</product>
<product>primavera_p6_enterprise_project_portfolio_management:8.4</product>
<product>primavera_p6_enterprise_project_portfolio_management:15.1</product>
<product>primavera_p6_enterprise_project_portfolio_management:15.2</product>
<product>primavera_p6_enterprise_project_portfolio_management:16.1</product>
</cve>
<cve id="CVE-2016-3570" level="MEDIUM">
<product>primavera_p6_enterprise_project_portfolio_management:8.3</product>
<product>primavera_p6_enterprise_project_portfolio_management:8.4</product>
<product>primavera_p6_enterprise_project_portfolio_management:15.1</product>
<product>primavera_p6_enterprise_project_portfolio_management:15.2</product>
<product>primavera_p6_enterprise_project_portfolio_management:16.1</product>
</cve>
<cve id="CVE-2016-8491" level="LOW">
<product>fortiwlc:7.0-9-1</product>
<product>fortiwlc:7.0-10-0</product>
<product>fortiwlc:8.1-2-0</product>
<product>fortiwlc:8.1-3-2</product>
<product>fortiwlc:8.2-4-0</product>
</cve>
<cve id="CVE-2016-8493" level="LOW">
<product>forticlient:5.4.1</product>
<product>forticlient:5.4.2</product>
</cve>
<cve id="CVE-2016-3149" level="LOW">
<product>clickshare_csc-1_firmware:01.09.02.03</product>
<product>clickshare_csm-1_firmware:01.06.01.04</product>
</cve>
<cve id="CVE-2016-8495" level="MEDIUM">
<product>fortimanager_firmware:5.0.3</product>
<product>fortimanager_firmware:5.0.4</product>
<product>fortimanager_firmware:5.0.5</product>
<product>fortimanager_firmware:5.0.6</product>
<product>fortimanager_firmware:5.0.7</product>
<product>fortimanager_firmware:5.0.8</product>
<product>fortimanager_firmware:5.0.9</product>
<product>fortimanager_firmware:5.0.10</product>
<product>fortimanager_firmware:5.0.11</product>
<product>fortimanager_firmware:5.2.0</product>
<product>fortimanager_firmware:5.2.1</product>
<product>fortimanager_firmware:5.2.2</product>
<product>fortimanager_firmware:5.2.3</product>
<product>fortimanager_firmware:5.2.4</product>
<product>fortimanager_firmware:5.2.6</product>
<product>fortimanager_firmware:5.2.7</product>
<product>fortimanager_firmware:5.4.0</product>
<product>fortimanager_firmware:5.4.1</product>
</cve>
<cve id="CVE-2016-8494" level="LOW">
<product>connect:14.2</product>
<product>connect:14.10</product>
<product>connect:15.10</product>
<product>connect:16.7</product>
</cve>
<cve id="CVE-2016-9540" level="LOW">
<product>libtiff:4.0.6</product>
</cve>
<cve id="CVE-2016-1713" level="MEDIUM">
<product>vtiger_crm:6.4.0</product>
</cve>
<cve id="CVE-2016-1712" level="LOW">
<product>pan-os:5.0.18</product>
<product>pan-os:5.1.11</product>
<product>pan-os:6.0.13</product>
<product>pan-os:6.1.11</product>
<product>pan-os:7.0.7</product>
</cve>
<cve id="CVE-2016-5019" level="LOW">
<product>myfaces:1.0.0</product>
<product>myfaces:1.0.1</product>
<product>myfaces:1.0.2</product>
<product>myfaces:1.0.3</product>
<product>myfaces:1.0.4</product>
<product>myfaces:1.0.5</product>
<product>myfaces:1.0.6</product>
<product>myfaces:1.0.7</product>
<product>myfaces:1.0.8</product>
<product>myfaces:1.0.9</product>
<product>myfaces:1.0.10</product>
<product>myfaces:1.0.11</product>
<product>myfaces:1.0.12</product>
<product>myfaces:1.0.13</product>
<product>myfaces:1.2.1</product>
<product>myfaces:1.2.2</product>
<product>myfaces:1.2.3</product>
<product>myfaces:1.2.4</product>
<product>myfaces:1.2.5</product>
<product>myfaces:1.2.6</product>
<product>myfaces:1.2.7</product>
<product>myfaces:1.2.8</product>
<product>myfaces:1.2.9</product>
<product>myfaces:1.2.10</product>
<product>myfaces:1.2.11</product>
<product>myfaces:1.2.12</product>
<product>myfaces:1.2.13</product>
<product>myfaces:1.2.14</product>
<product>myfaces:2.0.0</product>
<product>myfaces:2.0.1</product>
<product>myfaces:2.1.0</product>
<product>myfaces:2.1.1</product>
</cve>
<cve id="CVE-2016-5012" level="LOW">
<product>moodle:3.1.0</product>
<product>moodle:3.1.0</product>
<product>moodle:3.1.0</product>
<product>moodle:3.1.0</product>
</cve>
<cve id="CVE-2016-5013" level="MEDIUM">
<product>moodle:2.7.14</product>
<product>moodle:2.8</product>
<product>moodle:2.8.1</product>
<product>moodle:2.8.2</product>
<product>moodle:2.8.3</product>
<product>moodle:2.8.4</product>
<product>moodle:2.8.5</product>
<product>moodle:2.8.6</product>
<product>moodle:2.8.7</product>
<product>moodle:2.8.8</product>
<product>moodle:2.8.9</product>
<product>moodle:2.8.10</product>
<product>moodle:2.8.11</product>
<product>moodle:2.8.12</product>
<product>moodle:2.9</product>
<product>moodle:2.9.1</product>
<product>moodle:2.9.2</product>
<product>moodle:2.9.3</product>
<product>moodle:2.9.4</product>
<product>moodle:2.9.5</product>
<product>moodle:2.9.6</product>
<product>moodle:3.0</product>
<product>moodle:3.0.1</product>
<product>moodle:3.0.2</product>
<product>moodle:3.0.3</product>
<product>moodle:3.0.4</product>
<product>moodle:3.1.0</product>
</cve>
<cve id="CVE-2016-5010" level="MEDIUM">
<product>imagemagick:6.9.5-2</product>
</cve>
<cve id="CVE-2016-8236" level="LOW">
<product>thinkserver_firmware:3.76.208</product>
</cve>
<cve id="CVE-2016-5016" level="MEDIUM">
<product>cloud_foundry:239</product>
<product>cloud_foundry_elastic_runtime:1.6.0</product>
<product>cloud_foundry_elastic_runtime:1.6.1</product>
<product>cloud_foundry_elastic_runtime:1.6.2</product>
<product>cloud_foundry_elastic_runtime:1.6.3</product>
<product>cloud_foundry_elastic_runtime:1.6.4</product>
<product>cloud_foundry_elastic_runtime:1.6.5</product>
<product>cloud_foundry_elastic_runtime:1.6.6</product>
<product>cloud_foundry_elastic_runtime:1.6.7</product>
<product>cloud_foundry_elastic_runtime:1.6.8</product>
<product>cloud_foundry_elastic_runtime:1.6.9</product>
<product>cloud_foundry_elastic_runtime:1.6.10</product>
<product>cloud_foundry_elastic_runtime:1.6.11</product>
<product>cloud_foundry_elastic_runtime:1.6.12</product>
<product>cloud_foundry_elastic_runtime:1.6.13</product>
<product>cloud_foundry_elastic_runtime:1.6.14</product>
<product>cloud_foundry_elastic_runtime:1.6.15</product>
<product>cloud_foundry_elastic_runtime:1.6.17</product>
<product>cloud_foundry_elastic_runtime:1.6.18</product>
<product>cloud_foundry_elastic_runtime:1.6.19</product>
<product>cloud_foundry_elastic_runtime:1.6.20</product>
<product>cloud_foundry_elastic_runtime:1.6.21</product>
<product>cloud_foundry_elastic_runtime:1.6.22</product>
<product>cloud_foundry_elastic_runtime:1.6.23</product>
<product>cloud_foundry_elastic_runtime:1.6.25</product>
<product>cloud_foundry_elastic_runtime:1.6.26</product>
<product>cloud_foundry_elastic_runtime:1.6.27</product>
<product>cloud_foundry_elastic_runtime:1.6.28</product>
<product>cloud_foundry_elastic_runtime:1.6.29</product>
<product>cloud_foundry_elastic_runtime:1.6.30</product>
<product>cloud_foundry_elastic_runtime:1.6.31</product>
<product>cloud_foundry_elastic_runtime:1.6.32</product>
<product>cloud_foundry_elastic_runtime:1.6.34</product>
<product>cloud_foundry_elastic_runtime:1.6.35</product>
<product>cloud_foundry_elastic_runtime:1.7.0</product>
<product>cloud_foundry_elastic_runtime:1.7.1</product>
<product>cloud_foundry_elastic_runtime:1.7.2</product>
<product>cloud_foundry_elastic_runtime:1.7.3</product>
<product>cloud_foundry_elastic_runtime:1.7.4</product>
<product>cloud_foundry_elastic_runtime:1.7.5</product>
<product>cloud_foundry_elastic_runtime:1.7.6</product>
<product>cloud_foundry_elastic_runtime:1.7.7</product>
<product>cloud_foundry_elastic_runtime:1.7.8</product>
<product>cloud_foundry_elastic_runtime:1.7.9</product>
<product>cloud_foundry_elastic_runtime:1.7.10</product>
<product>cloud_foundry_elastic_runtime:1.7.11</product>
<product>cloud_foundry_elastic_runtime:1.7.12</product>
<product>cloud_foundry_uaa:3.4.1</product>
<product>cloud_foundry_uaa:12.2</product>
</cve>
<cve id="CVE-2016-5017" level="MEDIUM">
<product>zookeeper:3.4.8</product>
<product>zookeeper:3.5.0</product>
<product>zookeeper:3.5.1</product>
<product>zookeeper:3.5.2</product>
</cve>
<cve id="CVE-2016-5014" level="MEDIUM">
<product>moodle:2.8</product>
<product>moodle:2.8.1</product>
<product>moodle:2.8.2</product>
<product>moodle:2.8.3</product>
<product>moodle:2.8.4</product>
<product>moodle:2.8.5</product>
<product>moodle:2.8.6</product>
<product>moodle:2.8.7</product>
<product>moodle:2.8.8</product>
<product>moodle:2.8.9</product>
<product>moodle:2.8.10</product>
<product>moodle:2.8.11</product>
<product>moodle:2.8.12</product>
<product>moodle:2.9</product>
<product>moodle:2.9.1</product>
<product>moodle:2.9.2</product>
<product>moodle:2.9.3</product>
<product>moodle:2.9.4</product>
<product>moodle:2.9.5</product>
<product>moodle:2.9.6</product>
<product>moodle:3.0</product>
<product>moodle:3.0.1</product>
<product>moodle:3.0.2</product>
<product>moodle:3.0.3</product>
<product>moodle:3.0.4</product>
<product>moodle:3.1.0</product>
</cve>
<cve id="CVE-2016-8232" level="MEDIUM">
<product>advanced_management_module_firmware:-</product>
</cve>
<cve id="CVE-2016-0005" level="MEDIUM">
<product>internet_explorer:9</product>
<product>internet_explorer:10</product>
<product>internet_explorer:11</product>
</cve>
<cve id="CVE-2016-0002" level="HIGH">
<product>jscript:5.7</product>
<product>jscript:5.8</product>
<product>vbscript:5.7</product>
<product>vbscript:5.8</product>
</cve>
<cve id="CVE-2016-0003" level="MEDIUM">
<product>edge:-</product>
</cve>
<cve id="CVE-2016-9728" level="LOW">
<product>qradar_security_information_and_event_manager:7.2.0</product>
<product>qradar_security_information_and_event_manager:7.2.1</product>
<product>qradar_security_information_and_event_manager:7.2.2</product>
<product>qradar_security_information_and_event_manager:7.2.3</product>
<product>qradar_security_information_and_event_manager:7.2.4</product>
<product>qradar_security_information_and_event_manager:7.2.5</product>
<product>qradar_security_information_and_event_manager:7.2.6</product>
<product>qradar_security_information_and_event_manager:7.2.7</product>
<product>qradar_security_information_and_event_manager:7.2.8</product>
</cve>
<cve id="CVE-2016-9729" level="LOW">
<product>qradar_security_information_and_event_manager:7.2.0</product>
<product>qradar_security_information_and_event_manager:7.2.1</product>
<product>qradar_security_information_and_event_manager:7.2.2</product>
<product>qradar_security_information_and_event_manager:7.2.3</product>
<product>qradar_security_information_and_event_manager:7.2.4</product>
<product>qradar_security_information_and_event_manager:7.2.5</product>
<product>qradar_security_information_and_event_manager:7.2.6</product>
<product>qradar_security_information_and_event_manager:7.2.7</product>
<product>qradar_security_information_and_event_manager:7.2.8</product>
</cve>
<cve id="CVE-2016-9720" level="LOW">
<product>qradar_incident_forensics:7.2.0</product>
<product>qradar_incident_forensics:7.2.1</product>
<product>qradar_incident_forensics:7.2.2</product>
<product>qradar_incident_forensics:7.2.3</product>
<product>qradar_incident_forensics:7.2.4</product>
<product>qradar_incident_forensics:7.2.5</product>
<product>qradar_incident_forensics:7.2.6</product>
<product>qradar_incident_forensics:7.2.7</product>
<product>qradar_incident_forensics:7.2.8</product>
<product>qradar_security_information_and_event_manager:7.2.0</product>
<product>qradar_security_information_and_event_manager:7.2.1</product>
<product>qradar_security_information_and_event_manager:7.2.2</product>
<product>qradar_security_information_and_event_manager:7.2.3</product>
<product>qradar_security_information_and_event_manager:7.2.4</product>
<product>qradar_security_information_and_event_manager:7.2.5</product>
<product>qradar_security_information_and_event_manager:7.2.6</product>
<product>qradar_security_information_and_event_manager:7.2.7</product>
<product>qradar_security_information_and_event_manager:7.2.8</product>
</cve>
<cve id="CVE-2016-9722" level="MEDIUM">
<product>qradar_security_information_and_event_manager:7.2.0</product>
<product>qradar_security_information_and_event_manager:7.2.1</product>
<product>qradar_security_information_and_event_manager:7.2.2</product>
<product>qradar_security_information_and_event_manager:7.2.3</product>
<product>qradar_security_information_and_event_manager:7.2.4</product>
<product>qradar_security_information_and_event_manager:7.2.5</product>
<product>qradar_security_information_and_event_manager:7.2.6</product>
<product>qradar_security_information_and_event_manager:7.2.7</product>
<product>qradar_security_information_and_event_manager:7.2.8</product>
<product>qradar_security_information_and_event_manager:7.3.0</product>
</cve>
<cve id="CVE-2016-9723" level="MEDIUM">
<product>qradar_incident_forensics:7.2.0</product>
<product>qradar_incident_forensics:7.2.1</product>
<product>qradar_incident_forensics:7.2.2</product>
<product>qradar_incident_forensics:7.2.3</product>
<product>qradar_incident_forensics:7.2.4</product>
<product>qradar_incident_forensics:7.2.5</product>
<product>qradar_incident_forensics:7.2.6</product>
<product>qradar_incident_forensics:7.2.7</product>
<product>qradar_incident_forensics:7.2.8</product>
<product>qradar_security_information_and_event_manager:7.2.0</product>
<product>qradar_security_information_and_event_manager:7.2.1</product>
<product>qradar_security_information_and_event_manager:7.2.2</product>
<product>qradar_security_information_and_event_manager:7.2.3</product>
<product>qradar_security_information_and_event_manager:7.2.4</product>
<product>qradar_security_information_and_event_manager:7.2.5</product>
<product>qradar_security_information_and_event_manager:7.2.6</product>
<product>qradar_security_information_and_event_manager:7.2.7</product>
<product>qradar_security_information_and_event_manager:7.2.8</product>
</cve>
<cve id="CVE-2016-9724" level="LOW">
<product>qradar_security_information_and_event_manager:7.2.0</product>
<product>qradar_security_information_and_event_manager:7.2.1</product>
<product>qradar_security_information_and_event_manager:7.2.2</product>
<product>qradar_security_information_and_event_manager:7.2.3</product>
<product>qradar_security_information_and_event_manager:7.2.4</product>
<product>qradar_security_information_and_event_manager:7.2.5</product>
<product>qradar_security_information_and_event_manager:7.2.6</product>
<product>qradar_security_information_and_event_manager:7.2.7</product>
<product>qradar_security_information_and_event_manager:7.2.8</product>
</cve>
<cve id="CVE-2016-9725" level="LOW">
<product>qradar_security_information_and_event_manager:7.2.0</product>
<product>qradar_security_information_and_event_manager:7.2.1</product>
<product>qradar_security_information_and_event_manager:7.2.2</product>
<product>qradar_security_information_and_event_manager:7.2.3</product>
<product>qradar_security_information_and_event_manager:7.2.4</product>
<product>qradar_security_information_and_event_manager:7.2.5</product>
<product>qradar_security_information_and_event_manager:7.2.6</product>
<product>qradar_security_information_and_event_manager:7.2.7</product>
<product>qradar_security_information_and_event_manager:7.2.8</product>
</cve>
<cve id="CVE-2016-9726" level="LOW">
<product>qradar_incident_forensics:7.2.0</product>
<product>qradar_incident_forensics:7.2.1</product>
<product>qradar_incident_forensics:7.2.2</product>
<product>qradar_incident_forensics:7.2.3</product>
<product>qradar_incident_forensics:7.2.4</product>
<product>qradar_incident_forensics:7.2.5</product>
<product>qradar_incident_forensics:7.2.6</product>
<product>qradar_incident_forensics:7.2.7</product>
<product>qradar_incident_forensics:7.2.8</product>
<product>qradar_security_information_and_event_manager:7.2.0</product>
<product>qradar_security_information_and_event_manager:7.2.1</product>
<product>qradar_security_information_and_event_manager:7.2.2</product>
<product>qradar_security_information_and_event_manager:7.2.3</product>
<product>qradar_security_information_and_event_manager:7.2.4</product>
<product>qradar_security_information_and_event_manager:7.2.5</product>
<product>qradar_security_information_and_event_manager:7.2.6</product>
<product>qradar_security_information_and_event_manager:7.2.7</product>
<product>qradar_security_information_and_event_manager:7.2.8</product>
</cve>
<cve id="CVE-2016-9727" level="MEDIUM">
<product>qradar_incident_forensics:7.2.0</product>
<product>qradar_incident_forensics:7.2.1</product>
<product>qradar_incident_forensics:7.2.2</product>
<product>qradar_incident_forensics:7.2.3</product>
<product>qradar_incident_forensics:7.2.4</product>
<product>qradar_incident_forensics:7.2.5</product>
<product>qradar_incident_forensics:7.2.6</product>
<product>qradar_incident_forensics:7.2.7</product>
<product>qradar_incident_forensics:7.2.8</product>
<product>qradar_security_information_and_event_manager:7.2.0</product>
<product>qradar_security_information_and_event_manager:7.2.1</product>
<product>qradar_security_information_and_event_manager:7.2.2</product>
<product>qradar_security_information_and_event_manager:7.2.3</product>
<product>qradar_security_information_and_event_manager:7.2.4</product>
<product>qradar_security_information_and_event_manager:7.2.5</product>
<product>qradar_security_information_and_event_manager:7.2.6</product>
<product>qradar_security_information_and_event_manager:7.2.7</product>
<product>qradar_security_information_and_event_manager:7.2.8</product>
</cve>
<cve id="CVE-2016-10561" level="LOW">
<product>bitty:0.2.10</product>
</cve>
<cve id="CVE-2016-4499" level="MEDIUM">
<product>fpwin_pro:-</product>
</cve>
<cve id="CVE-2016-4498" level="MEDIUM">
<product>fpwin_pro:-</product>
</cve>
<cve id="CVE-2016-4495" level="LOW">
<product>bac-5051e_firmware:-</product>
</cve>
<cve id="CVE-2016-4494" level="MEDIUM">
<product>bac-5051e_firmware:-</product>
</cve>
<cve id="CVE-2016-4497" level="MEDIUM">
<product>fpwin_pro:-</product>
</cve>
<cve id="CVE-2016-4496" level="MEDIUM">
<product>fpwin_pro:-</product>
</cve>
<cve id="CVE-2016-4491" level="MEDIUM">
<product>libiberty</product>
</cve>
<cve id="CVE-2016-4490" level="MEDIUM">
<product>libiberty</product>
</cve>
<cve id="CVE-2016-4493" level="MEDIUM">
<product>libiberty</product>
</cve>
<cve id="CVE-2016-4492" level="MEDIUM">
<product>libiberty</product>
</cve>
<cve id="CVE-2016-2542" level="LOW">
<product>installshield:2015</product>
</cve>
<cve id="CVE-2016-2894" level="LOW">
<product>tivoli_storage_manager:5.5</product>
<product>tivoli_storage_manager:5.5.0</product>
<product>tivoli_storage_manager:5.5.2</product>
<product>tivoli_storage_manager:5.5.3</product>
<product>tivoli_storage_manager:5.5.4</product>
<product>tivoli_storage_manager:5.5.4.1</product>
<product>tivoli_storage_manager:5.5.4.2</product>
<product>tivoli_storage_manager:5.5.4.3</product>
<product>tivoli_storage_manager:6.1</product>
<product>tivoli_storage_manager:6.1.0</product>
<product>tivoli_storage_manager:6.1.1</product>
<product>tivoli_storage_manager:6.1.2</product>
<product>tivoli_storage_manager:6.1.3</product>
<product>tivoli_storage_manager:6.1.4</product>
<product>tivoli_storage_manager:6.1.5</product>
<product>tivoli_storage_manager:6.1.5.4</product>
<product>tivoli_storage_manager:6.1.5.5</product>
<product>tivoli_storage_manager:6.1.5.6</product>
<product>tivoli_storage_manager:6.2</product>
<product>tivoli_storage_manager:6.2.0</product>
<product>tivoli_storage_manager:6.2.1</product>
<product>tivoli_storage_manager:6.2.2</product>
<product>tivoli_storage_manager:6.2.3</product>
<product>tivoli_storage_manager:6.2.4</product>
<product>tivoli_storage_manager:6.2.4.7</product>
<product>tivoli_storage_manager:6.3</product>
<product>tivoli_storage_manager:6.3.0</product>
<product>tivoli_storage_manager:6.3.0.5</product>
<product>tivoli_storage_manager:6.3.0.15</product>
<product>tivoli_storage_manager:6.3.0.17</product>
<product>tivoli_storage_manager:6.3.1</product>
<product>tivoli_storage_manager:6.3.1.2</product>
<product>tivoli_storage_manager:6.3.2.2</product>
<product>tivoli_storage_manager:6.4</product>
<product>tivoli_storage_manager:6.4.0</product>
<product>tivoli_storage_manager:6.4.0.1</product>
<product>tivoli_storage_manager:6.4.0.4</product>
<product>tivoli_storage_manager:6.4.0.5</product>
<product>tivoli_storage_manager:6.4.0.7</product>
<product>tivoli_storage_manager:6.4.1.3</product>
<product>tivoli_storage_manager:6.4.1.7</product>
<product>tivoli_storage_manager:6.4.2.1</product>
<product>tivoli_storage_manager:6.4.2.100</product>
<product>tivoli_storage_manager:6.4.2.200</product>
<product>tivoli_storage_manager:6.4.3</product>
<product>tivoli_storage_manager:6.4.3.1</product>
<product>tivoli_storage_manager:7.1</product>
<product>tivoli_storage_manager:7.1..5.100</product>
<product>tivoli_storage_manager:7.1.0.1</product>
<product>tivoli_storage_manager:7.1.0.2</product>
<product>tivoli_storage_manager:7.1.0.3</product>
<product>tivoli_storage_manager:7.1.1</product>
<product>tivoli_storage_manager:7.1.1.1</product>
<product>tivoli_storage_manager:7.1.1.100</product>
<product>tivoli_storage_manager:7.1.1.200</product>
<product>tivoli_storage_manager:7.1.1.300</product>
<product>tivoli_storage_manager:7.1.2</product>
<product>tivoli_storage_manager:7.1.3</product>
<product>tivoli_storage_manager:7.1.3.000</product>
<product>tivoli_storage_manager:7.1.3.1</product>
<product>tivoli_storage_manager:7.1.3.2</product>
<product>tivoli_storage_manager:7.1.3.100</product>
<product>tivoli_storage_manager:7.1.4</product>
<product>tivoli_storage_manager:7.1.4.1</product>
<product>tivoli_storage_manager:7.1.5</product>
<product>tivoli_storage_manager:7.1.5.200</product>
</cve>
<cve id="CVE-2016-1000000" level="LOW">
<product>whatsup_gold:16.4</product>
</cve>
<cve id="CVE-2016-1000003" level="LOW">
<product>mirror_manager:0.7.2</product>
</cve>
<cve id="CVE-2016-2091" level="LOW">
<product>libdwarf:20151114</product>
</cve>
<cve id="CVE-2016-2090" level="LOW">
<product>libbsd:0.8.1</product>
<product>fedora:24</product>
<product>fedora:25</product>
</cve>
<cve id="CVE-2016-2097" level="LOW">
<product>ruby_on_rails:3.2.22.1</product>
<product>ruby_on_rails:4.0.0</product>
<product>ruby_on_rails:4.0.0</product>
<product>ruby_on_rails:4.0.0</product>
<product>ruby_on_rails:4.0.0</product>
<product>ruby_on_rails:4.0.1</product>
<product>ruby_on_rails:4.0.1</product>
<product>ruby_on_rails:4.0.1</product>
<product>ruby_on_rails:4.0.1</product>
<product>ruby_on_rails:4.0.1</product>
<product>ruby_on_rails:4.0.2</product>
<product>ruby_on_rails:4.0.3</product>
<product>ruby_on_rails:4.0.4</product>
<product>ruby_on_rails:4.0.4</product>
<product>ruby_on_rails:4.0.5</product>
<product>ruby_on_rails:4.0.6</product>
<product>ruby_on_rails:4.0.6</product>
<product>ruby_on_rails:4.0.6</product>
<product>ruby_on_rails:4.0.6</product>
<product>ruby_on_rails:4.0.7</product>
<product>ruby_on_rails:4.0.8</product>
<product>ruby_on_rails:4.0.9</product>
<product>ruby_on_rails:4.0.10</product>
<product>ruby_on_rails:4.1.0</product>
<product>ruby_on_rails:4.1.0</product>
<product>ruby_on_rails:4.1.0</product>
<product>ruby_on_rails:4.1.0</product>
<product>ruby_on_rails:4.1.0</product>
<product>ruby_on_rails:4.1.1</product>
<product>ruby_on_rails:4.1.2</product>
<product>ruby_on_rails:4.1.2</product>
<product>ruby_on_rails:4.1.2</product>
<product>ruby_on_rails:4.1.2</product>
<product>ruby_on_rails:4.1.3</product>
<product>ruby_on_rails:4.1.4</product>
<product>ruby_on_rails:4.1.5</product>
<product>ruby_on_rails:4.1.6</product>
<product>ruby_on_rails:4.1.6</product>
<product>ruby_on_rails:4.1.7</product>
<product>ruby_on_rails:4.1.7.1</product>
<product>ruby_on_rails:4.1.8</product>
<product>ruby_on_rails:4.1.9</product>
<product>ruby_on_rails:4.1.10</product>
<product>ruby_on_rails:4.1.10</product>
<product>ruby_on_rails:4.1.10</product>
<product>ruby_on_rails:4.1.10</product>
<product>ruby_on_rails:4.1.12</product>
<product>ruby_on_rails:4.1.13</product>
<product>ruby_on_rails:4.1.14</product>
<product>ruby_on_rails:4.1.14</product>
<product>ruby_on_rails:4.1.14.1</product>
</cve>
<cve id="CVE-2016-2094" level="LOW">
<product>enterprise_application_platform:6.4.6</product>
</cve>
<cve id="CVE-2016-2099" level="LOW">
<product>xerces-c%2b%2b:3.1.3</product>
<product>opensuse:13.2</product>
</cve>
<cve id="CVE-2016-1000007" level="MEDIUM">
<product>pagure:2.2.1</product>
</cve>
<cve id="CVE-2016-10438" level="LOW">
<product>fsm9055_firmware:-</product>
<product>ipq4019_firmware:-</product>
<product>mdm9206_firmware:-</product>
<product>mdm9607_firmware:-</product>
<product>mdm9635m_firmware:-</product>
<product>mdm9640_firmware:-</product>
<product>mdm9650_firmware:-</product>
<product>msm8909w_firmware:-</product>
<product>qca4531_firmware:-</product>
<product>qca9980_firmware:-</product>
<product>sd_205_firmware:-</product>
<product>sd_210_firmware:-</product>
<product>sd_212_firmware:-</product>
<product>sd_400_firmware:-</product>
<product>sd_410_firmware:-</product>
<product>sd_412_firmware:-</product>
<product>sd_415_firmware:-</product>
<product>sd_425_firmware:-</product>
<product>sd_430_firmware:-</product>
<product>sd_450_firmware:-</product>
<product>sd_615_firmware:-</product>
<product>sd_616_firmware:-</product>
<product>sd_617_firmware:-</product>
<product>sd_625_firmware:-</product>
<product>sd_650_firmware:-</product>
<product>sd_652_firmware:-</product>
<product>sd_808_firmware:-</product>
<product>sd_810_firmware:-</product>
<product>sd_820_firmware:-</product>
<product>sd_835_firmware:-</product>
<product>sdx20_firmware:-</product>
</cve>
<cve id="CVE-2016-7065" level="LOW">
<product>jboss_enterprise_application_platform:4.0.0</product>
<product>jboss_enterprise_application_platform:5.0.0</product>
</cve>
<cve id="CVE-2016-7060" level="LOW">
<product>quickstart_cloud_installer:1.0</product>
</cve>
<cve id="CVE-2016-7062" level="LOW">
<product>storage_console:2.0</product>
<product>storage_console_node:2.0</product>
</cve>
<cve id="CVE-2016-3382" level="MEDIUM">
<product>edge:-</product>
<product>internet_explorer:9</product>
<product>internet_explorer:10</product>
<product>internet_explorer:11</product>
</cve>
<cve id="CVE-2016-3383" level="MEDIUM">
<product>internet_explorer:10</product>
<product>internet_explorer:11</product>
</cve>
<cve id="CVE-2016-3384" level="MEDIUM">
<product>internet_explorer:9</product>
<product>internet_explorer:10</product>
<product>internet_explorer:11</product>
</cve>
<cve id="CVE-2016-3385" level="MEDIUM">
<product>internet_explorer:9</product>
<product>internet_explorer:10</product>
<product>internet_explorer:11</product>
</cve>
<cve id="CVE-2016-3386" level="MEDIUM">
<product>edge:-</product>
</cve>
<cve id="CVE-2016-3387" level="MEDIUM">
<product>edge:-</product>
<product>internet_explorer:10</product>
<product>internet_explorer:11</product>
</cve>
<cve id="CVE-2016-3388" level="HIGH">
<product>edge</product>
<product>internet_explorer:10</product>
<product>internet_explorer:11</product>
</cve>
<cve id="CVE-2016-3389" level="HIGH">
<product>edge:-</product>
</cve>
<cve id="CVE-2016-4266" level="LOW">
<product>acrobat:11.0.16</product>
<product>acrobat_dc:15.006.30174</product>
<product>acrobat_dc:15.016.20045</product>
<product>acrobat_reader_dc:15.006.30174</product>
<product>acrobat_reader_dc:15.016.20045</product>
<product>reader:11.0.16</product>
</cve>
<cve id="CVE-2016-4267" level="LOW">
<product>acrobat:11.0.16</product>
<product>acrobat_dc:15.006.30174</product>
<product>acrobat_dc:15.016.20045</product>
<product>acrobat_reader_dc:15.006.30174</product>
<product>acrobat_reader_dc:15.016.20045</product>
<product>reader:11.0.16</product>
</cve>
<cve id="CVE-2016-4264" level="LOW">
<product>coldfusion:10.0</product>
<product>coldfusion:11.0</product>
</cve>
<cve id="CVE-2016-10489" level="LOW">
<product>sd_400_firmware:-</product>
</cve>
<cve id="CVE-2016-4262" level="LOW">
<product>digital_editions:4.5.1</product>
</cve>
<cve id="CVE-2016-4263" level="LOW">
<product>digital_editions:4.5.1</product>
</cve>
<cve id="CVE-2016-4260" level="LOW">
<product>digital_editions:4.5.1</product>
</cve>
<cve id="CVE-2016-4261" level="LOW">
<product>digital_editions:4.5.1</product>
</cve>
<cve id="CVE-2016-10482" level="LOW">
<product>mdm9206_firmware:-</product>
<product>mdm9607_firmware:-</product>
<product>mdm9625_firmware:-</product>
<product>mdm9635m_firmware:-</product>
<product>mdm9640_firmware:-</product>
<product>mdm9645_firmware:-</product>
<product>mdm9650_firmware:-</product>
<product>mdm9655_firmware:-</product>
<product>msm8909w_firmware:-</product>
<product>sd_205_firmware:-</product>
<product>sd_210_firmware:-</product>
<product>sd_212_firmware:-</product>
<product>sd_400_firmware:-</product>
<product>sd_410_firmware:-</product>
<product>sd_412_firmware:-</product>
<product>sd_415_firmware:-</product>
<product>sd_425_firmware:-</product>
<product>sd_430_firmware:-</product>
<product>sd_450_firmware:-</product>
<product>sd_615_firmware:-</product>
<product>sd_616_firmware:-</product>
<product>sd_617_firmware:-</product>
<product>sd_625_firmware:-</product>
<product>sd_650_firmware:-</product>
<product>sd_652_firmware:-</product>
<product>sd_800_firmware:-</product>
<product>sd_808_firmware:-</product>
<product>sd_810_firmware:-</product>
<product>sd_820_firmware:-</product>
<product>sd_835_firmware:-</product>
<product>sd_845_firmware:-</product>
<product>sd_850_firmware:-</product>
<product>sdx20_firmware:-</product>
</cve>
<cve id="CVE-2016-10483" level="LOW">
<product>sd_410_firmware:-</product>
<product>sd_412_firmware:-</product>
<product>sd_415_firmware:-</product>
<product>sd_615_firmware:-</product>
<product>sd_616_firmware:-</product>
<product>sd_808_firmware:-</product>
<product>sd_810_firmware:-</product>
</cve>
<cve id="CVE-2016-10480" level="LOW">
<product>mdm9206_firmware:-</product>
<product>mdm9607_firmware:-</product>
<product>mdm9650_firmware:-</product>
<product>msm8909w_firmware:-</product>
<product>sd_205_firmware:-</product>
<product>sd_210_firmware:-</product>
<product>sd_212_firmware:-</product>
<product>sd_400_firmware:-</product>
<product>sd_410_firmware:-</product>
<product>sd_412_firmware:-</product>
<product>sd_415_firmware:-</product>
<product>sd_425_firmware:-</product>
<product>sd_430_firmware:-</product>
<product>sd_450_firmware:-</product>
<product>sd_615_firmware:-</product>
<product>sd_616_firmware:-</product>
<product>sd_617_firmware:-</product>
<product>sd_625_firmware:-</product>
<product>sd_650_firmware:-</product>
<product>sd_652_firmware:-</product>
<product>sd_800_firmware:-</product>
<product>sd_808_firmware:-</product>
<product>sd_810_firmware:-</product>
<product>sd_820_firmware:-</product>
<product>sd_835_firmware:-</product>
<product>sdx20_firmware:-</product>
</cve>
<cve id="CVE-2016-10481" level="LOW">
<product>mdm9607_firmware:-</product>
<product>mdm9635m_firmware:-</product>
<product>mdm9640_firmware:-</product>
<product>mdm9650_firmware:-</product>
<product>qca4531_firmware:-</product>
<product>qca6174a_firmware:-</product>
<product>qca6574au_firmware:-</product>
<product>qca6584_firmware:-</product>
<product>qca6584au_firmware:-</product>
<product>qca9377_firmware:-</product>
<product>qca9378_firmware:-</product>
<product>qca9379_firmware:-</product>
<product>sd_205_firmware:-</product>
<product>sd_210_firmware:-</product>
<product>sd_212_firmware:-</product>
<product>sd_425_firmware:-</product>
<product>sd_600_firmware:-</product>
<product>sd_625_firmware:-</product>
<product>sd_650_firmware:-</product>
<product>sd_652_firmware:-</product>
<product>sd_808_firmware:-</product>
<product>sd_810_firmware:-</product>
<product>sd_820_firmware:-</product>
<product>sd_835_firmware:-</product>
<product>sd_845_firmware:-</product>
<product>sdx20_firmware:-</product>
</cve>
<cve id="CVE-2016-10486" level="LOW">
<product>mdm9640_firmware:-</product>
<product>mdm9645_firmware:-</product>
<product>sd_205_firmware:-</product>
<product>sd_210_firmware:-</product>
<product>sd_212_firmware:-</product>
<product>sd_450_firmware:-</product>
<product>sd_617_firmware:-</product>
<product>sd_625_firmware:-</product>
<product>sd_650_firmware:-</product>
<product>sd_652_firmware:-</product>
<product>sd_808_firmware:-</product>
<product>sd_810_firmware:-</product>
<product>sd_820_firmware:-</product>
<product>sd_820a_firmware:-</product>
</cve>
<cve id="CVE-2016-10487" level="LOW">
<product>mdm9206_firmware:-</product>
<product>mdm9607_firmware:-</product>
<product>mdm9635m_firmware:-</product>
<product>mdm9640_firmware:-</product>
<product>mdm9645_firmware:-</product>
<product>mdm9650_firmware:-</product>
<product>mdm9655_firmware:-</product>
<product>msm8909w_firmware:-</product>
<product>sd_205_firmware:-</product>
<product>sd_210_firmware:-</product>
<product>sd_212_firmware:-</product>
<product>sd_425_firmware:-</product>
<product>sd_430_firmware:-</product>
<product>sd_450_firmware:-</product>
<product>sd_617_firmware:-</product>
<product>sd_625_firmware:-</product>
<product>sd_650_firmware:-</product>
<product>sd_652_firmware:-</product>
<product>sd_808_firmware:-</product>
<product>sd_810_firmware:-</product>
<product>sd_820_firmware:-</product>
<product>sd_820a_firmware:-</product>
<product>sd_835_firmware:-</product>
<product>sd_845_firmware:-</product>
<product>sd_850_firmware:-</product>
<product>sdx20_firmware:-</product>
</cve>
<cve id="CVE-2016-10484" level="LOW">
<product>ipq4019_firmware:-</product>
<product>mdm9206_firmware:-</product>
<product>mdm9607_firmware:-</product>
<product>mdm9625_firmware:-</product>
<product>mdm9635m_firmware:-</product>
<product>mdm9640_firmware:-</product>
<product>mdm9645_firmware:-</product>
<product>mdm9650_firmware:-</product>
<product>mdm9655_firmware:-</product>
<product>msm8909w_firmware:-</product>
<product>sd_205_firmware:-</product>
<product>sd_210_firmware:-</product>
<product>sd_212_firmware:-</product>
<product>sd_400_firmware:-</product>
<product>sd_410_firmware:-</product>
<product>sd_412_firmware:-</product>
<product>sd_415_firmware:-</product>
<product>sd_425_firmware:-</product>
<product>sd_430_firmware:-</product>
<product>sd_450_firmware:-</product>
<product>sd_615_firmware:-</product>
<product>sd_616_firmware:-</product>
<product>sd_617_firmware:-</product>
<product>sd_625_firmware:-</product>
<product>sd_650_firmware:-</product>
<product>sd_652_firmware:-</product>
<product>sd_800_firmware:-</product>
<product>sd_808_firmware:-</product>
<product>sd_810_firmware:-</product>
<product>sd_820_firmware:-</product>
<product>sd_820a_firmware:-</product>
<product>sd_835_firmware:-</product>
<product>sdx20_firmware:-</product>
</cve>
<cve id="CVE-2016-10485" level="LOW">
<product>ipq4019_firmware:-</product>
<product>mdm9206_firmware:-</product>
<product>mdm9607_firmware:-</product>
<product>mdm9625_firmware:-</product>
<product>mdm9635m_firmware:-</product>
<product>mdm9640_firmware:-</product>
<product>mdm9645_firmware:-</product>
<product>mdm9650_firmware:-</product>
<product>mdm9655_firmware:-</product>
<product>msm8909w_firmware:-</product>
<product>sd_205_firmware:-</product>
<product>sd_210_firmware:-</product>
<product>sd_212_firmware:-</product>
<product>sd_400_firmware:-</product>
<product>sd_410_firmware:-</product>
<product>sd_412_firmware:-</product>
<product>sd_415_firmware:-</product>
<product>sd_615_firmware:-</product>
<product>sd_616_firmware:-</product>
<product>sd_617_firmware:-</product>
<product>sd_650_firmware:-</product>
<product>sd_652_firmware:-</product>
<product>sd_800_firmware:-</product>
<product>sd_808_firmware:-</product>
<product>sd_810_firmware:-</product>
<product>sdx20_firmware:-</product>
</cve>
<cve id="CVE-2016-3960" level="LOW">
<product>fedora:22</product>
<product>fedora:23</product>
<product>fedora:24</product>
<product>vm_server:3.2</product>
<product>vm_server:3.3</product>
<product>vm_server:3.4</product>
<product>xen:-</product>
</cve>
<cve id="CVE-2016-3963" level="LOW">
<product>scalance_s613</product>
</cve>
<cve id="CVE-2016-3968" level="MEDIUM">
<product>cyberoam_cr100ing_utm_firmware:10.6.3_mr-1_build_503</product>
<product>cyberoam_cr35ing_utm_firmware:10.6.2_build_378</product>
<product>cyberoam_cr35ing_utm_firmware:10.6.2_mr-1_build_383</product>
</cve>
<cve id="CVE-2016-3969" level="MEDIUM">
<product>email_gateway:7.6</product>
<product>email_gateway:7.6.1</product>
<product>email_gateway:7.6.2</product>
<product>email_gateway:7.6.3</product>
<product>email_gateway:7.6.4</product>
</cve>
<cve id="CVE-2016-8006" level="LOW">
<product>security_information_and_event_management:9.6.0</product>
</cve>
<cve id="CVE-2016-8007" level="MEDIUM">
<product>host_intrusion_prevention_services:8.0</product>
</cve>
<cve id="CVE-2016-8005" level="LOW">
<product>email_gateway:7.6.401</product>
</cve>
<cve id="CVE-2016-8008" level="LOW">
<product>security_scan_plus:3.11.376</product>
</cve>
<cve id="CVE-2016-8009" level="LOW">
<product>application_control:6.0.0</product>
<product>application_control:6.1.0</product>
<product>application_control:6.1.1</product>
<product>application_control:6.1.2</product>
<product>application_control:6.1.3</product>
<product>application_control:6.2.0</product>
<product>application_control:7.0.0</product>
</cve>
<cve id="CVE-2016-1038" level="LOW">
<product>acrobat:11.0.15</product>
<product>acrobat_dc:15.006.30121</product>
<product>acrobat_dc:15.010.20060</product>
<product>acrobat_reader_dc:15.006.30121</product>
<product>acrobat_reader_dc:15.010.20060</product>
<product>reader:11.0.15</product>
</cve>
<cve id="CVE-2016-1039" level="LOW">
<product>acrobat:11.0.15</product>
<product>acrobat_dc:15.006.30121</product>
<product>acrobat_dc:15.010.20060</product>
<product>acrobat_reader_dc:15.006.30121</product>
<product>acrobat_reader_dc:15.010.20060</product>
<product>reader:11.0.15</product>
</cve>
<cve id="CVE-2016-1034" level="LOW">
<product>creative_cloud:3.5.1.209</product>
</cve>
<cve id="CVE-2016-1035" level="LOW">
<product>robohelp:9</product>
<product>robohelp:9.0.0.228</product>
<product>robohelp:9.0.1</product>
</cve>
<cve id="CVE-2016-1036" level="MEDIUM">
<product>analytics_appmeasurement_for_flash_library:4.0</product>
</cve>
<cve id="CVE-2016-1037" level="LOW">
<product>acrobat:11.0.15</product>
<product>acrobat_dc:15.006.30121</product>
<product>acrobat_dc:15.010.20060</product>
<product>acrobat_reader_dc:15.006.30121</product>
<product>acrobat_reader_dc:15.010.20060</product>
<product>reader:11.0.15</product>
</cve>
<cve id="CVE-2016-4003" level="MEDIUM">
<product>struts:2.3.24.1</product>
</cve>
<cve id="CVE-2016-1520" level="MEDIUM">
<product>wave:1.0.1.26</product>
</cve>
<cve id="CVE-2016-4007" level="LOW">
<product>leap:42.1</product>
<product>opensuse:13.2</product>
</cve>
<cve id="CVE-2016-1524" level="LOW">
<product>prosafe_network_management_software_300:1.5.0.11</product>
</cve>
<cve id="CVE-2016-1525" level="LOW">
<product>prosafe_network_management_software_300:1.5.0.11</product>
</cve>
<cve id="CVE-2016-4009" level="LOW">
<product>pillow:3.1.0</product>
</cve>
<cve id="CVE-2016-4057" level="LOW">
<product>fusioncompute:v100r005c00</product>
</cve>
<cve id="CVE-2016-4056" level="MEDIUM">
<product>typo3:6.2</product>
<product>typo3:6.2.0</product>
<product>typo3:6.2.0</product>
<product>typo3:6.2.0</product>
<product>typo3:6.2.0</product>
<product>typo3:6.2.0</product>
<product>typo3:6.2.0</product>
<product>typo3:6.2.0</product>
<product>typo3:6.2.0</product>
<product>typo3:6.2.0</product>
<product>typo3:6.2.0</product>
<product>typo3:6.2.0</product>
<product>typo3:6.2.0</product>
<product>typo3:6.2.1</product>
<product>typo3:6.2.2</product>
<product>typo3:6.2.3</product>
<product>typo3:6.2.4</product>
<product>typo3:6.2.5</product>
<product>typo3:6.2.6</product>
<product>typo3:6.2.7</product>
<product>typo3:6.2.8</product>
<product>typo3:6.2.9</product>
<product>typo3:6.2.10</product>
<product>typo3:6.2.10</product>
<product>typo3:6.2.11</product>
<product>typo3:6.2.12</product>
<product>typo3:6.2.13</product>
<product>typo3:6.2.14</product>
<product>typo3:6.2.15</product>
<product>typo3:6.2.16</product>
<product>typo3:6.2.17</product>
<product>typo3:6.2.18</product>
</cve>
<cve id="CVE-2016-1571" level="MEDIUM">
<product>xenserver:6.5</product>
<product>xen:4.4.0</product>
<product>xen:3.3.0</product>
<product>xen:3.3.1</product>
<product>xen:3.3.2</product>
<product>xen:3.4.0</product>
<product>xen:3.4.1</product>
<product>xen:3.4.2</product>
<product>xen:3.4.3</product>
<product>xen:3.4.4</product>
<product>xen:4.1.0</product>
<product>xen:4.1.1</product>
<product>xen:4.1.2</product>
<product>xen:4.1.3</product>
<product>xen:4.1.4</product>
<product>xen:4.1.5</product>
<product>xen:4.1.6</product>
<product>xen:4.1.6.1</product>
<product>xen:4.2.0</product>
<product>xen:4.2.1</product>
<product>xen:4.2.2</product>
<product>xen:4.2.3</product>
<product>xen:4.2.4</product>
<product>xen:4.2.5</product>
<product>xen:4.3.0</product>
<product>xen:4.3.1</product>
<product>xen:4.3.2</product>
<product>xen:4.3.3</product>
<product>xen:4.3.4</product>
<product>xen:4.4.0</product>
<product>xen:4.4.0</product>
<product>xen:4.4.1</product>
<product>xen:4.4.2</product>
<product>xen:4.4.3</product>
<product>xen:4.5.0</product>
<product>xen:4.5.1</product>
<product>xen:4.5.2</product>
<product>xen:4.6.0</product>
</cve>
<cve id="CVE-2016-1570" level="MEDIUM">
<product>xen:3.4.0</product>
<product>xen:3.4.1</product>
<product>xen:4.1.0</product>
<product>xen:4.1.1</product>
<product>xen:4.1.2</product>
<product>xen:4.1.3</product>
<product>xen:4.1.4</product>
<product>xen:4.1.5</product>
<product>xen:4.1.6</product>
<product>xen:4.1.6.1</product>
<product>xen:4.2.0</product>
<product>xen:4.2.1</product>
<product>xen:4.2.2</product>
<product>xen:4.2.3</product>
<product>xen:4.2.4</product>
<product>xen:4.2.5</product>
<product>xen:4.3.0</product>
<product>xen:4.3.1</product>
<product>xen:4.3.2</product>
<product>xen:4.3.3</product>
<product>xen:4.3.4</product>
<product>xen:4.4.0</product>
<product>xen:4.4.0</product>
<product>xen:4.4.0</product>
<product>xen:4.4.1</product>
<product>xen:4.4.2</product>
<product>xen:4.4.3</product>
<product>xen:4.5.0</product>
<product>xen:4.5.1</product>
<product>xen:4.5.2</product>
<product>xen:4.6.0</product>
</cve>
<cve id="CVE-2016-1000220" level="MEDIUM">
<product>kibana:4.1.10</product>
<product>kibana:4.5.3</product>
</cve>
<cve id="CVE-2016-1000221" level="LOW">
<product>logstash:2.3.3</product>
</cve>
<cve id="CVE-2016-1000222" level="LOW">
<product>logstash:2.1.1</product>
</cve>
<cve id="CVE-2016-5743" level="LOW">
<product>simatic_batch:7.1</product>
<product>simatic_openpcs_7:8.1</product>
<product>simatic_openpcs_7:8.2</product>
<product>simatic_wincc:7.3</product>
<product>simatic_wincc:7.4</product>
</cve>
<cve id="CVE-2016-5608" level="LOW">
<product>vm_virtualbox:5.0.26</product>
<product>vm_virtualbox:5.1.6</product>
</cve>
<cve id="CVE-2016-5607" level="LOW">
<product>flexcube_universal_banking:11.3.0</product>
<product>flexcube_universal_banking:11.4.0</product>
<product>flexcube_universal_banking:12.0.1</product>
<product>flexcube_universal_banking:12.0.2</product>
<product>flexcube_universal_banking:12.0.3</product>
<product>flexcube_universal_banking:12.1.0</product>
<product>flexcube_universal_banking:12.2.0</product>
</cve>
<cve id="CVE-2016-5605" level="LOW">
<product>vm_virtualbox:5.1.2</product>
</cve>
<cve id="CVE-2016-5604" level="MEDIUM">
<product>enterprise_manager_base_platform:12.1.0.5</product>
</cve>
<cve id="CVE-2016-5603" level="LOW">
<product>flexcube_universal_banking:11.3.0</product>
<product>flexcube_universal_banking:11.4.0</product>
<product>flexcube_universal_banking:12.0.1</product>
<product>flexcube_universal_banking:12.0.2</product>
<product>flexcube_universal_banking:12.0.3</product>
<product>flexcube_universal_banking:12.1.0</product>
<product>flexcube_universal_banking:12.2.0</product>
</cve>
<cve id="CVE-2016-5602" level="MEDIUM">
<product>data_integrator:11.1.1.7.0</product>
<product>data_integrator:11.1.1.9.0</product>
<product>data_integrator:12.1.3.0.0</product>
<product>data_integrator:12.2.1.0.0</product>
<product>data_integrator:12.2.1.1.0</product>
</cve>
<cve id="CVE-2016-5600" level="LOW">
<product>your_sha256_hashnt:9.1</product>
<product>your_sha256_hashnt:9.2</product>
</cve>
<cve id="CVE-2016-9937" level="LOW">
<product>asterisk:13.12</product>
<product>asterisk:13.13</product>
<product>asterisk:14.0</product>
<product>asterisk:14.01</product>
<product>asterisk:14.1.1</product>
<product>asterisk:14.1.2</product>
<product>asterisk:14.02</product>
</cve>
<cve id="CVE-2016-2958" level="LOW">
<product>connections:4.0.0.0</product>
<product>connections:4.5.0.0</product>
<product>connections:5.0.0.0</product>
</cve>
<cve id="CVE-2016-2959" level="LOW">
<product>sametime:8.5.2.0</product>
<product>sametime:8.5.2.1</product>
<product>sametime:9.0.0.0</product>
<product>sametime:9.0.0.1</product>
<product>sametime:9.0.1</product>
</cve>
<cve id="CVE-2016-2952" level="MEDIUM">
<product>bigfix_remote_control:9.1.2</product>
</cve>
<cve id="CVE-2016-2953" level="MEDIUM">
<product>connections:4.0.0.0</product>
<product>connections:4.5.0.0</product>
<product>connections:5.0.0.0</product>
</cve>
<cve id="CVE-2016-2950" level="LOW">
<product>bigfix_remote_control:9.1.2</product>
</cve>
<cve id="CVE-2016-2951" level="MEDIUM">
<product>bigfix_remote_control:9.1.2</product>
</cve>
<cve id="CVE-2016-2956" level="MEDIUM">
<product>connections:5.0.0.0</product>
<product>connections:5.5.0.0</product>
</cve>
<cve id="CVE-2016-2957" level="LOW">
<product>connections:4.0.0.0</product>
<product>connections:4.5.0.0</product>
<product>connections:5.0.0.0</product>
</cve>
<cve id="CVE-2016-2954" level="MEDIUM">
<product>connections:5.0.0.0</product>
<product>connections:5.5.0.0</product>
</cve>
<cve id="CVE-2016-2955" level="MEDIUM">
<product>connections:5.0.0.0</product>
<product>connections:5.5.0.0</product>
</cve>
<cve id="CVE-2016-8367" level="LOW">
<product>magelis_gto_advanced_optimum_panel_firmware:-</product>
<product>magelis_gtu_universal_panel_firmware:-</product>
<product>magelis_sto5_small_panel_firmware:-</product>
<product>magelis_stu_small_panel_firmware:-</product>
<product>magelis_xbt_gh_advanced_hand-held_panel_firmware:-</product>
<product>your_sha256_hash:-</product>
<product>magelis_xbt_gt_advanced_touchscreen_panel_firmware:-</product>
<product>magelis_xbt_gtw_advanced_open_touchscreen_panel_firmware:-</product>
</cve>
<cve id="CVE-2016-5901" level="MEDIUM">
<product>business_process_manager:8.5.6.0</product>
<product>business_process_manager:8.5.6.1</product>
<product>business_process_manager:8.5.6.2</product>
<product>business_process_manager:8.5.7.0</product>
</cve>
<cve id="CVE-2016-0800" level="MEDIUM">
<product>openssl:1.0.1</product>
<product>openssl:1.0.1</product>
<product>openssl:1.0.1</product>
<product>openssl:1.0.1</product>
<product>openssl:1.0.1a</product>
<product>openssl:1.0.1b</product>
<product>openssl:1.0.1c</product>
<product>openssl:1.0.1d</product>
<product>openssl:1.0.1e</product>
<product>openssl:1.0.1f</product>
<product>openssl:1.0.1g</product>
<product>openssl:1.0.1h</product>
<product>openssl:1.0.1i</product>
<product>openssl:1.0.1j</product>
<product>openssl:1.0.1k</product>
<product>openssl:1.0.1l</product>
<product>openssl:1.0.1m</product>
<product>openssl:1.0.1n</product>
<product>openssl:1.0.1o</product>
<product>openssl:1.0.1p</product>
<product>openssl:1.0.1q</product>
<product>openssl:1.0.1r</product>
<product>openssl:1.0.2</product>
<product>openssl:1.0.2</product>
<product>openssl:1.0.2</product>
<product>openssl:1.0.2</product>
<product>openssl:1.0.2a</product>
<product>openssl:1.0.2b</product>
<product>openssl:1.0.2c</product>
<product>openssl:1.0.2d</product>
<product>openssl:1.0.2e</product>
<product>openssl:1.0.2f</product>
<product>client:-</product>
<product>steel_belted_radius:-</product>
</cve>
<cve id="CVE-2016-8362" level="LOW">
<product>awk-1121_firmware:06-29-2017</product>
<product>awk-1127_firmware:06-29-2017</product>
<product>awk-1131a_firmware:10-31-2016</product>
<product>awk-3121-m12-rtg_firmware:06-29-2017</product>
<product>awk-3131-m12-rcc_firmware:06-29-2017</product>
<product>awk-3131a_firmware:10-31-2016</product>
<product>awk-3191_firmware:05-30-2017</product>
<product>awk-4131a_firmware:10-31-2016</product>
<product>awk-5232-m12-rcc_firmware:06-29-2017</product>
<product>awk-5232_firmware:05-30-2017</product>
<product>awk-6232_firmware:05-30-2017</product>
<product>oncellg3470a-lte_firmware:10-31-2016</product>
<product>wac-1001_v2_firmware:06-29-2017</product>
<product>wac-2004_firmware:06-29-2017</product>
</cve>
<cve id="CVE-2016-5744" level="LOW">
<product>simatic_wincc:7.0</product>
<product>simatic_wincc:7.0</product>
<product>simatic_wincc:7.0</product>
<product>simatic_wincc:7.0</product>
<product>simatic_wincc:7.2</product>
</cve>
<cve id="CVE-2016-7267" level="MEDIUM">
<product>excel:2010</product>
<product>excel:2013</product>
<product>excel:2013</product>
<product>excel:2016</product>
</cve>
<cve id="CVE-2016-2271" level="LOW">
<product>xen:4.6.0</product>
<product>xen:4.6.1</product>
</cve>
<cve id="CVE-2016-2379" level="LOW">
<product>mxit:-</product>
</cve>
<cve id="CVE-2016-7263" level="MEDIUM">
<product>excel_for_mac:2011</product>
<product>excel_for_mac:2016</product>
</cve>
<cve id="CVE-2016-6963" level="LOW">
<product>acrobat:11.0.17</product>
<product>acrobat_dc:15.006.30201</product>
<product>acrobat_dc:15.017.20053</product>
<product>acrobat_reader_dc:15.006.30201</product>
<product>acrobat_reader_dc:15.017.20053</product>
<product>reader:11.0.17</product>
</cve>
<cve id="CVE-2016-2279" level="MEDIUM">
<product>compactlogix_controller_1769_firmware:20.018</product>
<product>compactlogix_controller_1769_firmware:27.011</product>
</cve>
<cve id="CVE-2016-6962" level="LOW">
<product>acrobat:11.0.17</product>
<product>acrobat_dc:15.006.30201</product>
<product>acrobat_dc:15.017.20053</product>
<product>acrobat_reader_dc:15.006.30201</product>
<product>acrobat_reader_dc:15.017.20053</product>
<product>reader:11.0.17</product>
</cve>
<cve id="CVE-2016-2278" level="LOW">
<product>struxureware_building_operations_automation_server_as_firmware:1.7</product>
<product>your_sha256_hash:1.7</product>
</cve>
<cve id="CVE-2016-8824" level="LOW">
<product>gpu_driver:-</product>
</cve>
<cve id="CVE-2016-8825" level="LOW">
<product>gpu_driver:-</product>
</cve>
<cve id="CVE-2016-8826" level="LOW">
<product>gpu_driver:-</product>
</cve>
<cve id="CVE-2016-8827" level="LOW">
<product>geforce_experience:3.1.0</product>
</cve>
<cve id="CVE-2016-8820" level="LOW">
<product>gpu_driver:-</product>
</cve>
<cve id="CVE-2016-8821" level="LOW">
<product>gpu_driver:-</product>
</cve>
<cve id="CVE-2016-8822" level="LOW">
<product>gpu_driver:-</product>
</cve>
<cve id="CVE-2016-8823" level="LOW">
<product>gpu_driver:-</product>
</cve>
<cve id="CVE-2016-4460" level="LOW">
<product>pony_mail:0.6c</product>
<product>pony_mail:0.7b</product>
<product>pony_mail:0.8b</product>
</cve>
<cve id="CVE-2016-6079" level="LOW">
<product>aix:5.3</product>
<product>aix:6.1</product>
<product>aix:7.1</product>
<product>aix:7.2</product>
<product>vios:2.2.0.0</product>
<product>vios:2.2.0.10</product>
<product>vios:2.2.0.11</product>
<product>vios:2.2.0.12</product>
<product>vios:2.2.0.13</product>
<product>vios:2.2.1.0</product>
<product>vios:2.2.1.1</product>
<product>vios:2.2.1.3</product>
<product>vios:2.2.1.4</product>
<product>vios:2.2.1.5</product>
<product>vios:2.2.1.6</product>
<product>vios:2.2.1.7</product>
<product>vios:2.2.1.8</product>
<product>vios:2.2.2.0</product>
<product>vios:2.2.2.1</product>
<product>vios:2.2.2.2</product>
<product>vios:2.2.2.3</product>
<product>vios:2.2.2.4</product>
<product>vios:2.2.2.6</product>
<product>vios:2.2.2.70</product>
<product>vios:2.2.3.0</product>
<product>vios:2.2.3.1</product>
<product>vios:2.2.3.2</product>
<product>vios:2.2.3.3</product>
<product>vios:2.2.3.4</product>
<product>vios:2.2.3.50</product>
<product>vios:2.2.3.51</product>
<product>vios:2.2.3.52</product>
<product>vios:2.2.3.60</product>
<product>vios:2.2.3.70</product>
<product>vios:2.2.3.80</product>
<product>vios:2.2.4.0</product>
<product>vios:2.2.4.10</product>
<product>vios:2.2.4.21</product>
<product>vios:2.2.4.22</product>
<product>vios:2.2.4.23</product>
<product>vios:2.2.4.30</product>
<product>vios:2.2.5.0</product>
<product>vios:2.2.5.10</product>
</cve>
<cve id="CVE-2016-4461" level="LOW">
<product>struts:2.0.0</product>
<product>struts:2.0.1</product>
<product>struts:2.0.2</product>
<product>struts:2.0.3</product>
<product>struts:2.0.4</product>
<product>struts:2.0.5</product>
<product>struts:2.0.6</product>
<product>struts:2.0.7</product>
<product>struts:2.0.8</product>
<product>struts:2.0.9</product>
<product>struts:2.0.10</product>
<product>struts:2.0.11</product>
<product>struts:2.0.11.1</product>
<product>struts:2.0.11.2</product>
<product>struts:2.0.12</product>
<product>struts:2.0.13</product>
<product>struts:2.0.14</product>
<product>struts:2.1.0</product>
<product>struts:2.1.1</product>
<product>struts:2.1.2</product>
<product>struts:2.1.3</product>
<product>struts:2.1.4</product>
<product>struts:2.1.5</product>
<product>struts:2.1.6</product>
<product>struts:2.1.8</product>
<product>struts:2.1.8.1</product>
<product>struts:2.2.1</product>
<product>struts:2.2.1.1</product>
<product>struts:2.2.3</product>
<product>struts:2.2.3.1</product>
<product>struts:2.3.1</product>
<product>struts:2.3.1.1</product>
<product>struts:2.3.1.2</product>
<product>struts:2.3.3</product>
<product>struts:2.3.4</product>
<product>struts:2.3.4.1</product>
<product>struts:2.3.5</product>
<product>struts:2.3.6</product>
<product>struts:2.3.7</product>
<product>struts:2.3.8</product>
<product>struts:2.3.9</product>
<product>struts:2.3.10</product>
<product>struts:2.3.11</product>
<product>struts:2.3.12</product>
<product>struts:2.3.13</product>
<product>struts:2.3.14</product>
<product>struts:2.3.14.1</product>
<product>struts:2.3.14.2</product>
<product>struts:2.3.14.3</product>
<product>struts:2.3.15</product>
<product>struts:2.3.15.1</product>
<product>struts:2.3.15.2</product>
<product>struts:2.3.15.3</product>
<product>struts:2.3.16</product>
<product>struts:2.3.16.1</product>
<product>struts:2.3.16.2</product>
<product>struts:2.3.16.3</product>
<product>struts:2.3.17</product>
<product>struts:2.3.19</product>
<product>struts:2.3.20</product>
<product>struts:2.3.20.1</product>
<product>struts:2.3.20.2</product>
<product>struts:2.3.21</product>
<product>struts:2.3.22</product>
<product>struts:2.3.23</product>
<product>struts:2.3.24.2</product>
<product>struts:2.3.24.3</product>
<product>struts:2.3.25</product>
<product>struts:2.3.26</product>
<product>struts:2.3.27</product>
<product>struts:2.3.28</product>
<product>struts:2.3.28.1</product>
</cve>
<cve id="CVE-2016-6077" level="MEDIUM">
<product>cognos_disclosure_management:10.2.0</product>
<product>cognos_disclosure_management:10.2.1</product>
<product>cognos_disclosure_management:10.2.2</product>
<product>cognos_disclosure_management:10.2.3</product>
<product>cognos_disclosure_management:10.2.4</product>
<product>cognos_disclosure_management:10.2.5</product>
<product>cognos_disclosure_management:10.2.6</product>
</cve>
<cve id="CVE-2016-4462" level="LOW">
<product>ofbiz:11.04</product>
<product>ofbiz:11.04.01</product>
<product>ofbiz:11.04.02</product>
<product>ofbiz:11.04.03</product>
<product>ofbiz:11.04.04</product>
<product>ofbiz:11.04.05</product>
<product>ofbiz:11.04.06</product>
<product>ofbiz:12.04</product>
<product>ofbiz:12.04.01</product>
<product>ofbiz:12.04.02</product>
<product>ofbiz:12.04.03</product>
<product>ofbiz:12.04.04</product>
<product>ofbiz:12.04.05</product>
<product>ofbiz:12.04.06</product>
<product>ofbiz:13.07</product>
<product>ofbiz:13.07.01</product>
<product>ofbiz:13.07.02</product>
<product>ofbiz:13.07.03</product>
</cve>
<cve id="CVE-2016-6072" level="MEDIUM">
<product>maximo_asset_management:7.6.0.0</product>
<product>maximo_for_aviation:-</product>
<product>maximo_for_life_sciences:-</product>
<product>maximo_for_nuclear_power:-</product>
<product>maximo_for_oil_and_gas:-</product>
<product>maximo_for_transportation:-</product>
<product>maximo_for_utilities:-</product>
<product>smartcloud_control_desk:-</product>
<product>tivoli_asset_management_for_it:-</product>
<product>tivoli_change_and_configuration_management_database:-</product>
<product>tivoli_integration_composer:-</product>
<product>tivoli_service_request_manager:-</product>
</cve>
<cve id="CVE-2016-8929" level="LOW">
<product>kenexa_lms:4.1</product>
<product>kenexa_lms:4.2</product>
<product>kenexa_lms:4.2.2</product>
<product>kenexa_lms:4.2.3</product>
<product>kenexa_lms:4.2.4</product>
<product>kenexa_lms:5.0</product>
<product>kenexa_lms:5.1</product>
<product>kenexa_lms:5.2</product>
</cve>
<cve id="CVE-2016-8928" level="LOW">
<product>kenexa_lms:4.1</product>
<product>kenexa_lms:4.2</product>
<product>kenexa_lms:4.2.2</product>
<product>kenexa_lms:4.2.3</product>
<product>kenexa_lms:4.2.4</product>
<product>kenexa_lms:5.0</product>
<product>kenexa_lms:5.1</product>
<product>kenexa_lms:5.2</product>
</cve>
<cve id="CVE-2016-8921" level="LOW">
<product>filenet_workplace_xt:1.1.5</product>
</cve>
<cve id="CVE-2016-4464" level="LOW">
<product>cxf_fediz:1.2.0</product>
<product>cxf_fediz:1.2.1</product>
<product>cxf_fediz:1.2.2</product>
<product>cxf_fediz:1.3.0</product>
</cve>
<cve id="CVE-2016-8923" level="LOW">
<product>curam_social_program_management:5.2</product>
<product>curam_social_program_management:5.2</product>
<product>curam_social_program_management:5.2</product>
<product>curam_social_program_management:6.0</product>
<product>curam_social_program_management:6.0</product>
<product>curam_social_program_management:6.0.0</product>
<product>curam_social_program_management:6.0.4.0</product>
<product>curam_social_program_management:6.0.4.1</product>
<product>curam_social_program_management:6.0.4.2</product>
<product>curam_social_program_management:6.0.4.3</product>
<product>curam_social_program_management:6.0.4.4</product>
<product>curam_social_program_management:6.0.4.5</product>
<product>curam_social_program_management:6.0.4.6</product>
<product>curam_social_program_management:6.0.4.7</product>
<product>curam_social_program_management:6.0.4.8</product>
<product>curam_social_program_management:6.0.5</product>
<product>curam_social_program_management:6.0.5.0</product>
<product>curam_social_program_management:6.0.5.1</product>
<product>curam_social_program_management:6.0.5.2</product>
<product>curam_social_program_management:6.0.5.3</product>
<product>curam_social_program_management:6.0.5.4</product>
<product>curam_social_program_management:6.0.5.5</product>
<product>curam_social_program_management:6.0.5.6</product>
<product>curam_social_program_management:6.0.5.7</product>
<product>curam_social_program_management:6.0.5.8</product>
<product>curam_social_program_management:6.0.5.9</product>
<product>curam_social_program_management:6.1.0.0</product>
<product>curam_social_program_management:6.1.0.1</product>
<product>curam_social_program_management:6.1.0.2</product>
<product>curam_social_program_management:6.1.0.3</product>
<product>curam_social_program_management:6.1.1.0</product>
<product>curam_social_program_management:6.1.1.1</product>
<product>curam_social_program_management:6.1.1.2</product>
<product>curam_social_program_management:6.1.1.3</product>
<product>curam_social_program_management:6.2.0.0</product>
<product>curam_social_program_management:6.2.0.1</product>
<product>curam_social_program_management:6.2.0.2</product>
<product>curam_social_program_management:6.2.0.3</product>
<product>curam_social_program_management:7.0.0.0</product>
</cve>
<cve id="CVE-2016-8922" level="MEDIUM">
<product>web_content_manager_production_analytics:4.0</product>
<product>websphere_portal:8.0</product>
<product>websphere_portal:8.5</product>
</cve>
<cve id="CVE-2016-8925" level="LOW">
<product>tivoli_application_dependency_discovery_manager:7.2.2</product>
<product>tivoli_application_dependency_discovery_manager:7.2.2.0</product>
<product>tivoli_application_dependency_discovery_manager:7.2.2.1</product>
<product>tivoli_application_dependency_discovery_manager:7.2.2.2</product>
<product>tivoli_application_dependency_discovery_manager:7.2.2.3</product>
<product>tivoli_application_dependency_discovery_manager:7.2.2.4</product>
<product>tivoli_application_dependency_discovery_manager:7.2.2.5</product>
<product>tivoli_application_dependency_discovery_manager:7.3.0</product>
<product>tivoli_application_dependency_discovery_manager:7.3.0.0</product>
<product>tivoli_application_dependency_discovery_manager:7.3.0.1</product>
<product>tivoli_application_dependency_discovery_manager:7.3.0.2</product>
<product>tivoli_application_dependency_discovery_manager:7.3.0.3</product>
</cve>
<cve id="CVE-2016-8924" level="MEDIUM">
<product>maximo_asset_management:7.1</product>
<product>maximo_asset_management:7.5</product>
<product>maximo_asset_management:7.6</product>
</cve>
<cve id="CVE-2016-8927" level="MEDIUM">
<product>tivoli_application_dependency_discovery_manager:7.2.2</product>
<product>tivoli_application_dependency_discovery_manager:7.2.2.0</product>
<product>tivoli_application_dependency_discovery_manager:7.2.2.1</product>
<product>tivoli_application_dependency_discovery_manager:7.2.2.2</product>
<product>tivoli_application_dependency_discovery_manager:7.2.2.3</product>
<product>tivoli_application_dependency_discovery_manager:7.2.2.4</product>
<product>tivoli_application_dependency_discovery_manager:7.2.2.5</product>
<product>tivoli_application_dependency_discovery_manager:7.3.0</product>
<product>tivoli_application_dependency_discovery_manager:7.3.0.0</product>
<product>tivoli_application_dependency_discovery_manager:7.3.0.1</product>
<product>tivoli_application_dependency_discovery_manager:7.3.0.2</product>
<product>tivoli_application_dependency_discovery_manager:7.3.0.3</product>
</cve>
<cve id="CVE-2016-4465" level="LOW">
<product>struts:2.3.20</product>
<product>struts:2.3.20.1</product>
<product>struts:2.3.20.3</product>
<product>struts:2.3.24</product>
<product>struts:2.3.24.1</product>
<product>struts:2.3.24.3</product>
<product>struts:2.3.28</product>
<product>struts:2.3.28.1</product>
<product>struts:2.5</product>
<product>struts:2.5</product>
<product>struts:2.5</product>
<product>struts:2.5</product>
</cve>
<cve id="CVE-2016-1867" level="MEDIUM">
<product>jasper:1.900.1</product>
</cve>
<cve id="CVE-2016-1866" level="MEDIUM">
<product>salt:2015.8.0</product>
<product>salt:2015.8.1</product>
<product>salt:2015.8.2</product>
<product>salt:2015.8.3</product>
<product>leap:42.1</product>
</cve>
<cve id="CVE-2016-7476" level="LOW">
<product>big-ip_access_policy_manager:11.3.0</product>
<product>big-ip_access_policy_manager:11.4.0</product>
<product>big-ip_access_policy_manager:11.4.1</product>
<product>big-ip_access_policy_manager:11.5.0</product>
<product>big-ip_access_policy_manager:11.5.1</product>
<product>big-ip_access_policy_manager:11.5.2</product>
<product>big-ip_access_policy_manager:11.5.3</product>
<product>big-ip_access_policy_manager:11.6.0</product>
<product>big-ip_advanced_firewall_manager:11.3.0</product>
<product>big-ip_advanced_firewall_manager:11.4.0</product>
<product>big-ip_advanced_firewall_manager:11.4.1</product>
<product>big-ip_advanced_firewall_manager:11.5.0</product>
<product>big-ip_advanced_firewall_manager:11.5.1</product>
<product>big-ip_advanced_firewall_manager:11.5.2</product>
<product>big-ip_advanced_firewall_manager:11.5.3</product>
<product>big-ip_advanced_firewall_manager:11.6.0</product>
<product>big-ip_application_acceleration_manager:11.3.0</product>
<product>big-ip_application_acceleration_manager:11.4.0</product>
<product>big-ip_application_acceleration_manager:11.4.1</product>
<product>big-ip_application_acceleration_manager:11.5.0</product>
<product>big-ip_application_acceleration_manager:11.5.1</product>
<product>big-ip_application_acceleration_manager:11.5.2</product>
<product>big-ip_application_acceleration_manager:11.5.3</product>
<product>big-ip_application_acceleration_manager:11.6.0</product>
<product>big-ip_application_security_manager:11.3.0</product>
<product>big-ip_application_security_manager:11.4.0</product>
<product>big-ip_application_security_manager:11.4.1</product>
<product>big-ip_application_security_manager:11.5.0</product>
<product>big-ip_application_security_manager:11.5.1</product>
<product>big-ip_application_security_manager:11.5.2</product>
<product>big-ip_application_security_manager:11.5.3</product>
<product>big-ip_application_security_manager:11.6.0</product>
<product>big-ip_global_traffic_manager:11.3.0</product>
<product>big-ip_global_traffic_manager:11.4.0</product>
<product>big-ip_global_traffic_manager:11.4.1</product>
<product>big-ip_global_traffic_manager:11.5.0</product>
<product>big-ip_global_traffic_manager:11.5.1</product>
<product>big-ip_global_traffic_manager:11.5.2</product>
<product>big-ip_global_traffic_manager:11.5.3</product>
<product>big-ip_global_traffic_manager:11.6.0</product>
<product>big-ip_link_controller:11.3.0</product>
<product>big-ip_link_controller:11.4.0</product>
<product>big-ip_link_controller:11.4.1</product>
<product>big-ip_link_controller:11.5.0</product>
<product>big-ip_link_controller:11.5.1</product>
<product>big-ip_link_controller:11.5.2</product>
<product>big-ip_link_controller:11.5.3</product>
<product>big-ip_link_controller:11.6.0</product>
<product>big-ip_local_traffic_manager:11.3.0</product>
<product>big-ip_local_traffic_manager:11.4.0</product>
<product>big-ip_local_traffic_manager:11.4.1</product>
<product>big-ip_local_traffic_manager:11.5.0</product>
<product>big-ip_local_traffic_manager:11.5.1</product>
<product>big-ip_local_traffic_manager:11.5.2</product>
<product>big-ip_local_traffic_manager:11.5.3</product>
<product>big-ip_local_traffic_manager:11.6.0</product>
<product>big-ip_policy_enforcement_manager:11.3.0</product>
<product>big-ip_policy_enforcement_manager:11.4.0</product>
<product>big-ip_policy_enforcement_manager:11.4.1</product>
<product>big-ip_policy_enforcement_manager:11.5.0</product>
<product>big-ip_policy_enforcement_manager:11.5.1</product>
<product>big-ip_policy_enforcement_manager:11.5.2</product>
<product>big-ip_policy_enforcement_manager:11.5.3</product>
<product>big-ip_policy_enforcement_manager:11.6.0</product>
<product>big-ip_websafe:11.6.0</product>
<product>big-ip_protocol_security_manager:11.3.0</product>
<product>big-ip_protocol_security_manager:11.4.0</product>
<product>big-ip_protocol_security_manager:11.4.1</product>
</cve>
<cve id="CVE-2016-7477" level="MEDIUM">
<product>libav:11.7</product>
</cve>
<cve id="CVE-2016-7474" level="LOW">
<product>big-ip_access_policy_manager:11.2.1</product>
<product>big-ip_access_policy_manager:11.4.0</product>
<product>big-ip_access_policy_manager:11.4.1</product>
<product>big-ip_access_policy_manager:11.5.0</product>
<product>big-ip_access_policy_manager:11.5.1</product>
<product>big-ip_access_policy_manager:11.5.2</product>
<product>big-ip_access_policy_manager:11.5.3</product>
<product>big-ip_access_policy_manager:11.5.4</product>
<product>big-ip_access_policy_manager:11.6.0</product>
<product>big-ip_access_policy_manager:11.6.1</product>
<product>big-ip_access_policy_manager:12.0.0</product>
<product>big-ip_access_policy_manager:12.1.0</product>
<product>big-ip_access_policy_manager:12.1.1</product>
<product>big-ip_advanced_firewall_manager:11.4.0</product>
<product>big-ip_advanced_firewall_manager:11.4.1</product>
<product>big-ip_advanced_firewall_manager:11.5.0</product>
<product>big-ip_advanced_firewall_manager:11.5.1</product>
<product>big-ip_advanced_firewall_manager:11.5.2</product>
<product>big-ip_advanced_firewall_manager:11.5.3</product>
<product>big-ip_advanced_firewall_manager:11.5.4</product>
<product>big-ip_advanced_firewall_manager:11.6.0</product>
<product>big-ip_advanced_firewall_manager:11.6.1</product>
<product>big-ip_advanced_firewall_manager:12.0.0</product>
<product>big-ip_advanced_firewall_manager:12.1.0</product>
<product>big-ip_advanced_firewall_manager:12.1.1</product>
<product>big-ip_analytics:11.2.1</product>
<product>big-ip_analytics:11.4.0</product>
<product>big-ip_analytics:11.4.1</product>
<product>big-ip_analytics:11.5.0</product>
<product>big-ip_analytics:11.5.1</product>
<product>big-ip_analytics:11.5.2</product>
<product>big-ip_analytics:11.5.3</product>
<product>big-ip_analytics:11.5.4</product>
<product>big-ip_analytics:11.6.0</product>
<product>big-ip_analytics:11.6.1</product>
<product>big-ip_analytics:12.0.0</product>
<product>big-ip_analytics:12.1.0</product>
<product>big-ip_analytics:12.1.1</product>
<product>big-ip_application_acceleration_manager:11.4.0</product>
<product>big-ip_application_acceleration_manager:11.4.1</product>
<product>big-ip_application_acceleration_manager:11.5.0</product>
<product>big-ip_application_acceleration_manager:11.5.1</product>
<product>big-ip_application_acceleration_manager:11.5.2</product>
<product>big-ip_application_acceleration_manager:11.5.3</product>
<product>big-ip_application_acceleration_manager:11.5.4</product>
<product>big-ip_application_acceleration_manager:11.6.0</product>
<product>big-ip_application_acceleration_manager:11.6.1</product>
<product>big-ip_application_acceleration_manager:12.0.0</product>
<product>big-ip_application_acceleration_manager:12.1.0</product>
<product>big-ip_application_acceleration_manager:12.1.1</product>
<product>big-ip_application_security_manager:11.2.1</product>
<product>big-ip_application_security_manager:11.4.0</product>
<product>big-ip_application_security_manager:11.4.1</product>
<product>big-ip_application_security_manager:11.5.0</product>
<product>big-ip_application_security_manager:11.5.1</product>
<product>big-ip_application_security_manager:11.5.2</product>
<product>big-ip_application_security_manager:11.5.3</product>
<product>big-ip_application_security_manager:11.5.4</product>
<product>big-ip_application_security_manager:11.6.0</product>
<product>big-ip_application_security_manager:11.6.1</product>
<product>big-ip_application_security_manager:12.0.0</product>
<product>big-ip_application_security_manager:12.1.0</product>
<product>big-ip_application_security_manager:12.1.1</product>
<product>big-ip_domain_name_system:12.0.0</product>
<product>big-ip_domain_name_system:12.1.0</product>
<product>big-ip_domain_name_system:12.1.1</product>
<product>big-ip_edge_gateway:11.2.1</product>
<product>big-ip_global_traffic_manager:11.2.1</product>
<product>big-ip_global_traffic_manager:11.4.0</product>
<product>big-ip_global_traffic_manager:11.4.1</product>
<product>big-ip_global_traffic_manager:11.5.0</product>
<product>big-ip_global_traffic_manager:11.5.1</product>
<product>big-ip_global_traffic_manager:11.5.2</product>
<product>big-ip_global_traffic_manager:11.5.3</product>
<product>big-ip_global_traffic_manager:11.5.4</product>
<product>big-ip_global_traffic_manager:11.6.0</product>
<product>big-ip_global_traffic_manager:11.6.1</product>
<product>big-ip_link_controller:11.2.1</product>
<product>big-ip_link_controller:11.4.0</product>
<product>big-ip_link_controller:11.4.1</product>
<product>big-ip_link_controller:11.5.0</product>
<product>big-ip_link_controller:11.5.1</product>
<product>big-ip_link_controller:11.5.2</product>
<product>big-ip_link_controller:11.5.3</product>
<product>big-ip_link_controller:11.5.4</product>
<product>big-ip_link_controller:11.6.0</product>
<product>big-ip_link_controller:11.6.1</product>
<product>big-ip_link_controller:12.0.0</product>
<product>big-ip_link_controller:12.1.0</product>
<product>big-ip_link_controller:12.1.1</product>
<product>big-ip_local_traffic_manager:11.2.1</product>
<product>big-ip_local_traffic_manager:11.4.0</product>
<product>big-ip_local_traffic_manager:11.4.1</product>
<product>big-ip_local_traffic_manager:11.5.0</product>
<product>big-ip_local_traffic_manager:11.5.1</product>
<product>big-ip_local_traffic_manager:11.5.2</product>
<product>big-ip_local_traffic_manager:11.5.3</product>
<product>big-ip_local_traffic_manager:11.5.4</product>
<product>big-ip_local_traffic_manager:11.6.0</product>
<product>big-ip_local_traffic_manager:11.6.1</product>
<product>big-ip_local_traffic_manager:12.0.0</product>
<product>big-ip_local_traffic_manager:12.1.0</product>
<product>big-ip_local_traffic_manager:12.1.1</product>
<product>big-ip_policy_enforcement_manager:11.4.0</product>
<product>big-ip_policy_enforcement_manager:11.4.1</product>
<product>big-ip_policy_enforcement_manager:11.5.0</product>
<product>big-ip_policy_enforcement_manager:11.5.1</product>
<product>big-ip_policy_enforcement_manager:11.5.2</product>
<product>big-ip_policy_enforcement_manager:11.5.3</product>
<product>big-ip_policy_enforcement_manager:11.5.4</product>
<product>big-ip_policy_enforcement_manager:11.6.0</product>
<product>big-ip_policy_enforcement_manager:11.6.1</product>
<product>big-ip_policy_enforcement_manager:12.0.0</product>
<product>big-ip_policy_enforcement_manager:12.1.0</product>
<product>big-ip_policy_enforcement_manager:12.1.1</product>
<product>big-ip_webaccelerator:11.2.1</product>
<product>big-ip_websafe:11.6.0</product>
<product>big-ip_websafe:11.6.1</product>
<product>big-ip_websafe:12.0.0</product>
<product>big-ip_websafe:12.1.0</product>
<product>big-ip_websafe:12.1.1</product>
<product>big-ip_protocol_security_manager:11.4.0</product>
<product>big-ip_protocol_security_manager:11.4.1</product>
</cve>
<cve id="CVE-2016-4468" level="LOW">
<product>cloud_foundry:237.0</product>
<product>cloud_foundry_elastic_runtime:1.6.0</product>
<product>cloud_foundry_elastic_runtime:1.6.1</product>
<product>cloud_foundry_elastic_runtime:1.6.2</product>
<product>cloud_foundry_elastic_runtime:1.6.3</product>
<product>cloud_foundry_elastic_runtime:1.6.4</product>
<product>cloud_foundry_elastic_runtime:1.6.5</product>
<product>cloud_foundry_elastic_runtime:1.6.6</product>
<product>cloud_foundry_elastic_runtime:1.6.7</product>
<product>cloud_foundry_elastic_runtime:1.6.8</product>
<product>cloud_foundry_elastic_runtime:1.6.9</product>
<product>cloud_foundry_elastic_runtime:1.6.10</product>
<product>cloud_foundry_elastic_runtime:1.6.11</product>
<product>cloud_foundry_elastic_runtime:1.6.12</product>
<product>cloud_foundry_elastic_runtime:1.6.13</product>
<product>cloud_foundry_elastic_runtime:1.6.14</product>
<product>cloud_foundry_elastic_runtime:1.6.15</product>
<product>cloud_foundry_elastic_runtime:1.6.17</product>
<product>cloud_foundry_elastic_runtime:1.6.18</product>
<product>cloud_foundry_elastic_runtime:1.6.19</product>
<product>cloud_foundry_elastic_runtime:1.6.20</product>
<product>cloud_foundry_elastic_runtime:1.6.21</product>
<product>cloud_foundry_elastic_runtime:1.6.22</product>
<product>cloud_foundry_elastic_runtime:1.6.23</product>
<product>cloud_foundry_elastic_runtime:1.6.25</product>
<product>cloud_foundry_elastic_runtime:1.6.26</product>
<product>cloud_foundry_elastic_runtime:1.6.27</product>
<product>cloud_foundry_elastic_runtime:1.6.28</product>
<product>cloud_foundry_elastic_runtime:1.7.0</product>
<product>cloud_foundry_elastic_runtime:1.7.1</product>
<product>cloud_foundry_elastic_runtime:1.7.2</product>
<product>cloud_foundry_elastic_runtime:1.7.3</product>
<product>cloud_foundry_elastic_runtime:1.7.4</product>
<product>cloud_foundry_elastic_runtime:1.7.5</product>
<product>cloud_foundry_elastic_runtime:1.7.6</product>
<product>cloud_foundry_elastic_runtime:1.7.7</product>
<product>cloud_foundry_elastic_runtime:1.8.0</product>
<product>cloud_foundry_ops_manager:1.7.0</product>
<product>cloud_foundry_ops_manager:1.7.1</product>
<product>cloud_foundry_ops_manager:1.7.2</product>
<product>cloud_foundry_ops_manager:1.7.3</product>
<product>cloud_foundry_ops_manager:1.7.4</product>
<product>cloud_foundry_ops_manager:1.7.5</product>
<product>cloud_foundry_ops_manager:1.7.6</product>
<product>cloud_foundry_ops_manager:1.7.7</product>
<product>cloud_foundry_ops_manager:1.7.8</product>
<product>cloud_foundry_uaa:3.4.0</product>
<product>cloud_foundry_uaa_bosh:12.0</product>
</cve>
<cve id="CVE-2016-7114" level="LOW">
<product>en100_ethernet_module_firmware:4.28</product>
</cve>
<cve id="CVE-2016-3595" level="LOW">
<product>outside_in_technology:8.5.0</product>
<product>outside_in_technology:8.5.1</product>
<product>outside_in_technology:8.5.2</product>
</cve>
<cve id="CVE-2016-3594" level="LOW">
<product>outside_in_technology:8.5.0</product>
<product>outside_in_technology:8.5.1</product>
<product>outside_in_technology:8.5.2</product>
</cve>
<cve id="CVE-2016-3597" level="LOW">
<product>vm_virtualbox:5.0.24</product>
</cve>
<cve id="CVE-2016-3596" level="LOW">
<product>outside_in_technology:8.5.0</product>
<product>outside_in_technology:8.5.1</product>
<product>outside_in_technology:8.5.2</product>
</cve>
<cve id="CVE-2016-3591" level="LOW">
<product>outside_in_technology:8.5.0</product>
<product>outside_in_technology:8.5.1</product>
<product>outside_in_technology:8.5.2</product>
</cve>
<cve id="CVE-2016-3590" level="LOW">
<product>outside_in_technology:8.5.0</product>
<product>outside_in_technology:8.5.1</product>
<product>outside_in_technology:8.5.2</product>
</cve>
<cve id="CVE-2016-3593" level="LOW">
<product>outside_in_technology:8.5.0</product>
<product>outside_in_technology:8.5.1</product>
<product>outside_in_technology:8.5.2</product>
</cve>
<cve id="CVE-2016-3592" level="LOW">
<product>outside_in_technology:8.5.0</product>
<product>outside_in_technology:8.5.1</product>
<product>outside_in_technology:8.5.2</product>
</cve>
<cve id="CVE-2016-9848" level="LOW">
<product>phpmyadmin:4.0.0</product>
<product>phpmyadmin:4.0.1</product>
<product>phpmyadmin:4.0.2</product>
<product>phpmyadmin:4.0.3</product>
<product>phpmyadmin:4.0.4</product>
<product>phpmyadmin:4.0.4.1</product>
<product>phpmyadmin:4.0.4.2</product>
<product>phpmyadmin:4.0.5</product>
<product>phpmyadmin:4.0.6</product>
<product>phpmyadmin:4.0.7</product>
<product>phpmyadmin:4.0.8</product>
<product>phpmyadmin:4.0.9</product>
<product>phpmyadmin:4.0.10</product>
<product>phpmyadmin:4.0.10.1</product>
<product>phpmyadmin:4.0.10.2</product>
<product>phpmyadmin:4.0.10.3</product>
<product>phpmyadmin:4.0.10.4</product>
<product>phpmyadmin:4.0.10.5</product>
<product>phpmyadmin:4.0.10.6</product>
<product>phpmyadmin:4.0.10.7</product>
<product>phpmyadmin:4.0.10.8</product>
<product>phpmyadmin:4.0.10.9</product>
<product>phpmyadmin:4.0.10.10</product>
<product>phpmyadmin:4.0.10.11</product>
<product>phpmyadmin:4.0.10.12</product>
<product>phpmyadmin:4.0.10.13</product>
<product>phpmyadmin:4.0.10.14</product>
<product>phpmyadmin:4.0.10.15</product>
<product>phpmyadmin:4.0.10.16</product>
<product>phpmyadmin:4.0.10.17</product>
<product>phpmyadmin:4.4.0</product>
<product>phpmyadmin:4.4.1</product>
<product>phpmyadmin:4.4.1.1</product>
<product>phpmyadmin:4.4.2</product>
<product>phpmyadmin:4.4.3</product>
<product>phpmyadmin:4.4.4</product>
<product>phpmyadmin:4.4.5</product>
<product>phpmyadmin:4.4.6</product>
<product>phpmyadmin:4.4.6.1</product>
<product>phpmyadmin:4.4.7</product>
<product>phpmyadmin:4.4.8</product>
<product>phpmyadmin:4.4.9</product>
<product>phpmyadmin:4.4.10</product>
<product>phpmyadmin:4.4.11</product>
<product>phpmyadmin:4.4.12</product>
<product>phpmyadmin:4.4.13</product>
<product>phpmyadmin:4.4.13.1</product>
<product>phpmyadmin:4.4.14</product>
<product>phpmyadmin:4.4.14.1</product>
<product>phpmyadmin:4.4.15</product>
<product>phpmyadmin:4.4.15.1</product>
<product>phpmyadmin:4.4.15.2</product>
<product>phpmyadmin:4.4.15.3</product>
<product>phpmyadmin:4.4.15.4</product>
<product>phpmyadmin:4.4.15.5</product>
<product>phpmyadmin:4.4.15.6</product>
<product>phpmyadmin:4.4.15.7</product>
<product>phpmyadmin:4.4.15.8</product>
<product>phpmyadmin:4.6.0</product>
<product>phpmyadmin:4.6.1</product>
<product>phpmyadmin:4.6.2</product>
<product>phpmyadmin:4.6.3</product>
<product>phpmyadmin:4.6.4</product>
</cve>
<cve id="CVE-2016-6523" level="MEDIUM">
<product>dotclear:2.9.1</product>
</cve>
<cve id="CVE-2016-6030" level="MEDIUM">
<product>rational_collaborative_lifecycle_management:4.0.0</product>
<product>rational_collaborative_lifecycle_management:4.0.1</product>
<product>rational_collaborative_lifecycle_management:4.0.2</product>
<product>rational_collaborative_lifecycle_management:4.0.3</product>
<product>rational_collaborative_lifecycle_management:4.0.4</product>
<product>rational_collaborative_lifecycle_management:4.0.5</product>
<product>rational_collaborative_lifecycle_management:4.0.6</product>
<product>rational_collaborative_lifecycle_management:4.0.7</product>
<product>rational_collaborative_lifecycle_management:5.0.0</product>
<product>rational_collaborative_lifecycle_management:5.0.1</product>
<product>rational_collaborative_lifecycle_management:5.0.2</product>
<product>rational_collaborative_lifecycle_management:6.0.0</product>
<product>rational_collaborative_lifecycle_management:6.0.1</product>
<product>rational_collaborative_lifecycle_management:6.0.2</product>
</cve>
<cve id="CVE-2016-3001" level="MEDIUM">
<product>connections:4.0.0.0</product>
<product>connections:4.5.0.0</product>
<product>connections:5.0.0.0</product>
<product>connections:5.5.0.0</product>
</cve>
<cve id="CVE-2016-3000" level="LOW">
<product>connections:4.0.0.0</product>
<product>connections:4.5.0.0</product>
<product>connections:5.0.0.0</product>
<product>connections:5.5.0.0</product>
</cve>
<cve id="CVE-2016-7296" level="HIGH">
<product>edge:-</product>
</cve>
<cve id="CVE-2016-7297" level="HIGH">
<product>edge:-</product>
</cve>
<cve id="CVE-2016-3006" level="MEDIUM">
<product>connections:4.0.0.0</product>
<product>connections:4.5.0.0</product>
<product>connections:5.0.0.0</product>
<product>connections:5.5.0.0</product>
</cve>
<cve id="CVE-2016-9842" level="MEDIUM">
<product>zlib:1.2.8</product>
<product>leap:42.1</product>
<product>leap:42.2</product>
<product>opensuse:13.2</product>
</cve>
<cve id="CVE-2016-3005" level="MEDIUM">
<product>connections:4.0.0.0</product>
<product>connections:4.5.0.0</product>
<product>connections:5.0.0.0</product>
<product>connections:5.5.0.0</product>
</cve>
<cve id="CVE-2016-3004" level="MEDIUM">
<product>connections:4.0.0.0</product>
<product>connections:4.5.0.0</product>
<product>connections:5.0.0.0</product>
</cve>
<cve id="CVE-2016-9844" level="LOW">
<product>unzip:6.0</product>
</cve>
<cve id="CVE-2016-4925" level="LOW">
<product>junose:10.3.3</product>
<product>junose:12.3.3</product>
<product>junose:13.3.3</product>
<product>junose:14.3.1</product>
</cve>
<cve id="CVE-2016-4924" level="LOW">
<product>junos:14.1</product>
<product>junos:14.1</product>
<product>junos:14.1</product>
<product>junos:14.1</product>
<product>junos:14.1</product>
<product>junos:14.1</product>
<product>junos:14.1</product>
<product>junos:14.1</product>
<product>junos:15.1</product>
<product>junos:15.1</product>
<product>junos:15.1</product>
<product>junos:15.1</product>
<product>junos:15.1</product>
<product>junos:15.1</product>
<product>junos:15.1</product>
<product>junos:15.1</product>
</cve>
<cve id="CVE-2016-4927" level="MEDIUM">
<product>junos_space:15.2</product>
</cve>
<cve id="CVE-2016-4926" level="LOW">
<product>junos_space:15.2</product>
</cve>
<cve id="CVE-2016-4921" level="LOW">
<product>junos:11.4</product>
<product>junos:11.4</product>
<product>junos:11.4</product>
<product>junos:11.4</product>
<product>junos:11.4</product>
<product>junos:11.4</product>
<product>junos:11.4</product>
<product>junos:11.4</product>
<product>junos:11.4</product>
<product>junos:11.4</product>
<product>junos:11.4</product>
<product>junos:11.4</product>
<product>junos:11.4</product>
<product>junos:11.4r13</product>
<product>junos:12.3</product>
<product>junos:12.3</product>
<product>junos:12.3</product>
<product>junos:12.3</product>
<product>junos:12.3x48</product>
<product>junos:12.3x48</product>
<product>junos:12.3x48</product>
<product>junos:13.3</product>
<product>junos:13.3</product>
<product>junos:13.3</product>
<product>junos:13.3</product>
<product>junos:13.3</product>
<product>junos:13.3</product>
<product>junos:13.3</product>
<product>junos:13.3</product>
<product>junos:13.3</product>
<product>junos:13.3</product>
<product>junos:13.3</product>
<product>junos:13.3</product>
<product>junos:14.1</product>
<product>junos:14.1</product>
<product>junos:14.1</product>
<product>junos:14.1</product>
<product>junos:14.1</product>
<product>junos:14.1x53</product>
<product>junos:14.1x53</product>
<product>junos:14.1x53</product>
<product>junos:14.1x53</product>
<product>junos:14.1x53</product>
<product>junos:14.1x53</product>
<product>junos:14.1x55</product>
<product>junos:14.1x55</product>
<product>junos:14.2</product>
<product>junos:14.2</product>
<product>junos:14.2</product>
<product>junos:14.2</product>
<product>junos:14.2</product>
<product>junos:15.1</product>
<product>junos:15.1</product>
<product>junos:15.1</product>
<product>junos:15.1</product>
<product>junos:15.1</product>
<product>junos:15.1x49</product>
<product>junos:15.1x49</product>
<product>junos:15.1x49</product>
<product>junos:15.1x49</product>
<product>junos:15.1x53</product>
<product>junos:15.1x53</product>
<product>junos:15.1x53</product>
<product>junos:15.1x53</product>
<product>junos:15.1x53</product>
<product>junos:15.1x53</product>
<product>junos:15.1x53</product>
<product>junos:15.1x53</product>
<product>junos:15.1x53</product>
<product>junos:15.1x53</product>
<product>junos:15.1x53</product>
</cve>
<cve id="CVE-2016-1731" level="LOW">
<product>software_update:2.1.3.127</product>
</cve>
<cve id="CVE-2016-4922" level="LOW">
<product>junos:11.4</product>
<product>junos:11.4</product>
<product>junos:11.4</product>
<product>junos:11.4</product>
<product>junos:11.4</product>
<product>junos:11.4</product>
<product>junos:11.4</product>
<product>junos:11.4</product>
<product>junos:11.4</product>
<product>junos:11.4</product>
<product>junos:11.4</product>
<product>junos:11.4</product>
<product>junos:11.4</product>
<product>junos:11.4r13</product>
<product>junos:12.1x46</product>
<product>junos:12.1x46</product>
<product>junos:12.1x46</product>
<product>junos:12.1x46</product>
<product>junos:12.1x46</product>
<product>junos:12.1x46</product>
<product>junos:12.1x46</product>
<product>junos:12.1x46</product>
<product>junos:12.1x46</product>
<product>junos:12.1x46</product>
<product>junos:12.1x46</product>
<product>junos:12.1x47</product>
<product>junos:12.1x47</product>
<product>junos:12.1x47</product>
<product>junos:12.1x47</product>
<product>junos:12.1x47</product>
<product>junos:12.1x47</product>
<product>junos:12.1x47</product>
<product>junos:12.1x47</product>
<product>junos:12.3</product>
<product>junos:12.3</product>
<product>junos:12.3</product>
<product>junos:12.3</product>
<product>junos:12.3</product>
<product>junos:12.3</product>
<product>junos:12.3</product>
<product>junos:12.3</product>
<product>junos:12.3</product>
<product>junos:12.3</product>
<product>junos:12.3</product>
<product>junos:12.3</product>
<product>junos:12.3x48</product>
<product>junos:12.3x48</product>
<product>junos:12.3x48</product>
<product>junos:12.3x48</product>
<product>junos:13.2</product>
<product>junos:13.2</product>
<product>junos:13.2</product>
<product>junos:13.2</product>
<product>junos:13.2</product>
<product>junos:13.2</product>
<product>junos:13.2</product>
<product>junos:13.2</product>
<product>junos:13.2</product>
<product>junos:13.2</product>
<product>junos:13.2</product>
<product>junos:13.3</product>
<product>junos:13.3</product>
<product>junos:13.3</product>
<product>junos:13.3</product>
<product>junos:13.3</product>
<product>junos:13.3</product>
<product>junos:13.3</product>
<product>junos:13.3</product>
<product>junos:13.3</product>
<product>junos:13.3</product>
<product>junos:14.1</product>
<product>junos:14.1</product>
<product>junos:14.1</product>
<product>junos:14.1</product>
<product>junos:14.1</product>
<product>junos:14.1</product>
<product>junos:14.1</product>
<product>junos:14.1x53</product>
<product>junos:14.1x53</product>
<product>junos:14.1x53</product>
<product>junos:14.1x53</product>
<product>junos:14.1x53</product>
<product>junos:14.1x53</product>
<product>junos:14.1x53</product>
<product>junos:14.1x53</product>
<product>junos:14.1x53</product>
<product>junos:14.1x55</product>
<product>junos:14.1x55</product>
<product>junos:14.2</product>
<product>junos:14.2</product>
<product>junos:14.2</product>
<product>junos:14.2</product>
<product>junos:14.2</product>
<product>junos:14.2</product>
<product>junos:15.1</product>
<product>junos:15.1</product>
<product>junos:15.1</product>
<product>junos:15.1</product>
<product>junos:15.1</product>
<product>junos:15.1</product>
<product>junos:15.1</product>
<product>junos:15.1</product>
<product>junos:15.1</product>
<product>junos:15.1</product>
<product>junos:15.1</product>
<product>junos:15.1x49</product>
<product>junos:15.1x49</product>
<product>junos:15.1x49</product>
<product>junos:15.1x49</product>
<product>junos:15.1x49</product>
<product>junos:15.1x49</product>
<product>junos:15.1x49</product>
<product>junos:15.1x49</product>
<product>junos:15.1x49</product>
<product>junos:15.1x53</product>
<product>junos:15.1x53</product>
<product>junos:15.1x53</product>
<product>junos:15.1x53</product>
<product>junos:15.1x53</product>
<product>junos:15.1x53</product>
<product>junos:15.1x53</product>
<product>junos:15.1x53</product>
<product>junos:15.1x53</product>
<product>junos:15.1x53</product>
<product>junos:15.1x53</product>
<product>junos:15.1x53</product>
<product>junos:15.1x53</product>
<product>junos:15.1x53</product>
<product>junos:15.1x53</product>
<product>junos:15.1x53</product>
<product>junos:15.1x53</product>
<product>junos:15.1x53</product>
</cve>
<cve id="CVE-2016-4929" level="LOW">
<product>junos_space:15.2</product>
</cve>
<cve id="CVE-2016-4928" level="MEDIUM">
<product>junos_space:15.2</product>
</cve>
<cve id="CVE-2016-5030" level="MEDIUM">
<product>libdwarf:20160613</product>
</cve>
<cve id="CVE-2016-5031" level="MEDIUM">
<product>libdwarf:20160613</product>
</cve>
<cve id="CVE-2016-5032" level="MEDIUM">
<product>libdwarf:20160613</product>
</cve>
<cve id="CVE-2016-5033" level="MEDIUM">
<product>libdwarf:20160613</product>
</cve>
<cve id="CVE-2016-5034" level="MEDIUM">
<product>libdwarf:20160613</product>
</cve>
<cve id="CVE-2016-5035" level="MEDIUM">
<product>libdwarf:20160613</product>
</cve>
<cve id="CVE-2016-5036" level="LOW">
<product>libdwarf:20160613</product>
</cve>
<cve id="CVE-2016-5037" level="MEDIUM">
<product>libdwarf:20160613</product>
</cve>
<cve id="CVE-2016-5038" level="LOW">
<product>libdwarf:20160613</product>
</cve>
<cve id="CVE-2016-5039" level="LOW">
<product>libdwarf:20160613</product>
</cve>
<cve id="CVE-2016-8211" level="LOW">
<product>data_protection_advisor:6.1</product>
<product>data_protection_advisor:6.2</product>
<product>data_protection_advisor:6.2.1</product>
<product>data_protection_advisor:6.2.2</product>
<product>data_protection_advisor:6.2.3</product>
</cve>
<cve id="CVE-2016-8217" level="LOW">
<product>rsa_bsafe_crypto-j:6.2.1</product>
</cve>
<cve id="CVE-2016-8216" level="LOW">
<product>data_domain_os:5.4</product>
<product>data_domain_os:5.5</product>
<product>data_domain_os:5.6</product>
<product>data_domain_os:5.7</product>
</cve>
<cve id="CVE-2016-8215" level="MEDIUM">
<product>rsa_security_analytics:10.5</product>
<product>rsa_security_analytics:10.5.1</product>
<product>rsa_security_analytics:10.5.2</product>
<product>rsa_security_analytics:10.6</product>
<product>rsa_security_analytics:10.6.1</product>
</cve>
<cve id="CVE-2016-8214" level="LOW">
<product>avamar_data_store:7.3.0</product>
<product>avamar_data_store:7.3.1</product>
<product>avamar_virtual_edition:7.3.0</product>
<product>avamar_virtual_edition:7.3.1</product>
</cve>
<cve id="CVE-2016-0024" level="MEDIUM">
<product>edge:-</product>
</cve>
<cve id="CVE-2016-0021" level="MEDIUM">
<product>infopath:2007</product>
<product>infopath:2010</product>
<product>infopath:2013</product>
</cve>
<cve id="CVE-2016-0028" level="MEDIUM">
<product>outlook_web_access</product>
</cve>
<cve id="CVE-2016-0029" level="MEDIUM">
<product>exchange_server:2016</product>
</cve>
<cve id="CVE-2016-9294" level="LOW">
<product>mujs:a5c747f1d40e8d6659a37a8d25f13fb5acf8e767</product>
</cve>
<cve id="CVE-2016-9296" level="LOW">
<product>p7zip:16.02</product>
</cve>
<cve id="CVE-2016-9297" level="LOW">
<product>libtiff:4.0.6</product>
</cve>
<cve id="CVE-2016-9298" level="MEDIUM">
<product>imagemagick:6.9.6-3</product>
<product>imagemagick:7.0.1-0</product>
<product>imagemagick:7.0.1-1</product>
<product>imagemagick:7.0.1-2</product>
<product>imagemagick:7.0.1-3</product>
<product>imagemagick:7.0.1-4</product>
<product>imagemagick:7.0.1-5</product>
<product>imagemagick:7.0.1-6</product>
<product>imagemagick:7.0.1-7</product>
<product>imagemagick:7.0.1-8</product>
<product>imagemagick:7.0.1-9</product>
<product>imagemagick:7.0.1-10</product>
<product>imagemagick:7.0.2-0</product>
<product>imagemagick:7.0.2-1</product>
<product>imagemagick:7.0.2-2</product>
<product>imagemagick:7.0.2-3</product>
<product>imagemagick:7.0.2-4</product>
<product>imagemagick:7.0.2-5</product>
<product>imagemagick:7.0.2-6</product>
<product>imagemagick:7.0.2-7</product>
<product>imagemagick:7.0.2-8</product>
<product>imagemagick:7.0.2-9</product>
<product>imagemagick:7.0.2-10</product>
<product>imagemagick:7.0.3-0</product>
<product>imagemagick:7.0.3-1</product>
<product>imagemagick:7.0.3-2</product>
<product>imagemagick:7.0.3-3</product>
<product>imagemagick:7.0.3-4</product>
<product>imagemagick:7.0.3-5</product>
</cve>
<cve id="CVE-2016-9299" level="LOW">
<product>jenkins:2.19.2</product>
<product>jenkins:2.31</product>
<product>fedora:25</product>
</cve>
<cve id="CVE-2016-10547" level="MEDIUM">
<product>nunjucks:2.4.2</product>
</cve>
<cve id="CVE-2016-10546" level="LOW">
<product>pouchdb:6.0.4</product>
</cve>
<cve id="CVE-2016-10011" level="LOW">
<product>openssh:7.3</product>
</cve>
<cve id="CVE-2016-10542" level="LOW">
<product>ws:1.1.0</product>
</cve>
<cve id="CVE-2016-10541" level="LOW">
<product>shell-quote:1.6.0</product>
</cve>
<cve id="CVE-2016-10012" level="LOW">
<product>openssh:7.3</product>
</cve>
<cve id="CVE-2016-10549" level="HIGH">
<product>sails:0.12.7</product>
</cve>
<cve id="CVE-2016-10548" level="MEDIUM">
<product>reduce-css-calc:1.2.4</product>
</cve>
<cve id="CVE-2016-1199" level="LOW">
<product>ec-cube:3.0.0</product>
<product>ec-cube:3.0.1</product>
<product>ec-cube:3.0.2</product>
<product>ec-cube:3.0.3</product>
<product>ec-cube:3.0.4</product>
<product>ec-cube:3.0.5</product>
<product>ec-cube:3.0.6</product>
<product>ec-cube:3.0.7</product>
<product>ec-cube:3.0.8</product>
<product>ec-cube:3.0.9</product>
</cve>
<cve id="CVE-2016-1198" level="MEDIUM">
<product>photopt:1.0.0</product>
<product>photopt:1.1.0</product>
</cve>
<cve id="CVE-2016-1193" level="LOW">
<product>garoon:3.7.0</product>
<product>garoon:3.7.1</product>
<product>garoon:3.7.2</product>
<product>garoon:3.7.3</product>
<product>garoon:3.7.4</product>
<product>garoon:3.7.5</product>
<product>garoon:4.0.0</product>
<product>garoon:4.0.1</product>
<product>garoon:4.0.2</product>
<product>garoon:4.0.3</product>
<product>garoon:4.2.0</product>
</cve>
<cve id="CVE-2016-1192" level="LOW">
<product>garoon:3.7.0</product>
<product>garoon:3.7.1</product>
<product>garoon:3.7.2</product>
<product>garoon:3.7.3</product>
<product>garoon:3.7.4</product>
<product>garoon:3.7.5</product>
<product>garoon:4.0.0</product>
<product>garoon:4.0.1</product>
<product>garoon:4.0.2</product>
<product>garoon:4.0.3</product>
<product>garoon:4.2.0</product>
</cve>
<cve id="CVE-2016-1191" level="LOW">
<product>garoon:3.0.0</product>
<product>garoon:3.0.1</product>
<product>garoon:3.0.2</product>
<product>garoon:3.0.3</product>
<product>garoon:3.1.0</product>
<product>garoon:3.1.1</product>
<product>garoon:3.1.2</product>
<product>garoon:3.1.3</product>
<product>garoon:3.5.0</product>
<product>garoon:3.5.1</product>
<product>garoon:3.5.2</product>
<product>garoon:3.5.3</product>
<product>garoon:3.5.4</product>
<product>garoon:3.5.5</product>
<product>garoon:3.7.0</product>
<product>garoon:3.7.1</product>
<product>garoon:3.7.2</product>
<product>garoon:3.7.3</product>
<product>garoon:3.7.4</product>
<product>garoon:3.7.5</product>
<product>garoon:4.0.0</product>
<product>garoon:4.0.1</product>
<product>garoon:4.0.2</product>
<product>garoon:4.0.3</product>
<product>garoon:4.2.0</product>
</cve>
<cve id="CVE-2016-1190" level="LOW">
<product>garoon:3.1.0</product>
<product>garoon:3.1.1</product>
<product>garoon:3.1.2</product>
<product>garoon:3.1.3</product>
<product>garoon:3.5.0</product>
<product>garoon:3.5.1</product>
<product>garoon:3.5.2</product>
<product>garoon:3.5.3</product>
<product>garoon:3.5.4</product>
<product>garoon:3.5.5</product>
<product>garoon:3.7.0</product>
<product>garoon:3.7.1</product>
<product>garoon:3.7.2</product>
<product>garoon:3.7.3</product>
<product>garoon:3.7.4</product>
<product>garoon:3.7.5</product>
<product>garoon:4.0.0</product>
<product>garoon:4.0.1</product>
<product>garoon:4.0.2</product>
<product>garoon:4.0.3</product>
<product>garoon:4.2.0</product>
</cve>
<cve id="CVE-2016-1197" level="MEDIUM">
<product>garoon:4.0.0</product>
<product>garoon:4.0.1</product>
<product>garoon:4.0.2</product>
<product>garoon:4.0.3</product>
<product>garoon:4.2.0</product>
</cve>
<cve id="CVE-2016-1196" level="LOW">
<product>garoon:3.0.0</product>
<product>garoon:3.0.1</product>
<product>garoon:3.0.2</product>
<product>garoon:3.0.3</product>
<product>garoon:3.1.0</product>
<product>garoon:3.1.1</product>
<product>garoon:3.1.2</product>
<product>garoon:3.1.3</product>
<product>garoon:3.5.0</product>
<product>garoon:3.5.1</product>
<product>garoon:3.5.2</product>
<product>garoon:3.5.3</product>
<product>garoon:3.5.4</product>
<product>garoon:3.5.5</product>
<product>garoon:3.7.0</product>
<product>garoon:3.7.1</product>
<product>garoon:3.7.2</product>
<product>garoon:3.7.3</product>
<product>garoon:3.7.4</product>
<product>garoon:3.7.5</product>
<product>garoon:4.0.0</product>
<product>garoon:4.0.1</product>
<product>garoon:4.0.2</product>
<product>garoon:4.0.3</product>
<product>garoon:4.2.0</product>
</cve>
<cve id="CVE-2016-1195" level="MEDIUM">
<product>garoon:3.0.0</product>
<product>garoon:3.0.1</product>
<product>garoon:3.0.2</product>
<product>garoon:3.0.3</product>
<product>garoon:3.1.0</product>
<product>garoon:3.1.1</product>
<product>garoon:3.1.2</product>
<product>garoon:3.1.3</product>
<product>garoon:3.5.0</product>
<product>garoon:3.5.1</product>
<product>garoon:3.5.2</product>
<product>garoon:3.5.3</product>
<product>garoon:3.5.4</product>
<product>garoon:3.5.5</product>
<product>garoon:3.7.0</product>
<product>garoon:3.7.1</product>
<product>garoon:3.7.2</product>
<product>garoon:3.7.3</product>
<product>garoon:3.7.4</product>
<product>garoon:3.7.5</product>
<product>garoon:4.0.0</product>
<product>garoon:4.0.1</product>
<product>garoon:4.0.2</product>
<product>garoon:4.0.3</product>
<product>garoon:4.2.0</product>
</cve>
<cve id="CVE-2016-1194" level="LOW">
<product>garoon:4.2.0</product>
</cve>
<cve id="CVE-2016-2562" level="MEDIUM">
<product>phpmyadmin:4.5.0</product>
<product>phpmyadmin:4.5.0</product>
<product>phpmyadmin:4.5.0</product>
<product>phpmyadmin:4.5.0</product>
<product>phpmyadmin:4.5.0.1</product>
<product>phpmyadmin:4.5.0.2</product>
<product>phpmyadmin:4.5.1</product>
<product>phpmyadmin:4.5.2</product>
<product>phpmyadmin:4.5.3</product>
<product>phpmyadmin:4.5.3.1</product>
<product>phpmyadmin:4.5.4</product>
<product>phpmyadmin:4.5.4.1</product>
<product>phpmyadmin:4.5.5</product>
</cve>
<cve id="CVE-2016-2561" level="MEDIUM">
<product>phpmyadmin:4.4.0</product>
<product>phpmyadmin:4.4.1</product>
<product>phpmyadmin:4.4.1.1</product>
<product>phpmyadmin:4.4.2</product>
<product>phpmyadmin:4.4.3</product>
<product>phpmyadmin:4.4.4</product>
<product>phpmyadmin:4.4.5</product>
<product>phpmyadmin:4.4.6</product>
<product>phpmyadmin:4.4.6.1</product>
<product>phpmyadmin:4.4.7</product>
<product>phpmyadmin:4.4.8</product>
<product>phpmyadmin:4.4.9</product>
<product>phpmyadmin:4.4.10</product>
<product>phpmyadmin:4.4.11</product>
<product>phpmyadmin:4.4.12</product>
<product>phpmyadmin:4.4.13</product>
<product>phpmyadmin:4.4.13.1</product>
<product>phpmyadmin:4.4.14</product>
<product>phpmyadmin:4.4.14.1</product>
<product>phpmyadmin:4.4.15</product>
<product>phpmyadmin:4.4.15.1</product>
<product>phpmyadmin:4.4.15.2</product>
<product>phpmyadmin:4.4.15.3</product>
<product>phpmyadmin:4.4.15.4</product>
<product>phpmyadmin:4.5.0</product>
<product>phpmyadmin:4.5.0</product>
<product>phpmyadmin:4.5.0</product>
<product>phpmyadmin:4.5.0</product>
<product>phpmyadmin:4.5.0.1</product>
<product>phpmyadmin:4.5.0.2</product>
<product>phpmyadmin:4.5.1</product>
<product>phpmyadmin:4.5.2</product>
<product>phpmyadmin:4.5.3</product>
<product>phpmyadmin:4.5.3.1</product>
<product>phpmyadmin:4.5.4</product>
<product>phpmyadmin:4.5.4.1</product>
<product>phpmyadmin:4.5.5</product>
</cve>
<cve id="CVE-2016-2560" level="MEDIUM">
<product>phpmyadmin:4.0.0</product>
<product>phpmyadmin:4.0.1</product>
<product>phpmyadmin:4.0.2</product>
<product>phpmyadmin:4.0.3</product>
<product>phpmyadmin:4.0.4</product>
<product>phpmyadmin:4.0.4.1</product>
<product>phpmyadmin:4.0.4.2</product>
<product>phpmyadmin:4.0.5</product>
<product>phpmyadmin:4.0.6</product>
<product>phpmyadmin:4.0.7</product>
<product>phpmyadmin:4.0.8</product>
<product>phpmyadmin:4.0.9</product>
<product>phpmyadmin:4.0.10</product>
<product>phpmyadmin:4.0.10.1</product>
<product>phpmyadmin:4.0.10.2</product>
<product>phpmyadmin:4.0.10.3</product>
<product>phpmyadmin:4.0.10.4</product>
<product>phpmyadmin:4.0.10.5</product>
<product>phpmyadmin:4.0.10.6</product>
<product>phpmyadmin:4.0.10.7</product>
<product>phpmyadmin:4.0.10.8</product>
<product>phpmyadmin:4.0.10.9</product>
<product>phpmyadmin:4.0.10.10</product>
<product>phpmyadmin:4.0.10.11</product>
<product>phpmyadmin:4.0.10.12</product>
<product>phpmyadmin:4.0.10.13</product>
<product>phpmyadmin:4.0.10.14</product>
<product>phpmyadmin:4.4.0</product>
<product>phpmyadmin:4.4.1</product>
<product>phpmyadmin:4.4.1.1</product>
<product>phpmyadmin:4.4.2</product>
<product>phpmyadmin:4.4.3</product>
<product>phpmyadmin:4.4.4</product>
<product>phpmyadmin:4.4.5</product>
<product>phpmyadmin:4.4.6</product>
<product>phpmyadmin:4.4.6.1</product>
<product>phpmyadmin:4.4.7</product>
<product>phpmyadmin:4.4.8</product>
<product>phpmyadmin:4.4.9</product>
<product>phpmyadmin:4.4.10</product>
<product>phpmyadmin:4.4.11</product>
<product>phpmyadmin:4.4.12</product>
<product>phpmyadmin:4.4.13</product>
<product>phpmyadmin:4.4.13.1</product>
<product>phpmyadmin:4.4.14</product>
<product>phpmyadmin:4.4.14.1</product>
<product>phpmyadmin:4.4.15</product>
<product>phpmyadmin:4.4.15.1</product>
<product>phpmyadmin:4.4.15.2</product>
<product>phpmyadmin:4.4.15.3</product>
<product>phpmyadmin:4.4.15.4</product>
<product>phpmyadmin:4.5.0</product>
<product>phpmyadmin:4.5.0</product>
<product>phpmyadmin:4.5.0</product>
<product>phpmyadmin:4.5.0</product>
<product>phpmyadmin:4.5.0.1</product>
<product>phpmyadmin:4.5.0.2</product>
<product>phpmyadmin:4.5.1</product>
<product>phpmyadmin:4.5.2</product>
<product>phpmyadmin:4.5.3</product>
<product>phpmyadmin:4.5.3.1</product>
<product>phpmyadmin:4.5.4</product>
<product>phpmyadmin:4.5.4.1</product>
<product>phpmyadmin:4.5.5</product>
</cve>
<cve id="CVE-2016-2567" level="LOW">
<product>galaxy_note_3_firmware:n9005xxugbob6</product>
<product>galaxy_s6_firmware:g920fxxu2coh2</product>
</cve>
<cve id="CVE-2016-2566" level="LOW">
<product>galaxy_s6_firmware:g920fxxu2coh2</product>
</cve>
<cve id="CVE-2016-2565" level="LOW">
<product>galaxy_s6_firmware:g920fxxu2coh2</product>
</cve>
<cve id="CVE-2016-2564" level="MEDIUM">
<product>invision_power_board:4.1.8.1</product>
</cve>
<cve id="CVE-2016-2569" level="LOW">
<product>squid:3.0</product>
<product>squid:3.0</product>
<product>squid:3.0</product>
<product>squid:3.0</product>
<product>squid:3.0</product>
<product>squid:3.0</product>
<product>squid:3.0</product>
<product>squid:3.0</product>
<product>squid:3.0</product>
<product>squid:3.0.stable1</product>
<product>squid:3.0.stable2</product>
<product>squid:3.0.stable3</product>
<product>squid:3.0.stable4</product>
<product>squid:3.0.stable5</product>
<product>squid:3.0.stable6</product>
<product>squid:3.0.stable7</product>
<product>squid:3.0.stable8</product>
<product>squid:3.0.stable9</product>
<product>squid:3.0.stable10</product>
<product>squid:3.0.stable11</product>
<product>squid:3.0.stable11</product>
<product>squid:3.0.stable12</product>
<product>squid:3.0.stable13</product>
<product>squid:3.0.stable14</product>
<product>squid:3.0.stable15</product>
<product>squid:3.0.stable16</product>
<product>squid:3.0.stable16</product>
<product>squid:3.0.stable17</product>
<product>squid:3.0.stable18</product>
<product>squid:3.0.stable19</product>
<product>squid:3.0.stable20</product>
<product>squid:3.0.stable21</product>
<product>squid:3.0.stable22</product>
<product>squid:3.0.stable23</product>
<product>squid:3.0.stable24</product>
<product>squid:3.0.stable25</product>
<product>squid:3.1</product>
<product>squid:3.1.0.1</product>
<product>squid:3.1.0.2</product>
<product>squid:3.1.0.3</product>
<product>squid:3.1.0.4</product>
<product>squid:3.1.0.5</product>
<product>squid:3.1.0.6</product>
<product>squid:3.1.0.7</product>
<product>squid:3.1.0.8</product>
<product>squid:3.1.0.9</product>
<product>squid:3.1.0.10</product>
<product>squid:3.1.0.11</product>
<product>squid:3.1.0.12</product>
<product>squid:3.1.0.13</product>
<product>squid:3.1.0.14</product>
<product>squid:3.1.0.15</product>
<product>squid:3.1.0.16</product>
<product>squid:3.1.0.17</product>
<product>squid:3.1.0.18</product>
<product>squid:3.1.1</product>
<product>squid:3.1.2</product>
<product>squid:3.1.3</product>
<product>squid:3.1.4</product>
<product>squid:3.1.5</product>
<product>squid:3.1.5.1</product>
<product>squid:3.1.6</product>
<product>squid:3.1.7</product>
<product>squid:3.1.8</product>
<product>squid:3.1.9</product>
<product>squid:3.1.10</product>
<product>squid:3.1.11</product>
<product>squid:3.1.12</product>
<product>squid:3.1.13</product>
<product>squid:3.1.14</product>
<product>squid:3.1.15</product>
<product>squid:3.2.0.1</product>
<product>squid:3.2.0.2</product>
<product>squid:3.2.0.3</product>
<product>squid:3.2.0.4</product>
<product>squid:3.2.0.5</product>
<product>squid:3.2.0.6</product>
<product>squid:3.2.0.7</product>
<product>squid:3.2.0.8</product>
<product>squid:3.2.0.9</product>
<product>squid:3.2.0.10</product>
<product>squid:3.2.0.11</product>
<product>squid:3.2.0.12</product>
<product>squid:3.2.0.13</product>
<product>squid:3.2.0.14</product>
<product>squid:3.2.0.15</product>
<product>squid:3.2.0.16</product>
<product>squid:3.2.0.17</product>
<product>squid:3.2.0.18</product>
<product>squid:3.2.0.19</product>
<product>squid:3.2.1</product>
<product>squid:3.2.2</product>
<product>squid:3.2.3</product>
<product>squid:3.2.4</product>
<product>squid:3.2.5</product>
<product>squid:3.2.6</product>
<product>squid:3.2.7</product>
<product>squid:3.2.8</product>
<product>squid:3.2.9</product>
<product>squid:3.2.10</product>
<product>squid:3.2.11</product>
<product>squid:3.2.12</product>
<product>squid:3.2.13</product>
<product>squid:3.3.0</product>
<product>squid:3.3.0.2</product>
<product>squid:3.3.0.3</product>
<product>squid:3.3.1</product>
<product>squid:3.3.2</product>
<product>squid:3.3.3</product>
<product>squid:3.3.4</product>
<product>squid:3.3.5</product>
<product>squid:3.3.6</product>
<product>squid:3.3.7</product>
<product>squid:3.3.8</product>
<product>squid:3.3.9</product>
<product>squid:3.3.10</product>
<product>squid:3.3.11</product>
<product>squid:3.3.12</product>
<product>squid:3.3.13</product>
<product>squid:3.4.0.1</product>
<product>squid:3.4.0.2</product>
<product>squid:3.4.0.3</product>
<product>squid:3.4.1</product>
<product>squid:3.4.2</product>
<product>squid:3.4.3</product>
<product>squid:3.4.4</product>
<product>squid:3.4.8</product>
<product>squid:3.4.9</product>
<product>squid:3.4.10</product>
<product>squid:3.4.11</product>
<product>squid:3.4.12</product>
<product>squid:3.4.13</product>
<product>squid:3.5.0.1</product>
<product>squid:3.5.0.2</product>
<product>squid:3.5.0.3</product>
<product>squid:3.5.0.4</product>
<product>squid:3.5.1</product>
<product>squid:4.0.1</product>
<product>squid:4.0.2</product>
<product>squid:4.0.3</product>
<product>squid:4.0.4</product>
<product>squid:4.0.5</product>
<product>squid:4.0.6</product>
</cve>
<cve id="CVE-2016-2568" level="MEDIUM">
<product>polkit</product>
</cve>
<cve id="CVE-2016-4055" level="LOW">
<product>moment:2.11.1</product>
</cve>
<cve id="CVE-2016-6246" level="LOW">
<product>openbsd:5.8</product>
<product>openbsd:5.9</product>
</cve>
<cve id="CVE-2016-6247" level="LOW">
<product>openbsd:5.8</product>
<product>openbsd:5.9</product>
</cve>
<cve id="CVE-2016-6244" level="LOW">
<product>openbsd:5.9</product>
</cve>
<cve id="CVE-2016-6245" level="LOW">
<product>openbsd:5.8</product>
<product>openbsd:5.9</product>
</cve>
<cve id="CVE-2016-6242" level="LOW">
<product>openbsd:5.8</product>
<product>openbsd:5.9</product>
</cve>
<cve id="CVE-2016-6243" level="LOW">
<product>openbsd:5.8</product>
<product>openbsd:5.9</product>
</cve>
<cve id="CVE-2016-6240" level="LOW">
<product>openbsd:5.8</product>
<product>openbsd:5.9</product>
</cve>
<cve id="CVE-2016-6241" level="LOW">
<product>openbsd:5.8</product>
<product>openbsd:5.9</product>
</cve>
<cve id="CVE-2016-6249" level="LOW">
<product>big-ip_access_policy_manager:11.5.0</product>
<product>big-ip_access_policy_manager:11.5.1</product>
<product>big-ip_access_policy_manager:11.5.2</product>
<product>big-ip_access_policy_manager:11.5.3</product>
<product>big-ip_access_policy_manager:11.5.4</product>
<product>big-ip_access_policy_manager:11.6.0</product>
<product>big-ip_access_policy_manager:11.6.1</product>
<product>big-ip_access_policy_manager:12.0.0</product>
<product>big-ip_advanced_firewall_manager:11.5.0</product>
<product>big-ip_advanced_firewall_manager:11.5.1</product>
<product>big-ip_advanced_firewall_manager:11.5.2</product>
<product>big-ip_advanced_firewall_manager:11.5.3</product>
<product>big-ip_advanced_firewall_manager:11.5.4</product>
<product>big-ip_advanced_firewall_manager:11.6.0</product>
<product>big-ip_advanced_firewall_manager:11.6.1</product>
<product>big-ip_advanced_firewall_manager:12.0.0</product>
<product>big-ip_analytics:11.5.0</product>
<product>big-ip_analytics:11.5.1</product>
<product>big-ip_analytics:11.5.2</product>
<product>big-ip_analytics:11.5.3</product>
<product>big-ip_analytics:11.5.4</product>
<product>big-ip_analytics:11.6.0</product>
<product>big-ip_analytics:11.6.1</product>
<product>big-ip_analytics:12.0.0</product>
<product>big-ip_application_acceleration_manager:11.5.0</product>
<product>big-ip_application_acceleration_manager:11.5.1</product>
<product>big-ip_application_acceleration_manager:11.5.2</product>
<product>big-ip_application_acceleration_manager:11.5.3</product>
<product>big-ip_application_acceleration_manager:11.5.4</product>
<product>big-ip_application_acceleration_manager:11.6.0</product>
<product>big-ip_application_acceleration_manager:11.6.1</product>
<product>big-ip_application_acceleration_manager:12.0.0</product>
<product>big-ip_application_security_manager:11.5.0</product>
<product>big-ip_application_security_manager:11.5.1</product>
<product>big-ip_application_security_manager:11.5.2</product>
<product>big-ip_application_security_manager:11.5.3</product>
<product>big-ip_application_security_manager:11.5.4</product>
<product>big-ip_application_security_manager:11.6.0</product>
<product>big-ip_application_security_manager:11.6.1</product>
<product>big-ip_application_security_manager:12.0.0</product>
<product>big-ip_domain_name_system:12.0.0</product>
<product>big-ip_global_traffic_manager:11.5.0</product>
<product>big-ip_global_traffic_manager:11.5.1</product>
<product>big-ip_global_traffic_manager:11.5.2</product>
<product>big-ip_global_traffic_manager:11.5.3</product>
<product>big-ip_global_traffic_manager:11.5.4</product>
<product>big-ip_global_traffic_manager:11.6.0</product>
<product>big-ip_global_traffic_manager:11.6.1</product>
<product>big-ip_link_controller:11.5.0</product>
<product>big-ip_link_controller:11.5.1</product>
<product>big-ip_link_controller:11.5.2</product>
<product>big-ip_link_controller:11.5.3</product>
<product>big-ip_link_controller:11.5.4</product>
<product>big-ip_link_controller:11.6.0</product>
<product>big-ip_link_controller:11.6.1</product>
<product>big-ip_link_controller:12.0.0</product>
<product>big-ip_local_traffic_manager:11.5.0</product>
<product>big-ip_local_traffic_manager:11.5.1</product>
<product>big-ip_local_traffic_manager:11.5.2</product>
<product>big-ip_local_traffic_manager:11.5.3</product>
<product>big-ip_local_traffic_manager:11.5.4</product>
<product>big-ip_local_traffic_manager:11.6.0</product>
<product>big-ip_local_traffic_manager:11.6.1</product>
<product>big-ip_local_traffic_manager:12.0.0</product>
<product>big-ip_policy_enforcement_manager:11.5.0</product>
<product>big-ip_policy_enforcement_manager:11.5.1</product>
<product>big-ip_policy_enforcement_manager:11.5.2</product>
<product>big-ip_policy_enforcement_manager:11.5.3</product>
<product>big-ip_policy_enforcement_manager:11.5.4</product>
<product>big-ip_policy_enforcement_manager:11.6.0</product>
<product>big-ip_policy_enforcement_manager:11.6.1</product>
<product>big-ip_policy_enforcement_manager:12.0.0</product>
<product>big-ip_websafe:11.5.0</product>
<product>big-ip_websafe:11.5.1</product>
<product>big-ip_websafe:11.5.2</product>
<product>big-ip_websafe:11.5.3</product>
<product>big-ip_websafe:11.5.4</product>
<product>big-ip_websafe:11.6.0</product>
<product>big-ip_websafe:11.6.1</product>
<product>big-ip_websafe:12.0.0</product>
</cve>
<cve id="CVE-2016-7040" level="LOW">
<product>cloudforms_management_engine:4.1</product>
</cve>
<cve id="CVE-2016-7046" level="MEDIUM">
<product>jboss_enterprise_application_platform:7.0</product>
</cve>
<cve id="CVE-2016-10725" level="LOW">
<product>bitcoin-qt:0.3.4</product>
<product>bitcoin-qt:0.3.5</product>
<product>bitcoin-qt:0.3.8</product>
<product>bitcoin-qt:0.3.10</product>
<product>bitcoin-qt:0.3.11</product>
<product>bitcoin-qt:0.3.12</product>
<product>bitcoin-qt:0.4.0</product>
<product>bitcoin-qt:0.4.1</product>
<product>bitcoin-qt:0.4.1</product>
<product>bitcoin-qt:0.4.2</product>
<product>bitcoin-qt:0.4.3</product>
<product>bitcoin-qt:0.4.4</product>
<product>bitcoin-qt:0.4.4</product>
<product>bitcoin-qt:0.4.5</product>
<product>bitcoin-qt:0.4.6</product>
<product>bitcoin-qt:0.4.7</product>
<product>bitcoin-qt:0.5.0</product>
<product>bitcoin-qt:0.5.1</product>
<product>bitcoin-qt:0.5.2</product>
<product>bitcoin-qt:0.5.3</product>
<product>bitcoin-qt:0.5.3.1</product>
<product>bitcoin-qt:0.5.4</product>
<product>bitcoin-qt:0.5.5</product>
<product>bitcoin-qt:0.5.6</product>
<product>bitcoin-qt:0.6.0</product>
<product>bitcoin-qt:0.6.0</product>
<product>bitcoin-qt:0.6.0</product>
<product>bitcoin-qt:0.6.0.1</product>
<product>bitcoin-qt:0.6.0.2</product>
<product>bitcoin-qt:0.6.0.3</product>
<product>bitcoin-qt:0.6.0.4</product>
<product>bitcoin-qt:0.6.0.5</product>
<product>bitcoin-qt:0.6.0.6</product>
<product>bitcoin-qt:0.6.0.7</product>
<product>bitcoin-qt:0.6.0.8</product>
<product>bitcoin-qt:0.6.1</product>
<product>bitcoin-qt:0.6.2</product>
<product>bitcoin-qt:0.8.0</product>
<product>bitcoin-qt:0.8.1</product>
<product>bitcoind:0.3.4</product>
<product>bitcoind:0.3.5</product>
<product>bitcoind:0.3.8</product>
<product>bitcoind:0.3.10</product>
<product>bitcoind:0.3.11</product>
<product>bitcoind:0.3.12</product>
<product>bitcoind:0.4.0</product>
<product>bitcoind:0.4.1</product>
<product>bitcoind:0.4.1</product>
<product>bitcoind:0.4.2</product>
<product>bitcoind:0.4.3</product>
<product>bitcoind:0.4.4</product>
<product>bitcoind:0.4.4</product>
<product>bitcoind:0.4.5</product>
<product>bitcoind:0.4.6</product>
<product>bitcoind:0.4.7</product>
<product>bitcoind:0.5.0</product>
<product>bitcoind:0.5.1</product>
<product>bitcoind:0.5.2</product>
<product>bitcoind:0.5.3</product>
<product>bitcoind:0.5.3.1</product>
<product>bitcoind:0.5.4</product>
<product>bitcoind:0.5.5</product>
<product>bitcoind:0.5.6</product>
<product>bitcoind:0.6.0</product>
<product>bitcoind:0.6.0</product>
<product>bitcoind:0.6.0</product>
<product>bitcoind:0.6.0.1</product>
<product>bitcoind:0.6.0.2</product>
<product>bitcoind:0.6.0.3</product>
<product>bitcoind:0.6.0.4</product>
<product>bitcoind:0.6.0.5</product>
<product>bitcoind:0.6.0.6</product>
<product>bitcoind:0.6.0.7</product>
<product>bitcoind:0.6.0.8</product>
<product>bitcoind:0.6.1</product>
<product>bitcoind:0.6.2</product>
<product>bitcoind:0.8.0</product>
<product>bitcoind:0.8.1</product>
</cve>
<cve id="CVE-2016-10724" level="LOW">
<product>bitcoin-qt:0.3.4</product>
<product>bitcoin-qt:0.3.5</product>
<product>bitcoin-qt:0.3.8</product>
<product>bitcoin-qt:0.3.10</product>
<product>bitcoin-qt:0.3.11</product>
<product>bitcoin-qt:0.3.12</product>
<product>bitcoin-qt:0.4.0</product>
<product>bitcoin-qt:0.4.1</product>
<product>bitcoin-qt:0.4.1</product>
<product>bitcoin-qt:0.4.2</product>
<product>bitcoin-qt:0.4.3</product>
<product>bitcoin-qt:0.4.4</product>
<product>bitcoin-qt:0.4.4</product>
<product>bitcoin-qt:0.4.5</product>
<product>bitcoin-qt:0.4.6</product>
<product>bitcoin-qt:0.4.7</product>
<product>bitcoin-qt:0.5.0</product>
<product>bitcoin-qt:0.5.1</product>
<product>bitcoin-qt:0.5.2</product>
<product>bitcoin-qt:0.5.3</product>
<product>bitcoin-qt:0.5.3.1</product>
<product>bitcoin-qt:0.5.4</product>
<product>bitcoin-qt:0.5.5</product>
<product>bitcoin-qt:0.5.6</product>
<product>bitcoin-qt:0.6.0</product>
<product>bitcoin-qt:0.6.0</product>
<product>bitcoin-qt:0.6.0</product>
<product>bitcoin-qt:0.6.0.1</product>
<product>bitcoin-qt:0.6.0.2</product>
<product>bitcoin-qt:0.6.0.3</product>
<product>bitcoin-qt:0.6.0.4</product>
<product>bitcoin-qt:0.6.0.5</product>
<product>bitcoin-qt:0.6.0.6</product>
<product>bitcoin-qt:0.6.0.7</product>
<product>bitcoin-qt:0.6.0.8</product>
<product>bitcoin-qt:0.6.1</product>
<product>bitcoin-qt:0.6.2</product>
<product>bitcoin-qt:0.8.0</product>
<product>bitcoin-qt:0.8.1</product>
<product>bitcoind:0.3.4</product>
<product>bitcoind:0.3.5</product>
<product>bitcoind:0.3.8</product>
<product>bitcoind:0.3.10</product>
<product>bitcoind:0.3.11</product>
<product>bitcoind:0.3.12</product>
<product>bitcoind:0.4.0</product>
<product>bitcoind:0.4.1</product>
<product>bitcoind:0.4.1</product>
<product>bitcoind:0.4.2</product>
<product>bitcoind:0.4.3</product>
<product>bitcoind:0.4.4</product>
<product>bitcoind:0.4.4</product>
<product>bitcoind:0.4.5</product>
<product>bitcoind:0.4.6</product>
<product>bitcoind:0.4.7</product>
<product>bitcoind:0.5.0</product>
<product>bitcoind:0.5.1</product>
<product>bitcoind:0.5.2</product>
<product>bitcoind:0.5.3</product>
<product>bitcoind:0.5.3.1</product>
<product>bitcoind:0.5.4</product>
<product>bitcoind:0.5.5</product>
<product>bitcoind:0.5.6</product>
<product>bitcoind:0.6.0</product>
<product>bitcoind:0.6.0</product>
<product>bitcoind:0.6.0</product>
<product>bitcoind:0.6.0.1</product>
<product>bitcoind:0.6.0.2</product>
<product>bitcoind:0.6.0.3</product>
<product>bitcoind:0.6.0.4</product>
<product>bitcoind:0.6.0.5</product>
<product>bitcoind:0.6.0.6</product>
<product>bitcoind:0.6.0.7</product>
<product>bitcoind:0.6.0.8</product>
<product>bitcoind:0.6.1</product>
<product>bitcoind:0.6.2</product>
<product>bitcoind:0.8.0</product>
<product>bitcoind:0.8.1</product>
</cve>
<cve id="CVE-2016-10713" level="MEDIUM">
<product>patch:2.7.1</product>
</cve>
<cve id="CVE-2016-10717" level="LOW">
<product>malwarebytes_anti-malware:2.2.1</product>
</cve>
<cve id="CVE-2016-10715" level="MEDIUM">
<product>kanban_board:1.4</product>
</cve>
<cve id="CVE-2016-10728" level="LOW">
<product>suricata:0.8.2</product>
<product>suricata:1.0.0</product>
<product>suricata:1.0.1</product>
<product>suricata:1.0.2</product>
<product>suricata:1.0.3</product>
<product>suricata:1.0.4</product>
<product>suricata:1.0.5</product>
<product>suricata:1.1</product>
<product>suricata:1.1</product>
<product>suricata:1.1</product>
<product>suricata:1.1</product>
<product>suricata:1.1</product>
<product>suricata:1.1.1</product>
<product>suricata:1.2</product>
<product>suricata:1.2</product>
<product>suricata:1.2.1</product>
<product>suricata:1.3</product>
<product>suricata:1.3</product>
<product>suricata:1.3</product>
<product>suricata:1.3</product>
<product>suricata:1.3</product>
<product>suricata:1.3.1</product>
<product>suricata:1.3.2</product>
<product>suricata:1.3.3</product>
<product>suricata:1.3.4</product>
<product>suricata:1.3.5</product>
<product>suricata:1.3.6</product>
<product>suricata:1.4</product>
<product>suricata:1.4</product>
<product>suricata:1.4</product>
<product>suricata:1.4</product>
<product>suricata:1.4</product>
<product>suricata:1.4.1</product>
<product>suricata:1.4.2</product>
<product>suricata:1.4.3</product>
<product>suricata:1.4.4</product>
<product>suricata:1.4.5</product>
<product>suricata:1.4.6</product>
<product>suricata:1.4.7</product>
<product>suricata:2.0</product>
<product>suricata:2.0</product>
<product>suricata:2.0</product>
<product>suricata:2.0</product>
<product>suricata:2.0</product>
<product>suricata:2.0</product>
<product>suricata:2.0.1</product>
<product>suricata:2.0.1</product>
<product>suricata:2.0.2</product>
<product>suricata:2.0.3</product>
<product>suricata:2.0.4</product>
<product>suricata:2.0.5</product>
<product>suricata:2.0.6</product>
<product>suricata:2.0.7</product>
<product>suricata:2.0.8</product>
<product>suricata:2.0.9</product>
<product>suricata:2.0.10</product>
<product>suricata:2.0.11</product>
<product>suricata:2.1</product>
<product>suricata:2.1</product>
<product>suricata:2.1</product>
<product>suricata:2.1</product>
<product>suricata:3.0</product>
<product>suricata:3.0</product>
<product>suricata:3.0</product>
<product>suricata:3.0</product>
<product>suricata:3.0.1</product>
<product>suricata:3.0.1</product>
<product>suricata:3.0.2</product>
<product>suricata:3.1</product>
<product>suricata:3.1</product>
<product>suricata:3.1.1</product>
</cve>
<cve id="CVE-2016-9998" level="MEDIUM">
<product>spip:3.1.0</product>
<product>spip:3.1.0</product>
<product>spip:3.1.0</product>
<product>spip:3.1.0</product>
<product>spip:3.1.0</product>
<product>spip:3.1.0</product>
<product>spip:3.1.1</product>
<product>spip:3.1.2</product>
<product>spip:3.1.3</product>
</cve>
<cve id="CVE-2016-8024" level="MEDIUM">
<product>virusscan_enterprise:2.0.3</product>
</cve>
<cve id="CVE-2016-8025" level="MEDIUM">
<product>virusscan_enterprise:2.0.3</product>
</cve>
<cve id="CVE-2016-8026" level="LOW">
<product>security_scan_plus:3.11.469</product>
</cve>
<cve id="CVE-2016-8027" level="LOW">
<product>epolicy_orchestrator:5.1.3</product>
<product>epolicy_orchestrator:5.3.2</product>
</cve>
<cve id="CVE-2016-8020" level="MEDIUM">
<product>virusscan_enterprise:2.0.3</product>
</cve>
<cve id="CVE-2016-8021" level="MEDIUM">
<product>virusscan_enterprise:2.0.3</product>
</cve>
<cve id="CVE-2016-8022" level="HIGH">
<product>virusscan_enterprise:2.0.3</product>
</cve>
<cve id="CVE-2016-8023" level="MEDIUM">
<product>virusscan_enterprise:2.0.3</product>
</cve>
<cve id="CVE-2016-4028" level="MEDIUM">
<product>ox_guard:2.4.0</product>
</cve>
<cve id="CVE-2016-1058" level="LOW">
<product>acrobat:11.0.15</product>
<product>acrobat_dc:15.006.30121</product>
<product>acrobat_dc:15.010.20060</product>
<product>acrobat_reader_dc:15.006.30121</product>
<product>acrobat_reader_dc:15.010.20060</product>
<product>reader:11.0.15</product>
</cve>
<cve id="CVE-2016-1059" level="LOW">
<product>acrobat:11.0.15</product>
<product>acrobat_dc:15.006.30121</product>
<product>acrobat_dc:15.010.20060</product>
<product>acrobat_reader_dc:15.006.30121</product>
<product>acrobat_reader_dc:15.010.20060</product>
<product>reader:11.0.15</product>
</cve>
<cve id="CVE-2016-1500" level="MEDIUM">
<product>owncloud:7.0.11</product>
<product>owncloud:8.0.0</product>
<product>owncloud:8.0.2</product>
<product>owncloud:8.0.3</product>
<product>owncloud:8.0.4</product>
<product>owncloud:8.0.5</product>
<product>owncloud:8.0.6</product>
<product>owncloud:8.0.8</product>
<product>owncloud:8.0.9</product>
<product>owncloud:8.1.0</product>
<product>owncloud:8.1.1</product>
<product>owncloud:8.1.3</product>
<product>owncloud:8.1.4</product>
<product>owncloud:8.2.0</product>
<product>owncloud:8.2.1</product>
</cve>
<cve id="CVE-2016-1501" level="LOW">
<product>owncloud:8.0.8</product>
<product>owncloud:8.1.0</product>
<product>owncloud:8.1.1</product>
<product>owncloud:8.1.3</product>
</cve>
<cve id="CVE-2016-1502" level="LOW">
<product>snapcenter_server:1.0</product>
<product>snapcenter_server:1.0</product>
</cve>
<cve id="CVE-2016-1051" level="LOW">
<product>acrobat:11.0.15</product>
<product>acrobat_dc:15.006.30121</product>
<product>acrobat_dc:15.010.20060</product>
<product>acrobat_reader_dc:15.006.30121</product>
<product>acrobat_reader_dc:15.010.20060</product>
<product>reader:11.0.15</product>
</cve>
<cve id="CVE-2016-1504" level="LOW">
<product>dhcpcd:6.9.4</product>
</cve>
<cve id="CVE-2016-1505" level="LOW">
<product>radicale:1.0.1</product>
</cve>
<cve id="CVE-2016-4026" level="MEDIUM">
<product>open-xchange_appsuite:7.8.1</product>
</cve>
<cve id="CVE-2016-4027" level="MEDIUM">
<product>open-xchange_appsuite:7.8.1</product>
</cve>
<cve id="CVE-2016-5997" level="LOW">
<product>tealeaf_customer_experience:8.7</product>
<product>tealeaf_customer_experience:8.8</product>
<product>tealeaf_customer_experience:9.0.0</product>
<product>tealeaf_customer_experience:9.0.1</product>
<product>tealeaf_customer_experience:9.0.1a</product>
<product>tealeaf_customer_experience:9.0.2</product>
<product>tealeaf_customer_experience:9.0.2a</product>
</cve>
<cve id="CVE-2016-5996" level="LOW">
<product>tealeaf_customer_experience:8.7</product>
<product>tealeaf_customer_experience:8.8</product>
<product>tealeaf_customer_experience:9.0.0</product>
<product>tealeaf_customer_experience:9.0.1</product>
<product>tealeaf_customer_experience:9.0.1a</product>
<product>tealeaf_customer_experience:9.0.2</product>
<product>tealeaf_customer_experience:9.0.2a</product>
</cve>
<cve id="CVE-2016-5995" level="MEDIUM">
<product>db2:9.7</product>
<product>db2:9.7</product>
<product>db2:9.7</product>
<product>db2:9.7</product>
<product>db2:9.7</product>
<product>db2:9.7</product>
<product>db2:9.7.0.1</product>
<product>db2:9.7.0.1</product>
<product>db2:9.7.0.1</product>
<product>db2:9.7.0.1</product>
<product>db2:9.7.0.1</product>
<product>db2:9.7.0.1</product>
<product>db2:9.7.0.2</product>
<product>db2:9.7.0.2</product>
<product>db2:9.7.0.2</product>
<product>db2:9.7.0.2</product>
<product>db2:9.7.0.2</product>
<product>db2:9.7.0.2</product>
<product>db2:9.7.0.3</product>
<product>db2:9.7.0.3</product>
<product>db2:9.7.0.3</product>
<product>db2:9.7.0.3</product>
<product>db2:9.7.0.3</product>
<product>db2:9.7.0.3</product>
<product>db2:9.7.0.4</product>
<product>db2:9.7.0.4</product>
<product>db2:9.7.0.4</product>
<product>db2:9.7.0.4</product>
<product>db2:9.7.0.4</product>
<product>db2:9.7.0.4</product>
<product>db2:9.7.0.5</product>
<product>db2:9.7.0.5</product>
<product>db2:9.7.0.5</product>
<product>db2:9.7.0.5</product>
<product>db2:9.7.0.5</product>
<product>db2:9.7.0.5</product>
<product>db2:9.7.0.6</product>
<product>db2:9.7.0.6</product>
<product>db2:9.7.0.6</product>
<product>db2:9.7.0.6</product>
<product>db2:9.7.0.6</product>
<product>db2:9.7.0.6</product>
<product>db2:9.7.0.7</product>
<product>db2:9.7.0.7</product>
<product>db2:9.7.0.7</product>
<product>db2:9.7.0.7</product>
<product>db2:9.7.0.7</product>
<product>db2:9.7.0.7</product>
<product>db2:9.7.0.8</product>
<product>db2:9.7.0.8</product>
<product>db2:9.7.0.8</product>
<product>db2:9.7.0.8</product>
<product>db2:9.7.0.8</product>
<product>db2:9.7.0.8</product>
<product>db2:9.7.0.9</product>
<product>db2:9.7.0.9</product>
<product>db2:9.7.0.9</product>
<product>db2:9.7.0.9</product>
<product>db2:9.7.0.9</product>
<product>db2:9.7.0.9</product>
<product>db2:9.7.0.10</product>
<product>db2:9.7.0.10</product>
<product>db2:9.7.0.10</product>
<product>db2:9.7.0.10</product>
<product>db2:9.7.0.10</product>
<product>db2:9.7.0.10</product>
<product>db2:9.7.0.11</product>
<product>db2:9.7.0.11</product>
<product>db2:9.7.0.11</product>
<product>db2:9.7.0.11</product>
<product>db2:9.7.0.11</product>
<product>db2:9.7.0.11</product>
<product>db2:10.1</product>
<product>db2:10.1</product>
<product>db2:10.1</product>
<product>db2:10.1</product>
<product>db2:10.1</product>
<product>db2:10.1</product>
<product>db2:10.1.0.1</product>
<product>db2:10.1.0.1</product>
<product>db2:10.1.0.1</product>
<product>db2:10.1.0.1</product>
<product>db2:10.1.0.1</product>
<product>db2:10.1.0.1</product>
<product>db2:10.1.0.2</product>
<product>db2:10.1.0.2</product>
<product>db2:10.1.0.2</product>
<product>db2:10.1.0.2</product>
<product>db2:10.1.0.2</product>
<product>db2:10.1.0.2</product>
<product>db2:10.1.0.3</product>
<product>db2:10.1.0.3</product>
<product>db2:10.1.0.3</product>
<product>db2:10.1.0.3</product>
<product>db2:10.1.0.3</product>
<product>db2:10.1.0.3</product>
<product>db2:10.1.0.4</product>
<product>db2:10.1.0.4</product>
<product>db2:10.1.0.4</product>
<product>db2:10.1.0.4</product>
<product>db2:10.1.0.4</product>
<product>db2:10.1.0.4</product>
<product>db2:10.1.0.5</product>
<product>db2:10.1.0.5</product>
<product>db2:10.1.0.5</product>
<product>db2:10.1.0.5</product>
<product>db2:10.1.0.5</product>
<product>db2:10.1.0.5</product>
<product>db2:10.5</product>
<product>db2:10.5</product>
<product>db2:10.5</product>
<product>db2:10.5</product>
<product>db2:10.5</product>
<product>db2:10.5</product>
<product>db2:10.5.0.1</product>
<product>db2:10.5.0.1</product>
<product>db2:10.5.0.1</product>
<product>db2:10.5.0.1</product>
<product>db2:10.5.0.1</product>
<product>db2:10.5.0.1</product>
<product>db2:10.5.0.2</product>
<product>db2:10.5.0.2</product>
<product>db2:10.5.0.2</product>
<product>db2:10.5.0.2</product>
<product>db2:10.5.0.2</product>
<product>db2:10.5.0.2</product>
<product>db2:10.5.0.3</product>
<product>db2:10.5.0.3</product>
<product>db2:10.5.0.3</product>
<product>db2:10.5.0.3</product>
<product>db2:10.5.0.3</product>
<product>db2:10.5.0.3</product>
<product>db2:10.5.0.4</product>
<product>db2:10.5.0.4</product>
<product>db2:10.5.0.4</product>
<product>db2:10.5.0.4</product>
<product>db2:10.5.0.4</product>
<product>db2:10.5.0.4</product>
<product>db2:10.5.0.5</product>
<product>db2:10.5.0.5</product>
<product>db2:10.5.0.5</product>
<product>db2:10.5.0.5</product>
<product>db2:10.5.0.5</product>
<product>db2:10.5.0.5</product>
<product>db2:10.5.0.6</product>
<product>db2:10.5.0.6</product>
<product>db2:10.5.0.6</product>
<product>db2:10.5.0.6</product>
<product>db2:10.5.0.6</product>
<product>db2:10.5.0.6</product>
<product>db2:10.5.0.7</product>
<product>db2:10.5.0.7</product>
<product>db2:10.5.0.7</product>
<product>db2:10.5.0.7</product>
<product>db2:10.5.0.7</product>
<product>db2:10.5.0.7</product>
<product>db2:11.1.0.0</product>
<product>db2:11.1.0.0</product>
<product>db2:11.1.0.0</product>
<product>db2:11.1.0.0</product>
<product>db2:11.1.0.0</product>
<product>db2:11.1.0.0</product>
<product>db2_connect:9.7</product>
<product>db2_connect:9.7</product>
<product>db2_connect:9.7</product>
<product>db2_connect:9.7.0.1</product>
<product>db2_connect:9.7.0.1</product>
<product>db2_connect:9.7.0.1</product>
<product>db2_connect:9.7.0.2</product>
<product>db2_connect:9.7.0.2</product>
<product>db2_connect:9.7.0.2</product>
<product>db2_connect:9.7.0.3</product>
<product>db2_connect:9.7.0.3</product>
<product>db2_connect:9.7.0.3</product>
<product>db2_connect:9.7.0.4</product>
<product>db2_connect:9.7.0.4</product>
<product>db2_connect:9.7.0.4</product>
<product>db2_connect:9.7.0.5</product>
<product>db2_connect:9.7.0.5</product>
<product>db2_connect:9.7.0.5</product>
<product>db2_connect:9.7.0.6</product>
<product>db2_connect:9.7.0.6</product>
<product>db2_connect:9.7.0.6</product>
<product>db2_connect:9.7.0.7</product>
<product>db2_connect:9.7.0.7</product>
<product>db2_connect:9.7.0.7</product>
<product>db2_connect:9.7.0.8</product>
<product>db2_connect:9.7.0.8</product>
<product>db2_connect:9.7.0.8</product>
<product>db2_connect:9.7.0.9</product>
<product>db2_connect:9.7.0.9</product>
<product>db2_connect:9.7.0.9</product>
<product>db2_connect:9.7.0.10</product>
<product>db2_connect:9.7.0.10</product>
<product>db2_connect:9.7.0.10</product>
<product>db2_connect:9.7.0.11</product>
<product>db2_connect:9.7.0.11</product>
<product>db2_connect:9.7.0.11</product>
<product>db2_connect:10.1</product>
<product>db2_connect:10.1</product>
<product>db2_connect:10.1</product>
<product>db2_connect:10.1.0.1</product>
<product>db2_connect:10.1.0.1</product>
<product>db2_connect:10.1.0.1</product>
<product>db2_connect:10.1.0.2</product>
<product>db2_connect:10.1.0.2</product>
<product>db2_connect:10.1.0.2</product>
<product>db2_connect:10.1.0.3</product>
<product>db2_connect:10.1.0.3</product>
<product>db2_connect:10.1.0.3</product>
<product>db2_connect:10.1.0.4</product>
<product>db2_connect:10.1.0.4</product>
<product>db2_connect:10.1.0.4</product>
<product>db2_connect:10.1.0.5</product>
<product>db2_connect:10.1.0.5</product>
<product>db2_connect:10.1.0.5</product>
<product>db2_connect:10.5</product>
<product>db2_connect:10.5</product>
<product>db2_connect:10.5</product>
<product>db2_connect:10.5.0.1</product>
<product>db2_connect:10.5.0.1</product>
<product>db2_connect:10.5.0.1</product>
<product>db2_connect:10.5.0.2</product>
<product>db2_connect:10.5.0.2</product>
<product>db2_connect:10.5.0.2</product>
<product>db2_connect:10.5.0.3</product>
<product>db2_connect:10.5.0.3</product>
<product>db2_connect:10.5.0.3</product>
<product>db2_connect:10.5.0.4</product>
<product>db2_connect:10.5.0.4</product>
<product>db2_connect:10.5.0.4</product>
<product>db2_connect:10.5.0.5</product>
<product>db2_connect:10.5.0.5</product>
<product>db2_connect:10.5.0.5</product>
<product>db2_connect:10.5.0.6</product>
<product>db2_connect:10.5.0.6</product>
<product>db2_connect:10.5.0.6</product>
<product>db2_connect:10.5.0.7</product>
<product>db2_connect:10.5.0.7</product>
<product>db2_connect:10.5.0.7</product>
<product>db2_connect:11.1.0.0</product>
<product>db2_connect:11.1.0.0</product>
<product>db2_connect:11.1.0.0</product>
</cve>
<cve id="CVE-2016-5994" level="LOW">
<product>infosphere_information_server:11.5</product>
</cve>
<cve id="CVE-2016-5992" level="MEDIUM">
<product>sterling_connect%3adirect:4.5</product>
<product>sterling_connect%3adirect:4.5.01</product>
<product>sterling_connect%3adirect:4.6</product>
<product>sterling_connect%3adirect:4.7</product>
</cve>
<cve id="CVE-2016-5991" level="MEDIUM">
<product>sterling_connect%3adirect:4.5</product>
<product>sterling_connect%3adirect:4.5.01</product>
<product>sterling_connect%3adirect:4.6</product>
<product>sterling_connect%3adirect:4.7</product>
</cve>
<cve id="CVE-2016-5990" level="LOW">
<product>security_privileged_identity_manager:2.0.2</product>
<product>security_privileged_identity_manager:2.1</product>
</cve>
<cve id="CVE-2016-9889" level="MEDIUM">
<product>tikiwiki_cms%2fgroupware:12.0</product>
<product>tikiwiki_cms%2fgroupware:12.1</product>
<product>tikiwiki_cms%2fgroupware:12.2</product>
<product>tikiwiki_cms%2fgroupware:12.3</product>
<product>tikiwiki_cms%2fgroupware:12.4</product>
<product>tikiwiki_cms%2fgroupware:12.5</product>
<product>tikiwiki_cms%2fgroupware:12.6</product>
<product>tikiwiki_cms%2fgroupware:12.7</product>
<product>tikiwiki_cms%2fgroupware:12.8</product>
<product>tikiwiki_cms%2fgroupware:12.9</product>
<product>tikiwiki_cms%2fgroupware:15.0</product>
<product>tikiwiki_cms%2fgroupware:15.1</product>
<product>tikiwiki_cms%2fgroupware:15.2</product>
<product>tikiwiki_cms%2fgroupware:16.0</product>
</cve>
<cve id="CVE-2016-9888" level="MEDIUM">
<product>libgsf:1.14.40</product>
</cve>
<cve id="CVE-2016-9885" level="LOW">
<product>gemfire_for_pivotal_cloud_foundry:1.6.0.0</product>
<product>gemfire_for_pivotal_cloud_foundry:1.6.1</product>
<product>gemfire_for_pivotal_cloud_foundry:1.6.2</product>
<product>gemfire_for_pivotal_cloud_foundry:1.6.3.0</product>
<product>gemfire_for_pivotal_cloud_foundry:1.6.4.0</product>
<product>gemfire_for_pivotal_cloud_foundry:1.7.0.0</product>
</cve>
<cve id="CVE-2016-9880" level="LOW">
<product>gemfire_for_pivotal_cloud_foundry:1.7.0</product>
</cve>
<cve id="CVE-2016-9882" level="LOW">
<product>capi-release:1.11.0</product>
<product>cf-release:249.0</product>
</cve>
<cve id="CVE-2016-5372" level="MEDIUM">
<product>snap_creator_framework:4.3.0</product>
</cve>
<cve id="CVE-2016-3469" level="LOW">
<product>siebel_core-server_framework:8.1.1</product>
<product>siebel_core-server_framework:8.2.2</product>
<product>siebel_core-server_framework:2014</product>
<product>siebel_core-server_framework:2015</product>
<product>siebel_core-server_framework:2016</product>
</cve>
<cve id="CVE-2016-5374" level="LOW">
<product>data_ontap:9.0</product>
<product>data_ontap:9.1</product>
</cve>
<cve id="CVE-2016-2970" level="LOW">
<product>sametime:8.5.2.0</product>
<product>sametime:8.5.2.1</product>
<product>sametime:9.0.0.0</product>
<product>sametime:9.0.0.1</product>
<product>sametime:9.0.1</product>
</cve>
<cve id="CVE-2016-7924" level="LOW">
<product>tcpdump:4.8.1</product>
</cve>
<cve id="CVE-2016-2972" level="LOW">
<product>sametime:8.5.2.0</product>
<product>sametime:8.5.2.1</product>
<product>sametime:9.0.0.0</product>
<product>sametime:9.0.0.1</product>
<product>sametime:9.0.1</product>
</cve>
<cve id="CVE-2016-2973" level="MEDIUM">
<product>sametime:8.5.2.0</product>
<product>sametime:8.5.2.1</product>
<product>sametime:9.0.0.0</product>
<product>sametime:9.0.0.1</product>
<product>sametime:9.0.1</product>
</cve>
<cve id="CVE-2016-9081" level="LOW">
<product>joomla%21:3.4.4</product>
<product>joomla%21:3.4.5</product>
<product>joomla%21:3.4.6</product>
<product>joomla%21:3.4.7</product>
<product>joomla%21:3.4.8</product>
<product>joomla%21:3.4.8</product>
<product>joomla%21:3.5.0</product>
<product>joomla%21:3.5.0</product>
<product>joomla%21:3.5.0</product>
<product>joomla%21:3.5.0</product>
<product>joomla%21:3.5.0</product>
<product>joomla%21:3.5.0</product>
<product>joomla%21:3.5.0</product>
<product>joomla%21:3.5.0</product>
<product>joomla%21:3.5.0</product>
<product>joomla%21:3.5.0</product>
<product>joomla%21:3.5.1</product>
<product>joomla%21:3.5.1</product>
<product>joomla%21:3.5.1</product>
<product>joomla%21:3.6.0</product>
<product>joomla%21:3.6.0</product>
<product>joomla%21:3.6.0</product>
<product>joomla%21:3.6.0</product>
<product>joomla%21:3.6.0</product>
<product>joomla%21:3.6.0</product>
<product>joomla%21:3.6.1</product>
<product>joomla%21:3.6.1</product>
<product>joomla%21:3.6.1</product>
<product>joomla%21:3.6.2</product>
<product>joomla%21:3.6.3</product>
<product>joomla%21:3.6.3</product>
<product>joomla%21:3.6.3</product>
<product>joomla%21:3.6.3</product>
</cve>
<cve id="CVE-2016-2975" level="MEDIUM">
<product>sametime:8.5.2.0</product>
<product>sametime:8.5.2.1</product>
<product>sametime:9.0.0.0</product>
<product>sametime:9.0.0.1</product>
<product>sametime:9.0.1</product>
</cve>
<cve id="CVE-2016-2976" level="LOW">
<product>sametime:8.5.2.0</product>
<product>sametime:8.5.2.1</product>
<product>sametime:9.0.0.0</product>
<product>sametime:9.0.0.1</product>
<product>sametime:9.0.1</product>
</cve>
<cve id="CVE-2016-9082" level="MEDIUM">
<product>cairo:1.14.6</product>
</cve>
<cve id="CVE-2016-2978" level="LOW">
<product>sametime:8.5.2.0</product>
<product>sametime:8.5.2.1</product>
<product>sametime:9.0.0.0</product>
<product>sametime:9.0.0.1</product>
<product>sametime:9.0.1</product>
</cve>
<cve id="CVE-2016-2979" level="MEDIUM">
<product>sametime:8.5.2.0</product>
<product>sametime:8.5.2.1</product>
<product>sametime:9.0.0.0</product>
<product>sametime:9.0.0.1</product>
<product>sametime:9.0.1</product>
</cve>
<cve id="CVE-2016-7926" level="LOW">
<product>tcpdump:4.8.1</product>
</cve>
<cve id="CVE-2016-7922" level="LOW">
<product>tcpdump:4.8.1</product>
</cve>
<cve id="CVE-2016-0203" level="LOW">
<product>cloud_orchestrator:2.4</product>
<product>cloud_orchestrator:2.4.0.1</product>
<product>cloud_orchestrator:2.4.0.2</product>
<product>cloud_orchestrator:2.4.0.3</product>
<product>cloud_orchestrator:2.5</product>
<product>cloud_orchestrator:2.5.01</product>
<product>smartcloud_orchestrator:2.3</product>
<product>smartcloud_orchestrator:2.3.0.1</product>
</cve>
<cve id="CVE-2016-2354" level="LOW">
<product>bluedriver:6.3.2</product>
</cve>
<cve id="CVE-2016-2355" level="LOW">
<product>dotcms:3.3.1</product>
</cve>
<cve id="CVE-2016-2350" level="MEDIUM">
<product>file_transfer_appliance:9_11_210</product>
</cve>
<cve id="CVE-2016-2351" level="LOW">
<product>file_transfer_appliance:9_11_210</product>
</cve>
<cve id="CVE-2016-2352" level="LOW">
<product>file_transfer_appliance:9_11_210</product>
</cve>
<cve id="CVE-2016-2353" level="LOW">
<product>file_transfer_appliance:9_11_210</product>
</cve>
<cve id="CVE-2016-3025" level="LOW">
<product>security_access_manager:9.0.0</product>
<product>security_access_manager:9.0.0.1</product>
<product>security_access_manager:9.0.1.0</product>
<product>security_access_manager_for_mobile:8.0.0.0</product>
<product>security_access_manager_for_mobile:8.0.0.1</product>
<product>security_access_manager_for_mobile:8.0.0.2</product>
<product>security_access_manager_for_mobile:8.0.0.3</product>
<product>security_access_manager_for_mobile:8.0.0.4</product>
<product>security_access_manager_for_mobile:8.0.0.5</product>
<product>security_access_manager_for_mobile:8.0.1</product>
<product>security_access_manager_for_mobile:8.0.1.2</product>
<product>security_access_manager_for_mobile:8.0.1.3</product>
<product>security_access_manager_for_mobile:8.0.1.4</product>
</cve>
<cve id="CVE-2016-3024" level="LOW">
<product>security_access_manager_9.0_firmware:9.0.0</product>
<product>security_access_manager_9.0_firmware:9.0.0.1</product>
<product>security_access_manager_9.0_firmware:9.0.1.0</product>
<product>security_access_manager_for_mobile_8.0_firmware:8.0.0.1</product>
<product>security_access_manager_for_mobile_8.0_firmware:8.0.0.2</product>
<product>security_access_manager_for_mobile_8.0_firmware:8.0.0.3</product>
<product>security_access_manager_for_mobile_8.0_firmware:8.0.0.5</product>
<product>security_access_manager_for_mobile_8.0_firmware:8.0.1.0</product>
<product>security_access_manager_for_mobile_8.0_firmware:8.0.1.2</product>
<product>security_access_manager_for_mobile_8.0_firmware:8.0.1.3</product>
<product>security_access_manager_for_mobile_8.0_firmware:8.0.1.4</product>
<product>security_access_manager_for_web_8.0_firmware:8.0.0.1</product>
<product>security_access_manager_for_web_8.0_firmware:8.0.0.2</product>
<product>security_access_manager_for_web_8.0_firmware:8.0.0.3</product>
<product>security_access_manager_for_web_8.0_firmware:8.0.0.5</product>
<product>security_access_manager_for_web_8.0_firmware:8.0.1.0</product>
<product>security_access_manager_for_web_8.0_firmware:8.0.1.2</product>
<product>security_access_manager_for_web_8.0_firmware:8.0.1.3</product>
<product>security_access_manager_for_web_8.0_firmware:8.0.1.4</product>
</cve>
<cve id="CVE-2016-3027" level="LOW">
<product>security_access_manager_9.0_firmware:9.0.0</product>
<product>security_access_manager_9.0_firmware:9.0.0.1</product>
<product>security_access_manager_9.0_firmware:9.0.1.0</product>
<product>security_access_manager_for_mobile_8.0_firmware:8.0.0.1</product>
<product>security_access_manager_for_mobile_8.0_firmware:8.0.0.2</product>
<product>security_access_manager_for_mobile_8.0_firmware:8.0.0.3</product>
<product>security_access_manager_for_mobile_8.0_firmware:8.0.0.5</product>
<product>security_access_manager_for_mobile_8.0_firmware:8.0.1.0</product>
<product>security_access_manager_for_mobile_8.0_firmware:8.0.1.2</product>
<product>security_access_manager_for_mobile_8.0_firmware:8.0.1.3</product>
<product>security_access_manager_for_mobile_8.0_firmware:8.0.1.4</product>
<product>security_access_manager_for_web_8.0_firmware:8.0.0.1</product>
<product>security_access_manager_for_web_8.0_firmware:8.0.0.2</product>
<product>security_access_manager_for_web_8.0_firmware:8.0.0.3</product>
<product>security_access_manager_for_web_8.0_firmware:8.0.0.5</product>
<product>security_access_manager_for_web_8.0_firmware:8.0.1.0</product>
<product>security_access_manager_for_web_8.0_firmware:8.0.1.2</product>
<product>security_access_manager_for_web_8.0_firmware:8.0.1.3</product>
<product>security_access_manager_for_web_8.0_firmware:8.0.1.4</product>
</cve>
<cve id="CVE-2016-3021" level="LOW">
<product>security_access_manager_9.0_firmware:9.0.0</product>
<product>security_access_manager_9.0_firmware:9.0.0.1</product>
<product>security_access_manager_9.0_firmware:9.0.1.0</product>
<product>security_access_manager_for_mobile_8.0_firmware:8.0.0.1</product>
<product>security_access_manager_for_mobile_8.0_firmware:8.0.0.2</product>
<product>security_access_manager_for_mobile_8.0_firmware:8.0.0.3</product>
<product>security_access_manager_for_mobile_8.0_firmware:8.0.0.5</product>
<product>security_access_manager_for_mobile_8.0_firmware:8.0.1.0</product>
<product>security_access_manager_for_mobile_8.0_firmware:8.0.1.2</product>
<product>security_access_manager_for_mobile_8.0_firmware:8.0.1.3</product>
<product>security_access_manager_for_mobile_8.0_firmware:8.0.1.4</product>
<product>security_access_manager_for_web_7.0_firmware:7.0.0.1</product>
<product>security_access_manager_for_web_7.0_firmware:7.0.0.2</product>
<product>security_access_manager_for_web_7.0_firmware:7.0.0.3</product>
<product>security_access_manager_for_web_7.0_firmware:7.0.0.4</product>
<product>security_access_manager_for_web_7.0_firmware:7.0.0.5</product>
<product>security_access_manager_for_web_7.0_firmware:7.0.0.6</product>
<product>security_access_manager_for_web_7.0_firmware:7.0.0.7</product>
<product>security_access_manager_for_web_7.0_firmware:7.0.0.8</product>
<product>security_access_manager_for_web_7.0_firmware:7.0.0.9</product>
<product>security_access_manager_for_web_7.0_firmware:7.0.0.10</product>
<product>security_access_manager_for_web_7.0_firmware:7.0.0.11</product>
<product>security_access_manager_for_web_7.0_firmware:7.0.0.12</product>
<product>security_access_manager_for_web_7.0_firmware:7.0.0.13</product>
<product>security_access_manager_for_web_7.0_firmware:7.0.0.14</product>
<product>security_access_manager_for_web_7.0_firmware:7.0.0.15</product>
<product>security_access_manager_for_web_7.0_firmware:7.0.0.16</product>
<product>security_access_manager_for_web_8.0_firmware:8.0.0.1</product>
<product>security_access_manager_for_web_8.0_firmware:8.0.0.2</product>
<product>security_access_manager_for_web_8.0_firmware:8.0.0.3</product>
<product>security_access_manager_for_web_8.0_firmware:8.0.0.5</product>
<product>security_access_manager_for_web_8.0_firmware:8.0.1.0</product>
<product>security_access_manager_for_web_8.0_firmware:8.0.1.2</product>
<product>security_access_manager_for_web_8.0_firmware:8.0.1.3</product>
<product>security_access_manager_for_web_8.0_firmware:8.0.1.4</product>
</cve>
<cve id="CVE-2016-3020" level="MEDIUM">
<product>security_access_manager_for_mobile</product>
<product>security_access_manager_9.0_firmware</product>
<product>security_access_manager_for_web_7.0_firmware</product>
<product>security_access_manager_for_web_8.0_firmware</product>
</cve>
<cve id="CVE-2016-3023" level="LOW">
<product>security_access_manager_9.0_firmware:9.0.0</product>
<product>security_access_manager_9.0_firmware:9.0.0.1</product>
<product>security_access_manager_9.0_firmware:9.0.1.0</product>
<product>security_access_manager_for_mobile_8.0_firmware:8.0.0.1</product>
<product>security_access_manager_for_mobile_8.0_firmware:8.0.0.2</product>
<product>security_access_manager_for_mobile_8.0_firmware:8.0.0.3</product>
<product>security_access_manager_for_mobile_8.0_firmware:8.0.0.5</product>
<product>security_access_manager_for_mobile_8.0_firmware:8.0.1.0</product>
<product>security_access_manager_for_mobile_8.0_firmware:8.0.1.2</product>
<product>security_access_manager_for_mobile_8.0_firmware:8.0.1.3</product>
<product>security_access_manager_for_mobile_8.0_firmware:8.0.1.4</product>
<product>security_access_manager_for_web_7.0_firmware:7.0.0.1</product>
<product>security_access_manager_for_web_7.0_firmware:7.0.0.2</product>
<product>security_access_manager_for_web_7.0_firmware:7.0.0.3</product>
<product>security_access_manager_for_web_7.0_firmware:7.0.0.4</product>
<product>security_access_manager_for_web_7.0_firmware:7.0.0.5</product>
<product>security_access_manager_for_web_7.0_firmware:7.0.0.6</product>
<product>security_access_manager_for_web_7.0_firmware:7.0.0.7</product>
<product>security_access_manager_for_web_7.0_firmware:7.0.0.8</product>
<product>security_access_manager_for_web_7.0_firmware:7.0.0.9</product>
<product>security_access_manager_for_web_7.0_firmware:7.0.0.10</product>
<product>security_access_manager_for_web_7.0_firmware:7.0.0.11</product>
<product>security_access_manager_for_web_7.0_firmware:7.0.0.12</product>
<product>security_access_manager_for_web_7.0_firmware:7.0.0.13</product>
<product>security_access_manager_for_web_7.0_firmware:7.0.0.14</product>
<product>security_access_manager_for_web_7.0_firmware:7.0.0.15</product>
<product>security_access_manager_for_web_7.0_firmware:7.0.0.16</product>
<product>security_access_manager_for_web_8.0_firmware:8.0.0.1</product>
<product>security_access_manager_for_web_8.0_firmware:8.0.0.2</product>
<product>security_access_manager_for_web_8.0_firmware:8.0.0.3</product>
<product>security_access_manager_for_web_8.0_firmware:8.0.0.5</product>
<product>security_access_manager_for_web_8.0_firmware:8.0.1.0</product>
<product>security_access_manager_for_web_8.0_firmware:8.0.1.2</product>
<product>security_access_manager_for_web_8.0_firmware:8.0.1.3</product>
<product>security_access_manager_for_web_8.0_firmware:8.0.1.4</product>
</cve>
<cve id="CVE-2016-3022" level="LOW">
<product>security_access_manager_9.0_firmware:9.0.0</product>
<product>security_access_manager_9.0_firmware:9.0.0.1</product>
<product>security_access_manager_9.0_firmware:9.0.1.0</product>
<product>security_access_manager_for_mobile_8.0_firmware:8.0.0.1</product>
<product>security_access_manager_for_mobile_8.0_firmware:8.0.0.2</product>
<product>security_access_manager_for_mobile_8.0_firmware:8.0.0.3</product>
<product>security_access_manager_for_mobile_8.0_firmware:8.0.0.5</product>
<product>security_access_manager_for_mobile_8.0_firmware:8.0.1.0</product>
<product>security_access_manager_for_mobile_8.0_firmware:8.0.1.2</product>
<product>security_access_manager_for_mobile_8.0_firmware:8.0.1.3</product>
<product>security_access_manager_for_mobile_8.0_firmware:8.0.1.4</product>
<product>security_access_manager_for_web_7.0_firmware:7.0.0.1</product>
<product>security_access_manager_for_web_7.0_firmware:7.0.0.2</product>
<product>security_access_manager_for_web_7.0_firmware:7.0.0.3</product>
<product>security_access_manager_for_web_7.0_firmware:7.0.0.4</product>
<product>security_access_manager_for_web_7.0_firmware:7.0.0.5</product>
<product>security_access_manager_for_web_7.0_firmware:7.0.0.6</product>
<product>security_access_manager_for_web_7.0_firmware:7.0.0.7</product>
<product>security_access_manager_for_web_7.0_firmware:7.0.0.8</product>
<product>security_access_manager_for_web_7.0_firmware:7.0.0.9</product>
<product>security_access_manager_for_web_7.0_firmware:7.0.0.10</product>
<product>security_access_manager_for_web_7.0_firmware:7.0.0.11</product>
<product>security_access_manager_for_web_7.0_firmware:7.0.0.12</product>
<product>security_access_manager_for_web_7.0_firmware:7.0.0.13</product>
<product>security_access_manager_for_web_7.0_firmware:7.0.0.14</product>
<product>security_access_manager_for_web_7.0_firmware:7.0.0.15</product>
<product>security_access_manager_for_web_7.0_firmware:7.0.0.16</product>
<product>security_access_manager_for_web_8.0_firmware:8.0.0.1</product>
<product>security_access_manager_for_web_8.0_firmware:8.0.0.2</product>
<product>security_access_manager_for_web_8.0_firmware:8.0.0.3</product>
<product>security_access_manager_for_web_8.0_firmware:8.0.0.5</product>
<product>security_access_manager_for_web_8.0_firmware:8.0.1.0</product>
<product>security_access_manager_for_web_8.0_firmware:8.0.1.2</product>
<product>security_access_manager_for_web_8.0_firmware:8.0.1.3</product>
<product>security_access_manager_for_web_8.0_firmware:8.0.1.4</product>
</cve>
<cve id="CVE-2016-3029" level="MEDIUM">
<product>security_access_manager_9.0_firmware:9.0.0</product>
<product>security_access_manager_9.0_firmware:9.0.0.1</product>
<product>security_access_manager_9.0_firmware:9.0.1.0</product>
<product>security_access_manager_for_mobile_8.0_firmware:8.0.0.1</product>
<product>security_access_manager_for_mobile_8.0_firmware:8.0.0.2</product>
<product>security_access_manager_for_mobile_8.0_firmware:8.0.0.3</product>
<product>security_access_manager_for_mobile_8.0_firmware:8.0.0.5</product>
<product>security_access_manager_for_mobile_8.0_firmware:8.0.1.0</product>
<product>security_access_manager_for_mobile_8.0_firmware:8.0.1.2</product>
<product>security_access_manager_for_mobile_8.0_firmware:8.0.1.3</product>
<product>security_access_manager_for_mobile_8.0_firmware:8.0.1.4</product>
<product>security_access_manager_for_web_8.0_firmware:8.0.0.1</product>
<product>security_access_manager_for_web_8.0_firmware:8.0.0.2</product>
<product>security_access_manager_for_web_8.0_firmware:8.0.0.3</product>
<product>security_access_manager_for_web_8.0_firmware:8.0.0.5</product>
<product>security_access_manager_for_web_8.0_firmware:8.0.1.0</product>
<product>security_access_manager_for_web_8.0_firmware:8.0.1.2</product>
<product>security_access_manager_for_web_8.0_firmware:8.0.1.3</product>
<product>security_access_manager_for_web_8.0_firmware:8.0.1.4</product>
</cve>
<cve id="CVE-2016-6056" level="MEDIUM">
<product>call_center_for_commerce:9.3</product>
<product>call_center_for_commerce:9.4</product>
</cve>
<cve id="CVE-2016-6055" level="MEDIUM">
<product>rational_doors_next_generation:5.0</product>
<product>rational_doors_next_generation:5.0.0</product>
<product>rational_doors_next_generation:5.0.1</product>
<product>rational_doors_next_generation:5.0.2</product>
<product>rational_doors_next_generation:6.0.0</product>
<product>rational_doors_next_generation:6.0.1</product>
<product>rational_doors_next_generation:6.0.2</product>
<product>rational_requirements_composer:4.0.1</product>
<product>rational_requirements_composer:4.0.2</product>
<product>rational_requirements_composer:4.0.3</product>
<product>rational_requirements_composer:4.0.4</product>
<product>rational_requirements_composer:4.0.5</product>
<product>rational_requirements_composer:4.0.6</product>
<product>rational_requirements_composer:4.0.7</product>
</cve>
<cve id="CVE-2016-6054" level="MEDIUM">
<product>jazz_reporting_service:5.0</product>
<product>jazz_reporting_service:5.0.1</product>
<product>jazz_reporting_service:5.0.2</product>
<product>jazz_reporting_service:6.0</product>
<product>jazz_reporting_service:6.0.1</product>
<product>jazz_reporting_service:6.0.2</product>
</cve>
<cve id="CVE-2016-8907" level="LOW">
<product>dotcms:3.3</product>
</cve>
<cve id="CVE-2016-8906" level="LOW">
<product>dotcms:3.3</product>
</cve>
<cve id="CVE-2016-8905" level="LOW">
<product>dotcms:3.3</product>
</cve>
<cve id="CVE-2016-8904" level="LOW">
<product>dotcms:3.3</product>
</cve>
<cve id="CVE-2016-8903" level="LOW">
<product>dotcms:3.3</product>
</cve>
<cve id="CVE-2016-8902" level="LOW">
<product>dotcms:3.3</product>
</cve>
<cve id="CVE-2016-8909" level="MEDIUM">
<product>qemu:-</product>
</cve>
<cve id="CVE-2016-8908" level="LOW">
<product>dotcms:3.3</product>
</cve>
<cve id="CVE-2016-7452" level="LOW">
<product>exponent_cms:2.3.9</product>
</cve>
<cve id="CVE-2016-7453" level="LOW">
<product>exponent_cms:2.3.9</product>
</cve>
<cve id="CVE-2016-7454" level="MEDIUM">
<product>xfinity_gateway_router_dpc3941t_firmware:dpc3941-p20-18-v303r20421733-160413a-cmcst</product>
</cve>
<cve id="CVE-2016-7456" level="LOW">
<product>vsphere_data_protection:5.5.1</product>
<product>vsphere_data_protection:5.5.5</product>
<product>vsphere_data_protection:5.5.6</product>
<product>vsphere_data_protection:5.5.7</product>
<product>vsphere_data_protection:5.5.8</product>
<product>vsphere_data_protection:5.5.9</product>
<product>vsphere_data_protection:5.5.10</product>
<product>vsphere_data_protection:5.5.11</product>
<product>vsphere_data_protection:5.8.0</product>
<product>vsphere_data_protection:5.8.1</product>
<product>vsphere_data_protection:5.8.2</product>
<product>vsphere_data_protection:5.8.3</product>
<product>vsphere_data_protection:5.8.4</product>
<product>vsphere_data_protection:6.0.0</product>
<product>vsphere_data_protection:6.0.1</product>
<product>vsphere_data_protection:6.0.2</product>
<product>vsphere_data_protection:6.0.3</product>
<product>vsphere_data_protection:6.0.4</product>
<product>vsphere_data_protection:6.1.0</product>
<product>vsphere_data_protection:6.1.1</product>
<product>vsphere_data_protection:6.1.2</product>
<product>vsphere_data_protection:6.1.3</product>
</cve>
<cve id="CVE-2016-7457" level="LOW">
<product>vrealize_operations:6.0.0</product>
<product>vrealize_operations:6.1.0</product>
<product>vrealize_operations:6.2.0a</product>
<product>vrealize_operations:6.2.1</product>
<product>vrealize_operations:6.3.0</product>
</cve>
<cve id="CVE-2016-7458" level="LOW">
<product>vsphere_client:5.5</product>
<product>vsphere_client:5.5</product>
<product>vsphere_client:5.5</product>
<product>vsphere_client:5.5</product>
<product>vsphere_client:5.5</product>
<product>vsphere_client:6.0</product>
<product>vsphere_client:6.0</product>
<product>vsphere_client:6.0</product>
<product>vsphere_client:6.0</product>
<product>vsphere_client:6.0</product>
<product>vsphere_client:6.0</product>
<product>vsphere_client:6.0</product>
</cve>
<cve id="CVE-2016-7459" level="LOW">
<product>vcenter_server:5.0</product>
<product>vcenter_server:5.5</product>
<product>vcenter_server:5.5</product>
<product>vcenter_server:5.5</product>
<product>vcenter_server:5.5</product>
<product>vcenter_server:5.5</product>
<product>vcenter_server:6.0</product>
<product>vcenter_server:6.0</product>
<product>vcenter_server:6.0</product>
<product>vcenter_server:6.0</product>
<product>vcenter_server:6.0</product>
<product>vcenter_server:6.0</product>
<product>vcenter_server:6.0</product>
</cve>
<cve id="CVE-2016-6373" level="LOW">
<product>cloud_services_platform_2100:2.0.0_base</product>
</cve>
<cve id="CVE-2016-0226" level="MEDIUM">
<product>informix_dynamic_server:11.70.xcn</product>
</cve>
<cve id="CVE-2016-7907" level="LOW">
<product>qemu</product>
</cve>
<cve id="CVE-2016-7904" level="MEDIUM">
<product>cms_made_simple:2.1.5</product>
</cve>
<cve id="CVE-2016-0225" level="LOW">
<product>websphere_commerce:6.0</product>
<product>websphere_commerce:6.0.0.1</product>
<product>websphere_commerce:6.0.0.2</product>
<product>websphere_commerce:6.0.0.3</product>
<product>websphere_commerce:6.0.0.4</product>
<product>websphere_commerce:6.0.0.5</product>
<product>websphere_commerce:6.0.0.6</product>
<product>websphere_commerce:6.0.0.7</product>
<product>websphere_commerce:6.0.0.8</product>
<product>websphere_commerce:6.0.0.9</product>
<product>websphere_commerce:6.0.0.10</product>
<product>websphere_commerce:6.0.0.11</product>
<product>websphere_commerce:7.0</product>
<product>websphere_commerce:7.0.0.1</product>
<product>websphere_commerce:7.0.0.2</product>
<product>websphere_commerce:7.0.0.3</product>
<product>websphere_commerce:7.0.0.4</product>
<product>websphere_commerce:7.0.0.5</product>
<product>websphere_commerce:7.0.0.6</product>
<product>websphere_commerce:7.0.0.7</product>
<product>websphere_commerce:7.0.0.8</product>
<product>websphere_commerce:7.0.0.9</product>
</cve>
<cve id="CVE-2016-7902" level="LOW">
<product>dotclear:2.10.2</product>
</cve>
<cve id="CVE-2016-0591" level="LOW">
<product>peoplesoft_supply_chain_management_purchasing:9.1</product>
<product>peoplesoft_supply_chain_management_purchasing:9.2</product>
</cve>
<cve id="CVE-2016-0592" level="LOW">
<product>vm_virtualbox:4.3.35</product>
<product>vm_virtualbox:5.0.13</product>
</cve>
<cve id="CVE-2016-0221" level="MEDIUM">
<product>cognos_business_intelligence:10.1.1</product>
<product>cognos_business_intelligence:10.2</product>
<product>cognos_business_intelligence:10.2.1</product>
<product>cognos_business_intelligence:10.2.1.1</product>
<product>cognos_business_intelligence:10.2.2</product>
</cve>
<cve id="CVE-2016-6375" level="MEDIUM">
<product>wireless_lan_controller_software:3.0_base</product>
<product>wireless_lan_controller_software:3.1.59.24</product>
<product>wireless_lan_controller_software:3.1.105.0</product>
<product>wireless_lan_controller_software:3.1.111.0</product>
<product>wireless_lan_controller_software:3.2.78.0</product>
<product>wireless_lan_controller_software:3.2.116.21</product>
<product>wireless_lan_controller_software:3.2.150.6</product>
<product>wireless_lan_controller_software:3.2.150.10</product>
<product>wireless_lan_controller_software:3.2.171.5</product>
<product>wireless_lan_controller_software:3.2.171.6</product>
<product>wireless_lan_controller_software:3.2.185.0</product>
<product>wireless_lan_controller_software:3.2.193.5</product>
<product>wireless_lan_controller_software:3.2.195.10</product>
<product>wireless_lan_controller_software:3.6.0e</product>
<product>wireless_lan_controller_software:4.0.108</product>
<product>wireless_lan_controller_software:4.0.155.0</product>
<product>wireless_lan_controller_software:4.0.155.5</product>
<product>wireless_lan_controller_software:4.0.179.8</product>
<product>wireless_lan_controller_software:4.0.179.11</product>
<product>wireless_lan_controller_software:4.0.196</product>
<product>wireless_lan_controller_software:4.0.206.0</product>
<product>wireless_lan_controller_software:4.0.217.0</product>
<product>wireless_lan_controller_software:4.0.219.0</product>
<product>wireless_lan_controller_software:4.1.171.0</product>
<product>wireless_lan_controller_software:4.1.181.0</product>
<product>wireless_lan_controller_software:4.1.185.0</product>
<product>wireless_lan_controller_software:4.1_base</product>
<product>wireless_lan_controller_software:4.2.61.0</product>
<product>wireless_lan_controller_software:4.2.99.0</product>
<product>wireless_lan_controller_software:4.2.112.0</product>
<product>wireless_lan_controller_software:4.2.117.0</product>
<product>wireless_lan_controller_software:4.2.130.0</product>
<product>wireless_lan_controller_software:4.2.173.0</product>
<product>wireless_lan_controller_software:4.2.174.0</product>
<product>wireless_lan_controller_software:4.2.176.0</product>
<product>wireless_lan_controller_software:4.2.182.0</product>
<product>wireless_lan_controller_software:4.2_base</product>
<product>wireless_lan_controller_software:5.0.148.0</product>
<product>wireless_lan_controller_software:5.0.148.2</product>
<product>wireless_lan_controller_software:5.1.151.0</product>
<product>wireless_lan_controller_software:5.1.152.0</product>
<product>wireless_lan_controller_software:5.1.160.0</product>
<product>wireless_lan_controller_software:5.2.157.0</product>
<product>wireless_lan_controller_software:5.2.169.0</product>
<product>wireless_lan_controller_software:6.0_base</product>
<product>wireless_lan_controller_software:7.0_base</product>
<product>wireless_lan_controller_software:7.1_base</product>
<product>wireless_lan_controller_software:7.2_base</product>
<product>wireless_lan_controller_software:7.3.101.0</product>
<product>wireless_lan_controller_software:7.3.103.8</product>
<product>wireless_lan_controller_software:7.3.112</product>
<product>wireless_lan_controller_software:7.3_base</product>
<product>wireless_lan_controller_software:7.4.1.1</product>
<product>wireless_lan_controller_software:7.4.100</product>
<product>wireless_lan_controller_software:7.4.100.60</product>
<product>wireless_lan_controller_software:7.4.110.0</product>
<product>wireless_lan_controller_software:7.4.121.0</product>
<product>wireless_lan_controller_software:7.4_base</product>
<product>wireless_lan_controller_software:7.5.102.0</product>
<product>wireless_lan_controller_software:7.5.102.11</product>
<product>wireless_lan_controller_software:7.5_base</product>
<product>wireless_lan_controller_software:7.6.1.62</product>
<product>wireless_lan_controller_software:7.6.100.0</product>
<product>wireless_lan_controller_software:7.6.110.0</product>
<product>wireless_lan_controller_software:7.6.120.0</product>
<product>wireless_lan_controller_software:7.6.130.0</product>
<product>wireless_lan_controller_software:8.0.0</product>
<product>wireless_lan_controller_software:8.0.0.30220.385</product>
<product>wireless_lan_controller_software:8.0.72.140</product>
<product>wireless_lan_controller_software:8.0.100</product>
<product>wireless_lan_controller_software:8.0.115.0</product>
<product>wireless_lan_controller_software:8.0.120.0</product>
<product>wireless_lan_controller_software:8.0.121.0</product>
<product>wireless_lan_controller_software:8.1.0</product>
<product>wireless_lan_controller_software:8.1.104.37</product>
<product>wireless_lan_controller_software:8.1.111.0</product>
<product>wireless_lan_controller_software:8.1.122.0</product>
<product>wireless_lan_controller_software:8.1.130.0</product>
<product>wireless_lan_controller_software_6.0:182.0</product>
<product>wireless_lan_controller_software_6.0:188.0</product>
<product>wireless_lan_controller_software_6.0:196.0</product>
<product>wireless_lan_controller_software_6.0:199.4</product>
<product>wireless_lan_controller_software_6.0:202.0</product>
<product>wireless_lan_controller_software_7.0:98.0</product>
<product>wireless_lan_controller_software_7.0:98.218</product>
<product>wireless_lan_controller_software_7.0:116.0</product>
<product>wireless_lan_controller_software_7.0:220.0</product>
<product>wireless_lan_controller_software_7.0:240.0</product>
<product>wireless_lan_controller_software_7.0:250.0</product>
<product>wireless_lan_controller_software_7.0:252.0</product>
<product>wireless_lan_controller_software_7.1:91.0</product>
<product>wireless_lan_controller_software_7.2:103.0</product>
<product>wireless_lan_controller_software_7.4:1.19</product>
<product>wireless_lan_controller_software_7.4:1.54</product>
<product>wireless_lan_controller_software_7.4:140.0</product>
</cve>
<cve id="CVE-2016-0228" level="MEDIUM">
<product>marketing_platform:10.0</product>
</cve>
<cve id="CVE-2016-0229" level="MEDIUM">
<product>marketing_platform:8.6.0.0</product>
<product>marketing_platform:8.6.0.1</product>
<product>marketing_platform:8.6.0.2</product>
<product>marketing_platform:8.6.0.3</product>
<product>marketing_platform:8.6.0.4</product>
<product>marketing_platform:8.6.0.5</product>
<product>marketing_platform:8.6.0.6</product>
<product>marketing_platform:8.6.0.7</product>
<product>marketing_platform:8.6.0.8</product>
<product>marketing_platform:8.6.0.9</product>
<product>marketing_platform:8.6.0.10</product>
<product>marketing_platform:8.6.0.11</product>
<product>marketing_platform:9.0.0.0</product>
<product>marketing_platform:9.0.0.1</product>
<product>marketing_platform:9.0.0.2</product>
<product>marketing_platform:9.0.0.3</product>
<product>marketing_platform:9.0.0.4</product>
<product>marketing_platform:9.1.0.0</product>
<product>marketing_platform:9.1.0.1</product>
<product>marketing_platform:9.1.0.2</product>
<product>marketing_platform:9.1.0.3</product>
<product>marketing_platform:9.1.0.4</product>
<product>marketing_platform:9.1.0.5</product>
<product>marketing_platform:9.1.0.6</product>
<product>marketing_platform:9.1.0.7</product>
<product>marketing_platform:9.1.0.8</product>
<product>marketing_platform:9.1.0.9</product>
<product>marketing_platform:9.1.0.10</product>
<product>marketing_platform:9.1.1.0</product>
<product>marketing_platform:9.1.1.1</product>
<product>marketing_platform:9.1.1.2</product>
<product>marketing_platform:9.1.1.3</product>
<product>marketing_platform:9.1.1.4</product>
<product>marketing_platform:9.1.2.0</product>
</cve>
<cve id="CVE-2016-4903" level="MEDIUM">
<product>olivecart:3.1.2</product>
<product>olivecartpro:3.1.7</product>
</cve>
<cve id="CVE-2016-4902" level="MEDIUM">
<product>the_public_certification_service_for_individuals:2.6</product>
<product>the_public_certification_service_for_individuals_for_windows_7:3.0.1</product>
<product>your_sha256_hashta:3.0.1</product>
</cve>
<cve id="CVE-2016-4901" level="MEDIUM">
<product>e-tax:-</product>
</cve>
<cve id="CVE-2016-4900" level="MEDIUM">
<product>evernote:6.2.1</product>
</cve>
<cve id="CVE-2016-4907" level="MEDIUM">
<product>garoon:3.0.0</product>
<product>garoon:3.0.1</product>
<product>garoon:3.0.2</product>
<product>garoon:3.0.3</product>
<product>garoon:3.1.0</product>
<product>garoon:3.1.1</product>
<product>garoon:3.1.2</product>
<product>garoon:3.1.3</product>
<product>garoon:3.5.0</product>
<product>garoon:3.5.1</product>
<product>garoon:3.5.2</product>
<product>garoon:3.5.3</product>
<product>garoon:3.5.4</product>
<product>garoon:3.5.5</product>
<product>garoon:3.7.0</product>
<product>garoon:3.7.1</product>
<product>garoon:3.7.2</product>
<product>garoon:3.7.3</product>
<product>garoon:3.7.4</product>
<product>garoon:3.7.5</product>
<product>garoon:4.0.0</product>
<product>garoon:4.0.1</product>
<product>garoon:4.0.2</product>
<product>garoon:4.0.3</product>
<product>garoon:4.2.0</product>
<product>garoon:4.2.1</product>
<product>garoon:4.2.2</product>
</cve>
<cve id="CVE-2016-4906" level="MEDIUM">
<product>garoon:3.0.0</product>
<product>garoon:3.0.1</product>
<product>garoon:3.0.2</product>
<product>garoon:3.0.3</product>
<product>garoon:3.1.0</product>
<product>garoon:3.1.1</product>
<product>garoon:3.1.2</product>
<product>garoon:3.1.3</product>
<product>garoon:3.5.0</product>
<product>garoon:3.5.1</product>
<product>garoon:3.5.2</product>
<product>garoon:3.5.3</product>
<product>garoon:3.5.4</product>
<product>garoon:3.5.5</product>
<product>garoon:3.7.0</product>
<product>garoon:3.7.1</product>
<product>garoon:3.7.2</product>
<product>garoon:3.7.3</product>
<product>garoon:3.7.4</product>
<product>garoon:3.7.5</product>
<product>garoon:4.0.0</product>
<product>garoon:4.0.1</product>
<product>garoon:4.0.2</product>
<product>garoon:4.0.3</product>
<product>garoon:4.2.0</product>
<product>garoon:4.2.1</product>
<product>garoon:4.2.2</product>
</cve>
<cve id="CVE-2016-4905" level="LOW">
<product>olivecart:3.1.2</product>
<product>olivecartpro:3.1.7</product>
</cve>
<cve id="CVE-2016-4904" level="MEDIUM">
<product>olivecart:3.1.2</product>
<product>olivecartpro:3.1.7</product>
</cve>
<cve id="CVE-2016-4909" level="MEDIUM">
<product>garoon:3.0.0</product>
<product>garoon:3.0.1</product>
<product>garoon:3.0.2</product>
<product>garoon:3.0.3</product>
<product>garoon:3.1.0</product>
<product>garoon:3.1.1</product>
<product>garoon:3.1.2</product>
<product>garoon:3.1.3</product>
<product>garoon:3.5.0</product>
<product>garoon:3.5.1</product>
<product>garoon:3.5.2</product>
<product>garoon:3.5.3</product>
<product>garoon:3.5.4</product>
<product>garoon:3.5.5</product>
<product>garoon:3.7.0</product>
<product>garoon:3.7.1</product>
<product>garoon:3.7.2</product>
<product>garoon:3.7.3</product>
<product>garoon:3.7.4</product>
<product>garoon:3.7.5</product>
<product>garoon:4.0.0</product>
<product>garoon:4.0.1</product>
<product>garoon:4.0.2</product>
<product>garoon:4.0.3</product>
<product>garoon:4.2.0</product>
<product>garoon:4.2.1</product>
<product>garoon:4.2.2</product>
</cve>
<cve id="CVE-2016-4908" level="LOW">
<product>garoon:3.0.0</product>
<product>garoon:3.0.1</product>
<product>garoon:3.0.2</product>
<product>garoon:3.0.3</product>
<product>garoon:3.1.0</product>
<product>garoon:3.1.1</product>
<product>garoon:3.1.2</product>
<product>garoon:3.1.3</product>
<product>garoon:3.5.0</product>
<product>garoon:3.5.1</product>
<product>garoon:3.5.2</product>
<product>garoon:3.5.3</product>
<product>garoon:3.5.4</product>
<product>garoon:3.5.5</product>
<product>garoon:3.7.0</product>
<product>garoon:3.7.1</product>
<product>garoon:3.7.2</product>
<product>garoon:3.7.3</product>
<product>garoon:3.7.4</product>
<product>garoon:3.7.5</product>
<product>garoon:4.0.0</product>
<product>garoon:4.0.1</product>
<product>garoon:4.0.2</product>
<product>garoon:4.0.3</product>
<product>garoon:4.2.0</product>
<product>garoon:4.2.1</product>
<product>garoon:4.2.2</product>
</cve>
<cve id="CVE-2016-8271" level="LOW">
<product>espace_iad_firmware:v300r002c01spc100</product>
</cve>
<cve id="CVE-2016-8273" level="MEDIUM">
<product>hisuite:4.0.5.300_ove</product>
</cve>
<cve id="CVE-2016-8272" level="LOW">
<product>hisuite:4.0.5.300_ove</product>
</cve>
<cve id="CVE-2016-8275" level="MEDIUM">
<product>anyoffice:v200r006c00</product>
</cve>
<cve id="CVE-2016-8274" level="LOW">
<product>hisuite:4.0.5.300_ove</product>
</cve>
<cve id="CVE-2016-8277" level="LOW">
<product>usg9520:v300r001c01</product>
<product>usg9560:v300r001c01</product>
<product>usg9580:v300r001c01</product>
</cve>
<cve id="CVE-2016-8276" level="MEDIUM">
<product>usg2100:v300r001c00</product>
<product>usg2100:v300r001c10</product>
<product>usg2200:v300r001c00</product>
<product>usg2200:v300r001c10</product>
<product>usg5100:v300r001c00</product>
<product>usg5100:v300r001c10</product>
<product>usg5500:v300r001c00</product>
<product>usg5500:v300r001c10</product>
</cve>
<cve id="CVE-2016-8279" level="MEDIUM">
<product>honor6_firmware:6.9</product>
<product>mate_s_firmware:crr-cl00</product>
<product>mate_s_firmware:crr-cl20</product>
<product>mate_s_firmware:crr-tl00</product>
<product>mate_s_firmware:crr-ul20</product>
<product>p8_firmware:gra-cl00</product>
<product>p8_firmware:gra-tl00</product>
<product>p8_firmware:gra-ul00</product>
<product>p8_firmware:gra-ul10</product>
</cve>
<cve id="CVE-2016-8278" level="LOW">
<product>usg9520:v300r001c01</product>
<product>usg9560:v300r001c01</product>
<product>usg9580:v300r001c01</product>
</cve>
<cve id="CVE-2016-10039" level="LOW">
<product>modx_revolution:2.5.1-pl</product>
</cve>
<cve id="CVE-2016-10038" level="LOW">
<product>modx_revolution:2.5.1-pl</product>
</cve>
<cve id="CVE-2016-10037" level="LOW">
<product>modx_revolution:2.5.1-pl</product>
</cve>
<cve id="CVE-2016-10034" level="LOW">
<product>zend-mail:2.4.10</product>
<product>zend-mail:2.5.0</product>
<product>zend-mail:2.5.1</product>
<product>zend-mail:2.5.2</product>
<product>zend-mail:2.6.0</product>
<product>zend-mail:2.6.1</product>
<product>zend-mail:2.6.2</product>
<product>zend-mail:2.7.0</product>
<product>zend-mail:2.7.1</product>
<product>zend_framework:2.4.10</product>
</cve>
<cve id="CVE-2016-10033" level="LOW">
<product>phpmailer:5.2.17</product>
</cve>
<cve id="CVE-2016-10031" level="MEDIUM">
<product>wampserver:3.0.6</product>
</cve>
<cve id="CVE-2016-10030" level="HIGH">
<product>slurm:15.08.12</product>
<product>slurm:16.05.0</product>
<product>slurm:16.05.0</product>
<product>slurm:16.05.0</product>
<product>slurm:16.05.0</product>
<product>slurm:16.05.0</product>
<product>slurm:16.05.1</product>
<product>slurm:16.05.2</product>
<product>slurm:16.05.3</product>
<product>slurm:16.05.4</product>
<product>slurm:16.05.5</product>
<product>slurm:16.05.6</product>
<product>slurm:17.02.0</product>
<product>slurm:17.02.0</product>
<product>slurm:17.02.0</product>
</cve>
<cve id="CVE-2016-10521" level="LOW">
<product>jshamcrest</product>
</cve>
<cve id="CVE-2016-10520" level="LOW">
<product>jadedown</product>
</cve>
<cve id="CVE-2016-10525" level="LOW">
<product>hapi-auth-jwt2:5.1.1</product>
</cve>
<cve id="CVE-2016-10527" level="LOW">
<product>riot-compiler:2.3.21</product>
</cve>
<cve id="CVE-2016-4362" level="LOW">
<product>insight_control_server_deployment:-</product>
</cve>
<cve id="CVE-2016-2509" level="MEDIUM">
<product>hirschmann_l2b:-</product>
<product>hirschmann_firmware:05.3.06</product>
<product>hirschmann_firmware:09.0.05</product>
</cve>
<cve id="CVE-2016-1319" level="LOW">
<product>unified_communications_manager:9.1%5c%282.10000.28%5c%29</product>
<product>unified_communications_manager:10.5%5c%282.10000.5%5c%29</product>
<product>unified_communications_manager:10.5%5c%282.12901.1%5c%29</product>
<product>unified_communications_manager:11.0%5c%281.10000.10%5c%29</product>
<product>unified_communications_manager_im_and_presence_service:10.5%5c%282%5c%29</product>
<product>unified_contact_center_express:11.0%5c%281%5c%29</product>
<product>unity_connection:10.5%5c%282%5c%29</product>
</cve>
<cve id="CVE-2016-1318" level="MEDIUM">
<product>application_policy_infrastructure_controller_enterprise_module:1.1_base</product>
</cve>
<cve id="CVE-2016-1315" level="LOW">
<product>email_security_appliance_firmeware:9.1.0-032</product>
<product>email_security_appliance_firmeware:9.5.0-201</product>
<product>email_security_appliance_firmeware:9.6.0-051</product>
<product>email_security_appliance_firmeware:9.7.0-125</product>
<product>email_security_appliance_firmeware:9.7.0-782</product>
</cve>
<cve id="CVE-2016-1314" level="MEDIUM">
<product>unified_communications_domain_manager:8.1%5c%28.1%5c%29</product>
</cve>
<cve id="CVE-2016-1317" level="LOW">
<product>unified_communications_manager:11.5%5c%280.98000.480%5c%29</product>
</cve>
<cve id="CVE-2016-1316" level="LOW">
<product>telepresence_video_communication_server_software:x8.1.1</product>
<product>telepresence_video_communication_server_software:x8.1.2</product>
<product>telepresence_video_communication_server_software:x8.1_base</product>
<product>telepresence_video_communication_server_software:x8.2.1</product>
<product>telepresence_video_communication_server_software:x8.2.2</product>
<product>telepresence_video_communication_server_software:x8.2_base</product>
<product>telepresence_video_communication_server_software:x8.5.0</product>
<product>telepresence_video_communication_server_software:x8.5.1</product>
<product>telepresence_video_communication_server_software:x8.5.2</product>
<product>telepresence_video_communication_server_software:x8.5.3</product>
<product>telepresence_video_communication_server_software:x8.6.0</product>
<product>telepresence_video_communication_server_software:x8.6.1</product>
<product>telepresence_video_communication_server_software:x8.7_base</product>
</cve>
<cve id="CVE-2016-1311" level="MEDIUM">
<product>jabber_guest:10.6.8</product>
</cve>
<cve id="CVE-2016-1310" level="MEDIUM">
<product>unity_connection:11.5%5c%280.199%5c%29</product>
</cve>
<cve id="CVE-2016-1313" level="LOW">
<product>ucs_invicta_c3124sa_appliance:4.3.1</product>
<product>ucs_invicta_c3124sa_appliance:4.5.0</product>
<product>ucs_invicta_c3124sa_appliance:5.0.1</product>
</cve>
<cve id="CVE-2016-1312" level="LOW">
<product>asa_5500_csc-ssm_firmware:6.6.1125.0</product>
</cve>
<cve id="CVE-2016-10503" level="LOW">
<product>sametime:8.5.2.0</product>
<product>sametime:8.5.2.1</product>
<product>sametime:9.0.0.0</product>
<product>sametime:9.0.0.1</product>
<product>sametime:9.0.1</product>
</cve>
<cve id="CVE-2016-10501" level="LOW">
<product>fsm9055_firmware:-</product>
<product>mdm9206_firmware:-</product>
<product>mdm9607_firmware:-</product>
<product>mdm9635m_firmware:-</product>
<product>mdm9655_firmware:-</product>
<product>msm8909w_firmware:-</product>
<product>sd_205_firmware:-</product>
<product>sd_210_firmware:-</product>
<product>sd_212_firmware:-</product>
<product>sd_400_firmware:-</product>
<product>sd_410_firmware:-</product>
<product>sd_412_firmware:-</product>
<product>sd_415_firmware:-</product>
<product>sd_425_firmware:-</product>
<product>sd_430_firmware:-</product>
<product>sd_450_firmware:-</product>
<product>sd_615_firmware:-</product>
<product>sd_616_firmware:-</product>
<product>sd_617_firmware:-</product>
<product>sd_625_firmware:-</product>
<product>sd_650_firmware:-</product>
<product>sd_652_firmware:-</product>
<product>sd_800_firmware:-</product>
<product>sd_808_firmware:-</product>
<product>sd_810_firmware:-</product>
<product>sd_835_firmware:-</product>
</cve>
<cve id="CVE-2016-10055" level="MEDIUM">
<product>imagemagick:6.9.5-7</product>
</cve>
<cve id="CVE-2016-10054" level="MEDIUM">
<product>imagemagick:6.9.5-7</product>
</cve>
<cve id="CVE-2016-10505" level="MEDIUM">
<product>openjpeg:2.1.2</product>
</cve>
<cve id="CVE-2016-10056" level="MEDIUM">
<product>imagemagick:6.9.5-7</product>
</cve>
<cve id="CVE-2016-5417" level="LOW">
<product>glibc:2.23</product>
</cve>
<cve id="CVE-2016-5414" level="LOW">
<product>freeipa:4.4.0</product>
</cve>
<cve id="CVE-2016-5411" level="LOW">
<product>quickstart_cloud_installer:0.9</product>
</cve>
<cve id="CVE-2016-6268" level="LOW">
<product>smart_protection_server:2.5</product>
<product>smart_protection_server:2.6</product>
<product>smart_protection_server:3.0</product>
</cve>
<cve id="CVE-2016-6269" level="LOW">
<product>smart_protection_server:2.5</product>
<product>smart_protection_server:2.6</product>
<product>smart_protection_server:3.0</product>
</cve>
<cve id="CVE-2016-6264" level="LOW">
<product>uclibc-ng:1.0.15</product>
</cve>
<cve id="CVE-2016-6265" level="MEDIUM">
<product>mupdf:1.9</product>
<product>leap:42.1</product>
<product>opensuse:13.2</product>
</cve>
<cve id="CVE-2016-6266" level="LOW">
<product>smart_protection_server:2.5</product>
<product>smart_protection_server:2.6</product>
<product>smart_protection_server:3.0</product>
</cve>
<cve id="CVE-2016-6267" level="LOW">
<product>smart_protection_server:2.5</product>
<product>smart_protection_server:2.6</product>
<product>smart_protection_server:3.0</product>
</cve>
<cve id="CVE-2016-6263" level="LOW">
<product>libidn:1.32</product>
</cve>
<cve id="CVE-2016-6199" level="LOW">
<product>gradle:2.12</product>
</cve>
<cve id="CVE-2016-6192" level="MEDIUM">
<product>p8_smartphone_firmware:gra-cl00c92b350</product>
</cve>
<cve id="CVE-2016-6193" level="MEDIUM">
<product>p8_smartphone_firmware:gra-cl00c92b350</product>
</cve>
<cve id="CVE-2016-6190" level="LOW">
<product>sogo:2.3.11</product>
<product>sogo:3.0.0</product>
<product>sogo:3.0.0</product>
<product>sogo:3.0.0</product>
<product>sogo:3.0.0</product>
<product>sogo:3.0.0</product>
<product>sogo:3.0.0</product>
<product>sogo:3.0.1</product>
<product>sogo:3.0.2</product>
<product>sogo:3.1.0</product>
</cve>
<cve id="CVE-2016-6191" level="MEDIUM">
<product>sogo:3.1.2</product>
</cve>
<cve id="CVE-2016-6195" level="LOW">
<product>vbulletin:4.2.2</product>
<product>vbulletin:4.2.3</product>
</cve>
<cve id="CVE-2016-8602" level="MEDIUM">
<product>ghostscript:9.20</product>
</cve>
<cve id="CVE-2016-5515" level="LOW">
<product>agile_product_lifecycle_management_framework:9.3.4</product>
<product>agile_product_lifecycle_management_framework:9.3.5</product>
</cve>
<cve id="CVE-2016-6993" level="LOW">
<product>acrobat:11.0.17</product>
<product>acrobat_dc:15.006.30201</product>
<product>acrobat_dc:15.017.20053</product>
<product>acrobat_reader_dc:15.006.30201</product>
<product>acrobat_reader_dc:15.017.20053</product>
<product>reader:11.0.17</product>
</cve>
<cve id="CVE-2016-6996" level="LOW">
<product>acrobat:11.0.17</product>
<product>acrobat_dc:15.006.30201</product>
<product>acrobat_dc:15.017.20053</product>
<product>acrobat_reader_dc:15.006.30201</product>
<product>acrobat_reader_dc:15.017.20053</product>
<product>reader:11.0.17</product>
</cve>
<cve id="CVE-2016-6997" level="LOW">
<product>acrobat:11.0.17</product>
<product>acrobat_dc:15.006.30201</product>
<product>acrobat_dc:15.017.20053</product>
<product>acrobat_reader_dc:15.006.30201</product>
<product>acrobat_reader_dc:15.017.20053</product>
<product>reader:11.0.17</product>
</cve>
<cve id="CVE-2016-6994" level="LOW">
<product>acrobat:11.0.17</product>
<product>acrobat_dc:15.006.30201</product>
<product>acrobat_dc:15.017.20053</product>
<product>acrobat_reader_dc:15.006.30201</product>
<product>acrobat_reader_dc:15.017.20053</product>
<product>reader:11.0.17</product>
</cve>
<cve id="CVE-2016-6995" level="LOW">
<product>acrobat:11.0.17</product>
<product>acrobat_dc:15.006.30201</product>
<product>acrobat_dc:15.017.20053</product>
<product>acrobat_reader_dc:15.006.30201</product>
<product>acrobat_reader_dc:15.017.20053</product>
<product>reader:11.0.17</product>
</cve>
<cve id="CVE-2016-6998" level="LOW">
<product>acrobat:11.0.17</product>
<product>acrobat_dc:15.006.30201</product>
<product>acrobat_dc:15.017.20053</product>
<product>acrobat_reader_dc:15.006.30201</product>
<product>acrobat_reader_dc:15.017.20053</product>
<product>reader:11.0.17</product>
</cve>
<cve id="CVE-2016-6999" level="LOW">
<product>acrobat:11.0.17</product>
<product>acrobat_dc:15.006.30201</product>
<product>acrobat_dc:15.017.20053</product>
<product>acrobat_reader_dc:15.006.30201</product>
<product>acrobat_reader_dc:15.017.20053</product>
<product>reader:11.0.17</product>
</cve>
<cve id="CVE-2016-3259" level="MEDIUM">
<product>edge:-</product>
<product>internet_explorer:9</product>
<product>internet_explorer:10</product>
<product>internet_explorer:11</product>
</cve>
<cve id="CVE-2016-0697" level="HIGH">
<product>application_object_library:12.1.3</product>
<product>application_object_library:12.2.3</product>
<product>application_object_library:12.2.4</product>
<product>application_object_library:12.2.5</product>
</cve>
<cve id="CVE-2016-0694" level="MEDIUM">
<product>oracle_berkeley_db:11.2.5.0.32</product>
<product>oracle_berkeley_db:11.2.5.1.29</product>
<product>oracle_berkeley_db:11.2.5.2.42</product>
<product>oracle_berkeley_db:11.2.5.3.28</product>
<product>oracle_berkeley_db:12.1.6.0.35</product>
<product>oracle_berkeley_db:12.1.6.1.26</product>
</cve>
<cve id="CVE-2016-0692" level="MEDIUM">
<product>oracle_berkeley_db:11.2.5.0.32</product>
<product>oracle_berkeley_db:11.2.5.1.29</product>
<product>oracle_berkeley_db:11.2.5.2.42</product>
<product>oracle_berkeley_db:11.2.5.3.28</product>
<product>oracle_berkeley_db:12.1.6.0.35</product>
<product>oracle_berkeley_db:12.1.6.1.26</product>
</cve>
<cve id="CVE-2016-0691" level="LOW">
<product>database:11.2.0.4</product>
<product>database:12.1.0.1</product>
<product>database:12.1.0.2</product>
</cve>
<cve id="CVE-2016-0690" level="LOW">
<product>database:11.2.0.4</product>
<product>database:12.1.0.1</product>
<product>database:12.1.0.2</product>
</cve>
<cve id="CVE-2016-0699" level="LOW">
<product>flexcube_direct_banking:12.0.2</product>
<product>flexcube_direct_banking:12.0.3</product>
</cve>
<cve id="CVE-2016-0698" level="MEDIUM">
<product>peoplesoft_enterprise_peopletools:8.53</product>
<product>peoplesoft_enterprise_peopletools:8.54</product>
<product>peoplesoft_enterprise_peopletools:8.55</product>
</cve>
<cve id="CVE-2016-1070" level="LOW">
<product>acrobat:11.0.15</product>
<product>acrobat_dc:15.006.30121</product>
<product>acrobat_dc:15.010.20060</product>
<product>acrobat_reader_dc:15.006.30121</product>
<product>acrobat_reader_dc:15.010.20060</product>
<product>reader:11.0.15</product>
</cve>
<cve id="CVE-2016-1071" level="LOW">
<product>acrobat:11.0.15</product>
<product>acrobat_dc:15.006.30121</product>
<product>acrobat_dc:15.010.20060</product>
<product>acrobat_reader_dc:15.006.30121</product>
<product>acrobat_reader_dc:15.010.20060</product>
<product>reader:11.0.15</product>
</cve>
<cve id="CVE-2016-1072" level="LOW">
<product>acrobat:11.0.15</product>
<product>acrobat_dc:15.006.30121</product>
<product>acrobat_dc:15.010.20060</product>
<product>acrobat_reader_dc:15.006.30121</product>
<product>acrobat_reader_dc:15.010.20060</product>
<product>reader:11.0.15</product>
</cve>
<cve id="CVE-2016-1073" level="LOW">
<product>acrobat:11.0.15</product>
<product>acrobat_dc:15.006.30121</product>
<product>acrobat_dc:15.010.20060</product>
<product>acrobat_reader_dc:15.006.30121</product>
<product>acrobat_reader_dc:15.010.20060</product>
<product>reader:11.0.15</product>
</cve>
<cve id="CVE-2016-1074" level="LOW">
<product>acrobat:11.0.15</product>
<product>acrobat_dc:15.006.30121</product>
<product>acrobat_dc:15.010.20060</product>
<product>acrobat_reader_dc:15.006.30121</product>
<product>acrobat_reader_dc:15.010.20060</product>
<product>reader:11.0.15</product>
</cve>
<cve id="CVE-2016-1075" level="LOW">
<product>acrobat_dc:15.006.30121</product>
<product>acrobat_dc:15.010.20060</product>
<product>acrobat_reader_dc:15.006.30121</product>
<product>acrobat_reader_dc:15.010.20060</product>
<product>acrobat_xi:11.0.15</product>
<product>reader_xi:11.0.15</product>
</cve>
<cve id="CVE-2016-1076" level="LOW">
<product>acrobat:11.0.15</product>
<product>acrobat_dc:15.006.30121</product>
<product>acrobat_dc:15.010.20060</product>
<product>acrobat_reader_dc:15.006.30121</product>
<product>acrobat_reader_dc:15.010.20060</product>
<product>reader:11.0.15</product>
</cve>
<cve id="CVE-2016-1077" level="LOW">
<product>acrobat:11.0.15</product>
<product>acrobat_dc:15.006.30121</product>
<product>acrobat_dc:15.010.20060</product>
<product>acrobat_reader_dc:15.006.30121</product>
<product>acrobat_reader_dc:15.010.20060</product>
<product>reader:11.0.15</product>
</cve>
<cve id="CVE-2016-1078" level="LOW">
<product>acrobat:11.0.15</product>
<product>acrobat_dc:15.006.30121</product>
<product>acrobat_dc:15.010.20060</product>
<product>acrobat_reader_dc:15.006.30121</product>
<product>acrobat_reader_dc:15.010.20060</product>
<product>reader:11.0.15</product>
</cve>
<cve id="CVE-2016-1079" level="LOW">
<product>acrobat:11.0.15</product>
<product>acrobat_dc:15.006.30121</product>
<product>acrobat_dc:15.010.20060</product>
<product>acrobat_reader_dc:15.006.30121</product>
<product>acrobat_reader_dc:15.010.20060</product>
<product>reader:11.0.15</product>
</cve>
<cve id="CVE-2016-10193" level="LOW">
<product>espeak-ruby:1.0.2</product>
</cve>
<cve id="CVE-2016-10194" level="LOW">
<product>festivaltts4r:</product>
</cve>
<cve id="CVE-2016-9303" level="LOW">
<product>fbx_software_development_kit:2017.0</product>
</cve>
<cve id="CVE-2016-9315" level="LOW">
<product>interscan_web_security_virtual_appliance:6.5</product>
</cve>
<cve id="CVE-2016-9314" level="LOW">
<product>interscan_web_security_virtual_appliance:6.5</product>
</cve>
<cve id="CVE-2016-9317" level="MEDIUM">
<product>libgd:2.2.3</product>
</cve>
<cve id="CVE-2016-9316" level="MEDIUM">
<product>interscan_web_security_virtual_appliance:6.5</product>
</cve>
<cve id="CVE-2016-9319" level="MEDIUM">
<product>mobile_security:9.7</product>
</cve>
<cve id="CVE-2016-9318" level="MEDIUM">
<product>libxml2:2.9.4</product>
</cve>
<cve id="CVE-2016-5310" level="MEDIUM">
<product>advanced_threat_protection:-</product>
<product>csapi:10.0.4</product>
<product>data_center_security_server:-</product>
<product>email_security.cloud:-</product>
<product>endpoint_protection:12.1.4</product>
<product>endpoint_protection:12.1.6</product>
<product>endpoint_protection:12.1.6</product>
<product>endpoint_protection_cloud:-</product>
<product>endpoint_protection_cloud:-</product>
<product>endpoint_protection_for_small_business:-</product>
<product>endpoint_protection_for_small_business:12.1</product>
<product>mail_security_for_domino:8.0.9</product>
<product>mail_security_for_domino:8.1.2</product>
<product>mail_security_for_domino:8.1.3</product>
<product>mail_security_for_microsoft_exchange:6.5.8</product>
<product>mail_security_for_microsoft_exchange:7.0</product>
<product>mail_security_for_microsoft_exchange:7.0.1</product>
<product>mail_security_for_microsoft_exchange:7.0.2</product>
<product>mail_security_for_microsoft_exchange:7.0.3</product>
<product>mail_security_for_microsoft_exchange:7.0.4</product>
<product>mail_security_for_microsoft_exchange:7.5</product>
<product>mail_security_for_microsoft_exchange:7.5.1</product>
<product>mail_security_for_microsoft_exchange:7.5.2</product>
<product>mail_security_for_microsoft_exchange:7.5.3</product>
<product>mail_security_for_microsoft_exchange:7.5.4</product>
<product>messaging_gateway:10.6.1</product>
<product>messaging_gateway_for_service_providers:10.5</product>
<product>messaging_gateway_for_service_providers:10.6</product>
<product>protection_engine:7.0.5</product>
<product>protection_engine:7.5.0</product>
<product>protection_engine:7.5.1</product>
<product>protection_engine:7.5.2</product>
<product>protection_engine:7.5.3</product>
<product>protection_engine:7.5.4</product>
<product>protection_engine:7.5.5</product>
<product>protection_engine:7.8.0</product>
<product>protection_for_sharepoint_servers:6.0.3</product>
<product>protection_for_sharepoint_servers:6.0.4</product>
<product>protection_for_sharepoint_servers:6.0.5</product>
<product>protection_for_sharepoint_servers:6.0.6</product>
<product>protection_for_sharepoint_servers:6.0.7</product>
<product>web_gateway:-</product>
<product>web_security.cloud:-</product>
</cve>
<cve id="CVE-2016-5313" level="LOW">
<product>web_gateway:5.2.2</product>
</cve>
<cve id="CVE-2016-5312" level="LOW">
<product>messaging_gateway:10.6.1</product>
</cve>
<cve id="CVE-2016-5317" level="MEDIUM">
<product>libtiff:4.0.6</product>
<product>leap:42.1</product>
<product>opensuse:13.1</product>
<product>opensuse:13.2</product>
</cve>
<cve id="CVE-2016-5316" level="MEDIUM">
<product>libtiff:4.0.6</product>
<product>leap:42.1</product>
<product>opensuse:13.1</product>
<product>opensuse:13.2</product>
</cve>
<cve id="CVE-2016-5319" level="MEDIUM">
<product>libtiff:4.0.6</product>
</cve>
<cve id="CVE-2016-5318" level="MEDIUM">
<product>libtiff:4.0.6</product>
</cve>
<cve id="CVE-2016-0433" level="MEDIUM">
<product>fusion_middleware:11.1.1.9</product>
</cve>
<cve id="CVE-2016-0432" level="MEDIUM">
<product>fusion_middleware:8.5.0</product>
<product>fusion_middleware:8.5.1</product>
<product>fusion_middleware:8.5.2</product>
</cve>
<cve id="CVE-2016-7422" level="LOW">
<product>qemu:-</product>
</cve>
<cve id="CVE-2016-1339" level="LOW">
<product>unified_computing_system_platform_emulator:2.5%282%29ts4</product>
<product>unified_computing_system_platform_emulator:3.0%282c%29a</product>
<product>unified_computing_system_platform_emulator:3.0%282c%29ts9</product>
</cve>
<cve id="CVE-2016-1338" level="LOW">
<product>telepresence_video_communication_server_software:x8.5.1</product>
<product>telepresence_video_communication_server_software:x8.5.2</product>
</cve>
<cve id="CVE-2016-1210" level="MEDIUM">
<product>105_bank:1.0</product>
<product>105_bank:1.0</product>
<product>105_bank:1.1</product>
</cve>
<cve id="CVE-2016-4995" level="MEDIUM">
<product>foreman:1.11.3</product>
<product>foreman:1.12.0</product>
</cve>
<cve id="CVE-2016-4332" level="MEDIUM">
<product>hdf5:1.8.16</product>
</cve>
<cve id="CVE-2016-1213" level="MEDIUM">
<product>garoon:4.2.1</product>
</cve>
<cve id="CVE-2016-1742" level="LOW">
<product>itunes:12.3.1</product>
</cve>
<cve id="CVE-2016-1215" level="MEDIUM">
<product>garoon:4.2.1</product>
</cve>
<cve id="CVE-2016-2332" level="LOW">
<product>syslink_sl-1000_modular_gateway_firmware:-</product>
</cve>
<cve id="CVE-2016-2333" level="LOW">
<product>syslink_sl-1000_modular_gateway_firmware:-</product>
</cve>
<cve id="CVE-2016-2331" level="LOW">
<product>syslink_sl-1000_modular_gateway_firmware:-</product>
</cve>
<cve id="CVE-2016-2336" level="LOW">
<product>ruby:2.2.2</product>
<product>ruby:2.3.0</product>
</cve>
<cve id="CVE-2016-2337" level="LOW">
<product>ruby:2.2.2</product>
<product>ruby:2.3.0</product>
</cve>
<cve id="CVE-2016-1337" level="MEDIUM">
<product>epc3928_firmware:-</product>
</cve>
<cve id="CVE-2016-2339" level="LOW">
<product>ruby:2.2.2</product>
<product>ruby:2.3.0</product>
</cve>
<cve id="CVE-2016-1336" level="LOW">
<product>epc3928_firmware:-</product>
</cve>
<cve id="CVE-2016-1218" level="LOW">
<product>garoon:4.2.1</product>
</cve>
<cve id="CVE-2016-0614" level="LOW">
<product>business_intelligence_publisher:11.1.1.7.0</product>
<product>business_intelligence_publisher:11.1.1.9.0</product>
<product>business_intelligence_publisher:12.2.1.0.0</product>
</cve>
<cve id="CVE-2016-8869" level="LOW">
<product>joomla%21:3.6.3</product>
</cve>
<cve id="CVE-2016-8860" level="LOW">
<product>tor:0.2.8.8</product>
<product>tor:0.2.9.0</product>
<product>tor:0.2.9.1</product>
<product>tor:0.2.9.2</product>
<product>tor:0.2.9.3</product>
</cve>
<cve id="CVE-2016-3035" level="LOW">
<product>security_appscan_source:9.0.1</product>
<product>security_appscan_source:9.0.2</product>
<product>security_appscan_source:9.0.3</product>
</cve>
<cve id="CVE-2016-8864" level="LOW">
<product>bind:9.0</product>
<product>bind:9.0.0</product>
<product>bind:9.0.0</product>
<product>bind:9.0.0</product>
<product>bind:9.0.0</product>
<product>bind:9.0.0</product>
<product>bind:9.0.0</product>
<product>bind:9.0.1</product>
<product>bind:9.0.1</product>
<product>bind:9.0.1</product>
<product>bind:9.1</product>
<product>bind:9.1.0</product>
<product>bind:9.1.1</product>
<product>bind:9.1.1</product>
<product>bind:9.1.1</product>
<product>bind:9.1.1</product>
<product>bind:9.1.1</product>
<product>bind:9.1.1</product>
<product>bind:9.1.1</product>
<product>bind:9.1.1</product>
<product>bind:9.1.2</product>
<product>bind:9.1.2</product>
<product>bind:9.1.3</product>
<product>bind:9.1.3</product>
<product>bind:9.1.3</product>
<product>bind:9.1.3</product>
<product>bind:9.2.0</product>
<product>bind:9.2.0</product>
<product>bind:9.2.0</product>
<product>bind:9.2.0</product>
<product>bind:9.2.0</product>
<product>bind:9.2.0</product>
<product>bind:9.2.0</product>
<product>bind:9.2.0</product>
<product>bind:9.2.0</product>
<product>bind:9.2.0</product>
<product>bind:9.2.0</product>
<product>bind:9.2.0</product>
<product>bind:9.2.0</product>
<product>bind:9.2.0</product>
<product>bind:9.2.0</product>
<product>bind:9.2.0</product>
<product>bind:9.2.1</product>
<product>bind:9.2.1</product>
<product>bind:9.2.1</product>
<product>bind:9.2.2</product>
<product>bind:9.2.2</product>
<product>bind:9.2.2</product>
<product>bind:9.2.2</product>
<product>bind:9.2.3</product>
<product>bind:9.2.3</product>
<product>bind:9.2.3</product>
<product>bind:9.2.3</product>
<product>bind:9.2.3</product>
<product>bind:9.2.4</product>
<product>bind:9.2.4</product>
<product>bind:9.2.4</product>
<product>bind:9.2.4</product>
<product>bind:9.2.4</product>
<product>bind:9.2.4</product>
<product>bind:9.2.4</product>
<product>bind:9.2.4</product>
<product>bind:9.2.5</product>
<product>bind:9.2.5</product>
<product>bind:9.2.5</product>
<product>bind:9.2.6</product>
<product>bind:9.2.6</product>
<product>bind:9.2.7</product>
<product>bind:9.2.7</product>
<product>bind:9.2.7</product>
<product>bind:9.2.7</product>
<product>bind:9.2.8</product>
<product>bind:9.2.9</product>
<product>bind:9.2.9</product>
<product>bind:9.3</product>
<product>bind:9.3.0</product>
<product>bind:9.3.0</product>
<product>bind:9.3.0</product>
<product>bind:9.3.0</product>
<product>bind:9.3.0</product>
<product>bind:9.3.0</product>
<product>bind:9.3.0</product>
<product>bind:9.3.0</product>
<product>bind:9.3.1</product>
<product>bind:9.3.1</product>
<product>bind:9.3.1</product>
<product>bind:9.3.2</product>
<product>bind:9.3.2</product>
<product>bind:9.3.3</product>
<product>bind:9.3.3</product>
<product>bind:9.3.3</product>
<product>bind:9.3.3</product>
<product>bind:9.3.4</product>
<product>bind:9.3.5</product>
<product>bind:9.3.5</product>
<product>bind:9.3.5</product>
<product>bind:9.3.5</product>
<product>bind:9.3.5-p2</product>
<product>bind:9.3.6</product>
<product>bind:9.3.6</product>
<product>bind:9.4</product>
<product>bind:9.4</product>
<product>bind:9.4</product>
<product>bind:9.4</product>
<product>bind:9.4</product>
<product>bind:9.4</product>
<product>bind:9.4</product>
<product>bind:9.4</product>
<product>bind:9.4</product>
<product>bind:9.4</product>
<product>bind:9.4</product>
<product>bind:9.4</product>
<product>bind:9.4.0</product>
<product>bind:9.4.0</product>
<product>bind:9.4.0</product>
<product>bind:9.4.0</product>
<product>bind:9.4.0</product>
<product>bind:9.4.0</product>
<product>bind:9.4.0</product>
<product>bind:9.4.0</product>
<product>bind:9.4.0</product>
<product>bind:9.4.0</product>
<product>bind:9.4.0</product>
<product>bind:9.4.0</product>
<product>bind:9.4.0</product>
<product>bind:9.4.1</product>
<product>bind:9.4.1p1</product>
<product>bind:9.4.2</product>
<product>bind:9.4.2</product>
<product>bind:9.4.2</product>
<product>bind:9.4.2</product>
<product>bind:9.4.3</product>
<product>bind:9.4.3</product>
<product>bind:9.4.3</product>
<product>bind:9.4.3</product>
<product>bind:9.4.3</product>
<product>bind:9.4.3</product>
<product>bind:9.4.3</product>
<product>bind:9.4.3</product>
<product>bind:9.4.3</product>
<product>bind:9.4.3</product>
<product>bind:9.5</product>
<product>bind:9.5.0</product>
<product>bind:9.5.0</product>
<product>bind:9.5.0</product>
<product>bind:9.5.0</product>
<product>bind:9.5.0</product>
<product>bind:9.5.0</product>
<product>bind:9.5.0</product>
<product>bind:9.5.0</product>
<product>bind:9.5.0</product>
<product>bind:9.5.0</product>
<product>bind:9.5.0</product>
<product>bind:9.5.0</product>
<product>bind:9.5.0</product>
<product>bind:9.5.0</product>
<product>bind:9.5.0</product>
<product>bind:9.5.0</product>
<product>bind:9.5.1</product>
<product>bind:9.5.1</product>
<product>bind:9.5.1</product>
<product>bind:9.5.1</product>
<product>bind:9.5.1</product>
<product>bind:9.5.1</product>
<product>bind:9.5.2</product>
<product>bind:9.5.2</product>
<product>bind:9.5.2</product>
<product>bind:9.5.2</product>
<product>bind:9.5.2</product>
<product>bind:9.5.2</product>
<product>bind:9.5.2</product>
<product>bind:9.5.3</product>
<product>bind:9.5.3</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6.0</product>
<product>bind:9.6.0</product>
<product>bind:9.6.0</product>
<product>bind:9.6.0</product>
<product>bind:9.6.0</product>
<product>bind:9.6.0</product>
<product>bind:9.6.1</product>
<product>bind:9.6.1</product>
<product>bind:9.6.1</product>
<product>bind:9.6.1</product>
<product>bind:9.6.1</product>
<product>bind:9.6.1</product>
<product>bind:9.6.2</product>
<product>bind:9.6.2</product>
<product>bind:9.6.2</product>
<product>bind:9.6.2</product>
<product>bind:9.6.2</product>
<product>bind:9.6.2</product>
<product>bind:9.6.3</product>
<product>bind:9.6.3</product>
<product>bind:9.6.3</product>
<product>bind:9.7.0</product>
<product>bind:9.7.0</product>
<product>bind:9.7.0</product>
<product>bind:9.7.0</product>
<product>bind:9.7.0</product>
<product>bind:9.7.0</product>
<product>bind:9.7.0</product>
<product>bind:9.7.0</product>
<product>bind:9.7.0</product>
<product>bind:9.7.0</product>
<product>bind:9.7.0</product>
<product>bind:9.7.1</product>
<product>bind:9.7.1</product>
<product>bind:9.7.1</product>
<product>bind:9.7.1</product>
<product>bind:9.7.1</product>
<product>bind:9.7.2</product>
<product>bind:9.7.2</product>
<product>bind:9.7.2</product>
<product>bind:9.7.2</product>
<product>bind:9.7.2</product>
<product>bind:9.7.2b1</product>
<product>bind:9.7.2rc1</product>
<product>bind:9.7.3</product>
<product>bind:9.7.3</product>
<product>bind:9.7.3</product>
<product>bind:9.7.3</product>
<product>bind:9.7.4</product>
<product>bind:9.7.4</product>
<product>bind:9.7.4</product>
<product>bind:9.7.4</product>
<product>bind:9.7.5</product>
<product>bind:9.7.5</product>
<product>bind:9.7.5</product>
<product>bind:9.7.5</product>
<product>bind:9.7.6</product>
<product>bind:9.7.6</product>
<product>bind:9.7.6</product>
<product>bind:9.7.6</product>
<product>bind:9.7.6</product>
<product>bind:9.7.7</product>
<product>bind:9.8.0</product>
<product>bind:9.8.0</product>
<product>bind:9.8.0</product>
<product>bind:9.8.0</product>
<product>bind:9.8.0</product>
<product>bind:9.8.0</product>
<product>bind:9.8.0</product>
<product>bind:9.8.1</product>
<product>bind:9.8.1</product>
<product>bind:9.8.1</product>
<product>bind:9.8.1</product>
<product>bind:9.8.1</product>
<product>bind:9.8.1</product>
<product>bind:9.8.2</product>
<product>bind:9.8.2</product>
<product>bind:9.8.2</product>
<product>bind:9.8.2</product>
<product>bind:9.8.3</product>
<product>bind:9.8.3</product>
<product>bind:9.8.3</product>
<product>bind:9.8.3</product>
<product>bind:9.8.3</product>
<product>bind:9.8.4</product>
<product>bind:9.8.5</product>
<product>bind:9.8.5</product>
<product>bind:9.8.5</product>
<product>bind:9.8.5</product>
<product>bind:9.8.5</product>
<product>bind:9.8.5</product>
<product>bind:9.8.5</product>
<product>bind:9.8.6</product>
<product>bind:9.8.6</product>
<product>bind:9.8.6</product>
<product>bind:9.9.0</product>
<product>bind:9.9.0</product>
<product>bind:9.9.0</product>
<product>bind:9.9.0</product>
<product>bind:9.9.0</product>
<product>bind:9.9.0</product>
<product>bind:9.9.0</product>
<product>bind:9.9.0</product>
<product>bind:9.9.0</product>
<product>bind:9.9.0</product>
<product>bind:9.9.1</product>
<product>bind:9.9.1</product>
<product>bind:9.9.1</product>
<product>bind:9.9.1</product>
<product>bind:9.9.1</product>
<product>bind:9.9.2</product>
<product>bind:9.9.2</product>
<product>bind:9.9.2</product>
<product>bind:9.9.3</product>
<product>bind:9.9.3</product>
<product>bind:9.9.3</product>
<product>bind:9.9.3</product>
<product>bind:9.9.3</product>
<product>bind:9.9.3</product>
<product>bind:9.9.3</product>
<product>bind:9.9.4</product>
<product>bind:9.9.5</product>
<product>bind:9.9.6</product>
<product>bind:9.9.6</product>
<product>bind:9.9.7</product>
<product>bind:9.9.7</product>
<product>bind:9.9.7</product>
<product>bind:9.9.7</product>
<product>bind:9.9.8</product>
<product>bind:9.9.8</product>
<product>bind:9.9.8</product>
<product>bind:9.9.8</product>
<product>bind:9.9.8</product>
<product>bind:9.9.8</product>
<product>bind:9.9.8</product>
<product>bind:9.9.8</product>
<product>bind:9.9.8</product>
<product>bind:9.9.8</product>
<product>bind:9.9.8</product>
<product>bind:9.9.9</product>
<product>bind:9.9.9</product>
<product>bind:9.9.9</product>
<product>bind:9.9.9</product>
<product>bind:9.9.9</product>
<product>bind:9.9.9</product>
<product>bind:9.9.9</product>
<product>bind:9.9.9</product>
<product>bind:9.10.0</product>
<product>bind:9.10.0</product>
<product>bind:9.10.0</product>
<product>bind:9.10.0</product>
<product>bind:9.10.0</product>
<product>bind:9.10.0</product>
<product>bind:9.10.0</product>
<product>bind:9.10.0</product>
<product>bind:9.10.0</product>
<product>bind:9.10.1</product>
<product>bind:9.10.1</product>
<product>bind:9.10.1</product>
<product>bind:9.10.1</product>
<product>bind:9.10.1</product>
<product>bind:9.10.1</product>
<product>bind:9.10.1</product>
<product>bind:9.10.2</product>
<product>bind:9.10.2</product>
<product>bind:9.10.2</product>
<product>bind:9.10.2</product>
<product>bind:9.10.2</product>
<product>bind:9.10.2</product>
<product>bind:9.10.2</product>
<product>bind:9.10.3</product>
<product>bind:9.10.3</product>
<product>bind:9.10.3</product>
<product>bind:9.10.3</product>
<product>bind:9.10.3</product>
<product>bind:9.10.3</product>
<product>bind:9.10.3</product>
<product>bind:9.10.4</product>
<product>bind:9.10.4</product>
<product>bind:9.10.4</product>
<product>bind:9.10.4</product>
<product>bind:9.10.4</product>
<product>bind:9.11.0</product>
<product>bind:9.11.0</product>
<product>bind:9.11.0</product>
<product>bind:9.11.0</product>
<product>bind:9.11.0</product>
<product>bind:9.11.0</product>
<product>bind:9.11.0</product>
</cve>
<cve id="CVE-2016-8866" level="MEDIUM">
<product>imagemagick:7.0.3-7</product>
<product>leap:42.1</product>
<product>leap:42.2</product>
<product>opensuse:13.2</product>
</cve>
<cve id="CVE-2016-8867" level="LOW">
<product>docker:1.12.2</product>
</cve>
<cve id="CVE-2016-6031" level="MEDIUM">
<product>rational_quality_manager:4.0</product>
<product>rational_quality_manager:4.0.1</product>
<product>rational_quality_manager:4.0.2</product>
<product>rational_quality_manager:4.0.3</product>
<product>rational_quality_manager:4.0.4</product>
<product>rational_quality_manager:4.0.5</product>
<product>rational_quality_manager:4.0.6</product>
<product>rational_quality_manager:4.0.7</product>
<product>rational_quality_manager:5.0</product>
<product>rational_quality_manager:5.0.1</product>
<product>rational_quality_manager:5.0.2</product>
<product>rational_quality_manager:6.0</product>
<product>rational_quality_manager:6.0.1</product>
<product>rational_quality_manager:6.0.2</product>
<product>rational_quality_manager:6.0.3</product>
</cve>
<cve id="CVE-2016-6522" level="LOW">
<product>openbsd:5.9</product>
</cve>
<cve id="CVE-2016-6521" level="MEDIUM">
<product>grails:1.5.9</product>
<product>grails:2.0.6</product>
</cve>
<cve id="CVE-2016-6520" level="LOW">
<product>imagemagick:7.0.2-6</product>
</cve>
<cve id="CVE-2016-6527" level="MEDIUM">
<product>samsung_mobile:5.0</product>
<product>samsung_mobile:5.1</product>
<product>samsung_mobile:6.0</product>
</cve>
<cve id="CVE-2016-6526" level="MEDIUM">
<product>samsung_mobile:5.0</product>
<product>samsung_mobile:5.1</product>
<product>samsung_mobile:6.0</product>
</cve>
<cve id="CVE-2016-6037" level="MEDIUM">
<product>rational_quality_manager:4.0.0</product>
<product>rational_quality_manager:4.0.1</product>
<product>rational_quality_manager:4.0.2</product>
<product>rational_quality_manager:4.0.3</product>
<product>rational_quality_manager:4.0.4</product>
<product>rational_quality_manager:4.0.5</product>
<product>rational_quality_manager:4.0.6</product>
<product>rational_quality_manager:4.0.7</product>
<product>rational_quality_manager:5.0.0</product>
<product>rational_quality_manager:5.0.1</product>
<product>rational_quality_manager:5.0.2</product>
<product>rational_quality_manager:6.0.0</product>
<product>rational_quality_manager:6.0.1</product>
<product>rational_quality_manager:6.0.2</product>
<product>rational_team_concert:4.0.0</product>
<product>rational_team_concert:4.0.1</product>
<product>rational_team_concert:4.0.2</product>
<product>rational_team_concert:4.0.3</product>
<product>rational_team_concert:4.0.4</product>
<product>rational_team_concert:4.0.5</product>
<product>rational_team_concert:4.0.6</product>
<product>rational_team_concert:4.0.7</product>
<product>rational_team_concert:5.0.0</product>
<product>rational_team_concert:5.0.1</product>
<product>rational_team_concert:5.0.2</product>
<product>rational_team_concert:6.0.0</product>
<product>rational_team_concert:6.0.1</product>
<product>rational_team_concert:6.0.2</product>
<product>rational_team_concert:6.0.3</product>
</cve>
<cve id="CVE-2016-6036" level="MEDIUM">
<product>rational_quality_manager:4.0</product>
<product>rational_quality_manager:4.0.1</product>
<product>rational_quality_manager:4.0.2</product>
<product>rational_quality_manager:4.0.3</product>
<product>rational_quality_manager:4.0.4</product>
<product>rational_quality_manager:4.0.5</product>
<product>rational_quality_manager:4.0.6</product>
<product>rational_quality_manager:4.0.7</product>
<product>rational_quality_manager:5.0</product>
<product>rational_quality_manager:5.0.1</product>
<product>rational_quality_manager:5.0.2</product>
<product>rational_quality_manager:6.0</product>
<product>rational_quality_manager:6.0.1</product>
<product>rational_quality_manager:6.0.2</product>
<product>rational_quality_manager:6.0.3</product>
</cve>
<cve id="CVE-2016-6039" level="MEDIUM">
<product>jazz_reporting_service:6.0</product>
<product>jazz_reporting_service:6.0.1</product>
<product>jazz_reporting_service:6.0.2</product>
</cve>
<cve id="CVE-2016-6038" level="LOW">
<product>aix:5.3</product>
<product>aix:6.1</product>
<product>aix:7.1</product>
</cve>
<cve id="CVE-2016-3009" level="MEDIUM">
<product>connections:4.0.0.0</product>
<product>connections:4.5.0.0</product>
<product>connections:5.0.0.0</product>
</cve>
<cve id="CVE-2016-3008" level="MEDIUM">
<product>connections:5.0.0.0</product>
<product>connections:5.5.0.0</product>
</cve>
<cve id="CVE-2016-6417" level="MEDIUM">
<product>firesight_system_software:4.10.2</product>
<product>firesight_system_software:4.10.2.1</product>
<product>firesight_system_software:4.10.2.2</product>
<product>firesight_system_software:4.10.2.3</product>
<product>firesight_system_software:4.10.2.4</product>
<product>firesight_system_software:4.10.2.5</product>
<product>firesight_system_software:4.10.3</product>
<product>firesight_system_software:4.10.3.1</product>
<product>firesight_system_software:4.10.3.2</product>
<product>firesight_system_software:4.10.3.3</product>
<product>firesight_system_software:4.10.3.4</product>
<product>firesight_system_software:4.10.3.5</product>
<product>firesight_system_software:4.10.3.6</product>
<product>firesight_system_software:4.10.3.7</product>
<product>firesight_system_software:4.10.3.8</product>
<product>firesight_system_software:4.10.3.9</product>
<product>firesight_system_software:4.10.3.10</product>
<product>firesight_system_software:5.1.0</product>
<product>firesight_system_software:5.1.0.1</product>
<product>firesight_system_software:5.1.0.2</product>
<product>firesight_system_software:5.1.0.3</product>
<product>firesight_system_software:5.1.1</product>
<product>firesight_system_software:5.1.1.1</product>
<product>firesight_system_software:5.1.1.2</product>
<product>firesight_system_software:5.1.1.3</product>
<product>firesight_system_software:5.1.1.4</product>
<product>firesight_system_software:5.1.1.5</product>
<product>firesight_system_software:5.1.1.6</product>
<product>firesight_system_software:5.1.1.8</product>
<product>firesight_system_software:5.1.1.9</product>
<product>firesight_system_software:5.1.1.10</product>
<product>firesight_system_software:5.1.1.11</product>
<product>firesight_system_software:5.2.0</product>
<product>firesight_system_software:5.2.0.1</product>
<product>firesight_system_software:5.2.0.2</product>
<product>firesight_system_software:5.2.0.3</product>
<product>firesight_system_software:5.2.0.4</product>
<product>firesight_system_software:5.2.0.5</product>
<product>firesight_system_software:5.2.0.6</product>
<product>firesight_system_software:5.2.0.8</product>
<product>firesight_system_software:5.3.0</product>
<product>firesight_system_software:5.3.0.1</product>
<product>firesight_system_software:5.3.0.2</product>
<product>firesight_system_software:5.3.0.3</product>
<product>firesight_system_software:5.3.0.4</product>
<product>firesight_system_software:5.3.0.5</product>
<product>firesight_system_software:5.3.0.6</product>
<product>firesight_system_software:5.3.0.7</product>
<product>firesight_system_software:5.3.1</product>
<product>firesight_system_software:5.3.1.1</product>
<product>firesight_system_software:5.3.1.2</product>
<product>firesight_system_software:5.3.1.3</product>
<product>firesight_system_software:5.3.1.4</product>
<product>firesight_system_software:5.3.1.5</product>
<product>firesight_system_software:5.3.1.7</product>
<product>firesight_system_software:5.4.0</product>
<product>firesight_system_software:5.4.0.1</product>
<product>firesight_system_software:5.4.0.2</product>
<product>firesight_system_software:5.4.0.3</product>
<product>firesight_system_software:5.4.0.4</product>
<product>firesight_system_software:5.4.0.5</product>
<product>firesight_system_software:5.4.0.6</product>
<product>firesight_system_software:5.4.1</product>
<product>firesight_system_software:5.4.1.2</product>
<product>firesight_system_software:5.4.1.3</product>
<product>firesight_system_software:5.4.1.4</product>
<product>firesight_system_software:6.0.0</product>
<product>firesight_system_software:6.0.0.1</product>
<product>firesight_system_software:6.0.1</product>
<product>firesight_system_software:6.1.0</product>
</cve>
<cve id="CVE-2016-6416" level="MEDIUM">
<product>content_security_management_appliance:9.1.0</product>
<product>content_security_management_appliance:9.1.0-004</product>
<product>content_security_management_appliance:9.1.0-031</product>
<product>content_security_management_appliance:9.1.0-033</product>
<product>content_security_management_appliance:9.1.0-103</product>
<product>content_security_management_appliance:9.5.0</product>
<product>content_security_management_appliance:9.6.0</product>
<product>email_security_appliance:9.6.0-000</product>
<product>email_security_appliance:9.6.0-042</product>
<product>email_security_appliance:9.6.0-051</product>
<product>email_security_appliance:9.7.1-066</product>
<product>email_security_appliance:9.9.6-026</product>
<product>email_security_appliance:9.9_base</product>
<product>web_security_appliance:9.0.0-162</product>
<product>web_security_appliance:9.1.0-000</product>
<product>web_security_appliance:9.1.0-070</product>
<product>web_security_appliance:9.1_base</product>
<product>web_security_appliance:9.5.0-235</product>
<product>web_security_appliance:9.5.0-284</product>
<product>web_security_appliance:9.5.0-444</product>
<product>web_security_appliance:9.5_base</product>
</cve>
<cve id="CVE-2016-6419" level="MEDIUM">
<product>firepower_management_center:4.10.3</product>
<product>firepower_management_center:5.2.0</product>
<product>firepower_management_center:5.3.0</product>
<product>firepower_management_center:5.3.1</product>
<product>firepower_management_center:5.4.0</product>
</cve>
<cve id="CVE-2016-6418" level="MEDIUM">
<product>videoscape_distribution_suite_service_manager:3.0.0</product>
<product>videoscape_distribution_suite_service_manager:3.0_base</product>
<product>videoscape_distribution_suite_service_manager:3.1.0</product>
<product>videoscape_distribution_suite_service_manager:3.1_base</product>
<product>videoscape_distribution_suite_service_manager:3.2.0</product>
<product>videoscape_distribution_suite_service_manager:3.3.0</product>
<product>videoscape_distribution_suite_service_manager:3.3_base</product>
<product>videoscape_distribution_suite_service_manager:3.4.0</product>
<product>videoscape_distribution_suite_service_manager:3.4_base</product>
</cve>
<cve id="CVE-2016-3031" level="MEDIUM">
<product>cognos_analytics:11.0.0.0</product>
<product>cognos_analytics:11.0.1.0</product>
<product>cognos_analytics:11.0.2.0</product>
<product>cognos_analytics:11.0.3.0</product>
<product>cognos_analytics:11.0.4.0</product>
</cve>
<cve id="CVE-2016-8781" level="LOW">
<product>secospace_usg6300_firmware:v500r001c20</product>
<product>secospace_usg6300_firmware:v500r001c20spc200pwe</product>
<product>secospace_usg6500_firmware:v500r001c20</product>
<product>secospace_usg6600_firmware:v500r001c20</product>
<product>secospace_usg6600_firmware:v500r001c20spc200pwe</product>
</cve>
<cve id="CVE-2016-8780" level="LOW">
<product>cloudengine_12800_firmware:v100r006c00</product>
<product>cloudengine_6800_firmware:v100r006c00</product>
<product>cloudengine_7800_firmware:v100r006c00</product>
<product>cloudengine_8800_firmware:v100r006c00</product>
</cve>
<cve id="CVE-2016-8783" level="MEDIUM">
<product>honor_6_firmware:h60-l01c00b850</product>
</cve>
<cve id="CVE-2016-8782" level="LOW">
<product>cloudengine_12800_firmware:v100r003c00</product>
<product>cloudengine_12800_firmware:v100r003c10</product>
<product>cloudengine_12800_firmware:v100r005c00</product>
<product>cloudengine_12800_firmware:v100r005c10</product>
<product>cloudengine_12800_firmware:v100r006c00</product>
</cve>
<cve id="CVE-2016-7928" level="LOW">
<product>tcpdump:4.8.1</product>
</cve>
<cve id="CVE-2016-7929" level="LOW">
<product>tcpdump:4.8.1</product>
</cve>
<cve id="CVE-2016-8786" level="LOW">
<product>s12700_firmware:v200r005c00</product>
<product>s12700_firmware:v200r006c00</product>
<product>s12700_firmware:v200r007c00</product>
<product>s12700_firmware:v200r008c00</product>
<product>s5700_firmware:v200r006c00</product>
<product>s5700_firmware:v200r007c00</product>
<product>s5700_firmware:v200r008c00</product>
<product>s6700_firmware:v200r008c00</product>
<product>s7700_firmware:v200r001c00</product>
<product>s7700_firmware:v200r002c00</product>
<product>s7700_firmware:v200r003c00</product>
<product>s7700_firmware:v200r005c00</product>
<product>s7700_firmware:v200r006c00</product>
<product>s7700_firmware:v200r007c00</product>
<product>s7700_firmware:v200r008c00</product>
<product>s9700_firmware:v200r001c00</product>
<product>s9700_firmware:v200r002c00</product>
<product>s9700_firmware:v200r003c00</product>
<product>s9700_firmware:v200r005c00</product>
<product>s9700_firmware:v200r006c00</product>
<product>s9700_firmware:v200r007c00</product>
<product>s9700_firmware:v200r008c00</product>
</cve>
<cve id="CVE-2016-8789" level="MEDIUM">
<product>espace_integrated_access_device_firmware:v300r001c03</product>
<product>espace_integrated_access_device_firmware:v300r001c04</product>
<product>espace_integrated_access_device_firmware:v300r001c06</product>
<product>espace_integrated_access_device_firmware:v300r001c07</product>
<product>espace_integrated_access_device_firmware:v300r001c20</product>
</cve>
<cve id="CVE-2016-7925" level="LOW">
<product>tcpdump:4.8.1</product>
</cve>
<cve id="CVE-2016-0206" level="LOW">
<product>cloud_orchestrator:2.3</product>
<product>cloud_orchestrator:2.3.0.1</product>
<product>cloud_orchestrator:2.4</product>
<product>cloud_orchestrator:2.4.0.1</product>
<product>cloud_orchestrator:2.4.0.2</product>
</cve>
<cve id="CVE-2016-7927" level="LOW">
<product>tcpdump:4.8.1</product>
</cve>
<cve id="CVE-2016-0200" level="MEDIUM">
<product>internet_explorer:9</product>
<product>internet_explorer:10</product>
<product>internet_explorer:11</product>
</cve>
<cve id="CVE-2016-0201" level="MEDIUM">
<product>security_network_protection_firmware:5.3.1</product>
<product>security_network_protection_firmware:5.3.2</product>
</cve>
<cve id="CVE-2016-0202" level="LOW">
<product>cloud_orchestrator:2.3</product>
<product>cloud_orchestrator:2.3.0.1</product>
<product>cloud_orchestrator:2.4</product>
<product>cloud_orchestrator:2.4.0.1</product>
<product>cloud_orchestrator:2.4.0.2</product>
<product>cloud_orchestrator:2.4.0.3</product>
</cve>
<cve id="CVE-2016-7923" level="LOW">
<product>tcpdump:4.8.1</product>
</cve>
<cve id="CVE-2016-4969" level="MEDIUM">
<product>fortiwan:4.2.4</product>
</cve>
<cve id="CVE-2016-4968" level="LOW">
<product>fortiwan:4.2.4</product>
</cve>
<cve id="CVE-2016-4961" level="LOW">
<product>geforce_experience:-</product>
</cve>
<cve id="CVE-2016-4960" level="MEDIUM">
<product>geforce_experience:-</product>
</cve>
<cve id="CVE-2016-4963" level="MEDIUM">
<product>xen:4.0.0</product>
<product>xen:4.0.1</product>
<product>xen:4.0.2</product>
<product>xen:4.0.3</product>
<product>xen:4.0.4</product>
<product>xen:4.1.0</product>
<product>xen:4.1.1</product>
<product>xen:4.1.2</product>
<product>xen:4.1.3</product>
<product>xen:4.1.4</product>
<product>xen:4.1.5</product>
<product>xen:4.1.6</product>
<product>xen:4.1.6.1</product>
<product>xen:4.2.0</product>
<product>xen:4.2.1</product>
<product>xen:4.2.2</product>
<product>xen:4.2.3</product>
<product>xen:4.2.4</product>
<product>xen:4.2.5</product>
<product>xen:4.3.0</product>
<product>xen:4.3.1</product>
<product>xen:4.3.2</product>
<product>xen:4.3.3</product>
<product>xen:4.3.4</product>
<product>xen:4.4.0</product>
<product>xen:4.4.0</product>
<product>xen:4.4.1</product>
<product>xen:4.4.2</product>
<product>xen:4.4.3</product>
<product>xen:4.4.4</product>
<product>xen:4.5.0</product>
<product>xen:4.5.1</product>
<product>xen:4.5.2</product>
<product>xen:4.5.3</product>
<product>xen:4.6.0</product>
<product>xen:4.6.1</product>
</cve>
<cve id="CVE-2016-4962" level="LOW">
<product>vm_server:3.3</product>
<product>vm_server:3.4</product>
<product>xen:4.3.0</product>
<product>xen:4.3.1</product>
<product>xen:4.3.2</product>
<product>xen:4.3.3</product>
<product>xen:4.3.4</product>
<product>xen:4.4.0</product>
<product>xen:4.4.0</product>
<product>xen:4.4.1</product>
<product>xen:4.4.2</product>
<product>xen:4.4.3</product>
<product>xen:4.4.4</product>
<product>xen:4.5.0</product>
<product>xen:4.5.1</product>
<product>xen:4.5.2</product>
<product>xen:4.5.3</product>
<product>xen:4.6.0</product>
<product>xen:4.6.1</product>
</cve>
<cve id="CVE-2016-4965" level="LOW">
<product>fortiwan:4.2.4</product>
</cve>
<cve id="CVE-2016-4964" level="LOW">
<product>qemu:-</product>
</cve>
<cve id="CVE-2016-4967" level="LOW">
<product>fortiwan:4.2.4</product>
</cve>
<cve id="CVE-2016-4966" level="LOW">
<product>fortiwan:4.2.4</product>
</cve>
<cve id="CVE-2016-0068" level="MEDIUM">
<product>internet_explorer:9</product>
<product>internet_explorer:10</product>
<product>internet_explorer:11</product>
</cve>
<cve id="CVE-2016-0069" level="MEDIUM">
<product>internet_explorer:9</product>
<product>internet_explorer:10</product>
<product>internet_explorer:11</product>
</cve>
<cve id="CVE-2016-0060" level="MEDIUM">
<product>edge:-</product>
<product>internet_explorer:9</product>
<product>internet_explorer:10</product>
<product>internet_explorer:11</product>
</cve>
<cve id="CVE-2016-0061" level="MEDIUM">
<product>edge:-</product>
<product>internet_explorer:9</product>
<product>internet_explorer:10</product>
<product>internet_explorer:11</product>
</cve>
<cve id="CVE-2016-0062" level="MEDIUM">
<product>edge:-</product>
<product>internet_explorer:11</product>
</cve>
<cve id="CVE-2016-0063" level="MEDIUM">
<product>internet_explorer:9</product>
<product>internet_explorer:10</product>
<product>internet_explorer:11</product>
</cve>
<cve id="CVE-2016-0064" level="MEDIUM">
<product>internet_explorer:10</product>
</cve>
<cve id="CVE-2016-0067" level="MEDIUM">
<product>internet_explorer:9</product>
<product>internet_explorer:10</product>
<product>internet_explorer:11</product>
</cve>
<cve id="CVE-2016-10059" level="MEDIUM">
<product>imagemagick:6.9.4-0</product>
</cve>
<cve id="CVE-2016-10058" level="MEDIUM">
<product>imagemagick:6.9.6-2</product>
</cve>
<cve id="CVE-2016-10509" level="LOW">
<product>opencart:2.3.0.0</product>
</cve>
<cve id="CVE-2016-10508" level="MEDIUM">
<product>phpthumb:1.7.13</product>
</cve>
<cve id="CVE-2016-10051" level="MEDIUM">
<product>imagemagick:6.9.5-5</product>
<product>leap:42.1</product>
<product>leap:42.2</product>
</cve>
<cve id="CVE-2016-10050" level="MEDIUM">
<product>imagemagick:6.9.4-8</product>
<product>leap:42.1</product>
<product>leap:42.2</product>
</cve>
<cve id="CVE-2016-10053" level="MEDIUM">
<product>imagemagick:6.9.5-7</product>
</cve>
<cve id="CVE-2016-10052" level="MEDIUM">
<product>imagemagick:6.9.5-5</product>
</cve>
<cve id="CVE-2016-10507" level="MEDIUM">
<product>openjpeg:2.1.2</product>
</cve>
<cve id="CVE-2016-10506" level="MEDIUM">
<product>openjpeg:2.1.2</product>
</cve>
<cve id="CVE-2016-10057" level="MEDIUM">
<product>imagemagick:6.9.5-7</product>
</cve>
<cve id="CVE-2016-10504" level="MEDIUM">
<product>openjpeg:2.1.2</product>
</cve>
<cve id="CVE-2016-3038" level="MEDIUM">
<product>cognos_business_intelligence:10.1</product>
<product>cognos_business_intelligence:10.2</product>
<product>cognos_business_intelligence:10.2.2</product>
</cve>
<cve id="CVE-2016-8529" level="LOW">
<product>lefthand:12.5</product>
</cve>
<cve id="CVE-2016-8528" level="LOW">
<product>eucalyptus:3.3.0</product>
<product>eucalyptus:3.3.1</product>
<product>eucalyptus:3.3.2</product>
<product>eucalyptus:3.4.0</product>
<product>eucalyptus:3.4.1</product>
<product>eucalyptus:3.4.2</product>
<product>eucalyptus:3.4.3</product>
<product>eucalyptus:4.0.0</product>
<product>eucalyptus:4.0.1</product>
<product>eucalyptus:4.0.2</product>
<product>eucalyptus:4.1.0</product>
<product>eucalyptus:4.1.1</product>
<product>eucalyptus:4.1.2</product>
<product>eucalyptus:4.2.0</product>
</cve>
<cve id="CVE-2016-8525" level="LOW">
<product>intelligent_management_center:7.2</product>
<product>intelligent_management_center:7.2</product>
</cve>
<cve id="CVE-2016-8521" level="MEDIUM">
<product>diagnostics:9.24</product>
<product>diagnostics:9.26</product>
<product>diagnostics:9.26</product>
</cve>
<cve id="CVE-2016-8520" level="LOW">
<product>eucalyptus:4.3.0</product>
</cve>
<cve id="CVE-2016-8522" level="MEDIUM">
<product>diagnostics:9.24</product>
<product>diagnostics:9.26</product>
<product>diagnostics:9.26</product>
</cve>
<cve id="CVE-2016-9128" level="MEDIUM">
<product>revive_adserver:3.2.2</product>
</cve>
<cve id="CVE-2016-9129" level="LOW">
<product>revive_adserver:3.2.2</product>
</cve>
<cve id="CVE-2016-9126" level="MEDIUM">
<product>revive_adserver:3.2.2</product>
</cve>
<cve id="CVE-2016-9127" level="MEDIUM">
<product>revive_adserver:3.2.2</product>
</cve>
<cve id="CVE-2016-9124" level="LOW">
<product>revive_adserver:3.2.2</product>
</cve>
<cve id="CVE-2016-9125" level="LOW">
<product>revive_adserver:3.2.2</product>
</cve>
<cve id="CVE-2016-9122" level="LOW">
<product>go-jose:1.0.3</product>
</cve>
<cve id="CVE-2016-9123" level="LOW">
<product>go-jose:1.0.4</product>
</cve>
<cve id="CVE-2016-9121" level="LOW">
<product>go-jose:1.0.3</product>
</cve>
<cve id="CVE-2016-4785" level="LOW">
<product>siprotec_firmware:-</product>
<product>siprotec_firmware:4.26</product>
</cve>
<cve id="CVE-2016-4784" level="LOW">
<product>siprotec_firmware:-</product>
<product>siprotec_firmware:4.26</product>
</cve>
<cve id="CVE-2016-4787" level="LOW">
<product>pulse_connect_secure:7.4</product>
<product>pulse_connect_secure:7.4r1.0</product>
<product>pulse_connect_secure:7.4r2.0</product>
<product>pulse_connect_secure:7.4r3.0</product>
<product>pulse_connect_secure:7.4r4.0</product>
<product>pulse_connect_secure:7.4r5.0</product>
<product>pulse_connect_secure:7.4r6.0</product>
<product>pulse_connect_secure:7.4r7.0</product>
<product>pulse_connect_secure:7.4r8.0</product>
<product>pulse_connect_secure:7.4r9.0</product>
<product>pulse_connect_secure:7.4r9.1</product>
<product>pulse_connect_secure:7.4r9.2</product>
<product>pulse_connect_secure:7.4r9.3</product>
<product>pulse_connect_secure:7.4r10.0</product>
<product>pulse_connect_secure:7.4r11.0</product>
<product>pulse_connect_secure:7.4r11.1</product>
<product>pulse_connect_secure:7.4r12.0</product>
<product>pulse_connect_secure:7.4r13.0</product>
<product>pulse_connect_secure:7.4r13.1</product>
<product>pulse_connect_secure:7.4r13.2</product>
<product>pulse_connect_secure:7.4r13.3</product>
<product>pulse_connect_secure:8.0</product>
<product>pulse_connect_secure:8.0r1.0</product>
<product>pulse_connect_secure:8.0r1.1</product>
<product>pulse_connect_secure:8.0r2.0</product>
<product>pulse_connect_secure:8.0r3.0</product>
<product>pulse_connect_secure:8.0r3.1</product>
<product>pulse_connect_secure:8.0r3.2</product>
<product>pulse_connect_secure:8.0r4.0</product>
<product>pulse_connect_secure:8.0r4.1</product>
<product>pulse_connect_secure:8.0r5.0</product>
<product>pulse_connect_secure:8.0r6.0</product>
<product>pulse_connect_secure:8.0r7.0</product>
<product>pulse_connect_secure:8.0r7.1</product>
<product>pulse_connect_secure:8.0r8.0</product>
<product>pulse_connect_secure:8.0r8.1</product>
<product>pulse_connect_secure:8.0r9.0</product>
<product>pulse_connect_secure:8.1</product>
<product>pulse_connect_secure:8.1r1.0</product>
<product>pulse_connect_secure:8.1r1.1</product>
<product>pulse_connect_secure:8.2</product>
</cve>
<cve id="CVE-2016-4786" level="LOW">
<product>pulse_connect_secure:7.4</product>
<product>pulse_connect_secure:7.4r1.0</product>
<product>pulse_connect_secure:7.4r2.0</product>
<product>pulse_connect_secure:7.4r3.0</product>
<product>pulse_connect_secure:7.4r4.0</product>
<product>pulse_connect_secure:7.4r5.0</product>
<product>pulse_connect_secure:7.4r6.0</product>
<product>pulse_connect_secure:7.4r7.0</product>
<product>pulse_connect_secure:7.4r8.0</product>
<product>pulse_connect_secure:7.4r9.0</product>
<product>pulse_connect_secure:7.4r9.1</product>
<product>pulse_connect_secure:7.4r9.2</product>
<product>pulse_connect_secure:7.4r9.3</product>
<product>pulse_connect_secure:7.4r10.0</product>
<product>pulse_connect_secure:7.4r11.0</product>
<product>pulse_connect_secure:7.4r11.1</product>
<product>pulse_connect_secure:7.4r12.0</product>
<product>pulse_connect_secure:7.4r13.0</product>
<product>pulse_connect_secure:7.4r13.1</product>
<product>pulse_connect_secure:7.4r13.2</product>
<product>pulse_connect_secure:7.4r13.3</product>
<product>pulse_connect_secure:8.0</product>
<product>pulse_connect_secure:8.0r1.0</product>
<product>pulse_connect_secure:8.0r1.1</product>
<product>pulse_connect_secure:8.0r2.0</product>
<product>pulse_connect_secure:8.0r3.0</product>
<product>pulse_connect_secure:8.0r3.1</product>
<product>pulse_connect_secure:8.0r3.2</product>
<product>pulse_connect_secure:8.0r4.0</product>
<product>pulse_connect_secure:8.0r4.1</product>
<product>pulse_connect_secure:8.0r5.0</product>
<product>pulse_connect_secure:8.0r6.0</product>
<product>pulse_connect_secure:8.0r7.0</product>
<product>pulse_connect_secure:8.0r7.1</product>
<product>pulse_connect_secure:8.0r8.0</product>
<product>pulse_connect_secure:8.0r8.1</product>
<product>pulse_connect_secure:8.0r9.0</product>
<product>pulse_connect_secure:8.0r10.0</product>
<product>pulse_connect_secure:8.1</product>
<product>pulse_connect_secure:8.1r1.0</product>
<product>pulse_connect_secure:8.1r1.1</product>
<product>pulse_connect_secure:8.1r2.0</product>
<product>pulse_connect_secure:8.1r2.1</product>
<product>pulse_connect_secure:8.2</product>
</cve>
<cve id="CVE-2016-4783" level="MEDIUM">
<product>shareit:3.5.98_ww</product>
</cve>
<cve id="CVE-2016-4782" level="MEDIUM">
<product>shareit:3.5.98_ww</product>
</cve>
<cve id="CVE-2016-1331" level="MEDIUM">
<product>emergency_responder:11.5%5c%280.99833.5%5c%29</product>
</cve>
<cve id="CVE-2016-4789" level="MEDIUM">
<product>pulse_connect_secure:7.4</product>
<product>pulse_connect_secure:7.4r1.0</product>
<product>pulse_connect_secure:7.4r2.0</product>
<product>pulse_connect_secure:7.4r3.0</product>
<product>pulse_connect_secure:7.4r4.0</product>
<product>pulse_connect_secure:7.4r5.0</product>
<product>pulse_connect_secure:7.4r6.0</product>
<product>pulse_connect_secure:7.4r7.0</product>
<product>pulse_connect_secure:7.4r8.0</product>
<product>pulse_connect_secure:7.4r9.0</product>
<product>pulse_connect_secure:7.4r9.1</product>
<product>pulse_connect_secure:7.4r9.2</product>
<product>pulse_connect_secure:7.4r9.3</product>
<product>pulse_connect_secure:7.4r10.0</product>
<product>pulse_connect_secure:7.4r11.0</product>
<product>pulse_connect_secure:7.4r11.1</product>
<product>pulse_connect_secure:7.4r12.0</product>
<product>pulse_connect_secure:7.4r13.0</product>
<product>pulse_connect_secure:7.4r13.1</product>
<product>pulse_connect_secure:7.4r13.2</product>
<product>pulse_connect_secure:7.4r13.3</product>
<product>pulse_connect_secure:8.0</product>
<product>pulse_connect_secure:8.0r1.0</product>
<product>pulse_connect_secure:8.0r1.1</product>
<product>pulse_connect_secure:8.0r2.0</product>
<product>pulse_connect_secure:8.0r3.0</product>
<product>pulse_connect_secure:8.0r3.1</product>
<product>pulse_connect_secure:8.0r3.2</product>
<product>pulse_connect_secure:8.0r4.0</product>
<product>pulse_connect_secure:8.0r4.1</product>
<product>pulse_connect_secure:8.0r5.0</product>
<product>pulse_connect_secure:8.0r6.0</product>
<product>pulse_connect_secure:8.0r7.0</product>
<product>pulse_connect_secure:8.0r7.1</product>
<product>pulse_connect_secure:8.0r8.0</product>
<product>pulse_connect_secure:8.0r8.1</product>
<product>pulse_connect_secure:8.1</product>
<product>pulse_connect_secure:8.1r1.0</product>
<product>pulse_connect_secure:8.1r1.1</product>
<product>pulse_connect_secure:8.2</product>
</cve>
<cve id="CVE-2016-4788" level="LOW">
<product>pulse_connect_secure:7.4</product>
<product>pulse_connect_secure:7.4r1.0</product>
<product>pulse_connect_secure:7.4r2.0</product>
<product>pulse_connect_secure:7.4r3.0</product>
<product>pulse_connect_secure:7.4r4.0</product>
<product>pulse_connect_secure:7.4r5.0</product>
<product>pulse_connect_secure:7.4r6.0</product>
<product>pulse_connect_secure:7.4r7.0</product>
<product>pulse_connect_secure:7.4r8.0</product>
<product>pulse_connect_secure:7.4r9.0</product>
<product>pulse_connect_secure:7.4r9.1</product>
<product>pulse_connect_secure:7.4r9.2</product>
<product>pulse_connect_secure:7.4r9.3</product>
<product>pulse_connect_secure:7.4r10.0</product>
<product>pulse_connect_secure:7.4r11.0</product>
<product>pulse_connect_secure:7.4r11.1</product>
<product>pulse_connect_secure:7.4r12.0</product>
<product>pulse_connect_secure:7.4r13.0</product>
<product>pulse_connect_secure:7.4r13.1</product>
<product>pulse_connect_secure:7.4r13.2</product>
<product>pulse_connect_secure:7.4r13.3</product>
<product>pulse_connect_secure:8.0</product>
<product>pulse_connect_secure:8.0r1.0</product>
<product>pulse_connect_secure:8.0r1.1</product>
<product>pulse_connect_secure:8.0r2.0</product>
<product>pulse_connect_secure:8.0r3.0</product>
<product>pulse_connect_secure:8.0r3.1</product>
<product>pulse_connect_secure:8.0r3.2</product>
<product>pulse_connect_secure:8.0r4.0</product>
<product>pulse_connect_secure:8.0r4.1</product>
<product>pulse_connect_secure:8.0r5.0</product>
<product>pulse_connect_secure:8.0r6.0</product>
<product>pulse_connect_secure:8.0r7.0</product>
<product>pulse_connect_secure:8.0r7.1</product>
<product>pulse_connect_secure:8.0r8.0</product>
<product>pulse_connect_secure:8.0r8.1</product>
<product>pulse_connect_secure:8.0r9.0</product>
<product>pulse_connect_secure:8.1</product>
<product>pulse_connect_secure:8.1r1.0</product>
<product>pulse_connect_secure:8.1r1.1</product>
<product>pulse_connect_secure:8.2</product>
</cve>
<cve id="CVE-2016-1335" level="HIGH">
<product>asr_5000_series_software:16.5.2</product>
<product>asr_5000_series_software:17.7.0</product>
<product>asr_5000_series_software:18.4.0</product>
<product>asr_5000_series_software:19.0.1</product>
<product>asr_5000_series_software:19.3.0</product>
<product>asr_5000_series_software:20.0.0</product>
</cve>
<cve id="CVE-2016-1334" level="LOW">
<product>small_business_wireless_access_points_firmware:1.0.4.4</product>
</cve>
<cve id="CVE-2016-2783" level="LOW">
<product>vsp_operating_system_software:4.2.2.0</product>
<product>vsp_operating_system_software:5.0.0.0</product>
</cve>
<cve id="CVE-2016-2781" level="LOW">
<product>coreutils</product>
</cve>
<cve id="CVE-2016-2780" level="LOW">
<product>utps_firmware:23.009.09.00.983</product>
</cve>
<cve id="CVE-2016-2787" level="LOW">
<product>puppet_enterprise:2015.3</product>
<product>puppet_enterprise:2015.3.2</product>
</cve>
<cve id="CVE-2016-2786" level="LOW">
<product>puppet_agent:1.3.0</product>
<product>puppet_agent:1.3.1</product>
<product>puppet_agent:1.3.2</product>
<product>puppet_agent:1.3.4</product>
<product>puppet_agent:1.3.5</product>
<product>puppet_enterprise:2015.3</product>
<product>puppet_enterprise:2015.3.2</product>
</cve>
<cve id="CVE-2016-2785" level="LOW">
<product>puppet:4.0.0</product>
<product>puppet:4.0.0</product>
<product>puppet:4.0.0</product>
<product>puppet:4.0.0</product>
<product>puppet:4.1.0</product>
<product>puppet:4.2.0</product>
<product>puppet:4.2.1</product>
<product>puppet:4.2.2</product>
<product>puppet:4.2.3</product>
<product>puppet:4.3.0</product>
<product>puppet:4.3.1</product>
<product>puppet:4.3.2</product>
<product>puppet:4.4.0</product>
<product>puppet:4.4.1</product>
<product>puppet_agent:1.4.1</product>
<product>puppet_server:2.0</product>
<product>puppet_server:2.1</product>
<product>puppet_server:2.1.1</product>
<product>puppet_server:2.1.2</product>
<product>puppet_server:2.2.0</product>
<product>puppet_server:2.3.0</product>
<product>puppet_server:2.3.1</product>
</cve>
<cve id="CVE-2016-2784" level="HIGH">
<product>cms_made_simple:1.0</product>
<product>cms_made_simple:1.0.1</product>
<product>cms_made_simple:1.0.2</product>
<product>cms_made_simple:1.0.3</product>
<product>cms_made_simple:1.0.4</product>
<product>cms_made_simple:1.0.5</product>
<product>cms_made_simple:1.0.6</product>
<product>cms_made_simple:1.0.7</product>
<product>cms_made_simple:1.0.8</product>
<product>cms_made_simple:1.1</product>
<product>cms_made_simple:1.1.1</product>
<product>cms_made_simple:1.1.2</product>
<product>cms_made_simple:1.1.3.1</product>
<product>cms_made_simple:1.1.4.1</product>
<product>cms_made_simple:1.2</product>
<product>cms_made_simple:1.2.1</product>
<product>cms_made_simple:1.2.2</product>
<product>cms_made_simple:1.2.3</product>
<product>cms_made_simple:1.2.4</product>
<product>cms_made_simple:1.2.5</product>
<product>cms_made_simple:1.3</product>
<product>cms_made_simple:1.3.1</product>
<product>cms_made_simple:1.4</product>
<product>cms_made_simple:1.4.1</product>
<product>cms_made_simple:1.5</product>
<product>cms_made_simple:1.5.1</product>
<product>cms_made_simple:1.5.2</product>
<product>cms_made_simple:1.5.3</product>
<product>cms_made_simple:1.5.4</product>
<product>cms_made_simple:1.6</product>
<product>cms_made_simple:1.6.1</product>
<product>cms_made_simple:1.6.2</product>
<product>cms_made_simple:1.6.3</product>
<product>cms_made_simple:1.6.4</product>
<product>cms_made_simple:1.6.5</product>
<product>cms_made_simple:1.6.6</product>
<product>cms_made_simple:1.6.7</product>
<product>cms_made_simple:1.6.8</product>
<product>cms_made_simple:1.6.9</product>
<product>cms_made_simple:1.6.10</product>
<product>cms_made_simple:1.7</product>
<product>cms_made_simple:1.7.1</product>
<product>cms_made_simple:1.8</product>
<product>cms_made_simple:1.8.1</product>
<product>cms_made_simple:1.8.2</product>
<product>cms_made_simple:1.9</product>
<product>cms_made_simple:1.9.1</product>
<product>cms_made_simple:1.9.2</product>
<product>cms_made_simple:1.9.3</product>
<product>cms_made_simple:1.9.4</product>
<product>cms_made_simple:1.9.4.1</product>
<product>cms_made_simple:1.9.4.2</product>
<product>cms_made_simple:1.9.4.3</product>
<product>cms_made_simple:1.10</product>
<product>cms_made_simple:1.10.1</product>
<product>cms_made_simple:1.10.2</product>
<product>cms_made_simple:1.10.3</product>
<product>cms_made_simple:1.11</product>
<product>cms_made_simple:1.11.1</product>
<product>cms_made_simple:1.11.2</product>
<product>cms_made_simple:1.11.2.1</product>
<product>cms_made_simple:1.11.3</product>
<product>cms_made_simple:1.11.4</product>
<product>cms_made_simple:1.11.5</product>
<product>cms_made_simple:1.11.6</product>
<product>cms_made_simple:1.11.7</product>
<product>cms_made_simple:1.11.8</product>
<product>cms_made_simple:1.11.9</product>
<product>cms_made_simple:1.11.10</product>
<product>cms_made_simple:1.11.11</product>
<product>cms_made_simple:1.11.12</product>
<product>cms_made_simple:1.11.13</product>
<product>cms_made_simple:1.12</product>
<product>cms_made_simple:1.12.1</product>
<product>cms_made_simple:2.0</product>
<product>cms_made_simple:2.0.1</product>
<product>cms_made_simple:2.0.1.1</product>
<product>cms_made_simple:2.1</product>
<product>cms_made_simple:2.1.1</product>
<product>cms_made_simple:2.1.2</product>
</cve>
<cve id="CVE-2016-2789" level="MEDIUM">
<product>xenmobile_server:10.0</product>
<product>xenmobile_server:10.1</product>
<product>xenmobile_server:10.3</product>
</cve>
<cve id="CVE-2016-2788" level="LOW">
<product>marionette-collective:2.7.0</product>
<product>marionette-collective:2.8.0</product>
<product>marionette-collective:2.8.1</product>
<product>marionette-collective:2.8.2</product>
<product>marionette-collective:2.8.3</product>
<product>marionette-collective:2.8.4</product>
<product>marionette-collective:2.8.5</product>
<product>marionette-collective:2.8.6</product>
<product>marionette-collective:2.8.7</product>
<product>marionette-collective:2.8.8</product>
<product>puppet:3.8</product>
<product>puppet:2016.2</product>
</cve>
<cve id="CVE-2016-5788" level="LOW">
<product>bently_nevada_3500%2f22m_serial_firmware:-</product>
<product>bently_nevada_3500%2f22m_usb_firmware:-</product>
</cve>
<cve id="CVE-2016-5789" level="MEDIUM">
<product>jtc-200_firmware</product>
</cve>
<cve id="CVE-2016-5786" level="LOW">
<product>omniview:1.2</product>
</cve>
<cve id="CVE-2016-5787" level="LOW">
<product>cimplicity:8.2</product>
</cve>
<cve id="CVE-2016-5782" level="LOW">
<product>lgate_firmware:-</product>
</cve>
<cve id="CVE-2016-5781" level="MEDIUM">
<product>levistudio:-</product>
</cve>
<cve id="CVE-2016-5434" level="MEDIUM">
<product>pacman:5.0.1</product>
</cve>
<cve id="CVE-2016-5435" level="MEDIUM">
<product>huawei_firmware:v5500r001c00</product>
</cve>
<cve id="CVE-2016-5430" level="LOW">
<product>jose-php:2.2.0</product>
<product>jose-php:2.3.0</product>
</cve>
<cve id="CVE-2016-5432" level="LOW">
<product>enterprise_virtualization:4.0</product>
</cve>
<cve id="CVE-2016-6209" level="MEDIUM">
<product>nagios:-</product>
</cve>
<cve id="CVE-2016-6201" level="MEDIUM">
<product>ektron_content_management_system:9.10</product>
</cve>
<cve id="CVE-2016-6206" level="LOW">
<product>ar3200_firmware:v200r001c00</product>
<product>ar3200_firmware:v200r001c01</product>
<product>ar3200_firmware:v200r002c00</product>
<product>ar3200_firmware:v200r002c01</product>
<product>ar3200_firmware:v200r002c02</product>
<product>ar3200_firmware:v200r002c05</product>
<product>ar3200_firmware:v200r003c00</product>
<product>ar3200_firmware:v200r003c01</product>
<product>ar3200_firmware:v200r003c05</product>
<product>ar3200_firmware:v200r005c00</product>
<product>ar3200_firmware:v200r005c10</product>
<product>ar3200_firmware:v200r005c20</product>
<product>ar3200_firmware:v200r005c21</product>
<product>ar3200_firmware:v200r005c30</product>
<product>ar3200_firmware:v200r005c31</product>
<product>ar3200_firmware:v200r005c32</product>
<product>ar3200_firmware:v200r006c00</product>
<product>ar3200_firmware:v200r006c10</product>
<product>ar3200_firmware:v200r006c11</product>
<product>ar3200_firmware:v200r006c12</product>
<product>ar3200_firmware:v200r006c13</product>
<product>ar3200_firmware:v200r006c15</product>
<product>ar3200_firmware:v200r006c16</product>
<product>ar3200_firmware:v200r006c17</product>
</cve>
<cve id="CVE-2016-6204" level="MEDIUM">
<product>sinema_remote_connect_server:1.1</product>
</cve>
<cve id="CVE-2016-7801" level="LOW">
<product>garoon:3.0.0</product>
<product>garoon:3.0.1</product>
<product>garoon:3.0.2</product>
<product>garoon:3.0.3</product>
<product>garoon:3.1.0</product>
<product>garoon:3.1.1</product>
<product>garoon:3.1.2</product>
<product>garoon:3.1.3</product>
<product>garoon:3.5.0</product>
<product>garoon:3.5.1</product>
<product>garoon:3.5.2</product>
<product>garoon:3.5.3</product>
<product>garoon:3.5.4</product>
<product>garoon:3.5.5</product>
<product>garoon:3.7.0</product>
<product>garoon:3.7.1</product>
<product>garoon:3.7.2</product>
<product>garoon:3.7.3</product>
<product>garoon:3.7.4</product>
<product>garoon:3.7.5</product>
<product>garoon:4.0.0</product>
<product>garoon:4.0.1</product>
<product>garoon:4.0.2</product>
<product>garoon:4.0.3</product>
<product>garoon:4.2.0</product>
<product>garoon:4.2.1</product>
<product>garoon:4.2.2</product>
</cve>
<cve id="CVE-2016-3498" level="LOW">
<product>jdk:1.7.0</product>
<product>jdk:1.8.0</product>
<product>jre:1.7.0</product>
<product>jre:1.8.0</product>
</cve>
<cve id="CVE-2016-3490" level="MEDIUM">
<product>transportation_management:6.3.0</product>
<product>transportation_management:6.3.1</product>
<product>transportation_management:6.3.2</product>
<product>transportation_management:6.3.3</product>
<product>transportation_management:6.3.4</product>
<product>transportation_management:6.3.5</product>
<product>transportation_management:6.3.6</product>
<product>transportation_management:6.3.7</product>
<product>transportation_management:6.4.0</product>
<product>transportation_management:6.4.1</product>
</cve>
<cve id="CVE-2016-3491" level="LOW">
<product>crm_technical_foundation:12.1.3</product>
</cve>
<cve id="CVE-2016-3493" level="LOW">
<product>hyperion_financial_reporting:11.1.2.4</product>
</cve>
<cve id="CVE-2016-3494" level="LOW">
<product>enterprise_manager_ops_center:12.1.4</product>
<product>enterprise_manager_ops_center:12.2.2</product>
<product>enterprise_manager_ops_center:12.3.2</product>
</cve>
<cve id="CVE-2016-3496" level="MEDIUM">
<product>enterprise_manager_for_fusion_middleware:11.1.1.7</product>
<product>enterprise_manager_for_fusion_middleware:11.1.1.9</product>
</cve>
<cve id="CVE-2016-7007" level="LOW">
<product>acrobat:11.0.17</product>
<product>acrobat_dc:15.006.30201</product>
<product>acrobat_dc:15.017.20053</product>
<product>acrobat_reader_dc:15.006.30201</product>
<product>acrobat_reader_dc:15.017.20053</product>
<product>reader:11.0.17</product>
</cve>
<cve id="CVE-2016-7006" level="LOW">
<product>acrobat:11.0.17</product>
<product>acrobat_dc:15.006.30201</product>
<product>acrobat_dc:15.017.20053</product>
<product>acrobat_reader_dc:15.006.30201</product>
<product>acrobat_reader_dc:15.017.20053</product>
<product>reader:11.0.17</product>
</cve>
<cve id="CVE-2016-7005" level="LOW">
<product>acrobat:11.0.17</product>
<product>acrobat_dc:15.006.30201</product>
<product>acrobat_dc:15.017.20053</product>
<product>acrobat_reader_dc:15.006.30201</product>
<product>acrobat_reader_dc:15.017.20053</product>
<product>reader:11.0.17</product>
</cve>
<cve id="CVE-2016-7004" level="LOW">
<product>acrobat:11.0.17</product>
<product>acrobat_dc:15.006.30201</product>
<product>acrobat_dc:15.017.20053</product>
<product>acrobat_reader_dc:15.006.30201</product>
<product>acrobat_reader_dc:15.017.20053</product>
<product>reader:11.0.17</product>
</cve>
<cve id="CVE-2016-7003" level="LOW">
<product>acrobat:11.0.17</product>
<product>acrobat_dc:15.006.30201</product>
<product>acrobat_dc:15.017.20053</product>
<product>acrobat_reader_dc:15.006.30201</product>
<product>acrobat_reader_dc:15.017.20053</product>
<product>reader:11.0.17</product>
</cve>
<cve id="CVE-2016-7002" level="LOW">
<product>acrobat:11.0.17</product>
<product>acrobat_dc:15.006.30201</product>
<product>acrobat_dc:15.017.20053</product>
<product>acrobat_reader_dc:15.006.30201</product>
<product>acrobat_reader_dc:15.017.20053</product>
<product>reader:11.0.17</product>
</cve>
<cve id="CVE-2016-7553" level="LOW">
<product>buf.pl:2.13</product>
</cve>
<cve id="CVE-2016-1929" level="LOW">
<product>hana:-</product>
</cve>
<cve id="CVE-2016-1926" level="MEDIUM">
<product>greenbone_security_assistant:6.0.0</product>
<product>greenbone_security_assistant:6.0.1</product>
<product>greenbone_security_assistant:6.0.2</product>
<product>greenbone_security_assistant:6.0.3</product>
<product>greenbone_security_assistant:6.0.4</product>
<product>greenbone_security_assistant:6.0.5</product>
<product>greenbone_security_assistant:6.0.6</product>
<product>greenbone_security_assistant:6.0.7</product>
<product>fedora:22</product>
<product>fedora:23</product>
<product>greenbone_os:3.1.1</product>
<product>greenbone_os:3.1.6</product>
<product>greenbone_os:3.1.7</product>
<product>greenbone_os:3.1.8</product>
<product>greenbone_os:3.1.9</product>
<product>greenbone_os:3.1.10</product>
<product>greenbone_os:3.1.11</product>
<product>greenbone_os:3.1.12</product>
<product>greenbone_os:3.1.13</product>
<product>greenbone_os:3.1.14</product>
<product>greenbone_os:3.1.15</product>
<product>greenbone_os:3.1.16</product>
<product>greenbone_os:3.1.17</product>
<product>greenbone_os:3.1.18</product>
<product>greenbone_os:3.1.19</product>
<product>greenbone_os:3.1.20</product>
<product>greenbone_os:3.1.21</product>
<product>greenbone_os:3.1.22</product>
<product>greenbone_os:3.1.23</product>
</cve>
<cve id="CVE-2016-1927" level="LOW">
<product>phpmyadmin:4.0.0</product>
<product>phpmyadmin:4.0.0</product>
<product>phpmyadmin:4.0.0</product>
<product>phpmyadmin:4.0.1</product>
<product>phpmyadmin:4.0.10</product>
<product>phpmyadmin:4.0.10.1</product>
<product>phpmyadmin:4.0.10.2</product>
<product>phpmyadmin:4.0.10.3</product>
<product>phpmyadmin:4.0.10.4</product>
<product>phpmyadmin:4.0.10.5</product>
<product>phpmyadmin:4.0.10.6</product>
<product>phpmyadmin:4.0.10.7</product>
<product>phpmyadmin:4.0.10.8</product>
<product>phpmyadmin:4.0.10.9</product>
<product>phpmyadmin:4.0.10.10</product>
<product>phpmyadmin:4.0.10.11</product>
<product>phpmyadmin:4.0.10.12</product>
<product>phpmyadmin:4.4.0</product>
<product>phpmyadmin:4.4.1</product>
<product>phpmyadmin:4.4.1.1</product>
<product>phpmyadmin:4.4.2</product>
<product>phpmyadmin:4.4.3</product>
<product>phpmyadmin:4.4.4</product>
<product>phpmyadmin:4.4.5</product>
<product>phpmyadmin:4.4.6</product>
<product>phpmyadmin:4.4.6.1</product>
<product>phpmyadmin:4.4.7</product>
<product>phpmyadmin:4.4.8</product>
<product>phpmyadmin:4.4.9</product>
<product>phpmyadmin:4.4.10</product>
<product>phpmyadmin:4.4.11</product>
<product>phpmyadmin:4.4.12</product>
<product>phpmyadmin:4.4.13</product>
<product>phpmyadmin:4.4.13.1</product>
<product>phpmyadmin:4.4.14.1</product>
<product>phpmyadmin:4.4.15</product>
<product>phpmyadmin:4.4.15.1</product>
<product>phpmyadmin:4.4.15.2</product>
<product>phpmyadmin:4.4.15.3</product>
<product>phpmyadmin:4.5.0</product>
<product>phpmyadmin:4.5.0.1</product>
<product>phpmyadmin:4.5.0.2</product>
<product>phpmyadmin:4.5.1</product>
<product>phpmyadmin:4.5.2</product>
<product>phpmyadmin:4.5.3</product>
</cve>
<cve id="CVE-2016-1924" level="MEDIUM">
<product>openjpeg:2.1.0</product>
</cve>
<cve id="CVE-2016-1925" level="LOW">
<product>lha_for_unix:-</product>
</cve>
<cve id="CVE-2016-1922" level="LOW">
<product>qemu</product>
</cve>
<cve id="CVE-2016-1923" level="MEDIUM">
<product>openjpeg:2.1.0</product>
</cve>
<cve id="CVE-2016-1920" level="MEDIUM">
<product>knox:1.0</product>
</cve>
<cve id="CVE-2016-7008" level="LOW">
<product>acrobat:11.0.17</product>
<product>acrobat_dc:15.006.30201</product>
<product>acrobat_dc:15.017.20053</product>
<product>acrobat_reader_dc:15.006.30201</product>
<product>acrobat_reader_dc:15.017.20053</product>
<product>reader:11.0.17</product>
</cve>
<cve id="CVE-2016-4200" level="MEDIUM">
<product>acrobat:11.0.16</product>
<product>acrobat_dc:15.006.30174</product>
<product>acrobat_dc:15.016.20045</product>
<product>acrobat_reader_dc:15.006.30174</product>
<product>acrobat_reader_dc:15.016.20045</product>
<product>reader:11.0.16</product>
</cve>
<cve id="CVE-2016-4201" level="LOW">
<product>acrobat:11.0.16</product>
<product>acrobat_dc:15.006.30174</product>
<product>acrobat_dc:15.016.20045</product>
<product>acrobat_reader_dc:15.006.30174</product>
<product>acrobat_reader_dc:15.016.20045</product>
<product>reader:11.0.16</product>
</cve>
<cve id="CVE-2016-4202" level="MEDIUM">
<product>acrobat:11.0.16</product>
<product>acrobat_dc:15.006.30174</product>
<product>acrobat_dc:15.016.20045</product>
<product>acrobat_reader_dc:15.006.30174</product>
<product>acrobat_reader_dc:15.016.20045</product>
<product>reader:11.0.16</product>
</cve>
<cve id="CVE-2016-4203" level="LOW">
<product>acrobat:11.0.16</product>
<product>acrobat_dc:15.006.30174</product>
<product>acrobat_dc:15.016.20045</product>
<product>acrobat_reader_dc:15.006.30174</product>
<product>acrobat_reader_dc:15.016.20045</product>
<product>reader:11.0.16</product>
</cve>
<cve id="CVE-2016-4204" level="LOW">
<product>acrobat:11.0.16</product>
<product>acrobat_dc:15.006.30174</product>
<product>acrobat_dc:15.016.20045</product>
<product>acrobat_reader_dc:15.006.30174</product>
<product>acrobat_reader_dc:15.016.20045</product>
<product>reader:11.0.16</product>
</cve>
<cve id="CVE-2016-4205" level="LOW">
<product>acrobat:11.0.16</product>
<product>acrobat_dc:15.006.30174</product>
<product>acrobat_dc:15.016.20045</product>
<product>acrobat_reader_dc:15.006.30174</product>
<product>acrobat_reader_dc:15.016.20045</product>
<product>reader:11.0.16</product>
</cve>
<cve id="CVE-2016-4206" level="LOW">
<product>acrobat:11.0.16</product>
<product>acrobat_dc:15.006.30174</product>
<product>acrobat_dc:15.016.20045</product>
<product>acrobat_reader_dc:15.006.30174</product>
<product>acrobat_reader_dc:15.016.20045</product>
<product>reader:11.0.16</product>
</cve>
<cve id="CVE-2016-4207" level="LOW">
<product>acrobat:11.0.16</product>
<product>acrobat_dc:15.006.30174</product>
<product>acrobat_dc:15.016.20045</product>
<product>acrobat_reader_dc:15.006.30174</product>
<product>acrobat_reader_dc:15.016.20045</product>
<product>reader:11.0.16</product>
</cve>
<cve id="CVE-2016-4208" level="LOW">
<product>acrobat:11.0.16</product>
<product>acrobat_dc:15.006.30174</product>
<product>acrobat_dc:15.016.20045</product>
<product>acrobat_reader_dc:15.006.30174</product>
<product>acrobat_reader_dc:15.016.20045</product>
<product>reader:11.0.16</product>
</cve>
<cve id="CVE-2016-4209" level="LOW">
<product>acrobat:11.0.16</product>
<product>acrobat_dc:15.006.30174</product>
<product>acrobat_dc:15.016.20045</product>
<product>acrobat_reader_dc:15.006.30174</product>
<product>acrobat_reader_dc:15.016.20045</product>
<product>reader:11.0.16</product>
</cve>
<cve id="CVE-2016-3274" level="HIGH">
<product>edge</product>
<product>internet_explorer:9</product>
<product>internet_explorer:10</product>
<product>internet_explorer:11</product>
</cve>
<cve id="CVE-2016-3276" level="HIGH">
<product>internet_explorer:11</product>
</cve>
<cve id="CVE-2016-3277" level="HIGH">
<product>edge:-</product>
<product>internet_explorer:10</product>
<product>internet_explorer:11</product>
</cve>
<cve id="CVE-2016-3271" level="MEDIUM">
<product>edge:-</product>
</cve>
<cve id="CVE-2016-3273" level="HIGH">
<product>edge</product>
<product>internet_explorer:9</product>
<product>internet_explorer:10</product>
<product>internet_explorer:11</product>
</cve>
<cve id="CVE-2016-3278" level="MEDIUM">
<product>outlook:2010</product>
<product>outlook:2013</product>
<product>outlook:2016</product>
<product>outlook_rt:2013</product>
</cve>
<cve id="CVE-2016-1568" level="MEDIUM">
<product>qemu:-</product>
</cve>
<cve id="CVE-2016-1569" level="LOW">
<product>firebird:2.5.5</product>
</cve>
<cve id="CVE-2016-4510" level="LOW">
<product>vtscada:8.0.05</product>
<product>vtscada:8.0.12</product>
<product>vtscada:8.0.16</product>
<product>vtscada:8.0.18</product>
<product>vtscada:8.1.05</product>
<product>vtscada:8.1.06</product>
<product>vtscada:9.0.02</product>
<product>vtscada:9.0.03</product>
<product>vtscada:9.0.08</product>
<product>vtscada:9.1.02</product>
<product>vtscada:9.1.03</product>
<product>vtscada:9.1.05</product>
<product>vtscada:9.1.09</product>
<product>vtscada:9.1.11</product>
<product>vtscada:9.1.14</product>
<product>vtscada:9.1.20</product>
<product>vtscada:10.0.11</product>
<product>vtscada:10.0.13</product>
<product>vtscada:10.0.14</product>
<product>vtscada:10.0.16</product>
<product>vtscada:10.0.17</product>
<product>vtscada:10.1.05</product>
<product>vtscada:10.1.06</product>
<product>vtscada:10.1.07</product>
<product>vtscada:10.1.12</product>
<product>vtscada:10.2.05</product>
<product>vtscada:10.2.07</product>
<product>vtscada:10.2.08</product>
<product>vtscada:10.2.11</product>
<product>vtscada:10.2.13</product>
<product>vtscada:10.2.14</product>
<product>vtscada:10.2.15</product>
<product>vtscada:10.2.17</product>
<product>vtscada:10.2.19</product>
<product>vtscada:10.2.20</product>
<product>vtscada:10.2.21</product>
<product>vtscada:10.2.22</product>
<product>vtscada:11.0.05</product>
<product>vtscada:11.0.07</product>
<product>vtscada:11.1.05</product>
<product>vtscada:11.1.06</product>
<product>vtscada:11.1.09</product>
<product>vtscada:11.1.10</product>
<product>vtscada:11.1.13</product>
<product>vtscada:11.1.14</product>
<product>vtscada:11.1.15</product>
<product>vtscada:11.1.16</product>
<product>vtscada:11.1.17</product>
<product>vtscada:11.1.18</product>
<product>vtscada:11.1.19</product>
<product>vtscada:11.1.20</product>
<product>vtscada:11.1.21</product>
<product>vtscada:11.1.22</product>
<product>vtscada:11.1.24</product>
</cve>
<cve id="CVE-2016-4047" level="LOW">
<product>open-xchange_appsuite:7.8.1</product>
</cve>
<cve id="CVE-2016-4513" level="MEDIUM">
<product>powerlogic_pm8ecc_firmware:2.60</product>
</cve>
<cve id="CVE-2016-4042" level="LOW">
<product>plone:3.3</product>
<product>plone:3.3.1</product>
<product>plone:3.3.2</product>
<product>plone:3.3.3</product>
<product>plone:3.3.4</product>
<product>plone:3.3.5</product>
<product>plone:3.3.6</product>
<product>plone:4.0</product>
<product>plone:4.0.1</product>
<product>plone:4.0.2</product>
<product>plone:4.0.3</product>
<product>plone:4.0.4</product>
<product>plone:4.0.5</product>
<product>plone:4.0.7</product>
<product>plone:4.0.8</product>
<product>plone:4.0.9</product>
<product>plone:4.0.10</product>
<product>plone:4.1</product>
<product>plone:4.1.1</product>
<product>plone:4.1.2</product>
<product>plone:4.1.3</product>
<product>plone:4.1.4</product>
<product>plone:4.1.5</product>
<product>plone:4.1.6</product>
<product>plone:4.2</product>
<product>plone:4.2.1</product>
<product>plone:4.2.2</product>
<product>plone:4.2.3</product>
<product>plone:4.2.4</product>
<product>plone:4.2.5</product>
<product>plone:4.2.6</product>
<product>plone:4.2.7</product>
<product>plone:4.3</product>
<product>plone:4.3.1</product>
<product>plone:4.3.2</product>
<product>plone:4.3.3</product>
<product>plone:4.3.4</product>
<product>plone:4.3.5</product>
<product>plone:4.3.6</product>
<product>plone:4.3.7</product>
<product>plone:4.3.8</product>
<product>plone:4.3.9</product>
<product>plone:5.0</product>
<product>plone:5.0</product>
<product>plone:5.0</product>
<product>plone:5.0</product>
<product>plone:5.0</product>
<product>plone:5.0.1</product>
<product>plone:5.0.2</product>
<product>plone:5.0.3</product>
<product>plone:5.0.4</product>
</cve>
<cve id="CVE-2016-1563" level="MEDIUM">
<product>clustered_data_ontap:8.3.1</product>
</cve>
<cve id="CVE-2016-4040" level="LOW">
<product>dotcms:3.3.1</product>
</cve>
<cve id="CVE-2016-1561" level="LOW">
<product>ex10000e_firmware:4.8</product>
<product>ex13000e_firmware:4.8</product>
<product>ex21000e_firmware:4.8</product>
<product>ex3000_firmware:4.8</product>
<product>ex32000e_firmware:4.8</product>
<product>ex40000e_firmware:4.8</product>
<product>ex5000_firmware:4.8</product>
<product>ex7000_firmware:4.8</product>
</cve>
<cve id="CVE-2016-9333" level="LOW">
<product>softcms:1.5</product>
</cve>
<cve id="CVE-2016-9332" level="LOW">
<product>softcms:1.5</product>
</cve>
<cve id="CVE-2016-9337" level="HIGH">
<product>gateway_ecu:-</product>
</cve>
<cve id="CVE-2016-3235" level="MEDIUM">
<product>visio:2007</product>
<product>visio:2010</product>
<product>visio:2013</product>
<product>visio:2016</product>
<product>visio_viewer:2007</product>
<product>visio_viewer:2010</product>
</cve>
<cve id="CVE-2016-9334" level="LOW">
<product>1763-l16awa_series_a:14.000</product>
<product>1763-l16awa_series_b:14.000</product>
<product>1763-l16bbb_series_a:14.000</product>
<product>1763-l16bbb_series_b:14.000</product>
<product>1763-l16bwa_series_a:14.000</product>
<product>1763-l16bwa_series_b:14.000</product>
<product>1763-l16dwd_series_a:14.000</product>
<product>1763-l16dwd_series_b:14.000</product>
<product>1766-l32awa_series_a:15.004</product>
<product>1766-l32awa_series_b:15.004</product>
<product>1766-l32awaa_series_a:15.004</product>
<product>1766-l32awaa_series_b:15.004</product>
<product>1766-l32bwa_series_a:15.004</product>
<product>1766-l32bwa_series_b:15.004</product>
<product>1766-l32bwaa_series_a:15.004</product>
<product>1766-l32bwaa_series_b:15.004</product>
<product>1766-l32bxb_series_a:15.004</product>
<product>1766-l32bxb_series_b:15.004</product>
<product>1766-l32bxba_series_a:15.004</product>
<product>1766-l32bxba_series_b:15.004</product>
</cve>
<cve id="CVE-2016-9339" level="LOW">
<product>vdr_g4e_firmware:5.220</product>
</cve>
<cve id="CVE-2016-9338" level="LOW">
<product>1763-l16awa_series_a:14.000</product>
<product>1763-l16awa_series_b:14.000</product>
<product>1763-l16bbb_series_a:14.000</product>
<product>1763-l16bbb_series_b:14.000</product>
<product>1763-l16bwa_series_a:14.000</product>
<product>1763-l16bwa_series_b:14.000</product>
<product>1763-l16dwd_series_a:14.000</product>
<product>1763-l16dwd_series_b:14.000</product>
<product>1766-l32awa_series_a:15.004</product>
<product>1766-l32awa_series_b:15.004</product>
<product>1766-l32awaa_series_a:15.004</product>
<product>1766-l32awaa_series_b:15.004</product>
<product>1766-l32bwa_series_a:15.004</product>
<product>1766-l32bwa_series_b:15.004</product>
<product>1766-l32bwaa_series_a:15.004</product>
<product>1766-l32bwaa_series_b:15.004</product>
<product>1766-l32bxb_series_a:15.004</product>
<product>1766-l32bxb_series_b:15.004</product>
<product>1766-l32bxba_series_a:15.004</product>
<product>1766-l32bxba_series_b:15.004</product>
</cve>
<cve id="CVE-2016-5849" level="MEDIUM">
<product>sicam_pas:8.06</product>
</cve>
<cve id="CVE-2016-5848" level="LOW">
<product>sicam_pas:8.06</product>
</cve>
<cve id="CVE-2016-5845" level="LOW">
<product>sapcar_archive_tool:-</product>
</cve>
<cve id="CVE-2016-5336" level="LOW">
<product>vrealize_automation:7.0</product>
<product>vrealize_automation:7.0.1</product>
</cve>
<cve id="CVE-2016-5847" level="MEDIUM">
<product>sapcar_archive_tool:-</product>
</cve>
<cve id="CVE-2016-5334" level="LOW">
<product>identity_manger:2.0</product>
<product>identity_manger:2.1.0</product>
<product>identity_manger:2.1.1</product>
<product>identity_manger:2.4</product>
<product>identity_manger:2.6</product>
<product>identity_manger:2.7</product>
<product>vrealize_automation:7.0</product>
<product>vrealize_automation:7.0.1</product>
<product>vrealize_automation:7.1</product>
</cve>
<cve id="CVE-2016-5333" level="MEDIUM">
<product>photon_os:1.0</product>
</cve>
<cve id="CVE-2016-5840" level="LOW">
<product>deep_discovery_inspector:3.7</product>
<product>deep_discovery_inspector:3.81</product>
<product>deep_discovery_inspector:3.82</product>
</cve>
<cve id="CVE-2016-5843" level="LOW">
<product>faq:2.0.1</product>
<product>faq:2.0.2</product>
<product>faq:2.0.3</product>
<product>faq:2.0.4</product>
<product>faq:2.0.5</product>
<product>faq:2.0.6</product>
<product>faq:2.0.7</product>
<product>faq:2.0.8</product>
<product>faq:2.1.0</product>
<product>faq:2.1.1</product>
<product>faq:2.1.2</product>
<product>faq:2.1.3</product>
<product>faq:2.1.4</product>
<product>faq:2.2.0</product>
<product>faq:2.2.1</product>
<product>faq:2.2.2</product>
<product>faq:2.2.3</product>
<product>faq:2.3.0</product>
<product>faq:2.3.1</product>
<product>faq:2.3.2</product>
<product>faq:2.3.3</product>
<product>faq:2.3.4</product>
<product>faq:4.0.0</product>
<product>faq:4.0.1</product>
<product>faq:4.0.2</product>
<product>faq:4.0.3</product>
<product>faq:5.0.0</product>
<product>faq:5.0.1</product>
<product>faq:5.0.2</product>
<product>faq:5.0.3</product>
</cve>
<cve id="CVE-2016-5330" level="MEDIUM">
<product>fusion:8.1</product>
<product>fusion:8.1</product>
<product>fusion:8.1.1</product>
<product>tools:10.0.5</product>
<product>workstation_player:12.1</product>
<product>workstation_player:12.1.1</product>
<product>workstation_pro:12.1</product>
<product>workstation_pro:12.1.1</product>
<product>esxi:5.0</product>
<product>esxi:5.1</product>
<product>esxi:5.5</product>
<product>esxi:6.0</product>
</cve>
<cve id="CVE-2016-10319" level="MEDIUM">
<product>arm_trusted_firmware:1.2</product>
<product>arm_trusted_firmware:1.3</product>
</cve>
<cve id="CVE-2016-10316" level="MEDIUM">
<product>al3g_firmware:2.23m</product>
<product>al5000ac_firmware:1.13</product>
<product>al59300_firmware:1.04</product>
</cve>
<cve id="CVE-2016-4198" level="MEDIUM">
<product>acrobat:11.0.16</product>
<product>acrobat_dc:15.006.30174</product>
<product>acrobat_dc:15.016.20045</product>
<product>acrobat_reader_dc:15.006.30174</product>
<product>acrobat_reader_dc:15.016.20045</product>
<product>reader:11.0.16</product>
</cve>
<cve id="CVE-2016-10314" level="LOW">
<product>al3g_firmware:2.23m</product>
<product>al5000ac_firmware:1.13</product>
<product>al59300_firmware:1.04</product>
</cve>
<cve id="CVE-2016-10315" level="MEDIUM">
<product>al3g_firmware:2.23m</product>
<product>al5000ac_firmware:1.13</product>
<product>al59300_firmware:1.04</product>
</cve>
<cve id="CVE-2016-10312" level="LOW">
<product>al3g_firmware:2.23m</product>
<product>al5000ac_firmware:1.13</product>
<product>al59300_firmware:1.04</product>
</cve>
<cve id="CVE-2016-10313" level="MEDIUM">
<product>al3g_firmware:2.23m</product>
<product>al5000ac_firmware:1.13</product>
<product>al59300_firmware:1.04</product>
</cve>
<cve id="CVE-2016-10310" level="LOW">
<product>sql_anywhere:17.0</product>
</cve>
<cve id="CVE-2016-4199" level="MEDIUM">
<product>acrobat:11.0.16</product>
<product>acrobat_dc:15.006.30174</product>
<product>acrobat_dc:15.016.20045</product>
<product>acrobat_reader_dc:15.006.30174</product>
<product>acrobat_reader_dc:15.016.20045</product>
<product>reader:11.0.16</product>
</cve>
<cve id="CVE-2016-0860" level="LOW">
<product>webaccess:8.0</product>
</cve>
<cve id="CVE-2016-0861" level="LOW">
<product>ups_snmp_web_adapter_firmware:4.7</product>
</cve>
<cve id="CVE-2016-0862" level="LOW">
<product>snmp_web_adapter_firmware:4.7</product>
</cve>
<cve id="CVE-2016-0863" level="MEDIUM">
<product>smartgrid_lighthouse_sensor_management_system:4.1.0</product>
<product>smartgrid_lighthouse_sensor_management_system:5.0</product>
</cve>
<cve id="CVE-2016-0864" level="LOW">
<product>smartgrid_lighthouse_sensor_management_system:4.1.0</product>
<product>smartgrid_lighthouse_sensor_management_system:5.0</product>
</cve>
<cve id="CVE-2016-0865" level="LOW">
<product>smartgrid_lighthouse_sensor_management_system:4.1.0</product>
<product>smartgrid_lighthouse_sensor_management_system:5.0</product>
</cve>
<cve id="CVE-2016-0866" level="MEDIUM">
<product>smartgrid_lighthouse_sensor_management_system:4.1.0</product>
<product>smartgrid_lighthouse_sensor_management_system:5.0</product>
</cve>
<cve id="CVE-2016-0867" level="LOW">
<product>plantvisor_enhanced</product>
</cve>
<cve id="CVE-2016-0868" level="LOW">
<product>1763-l16awa_series_a:15.000</product>
<product>1763-l16awa_series_b:15.000</product>
<product>1763-l16bbb_series_a:15.000</product>
<product>1763-l16bbb_series_b:15.000</product>
<product>1763-l16bwa_series_a:15.000</product>
<product>1763-l16bwa_series_b:15.000</product>
<product>1763-l16dwd_series_a:15.000</product>
<product>1763-l16dwd_series_b:15.000</product>
</cve>
<cve id="CVE-2016-0869" level="MEDIUM">
<product>promotic:8.3.10</product>
</cve>
<cve id="CVE-2016-3072" level="LOW">
<product>katello:-</product>
<product>satellite:6.1</product>
</cve>
<cve id="CVE-2016-2310" level="LOW">
<product>multilink_firmware:5.4.1</product>
<product>multilink_firmware:5.5.0</product>
</cve>
<cve id="CVE-2016-2311" level="LOW">
<product>alertwerks_servsensor_contact_firmware:-</product>
<product>alertwerks_servsensor_firmware:-</product>
<product>alertwerks_servsensor_junior_firmware:-</product>
<product>alertwerks_servsensor_junior_firmware:-</product>
</cve>
<cve id="CVE-2016-2312" level="LOW">
<product>kscreenlocker:5.5.4</product>
<product>plasma-workspace:5.4.3</product>
<product>fedora:22</product>
<product>fedora:23</product>
<product>leap:42.1</product>
</cve>
<cve id="CVE-2016-2313" level="LOW">
<product>cacti:0.8.8f</product>
<product>leap:42.1</product>
<product>opensuse:13.1</product>
<product>opensuse:13.2</product>
</cve>
<cve id="CVE-2016-2314" level="MEDIUM">
<product>mt882_firmware:v200r002b022_arg</product>
</cve>
<cve id="CVE-2016-2316" level="MEDIUM">
<product>asterisk:1.8.0</product>
<product>asterisk:1.8.0</product>
<product>asterisk:1.8.0</product>
<product>asterisk:1.8.0</product>
<product>asterisk:1.8.0</product>
<product>asterisk:1.8.0</product>
<product>asterisk:1.8.0</product>
<product>asterisk:1.8.0</product>
<product>asterisk:1.8.0</product>
<product>asterisk:1.8.0</product>
<product>asterisk:1.8.1</product>
<product>asterisk:1.8.1</product>
<product>asterisk:1.8.1.1</product>
<product>asterisk:1.8.1.2</product>
<product>asterisk:1.8.2</product>
<product>asterisk:1.8.2.1</product>
<product>asterisk:1.8.2.2</product>
<product>asterisk:1.8.2.3</product>
<product>asterisk:1.8.2.4</product>
<product>asterisk:1.8.3</product>
<product>asterisk:1.8.3</product>
<product>asterisk:1.8.3</product>
<product>asterisk:1.8.3</product>
<product>asterisk:1.8.3.1</product>
<product>asterisk:1.8.3.2</product>
<product>asterisk:1.8.3.3</product>
<product>asterisk:1.8.4</product>
<product>asterisk:1.8.4</product>
<product>asterisk:1.8.4</product>
<product>asterisk:1.8.4</product>
<product>asterisk:1.8.4.1</product>
<product>asterisk:1.8.4.2</product>
<product>asterisk:1.8.4.3</product>
<product>asterisk:1.8.4.4</product>
<product>asterisk:1.8.5</product>
<product>asterisk:1.8.5</product>
<product>asterisk:1.8.5.0</product>
<product>asterisk:1.8.6.0</product>
<product>asterisk:1.8.6.0</product>
<product>asterisk:1.8.6.0</product>
<product>asterisk:1.8.6.0</product>
<product>asterisk:1.8.7.0</product>
<product>asterisk:1.8.7.0</product>
<product>asterisk:1.8.7.0</product>
<product>asterisk:1.8.7.1</product>
<product>asterisk:1.8.8.0</product>
<product>asterisk:1.8.8.0</product>
<product>asterisk:1.8.8.0</product>
<product>asterisk:1.8.8.0</product>
<product>asterisk:1.8.8.0</product>
<product>asterisk:1.8.8.0</product>
<product>asterisk:1.8.8.0</product>
<product>asterisk:1.8.8.0</product>
<product>asterisk:1.8.8.1</product>
<product>asterisk:1.8.8.2</product>
<product>asterisk:1.8.9.0</product>
<product>asterisk:1.8.9.0</product>
<product>asterisk:1.8.9.0</product>
<product>asterisk:1.8.9.0</product>
<product>asterisk:1.8.9.0</product>
<product>asterisk:1.8.9.1</product>
<product>asterisk:1.8.9.2</product>
<product>asterisk:1.8.9.3</product>
<product>asterisk:1.8.10.0</product>
<product>asterisk:1.8.10.0</product>
<product>asterisk:1.8.10.0</product>
<product>asterisk:1.8.10.0</product>
<product>asterisk:1.8.10.0</product>
<product>asterisk:1.8.10.0</product>
<product>asterisk:1.8.10.1</product>
<product>asterisk:1.8.11.0</product>
<product>asterisk:1.8.11.0</product>
<product>asterisk:1.8.11.0</product>
<product>asterisk:1.8.11.0</product>
<product>asterisk:1.8.11.0</product>
<product>asterisk:1.8.11.1</product>
<product>asterisk:1.8.11.1</product>
<product>asterisk:1.8.11.1</product>
<product>asterisk:1.8.12</product>
<product>asterisk:1.8.12.0</product>
<product>asterisk:1.8.12.0</product>
<product>asterisk:1.8.12.0</product>
<product>asterisk:1.8.12.0</product>
<product>asterisk:1.8.12.0</product>
<product>asterisk:1.8.12.1</product>
<product>asterisk:1.8.12.2</product>
<product>asterisk:1.8.13.0</product>
<product>asterisk:1.8.13.0</product>
<product>asterisk:1.8.13.0</product>
<product>asterisk:1.8.13.1</product>
<product>asterisk:1.8.14.0</product>
<product>asterisk:1.8.14.0</product>
<product>asterisk:1.8.14.0</product>
<product>asterisk:1.8.14.0</product>
<product>asterisk:1.8.14.1</product>
<product>asterisk:1.8.14.1</product>
<product>asterisk:1.8.14.1</product>
<product>asterisk:1.8.15.0</product>
<product>asterisk:1.8.15.0</product>
<product>asterisk:1.8.15.0</product>
<product>asterisk:1.8.15.1</product>
<product>asterisk:1.8.16.0</product>
<product>asterisk:1.8.16.0</product>
<product>asterisk:1.8.16.0</product>
<product>asterisk:1.8.16.0</product>
<product>asterisk:1.8.17.0</product>
<product>asterisk:1.8.17.0</product>
<product>asterisk:1.8.17.0</product>
<product>asterisk:1.8.17.0</product>
<product>asterisk:1.8.17.0</product>
<product>asterisk:1.8.17.0</product>
<product>asterisk:1.8.18.0</product>
<product>asterisk:1.8.18.0</product>
<product>asterisk:1.8.18.0</product>
<product>asterisk:1.8.18.1</product>
<product>asterisk:1.8.19.0</product>
<product>asterisk:1.8.19.0</product>
<product>asterisk:1.8.19.0</product>
<product>asterisk:1.8.19.0</product>
<product>asterisk:1.8.19.1</product>
<product>asterisk:1.8.20.0</product>
<product>asterisk:1.8.20.0</product>
<product>asterisk:1.8.20.0</product>
<product>asterisk:1.8.20.0</product>
<product>asterisk:1.8.20.1</product>
<product>asterisk:1.8.20.1</product>
<product>asterisk:1.8.20.2</product>
<product>asterisk:1.8.20.2</product>
<product>asterisk:1.8.21.0</product>
<product>asterisk:1.8.21.0</product>
<product>asterisk:1.8.21.0</product>
<product>asterisk:1.8.22.0</product>
<product>asterisk:1.8.22.0</product>
<product>asterisk:1.8.22.0</product>
<product>asterisk:1.8.23.0</product>
<product>asterisk:1.8.23.0</product>
<product>asterisk:1.8.23.0</product>
<product>asterisk:1.8.23.0</product>
<product>asterisk:1.8.23.1</product>
<product>asterisk:1.8.24.0</product>
<product>asterisk:1.8.24.0</product>
<product>asterisk:1.8.24.0</product>
<product>asterisk:1.8.24.1</product>
<product>asterisk:1.8.25.0</product>
<product>asterisk:1.8.25.0</product>
<product>asterisk:1.8.25.0</product>
<product>asterisk:1.8.26.0</product>
<product>asterisk:1.8.26.0</product>
<product>asterisk:1.8.26.1</product>
<product>asterisk:1.8.27.0</product>
<product>asterisk:1.8.27.0</product>
<product>asterisk:1.8.27.0</product>
<product>asterisk:1.8.28.0</product>
<product>asterisk:1.8.28.0</product>
<product>asterisk:1.8.28.1</product>
<product>asterisk:1.8.28.2</product>
<product>asterisk:1.8.32.0</product>
<product>asterisk:11.0.0</product>
<product>asterisk:11.0.0</product>
<product>asterisk:11.0.0</product>
<product>asterisk:11.0.0</product>
<product>asterisk:11.0.0</product>
<product>asterisk:11.0.1</product>
<product>asterisk:11.0.2</product>
<product>asterisk:11.1.0</product>
<product>asterisk:11.1.0</product>
<product>asterisk:11.1.0</product>
<product>asterisk:11.1.0</product>
<product>asterisk:11.1.1</product>
<product>asterisk:11.1.2</product>
<product>asterisk:11.2.0</product>
<product>asterisk:11.4.0</product>
<product>asterisk:11.6.0</product>
<product>asterisk:11.6.0</product>
<product>asterisk:11.6.0</product>
<product>asterisk:11.7.0</product>
<product>asterisk:11.7.0</product>
<product>asterisk:11.7.0</product>
<product>asterisk:11.8.0</product>
<product>asterisk:11.8.0</product>
<product>asterisk:11.8.0</product>
<product>asterisk:11.8.0</product>
<product>asterisk:11.8.1</product>
<product>asterisk:11.9.0</product>
<product>asterisk:11.9.0</product>
<product>asterisk:11.9.0</product>
<product>asterisk:11.9.0</product>
<product>asterisk:11.10.0</product>
<product>asterisk:11.10.0</product>
<product>asterisk:11.10.1</product>
<product>asterisk:11.10.1</product>
<product>asterisk:11.11.0</product>
<product>asterisk:11.11.0</product>
<product>asterisk:11.12.0</product>
<product>asterisk:11.12.0</product>
<product>asterisk:11.13.0</product>
<product>asterisk:11.13.0</product>
<product>asterisk:11.14.0</product>
<product>asterisk:11.14.0</product>
<product>asterisk:11.14.0</product>
<product>asterisk:11.15.0</product>
<product>asterisk:11.15.0</product>
<product>asterisk:11.15.0</product>
<product>asterisk:11.16.0</product>
<product>asterisk:11.16.0</product>
<product>asterisk:11.17.0</product>
<product>asterisk:11.18.0</product>
<product>asterisk:11.18.0</product>
<product>asterisk:11.19.0</product>
<product>asterisk:11.20.0</product>
<product>asterisk:11.21.0</product>
<product>asterisk:11.21.0</product>
<product>asterisk:11.21.0</product>
<product>asterisk:11.21.0</product>
<product>asterisk:12.0.0</product>
<product>asterisk:12.1.0</product>
<product>asterisk:12.1.0</product>
<product>asterisk:12.1.0</product>
<product>asterisk:12.1.0</product>
<product>asterisk:12.1.1</product>
<product>asterisk:12.2.0</product>
<product>asterisk:12.2.0</product>
<product>asterisk:12.2.0</product>
<product>asterisk:12.2.0</product>
<product>asterisk:12.3.0</product>
<product>asterisk:12.3.0</product>
<product>asterisk:12.3.0</product>
<product>asterisk:12.3.1</product>
<product>asterisk:12.3.2</product>
<product>asterisk:12.4.0</product>
<product>asterisk:12.4.0</product>
<product>asterisk:12.5.0</product>
<product>asterisk:12.5.0</product>
<product>asterisk:12.6.0</product>
<product>asterisk:12.6.0</product>
<product>asterisk:12.7.0</product>
<product>asterisk:12.7.0</product>
<product>asterisk:12.7.0</product>
<product>asterisk:12.7.0</product>
<product>asterisk:12.7.1</product>
<product>asterisk:12.8.0</product>
<product>asterisk:12.8.0</product>
<product>asterisk:12.8.0</product>
<product>asterisk:12.8.1</product>
<product>asterisk:12.8.2</product>
<product>asterisk:13.0.0</product>
<product>asterisk:13.0.1</product>
<product>asterisk:13.1.0</product>
<product>asterisk:13.1.0</product>
<product>asterisk:13.1.0</product>
<product>asterisk:13.2.0</product>
<product>asterisk:13.2.0</product>
<product>asterisk:13.3.0</product>
<product>asterisk:13.4.0</product>
<product>asterisk:13.4.0</product>
<product>asterisk:13.5.0</product>
<product>asterisk:13.5.0</product>
<product>asterisk:13.6.0</product>
<product>asterisk:13.7.0</product>
<product>asterisk:13.7.0</product>
<product>asterisk:13.7.0</product>
<product>asterisk:13.7.0</product>
<product>certified_asterisk:1.8.28</product>
<product>certified_asterisk:11.6</product>
<product>certified_asterisk:11.6</product>
<product>certified_asterisk:11.6</product>
<product>certified_asterisk:11.6</product>
<product>certified_asterisk:11.6</product>
<product>certified_asterisk:11.6</product>
<product>certified_asterisk:11.6</product>
<product>certified_asterisk:11.6</product>
<product>certified_asterisk:11.6</product>
<product>certified_asterisk:11.6</product>
<product>certified_asterisk:11.6</product>
<product>certified_asterisk:11.6</product>
<product>certified_asterisk:11.6</product>
<product>certified_asterisk:11.6</product>
<product>certified_asterisk:11.6</product>
<product>certified_asterisk:11.6.0</product>
<product>certified_asterisk:11.6.0</product>
<product>certified_asterisk:11.6.0</product>
<product>certified_asterisk:11.6.0</product>
<product>certified_asterisk:13.1</product>
<product>certified_asterisk:13.1</product>
<product>certified_asterisk:13.1</product>
<product>certified_asterisk:13.1.0</product>
<product>certified_asterisk:13.1.0</product>
<product>certified_asterisk:13.1.0</product>
<product>fedora:22</product>
<product>fedora:23</product>
</cve>
<cve id="CVE-2016-8886" level="MEDIUM">
<product>jasper:1.900.10</product>
</cve>
<cve id="CVE-2016-8887" level="MEDIUM">
<product>jasper:1.900.9</product>
<product>fedora:23</product>
<product>fedora:24</product>
</cve>
<cve id="CVE-2016-8884" level="MEDIUM">
<product>jasper:1.900.5</product>
<product>fedora:23</product>
<product>fedora:24</product>
</cve>
<cve id="CVE-2016-8885" level="MEDIUM">
<product>jasper:1.900.8</product>
</cve>
<cve id="CVE-2016-8882" level="MEDIUM">
<product>jasper:1.900.7</product>
</cve>
<cve id="CVE-2016-8883" level="MEDIUM">
<product>jasper:1.900.7</product>
</cve>
<cve id="CVE-2016-7279" level="HIGH">
<product>edge:-</product>
<product>internet_explorer:9</product>
<product>internet_explorer:10</product>
<product>internet_explorer:11</product>
</cve>
<cve id="CVE-2016-8889" level="LOW">
<product>bitcoin_knots:0.11.0</product>
<product>bitcoin_knots:0.11.0</product>
<product>bitcoin_knots:0.11.0</product>
<product>bitcoin_knots:0.11.0</product>
<product>bitcoin_knots:0.11.1</product>
<product>bitcoin_knots:0.11.1</product>
<product>bitcoin_knots:0.11.1</product>
<product>bitcoin_knots:0.11.2</product>
<product>bitcoin_knots:0.11.2</product>
<product>bitcoin_knots:0.12.0</product>
<product>bitcoin_knots:0.12.0</product>
<product>bitcoin_knots:0.12.0</product>
<product>bitcoin_knots:0.12.0</product>
<product>bitcoin_knots:0.12.0</product>
<product>bitcoin_knots:0.12.0</product>
<product>bitcoin_knots:0.12.0.knots20160226</product>
<product>bitcoin_knots:0.12.1.knots20160629</product>
<product>bitcoin_knots:0.13.0.knots20160814</product>
</cve>
<cve id="CVE-2016-0731" level="LOW">
<product>ambari:2.2.0</product>
</cve>
<cve id="CVE-2016-7102" level="LOW">
<product>owncloud_desktop:2.2.2</product>
</cve>
<cve id="CVE-2016-7103" level="MEDIUM">
<product>jquery-ui:1.11.4</product>
</cve>
<cve id="CVE-2016-7101" level="MEDIUM">
<product>imagemagick:7.0.2-9</product>
</cve>
<cve id="CVE-2016-0797" level="LOW">
<product>openssl:1.0.1</product>
<product>openssl:1.0.1</product>
<product>openssl:1.0.1</product>
<product>openssl:1.0.1</product>
<product>openssl:1.0.1a</product>
<product>openssl:1.0.1b</product>
<product>openssl:1.0.1c</product>
<product>openssl:1.0.1d</product>
<product>openssl:1.0.1e</product>
<product>openssl:1.0.1f</product>
<product>openssl:1.0.1g</product>
<product>openssl:1.0.1h</product>
<product>openssl:1.0.1i</product>
<product>openssl:1.0.1j</product>
<product>openssl:1.0.1k</product>
<product>openssl:1.0.1l</product>
<product>openssl:1.0.1m</product>
<product>openssl:1.0.1n</product>
<product>openssl:1.0.1o</product>
<product>openssl:1.0.1p</product>
<product>openssl:1.0.1q</product>
<product>openssl:1.0.1r</product>
<product>openssl:1.0.2</product>
<product>openssl:1.0.2</product>
<product>openssl:1.0.2</product>
<product>openssl:1.0.2</product>
<product>openssl:1.0.2a</product>
<product>openssl:1.0.2b</product>
<product>openssl:1.0.2c</product>
<product>openssl:1.0.2d</product>
<product>openssl:1.0.2e</product>
<product>openssl:1.0.2f</product>
</cve>
<cve id="CVE-2016-6549" level="LOW">
<product>nut_mobile:-</product>
</cve>
<cve id="CVE-2016-6548" level="LOW">
<product>nut_mobile:-</product>
</cve>
<cve id="CVE-2016-6019" level="MEDIUM">
<product>emptoris_strategic_supply_management:10.0.0.0</product>
<product>emptoris_strategic_supply_management:10.0.0.1</product>
<product>emptoris_strategic_supply_management:10.0.0.2</product>
<product>emptoris_strategic_supply_management:10.0.0.3</product>
<product>emptoris_strategic_supply_management:10.0.1.0</product>
<product>emptoris_strategic_supply_management:10.0.1.1</product>
<product>emptoris_strategic_supply_management:10.0.1.2</product>
<product>emptoris_strategic_supply_management:10.0.1.3</product>
<product>emptoris_strategic_supply_management:10.0.1.4</product>
<product>emptoris_strategic_supply_management:10.0.2.0</product>
<product>emptoris_strategic_supply_management:10.0.2.1</product>
<product>emptoris_strategic_supply_management:10.0.2.2</product>
<product>emptoris_strategic_supply_management:10.0.2.3</product>
<product>emptoris_strategic_supply_management:10.0.2.4</product>
<product>emptoris_strategic_supply_management:10.0.2.5</product>
<product>emptoris_strategic_supply_management:10.0.2.6</product>
<product>emptoris_strategic_supply_management:10.0.2.7</product>
<product>emptoris_strategic_supply_management:10.0.2.8</product>
<product>emptoris_strategic_supply_management:10.0.2.9</product>
<product>emptoris_strategic_supply_management:10.0.2.10</product>
<product>emptoris_strategic_supply_management:10.0.2.11</product>
<product>emptoris_strategic_supply_management:10.0.2.12</product>
<product>emptoris_strategic_supply_management:10.0.2.13</product>
<product>emptoris_strategic_supply_management:10.0.2.14</product>
<product>emptoris_strategic_supply_management:10.0.2.15</product>
<product>emptoris_strategic_supply_management:10.0.2.16</product>
<product>emptoris_strategic_supply_management:10.0.2.17</product>
<product>emptoris_strategic_supply_management:10.0.4.0</product>
<product>emptoris_strategic_supply_management:10.1.0.0</product>
<product>emptoris_strategic_supply_management:10.1.0.1</product>
<product>emptoris_strategic_supply_management:10.1.0.2</product>
<product>emptoris_strategic_supply_management:10.1.0.3</product>
<product>emptoris_strategic_supply_management:10.1.0.4</product>
<product>emptoris_strategic_supply_management:10.1.0.5</product>
<product>emptoris_strategic_supply_management:10.1.0.6</product>
<product>emptoris_strategic_supply_management:10.1.0.7</product>
<product>emptoris_strategic_supply_management:10.1.0.8</product>
<product>emptoris_strategic_supply_management:10.1.0.9</product>
<product>emptoris_strategic_supply_management:10.1.0.10</product>
<product>emptoris_strategic_supply_management:10.1.0.11</product>
<product>emptoris_strategic_supply_management:10.1.0.12</product>
<product>emptoris_strategic_supply_management:10.1.1.0</product>
<product>emptoris_strategic_supply_management:10.1.1.1</product>
<product>emptoris_strategic_supply_management:10.1.1.2</product>
<product>emptoris_strategic_supply_management:10.1.1.3</product>
<product>emptoris_strategic_supply_management:10.1.1.4</product>
<product>emptoris_strategic_supply_management:10.1.1.5</product>
<product>emptoris_strategic_supply_management:10.1.1.6</product>
<product>emptoris_strategic_supply_management:10.1.1.7</product>
<product>emptoris_strategic_supply_management:10.1.1.8</product>
<product>emptoris_strategic_supply_management:10.1.1.9</product>
<product>emptoris_strategic_supply_management:10.1.1.10</product>
</cve>
<cve id="CVE-2016-6018" level="LOW">
<product>emptoris_contract_management:10.0.0.0</product>
<product>emptoris_contract_management:10.0.0.1</product>
<product>emptoris_contract_management:10.0.1.0</product>
<product>emptoris_contract_management:10.0.1.1</product>
<product>emptoris_contract_management:10.0.1.2</product>
<product>emptoris_contract_management:10.0.1.3</product>
<product>emptoris_contract_management:10.0.1.4</product>
<product>emptoris_contract_management:10.0.1.5</product>
<product>emptoris_contract_management:10.0.2.0</product>
<product>emptoris_contract_management:10.0.2.1</product>
<product>emptoris_contract_management:10.0.2.2</product>
<product>emptoris_contract_management:10.0.2.3</product>
<product>emptoris_contract_management:10.0.2.5</product>
<product>emptoris_contract_management:10.0.2.6</product>
<product>emptoris_contract_management:10.0.2.7</product>
<product>emptoris_contract_management:10.0.2.8</product>
<product>emptoris_contract_management:10.0.2.9</product>
<product>emptoris_contract_management:10.0.2.10</product>
<product>emptoris_contract_management:10.0.2.11</product>
<product>emptoris_contract_management:10.0.2.12</product>
<product>emptoris_contract_management:10.0.2.13</product>
<product>emptoris_contract_management:10.0.2.14</product>
<product>emptoris_contract_management:10.0.2.15</product>
<product>emptoris_contract_management:10.0.2.16</product>
<product>emptoris_contract_management:10.0.2.17</product>
<product>emptoris_contract_management:10.0.4.0</product>
<product>emptoris_contract_management:10.1.0.0</product>
</cve>
<cve id="CVE-2016-3060" level="MEDIUM">
<product>financial_transaction_manager:3.0.0.0</product>
<product>financial_transaction_manager:3.0.0.0</product>
<product>financial_transaction_manager:3.0.0.0</product>
<product>financial_transaction_manager:3.0.0.1</product>
<product>financial_transaction_manager:3.0.0.1</product>
<product>financial_transaction_manager:3.0.0.1</product>
<product>financial_transaction_manager:3.0.0.2</product>
<product>financial_transaction_manager:3.0.0.2</product>
<product>financial_transaction_manager:3.0.0.2</product>
<product>financial_transaction_manager:3.0.0.3</product>
<product>financial_transaction_manager:3.0.0.3</product>
<product>financial_transaction_manager:3.0.0.3</product>
<product>financial_transaction_manager:3.0.0.4</product>
<product>financial_transaction_manager:3.0.0.4</product>
<product>financial_transaction_manager:3.0.0.4</product>
<product>financial_transaction_manager:3.0.0.5</product>
<product>financial_transaction_manager:3.0.0.5</product>
<product>financial_transaction_manager:3.0.0.5</product>
<product>financial_transaction_manager:3.0.0.6</product>
<product>financial_transaction_manager:3.0.0.6</product>
<product>financial_transaction_manager:3.0.0.6</product>
<product>financial_transaction_manager:3.0.0.7</product>
<product>financial_transaction_manager:3.0.0.7</product>
<product>financial_transaction_manager:3.0.0.7</product>
<product>financial_transaction_manager:3.0.0.8</product>
<product>financial_transaction_manager:3.0.0.8</product>
<product>financial_transaction_manager:3.0.0.8</product>
<product>financial_transaction_manager:3.0.0.9</product>
<product>financial_transaction_manager:3.0.0.9</product>
<product>financial_transaction_manager:3.0.0.9</product>
<product>financial_transaction_manager:3.0.0.10</product>
<product>financial_transaction_manager:3.0.0.10</product>
<product>financial_transaction_manager:3.0.0.10</product>
<product>financial_transaction_manager:3.0.0.11</product>
<product>financial_transaction_manager:3.0.0.11</product>
<product>financial_transaction_manager:3.0.0.11</product>
<product>financial_transaction_manager:3.0.0.12</product>
<product>financial_transaction_manager:3.0.0.12</product>
<product>financial_transaction_manager:3.0.0.12</product>
<product>financial_transaction_manager:3.0.0.13</product>
<product>financial_transaction_manager:3.0.0.13</product>
<product>financial_transaction_manager:3.0.0.13</product>
<product>financial_transaction_manager:3.0.0.14</product>
<product>financial_transaction_manager:3.0.0.14</product>
<product>financial_transaction_manager:3.0.0.14</product>
<product>financial_transaction_manager:3.0.1.0</product>
<product>financial_transaction_manager:3.0.1.0</product>
</cve>
<cve id="CVE-2016-3063" level="MEDIUM">
<product>oncommand_system_manager:8.3.1</product>
</cve>
<cve id="CVE-2016-6542" level="MEDIUM">
<product>itrackeasy:-</product>
</cve>
<cve id="CVE-2016-6545" level="LOW">
<product>itrackeasy:-</product>
</cve>
<cve id="CVE-2016-3064" level="LOW">
<product>clustered_data_ontap:8.2.4</product>
<product>clustered_data_ontap:8.3</product>
<product>clustered_data_ontap:8.3.1</product>
<product>clustered_data_ontap:8.3.2</product>
</cve>
<cve id="CVE-2016-3067" level="LOW">
<product>cygwin:2.4.1-1</product>
</cve>
<cve id="CVE-2016-3066" level="LOW">
<product>spice-gtk:0.1.0</product>
<product>spice-gtk:0.2</product>
<product>spice-gtk:0.3</product>
<product>spice-gtk:0.4</product>
<product>spice-gtk:0.5</product>
<product>spice-gtk:0.6</product>
<product>spice-gtk:0.7</product>
<product>spice-gtk:0.8</product>
<product>spice-gtk:0.9</product>
<product>spice-gtk:0.10</product>
<product>spice-gtk:0.11</product>
<product>spice-gtk:0.12</product>
<product>spice-gtk:0.12.101</product>
<product>spice-gtk:0.13</product>
<product>spice-gtk:0.13.17</product>
<product>spice-gtk:0.13.29</product>
<product>spice-gtk:0.14</product>
<product>spice-gtk:0.15</product>
<product>spice-gtk:0.15.3</product>
<product>spice-gtk:0.16</product>
<product>spice-gtk:0.17</product>
<product>spice-gtk:0.18</product>
<product>spice-gtk:0.19</product>
<product>spice-gtk:0.20</product>
<product>spice-gtk:0.21</product>
<product>spice-gtk:0.22</product>
<product>spice-gtk:0.23</product>
<product>spice-gtk:0.24</product>
<product>spice-gtk:0.25</product>
<product>spice-gtk:0.26</product>
<product>spice-gtk:0.27</product>
<product>spice-gtk:0.28</product>
<product>spice-gtk:0.29</product>
<product>spice-gtk:0.30</product>
<product>spice-gtk:0.31</product>
<product>spice-gtk:0.32</product>
<product>spice-gtk:0.33</product>
</cve>
<cve id="CVE-2016-7948" level="LOW">
<product>libxrandr:1.5.0</product>
<product>fedora:24</product>
<product>fedora:25</product>
</cve>
<cve id="CVE-2016-7949" level="LOW">
<product>libxrender:0.9.9</product>
<product>fedora:24</product>
<product>fedora:25</product>
</cve>
<cve id="CVE-2016-7942" level="LOW">
<product>libx11:1.6.3</product>
<product>fedora:25</product>
</cve>
<cve id="CVE-2016-7943" level="LOW">
<product>libx11:1.6.3</product>
<product>fedora:25</product>
</cve>
<cve id="CVE-2016-7940" level="LOW">
<product>tcpdump:4.8.1</product>
</cve>
<cve id="CVE-2016-0261" level="MEDIUM">
<product>care_management:6.0</product>
<product>curam_social_program_management:6.0</product>
<product>curam_social_program_management:6.0</product>
<product>curam_social_program_management:6.0.0</product>
<product>curam_social_program_management:6.0.4.0</product>
<product>curam_social_program_management:6.0.4.1</product>
<product>curam_social_program_management:6.0.4.2</product>
<product>curam_social_program_management:6.0.4.3</product>
<product>curam_social_program_management:6.0.4.4</product>
<product>curam_social_program_management:6.0.4.5</product>
<product>curam_social_program_management:6.0.4.6</product>
<product>curam_social_program_management:6.0.5.0</product>
<product>curam_social_program_management:6.0.5.1</product>
<product>curam_social_program_management:6.0.5.2</product>
<product>curam_social_program_management:6.0.5.3</product>
<product>curam_social_program_management:6.0.5.4</product>
<product>curam_social_program_management:6.0.5.8</product>
<product>curam_social_program_management:6.0.5.9</product>
<product>curam_social_program_management:6.1.0.0</product>
<product>curam_social_program_management:6.1.0.1</product>
<product>curam_social_program_management:6.1.1.0</product>
<product>curam_social_program_management:6.1.1.1</product>
</cve>
<cve id="CVE-2016-7946" level="LOW">
<product>libxi:1.7.6</product>
<product>fedora:24</product>
<product>fedora:25</product>
</cve>
<cve id="CVE-2016-7947" level="LOW">
<product>libxrandr:1.5.0</product>
<product>fedora:24</product>
<product>fedora:25</product>
</cve>
<cve id="CVE-2016-7944" level="LOW">
<product>libxfixes:5.0.2</product>
<product>fedora:24</product>
<product>fedora:25</product>
</cve>
<cve id="CVE-2016-7945" level="LOW">
<product>libxi:1.7.6</product>
<product>fedora:24</product>
<product>fedora:25</product>
</cve>
<cve id="CVE-2016-4947" level="LOW">
<product>hue:3.9.0</product>
</cve>
<cve id="CVE-2016-4946" level="MEDIUM">
<product>hue:3.9.0</product>
</cve>
<cve id="CVE-2016-4945" level="MEDIUM">
<product>netscaler_gateway_11.0_firmware:65.35</product>
</cve>
<cve id="CVE-2016-4949" level="LOW">
<product>manager:5.5.0</product>
</cve>
<cve id="CVE-2016-4948" level="MEDIUM">
<product>manager:5.5.0</product>
</cve>
<cve id="CVE-2016-0084" level="MEDIUM">
<product>edge:-</product>
</cve>
<cve id="CVE-2016-0080" level="MEDIUM">
<product>edge:-</product>
</cve>
<cve id="CVE-2016-10073" level="LOW">
<product>vanilla_forums:2.3</product>
</cve>
<cve id="CVE-2016-10072" level="MEDIUM">
<product>wampserver:3.0.6</product>
</cve>
<cve id="CVE-2016-10071" level="MEDIUM">
<product>imagemagick:6.9.3-10</product>
</cve>
<cve id="CVE-2016-10070" level="MEDIUM">
<product>imagemagick:6.9.3-10</product>
<product>leap:42.1</product>
<product>leap:42.2</product>
</cve>
<cve id="CVE-2016-3688" level="LOW">
<product>dotcms:3.3.1</product>
</cve>
<cve id="CVE-2016-10075" level="LOW">
<product>tqdm:4.4.1</product>
<product>tqdm:4.10</product>
</cve>
<cve id="CVE-2016-10074" level="LOW">
<product>swiftmailer:5.4.4</product>
</cve>
<cve id="CVE-2016-3685" level="MEDIUM">
<product>download_manager:2.1.142</product>
</cve>
<cve id="CVE-2016-3684" level="MEDIUM">
<product>download_manager:2.1.142</product>
</cve>
<cve id="CVE-2016-3687" level="HIGH">
<product>big-ip_access_policy_manager:11.2.1</product>
<product>big-ip_access_policy_manager:11.4.0</product>
<product>big-ip_access_policy_manager:11.4.1</product>
<product>big-ip_access_policy_manager:11.5.0</product>
<product>big-ip_access_policy_manager:11.5.1</product>
<product>big-ip_access_policy_manager:11.5.2</product>
<product>big-ip_access_policy_manager:11.5.3</product>
<product>big-ip_access_policy_manager:11.5.4</product>
<product>big-ip_access_policy_manager:11.6.0</product>
<product>big-ip_edge_gateway:11.2.1</product>
</cve>
<cve id="CVE-2016-3686" level="MEDIUM">
<product>big-ip_access_policy_manager:11.0.0</product>
<product>big-ip_access_policy_manager:11.1.0</product>
<product>big-ip_access_policy_manager:11.2.0</product>
<product>big-ip_access_policy_manager:11.2.1</product>
<product>big-ip_access_policy_manager:11.3.0</product>
<product>big-ip_access_policy_manager:11.4.0</product>
<product>big-ip_access_policy_manager:11.4.1</product>
<product>big-ip_access_policy_manager:11.5.0</product>
<product>big-ip_access_policy_manager:11.5.1</product>
<product>big-ip_access_policy_manager:11.5.2</product>
<product>big-ip_access_policy_manager:11.5.3</product>
<product>big-ip_access_policy_manager:11.5.4</product>
<product>big-ip_access_policy_manager:11.6.0</product>
<product>big-ip_edge_gateway:11.0.0</product>
<product>big-ip_edge_gateway:11.1.0</product>
<product>big-ip_edge_gateway:11.2.0</product>
<product>big-ip_edge_gateway:11.2.1</product>
<product>big-ip_edge_gateway:11.3.0</product>
</cve>
<cve id="CVE-2016-3681" level="MEDIUM">
<product>mate_8_firmware:-</product>
</cve>
<cve id="CVE-2016-3680" level="MEDIUM">
<product>mate_8_firmware:-</product>
</cve>
<cve id="CVE-2016-1135" level="MEDIUM">
<product>bhr-4grv2_firmware:1.04</product>
<product>wex-300_firmware:1.90</product>
<product>whr-1166dhp_firmware:1.90</product>
<product>whr-300hp2_firmware:1.90</product>
<product>whr-600d_firmware:1.90</product>
<product>wmr-300_firmware:1.90</product>
<product>wmr-433_firmware:1.01</product>
<product>wsr-1166dhp_firmware:1.01</product>
</cve>
<cve id="CVE-2016-4414" level="LOW">
<product>quassel:0.12.3</product>
<product>fedora:22</product>
<product>fedora:23</product>
<product>fedora:24</product>
<product>leap:42.1</product>
<product>opensuse:13.2</product>
</cve>
<cve id="CVE-2016-1137" level="MEDIUM">
<product>home_spot_cube_firmware:2.0</product>
</cve>
<cve id="CVE-2016-1136" level="MEDIUM">
<product>home_spot_cube_firmware:2.0</product>
</cve>
<cve id="CVE-2016-1131" level="MEDIUM">
<product>dx_library:3.15e</product>
</cve>
<cve id="CVE-2016-1130" level="LOW">
<product>acrobat:11.0.15</product>
<product>acrobat_dc:15.006.30121</product>
<product>acrobat_dc:15.010.20060</product>
<product>acrobat_reader_dc:15.006.30121</product>
<product>acrobat_reader_dc:15.010.20060</product>
<product>reader:11.0.15</product>
</cve>
<cve id="CVE-2016-1133" level="MEDIUM">
<product>h2o:1.6.1</product>
<product>h2o:1.7.0</product>
</cve>
<cve id="CVE-2016-4412" level="HIGH">
<product>phpmyadmin:4.0.0</product>
<product>phpmyadmin:4.0.1</product>
<product>phpmyadmin:4.0.2</product>
<product>phpmyadmin:4.0.3</product>
<product>phpmyadmin:4.0.4</product>
<product>phpmyadmin:4.0.4.1</product>
<product>phpmyadmin:4.0.4.2</product>
<product>phpmyadmin:4.0.5</product>
<product>phpmyadmin:4.0.6</product>
<product>phpmyadmin:4.0.7</product>
<product>phpmyadmin:4.0.8</product>
<product>phpmyadmin:4.0.9</product>
<product>phpmyadmin:4.0.10</product>
<product>phpmyadmin:4.0.10.1</product>
<product>phpmyadmin:4.0.10.2</product>
<product>phpmyadmin:4.0.10.3</product>
<product>phpmyadmin:4.0.10.4</product>
<product>phpmyadmin:4.0.10.5</product>
<product>phpmyadmin:4.0.10.6</product>
<product>phpmyadmin:4.0.10.7</product>
<product>phpmyadmin:4.0.10.8</product>
<product>phpmyadmin:4.0.10.9</product>
<product>phpmyadmin:4.0.10.10</product>
<product>phpmyadmin:4.0.10.11</product>
<product>phpmyadmin:4.0.10.12</product>
<product>phpmyadmin:4.0.10.13</product>
<product>phpmyadmin:4.0.10.14</product>
<product>phpmyadmin:4.0.10.15</product>
</cve>
<cve id="CVE-2016-1139" level="MEDIUM">
<product>home_spot_cube_firmware:2.0</product>
</cve>
<cve id="CVE-2016-1138" level="MEDIUM">
<product>home_spot_cube_firmware:2.0</product>
</cve>
<cve id="CVE-2016-8508" level="MEDIUM">
<product>yandex_browser:17.0</product>
</cve>
<cve id="CVE-2016-8503" level="LOW">
<product>yandex_browser:16.7.0.3342</product>
<product>yandex_browser:16.7.1.20808</product>
<product>yandex_browser:16.9.1.1131</product>
</cve>
<cve id="CVE-2016-8502" level="LOW">
<product>yandex_browser:15.12.0.6151</product>
<product>yandex_browser:15.12.1.6475</product>
<product>yandex_browser:16.2.0.3539</product>
</cve>
<cve id="CVE-2016-8501" level="LOW">
<product>yandex_browser:15.10.2454.3845</product>
<product>yandex_browser:15.12.0.6151</product>
<product>yandex_browser:15.12.1.6475</product>
</cve>
<cve id="CVE-2016-8507" level="MEDIUM">
<product>yandex_browser:16.9.0</product>
</cve>
<cve id="CVE-2016-8506" level="MEDIUM">
<product>yandex_browser:15.2.2214.3645</product>
<product>yandex_browser:15.4.2272.3429</product>
<product>yandex_browser:15.6.2311.5029</product>
<product>yandex_browser:15.12.0.6151</product>
<product>yandex_browser:15.12.1.6475</product>
<product>yandex_browser:16.2.0.3539</product>
</cve>
<cve id="CVE-2016-8505" level="MEDIUM">
<product>yandex.browser:16.4.0.94.4</product>
</cve>
<cve id="CVE-2016-8504" level="MEDIUM">
<product>yandex_browser:16.6.1.30165</product>
</cve>
<cve id="CVE-2016-9104" level="LOW">
<product>qemu:-</product>
</cve>
<cve id="CVE-2016-9105" level="LOW">
<product>qemu:-</product>
<product>leap:42.2</product>
</cve>
<cve id="CVE-2016-9106" level="LOW">
<product>qemu:-</product>
<product>leap:42.2</product>
</cve>
<cve id="CVE-2016-9107" level="LOW">
<product>gajim-otr:-</product>
</cve>
<cve id="CVE-2016-9101" level="LOW">
<product>qemu:-</product>
<product>leap:42.2</product>
</cve>
<cve id="CVE-2016-9102" level="LOW">
<product>qemu:-</product>
</cve>
<cve id="CVE-2016-9103" level="LOW">
<product>qemu:-</product>
</cve>
<cve id="CVE-2016-9108" level="LOW">
<product>mujs:5008105780c0b0182ea6eda83ad5598f225be3ee</product>
<product>fedora:23</product>
<product>fedora:24</product>
<product>fedora:25</product>
</cve>
<cve id="CVE-2016-9109" level="LOW">
<product>mujs:-</product>
</cve>
<cve id="CVE-2016-1353" level="LOW">
<product>videoscape_distribution_suite_for_internet_streaming:3.3.0</product>
<product>videoscape_distribution_suite_for_internet_streaming:3.3.1</product>
<product>videoscape_distribution_suite_for_internet_streaming:4.0.0</product>
<product>videoscape_distribution_suite_for_internet_streaming:4.1.0</product>
</cve>
<cve id="CVE-2016-1352" level="LOW">
<product>unified_computing_system_central_software:1.3%280.1%29</product>
</cve>
<cve id="CVE-2016-1355" level="MEDIUM">
<product>firesight_system_software:6.1.0</product>
</cve>
<cve id="CVE-2016-1354" level="MEDIUM">
<product>unified_communications_domain_manager:8.0</product>
<product>unified_communications_domain_manager:8.0.1</product>
<product>unified_communications_domain_manager:8.0.2</product>
</cve>
<cve id="CVE-2016-1357" level="LOW">
<product>cisco_policy_suite:7.0.1.3</product>
<product>cisco_policy_suite:7.0.2</product>
<product>cisco_policy_suite:7.0.2-att</product>
<product>cisco_policy_suite:7.0.3-att</product>
<product>cisco_policy_suite:7.0.4-att</product>
<product>cisco_policy_suite:7.0.5</product>
</cve>
<cve id="CVE-2016-1356" level="MEDIUM">
<product>firesight_system_software:_6.1.0</product>
</cve>
<cve id="CVE-2016-1359" level="LOW">
<product>prime_infrastructure:3.0.0</product>
</cve>
<cve id="CVE-2016-1358" level="LOW">
<product>prime_infrastructure:2.2.0</product>
<product>prime_infrastructure:3.0.0</product>
<product>prime_infrastructure:3.1.0</product>
</cve>
<cve id="CVE-2016-1000031" level="LOW">
<product>commons_fileupload:1.3.2</product>
</cve>
<cve id="CVE-2016-1000032" level="LOW">
<product>tgcaptcha2:0.3.0</product>
</cve>
<cve id="CVE-2016-0456" level="LOW">
<product>e-business_suite:12.1</product>
<product>e-business_suite:12.2</product>
</cve>
<cve id="CVE-2016-5453" level="LOW">
<product>integrated_lights_out_manager_firmware:3.0</product>
<product>integrated_lights_out_manager_firmware:3.1</product>
<product>integrated_lights_out_manager_firmware:3.2</product>
</cve>
<cve id="CVE-2016-5450" level="MEDIUM">
<product>siebel_ui_framework:8.1.1</product>
<product>siebel_ui_framework:8.2.2</product>
<product>siebel_ui_framework:2014</product>
<product>siebel_ui_framework:2015</product>
<product>siebel_ui_framework:2016</product>
</cve>
<cve id="CVE-2016-5451" level="LOW">
<product>siebel_ui_framework:8.1.1</product>
<product>siebel_ui_framework:8.2.2</product>
<product>siebel_ui_framework:2014</product>
<product>siebel_ui_framework:2015</product>
<product>siebel_ui_framework:2016</product>
</cve>
<cve id="CVE-2016-5456" level="MEDIUM">
<product>siebel_core-server_framework:8.1.1</product>
<product>siebel_core-server_framework:8.2.2</product>
<product>siebel_core-server_framework:2014</product>
<product>siebel_core-server_framework:2015</product>
<product>siebel_core-server_framework:2016</product>
</cve>
<cve id="CVE-2016-5457" level="LOW">
<product>integrated_lights_out_manager_firmware:3.0</product>
<product>integrated_lights_out_manager_firmware:3.1</product>
<product>integrated_lights_out_manager_firmware:3.2</product>
</cve>
<cve id="CVE-2016-5455" level="LOW">
<product>communications_messaging_server:6.3</product>
<product>communications_messaging_server:7.0</product>
<product>communications_messaging_server:8.0</product>
</cve>
<cve id="CVE-2016-5458" level="LOW">
<product>communications_eagle_application_processor:16.0</product>
</cve>
<cve id="CVE-2016-5459" level="MEDIUM">
<product>siebel_core-common_components:8.1.1</product>
<product>siebel_core-common_components:8.2.2</product>
<product>siebel_core-common_components:2014</product>
<product>siebel_core-common_components:2015</product>
<product>siebel_core-common_components:2016</product>
</cve>
<cve id="CVE-2016-0450" level="LOW">
<product>goldengate:11.2</product>
<product>goldengate:12.1.2</product>
</cve>
<cve id="CVE-2016-6220" level="LOW">
<product>trend_micro_control_manager:6.0</product>
</cve>
<cve id="CVE-2016-6223" level="LOW">
<product>libtiff:4.0.6</product>
</cve>
<cve id="CVE-2016-6225" level="MEDIUM">
<product>xtrabackup:2.3.5</product>
<product>xtrabackup:2.4.0</product>
<product>xtrabackup:2.4.1</product>
<product>xtrabackup:2.4.2</product>
<product>xtrabackup:2.4.3</product>
<product>xtrabackup:2.4.4</product>
<product>fedora:24</product>
<product>fedora:25</product>
<product>leap:42.1</product>
<product>leap:42.2</product>
</cve>
<cve id="CVE-2016-2104" level="MEDIUM">
<product>satellite:5.7</product>
</cve>
<cve id="CVE-2016-2100" level="LOW">
<product>foreman:1.10.2</product>
<product>foreman:1.11.0</product>
<product>foreman:1.11.0</product>
</cve>
<cve id="CVE-2016-2103" level="MEDIUM">
<product>network_satellite:5.7</product>
</cve>
<cve id="CVE-2016-2102" level="LOW">
<product>haproxy:-</product>
</cve>
<cve id="CVE-2016-6956" level="LOW">
<product>acrobat:11.0.17</product>
<product>acrobat_dc:15.006.30201</product>
<product>acrobat_dc:15.017.20053</product>
<product>acrobat_reader_dc:15.006.30201</product>
<product>acrobat_reader_dc:15.017.20053</product>
<product>reader:11.0.17</product>
</cve>
<cve id="CVE-2016-6957" level="LOW">
<product>acrobat:11.0.17</product>
<product>acrobat_dc:15.006.30201</product>
<product>acrobat_dc:15.017.20053</product>
<product>acrobat_reader_dc:15.006.30201</product>
<product>acrobat_reader_dc:15.017.20053</product>
<product>reader:11.0.17</product>
</cve>
<cve id="CVE-2016-6954" level="LOW">
<product>acrobat:11.0.17</product>
<product>acrobat_dc:15.006.30201</product>
<product>acrobat_dc:15.017.20053</product>
<product>acrobat_reader_dc:15.006.30201</product>
<product>acrobat_reader_dc:15.017.20053</product>
<product>reader:11.0.17</product>
</cve>
<cve id="CVE-2016-6955" level="LOW">
<product>acrobat:11.0.17</product>
<product>acrobat_dc:15.006.30201</product>
<product>acrobat_dc:15.017.20053</product>
<product>acrobat_reader_dc:15.006.30201</product>
<product>acrobat_reader_dc:15.017.20053</product>
<product>reader:11.0.17</product>
</cve>
<cve id="CVE-2016-6952" level="LOW">
<product>acrobat:11.0.17</product>
<product>acrobat_dc:15.006.30201</product>
<product>acrobat_dc:15.017.20053</product>
<product>acrobat_reader_dc:15.006.30201</product>
<product>acrobat_reader_dc:15.017.20053</product>
<product>reader:11.0.17</product>
</cve>
<cve id="CVE-2016-6953" level="LOW">
<product>acrobat:11.0.17</product>
<product>acrobat_dc:15.006.30201</product>
<product>acrobat_dc:15.017.20053</product>
<product>acrobat_reader_dc:15.006.30201</product>
<product>acrobat_reader_dc:15.017.20053</product>
<product>reader:11.0.17</product>
</cve>
<cve id="CVE-2016-6950" level="LOW">
<product>acrobat:11.0.17</product>
<product>acrobat_dc:15.006.30201</product>
<product>acrobat_dc:15.017.20053</product>
<product>acrobat_reader_dc:15.006.30201</product>
<product>acrobat_reader_dc:15.017.20053</product>
<product>reader:11.0.17</product>
</cve>
<cve id="CVE-2016-6951" level="LOW">
<product>acrobat:11.0.17</product>
<product>acrobat_dc:15.006.30201</product>
<product>acrobat_dc:15.017.20053</product>
<product>acrobat_reader_dc:15.006.30201</product>
<product>acrobat_reader_dc:15.017.20053</product>
<product>reader:11.0.17</product>
</cve>
<cve id="CVE-2016-6958" level="LOW">
<product>acrobat:11.0.17</product>
<product>acrobat_dc:15.006.30201</product>
<product>acrobat_dc:15.017.20053</product>
<product>acrobat_reader_dc:15.006.30201</product>
<product>acrobat_reader_dc:15.017.20053</product>
<product>reader:11.0.17</product>
</cve>
<cve id="CVE-2016-6959" level="LOW">
<product>acrobat:11.0.17</product>
<product>acrobat_dc:15.006.30201</product>
<product>acrobat_dc:15.017.20053</product>
<product>acrobat_reader_dc:15.006.30201</product>
<product>acrobat_reader_dc:15.017.20053</product>
<product>reader:11.0.17</product>
</cve>
<cve id="CVE-2016-9984" level="LOW">
<product>maximo_asset_management:7.5</product>
<product>maximo_asset_management:7.6</product>
</cve>
<cve id="CVE-2016-9985" level="LOW">
<product>cognos_business_intelligence:10.1.1</product>
<product>cognos_business_intelligence:10.2</product>
</cve>
<cve id="CVE-2016-9986" level="MEDIUM">
<product>jazz_reporting_service:5.0</product>
<product>jazz_reporting_service:5.0.1</product>
<product>jazz_reporting_service:5.0.2</product>
<product>jazz_reporting_service:6.0</product>
<product>jazz_reporting_service:6.0.1</product>
<product>jazz_reporting_service:6.0.2</product>
<product>jazz_reporting_service:6.0.3</product>
</cve>
<cve id="CVE-2016-7572" level="LOW">
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.1</product>
<product>drupal:8.0.2</product>
<product>drupal:8.0.3</product>
<product>drupal:8.0.4</product>
<product>drupal:8.0.5</product>
<product>drupal:8.0.6</product>
<product>drupal:8.1.0</product>
<product>drupal:8.1.0</product>
<product>drupal:8.1.0</product>
<product>drupal:8.1.0</product>
<product>drupal:8.1.1</product>
<product>drupal:8.1.2</product>
<product>drupal:8.1.3</product>
<product>drupal:8.1.4</product>
<product>drupal:8.1.5</product>
<product>drupal:8.1.6</product>
<product>drupal:8.1.7</product>
<product>drupal:8.1.8</product>
<product>drupal:8.1.9</product>
</cve>
<cve id="CVE-2016-7571" level="MEDIUM">
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.1</product>
<product>drupal:8.0.2</product>
<product>drupal:8.0.3</product>
<product>drupal:8.0.4</product>
<product>drupal:8.0.5</product>
<product>drupal:8.0.6</product>
<product>drupal:8.1.0</product>
<product>drupal:8.1.0</product>
<product>drupal:8.1.0</product>
<product>drupal:8.1.0</product>
<product>drupal:8.1.1</product>
<product>drupal:8.1.2</product>
<product>drupal:8.1.3</product>
<product>drupal:8.1.4</product>
<product>drupal:8.1.5</product>
<product>drupal:8.1.6</product>
<product>drupal:8.1.7</product>
<product>drupal:8.1.8</product>
<product>drupal:8.1.9</product>
</cve>
<cve id="CVE-2016-7570" level="LOW">
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.1</product>
<product>drupal:8.0.2</product>
<product>drupal:8.0.3</product>
<product>drupal:8.0.4</product>
<product>drupal:8.0.5</product>
<product>drupal:8.0.6</product>
<product>drupal:8.1.0</product>
<product>drupal:8.1.0</product>
<product>drupal:8.1.0</product>
<product>drupal:8.1.0</product>
<product>drupal:8.1.1</product>
<product>drupal:8.1.2</product>
<product>drupal:8.1.3</product>
<product>drupal:8.1.4</product>
<product>drupal:8.1.5</product>
<product>drupal:8.1.6</product>
<product>drupal:8.1.7</product>
<product>drupal:8.1.8</product>
<product>drupal:8.1.9</product>
</cve>
<cve id="CVE-2016-1900" level="MEDIUM">
<product>cgit:0.11.2</product>
<product>fedora:22</product>
</cve>
<cve id="CVE-2016-1901" level="LOW">
<product>cgit:0.11.2</product>
<product>fedora:22</product>
</cve>
<cve id="CVE-2016-9980" level="MEDIUM">
<product>curam_social_program_management:5.2</product>
<product>curam_social_program_management:5.2</product>
<product>curam_social_program_management:5.2</product>
<product>curam_social_program_management:6.0</product>
<product>curam_social_program_management:6.0</product>
<product>curam_social_program_management:6.0.0</product>
<product>curam_social_program_management:6.0.4.0</product>
<product>curam_social_program_management:6.0.4.1</product>
<product>curam_social_program_management:6.0.4.2</product>
<product>curam_social_program_management:6.0.4.3</product>
<product>curam_social_program_management:6.0.4.4</product>
<product>curam_social_program_management:6.0.4.5</product>
<product>curam_social_program_management:6.0.4.6</product>
<product>curam_social_program_management:6.0.4.7</product>
<product>curam_social_program_management:6.0.4.8</product>
<product>curam_social_program_management:6.0.5</product>
<product>curam_social_program_management:6.0.5.0</product>
<product>curam_social_program_management:6.0.5.1</product>
<product>curam_social_program_management:6.0.5.2</product>
<product>curam_social_program_management:6.0.5.3</product>
<product>curam_social_program_management:6.0.5.4</product>
<product>curam_social_program_management:6.0.5.5</product>
<product>curam_social_program_management:6.0.5.6</product>
<product>curam_social_program_management:6.0.5.7</product>
<product>curam_social_program_management:6.0.5.8</product>
<product>curam_social_program_management:6.0.5.9</product>
<product>curam_social_program_management:6.1.0.0</product>
<product>curam_social_program_management:6.1.0.1</product>
<product>curam_social_program_management:6.1.0.2</product>
<product>curam_social_program_management:6.1.0.3</product>
<product>curam_social_program_management:6.1.1.0</product>
<product>curam_social_program_management:6.1.1.1</product>
<product>curam_social_program_management:6.1.1.2</product>
<product>curam_social_program_management:6.1.1.3</product>
<product>curam_social_program_management:6.2.0.0</product>
<product>curam_social_program_management:6.2.0.1</product>
<product>curam_social_program_management:6.2.0.2</product>
<product>curam_social_program_management:6.2.0.3</product>
<product>curam_social_program_management:7.0.0.0</product>
</cve>
<cve id="CVE-2016-1908" level="LOW">
<product>openssh:7.1</product>
</cve>
<cve id="CVE-2016-1909" level="LOW">
<product>fortios:4.3.16</product>
<product>fortios:5.0</product>
<product>fortios:5.0.0</product>
<product>fortios:5.0.1</product>
<product>fortios:5.0.2</product>
<product>fortios:5.0.3</product>
<product>fortios:5.0.4</product>
<product>fortios:5.0.5</product>
<product>fortios:5.0.6</product>
<product>fortios:5.0.7</product>
</cve>
<cve id="CVE-2016-9981" level="MEDIUM">
<product>security_appscan:9.0.0.0</product>
<product>security_appscan:9.0.0.1</product>
<product>security_appscan:9.0.1.0</product>
<product>security_appscan:9.0.1.1</product>
<product>security_appscan:9.0.2.0</product>
<product>security_appscan:9.0.2.1</product>
<product>security_appscan:9.0.3.0</product>
<product>security_appscan:9.0.3.1</product>
<product>security_appscan:9.0.3.4</product>
<product>security_appscan:9.0.3.5</product>
</cve>
<cve id="CVE-2016-4882" level="MEDIUM">
<product>basercms:3.0.10</product>
</cve>
<cve id="CVE-2016-4883" level="MEDIUM">
<product>basercms:3.0.10</product>
</cve>
<cve id="CVE-2016-4880" level="MEDIUM">
<product>basercms:3.0.10</product>
</cve>
<cve id="CVE-2016-4881" level="MEDIUM">
<product>basercms:3.0.10</product>
</cve>
<cve id="CVE-2016-4886" level="MEDIUM">
<product>basercms:3.0.10</product>
</cve>
<cve id="CVE-2016-4887" level="MEDIUM">
<product>basercms:3.0.10</product>
</cve>
<cve id="CVE-2016-4884" level="MEDIUM">
<product>basercms:3.0.10</product>
</cve>
<cve id="CVE-2016-4885" level="MEDIUM">
<product>basercms:3.0.10</product>
</cve>
<cve id="CVE-2016-4888" level="MEDIUM">
<product>servicedesk_plus:9.1</product>
</cve>
<cve id="CVE-2016-4889" level="LOW">
<product>servicedesk_plus:8.2</product>
</cve>
<cve id="CVE-2016-6980" level="LOW">
<product>digital_editions:4.5.1</product>
</cve>
<cve id="CVE-2016-3212" level="MEDIUM">
<product>internet_explorer:9</product>
<product>internet_explorer:10</product>
<product>internet_explorer:11</product>
</cve>
<cve id="CVE-2016-3210" level="MEDIUM">
<product>internet_explorer:11</product>
</cve>
<cve id="CVE-2016-3211" level="MEDIUM">
<product>internet_explorer:9</product>
<product>internet_explorer:10</product>
<product>internet_explorer:11</product>
</cve>
<cve id="CVE-2016-3214" level="MEDIUM">
<product>edge:-</product>
</cve>
<cve id="CVE-2016-9989" level="MEDIUM">
<product>jazz_reporting_service:5.0</product>
<product>jazz_reporting_service:5.0.1</product>
<product>jazz_reporting_service:5.0.2</product>
<product>jazz_reporting_service:6.0</product>
<product>jazz_reporting_service:6.0.1</product>
<product>jazz_reporting_service:6.0.2</product>
<product>jazz_reporting_service:6.0.3</product>
</cve>
<cve id="CVE-2016-1928" level="LOW">
<product>hana:-</product>
</cve>
<cve id="CVE-2016-9997" level="MEDIUM">
<product>spip:3.1.0</product>
<product>spip:3.1.0</product>
<product>spip:3.1.0</product>
<product>spip:3.1.0</product>
<product>spip:3.1.0</product>
<product>spip:3.1.0</product>
<product>spip:3.1.1</product>
<product>spip:3.1.2</product>
<product>spip:3.1.3</product>
</cve>
<cve id="CVE-2016-7000" level="LOW">
<product>acrobat:11.0.17</product>
<product>acrobat_dc:15.006.30201</product>
<product>acrobat_dc:15.017.20053</product>
<product>acrobat_reader_dc:15.006.30201</product>
<product>acrobat_reader_dc:15.017.20053</product>
<product>reader:11.0.17</product>
</cve>
<cve id="CVE-2016-3014" level="MEDIUM">
<product>rational_collaborative_lifecycle_management:4.0.0</product>
<product>rational_collaborative_lifecycle_management:4.0.1</product>
<product>rational_collaborative_lifecycle_management:4.0.2</product>
<product>rational_collaborative_lifecycle_management:4.0.3</product>
<product>rational_collaborative_lifecycle_management:4.0.4</product>
<product>rational_collaborative_lifecycle_management:4.0.5</product>
<product>rational_collaborative_lifecycle_management:4.0.6</product>
<product>rational_collaborative_lifecycle_management:4.0.7</product>
<product>rational_collaborative_lifecycle_management:5.0.0</product>
<product>rational_collaborative_lifecycle_management:5.0.1</product>
<product>rational_collaborative_lifecycle_management:5.0.2</product>
<product>rational_doors_next_generation:4.0.0</product>
<product>rational_doors_next_generation:4.0.1</product>
<product>rational_doors_next_generation:4.0.2</product>
<product>rational_doors_next_generation:4.0.3</product>
<product>rational_doors_next_generation:4.0.4</product>
<product>rational_doors_next_generation:4.0.5</product>
<product>rational_doors_next_generation:4.0.6</product>
<product>rational_doors_next_generation:4.0.7</product>
<product>rational_doors_next_generation:5.0.0</product>
<product>rational_doors_next_generation:5.0.1</product>
<product>rational_doors_next_generation:5.0.2</product>
<product>rational_engineering_lifecycle_manager:4.0.0</product>
<product>rational_engineering_lifecycle_manager:4.0.1</product>
<product>rational_engineering_lifecycle_manager:4.0.2</product>
<product>rational_engineering_lifecycle_manager:4.0.3</product>
<product>rational_engineering_lifecycle_manager:4.0.4</product>
<product>rational_engineering_lifecycle_manager:4.0.5</product>
<product>rational_engineering_lifecycle_manager:4.0.6</product>
<product>rational_engineering_lifecycle_manager:4.0.7</product>
<product>rational_engineering_lifecycle_manager:5.0.0</product>
<product>rational_engineering_lifecycle_manager:5.0.1</product>
<product>rational_engineering_lifecycle_manager:5.0.2</product>
<product>rational_quality_manager:4.0.0</product>
<product>rational_quality_manager:4.0.1</product>
<product>rational_quality_manager:4.0.2</product>
<product>rational_quality_manager:4.0.3</product>
<product>rational_quality_manager:4.0.4</product>
<product>rational_quality_manager:4.0.5</product>
<product>rational_quality_manager:4.0.6</product>
<product>rational_quality_manager:4.0.7</product>
<product>rational_quality_manager:5.0.0</product>
<product>rational_quality_manager:5.0.1</product>
<product>rational_quality_manager:5.0.2</product>
<product>rational_rhapsody_design_manager:4.0</product>
<product>rational_rhapsody_design_manager:4.0.1</product>
<product>rational_rhapsody_design_manager:4.0.2</product>
<product>rational_rhapsody_design_manager:4.0.3</product>
<product>rational_rhapsody_design_manager:4.0.4</product>
<product>rational_rhapsody_design_manager:4.0.5</product>
<product>rational_rhapsody_design_manager:4.0.6</product>
<product>rational_rhapsody_design_manager:4.0.7</product>
<product>rational_rhapsody_design_manager:5.0.0</product>
<product>rational_rhapsody_design_manager:5.0.1</product>
<product>rational_rhapsody_design_manager:5.0.2</product>
<product>rational_software_architect_design_manager:4.0.0</product>
<product>rational_software_architect_design_manager:4.0.1</product>
<product>rational_software_architect_design_manager:4.0.2</product>
<product>rational_software_architect_design_manager:4.0.3</product>
<product>rational_software_architect_design_manager:4.0.4</product>
<product>rational_software_architect_design_manager:4.0.5</product>
<product>rational_software_architect_design_manager:4.0.6</product>
<product>rational_software_architect_design_manager:4.0.7</product>
<product>rational_software_architect_design_manager:5.0.0</product>
<product>rational_software_architect_design_manager:5.0.1</product>
<product>rational_software_architect_design_manager:5.0.2</product>
<product>rational_team_concert:4.0.0</product>
<product>rational_team_concert:4.0.1</product>
<product>rational_team_concert:4.0.2</product>
<product>rational_team_concert:4.0.3</product>
<product>rational_team_concert:4.0.4</product>
<product>rational_team_concert:4.0.5</product>
<product>rational_team_concert:4.0.6</product>
<product>rational_team_concert:4.0.7</product>
<product>rational_team_concert:5.0.0</product>
<product>rational_team_concert:5.0.1</product>
<product>rational_team_concert:5.0.2</product>
</cve>
<cve id="CVE-2016-3015" level="MEDIUM">
<product>cognos_analytics:11.0.0.0</product>
<product>cognos_analytics:11.0.1.0</product>
<product>cognos_analytics:11.0.2.0</product>
<product>cognos_analytics:11.0.3.0</product>
<product>cognos_analytics:11.0.4.0</product>
</cve>
<cve id="CVE-2016-3016" level="MEDIUM">
<product>security_access_manager_9.0_firmware:9.0.0</product>
<product>security_access_manager_9.0_firmware:9.0.0.1</product>
<product>security_access_manager_9.0_firmware:9.0.1.0</product>
<product>security_access_manager_for_mobile_8.0_firmware:8.0.0.1</product>
<product>security_access_manager_for_mobile_8.0_firmware:8.0.0.2</product>
<product>security_access_manager_for_mobile_8.0_firmware:8.0.0.3</product>
<product>security_access_manager_for_mobile_8.0_firmware:8.0.0.5</product>
<product>security_access_manager_for_mobile_8.0_firmware:8.0.1.0</product>
<product>security_access_manager_for_mobile_8.0_firmware:8.0.1.2</product>
<product>security_access_manager_for_mobile_8.0_firmware:8.0.1.3</product>
<product>security_access_manager_for_mobile_8.0_firmware:8.0.1.4</product>
<product>security_access_manager_for_web_7.0_firmware:7.0.0.1</product>
<product>security_access_manager_for_web_7.0_firmware:7.0.0.2</product>
<product>security_access_manager_for_web_7.0_firmware:7.0.0.3</product>
<product>security_access_manager_for_web_7.0_firmware:7.0.0.4</product>
<product>security_access_manager_for_web_7.0_firmware:7.0.0.5</product>
<product>security_access_manager_for_web_7.0_firmware:7.0.0.6</product>
<product>security_access_manager_for_web_7.0_firmware:7.0.0.7</product>
<product>security_access_manager_for_web_7.0_firmware:7.0.0.8</product>
<product>security_access_manager_for_web_7.0_firmware:7.0.0.9</product>
<product>security_access_manager_for_web_7.0_firmware:7.0.0.10</product>
<product>security_access_manager_for_web_7.0_firmware:7.0.0.11</product>
<product>security_access_manager_for_web_7.0_firmware:7.0.0.12</product>
<product>security_access_manager_for_web_7.0_firmware:7.0.0.13</product>
<product>security_access_manager_for_web_7.0_firmware:7.0.0.14</product>
<product>security_access_manager_for_web_7.0_firmware:7.0.0.15</product>
<product>security_access_manager_for_web_7.0_firmware:7.0.0.16</product>
<product>security_access_manager_for_web_8.0_firmware:8.0.0.1</product>
<product>security_access_manager_for_web_8.0_firmware:8.0.0.2</product>
<product>security_access_manager_for_web_8.0_firmware:8.0.0.3</product>
<product>security_access_manager_for_web_8.0_firmware:8.0.0.5</product>
<product>security_access_manager_for_web_8.0_firmware:8.0.1.0</product>
<product>security_access_manager_for_web_8.0_firmware:8.0.1.2</product>
<product>security_access_manager_for_web_8.0_firmware:8.0.1.3</product>
<product>security_access_manager_for_web_8.0_firmware:8.0.1.4</product>
</cve>
<cve id="CVE-2016-9358" level="LOW">
<product>a320_firmware:-</product>
<product>a325_firmware:-</product>
<product>a371_firmware:-</product>
<product>a520_master_firmware:-</product>
<product>a520_slave_firmware:-</product>
<product>a530_firmware:-</product>
<product>a542_firmware:-</product>
<product>a571_firmware:-</product>
<product>check_bin_grader_firmware:-</product>
<product>flowlineqc_t376_firmware:-</product>
<product>ipm3_dual_cam_firmware:132</product>
<product>ipm3_dual_cam_firmware:139</product>
<product>p520_firmware:-</product>
<product>p574_firmware:-</product>
<product>sensorx13_qc_flow_line_firmware:-</product>
<product>sensorx23_qc_master_firmware:-</product>
<product>sensorx23_qc_slave_firmware:-</product>
<product>speed_batcher_firmware:-</product>
<product>t374_firmware:-</product>
<product>t377_firmware:-</product>
<product>v36_firmware:-</product>
<product>v36b_firmware:-</product>
<product>v36c_firmware:-</product>
</cve>
<cve id="CVE-2016-6537" level="LOW">
<product>eh6108h%2b_firmware:x9.03.24.00.07l</product>
</cve>
<cve id="CVE-2016-9351" level="MEDIUM">
<product>susiaccess:3.0</product>
</cve>
<cve id="CVE-2016-3010" level="MEDIUM">
<product>connections:4.0.0.0</product>
<product>connections:4.5.0.0</product>
<product>connections:5.0.0.0</product>
<product>connections:5.5.0.0</product>
</cve>
<cve id="CVE-2016-9353" level="LOW">
<product>susiaccess:3.0</product>
</cve>
<cve id="CVE-2016-9355" level="LOW">
<product>alaris_8015_pc_unit:9.5</product>
<product>alaris_8015_pc_unit:9.7</product>
</cve>
<cve id="CVE-2016-9354" level="MEDIUM">
<product>dacenter:1.4</product>
</cve>
<cve id="CVE-2016-9357" level="LOW">
<product>eamaxx_series_epdu_firmware:01-31-2014</product>
<product>eamxxx_series_epdu_firmware:06-30-2015</product>
<product>emaaxx_series_epdu_firmware:01-31-2014</product>
<product>emaxxx_series_epdu_firmware:01-31-2014</product>
<product>eswaxx_series_epdu_firmware:01-31-2014</product>
</cve>
<cve id="CVE-2016-9356" level="LOW">
<product>dacenter:1.4</product>
</cve>
<cve id="CVE-2016-4088" level="LOW">
<product>acrobat:11.0.15</product>
<product>acrobat_dc:15.006.30121</product>
<product>acrobat_dc:15.010.20060</product>
<product>acrobat_reader_dc:15.006.30121</product>
<product>acrobat_reader_dc:15.010.20060</product>
<product>reader:11.0.15</product>
</cve>
<cve id="CVE-2016-4089" level="LOW">
<product>acrobat:11.0.15</product>
<product>acrobat_dc:15.006.30121</product>
<product>acrobat_dc:15.010.20060</product>
<product>acrobat_reader_dc:15.006.30121</product>
<product>acrobat_reader_dc:15.010.20060</product>
<product>reader:11.0.15</product>
</cve>
<cve id="CVE-2016-7009" level="LOW">
<product>acrobat:11.0.17</product>
<product>acrobat_dc:15.006.30201</product>
<product>acrobat_dc:15.017.20053</product>
<product>acrobat_reader_dc:15.006.30201</product>
<product>acrobat_reader_dc:15.017.20053</product>
<product>reader:11.0.17</product>
</cve>
<cve id="CVE-2016-4086" level="MEDIUM">
<product>hisuite:2.3.15</product>
<product>hisuite:2.3.28</product>
<product>hisuite:2.3.35</product>
<product>hisuite:2.3.42</product>
<product>hisuite:2.3.50</product>
<product>hisuite:2.3.55</product>
<product>hisuite:2.3.55.1</product>
</cve>
<cve id="CVE-2016-4087" level="HIGH">
<product>s12700_firmware:v200r005c00spc300</product>
<product>s5700_firmware:v200r001c00</product>
<product>s5700_firmware:v200r002c00spc100</product>
<product>s5700_firmware:v200r003c00spc300</product>
<product>s5700_firmware:v200r005c00</product>
</cve>
<cve id="CVE-2016-0279" level="MEDIUM">
<product>domino:8.5.0</product>
<product>domino:8.5.1</product>
<product>domino:8.5.1.1</product>
<product>domino:8.5.1.2</product>
<product>domino:8.5.1.3</product>
<product>domino:8.5.1.4</product>
<product>domino:8.5.2</product>
<product>domino:8.5.2.1</product>
<product>domino:8.5.2.2</product>
<product>domino:8.5.2.3</product>
<product>domino:8.5.3</product>
<product>domino:8.5.3.1</product>
<product>domino:8.5.3.2</product>
<product>domino:8.5.3.3</product>
<product>domino:8.5.3.4</product>
<product>domino:8.5.3.5</product>
<product>domino:9.0.0</product>
<product>domino:9.0.1</product>
<product>domino:9.0.1.1</product>
<product>domino:9.0.1.2</product>
<product>domino:9.0.1.3</product>
<product>domino:9.0.1.4</product>
<product>domino:9.0.1.5</product>
</cve>
<cve id="CVE-2016-5685" level="LOW">
<product>idrac7_firmware:2.30.30.30</product>
<product>idrac8_firmware:2.30.30.30</product>
</cve>
<cve id="CVE-2016-5684" level="MEDIUM">
<product>freeimage:3.17.0</product>
</cve>
<cve id="CVE-2016-5683" level="LOW">
<product>readydesk:9.1</product>
</cve>
<cve id="CVE-2016-5682" level="MEDIUM">
<product>swagger-ui:2.2.0</product>
</cve>
<cve id="CVE-2016-5681" level="MEDIUM">
<product>dir-822_firmware:3.01</product>
<product>dir-817l%28w%29_firmware:jul.2016</product>
<product>dir-818l%28w%29_firmware:2.05</product>
<product>dir-823_firmware:1.00</product>
<product>dir-850l_firmare:2.07</product>
<product>dir-868l_firmware:2.03</product>
<product>dir-868l_firmware:3.00</product>
<product>dir-880l_firmware:1.07</product>
<product>dir-885l_firmware:1.11</product>
<product>dir-890l_firmware:1.09</product>
<product>dir-895l_firmware:1.11</product>
</cve>
<cve id="CVE-2016-8793" level="HIGH">
<product>mate_8_firmware:-</product>
<product>mate_s_firmware:-</product>
<product>p8_firmware:-</product>
</cve>
<cve id="CVE-2016-1463" level="LOW">
<product>firesight_system_software:5.3.0</product>
<product>firesight_system_software:5.3.1</product>
<product>firesight_system_software:5.4.0</product>
<product>firesight_system_software:6.0.0</product>
<product>firesight_system_software:6.0.1</product>
</cve>
<cve id="CVE-2016-4102" level="LOW">
<product>acrobat:11.0.15</product>
<product>acrobat_dc:15.006.30121</product>
<product>acrobat_dc:15.010.20060</product>
<product>acrobat_reader_dc:15.006.30121</product>
<product>acrobat_reader_dc:15.010.20060</product>
<product>reader:11.0.15</product>
</cve>
<cve id="CVE-2016-4101" level="LOW">
<product>acrobat:11.0.15</product>
<product>acrobat_dc:15.006.30121</product>
<product>acrobat_dc:15.010.20060</product>
<product>acrobat_reader_dc:15.006.30121</product>
<product>acrobat_reader_dc:15.010.20060</product>
<product>reader:11.0.15</product>
</cve>
<cve id="CVE-2016-4100" level="LOW">
<product>acrobat:11.0.15</product>
<product>acrobat_dc:15.006.30121</product>
<product>acrobat_dc:15.010.20060</product>
<product>acrobat_reader_dc:15.006.30121</product>
<product>acrobat_reader_dc:15.010.20060</product>
<product>reader:11.0.15</product>
</cve>
<cve id="CVE-2016-4107" level="LOW">
<product>acrobat:11.0.15</product>
<product>acrobat_dc:15.006.30121</product>
<product>acrobat_dc:15.010.20060</product>
<product>acrobat_reader_dc:15.006.30121</product>
<product>acrobat_reader_dc:15.010.20060</product>
<product>reader:11.0.15</product>
</cve>
<cve id="CVE-2016-4106" level="LOW">
<product>acrobat:11.0.15</product>
<product>acrobat_dc:15.006.30121</product>
<product>acrobat_dc:15.010.20060</product>
<product>acrobat_reader_dc:15.006.30121</product>
<product>acrobat_reader_dc:15.010.20060</product>
<product>reader:11.0.15</product>
</cve>
<cve id="CVE-2016-0271" level="LOW">
<product>urbancode_deploy:6.0</product>
<product>urbancode_deploy:6.0.1.0</product>
<product>urbancode_deploy:6.0.1.1</product>
<product>urbancode_deploy:6.0.1.2</product>
<product>urbancode_deploy:6.0.1.3</product>
<product>urbancode_deploy:6.0.1.4</product>
<product>urbancode_deploy:6.0.1.5</product>
<product>urbancode_deploy:6.0.1.6</product>
<product>urbancode_deploy:6.0.1.7</product>
<product>urbancode_deploy:6.0.1.8</product>
<product>urbancode_deploy:6.0.1.9</product>
<product>urbancode_deploy:6.0.1.10</product>
<product>urbancode_deploy:6.0.1.11</product>
<product>urbancode_deploy:6.0.1.12</product>
<product>urbancode_deploy:6.0.1.13</product>
<product>urbancode_deploy:6.1</product>
<product>urbancode_deploy:6.1.0.1</product>
<product>urbancode_deploy:6.1.0.2</product>
<product>urbancode_deploy:6.1.0.3</product>
<product>urbancode_deploy:6.1.0.4</product>
<product>urbancode_deploy:6.1.1.0</product>
<product>urbancode_deploy:6.1.1.1</product>
<product>urbancode_deploy:6.1.1.2</product>
<product>urbancode_deploy:6.1.1.3</product>
<product>urbancode_deploy:6.1.1.4</product>
<product>urbancode_deploy:6.1.1.5</product>
<product>urbancode_deploy:6.1.1.6</product>
<product>urbancode_deploy:6.1.1.7</product>
<product>urbancode_deploy:6.1.1.8</product>
<product>urbancode_deploy:6.1.2</product>
<product>urbancode_deploy:6.1.3</product>
<product>urbancode_deploy:6.1.3.1</product>
<product>urbancode_deploy:6.1.3.2</product>
<product>urbancode_deploy:6.2.0.0</product>
<product>urbancode_deploy:6.2.0.1</product>
<product>urbancode_deploy:6.2.0.2</product>
<product>urbancode_deploy:6.2.1</product>
</cve>
<cve id="CVE-2016-4105" level="LOW">
<product>acrobat:11.0.15</product>
<product>acrobat_dc:15.006.30121</product>
<product>acrobat_dc:15.010.20060</product>
<product>acrobat_reader_dc:15.006.30121</product>
<product>acrobat_reader_dc:15.010.20060</product>
<product>reader:11.0.15</product>
</cve>
<cve id="CVE-2016-0270" level="MEDIUM">
<product>client_application_access:1.0.0.1</product>
<product>domino:9.0.1.3</product>
<product>domino:9.0.1.4</product>
<product>domino:9.0.1.5</product>
<product>notes:9.0.1.3</product>
<product>notes:9.0.1.4</product>
<product>notes:9.0.1.5</product>
</cve>
<cve id="CVE-2016-10330" level="LOW">
<product>photo_station:6.5.2-3225</product>
</cve>
<cve id="CVE-2016-10331" level="LOW">
<product>photo_station:6.5.2-3225</product>
</cve>
<cve id="CVE-2016-4104" level="LOW">
<product>acrobat:11.0.15</product>
<product>acrobat_dc:15.006.30121</product>
<product>acrobat_dc:15.010.20060</product>
<product>acrobat_reader_dc:15.006.30121</product>
<product>acrobat_reader_dc:15.010.20060</product>
<product>reader:11.0.15</product>
</cve>
<cve id="CVE-2016-0273" level="MEDIUM">
<product>rational_collaborative_lifecycle_management:3.0.1.6</product>
<product>rational_collaborative_lifecycle_management:4.0.0</product>
<product>rational_collaborative_lifecycle_management:4.0.1</product>
<product>rational_collaborative_lifecycle_management:4.0.2</product>
<product>rational_collaborative_lifecycle_management:4.0.3</product>
<product>rational_collaborative_lifecycle_management:4.0.4</product>
<product>rational_collaborative_lifecycle_management:4.0.5</product>
<product>rational_collaborative_lifecycle_management:4.0.6</product>
<product>rational_collaborative_lifecycle_management:4.0.7</product>
<product>rational_collaborative_lifecycle_management:5.0.0</product>
<product>rational_collaborative_lifecycle_management:5.0.1</product>
<product>rational_collaborative_lifecycle_management:5.0.2</product>
<product>rational_collaborative_lifecycle_management:6.0.0</product>
<product>rational_collaborative_lifecycle_management:6.0.1</product>
<product>rational_collaborative_lifecycle_management:6.0.2</product>
<product>rational_doors_next_generation:4.0.0</product>
<product>rational_doors_next_generation:4.0.1</product>
<product>rational_doors_next_generation:4.0.2</product>
<product>rational_doors_next_generation:4.0.3</product>
<product>rational_doors_next_generation:4.0.4</product>
<product>rational_doors_next_generation:4.0.5</product>
<product>rational_doors_next_generation:4.0.6</product>
<product>rational_doors_next_generation:4.0.7</product>
<product>rational_doors_next_generation:5.0.0</product>
<product>rational_doors_next_generation:5.0.1</product>
<product>rational_doors_next_generation:5.0.2</product>
<product>rational_doors_next_generation:6.0.0</product>
<product>rational_doors_next_generation:6.0.1</product>
<product>rational_doors_next_generation:6.0.2</product>
<product>rational_engineering_lifecycle_manager:4.0.0</product>
<product>rational_engineering_lifecycle_manager:4.0.1</product>
<product>rational_engineering_lifecycle_manager:4.0.2</product>
<product>rational_engineering_lifecycle_manager:4.0.3</product>
<product>rational_engineering_lifecycle_manager:4.0.4</product>
<product>rational_engineering_lifecycle_manager:4.0.5</product>
<product>rational_engineering_lifecycle_manager:4.0.6</product>
<product>rational_engineering_lifecycle_manager:4.0.7</product>
<product>rational_engineering_lifecycle_manager:5.0.0</product>
<product>rational_engineering_lifecycle_manager:5.0.1</product>
<product>rational_engineering_lifecycle_manager:5.0.2</product>
<product>rational_engineering_lifecycle_manager:6.0.0</product>
<product>rational_engineering_lifecycle_manager:6.0.1</product>
<product>rational_engineering_lifecycle_manager:6.0.2</product>
<product>rational_quality_manager:3.0.1.6</product>
<product>rational_quality_manager:4.0.0</product>
<product>rational_quality_manager:4.0.1</product>
<product>rational_quality_manager:4.0.2</product>
<product>rational_quality_manager:4.0.3</product>
<product>rational_quality_manager:4.0.4</product>
<product>rational_quality_manager:4.0.5</product>
<product>rational_quality_manager:4.0.6</product>
<product>rational_quality_manager:4.0.7</product>
<product>rational_quality_manager:5.0.0</product>
<product>rational_quality_manager:5.0.1</product>
<product>rational_quality_manager:5.0.2</product>
<product>rational_quality_manager:6.0.0</product>
<product>rational_quality_manager:6.0.1</product>
<product>rational_quality_manager:6.0.2</product>
<product>rational_rhapsody_design_manager:4.0</product>
<product>rational_rhapsody_design_manager:4.0.1</product>
<product>rational_rhapsody_design_manager:4.0.2</product>
<product>rational_rhapsody_design_manager:4.0.3</product>
<product>rational_rhapsody_design_manager:4.0.4</product>
<product>rational_rhapsody_design_manager:4.0.5</product>
<product>rational_rhapsody_design_manager:4.0.6</product>
<product>rational_rhapsody_design_manager:4.0.7</product>
<product>rational_rhapsody_design_manager:5.0.0</product>
<product>rational_rhapsody_design_manager:5.0.1</product>
<product>rational_rhapsody_design_manager:5.0.2</product>
<product>rational_rhapsody_design_manager:6.0.0</product>
<product>rational_rhapsody_design_manager:6.0.1</product>
<product>rational_rhapsody_design_manager:6.0.2</product>
<product>rational_software_architect_design_manager:4.0.0</product>
<product>rational_software_architect_design_manager:4.0.1</product>
<product>rational_software_architect_design_manager:4.0.2</product>
<product>rational_software_architect_design_manager:4.0.3</product>
<product>rational_software_architect_design_manager:4.0.4</product>
<product>rational_software_architect_design_manager:4.0.5</product>
<product>rational_software_architect_design_manager:4.0.6</product>
<product>rational_software_architect_design_manager:4.0.7</product>
<product>rational_software_architect_design_manager:5.0.0</product>
<product>rational_software_architect_design_manager:5.0.1</product>
<product>rational_software_architect_design_manager:5.0.2</product>
<product>rational_software_architect_design_manager:6.0.0</product>
<product>rational_software_architect_design_manager:6.0.1</product>
<product>rational_software_architect_design_manager:6.0.2</product>
<product>rational_team_concert:3.0.1.6</product>
<product>rational_team_concert:4.0.0</product>
<product>rational_team_concert:4.0.1</product>
<product>rational_team_concert:4.0.2</product>
<product>rational_team_concert:4.0.3</product>
<product>rational_team_concert:4.0.4</product>
<product>rational_team_concert:4.0.5</product>
<product>rational_team_concert:4.0.6</product>
<product>rational_team_concert:4.0.7</product>
<product>rational_team_concert:5.0.0</product>
<product>rational_team_concert:5.0.1</product>
<product>rational_team_concert:5.0.2</product>
<product>rational_team_concert:6.0.0</product>
<product>rational_team_concert:6.0.1</product>
<product>rational_team_concert:6.0.2</product>
</cve>
<cve id="CVE-2016-7952" level="LOW">
<product>libxtst:1.2.2</product>
<product>fedora:24</product>
<product>fedora:25</product>
</cve>
<cve id="CVE-2016-7955" level="LOW">
<product>ossim:5.3</product>
<product>unified_security_management:5.3</product>
</cve>
<cve id="CVE-2016-7954" level="LOW">
<product>bundler:1.0.0</product>
<product>bundler:1.0.0</product>
<product>bundler:1.0.0</product>
<product>bundler:1.0.0</product>
<product>bundler:1.0.0</product>
<product>bundler:1.0.0</product>
<product>bundler:1.0.0</product>
<product>bundler:1.0.0</product>
<product>bundler:1.0.0</product>
<product>bundler:1.0.0</product>
<product>bundler:1.0.0</product>
<product>bundler:1.0.0</product>
<product>bundler:1.0.0</product>
<product>bundler:1.0.1</product>
<product>bundler:1.0.2</product>
<product>bundler:1.0.3</product>
<product>bundler:1.0.4</product>
<product>bundler:1.0.5</product>
<product>bundler:1.0.6</product>
<product>bundler:1.0.7</product>
<product>bundler:1.0.8</product>
<product>bundler:1.0.9</product>
<product>bundler:1.0.10</product>
<product>bundler:1.0.11</product>
<product>bundler:1.0.12</product>
<product>bundler:1.0.13</product>
<product>bundler:1.0.14</product>
<product>bundler:1.0.15</product>
<product>bundler:1.0.16</product>
<product>bundler:1.0.17</product>
<product>bundler:1.0.18</product>
<product>bundler:1.0.19</product>
<product>bundler:1.0.20</product>
<product>bundler:1.0.20</product>
<product>bundler:1.0.21</product>
<product>bundler:1.0.21</product>
<product>bundler:1.1</product>
<product>bundler:1.1</product>
<product>bundler:1.1</product>
<product>bundler:1.1</product>
<product>bundler:1.1</product>
<product>bundler:1.1</product>
<product>bundler:1.1</product>
<product>bundler:1.1</product>
<product>bundler:1.1</product>
<product>bundler:1.1</product>
<product>bundler:1.1</product>
<product>bundler:1.1</product>
<product>bundler:1.1</product>
<product>bundler:1.1</product>
<product>bundler:1.1</product>
<product>bundler:1.1</product>
<product>bundler:1.1</product>
<product>bundler:1.1</product>
<product>bundler:1.1</product>
<product>bundler:1.1.0</product>
<product>bundler:1.1.1</product>
<product>bundler:1.1.2</product>
<product>bundler:1.1.3</product>
<product>bundler:1.1.4</product>
<product>bundler:1.1.5</product>
<product>bundler:1.2.0</product>
<product>bundler:1.2.0</product>
<product>bundler:1.2.0</product>
<product>bundler:1.2.0</product>
<product>bundler:1.2.0</product>
<product>bundler:1.2.1</product>
<product>bundler:1.2.2</product>
<product>bundler:1.2.3</product>
<product>bundler:1.2.4</product>
<product>bundler:1.2.5</product>
<product>bundler:1.3.0</product>
<product>bundler:1.3.0</product>
<product>bundler:1.3.0</product>
<product>bundler:1.3.0</product>
<product>bundler:1.3.0</product>
<product>bundler:1.3.0</product>
<product>bundler:1.3.0</product>
<product>bundler:1.3.0</product>
<product>bundler:1.3.0</product>
<product>bundler:1.3.1</product>
<product>bundler:1.3.2</product>
<product>bundler:1.3.3</product>
<product>bundler:1.3.4</product>
<product>bundler:1.3.5</product>
<product>bundler:1.3.6</product>
<product>bundler:1.4.0</product>
<product>bundler:1.4.0</product>
<product>bundler:1.5.0</product>
<product>bundler:1.5.0</product>
<product>bundler:1.5.0</product>
<product>bundler:1.5.1</product>
<product>bundler:1.5.2</product>
<product>bundler:1.5.3</product>
<product>bundler:1.6.0</product>
<product>bundler:1.6.1</product>
<product>bundler:1.6.2</product>
<product>bundler:1.6.3</product>
<product>bundler:1.6.4</product>
<product>bundler:1.6.5</product>
<product>bundler:1.6.6</product>
<product>bundler:1.6.7</product>
<product>bundler:1.7.0</product>
<product>bundler:1.7.1</product>
<product>bundler:1.7.2</product>
<product>bundler:1.7.3</product>
<product>bundler:1.7.4</product>
<product>bundler:1.7.5</product>
<product>bundler:1.7.6</product>
<product>bundler:1.7.7</product>
<product>bundler:1.7.8</product>
<product>bundler:1.7.9</product>
<product>bundler:1.7.10</product>
<product>bundler:1.7.11</product>
<product>bundler:1.7.12</product>
<product>bundler:1.7.13</product>
<product>bundler:1.7.14</product>
<product>bundler:1.7.15</product>
<product>bundler:1.8.0</product>
<product>bundler:1.8.0</product>
<product>bundler:1.8.0</product>
<product>bundler:1.8.1</product>
<product>bundler:1.8.2</product>
<product>bundler:1.8.3</product>
<product>bundler:1.8.4</product>
<product>bundler:1.8.5</product>
<product>bundler:1.8.6</product>
<product>bundler:1.8.7</product>
<product>bundler:1.8.8</product>
<product>bundler:1.8.9</product>
<product>bundler:1.9.0</product>
<product>bundler:1.9.0</product>
<product>bundler:1.9.0</product>
<product>bundler:1.9.0</product>
<product>bundler:1.9.1</product>
<product>bundler:1.9.2</product>
<product>bundler:1.9.3</product>
<product>bundler:1.9.4</product>
<product>bundler:1.9.5</product>
<product>bundler:1.9.6</product>
<product>bundler:1.9.7</product>
<product>bundler:1.9.8</product>
<product>bundler:1.9.9</product>
<product>bundler:1.9.10</product>
<product>bundler:1.10.0</product>
<product>bundler:1.10.0</product>
<product>bundler:1.10.0</product>
<product>bundler:1.10.0</product>
<product>bundler:1.10.0</product>
<product>bundler:1.10.1</product>
<product>bundler:1.10.2</product>
<product>bundler:1.10.3</product>
<product>bundler:1.10.4</product>
<product>bundler:1.10.5</product>
<product>bundler:1.10.6</product>
<product>bundler:1.11.0</product>
<product>bundler:1.11.0</product>
<product>bundler:1.11.0</product>
<product>bundler:1.11.1</product>
<product>bundler:1.11.2</product>
<product>bundler:1.12.0</product>
<product>bundler:1.12.0</product>
<product>bundler:1.12.0</product>
<product>bundler:1.12.0</product>
<product>bundler:1.12.0</product>
<product>bundler:1.12.0</product>
<product>bundler:1.12.0</product>
<product>bundler:1.12.1</product>
<product>bundler:1.12.2</product>
<product>bundler:1.12.3</product>
<product>bundler:1.12.4</product>
<product>bundler:1.12.5</product>
<product>bundler:1.12.6</product>
<product>bundler:1.13.0</product>
<product>bundler:1.13.0</product>
<product>bundler:1.13.0</product>
<product>bundler:1.13.0</product>
<product>bundler:1.13.1</product>
<product>bundler:1.13.2</product>
<product>bundler:1.13.3</product>
<product>bundler:1.13.4</product>
<product>bundler:1.13.5</product>
<product>bundler:1.13.6</product>
</cve>
<cve id="CVE-2016-6445" level="LOW">
<product>meeting_server:1.8.15</product>
<product>meeting_server:1.8_base</product>
<product>meeting_server:1.9.0</product>
<product>meeting_server:1.9.2</product>
<product>meeting_server:2.0.0</product>
<product>meeting_server:2.0.1</product>
<product>meeting_server:2.0.3</product>
<product>meeting_server:2.0.4</product>
<product>meeting_server:2.0.5</product>
</cve>
<cve id="CVE-2016-6344" level="LOW">
<product>jboss_bpm_suite:6.3</product>
</cve>
<cve id="CVE-2016-3012" level="LOW">
<product>api_connect:5.0.2.0</product>
<product>network_path_manager:2.1.1.9</product>
</cve>
<cve id="CVE-2016-1437" level="LOW">
<product>prime_collaboration_deployment:10.5.0</product>
<product>prime_collaboration_deployment:10.5.1</product>
<product>prime_collaboration_deployment:11.0_base</product>
<product>prime_collaboration_deployment:11.5.0</product>
</cve>
<cve id="CVE-2016-6567" level="LOW">
<product>resident_download_manager:-</product>
</cve>
<cve id="CVE-2016-6566" level="LOW">
<product>etrakit3:3.2.1.17</product>
</cve>
<cve id="CVE-2016-6565" level="MEDIUM">
<product>nextgen_gallery:1.5.0</product>
<product>nextgen_gallery:1.5.1</product>
<product>nextgen_gallery:1.5.2</product>
<product>nextgen_gallery:1.5.3</product>
<product>nextgen_gallery:1.5.4</product>
<product>nextgen_gallery:1.5.5</product>
<product>nextgen_gallery:1.6.0</product>
<product>nextgen_gallery:1.6.1</product>
<product>nextgen_gallery:1.6.2</product>
<product>nextgen_gallery:1.7.0</product>
<product>nextgen_gallery:1.7.1</product>
<product>nextgen_gallery:1.7.2</product>
<product>nextgen_gallery:1.7.3</product>
<product>nextgen_gallery:1.7.4</product>
<product>nextgen_gallery:1.8.0</product>
<product>nextgen_gallery:1.8.1</product>
<product>nextgen_gallery:1.8.2</product>
<product>nextgen_gallery:1.8.3</product>
<product>nextgen_gallery:1.8.4</product>
<product>nextgen_gallery:1.9.0</product>
<product>nextgen_gallery:1.9.1</product>
<product>nextgen_gallery:1.9.2</product>
<product>nextgen_gallery:1.9.3</product>
<product>nextgen_gallery:1.9.5</product>
<product>nextgen_gallery:1.9.6</product>
<product>nextgen_gallery:1.9.7</product>
<product>nextgen_gallery:1.9.8</product>
<product>nextgen_gallery:1.9.10</product>
<product>nextgen_gallery:1.9.11</product>
<product>nextgen_gallery:1.9.12</product>
<product>nextgen_gallery:1.9.13</product>
<product>nextgen_gallery:2.0</product>
<product>nextgen_gallery:2.0.7</product>
<product>nextgen_gallery:2.0.11</product>
<product>nextgen_gallery:2.0.14</product>
<product>nextgen_gallery:2.0.17</product>
<product>nextgen_gallery:2.0.21</product>
<product>nextgen_gallery:2.0.23</product>
<product>nextgen_gallery:2.0.25</product>
<product>nextgen_gallery:2.0.27</product>
<product>nextgen_gallery:2.0.30</product>
<product>nextgen_gallery:2.0.31</product>
<product>nextgen_gallery:2.0.33</product>
<product>nextgen_gallery:2.0.40</product>
<product>nextgen_gallery:2.0.57</product>
<product>nextgen_gallery:2.0.58</product>
<product>nextgen_gallery:2.0.59</product>
<product>nextgen_gallery:2.0.61</product>
<product>nextgen_gallery:2.0.63</product>
<product>nextgen_gallery:2.0.65</product>
<product>nextgen_gallery:2.0.66</product>
<product>nextgen_gallery:2.0.66.16</product>
<product>nextgen_gallery:2.0.66.17</product>
<product>nextgen_gallery:2.0.66.26</product>
<product>nextgen_gallery:2.0.66.27</product>
<product>nextgen_gallery:2.0.66.29</product>
<product>nextgen_gallery:2.0.66.31</product>
<product>nextgen_gallery:2.0.66.33</product>
<product>nextgen_gallery:2.0.71</product>
<product>nextgen_gallery:2.0.74</product>
<product>nextgen_gallery:2.0.76</product>
<product>nextgen_gallery:2.0.77</product>
<product>nextgen_gallery:2.0.78</product>
<product>nextgen_gallery:2.0.78.1</product>
<product>nextgen_gallery:2.0.79</product>
<product>nextgen_gallery:2.1.0</product>
<product>nextgen_gallery:2.1.2</product>
<product>nextgen_gallery:2.1.7</product>
<product>nextgen_gallery:2.1.9</product>
<product>nextgen_gallery:2.1.10</product>
<product>nextgen_gallery:2.1.13</product>
<product>nextgen_gallery:2.1.15</product>
<product>nextgen_gallery:2.1.18</product>
<product>nextgen_gallery:2.1.19</product>
<product>nextgen_gallery:2.1.23</product>
<product>nextgen_gallery:2.1.26</product>
<product>nextgen_gallery:2.1.27</product>
<product>nextgen_gallery:2.1.31</product>
<product>nextgen_gallery:2.1.33</product>
<product>nextgen_gallery:2.1.43</product>
<product>nextgen_gallery:2.1.44</product>
<product>nextgen_gallery:2.1.45</product>
<product>nextgen_gallery:2.1.46</product>
<product>nextgen_gallery:2.1.49</product>
<product>nextgen_gallery:2.1.50</product>
<product>nextgen_gallery:2.1.54</product>
<product>nextgen_gallery:2.1.56</product>
</cve>
<cve id="CVE-2016-6564" level="MEDIUM">
<product>pro_2_firmware:-</product>
<product>studio_6.0_hd_firmware:-</product>
<product>studio_c_hd_firmware:-</product>
<product>studio_g_firmware:-</product>
<product>studio_g_plus_firmware:-</product>
<product>studio_x_firmware:-</product>
<product>studio_x_plus_firmware:-</product>
<product>voyager_2_dg310i_firmware:-</product>
<product>colorful_k45i_firmware:-</product>
<product>hot_2_x510_firmware:-</product>
<product>hot_x507_firmware:-</product>
<product>zero_2_x509_firmware:-</product>
<product>zero_x506_firmware:-</product>
<product>alfa_6_firmware:-</product>
<product>lead_2s_firmware:-</product>
<product>lead_3i_firmware:-</product>
<product>lead_5_firmware:-</product>
<product>lead_6_firmware:-</product>
<product>cube_5.0_firmware:-</product>
</cve>
<cve id="CVE-2016-6563" level="LOW">
<product>dir-818l%28w%29_firmware:-</product>
<product>dir-822_firmware:-</product>
<product>dir-823_firmware:-</product>
<product>dir-850l_firmware:-</product>
<product>dir-868l_firmware:-</product>
<product>dir-880l_firmware:-</product>
<product>dir-885l_firmware:-</product>
<product>dir-890l_firmware:-</product>
<product>dir-895l_firmware:-</product>
</cve>
<cve id="CVE-2016-6562" level="MEDIUM">
<product>shortel_mobility_client:9.1.3.109</product>
<product>shortel_mobility_client:9.1.3.109</product>
</cve>
<cve id="CVE-2016-6561" level="LOW">
<product>illumos:-</product>
</cve>
<cve id="CVE-2016-6560" level="LOW">
<product>illumos:-</product>
</cve>
<cve id="CVE-2016-3049" level="MEDIUM">
<product>openpages_grc_platform:7.1</product>
<product>openpages_grc_platform:7.2</product>
<product>openpages_grc_platform:7.3</product>
</cve>
<cve id="CVE-2016-3048" level="MEDIUM">
<product>openpages_grc_platform:7.1.0.0</product>
<product>openpages_grc_platform:7.1.0.1</product>
<product>openpages_grc_platform:7.1.0.2</product>
<product>openpages_grc_platform:7.1.0.3</product>
<product>openpages_grc_platform:7.2.0.0</product>
<product>openpages_grc_platform:7.2.0.1</product>
<product>openpages_grc_platform:7.2.0.2</product>
<product>openpages_grc_platform:7.2.0.3</product>
<product>openpages_grc_platform:7.2.0.4</product>
<product>openpages_grc_platform:7.3.0.0</product>
</cve>
<cve id="CVE-2016-7960" level="MEDIUM">
<product>simatic_step_7:13.010</product>
</cve>
<cve id="CVE-2016-0537" level="LOW">
<product>human_resources:11.5.10.2</product>
</cve>
<cve id="CVE-2016-0534" level="MEDIUM">
<product>project_contracts:12.1.1</product>
<product>project_contracts:12.1.2</product>
<product>project_contracts:12.1.3</product>
</cve>
<cve id="CVE-2016-0243" level="MEDIUM">
<product>websphere_portal:6.1.0.0</product>
<product>websphere_portal:6.1.0.1</product>
<product>websphere_portal:6.1.0.2</product>
<product>websphere_portal:6.1.0.3</product>
<product>websphere_portal:6.1.0.4</product>
<product>websphere_portal:6.1.0.5</product>
<product>websphere_portal:6.1.0.6</product>
<product>websphere_portal:6.1.5.0</product>
<product>websphere_portal:6.1.5.1</product>
<product>websphere_portal:6.1.5.2</product>
<product>websphere_portal:6.1.5.3</product>
<product>websphere_portal:7.0.0.0</product>
<product>websphere_portal:7.0.0.1</product>
<product>websphere_portal:7.0.0.2</product>
<product>websphere_portal:8.0.0.0</product>
<product>websphere_portal:8.0.0.1</product>
<product>websphere_portal:8.5.0.0</product>
</cve>
<cve id="CVE-2016-0244" level="MEDIUM">
<product>websphere_portal:6.1.0.0</product>
<product>websphere_portal:6.1.0.1</product>
<product>websphere_portal:6.1.0.2</product>
<product>websphere_portal:6.1.0.3</product>
<product>websphere_portal:6.1.0.4</product>
<product>websphere_portal:6.1.0.5</product>
<product>websphere_portal:6.1.0.6</product>
<product>websphere_portal:6.1.5.0</product>
<product>websphere_portal:6.1.5.1</product>
<product>websphere_portal:6.1.5.2</product>
<product>websphere_portal:6.1.5.3</product>
<product>websphere_portal:7.0.0.0</product>
<product>websphere_portal:7.0.0.1</product>
<product>websphere_portal:7.0.0.2</product>
<product>websphere_portal:8.0.0.0</product>
<product>websphere_portal:8.0.0.1</product>
<product>websphere_portal:8.5.0.0</product>
</cve>
<cve id="CVE-2016-0245" level="LOW">
<product>websphere_portal:8.0.0.0</product>
<product>websphere_portal:8.0.0.1</product>
<product>websphere_portal:8.5.0.0</product>
</cve>
<cve id="CVE-2016-0246" level="MEDIUM">
<product>security_guardium:8.2</product>
<product>security_guardium:9.0</product>
<product>security_guardium:9.1</product>
<product>security_guardium:9.5</product>
<product>security_guardium:10.0</product>
<product>security_guardium:10.1</product>
</cve>
<cve id="CVE-2016-0247" level="LOW">
<product>security_guardium:8.2</product>
<product>security_guardium:9.0</product>
<product>security_guardium:9.1</product>
<product>security_guardium:9.5</product>
<product>security_guardium:10.0</product>
<product>security_guardium:10.1</product>
</cve>
<cve id="CVE-2016-0248" level="MEDIUM">
<product>security_guardium:9.0</product>
<product>security_guardium:10.0</product>
</cve>
<cve id="CVE-2016-7969" level="LOW">
<product>libass:0.13.3</product>
<product>fedora:23</product>
<product>fedora:24</product>
<product>fedora:25</product>
<product>leap:42.1</product>
<product>opensuse:13.2</product>
</cve>
<cve id="CVE-2016-0538" level="LOW">
<product>financial_consolidation_hub:11.5.10.2</product>
<product>financial_consolidation_hub:12.1.1</product>
<product>financial_consolidation_hub:12.1.2</product>
<product>financial_consolidation_hub:12.1.3</product>
</cve>
<cve id="CVE-2016-0539" level="LOW">
<product>report_manager:11.5.10.2</product>
<product>report_manager:12.1.3</product>
<product>report_manager:12.2.3</product>
<product>report_manager:12.2.4</product>
</cve>
<cve id="CVE-2016-8744" level="LOW">
<product>brooklyn:0.9.0</product>
</cve>
<cve id="CVE-2016-8746" level="MEDIUM">
<product>ranger:0.6.2</product>
</cve>
<cve id="CVE-2016-8741" level="LOW">
<product>qpid_java:6.0.1</product>
<product>qpid_java:6.0.2</product>
<product>qpid_java:6.0.3</product>
<product>qpid_java:6.0.4</product>
<product>qpid_java:6.0.5</product>
<product>qpid_java:6.1.0</product>
</cve>
<cve id="CVE-2016-8742" level="LOW">
<product>couchdb:2.0.0</product>
</cve>
<cve id="CVE-2016-8749" level="LOW">
<product>camel:2.16.0</product>
<product>camel:2.16.1</product>
<product>camel:2.16.2</product>
<product>camel:2.16.3</product>
<product>camel:2.16.4</product>
<product>camel:2.17.0</product>
<product>camel:2.17.1</product>
<product>camel:2.17.2</product>
<product>camel:2.17.3</product>
<product>camel:2.17.4</product>
<product>camel:2.18.0</product>
<product>camel:2.18.1</product>
</cve>
<cve id="CVE-2016-8748" level="MEDIUM">
<product>nifi:1.0.0</product>
<product>nifi:1.1.0</product>
</cve>
<cve id="CVE-2016-4433" level="LOW">
<product>struts:2.3.20</product>
<product>struts:2.3.20.1</product>
<product>struts:2.3.20.3</product>
<product>struts:2.3.24</product>
<product>struts:2.3.24.1</product>
<product>struts:2.3.24.3</product>
<product>struts:2.3.28</product>
</cve>
<cve id="CVE-2016-4432" level="LOW">
<product>qpid_java:6.0.2</product>
</cve>
<cve id="CVE-2016-4431" level="LOW">
<product>struts:2.3.20</product>
<product>struts:2.3.20.1</product>
<product>struts:2.3.20.3</product>
<product>struts:2.3.24</product>
<product>struts:2.3.24.1</product>
<product>struts:2.3.24.3</product>
<product>struts:2.3.28</product>
</cve>
<cve id="CVE-2016-4430" level="MEDIUM">
<product>struts:2.3.20</product>
<product>struts:2.3.20.1</product>
<product>struts:2.3.20.3</product>
<product>struts:2.3.24</product>
<product>struts:2.3.24.1</product>
<product>struts:2.3.24.3</product>
<product>struts:2.3.28</product>
<product>struts:2.3.28.1</product>
</cve>
<cve id="CVE-2016-4437" level="MEDIUM">
<product>shiro:1.2.4</product>
</cve>
<cve id="CVE-2016-4436" level="LOW">
<product>struts:2.0.0</product>
<product>struts:2.0.1</product>
<product>struts:2.0.2</product>
<product>struts:2.0.3</product>
<product>struts:2.0.4</product>
<product>struts:2.0.5</product>
<product>struts:2.0.6</product>
<product>struts:2.0.7</product>
<product>struts:2.0.8</product>
<product>struts:2.0.9</product>
<product>struts:2.0.11</product>
<product>struts:2.0.11.1</product>
<product>struts:2.0.11.2</product>
<product>struts:2.0.12</product>
<product>struts:2.0.14</product>
<product>struts:2.1.6</product>
<product>struts:2.1.8</product>
<product>struts:2.1.8.1</product>
<product>struts:2.2.1</product>
<product>struts:2.2.1.1</product>
<product>struts:2.2.3</product>
<product>struts:2.2.3.1</product>
<product>struts:2.3.1</product>
<product>struts:2.3.1.1</product>
<product>struts:2.3.1.2</product>
<product>struts:2.3.3</product>
<product>struts:2.3.4</product>
<product>struts:2.3.4.1</product>
<product>struts:2.3.7</product>
<product>struts:2.3.8</product>
<product>struts:2.3.12</product>
<product>struts:2.3.14</product>
<product>struts:2.3.14.1</product>
<product>struts:2.3.14.2</product>
<product>struts:2.3.14.3</product>
<product>struts:2.3.15</product>
<product>struts:2.3.15.1</product>
<product>struts:2.3.15.2</product>
<product>struts:2.3.15.3</product>
<product>struts:2.3.16</product>
<product>struts:2.3.16.1</product>
<product>struts:2.3.16.2</product>
<product>struts:2.3.16.3</product>
<product>struts:2.3.20</product>
<product>struts:2.3.20.1</product>
<product>struts:2.3.20.3</product>
<product>struts:2.3.24</product>
<product>struts:2.3.24.1</product>
<product>struts:2.3.24.3</product>
<product>struts:2.3.28</product>
<product>struts:2.3.28.1</product>
<product>struts:2.5</product>
<product>struts:2.5</product>
<product>struts:2.5</product>
<product>struts:2.5</product>
</cve>
<cve id="CVE-2016-4435" level="MEDIUM">
<product>bosh_stemcell:3146.13</product>
<product>bosh_stemcell:3232.4</product>
</cve>
<cve id="CVE-2016-4434" level="MEDIUM">
<product>tika:1.12</product>
</cve>
<cve id="CVE-2016-1119" level="LOW">
<product>acrobat:11.0.15</product>
<product>acrobat_dc:15.006.30121</product>
<product>acrobat_dc:15.010.20060</product>
<product>acrobat_reader_dc:15.006.30121</product>
<product>acrobat_reader_dc:15.010.20060</product>
<product>reader:11.0.15</product>
</cve>
<cve id="CVE-2016-4438" level="LOW">
<product>struts:2.3.20</product>
<product>struts:2.3.20.1</product>
<product>struts:2.3.20.3</product>
<product>struts:2.3.24</product>
<product>struts:2.3.24.1</product>
<product>struts:2.3.24.3</product>
<product>struts:2.3.28</product>
</cve>
<cve id="CVE-2016-8293" level="MEDIUM">
<product>peoplesoft_enterprise_peopletools:8.54</product>
<product>peoplesoft_enterprise_peopletools:8.55</product>
</cve>
<cve id="CVE-2016-8292" level="MEDIUM">
<product>your_sha256_hashn_manager:9.2</product>
</cve>
<cve id="CVE-2016-8291" level="MEDIUM">
<product>peoplesoft_enterprise_peopletools:8.54</product>
<product>peoplesoft_enterprise_peopletools:8.55</product>
</cve>
<cve id="CVE-2016-8562" level="MEDIUM">
<product>simatic_cp_1543-1_firmware:-</product>
</cve>
<cve id="CVE-2016-8565" level="LOW">
<product>automation_license_manager:5.3</product>
</cve>
<cve id="CVE-2016-8296" level="MEDIUM">
<product>peoplesoft_enterprise_peopletools:8.54</product>
<product>peoplesoft_enterprise_peopletools:8.55</product>
</cve>
<cve id="CVE-2016-8567" level="LOW">
<product>sicam_pas:-</product>
</cve>
<cve id="CVE-2016-8294" level="LOW">
<product>peoplesoft_enterprise_peopletools:8.54</product>
<product>peoplesoft_enterprise_peopletools:8.55</product>
</cve>
<cve id="CVE-2016-8299" level="LOW">
<product>flexcube_universal_banking:11.3.0</product>
<product>flexcube_universal_banking:11.4.0</product>
<product>flexcube_universal_banking:12.0.1</product>
<product>flexcube_universal_banking:12.0.2</product>
<product>flexcube_universal_banking:12.0.3</product>
<product>flexcube_universal_banking:12.1.0</product>
<product>flexcube_universal_banking:12.2.0</product>
</cve>
<cve id="CVE-2016-8298" level="LOW">
<product>flexcube_private_banking:2.0.1</product>
<product>flexcube_private_banking:2.2.0</product>
<product>flexcube_private_banking:12.0.1</product>
</cve>
<cve id="CVE-2016-9160" level="MEDIUM">
<product>simatic_pcs_7:8.0</product>
<product>simatic_wincc:7.1</product>
</cve>
<cve id="CVE-2016-9167" level="LOW">
<product>edirectory:9.0.1</product>
</cve>
<cve id="CVE-2016-9164" level="LOW">
<product>unified_infrastructure_management:8.4</product>
</cve>
<cve id="CVE-2016-9165" level="LOW">
<product>unified_infrastructure_management:8.47</product>
<product>unified_infrastructure_management_snap:8.47</product>
</cve>
<cve id="CVE-2016-1377" level="MEDIUM">
<product>unity_connection:10.0.0</product>
<product>unity_connection:10.0.5</product>
<product>unity_connection:10.5%282%29</product>
<product>unity_connection:10.5%282.3009%29</product>
<product>unity_connection:11.0%280.98000.225%29</product>
<product>unity_connection:11.0.0</product>
</cve>
<cve id="CVE-2016-9168" level="MEDIUM">
<product>edirectory:9.0.1</product>
</cve>
<cve id="CVE-2016-9169" level="MEDIUM">
<product>groupwise:2014</product>
</cve>
<cve id="CVE-2016-1373" level="LOW">
<product>finesse:8.5%281%29_base</product>
<product>finesse:8.5%282%29_base</product>
<product>finesse:8.5%283%29_base</product>
<product>finesse:8.5%284%29_base</product>
<product>finesse:8.5%285%29_base</product>
<product>finesse:8.6%281%29_base</product>
<product>finesse:9.0%281%29_base</product>
<product>finesse:9.0%282%29_base</product>
<product>finesse:9.1%281%29_base</product>
<product>finesse:9.1%281%29_es1</product>
<product>finesse:9.1%281%29_es2</product>
<product>finesse:9.1%281%29_es3</product>
<product>finesse:9.1%281%29_es4</product>
<product>finesse:9.1%281%29_es5</product>
<product>finesse:9.1%281%29_su1</product>
<product>finesse:9.1%281%29_su1.1</product>
<product>finesse:10.0%281%29_base</product>
<product>finesse:10.0%281%29_su1</product>
<product>finesse:10.0%281%29_su1.1</product>
<product>finesse:10.5%281%29_base</product>
<product>finesse:10.5%281%29_es1</product>
<product>finesse:10.5%281%29_es2</product>
<product>finesse:10.5%281%29_es3</product>
<product>finesse:10.5%281%29_es4</product>
<product>finesse:10.5%281%29_su1</product>
<product>finesse:10.5%281%29_su1.1</product>
<product>finesse:10.5%281%29_su1.7</product>
<product>finesse:10.6%281%29_base</product>
<product>finesse:10.6%281%29_su1</product>
<product>finesse:10.6%281%29_su2</product>
<product>finesse:11.0%281%29_base</product>
</cve>
<cve id="CVE-2016-1370" level="LOW">
<product>network_analysis_module_software:4.0.0</product>
<product>network_analysis_module_software:4.1.0</product>
</cve>
<cve id="CVE-2016-9752" level="LOW">
<product>serendipity:2.0.4</product>
</cve>
<cve id="CVE-2016-2879" level="LOW">
<product>qradar_security_information_and_event_manager:7.2.0</product>
<product>qradar_security_information_and_event_manager:7.2.1</product>
<product>qradar_security_information_and_event_manager:7.2.2</product>
<product>qradar_security_information_and_event_manager:7.2.3</product>
<product>qradar_security_information_and_event_manager:7.2.4</product>
<product>qradar_security_information_and_event_manager:7.2.5</product>
<product>qradar_security_information_and_event_manager:7.2.6</product>
<product>qradar_security_information_and_event_manager:7.2.7</product>
</cve>
<cve id="CVE-2016-2878" level="MEDIUM">
<product>qradar_security_information_and_event_manager:7.1.0</product>
<product>qradar_security_information_and_event_manager:7.2.0</product>
<product>qradar_security_information_and_event_manager:7.2.1</product>
<product>qradar_security_information_and_event_manager:7.2.2</product>
<product>qradar_security_information_and_event_manager:7.2.3</product>
<product>qradar_security_information_and_event_manager:7.2.4</product>
<product>qradar_security_information_and_event_manager:7.2.5</product>
<product>qradar_security_information_and_event_manager:7.2.6</product>
</cve>
<cve id="CVE-2016-2871" level="LOW">
<product>qradar_security_information_and_event_manager:7.1.0</product>
<product>qradar_security_information_and_event_manager:7.2.0</product>
<product>qradar_security_information_and_event_manager:7.2.1</product>
<product>qradar_security_information_and_event_manager:7.2.2</product>
<product>qradar_security_information_and_event_manager:7.2.3</product>
<product>qradar_security_information_and_event_manager:7.2.4</product>
<product>qradar_security_information_and_event_manager:7.2.5</product>
<product>qradar_security_information_and_event_manager:7.2.6</product>
</cve>
<cve id="CVE-2016-2870" level="LOW">
<product>websphere_datapower_xc10_appliance_firmware:2.1</product>
<product>websphere_datapower_xc10_appliance_firmware:2.5</product>
</cve>
<cve id="CVE-2016-2873" level="LOW">
<product>qradar_security_information_and_event_manager:7.1.0</product>
<product>qradar_security_information_and_event_manager:7.2.0</product>
<product>qradar_security_information_and_event_manager:7.2.1</product>
<product>qradar_security_information_and_event_manager:7.2.2</product>
<product>qradar_security_information_and_event_manager:7.2.3</product>
<product>qradar_security_information_and_event_manager:7.2.4</product>
<product>qradar_security_information_and_event_manager:7.2.5</product>
<product>qradar_security_information_and_event_manager:7.2.6</product>
</cve>
<cve id="CVE-2016-2872" level="LOW">
<product>qradar_security_information_and_event_manager:7.2.0</product>
<product>qradar_security_information_and_event_manager:7.2.1</product>
<product>qradar_security_information_and_event_manager:7.2.2</product>
<product>qradar_security_information_and_event_manager:7.2.3</product>
<product>qradar_security_information_and_event_manager:7.2.4</product>
<product>qradar_security_information_and_event_manager:7.2.5</product>
<product>qradar_security_information_and_event_manager:7.2.6</product>
<product>security_qradar_incident_forensics:7.2.0</product>
<product>security_qradar_incident_forensics:7.2.1</product>
<product>security_qradar_incident_forensics:7.2.2</product>
<product>security_qradar_incident_forensics:7.2.3</product>
<product>security_qradar_incident_forensics:7.2.4</product>
<product>security_qradar_incident_forensics:7.2.5</product>
<product>security_qradar_incident_forensics:7.2.6</product>
</cve>
<cve id="CVE-2016-2875" level="LOW">
<product>qradar_security_information_and_event_manager:7.1.0</product>
<product>qradar_security_information_and_event_manager:7.2.0</product>
<product>qradar_security_information_and_event_manager:7.2.1</product>
<product>qradar_security_information_and_event_manager:7.2.2</product>
<product>qradar_security_information_and_event_manager:7.2.3</product>
<product>qradar_security_information_and_event_manager:7.2.4</product>
<product>qradar_security_information_and_event_manager:7.2.5</product>
<product>qradar_security_information_and_event_manager:7.2.6</product>
</cve>
<cve id="CVE-2016-2874" level="MEDIUM">
<product>qradar_security_information_and_event_manager:7.1.0</product>
<product>qradar_security_information_and_event_manager:7.2.0</product>
<product>qradar_security_information_and_event_manager:7.2.1</product>
<product>qradar_security_information_and_event_manager:7.2.2</product>
<product>qradar_security_information_and_event_manager:7.2.3</product>
<product>qradar_security_information_and_event_manager:7.2.4</product>
<product>qradar_security_information_and_event_manager:7.2.5</product>
<product>qradar_security_information_and_event_manager:7.2.6</product>
</cve>
<cve id="CVE-2016-2877" level="LOW">
<product>qradar_security_information_and_event_manager:7.1.0</product>
<product>qradar_security_information_and_event_manager:7.2.0</product>
<product>qradar_security_information_and_event_manager:7.2.1</product>
<product>qradar_security_information_and_event_manager:7.2.2</product>
<product>qradar_security_information_and_event_manager:7.2.3</product>
<product>qradar_security_information_and_event_manager:7.2.4</product>
<product>qradar_security_information_and_event_manager:7.2.5</product>
<product>qradar_security_information_and_event_manager:7.2.6</product>
</cve>
<cve id="CVE-2016-2876" level="MEDIUM">
<product>qradar_security_information_and_event_manager:7.1.0</product>
<product>qradar_security_information_and_event_manager:7.2.0</product>
<product>qradar_security_information_and_event_manager:7.2.1</product>
<product>qradar_security_information_and_event_manager:7.2.2</product>
<product>qradar_security_information_and_event_manager:7.2.3</product>
<product>qradar_security_information_and_event_manager:7.2.4</product>
<product>qradar_security_information_and_event_manager:7.2.5</product>
<product>qradar_security_information_and_event_manager:7.2.6</product>
</cve>
<cve id="CVE-2016-5479" level="LOW">
<product>flexcube_universal_banking:11.3.0</product>
<product>flexcube_universal_banking:11.4.0</product>
<product>flexcube_universal_banking:12.0.1</product>
</cve>
<cve id="CVE-2016-5470" level="MEDIUM">
<product>peoplesoft_enterprise_peopletools:8.54</product>
<product>peoplesoft_enterprise_peopletools:8.55</product>
</cve>
<cve id="CVE-2016-5472" level="LOW">
<product>peoplesoft_enterprise_peopletools:8.54</product>
<product>peoplesoft_enterprise_peopletools:8.55</product>
</cve>
<cve id="CVE-2016-5473" level="MEDIUM">
<product>agile_product_lifecycle_management_framework:9.3.4</product>
<product>agile_product_lifecycle_management_framework:9.3.5</product>
</cve>
<cve id="CVE-2016-5474" level="LOW">
<product>retail_service_backbone:14.0</product>
<product>retail_service_backbone:14.1</product>
<product>retail_service_backbone:15.0</product>
</cve>
<cve id="CVE-2016-5475" level="LOW">
<product>retail_service_backbone:14.0</product>
<product>retail_service_backbone:14.1</product>
<product>retail_service_backbone:15.0</product>
</cve>
<cve id="CVE-2016-5476" level="LOW">
<product>retail_integration_bus:13.0</product>
<product>retail_integration_bus:13.1</product>
<product>retail_integration_bus:13.2</product>
<product>retail_integration_bus:14.0</product>
<product>retail_integration_bus:14.1</product>
<product>retail_integration_bus:15.0</product>
</cve>
<cve id="CVE-2016-5477" level="LOW">
<product>glassfish_server:2.1.1</product>
<product>glassfish_server:3.0.1</product>
</cve>
<cve id="CVE-2016-2299" level="LOW">
<product>integraxor:4.2.4502</product>
</cve>
<cve id="CVE-2016-2298" level="LOW">
<product>web%27log_basic_100:-</product>
<product>web%27log_light:-</product>
<product>web%27log_pro:-</product>
<product>web%27log_pro_unlimited:-</product>
</cve>
<cve id="CVE-2016-2295" level="LOW">
<product>miineport_e1_4641_firmware:1.1.10</product>
<product>miineport_e1_7080_firmware:1.1.10</product>
<product>miineport_e2_1242_firmware:1.1</product>
<product>miineport_e2_4561_firmware:1.1</product>
<product>miineport_e3_firmware:1.0</product>
</cve>
<cve id="CVE-2016-2294" level="LOW">
<product>acuvim_ii_net_firmware:3.08</product>
<product>acuvim_iir_net_firmware:3.08</product>
</cve>
<cve id="CVE-2016-2297" level="LOW">
<product>web%27log_basic_100:-</product>
<product>web%27log_light:-</product>
<product>web%27log_pro:-</product>
<product>web%27log_pro_unlimited:-</product>
</cve>
<cve id="CVE-2016-2296" level="LOW">
<product>web%27log_basic_100:-</product>
<product>web%27log_light:-</product>
<product>web%27log_pro:-</product>
<product>web%27log_pro_unlimited:-</product>
</cve>
<cve id="CVE-2016-2291" level="MEDIUM">
<product>gp-pro_ex_ex-ed:4.0.4</product>
<product>gp-pro_ex_pfxexedls:4.0.4</product>
<product>gp-pro_ex_pfxexedv:4.0.4</product>
<product>gp-pro_ex_pfxexgrpls:4.0.4</product>
</cve>
<cve id="CVE-2016-2290" level="MEDIUM">
<product>gp-pro_ex_ex-ed:4.0.4</product>
<product>gp-pro_ex_pfxexedls:4.0.4</product>
<product>gp-pro_ex_pfxexedv:4.0.4</product>
<product>gp-pro_ex_pfxexgrpls:4.0.4</product>
</cve>
<cve id="CVE-2016-2293" level="LOW">
<product>acuvim_ii_net_firmware:3.08</product>
<product>acuvim_iir_net_firmware:3.08</product>
</cve>
<cve id="CVE-2016-2292" level="MEDIUM">
<product>gp-pro_ex_ex-ed:4.0.4</product>
<product>gp-pro_ex_pfxexedls:4.0.4</product>
<product>gp-pro_ex_pfxexedv:4.0.4</product>
<product>gp-pro_ex_pfxexgrpls:4.0.4</product>
</cve>
<cve id="CVE-2016-3740" level="MEDIUM">
<product>foxit_reader:7.3.4.311</product>
</cve>
<cve id="CVE-2016-6978" level="LOW">
<product>acrobat:11.0.17</product>
<product>acrobat_dc:15.006.30201</product>
<product>acrobat_dc:15.017.20053</product>
<product>acrobat_reader_dc:15.006.30201</product>
<product>acrobat_reader_dc:15.017.20053</product>
<product>reader:11.0.17</product>
</cve>
<cve id="CVE-2016-6979" level="LOW">
<product>acrobat:11.0.17</product>
<product>acrobat_dc:15.006.30201</product>
<product>acrobat_dc:15.017.20053</product>
<product>acrobat_reader_dc:15.006.30201</product>
<product>acrobat_reader_dc:15.017.20053</product>
<product>reader:11.0.17</product>
</cve>
<cve id="CVE-2016-6974" level="LOW">
<product>acrobat:11.0.17</product>
<product>acrobat_dc:15.006.30201</product>
<product>acrobat_dc:15.017.20053</product>
<product>acrobat_reader_dc:15.006.30201</product>
<product>acrobat_reader_dc:15.017.20053</product>
<product>reader:11.0.17</product>
</cve>
<cve id="CVE-2016-6975" level="LOW">
<product>acrobat:11.0.17</product>
<product>acrobat_dc:15.006.30201</product>
<product>acrobat_dc:15.017.20053</product>
<product>acrobat_reader_dc:15.006.30201</product>
<product>acrobat_reader_dc:15.017.20053</product>
<product>reader:11.0.17</product>
</cve>
<cve id="CVE-2016-6976" level="LOW">
<product>acrobat:11.0.17</product>
<product>acrobat_dc:15.006.30201</product>
<product>acrobat_dc:15.017.20053</product>
<product>acrobat_reader_dc:15.006.30201</product>
<product>acrobat_reader_dc:15.017.20053</product>
<product>reader:11.0.17</product>
</cve>
<cve id="CVE-2016-6977" level="LOW">
<product>acrobat:11.0.17</product>
<product>acrobat_dc:15.006.30201</product>
<product>acrobat_dc:15.017.20053</product>
<product>acrobat_reader_dc:15.006.30201</product>
<product>acrobat_reader_dc:15.017.20053</product>
<product>reader:11.0.17</product>
</cve>
<cve id="CVE-2016-6970" level="LOW">
<product>acrobat:11.0.17</product>
<product>acrobat_dc:15.006.30201</product>
<product>acrobat_dc:15.017.20053</product>
<product>acrobat_reader_dc:15.006.30201</product>
<product>acrobat_reader_dc:15.017.20053</product>
<product>reader:11.0.17</product>
</cve>
<cve id="CVE-2016-6971" level="LOW">
<product>acrobat:11.0.17</product>
<product>acrobat_dc:15.006.30201</product>
<product>acrobat_dc:15.017.20053</product>
<product>acrobat_reader_dc:15.006.30201</product>
<product>acrobat_reader_dc:15.017.20053</product>
<product>reader:11.0.17</product>
</cve>
<cve id="CVE-2016-6972" level="LOW">
<product>acrobat:11.0.17</product>
<product>acrobat_dc:15.006.30201</product>
<product>acrobat_dc:15.017.20053</product>
<product>acrobat_reader_dc:15.006.30201</product>
<product>acrobat_reader_dc:15.017.20053</product>
<product>reader:11.0.17</product>
</cve>
<cve id="CVE-2016-6973" level="LOW">
<product>acrobat:11.0.17</product>
<product>acrobat_dc:15.006.30201</product>
<product>acrobat_dc:15.017.20053</product>
<product>acrobat_reader_dc:15.006.30201</product>
<product>acrobat_reader_dc:15.017.20053</product>
<product>reader:11.0.17</product>
</cve>
<cve id="CVE-2016-3183" level="MEDIUM">
<product>openjpeg:2.1.0</product>
</cve>
<cve id="CVE-2016-3180" level="MEDIUM">
<product>tor_browser_launcher:0.2.3</product>
</cve>
<cve id="CVE-2016-3186" level="LOW">
<product>libtiff:4.0.6</product>
<product>opensuse:13.2</product>
</cve>
<cve id="CVE-2016-3187" level="LOW">
<product>prepopulate:7.x-2.0</product>
<product>prepopulate:7.x-2.x</product>
</cve>
<cve id="CVE-2016-3188" level="LOW">
<product>prepopulate:7.x-2.0</product>
<product>prepopulate:7.x-2.x</product>
</cve>
<cve id="CVE-2016-3189" level="MEDIUM">
<product>bzip2:1.0.6</product>
</cve>
<cve id="CVE-2016-7519" level="MEDIUM">
<product>imagemagick:-</product>
</cve>
<cve id="CVE-2016-7518" level="MEDIUM">
<product>imagemagick:-</product>
</cve>
<cve id="CVE-2016-7511" level="MEDIUM">
<product>libdwarf:20160613</product>
</cve>
<cve id="CVE-2016-7510" level="MEDIUM">
<product>libdwarf:20160613</product>
</cve>
<cve id="CVE-2016-7513" level="MEDIUM">
<product>imagemagick:-</product>
</cve>
<cve id="CVE-2016-7515" level="MEDIUM">
<product>imagemagick:-</product>
</cve>
<cve id="CVE-2016-7514" level="MEDIUM">
<product>imagemagick:-</product>
</cve>
<cve id="CVE-2016-7517" level="MEDIUM">
<product>imagemagick:-</product>
</cve>
<cve id="CVE-2016-7516" level="MEDIUM">
<product>imagemagick:-</product>
</cve>
<cve id="CVE-2016-6608" level="MEDIUM">
<product>phpmyadmin:4.6.0</product>
<product>phpmyadmin:4.6.0</product>
<product>phpmyadmin:4.6.0</product>
<product>phpmyadmin:4.6.0</product>
<product>phpmyadmin:4.6.1</product>
<product>phpmyadmin:4.6.2</product>
<product>phpmyadmin:4.6.3</product>
</cve>
<cve id="CVE-2016-6609" level="LOW">
<product>phpmyadmin:4.0.0</product>
<product>phpmyadmin:4.0.1</product>
<product>phpmyadmin:4.0.2</product>
<product>phpmyadmin:4.0.3</product>
<product>phpmyadmin:4.0.4</product>
<product>phpmyadmin:4.0.4.1</product>
<product>phpmyadmin:4.0.4.2</product>
<product>phpmyadmin:4.0.5</product>
<product>phpmyadmin:4.0.6</product>
<product>phpmyadmin:4.0.7</product>
<product>phpmyadmin:4.0.8</product>
<product>phpmyadmin:4.0.9</product>
<product>phpmyadmin:4.0.10</product>
<product>phpmyadmin:4.0.10.1</product>
<product>phpmyadmin:4.0.10.2</product>
<product>phpmyadmin:4.0.10.3</product>
<product>phpmyadmin:4.0.10.4</product>
<product>phpmyadmin:4.0.10.5</product>
<product>phpmyadmin:4.0.10.6</product>
<product>phpmyadmin:4.0.10.7</product>
<product>phpmyadmin:4.0.10.8</product>
<product>phpmyadmin:4.0.10.9</product>
<product>phpmyadmin:4.0.10.10</product>
<product>phpmyadmin:4.0.10.11</product>
<product>phpmyadmin:4.0.10.12</product>
<product>phpmyadmin:4.0.10.13</product>
<product>phpmyadmin:4.0.10.14</product>
<product>phpmyadmin:4.0.10.15</product>
<product>phpmyadmin:4.0.10.16</product>
<product>phpmyadmin:4.4.0</product>
<product>phpmyadmin:4.4.1</product>
<product>phpmyadmin:4.4.1.1</product>
<product>phpmyadmin:4.4.2</product>
<product>phpmyadmin:4.4.3</product>
<product>phpmyadmin:4.4.4</product>
<product>phpmyadmin:4.4.5</product>
<product>phpmyadmin:4.4.6</product>
<product>phpmyadmin:4.4.6.1</product>
<product>phpmyadmin:4.4.7</product>
<product>phpmyadmin:4.4.8</product>
<product>phpmyadmin:4.4.9</product>
<product>phpmyadmin:4.4.10</product>
<product>phpmyadmin:4.4.11</product>
<product>phpmyadmin:4.4.12</product>
<product>phpmyadmin:4.4.13</product>
<product>phpmyadmin:4.4.13.1</product>
<product>phpmyadmin:4.4.14</product>
<product>phpmyadmin:4.4.14.1</product>
<product>phpmyadmin:4.4.15</product>
<product>phpmyadmin:4.4.15.1</product>
<product>phpmyadmin:4.4.15.2</product>
<product>phpmyadmin:4.4.15.3</product>
<product>phpmyadmin:4.4.15.4</product>
<product>phpmyadmin:4.4.15.5</product>
<product>phpmyadmin:4.4.15.6</product>
<product>phpmyadmin:4.4.15.7</product>
<product>phpmyadmin:4.6.0</product>
<product>phpmyadmin:4.6.1</product>
<product>phpmyadmin:4.6.2</product>
<product>phpmyadmin:4.6.3</product>
</cve>
<cve id="CVE-2016-6606" level="LOW">
<product>phpmyadmin:4.0.0</product>
<product>phpmyadmin:4.0.1</product>
<product>phpmyadmin:4.0.2</product>
<product>phpmyadmin:4.0.3</product>
<product>phpmyadmin:4.0.4</product>
<product>phpmyadmin:4.0.4.1</product>
<product>phpmyadmin:4.0.4.2</product>
<product>phpmyadmin:4.0.5</product>
<product>phpmyadmin:4.0.6</product>
<product>phpmyadmin:4.0.7</product>
<product>phpmyadmin:4.0.8</product>
<product>phpmyadmin:4.0.9</product>
<product>phpmyadmin:4.0.10</product>
<product>phpmyadmin:4.0.10.1</product>
<product>phpmyadmin:4.0.10.2</product>
<product>phpmyadmin:4.0.10.3</product>
<product>phpmyadmin:4.0.10.4</product>
<product>phpmyadmin:4.0.10.5</product>
<product>phpmyadmin:4.0.10.6</product>
<product>phpmyadmin:4.0.10.7</product>
<product>phpmyadmin:4.0.10.8</product>
<product>phpmyadmin:4.0.10.9</product>
<product>phpmyadmin:4.0.10.10</product>
<product>phpmyadmin:4.0.10.11</product>
<product>phpmyadmin:4.0.10.12</product>
<product>phpmyadmin:4.0.10.13</product>
<product>phpmyadmin:4.0.10.14</product>
<product>phpmyadmin:4.0.10.15</product>
<product>phpmyadmin:4.0.10.16</product>
<product>phpmyadmin:4.4.0</product>
<product>phpmyadmin:4.4.1</product>
<product>phpmyadmin:4.4.1.1</product>
<product>phpmyadmin:4.4.2</product>
<product>phpmyadmin:4.4.3</product>
<product>phpmyadmin:4.4.4</product>
<product>phpmyadmin:4.4.5</product>
<product>phpmyadmin:4.4.6</product>
<product>phpmyadmin:4.4.6.1</product>
<product>phpmyadmin:4.4.7</product>
<product>phpmyadmin:4.4.8</product>
<product>phpmyadmin:4.4.9</product>
<product>phpmyadmin:4.4.10</product>
<product>phpmyadmin:4.4.11</product>
<product>phpmyadmin:4.4.12</product>
<product>phpmyadmin:4.4.13</product>
<product>phpmyadmin:4.4.13.1</product>
<product>phpmyadmin:4.4.14</product>
<product>phpmyadmin:4.4.14.1</product>
<product>phpmyadmin:4.4.15</product>
<product>phpmyadmin:4.4.15.1</product>
<product>phpmyadmin:4.4.15.2</product>
<product>phpmyadmin:4.4.15.3</product>
<product>phpmyadmin:4.4.15.4</product>
<product>phpmyadmin:4.4.15.5</product>
<product>phpmyadmin:4.4.15.6</product>
<product>phpmyadmin:4.4.15.7</product>
<product>phpmyadmin:4.6.0</product>
<product>phpmyadmin:4.6.1</product>
<product>phpmyadmin:4.6.2</product>
<product>phpmyadmin:4.6.3</product>
</cve>
<cve id="CVE-2016-6607" level="MEDIUM">
<product>phpmyadmin:4.0.0</product>
<product>phpmyadmin:4.0.0</product>
<product>phpmyadmin:4.0.0</product>
<product>phpmyadmin:4.0.1</product>
<product>phpmyadmin:4.0.2</product>
<product>phpmyadmin:4.0.3</product>
<product>phpmyadmin:4.0.4</product>
<product>phpmyadmin:4.0.4.1</product>
<product>phpmyadmin:4.0.4.2</product>
<product>phpmyadmin:4.0.5</product>
<product>phpmyadmin:4.0.6</product>
<product>phpmyadmin:4.0.7</product>
<product>phpmyadmin:4.0.8</product>
<product>phpmyadmin:4.0.9</product>
<product>phpmyadmin:4.0.10</product>
<product>phpmyadmin:4.0.10.1</product>
<product>phpmyadmin:4.0.10.2</product>
<product>phpmyadmin:4.0.10.3</product>
<product>phpmyadmin:4.0.10.4</product>
<product>phpmyadmin:4.0.10.5</product>
<product>phpmyadmin:4.0.10.6</product>
<product>phpmyadmin:4.0.10.7</product>
<product>phpmyadmin:4.0.10.8</product>
<product>phpmyadmin:4.0.10.9</product>
<product>phpmyadmin:4.0.10.10</product>
<product>phpmyadmin:4.0.10.11</product>
<product>phpmyadmin:4.0.10.12</product>
<product>phpmyadmin:4.0.10.13</product>
<product>phpmyadmin:4.0.10.14</product>
<product>phpmyadmin:4.0.10.15</product>
<product>phpmyadmin:4.0.10.16</product>
<product>phpmyadmin:4.4.0</product>
<product>phpmyadmin:4.4.1</product>
<product>phpmyadmin:4.4.1.1</product>
<product>phpmyadmin:4.4.2</product>
<product>phpmyadmin:4.4.3</product>
<product>phpmyadmin:4.4.4</product>
<product>phpmyadmin:4.4.5</product>
<product>phpmyadmin:4.4.6</product>
<product>phpmyadmin:4.4.6.1</product>
<product>phpmyadmin:4.4.7</product>
<product>phpmyadmin:4.4.8</product>
<product>phpmyadmin:4.4.9</product>
<product>phpmyadmin:4.4.10</product>
<product>phpmyadmin:4.4.11</product>
<product>phpmyadmin:4.4.12</product>
<product>phpmyadmin:4.4.13</product>
<product>phpmyadmin:4.4.13.1</product>
<product>phpmyadmin:4.4.14.1</product>
<product>phpmyadmin:4.4.15</product>
<product>phpmyadmin:4.4.15.1</product>
<product>phpmyadmin:4.4.15.2</product>
<product>phpmyadmin:4.4.15.3</product>
<product>phpmyadmin:4.4.15.4</product>
<product>phpmyadmin:4.4.15.5</product>
<product>phpmyadmin:4.4.15.6</product>
<product>phpmyadmin:4.4.15.7</product>
<product>phpmyadmin:4.6.0</product>
<product>phpmyadmin:4.6.0</product>
<product>phpmyadmin:4.6.0</product>
<product>phpmyadmin:4.6.0</product>
<product>phpmyadmin:4.6.1</product>
<product>phpmyadmin:4.6.2</product>
<product>phpmyadmin:4.6.3</product>
</cve>
<cve id="CVE-2016-6604" level="LOW">
<product>exynos_fimg2d:-</product>
</cve>
<cve id="CVE-2016-6605" level="LOW">
<product>cdh:5.2.0</product>
<product>cdh:5.2.1</product>
<product>cdh:5.2.2</product>
<product>cdh:5.2.3</product>
<product>cdh:5.2.4</product>
<product>cdh:5.2.5</product>
<product>cdh:5.2.6</product>
<product>cdh:5.3.0</product>
<product>cdh:5.3.1</product>
<product>cdh:5.3.2</product>
<product>cdh:5.3.3</product>
<product>cdh:5.3.4</product>
<product>cdh:5.3.5</product>
<product>cdh:5.3.6</product>
<product>cdh:5.3.7</product>
<product>cdh:5.3.8</product>
<product>cdh:5.3.9</product>
<product>cdh:5.3.10</product>
<product>cdh:5.4.0</product>
<product>cdh:5.4.1</product>
<product>cdh:5.4.2</product>
<product>cdh:5.4.3</product>
<product>cdh:5.4.4</product>
<product>cdh:5.4.5</product>
<product>cdh:5.4.6</product>
<product>cdh:5.4.7</product>
<product>cdh:5.4.8</product>
<product>cdh:5.4.9</product>
<product>cdh:5.4.10</product>
<product>cdh:5.4.11</product>
<product>cdh:5.5.0</product>
<product>cdh:5.5.1</product>
<product>cdh:5.5.2</product>
<product>cdh:5.5.3</product>
<product>cdh:5.5.4</product>
<product>cdh:5.5.5</product>
<product>cdh:5.5.6</product>
<product>cdh:5.6.0</product>
<product>cdh:5.6.1</product>
<product>cdh:5.7.0</product>
<product>cdh:5.7.1</product>
<product>cdh:5.7.2</product>
<product>cdh:5.8.0</product>
</cve>
<cve id="CVE-2016-6602" level="LOW">
<product>webnms_framework:5.2</product>
<product>webnms_framework:5.2</product>
</cve>
<cve id="CVE-2016-6603" level="LOW">
<product>webnms_framework:5.2</product>
<product>webnms_framework:5.2</product>
</cve>
<cve id="CVE-2016-6600" level="LOW">
<product>webnms_framework:5.2</product>
<product>webnms_framework:5.2</product>
</cve>
<cve id="CVE-2016-6601" level="LOW">
<product>webnms_framework:5.2</product>
<product>webnms_framework:5.2</product>
</cve>
<cve id="CVE-2016-0516" level="LOW">
<product>e-business_suite:11.5.10.2</product>
</cve>
<cve id="CVE-2016-3089" level="MEDIUM">
<product>openmeetings:3.1.1</product>
</cve>
<cve id="CVE-2016-7419" level="MEDIUM">
<product>nextcloud_server:9.0.51</product>
<product>owncloud:9.0.3</product>
</cve>
<cve id="CVE-2016-0189" level="HIGH">
<product>jscript:5.8</product>
<product>vbscript:5.7</product>
<product>vbscript:5.8</product>
</cve>
<cve id="CVE-2016-0188" level="MEDIUM">
<product>internet_explorer:11</product>
</cve>
<cve id="CVE-2016-0187" level="HIGH">
<product>jscript:5.8</product>
<product>vbscript:5.8</product>
</cve>
<cve id="CVE-2016-0186" level="HIGH">
<product>edge:-</product>
</cve>
<cve id="CVE-2016-3087" level="LOW">
<product>struts:2.3.20</product>
<product>struts:2.3.20.1</product>
<product>struts:2.3.24</product>
<product>struts:2.3.24.1</product>
<product>struts:2.3.28</product>
</cve>
<cve id="CVE-2016-3086" level="LOW">
<product>hadoop:2.6.0</product>
<product>hadoop:2.6.1</product>
<product>hadoop:2.6.2</product>
<product>hadoop:2.6.3</product>
<product>hadoop:2.6.4</product>
<product>hadoop:2.7.0</product>
<product>hadoop:2.7.1</product>
<product>hadoop:2.7.2</product>
</cve>
<cve id="CVE-2016-5117" level="MEDIUM">
<product>openntpd:6.0</product>
</cve>
<cve id="CVE-2016-5115" level="MEDIUM">
<product>libavformat:57.34.103</product>
</cve>
<cve id="CVE-2016-9335" level="LOW">
<product>sixnet-managed_industrial_switches_firmware:5.0.196</product>
<product>stride-managed_ethernet_switches_firmware:5.0.190</product>
</cve>
<cve id="CVE-2016-5119" level="HIGH">
<product>keepass:2.33</product>
</cve>
<cve id="CVE-2016-3331" level="MEDIUM">
<product>edge:-</product>
<product>internet_explorer:11</product>
</cve>
<cve id="CVE-2016-0769" level="LOW">
<product>eshop_plugin:6.3.14</product>
</cve>
<cve id="CVE-2016-8329" level="MEDIUM">
<product>peoplesoft_enterprise_peopletools:8.54</product>
<product>peoplesoft_enterprise_peopletools:8.55</product>
</cve>
<cve id="CVE-2016-0761" level="LOW">
<product>cloud_foundry_elastic_runtime:1.6.0</product>
<product>cloud_foundry_elastic_runtime:1.6.1</product>
<product>cloud_foundry_elastic_runtime:1.6.2</product>
<product>cloud_foundry_elastic_runtime:1.6.3</product>
<product>cloud_foundry_elastic_runtime:1.6.4</product>
<product>cloud_foundry_elastic_runtime:1.6.5</product>
<product>cloud_foundry_elastic_runtime:1.6.6</product>
<product>cloud_foundry_elastic_runtime:1.6.7</product>
<product>cloud_foundry_elastic_runtime:1.6.8</product>
<product>cloud_foundry_elastic_runtime:1.6.9</product>
<product>cloud_foundry_elastic_runtime:1.6.10</product>
<product>cloud_foundry_elastic_runtime:1.6.11</product>
<product>cloud_foundry_elastic_runtime:1.6.12</product>
<product>cloud_foundry_elastic_runtime:1.6.13</product>
<product>cloud_foundry_elastic_runtime:1.6.14</product>
<product>cloud_foundry_elastic_runtime:1.6.15</product>
<product>cloud_foundry_elastic_runtime:1.6.16</product>
<product>cloud_foundry_garden_linux:0.332.0</product>
</cve>
<cve id="CVE-2016-0760" level="LOW">
<product>sentry:1.5.1</product>
<product>sentry:1.6.0</product>
</cve>
<cve id="CVE-2016-0767" level="LOW">
<product>postgre_sql_pl%2fjava:1.4.3</product>
</cve>
<cve id="CVE-2016-0765" level="MEDIUM">
<product>eshop_plugin:6.3.14</product>
</cve>
<cve id="CVE-2016-0764" level="LOW">
<product>network_manager:1.0.8</product>
</cve>
<cve id="CVE-2016-9377" level="LOW">
<product>xen:4.5.0</product>
<product>xen:4.5.1</product>
<product>xen:4.5.2</product>
<product>xen:4.5.3</product>
<product>xen:4.5.5</product>
<product>xen:4.6.0</product>
<product>xen:4.6.1</product>
<product>xen:4.6.3</product>
<product>xen:4.6.4</product>
<product>xen:4.7.0</product>
<product>xen:4.7.1</product>
</cve>
<cve id="CVE-2016-9804" level="LOW">
<product>bluez:5.42</product>
</cve>
<cve id="CVE-2016-9807" level="MEDIUM">
<product>gstreamer:1.10.1</product>
</cve>
<cve id="CVE-2016-9801" level="LOW">
<product>bluez:5.42</product>
</cve>
<cve id="CVE-2016-9800" level="LOW">
<product>bluez:5.42</product>
</cve>
<cve id="CVE-2016-9803" level="LOW">
<product>bluez:5.42</product>
</cve>
<cve id="CVE-2016-9802" level="LOW">
<product>bluez:5.42</product>
</cve>
<cve id="CVE-2016-8610" level="LOW">
<product>openssl:0.9.8</product>
<product>openssl:1.0.1</product>
<product>openssl:1.0.2</product>
<product>openssl:1.0.2</product>
<product>openssl:1.0.2</product>
<product>openssl:1.0.2</product>
<product>openssl:1.0.2a</product>
<product>openssl:1.0.2b</product>
<product>openssl:1.0.2c</product>
<product>openssl:1.0.2d</product>
<product>openssl:1.0.2e</product>
<product>openssl:1.0.2f</product>
<product>openssl:1.0.2g</product>
<product>openssl:1.0.2h</product>
<product>openssl:1.1.0</product>
</cve>
<cve id="CVE-2016-9809" level="MEDIUM">
<product>gstreamer:1.10.1</product>
</cve>
<cve id="CVE-2016-9808" level="LOW">
<product>gstreamer:1.10.1</product>
</cve>
<cve id="CVE-2016-9379" level="LOW">
<product>xenserver:6.0.2</product>
<product>xenserver:6.2.0</product>
<product>xenserver:6.5</product>
<product>xenserver:7.0</product>
<product>xen</product>
</cve>
<cve id="CVE-2016-9378" level="LOW">
<product>xen:4.5.0</product>
<product>xen:4.5.1</product>
<product>xen:4.5.2</product>
<product>xen:4.5.3</product>
<product>xen:4.5.5</product>
<product>xen:4.6.0</product>
<product>xen:4.6.1</product>
<product>xen:4.6.3</product>
<product>xen:4.6.4</product>
<product>xen:4.7.0</product>
<product>xen:4.7.1</product>
</cve>
<cve id="CVE-2016-10136" level="LOW">
<product>adups_fota:-</product>
</cve>
<cve id="CVE-2016-10137" level="LOW">
<product>adups_fota:-</product>
</cve>
<cve id="CVE-2016-10134" level="LOW">
<product>zabbix:2.2.13</product>
<product>zabbix:3.0.0</product>
<product>zabbix:3.0.1</product>
<product>zabbix:3.0.2</product>
<product>zabbix:3.0.3</product>
</cve>
<cve id="CVE-2016-10135" level="MEDIUM">
<product>lg_mobile:5.0</product>
<product>lg_mobile:5.1</product>
<product>lg_mobile:6.0</product>
<product>lg_mobile:6.0.1</product>
<product>lg_mobile:7.0</product>
</cve>
<cve id="CVE-2016-10132" level="LOW">
<product>mujs</product>
<product>fedora:25</product>
</cve>
<cve id="CVE-2016-10133" level="LOW">
<product>mujs</product>
</cve>
<cve id="CVE-2016-10130" level="MEDIUM">
<product>libgit2:0.24.5</product>
<product>libgit2:0.25.0</product>
<product>libgit2:0.25.0</product>
<product>libgit2:0.25.0</product>
</cve>
<cve id="CVE-2016-10131" level="LOW">
<product>codeigniter:3.1.2</product>
</cve>
<cve id="CVE-2016-10680" level="MEDIUM">
<product>adamvr-geoip-lite:1.2.0</product>
</cve>
<cve id="CVE-2016-10681" level="MEDIUM">
<product>roslibjs:0.18.0</product>
</cve>
<cve id="CVE-2016-10682" level="MEDIUM">
<product>massif:0.0.1-1</product>
</cve>
<cve id="CVE-2016-10683" level="MEDIUM">
<product>arcanist:0.0.1</product>
</cve>
<cve id="CVE-2016-10684" level="MEDIUM">
<product>healthcenter:3.0.3</product>
</cve>
<cve id="CVE-2016-10685" level="MEDIUM">
<product>pk-app-wonderbox:1.0.0</product>
</cve>
<cve id="CVE-2016-10138" level="LOW">
<product>adups_fota:-</product>
</cve>
<cve id="CVE-2016-10139" level="LOW">
<product>adups_fota:-</product>
</cve>
<cve id="CVE-2016-5801" level="LOW">
<product>omniview:1.2</product>
</cve>
<cve id="CVE-2016-5803" level="LOW">
<product>unified_infrastructure_management:8.47</product>
</cve>
<cve id="CVE-2016-5802" level="MEDIUM">
<product>ispsoft:-</product>
<product>pmsoft:-</product>
<product>wplsoft:-</product>
</cve>
<cve id="CVE-2016-5805" level="MEDIUM">
<product>ispsoft:-</product>
<product>pmsoft:-</product>
<product>wplsoft:-</product>
</cve>
<cve id="CVE-2016-5804" level="LOW">
<product>mgate_mb3170_router_firmware:2.4</product>
<product>mgate_mb3180_router_firmware:1.7</product>
<product>mgate_mb3270_router_firmware:2.6</product>
<product>mgate_mb3280_router_firmware:2.6</product>
<product>mgate_mb3480_router_firmware:2.5</product>
</cve>
<cve id="CVE-2016-5807" level="LOW">
<product>lighthouse_sms:5.1</product>
</cve>
<cve id="CVE-2016-5809" level="MEDIUM">
<product>ion5000:-</product>
<product>ion7300:-</product>
<product>ion7500:-</product>
<product>ion7600:-</product>
<product>ion8650:-</product>
<product>ion8800:-</product>
</cve>
<cve id="CVE-2016-8785" level="MEDIUM">
<product>s12700_firmware:v200r007c00</product>
<product>s12700_firmware:v200r008c00</product>
<product>s5700_firmware:v200r007c00</product>
<product>s7700_firmware:v200r002c00</product>
<product>s7700_firmware:v200r005c00</product>
<product>s7700_firmware:v200r006c00</product>
<product>s7700_firmware:v200r007c00</product>
<product>s7700_firmware:v200r008c00</product>
<product>s9700_firmware:v200r007c00</product>
</cve>
<cve id="CVE-2016-0421" level="LOW">
<product>jd_edwards_products:9.1</product>
<product>jd_edwards_products:9.2</product>
</cve>
<cve id="CVE-2016-8784" level="LOW">
<product>cloudengine_12800_firmware:v100r003c00</product>
<product>cloudengine_12800_firmware:v100r003c10</product>
<product>cloudengine_12800_firmware:v100r005c00</product>
<product>cloudengine_12800_firmware:v100r005c10</product>
<product>cloudengine_12800_firmware:v100r006c00</product>
</cve>
<cve id="CVE-2016-2538" level="LOW">
<product>qemu:2.5.0</product>
</cve>
<cve id="CVE-2016-10350" level="MEDIUM">
<product>libarchive:3.2.2</product>
</cve>
<cve id="CVE-2016-10351" level="LOW">
<product>telegram_desktop:0.10.19</product>
</cve>
<cve id="CVE-2016-2539" level="MEDIUM">
<product>atutor:2.2.1</product>
</cve>
<cve id="CVE-2016-5335" level="LOW">
<product>identity_manger:2.0</product>
<product>identity_manger:2.1.0</product>
<product>identity_manger:2.1.1</product>
<product>identity_manger:2.4</product>
<product>identity_manger:2.6</product>
<product>vrealize_automation:7.0</product>
<product>vrealize_automation:7.0.1</product>
</cve>
<cve id="CVE-2016-5332" level="LOW">
<product>vrealize_log_insight:2.0</product>
<product>vrealize_log_insight:2.0.5</product>
<product>vrealize_log_insight:2.5</product>
<product>vrealize_log_insight:3.0</product>
<product>vrealize_log_insight:3.3</product>
</cve>
<cve id="CVE-2016-5331" level="MEDIUM">
<product>vcenter_server:6.0</product>
<product>esxi:6.0</product>
</cve>
<cve id="CVE-2016-4796" level="MEDIUM">
<product>openjpeg:2.1.0</product>
<product>fedora:23</product>
<product>fedora:24</product>
</cve>
<cve id="CVE-2016-4607" level="LOW">
<product>libxslt</product>
</cve>
<cve id="CVE-2016-4797" level="MEDIUM">
<product>openjpeg:2.1.0</product>
<product>fedora:23</product>
<product>fedora:24</product>
</cve>
<cve id="CVE-2016-4608" level="LOW">
<product>libxslt</product>
</cve>
<cve id="CVE-2016-4609" level="LOW">
<product>libxslt</product>
</cve>
<cve id="CVE-2016-1320" level="LOW">
<product>prime_collaboration:9.0.0</product>
<product>prime_collaboration:9.0.5</product>
<product>prime_collaboration:11.0.0</product>
</cve>
<cve id="CVE-2016-1321" level="LOW">
<product>universal_small_cell_firmware:r2.12_base</product>
<product>universal_small_cell_firmware:r2.13_base</product>
<product>universal_small_cell_firmware:r2.14_base</product>
<product>universal_small_cell_firmware:r2.15_base</product>
<product>universal_small_cell_firmware:r2.16_base</product>
<product>universal_small_cell_firmware:r2.17_base</product>
<product>universal_small_cell_firmware:r3.2_base</product>
<product>universal_small_cell_firmware:r3.3_base</product>
<product>universal_small_cell_firmware:r3.4_1.1</product>
<product>universal_small_cell_firmware:r3.4_2.1</product>
<product>universal_small_cell_firmware:r3.4_2.17</product>
<product>universal_small_cell_firmware:r3.4_base</product>
<product>universal_small_cell_firmware:r3.5_base</product>
</cve>
<cve id="CVE-2016-4790" level="MEDIUM">
<product>pulse_connect_secure:7.4</product>
<product>pulse_connect_secure:7.4r1.0</product>
<product>pulse_connect_secure:7.4r2.0</product>
<product>pulse_connect_secure:7.4r3.0</product>
<product>pulse_connect_secure:7.4r4.0</product>
<product>pulse_connect_secure:7.4r5.0</product>
<product>pulse_connect_secure:7.4r6.0</product>
<product>pulse_connect_secure:7.4r7.0</product>
<product>pulse_connect_secure:7.4r8.0</product>
<product>pulse_connect_secure:7.4r9.0</product>
<product>pulse_connect_secure:7.4r9.1</product>
<product>pulse_connect_secure:7.4r9.2</product>
<product>pulse_connect_secure:7.4r9.3</product>
<product>pulse_connect_secure:7.4r10.0</product>
<product>pulse_connect_secure:7.4r11.0</product>
<product>pulse_connect_secure:7.4r11.1</product>
<product>pulse_connect_secure:7.4r12.0</product>
<product>pulse_connect_secure:7.4r13.0</product>
<product>pulse_connect_secure:7.4r13.1</product>
<product>pulse_connect_secure:7.4r13.2</product>
<product>pulse_connect_secure:7.4r13.3</product>
<product>pulse_connect_secure:8.0</product>
<product>pulse_connect_secure:8.0r1.0</product>
<product>pulse_connect_secure:8.0r1.1</product>
<product>pulse_connect_secure:8.0r2.0</product>
<product>pulse_connect_secure:8.0r3.0</product>
<product>pulse_connect_secure:8.0r3.1</product>
<product>pulse_connect_secure:8.0r3.2</product>
<product>pulse_connect_secure:8.0r4.0</product>
<product>pulse_connect_secure:8.0r4.1</product>
<product>pulse_connect_secure:8.0r5.0</product>
<product>pulse_connect_secure:8.0r6.0</product>
<product>pulse_connect_secure:8.0r7.0</product>
<product>pulse_connect_secure:8.0r7.1</product>
<product>pulse_connect_secure:8.0r8.0</product>
<product>pulse_connect_secure:8.0r8.1</product>
<product>pulse_connect_secure:8.1</product>
<product>pulse_connect_secure:8.1r1.0</product>
<product>pulse_connect_secure:8.1r1.1</product>
<product>pulse_connect_secure:8.2</product>
</cve>
<cve id="CVE-2016-4791" level="LOW">
<product>pulse_connect_secure:7.4</product>
<product>pulse_connect_secure:7.4r1.0</product>
<product>pulse_connect_secure:7.4r2.0</product>
<product>pulse_connect_secure:7.4r3.0</product>
<product>pulse_connect_secure:7.4r4.0</product>
<product>pulse_connect_secure:7.4r5.0</product>
<product>pulse_connect_secure:7.4r6.0</product>
<product>pulse_connect_secure:7.4r7.0</product>
<product>pulse_connect_secure:7.4r8.0</product>
<product>pulse_connect_secure:7.4r9.0</product>
<product>pulse_connect_secure:7.4r9.1</product>
<product>pulse_connect_secure:7.4r9.2</product>
<product>pulse_connect_secure:7.4r9.3</product>
<product>pulse_connect_secure:7.4r10.0</product>
<product>pulse_connect_secure:7.4r11.0</product>
<product>pulse_connect_secure:7.4r11.1</product>
<product>pulse_connect_secure:7.4r12.0</product>
<product>pulse_connect_secure:7.4r13.0</product>
<product>pulse_connect_secure:7.4r13.1</product>
<product>pulse_connect_secure:7.4r13.2</product>
<product>pulse_connect_secure:7.4r13.3</product>
<product>pulse_connect_secure:8.0</product>
<product>pulse_connect_secure:8.0r1.0</product>
<product>pulse_connect_secure:8.0r1.1</product>
<product>pulse_connect_secure:8.0r2.0</product>
<product>pulse_connect_secure:8.0r3.0</product>
<product>pulse_connect_secure:8.0r3.1</product>
<product>pulse_connect_secure:8.0r3.2</product>
<product>pulse_connect_secure:8.0r4.0</product>
<product>pulse_connect_secure:8.0r4.1</product>
<product>pulse_connect_secure:8.0r5.0</product>
<product>pulse_connect_secure:8.0r6.0</product>
<product>pulse_connect_secure:8.0r7.0</product>
<product>pulse_connect_secure:8.0r7.1</product>
<product>pulse_connect_secure:8.0r8.0</product>
<product>pulse_connect_secure:8.0r8.1</product>
<product>pulse_connect_secure:8.1</product>
<product>pulse_connect_secure:8.1r1.0</product>
<product>pulse_connect_secure:8.1r1.1</product>
<product>pulse_connect_secure:8.2</product>
</cve>
<cve id="CVE-2016-0602" level="HIGH">
<product>vm_virtualbox:5.0.12</product>
</cve>
<cve id="CVE-2016-0603" level="HIGH">
<product>jdk:1.6.0</product>
<product>jdk:1.7.0</product>
<product>jdk:1.8.0</product>
<product>jdk:1.8.0</product>
<product>jre:1.6.0</product>
<product>jre:1.7.0</product>
<product>jre:1.8.0</product>
<product>jre:1.8.0</product>
</cve>
<cve id="CVE-2016-6033" level="MEDIUM">
<product>tivoli_storage_flashcopy_manager_for_vmware:4.1.0.0</product>
<product>tivoli_storage_flashcopy_manager_for_vmware:4.1.1</product>
<product>tivoli_storage_flashcopy_manager_for_vmware:4.1.2</product>
<product>tivoli_storage_flashcopy_manager_for_vmware:4.1.3</product>
<product>tivoli_storage_flashcopy_manager_for_vmware:4.1.4</product>
<product>tivoli_storage_flashcopy_manager_for_vmware:4.1.4.0</product>
<product>tivoli_storage_flashcopy_manager_for_vmware:4.1.4.1</product>
<product>tivoli_storage_flashcopy_manager_for_vmware:4.1.6</product>
<product>tivoli_storage_flashcopy_manager_for_vmware:4.1.6.0</product>
<product>your_sha256_hashfor_vmware:7.1.0</product>
<product>your_sha256_hashfor_vmware:7.1.1</product>
<product>your_sha256_hashfor_vmware:7.1.2</product>
<product>your_sha256_hashfor_vmware:7.1.3</product>
<product>your_sha256_hashfor_vmware:7.1.4</product>
<product>your_sha256_hashfor_vmware:7.1.4.0</product>
<product>your_sha256_hashfor_vmware:7.1.6</product>
<product>your_sha256_hashfor_vmware:7.1.6.2</product>
<product>your_sha256_hashfor_vmware:7.1.6.3</product>
</cve>
<cve id="CVE-2016-6032" level="MEDIUM">
<product>rational_collaborative_lifecycle_management:4.0.0</product>
<product>rational_collaborative_lifecycle_management:4.0.1</product>
<product>rational_collaborative_lifecycle_management:4.0.2</product>
<product>rational_collaborative_lifecycle_management:4.0.3</product>
<product>rational_collaborative_lifecycle_management:4.0.4</product>
<product>rational_collaborative_lifecycle_management:4.0.5</product>
<product>rational_collaborative_lifecycle_management:4.0.6</product>
<product>rational_collaborative_lifecycle_management:4.0.7</product>
<product>rational_collaborative_lifecycle_management:5.0.0</product>
<product>rational_collaborative_lifecycle_management:5.0.1</product>
<product>rational_collaborative_lifecycle_management:5.0.2</product>
<product>rational_collaborative_lifecycle_management:6.0.0</product>
<product>rational_collaborative_lifecycle_management:6.0.1</product>
<product>rational_collaborative_lifecycle_management:6.0.2</product>
<product>rational_collaborative_lifecycle_management:6.0.3</product>
</cve>
<cve id="CVE-2016-9085" level="LOW">
<product>libwebp:-</product>
<product>fedora:24</product>
<product>fedora:25</product>
</cve>
<cve id="CVE-2016-6035" level="MEDIUM">
<product>rational_quality_manager:4.0.0</product>
<product>rational_quality_manager:4.0.1</product>
<product>rational_quality_manager:4.0.2</product>
<product>rational_quality_manager:4.0.3</product>
<product>rational_quality_manager:4.0.4</product>
<product>rational_quality_manager:4.0.5</product>
<product>rational_quality_manager:4.0.6</product>
<product>rational_quality_manager:4.0.7</product>
<product>rational_quality_manager:5.0.0</product>
<product>rational_quality_manager:5.0.1</product>
<product>rational_quality_manager:5.0.2</product>
<product>rational_quality_manager:6.0.0</product>
<product>rational_quality_manager:6.0.1</product>
<product>rational_quality_manager:6.0.2</product>
<product>rational_team_concert:4.0.0</product>
<product>rational_team_concert:4.0.1</product>
<product>rational_team_concert:4.0.2</product>
<product>rational_team_concert:4.0.3</product>
<product>rational_team_concert:4.0.4</product>
<product>rational_team_concert:4.0.5</product>
<product>rational_team_concert:4.0.6</product>
<product>rational_team_concert:4.0.7</product>
<product>rational_team_concert:5.0.0</product>
<product>rational_team_concert:5.0.1</product>
<product>rational_team_concert:5.0.2</product>
<product>rational_team_concert:6.0.0</product>
<product>rational_team_concert:6.0.1</product>
<product>rational_team_concert:6.0.2</product>
<product>rational_team_concert:6.0.3</product>
</cve>
<cve id="CVE-2016-6034" level="LOW">
<product>your_sha256_hashfor_vmware:7.1.3</product>
<product>your_sha256_hashfor_vmware:7.1.4</product>
<product>your_sha256_hashfor_vmware:7.1.4.0</product>
<product>your_sha256_hashfor_vmware:7.1.6</product>
<product>your_sha256_hashfor_vmware:7.1.6.2</product>
<product>your_sha256_hashfor_vmware:7.1.6.3</product>
</cve>
<cve id="CVE-2016-9087" level="LOW">
<product>exponent_cms:2.3.9</product>
</cve>
<cve id="CVE-2016-10317" level="MEDIUM">
<product>ghostscript:9.20</product>
</cve>
<cve id="CVE-2016-10311" level="LOW">
<product>netweaver:7.0</product>
<product>netweaver:7.0</product>
<product>netweaver:7.0</product>
<product>netweaver:7.0</product>
<product>netweaver:7.3</product>
<product>netweaver:7.3</product>
<product>netweaver:7.4</product>
<product>netweaver:7.5</product>
</cve>
<cve id="CVE-2016-0240" level="MEDIUM">
<product>security_guardium_database_activity_monitor:8.2</product>
<product>security_guardium_database_activity_monitor:9.0</product>
<product>security_guardium_database_activity_monitor:9.1</product>
<product>security_guardium_database_activity_monitor:9.5</product>
<product>security_guardium_database_activity_monitor:10.0</product>
<product>security_guardium_database_activity_monitor:10.1</product>
</cve>
<cve id="CVE-2016-8763" level="MEDIUM">
<product>p8_lite_firmware:ale-l02c636b150</product>
<product>p9_firmware:-</product>
<product>p9_lite_firmware:vns-l21c185b130</product>
</cve>
<cve id="CVE-2016-8762" level="MEDIUM">
<product>p8_lite_firmware:ale-l02c636b150</product>
<product>p9_firmware:-</product>
<product>p9_lite_firmware:vns-l21c185b130</product>
</cve>
<cve id="CVE-2016-8761" level="MEDIUM">
<product>honor_6_firmware:-</product>
<product>p9_firmware:-</product>
<product>p9_plus_firmware:-</product>
</cve>
<cve id="CVE-2016-8760" level="MEDIUM">
<product>honor_6_firmware:-</product>
<product>p9_firmware:-</product>
<product>p9_plus_firmware:-</product>
</cve>
<cve id="CVE-2016-0518" level="LOW">
<product>e-business_suite:11.5.10.2</product>
</cve>
<cve id="CVE-2016-7239" level="HIGH">
<product>edge</product>
<product>internet_explorer:9</product>
<product>internet_explorer:10</product>
<product>internet_explorer:11</product>
</cve>
<cve id="CVE-2016-8764" level="MEDIUM">
<product>p8_lite_firmware:ale-l02c636b150</product>
<product>p9_firmware:-</product>
<product>p9_lite_firmware:vns-l21c185b130</product>
</cve>
<cve id="CVE-2016-0514" level="LOW">
<product>e-business_suite:11.5.10.2</product>
</cve>
<cve id="CVE-2016-0515" level="LOW">
<product>e-business_suite:11.5.10.2</product>
</cve>
<cve id="CVE-2016-8769" level="LOW">
<product>utps_firmware:v200r003b015d15sp00c983</product>
</cve>
<cve id="CVE-2016-8768" level="MEDIUM">
<product>honor_6_firmware:-</product>
<product>honor_6_plus_firmware:-</product>
<product>honor_7_firmware:-</product>
</cve>
<cve id="CVE-2016-0510" level="LOW">
<product>e-business_suite:11.5.10.2</product>
</cve>
<cve id="CVE-2016-0511" level="LOW">
<product>e-business_suite:11.5.10.2</product>
</cve>
<cve id="CVE-2016-0512" level="LOW">
<product>e-business_suite:11.5.10.2</product>
</cve>
<cve id="CVE-2016-0513" level="MEDIUM">
<product>e-business_suite:11.5.10.2</product>
</cve>
<cve id="CVE-2016-1179" level="MEDIUM">
<product>a-blog_cms:2.6.0.1</product>
</cve>
<cve id="CVE-2016-1178" level="LOW">
<product>a-blog_cms:2.6.0.1</product>
</cve>
<cve id="CVE-2016-9490" level="MEDIUM">
<product>applications_manager:12.0</product>
<product>applications_manager:13.0</product>
</cve>
<cve id="CVE-2016-9491" level="LOW">
<product>manageengine_applications_manager:12.0</product>
<product>manageengine_applications_manager:13.0</product>
</cve>
<cve id="CVE-2016-9496" level="LOW">
<product>dw7000_firmware:6.9.0.34</product>
<product>hn7000s_firmware:6.9.0.34</product>
<product>hn7000sm_firmware:6.9.0.34</product>
<product>hn7740s_firmware:6.9.0.34</product>
</cve>
<cve id="CVE-2016-9497" level="LOW">
<product>dw7000_firmware:6.9.0.34</product>
<product>hn7000s_firmware:6.9.0.34</product>
<product>hn7000sm_firmware:6.9.0.34</product>
<product>hn7740s_firmware:6.9.0.34</product>
</cve>
<cve id="CVE-2016-9494" level="LOW">
<product>dw7000_firmware:6.9.0.34</product>
<product>hn7000s_firmware:6.9.0.34</product>
<product>hn7000sm_firmware:6.9.0.34</product>
<product>hn7740s_firmware:6.9.0.34</product>
</cve>
<cve id="CVE-2016-9495" level="LOW">
<product>dw7000_firmware:6.9.0.34</product>
<product>hn7000s_firmware:6.9.0.34</product>
<product>hn7000sm_firmware:6.9.0.34</product>
<product>hn7740s_firmware:6.9.0.34</product>
</cve>
<cve id="CVE-2016-1171" level="MEDIUM">
<product>casebook_plugin:0.9.2</product>
</cve>
<cve id="CVE-2016-1170" level="MEDIUM">
<product>casebook_plugin:0.9.3</product>
</cve>
<cve id="CVE-2016-1173" level="MEDIUM">
<product>casebook_plugin:0.9.2</product>
</cve>
<cve id="CVE-2016-1172" level="MEDIUM">
<product>casebook_plugin:0.9.2</product>
</cve>
<cve id="CVE-2016-1175" level="MEDIUM">
<product>aquos_hn-pp150_firmware:1.02.00.04</product>
<product>aquos_hn-pp150_firmware:1.03.01.04</product>
</cve>
<cve id="CVE-2016-1174" level="MEDIUM">
<product>casebook_plugin:0.9.2</product>
</cve>
<cve id="CVE-2016-1177" level="MEDIUM">
<product>wisepoint:4.3.1</product>
<product>wisepoint_authenticator:4.1.19.22</product>
</cve>
<cve id="CVE-2016-1176" level="MEDIUM">
<product>eva_animator:-</product>
</cve>
<cve id="CVE-2016-3191" level="LOW">
<product>pcre:8.00</product>
<product>pcre:8.01</product>
<product>pcre:8.02</product>
<product>pcre:8.10</product>
<product>pcre:8.11</product>
<product>pcre:8.12</product>
<product>pcre:8.13</product>
<product>pcre:8.20</product>
<product>pcre:8.21</product>
<product>pcre:8.30</product>
<product>pcre:8.31</product>
<product>pcre:8.32</product>
<product>pcre:8.33</product>
<product>pcre:8.34</product>
<product>pcre:8.35</product>
<product>pcre:8.36</product>
<product>pcre:8.37</product>
<product>pcre:8.38</product>
<product>pcre2:10.21</product>
</cve>
<cve id="CVE-2016-1395" level="LOW">
<product>rv110w_wireless-n_vpn_firewall_firmware:1.1.0.9</product>
<product>rv110w_wireless-n_vpn_firewall_firmware:1.2.0.9</product>
<product>rv110w_wireless-n_vpn_firewall_firmware:1.2.0.10</product>
<product>rv110w_wireless-n_vpn_firewall_firmware:1.2.1.4</product>
<product>rv130w_wireless-n_multifunction_vpn_router_firmware:1.0.0.21</product>
<product>rv130w_wireless-n_multifunction_vpn_router_firmware:1.0.1.3</product>
<product>rv130w_wireless-n_multifunction_vpn_router_firmware:1.0.2.7</product>
<product>rv215w_wireless-n_vpn_router_firmware:1.1.0.5</product>
<product>rv215w_wireless-n_vpn_router_firmware:1.1.0.6</product>
<product>rv215w_wireless-n_vpn_router_firmware:1.2.0.14</product>
<product>rv215w_wireless-n_vpn_router_firmware:1.2.0.15</product>
<product>rv215w_wireless-n_vpn_router_firmware:1.3.0.7</product>
</cve>
<cve id="CVE-2016-1394" level="LOW">
<product>firesight_system_software:6.0.0</product>
<product>firesight_system_software:6.0.0.1</product>
<product>firesight_system_software:6.0.1</product>
<product>firesight_system_software:6.1.0</product>
</cve>
<cve id="CVE-2016-1397" level="LOW">
<product>rv110w_wireless-n_vpn_firewall_firmware:1.1.0.9</product>
<product>rv110w_wireless-n_vpn_firewall_firmware:1.2.0.9</product>
<product>rv110w_wireless-n_vpn_firewall_firmware:1.2.0.10</product>
<product>rv110w_wireless-n_vpn_firewall_firmware:1.2.1.4</product>
<product>rv130w_wireless-n_multifunction_vpn_router_firmware:1.0.0.21</product>
<product>rv130w_wireless-n_multifunction_vpn_router_firmware:1.0.1.3</product>
<product>rv130w_wireless-n_multifunction_vpn_router_firmware:1.0.2.7</product>
<product>rv215w_wireless-n_vpn_router_firmware:1.1.0.5</product>
<product>rv215w_wireless-n_vpn_router_firmware:1.1.0.6</product>
<product>rv215w_wireless-n_vpn_router_firmware:1.2.0.14</product>
<product>rv215w_wireless-n_vpn_router_firmware:1.2.0.15</product>
<product>rv215w_wireless-n_vpn_router_firmware:1.3.0.7</product>
</cve>
<cve id="CVE-2016-1396" level="MEDIUM">
<product>rv110w_wireless-n_vpn_firewall_firmware:1.1.0.9</product>
<product>rv110w_wireless-n_vpn_firewall_firmware:1.2.0.9</product>
<product>rv110w_wireless-n_vpn_firewall_firmware:1.2.0.10</product>
<product>rv110w_wireless-n_vpn_firewall_firmware:1.2.1.4</product>
<product>rv130w_wireless-n_multifunction_vpn_router_firmware:1.0.0.21</product>
<product>rv130w_wireless-n_multifunction_vpn_router_firmware:1.0.1.3</product>
<product>rv130w_wireless-n_multifunction_vpn_router_firmware:1.0.2.7</product>
<product>rv215w_wireless-n_vpn_router_firmware:1.1.0.5</product>
<product>rv215w_wireless-n_vpn_router_firmware:1.1.0.6</product>
<product>rv215w_wireless-n_vpn_router_firmware:1.2.0.14</product>
<product>rv215w_wireless-n_vpn_router_firmware:1.2.0.15</product>
<product>rv215w_wireless-n_vpn_router_firmware:1.3.0.7</product>
</cve>
<cve id="CVE-2016-1391" level="LOW">
<product>prime_network_analysis_module_software:5.0.0</product>
<product>prime_network_analysis_module_software:5.0.1</product>
<product>prime_network_analysis_module_software:5.0.2</product>
<product>prime_network_analysis_module_software:5.1.0</product>
<product>prime_network_analysis_module_software:5.1.2</product>
<product>prime_network_analysis_module_software:6.0.2</product>
<product>prime_network_analysis_module_software:6.1.0</product>
<product>prime_network_analysis_module_software:6.1.1</product>
<product>prime_network_analysis_module_software:6.2.0</product>
<product>prime_virtual_network_analysis_module_software:6.0.0</product>
<product>prime_virtual_network_analysis_module_software:6.1.0</product>
<product>prime_virtual_network_analysis_module_software:6.2.0</product>
<product>prime_virtual_network_analysis_module_software:6.2.1</product>
</cve>
<cve id="CVE-2016-1390" level="LOW">
<product>prime_network_analysis_module_software:5.0.0</product>
<product>prime_network_analysis_module_software:5.0.1</product>
<product>prime_network_analysis_module_software:5.0.2</product>
<product>prime_network_analysis_module_software:5.1.0</product>
<product>prime_network_analysis_module_software:5.1.2</product>
<product>prime_network_analysis_module_software:6.0.2</product>
<product>prime_network_analysis_module_software:6.1.0</product>
<product>prime_network_analysis_module_software:6.1.1</product>
<product>prime_network_analysis_module_software:6.2.0</product>
<product>prime_virtual_network_analysis_module_software:6.0.0</product>
<product>prime_virtual_network_analysis_module_software:6.1.0</product>
<product>prime_virtual_network_analysis_module_software:6.2.0</product>
</cve>
<cve id="CVE-2016-1393" level="LOW">
<product>cloud_network_automation_provisioner:1.0</product>
<product>cloud_network_automation_provisioner:1.1</product>
</cve>
<cve id="CVE-2016-1392" level="MEDIUM">
<product>prime_collaboration_assurance:10.5.0</product>
<product>prime_collaboration_assurance:10.5.1</product>
<product>prime_collaboration_assurance:10.6.0</product>
<product>prime_collaboration_assurance:11.0.0</product>
</cve>
<cve id="CVE-2016-1398" level="LOW">
<product>rv110w_firmware:1.1.0.9</product>
<product>rv110w_firmware:1.2.0.9</product>
<product>rv110w_firmware:1.2.0.10</product>
<product>rv110w_firmware:1.2.1.4</product>
<product>rv130w_firmware:1.0.0.21</product>
<product>rv130w_firmware:1.0.1.3</product>
<product>rv130w_firmware:1.0.2.7</product>
<product>rv215w_firmware:1.1.0.5</product>
<product>rv215w_firmware:1.1.0.6</product>
<product>rv215w_firmware:1.2.0.14</product>
<product>rv215w_firmware:1.2.0.15</product>
<product>rv215w_firmware:1.3.0.7</product>
</cve>
<cve id="CVE-2016-3190" level="LOW">
<product>cairo:1.12.16</product>
<product>opensuse:13.2</product>
</cve>
<cve id="CVE-2016-3407" level="MEDIUM">
<product>zimbra_collaboration_suite:8.6.0</product>
</cve>
<cve id="CVE-2016-9148" level="MEDIUM">
<product>service_desk_manager:12.9</product>
<product>service_desk_manager:14.1</product>
</cve>
<cve id="CVE-2016-9149" level="LOW">
<product>pan-os:5.0.19</product>
<product>pan-os:5.1.12</product>
<product>pan-os:6.0.14</product>
<product>pan-os:6.1.14</product>
<product>pan-os:7.0.10</product>
<product>pan-os:7.1.5</product>
</cve>
<cve id="CVE-2016-2855" level="LOW">
<product>mobile_broadband_hl_service:22.001.25.00.03</product>
</cve>
<cve id="CVE-2016-3195" level="MEDIUM">
<product>fortianalyzer_firmware:5.0.0</product>
<product>fortianalyzer_firmware:5.0.2</product>
<product>fortianalyzer_firmware:5.0.3</product>
<product>fortianalyzer_firmware:5.0.4</product>
<product>fortianalyzer_firmware:5.0.5</product>
<product>fortianalyzer_firmware:5.0.6</product>
<product>fortianalyzer_firmware:5.0.7</product>
<product>fortianalyzer_firmware:5.0.8</product>
<product>fortianalyzer_firmware:5.0.9</product>
<product>fortianalyzer_firmware:5.0.10</product>
<product>fortianalyzer_firmware:5.0.11</product>
<product>fortianalyzer_firmware:5.0.12</product>
<product>fortianalyzer_firmware:5.2.0</product>
<product>fortianalyzer_firmware:5.2.1</product>
<product>fortianalyzer_firmware:5.2.2</product>
<product>fortianalyzer_firmware:5.2.3</product>
<product>fortianalyzer_firmware:5.2.4</product>
<product>fortianalyzer_firmware:5.2.5</product>
<product>fortimanager_firmware:5.0.0</product>
<product>fortimanager_firmware:5.0.1</product>
<product>fortimanager_firmware:5.0.2</product>
<product>fortimanager_firmware:5.0.3</product>
<product>fortimanager_firmware:5.0.4</product>
<product>fortimanager_firmware:5.0.5</product>
<product>fortimanager_firmware:5.0.6</product>
<product>fortimanager_firmware:5.0.7</product>
<product>fortimanager_firmware:5.0.8</product>
<product>fortimanager_firmware:5.0.9</product>
<product>fortimanager_firmware:5.0.10</product>
<product>fortimanager_firmware:5.0.11</product>
<product>fortimanager_firmware:5.2.0</product>
<product>fortimanager_firmware:5.2.1</product>
<product>fortimanager_firmware:5.2.2</product>
<product>fortimanager_firmware:5.2.3</product>
<product>fortimanager_firmware:5.2.4</product>
<product>fortimanager_firmware:5.2.5</product>
</cve>
<cve id="CVE-2016-9638" level="LOW">
<product>patrol:9.13.10.01</product>
</cve>
<cve id="CVE-2016-2850" level="LOW">
<product>botan:1.11.0</product>
<product>botan:1.11.1</product>
<product>botan:1.11.2</product>
<product>botan:1.11.3</product>
<product>botan:1.11.4</product>
<product>botan:1.11.5</product>
<product>botan:1.11.6</product>
<product>botan:1.11.7</product>
<product>botan:1.11.8</product>
<product>botan:1.11.9</product>
<product>botan:1.11.10</product>
<product>botan:1.11.11</product>
<product>botan:1.11.12</product>
<product>botan:1.11.13</product>
<product>botan:1.11.14</product>
<product>botan:1.11.15</product>
<product>botan:1.11.16</product>
<product>botan:1.11.17</product>
<product>botan:1.11.18</product>
<product>botan:1.11.19</product>
<product>botan:1.11.20</product>
<product>botan:1.11.21</product>
<product>botan:1.11.22</product>
<product>botan:1.11.23</product>
<product>botan:1.11.24</product>
<product>botan:1.11.25</product>
<product>botan:1.11.26</product>
<product>botan:1.11.27</product>
<product>botan:1.11.28</product>
<product>fedora:24</product>
</cve>
<cve id="CVE-2016-9637" level="HIGH">
<product>xenserver:6.0.2</product>
<product>xenserver:6.2.0</product>
<product>xenserver:6.5</product>
<product>xenserver:7.0</product>
</cve>
<cve id="CVE-2016-9632" level="MEDIUM">
<product>w3m:0.5.3-32</product>
</cve>
<cve id="CVE-2016-9633" level="MEDIUM">
<product>w3m:0.5.3-32</product>
</cve>
<cve id="CVE-2016-9630" level="MEDIUM">
<product>w3m:0.5.3-32</product>
</cve>
<cve id="CVE-2016-9147" level="LOW">
<product>bind:9.9.9</product>
<product>bind:9.9.9</product>
<product>bind:9.10.4</product>
<product>bind:9.11.0</product>
</cve>
<cve id="CVE-2016-3406" level="MEDIUM">
<product>zimbra_collaboration_suite:8.6.0</product>
</cve>
<cve id="CVE-2016-6336" level="LOW">
<product>mediawiki:1.23.14</product>
<product>mediawiki:1.26.0</product>
<product>mediawiki:1.26.1</product>
<product>mediawiki:1.26.2</product>
<product>mediawiki:1.26.3</product>
<product>mediawiki:1.26.4</product>
<product>mediawiki:1.27.0</product>
</cve>
<cve id="CVE-2016-5497" level="MEDIUM">
<product>database:12.1.0.2</product>
</cve>
<cve id="CVE-2016-3194" level="MEDIUM">
<product>fortianalyzer_firmware:5.0.0</product>
<product>fortianalyzer_firmware:5.0.2</product>
<product>fortianalyzer_firmware:5.0.3</product>
<product>fortianalyzer_firmware:5.0.4</product>
<product>fortianalyzer_firmware:5.0.5</product>
<product>fortianalyzer_firmware:5.0.6</product>
<product>fortianalyzer_firmware:5.0.7</product>
<product>fortianalyzer_firmware:5.0.8</product>
<product>fortianalyzer_firmware:5.0.9</product>
<product>fortianalyzer_firmware:5.0.10</product>
<product>fortianalyzer_firmware:5.0.11</product>
<product>fortianalyzer_firmware:5.0.12</product>
<product>fortianalyzer_firmware:5.2.0</product>
<product>fortianalyzer_firmware:5.2.1</product>
<product>fortianalyzer_firmware:5.2.2</product>
<product>fortianalyzer_firmware:5.2.3</product>
<product>fortianalyzer_firmware:5.2.4</product>
<product>fortianalyzer_firmware:5.2.5</product>
<product>fortimanager_firmware:5.0.0</product>
<product>fortimanager_firmware:5.0.1</product>
<product>fortimanager_firmware:5.0.2</product>
<product>fortimanager_firmware:5.0.3</product>
<product>fortimanager_firmware:5.0.4</product>
<product>fortimanager_firmware:5.0.5</product>
<product>fortimanager_firmware:5.0.6</product>
<product>fortimanager_firmware:5.0.7</product>
<product>fortimanager_firmware:5.0.8</product>
<product>fortimanager_firmware:5.0.9</product>
<product>fortimanager_firmware:5.0.10</product>
<product>fortimanager_firmware:5.0.11</product>
<product>fortimanager_firmware:5.2.0</product>
<product>fortimanager_firmware:5.2.1</product>
<product>fortimanager_firmware:5.2.2</product>
<product>fortimanager_firmware:5.2.3</product>
<product>fortimanager_firmware:5.2.4</product>
<product>fortimanager_firmware:5.2.5</product>
</cve>
<cve id="CVE-2016-5495" level="LOW">
<product>discoverer:11.1.1.7.0</product>
</cve>
<cve id="CVE-2016-5492" level="LOW">
<product>sun_zfs_storage_appliance_kit:ak_2013</product>
</cve>
<cve id="CVE-2016-5493" level="MEDIUM">
<product>flexcube_private_banking:12.0.1</product>
<product>flexcube_private_banking:12.0.2</product>
<product>flexcube_private_banking:12.0.3</product>
</cve>
<cve id="CVE-2016-5490" level="LOW">
<product>flexcube_universal_banking:11.4.0</product>
</cve>
<cve id="CVE-2016-5491" level="MEDIUM">
<product>commerce_service_center:10.0.3.5</product>
<product>commerce_service_center:10.2.0.5</product>
</cve>
<cve id="CVE-2016-0249" level="LOW">
<product>security_guardium:8.2</product>
<product>security_guardium:9.0</product>
<product>security_guardium:9.1</product>
<product>security_guardium:9.5</product>
<product>security_guardium:10.0</product>
<product>security_guardium:10.0.1</product>
<product>security_guardium:10.1.0</product>
</cve>
<cve id="CVE-2016-3196" level="MEDIUM">
<product>fortianalyzer_firmware:5.0.0</product>
<product>fortianalyzer_firmware:5.0.1</product>
<product>fortianalyzer_firmware:5.0.4</product>
<product>fortianalyzer_firmware:5.0.5</product>
<product>fortianalyzer_firmware:5.0.10</product>
<product>fortianalyzer_firmware:5.2.0</product>
<product>fortianalyzer_firmware:5.2.1</product>
<product>fortianalyzer_firmware:5.2.2</product>
<product>fortianalyzer_firmware:5.2.3</product>
<product>fortianalyzer_firmware:5.2.4</product>
<product>fortianalyzer_firmware:5.2.5</product>
<product>fortimanager_firmware:5.0.3</product>
<product>fortimanager_firmware:5.0.4</product>
<product>fortimanager_firmware:5.0.5</product>
<product>fortimanager_firmware:5.0.6</product>
<product>fortimanager_firmware:5.0.7</product>
<product>fortimanager_firmware:5.0.8</product>
<product>fortimanager_firmware:5.0.9</product>
<product>fortimanager_firmware:5.0.10</product>
<product>fortimanager_firmware:5.2.0</product>
<product>fortimanager_firmware:5.2.1</product>
<product>fortimanager_firmware:5.2.2</product>
<product>fortimanager_firmware:5.2.3</product>
<product>fortimanager_firmware:5.2.4</product>
<product>fortimanager_firmware:5.2.5</product>
</cve>
<cve id="CVE-2016-3984" level="LOW">
<product>active_response:1.1.0.158</product>
<product>agent:5.0.2.285</product>
<product>data_exchange_layer:2.0.0.430.1</product>
<product>data_loss_prevention_endpoint:9.3.0</product>
<product>data_loss_prevention_endpoint:9.4.0</product>
<product>endpoint_security:10.0.1</product>
<product>host_intrusion_prevention:8.0.0</product>
<product>virusscan_enterprise:8.8.0</product>
</cve>
<cve id="CVE-2016-3403" level="MEDIUM">
<product>zimbra_collaboration_suite:8.6.0</product>
</cve>
<cve id="CVE-2016-3985" level="LOW">
<product>pulse_connect_secure:8.1r7</product>
<product>pulse_connect_secure:8.2r1</product>
</cve>
<cve id="CVE-2016-2141" level="LOW">
<product>jboss_enterprise_application_platform:5.2</product>
<product>jboss_enterprise_application_platform:6.4</product>
<product>jboss_enterprise_application_platform:7.0</product>
<product>jgroups:-</product>
</cve>
<cve id="CVE-2016-2140" level="MEDIUM">
<product>compute:12.0.0</product>
<product>compute:12.0.1</product>
<product>compute:12.0.2</product>
<product>compute:2015.1.3</product>
</cve>
<cve id="CVE-2016-2142" level="LOW">
<product>openshift:3.1</product>
</cve>
<cve id="CVE-2016-2145" level="LOW">
<product>mod_auth_mellon:0.11.0</product>
<product>fedora:23</product>
</cve>
<cve id="CVE-2016-2147" level="LOW">
<product>busybox:1.24.2</product>
</cve>
<cve id="CVE-2016-2146" level="LOW">
<product>mod_auth_mellon:0.11.0</product>
<product>fedora:23</product>
</cve>
<cve id="CVE-2016-2149" level="LOW">
<product>openshift:3.2</product>
</cve>
<cve id="CVE-2016-2148" level="LOW">
<product>busybox:1.24.2</product>
</cve>
<cve id="CVE-2016-3400" level="MEDIUM">
<product>data_ontap:8.1</product>
<product>data_ontap:8.2</product>
</cve>
<cve id="CVE-2016-6330" level="LOW">
<product>jboss_operations_network:3.0</product>
<product>jboss_operations_network:3.0.1</product>
<product>jboss_operations_network:3.1</product>
<product>jboss_operations_network:3.1.1</product>
<product>jboss_operations_network:3.1.2</product>
<product>jboss_operations_network:3.1.4</product>
<product>jboss_operations_network:3.2.0</product>
<product>jboss_operations_network:3.2.1</product>
<product>jboss_operations_network:3.2.2</product>
<product>jboss_operations_network:3.2.3</product>
<product>jboss_operations_network:3.3.1</product>
<product>jboss_operations_network:3.3.2</product>
<product>jboss_operations_network:3.3.3</product>
<product>jboss_operations_network:3.3.4</product>
<product>jboss_operations_network:3.3.5</product>
<product>jboss_operations_network:3.3.6</product>
</cve>
<cve id="CVE-2016-3438" level="LOW">
<product>configurator:12.1</product>
<product>configurator:12.2</product>
</cve>
<cve id="CVE-2016-3439" level="MEDIUM">
<product>crm_technical_foundation:12.1.3</product>
</cve>
<cve id="CVE-2016-3432" level="MEDIUM">
<product>business_intelligence_publisher:11.1.1.7.0</product>
<product>business_intelligence_publisher:11.1.1.9.0</product>
</cve>
<cve id="CVE-2016-3433" level="MEDIUM">
<product>business_intelligence:11.1.1.7.0</product>
<product>business_intelligence:11.1.1.9.0</product>
</cve>
<cve id="CVE-2016-3431" level="HIGH">
<product>agile_product_lifecycle_management_framework:9.3.1.1</product>
<product>agile_product_lifecycle_management_framework:9.3.1.2</product>
<product>agile_product_lifecycle_management_framework:9.3.2</product>
<product>agile_product_lifecycle_management_framework:9.3.3</product>
</cve>
<cve id="CVE-2016-3436" level="MEDIUM">
<product>common_applications_calendar:12.1.1</product>
<product>common_applications_calendar:12.1.2</product>
<product>common_applications_calendar:12.1.3</product>
</cve>
<cve id="CVE-2016-6917" level="LOW">
<product>video_driver:-</product>
<product>shield_tablet_firmware:4.3.0</product>
<product>shield_tablet_tk1_firmware:1.4.0</product>
<product>shield_tv_firmware:3.2</product>
</cve>
<cve id="CVE-2016-6914" level="LOW">
<product>unifi_video:2.1.3</product>
<product>unifi_video:3.0.1</product>
</cve>
<cve id="CVE-2016-3435" level="MEDIUM">
<product>peoplesoft_enterprise_peopletools:8.53</product>
<product>peoplesoft_enterprise_peopletools:8.54</product>
<product>peoplesoft_enterprise_peopletools:8.55</product>
</cve>
<cve id="CVE-2016-6331" level="LOW">
<product>mediawiki:1.23.14</product>
<product>mediawiki:1.26.0</product>
<product>mediawiki:1.26.1</product>
<product>mediawiki:1.26.2</product>
<product>mediawiki:1.26.3</product>
<product>mediawiki:1.26.4</product>
<product>mediawiki:1.27.0</product>
</cve>
<cve id="CVE-2016-7537" level="MEDIUM">
<product>imagemagick:-</product>
</cve>
<cve id="CVE-2016-7536" level="MEDIUM">
<product>imagemagick:-</product>
</cve>
<cve id="CVE-2016-7535" level="MEDIUM">
<product>imagemagick:-</product>
</cve>
<cve id="CVE-2016-7534" level="MEDIUM">
<product>imagemagick:-</product>
</cve>
<cve id="CVE-2016-7533" level="MEDIUM">
<product>imagemagick:-</product>
</cve>
<cve id="CVE-2016-7532" level="MEDIUM">
<product>imagemagick:-</product>
</cve>
<cve id="CVE-2016-7531" level="MEDIUM">
<product>imagemagick:-</product>
</cve>
<cve id="CVE-2016-7530" level="MEDIUM">
<product>imagemagick:-</product>
</cve>
<cve id="CVE-2016-7539" level="LOW">
<product>imagemagick:6.9.9-3</product>
</cve>
<cve id="CVE-2016-7538" level="MEDIUM">
<product>imagemagick:-</product>
</cve>
<cve id="CVE-2016-6624" level="MEDIUM">
<product>phpmyadmin:4.0.0</product>
<product>phpmyadmin:4.0.1</product>
<product>phpmyadmin:4.0.2</product>
<product>phpmyadmin:4.0.3</product>
<product>phpmyadmin:4.0.4</product>
<product>phpmyadmin:4.0.4.1</product>
<product>phpmyadmin:4.0.4.2</product>
<product>phpmyadmin:4.0.5</product>
<product>phpmyadmin:4.0.6</product>
<product>phpmyadmin:4.0.7</product>
<product>phpmyadmin:4.0.8</product>
<product>phpmyadmin:4.0.9</product>
<product>phpmyadmin:4.0.10</product>
<product>phpmyadmin:4.0.10.1</product>
<product>phpmyadmin:4.0.10.2</product>
<product>phpmyadmin:4.0.10.3</product>
<product>phpmyadmin:4.0.10.4</product>
<product>phpmyadmin:4.0.10.5</product>
<product>phpmyadmin:4.0.10.6</product>
<product>phpmyadmin:4.0.10.7</product>
<product>phpmyadmin:4.0.10.8</product>
<product>phpmyadmin:4.0.10.9</product>
<product>phpmyadmin:4.0.10.10</product>
<product>phpmyadmin:4.0.10.11</product>
<product>phpmyadmin:4.0.10.12</product>
<product>phpmyadmin:4.0.10.13</product>
<product>phpmyadmin:4.0.10.14</product>
<product>phpmyadmin:4.0.10.15</product>
<product>phpmyadmin:4.0.10.16</product>
<product>phpmyadmin:4.4.0</product>
<product>phpmyadmin:4.4.1</product>
<product>phpmyadmin:4.4.1.1</product>
<product>phpmyadmin:4.4.2</product>
<product>phpmyadmin:4.4.3</product>
<product>phpmyadmin:4.4.4</product>
<product>phpmyadmin:4.4.5</product>
<product>phpmyadmin:4.4.6</product>
<product>phpmyadmin:4.4.6.1</product>
<product>phpmyadmin:4.4.7</product>
<product>phpmyadmin:4.4.8</product>
<product>phpmyadmin:4.4.9</product>
<product>phpmyadmin:4.4.10</product>
<product>phpmyadmin:4.4.11</product>
<product>phpmyadmin:4.4.12</product>
<product>phpmyadmin:4.4.13</product>
<product>phpmyadmin:4.4.13.1</product>
<product>phpmyadmin:4.4.14</product>
<product>phpmyadmin:4.4.14.1</product>
<product>phpmyadmin:4.4.15</product>
<product>phpmyadmin:4.4.15.1</product>
<product>phpmyadmin:4.4.15.2</product>
<product>phpmyadmin:4.4.15.3</product>
<product>phpmyadmin:4.4.15.4</product>
<product>phpmyadmin:4.4.15.5</product>
<product>phpmyadmin:4.4.15.6</product>
<product>phpmyadmin:4.4.15.7</product>
<product>phpmyadmin:4.6.0</product>
<product>phpmyadmin:4.6.1</product>
<product>phpmyadmin:4.6.2</product>
<product>phpmyadmin:4.6.3</product>
</cve>
<cve id="CVE-2016-6625" level="LOW">
<product>phpmyadmin:4.0.0</product>
<product>phpmyadmin:4.0.1</product>
<product>phpmyadmin:4.0.2</product>
<product>phpmyadmin:4.0.3</product>
<product>phpmyadmin:4.0.4</product>
<product>phpmyadmin:4.0.4.1</product>
<product>phpmyadmin:4.0.4.2</product>
<product>phpmyadmin:4.0.5</product>
<product>phpmyadmin:4.0.6</product>
<product>phpmyadmin:4.0.7</product>
<product>phpmyadmin:4.0.8</product>
<product>phpmyadmin:4.0.9</product>
<product>phpmyadmin:4.0.10</product>
<product>phpmyadmin:4.0.10.1</product>
<product>phpmyadmin:4.0.10.2</product>
<product>phpmyadmin:4.0.10.3</product>
<product>phpmyadmin:4.0.10.4</product>
<product>phpmyadmin:4.0.10.5</product>
<product>phpmyadmin:4.0.10.6</product>
<product>phpmyadmin:4.0.10.7</product>
<product>phpmyadmin:4.0.10.8</product>
<product>phpmyadmin:4.0.10.9</product>
<product>phpmyadmin:4.0.10.10</product>
<product>phpmyadmin:4.0.10.11</product>
<product>phpmyadmin:4.0.10.12</product>
<product>phpmyadmin:4.0.10.13</product>
<product>phpmyadmin:4.0.10.14</product>
<product>phpmyadmin:4.0.10.15</product>
<product>phpmyadmin:4.0.10.16</product>
<product>phpmyadmin:4.4.0</product>
<product>phpmyadmin:4.4.1</product>
<product>phpmyadmin:4.4.1.1</product>
<product>phpmyadmin:4.4.2</product>
<product>phpmyadmin:4.4.3</product>
<product>phpmyadmin:4.4.4</product>
<product>phpmyadmin:4.4.5</product>
<product>phpmyadmin:4.4.6</product>
<product>phpmyadmin:4.4.6.1</product>
<product>phpmyadmin:4.4.7</product>
<product>phpmyadmin:4.4.8</product>
<product>phpmyadmin:4.4.9</product>
<product>phpmyadmin:4.4.10</product>
<product>phpmyadmin:4.4.11</product>
<product>phpmyadmin:4.4.12</product>
<product>phpmyadmin:4.4.13</product>
<product>phpmyadmin:4.4.13.1</product>
<product>phpmyadmin:4.4.14</product>
<product>phpmyadmin:4.4.14.1</product>
<product>phpmyadmin:4.4.15</product>
<product>phpmyadmin:4.4.15.1</product>
<product>phpmyadmin:4.4.15.2</product>
<product>phpmyadmin:4.4.15.3</product>
<product>phpmyadmin:4.4.15.4</product>
<product>phpmyadmin:4.4.15.5</product>
<product>phpmyadmin:4.4.15.6</product>
<product>phpmyadmin:4.4.15.7</product>
<product>phpmyadmin:4.6.0</product>
<product>phpmyadmin:4.6.1</product>
<product>phpmyadmin:4.6.2</product>
<product>phpmyadmin:4.6.3</product>
</cve>
<cve id="CVE-2016-6626" level="MEDIUM">
<product>phpmyadmin:4.0.0</product>
<product>phpmyadmin:4.0.1</product>
<product>phpmyadmin:4.0.2</product>
<product>phpmyadmin:4.0.3</product>
<product>phpmyadmin:4.0.4</product>
<product>phpmyadmin:4.0.4.1</product>
<product>phpmyadmin:4.0.4.2</product>
<product>phpmyadmin:4.0.5</product>
<product>phpmyadmin:4.0.6</product>
<product>phpmyadmin:4.0.7</product>
<product>phpmyadmin:4.0.8</product>
<product>phpmyadmin:4.0.9</product>
<product>phpmyadmin:4.0.10</product>
<product>phpmyadmin:4.0.10.1</product>
<product>phpmyadmin:4.0.10.2</product>
<product>phpmyadmin:4.0.10.3</product>
<product>phpmyadmin:4.0.10.4</product>
<product>phpmyadmin:4.0.10.5</product>
<product>phpmyadmin:4.0.10.6</product>
<product>phpmyadmin:4.0.10.7</product>
<product>phpmyadmin:4.0.10.8</product>
<product>phpmyadmin:4.0.10.9</product>
<product>phpmyadmin:4.0.10.10</product>
<product>phpmyadmin:4.0.10.11</product>
<product>phpmyadmin:4.0.10.12</product>
<product>phpmyadmin:4.0.10.13</product>
<product>phpmyadmin:4.0.10.14</product>
<product>phpmyadmin:4.0.10.15</product>
<product>phpmyadmin:4.0.10.16</product>
<product>phpmyadmin:4.4.0</product>
<product>phpmyadmin:4.4.1</product>
<product>phpmyadmin:4.4.1.1</product>
<product>phpmyadmin:4.4.2</product>
<product>phpmyadmin:4.4.3</product>
<product>phpmyadmin:4.4.4</product>
<product>phpmyadmin:4.4.5</product>
<product>phpmyadmin:4.4.6</product>
<product>phpmyadmin:4.4.6.1</product>
<product>phpmyadmin:4.4.7</product>
<product>phpmyadmin:4.4.8</product>
<product>phpmyadmin:4.4.9</product>
<product>phpmyadmin:4.4.10</product>
<product>phpmyadmin:4.4.11</product>
<product>phpmyadmin:4.4.12</product>
<product>phpmyadmin:4.4.13</product>
<product>phpmyadmin:4.4.13.1</product>
<product>phpmyadmin:4.4.14</product>
<product>phpmyadmin:4.4.14.1</product>
<product>phpmyadmin:4.4.15</product>
<product>phpmyadmin:4.4.15.1</product>
<product>phpmyadmin:4.4.15.2</product>
<product>phpmyadmin:4.4.15.3</product>
<product>phpmyadmin:4.4.15.4</product>
<product>phpmyadmin:4.4.15.5</product>
<product>phpmyadmin:4.4.15.6</product>
<product>phpmyadmin:4.4.15.7</product>
<product>phpmyadmin:4.6.0</product>
<product>phpmyadmin:4.6.1</product>
<product>phpmyadmin:4.6.2</product>
<product>phpmyadmin:4.6.3</product>
</cve>
<cve id="CVE-2016-6627" level="LOW">
<product>phpmyadmin:4.0.0</product>
<product>phpmyadmin:4.0.1</product>
<product>phpmyadmin:4.0.2</product>
<product>phpmyadmin:4.0.3</product>
<product>phpmyadmin:4.0.4</product>
<product>phpmyadmin:4.0.4.1</product>
<product>phpmyadmin:4.0.4.2</product>
<product>phpmyadmin:4.0.5</product>
<product>phpmyadmin:4.0.6</product>
<product>phpmyadmin:4.0.7</product>
<product>phpmyadmin:4.0.8</product>
<product>phpmyadmin:4.0.9</product>
<product>phpmyadmin:4.0.10</product>
<product>phpmyadmin:4.0.10.1</product>
<product>phpmyadmin:4.0.10.2</product>
<product>phpmyadmin:4.0.10.3</product>
<product>phpmyadmin:4.0.10.4</product>
<product>phpmyadmin:4.0.10.5</product>
<product>phpmyadmin:4.0.10.6</product>
<product>phpmyadmin:4.0.10.7</product>
<product>phpmyadmin:4.0.10.8</product>
<product>phpmyadmin:4.0.10.9</product>
<product>phpmyadmin:4.0.10.10</product>
<product>phpmyadmin:4.0.10.11</product>
<product>phpmyadmin:4.0.10.12</product>
<product>phpmyadmin:4.0.10.13</product>
<product>phpmyadmin:4.0.10.14</product>
<product>phpmyadmin:4.0.10.15</product>
<product>phpmyadmin:4.0.10.16</product>
<product>phpmyadmin:4.4.0</product>
<product>phpmyadmin:4.4.1</product>
<product>phpmyadmin:4.4.1.1</product>
<product>phpmyadmin:4.4.2</product>
<product>phpmyadmin:4.4.3</product>
<product>phpmyadmin:4.4.4</product>
<product>phpmyadmin:4.4.5</product>
<product>phpmyadmin:4.4.6</product>
<product>phpmyadmin:4.4.6.1</product>
<product>phpmyadmin:4.4.7</product>
<product>phpmyadmin:4.4.8</product>
<product>phpmyadmin:4.4.9</product>
<product>phpmyadmin:4.4.10</product>
<product>phpmyadmin:4.4.11</product>
<product>phpmyadmin:4.4.12</product>
<product>phpmyadmin:4.4.13</product>
<product>phpmyadmin:4.4.13.1</product>
<product>phpmyadmin:4.4.14</product>
<product>phpmyadmin:4.4.14.1</product>
<product>phpmyadmin:4.4.15</product>
<product>phpmyadmin:4.4.15.1</product>
<product>phpmyadmin:4.4.15.2</product>
<product>phpmyadmin:4.4.15.3</product>
<product>phpmyadmin:4.4.15.4</product>
<product>phpmyadmin:4.4.15.5</product>
<product>phpmyadmin:4.4.15.6</product>
<product>phpmyadmin:4.4.15.7</product>
<product>phpmyadmin:4.6.0</product>
<product>phpmyadmin:4.6.1</product>
<product>phpmyadmin:4.6.2</product>
<product>phpmyadmin:4.6.3</product>
</cve>
<cve id="CVE-2016-6620" level="LOW">
<product>phpmyadmin:4.0.0</product>
<product>phpmyadmin:4.0.1</product>
<product>phpmyadmin:4.0.2</product>
<product>phpmyadmin:4.0.3</product>
<product>phpmyadmin:4.0.4</product>
<product>phpmyadmin:4.0.4.1</product>
<product>phpmyadmin:4.0.4.2</product>
<product>phpmyadmin:4.0.5</product>
<product>phpmyadmin:4.0.6</product>
<product>phpmyadmin:4.0.7</product>
<product>phpmyadmin:4.0.8</product>
<product>phpmyadmin:4.0.9</product>
<product>phpmyadmin:4.0.10</product>
<product>phpmyadmin:4.0.10.1</product>
<product>phpmyadmin:4.0.10.2</product>
<product>phpmyadmin:4.0.10.3</product>
<product>phpmyadmin:4.0.10.4</product>
<product>phpmyadmin:4.0.10.5</product>
<product>phpmyadmin:4.0.10.6</product>
<product>phpmyadmin:4.0.10.7</product>
<product>phpmyadmin:4.0.10.8</product>
<product>phpmyadmin:4.0.10.9</product>
<product>phpmyadmin:4.0.10.10</product>
<product>phpmyadmin:4.0.10.11</product>
<product>phpmyadmin:4.0.10.12</product>
<product>phpmyadmin:4.0.10.13</product>
<product>phpmyadmin:4.0.10.14</product>
<product>phpmyadmin:4.0.10.15</product>
<product>phpmyadmin:4.0.10.16</product>
<product>phpmyadmin:4.4.0</product>
<product>phpmyadmin:4.4.1</product>
<product>phpmyadmin:4.4.1.1</product>
<product>phpmyadmin:4.4.2</product>
<product>phpmyadmin:4.4.3</product>
<product>phpmyadmin:4.4.4</product>
<product>phpmyadmin:4.4.5</product>
<product>phpmyadmin:4.4.6</product>
<product>phpmyadmin:4.4.6.1</product>
<product>phpmyadmin:4.4.7</product>
<product>phpmyadmin:4.4.8</product>
<product>phpmyadmin:4.4.9</product>
<product>phpmyadmin:4.4.10</product>
<product>phpmyadmin:4.4.11</product>
<product>phpmyadmin:4.4.12</product>
<product>phpmyadmin:4.4.13</product>
<product>phpmyadmin:4.4.13.1</product>
<product>phpmyadmin:4.4.14</product>
<product>phpmyadmin:4.4.14.1</product>
<product>phpmyadmin:4.4.15</product>
<product>phpmyadmin:4.4.15.1</product>
<product>phpmyadmin:4.4.15.2</product>
<product>phpmyadmin:4.4.15.3</product>
<product>phpmyadmin:4.4.15.4</product>
<product>phpmyadmin:4.4.15.5</product>
<product>phpmyadmin:4.4.15.6</product>
<product>phpmyadmin:4.4.15.7</product>
<product>phpmyadmin:4.6.0</product>
<product>phpmyadmin:4.6.1</product>
<product>phpmyadmin:4.6.2</product>
<product>phpmyadmin:4.6.3</product>
</cve>
<cve id="CVE-2016-6621" level="LOW">
<product>phpmyadmin:4.0.10.18</product>
<product>phpmyadmin:4.4.0</product>
<product>phpmyadmin:4.4.1</product>
<product>phpmyadmin:4.4.1.1</product>
<product>phpmyadmin:4.4.2</product>
<product>phpmyadmin:4.4.3</product>
<product>phpmyadmin:4.4.4</product>
<product>phpmyadmin:4.4.5</product>
<product>phpmyadmin:4.4.6</product>
<product>phpmyadmin:4.4.6.1</product>
<product>phpmyadmin:4.4.7</product>
<product>phpmyadmin:4.4.8</product>
<product>phpmyadmin:4.4.9</product>
<product>phpmyadmin:4.4.10</product>
<product>phpmyadmin:4.4.11</product>
<product>phpmyadmin:4.4.12</product>
<product>phpmyadmin:4.4.13</product>
<product>phpmyadmin:4.4.13.1</product>
<product>phpmyadmin:4.4.14.1</product>
<product>phpmyadmin:4.4.15</product>
<product>phpmyadmin:4.4.15.1</product>
<product>phpmyadmin:4.4.15.2</product>
<product>phpmyadmin:4.4.15.3</product>
<product>phpmyadmin:4.4.15.4</product>
<product>phpmyadmin:4.4.15.5</product>
<product>phpmyadmin:4.4.15.6</product>
<product>phpmyadmin:4.4.15.8</product>
<product>phpmyadmin:4.4.15.9</product>
<product>phpmyadmin:4.6.0</product>
<product>phpmyadmin:4.6.0</product>
<product>phpmyadmin:4.6.0</product>
<product>phpmyadmin:4.6.0</product>
<product>phpmyadmin:4.6.1</product>
<product>phpmyadmin:4.6.2</product>
<product>phpmyadmin:4.6.4</product>
<product>phpmyadmin:4.6.5</product>
</cve>
<cve id="CVE-2016-6622" level="MEDIUM">
<product>phpmyadmin:4.0.0</product>
<product>phpmyadmin:4.0.1</product>
<product>phpmyadmin:4.0.2</product>
<product>phpmyadmin:4.0.3</product>
<product>phpmyadmin:4.0.4</product>
<product>phpmyadmin:4.0.4.1</product>
<product>phpmyadmin:4.0.4.2</product>
<product>phpmyadmin:4.0.5</product>
<product>phpmyadmin:4.0.6</product>
<product>phpmyadmin:4.0.7</product>
<product>phpmyadmin:4.0.8</product>
<product>phpmyadmin:4.0.9</product>
<product>phpmyadmin:4.0.10</product>
<product>phpmyadmin:4.0.10.1</product>
<product>phpmyadmin:4.0.10.2</product>
<product>phpmyadmin:4.0.10.3</product>
<product>phpmyadmin:4.0.10.4</product>
<product>phpmyadmin:4.0.10.5</product>
<product>phpmyadmin:4.0.10.6</product>
<product>phpmyadmin:4.0.10.7</product>
<product>phpmyadmin:4.0.10.8</product>
<product>phpmyadmin:4.0.10.9</product>
<product>phpmyadmin:4.0.10.10</product>
<product>phpmyadmin:4.0.10.11</product>
<product>phpmyadmin:4.0.10.12</product>
<product>phpmyadmin:4.0.10.13</product>
<product>phpmyadmin:4.0.10.14</product>
<product>phpmyadmin:4.0.10.15</product>
<product>phpmyadmin:4.0.10.16</product>
<product>phpmyadmin:4.4.0</product>
<product>phpmyadmin:4.4.1</product>
<product>phpmyadmin:4.4.1.1</product>
<product>phpmyadmin:4.4.2</product>
<product>phpmyadmin:4.4.3</product>
<product>phpmyadmin:4.4.4</product>
<product>phpmyadmin:4.4.5</product>
<product>phpmyadmin:4.4.6</product>
<product>phpmyadmin:4.4.6.1</product>
<product>phpmyadmin:4.4.7</product>
<product>phpmyadmin:4.4.8</product>
<product>phpmyadmin:4.4.9</product>
<product>phpmyadmin:4.4.10</product>
<product>phpmyadmin:4.4.11</product>
<product>phpmyadmin:4.4.12</product>
<product>phpmyadmin:4.4.13</product>
<product>phpmyadmin:4.4.13.1</product>
<product>phpmyadmin:4.4.14</product>
<product>phpmyadmin:4.4.14.1</product>
<product>phpmyadmin:4.4.15</product>
<product>phpmyadmin:4.4.15.1</product>
<product>phpmyadmin:4.4.15.2</product>
<product>phpmyadmin:4.4.15.3</product>
<product>phpmyadmin:4.4.15.4</product>
<product>phpmyadmin:4.4.15.5</product>
<product>phpmyadmin:4.4.15.6</product>
<product>phpmyadmin:4.4.15.7</product>
<product>phpmyadmin:4.6.0</product>
<product>phpmyadmin:4.6.1</product>
<product>phpmyadmin:4.6.2</product>
<product>phpmyadmin:4.6.3</product>
</cve>
<cve id="CVE-2016-6623" level="LOW">
<product>phpmyadmin:4.0.0</product>
<product>phpmyadmin:4.0.1</product>
<product>phpmyadmin:4.0.2</product>
<product>phpmyadmin:4.0.3</product>
<product>phpmyadmin:4.0.4</product>
<product>phpmyadmin:4.0.4.1</product>
<product>phpmyadmin:4.0.4.2</product>
<product>phpmyadmin:4.0.5</product>
<product>phpmyadmin:4.0.6</product>
<product>phpmyadmin:4.0.7</product>
<product>phpmyadmin:4.0.8</product>
<product>phpmyadmin:4.0.9</product>
<product>phpmyadmin:4.0.10</product>
<product>phpmyadmin:4.0.10.1</product>
<product>phpmyadmin:4.0.10.2</product>
<product>phpmyadmin:4.0.10.3</product>
<product>phpmyadmin:4.0.10.4</product>
<product>phpmyadmin:4.0.10.5</product>
<product>phpmyadmin:4.0.10.6</product>
<product>phpmyadmin:4.0.10.7</product>
<product>phpmyadmin:4.0.10.8</product>
<product>phpmyadmin:4.0.10.9</product>
<product>phpmyadmin:4.0.10.10</product>
<product>phpmyadmin:4.0.10.11</product>
<product>phpmyadmin:4.0.10.12</product>
<product>phpmyadmin:4.0.10.13</product>
<product>phpmyadmin:4.0.10.14</product>
<product>phpmyadmin:4.0.10.15</product>
<product>phpmyadmin:4.0.10.16</product>
<product>phpmyadmin:4.4.0</product>
<product>phpmyadmin:4.4.1</product>
<product>phpmyadmin:4.4.1.1</product>
<product>phpmyadmin:4.4.2</product>
<product>phpmyadmin:4.4.3</product>
<product>phpmyadmin:4.4.4</product>
<product>phpmyadmin:4.4.5</product>
<product>phpmyadmin:4.4.6</product>
<product>phpmyadmin:4.4.6.1</product>
<product>phpmyadmin:4.4.7</product>
<product>phpmyadmin:4.4.8</product>
<product>phpmyadmin:4.4.9</product>
<product>phpmyadmin:4.4.10</product>
<product>phpmyadmin:4.4.11</product>
<product>phpmyadmin:4.4.12</product>
<product>phpmyadmin:4.4.13</product>
<product>phpmyadmin:4.4.13.1</product>
<product>phpmyadmin:4.4.14</product>
<product>phpmyadmin:4.4.14.1</product>
<product>phpmyadmin:4.4.15</product>
<product>phpmyadmin:4.4.15.1</product>
<product>phpmyadmin:4.4.15.2</product>
<product>phpmyadmin:4.4.15.3</product>
<product>phpmyadmin:4.4.15.4</product>
<product>phpmyadmin:4.4.15.5</product>
<product>phpmyadmin:4.4.15.6</product>
<product>phpmyadmin:4.4.15.7</product>
<product>phpmyadmin:4.6.0</product>
<product>phpmyadmin:4.6.1</product>
<product>phpmyadmin:4.6.2</product>
<product>phpmyadmin:4.6.3</product>
</cve>
<cve id="CVE-2016-6628" level="MEDIUM">
<product>phpmyadmin:4.0.0</product>
<product>phpmyadmin:4.0.1</product>
<product>phpmyadmin:4.0.2</product>
<product>phpmyadmin:4.0.3</product>
<product>phpmyadmin:4.0.4</product>
<product>phpmyadmin:4.0.4.1</product>
<product>phpmyadmin:4.0.4.2</product>
<product>phpmyadmin:4.0.5</product>
<product>phpmyadmin:4.0.6</product>
<product>phpmyadmin:4.0.7</product>
<product>phpmyadmin:4.0.8</product>
<product>phpmyadmin:4.0.9</product>
<product>phpmyadmin:4.0.10</product>
<product>phpmyadmin:4.0.10.1</product>
<product>phpmyadmin:4.0.10.2</product>
<product>phpmyadmin:4.0.10.3</product>
<product>phpmyadmin:4.0.10.4</product>
<product>phpmyadmin:4.0.10.5</product>
<product>phpmyadmin:4.0.10.6</product>
<product>phpmyadmin:4.0.10.7</product>
<product>phpmyadmin:4.0.10.8</product>
<product>phpmyadmin:4.0.10.9</product>
<product>phpmyadmin:4.0.10.10</product>
<product>phpmyadmin:4.0.10.11</product>
<product>phpmyadmin:4.0.10.12</product>
<product>phpmyadmin:4.0.10.13</product>
<product>phpmyadmin:4.0.10.14</product>
<product>phpmyadmin:4.0.10.15</product>
<product>phpmyadmin:4.0.10.16</product>
<product>phpmyadmin:4.4.0</product>
<product>phpmyadmin:4.4.1</product>
<product>phpmyadmin:4.4.1.1</product>
<product>phpmyadmin:4.4.2</product>
<product>phpmyadmin:4.4.3</product>
<product>phpmyadmin:4.4.4</product>
<product>phpmyadmin:4.4.5</product>
<product>phpmyadmin:4.4.6</product>
<product>phpmyadmin:4.4.6.1</product>
<product>phpmyadmin:4.4.7</product>
<product>phpmyadmin:4.4.8</product>
<product>phpmyadmin:4.4.9</product>
<product>phpmyadmin:4.4.10</product>
<product>phpmyadmin:4.4.11</product>
<product>phpmyadmin:4.4.12</product>
<product>phpmyadmin:4.4.13</product>
<product>phpmyadmin:4.4.13.1</product>
<product>phpmyadmin:4.4.14</product>
<product>phpmyadmin:4.4.14.1</product>
<product>phpmyadmin:4.4.15</product>
<product>phpmyadmin:4.4.15.1</product>
<product>phpmyadmin:4.4.15.2</product>
<product>phpmyadmin:4.4.15.3</product>
<product>phpmyadmin:4.4.15.4</product>
<product>phpmyadmin:4.4.15.5</product>
<product>phpmyadmin:4.4.15.6</product>
<product>phpmyadmin:4.4.15.7</product>
<product>phpmyadmin:4.6.0</product>
<product>phpmyadmin:4.6.1</product>
<product>phpmyadmin:4.6.2</product>
<product>phpmyadmin:4.6.3</product>
</cve>
<cve id="CVE-2016-6629" level="LOW">
<product>phpmyadmin:4.0.0</product>
<product>phpmyadmin:4.0.1</product>
<product>phpmyadmin:4.0.2</product>
<product>phpmyadmin:4.0.3</product>
<product>phpmyadmin:4.0.4</product>
<product>phpmyadmin:4.0.4.1</product>
<product>phpmyadmin:4.0.4.2</product>
<product>phpmyadmin:4.0.5</product>
<product>phpmyadmin:4.0.6</product>
<product>phpmyadmin:4.0.7</product>
<product>phpmyadmin:4.0.8</product>
<product>phpmyadmin:4.0.9</product>
<product>phpmyadmin:4.0.10</product>
<product>phpmyadmin:4.0.10.1</product>
<product>phpmyadmin:4.0.10.2</product>
<product>phpmyadmin:4.0.10.3</product>
<product>phpmyadmin:4.0.10.4</product>
<product>phpmyadmin:4.0.10.5</product>
<product>phpmyadmin:4.0.10.6</product>
<product>phpmyadmin:4.0.10.7</product>
<product>phpmyadmin:4.0.10.8</product>
<product>phpmyadmin:4.0.10.9</product>
<product>phpmyadmin:4.0.10.10</product>
<product>phpmyadmin:4.0.10.11</product>
<product>phpmyadmin:4.0.10.12</product>
<product>phpmyadmin:4.0.10.13</product>
<product>phpmyadmin:4.0.10.14</product>
<product>phpmyadmin:4.0.10.15</product>
<product>phpmyadmin:4.0.10.16</product>
<product>phpmyadmin:4.4.0</product>
<product>phpmyadmin:4.4.1</product>
<product>phpmyadmin:4.4.1.1</product>
<product>phpmyadmin:4.4.2</product>
<product>phpmyadmin:4.4.3</product>
<product>phpmyadmin:4.4.4</product>
<product>phpmyadmin:4.4.5</product>
<product>phpmyadmin:4.4.6</product>
<product>phpmyadmin:4.4.6.1</product>
<product>phpmyadmin:4.4.7</product>
<product>phpmyadmin:4.4.8</product>
<product>phpmyadmin:4.4.9</product>
<product>phpmyadmin:4.4.10</product>
<product>phpmyadmin:4.4.11</product>
<product>phpmyadmin:4.4.12</product>
<product>phpmyadmin:4.4.13</product>
<product>phpmyadmin:4.4.13.1</product>
<product>phpmyadmin:4.4.14</product>
<product>phpmyadmin:4.4.14.1</product>
<product>phpmyadmin:4.4.15</product>
<product>phpmyadmin:4.4.15.1</product>
<product>phpmyadmin:4.4.15.2</product>
<product>phpmyadmin:4.4.15.3</product>
<product>phpmyadmin:4.4.15.4</product>
<product>phpmyadmin:4.4.15.5</product>
<product>phpmyadmin:4.4.15.6</product>
<product>phpmyadmin:4.4.15.7</product>
<product>phpmyadmin:4.6.0</product>
<product>phpmyadmin:4.6.1</product>
<product>phpmyadmin:4.6.2</product>
<product>phpmyadmin:4.6.3</product>
</cve>
<cve id="CVE-2016-3165" level="LOW">
<product>drupal:6.0</product>
<product>drupal:6.0</product>
<product>drupal:6.0</product>
<product>drupal:6.0</product>
<product>drupal:6.0</product>
<product>drupal:6.0</product>
<product>drupal:6.0</product>
<product>drupal:6.0</product>
<product>drupal:6.0</product>
<product>drupal:6.0</product>
<product>drupal:6.1</product>
<product>drupal:6.2</product>
<product>drupal:6.3</product>
<product>drupal:6.4</product>
<product>drupal:6.5</product>
<product>drupal:6.6</product>
<product>drupal:6.7</product>
<product>drupal:6.8</product>
<product>drupal:6.9</product>
<product>drupal:6.10</product>
<product>drupal:6.11</product>
<product>drupal:6.12</product>
<product>drupal:6.13</product>
<product>drupal:6.14</product>
<product>drupal:6.15</product>
<product>drupal:6.16</product>
<product>drupal:6.17</product>
<product>drupal:6.18</product>
<product>drupal:6.19</product>
<product>drupal:6.20</product>
<product>drupal:6.21</product>
<product>drupal:6.22</product>
<product>drupal:6.23</product>
<product>drupal:6.24</product>
<product>drupal:6.25</product>
<product>drupal:6.26</product>
<product>drupal:6.27</product>
<product>drupal:6.28</product>
<product>drupal:6.29</product>
<product>drupal:6.30</product>
<product>drupal:6.31</product>
<product>drupal:6.32</product>
<product>drupal:6.33</product>
<product>drupal:6.34</product>
<product>drupal:6.35</product>
<product>drupal:6.36</product>
<product>drupal:6.37</product>
</cve>
<cve id="CVE-2016-1559" level="HIGH">
<product>dap-1353_h%2fw_b1_firmware:3.15</product>
<product>dap-2553_h%2fw_a1_firmware:1.31</product>
<product>dap-3520_h%2fw_a1_firmware:1.16</product>
</cve>
<cve id="CVE-2016-3161" level="LOW">
<product>geforce_experience:-</product>
</cve>
<cve id="CVE-2016-0164" level="HIGH">
<product>internet_explorer:10</product>
<product>internet_explorer:11</product>
</cve>
<cve id="CVE-2016-7399" level="LOW">
<product>netbackup_appliance_firmware:2.6.0.0</product>
<product>netbackup_appliance_firmware:2.6.0.1</product>
<product>netbackup_appliance_firmware:2.6.0.2</product>
<product>netbackup_appliance_firmware:2.6.0.3</product>
<product>netbackup_appliance_firmware:2.6.0.4</product>
<product>netbackup_appliance_firmware:2.6.1.0</product>
<product>netbackup_appliance_firmware:2.6.1.1</product>
<product>netbackup_appliance_firmware:2.6.1.2</product>
<product>netbackup_appliance_firmware:2.7.0.0</product>
<product>netbackup_appliance_firmware:2.7.1.0</product>
<product>netbackup_appliance_firmware:2.7.2.0</product>
<product>netbackup_appliance_firmware:3.0.0.0</product>
</cve>
<cve id="CVE-2016-0166" level="HIGH">
<product>internet_explorer:11</product>
</cve>
<cve id="CVE-2016-0161" level="MEDIUM">
<product>edge:-</product>
</cve>
<cve id="CVE-2016-0160" level="LOW">
<product>internet_explorer:11</product>
</cve>
<cve id="CVE-2016-0162" level="MEDIUM">
<product>internet_explorer:9</product>
<product>internet_explorer:10</product>
<product>internet_explorer:11</product>
</cve>
<cve id="CVE-2016-7393" level="MEDIUM">
<product>libav:11.4</product>
</cve>
<cve id="CVE-2016-7392" level="MEDIUM">
<product>autotrace:0.31.1</product>
</cve>
<cve id="CVE-2016-7391" level="LOW">
<product>gpu_driver:341.98</product>
<product>gpu_driver:373.06</product>
</cve>
<cve id="CVE-2016-7390" level="LOW">
<product>gpu_driver:341.98</product>
<product>gpu_driver:373.06</product>
</cve>
<cve id="CVE-2016-7397" level="LOW">
<product>unified_threat_management_software:9.405-5</product>
</cve>
<cve id="CVE-2016-7394" level="MEDIUM">
<product>tikiwiki_cms%2fgroupware:15.2</product>
</cve>
<cve id="CVE-2016-1557" level="LOW">
<product>wnap320_firmware:3.0.5.0</product>
<product>wndap350_firmware:3.0.5.0</product>
<product>wndap360_firmware:3.0.5.0</product>
</cve>
<cve id="CVE-2016-1556" level="LOW">
<product>wn604_firmware:3.3.2</product>
<product>wnap320_firmware:3.0.5.0</product>
<product>wnd930_firmware:2.0.4</product>
<product>wndap210v2_firmware:3.0.5.0</product>
<product>wndap350_firmware:3.0.5.0</product>
<product>wndap360_firmware:3.0.5.0</product>
</cve>
<cve id="CVE-2016-4846" level="MEDIUM">
<product>phishwall_client:3.7.8.1</product>
</cve>
<cve id="CVE-2016-4847" level="MEDIUM">
<product>web_ui:0.8</product>
</cve>
<cve id="CVE-2016-4844" level="MEDIUM">
<product>mailwise:5.0.0</product>
<product>mailwise:5.0.1</product>
<product>mailwise:5.0.4</product>
<product>mailwise:5.0.5</product>
<product>mailwise:5.0.6</product>
<product>mailwise:5.1.0</product>
<product>mailwise:5.1.1</product>
<product>mailwise:5.1.2</product>
<product>mailwise:5.1.4</product>
<product>mailwise:5.2.0</product>
<product>mailwise:5.2.1</product>
<product>mailwise:5.3.0</product>
<product>mailwise:5.3.1</product>
<product>mailwise:5.3.2</product>
</cve>
<cve id="CVE-2016-4845" level="MEDIUM">
<product>hvl-a2.0_firmware:2.03</product>
<product>hvl-a3.0_firmware:2.03</product>
<product>hvl-a4.0_firmware:2.03</product>
<product>hvl-at1.0s_firmware:2.03</product>
<product>hvl-at2.0_firmware:2.03</product>
<product>hvl-at2.0a_firmware:2.03</product>
<product>hvl-at3.0_firmware:2.03</product>
<product>hvl-at3.0a_firmware:2.03</product>
<product>hvl-at4.0_firmware:2.03</product>
<product>hvl-at4.0a_firmware:2.03</product>
</cve>
<cve id="CVE-2016-4842" level="MEDIUM">
<product>mailwise:5.0.0</product>
<product>mailwise:5.0.1</product>
<product>mailwise:5.0.4</product>
<product>mailwise:5.0.5</product>
<product>mailwise:5.0.6</product>
<product>mailwise:5.1.0</product>
<product>mailwise:5.1.1</product>
<product>mailwise:5.1.2</product>
<product>mailwise:5.1.4</product>
<product>mailwise:5.2.0</product>
<product>mailwise:5.2.1</product>
<product>mailwise:5.3.0</product>
<product>mailwise:5.3.1</product>
<product>mailwise:5.3.2</product>
</cve>
<cve id="CVE-2016-4075" level="MEDIUM">
<product>opera_browser:36.00</product>
<product>opera_mini:13.00</product>
</cve>
<cve id="CVE-2016-4840" level="MEDIUM">
<product>coordinate_plus:1.0.2</product>
<product>coordinate_plus:1.0.2</product>
</cve>
<cve id="CVE-2016-4841" level="MEDIUM">
<product>mailwise:5.0.0</product>
<product>mailwise:5.0.1</product>
<product>mailwise:5.0.4</product>
<product>mailwise:5.0.5</product>
<product>mailwise:5.0.6</product>
<product>mailwise:5.1.0</product>
<product>mailwise:5.1.1</product>
<product>mailwise:5.1.2</product>
<product>mailwise:5.1.4</product>
<product>mailwise:5.2.0</product>
<product>mailwise:5.2.1</product>
<product>mailwise:5.3.0</product>
<product>mailwise:5.3.1</product>
<product>mailwise:5.3.2</product>
</cve>
<cve id="CVE-2016-4848" level="MEDIUM">
<product>clipbucket:2.8.1</product>
</cve>
<cve id="CVE-2016-4849" level="MEDIUM">
<product>geeklog:2.1.1</product>
</cve>
<cve id="CVE-2016-0701" level="HIGH">
<product>openssl:1.0.2</product>
<product>openssl:1.0.2</product>
<product>openssl:1.0.2</product>
<product>openssl:1.0.2</product>
<product>openssl:1.0.2a</product>
<product>openssl:1.0.2b</product>
<product>openssl:1.0.2c</product>
<product>openssl:1.0.2d</product>
<product>openssl:1.0.2e</product>
</cve>
<cve id="CVE-2016-0703" level="MEDIUM">
<product>openssl:0.9.8ze</product>
<product>openssl:1.0.0</product>
<product>openssl:1.0.0</product>
<product>openssl:1.0.0</product>
<product>openssl:1.0.0</product>
<product>openssl:1.0.0</product>
<product>openssl:1.0.0</product>
<product>openssl:1.0.0a</product>
<product>openssl:1.0.0b</product>
<product>openssl:1.0.0c</product>
<product>openssl:1.0.0d</product>
<product>openssl:1.0.0e</product>
<product>openssl:1.0.0f</product>
<product>openssl:1.0.0g</product>
<product>openssl:1.0.0h</product>
<product>openssl:1.0.0i</product>
<product>openssl:1.0.0j</product>
<product>openssl:1.0.0k</product>
<product>openssl:1.0.0l</product>
<product>openssl:1.0.0m</product>
<product>openssl:1.0.0n</product>
<product>openssl:1.0.0o</product>
<product>openssl:1.0.0p</product>
<product>openssl:1.0.0q</product>
<product>openssl:1.0.1</product>
<product>openssl:1.0.1</product>
<product>openssl:1.0.1</product>
<product>openssl:1.0.1</product>
<product>openssl:1.0.1a</product>
<product>openssl:1.0.1b</product>
<product>openssl:1.0.1c</product>
<product>openssl:1.0.1d</product>
<product>openssl:1.0.1e</product>
<product>openssl:1.0.1f</product>
<product>openssl:1.0.1g</product>
<product>openssl:1.0.1h</product>
<product>openssl:1.0.1i</product>
<product>openssl:1.0.1j</product>
<product>openssl:1.0.1k</product>
<product>openssl:1.0.1l</product>
<product>openssl:1.0.2</product>
<product>openssl:1.0.2</product>
<product>openssl:1.0.2</product>
<product>openssl:1.0.2</product>
</cve>
<cve id="CVE-2016-0702" level="MEDIUM">
<product>openssl:1.0.1</product>
<product>openssl:1.0.1</product>
<product>openssl:1.0.1</product>
<product>openssl:1.0.1</product>
<product>openssl:1.0.1a</product>
<product>openssl:1.0.1b</product>
<product>openssl:1.0.1c</product>
<product>openssl:1.0.1d</product>
<product>openssl:1.0.1e</product>
<product>openssl:1.0.1f</product>
<product>openssl:1.0.1g</product>
<product>openssl:1.0.1h</product>
<product>openssl:1.0.1i</product>
<product>openssl:1.0.1j</product>
<product>openssl:1.0.1k</product>
<product>openssl:1.0.1l</product>
<product>openssl:1.0.1m</product>
<product>openssl:1.0.1n</product>
<product>openssl:1.0.1o</product>
<product>openssl:1.0.1p</product>
<product>openssl:1.0.1q</product>
<product>openssl:1.0.1r</product>
<product>openssl:1.0.2</product>
<product>openssl:1.0.2</product>
<product>openssl:1.0.2</product>
<product>openssl:1.0.2</product>
<product>openssl:1.0.2a</product>
<product>openssl:1.0.2b</product>
<product>openssl:1.0.2c</product>
<product>openssl:1.0.2d</product>
<product>openssl:1.0.2e</product>
<product>openssl:1.0.2f</product>
</cve>
<cve id="CVE-2016-0704" level="MEDIUM">
<product>openssl:0.9.8ze</product>
<product>openssl:1.0.0</product>
<product>openssl:1.0.0</product>
<product>openssl:1.0.0</product>
<product>openssl:1.0.0</product>
<product>openssl:1.0.0</product>
<product>openssl:1.0.0</product>
<product>openssl:1.0.0a</product>
<product>openssl:1.0.0b</product>
<product>openssl:1.0.0c</product>
<product>openssl:1.0.0d</product>
<product>openssl:1.0.0e</product>
<product>openssl:1.0.0f</product>
<product>openssl:1.0.0g</product>
<product>openssl:1.0.0h</product>
<product>openssl:1.0.0i</product>
<product>openssl:1.0.0j</product>
<product>openssl:1.0.0k</product>
<product>openssl:1.0.0l</product>
<product>openssl:1.0.0m</product>
<product>openssl:1.0.0n</product>
<product>openssl:1.0.0o</product>
<product>openssl:1.0.0p</product>
<product>openssl:1.0.0q</product>
<product>openssl:1.0.1</product>
<product>openssl:1.0.1</product>
<product>openssl:1.0.1</product>
<product>openssl:1.0.1</product>
<product>openssl:1.0.1a</product>
<product>openssl:1.0.1b</product>
<product>openssl:1.0.1c</product>
<product>openssl:1.0.1d</product>
<product>openssl:1.0.1e</product>
<product>openssl:1.0.1f</product>
<product>openssl:1.0.1g</product>
<product>openssl:1.0.1h</product>
<product>openssl:1.0.1i</product>
<product>openssl:1.0.1j</product>
<product>openssl:1.0.1k</product>
<product>openssl:1.0.1l</product>
<product>openssl:1.0.2</product>
<product>openssl:1.0.2</product>
<product>openssl:1.0.2</product>
<product>openssl:1.0.2</product>
</cve>
<cve id="CVE-2016-0707" level="LOW">
<product>ambari:2.1.1</product>
</cve>
<cve id="CVE-2016-0709" level="LOW">
<product>jetspeed:2.3.0</product>
</cve>
<cve id="CVE-2016-0708" level="MEDIUM">
<product>cf-release:166</product>
<product>cf-release:167</product>
<product>cf-release:168</product>
<product>cf-release:169</product>
<product>cf-release:170</product>
<product>cf-release:171</product>
<product>cf-release:172</product>
<product>cf-release:173</product>
<product>cf-release:174</product>
<product>cf-release:175</product>
<product>cf-release:176</product>
<product>cf-release:177</product>
<product>cf-release:178</product>
<product>cf-release:179</product>
<product>cf-release:180</product>
<product>cf-release:181</product>
<product>cf-release:182</product>
<product>cf-release:183</product>
<product>cf-release:184</product>
<product>cf-release:185</product>
<product>cf-release:186</product>
<product>cf-release:187</product>
<product>cf-release:188</product>
<product>cf-release:189</product>
<product>cf-release:190</product>
<product>cf-release:191</product>
<product>cf-release:192</product>
<product>cf-release:193</product>
<product>cf-release:194</product>
<product>cf-release:195</product>
<product>cf-release:196</product>
<product>cf-release:197</product>
<product>cf-release:198</product>
<product>cf-release:199</product>
<product>cf-release:200</product>
<product>cf-release:201</product>
<product>cf-release:202</product>
<product>cf-release:203</product>
<product>cf-release:204</product>
<product>cf-release:205</product>
<product>cf-release:206</product>
<product>cf-release:207</product>
<product>cf-release:208</product>
<product>cf-release:209</product>
<product>cf-release:210</product>
<product>cf-release:211</product>
<product>cf-release:212</product>
<product>cf-release:213</product>
<product>cf-release:214</product>
<product>cf-release:215</product>
<product>cf-release:216</product>
<product>cf-release:217</product>
<product>cf-release:218</product>
<product>cf-release:219</product>
<product>cf-release:220</product>
<product>cf-release:221</product>
<product>cf-release:222</product>
<product>cf-release:223</product>
<product>cf-release:224</product>
<product>cf-release:225</product>
<product>cf-release:226</product>
<product>cf-release:227</product>
</cve>
<cve id="CVE-2016-9823" level="MEDIUM">
<product>libav:11.8</product>
</cve>
<cve id="CVE-2016-9822" level="MEDIUM">
<product>libav:11.8</product>
</cve>
<cve id="CVE-2016-9821" level="MEDIUM">
<product>libav:11.8</product>
</cve>
<cve id="CVE-2016-9820" level="MEDIUM">
<product>libav:11.8</product>
</cve>
<cve id="CVE-2016-9827" level="MEDIUM">
<product>libming:0.4.7</product>
</cve>
<cve id="CVE-2016-9826" level="MEDIUM">
<product>libav:11.8</product>
</cve>
<cve id="CVE-2016-9825" level="MEDIUM">
<product>libav:11.8</product>
</cve>
<cve id="CVE-2016-9824" level="MEDIUM">
<product>libav:11.8</product>
</cve>
<cve id="CVE-2016-9829" level="MEDIUM">
<product>libming:0.4.7</product>
</cve>
<cve id="CVE-2016-9828" level="MEDIUM">
<product>libming:0.4.7</product>
</cve>
<cve id="CVE-2016-10112" level="MEDIUM">
<product>woocommerce:2.6.8</product>
</cve>
<cve id="CVE-2016-10114" level="LOW">
<product>aweb_cart_watching_system_for_virtuemart:2.6.0</product>
</cve>
<cve id="CVE-2016-10115" level="LOW">
<product>arlo_base_station_firmware:1.7.5_6178</product>
<product>arlo_q_camera_firmware:1.8.0_5551</product>
<product>arlo_q_plus_camera_firmware:1.8.1_6094</product>
</cve>
<cve id="CVE-2016-10116" level="MEDIUM">
<product>arlo_base_station_firmware:1.7.5_6178</product>
<product>arlo_q_camera_firmware:1.8.0_5551</product>
<product>arlo_q_plus_camera_firmware:1.8.1_6094</product>
</cve>
<cve id="CVE-2016-10117" level="LOW">
<product>firejail:-</product>
</cve>
<cve id="CVE-2016-10118" level="LOW">
<product>firejail:-</product>
</cve>
<cve id="CVE-2016-10119" level="LOW">
<product>firejail:-</product>
</cve>
<cve id="CVE-2016-10378" level="LOW">
<product>e107:2.1.1</product>
</cve>
<cve id="CVE-2016-10379" level="LOW">
<product>virtuemart:3.0.14</product>
</cve>
<cve id="CVE-2016-9703" level="LOW">
<product>security_identity_manager_virtual_appliance:7.0.0.0</product>
<product>security_identity_manager_virtual_appliance:7.0.0.1</product>
<product>security_identity_manager_virtual_appliance:7.0.0.2</product>
<product>security_identity_manager_virtual_appliance:7.0.0.3</product>
<product>security_identity_manager_virtual_appliance:7.0.1.0</product>
<product>security_identity_manager_virtual_appliance:7.0.1.1</product>
<product>security_identity_manager_virtual_appliance:7.0.1.2</product>
<product>security_identity_manager_virtual_appliance:7.0.1.3</product>
<product>security_identity_manager_virtual_appliance:7.0.1.4</product>
</cve>
<cve id="CVE-2016-10374" level="LOW">
<product>perltidy:20160302</product>
</cve>
<cve id="CVE-2016-10375" level="LOW">
<product>yodl:3.06.00</product>
</cve>
<cve id="CVE-2016-10376" level="MEDIUM">
<product>gajim:0.16.7</product>
</cve>
<cve id="CVE-2016-10377" level="LOW">
<product>openvswitch:2.5.0</product>
</cve>
<cve id="CVE-2016-10370" level="LOW">
<product>oxygenos</product>
</cve>
<cve id="CVE-2016-10371" level="MEDIUM">
<product>libtiff:4.0.6</product>
</cve>
<cve id="CVE-2016-10372" level="LOW">
<product>d1000_modem_firmware:-</product>
</cve>
<cve id="CVE-2016-5398" level="MEDIUM">
<product>jboss_bpm_suite:6.3.2</product>
</cve>
<cve id="CVE-2016-5827" level="LOW">
<product>libical:0.47</product>
<product>libical:1.0</product>
</cve>
<cve id="CVE-2016-5390" level="HIGH">
<product>foreman:1.11.3</product>
<product>foreman:1.12.0</product>
</cve>
<cve id="CVE-2016-5393" level="LOW">
<product>hadoop:2.6.0</product>
<product>hadoop:2.6.1</product>
<product>hadoop:2.6.2</product>
<product>hadoop:2.6.3</product>
<product>hadoop:2.6.4</product>
<product>hadoop:2.7.0</product>
<product>hadoop:2.7.1</product>
<product>hadoop:2.7.2</product>
</cve>
<cve id="CVE-2016-5392" level="LOW">
<product>openshift:3.2</product>
</cve>
<cve id="CVE-2016-5395" level="MEDIUM">
<product>ranger:0.5.0</product>
<product>ranger:0.5.1</product>
<product>ranger:0.5.2</product>
<product>ranger:0.5.3</product>
<product>ranger:0.6.0</product>
</cve>
<cve id="CVE-2016-5394" level="MEDIUM">
<product>sling:1.0.11</product>
</cve>
<cve id="CVE-2016-5397" level="LOW">
<product>thrift:0.9.3</product>
</cve>
<cve id="CVE-2016-5396" level="LOW">
<product>traffic_server:6.0.0</product>
<product>traffic_server:6.1.0</product>
<product>traffic_server:6.1.1</product>
<product>traffic_server:6.2.0</product>
</cve>
<cve id="CVE-2016-9034" level="MEDIUM">
<product>smartos:20161110t013148z</product>
</cve>
<cve id="CVE-2016-9031" level="MEDIUM">
<product>smartos:20161110t013148z</product>
</cve>
<cve id="CVE-2016-9032" level="MEDIUM">
<product>smartos:20161110t013148z</product>
</cve>
<cve id="CVE-2016-9033" level="MEDIUM">
<product>smartos:20161110t013148z</product>
</cve>
<cve id="CVE-2016-5539" level="LOW">
<product>micros_xstore_payment:1.0</product>
</cve>
<cve id="CVE-2016-5538" level="LOW">
<product>vm_virtualbox:5.0.27</product>
<product>vm_virtualbox:5.1.7</product>
</cve>
<cve id="CVE-2016-5534" level="LOW">
<product>siebel_user_interface_framework:16.1</product>
</cve>
<cve id="CVE-2016-5537" level="LOW">
<product>netbeans:8.1</product>
</cve>
<cve id="CVE-2016-5536" level="LOW">
<product>platform_security_for_java:12.1.3.0.0</product>
<product>platform_security_for_java:12.2.1.0.0</product>
<product>platform_security_for_java:12.2.1.1.0</product>
</cve>
<cve id="CVE-2016-5530" level="MEDIUM">
<product>peoplesoft_enterprise_peopletools:8.54</product>
<product>peoplesoft_enterprise_peopletools:8.55</product>
</cve>
<cve id="CVE-2016-1000338" level="LOW">
<product>legion-of-the-bouncy-castle-java-crytography-api:1.55</product>
</cve>
<cve id="CVE-2016-5532" level="LOW">
<product>shipping_execution:12.1.1</product>
<product>shipping_execution:12.1.2</product>
<product>shipping_execution:12.1.3</product>
<product>shipping_execution:12.2.3</product>
<product>shipping_execution:12.2.4</product>
<product>shipping_execution:12.2.5</product>
<product>shipping_execution:12.2.6</product>
</cve>
<cve id="CVE-2016-3295" level="HIGH">
<product>edge:-</product>
<product>internet_explorer:10</product>
<product>internet_explorer:11</product>
</cve>
<cve id="CVE-2016-8307" level="LOW">
<product>flexcube_universal_banking:11.3.0</product>
<product>flexcube_universal_banking:11.4.0</product>
<product>flexcube_universal_banking:12.0.1</product>
<product>flexcube_universal_banking:12.0.2</product>
<product>flexcube_universal_banking:12.0.3</product>
<product>flexcube_universal_banking:12.1.0</product>
<product>flexcube_universal_banking:12.2.0</product>
</cve>
<cve id="CVE-2016-6059" level="LOW">
<product>infosphere_datastage:11.3</product>
<product>infosphere_datastage:11.3.1</product>
<product>infosphere_datastage:11.5</product>
<product>infosphere_information_server:11.3</product>
<product>infosphere_information_server:11.3.1</product>
<product>infosphere_information_server:11.5</product>
<product>infosphere_information_server_on_cloud:11.5</product>
</cve>
<cve id="CVE-2016-0954" level="LOW">
<product>digital_editions:4.5.0</product>
</cve>
<cve id="CVE-2016-0955" level="MEDIUM">
<product>experience_manager:6.1.0</product>
</cve>
<cve id="CVE-2016-0956" level="LOW">
<product>experience_manager:5.6.1</product>
<product>experience_manager:6.0.0</product>
<product>experience_manager:6.1.0</product>
<product>sling</product>
</cve>
<cve id="CVE-2016-0957" level="LOW">
<product>dispatcher:4.1.4</product>
<product>experience_manager:5.6.1</product>
<product>experience_manager:6.0.0</product>
<product>experience_manager:6.1.0</product>
</cve>
<cve id="CVE-2016-0950" level="LOW">
<product>connect:9.5.2</product>
</cve>
<cve id="CVE-2016-0951" level="LOW">
<product>bridge_cc:6.1</product>
<product>photoshop_cc:16.1.1</product>
</cve>
<cve id="CVE-2016-0952" level="LOW">
<product>bridge_cc:6.1</product>
<product>photoshop_cc:16.1.1</product>
</cve>
<cve id="CVE-2016-0953" level="LOW">
<product>bridge_cc:6.1</product>
<product>photoshop_cc:16.1.1</product>
</cve>
<cve id="CVE-2016-0958" level="LOW">
<product>experience_manager:5.6.1</product>
<product>experience_manager:6.0.0</product>
<product>experience_manager:6.1.0</product>
</cve>
<cve id="CVE-2016-0105" level="HIGH">
<product>edge</product>
<product>internet_explorer:9</product>
<product>internet_explorer:10</product>
<product>internet_explorer:11</product>
</cve>
<cve id="CVE-2016-9868" level="LOW">
<product>scaleio:2.0.1.0</product>
</cve>
<cve id="CVE-2016-10627" level="MEDIUM">
<product>scala-bin:0.3.3</product>
</cve>
<cve id="CVE-2016-10624" level="MEDIUM">
<product>selenium-chromedriver:-</product>
</cve>
<cve id="CVE-2016-10583" level="MEDIUM">
<product>closure-util:1.26.0</product>
</cve>
<cve id="CVE-2016-10582" level="MEDIUM">
<product>closurecompiler:1.6.1</product>
</cve>
<cve id="CVE-2016-10581" level="MEDIUM">
<product>steroids:4.1.27</product>
</cve>
<cve id="CVE-2016-10580" level="MEDIUM">
<product>nodewebkit:0.11.2-1</product>
</cve>
<cve id="CVE-2016-10587" level="MEDIUM">
<product>wasdk:1.0.54</product>
</cve>
<cve id="CVE-2016-3378" level="MEDIUM">
<product>exchange_server:2013</product>
<product>exchange_server:2013</product>
<product>exchange_server:2013</product>
<product>exchange_server:2016</product>
<product>exchange_server:2016</product>
</cve>
<cve id="CVE-2016-10585" level="MEDIUM">
<product>libxl:0.3.0</product>
</cve>
<cve id="CVE-2016-10584" level="MEDIUM">
<product>dalekjs:0.0.11</product>
</cve>
<cve id="CVE-2016-10589" level="MEDIUM">
<product>selenium-binaries:0.10.0</product>
</cve>
<cve id="CVE-2016-10151" level="MEDIUM">
<product>hesiod:3.2.1</product>
</cve>
<cve id="CVE-2016-8709" level="MEDIUM">
<product>nitro_pro:10.5.9.9</product>
</cve>
<cve id="CVE-2016-10620" level="MEDIUM">
<product>atom-node-module-installer:0.9.0</product>
</cve>
<cve id="CVE-2016-8701" level="MEDIUM">
<product>potrace:1.12</product>
</cve>
<cve id="CVE-2016-8700" level="MEDIUM">
<product>potrace:1.12</product>
</cve>
<cve id="CVE-2016-8703" level="MEDIUM">
<product>potrace:1.12</product>
</cve>
<cve id="CVE-2016-8702" level="MEDIUM">
<product>potrace:1.12</product>
</cve>
<cve id="CVE-2016-8705" level="LOW">
<product>memcached:1.4.31</product>
</cve>
<cve id="CVE-2016-8704" level="LOW">
<product>memcached:1.4.31</product>
</cve>
<cve id="CVE-2016-8707" level="MEDIUM">
<product>imagemagick:7.0.3-1</product>
</cve>
<cve id="CVE-2016-8706" level="MEDIUM">
<product>memcached:1.4.31</product>
</cve>
<cve id="CVE-2016-0578" level="LOW">
<product>customer_relationship_management_technical_foundation:11.5.10.2</product>
</cve>
<cve id="CVE-2016-0579" level="MEDIUM">
<product>customer_relationship_management_technical_foundation:11.5.10.2</product>
</cve>
<cve id="CVE-2016-0570" level="LOW">
<product>human_capital_management_configuration_workbench:12.1.1</product>
<product>human_capital_management_configuration_workbench:12.1.2</product>
<product>human_capital_management_configuration_workbench:12.1.3</product>
</cve>
<cve id="CVE-2016-0571" level="LOW">
<product>balanced_scorecard:11.5.10.2</product>
<product>balanced_scorecard:12.1</product>
</cve>
<cve id="CVE-2016-0576" level="LOW">
<product>application_object_library:11.5.10.2</product>
</cve>
<cve id="CVE-2016-0575" level="MEDIUM">
<product>e-business_suite:11.5.10.2</product>
</cve>
<cve id="CVE-2016-1157" level="MEDIUM">
<product>log-chat:1.0</product>
</cve>
<cve id="CVE-2016-4476" level="LOW">
<product>hostapd:0.6.7</product>
<product>hostapd:0.7.0</product>
<product>hostapd:0.7.1</product>
<product>hostapd:0.7.2</product>
<product>hostapd:0.7.3</product>
<product>hostapd:1.0</product>
<product>hostapd:1.1</product>
<product>hostapd:2.0</product>
<product>hostapd:2.1</product>
<product>hostapd:2.2</product>
<product>hostapd:2.3</product>
<product>hostapd:2.4</product>
<product>hostapd:2.5</product>
</cve>
<cve id="CVE-2016-4475" level="LOW">
<product>foreman:1.11.3</product>
<product>foreman:1.12.0</product>
</cve>
<cve id="CVE-2016-4474" level="LOW">
<product>openstack:7.0</product>
<product>openstack:8.0</product>
</cve>
<cve id="CVE-2016-1153" level="LOW">
<product>cybozu_office:9.9.0</product>
<product>cybozu_office:10.3.0</product>
</cve>
<cve id="CVE-2016-4471" level="LOW">
<product>cloudforms:4.0</product>
</cve>
<cve id="CVE-2016-1158" level="HIGH">
<product>cg-wlbargmh_firmware:-</product>
<product>cg-wlbargnl_firmware:-</product>
</cve>
<cve id="CVE-2016-3644" level="LOW">
<product>advanced_threat_protection:2.0.3</product>
<product>csapi:10.0.4</product>
<product>data_center_security_server:6.0</product>
<product>data_center_security_server:6.0</product>
<product>data_center_security_server:6.5</product>
<product>data_center_security_server:6.5</product>
<product>data_center_security_server:6.6</product>
<product>data_center_security_server:6.6</product>
<product>endpoint_protection:12.1.6</product>
<product>endpoint_protection:12.1.6</product>
<product>endpoint_protection:12.1.6</product>
<product>mail_security_for_domino:8.0.9</product>
<product>mail_security_for_domino:8.1.3</product>
<product>mail_security_for_microsoft_exchange:6.5.8</product>
<product>mail_security_for_microsoft_exchange:7.0.4</product>
<product>mail_security_for_microsoft_exchange:7.5.4</product>
<product>message_gateway:10.6.1-3</product>
<product>message_gateway_for_service_providers:10.5</product>
<product>message_gateway_for_service_providers:10.6</product>
<product>ngc:22.6</product>
<product>norton_360</product>
<product>norton_antivirus</product>
<product>norton_bootable_removal_tool:2016.0</product>
<product>norton_internet_security</product>
<product>norton_power_eraser:5.0</product>
<product>norton_security</product>
<product>norton_security:13.0.1</product>
<product>norton_security_with_backup</product>
<product>protection_engine:7.0.5</product>
<product>protection_engine:7.5.4</product>
<product>protection_engine:7.8.0</product>
<product>protection_for_sharepoint_servers:6.03</product>
<product>protection_for_sharepoint_servers:6.04</product>
<product>protection_for_sharepoint_servers:6.05</product>
<product>protection_for_sharepoint_servers:6.06</product>
</cve>
<cve id="CVE-2016-3646" level="LOW">
<product>advanced_threat_protection:2.0.3</product>
<product>csapi:10.0.4</product>
<product>data_center_security_server:6.0</product>
<product>data_center_security_server:6.0</product>
<product>data_center_security_server:6.5</product>
<product>data_center_security_server:6.5</product>
<product>data_center_security_server:6.6</product>
<product>data_center_security_server:6.6</product>
<product>endpoint_protection:12.1.6</product>
<product>endpoint_protection:12.1.6</product>
<product>endpoint_protection:12.1.6</product>
<product>mail_security_for_domino:8.0.9</product>
<product>mail_security_for_domino:8.1.3</product>
<product>mail_security_for_microsoft_exchange:6.5.8</product>
<product>mail_security_for_microsoft_exchange:7.0.4</product>
<product>mail_security_for_microsoft_exchange:7.5.4</product>
<product>message_gateway:10.6.1-3</product>
<product>message_gateway_for_service_providers:10.5</product>
<product>message_gateway_for_service_providers:10.6</product>
<product>ngc:22.6</product>
<product>norton_360:-</product>
<product>norton_antivirus:-</product>
<product>norton_bootable_removal_tool:2016.0</product>
<product>norton_internet_security:-</product>
<product>norton_power_eraser:5.0</product>
<product>norton_security:-</product>
<product>norton_security:13.0.1</product>
<product>norton_security_with_backup:-</product>
<product>protection_engine:7.0.5</product>
<product>protection_engine:7.5.4</product>
<product>protection_engine:7.8.0</product>
<product>protection_for_sharepoint_servers:6.03</product>
<product>protection_for_sharepoint_servers:6.04</product>
<product>protection_for_sharepoint_servers:6.05</product>
<product>protection_for_sharepoint_servers:6.06</product>
</cve>
<cve id="CVE-2016-0398" level="MEDIUM">
<product>cognos_analytics:11.0.0</product>
</cve>
<cve id="CVE-2016-0399" level="MEDIUM">
<product>maximo_asset_management:7.1</product>
<product>maximo_asset_management:7.1.1</product>
<product>maximo_asset_management:7.1.1.1</product>
<product>maximo_asset_management:7.1.1.2</product>
<product>maximo_asset_management:7.1.1.3</product>
<product>maximo_asset_management:7.1.1.5</product>
<product>maximo_asset_management:7.1.1.6</product>
<product>maximo_asset_management:7.1.1.7</product>
<product>maximo_asset_management:7.1.1.8</product>
<product>maximo_asset_management:7.1.1.9</product>
<product>maximo_asset_management:7.1.1.10</product>
<product>maximo_asset_management:7.1.1.11</product>
<product>maximo_asset_management:7.1.1.12</product>
<product>maximo_asset_management:7.1.1.13</product>
<product>maximo_asset_management:7.1.2</product>
<product>maximo_asset_management:7.5.0.0</product>
<product>maximo_asset_management:7.5.0.1</product>
<product>maximo_asset_management:7.5.0.2</product>
<product>maximo_asset_management:7.5.0.3</product>
<product>maximo_asset_management:7.5.0.4</product>
<product>maximo_asset_management:7.5.0.5</product>
<product>maximo_asset_management:7.5.0.6</product>
<product>maximo_asset_management:7.5.0.7</product>
<product>maximo_asset_management:7.5.0.8</product>
<product>maximo_asset_management:7.5.0.9</product>
<product>maximo_asset_management:7.5.0.10</product>
<product>maximo_asset_management:7.6.0.4</product>
<product>maximo_asset_management:7.6.0.5</product>
</cve>
<cve id="CVE-2016-0396" level="MEDIUM">
<product>bigfix_platform:9.0</product>
<product>bigfix_platform:9.1</product>
<product>bigfix_platform:9.2</product>
<product>bigfix_platform:9.5</product>
</cve>
<cve id="CVE-2016-0397" level="MEDIUM">
<product>bigfix_webreports:9.0</product>
<product>bigfix_webreports:9.1</product>
<product>bigfix_webreports:9.2</product>
<product>bigfix_webreports:9.5</product>
</cve>
<cve id="CVE-2016-0394" level="LOW">
<product>integration_bus:9.0</product>
<product>integration_bus:9.0.0.1</product>
<product>integration_bus:9.0.0.2</product>
<product>integration_bus:10.0</product>
<product>websphere_message_broker:8.0</product>
<product>websphere_message_broker:8.0.0.1</product>
<product>websphere_message_broker:8.0.0.2</product>
<product>websphere_message_broker:8.0.0.3</product>
<product>websphere_message_broker:8.0.0.4</product>
<product>websphere_message_broker:8.0.0.5</product>
</cve>
<cve id="CVE-2016-0392" level="LOW">
<product>elastic_storage_server:2.5.0</product>
<product>elastic_storage_server:2.5.1</product>
<product>elastic_storage_server:2.5.2</product>
<product>elastic_storage_server:2.5.3</product>
<product>elastic_storage_server:2.5.4</product>
<product>elastic_storage_server:2.5.5</product>
<product>elastic_storage_server:3.0.0</product>
<product>elastic_storage_server:3.0.1</product>
<product>elastic_storage_server:3.0.2</product>
<product>elastic_storage_server:3.0.3</product>
<product>elastic_storage_server:3.0.4</product>
<product>elastic_storage_server:3.0.5</product>
<product>elastic_storage_server:3.5.0</product>
<product>elastic_storage_server:3.5.1</product>
<product>elastic_storage_server:3.5.2</product>
<product>elastic_storage_server:3.5.3</product>
<product>elastic_storage_server:3.5.4</product>
<product>elastic_storage_server:4.0.0</product>
<product>elastic_storage_server:4.0.1</product>
<product>elastic_storage_server:4.0.2</product>
<product>general_parallel_file_system_storage_server:2.0.0</product>
<product>general_parallel_file_system_storage_server:2.0.1</product>
<product>general_parallel_file_system_storage_server:2.0.2</product>
<product>general_parallel_file_system_storage_server:2.0.3</product>
<product>general_parallel_file_system_storage_server:2.0.4</product>
<product>general_parallel_file_system_storage_server:2.0.5</product>
<product>general_parallel_file_system_storage_server:2.0.6</product>
<product>general_parallel_file_system_storage_server:2.0.7</product>
</cve>
<cve id="CVE-2016-0393" level="LOW">
<product>maximo_asset_management:7.5.0.0</product>
<product>maximo_asset_management:7.5.0.1</product>
<product>maximo_asset_management:7.5.0.2</product>
<product>maximo_asset_management:7.5.0.3</product>
<product>maximo_asset_management:7.5.0.4</product>
<product>maximo_asset_management:7.5.0.5</product>
<product>maximo_asset_management:7.5.0.6</product>
<product>maximo_asset_management:7.5.0.7</product>
<product>maximo_asset_management:7.5.0.8</product>
<product>maximo_asset_management:7.5.0.9</product>
<product>maximo_asset_management:7.5.0.10</product>
<product>maximo_asset_management:7.6.0.0</product>
<product>maximo_asset_management:7.6.0.1</product>
<product>maximo_asset_management:7.6.0.2</product>
<product>maximo_asset_management:7.6.0.3</product>
<product>maximo_asset_management:7.6.0.4</product>
<product>maximo_asset_management:7.6.0.5</product>
</cve>
<cve id="CVE-2016-0390" level="MEDIUM">
<product>algo_one:4.9.1</product>
<product>algo_one:5.0.0</product>
<product>algo_one:5.1.0</product>
</cve>
<cve id="CVE-2016-0391" level="LOW">
<product>watson_developer_cloud:-</product>
</cve>
<cve id="CVE-2016-5706" level="LOW">
<product>phpmyadmin:4.0.0</product>
<product>phpmyadmin:4.0.1</product>
<product>phpmyadmin:4.0.2</product>
<product>phpmyadmin:4.0.3</product>
<product>phpmyadmin:4.0.4</product>
<product>phpmyadmin:4.0.4.1</product>
<product>phpmyadmin:4.0.4.2</product>
<product>phpmyadmin:4.0.5</product>
<product>phpmyadmin:4.0.6</product>
<product>phpmyadmin:4.0.7</product>
<product>phpmyadmin:4.0.8</product>
<product>phpmyadmin:4.0.9</product>
<product>phpmyadmin:4.0.10</product>
<product>phpmyadmin:4.0.10.1</product>
<product>phpmyadmin:4.0.10.2</product>
<product>phpmyadmin:4.0.10.3</product>
<product>phpmyadmin:4.0.10.4</product>
<product>phpmyadmin:4.0.10.5</product>
<product>phpmyadmin:4.0.10.6</product>
<product>phpmyadmin:4.0.10.7</product>
<product>phpmyadmin:4.0.10.8</product>
<product>phpmyadmin:4.0.10.9</product>
<product>phpmyadmin:4.0.10.10</product>
<product>phpmyadmin:4.0.10.11</product>
<product>phpmyadmin:4.0.10.12</product>
<product>phpmyadmin:4.0.10.13</product>
<product>phpmyadmin:4.0.10.14</product>
<product>phpmyadmin:4.0.10.15</product>
<product>phpmyadmin:4.4.0</product>
<product>phpmyadmin:4.4.1</product>
<product>phpmyadmin:4.4.1.1</product>
<product>phpmyadmin:4.4.2</product>
<product>phpmyadmin:4.4.3</product>
<product>phpmyadmin:4.4.4</product>
<product>phpmyadmin:4.4.5</product>
<product>phpmyadmin:4.4.6</product>
<product>phpmyadmin:4.4.6.1</product>
<product>phpmyadmin:4.4.7</product>
<product>phpmyadmin:4.4.8</product>
<product>phpmyadmin:4.4.9</product>
<product>phpmyadmin:4.4.10</product>
<product>phpmyadmin:4.4.11</product>
<product>phpmyadmin:4.4.12</product>
<product>phpmyadmin:4.4.13</product>
<product>phpmyadmin:4.4.13.1</product>
<product>phpmyadmin:4.4.14.1</product>
<product>phpmyadmin:4.4.15</product>
<product>phpmyadmin:4.4.15.1</product>
<product>phpmyadmin:4.4.15.2</product>
<product>phpmyadmin:4.4.15.3</product>
<product>phpmyadmin:4.4.15.4</product>
<product>phpmyadmin:4.4.15.5</product>
<product>phpmyadmin:4.4.15.6</product>
<product>phpmyadmin:4.6.0</product>
<product>phpmyadmin:4.6.0</product>
<product>phpmyadmin:4.6.0</product>
<product>phpmyadmin:4.6.0</product>
<product>phpmyadmin:4.6.1</product>
<product>phpmyadmin:4.6.2</product>
<product>leap:42.1</product>
<product>opensuse:13.1</product>
<product>opensuse:13.2</product>
</cve>
<cve id="CVE-2016-5704" level="MEDIUM">
<product>phpmyadmin:4.6.0</product>
<product>phpmyadmin:4.6.0</product>
<product>phpmyadmin:4.6.0</product>
<product>phpmyadmin:4.6.0</product>
<product>phpmyadmin:4.6.1</product>
<product>phpmyadmin:4.6.2</product>
</cve>
<cve id="CVE-2016-5705" level="MEDIUM">
<product>phpmyadmin:4.4.0</product>
<product>phpmyadmin:4.4.1</product>
<product>phpmyadmin:4.4.1.1</product>
<product>phpmyadmin:4.4.2</product>
<product>phpmyadmin:4.4.3</product>
<product>phpmyadmin:4.4.4</product>
<product>phpmyadmin:4.4.5</product>
<product>phpmyadmin:4.4.6</product>
<product>phpmyadmin:4.4.6.1</product>
<product>phpmyadmin:4.4.7</product>
<product>phpmyadmin:4.4.8</product>
<product>phpmyadmin:4.4.9</product>
<product>phpmyadmin:4.4.10</product>
<product>phpmyadmin:4.4.11</product>
<product>phpmyadmin:4.4.12</product>
<product>phpmyadmin:4.4.13</product>
<product>phpmyadmin:4.4.13.1</product>
<product>phpmyadmin:4.4.14.1</product>
<product>phpmyadmin:4.4.15</product>
<product>phpmyadmin:4.4.15.1</product>
<product>phpmyadmin:4.4.15.2</product>
<product>phpmyadmin:4.4.15.3</product>
<product>phpmyadmin:4.4.15.4</product>
<product>phpmyadmin:4.4.15.5</product>
<product>phpmyadmin:4.4.15.6</product>
<product>phpmyadmin:4.6.0</product>
<product>phpmyadmin:4.6.0</product>
<product>phpmyadmin:4.6.0</product>
<product>phpmyadmin:4.6.0</product>
<product>phpmyadmin:4.6.1</product>
<product>phpmyadmin:4.6.2</product>
<product>leap:42.1</product>
<product>opensuse:13.1</product>
<product>opensuse:13.2</product>
</cve>
<cve id="CVE-2016-5702" level="MEDIUM">
<product>phpmyadmin:4.6.0</product>
<product>phpmyadmin:4.6.0</product>
<product>phpmyadmin:4.6.0</product>
<product>phpmyadmin:4.6.0</product>
<product>phpmyadmin:4.6.1</product>
<product>phpmyadmin:4.6.2</product>
</cve>
<cve id="CVE-2016-5703" level="LOW">
<product>phpmyadmin:4.4.0</product>
<product>phpmyadmin:4.4.1</product>
<product>phpmyadmin:4.4.1.1</product>
<product>phpmyadmin:4.4.2</product>
<product>phpmyadmin:4.4.3</product>
<product>phpmyadmin:4.4.4</product>
<product>phpmyadmin:4.4.5</product>
<product>phpmyadmin:4.4.6</product>
<product>phpmyadmin:4.4.6.1</product>
<product>phpmyadmin:4.4.7</product>
<product>phpmyadmin:4.4.8</product>
<product>phpmyadmin:4.4.9</product>
<product>phpmyadmin:4.4.10</product>
<product>phpmyadmin:4.4.11</product>
<product>phpmyadmin:4.4.12</product>
<product>phpmyadmin:4.4.13</product>
<product>phpmyadmin:4.4.13.1</product>
<product>phpmyadmin:4.4.14.1</product>
<product>phpmyadmin:4.4.15</product>
<product>phpmyadmin:4.4.15.1</product>
<product>phpmyadmin:4.4.15.2</product>
<product>phpmyadmin:4.4.15.3</product>
<product>phpmyadmin:4.4.15.4</product>
<product>phpmyadmin:4.4.15.5</product>
<product>phpmyadmin:4.4.15.6</product>
<product>phpmyadmin:4.6.0</product>
<product>phpmyadmin:4.6.0</product>
<product>phpmyadmin:4.6.0</product>
<product>phpmyadmin:4.6.0</product>
<product>phpmyadmin:4.6.1</product>
<product>phpmyadmin:4.6.2</product>
<product>leap:42.1</product>
<product>opensuse:13.1</product>
<product>opensuse:13.2</product>
</cve>
<cve id="CVE-2016-5700" level="MEDIUM">
<product>big-ip_access_policy_manager:11.5.0</product>
<product>big-ip_access_policy_manager:11.5.1</product>
<product>big-ip_access_policy_manager:11.5.2</product>
<product>big-ip_access_policy_manager:11.5.3</product>
<product>big-ip_access_policy_manager:11.5.4</product>
<product>big-ip_access_policy_manager:11.6.0</product>
<product>big-ip_access_policy_manager:11.6.1</product>
<product>big-ip_access_policy_manager:12.0.0</product>
<product>big-ip_access_policy_manager:12.1.0</product>
<product>big-ip_advanced_firewall_manager:11.5.0</product>
<product>big-ip_advanced_firewall_manager:11.5.1</product>
<product>big-ip_advanced_firewall_manager:11.5.2</product>
<product>big-ip_advanced_firewall_manager:11.5.3</product>
<product>big-ip_advanced_firewall_manager:11.5.4</product>
<product>big-ip_advanced_firewall_manager:11.6.0</product>
<product>big-ip_advanced_firewall_manager:11.6.1</product>
<product>big-ip_advanced_firewall_manager:12.0.0</product>
<product>big-ip_advanced_firewall_manager:12.1.0</product>
<product>big-ip_application_acceleration_manager:11.5.0</product>
<product>big-ip_application_acceleration_manager:11.5.1</product>
<product>big-ip_application_acceleration_manager:11.5.2</product>
<product>big-ip_application_acceleration_manager:11.5.3</product>
<product>big-ip_application_acceleration_manager:11.5.4</product>
<product>big-ip_application_acceleration_manager:11.6.0</product>
<product>big-ip_application_acceleration_manager:11.6.1</product>
<product>big-ip_application_acceleration_manager:12.0.0</product>
<product>big-ip_application_acceleration_manager:12.1.0</product>
<product>big-ip_application_security_manager:11.5.0</product>
<product>big-ip_application_security_manager:11.5.1</product>
<product>big-ip_application_security_manager:11.5.2</product>
<product>big-ip_application_security_manager:11.5.3</product>
<product>big-ip_application_security_manager:11.5.4</product>
<product>big-ip_application_security_manager:11.6.0</product>
<product>big-ip_application_security_manager:11.6.1</product>
<product>big-ip_application_security_manager:12.0.0</product>
<product>big-ip_application_security_manager:12.1.0</product>
<product>big-ip_link_controller:11.5.0</product>
<product>big-ip_link_controller:11.5.1</product>
<product>big-ip_link_controller:11.5.2</product>
<product>big-ip_link_controller:11.5.3</product>
<product>big-ip_link_controller:11.5.4</product>
<product>big-ip_link_controller:11.6.0</product>
<product>big-ip_link_controller:11.6.1</product>
<product>big-ip_link_controller:12.0.0</product>
<product>big-ip_link_controller:12.1.0</product>
<product>big-ip_local_traffic_manager:11.5.0</product>
<product>big-ip_local_traffic_manager:11.5.1</product>
<product>big-ip_local_traffic_manager:11.5.2</product>
<product>big-ip_local_traffic_manager:11.5.3</product>
<product>big-ip_local_traffic_manager:11.5.4</product>
<product>big-ip_local_traffic_manager:11.6.0</product>
<product>big-ip_local_traffic_manager:11.6.1</product>
<product>big-ip_local_traffic_manager:12.0.0</product>
<product>big-ip_local_traffic_manager:12.1.0</product>
<product>big-ip_policy_enforcement_manager:11.5.0</product>
<product>big-ip_policy_enforcement_manager:11.5.1</product>
<product>big-ip_policy_enforcement_manager:11.5.2</product>
<product>big-ip_policy_enforcement_manager:11.5.3</product>
<product>big-ip_policy_enforcement_manager:11.5.4</product>
<product>big-ip_policy_enforcement_manager:11.6.0</product>
<product>big-ip_policy_enforcement_manager:11.6.1</product>
<product>big-ip_policy_enforcement_manager:12.0.0</product>
<product>big-ip_policy_enforcement_manager:12.1.0</product>
<product>big-ip_websafe:11.6.0</product>
<product>big-ip_websafe:11.6.1</product>
<product>big-ip_websafe:12.0.0</product>
<product>big-ip_websafe:12.1.0</product>
</cve>
<cve id="CVE-2016-5701" level="MEDIUM">
<product>phpmyadmin:4.0.0</product>
<product>phpmyadmin:4.0.1</product>
<product>phpmyadmin:4.0.2</product>
<product>phpmyadmin:4.0.3</product>
<product>phpmyadmin:4.0.4</product>
<product>phpmyadmin:4.0.4.1</product>
<product>phpmyadmin:4.0.4.2</product>
<product>phpmyadmin:4.0.5</product>
<product>phpmyadmin:4.0.6</product>
<product>phpmyadmin:4.0.7</product>
<product>phpmyadmin:4.0.8</product>
<product>phpmyadmin:4.0.9</product>
<product>phpmyadmin:4.0.10</product>
<product>phpmyadmin:4.0.10.1</product>
<product>phpmyadmin:4.0.10.2</product>
<product>phpmyadmin:4.0.10.3</product>
<product>phpmyadmin:4.0.10.4</product>
<product>phpmyadmin:4.0.10.5</product>
<product>phpmyadmin:4.0.10.6</product>
<product>phpmyadmin:4.0.10.7</product>
<product>phpmyadmin:4.0.10.8</product>
<product>phpmyadmin:4.0.10.9</product>
<product>phpmyadmin:4.0.10.10</product>
<product>phpmyadmin:4.0.10.11</product>
<product>phpmyadmin:4.0.10.12</product>
<product>phpmyadmin:4.0.10.13</product>
<product>phpmyadmin:4.0.10.14</product>
<product>phpmyadmin:4.0.10.15</product>
<product>phpmyadmin:4.4.0</product>
<product>phpmyadmin:4.4.1</product>
<product>phpmyadmin:4.4.1.1</product>
<product>phpmyadmin:4.4.2</product>
<product>phpmyadmin:4.4.3</product>
<product>phpmyadmin:4.4.4</product>
<product>phpmyadmin:4.4.5</product>
<product>phpmyadmin:4.4.6</product>
<product>phpmyadmin:4.4.6.1</product>
<product>phpmyadmin:4.4.7</product>
<product>phpmyadmin:4.4.8</product>
<product>phpmyadmin:4.4.9</product>
<product>phpmyadmin:4.4.10</product>
<product>phpmyadmin:4.4.11</product>
<product>phpmyadmin:4.4.12</product>
<product>phpmyadmin:4.4.13</product>
<product>phpmyadmin:4.4.13.1</product>
<product>phpmyadmin:4.4.14.1</product>
<product>phpmyadmin:4.4.15</product>
<product>phpmyadmin:4.4.15.1</product>
<product>phpmyadmin:4.4.15.2</product>
<product>phpmyadmin:4.4.15.3</product>
<product>phpmyadmin:4.4.15.4</product>
<product>phpmyadmin:4.4.15.5</product>
<product>phpmyadmin:4.4.15.6</product>
<product>phpmyadmin:4.6.0</product>
<product>phpmyadmin:4.6.0</product>
<product>phpmyadmin:4.6.0</product>
<product>phpmyadmin:4.6.0</product>
<product>phpmyadmin:4.6.1</product>
<product>phpmyadmin:4.6.2</product>
<product>leap:42.1</product>
<product>opensuse:13.1</product>
<product>opensuse:13.2</product>
</cve>
<cve id="CVE-2016-5709" level="MEDIUM">
<product>virtualization_manager:6.3.1</product>
</cve>
<cve id="CVE-2016-2169" level="LOW">
<product>cf-release:141</product>
<product>cf-release:142</product>
<product>cf-release:143</product>
<product>cf-release:144</product>
<product>cf-release:145</product>
<product>cf-release:146</product>
<product>cf-release:147</product>
<product>cf-release:148</product>
<product>cf-release:149</product>
<product>cf-release:150</product>
<product>cf-release:151</product>
<product>cf-release:152</product>
<product>cf-release:153</product>
<product>cf-release:154</product>
<product>cf-release:155</product>
<product>cf-release:156</product>
<product>cf-release:157</product>
<product>cf-release:158</product>
<product>cf-release:159</product>
<product>cf-release:160</product>
<product>cf-release:161</product>
<product>cf-release:162</product>
<product>cf-release:163</product>
<product>cf-release:164</product>
<product>cf-release:165</product>
<product>cf-release:166</product>
<product>cf-release:167</product>
<product>cf-release:168</product>
<product>cf-release:169</product>
<product>cf-release:170</product>
<product>cf-release:171</product>
<product>cf-release:172</product>
<product>cf-release:173</product>
<product>cf-release:174</product>
<product>cf-release:175</product>
<product>cf-release:176</product>
<product>cf-release:177</product>
<product>cf-release:178</product>
<product>cf-release:179</product>
<product>cf-release:180</product>
<product>cf-release:181</product>
<product>cf-release:182</product>
<product>cf-release:183</product>
<product>cf-release:184</product>
<product>cf-release:185</product>
<product>cf-release:186</product>
<product>cf-release:187</product>
<product>cf-release:188</product>
<product>cf-release:189</product>
<product>cf-release:190</product>
<product>cf-release:191</product>
<product>cf-release:192</product>
<product>cf-release:193</product>
<product>cf-release:194</product>
<product>cf-release:195</product>
<product>cf-release:196</product>
<product>cf-release:197</product>
<product>cf-release:198</product>
<product>cf-release:199</product>
<product>cf-release:200</product>
<product>cf-release:201</product>
<product>cf-release:202</product>
<product>cf-release:203</product>
<product>cf-release:204</product>
<product>cf-release:205</product>
<product>cf-release:206</product>
<product>cf-release:207</product>
<product>cf-release:208</product>
<product>cf-release:209</product>
<product>cf-release:210</product>
<product>cf-release:211</product>
<product>cf-release:212</product>
<product>cf-release:213</product>
<product>cf-release:214</product>
<product>cf-release:215</product>
<product>cf-release:216</product>
<product>cf-release:217</product>
<product>cf-release:218</product>
<product>cf-release:219</product>
<product>cf-release:220</product>
<product>cf-release:221</product>
<product>cf-release:222</product>
<product>cf-release:223</product>
<product>cf-release:224</product>
<product>cf-release:225</product>
<product>cf-release:226</product>
<product>cf-release:227</product>
<product>cf-release:228</product>
</cve>
<cve id="CVE-2016-2168" level="LOW">
<product>subversion:1.8.15</product>
<product>subversion:1.9.0</product>
<product>subversion:1.9.1</product>
<product>subversion:1.9.2</product>
<product>subversion:1.9.3</product>
</cve>
<cve id="CVE-2016-2167" level="MEDIUM">
<product>subversion:1.8.15</product>
<product>subversion:1.9.0</product>
<product>subversion:1.9.1</product>
<product>subversion:1.9.2</product>
<product>subversion:1.9.3</product>
</cve>
<cve id="CVE-2016-2166" level="MEDIUM">
<product>qpid_proton:0.12.0</product>
<product>fedora:23</product>
</cve>
<cve id="CVE-2016-2165" level="MEDIUM">
<product>cloud_foundry_cf_release:231</product>
<product>cloud_foundry_elastic_runtime:1.5.18</product>
<product>cloud_foundry_elastic_runtime:1.6.0</product>
<product>cloud_foundry_elastic_runtime:1.6.1</product>
<product>cloud_foundry_elastic_runtime:1.6.2</product>
<product>cloud_foundry_elastic_runtime:1.6.3</product>
<product>cloud_foundry_elastic_runtime:1.6.4</product>
<product>cloud_foundry_elastic_runtime:1.6.5</product>
<product>cloud_foundry_elastic_runtime:1.6.6</product>
<product>cloud_foundry_elastic_runtime:1.6.7</product>
<product>cloud_foundry_elastic_runtime:1.6.8</product>
<product>cloud_foundry_elastic_runtime:1.6.9</product>
<product>cloud_foundry_elastic_runtime:1.6.10</product>
<product>cloud_foundry_elastic_runtime:1.6.11</product>
<product>cloud_foundry_elastic_runtime:1.6.12</product>
<product>cloud_foundry_elastic_runtime:1.6.13</product>
<product>cloud_foundry_elastic_runtime:1.6.14</product>
<product>cloud_foundry_elastic_runtime:1.6.15</product>
<product>cloud_foundry_elastic_runtime:1.6.16</product>
<product>cloud_foundry_elastic_runtime:1.6.17</product>
<product>cloud_foundry_elastic_runtime:1.6.18</product>
<product>cloud_foundry_elastic_runtime:1.6.19</product>
</cve>
<cve id="CVE-2016-2164" level="LOW">
<product>openmeetings:3.1.0</product>
</cve>
<cve id="CVE-2016-2163" level="MEDIUM">
<product>openmeetings:3.1.0</product>
</cve>
<cve id="CVE-2016-2162" level="MEDIUM">
<product>struts:2.0.0</product>
<product>struts:2.0.1</product>
<product>struts:2.0.2</product>
<product>struts:2.0.3</product>
<product>struts:2.0.4</product>
<product>struts:2.0.5</product>
<product>struts:2.0.6</product>
<product>struts:2.0.7</product>
<product>struts:2.0.8</product>
<product>struts:2.0.9</product>
<product>struts:2.0.10</product>
<product>struts:2.0.11</product>
<product>struts:2.0.11.1</product>
<product>struts:2.0.11.2</product>
<product>struts:2.0.12</product>
<product>struts:2.0.13</product>
<product>struts:2.0.14</product>
<product>struts:2.1</product>
<product>struts:2.1.0</product>
<product>struts:2.1.1</product>
<product>struts:2.1.2</product>
<product>struts:2.1.2_beta</product>
<product>struts:2.1.3</product>
<product>struts:2.1.4</product>
<product>struts:2.1.5</product>
<product>struts:2.1.6</product>
<product>struts:2.1.8</product>
<product>struts:2.1.8.1</product>
<product>struts:2.2.1</product>
<product>struts:2.2.1.1</product>
<product>struts:2.2.3</product>
<product>struts:2.2.3.1</product>
<product>struts:2.3.1</product>
<product>struts:2.3.1.1</product>
<product>struts:2.3.1.2</product>
<product>struts:2.3.3</product>
<product>struts:2.3.4</product>
<product>struts:2.3.4.1</product>
<product>struts:2.3.7</product>
<product>struts:2.3.8</product>
<product>struts:2.3.12</product>
<product>struts:2.3.14</product>
<product>struts:2.3.14.1</product>
<product>struts:2.3.14.2</product>
<product>struts:2.3.14.3</product>
<product>struts:2.3.15</product>
<product>struts:2.3.15.1</product>
<product>struts:2.3.15.2</product>
<product>struts:2.3.15.3</product>
<product>struts:2.3.16</product>
<product>struts:2.3.16.1</product>
<product>struts:2.3.16.2</product>
<product>struts:2.3.16.3</product>
<product>struts:2.3.20</product>
<product>struts:2.3.24</product>
<product>struts:2.3.24.1</product>
</cve>
<cve id="CVE-2016-2160" level="LOW">
<product>openshift:3.2</product>
<product>openshift_origin:-</product>
</cve>
<cve id="CVE-2016-3464" level="LOW">
<product>flexcube_direct_banking:12.0.3</product>
</cve>
<cve id="CVE-2016-3467" level="LOW">
<product>application_express:5.0.3</product>
</cve>
<cve id="CVE-2016-3466" level="LOW">
<product>field_service:12.1.1</product>
<product>field_service:12.1.2</product>
<product>field_service:12.1.3</product>
</cve>
<cve id="CVE-2016-3460" level="LOW">
<product>peoplesoft_enterprise_human_capital_management_eperformance:9.2</product>
</cve>
<cve id="CVE-2016-6394" level="MEDIUM">
<product>firesight_system_software:5.2.0</product>
<product>firesight_system_software:5.2.0.1</product>
<product>firesight_system_software:5.2.0.2</product>
<product>firesight_system_software:5.2.0.3</product>
<product>firesight_system_software:5.2.0.4</product>
<product>firesight_system_software:5.2.0.5</product>
<product>firesight_system_software:5.2.0.6</product>
<product>firesight_system_software:5.2.0.8</product>
<product>firesight_system_software:5.3.0</product>
<product>firesight_system_software:5.3.0.1</product>
<product>firesight_system_software:5.3.0.2</product>
<product>firesight_system_software:5.3.0.3</product>
<product>firesight_system_software:5.3.0.4</product>
<product>firesight_system_software:5.3.0.5</product>
<product>firesight_system_software:5.3.0.6</product>
<product>firesight_system_software:5.3.0.7</product>
<product>firesight_system_software:5.3.1</product>
<product>firesight_system_software:5.3.1.1</product>
<product>firesight_system_software:5.3.1.2</product>
<product>firesight_system_software:5.3.1.3</product>
<product>firesight_system_software:5.3.1.4</product>
<product>firesight_system_software:5.3.1.5</product>
<product>firesight_system_software:5.3.1.7</product>
<product>firesight_system_software:5.4.0</product>
<product>firesight_system_software:5.4.0.1</product>
<product>firesight_system_software:5.4.0.2</product>
<product>firesight_system_software:5.4.0.3</product>
<product>firesight_system_software:5.4.0.4</product>
<product>firesight_system_software:5.4.0.5</product>
<product>firesight_system_software:5.4.0.6</product>
<product>firesight_system_software:5.4.1</product>
<product>firesight_system_software:5.4.1.2</product>
<product>firesight_system_software:5.4.1.3</product>
<product>firesight_system_software:5.4.1.4</product>
<product>firesight_system_software:6.0.0</product>
<product>firesight_system_software:6.0.0.1</product>
<product>firesight_system_software:6.0.1</product>
<product>firesight_system_software:6.1.0</product>
</cve>
<cve id="CVE-2016-6395" level="MEDIUM">
<product>firesight_system_software:5.1.0</product>
<product>firesight_system_software:5.1.0.1</product>
<product>firesight_system_software:5.1.0.2</product>
<product>firesight_system_software:5.1.0.3</product>
<product>firesight_system_software:5.1.1</product>
<product>firesight_system_software:5.1.1.1</product>
<product>firesight_system_software:5.1.1.2</product>
<product>firesight_system_software:5.1.1.3</product>
<product>firesight_system_software:5.1.1.4</product>
<product>firesight_system_software:5.1.1.5</product>
<product>firesight_system_software:5.1.1.6</product>
<product>firesight_system_software:5.1.1.8</product>
<product>firesight_system_software:5.1.1.9</product>
<product>firesight_system_software:5.1.1.10</product>
<product>firesight_system_software:5.1.1.11</product>
<product>firesight_system_software:5.2.0</product>
<product>firesight_system_software:5.2.0.1</product>
<product>firesight_system_software:5.2.0.2</product>
<product>firesight_system_software:5.2.0.3</product>
<product>firesight_system_software:5.2.0.4</product>
<product>firesight_system_software:5.2.0.5</product>
<product>firesight_system_software:5.2.0.6</product>
<product>firesight_system_software:5.2.0.8</product>
<product>firesight_system_software:5.3.0</product>
<product>firesight_system_software:5.3.0.1</product>
<product>firesight_system_software:5.3.0.2</product>
<product>firesight_system_software:5.3.0.3</product>
<product>firesight_system_software:5.3.0.4</product>
<product>firesight_system_software:5.3.0.5</product>
<product>firesight_system_software:5.3.0.6</product>
<product>firesight_system_software:5.3.0.7</product>
<product>firesight_system_software:5.3.1</product>
<product>firesight_system_software:5.3.1.1</product>
<product>firesight_system_software:5.3.1.2</product>
<product>firesight_system_software:5.3.1.3</product>
<product>firesight_system_software:5.3.1.4</product>
<product>firesight_system_software:5.3.1.5</product>
<product>firesight_system_software:5.3.1.7</product>
<product>firesight_system_software:5.4.0</product>
<product>firesight_system_software:5.4.0.1</product>
<product>firesight_system_software:5.4.0.2</product>
<product>firesight_system_software:5.4.0.3</product>
<product>firesight_system_software:5.4.0.4</product>
<product>firesight_system_software:5.4.0.5</product>
<product>firesight_system_software:5.4.0.6</product>
<product>firesight_system_software:5.4.1</product>
<product>firesight_system_software:5.4.1.2</product>
<product>firesight_system_software:5.4.1.3</product>
<product>firesight_system_software:5.4.1.4</product>
<product>firesight_system_software:6.0.0</product>
<product>firesight_system_software:6.0.0.1</product>
<product>firesight_system_software:6.0.1</product>
</cve>
<cve id="CVE-2016-6396" level="LOW">
<product>firesight_system_software:5.1.0</product>
<product>firesight_system_software:5.1.0.1</product>
<product>firesight_system_software:5.1.0.2</product>
<product>firesight_system_software:5.1.0.3</product>
<product>firesight_system_software:5.1.1</product>
<product>firesight_system_software:5.1.1.1</product>
<product>firesight_system_software:5.1.1.2</product>
<product>firesight_system_software:5.1.1.3</product>
<product>firesight_system_software:5.1.1.4</product>
<product>firesight_system_software:5.1.1.5</product>
<product>firesight_system_software:5.1.1.6</product>
<product>firesight_system_software:5.1.1.8</product>
<product>firesight_system_software:5.1.1.9</product>
<product>firesight_system_software:5.1.1.10</product>
<product>firesight_system_software:5.1.1.11</product>
<product>firesight_system_software:5.2.0</product>
<product>firesight_system_software:5.2.0.1</product>
<product>firesight_system_software:5.2.0.2</product>
<product>firesight_system_software:5.2.0.3</product>
<product>firesight_system_software:5.2.0.4</product>
<product>firesight_system_software:5.2.0.5</product>
<product>firesight_system_software:5.2.0.6</product>
<product>firesight_system_software:5.2.0.8</product>
<product>firesight_system_software:5.3.0</product>
<product>firesight_system_software:5.3.0.1</product>
<product>firesight_system_software:5.3.0.2</product>
<product>firesight_system_software:5.3.0.3</product>
<product>firesight_system_software:5.3.0.4</product>
<product>firesight_system_software:5.3.0.5</product>
<product>firesight_system_software:5.3.0.6</product>
<product>firesight_system_software:5.3.0.7</product>
<product>firesight_system_software:5.3.1</product>
<product>firesight_system_software:5.3.1.1</product>
<product>firesight_system_software:5.3.1.2</product>
<product>firesight_system_software:5.3.1.3</product>
<product>firesight_system_software:5.3.1.4</product>
<product>firesight_system_software:5.3.1.5</product>
<product>firesight_system_software:5.3.1.7</product>
<product>firesight_system_software:5.4.0</product>
<product>firesight_system_software:5.4.0.1</product>
<product>firesight_system_software:5.4.0.2</product>
<product>firesight_system_software:5.4.0.3</product>
<product>firesight_system_software:5.4.0.4</product>
<product>firesight_system_software:5.4.0.5</product>
<product>firesight_system_software:5.4.0.6</product>
<product>firesight_system_software:5.4.1</product>
<product>firesight_system_software:5.4.1.2</product>
<product>firesight_system_software:5.4.1.3</product>
<product>firesight_system_software:5.4.1.4</product>
<product>firesight_system_software:6.0.0</product>
<product>firesight_system_software:6.0.0.1</product>
<product>firesight_system_software:6.0.1</product>
</cve>
<cve id="CVE-2016-6425" level="MEDIUM">
<product>unified_contact_center_express:10.0%281%29</product>
<product>unified_contact_center_express:10.5%281%29</product>
<product>unified_contact_center_express:10.6%281%29</product>
<product>unified_contact_center_express:11.0%281%29</product>
<product>unified_intelligence_center:8.5.4</product>
<product>unified_intelligence_center:9.0%282%29</product>
<product>unified_intelligence_center:9.1%281%29</product>
</cve>
<cve id="CVE-2016-6934" level="MEDIUM">
<product>experience_manager_forms:6.2</product>
<product>livecycle:10.0.4</product>
<product>livecycle:11.0.1</product>
</cve>
<cve id="CVE-2016-6935" level="LOW">
<product>creative_cloud:3.7.0.272</product>
</cve>
<cve id="CVE-2016-6936" level="LOW">
<product>air_sdk_%26_compiler:22.0.0.153</product>
</cve>
<cve id="CVE-2016-3417" level="MEDIUM">
<product>peoplesoft_enterprise_peopletools:8.53</product>
<product>peoplesoft_enterprise_peopletools:8.54</product>
<product>peoplesoft_enterprise_peopletools:8.55</product>
</cve>
<cve id="CVE-2016-6938" level="LOW">
<product>acrobat:11.0.16</product>
<product>acrobat_dc:15.006.30174</product>
<product>acrobat_dc:15.016.20045</product>
<product>acrobat_reader_dc:15.006.30174</product>
<product>acrobat_reader_dc:15.016.20045</product>
<product>reader:11.0.16</product>
</cve>
<cve id="CVE-2016-6939" level="LOW">
<product>acrobat:11.0.17</product>
<product>acrobat_dc:15.006.30201</product>
<product>acrobat_dc:15.017.20053</product>
<product>acrobat_reader_dc:15.006.30201</product>
<product>acrobat_reader_dc:15.017.20053</product>
<product>reader:11.0.17</product>
</cve>
<cve id="CVE-2016-6399" level="LOW">
<product>ace_application_control_engine_module_a1:7a</product>
<product>ace_application_control_engine_module_a1:7b</product>
<product>ace_application_control_engine_module_a1:8.0</product>
<product>ace_application_control_engine_module_a1:8.0a</product>
<product>ace_application_control_engine_module_a3:1.0</product>
<product>ace_application_control_engine_module_a3:2.0</product>
<product>ace_application_control_engine_module_a3:2.2</product>
<product>ace_application_control_engine_module_a3:2.3</product>
<product>ace_application_control_engine_module_a3:2.4</product>
<product>ace_application_control_engine_module_a3:2.5</product>
<product>ace_application_control_engine_module_a3:2.6</product>
<product>ace_application_control_engine_module_a3:2.7</product>
<product>ace_application_control_engine_module_a4:1.0</product>
<product>ace_application_control_engine_module_a4:1.1</product>
<product>ace_application_control_engine_module_a4:2.0</product>
<product>ace_application_control_engine_module_a4:2.1a</product>
<product>ace_application_control_engine_module_a4:2.2</product>
<product>ace_application_control_engine_module_a4:2.3</product>
<product>ace_application_control_engine_module_a5:1.0</product>
<product>ace_application_control_engine_module_a5:1.1</product>
<product>ace_application_control_engine_module_a5:1.2</product>
<product>ace_application_control_engine_module_a5:2.0</product>
<product>ace_application_control_engine_module_a5:2.1</product>
<product>ace_application_control_engine_module_a5:2.1e</product>
<product>ace_application_control_engine_module_a5:3.0</product>
<product>ace_application_control_engine_module_a5:3.1a</product>
<product>ace_application_control_engine_module_a5:3.1b</product>
<product>ace_application_control_engine_module_a5:3.2</product>
<product>ace_application_control_engine_module_a5:3.3</product>
<product>ace_4700_series_application_control_engine_appliance:a5%281.0%29</product>
<product>ace_4700_series_application_control_engine_appliance:a5%281.1%29</product>
<product>ace_4700_series_application_control_engine_appliance:a5%281.2%29</product>
<product>ace_4700_series_application_control_engine_appliance:a5%282.0%29</product>
<product>ace_4700_series_application_control_engine_appliance:a5%282.1%29</product>
<product>ace_4700_series_application_control_engine_appliance:a5%282.1e%29</product>
<product>ace_4700_series_application_control_engine_appliance:a5%283.0%29</product>
<product>ace_4700_series_application_control_engine_appliance:a5_base</product>
<product>ace_4700_series_application_control_engine_appliance_a1:7</product>
<product>ace_4700_series_application_control_engine_appliance_a1:7a</product>
<product>ace_4700_series_application_control_engine_appliance_a1:7b</product>
<product>ace_4700_series_application_control_engine_appliance_a1:8.0</product>
<product>ace_4700_series_application_control_engine_appliance_a1:8.0a</product>
<product>ace_4700_series_application_control_engine_appliance_a3:1.0</product>
<product>ace_4700_series_application_control_engine_appliance_a3:2.0</product>
<product>ace_4700_series_application_control_engine_appliance_a3:2.2</product>
<product>ace_4700_series_application_control_engine_appliance_a3:2.3</product>
<product>ace_4700_series_application_control_engine_appliance_a3:2.4</product>
<product>ace_4700_series_application_control_engine_appliance_a3:2.5</product>
<product>ace_4700_series_application_control_engine_appliance_a3:2.6</product>
<product>ace_4700_series_application_control_engine_appliance_a3:2.7</product>
<product>ace_4700_series_application_control_engine_appliance_a4:1.0</product>
<product>ace_4700_series_application_control_engine_appliance_a4:1.1</product>
<product>ace_4700_series_application_control_engine_appliance_a4:2.0</product>
<product>ace_4700_series_application_control_engine_appliance_a4:2.1a</product>
<product>ace_4700_series_application_control_engine_appliance_a4:2.2</product>
<product>ace_4700_series_application_control_engine_appliance_a4:2.3</product>
<product>ace_4700_series_application_control_engine_appliance_a5:3.1a</product>
<product>ace_4700_series_application_control_engine_appliance_a5:3.1b</product>
<product>ace_4700_series_application_control_engine_appliance_a5:3.2</product>
<product>ace_4700_series_application_control_engine_appliance_a5:3.3</product>
</cve>
<cve id="CVE-2016-6429" level="MEDIUM">
<product>ip_interoperability_and_collaboration_system:4.10%281%29</product>
</cve>
<cve id="CVE-2016-0266" level="MEDIUM">
<product>aix:5.3</product>
<product>aix:6.1</product>
<product>aix:7.1</product>
<product>aix:7.2</product>
<product>vios:2.2.0.10</product>
<product>vios:2.2.0.11</product>
<product>vios:2.2.0.12</product>
<product>vios:2.2.0.13</product>
<product>vios:2.2.1.0</product>
<product>vios:2.2.1.1</product>
<product>vios:2.2.1.3</product>
<product>vios:2.2.1.4</product>
<product>vios:2.2.1.5</product>
<product>vios:2.2.1.6</product>
<product>vios:2.2.1.7</product>
<product>vios:2.2.1.8</product>
<product>vios:2.2.1.9</product>
<product>vios:2.2.2.0</product>
<product>vios:2.2.2.1</product>
<product>vios:2.2.2.2</product>
<product>vios:2.2.2.3</product>
<product>vios:2.2.2.4</product>
<product>vios:2.2.2.5</product>
<product>vios:2.2.3.0</product>
<product>vios:2.2.3.1</product>
<product>vios:2.2.3.2</product>
<product>vios:2.2.3.3</product>
<product>vios:2.2.3.4</product>
<product>vios:2.2.3.50</product>
<product>vios:2.2.3.51</product>
<product>vios:2.2.3.52</product>
<product>vios:2.2.3.60</product>
<product>vios:2.2.3.70</product>
<product>vios:2.2.4.0</product>
<product>vios:2.2.4.10</product>
<product>vios:2.2.4.21</product>
<product>vios:2.2.4.22</product>
</cve>
<cve id="CVE-2016-6949" level="LOW">
<product>acrobat:11.0.17</product>
<product>acrobat_dc:15.006.30201</product>
<product>acrobat_dc:15.017.20053</product>
<product>acrobat_reader_dc:15.006.30201</product>
<product>acrobat_reader_dc:15.017.20053</product>
<product>reader:11.0.17</product>
</cve>
<cve id="CVE-2016-6948" level="LOW">
<product>acrobat:11.0.17</product>
<product>acrobat_dc:15.006.30201</product>
<product>acrobat_dc:15.017.20053</product>
<product>acrobat_reader_dc:15.006.30201</product>
<product>acrobat_reader_dc:15.017.20053</product>
<product>reader:11.0.17</product>
</cve>
<cve id="CVE-2016-6642" level="MEDIUM">
<product>vipr_srm:3.7.1</product>
</cve>
<cve id="CVE-2016-6643" level="MEDIUM">
<product>vipr_srm:3.7.1</product>
</cve>
<cve id="CVE-2016-6641" level="MEDIUM">
<product>vipr_srm:3.7.1</product>
</cve>
<cve id="CVE-2016-6646" level="LOW">
<product>solutions_enabler:8.0</product>
<product>solutions_enabler:8.0.3</product>
<product>solutions_enabler:8.1</product>
<product>solutions_enabler:8.1.2</product>
<product>solutions_enabler:8.3</product>
<product>unisphere:8.0</product>
<product>unisphere:8.0.3</product>
<product>unisphere:8.1</product>
<product>unisphere:8.1.2</product>
<product>unisphere:8.2</product>
</cve>
<cve id="CVE-2016-6647" level="MEDIUM">
<product>vipr_srm:4.0</product>
</cve>
<cve id="CVE-2016-6644" level="LOW">
<product>documentum_d2:4.5</product>
<product>documentum_d2:4.6</product>
</cve>
<cve id="CVE-2016-6645" level="LOW">
<product>solutions_enabler:8.0</product>
<product>solutions_enabler:8.0.3</product>
<product>solutions_enabler:8.1</product>
<product>solutions_enabler:8.1.2</product>
<product>solutions_enabler:8.2</product>
<product>unisphere:8.0</product>
<product>unisphere:8.0.3</product>
<product>unisphere:8.1</product>
<product>unisphere:8.1.2</product>
<product>unisphere:8.2</product>
</cve>
<cve id="CVE-2016-6648" level="LOW">
<product>recoverpoint:4.4.1.0</product>
<product>recoverpoint_for_virtual_machines:4.0</product>
</cve>
<cve id="CVE-2016-6649" level="LOW">
<product>recoverpoint:4.4.1.0</product>
<product>recoverpoint_for_virtual_machines:4.0</product>
</cve>
<cve id="CVE-2016-3421" level="LOW">
<product>peoplesoft_enterprise_peopletools:8.53</product>
<product>peoplesoft_enterprise_peopletools:8.54</product>
<product>peoplesoft_enterprise_peopletools:8.55</product>
</cve>
<cve id="CVE-2016-0265" level="MEDIUM">
<product>campaign:8.6</product>
<product>campaign:9.1</product>
<product>campaign:9.1.1</product>
<product>campaign:9.1.2</product>
</cve>
<cve id="CVE-2016-2402" level="MEDIUM">
<product>okhttp:2.7.3</product>
<product>okhttp3:3.0.0</product>
<product>okhttp3:3.0.0</product>
<product>okhttp3:3.0.1</product>
<product>okhttp3:3.1.0</product>
<product>okhttp3:3.1.1</product>
</cve>
<cve id="CVE-2016-0491" level="LOW">
<product>application_testing_suite:12.4.0.2</product>
<product>application_testing_suite:12.5.0.2</product>
</cve>
<cve id="CVE-2016-0490" level="LOW">
<product>application_testing_suite:12.4.0.2</product>
<product>application_testing_suite:12.5.0.2</product>
</cve>
<cve id="CVE-2016-0492" level="LOW">
<product>application_testing_suite:12.4.0.2</product>
<product>application_testing_suite:12.5.0.2</product>
</cve>
<cve id="CVE-2016-0147" level="MEDIUM">
<product>xml_core_services:3.0</product>
</cve>
<cve id="CVE-2016-0497" level="MEDIUM">
<product>agile_engineering_data_management:6.1.2.2</product>
<product>agile_engineering_data_management:6.1.3.0</product>
<product>agile_engineering_data_management:6.2.0.0</product>
</cve>
<cve id="CVE-2016-0496" level="MEDIUM">
<product>micros_cwdirect:12.5</product>
<product>micros_cwdirect:13.0</product>
<product>micros_cwdirect:14.0</product>
<product>micros_cwdirect:15.0</product>
<product>micros_cwdirect:16.0</product>
<product>micros_cwdirect:17.0</product>
<product>micros_cwdirect:18.0</product>
</cve>
<cve id="CVE-2016-0498" level="MEDIUM">
<product>agile_engineering_data_management:6.1.2.2</product>
<product>agile_engineering_data_management:6.1.3.0</product>
<product>agile_engineering_data_management:6.2.0.0</product>
</cve>
<cve id="CVE-2016-7011" level="LOW">
<product>acrobat:11.0.17</product>
<product>acrobat_dc:15.006.30201</product>
<product>acrobat_dc:15.017.20053</product>
<product>acrobat_reader_dc:15.006.30201</product>
<product>acrobat_reader_dc:15.017.20053</product>
<product>reader:11.0.17</product>
</cve>
<cve id="CVE-2016-4864" level="LOW">
<product>h2o:2.0.3</product>
<product>h2o:2.1.0</product>
</cve>
<cve id="CVE-2016-4860" level="LOW">
<product>stardom_fcn%2ffcj:r1.01</product>
<product>stardom_fcn%2ffcj:r2.01</product>
<product>stardom_fcn%2ffcj:r3.01</product>
<product>stardom_fcn%2ffcj:r4.01</product>
</cve>
<cve id="CVE-2016-4861" level="LOW">
<product>zend_framework:1.12.19</product>
<product>fedora:23</product>
<product>fedora:24</product>
<product>fedora:25</product>
</cve>
<cve id="CVE-2016-4862" level="LOW">
<product>cs-cart:4.3.9</product>
<product>cs-cart:4.3.9</product>
</cve>
<cve id="CVE-2016-4863" level="LOW">
<product>flashair:1.00.03</product>
<product>flashair:1.00.04</product>
<product>flashair:1.00.06</product>
<product>flashair:1.02</product>
<product>flashair:2.00.03</product>
<product>flashair:3.00.01</product>
<product>flashair:3.0.2</product>
</cve>
<cve id="CVE-2016-5975" level="MEDIUM">
<product>tealeaf_customer_experience:8.7</product>
<product>tealeaf_customer_experience:8.8</product>
<product>tealeaf_customer_experience:9.0.0</product>
<product>tealeaf_customer_experience:9.0.1</product>
<product>tealeaf_customer_experience:9.0.1a</product>
<product>tealeaf_customer_experience:9.0.2</product>
<product>tealeaf_customer_experience:9.0.2a</product>
</cve>
<cve id="CVE-2016-1918" level="MEDIUM">
<product>enterprise_server:12.4</product>
</cve>
<cve id="CVE-2016-5974" level="MEDIUM">
<product>security_privileged_identity_manager_virtual_appliance:2.0.2</product>
</cve>
<cve id="CVE-2016-7014" level="LOW">
<product>acrobat:11.0.17</product>
<product>acrobat_dc:15.006.30201</product>
<product>acrobat_dc:15.017.20053</product>
<product>acrobat_reader_dc:15.006.30201</product>
<product>acrobat_reader_dc:15.017.20053</product>
<product>reader:11.0.17</product>
</cve>
<cve id="CVE-2016-7015" level="LOW">
<product>acrobat:11.0.17</product>
<product>acrobat_dc:15.006.30201</product>
<product>acrobat_dc:15.017.20053</product>
<product>acrobat_reader_dc:15.006.30201</product>
<product>acrobat_reader_dc:15.017.20053</product>
<product>reader:11.0.17</product>
</cve>
<cve id="CVE-2016-5976" level="HIGH">
<product>tealeaf_customer_experience:8.7</product>
<product>tealeaf_customer_experience:8.8</product>
<product>tealeaf_customer_experience:9.0.0</product>
<product>tealeaf_customer_experience:9.0.1</product>
<product>tealeaf_customer_experience:9.0.1a</product>
<product>tealeaf_customer_experience:9.0.2</product>
<product>tealeaf_customer_experience:9.0.2a</product>
</cve>
<cve id="CVE-2016-7119" level="MEDIUM">
<product>dotnetnuke:08.00.04</product>
</cve>
<cve id="CVE-2016-7016" level="LOW">
<product>acrobat:11.0.17</product>
<product>acrobat_dc:15.006.30201</product>
<product>acrobat_dc:15.017.20053</product>
<product>acrobat_reader_dc:15.006.30201</product>
<product>acrobat_reader_dc:15.017.20053</product>
<product>reader:11.0.17</product>
</cve>
<cve id="CVE-2016-0729" level="LOW">
<product>xerces-c%5c%2b%5c%2b:3.1.2</product>
<product>fedora:22</product>
<product>fedora:23</product>
<product>fedora:24</product>
</cve>
<cve id="CVE-2016-7115" level="LOW">
<product>mac-telnet:0.4.3</product>
</cve>
<cve id="CVE-2016-0726" level="LOW">
<product>nagios:-</product>
</cve>
<cve id="CVE-2016-0725" level="MEDIUM">
<product>moodle:2.8</product>
<product>moodle:2.8.1</product>
<product>moodle:2.8.2</product>
<product>moodle:2.8.3</product>
<product>moodle:2.8.4</product>
<product>moodle:2.8.5</product>
<product>moodle:2.8.6</product>
<product>moodle:2.8.7</product>
<product>moodle:2.8.8</product>
<product>moodle:2.8.9</product>
<product>moodle:2.9</product>
<product>moodle:2.9.1</product>
<product>moodle:2.9.2</product>
<product>moodle:2.9.3</product>
<product>moodle:3.0</product>
<product>moodle:3.0.1</product>
<product>fedora:22</product>
<product>fedora:23</product>
</cve>
<cve id="CVE-2016-0724" level="LOW">
<product>moodle:2.6.11</product>
<product>moodle:2.7</product>
<product>moodle:2.7.1</product>
<product>moodle:2.7.2</product>
<product>moodle:2.7.3</product>
<product>moodle:2.7.4</product>
<product>moodle:2.7.5</product>
<product>moodle:2.7.6</product>
<product>moodle:2.7.7</product>
<product>moodle:2.7.8</product>
<product>moodle:2.7.9</product>
<product>moodle:2.7.10</product>
<product>moodle:2.7.11</product>
<product>moodle:2.8</product>
<product>moodle:2.8.1</product>
<product>moodle:2.8.2</product>
<product>moodle:2.8.3</product>
<product>moodle:2.8.4</product>
<product>moodle:2.8.5</product>
<product>moodle:2.8.6</product>
<product>moodle:2.8.7</product>
<product>moodle:2.8.8</product>
<product>moodle:2.8.9</product>
<product>moodle:2.9</product>
<product>moodle:2.9.1</product>
<product>moodle:2.9.2</product>
<product>moodle:2.9.3</product>
<product>moodle:3.0</product>
<product>moodle:3.0.1</product>
<product>fedora:22</product>
<product>fedora:23</product>
</cve>
<cve id="CVE-2016-7110" level="LOW">
<product>uma:v200r001c00spc100</product>
</cve>
<cve id="CVE-2016-7113" level="LOW">
<product>en100_ethernet_module_firmware:4.28</product>
</cve>
<cve id="CVE-2016-7112" level="LOW">
<product>en100_ethernet_module_firmware:4.28</product>
</cve>
<cve id="CVE-2016-9849" level="LOW">
<product>phpmyadmin:4.0.0</product>
<product>phpmyadmin:4.0.1</product>
<product>phpmyadmin:4.0.2</product>
<product>phpmyadmin:4.0.3</product>
<product>phpmyadmin:4.0.4</product>
<product>phpmyadmin:4.0.4.1</product>
<product>phpmyadmin:4.0.4.2</product>
<product>phpmyadmin:4.0.5</product>
<product>phpmyadmin:4.0.6</product>
<product>phpmyadmin:4.0.7</product>
<product>phpmyadmin:4.0.8</product>
<product>phpmyadmin:4.0.9</product>
<product>phpmyadmin:4.0.10</product>
<product>phpmyadmin:4.0.10.1</product>
<product>phpmyadmin:4.0.10.2</product>
<product>phpmyadmin:4.0.10.3</product>
<product>phpmyadmin:4.0.10.4</product>
<product>phpmyadmin:4.0.10.5</product>
<product>phpmyadmin:4.0.10.6</product>
<product>phpmyadmin:4.0.10.7</product>
<product>phpmyadmin:4.0.10.8</product>
<product>phpmyadmin:4.0.10.9</product>
<product>phpmyadmin:4.0.10.10</product>
<product>phpmyadmin:4.0.10.11</product>
<product>phpmyadmin:4.0.10.12</product>
<product>phpmyadmin:4.0.10.13</product>
<product>phpmyadmin:4.0.10.14</product>
<product>phpmyadmin:4.0.10.15</product>
<product>phpmyadmin:4.0.10.16</product>
<product>phpmyadmin:4.0.10.17</product>
<product>phpmyadmin:4.4.0</product>
<product>phpmyadmin:4.4.1</product>
<product>phpmyadmin:4.4.1.1</product>
<product>phpmyadmin:4.4.2</product>
<product>phpmyadmin:4.4.3</product>
<product>phpmyadmin:4.4.4</product>
<product>phpmyadmin:4.4.5</product>
<product>phpmyadmin:4.4.6</product>
<product>phpmyadmin:4.4.6.1</product>
<product>phpmyadmin:4.4.7</product>
<product>phpmyadmin:4.4.8</product>
<product>phpmyadmin:4.4.9</product>
<product>phpmyadmin:4.4.10</product>
<product>phpmyadmin:4.4.11</product>
<product>phpmyadmin:4.4.12</product>
<product>phpmyadmin:4.4.13</product>
<product>phpmyadmin:4.4.13.1</product>
<product>phpmyadmin:4.4.14</product>
<product>phpmyadmin:4.4.14.1</product>
<product>phpmyadmin:4.4.15</product>
<product>phpmyadmin:4.4.15.1</product>
<product>phpmyadmin:4.4.15.2</product>
<product>phpmyadmin:4.4.15.3</product>
<product>phpmyadmin:4.4.15.4</product>
<product>phpmyadmin:4.4.15.5</product>
<product>phpmyadmin:4.4.15.6</product>
<product>phpmyadmin:4.4.15.7</product>
<product>phpmyadmin:4.4.15.8</product>
<product>phpmyadmin:4.6.0</product>
<product>phpmyadmin:4.6.1</product>
<product>phpmyadmin:4.6.2</product>
<product>phpmyadmin:4.6.3</product>
<product>phpmyadmin:4.6.4</product>
</cve>
<cve id="CVE-2016-7018" level="LOW">
<product>acrobat:11.0.17</product>
<product>acrobat_dc:15.006.30201</product>
<product>acrobat_dc:15.017.20053</product>
<product>acrobat_reader_dc:15.006.30201</product>
<product>acrobat_reader_dc:15.017.20053</product>
<product>reader:11.0.17</product>
</cve>
<cve id="CVE-2016-7019" level="LOW">
<product>acrobat:11.0.17</product>
<product>acrobat_dc:15.006.30201</product>
<product>acrobat_dc:15.017.20053</product>
<product>acrobat_reader_dc:15.006.30201</product>
<product>acrobat_reader_dc:15.017.20053</product>
<product>reader:11.0.17</product>
</cve>
<cve id="CVE-2016-9841" level="LOW">
<product>zlib:1.2.8</product>
<product>leap:42.1</product>
<product>leap:42.2</product>
<product>opensuse:13.2</product>
</cve>
<cve id="CVE-2016-9840" level="MEDIUM">
<product>zlib:1.2.8</product>
<product>leap:42.1</product>
<product>leap:42.2</product>
<product>opensuse:13.2</product>
</cve>
<cve id="CVE-2016-9843" level="LOW">
<product>zlib:1.2.8</product>
<product>leap:42.1</product>
<product>leap:42.2</product>
<product>opensuse:13.2</product>
</cve>
<cve id="CVE-2016-5972" level="MEDIUM">
<product>security_privileged_identity_manager_virtual_appliance:2.0.2</product>
</cve>
<cve id="CVE-2016-9845" level="LOW">
<product>qemu</product>
</cve>
<cve id="CVE-2016-6543" level="MEDIUM">
<product>itrack_easy:-</product>
</cve>
<cve id="CVE-2016-9847" level="LOW">
<product>phpmyadmin:4.0.0</product>
<product>phpmyadmin:4.0.1</product>
<product>phpmyadmin:4.0.2</product>
<product>phpmyadmin:4.0.3</product>
<product>phpmyadmin:4.0.4</product>
<product>phpmyadmin:4.0.4.1</product>
<product>phpmyadmin:4.0.4.2</product>
<product>phpmyadmin:4.0.5</product>
<product>phpmyadmin:4.0.6</product>
<product>phpmyadmin:4.0.7</product>
<product>phpmyadmin:4.0.8</product>
<product>phpmyadmin:4.0.9</product>
<product>phpmyadmin:4.0.10</product>
<product>phpmyadmin:4.0.10.1</product>
<product>phpmyadmin:4.0.10.2</product>
<product>phpmyadmin:4.0.10.3</product>
<product>phpmyadmin:4.0.10.4</product>
<product>phpmyadmin:4.0.10.5</product>
<product>phpmyadmin:4.0.10.6</product>
<product>phpmyadmin:4.0.10.7</product>
<product>phpmyadmin:4.0.10.8</product>
<product>phpmyadmin:4.0.10.9</product>
<product>phpmyadmin:4.0.10.10</product>
<product>phpmyadmin:4.0.10.11</product>
<product>phpmyadmin:4.0.10.12</product>
<product>phpmyadmin:4.0.10.13</product>
<product>phpmyadmin:4.0.10.14</product>
<product>phpmyadmin:4.0.10.15</product>
<product>phpmyadmin:4.0.10.16</product>
<product>phpmyadmin:4.0.10.17</product>
<product>phpmyadmin:4.4.0</product>
<product>phpmyadmin:4.4.1</product>
<product>phpmyadmin:4.4.1.1</product>
<product>phpmyadmin:4.4.2</product>
<product>phpmyadmin:4.4.3</product>
<product>phpmyadmin:4.4.4</product>
<product>phpmyadmin:4.4.5</product>
<product>phpmyadmin:4.4.6</product>
<product>phpmyadmin:4.4.6.1</product>
<product>phpmyadmin:4.4.7</product>
<product>phpmyadmin:4.4.8</product>
<product>phpmyadmin:4.4.9</product>
<product>phpmyadmin:4.4.10</product>
<product>phpmyadmin:4.4.11</product>
<product>phpmyadmin:4.4.12</product>
<product>phpmyadmin:4.4.13</product>
<product>phpmyadmin:4.4.13.1</product>
<product>phpmyadmin:4.4.14</product>
<product>phpmyadmin:4.4.14.1</product>
<product>phpmyadmin:4.4.15</product>
<product>phpmyadmin:4.4.15.1</product>
<product>phpmyadmin:4.4.15.2</product>
<product>phpmyadmin:4.4.15.3</product>
<product>phpmyadmin:4.4.15.4</product>
<product>phpmyadmin:4.4.15.5</product>
<product>phpmyadmin:4.4.15.6</product>
<product>phpmyadmin:4.4.15.7</product>
<product>phpmyadmin:4.4.15.8</product>
<product>phpmyadmin:4.6.0</product>
<product>phpmyadmin:4.6.1</product>
<product>phpmyadmin:4.6.2</product>
<product>phpmyadmin:4.6.3</product>
<product>phpmyadmin:4.6.4</product>
</cve>
<cve id="CVE-2016-9846" level="LOW">
<product>qemu</product>
</cve>
<cve id="CVE-2016-10178" level="LOW">
<product>dwr-932b_firmware:02.02eu</product>
</cve>
<cve id="CVE-2016-10179" level="LOW">
<product>dwr-932b_firmware:02.02eu</product>
</cve>
<cve id="CVE-2016-10172" level="MEDIUM">
<product>wavpack:5.0.0</product>
</cve>
<cve id="CVE-2016-10173" level="LOW">
<product>archive-tar-minitar:0.5.2</product>
<product>minitar:0.5.4</product>
</cve>
<cve id="CVE-2016-10170" level="MEDIUM">
<product>wavpack:5.0.0</product>
</cve>
<cve id="CVE-2016-10171" level="MEDIUM">
<product>wavpack:5.0.0</product>
</cve>
<cve id="CVE-2016-10176" level="LOW">
<product>wnr2000v5_firmware:1.0.0.34</product>
</cve>
<cve id="CVE-2016-10177" level="LOW">
<product>dwr-932b_firmware:02.02eu</product>
</cve>
<cve id="CVE-2016-10174" level="LOW">
<product>wnr2000v5_firmware:1.0.0.34</product>
</cve>
<cve id="CVE-2016-10175" level="LOW">
<product>wnr2000v5_firmware:1.0.0.34</product>
</cve>
<cve id="CVE-2016-6547" level="LOW">
<product>nut_mobile:-</product>
</cve>
<cve id="CVE-2016-6546" level="LOW">
<product>itrackeasy:-</product>
</cve>
<cve id="CVE-2016-0268" level="LOW">
<product>financial_transaction_manager:2.1.1.2</product>
<product>financial_transaction_manager:2.1.1.2</product>
<product>financial_transaction_manager:2.1.1.2</product>
<product>financial_transaction_manager:3.0.0.0</product>
<product>financial_transaction_manager:3.0.0.0</product>
<product>financial_transaction_manager:3.0.0.0</product>
<product>financial_transaction_manager:3.0.0.1</product>
<product>financial_transaction_manager:3.0.0.1</product>
<product>financial_transaction_manager:3.0.0.1</product>
<product>financial_transaction_manager:3.0.0.2</product>
<product>financial_transaction_manager:3.0.0.2</product>
<product>financial_transaction_manager:3.0.0.2</product>
<product>financial_transaction_manager:3.0.0.3</product>
<product>financial_transaction_manager:3.0.0.3</product>
<product>financial_transaction_manager:3.0.0.3</product>
<product>financial_transaction_manager:3.0.0.4</product>
<product>financial_transaction_manager:3.0.0.4</product>
<product>financial_transaction_manager:3.0.0.4</product>
<product>financial_transaction_manager:3.0.0.5</product>
<product>financial_transaction_manager:3.0.0.5</product>
<product>financial_transaction_manager:3.0.0.5</product>
<product>financial_transaction_manager:3.0.0.6</product>
<product>financial_transaction_manager:3.0.0.6</product>
<product>financial_transaction_manager:3.0.0.6</product>
<product>financial_transaction_manager:3.0.0.7</product>
<product>financial_transaction_manager:3.0.0.7</product>
<product>financial_transaction_manager:3.0.0.7</product>
<product>financial_transaction_manager:3.0.0.8</product>
<product>financial_transaction_manager:3.0.0.8</product>
<product>financial_transaction_manager:3.0.0.8</product>
<product>financial_transaction_manager:3.0.0.9</product>
<product>financial_transaction_manager:3.0.0.9</product>
<product>financial_transaction_manager:3.0.0.9</product>
<product>financial_transaction_manager:3.0.0.10</product>
<product>financial_transaction_manager:3.0.0.10</product>
<product>financial_transaction_manager:3.0.0.10</product>
<product>financial_transaction_manager:3.0.0.11</product>
<product>financial_transaction_manager:3.0.0.11</product>
<product>financial_transaction_manager:3.0.0.11</product>
<product>financial_transaction_manager:3.0.0.12</product>
<product>financial_transaction_manager:3.0.0.12</product>
<product>financial_transaction_manager:3.0.0.12</product>
</cve>
<cve id="CVE-2016-0269" level="MEDIUM">
<product>bigfix_platform:9.0.5</product>
<product>bigfix_platform:9.0.6</product>
<product>bigfix_platform:9.0.7</product>
<product>bigfix_platform:9.0.8</product>
<product>bigfix_platform:9.1.3</product>
<product>bigfix_platform:9.1.4</product>
<product>bigfix_platform:9.1.5</product>
<product>bigfix_platform:9.1.6</product>
<product>bigfix_platform:9.1.7</product>
<product>bigfix_platform:9.2.0</product>
<product>bigfix_platform:9.2.1</product>
<product>bigfix_platform:9.2.2</product>
<product>bigfix_platform:9.2.3</product>
<product>bigfix_platform:9.2.4</product>
<product>bigfix_platform:9.2.5</product>
<product>bigfix_platform:9.2.6</product>
</cve>
<cve id="CVE-2016-10396" level="LOW">
<product>ipsec-tools:0.8.2</product>
</cve>
<cve id="CVE-2016-4393" level="MEDIUM">
<product>system_management_homepage:7.5.5.0</product>
</cve>
<cve id="CVE-2016-4390" level="MEDIUM">
<product>keyview:10.18.0.0</product>
<product>keyview:10.19.0.0</product>
<product>keyview:10.20.0.0</product>
<product>keyview:10.21.0.0</product>
<product>keyview:10.22.0.0</product>
<product>keyview:10.23.0.0</product>
<product>keyview:10.24.0.0</product>
</cve>
<cve id="CVE-2016-10395" level="LOW">
<product>flexnet_publisher:11.14.1</product>
</cve>
<cve id="CVE-2016-4396" level="LOW">
<product>system_management_homepage:7.5.5.0</product>
</cve>
<cve id="CVE-2016-4394" level="MEDIUM">
<product>system_management_homepage:7.5.5.0</product>
</cve>
<cve id="CVE-2016-4395" level="LOW">
<product>system_management_homepage:7.5.5.0</product>
</cve>
<cve id="CVE-2016-10399" level="LOW">
<product>sendio:8.2.0</product>
</cve>
<cve id="CVE-2016-0262" level="MEDIUM">
<product>maximo_asset_management:7.1.1</product>
<product>maximo_asset_management:7.1.1.1</product>
<product>maximo_asset_management:7.1.1.2</product>
<product>maximo_asset_management:7.1.1.3</product>
<product>maximo_asset_management:7.5.0.0</product>
<product>maximo_asset_management:7.5.0.1</product>
<product>maximo_asset_management:7.5.0.2</product>
<product>maximo_asset_management:7.5.0.3</product>
<product>maximo_asset_management:7.5.0.4</product>
<product>maximo_asset_management:7.5.0.5</product>
<product>maximo_asset_management:7.5.0.6</product>
<product>maximo_asset_management:7.5.0.7</product>
<product>maximo_asset_management:7.5.0.8</product>
<product>maximo_asset_management:7.5.0.9</product>
<product>maximo_asset_management:7.6.0.0</product>
<product>maximo_asset_management:7.6.0.1</product>
<product>maximo_asset_management:7.6.0.2</product>
<product>maximo_asset_management:7.6.0.3</product>
</cve>
<cve id="CVE-2016-0263" level="LOW">
<product>general_parallel_file_system_storage_server:3.5.0.1</product>
<product>general_parallel_file_system_storage_server:3.5.0.2</product>
<product>general_parallel_file_system_storage_server:3.5.0.3</product>
<product>general_parallel_file_system_storage_server:3.5.0.4</product>
<product>general_parallel_file_system_storage_server:3.5.0.5</product>
<product>general_parallel_file_system_storage_server:3.5.0.6</product>
<product>general_parallel_file_system_storage_server:3.5.0.7</product>
<product>general_parallel_file_system_storage_server:3.5.0.8</product>
<product>general_parallel_file_system_storage_server:3.5.0.9</product>
<product>general_parallel_file_system_storage_server:3.5.0.10</product>
<product>general_parallel_file_system_storage_server:3.5.0.11</product>
<product>general_parallel_file_system_storage_server:3.5.0.12</product>
<product>general_parallel_file_system_storage_server:3.5.0.13</product>
<product>general_parallel_file_system_storage_server:3.5.0.14</product>
<product>general_parallel_file_system_storage_server:3.5.0.15</product>
<product>general_parallel_file_system_storage_server:3.5.0.16</product>
<product>general_parallel_file_system_storage_server:3.5.0.17</product>
<product>general_parallel_file_system_storage_server:3.5.0.18</product>
<product>general_parallel_file_system_storage_server:3.5.0.19</product>
<product>general_parallel_file_system_storage_server:3.5.0.20</product>
<product>general_parallel_file_system_storage_server:3.5.0.21</product>
<product>general_parallel_file_system_storage_server:3.5.0.22</product>
<product>general_parallel_file_system_storage_server:3.5.0.23</product>
<product>general_parallel_file_system_storage_server:3.5.0.24</product>
<product>general_parallel_file_system_storage_server:3.5.0.25</product>
<product>general_parallel_file_system_storage_server:3.5.0.26</product>
<product>general_parallel_file_system_storage_server:3.5.0.27</product>
<product>general_parallel_file_system_storage_server:3.5.0.28</product>
<product>general_parallel_file_system_storage_server:3.5.0.29</product>
<product>spectrum_scale:4.1.1.1</product>
<product>spectrum_scale:4.1.1.2</product>
<product>spectrum_scale:4.1.1.3</product>
<product>spectrum_scale:4.1.1.4</product>
<product>spectrum_scale:4.2.0.0</product>
<product>spectrum_scale:4.2.0.1</product>
</cve>
<cve id="CVE-2016-0260" level="LOW">
<product>websphere_mq:8.0</product>
<product>websphere_mq:8.0.0.1</product>
<product>websphere_mq:8.0.0.2</product>
<product>websphere_mq:8.0.0.3</product>
<product>websphere_mq:8.0.0.4</product>
</cve>
<cve id="CVE-2016-9269" level="LOW">
<product>interscan_web_security_virtual_appliance:6.5</product>
</cve>
<cve id="CVE-2016-9268" level="LOW">
<product>dotclear:2.10.4</product>
</cve>
<cve id="CVE-2016-9265" level="MEDIUM">
<product>libming:0.4.7</product>
</cve>
<cve id="CVE-2016-9264" level="MEDIUM">
<product>libming:0.4.7</product>
</cve>
<cve id="CVE-2016-9266" level="MEDIUM">
<product>libming:0.4.7</product>
</cve>
<cve id="CVE-2016-9261" level="MEDIUM">
<product>log_correlation_engine:4.8</product>
</cve>
<cve id="CVE-2016-9260" level="MEDIUM">
<product>nessus:6.8.1</product>
</cve>
<cve id="CVE-2016-9262" level="MEDIUM">
<product>jasper:1.900.21</product>
</cve>
<cve id="CVE-2016-1458" level="LOW">
<product>firepower_management_center:4.10.3</product>
<product>firepower_management_center:5.2.0</product>
<product>firepower_management_center:5.3.0</product>
<product>firepower_management_center:5.3.1</product>
<product>firepower_management_center:5.4.0</product>
</cve>
<cve id="CVE-2016-1457" level="LOW">
<product>firepower_management_center:4.10.3.9</product>
<product>firepower_management_center:5.2.0</product>
<product>firepower_management_center:5.3.0.4</product>
<product>firepower_management_center:5.3.1</product>
<product>firepower_management_center:5.4.0</product>
</cve>
<cve id="CVE-2016-1454" level="MEDIUM">
<product>nx-os:4.0%280%29n1%281a%29</product>
<product>nx-os:4.0%280%29n1%282%29</product>
<product>nx-os:4.0%280%29n1%282a%29</product>
<product>nx-os:4.0%281a%29n1%281%29</product>
<product>nx-os:4.0%281a%29n1%281a%29</product>
<product>nx-os:4.0%281a%29n2%281%29</product>
<product>nx-os:4.0%281a%29n2%281a%29</product>
<product>nx-os:4.0%284%29sv1%281%29</product>
<product>nx-os:4.0%284%29sv1%282%29</product>
<product>nx-os:4.0%284%29sv1%283%29</product>
<product>nx-os:4.0%284%29sv1%283a%29</product>
<product>nx-os:4.0%284%29sv1%283b%29</product>
<product>nx-os:4.0%284%29sv1%283c%29</product>
<product>nx-os:4.0%284%29sv1%283d%29</product>
<product>nx-os:4.1%283%29n1%281%29</product>
<product>nx-os:4.1%283%29n1%281a%29</product>
<product>nx-os:4.1%283%29n2%281%29</product>
<product>nx-os:4.1%283%29n2%281a%29</product>
<product>nx-os:4.1.%282%29</product>
<product>nx-os:4.1.%283%29</product>
<product>nx-os:4.1.%284%29</product>
<product>nx-os:4.1.%285%29</product>
<product>nx-os:4.2%281%29n1%281%29</product>
<product>nx-os:4.2%281%29n2%281%29</product>
<product>nx-os:4.2%281%29n2%281a%29</product>
<product>nx-os:4.2%281%29sv1%284%29</product>
<product>nx-os:4.2%281%29sv1%284a%29</product>
<product>nx-os:4.2%281%29sv1%284b%29</product>
<product>nx-os:4.2%281%29sv1%285.1%29</product>
<product>nx-os:4.2%281%29sv1%285.1a%29</product>
<product>nx-os:4.2%281%29sv1%285.2%29</product>
<product>nx-os:4.2%281%29sv1%285.2b%29</product>
<product>nx-os:4.2%281%29sv2%281.1%29</product>
<product>nx-os:4.2%281%29sv2%281.1a%29</product>
<product>nx-os:4.2%281%29sv2%282.1%29</product>
<product>nx-os:4.2%281%29sv2%282.1a%29</product>
<product>nx-os:4.2%283%29</product>
<product>nx-os:4.2%284%29</product>
<product>nx-os:4.2%286%29</product>
<product>nx-os:4.2%288%29</product>
<product>nx-os:4.2.%282a%29</product>
<product>nx-os:5.0%282%29n1%281%29</product>
<product>nx-os:5.0%282%29n2%281%29</product>
<product>nx-os:5.0%282%29n2%281a%29</product>
<product>nx-os:5.0%282a%29</product>
<product>nx-os:5.0%283%29</product>
<product>nx-os:5.0%283%29n1%281c%29</product>
<product>nx-os:5.0%283%29n2%281%29</product>
<product>nx-os:5.0%283%29n2%282%29</product>
<product>nx-os:5.0%283%29n2%282a%29</product>
<product>nx-os:5.0%283%29n2%282b%29</product>
<product>nx-os:5.0%283%29u1%281%29</product>
<product>nx-os:5.0%283%29u1%281a%29</product>
<product>nx-os:5.0%283%29u1%281b%29</product>
<product>nx-os:5.0%283%29u1%281d%29</product>
<product>nx-os:5.0%283%29u1%282%29</product>
<product>nx-os:5.0%283%29u1%282a%29</product>
<product>nx-os:5.0%283%29u2%281%29</product>
<product>nx-os:5.0%283%29u2%282%29</product>
<product>nx-os:5.0%283%29u2%282a%29</product>
<product>nx-os:5.0%283%29u2%282b%29</product>
<product>nx-os:5.0%283%29u2%282c%29</product>
<product>nx-os:5.0%283%29u2%282d%29</product>
<product>nx-os:5.0%283%29u3%281%29</product>
<product>nx-os:5.0%283%29u3%282%29</product>
<product>nx-os:5.0%283%29u3%282a%29</product>
<product>nx-os:5.0%283%29u3%282b%29</product>
<product>nx-os:5.0%283%29u4%281%29</product>
<product>nx-os:5.0%283%29u5%281%29</product>
<product>nx-os:5.0%283%29u5%281a%29</product>
<product>nx-os:5.0%283%29u5%281b%29</product>
<product>nx-os:5.0%283%29u5%281c%29</product>
<product>nx-os:5.0%283%29u5%281d%29</product>
<product>nx-os:5.0%283%29u5%281e%29</product>
<product>nx-os:5.0%283%29u5%281f%29</product>
<product>nx-os:5.0%283%29u5%281g%29</product>
<product>nx-os:5.0%283%29u5%281h%29</product>
<product>nx-os:5.0%285%29</product>
<product>nx-os:5.1%281%29</product>
<product>nx-os:5.1%281a%29</product>
<product>nx-os:5.1%283%29</product>
<product>nx-os:5.1%283%29n1%281%29</product>
<product>nx-os:5.1%283%29n1%281a%29</product>
<product>nx-os:5.1%283%29n2%281%29</product>
<product>nx-os:5.1%283%29n2%281a%29</product>
<product>nx-os:5.1%283%29n2%281b%29</product>
<product>nx-os:5.1%283%29n2%281c%29</product>
<product>nx-os:5.1%284%29</product>
<product>nx-os:5.1%285%29</product>
<product>nx-os:5.1%286%29</product>
<product>nx-os:5.2%281%29</product>
<product>nx-os:5.2%281%29n1%281%29</product>
<product>nx-os:5.2%281%29n1%281a%29</product>
<product>nx-os:5.2%281%29n1%282%29</product>
<product>nx-os:5.2%281%29n1%282a%29</product>
<product>nx-os:5.2%281%29n1%283%29</product>
<product>nx-os:5.2%281%29n1%284%29</product>
<product>nx-os:5.2%281%29n1%285%29</product>
<product>nx-os:5.2%281%29n1%286%29</product>
<product>nx-os:5.2%281%29n1%287%29</product>
<product>nx-os:5.2%281%29n1%288%29</product>
<product>nx-os:5.2%281%29n1%288a%29</product>
<product>nx-os:5.2%281%29sv3%281.1%29</product>
<product>nx-os:5.2%281%29sv3%281.3%29</product>
<product>nx-os:5.2%281%29sv3%281.4%29</product>
<product>nx-os:5.2%281%29sv3%281.5a%29</product>
<product>nx-os:5.2%281%29sv3%281.5b%29</product>
<product>nx-os:5.2%281%29sv3%281.6%29</product>
<product>nx-os:5.2%281%29sv3%281.10%29</product>
<product>nx-os:5.2%283a%29</product>
<product>nx-os:5.2%284%29</product>
<product>nx-os:5.2%285%29</product>
<product>nx-os:5.2%287%29</product>
<product>nx-os:5.2%289%29</product>
<product>nx-os:5.2%289%29n1%281%29</product>
<product>nx-os:6.0%281%29</product>
<product>nx-os:6.0%282%29</product>
<product>nx-os:6.0%282%29a6%281%29</product>
<product>nx-os:6.0%282%29a6%282%29</product>
<product>nx-os:6.0%282%29a6%283%29</product>
<product>nx-os:6.0%282%29a6%284%29</product>
<product>nx-os:6.0%282%29a6%285%29</product>
<product>nx-os:6.0%282%29a6%286%29</product>
<product>nx-os:6.0%282%29a6%287%29</product>
<product>nx-os:6.0%282%29a6%288%29</product>
<product>nx-os:6.0%282%29a7%281%29</product>
<product>nx-os:6.0%282%29a7%282%29</product>
<product>nx-os:6.0%282%29a7%282a%29</product>
<product>nx-os:6.0%282%29a8%282%29</product>
<product>nx-os:6.0%282%29n1%281%29</product>
<product>nx-os:6.0%282%29n1%282%29</product>
<product>nx-os:6.0%282%29n1%282a%29</product>
<product>nx-os:6.0%282%29n2%281%29</product>
<product>nx-os:6.0%282%29n2%281b%29</product>
<product>nx-os:6.0%282%29n2%282%29</product>
<product>nx-os:6.0%282%29n2%283%29</product>
<product>nx-os:6.0%282%29n2%284%29</product>
<product>nx-os:6.0%282%29n2%285%29</product>
<product>nx-os:6.0%282%29n2%285a%29</product>
<product>nx-os:6.0%282%29n2%286%29</product>
<product>nx-os:6.0%282%29n2%287%29</product>
<product>nx-os:6.0%282%29u1%281a%29</product>
<product>nx-os:6.0%282%29u1%282%29</product>
<product>nx-os:6.0%282%29u1%283%29</product>
<product>nx-os:6.0%282%29u1%284%29</product>
<product>nx-os:6.0%282%29u2%281%29</product>
<product>nx-os:6.0%282%29u2%282%29</product>
<product>nx-os:6.0%282%29u2%283%29</product>
<product>nx-os:6.0%282%29u2%284%29</product>
<product>nx-os:6.0%282%29u2%285%29</product>
<product>nx-os:6.0%282%29u2%286%29</product>
<product>nx-os:6.0%282%29u3%281%29</product>
<product>nx-os:6.0%282%29u3%282%29</product>
<product>nx-os:6.0%282%29u3%283%29</product>
<product>nx-os:6.0%282%29u3%284%29</product>
<product>nx-os:6.0%282%29u3%285%29</product>
<product>nx-os:6.0%282%29u4%281%29</product>
<product>nx-os:6.0%282%29u4%282%29</product>
<product>nx-os:6.0%282%29u4%283%29</product>
<product>nx-os:6.0%282%29u5%281%29</product>
<product>nx-os:6.0%282%29u5%281.41%29</product>
<product>nx-os:6.0%282%29u5%282%29</product>
<product>nx-os:6.0%282%29u5%283%29</product>
<product>nx-os:6.0%282%29u5%284%29</product>
<product>nx-os:6.0%282%29u6%280.46%29</product>
<product>nx-os:6.0%282%29u6%281%29</product>
<product>nx-os:6.0%282%29u6%282%29</product>
<product>nx-os:6.0%282%29u6%283%29</product>
<product>nx-os:6.0%282%29u6%284%29</product>
<product>nx-os:6.0%282%29u6%285%29</product>
<product>nx-os:6.0%282%29u6%286%29</product>
<product>nx-os:6.0%282%29u6%287%29</product>
<product>nx-os:6.0%282%29u6%288%29</product>
<product>nx-os:6.0%283%29</product>
<product>nx-os:6.0%284%29</product>
<product>nx-os:6.1%281%29</product>
<product>nx-os:6.1%282%29</product>
<product>nx-os:6.1%282%29i2%281%29</product>
<product>nx-os:6.1%282%29i2%282%29</product>
<product>nx-os:6.1%282%29i2%282a%29</product>
<product>nx-os:6.1%282%29i2%282b%29</product>
<product>nx-os:6.1%282%29i2%283%29</product>
<product>nx-os:6.1%282%29i3%281%29</product>
<product>nx-os:6.1%282%29i3%282%29</product>
<product>nx-os:6.1%282%29i3%283%29</product>
<product>nx-os:6.1%282%29i3%283.78%29</product>
<product>nx-os:6.1%282%29i3%284%29</product>
<product>nx-os:6.1%283%29</product>
<product>nx-os:6.1%284%29</product>
<product>nx-os:6.1%284a%29</product>
<product>nx-os:6.1%285%29</product>
<product>nx-os:6.2%282%29</product>
<product>nx-os:6.2%282a%29</product>
<product>nx-os:6.2%286%29</product>
<product>nx-os:6.2%286b%29</product>
<product>nx-os:6.2%288%29</product>
<product>nx-os:6.2%288a%29</product>
<product>nx-os:6.2%288b%29</product>
<product>nx-os:6.2%2810%29</product>
<product>nx-os:6.2%2812%29</product>
<product>nx-os:6.2%2814%29s1</product>
<product>nx-os:7.0%280%29n1%281%29</product>
<product>nx-os:7.0%281%29n1%281%29</product>
<product>nx-os:7.0%282%29n1%281%29</product>
<product>nx-os:7.0%283%29</product>
<product>nx-os:7.0%283%29i1%281%29</product>
<product>nx-os:7.0%283%29i1%281a%29</product>
<product>nx-os:7.0%283%29i1%281b%29</product>
<product>nx-os:7.0%283%29i1%282%29</product>
<product>nx-os:7.0%283%29i2%280.373%29</product>
<product>nx-os:7.0%283%29n1%281%29</product>
<product>nx-os:7.0%284%29n1%281%29</product>
<product>nx-os:7.0%285%29n1%281%29</product>
<product>nx-os:7.0%285%29n1%281a%29</product>
<product>nx-os:7.0%286%29n1%281%29</product>
<product>nx-os:7.0%287%29n1%281%29</product>
<product>nx-os:7.0%288%29n1%281%29</product>
<product>nx-os:7.1%280%29n1%281a%29</product>
<product>nx-os:7.1%280%29n1%281b%29</product>
<product>nx-os:7.1%281%29n1%281%29</product>
<product>nx-os:7.1%282%29n1%281%29</product>
<product>nx-os:7.1%283%29n1%281%29</product>
<product>nx-os:7.1%283%29n1%282%29</product>
<product>nx-os:7.1%284%29n1%281%29</product>
<product>nx-os:7.2%280%29n1%280.1%29</product>
<product>nx-os:7.2%280%29n1%281%29</product>
<product>nx-os:7.2%281%29n1%281%29</product>
<product>nx-os:11.0%281b%29</product>
<product>nx-os:11.0%281c%29</product>
<product>nx-os:11.0%281d%29</product>
<product>nx-os:11.0%281e%29</product>
<product>nx-os:11.0%282j%29</product>
<product>nx-os:11.0%282m%29</product>
<product>nx-os:11.0%283f%29</product>
<product>nx-os:11.0%283i%29</product>
<product>nx-os:11.0%283k%29</product>
<product>nx-os:11.0%283n%29</product>
<product>nx-os:11.0%284h%29</product>
<product>nx-os:11.0%284o%29</product>
<product>nx-os:11.1%281c%29</product>
<product>nx-os:11.1%281j%29</product>
<product>nx-os:11.1%281o%29</product>
<product>nx-os:11.1%281r%29</product>
<product>nx-os:11.1%281s%29</product>
<product>nx-os:11.1%282h%29</product>
<product>nx-os:11.1%282i%29</product>
<product>nx-os:11.1%283f%29</product>
<product>nx-os:11.1%284e%29</product>
<product>nx-os:11.1%284f%29</product>
<product>nx-os:11.1%284g%29</product>
<product>nx-os:11.1%284i%29</product>
<product>nx-os:11.1%284l%29</product>
<product>nx-os:11.1%284m%29</product>
<product>nx-os:11.2%281m%29</product>
<product>nx-os:11.2%282g%29</product>
<product>nx-os:11.2%282h%29</product>
<product>nx-os:11.2%282i%29</product>
<product>nx-os:11.2%283c%29</product>
<product>nx-os:11.2%283e%29</product>
<product>nx-os:11.2%283h%29</product>
<product>nx-os:11.3%281i%29</product>
<product>nx-os:11.3%282f%29</product>
<product>nx-os:11.3%282h%29</product>
<product>nx-os:11.3%282i%29</product>
<product>nx-os:base</product>
</cve>
<cve id="CVE-2016-1455" level="LOW">
<product>nx-os:7.0%283%29</product>
<product>nx-os:7.0%283%29i1%281%29</product>
<product>nx-os:7.0%283%29i1%281a%29</product>
<product>nx-os:7.0%283%29i1%281b%29</product>
<product>nx-os:7.0%283%29i1%282%29</product>
</cve>
<cve id="CVE-2016-1452" level="LOW">
<product>asr_5000_software:18.3.0</product>
<product>asr_5000_software:18.3_base</product>
<product>asr_5000_software:19.0.1</product>
<product>asr_5000_software:19.0.m0.60737</product>
<product>asr_5000_software:19.0.m0.60828</product>
<product>asr_5000_software:19.0.m0.61045</product>
<product>asr_5000_software:19.1.0</product>
<product>asr_5000_software:19.1.0.61559</product>
<product>asr_5000_software:19.2.0</product>
<product>asr_5000_software:19.3.0</product>
<product>asr_5000_software:20.0.0</product>
<product>asr_5000:-</product>
</cve>
<cve id="CVE-2016-1453" level="LOW">
<product>nx-os:4.1.%282%29</product>
<product>nx-os:4.1.%283%29</product>
<product>nx-os:4.1.%284%29</product>
<product>nx-os:4.1.%285%29</product>
<product>nx-os:4.2%283%29</product>
<product>nx-os:4.2%284%29</product>
<product>nx-os:4.2%286%29</product>
<product>nx-os:4.2%288%29</product>
<product>nx-os:4.2.%282a%29</product>
<product>nx-os:5.0%282a%29</product>
<product>nx-os:5.0%283%29</product>
<product>nx-os:5.0%285%29</product>
<product>nx-os:5.1%281%29</product>
<product>nx-os:5.1%281a%29</product>
<product>nx-os:5.1%283%29</product>
<product>nx-os:5.1%284%29</product>
<product>nx-os:5.1%285%29</product>
<product>nx-os:5.1%286%29</product>
<product>nx-os:5.2%281%29</product>
<product>nx-os:5.2%283a%29</product>
<product>nx-os:5.2%284%29</product>
<product>nx-os:5.2%285%29</product>
<product>nx-os:5.2%287%29</product>
<product>nx-os:5.2%289%29</product>
<product>nx-os:6.0%281%29</product>
<product>nx-os:6.0%282%29</product>
<product>nx-os:6.0%283%29</product>
<product>nx-os:6.0%284%29</product>
<product>nx-os:6.1%281%29</product>
<product>nx-os:6.1%282%29</product>
<product>nx-os:6.1%283%29</product>
<product>nx-os:6.1%284%29</product>
<product>nx-os:6.1%284a%29</product>
<product>nx-os:6.1%285%29</product>
<product>nx-os:6.2%282%29</product>
<product>nx-os:6.2%282a%29</product>
<product>nx-os:6.2%286%29</product>
<product>nx-os:6.2%286b%29</product>
<product>nx-os:6.2%288%29</product>
<product>nx-os:6.2%288a%29</product>
<product>nx-os:6.2%288b%29</product>
<product>nx-os:6.2%2810%29</product>
<product>nx-os:6.2%2812%29</product>
<product>nx-os:6.2%2814%29s1</product>
<product>nx-os:7.2%280%29n1%280.1%29</product>
<product>nx-os:base</product>
</cve>
<cve id="CVE-2016-1450" level="MEDIUM">
<product>webex_meetings_server:2.6.0</product>
<product>webex_meetings_server:2.6.1.39</product>
</cve>
<cve id="CVE-2016-1451" level="MEDIUM">
<product>meeting_server:1.7_base</product>
<product>meeting_server:1.8_base</product>
<product>meeting_server:1.9_base</product>
</cve>
<cve id="CVE-2016-2390" level="MEDIUM">
<product>squid:3.5.13</product>
<product>squid:4.0.4</product>
<product>squid:4.0.5</product>
</cve>
<cve id="CVE-2016-2393" level="LOW">
<product>fingerprint_manager:8.01.56</product>
<product>touch_fingerprint:1.00.07</product>
</cve>
<cve id="CVE-2016-2396" level="LOW">
<product>analyzer:7.2</product>
<product>analyzer:8.0</product>
<product>analyzer:8.1</product>
<product>global_management_system:7.2</product>
<product>global_management_system:8.0</product>
<product>global_management_system:8.1</product>
<product>uma_em5000_firmware:7.2</product>
<product>uma_em5000_firmware:8.0</product>
<product>uma_em5000_firmware:8.1</product>
</cve>
<cve id="CVE-2016-2397" level="LOW">
<product>analyzer:7.2</product>
<product>analyzer:8.0</product>
<product>analyzer:8.1</product>
<product>global_management_system:7.2</product>
<product>global_management_system:8.0</product>
<product>global_management_system:8.1</product>
<product>uma_em5000_firmware:7.2</product>
<product>uma_em5000_firmware:8.0</product>
<product>uma_em5000_firmware:8.1</product>
</cve>
<cve id="CVE-2016-2398" level="LOW">
<product>xfinity_home_security_system</product>
</cve>
<cve id="CVE-2016-2399" level="MEDIUM">
<product>libquicktime:1.2.4</product>
</cve>
<cve id="CVE-2016-1000138" level="MEDIUM">
<product>indexisto:1.0.5</product>
</cve>
<cve id="CVE-2016-1000139" level="MEDIUM">
<product>infusionsoft:1.5.11</product>
</cve>
<cve id="CVE-2016-1000130" level="MEDIUM">
<product>e-search:1.0</product>
</cve>
<cve id="CVE-2016-1000131" level="MEDIUM">
<product>esearch:1.0</product>
</cve>
<cve id="CVE-2016-1000132" level="MEDIUM">
<product>enhanced-tooltipglossary:3.2.8</product>
</cve>
<cve id="CVE-2016-1000133" level="MEDIUM">
<product>forget-about-shorcode-buttons:1.1.1</product>
</cve>
<cve id="CVE-2016-1000134" level="MEDIUM">
<product>hdw-tube:1.2</product>
</cve>
<cve id="CVE-2016-1000135" level="MEDIUM">
<product>hdw-tube:1.2</product>
</cve>
<cve id="CVE-2016-1000136" level="MEDIUM">
<product>heat-trackr:1.0</product>
</cve>
<cve id="CVE-2016-1000137" level="MEDIUM">
<product>hero-maps-pro:2.1.0</product>
</cve>
<cve id="CVE-2016-5519" level="LOW">
<product>glassfish_server:2.1.1</product>
<product>glassfish_server:3.0.1</product>
<product>glassfish_server:3.1.2</product>
</cve>
<cve id="CVE-2016-5518" level="MEDIUM">
<product>agile_engineering_data_management:6.1.3.0</product>
<product>agile_engineering_data_management:6.2.0.0</product>
</cve>
<cve id="CVE-2016-5513" level="LOW">
<product>agile_product_lifecycle_management_framework:9.3.4</product>
<product>agile_product_lifecycle_management_framework:9.3.5</product>
</cve>
<cve id="CVE-2016-5512" level="MEDIUM">
<product>agile_product_lifecycle_management_framework:9.3.4</product>
<product>agile_product_lifecycle_management_framework:9.3.5</product>
</cve>
<cve id="CVE-2016-5511" level="MEDIUM">
<product>webcenter_sites:12.2.1.0.0</product>
<product>webcenter_sites:12.2.1.1.0</product>
<product>webcenter_sites:12.2.1.2.0</product>
</cve>
<cve id="CVE-2016-5510" level="LOW">
<product>agile_product_lifecycle_management_framework:9.3.4</product>
<product>agile_product_lifecycle_management_framework:9.3.5</product>
</cve>
<cve id="CVE-2016-5517" level="LOW">
<product>applications_dba:12.1.3</product>
</cve>
<cve id="CVE-2016-1000352" level="MEDIUM">
<product>legion-of-the-bouncy-castle-java-crytography-api:1.55</product>
</cve>
<cve id="CVE-2016-5514" level="LOW">
<product>agile_product_lifecycle_management_framework:9.3.4</product>
<product>agile_product_lifecycle_management_framework:9.3.5</product>
</cve>
<cve id="CVE-2016-1209" level="LOW">
<product>ninja_forms:2.9.42</product>
</cve>
<cve id="CVE-2016-7552" level="LOW">
<product>threat_discovery_appliance:2.6.1062</product>
</cve>
<cve id="CVE-2016-0932" level="MEDIUM">
<product>acrobat:11.0.0</product>
<product>acrobat:11.0.1</product>
<product>acrobat:11.0.2</product>
<product>acrobat:11.0.3</product>
<product>acrobat:11.0.4</product>
<product>acrobat:11.0.5</product>
<product>acrobat:11.0.6</product>
<product>acrobat:11.0.7</product>
<product>acrobat:11.0.8</product>
<product>acrobat:11.0.9</product>
<product>acrobat:11.0.10</product>
<product>acrobat:11.0.11</product>
<product>acrobat:11.0.12</product>
<product>acrobat:11.0.13</product>
<product>acrobat_dc:15.006.30097</product>
<product>acrobat_dc:15.009.20077</product>
<product>acrobat_reader:11.0.0</product>
<product>acrobat_reader:11.0.1</product>
<product>acrobat_reader:11.0.2</product>
<product>acrobat_reader:11.0.3</product>
<product>acrobat_reader:11.0.4</product>
<product>acrobat_reader:11.0.5</product>
<product>acrobat_reader:11.0.6</product>
<product>acrobat_reader:11.0.7</product>
<product>acrobat_reader:11.0.8</product>
<product>acrobat_reader:11.0.9</product>
<product>acrobat_reader:11.0.10</product>
<product>acrobat_reader:11.0.11</product>
<product>acrobat_reader:11.0.12</product>
<product>acrobat_reader:11.0.13</product>
<product>acrobat_reader_dc:15.006.30097</product>
<product>acrobat_reader_dc:15.009.20077</product>
</cve>
<cve id="CVE-2016-0933" level="LOW">
<product>acrobat:11.0.0</product>
<product>acrobat:11.0.1</product>
<product>acrobat:11.0.2</product>
<product>acrobat:11.0.3</product>
<product>acrobat:11.0.4</product>
<product>acrobat:11.0.5</product>
<product>acrobat:11.0.6</product>
<product>acrobat:11.0.7</product>
<product>acrobat:11.0.8</product>
<product>acrobat:11.0.9</product>
<product>acrobat:11.0.10</product>
<product>acrobat:11.0.11</product>
<product>acrobat:11.0.12</product>
<product>acrobat:11.0.13</product>
<product>acrobat_dc:15.006.30097</product>
<product>acrobat_dc:15.009.20077</product>
<product>acrobat_reader:11.0.0</product>
<product>acrobat_reader:11.0.1</product>
<product>acrobat_reader:11.0.2</product>
<product>acrobat_reader:11.0.3</product>
<product>acrobat_reader:11.0.4</product>
<product>acrobat_reader:11.0.5</product>
<product>acrobat_reader:11.0.6</product>
<product>acrobat_reader:11.0.7</product>
<product>acrobat_reader:11.0.8</product>
<product>acrobat_reader:11.0.9</product>
<product>acrobat_reader:11.0.10</product>
<product>acrobat_reader:11.0.11</product>
<product>acrobat_reader:11.0.12</product>
<product>acrobat_reader:11.0.13</product>
<product>acrobat_reader_dc:15.006.30097</product>
<product>acrobat_reader_dc:15.009.20077</product>
</cve>
<cve id="CVE-2016-0930" level="LOW">
<product>operations_manager:1.6.18</product>
<product>operations_manager:1.7.0</product>
<product>operations_manager:1.7.1</product>
<product>operations_manager:1.7.2</product>
<product>operations_manager:1.7.3</product>
<product>operations_manager:1.7.4</product>
<product>operations_manager:1.7.5</product>
<product>operations_manager:1.7.6</product>
<product>operations_manager:1.7.7</product>
<product>operations_manager:1.7.8</product>
<product>operations_manager:1.7.9</product>
</cve>
<cve id="CVE-2016-0931" level="MEDIUM">
<product>acrobat:11.0.0</product>
<product>acrobat:11.0.1</product>
<product>acrobat:11.0.2</product>
<product>acrobat:11.0.3</product>
<product>acrobat:11.0.4</product>
<product>acrobat:11.0.5</product>
<product>acrobat:11.0.6</product>
<product>acrobat:11.0.7</product>
<product>acrobat:11.0.8</product>
<product>acrobat:11.0.9</product>
<product>acrobat:11.0.10</product>
<product>acrobat:11.0.11</product>
<product>acrobat:11.0.12</product>
<product>acrobat:11.0.13</product>
<product>acrobat_dc:15.006.30097</product>
<product>acrobat_dc:15.009.20077</product>
<product>acrobat_reader:11.0.0</product>
<product>acrobat_reader:11.0.1</product>
<product>acrobat_reader:11.0.2</product>
<product>acrobat_reader:11.0.3</product>
<product>acrobat_reader:11.0.4</product>
<product>acrobat_reader:11.0.5</product>
<product>acrobat_reader:11.0.6</product>
<product>acrobat_reader:11.0.7</product>
<product>acrobat_reader:11.0.8</product>
<product>acrobat_reader:11.0.9</product>
<product>acrobat_reader:11.0.10</product>
<product>acrobat_reader:11.0.11</product>
<product>acrobat_reader:11.0.12</product>
<product>acrobat_reader:11.0.13</product>
<product>acrobat_reader_dc:15.006.30097</product>
<product>acrobat_reader_dc:15.009.20077</product>
</cve>
<cve id="CVE-2016-0936" level="MEDIUM">
<product>acrobat:11.0.0</product>
<product>acrobat:11.0.1</product>
<product>acrobat:11.0.2</product>
<product>acrobat:11.0.3</product>
<product>acrobat:11.0.4</product>
<product>acrobat:11.0.5</product>
<product>acrobat:11.0.6</product>
<product>acrobat:11.0.7</product>
<product>acrobat:11.0.8</product>
<product>acrobat:11.0.9</product>
<product>acrobat:11.0.10</product>
<product>acrobat:11.0.11</product>
<product>acrobat:11.0.12</product>
<product>acrobat:11.0.13</product>
<product>acrobat_dc:15.006.30097</product>
<product>acrobat_dc:15.009.20077</product>
<product>acrobat_reader:11.0.0</product>
<product>acrobat_reader:11.0.1</product>
<product>acrobat_reader:11.0.2</product>
<product>acrobat_reader:11.0.3</product>
<product>acrobat_reader:11.0.4</product>
<product>acrobat_reader:11.0.5</product>
<product>acrobat_reader:11.0.6</product>
<product>acrobat_reader:11.0.7</product>
<product>acrobat_reader:11.0.8</product>
<product>acrobat_reader:11.0.9</product>
<product>acrobat_reader:11.0.10</product>
<product>acrobat_reader:11.0.11</product>
<product>acrobat_reader:11.0.12</product>
<product>acrobat_reader:11.0.13</product>
<product>acrobat_reader_dc:15.006.30097</product>
<product>acrobat_reader_dc:15.009.20077</product>
</cve>
<cve id="CVE-2016-0937" level="MEDIUM">
<product>acrobat:11.0.0</product>
<product>acrobat:11.0.1</product>
<product>acrobat:11.0.2</product>
<product>acrobat:11.0.3</product>
<product>acrobat:11.0.4</product>
<product>acrobat:11.0.5</product>
<product>acrobat:11.0.6</product>
<product>acrobat:11.0.7</product>
<product>acrobat:11.0.8</product>
<product>acrobat:11.0.9</product>
<product>acrobat:11.0.10</product>
<product>acrobat:11.0.11</product>
<product>acrobat:11.0.12</product>
<product>acrobat:11.0.13</product>
<product>acrobat_dc:15.006.30097</product>
<product>acrobat_dc:15.009.20077</product>
<product>acrobat_reader:11.0.0</product>
<product>acrobat_reader:11.0.1</product>
<product>acrobat_reader:11.0.2</product>
<product>acrobat_reader:11.0.3</product>
<product>acrobat_reader:11.0.4</product>
<product>acrobat_reader:11.0.5</product>
<product>acrobat_reader:11.0.6</product>
<product>acrobat_reader:11.0.7</product>
<product>acrobat_reader:11.0.8</product>
<product>acrobat_reader:11.0.9</product>
<product>acrobat_reader:11.0.10</product>
<product>acrobat_reader:11.0.11</product>
<product>acrobat_reader:11.0.12</product>
<product>acrobat_reader:11.0.13</product>
<product>acrobat_reader_dc:15.006.30097</product>
<product>acrobat_reader_dc:15.009.20077</product>
</cve>
<cve id="CVE-2016-0934" level="MEDIUM">
<product>acrobat:11.0.0</product>
<product>acrobat:11.0.1</product>
<product>acrobat:11.0.2</product>
<product>acrobat:11.0.3</product>
<product>acrobat:11.0.4</product>
<product>acrobat:11.0.5</product>
<product>acrobat:11.0.6</product>
<product>acrobat:11.0.7</product>
<product>acrobat:11.0.8</product>
<product>acrobat:11.0.9</product>
<product>acrobat:11.0.10</product>
<product>acrobat:11.0.11</product>
<product>acrobat:11.0.12</product>
<product>acrobat:11.0.13</product>
<product>acrobat_dc:15.006.30097</product>
<product>acrobat_dc:15.009.20077</product>
<product>acrobat_reader:11.0.0</product>
<product>acrobat_reader:11.0.1</product>
<product>acrobat_reader:11.0.2</product>
<product>acrobat_reader:11.0.3</product>
<product>acrobat_reader:11.0.4</product>
<product>acrobat_reader:11.0.5</product>
<product>acrobat_reader:11.0.6</product>
<product>acrobat_reader:11.0.7</product>
<product>acrobat_reader:11.0.8</product>
<product>acrobat_reader:11.0.9</product>
<product>acrobat_reader:11.0.10</product>
<product>acrobat_reader:11.0.11</product>
<product>acrobat_reader:11.0.12</product>
<product>acrobat_reader:11.0.13</product>
<product>acrobat_reader_dc:15.006.30097</product>
<product>acrobat_reader_dc:15.009.20077</product>
</cve>
<cve id="CVE-2016-0935" level="MEDIUM">
<product>acrobat:11.0.0</product>
<product>acrobat:11.0.1</product>
<product>acrobat:11.0.2</product>
<product>acrobat:11.0.3</product>
<product>acrobat:11.0.4</product>
<product>acrobat:11.0.5</product>
<product>acrobat:11.0.6</product>
<product>acrobat:11.0.7</product>
<product>acrobat:11.0.8</product>
<product>acrobat:11.0.9</product>
<product>acrobat:11.0.10</product>
<product>acrobat:11.0.11</product>
<product>acrobat:11.0.12</product>
<product>acrobat:11.0.13</product>
<product>acrobat_dc:15.006.30097</product>
<product>acrobat_dc:15.009.20077</product>
<product>acrobat_reader:11.0.0</product>
<product>acrobat_reader:11.0.1</product>
<product>acrobat_reader:11.0.2</product>
<product>acrobat_reader:11.0.3</product>
<product>acrobat_reader:11.0.4</product>
<product>acrobat_reader:11.0.5</product>
<product>acrobat_reader:11.0.6</product>
<product>acrobat_reader:11.0.7</product>
<product>acrobat_reader:11.0.8</product>
<product>acrobat_reader:11.0.9</product>
<product>acrobat_reader:11.0.10</product>
<product>acrobat_reader:11.0.11</product>
<product>acrobat_reader:11.0.12</product>
<product>acrobat_reader:11.0.13</product>
<product>acrobat_reader_dc:15.006.30097</product>
<product>acrobat_reader_dc:15.009.20077</product>
</cve>
<cve id="CVE-2016-0938" level="MEDIUM">
<product>acrobat:11.0.0</product>
<product>acrobat:11.0.1</product>
<product>acrobat:11.0.2</product>
<product>acrobat:11.0.3</product>
<product>acrobat:11.0.4</product>
<product>acrobat:11.0.5</product>
<product>acrobat:11.0.6</product>
<product>acrobat:11.0.7</product>
<product>acrobat:11.0.8</product>
<product>acrobat:11.0.9</product>
<product>acrobat:11.0.10</product>
<product>acrobat:11.0.11</product>
<product>acrobat:11.0.12</product>
<product>acrobat:11.0.13</product>
<product>acrobat_dc:15.006.30097</product>
<product>acrobat_dc:15.009.20077</product>
<product>acrobat_reader:11.0.0</product>
<product>acrobat_reader:11.0.1</product>
<product>acrobat_reader:11.0.2</product>
<product>acrobat_reader:11.0.3</product>
<product>acrobat_reader:11.0.4</product>
<product>acrobat_reader:11.0.5</product>
<product>acrobat_reader:11.0.6</product>
<product>acrobat_reader:11.0.7</product>
<product>acrobat_reader:11.0.8</product>
<product>acrobat_reader:11.0.9</product>
<product>acrobat_reader:11.0.10</product>
<product>acrobat_reader:11.0.11</product>
<product>acrobat_reader:11.0.12</product>
<product>acrobat_reader:11.0.13</product>
<product>acrobat_reader_dc:15.006.30097</product>
<product>acrobat_reader_dc:15.009.20077</product>
</cve>
<cve id="CVE-2016-0939" level="MEDIUM">
<product>acrobat:11.0.0</product>
<product>acrobat:11.0.1</product>
<product>acrobat:11.0.2</product>
<product>acrobat:11.0.3</product>
<product>acrobat:11.0.4</product>
<product>acrobat:11.0.5</product>
<product>acrobat:11.0.6</product>
<product>acrobat:11.0.7</product>
<product>acrobat:11.0.8</product>
<product>acrobat:11.0.9</product>
<product>acrobat:11.0.10</product>
<product>acrobat:11.0.11</product>
<product>acrobat:11.0.12</product>
<product>acrobat:11.0.13</product>
<product>acrobat_dc:15.006.30097</product>
<product>acrobat_dc:15.009.20077</product>
<product>acrobat_reader:11.0.0</product>
<product>acrobat_reader:11.0.1</product>
<product>acrobat_reader:11.0.2</product>
<product>acrobat_reader:11.0.3</product>
<product>acrobat_reader:11.0.4</product>
<product>acrobat_reader:11.0.5</product>
<product>acrobat_reader:11.0.6</product>
<product>acrobat_reader:11.0.7</product>
<product>acrobat_reader:11.0.8</product>
<product>acrobat_reader:11.0.9</product>
<product>acrobat_reader:11.0.10</product>
<product>acrobat_reader:11.0.11</product>
<product>acrobat_reader:11.0.12</product>
<product>acrobat_reader:11.0.13</product>
<product>acrobat_reader_dc:15.006.30097</product>
<product>acrobat_reader_dc:15.009.20077</product>
</cve>
<cve id="CVE-2016-6097" level="LOW">
<product>security_key_lifecycle_manager:2.5.0.0</product>
<product>security_key_lifecycle_manager:2.5.0.1</product>
<product>security_key_lifecycle_manager:2.5.0.2</product>
<product>security_key_lifecycle_manager:2.5.0.3</product>
<product>security_key_lifecycle_manager:2.5.0.4</product>
<product>security_key_lifecycle_manager:2.5.0.5</product>
<product>security_key_lifecycle_manager:2.5.0.6</product>
<product>security_key_lifecycle_manager:2.5.0.7</product>
<product>security_key_lifecycle_manager:2.6.0.0</product>
<product>security_key_lifecycle_manager:2.6.0.1</product>
<product>security_key_lifecycle_manager:2.6.0.2</product>
<product>tivoli_key_lifecycle_manager:2.0.1</product>
<product>tivoli_key_lifecycle_manager:2.0.1.1</product>
<product>tivoli_key_lifecycle_manager:2.0.1.2</product>
<product>tivoli_key_lifecycle_manager:2.0.1.3</product>
<product>tivoli_key_lifecycle_manager:2.0.1.4</product>
<product>tivoli_key_lifecycle_manager:2.0.1.5</product>
<product>tivoli_key_lifecycle_manager:2.0.1.6</product>
<product>tivoli_key_lifecycle_manager:2.0.1.7</product>
<product>tivoli_key_lifecycle_manager:2.0.1.8</product>
</cve>
<cve id="CVE-2016-6096" level="MEDIUM">
<product>security_key_lifecycle_manager:2.5.0.0</product>
<product>security_key_lifecycle_manager:2.5.0.1</product>
<product>security_key_lifecycle_manager:2.5.0.2</product>
<product>security_key_lifecycle_manager:2.5.0.3</product>
<product>security_key_lifecycle_manager:2.5.0.4</product>
<product>security_key_lifecycle_manager:2.5.0.5</product>
<product>security_key_lifecycle_manager:2.5.0.6</product>
<product>security_key_lifecycle_manager:2.5.0.7</product>
<product>security_key_lifecycle_manager:2.6.0.0</product>
<product>security_key_lifecycle_manager:2.6.0.1</product>
<product>security_key_lifecycle_manager:2.6.0.2</product>
<product>tivoli_key_lifecycle_manager:2.0.1</product>
<product>tivoli_key_lifecycle_manager:2.0.1.1</product>
<product>tivoli_key_lifecycle_manager:2.0.1.2</product>
<product>tivoli_key_lifecycle_manager:2.0.1.3</product>
<product>tivoli_key_lifecycle_manager:2.0.1.4</product>
<product>tivoli_key_lifecycle_manager:2.0.1.5</product>
<product>tivoli_key_lifecycle_manager:2.0.1.6</product>
<product>tivoli_key_lifecycle_manager:2.0.1.7</product>
<product>tivoli_key_lifecycle_manager:2.0.1.8</product>
</cve>
<cve id="CVE-2016-6095" level="LOW">
<product>security_key_lifecycle_manager:2.5.0</product>
<product>security_key_lifecycle_manager:2.5.0.0</product>
<product>security_key_lifecycle_manager:2.5.0.1</product>
<product>security_key_lifecycle_manager:2.5.0.2</product>
<product>security_key_lifecycle_manager:2.5.0.3</product>
<product>security_key_lifecycle_manager:2.5.0.4</product>
<product>security_key_lifecycle_manager:2.5.0.5</product>
<product>security_key_lifecycle_manager:2.5.0.6</product>
<product>security_key_lifecycle_manager:2.5.0.7</product>
<product>security_key_lifecycle_manager:2.6.0</product>
<product>security_key_lifecycle_manager:2.6.0.1</product>
<product>security_key_lifecycle_manager:2.6.0.2</product>
</cve>
<cve id="CVE-2016-6094" level="LOW">
<product>security_key_lifecycle_manager:2.5.0.0</product>
<product>security_key_lifecycle_manager:2.5.0.1</product>
<product>security_key_lifecycle_manager:2.5.0.2</product>
<product>security_key_lifecycle_manager:2.5.0.3</product>
<product>security_key_lifecycle_manager:2.5.0.4</product>
<product>security_key_lifecycle_manager:2.5.0.5</product>
<product>security_key_lifecycle_manager:2.5.0.6</product>
<product>security_key_lifecycle_manager:2.5.0.7</product>
<product>security_key_lifecycle_manager:2.6.0.0</product>
<product>security_key_lifecycle_manager:2.6.0.1</product>
<product>security_key_lifecycle_manager:2.6.0.2</product>
<product>tivoli_key_lifecycle_manager:2.0.1</product>
<product>tivoli_key_lifecycle_manager:2.0.1.1</product>
<product>tivoli_key_lifecycle_manager:2.0.1.2</product>
<product>tivoli_key_lifecycle_manager:2.0.1.3</product>
<product>tivoli_key_lifecycle_manager:2.0.1.4</product>
<product>tivoli_key_lifecycle_manager:2.0.1.5</product>
<product>tivoli_key_lifecycle_manager:2.0.1.6</product>
<product>tivoli_key_lifecycle_manager:2.0.1.7</product>
<product>tivoli_key_lifecycle_manager:2.0.1.8</product>
</cve>
<cve id="CVE-2016-6093" level="LOW">
<product>security_key_lifecycle_manager:2.5.0.0</product>
<product>security_key_lifecycle_manager:2.5.0.1</product>
<product>security_key_lifecycle_manager:2.5.0.2</product>
<product>security_key_lifecycle_manager:2.5.0.3</product>
<product>security_key_lifecycle_manager:2.5.0.4</product>
<product>security_key_lifecycle_manager:2.5.0.5</product>
<product>security_key_lifecycle_manager:2.5.0.6</product>
<product>security_key_lifecycle_manager:2.5.0.7</product>
<product>security_key_lifecycle_manager:2.6.0.0</product>
<product>security_key_lifecycle_manager:2.6.0.1</product>
<product>security_key_lifecycle_manager:2.6.0.2</product>
<product>tivoli_key_lifecycle_manager:2.0.1</product>
<product>tivoli_key_lifecycle_manager:2.0.1.1</product>
<product>tivoli_key_lifecycle_manager:2.0.1.2</product>
<product>tivoli_key_lifecycle_manager:2.0.1.3</product>
<product>tivoli_key_lifecycle_manager:2.0.1.4</product>
<product>tivoli_key_lifecycle_manager:2.0.1.5</product>
<product>tivoli_key_lifecycle_manager:2.0.1.6</product>
<product>tivoli_key_lifecycle_manager:2.0.1.7</product>
<product>tivoli_key_lifecycle_manager:2.0.1.8</product>
</cve>
<cve id="CVE-2016-6092" level="LOW">
<product>security_key_lifecycle_manager:2.5.0.0</product>
<product>security_key_lifecycle_manager:2.5.0.1</product>
<product>security_key_lifecycle_manager:2.5.0.2</product>
<product>security_key_lifecycle_manager:2.5.0.3</product>
<product>security_key_lifecycle_manager:2.5.0.4</product>
<product>security_key_lifecycle_manager:2.5.0.5</product>
<product>security_key_lifecycle_manager:2.5.0.6</product>
<product>security_key_lifecycle_manager:2.5.0.7</product>
<product>security_key_lifecycle_manager:2.6.0.0</product>
<product>security_key_lifecycle_manager:2.6.0.1</product>
<product>security_key_lifecycle_manager:2.6.0.2</product>
<product>tivoli_key_lifecycle_manager:2.0.1</product>
<product>tivoli_key_lifecycle_manager:2.0.1.1</product>
<product>tivoli_key_lifecycle_manager:2.0.1.2</product>
<product>tivoli_key_lifecycle_manager:2.0.1.3</product>
<product>tivoli_key_lifecycle_manager:2.0.1.4</product>
<product>tivoli_key_lifecycle_manager:2.0.1.5</product>
<product>tivoli_key_lifecycle_manager:2.0.1.6</product>
<product>tivoli_key_lifecycle_manager:2.0.1.7</product>
<product>tivoli_key_lifecycle_manager:2.0.1.8</product>
</cve>
<cve id="CVE-2016-6090" level="LOW">
<product>commerce_on_cloud:8.0.2</product>
<product>commerce_on_cloud:8.0.2.1</product>
<product>commerce_on_cloud:8.0.2.2</product>
<product>commerce_on_cloud:8.0.2.3</product>
<product>websphere_commerce:6.0</product>
<product>websphere_commerce:6.0.0.1</product>
<product>websphere_commerce:6.0.0.2</product>
<product>websphere_commerce:6.0.0.3</product>
<product>websphere_commerce:6.0.0.4</product>
<product>websphere_commerce:6.0.0.5</product>
<product>websphere_commerce:6.0.0.6</product>
<product>websphere_commerce:6.0.0.7</product>
<product>websphere_commerce:6.0.0.8</product>
<product>websphere_commerce:6.0.0.9</product>
<product>websphere_commerce:6.0.0.10</product>
<product>websphere_commerce:6.0.0.11</product>
<product>websphere_commerce:7.0</product>
<product>websphere_commerce:7.0.0.1</product>
<product>websphere_commerce:7.0.0.2</product>
<product>websphere_commerce:7.0.0.3</product>
<product>websphere_commerce:7.0.0.4</product>
<product>websphere_commerce:7.0.0.5</product>
<product>websphere_commerce:7.0.0.6</product>
<product>websphere_commerce:7.0.0.7</product>
<product>websphere_commerce:7.0.0.8</product>
<product>websphere_commerce:7.0.0.9</product>
<product>websphere_commerce:8.0</product>
<product>websphere_commerce:8.0.0.1</product>
<product>websphere_commerce:8.0.0.2</product>
<product>websphere_commerce:8.0.0.3</product>
<product>websphere_commerce:8.0.0.4</product>
<product>websphere_commerce:8.0.0.5</product>
<product>websphere_commerce:8.0.0.6</product>
<product>websphere_commerce:8.0.0.7</product>
<product>websphere_commerce:8.0.0.8</product>
<product>websphere_commerce:8.0.0.9</product>
<product>websphere_commerce:8.0.0.10</product>
<product>websphere_commerce:8.0.0.11</product>
<product>websphere_commerce:8.0.0.12</product>
<product>websphere_commerce:8.0.0.13</product>
<product>websphere_commerce:8.0.0.14</product>
<product>websphere_commerce:8.0.0.15</product>
<product>websphere_commerce:8.0.0.16</product>
<product>websphere_commerce:8.0.1</product>
<product>websphere_commerce:8.0.1.1</product>
<product>websphere_commerce:8.0.1.2</product>
<product>websphere_commerce:8.0.1.3</product>
<product>websphere_commerce:8.0.1.4</product>
<product>websphere_commerce:8.0.1.5</product>
<product>websphere_commerce:8.0.1.6</product>
<product>websphere_commerce:8.0.1.7</product>
<product>websphere_commerce:8.0.1.8</product>
<product>websphere_commerce:8.0.2</product>
<product>websphere_commerce:8.0.2.1</product>
<product>websphere_commerce:8.0.2.2</product>
<product>websphere_commerce:8.0.2.3</product>
<product>websphere_commerce:8.0.3</product>
</cve>
<cve id="CVE-2016-6099" level="LOW">
<product>security_key_lifecycle_manager:2.5.0</product>
<product>security_key_lifecycle_manager:2.5.0.0</product>
<product>security_key_lifecycle_manager:2.5.0.1</product>
<product>security_key_lifecycle_manager:2.5.0.2</product>
<product>security_key_lifecycle_manager:2.5.0.3</product>
<product>security_key_lifecycle_manager:2.5.0.4</product>
<product>security_key_lifecycle_manager:2.5.0.5</product>
<product>security_key_lifecycle_manager:2.5.0.6</product>
<product>security_key_lifecycle_manager:2.5.0.7</product>
<product>security_key_lifecycle_manager:2.6.0</product>
<product>security_key_lifecycle_manager:2.6.0.1</product>
<product>security_key_lifecycle_manager:2.6.0.2</product>
</cve>
<cve id="CVE-2016-6098" level="LOW">
<product>security_key_lifecycle_manager:2.5.0.0</product>
<product>security_key_lifecycle_manager:2.5.0.1</product>
<product>security_key_lifecycle_manager:2.5.0.2</product>
<product>security_key_lifecycle_manager:2.5.0.3</product>
<product>security_key_lifecycle_manager:2.5.0.4</product>
<product>security_key_lifecycle_manager:2.5.0.5</product>
<product>security_key_lifecycle_manager:2.5.0.6</product>
<product>security_key_lifecycle_manager:2.5.0.7</product>
<product>security_key_lifecycle_manager:2.6.0.0</product>
<product>security_key_lifecycle_manager:2.6.0.1</product>
<product>security_key_lifecycle_manager:2.6.0.2</product>
<product>tivoli_key_lifecycle_manager:2.0.1</product>
<product>tivoli_key_lifecycle_manager:2.0.1.1</product>
<product>tivoli_key_lifecycle_manager:2.0.1.2</product>
<product>tivoli_key_lifecycle_manager:2.0.1.3</product>
<product>tivoli_key_lifecycle_manager:2.0.1.4</product>
<product>tivoli_key_lifecycle_manager:2.0.1.5</product>
<product>tivoli_key_lifecycle_manager:2.0.1.6</product>
<product>tivoli_key_lifecycle_manager:2.0.1.7</product>
<product>tivoli_key_lifecycle_manager:2.0.1.8</product>
</cve>
<cve id="CVE-2016-6899" level="MEDIUM">
<product>rh1288_v3_server_firmware:v100r003c00</product>
<product>rh2288_v3_server_firmware:v100r003c00</product>
<product>rh2288h_v3_server_firmware:v100r003c00</product>
<product>rh5885_v3_server_firmware:v100r003c01</product>
<product>xh620_v3_server_firmware:v100r003c00</product>
<product>xh622_v3_server_firmware:v100r003c00</product>
<product>xh628_v3_server_firmware:v100r003c00</product>
</cve>
<cve id="CVE-2016-6898" level="MEDIUM">
<product>e9000_chassis:v100r001c00</product>
</cve>
<cve id="CVE-2016-6894" level="LOW">
<product>dcs-7050q_eos_software:4.15</product>
<product>dcs-7050s_eos_software:4.15</product>
<product>dcs-7050t_eos_software:4.15</product>
</cve>
<cve id="CVE-2016-6893" level="MEDIUM">
<product>mailman:2.1</product>
<product>mailman:2.1.1</product>
<product>mailman:2.1.2</product>
<product>mailman:2.1.3</product>
<product>mailman:2.1.4</product>
<product>mailman:2.1.5</product>
<product>mailman:2.1.6</product>
<product>mailman:2.1.8</product>
<product>mailman:2.1.9</product>
<product>mailman:2.1.10</product>
<product>mailman:2.1.10</product>
<product>mailman:2.1.10b1</product>
<product>mailman:2.1.10b3</product>
<product>mailman:2.1.10b4</product>
<product>mailman:2.1.11</product>
<product>mailman:2.1.11</product>
<product>mailman:2.1.11</product>
<product>mailman:2.1.12</product>
<product>mailman:2.1.12</product>
<product>mailman:2.1.12</product>
<product>mailman:2.1.13</product>
<product>mailman:2.1.13</product>
<product>mailman:2.1.14</product>
<product>mailman:2.1.14</product>
<product>mailman:2.1.14-1</product>
<product>mailman:2.1.15</product>
<product>mailman:2.1.15</product>
<product>mailman:2.1.16</product>
<product>mailman:2.1.16</product>
<product>mailman:2.1.16</product>
<product>mailman:2.1.16</product>
<product>mailman:2.1.17</product>
<product>mailman:2.1.18</product>
<product>mailman:2.1.18</product>
<product>mailman:2.1.18</product>
<product>mailman:2.1.18</product>
<product>mailman:2.1.18-1</product>
<product>mailman:2.1.19</product>
<product>mailman:2.1.19</product>
<product>mailman:2.1.19</product>
<product>mailman:2.1.19</product>
<product>mailman:2.1.20</product>
<product>mailman:2.1.21</product>
<product>mailman:2.1.21</product>
<product>mailman:2.1.22</product>
<product>mailman:2.1.23</product>
</cve>
<cve id="CVE-2016-6892" level="LOW">
<product>matrixssl:3.8.5</product>
</cve>
<cve id="CVE-2016-6891" level="LOW">
<product>matrixssl:3.8.5</product>
</cve>
<cve id="CVE-2016-6890" level="LOW">
<product>matrixssl:3.8.5</product>
</cve>
<cve id="CVE-2016-4993" level="MEDIUM">
<product>jboss_enterprise_application_platform:7.0.1</product>
<product>jboss_wildfly_application_server:10.0.0</product>
</cve>
<cve id="CVE-2016-3607" level="LOW">
<product>glassfish_server:3.0.1</product>
<product>glassfish_server:3.1.2</product>
</cve>
<cve id="CVE-2016-3353" level="HIGH">
<product>internet_explorer:9</product>
<product>internet_explorer:10</product>
<product>internet_explorer:11</product>
</cve>
<cve id="CVE-2016-3351" level="HIGH">
<product>edge:-</product>
<product>internet_explorer:9</product>
<product>internet_explorer:10</product>
<product>internet_explorer:11</product>
</cve>
<cve id="CVE-2016-3350" level="HIGH">
<product>edge:-</product>
</cve>
<cve id="CVE-2016-3609" level="MEDIUM">
<product>database:11.2.0.4</product>
<product>database:12.1.0.1</product>
<product>database:12.1.0.2</product>
</cve>
<cve id="CVE-2016-3608" level="LOW">
<product>glassfish_server:3.0.1</product>
</cve>
<cve id="CVE-2016-8727" level="LOW">
<product>awk-3131a_firmware:1.1</product>
</cve>
<cve id="CVE-2016-8726" level="LOW">
<product>awk-3131a_firmware:1.1</product>
</cve>
<cve id="CVE-2016-8725" level="LOW">
<product>awk-3131a_firmware:1.1</product>
</cve>
<cve id="CVE-2016-8724" level="LOW">
<product>awk-3131a_firmware:1.1</product>
</cve>
<cve id="CVE-2016-8723" level="LOW">
<product>awk-3131a_firmware:1.1</product>
</cve>
<cve id="CVE-2016-8722" level="LOW">
<product>awk-3131a_firmware:1.1</product>
</cve>
<cve id="CVE-2016-8721" level="LOW">
<product>awk-3131a_firmware:1.1</product>
</cve>
<cve id="CVE-2016-8720" level="MEDIUM">
<product>awk-3131a_firmware:1.1</product>
</cve>
<cve id="CVE-2016-8729" level="MEDIUM">
<product>mupdf:1.9</product>
</cve>
<cve id="CVE-2016-8728" level="MEDIUM">
<product>mupdf:1.10</product>
</cve>
<cve id="CVE-2016-0550" level="LOW">
<product>customer_relationship_management_technical_foundation:12.1.3</product>
<product>customer_relationship_management_technical_foundation:12.2.3</product>
<product>customer_relationship_management_technical_foundation:12.2.4</product>
<product>customer_relationship_management_technical_foundation:12.2.5</product>
</cve>
<cve id="CVE-2016-0551" level="LOW">
<product>customer_intelligence:11.5.10.2</product>
<product>customer_intelligence:12.1.1</product>
<product>customer_intelligence:12.1.2</product>
<product>customer_intelligence:12.1.3</product>
<product>customer_intelligence:12.2.3</product>
<product>customer_intelligence:12.2.4</product>
<product>customer_intelligence:12.2.5</product>
</cve>
<cve id="CVE-2016-0552" level="LOW">
<product>customer_intelligence:11.5.10.2</product>
<product>customer_intelligence:12.1.1</product>
<product>customer_intelligence:12.1.2</product>
<product>customer_intelligence:12.1.3</product>
<product>customer_intelligence:12.2.3</product>
<product>customer_intelligence:12.2.4</product>
<product>customer_intelligence:12.2.5</product>
</cve>
<cve id="CVE-2016-0553" level="LOW">
<product>e-business_intelligence:11.5.10.2</product>
<product>e-business_intelligence:12.1.1</product>
<product>e-business_intelligence:12.1.2</product>
<product>e-business_intelligence:12.1.3</product>
</cve>
<cve id="CVE-2016-0554" level="LOW">
<product>interaction_center_intelligence:11.5.10.2</product>
<product>interaction_center_intelligence:12.1.1</product>
<product>interaction_center_intelligence:12.1.2</product>
<product>interaction_center_intelligence:12.1.3</product>
</cve>
<cve id="CVE-2016-0555" level="MEDIUM">
<product>cadview-3d:11.5.10.2</product>
<product>cadview-3d:12.1.1</product>
<product>cadview-3d:12.1.2</product>
<product>cadview-3d:12.1.3</product>
</cve>
<cve id="CVE-2016-0556" level="LOW">
<product>e-business_suite:11.5.10.2</product>
<product>e-business_suite:12.1.1</product>
<product>e-business_suite:12.1.2</product>
<product>e-business_suite:12.1.3</product>
</cve>
<cve id="CVE-2016-0557" level="LOW">
<product>advanced_collections:11.5.10.2</product>
<product>advanced_collections:12.1.1</product>
<product>advanced_collections:12.1.2</product>
<product>advanced_collections:12.1.3</product>
</cve>
<cve id="CVE-2016-0558" level="MEDIUM">
<product>service_contracts:11.5.10.2</product>
<product>service_contracts:12.1.1</product>
<product>service_contracts:12.1.2</product>
<product>service_contracts:12.1.3</product>
</cve>
<cve id="CVE-2016-0559" level="LOW">
<product>customer_intelligence:11.5.10.2</product>
<product>customer_intelligence:12.1.1</product>
<product>customer_intelligence:12.1.2</product>
<product>customer_intelligence:12.1.3</product>
<product>customer_intelligence:12.2.3</product>
<product>customer_intelligence:12.2.4</product>
<product>customer_intelligence:12.2.5</product>
</cve>
<cve id="CVE-2016-1603" level="LOW">
<product>netiq_idm_servicenow_driver:1.0.0</product>
</cve>
<cve id="CVE-2016-1601" level="LOW">
<product>yast2</product>
</cve>
<cve id="CVE-2016-1607" level="LOW">
<product>filr:1.2</product>
<product>filr:2.0</product>
</cve>
<cve id="CVE-2016-1606" level="LOW">
<product>rumba:9.4</product>
</cve>
<cve id="CVE-2016-1605" level="LOW">
<product>sentinel:7.4</product>
<product>sentinel:7.4.1</product>
</cve>
<cve id="CVE-2016-1609" level="MEDIUM">
<product>filr:1.2</product>
<product>filr:2.0</product>
</cve>
<cve id="CVE-2016-1608" level="LOW">
<product>filr:1.2</product>
<product>filr:2.0</product>
</cve>
<cve id="CVE-2016-8583" level="MEDIUM">
<product>open_source_security_information_and_event_management:5.3.1</product>
<product>unified_security_management:5.3.1</product>
</cve>
<cve id="CVE-2016-8582" level="LOW">
<product>open_source_security_information_and_event_management:5.3.1</product>
<product>unified_security_management:5.3.1</product>
</cve>
<cve id="CVE-2016-8581" level="MEDIUM">
<product>open_source_security_information_and_event_management:5.3.1</product>
<product>unified_security_management:5.3.1</product>
</cve>
<cve id="CVE-2016-8580" level="LOW">
<product>open_source_security_information_and_event_management:5.3.1</product>
<product>unified_security_management:5.3.1</product>
</cve>
<cve id="CVE-2016-8587" level="MEDIUM">
<product>threat_discovery_appliance:2.6.1062</product>
</cve>
<cve id="CVE-2016-8586" level="LOW">
<product>threat_discovery_appliance:2.6.1062</product>
</cve>
<cve id="CVE-2016-8585" level="LOW">
<product>threat_discovery_appliance:2.6.1062</product>
</cve>
<cve id="CVE-2016-8584" level="LOW">
<product>threat_discovery_appliance:2.6.1062</product>
</cve>
<cve id="CVE-2016-8589" level="LOW">
<product>threat_discovery_appliance:2.6.1062</product>
</cve>
<cve id="CVE-2016-8588" level="MEDIUM">
<product>threat_discovery_appliance:2.6.1062</product>
</cve>
<cve id="CVE-2016-7854" level="LOW">
<product>acrobat:11.0.17</product>
<product>acrobat_dc:15.006.30201</product>
<product>acrobat_dc:15.017.20053</product>
<product>acrobat_reader_dc:15.006.30201</product>
<product>acrobat_reader_dc:15.017.20053</product>
<product>reader:11.0.17</product>
</cve>
<cve id="CVE-2016-7856" level="LOW">
<product>dng_converter:9.7</product>
</cve>
<cve id="CVE-2016-7851" level="MEDIUM">
<product>connect:9.5.6</product>
</cve>
<cve id="CVE-2016-7852" level="LOW">
<product>acrobat:11.0.17</product>
<product>acrobat_dc:15.006.30201</product>
<product>acrobat_dc:15.017.20053</product>
<product>acrobat_reader_dc:15.006.30201</product>
<product>acrobat_reader_dc:15.017.20053</product>
<product>reader:11.0.17</product>
</cve>
<cve id="CVE-2016-7853" level="LOW">
<product>acrobat:11.0.17</product>
<product>acrobat_dc:15.006.30201</product>
<product>acrobat_dc:15.017.20053</product>
<product>acrobat_reader_dc:15.006.30201</product>
<product>acrobat_reader_dc:15.017.20053</product>
<product>reader:11.0.17</product>
</cve>
<cve id="CVE-2016-9456" level="MEDIUM">
<product>revive_adserver:3.2.2</product>
</cve>
<cve id="CVE-2016-9457" level="MEDIUM">
<product>revive_adserver:3.2.2</product>
</cve>
<cve id="CVE-2016-9454" level="MEDIUM">
<product>revive_adserver:3.2.2</product>
</cve>
<cve id="CVE-2016-9455" level="MEDIUM">
<product>revive_adserver:3.2.2</product>
</cve>
<cve id="CVE-2016-9452" level="MEDIUM">
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.1</product>
<product>drupal:8.0.2</product>
<product>drupal:8.0.3</product>
<product>drupal:8.0.4</product>
<product>drupal:8.0.5</product>
<product>drupal:8.0.6</product>
<product>drupal:8.1.0</product>
<product>drupal:8.1.0</product>
<product>drupal:8.1.0</product>
<product>drupal:8.1.0</product>
<product>drupal:8.1.1</product>
<product>drupal:8.1.2</product>
<product>drupal:8.1.3</product>
<product>drupal:8.1.4</product>
<product>drupal:8.1.5</product>
<product>drupal:8.1.6</product>
<product>drupal:8.1.7</product>
<product>drupal:8.1.8</product>
<product>drupal:8.1.9</product>
<product>drupal:8.1.10</product>
<product>drupal:8.2.0</product>
<product>drupal:8.2.0</product>
<product>drupal:8.2.0</product>
<product>drupal:8.2.0</product>
<product>drupal:8.2.0</product>
<product>drupal:8.2.0</product>
<product>drupal:8.2.1</product>
<product>drupal:8.2.2</product>
</cve>
<cve id="CVE-2016-9453" level="MEDIUM">
<product>libtiff</product>
<product>opensuse:13.2</product>
</cve>
<cve id="CVE-2016-9450" level="LOW">
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.1</product>
<product>drupal:8.0.2</product>
<product>drupal:8.0.3</product>
<product>drupal:8.0.4</product>
<product>drupal:8.0.5</product>
<product>drupal:8.0.6</product>
<product>drupal:8.1.0</product>
<product>drupal:8.1.0</product>
<product>drupal:8.1.0</product>
<product>drupal:8.1.0</product>
<product>drupal:8.1.1</product>
<product>drupal:8.1.2</product>
<product>drupal:8.1.3</product>
<product>drupal:8.1.4</product>
<product>drupal:8.1.5</product>
<product>drupal:8.1.6</product>
<product>drupal:8.1.7</product>
<product>drupal:8.1.8</product>
<product>drupal:8.1.9</product>
<product>drupal:8.1.10</product>
<product>drupal:8.2.0</product>
<product>drupal:8.2.0</product>
<product>drupal:8.2.0</product>
<product>drupal:8.2.0</product>
<product>drupal:8.2.0</product>
<product>drupal:8.2.0</product>
<product>drupal:8.2.1</product>
<product>drupal:8.2.2</product>
</cve>
<cve id="CVE-2016-9451" level="MEDIUM">
<product>drupal:7.0</product>
<product>drupal:7.0</product>
<product>drupal:7.0</product>
<product>drupal:7.0</product>
<product>drupal:7.0</product>
<product>drupal:7.0</product>
<product>drupal:7.0</product>
<product>drupal:7.0</product>
<product>drupal:7.0</product>
<product>drupal:7.0</product>
<product>drupal:7.0</product>
<product>drupal:7.0</product>
<product>drupal:7.0</product>
<product>drupal:7.0</product>
<product>drupal:7.0</product>
<product>drupal:7.0</product>
<product>drupal:7.1</product>
<product>drupal:7.2</product>
<product>drupal:7.3</product>
<product>drupal:7.4</product>
<product>drupal:7.10</product>
<product>drupal:7.11</product>
<product>drupal:7.12</product>
<product>drupal:7.13</product>
<product>drupal:7.14</product>
<product>drupal:7.15</product>
<product>drupal:7.16</product>
<product>drupal:7.17</product>
<product>drupal:7.18</product>
<product>drupal:7.19</product>
<product>drupal:7.20</product>
<product>drupal:7.21</product>
<product>drupal:7.22</product>
<product>drupal:7.23</product>
<product>drupal:7.24</product>
<product>drupal:7.25</product>
<product>drupal:7.26</product>
<product>drupal:7.27</product>
<product>drupal:7.28</product>
<product>drupal:7.29</product>
<product>drupal:7.30</product>
<product>drupal:7.31</product>
<product>drupal:7.32</product>
<product>drupal:7.33</product>
<product>drupal:7.34</product>
<product>drupal:7.35</product>
<product>drupal:7.36</product>
<product>drupal:7.37</product>
<product>drupal:7.38</product>
<product>drupal:7.40</product>
<product>drupal:7.41</product>
<product>drupal:7.42</product>
<product>drupal:7.43</product>
<product>drupal:7.44</product>
<product>drupal:7.50</product>
<product>drupal:7.51</product>
</cve>
<cve id="CVE-2016-9988" level="MEDIUM">
<product>jazz_reporting_service:5.0</product>
<product>jazz_reporting_service:5.0.1</product>
<product>jazz_reporting_service:5.0.2</product>
<product>jazz_reporting_service:6.0</product>
<product>jazz_reporting_service:6.0.1</product>
<product>jazz_reporting_service:6.0.2</product>
<product>jazz_reporting_service:6.0.3</product>
</cve>
<cve id="CVE-2016-10079" level="LOW">
<product>saplpd:7400.3.11.33</product>
</cve>
<cve id="CVE-2016-9459" level="MEDIUM">
<product>nextcloud:9.0.51</product>
<product>owncloud:8.1.8</product>
<product>owncloud:8.2.6</product>
<product>owncloud:9.0.3</product>
</cve>
<cve id="CVE-2016-5729" level="LOW">
<product>bios_efi_driver:-</product>
</cve>
<cve id="CVE-2016-5725" level="MEDIUM">
<product>jsch:0.1.53</product>
</cve>
<cve id="CVE-2016-5726" level="LOW">
<product>simple_machines_forum:2.1</product>
</cve>
<cve id="CVE-2016-5727" level="MEDIUM">
<product>simple_machines_forum:2.1</product>
</cve>
<cve id="CVE-2016-5720" level="LOW">
<product>skype:-</product>
</cve>
<cve id="CVE-2016-5721" level="MEDIUM">
<product>zimbra_collaboration_server:8.6.0</product>
</cve>
<cve id="CVE-2016-5722" level="LOW">
<product>ocean_stor_firmware:v300r002c10spc200</product>
<product>ocean_stor_firmware:v300r003c00spc100</product>
</cve>
<cve id="CVE-2016-5723" level="LOW">
<product>fusioninsight_hd:v100r002c30</product>
<product>fusioninsight_hd:v100r002c50</product>
</cve>
<cve id="CVE-2016-9188" level="MEDIUM">
<product>moodle:3.1.2</product>
</cve>
<cve id="CVE-2016-9184" level="LOW">
<product>exponent_cms:2.4.0</product>
</cve>
<cve id="CVE-2016-9185" level="LOW">
<product>heat:5.0.3</product>
<product>heat:6.0.0</product>
<product>heat:6.1.0</product>
<product>heat:7.0.0</product>
</cve>
<cve id="CVE-2016-9186" level="LOW">
<product>moodle:3.1.2</product>
</cve>
<cve id="CVE-2016-9187" level="LOW">
<product>moodle:3.1.2</product>
</cve>
<cve id="CVE-2016-9180" level="LOW">
<product>xml-twig_for_perl:-</product>
</cve>
<cve id="CVE-2016-9181" level="MEDIUM">
<product>image-info_for_perl:1.16</product>
<product>image-info_for_perl:1.30</product>
</cve>
<cve id="CVE-2016-9182" level="LOW">
<product>exponent_cms:2.4.0</product>
</cve>
<cve id="CVE-2016-9183" level="LOW">
<product>exponent_cms:2.4.0</product>
</cve>
<cve id="CVE-2016-9676" level="LOW">
<product>provisioning_services:7.0</product>
<product>provisioning_services:7.1</product>
<product>provisioning_services:7.6</product>
<product>provisioning_services:7.7</product>
<product>provisioning_services:7.8</product>
<product>provisioning_services:7.9</product>
<product>provisioning_services:7.11</product>
</cve>
<cve id="CVE-2016-9677" level="LOW">
<product>provisioning_services:7.0</product>
<product>provisioning_services:7.1</product>
<product>provisioning_services:7.6</product>
<product>provisioning_services:7.7</product>
<product>provisioning_services:7.8</product>
<product>provisioning_services:7.9</product>
<product>provisioning_services:7.11</product>
</cve>
<cve id="CVE-2016-9675" level="MEDIUM">
<product>openjpeg</product>
</cve>
<cve id="CVE-2016-9678" level="LOW">
<product>provisioning_services:7.0</product>
<product>provisioning_services:7.1</product>
<product>provisioning_services:7.6</product>
<product>provisioning_services:7.7</product>
<product>provisioning_services:7.8</product>
<product>provisioning_services:7.9</product>
<product>provisioning_services:7.11</product>
</cve>
<cve id="CVE-2016-9679" level="LOW">
<product>provisioning_services:7.0</product>
<product>provisioning_services:7.1</product>
<product>provisioning_services:7.6</product>
<product>provisioning_services:7.7</product>
<product>provisioning_services:7.8</product>
<product>provisioning_services:7.9</product>
<product>provisioning_services:7.11</product>
</cve>
<cve id="CVE-2016-3622" level="MEDIUM">
<product>libtiff:4.0.6</product>
</cve>
<cve id="CVE-2016-7116" level="LOW">
<product>qemu:-</product>
</cve>
<cve id="CVE-2016-0208" level="MEDIUM">
<product>websphere_commerce:6.0</product>
<product>websphere_commerce:6.0.0.1</product>
<product>websphere_commerce:6.0.0.2</product>
<product>websphere_commerce:6.0.0.3</product>
<product>websphere_commerce:6.0.0.4</product>
<product>websphere_commerce:6.0.0.5</product>
<product>websphere_commerce:6.0.0.6</product>
<product>websphere_commerce:6.0.0.7</product>
<product>websphere_commerce:6.0.0.8</product>
<product>websphere_commerce:6.0.0.9</product>
<product>websphere_commerce:6.0.0.10</product>
<product>websphere_commerce:6.0.0.11</product>
<product>websphere_commerce:7.0</product>
<product>websphere_commerce:7.0.0.1</product>
<product>websphere_commerce:7.0.0.2</product>
<product>websphere_commerce:7.0.0.3</product>
<product>websphere_commerce:7.0.0.4</product>
<product>websphere_commerce:7.0.0.5</product>
<product>websphere_commerce:7.0.0.6</product>
<product>websphere_commerce:7.0.0.7</product>
<product>websphere_commerce:7.0.0.8</product>
<product>websphere_commerce:7.0.0.9</product>
<product>websphere_commerce:8.0</product>
<product>websphere_commerce:8.0.0.1</product>
<product>websphere_commerce:8.0.0.2</product>
</cve>
<cve id="CVE-2016-2989" level="MEDIUM">
<product>connections_portlets:5.0</product>
</cve>
<cve id="CVE-2016-2988" level="HIGH">
<product>tivoli_storage_manager_for_virtual_environments:6.4</product>
<product>tivoli_storage_manager_for_virtual_environments:7.1</product>
</cve>
<cve id="CVE-2016-2985" level="MEDIUM">
<product>general_parallel_file_system:3.5.0.0</product>
<product>general_parallel_file_system:3.5.0.1</product>
<product>general_parallel_file_system:3.5.0.2</product>
<product>general_parallel_file_system:3.5.0.3</product>
<product>general_parallel_file_system:3.5.0.4</product>
<product>general_parallel_file_system:3.5.0.5</product>
<product>general_parallel_file_system:3.5.0.6</product>
<product>general_parallel_file_system:3.5.0.7</product>
<product>general_parallel_file_system:3.5.0.8</product>
<product>general_parallel_file_system:3.5.0.9</product>
<product>general_parallel_file_system:3.5.0.10</product>
<product>general_parallel_file_system:3.5.0.11</product>
<product>general_parallel_file_system:3.5.0.12</product>
<product>general_parallel_file_system:3.5.0.13</product>
<product>general_parallel_file_system:3.5.0.14</product>
<product>general_parallel_file_system:3.5.0.15</product>
<product>general_parallel_file_system:3.5.0.16</product>
<product>general_parallel_file_system:3.5.0.17</product>
<product>general_parallel_file_system:3.5.0.18</product>
<product>general_parallel_file_system:3.5.0.19</product>
<product>general_parallel_file_system:3.5.0.20</product>
<product>general_parallel_file_system:3.5.0.21</product>
<product>general_parallel_file_system:3.5.0.22</product>
<product>general_parallel_file_system:3.5.0.23</product>
<product>general_parallel_file_system:3.5.0.24</product>
<product>general_parallel_file_system:3.5.0.25</product>
<product>general_parallel_file_system:3.5.0.26</product>
<product>general_parallel_file_system:3.5.0.27</product>
<product>general_parallel_file_system:3.5.0.28</product>
<product>general_parallel_file_system:3.5.0.29</product>
<product>general_parallel_file_system:3.5.0.30</product>
<product>general_parallel_file_system:3.5.0.31</product>
<product>general_parallel_file_system:4.1.0.0</product>
<product>general_parallel_file_system:4.1.0.1</product>
<product>general_parallel_file_system:4.1.0.2</product>
<product>general_parallel_file_system:4.1.0.3</product>
<product>general_parallel_file_system:4.1.0.4</product>
<product>general_parallel_file_system:4.1.0.5</product>
<product>general_parallel_file_system:4.1.0.6</product>
<product>general_parallel_file_system:4.1.0.7</product>
<product>general_parallel_file_system:4.1.0.8</product>
<product>spectrum_scale:4.1.1.0</product>
<product>spectrum_scale:4.1.1.1</product>
<product>spectrum_scale:4.1.1.2</product>
<product>spectrum_scale:4.1.1.3</product>
<product>spectrum_scale:4.1.1.4</product>
<product>spectrum_scale:4.1.1.5</product>
<product>spectrum_scale:4.1.1.6</product>
<product>spectrum_scale:4.1.1.7</product>
<product>spectrum_scale:4.1.1.8</product>
<product>spectrum_scale:4.2.0.0</product>
<product>spectrum_scale:4.2.0.1</product>
<product>spectrum_scale:4.2.0.2</product>
<product>spectrum_scale:4.2.0.3</product>
</cve>
<cve id="CVE-2016-2984" level="MEDIUM">
<product>general_parallel_file_system:3.5.0.0</product>
<product>general_parallel_file_system:3.5.0.1</product>
<product>general_parallel_file_system:3.5.0.2</product>
<product>general_parallel_file_system:3.5.0.3</product>
<product>general_parallel_file_system:3.5.0.4</product>
<product>general_parallel_file_system:3.5.0.5</product>
<product>general_parallel_file_system:3.5.0.6</product>
<product>general_parallel_file_system:3.5.0.7</product>
<product>general_parallel_file_system:3.5.0.8</product>
<product>general_parallel_file_system:3.5.0.9</product>
<product>general_parallel_file_system:3.5.0.10</product>
<product>general_parallel_file_system:3.5.0.11</product>
<product>general_parallel_file_system:3.5.0.12</product>
<product>general_parallel_file_system:3.5.0.13</product>
<product>general_parallel_file_system:3.5.0.14</product>
<product>general_parallel_file_system:3.5.0.15</product>
<product>general_parallel_file_system:3.5.0.16</product>
<product>general_parallel_file_system:3.5.0.17</product>
<product>general_parallel_file_system:3.5.0.18</product>
<product>general_parallel_file_system:3.5.0.19</product>
<product>general_parallel_file_system:3.5.0.20</product>
<product>general_parallel_file_system:3.5.0.21</product>
<product>general_parallel_file_system:3.5.0.22</product>
<product>general_parallel_file_system:3.5.0.23</product>
<product>general_parallel_file_system:3.5.0.24</product>
<product>general_parallel_file_system:3.5.0.25</product>
<product>general_parallel_file_system:3.5.0.26</product>
<product>general_parallel_file_system:3.5.0.27</product>
<product>general_parallel_file_system:3.5.0.28</product>
<product>general_parallel_file_system:3.5.0.29</product>
<product>general_parallel_file_system:3.5.0.30</product>
<product>general_parallel_file_system:3.5.0.31</product>
<product>general_parallel_file_system:4.1.0.0</product>
<product>general_parallel_file_system:4.1.0.1</product>
<product>general_parallel_file_system:4.1.0.2</product>
<product>general_parallel_file_system:4.1.0.3</product>
<product>general_parallel_file_system:4.1.0.4</product>
<product>general_parallel_file_system:4.1.0.5</product>
<product>general_parallel_file_system:4.1.0.6</product>
<product>general_parallel_file_system:4.1.0.7</product>
<product>general_parallel_file_system:4.1.0.8</product>
<product>spectrum_scale:4.1.1.0</product>
<product>spectrum_scale:4.1.1.1</product>
<product>spectrum_scale:4.1.1.2</product>
<product>spectrum_scale:4.1.1.3</product>
<product>spectrum_scale:4.1.1.4</product>
<product>spectrum_scale:4.1.1.5</product>
<product>spectrum_scale:4.1.1.6</product>
<product>spectrum_scale:4.1.1.7</product>
<product>spectrum_scale:4.1.1.8</product>
<product>spectrum_scale:4.2.0.0</product>
<product>spectrum_scale:4.2.0.1</product>
<product>spectrum_scale:4.2.0.2</product>
<product>spectrum_scale:4.2.0.3</product>
</cve>
<cve id="CVE-2016-2987" level="LOW">
<product>rational_doors_next_generation:4.0</product>
<product>rational_doors_next_generation:4.0.0</product>
<product>rational_doors_next_generation:4.0.1</product>
<product>rational_doors_next_generation:4.0.2</product>
<product>rational_doors_next_generation:4.0.3</product>
<product>rational_doors_next_generation:4.0.4</product>
<product>rational_doors_next_generation:4.0.5</product>
<product>rational_doors_next_generation:4.0.6</product>
<product>rational_doors_next_generation:4.0.7</product>
<product>rational_doors_next_generation:5.0</product>
<product>rational_doors_next_generation:5.0.0</product>
<product>rational_doors_next_generation:5.0.1</product>
<product>rational_doors_next_generation:5.0.2</product>
<product>rational_doors_next_generation:6.0.0</product>
<product>rational_doors_next_generation:6.0.1</product>
<product>rational_doors_next_generation:6.0.2</product>
<product>rational_engineering_lifecycle_manager:4.0.3</product>
<product>rational_engineering_lifecycle_manager:4.0.4</product>
<product>rational_engineering_lifecycle_manager:4.0.5</product>
<product>rational_engineering_lifecycle_manager:4.0.6</product>
<product>rational_engineering_lifecycle_manager:4.0.7</product>
<product>rational_engineering_lifecycle_manager:5.0</product>
<product>rational_engineering_lifecycle_manager:5.0.0</product>
<product>rational_engineering_lifecycle_manager:5.0.1</product>
<product>rational_engineering_lifecycle_manager:5.0.2</product>
<product>rational_engineering_lifecycle_manager:6.0.0</product>
<product>rational_engineering_lifecycle_manager:6.0.1</product>
<product>rational_engineering_lifecycle_manager:6.0.2</product>
<product>rational_quality_manager:4.0.0</product>
<product>rational_quality_manager:4.0.0.1</product>
<product>rational_quality_manager:4.0.0.2</product>
<product>rational_quality_manager:4.0.1</product>
<product>rational_quality_manager:4.0.2</product>
<product>rational_quality_manager:4.0.3</product>
<product>rational_quality_manager:4.0.4</product>
<product>rational_quality_manager:4.0.5</product>
<product>rational_quality_manager:4.0.6</product>
<product>rational_quality_manager:4.0.7</product>
<product>rational_quality_manager:5.0</product>
<product>rational_quality_manager:5.0.0</product>
<product>rational_quality_manager:5.0.1</product>
<product>rational_quality_manager:5.0.2</product>
<product>rational_quality_manager:6.0.2</product>
<product>rational_rhapsody_design_manager:4.0</product>
<product>rational_rhapsody_design_manager:4.0.1</product>
<product>rational_rhapsody_design_manager:4.0.2</product>
<product>rational_rhapsody_design_manager:4.0.3</product>
<product>rational_rhapsody_design_manager:4.0.4</product>
<product>rational_rhapsody_design_manager:4.0.5</product>
<product>rational_rhapsody_design_manager:4.0.6</product>
<product>rational_rhapsody_design_manager:4.0.7</product>
<product>rational_rhapsody_design_manager:5.0</product>
<product>rational_rhapsody_design_manager:5.0.0</product>
<product>rational_rhapsody_design_manager:5.0.1</product>
<product>rational_rhapsody_design_manager:5.0.2</product>
<product>rational_rhapsody_design_manager:6.0</product>
<product>rational_rhapsody_design_manager:6.0.0</product>
<product>rational_rhapsody_design_manager:6.0.1</product>
<product>rational_rhapsody_design_manager:6.0.2</product>
<product>rational_software_architect_design_manager:4.0</product>
<product>rational_software_architect_design_manager:4.0.0</product>
<product>rational_software_architect_design_manager:4.0.1</product>
<product>rational_software_architect_design_manager:4.0.2</product>
<product>rational_software_architect_design_manager:4.0.3</product>
<product>rational_software_architect_design_manager:4.0.4</product>
<product>rational_software_architect_design_manager:4.0.5</product>
<product>rational_software_architect_design_manager:4.0.6</product>
<product>rational_software_architect_design_manager:4.0.7</product>
<product>rational_software_architect_design_manager:5.0</product>
<product>rational_software_architect_design_manager:5.0.0</product>
<product>rational_software_architect_design_manager:5.0.1</product>
<product>rational_software_architect_design_manager:5.0.2</product>
<product>rational_software_architect_design_manager:6.0.0</product>
<product>rational_software_architect_design_manager:6.0.1</product>
<product>rational_software_architect_design_manager:6.0.2</product>
<product>rational_team_concert:4.0</product>
<product>rational_team_concert:4.0.0</product>
<product>rational_team_concert:4.0.0.1</product>
<product>rational_team_concert:4.0.0.2</product>
<product>rational_team_concert:4.0.1</product>
<product>rational_team_concert:4.0.2</product>
<product>rational_team_concert:4.0.3</product>
<product>rational_team_concert:4.0.4</product>
<product>rational_team_concert:4.0.5</product>
<product>rational_team_concert:4.0.6</product>
<product>rational_team_concert:4.0.7</product>
<product>rational_team_concert:5.0</product>
<product>rational_team_concert:5.0.1</product>
<product>rational_team_concert:5.0.2</product>
<product>rational_team_concert:6.0</product>
<product>rational_team_concert:6.0.1</product>
<product>rational_team_concert:6.0.2</product>
</cve>
<cve id="CVE-2016-2986" level="MEDIUM">
<product>rational_doors_next_generation:6.0.0</product>
<product>rational_doors_next_generation:6.0.1</product>
<product>rational_doors_next_generation:6.0.2</product>
<product>rational_engineering_lifecycle_manager:6.0.0</product>
<product>rational_engineering_lifecycle_manager:6.0.1</product>
<product>rational_engineering_lifecycle_manager:6.0.2</product>
<product>rational_quality_manager:6.0.0</product>
<product>rational_quality_manager:6.0.1</product>
<product>rational_quality_manager:6.0.2</product>
<product>rational_rhapsody_design_manager:6.0.0</product>
<product>rational_rhapsody_design_manager:6.0.1</product>
<product>rational_rhapsody_design_manager:6.0.2</product>
<product>rational_team_concert:6.0.0</product>
<product>rational_team_concert:6.0.1</product>
<product>rational_team_concert:6.0.2</product>
</cve>
<cve id="CVE-2016-2981" level="LOW">
<product>rational_collaborative_lifecycle_management:4.0</product>
<product>rational_collaborative_lifecycle_management:4.0.1</product>
<product>rational_collaborative_lifecycle_management:4.0.2</product>
<product>rational_collaborative_lifecycle_management:4.0.3</product>
<product>rational_collaborative_lifecycle_management:4.0.4</product>
<product>rational_collaborative_lifecycle_management:4.0.5</product>
<product>rational_collaborative_lifecycle_management:4.0.6</product>
<product>rational_collaborative_lifecycle_management:4.0.7</product>
<product>rational_collaborative_lifecycle_management:5.0</product>
<product>rational_collaborative_lifecycle_management:5.0.1</product>
<product>rational_collaborative_lifecycle_management:5.0.2</product>
<product>rational_collaborative_lifecycle_management:6.0</product>
<product>rational_collaborative_lifecycle_management:6.0.1</product>
<product>rational_collaborative_lifecycle_management:6.0.2</product>
<product>rational_collaborative_lifecycle_management:6.0.3</product>
</cve>
<cve id="CVE-2016-2980" level="MEDIUM">
<product>sametime:8.5.2.0</product>
<product>sametime:8.5.2.1</product>
<product>sametime:9.0.0.0</product>
<product>sametime:9.0.0.1</product>
<product>sametime:9.0.1</product>
</cve>
<cve id="CVE-2016-2983" level="MEDIUM">
<product>tealeaf_customer_experience:8.7</product>
<product>tealeaf_customer_experience:8.8</product>
<product>tealeaf_customer_experience:9.0.2</product>
</cve>
<cve id="CVE-2016-0209" level="MEDIUM">
<product>websphere_portal:8.5.0.0</product>
</cve>
<cve id="CVE-2016-1134" level="MEDIUM">
<product>bhr-4grv2_firmware:1.04</product>
<product>wex-300_firmware:1.90</product>
<product>whr-1166dhp_firmware:1.90</product>
<product>whr-300hp2_firmware:1.90</product>
<product>whr-600d_firmware:1.90</product>
<product>wmr-300_firmware:1.90</product>
<product>wmr-433_firmware:1.01</product>
<product>wsr-1166dhp_firmware:1.01</product>
</cve>
<cve id="CVE-2016-0204" level="MEDIUM">
<product>cloud_orchestrator:2.4.0.0</product>
<product>cloud_orchestrator:2.4.0.1</product>
<product>cloud_orchestrator:2.4.0.2</product>
</cve>
<cve id="CVE-2016-1132" level="LOW">
<product>shoplat:-</product>
</cve>
<cve id="CVE-2016-1988" level="LOW">
<product>network_automation:9.22</product>
<product>network_automation:9.22.01</product>
<product>network_automation:9.22.02</product>
<product>network_automation:10.00</product>
<product>network_automation:10.00.01</product>
</cve>
<cve id="CVE-2016-1989" level="LOW">
<product>network_automation:9.22</product>
<product>network_automation:9.22.01</product>
<product>network_automation:9.22.02</product>
<product>network_automation:10.00</product>
<product>network_automation:10.00.01</product>
</cve>
<cve id="CVE-2016-1984" level="LOW">
<product>amx_firmware:1.2.322</product>
<product>amx_firmware:1.3.100</product>
</cve>
<cve id="CVE-2016-1985" level="LOW">
<product>operations_manager:8.1</product>
<product>operations_manager:8.10</product>
<product>operations_manager:8.16</product>
<product>operations_manager:9.0</product>
</cve>
<cve id="CVE-2016-1986" level="LOW">
<product>continuous_delivery_automation:1.3.0</product>
</cve>
<cve id="CVE-2016-1987" level="HIGH">
<product>hp-ux_ipfilter:a.11.31.18.21</product>
</cve>
<cve id="CVE-2016-1981" level="LOW">
<product>qemu</product>
</cve>
<cve id="CVE-2016-1982" level="LOW">
<product>privoxy:3.0.23</product>
</cve>
<cve id="CVE-2016-1983" level="LOW">
<product>privoxy:3.0.23</product>
</cve>
<cve id="CVE-2016-3726" level="MEDIUM">
<product>jenkins:1.651.1</product>
<product>jenkins:2.2</product>
<product>openshift:3.1</product>
<product>openshift:3.2</product>
</cve>
<cve id="CVE-2016-3727" level="LOW">
<product>jenkins:1.651.1</product>
<product>jenkins:2.2</product>
<product>openshift:3.1</product>
<product>openshift:3.2</product>
</cve>
<cve id="CVE-2016-3724" level="LOW">
<product>jenkins:1.649</product>
<product>jenkins:1.651.1</product>
<product>openshift:3.1</product>
<product>openshift:3.2</product>
</cve>
<cve id="CVE-2016-3725" level="LOW">
<product>jenkins:1.651.1</product>
<product>jenkins:2.2</product>
<product>openshift:3.1</product>
<product>openshift:3.2</product>
</cve>
<cve id="CVE-2016-6408" level="MEDIUM">
<product>prime_home:5.2.0</product>
</cve>
<cve id="CVE-2016-3722" level="LOW">
<product>jenkins:1.651.1</product>
<product>jenkins:2.2</product>
<product>openshift:3.1</product>
<product>openshift:3.2</product>
</cve>
<cve id="CVE-2016-6406" level="LOW">
<product>email_security_appliance_firmware:9.1.2-023</product>
<product>email_security_appliance_firmware:9.1.2-028</product>
<product>email_security_appliance_firmware:9.1.2-036</product>
<product>email_security_appliance_firmware:9.7.2-046</product>
<product>email_security_appliance_firmware:9.7.2-047</product>
<product>email_security_appliance_firmware:9.7.2-054</product>
<product>email_security_appliance_firmware:10.0.0-124</product>
<product>email_security_appliance_firmware:10.0.0-125</product>
</cve>
<cve id="CVE-2016-6407" level="LOW">
<product>web_security_appliance:5.6.0-623</product>
<product>web_security_appliance:6.0.0-000</product>
<product>web_security_appliance:7.1.0</product>
<product>web_security_appliance:7.1.1</product>
<product>web_security_appliance:7.1.2</product>
<product>web_security_appliance:7.1.3</product>
<product>web_security_appliance:7.1.4</product>
<product>web_security_appliance:7.5.0-000</product>
<product>web_security_appliance:7.5.0-825</product>
<product>web_security_appliance:7.5.1-000</product>
<product>web_security_appliance:7.5.2-000</product>
<product>web_security_appliance:7.5.2-hp2-303</product>
<product>web_security_appliance:7.7.0-000</product>
<product>web_security_appliance:7.7.0-608</product>
<product>web_security_appliance:7.7.1-000</product>
<product>web_security_appliance:7.7.5-835</product>
<product>web_security_appliance:8.0.0-000</product>
<product>web_security_appliance:8.0.5</product>
<product>web_security_appliance:8.0.6</product>
<product>web_security_appliance:8.0.6-078</product>
<product>web_security_appliance:8.0.6-119</product>
<product>web_security_appliance:8.0.7</product>
<product>web_security_appliance:8.0.7-142</product>
<product>web_security_appliance:8.0.8-mr-113</product>
<product>web_security_appliance:8.5.0-497</product>
<product>web_security_appliance:8.5.0.000</product>
<product>web_security_appliance:8.5.1-021</product>
<product>web_security_appliance:8.5.2-024</product>
<product>web_security_appliance:8.5.2-027</product>
<product>web_security_appliance:8.5.3-055</product>
<product>web_security_appliance:8.8.0-000</product>
<product>web_security_appliance:8.8.0-085</product>
<product>web_security_appliance:9.0.0-193</product>
<product>web_security_appliance:9.0_base</product>
<product>web_security_appliance:9.1.0-000</product>
<product>web_security_appliance:9.1.0-070</product>
<product>web_security_appliance:9.1_base</product>
<product>web_security_appliance:9.5.0-235</product>
<product>web_security_appliance:9.5.0-284</product>
<product>web_security_appliance:9.5.0-444</product>
<product>web_security_appliance:9.5_base</product>
</cve>
<cve id="CVE-2016-6401" level="MEDIUM">
<product>carrier_routing_system:5.1.4</product>
<product>carrier_routing_system:5.1_base</product>
</cve>
<cve id="CVE-2016-6402" level="LOW">
<product>unified_computing_system:2.2%281b%29</product>
<product>unified_computing_system:2.2%281c%29</product>
<product>unified_computing_system:2.2%281d%29</product>
<product>unified_computing_system:2.2%281e%29</product>
<product>unified_computing_system:2.2%281f%29</product>
<product>unified_computing_system:2.2%281g%29</product>
<product>unified_computing_system:2.2%281h%29</product>
<product>unified_computing_system:2.2%282c%29</product>
<product>unified_computing_system:2.2%282c%29a</product>
<product>unified_computing_system:2.2%282d%29</product>
<product>unified_computing_system:2.2%282e%29</product>
<product>unified_computing_system:2.2%283a%29</product>
<product>unified_computing_system:2.2%283b%29</product>
<product>unified_computing_system:2.2%283c%29</product>
<product>unified_computing_system:2.2%283d%29</product>
<product>unified_computing_system:2.2%283e%29</product>
<product>unified_computing_system:2.2%283f%29</product>
<product>unified_computing_system:2.2%283g%29</product>
<product>unified_computing_system:2.2%284b%29</product>
<product>unified_computing_system:2.2%284c%29</product>
<product>unified_computing_system:2.2%285a%29</product>
<product>unified_computing_system:2.2%285b%29a</product>
<product>unified_computing_system:2.2_base</product>
<product>unified_computing_system:3.0%281c%29</product>
<product>unified_computing_system:3.0%281d%29</product>
<product>unified_computing_system:3.0%281e%29</product>
<product>unified_computing_system:3.0%282c%29</product>
<product>unified_computing_system:3.0%282d%29</product>
</cve>
<cve id="CVE-2016-3723" level="LOW">
<product>jenkins:1.651.1</product>
<product>jenkins:2.2</product>
<product>openshift:3.1</product>
<product>openshift:3.2</product>
</cve>
<cve id="CVE-2016-0129" level="HIGH">
<product>edge</product>
</cve>
<cve id="CVE-2016-0123" level="HIGH">
<product>edge</product>
</cve>
<cve id="CVE-2016-3721" level="LOW">
<product>jenkins:1.651.1</product>
<product>jenkins:2.2</product>
<product>openshift:3.1</product>
<product>openshift:3.2</product>
</cve>
<cve id="CVE-2016-0125" level="HIGH">
<product>edge</product>
</cve>
<cve id="CVE-2016-0124" level="HIGH">
<product>edge</product>
</cve>
<cve id="CVE-2016-4808" level="MEDIUM">
<product>web2py:2.14.5</product>
</cve>
<cve id="CVE-2016-4802" level="MEDIUM">
<product>curl:7.49.0</product>
</cve>
<cve id="CVE-2016-4803" level="LOW">
<product>dotcms:3.3.1</product>
</cve>
<cve id="CVE-2016-4800" level="LOW">
<product>jetty:9.3.0</product>
<product>jetty:9.3.0</product>
<product>jetty:9.3.0</product>
<product>jetty:9.3.0</product>
<product>jetty:9.3.0</product>
<product>jetty:9.3.0</product>
<product>jetty:9.3.1</product>
<product>jetty:9.3.2</product>
<product>jetty:9.3.3</product>
<product>jetty:9.3.4</product>
<product>jetty:9.3.4</product>
<product>jetty:9.3.4</product>
<product>jetty:9.3.5</product>
<product>jetty:9.3.6</product>
<product>jetty:9.3.7</product>
<product>jetty:9.3.7</product>
<product>jetty:9.3.7</product>
<product>jetty:9.3.8</product>
<product>jetty:9.3.8</product>
</cve>
<cve id="CVE-2016-4806" level="LOW">
<product>web2py:2.14.5</product>
</cve>
<cve id="CVE-2016-4807" level="MEDIUM">
<product>web2py:2.14.5</product>
</cve>
<cve id="CVE-2016-6668" level="LOW">
<product>confluence:5.5.0</product>
<product>confluence:5.9.1</product>
<product>confluence:5.9.2</product>
<product>confluence:5.9.3</product>
<product>confluence:5.9.4</product>
<product>confluence:5.9.5</product>
<product>confluence:5.9.6</product>
<product>confluence:5.9.7</product>
<product>confluence:5.9.8</product>
<product>confluence:5.9.9</product>
<product>confluence:5.9.10</product>
<product>confluence:5.9.11</product>
<product>confluence:5.9.12</product>
<product>confluence:5.10.0</product>
<product>confluence:5.10.1</product>
<product>confluence:5.10.2</product>
<product>confluence:5.10.3</product>
<product>jira_integration_for_hipchat:6.26.0</product>
<product>jira_integration_for_hipchat:6.26.10</product>
<product>jira_integration_for_hipchat:6.29.1</product>
<product>jira_integration_for_hipchat:6.29.2</product>
<product>jira_integration_for_hipchat:6.31.0</product>
<product>jira_integration_for_hipchat:7.1.0</product>
<product>jira_integration_for_hipchat:7.2.1</product>
<product>jira_integration_for_hipchat:7.3.2</product>
<product>jira_integration_for_hipchat:7.3.3</product>
<product>jira_integration_for_hipchat:7.4.1</product>
<product>jira_integration_for_hipchat:7.8.1</product>
<product>jira_integration_for_hipchat:7.8.3</product>
<product>jira_integration_for_hipchat:7.8.12</product>
</cve>
<cve id="CVE-2016-6669" level="HIGH">
<product>usg2100_firmware:v300r001c00</product>
<product>usg2100_firmware:v300r001c10</product>
<product>usg2200_firmware:v300r001c00</product>
<product>usg2200_firmware:v300r001c10</product>
<product>usg5100_firmware:v300r001c00</product>
<product>usg5100_firmware:v300r001c10</product>
<product>usg5500_firmware:v300r001c00</product>
<product>usg5500_firmware:v300r001c10</product>
</cve>
<cve id="CVE-2016-3292" level="HIGH">
<product>internet_explorer:10</product>
<product>internet_explorer:11</product>
</cve>
<cve id="CVE-2016-3293" level="HIGH">
<product>edge</product>
<product>internet_explorer:9</product>
<product>internet_explorer:10</product>
<product>internet_explorer:11</product>
</cve>
<cve id="CVE-2016-3290" level="HIGH">
<product>internet_explorer:11</product>
</cve>
<cve id="CVE-2016-3291" level="HIGH">
<product>edge:-</product>
<product>internet_explorer:11</product>
</cve>
<cve id="CVE-2016-3296" level="HIGH">
<product>edge</product>
</cve>
<cve id="CVE-2016-3297" level="MEDIUM">
<product>edge:-</product>
<product>internet_explorer:9</product>
<product>internet_explorer:10</product>
<product>internet_explorer:11</product>
</cve>
<cve id="CVE-2016-3294" level="HIGH">
<product>edge:-</product>
</cve>
<cve id="CVE-2016-6667" level="LOW">
<product>oncommand_unified_manager_for_clustered_data_ontap:6.3</product>
<product>oncommand_unified_manager_for_clustered_data_ontap:6.4</product>
<product>oncommand_unified_manager_for_clustered_data_ontap:6.4</product>
</cve>
<cve id="CVE-2016-7139" level="MEDIUM">
<product>plone:3.3</product>
<product>plone:3.3.1</product>
<product>plone:3.3.2</product>
<product>plone:3.3.3</product>
<product>plone:3.3.4</product>
<product>plone:3.3.5</product>
<product>plone:3.3.6</product>
<product>plone:4.0</product>
<product>plone:4.0.1</product>
<product>plone:4.0.2</product>
<product>plone:4.0.3</product>
<product>plone:4.0.4</product>
<product>plone:4.0.5</product>
<product>plone:4.0.7</product>
<product>plone:4.0.8</product>
<product>plone:4.0.9</product>
<product>plone:4.0.10</product>
<product>plone:4.1</product>
<product>plone:4.1.1</product>
<product>plone:4.1.2</product>
<product>plone:4.1.3</product>
<product>plone:4.1.4</product>
<product>plone:4.1.5</product>
<product>plone:4.1.6</product>
<product>plone:4.2</product>
<product>plone:4.2.1</product>
<product>plone:4.2.2</product>
<product>plone:4.2.3</product>
<product>plone:4.2.4</product>
<product>plone:4.2.5</product>
<product>plone:4.2.6</product>
<product>plone:4.2.7</product>
<product>plone:4.3</product>
<product>plone:4.3.1</product>
<product>plone:4.3.2</product>
<product>plone:4.3.3</product>
<product>plone:4.3.4</product>
<product>plone:4.3.5</product>
<product>plone:4.3.6</product>
<product>plone:4.3.7</product>
<product>plone:4.3.8</product>
<product>plone:4.3.9</product>
<product>plone:4.3.10</product>
<product>plone:4.3.11</product>
<product>plone:5.0</product>
<product>plone:5.0</product>
<product>plone:5.0</product>
<product>plone:5.0</product>
<product>plone:5.0</product>
<product>plone:5.0.1</product>
<product>plone:5.0.2</product>
<product>plone:5.0.3</product>
<product>plone:5.0.4</product>
<product>plone:5.0.5</product>
<product>plone:5.0.6</product>
<product>plone:5.1a1</product>
</cve>
<cve id="CVE-2016-7138" level="MEDIUM">
<product>plone:3.3</product>
<product>plone:3.3.1</product>
<product>plone:3.3.2</product>
<product>plone:3.3.3</product>
<product>plone:3.3.4</product>
<product>plone:3.3.5</product>
<product>plone:3.3.6</product>
<product>plone:4.0</product>
<product>plone:4.0.1</product>
<product>plone:4.0.2</product>
<product>plone:4.0.3</product>
<product>plone:4.0.4</product>
<product>plone:4.0.5</product>
<product>plone:4.0.7</product>
<product>plone:4.0.8</product>
<product>plone:4.0.9</product>
<product>plone:4.0.10</product>
<product>plone:4.1</product>
<product>plone:4.1.1</product>
<product>plone:4.1.2</product>
<product>plone:4.1.3</product>
<product>plone:4.1.4</product>
<product>plone:4.1.5</product>
<product>plone:4.1.6</product>
<product>plone:4.2</product>
<product>plone:4.2.1</product>
<product>plone:4.2.2</product>
<product>plone:4.2.3</product>
<product>plone:4.2.4</product>
<product>plone:4.2.5</product>
<product>plone:4.2.6</product>
<product>plone:4.2.7</product>
<product>plone:4.3</product>
<product>plone:4.3.1</product>
<product>plone:4.3.2</product>
<product>plone:4.3.3</product>
<product>plone:4.3.4</product>
<product>plone:4.3.5</product>
<product>plone:4.3.6</product>
<product>plone:4.3.7</product>
<product>plone:4.3.8</product>
<product>plone:4.3.9</product>
<product>plone:4.3.10</product>
<product>plone:4.3.11</product>
<product>plone:5.0</product>
<product>plone:5.0</product>
<product>plone:5.0</product>
<product>plone:5.0</product>
<product>plone:5.0</product>
<product>plone:5.0.1</product>
<product>plone:5.0.2</product>
<product>plone:5.0.3</product>
<product>plone:5.0.4</product>
<product>plone:5.0.5</product>
<product>plone:5.0.6</product>
<product>plone:5.1a1</product>
</cve>
<cve id="CVE-2016-7137" level="MEDIUM">
<product>plone:3.3</product>
<product>plone:3.3.1</product>
<product>plone:3.3.2</product>
<product>plone:3.3.3</product>
<product>plone:3.3.4</product>
<product>plone:3.3.5</product>
<product>plone:3.3.6</product>
<product>plone:4.0</product>
<product>plone:4.0.1</product>
<product>plone:4.0.2</product>
<product>plone:4.0.3</product>
<product>plone:4.0.4</product>
<product>plone:4.0.5</product>
<product>plone:4.0.7</product>
<product>plone:4.0.8</product>
<product>plone:4.0.9</product>
<product>plone:4.0.10</product>
<product>plone:4.1</product>
<product>plone:4.1.1</product>
<product>plone:4.1.2</product>
<product>plone:4.1.3</product>
<product>plone:4.1.4</product>
<product>plone:4.1.5</product>
<product>plone:4.1.6</product>
<product>plone:4.2</product>
<product>plone:4.2.1</product>
<product>plone:4.2.2</product>
<product>plone:4.2.3</product>
<product>plone:4.2.4</product>
<product>plone:4.2.5</product>
<product>plone:4.2.6</product>
<product>plone:4.2.7</product>
<product>plone:4.3</product>
<product>plone:4.3.1</product>
<product>plone:4.3.2</product>
<product>plone:4.3.3</product>
<product>plone:4.3.4</product>
<product>plone:4.3.5</product>
<product>plone:4.3.6</product>
<product>plone:4.3.7</product>
<product>plone:4.3.8</product>
<product>plone:4.3.9</product>
<product>plone:4.3.10</product>
<product>plone:4.3.11</product>
<product>plone:5.0</product>
<product>plone:5.0</product>
<product>plone:5.0</product>
<product>plone:5.0</product>
<product>plone:5.0</product>
<product>plone:5.0.1</product>
<product>plone:5.0.2</product>
<product>plone:5.0.3</product>
<product>plone:5.0.4</product>
<product>plone:5.0.5</product>
<product>plone:5.0.6</product>
<product>plone:5.1a1</product>
</cve>
<cve id="CVE-2016-7136" level="MEDIUM">
<product>plone:4.0</product>
<product>plone:4.0.1</product>
<product>plone:4.0.2</product>
<product>plone:4.0.3</product>
<product>plone:4.0.4</product>
<product>plone:4.0.5</product>
<product>plone:4.0.7</product>
<product>plone:4.0.8</product>
<product>plone:4.0.9</product>
<product>plone:4.0.10</product>
<product>plone:4.1</product>
<product>plone:4.1.1</product>
<product>plone:4.1.2</product>
<product>plone:4.1.3</product>
<product>plone:4.1.4</product>
<product>plone:4.1.5</product>
<product>plone:4.1.6</product>
<product>plone:4.2</product>
<product>plone:4.2.1</product>
<product>plone:4.2.2</product>
<product>plone:4.2.3</product>
<product>plone:4.2.4</product>
<product>plone:4.2.5</product>
<product>plone:4.2.6</product>
<product>plone:4.2.7</product>
<product>plone:4.3</product>
<product>plone:4.3.1</product>
<product>plone:4.3.2</product>
<product>plone:4.3.3</product>
<product>plone:4.3.4</product>
<product>plone:4.3.5</product>
<product>plone:4.3.6</product>
<product>plone:4.3.7</product>
<product>plone:4.3.8</product>
<product>plone:4.3.9</product>
<product>plone:4.3.10</product>
<product>plone:4.3.11</product>
<product>plone:5.0</product>
<product>plone:5.0</product>
<product>plone:5.0</product>
<product>plone:5.0</product>
<product>plone:5.0</product>
<product>plone:5.0.1</product>
<product>plone:5.0.2</product>
<product>plone:5.0.3</product>
<product>plone:5.0.4</product>
<product>plone:5.0.5</product>
<product>plone:5.0.6</product>
<product>plone:5.1a1</product>
</cve>
<cve id="CVE-2016-7135" level="LOW">
<product>plone:4.2</product>
<product>plone:4.2.1</product>
<product>plone:4.2.2</product>
<product>plone:4.2.3</product>
<product>plone:4.2.4</product>
<product>plone:4.2.5</product>
<product>plone:4.2.6</product>
<product>plone:4.2.7</product>
<product>plone:4.3</product>
<product>plone:4.3.1</product>
<product>plone:4.3.2</product>
<product>plone:4.3.3</product>
<product>plone:4.3.4</product>
<product>plone:4.3.5</product>
<product>plone:4.3.6</product>
<product>plone:4.3.7</product>
<product>plone:4.3.8</product>
<product>plone:4.3.9</product>
<product>plone:4.3.10</product>
<product>plone:4.3.11</product>
<product>plone:5.0</product>
<product>plone:5.0</product>
<product>plone:5.0</product>
<product>plone:5.0</product>
<product>plone:5.0</product>
<product>plone:5.0.1</product>
<product>plone:5.0.2</product>
<product>plone:5.0.3</product>
<product>plone:5.0.4</product>
<product>plone:5.0.5</product>
<product>plone:5.0.6</product>
<product>plone:5.1a1</product>
</cve>
<cve id="CVE-2016-9867" level="LOW">
<product>scaleio:2.0.1.0</product>
</cve>
<cve id="CVE-2016-9866" level="MEDIUM">
<product>phpmyadmin:4.0.0</product>
<product>phpmyadmin:4.0.1</product>
<product>phpmyadmin:4.0.2</product>
<product>phpmyadmin:4.0.3</product>
<product>phpmyadmin:4.0.4</product>
<product>phpmyadmin:4.0.4.1</product>
<product>phpmyadmin:4.0.4.2</product>
<product>phpmyadmin:4.0.5</product>
<product>phpmyadmin:4.0.6</product>
<product>phpmyadmin:4.0.7</product>
<product>phpmyadmin:4.0.8</product>
<product>phpmyadmin:4.0.9</product>
<product>phpmyadmin:4.0.10</product>
<product>phpmyadmin:4.0.10.1</product>
<product>phpmyadmin:4.0.10.2</product>
<product>phpmyadmin:4.0.10.3</product>
<product>phpmyadmin:4.0.10.4</product>
<product>phpmyadmin:4.0.10.5</product>
<product>phpmyadmin:4.0.10.6</product>
<product>phpmyadmin:4.0.10.7</product>
<product>phpmyadmin:4.0.10.8</product>
<product>phpmyadmin:4.0.10.9</product>
<product>phpmyadmin:4.0.10.10</product>
<product>phpmyadmin:4.0.10.11</product>
<product>phpmyadmin:4.0.10.12</product>
<product>phpmyadmin:4.0.10.13</product>
<product>phpmyadmin:4.0.10.14</product>
<product>phpmyadmin:4.0.10.15</product>
<product>phpmyadmin:4.0.10.16</product>
<product>phpmyadmin:4.0.10.17</product>
<product>phpmyadmin:4.4.0</product>
<product>phpmyadmin:4.4.1</product>
<product>phpmyadmin:4.4.1.1</product>
<product>phpmyadmin:4.4.2</product>
<product>phpmyadmin:4.4.3</product>
<product>phpmyadmin:4.4.4</product>
<product>phpmyadmin:4.4.5</product>
<product>phpmyadmin:4.4.6</product>
<product>phpmyadmin:4.4.6.1</product>
<product>phpmyadmin:4.4.7</product>
<product>phpmyadmin:4.4.8</product>
<product>phpmyadmin:4.4.9</product>
<product>phpmyadmin:4.4.10</product>
<product>phpmyadmin:4.4.11</product>
<product>phpmyadmin:4.4.12</product>
<product>phpmyadmin:4.4.13</product>
<product>phpmyadmin:4.4.13.1</product>
<product>phpmyadmin:4.4.14</product>
<product>phpmyadmin:4.4.14.1</product>
<product>phpmyadmin:4.4.15</product>
<product>phpmyadmin:4.4.15.1</product>
<product>phpmyadmin:4.4.15.2</product>
<product>phpmyadmin:4.4.15.3</product>
<product>phpmyadmin:4.4.15.4</product>
<product>phpmyadmin:4.4.15.5</product>
<product>phpmyadmin:4.4.15.6</product>
<product>phpmyadmin:4.4.15.7</product>
<product>phpmyadmin:4.4.15.8</product>
<product>phpmyadmin:4.6.0</product>
<product>phpmyadmin:4.6.1</product>
<product>phpmyadmin:4.6.2</product>
<product>phpmyadmin:4.6.3</product>
<product>phpmyadmin:4.6.4</product>
</cve>
<cve id="CVE-2016-9865" level="LOW">
<product>phpmyadmin:4.0.0</product>
<product>phpmyadmin:4.0.1</product>
<product>phpmyadmin:4.0.2</product>
<product>phpmyadmin:4.0.3</product>
<product>phpmyadmin:4.0.4</product>
<product>phpmyadmin:4.0.4.1</product>
<product>phpmyadmin:4.0.4.2</product>
<product>phpmyadmin:4.0.5</product>
<product>phpmyadmin:4.0.6</product>
<product>phpmyadmin:4.0.7</product>
<product>phpmyadmin:4.0.8</product>
<product>phpmyadmin:4.0.9</product>
<product>phpmyadmin:4.0.10</product>
<product>phpmyadmin:4.0.10.1</product>
<product>phpmyadmin:4.0.10.2</product>
<product>phpmyadmin:4.0.10.3</product>
<product>phpmyadmin:4.0.10.4</product>
<product>phpmyadmin:4.0.10.5</product>
<product>phpmyadmin:4.0.10.6</product>
<product>phpmyadmin:4.0.10.7</product>
<product>phpmyadmin:4.0.10.8</product>
<product>phpmyadmin:4.0.10.9</product>
<product>phpmyadmin:4.0.10.10</product>
<product>phpmyadmin:4.0.10.11</product>
<product>phpmyadmin:4.0.10.12</product>
<product>phpmyadmin:4.0.10.13</product>
<product>phpmyadmin:4.0.10.14</product>
<product>phpmyadmin:4.0.10.15</product>
<product>phpmyadmin:4.0.10.16</product>
<product>phpmyadmin:4.0.10.17</product>
<product>phpmyadmin:4.4.0</product>
<product>phpmyadmin:4.4.1</product>
<product>phpmyadmin:4.4.1.1</product>
<product>phpmyadmin:4.4.2</product>
<product>phpmyadmin:4.4.3</product>
<product>phpmyadmin:4.4.4</product>
<product>phpmyadmin:4.4.5</product>
<product>phpmyadmin:4.4.6</product>
<product>phpmyadmin:4.4.6.1</product>
<product>phpmyadmin:4.4.7</product>
<product>phpmyadmin:4.4.8</product>
<product>phpmyadmin:4.4.9</product>
<product>phpmyadmin:4.4.10</product>
<product>phpmyadmin:4.4.11</product>
<product>phpmyadmin:4.4.12</product>
<product>phpmyadmin:4.4.13</product>
<product>phpmyadmin:4.4.13.1</product>
<product>phpmyadmin:4.4.14</product>
<product>phpmyadmin:4.4.14.1</product>
<product>phpmyadmin:4.4.15</product>
<product>phpmyadmin:4.4.15.1</product>
<product>phpmyadmin:4.4.15.2</product>
<product>phpmyadmin:4.4.15.3</product>
<product>phpmyadmin:4.4.15.4</product>
<product>phpmyadmin:4.4.15.5</product>
<product>phpmyadmin:4.4.15.6</product>
<product>phpmyadmin:4.4.15.7</product>
<product>phpmyadmin:4.4.15.8</product>
<product>phpmyadmin:4.6.0</product>
<product>phpmyadmin:4.6.1</product>
<product>phpmyadmin:4.6.2</product>
<product>phpmyadmin:4.6.3</product>
<product>phpmyadmin:4.6.4</product>
</cve>
<cve id="CVE-2016-9864" level="MEDIUM">
<product>phpmyadmin:4.0.0</product>
<product>phpmyadmin:4.0.1</product>
<product>phpmyadmin:4.0.2</product>
<product>phpmyadmin:4.0.3</product>
<product>phpmyadmin:4.0.4</product>
<product>phpmyadmin:4.0.4.1</product>
<product>phpmyadmin:4.0.4.2</product>
<product>phpmyadmin:4.0.5</product>
<product>phpmyadmin:4.0.6</product>
<product>phpmyadmin:4.0.7</product>
<product>phpmyadmin:4.0.8</product>
<product>phpmyadmin:4.0.9</product>
<product>phpmyadmin:4.0.10</product>
<product>phpmyadmin:4.0.10.1</product>
<product>phpmyadmin:4.0.10.2</product>
<product>phpmyadmin:4.0.10.3</product>
<product>phpmyadmin:4.0.10.4</product>
<product>phpmyadmin:4.0.10.5</product>
<product>phpmyadmin:4.0.10.6</product>
<product>phpmyadmin:4.0.10.7</product>
<product>phpmyadmin:4.0.10.8</product>
<product>phpmyadmin:4.0.10.9</product>
<product>phpmyadmin:4.0.10.10</product>
<product>phpmyadmin:4.0.10.11</product>
<product>phpmyadmin:4.0.10.12</product>
<product>phpmyadmin:4.0.10.13</product>
<product>phpmyadmin:4.0.10.14</product>
<product>phpmyadmin:4.0.10.15</product>
<product>phpmyadmin:4.0.10.16</product>
<product>phpmyadmin:4.0.10.17</product>
<product>phpmyadmin:4.4.0</product>
<product>phpmyadmin:4.4.1</product>
<product>phpmyadmin:4.4.1.1</product>
<product>phpmyadmin:4.4.2</product>
<product>phpmyadmin:4.4.3</product>
<product>phpmyadmin:4.4.4</product>
<product>phpmyadmin:4.4.5</product>
<product>phpmyadmin:4.4.6</product>
<product>phpmyadmin:4.4.6.1</product>
<product>phpmyadmin:4.4.7</product>
<product>phpmyadmin:4.4.8</product>
<product>phpmyadmin:4.4.9</product>
<product>phpmyadmin:4.4.10</product>
<product>phpmyadmin:4.4.11</product>
<product>phpmyadmin:4.4.12</product>
<product>phpmyadmin:4.4.13</product>
<product>phpmyadmin:4.4.13.1</product>
<product>phpmyadmin:4.4.14</product>
<product>phpmyadmin:4.4.14.1</product>
<product>phpmyadmin:4.4.15</product>
<product>phpmyadmin:4.4.15.1</product>
<product>phpmyadmin:4.4.15.2</product>
<product>phpmyadmin:4.4.15.3</product>
<product>phpmyadmin:4.4.15.4</product>
<product>phpmyadmin:4.4.15.5</product>
<product>phpmyadmin:4.4.15.6</product>
<product>phpmyadmin:4.4.15.7</product>
<product>phpmyadmin:4.4.15.8</product>
<product>phpmyadmin:4.6.0</product>
<product>phpmyadmin:4.6.1</product>
<product>phpmyadmin:4.6.2</product>
<product>phpmyadmin:4.6.3</product>
<product>phpmyadmin:4.6.4</product>
</cve>
<cve id="CVE-2016-9863" level="LOW">
<product>phpmyadmin:4.6.0</product>
<product>phpmyadmin:4.6.1</product>
<product>phpmyadmin:4.6.2</product>
<product>phpmyadmin:4.6.3</product>
<product>phpmyadmin:4.6.4</product>
</cve>
<cve id="CVE-2016-9862" level="LOW">
<product>phpmyadmin:4.6.0</product>
<product>phpmyadmin:4.6.1</product>
<product>phpmyadmin:4.6.2</product>
<product>phpmyadmin:4.6.3</product>
<product>phpmyadmin:4.6.4</product>
</cve>
<cve id="CVE-2016-9861" level="LOW">
<product>phpmyadmin:4.0.0</product>
<product>phpmyadmin:4.0.1</product>
<product>phpmyadmin:4.0.2</product>
<product>phpmyadmin:4.0.3</product>
<product>phpmyadmin:4.0.4</product>
<product>phpmyadmin:4.0.4.1</product>
<product>phpmyadmin:4.0.4.2</product>
<product>phpmyadmin:4.0.5</product>
<product>phpmyadmin:4.0.6</product>
<product>phpmyadmin:4.0.7</product>
<product>phpmyadmin:4.0.8</product>
<product>phpmyadmin:4.0.9</product>
<product>phpmyadmin:4.0.10</product>
<product>phpmyadmin:4.0.10.1</product>
<product>phpmyadmin:4.0.10.2</product>
<product>phpmyadmin:4.0.10.3</product>
<product>phpmyadmin:4.0.10.4</product>
<product>phpmyadmin:4.0.10.5</product>
<product>phpmyadmin:4.0.10.6</product>
<product>phpmyadmin:4.0.10.7</product>
<product>phpmyadmin:4.0.10.8</product>
<product>phpmyadmin:4.0.10.9</product>
<product>phpmyadmin:4.0.10.10</product>
<product>phpmyadmin:4.0.10.11</product>
<product>phpmyadmin:4.0.10.12</product>
<product>phpmyadmin:4.0.10.13</product>
<product>phpmyadmin:4.0.10.14</product>
<product>phpmyadmin:4.0.10.15</product>
<product>phpmyadmin:4.0.10.16</product>
<product>phpmyadmin:4.0.10.17</product>
<product>phpmyadmin:4.4.0</product>
<product>phpmyadmin:4.4.1</product>
<product>phpmyadmin:4.4.1.1</product>
<product>phpmyadmin:4.4.2</product>
<product>phpmyadmin:4.4.3</product>
<product>phpmyadmin:4.4.4</product>
<product>phpmyadmin:4.4.5</product>
<product>phpmyadmin:4.4.6</product>
<product>phpmyadmin:4.4.6.1</product>
<product>phpmyadmin:4.4.7</product>
<product>phpmyadmin:4.4.8</product>
<product>phpmyadmin:4.4.9</product>
<product>phpmyadmin:4.4.10</product>
<product>phpmyadmin:4.4.11</product>
<product>phpmyadmin:4.4.12</product>
<product>phpmyadmin:4.4.13</product>
<product>phpmyadmin:4.4.13.1</product>
<product>phpmyadmin:4.4.14</product>
<product>phpmyadmin:4.4.14.1</product>
<product>phpmyadmin:4.4.15</product>
<product>phpmyadmin:4.4.15.1</product>
<product>phpmyadmin:4.4.15.2</product>
<product>phpmyadmin:4.4.15.3</product>
<product>phpmyadmin:4.4.15.4</product>
<product>phpmyadmin:4.4.15.5</product>
<product>phpmyadmin:4.4.15.6</product>
<product>phpmyadmin:4.4.15.7</product>
<product>phpmyadmin:4.4.15.8</product>
<product>phpmyadmin:4.6.0</product>
<product>phpmyadmin:4.6.1</product>
<product>phpmyadmin:4.6.2</product>
<product>phpmyadmin:4.6.3</product>
<product>phpmyadmin:4.6.4</product>
</cve>
<cve id="CVE-2016-9860" level="MEDIUM">
<product>phpmyadmin:4.0.0</product>
<product>phpmyadmin:4.0.1</product>
<product>phpmyadmin:4.0.2</product>
<product>phpmyadmin:4.0.3</product>
<product>phpmyadmin:4.0.4</product>
<product>phpmyadmin:4.0.4.1</product>
<product>phpmyadmin:4.0.4.2</product>
<product>phpmyadmin:4.0.5</product>
<product>phpmyadmin:4.0.6</product>
<product>phpmyadmin:4.0.7</product>
<product>phpmyadmin:4.0.8</product>
<product>phpmyadmin:4.0.9</product>
<product>phpmyadmin:4.0.10</product>
<product>phpmyadmin:4.0.10.1</product>
<product>phpmyadmin:4.0.10.2</product>
<product>phpmyadmin:4.0.10.3</product>
<product>phpmyadmin:4.0.10.4</product>
<product>phpmyadmin:4.0.10.5</product>
<product>phpmyadmin:4.0.10.6</product>
<product>phpmyadmin:4.0.10.7</product>
<product>phpmyadmin:4.0.10.8</product>
<product>phpmyadmin:4.0.10.9</product>
<product>phpmyadmin:4.0.10.10</product>
<product>phpmyadmin:4.0.10.11</product>
<product>phpmyadmin:4.0.10.12</product>
<product>phpmyadmin:4.0.10.13</product>
<product>phpmyadmin:4.0.10.14</product>
<product>phpmyadmin:4.0.10.15</product>
<product>phpmyadmin:4.0.10.16</product>
<product>phpmyadmin:4.0.10.17</product>
<product>phpmyadmin:4.4.0</product>
<product>phpmyadmin:4.4.1</product>
<product>phpmyadmin:4.4.1.1</product>
<product>phpmyadmin:4.4.2</product>
<product>phpmyadmin:4.4.3</product>
<product>phpmyadmin:4.4.4</product>
<product>phpmyadmin:4.4.5</product>
<product>phpmyadmin:4.4.6</product>
<product>phpmyadmin:4.4.6.1</product>
<product>phpmyadmin:4.4.7</product>
<product>phpmyadmin:4.4.8</product>
<product>phpmyadmin:4.4.9</product>
<product>phpmyadmin:4.4.10</product>
<product>phpmyadmin:4.4.11</product>
<product>phpmyadmin:4.4.12</product>
<product>phpmyadmin:4.4.13</product>
<product>phpmyadmin:4.4.13.1</product>
<product>phpmyadmin:4.4.14</product>
<product>phpmyadmin:4.4.14.1</product>
<product>phpmyadmin:4.4.15</product>
<product>phpmyadmin:4.4.15.1</product>
<product>phpmyadmin:4.4.15.2</product>
<product>phpmyadmin:4.4.15.3</product>
<product>phpmyadmin:4.4.15.4</product>
<product>phpmyadmin:4.4.15.5</product>
<product>phpmyadmin:4.4.15.6</product>
<product>phpmyadmin:4.4.15.7</product>
<product>phpmyadmin:4.4.15.8</product>
<product>phpmyadmin:4.6.0</product>
<product>phpmyadmin:4.6.1</product>
<product>phpmyadmin:4.6.2</product>
<product>phpmyadmin:4.6.3</product>
<product>phpmyadmin:4.6.4</product>
</cve>
<cve id="CVE-2016-9869" level="LOW">
<product>scaleio:2.0.1.0</product>
</cve>
<cve id="CVE-2016-8973" level="LOW">
<product>rational_rhapsody_design_manager:4.0</product>
<product>rational_rhapsody_design_manager:4.0.1</product>
<product>rational_rhapsody_design_manager:4.0.2</product>
<product>rational_rhapsody_design_manager:4.0.3</product>
<product>rational_rhapsody_design_manager:4.0.4</product>
<product>rational_rhapsody_design_manager:4.0.5</product>
<product>rational_rhapsody_design_manager:4.0.6</product>
<product>rational_rhapsody_design_manager:4.0.7</product>
<product>rational_rhapsody_design_manager:5.0</product>
<product>rational_rhapsody_design_manager:5.0.1</product>
<product>rational_rhapsody_design_manager:5.0.2</product>
<product>rational_rhapsody_design_manager:6.0</product>
<product>rational_rhapsody_design_manager:6.0.1</product>
<product>rational_rhapsody_design_manager:6.0.2</product>
</cve>
<cve id="CVE-2016-10626" level="MEDIUM">
<product>mystem3:1.0.7</product>
</cve>
<cve id="CVE-2016-10155" level="LOW">
<product>qemu</product>
</cve>
<cve id="CVE-2016-10156" level="LOW">
<product>systemd:228</product>
</cve>
<cve id="CVE-2016-10157" level="LOW">
<product>netsession:1.9.3.1</product>
</cve>
<cve id="CVE-2016-10623" level="MEDIUM">
<product>macaca-chromedriver-zxa:0.1.9</product>
</cve>
<cve id="CVE-2016-10152" level="LOW">
<product>hesiod:3.2.1</product>
</cve>
<cve id="CVE-2016-10621" level="MEDIUM">
<product>fibjs:0.1.8</product>
</cve>
<cve id="CVE-2016-10628" level="MEDIUM">
<product>selenium-wrapper:0.0.9</product>
</cve>
<cve id="CVE-2016-10629" level="MEDIUM">
<product>nw-with-arm:0.12.2</product>
</cve>
<cve id="CVE-2016-1298" level="MEDIUM">
<product>unified_contact_center_express:10.0%281%29</product>
<product>unified_contact_center_express:10.5%281%29</product>
<product>unified_contact_center_express:10.6%281%29</product>
<product>unified_contact_center_express:11.0%281%29</product>
</cve>
<cve id="CVE-2016-1299" level="LOW">
<product>300_series_managed_switch_firmware:1.4.1</product>
</cve>
<cve id="CVE-2016-1290" level="LOW">
<product>evolved_programmable_network_manager:1.2.0</product>
<product>prime_infrastructure:1.2.0</product>
<product>prime_infrastructure:1.2.0.103</product>
<product>prime_infrastructure:1.2.1</product>
<product>prime_infrastructure:1.3.0</product>
<product>prime_infrastructure:1.3.0.20</product>
<product>prime_infrastructure:1.4.0</product>
<product>prime_infrastructure:1.4.0.45</product>
<product>prime_infrastructure:1.4.1</product>
<product>prime_infrastructure:1.4.2</product>
<product>prime_infrastructure:2.0.0</product>
<product>prime_infrastructure:2.1.0</product>
<product>prime_infrastructure:2.2.0</product>
<product>prime_infrastructure:2.2%5c%282%5c%29</product>
</cve>
<cve id="CVE-2016-1291" level="MEDIUM">
<product>evolved_programmable_network_manager:1.2.0</product>
<product>prime_infrastructure:1.2.0</product>
<product>prime_infrastructure:1.2.0.103</product>
<product>prime_infrastructure:1.2.1</product>
<product>prime_infrastructure:1.3.0</product>
<product>prime_infrastructure:1.3.0.20</product>
<product>prime_infrastructure:1.4.0</product>
<product>prime_infrastructure:1.4.0.45</product>
<product>prime_infrastructure:1.4.1</product>
<product>prime_infrastructure:1.4.2</product>
<product>prime_infrastructure:2.0.0</product>
<product>prime_infrastructure:2.1.0</product>
<product>prime_infrastructure:2.2.0</product>
<product>prime_infrastructure:2.2%5c%282%5c%29</product>
</cve>
<cve id="CVE-2016-1293" level="MEDIUM">
<product>firesight_system_software:6.0.0</product>
<product>firesight_system_software:6.0.1</product>
</cve>
<cve id="CVE-2016-1294" level="MEDIUM">
<product>firesight_system_software:6.0.1</product>
</cve>
<cve id="CVE-2016-1295" level="LOW">
<product>adaptive_security_appliance_software:8.4.0</product>
<product>adaptive_security_appliance_software:8.4.1</product>
<product>adaptive_security_appliance_software:8.4.1.3</product>
<product>adaptive_security_appliance_software:8.4.1.11</product>
<product>adaptive_security_appliance_software:8.4.2</product>
<product>adaptive_security_appliance_software:8.4.2.1</product>
<product>adaptive_security_appliance_software:8.4.2.8</product>
<product>adaptive_security_appliance_software:8.4.3</product>
<product>adaptive_security_appliance_software:8.4.3.8</product>
<product>adaptive_security_appliance_software:8.4.3.9</product>
<product>adaptive_security_appliance_software:8.4.4</product>
<product>adaptive_security_appliance_software:8.4.4.1</product>
<product>adaptive_security_appliance_software:8.4.4.3</product>
<product>adaptive_security_appliance_software:8.4.4.5</product>
<product>adaptive_security_appliance_software:8.4.4.9</product>
<product>adaptive_security_appliance_software:8.4.5</product>
<product>adaptive_security_appliance_software:8.4.5.6</product>
<product>adaptive_security_appliance_software:8.4.6</product>
<product>adaptive_security_appliance_software:8.4.7</product>
<product>adaptive_security_appliance_software:8.4.7.3</product>
<product>adaptive_security_appliance_software:8.4.7.15</product>
<product>adaptive_security_appliance_software:8.4.7.22</product>
<product>adaptive_security_appliance_software:8.4.7.23</product>
<product>adaptive_security_appliance_software:8.4.7.26</product>
<product>adaptive_security_appliance_software:8.4.7.28</product>
<product>adaptive_security_appliance_software:8.4.7.29</product>
</cve>
<cve id="CVE-2016-1296" level="LOW">
<product>web_security_appliance:8.5.3-055</product>
<product>web_security_appliance:9.1.0-000</product>
<product>web_security_appliance:9.5.0-235</product>
</cve>
<cve id="CVE-2016-1297" level="LOW">
<product>application_control_engine_software:a5%281.0%29</product>
<product>application_control_engine_software:a5%281.1%29</product>
<product>application_control_engine_software:a5%281.2%29</product>
<product>application_control_engine_software:a5%282.0%29</product>
<product>application_control_engine_software:a5%282.1%29</product>
<product>application_control_engine_software:a5%282.1e%29</product>
<product>application_control_engine_software:a5%283.0%29</product>
</cve>
<cve id="CVE-2016-9249" level="LOW">
<product>big-ip_access_policy_manager:12.0.0</product>
<product>big-ip_access_policy_manager:12.1.0</product>
<product>big-ip_access_policy_manager:12.1.1</product>
<product>big-ip_advanced_firewall_manager:12.0.0</product>
<product>big-ip_advanced_firewall_manager:12.1.0</product>
<product>big-ip_advanced_firewall_manager:12.1.1</product>
<product>big-ip_analytics:12.0.0</product>
<product>big-ip_analytics:12.1.0</product>
<product>big-ip_analytics:12.1.1</product>
<product>big-ip_application_acceleration_manager:12.0.0</product>
<product>big-ip_application_acceleration_manager:12.1.0</product>
<product>big-ip_application_acceleration_manager:12.1.1</product>
<product>big-ip_application_security_manager:12.0.0</product>
<product>big-ip_application_security_manager:12.1.0</product>
<product>big-ip_application_security_manager:12.1.1</product>
<product>big-ip_domain_name_system:12.0.0</product>
<product>big-ip_domain_name_system:12.1.0</product>
<product>big-ip_domain_name_system:12.1.1</product>
<product>big-ip_link_controller:12.0.0</product>
<product>big-ip_link_controller:12.1.0</product>
<product>big-ip_link_controller:12.1.1</product>
<product>big-ip_local_traffic_manager:12.0.0</product>
<product>big-ip_local_traffic_manager:12.1.0</product>
<product>big-ip_local_traffic_manager:12.1.1</product>
<product>big-ip_policy_enforcement_manager:12.0.0</product>
<product>big-ip_policy_enforcement_manager:12.1.0</product>
<product>big-ip_policy_enforcement_manager:12.1.1</product>
<product>big-ip_websafe:12.0.0</product>
<product>big-ip_websafe:12.1.0</product>
<product>big-ip_websafe:12.1.1</product>
</cve>
<cve id="CVE-2016-2403" level="LOW">
<product>symfony:2.8.0</product>
<product>symfony:2.8.1</product>
<product>symfony:2.8.2</product>
<product>symfony:2.8.3</product>
<product>symfony:2.8.4</product>
<product>symfony:2.8.5</product>
<product>symfony:3.0.0</product>
<product>symfony:3.0.1</product>
<product>symfony:3.0.2</product>
<product>symfony:3.0.3</product>
<product>symfony:3.0.4</product>
<product>symfony:3.0.5</product>
</cve>
<cve id="CVE-2016-2404" level="MEDIUM">
<product>acu2_firmware:v200r005c00spc500</product>
<product>acu2_firmware:v200r006c00</product>
<product>s12700_firmware:v200r005c00spc500</product>
<product>s12700_firmware:v200r006c00</product>
<product>s5700_firmware:v200r001c00spc300</product>
<product>s5700_firmware:v200r002c00spc100</product>
<product>s5700_firmware:v200r003c00spc300</product>
<product>s5700_firmware:v200r005c00spc500</product>
<product>s5700_firmware:v200r006c00</product>
<product>s6700_firmware:v200r001c00spc300</product>
<product>s6700_firmware:v200r002c00spc100</product>
<product>s6700_firmware:v200r003c00spc300</product>
<product>s6700_firmware:v200r005c00spc500</product>
<product>s6700_firmware:v200r006c00</product>
<product>s7700_firmware:v200r001c00spc300</product>
<product>s7700_firmware:v200r002c00spc100</product>
<product>s7700_firmware:v200r003c00spc300</product>
<product>s7700_firmware:v200r005c00spc500</product>
<product>s7700_firmware:v200r006c00</product>
<product>s9700_firmware:v200r001c00spc300</product>
<product>s9700_firmware:v200r002c00spc100</product>
<product>s9700_firmware:v200r003c00spc300</product>
<product>s9700_firmware:v200r005c00spc500</product>
<product>s9700_firmware:v200r006c00</product>
</cve>
<cve id="CVE-2016-2405" level="LOW">
<product>policy_center_firmware:v100r003c10</product>
</cve>
<cve id="CVE-2016-2406" level="LOW">
<product>document_security_management:v100r002c05spc661</product>
</cve>
<cve id="CVE-2016-2408" level="LOW">
<product>odyssey_access_client:5.6r16.0</product>
<product>pulse_secure_desktop:5.0r1.0</product>
<product>pulse_secure_desktop:5.0r2.0</product>
<product>pulse_secure_desktop:5.0r3.0</product>
<product>pulse_secure_desktop:5.0r3.1</product>
<product>pulse_secure_desktop:5.0r4.0</product>
<product>pulse_secure_desktop:5.0r4.1</product>
<product>pulse_secure_desktop:5.0r5.0</product>
<product>pulse_secure_desktop:5.0r6.0</product>
<product>pulse_secure_desktop:5.0r7.0</product>
<product>pulse_secure_desktop:5.0r8.0</product>
<product>pulse_secure_desktop:5.0r8.1</product>
<product>pulse_secure_desktop:5.0r9.0</product>
<product>pulse_secure_desktop:5.0r10.0</product>
<product>pulse_secure_desktop:5.0r11.0</product>
<product>pulse_secure_desktop:5.0r12.0</product>
<product>pulse_secure_desktop:5.0r13.0</product>
<product>pulse_secure_desktop:5.0r13.1</product>
<product>pulse_secure_desktop:5.0r14.0</product>
<product>pulse_secure_desktop:5.0r15.0</product>
<product>pulse_secure_desktop:5.1r1.0</product>
<product>pulse_secure_desktop:5.1r1.1</product>
<product>pulse_secure_desktop:5.1r2.0</product>
<product>pulse_secure_desktop:5.1r3.0</product>
<product>pulse_secure_desktop:5.1r3.1</product>
<product>pulse_secure_desktop:5.1r3.2</product>
<product>pulse_secure_desktop:5.1r4.0</product>
<product>pulse_secure_desktop:5.1r5.0</product>
<product>pulse_secure_desktop:5.1r5.1</product>
<product>pulse_secure_desktop:5.1r6.0</product>
<product>pulse_secure_desktop:5.1r7.0</product>
<product>pulse_secure_desktop:5.1r8.0</product>
<product>pulse_secure_desktop:5.1r9.0</product>
<product>pulse_secure_desktop:5.2r1.0</product>
<product>pulse_secure_desktop:5.2r1.1</product>
<product>pulse_secure_desktop:5.2r2.0</product>
<product>pulse_secure_security:8.0r1.0</product>
<product>pulse_secure_security:8.0r1.1</product>
<product>pulse_secure_security:8.0r2.0</product>
<product>pulse_secure_security:8.0r3.0</product>
<product>pulse_secure_security:8.0r3.1</product>
<product>pulse_secure_security:8.0r3.2</product>
<product>pulse_secure_security:8.0r4.0</product>
<product>pulse_secure_security:8.0r4.1</product>
<product>pulse_secure_security:8.0r5.0</product>
<product>pulse_secure_security:8.0r6.0</product>
<product>pulse_secure_security:8.0r7.0</product>
<product>pulse_secure_security:8.0r7.1</product>
<product>pulse_secure_security:8.0r8.0</product>
<product>pulse_secure_security:8.0r8.1</product>
<product>pulse_secure_security:8.0r9.0</product>
<product>pulse_secure_security:8.0r10.0</product>
<product>pulse_secure_security:8.0r11.0</product>
<product>pulse_secure_security:8.0r12.1</product>
<product>pulse_secure_security:8.0r13.0</product>
<product>pulse_secure_security:8.0r13.1</product>
<product>pulse_secure_security:8.0r14.0</product>
<product>pulse_secure_security:8.0r15.0</product>
<product>pulse_secure_security:8.1r1.0</product>
<product>pulse_secure_security:8.1r1.1</product>
<product>pulse_secure_security:8.1r2.0</product>
<product>pulse_secure_security:8.1r2.1</product>
<product>pulse_secure_security:8.1r3.0</product>
<product>pulse_secure_security:8.1r3.1</product>
<product>pulse_secure_security:8.1r3.2</product>
<product>pulse_secure_security:8.1r4.0</product>
<product>pulse_secure_security:8.1r4.1</product>
<product>pulse_secure_security:8.1r5.0</product>
<product>pulse_secure_security:8.1r6.0</product>
<product>pulse_secure_security:8.1r7.0</product>
<product>pulse_secure_security:8.1r8.0</product>
<product>pulse_secure_security:8.1r9.0</product>
<product>pulse_secure_security:8.2r1.0</product>
<product>pulse_secure_security:8.2r1.1</product>
<product>pulse_secure_security:8.2r2.0</product>
<product>standalone_pulse_installer_service:7.4r1.0</product>
<product>standalone_pulse_installer_service:7.4r2.0</product>
<product>standalone_pulse_installer_service:7.4r3.0</product>
<product>standalone_pulse_installer_service:7.4r4.0</product>
<product>standalone_pulse_installer_service:7.4r5.0</product>
<product>standalone_pulse_installer_service:7.4r6.0</product>
<product>standalone_pulse_installer_service:7.4r7.0</product>
<product>standalone_pulse_installer_service:7.4r8.0</product>
<product>standalone_pulse_installer_service:7.4r9.0</product>
<product>standalone_pulse_installer_service:7.4r9.1</product>
<product>standalone_pulse_installer_service:7.4r9.2</product>
<product>standalone_pulse_installer_service:7.4r9.3</product>
<product>standalone_pulse_installer_service:7.4r10.0</product>
<product>standalone_pulse_installer_service:7.4r11.0</product>
<product>standalone_pulse_installer_service:7.4r11.1</product>
<product>standalone_pulse_installer_service:7.4r12.0</product>
<product>standalone_pulse_installer_service:7.4r13.0</product>
<product>standalone_pulse_installer_service:7.4r13.1</product>
<product>standalone_pulse_installer_service:7.4r13.2</product>
<product>standalone_pulse_installer_service:7.4r13.3</product>
<product>standalone_pulse_installer_service:7.4r13.4</product>
<product>standalone_pulse_installer_service:7.4r13.5</product>
<product>standalone_pulse_installer_service:7.4r13.6</product>
<product>standalone_pulse_installer_service:8.0r1.0</product>
<product>standalone_pulse_installer_service:8.0r1.1</product>
<product>standalone_pulse_installer_service:8.0r2.0</product>
<product>standalone_pulse_installer_service:8.0r3.0</product>
<product>standalone_pulse_installer_service:8.0r3.1</product>
<product>standalone_pulse_installer_service:8.0r3.2</product>
<product>standalone_pulse_installer_service:8.0r4.0</product>
<product>standalone_pulse_installer_service:8.0r4.1</product>
<product>standalone_pulse_installer_service:8.0r5.0</product>
<product>standalone_pulse_installer_service:8.0r6.0</product>
<product>standalone_pulse_installer_service:8.0r7.0</product>
<product>standalone_pulse_installer_service:8.0r7.1</product>
<product>standalone_pulse_installer_service:8.0r8.0</product>
<product>standalone_pulse_installer_service:8.0r8.1</product>
<product>standalone_pulse_installer_service:8.0r9.0</product>
<product>standalone_pulse_installer_service:8.0r10.0</product>
<product>standalone_pulse_installer_service:8.0r11.0</product>
<product>standalone_pulse_installer_service:8.0r12.1</product>
<product>standalone_pulse_installer_service:8.0r13.0</product>
<product>standalone_pulse_installer_service:8.0r13.1</product>
<product>standalone_pulse_installer_service:8.0r14.0</product>
<product>standalone_pulse_installer_service:8.0r15.0</product>
<product>standalone_pulse_installer_service:8.1r1.0</product>
<product>standalone_pulse_installer_service:8.1r1.1</product>
<product>standalone_pulse_installer_service:8.1r2.0</product>
<product>standalone_pulse_installer_service:8.1r2.1</product>
<product>standalone_pulse_installer_service:8.1r3.0</product>
<product>standalone_pulse_installer_service:8.1r3.1</product>
<product>standalone_pulse_installer_service:8.1r3.2</product>
<product>standalone_pulse_installer_service:8.1r4.0</product>
<product>standalone_pulse_installer_service:8.1r4.1</product>
<product>standalone_pulse_installer_service:8.1r5.0</product>
<product>standalone_pulse_installer_service:8.1r6.0</product>
<product>standalone_pulse_installer_service:8.1r7.0</product>
<product>standalone_pulse_installer_service:8.1r8.0</product>
<product>standalone_pulse_installer_service:8.1r9.0</product>
<product>standalone_pulse_installer_service:8.2r1.0</product>
<product>standalone_pulse_installer_service:8.2r1.1</product>
<product>standalone_pulse_installer_service:8.2r2.0</product>
</cve>
<cve id="CVE-2016-9242" level="LOW">
<product>exponent_cms:2.4.0</product>
</cve>
<cve id="CVE-2016-9247" level="MEDIUM">
<product>big-ip_access_policy_manager:12.1.0</product>
<product>big-ip_access_policy_manager:12.1.1</product>
<product>big-ip_advanced_firewall_manager:12.1.0</product>
<product>big-ip_advanced_firewall_manager:12.1.1</product>
<product>big-ip_analytics:12.1.0</product>
<product>big-ip_analytics:12.1.1</product>
<product>big-ip_application_acceleration_manager:12.1.0</product>
<product>big-ip_application_acceleration_manager:12.1.1</product>
<product>big-ip_application_security_manager:12.1.0</product>
<product>big-ip_application_security_manager:12.1.1</product>
<product>big-ip_domain_name_system:12.1.0</product>
<product>big-ip_domain_name_system:12.1.1</product>
<product>big-ip_link_controller:12.1.0</product>
<product>big-ip_link_controller:12.1.1</product>
<product>big-ip_local_traffic_manager:12.1.0</product>
<product>big-ip_local_traffic_manager:12.1.1</product>
<product>big-ip_policy_enforcement_manager:12.1.0</product>
<product>big-ip_policy_enforcement_manager:12.1.1</product>
<product>big-ip_websafe:12.1.0</product>
<product>big-ip_websafe:12.1.1</product>
</cve>
<cve id="CVE-2016-9245" level="MEDIUM">
<product>big-ip_access_policy_manager:12.1.0</product>
<product>big-ip_access_policy_manager:12.1.1</product>
<product>big-ip_access_policy_manager:12.1.2</product>
<product>big-ip_advanced_firewall_manager:12.1.0</product>
<product>big-ip_advanced_firewall_manager:12.1.1</product>
<product>big-ip_advanced_firewall_manager:12.1.2</product>
<product>big-ip_analytics:12.1.0</product>
<product>big-ip_analytics:12.1.1</product>
<product>big-ip_analytics:12.1.2</product>
<product>big-ip_application_acceleration_manager:12.1.0</product>
<product>big-ip_application_acceleration_manager:12.1.1</product>
<product>big-ip_application_acceleration_manager:12.1.2</product>
<product>big-ip_application_security_manager:12.1.0</product>
<product>big-ip_application_security_manager:12.1.1</product>
<product>big-ip_application_security_manager:12.1.2</product>
<product>big-ip_domain_name_system:12.1.0</product>
<product>big-ip_domain_name_system:12.1.1</product>
<product>big-ip_domain_name_system:12.1.2</product>
<product>big-ip_link_controller:12.1.0</product>
<product>big-ip_link_controller:12.1.1</product>
<product>big-ip_link_controller:12.1.2</product>
<product>big-ip_local_traffic_manager:12.1.0</product>
<product>big-ip_local_traffic_manager:12.1.1</product>
<product>big-ip_local_traffic_manager:12.1.2</product>
<product>big-ip_policy_enforcement_manager:12.1.0</product>
<product>big-ip_policy_enforcement_manager:12.1.1</product>
<product>big-ip_policy_enforcement_manager:12.1.2</product>
<product>big-ip_websafe:12.1.0</product>
<product>big-ip_websafe:12.1.1</product>
<product>big-ip_websafe:12.1.2</product>
</cve>
<cve id="CVE-2016-9244" level="LOW">
<product>big-ip_access_policy_manager:11.4.0</product>
<product>big-ip_access_policy_manager:11.4.1</product>
<product>big-ip_access_policy_manager:11.5.0</product>
<product>big-ip_access_policy_manager:11.5.1</product>
<product>big-ip_access_policy_manager:11.5.2</product>
<product>big-ip_access_policy_manager:11.5.3</product>
<product>big-ip_access_policy_manager:11.5.4</product>
<product>big-ip_access_policy_manager:11.6.0</product>
<product>big-ip_access_policy_manager:11.6.1</product>
<product>big-ip_access_policy_manager:12.0.0</product>
<product>big-ip_access_policy_manager:12.1.0</product>
<product>big-ip_access_policy_manager:12.1.1</product>
<product>big-ip_access_policy_manager:12.1.2</product>
<product>big-ip_advanced_firewall_manager:11.4.0</product>
<product>big-ip_advanced_firewall_manager:11.4.1</product>
<product>big-ip_advanced_firewall_manager:11.5.0</product>
<product>big-ip_advanced_firewall_manager:11.5.1</product>
<product>big-ip_advanced_firewall_manager:11.5.2</product>
<product>big-ip_advanced_firewall_manager:11.5.3</product>
<product>big-ip_advanced_firewall_manager:11.5.4</product>
<product>big-ip_advanced_firewall_manager:11.6.0</product>
<product>big-ip_advanced_firewall_manager:11.6.1</product>
<product>big-ip_advanced_firewall_manager:12.0.0</product>
<product>big-ip_advanced_firewall_manager:12.1.0</product>
<product>big-ip_advanced_firewall_manager:12.1.1</product>
<product>big-ip_advanced_firewall_manager:12.1.2</product>
<product>big-ip_analytics:11.4.0</product>
<product>big-ip_analytics:11.4.1</product>
<product>big-ip_analytics:11.5.0</product>
<product>big-ip_analytics:11.5.1</product>
<product>big-ip_analytics:11.5.2</product>
<product>big-ip_analytics:11.5.3</product>
<product>big-ip_analytics:11.5.4</product>
<product>big-ip_analytics:11.6.0</product>
<product>big-ip_analytics:11.6.1</product>
<product>big-ip_analytics:12.0.0</product>
<product>big-ip_analytics:12.1.0</product>
<product>big-ip_analytics:12.1.1</product>
<product>big-ip_analytics:12.1.2</product>
<product>big-ip_application_acceleration_manager:11.4.0</product>
<product>big-ip_application_acceleration_manager:11.4.1</product>
<product>big-ip_application_acceleration_manager:11.5.0</product>
<product>big-ip_application_acceleration_manager:11.5.1</product>
<product>big-ip_application_acceleration_manager:11.5.2</product>
<product>big-ip_application_acceleration_manager:11.5.3</product>
<product>big-ip_application_acceleration_manager:11.5.4</product>
<product>big-ip_application_acceleration_manager:11.6.0</product>
<product>big-ip_application_acceleration_manager:11.6.1</product>
<product>big-ip_application_acceleration_manager:12.0.0</product>
<product>big-ip_application_acceleration_manager:12.1.0</product>
<product>big-ip_application_acceleration_manager:12.1.1</product>
<product>big-ip_application_acceleration_manager:12.1.2</product>
<product>big-ip_application_security_manager:11.4.0</product>
<product>big-ip_application_security_manager:11.4.1</product>
<product>big-ip_application_security_manager:11.5.0</product>
<product>big-ip_application_security_manager:11.5.1</product>
<product>big-ip_application_security_manager:11.5.2</product>
<product>big-ip_application_security_manager:11.5.3</product>
<product>big-ip_application_security_manager:11.5.4</product>
<product>big-ip_application_security_manager:11.6.0</product>
<product>big-ip_application_security_manager:11.6.1</product>
<product>big-ip_application_security_manager:12.0.0</product>
<product>big-ip_application_security_manager:12.1.0</product>
<product>big-ip_application_security_manager:12.1.1</product>
<product>big-ip_application_security_manager:12.1.2</product>
<product>big-ip_global_traffic_manager:11.4.0</product>
<product>big-ip_global_traffic_manager:11.4.1</product>
<product>big-ip_global_traffic_manager:11.5.0</product>
<product>big-ip_global_traffic_manager:11.5.1</product>
<product>big-ip_global_traffic_manager:11.5.2</product>
<product>big-ip_global_traffic_manager:11.5.3</product>
<product>big-ip_global_traffic_manager:11.5.4</product>
<product>big-ip_global_traffic_manager:11.6.0</product>
<product>big-ip_global_traffic_manager:11.6.1</product>
<product>big-ip_link_controller:11.4.0</product>
<product>big-ip_link_controller:11.4.1</product>
<product>big-ip_link_controller:11.5.0</product>
<product>big-ip_link_controller:11.5.1</product>
<product>big-ip_link_controller:11.5.2</product>
<product>big-ip_link_controller:11.5.3</product>
<product>big-ip_link_controller:11.5.4</product>
<product>big-ip_link_controller:11.6.0</product>
<product>big-ip_link_controller:11.6.1</product>
<product>big-ip_link_controller:12.0.0</product>
<product>big-ip_link_controller:12.1.0</product>
<product>big-ip_link_controller:12.1.1</product>
<product>big-ip_link_controller:12.1.2</product>
<product>big-ip_local_traffic_manager:11.4.0</product>
<product>big-ip_local_traffic_manager:11.4.1</product>
<product>big-ip_local_traffic_manager:11.5.0</product>
<product>big-ip_local_traffic_manager:11.5.1</product>
<product>big-ip_local_traffic_manager:11.5.2</product>
<product>big-ip_local_traffic_manager:11.5.3</product>
<product>big-ip_local_traffic_manager:11.5.4</product>
<product>big-ip_local_traffic_manager:11.6.0</product>
<product>big-ip_local_traffic_manager:11.6.1</product>
<product>big-ip_local_traffic_manager:12.0.0</product>
<product>big-ip_local_traffic_manager:12.1.0</product>
<product>big-ip_local_traffic_manager:12.1.1</product>
<product>big-ip_local_traffic_manager:12.1.2</product>
<product>big-ip_policy_enforcement_manager:11.4.0</product>
<product>big-ip_policy_enforcement_manager:11.4.1</product>
<product>big-ip_policy_enforcement_manager:11.5.0</product>
<product>big-ip_policy_enforcement_manager:11.5.1</product>
<product>big-ip_policy_enforcement_manager:11.5.2</product>
<product>big-ip_policy_enforcement_manager:11.5.3</product>
<product>big-ip_policy_enforcement_manager:11.5.4</product>
<product>big-ip_policy_enforcement_manager:11.6.0</product>
<product>big-ip_policy_enforcement_manager:11.6.1</product>
<product>big-ip_policy_enforcement_manager:12.0.0</product>
<product>big-ip_policy_enforcement_manager:12.1.0</product>
<product>big-ip_policy_enforcement_manager:12.1.1</product>
<product>big-ip_policy_enforcement_manager:12.1.2</product>
<product>big-ip_protocol_security_manager:11.4.0</product>
<product>big-ip_protocol_security_manager:11.4.1</product>
</cve>
<cve id="CVE-2016-1474" level="MEDIUM">
<product>prime_infrastructure:2.2%282%29</product>
</cve>
<cve id="CVE-2016-1476" level="MEDIUM">
<product>ip_phone_8800_series_firmware:11.0_base</product>
</cve>
<cve id="CVE-2016-1477" level="LOW">
<product>connected_streaming_analytics:1.1.1_base</product>
</cve>
<cve id="CVE-2016-1470" level="MEDIUM">
<product>small_business_220_series_smart_plus_switches:1.0.0.17</product>
<product>small_business_220_series_smart_plus_switches:1.0.0.18</product>
<product>small_business_220_series_smart_plus_switches:1.0.0.19</product>
</cve>
<cve id="CVE-2016-1471" level="MEDIUM">
<product>small_business_220_series_smart_plus_switches:1.0.0.17</product>
<product>small_business_220_series_smart_plus_switches:1.0.0.18</product>
<product>small_business_220_series_smart_plus_switches:1.0.0.19</product>
</cve>
<cve id="CVE-2016-1472" level="LOW">
<product>small_business_220_series_smart_plus_switches:1.0.0.17</product>
<product>small_business_220_series_smart_plus_switches:1.0.0.18</product>
<product>small_business_220_series_smart_plus_switches:1.0.0.19</product>
</cve>
<cve id="CVE-2016-1473" level="LOW">
<product>small_business_220_series_smart_plus_switches:1.0.0.17</product>
<product>small_business_220_series_smart_plus_switches:1.0.0.18</product>
<product>small_business_220_series_smart_plus_switches:1.0.0.19</product>
</cve>
<cve id="CVE-2016-4118" level="LOW">
<product>connect:9.5.2</product>
</cve>
<cve id="CVE-2016-1479" level="LOW">
<product>ip_phone_8800_series_firmware:11.0%281%29</product>
</cve>
<cve id="CVE-2016-7887" level="LOW">
<product>coldfusion_builder:3.0.2</product>
<product>coldfusion_builder:2016</product>
</cve>
<cve id="CVE-2016-7886" level="LOW">
<product>indesign:11.4.1</product>
<product>indesign_server:11.0.0</product>
</cve>
<cve id="CVE-2016-7885" level="MEDIUM">
<product>experience_manager:6.2.0</product>
</cve>
<cve id="CVE-2016-0364" level="LOW">
<product>urbancode_deploy:6.0</product>
<product>urbancode_deploy:6.0.1.0</product>
<product>urbancode_deploy:6.0.1.1</product>
<product>urbancode_deploy:6.0.1.2</product>
<product>urbancode_deploy:6.0.1.3</product>
<product>urbancode_deploy:6.0.1.4</product>
<product>urbancode_deploy:6.0.1.5</product>
<product>urbancode_deploy:6.0.1.6</product>
<product>urbancode_deploy:6.0.1.7</product>
<product>urbancode_deploy:6.0.1.8</product>
<product>urbancode_deploy:6.0.1.9</product>
<product>urbancode_deploy:6.0.1.10</product>
<product>urbancode_deploy:6.0.1.11</product>
<product>urbancode_deploy:6.0.1.12</product>
<product>urbancode_deploy:6.1</product>
<product>urbancode_deploy:6.1.0.1</product>
<product>urbancode_deploy:6.1.0.2</product>
<product>urbancode_deploy:6.1.0.3</product>
<product>urbancode_deploy:6.1.0.4</product>
<product>urbancode_deploy:6.1.1.0</product>
<product>urbancode_deploy:6.1.1.1</product>
<product>urbancode_deploy:6.1.1.2</product>
<product>urbancode_deploy:6.1.1.3</product>
<product>urbancode_deploy:6.1.1.4</product>
<product>urbancode_deploy:6.1.1.5</product>
<product>urbancode_deploy:6.1.1.6</product>
<product>urbancode_deploy:6.1.1.7</product>
<product>urbancode_deploy:6.1.1.8</product>
<product>urbancode_deploy:6.1.2</product>
<product>urbancode_deploy:6.1.3</product>
<product>urbancode_deploy:6.1.3.1</product>
<product>urbancode_deploy:6.1.3.2</product>
<product>urbancode_deploy:6.2.0.0</product>
<product>urbancode_deploy:6.2.0.1</product>
<product>urbancode_deploy:6.2.0.2</product>
<product>urbancode_deploy:6.2.1</product>
</cve>
<cve id="CVE-2016-7882" level="MEDIUM">
<product>experience_manager:6.2.0</product>
</cve>
<cve id="CVE-2016-1000118" level="LOW">
<product>slideshow:1.0.4</product>
</cve>
<cve id="CVE-2016-1000119" level="LOW">
<product>catalog:1.0.4</product>
</cve>
<cve id="CVE-2016-1000116" level="LOW">
<product>portfolio_gallery_manager:1.1.5</product>
</cve>
<cve id="CVE-2016-1000117" level="LOW">
<product>slideshow:1.0.4</product>
</cve>
<cve id="CVE-2016-1000114" level="MEDIUM">
<product>huge-it_image_gallery:1.1.5</product>
</cve>
<cve id="CVE-2016-1000115" level="LOW">
<product>portfolio_gallery_manager:1.1.0</product>
</cve>
<cve id="CVE-2016-1000112" level="LOW">
<product>contus-video-comments:1.0</product>
</cve>
<cve id="CVE-2016-1000113" level="LOW">
<product>huge-it_image_gallery:1.1.5</product>
</cve>
<cve id="CVE-2016-7777" level="MEDIUM">
<product>xen:4.7.0</product>
</cve>
<cve id="CVE-2016-7889" level="LOW">
<product>digital_editions:4.5.2</product>
</cve>
<cve id="CVE-2016-5571" level="LOW">
<product>applications_dba:12.1.3</product>
<product>applications_dba:12.2.3</product>
<product>applications_dba:12.2.4</product>
<product>applications_dba:12.2.5</product>
<product>applications_dba:12.2.6</product>
</cve>
<cve id="CVE-2016-5570" level="LOW">
<product>applications_dba:12.2.3</product>
<product>applications_dba:12.2.4</product>
<product>applications_dba:12.2.5</product>
<product>applications_dba:12.2.6</product>
</cve>
<cve id="CVE-2016-5573" level="MEDIUM">
<product>jdk:1.6.0</product>
<product>jdk:1.7.0</product>
<product>jdk:1.8.0</product>
<product>jdk:1.8.0</product>
<product>jre:1.6.0</product>
<product>jre:1.7.0</product>
<product>jre:1.8.0</product>
<product>jre:1.8.0</product>
</cve>
<cve id="CVE-2016-5572" level="MEDIUM">
<product>database:12.1.0.2</product>
</cve>
<cve id="CVE-2016-5575" level="LOW">
<product>common_applications:12.1.1</product>
<product>common_applications:12.1.2</product>
<product>common_applications:12.1.3</product>
<product>common_applications:12.2.3</product>
<product>common_applications:12.2.4</product>
<product>common_applications:12.2.5</product>
<product>common_applications:12.2.6</product>
</cve>
<cve id="CVE-2016-5574" level="LOW">
<product>outside_in_technology:8.4.0</product>
<product>outside_in_technology:8.5.1</product>
<product>outside_in_technology:8.5.2</product>
<product>outside_in_technology:8.5.3</product>
</cve>
<cve id="CVE-2016-5577" level="LOW">
<product>outside_in_technology:8.4.0</product>
<product>outside_in_technology:8.5.1</product>
<product>outside_in_technology:8.5.2</product>
<product>outside_in_technology:8.5.3</product>
</cve>
<cve id="CVE-2016-5579" level="LOW">
<product>outside_in_technology:8.4.0</product>
<product>outside_in_technology:8.5.1</product>
<product>outside_in_technology:8.5.2</product>
<product>outside_in_technology:8.5.3</product>
</cve>
<cve id="CVE-2016-5578" level="LOW">
<product>outside_in_technology:8.4.0</product>
<product>outside_in_technology:8.5.1</product>
<product>outside_in_technology:8.5.2</product>
<product>outside_in_technology:8.5.3</product>
</cve>
<cve id="CVE-2016-0918" level="LOW">
<product>rsa_identity_management_and_governance:6.8.1</product>
<product>rsa_identity_management_and_governance:6.9.0</product>
<product>rsa_identity_management_and_governance:6.9.1</product>
<product>rsa_via_lifecycle_and_governance:7.0.0</product>
</cve>
<cve id="CVE-2016-0919" level="MEDIUM">
<product>rsa_web_threat_detection:5.0</product>
<product>rsa_web_threat_detection:5.1</product>
<product>rsa_web_threat_detection:5.1.2</product>
</cve>
<cve id="CVE-2016-1225" level="LOW">
<product>internet_security:8.0</product>
<product>internet_security:10.0</product>
</cve>
<cve id="CVE-2016-0910" level="LOW">
<product>data_domain_os:5.5.3.3</product>
<product>data_domain_os:5.6.1.0</product>
<product>data_domain_os:5.7.1.0</product>
</cve>
<cve id="CVE-2016-0911" level="LOW">
<product>data_domain:5.7.1.0</product>
</cve>
<cve id="CVE-2016-0912" level="LOW">
<product>data_domain:5.7.1.0</product>
</cve>
<cve id="CVE-2016-0913" level="LOW">
<product>networker_module_for_microsoft_applications:3.0</product>
<product>networker_module_for_microsoft_applications:3.0.1</product>
<product>networker_module_for_microsoft_applications:8.2.3.6</product>
<product>replication_manager:5.5.3</product>
</cve>
<cve id="CVE-2016-0914" level="LOW">
<product>documentum_administrator:7.0</product>
<product>documentum_administrator:7.1</product>
<product>documentum_administrator:7.2</product>
<product>documentum_capital_projects:1.9</product>
<product>documentum_capital_projects:1.10</product>
<product>documentum_taskspace:6.7</product>
<product>documentum_webtop:6.8</product>
<product>documentum_webtop:6.8.1</product>
</cve>
<cve id="CVE-2016-0915" level="LOW">
<product>authentication_manager_prime_self-service:3.0</product>
<product>authentication_manager_prime_self-service:3.1</product>
</cve>
<cve id="CVE-2016-0916" level="LOW">
<product>networker:8.2.1.8</product>
<product>networker:8.2.2.5</product>
<product>networker:9.0.0.5</product>
</cve>
<cve id="CVE-2016-0917" level="LOW">
<product>vnx1_oe_firmware:-</product>
<product>vnx2_oe_firmware:-</product>
<product>vnxe_oe_firmware:-</product>
</cve>
<cve id="CVE-2016-1227" level="LOW">
<product>pr-400mi_firmware:07.00.1006</product>
<product>rt-400mi_firmware:07.00.1006</product>
<product>rv-440mi_firmware:07.00.1006</product>
<product>pr-400mi_firmware:07.00.1005</product>
<product>rt-400mi_firmware:07.00.1005</product>
<product>rv-440mi_firmware:07.00.1005</product>
</cve>
<cve id="CVE-2016-1226" level="MEDIUM">
<product>internet_security:8.0</product>
<product>internet_security:10.0</product>
</cve>
<cve id="CVE-2016-6875" level="LOW">
<product>hhvm:3.14.5</product>
</cve>
<cve id="CVE-2016-6874" level="LOW">
<product>hhvm:3.14.5</product>
</cve>
<cve id="CVE-2016-6877" level="HIGH">
<product>xenmobile_server:10.3.6.310</product>
</cve>
<cve id="CVE-2016-6876" level="LOW">
<product>big-ip_access_policy_manager:10.2.1</product>
<product>big-ip_access_policy_manager:10.2.2</product>
<product>big-ip_access_policy_manager:10.2.3</product>
<product>big-ip_access_policy_manager:10.2.4</product>
<product>big-ip_access_policy_manager:11.2.1</product>
<product>big-ip_access_policy_manager:11.4.0</product>
<product>big-ip_access_policy_manager:11.4.1</product>
<product>big-ip_access_policy_manager:11.5.0</product>
<product>big-ip_access_policy_manager:11.5.1</product>
<product>big-ip_access_policy_manager:11.5.2</product>
<product>big-ip_access_policy_manager:11.5.3</product>
<product>big-ip_access_policy_manager:11.5.4</product>
<product>big-ip_access_policy_manager:11.6.0</product>
<product>big-ip_access_policy_manager:12.0.0</product>
<product>big-ip_advanced_firewall_manager:11.4.0</product>
<product>big-ip_advanced_firewall_manager:11.4.1</product>
<product>big-ip_advanced_firewall_manager:11.5.0</product>
<product>big-ip_advanced_firewall_manager:11.5.1</product>
<product>big-ip_advanced_firewall_manager:11.5.2</product>
<product>big-ip_advanced_firewall_manager:11.5.3</product>
<product>big-ip_advanced_firewall_manager:11.5.4</product>
<product>big-ip_advanced_firewall_manager:11.6.0</product>
<product>big-ip_advanced_firewall_manager:12.0.0</product>
<product>big-ip_analytics:11.2.1</product>
<product>big-ip_analytics:11.4.0</product>
<product>big-ip_analytics:11.4.1</product>
<product>big-ip_analytics:11.5.0</product>
<product>big-ip_analytics:11.5.1</product>
<product>big-ip_analytics:11.5.2</product>
<product>big-ip_analytics:11.5.3</product>
<product>big-ip_analytics:11.5.4</product>
<product>big-ip_analytics:11.6.0</product>
<product>big-ip_analytics:12.0.0</product>
<product>big-ip_application_acceleration_manager:11.4.0</product>
<product>big-ip_application_acceleration_manager:11.4.1</product>
<product>big-ip_application_acceleration_manager:11.5.0</product>
<product>big-ip_application_acceleration_manager:11.5.1</product>
<product>big-ip_application_acceleration_manager:11.5.2</product>
<product>big-ip_application_acceleration_manager:11.5.3</product>
<product>big-ip_application_acceleration_manager:11.5.4</product>
<product>big-ip_application_acceleration_manager:11.6.0</product>
<product>big-ip_application_acceleration_manager:12.0.0</product>
<product>big-ip_application_security_manager:10.2.1</product>
<product>big-ip_application_security_manager:10.2.2</product>
<product>big-ip_application_security_manager:10.2.3</product>
<product>big-ip_application_security_manager:10.2.4</product>
<product>big-ip_application_security_manager:11.2.1</product>
<product>big-ip_application_security_manager:11.4.0</product>
<product>big-ip_application_security_manager:11.4.1</product>
<product>big-ip_application_security_manager:11.5.0</product>
<product>big-ip_application_security_manager:11.5.1</product>
<product>big-ip_application_security_manager:11.5.2</product>
<product>big-ip_application_security_manager:11.5.3</product>
<product>big-ip_application_security_manager:11.5.4</product>
<product>big-ip_application_security_manager:11.6.0</product>
<product>big-ip_application_security_manager:12.0.0</product>
<product>big-ip_domain_name_system:12.0.0</product>
<product>big-ip_edge_gateway:10.2.1</product>
<product>big-ip_edge_gateway:10.2.2</product>
<product>big-ip_edge_gateway:10.2.3</product>
<product>big-ip_edge_gateway:10.2.4</product>
<product>big-ip_edge_gateway:11.2.1</product>
<product>big-ip_global_traffic_manager:10.2.1</product>
<product>big-ip_global_traffic_manager:10.2.2</product>
<product>big-ip_global_traffic_manager:10.2.3</product>
<product>big-ip_global_traffic_manager:10.2.4</product>
<product>big-ip_global_traffic_manager:11.2.1</product>
<product>big-ip_global_traffic_manager:11.4.0</product>
<product>big-ip_global_traffic_manager:11.4.1</product>
<product>big-ip_global_traffic_manager:11.5.0</product>
<product>big-ip_global_traffic_manager:11.5.1</product>
<product>big-ip_global_traffic_manager:11.5.2</product>
<product>big-ip_global_traffic_manager:11.5.3</product>
<product>big-ip_global_traffic_manager:11.5.4</product>
<product>big-ip_global_traffic_manager:11.6.0</product>
<product>big-ip_link_controller:10.2.1</product>
<product>big-ip_link_controller:10.2.2</product>
<product>big-ip_link_controller:10.2.3</product>
<product>big-ip_link_controller:10.2.4</product>
<product>big-ip_link_controller:11.2.1</product>
<product>big-ip_link_controller:11.4.0</product>
<product>big-ip_link_controller:11.4.1</product>
<product>big-ip_link_controller:11.5.0</product>
<product>big-ip_link_controller:11.5.1</product>
<product>big-ip_link_controller:11.5.2</product>
<product>big-ip_link_controller:11.5.3</product>
<product>big-ip_link_controller:11.5.4</product>
<product>big-ip_link_controller:11.6.0</product>
<product>big-ip_link_controller:12.0.0</product>
<product>big-ip_local_traffic_manager:10.2.1</product>
<product>big-ip_local_traffic_manager:10.2.2</product>
<product>big-ip_local_traffic_manager:10.2.3</product>
<product>big-ip_local_traffic_manager:10.2.4</product>
<product>big-ip_local_traffic_manager:11.2.1</product>
<product>big-ip_local_traffic_manager:11.4.0</product>
<product>big-ip_local_traffic_manager:11.4.1</product>
<product>big-ip_local_traffic_manager:11.5.0</product>
<product>big-ip_local_traffic_manager:11.5.1</product>
<product>big-ip_local_traffic_manager:11.5.2</product>
<product>big-ip_local_traffic_manager:11.5.3</product>
<product>big-ip_local_traffic_manager:11.5.4</product>
<product>big-ip_local_traffic_manager:11.6.0</product>
<product>big-ip_local_traffic_manager:12.0.0</product>
<product>big-ip_policy_enforcement_manager:11.4.0</product>
<product>big-ip_policy_enforcement_manager:11.4.1</product>
<product>big-ip_policy_enforcement_manager:11.5.0</product>
<product>big-ip_policy_enforcement_manager:11.5.1</product>
<product>big-ip_policy_enforcement_manager:11.5.2</product>
<product>big-ip_policy_enforcement_manager:11.5.3</product>
<product>big-ip_policy_enforcement_manager:11.5.4</product>
<product>big-ip_policy_enforcement_manager:11.6.0</product>
<product>big-ip_policy_enforcement_manager:12.0.0</product>
<product>big-ip_wan_optimization_manager:10.2.1</product>
<product>big-ip_wan_optimization_manager:10.2.2</product>
<product>big-ip_wan_optimization_manager:10.2.3</product>
<product>big-ip_wan_optimization_manager:10.2.4</product>
<product>big-ip_wan_optimization_manager:11.2.1</product>
<product>big-ip_webaccelerator:10.2.1</product>
<product>big-ip_webaccelerator:10.2.2</product>
<product>big-ip_webaccelerator:10.2.3</product>
<product>big-ip_webaccelerator:10.2.4</product>
<product>big-ip_webaccelerator:11.2.1</product>
<product>big-ip_protocol_security_manager:10.2.1</product>
<product>big-ip_protocol_security_manager:10.2.2</product>
<product>big-ip_protocol_security_manager:10.2.3</product>
<product>big-ip_protocol_security_manager:10.2.4</product>
<product>big-ip_protocol_security_manager:11.4.0</product>
<product>big-ip_protocol_security_manager:11.4.1</product>
</cve>
<cve id="CVE-2016-6871" level="LOW">
<product>hhvm:3.14.5</product>
</cve>
<cve id="CVE-2016-6870" level="LOW">
<product>hhvm:3.14.5</product>
</cve>
<cve id="CVE-2016-6873" level="LOW">
<product>hhvm:3.14.5</product>
</cve>
<cve id="CVE-2016-6872" level="LOW">
<product>hhvm:3.14.5</product>
</cve>
<cve id="CVE-2016-6879" level="LOW">
<product>botan:1.11.0</product>
<product>botan:1.11.1</product>
<product>botan:1.11.2</product>
<product>botan:1.11.3</product>
<product>botan:1.11.4</product>
<product>botan:1.11.5</product>
<product>botan:1.11.6</product>
<product>botan:1.11.7</product>
<product>botan:1.11.8</product>
<product>botan:1.11.9</product>
<product>botan:1.11.10</product>
<product>botan:1.11.11</product>
<product>botan:1.11.12</product>
<product>botan:1.11.13</product>
<product>botan:1.11.14</product>
<product>botan:1.11.15</product>
<product>botan:1.11.16</product>
<product>botan:1.11.17</product>
<product>botan:1.11.18</product>
<product>botan:1.11.19</product>
<product>botan:1.11.20</product>
<product>botan:1.11.21</product>
<product>botan:1.11.22</product>
<product>botan:1.11.23</product>
<product>botan:1.11.24</product>
<product>botan:1.11.25</product>
<product>botan:1.11.26</product>
<product>botan:1.11.27</product>
<product>botan:1.11.28</product>
<product>botan:1.11.29</product>
<product>botan:1.11.30</product>
</cve>
<cve id="CVE-2016-6878" level="LOW">
<product>botan:1.11.30</product>
</cve>
<cve id="CVE-2016-6444" level="MEDIUM">
<product>meeting_server:1.8.15</product>
<product>meeting_server:1.8_base</product>
<product>meeting_server:1.9.0</product>
<product>meeting_server:1.9.2</product>
<product>meeting_server:2.0.0</product>
<product>meeting_server:2.0.1</product>
<product>meeting_server:2.0.3</product>
<product>meeting_server:2.0.4</product>
<product>meeting_server:2.0.5</product>
</cve>
<cve id="CVE-2016-3623" level="LOW">
<product>libtiff:4.0.6</product>
<product>opensuse:13.2</product>
</cve>
<cve id="CVE-2016-3330" level="HIGH">
<product>edge:-</product>
</cve>
<cve id="CVE-2016-3621" level="MEDIUM">
<product>libtiff:4.0.6</product>
</cve>
<cve id="CVE-2016-3620" level="LOW">
<product>libtiff:4.0.6</product>
</cve>
<cve id="CVE-2016-3625" level="MEDIUM">
<product>libtiff:4.0.6</product>
</cve>
<cve id="CVE-2016-3624" level="LOW">
<product>libtiff:4.0.6</product>
</cve>
<cve id="CVE-2016-3628" level="LOW">
<product>enterprise_message_service:8.2.2</product>
<product>enterprise_message_service_appliance_firmware:2.3.1</product>
</cve>
<cve id="CVE-2016-5955" level="MEDIUM">
<product>rational_doors_next_generation:6.0.2</product>
</cve>
<cve id="CVE-2016-7832" level="LOW">
<product>dezie:8.0.2</product>
<product>dezie:8.0.3</product>
<product>dezie:8.0.4</product>
<product>dezie:8.0.5</product>
<product>dezie:8.0.6</product>
<product>dezie:8.0.7</product>
<product>dezie:8.1.0</product>
<product>dezie:8.1.1</product>
</cve>
<cve id="CVE-2016-7833" level="LOW">
<product>dezie:8.0.2</product>
<product>dezie:8.0.3</product>
<product>dezie:8.0.4</product>
<product>dezie:8.0.5</product>
<product>dezie:8.0.6</product>
<product>dezie:8.0.7</product>
<product>dezie:8.1.0</product>
<product>dezie:8.1.1</product>
</cve>
<cve id="CVE-2016-7830" level="LOW">
<product>pcs-xc1_firmware:1.21</product>
<product>pcs-xg100_firmware:1.42</product>
<product>pcs-xg100_firmware:1.50</product>
<product>pcs-xg77_firmware:1.42</product>
<product>pcs-xg77_firmware:1.50</product>
</cve>
<cve id="CVE-2016-7831" level="MEDIUM">
<product>sleipnir:4.5.3</product>
<product>sleipnir:4.5.3</product>
</cve>
<cve id="CVE-2016-7836" level="LOW">
<product>skysea_client_view:11.221.03</product>
</cve>
<cve id="CVE-2016-9479" level="LOW">
<product>b2evolution:6.7.8</product>
</cve>
<cve id="CVE-2016-7834" level="LOW">
<product>snc_series_firmware:1.8.5.00</product>
<product>snc_series_firmware:2.7.0</product>
</cve>
<cve id="CVE-2016-7835" level="LOW">
<product>h2o:2.0.4</product>
<product>h2o:2.1.0</product>
</cve>
<cve id="CVE-2016-7838" level="MEDIUM">
<product>winsparkle:0.5.2</product>
</cve>
<cve id="CVE-2016-7839" level="MEDIUM">
<product>olive_blog:-</product>
</cve>
<cve id="CVE-2016-9470" level="MEDIUM">
<product>revive_adserver:3.2.4</product>
<product>revive_adserver:4.0.0</product>
</cve>
<cve id="CVE-2016-9471" level="HIGH">
<product>revive_adserver:3.2.4</product>
<product>revive_adserver:4.0.0</product>
</cve>
<cve id="CVE-2016-9472" level="MEDIUM">
<product>revive_adserver:3.2.4</product>
<product>revive_adserver:4.0.0</product>
</cve>
<cve id="CVE-2016-9473" level="MEDIUM">
<product>browser:1.2.17</product>
<product>browser:1.9.56</product>
</cve>
<cve id="CVE-2016-5748" level="LOW">
<product>access_manager:4.1</product>
<product>access_manager:4.1</product>
<product>access_manager:4.1</product>
<product>access_manager:4.2</product>
<product>access_manager:4.2</product>
</cve>
<cve id="CVE-2016-5749" level="LOW">
<product>access_manager:4.1</product>
<product>access_manager:4.1</product>
<product>access_manager:4.1</product>
<product>access_manager:4.2</product>
<product>access_manager:4.2</product>
</cve>
<cve id="CVE-2016-8309" level="LOW">
<product>flexcube_investor_servicing:12.0.1</product>
<product>flexcube_investor_servicing:12.0.2</product>
<product>flexcube_investor_servicing:12.0.4</product>
<product>flexcube_investor_servicing:12.1.0</product>
<product>flexcube_investor_servicing:12.3.0</product>
</cve>
<cve id="CVE-2016-8308" level="MEDIUM">
<product>flexcube_private_banking:2.0.1</product>
<product>flexcube_private_banking:2.2.0</product>
<product>flexcube_private_banking:12.0.1</product>
</cve>
<cve id="CVE-2016-5968" level="LOW">
<product>tealeaf_customer_experience:8.6</product>
<product>tealeaf_customer_experience:8.7</product>
<product>tealeaf_customer_experience:8.8</product>
<product>tealeaf_customer_experience:9.0.0</product>
<product>tealeaf_customer_experience:9.0.0a</product>
<product>tealeaf_customer_experience:9.0.1</product>
<product>tealeaf_customer_experience:9.0.1a</product>
<product>tealeaf_customer_experience:9.0.2</product>
<product>tealeaf_customer_experience:9.0.2a</product>
</cve>
<cve id="CVE-2016-8305" level="MEDIUM">
<product>flexcube_universal_banking:11.3.0</product>
<product>flexcube_universal_banking:11.4.0</product>
<product>flexcube_universal_banking:12.0.1</product>
<product>flexcube_universal_banking:12.0.2</product>
<product>flexcube_universal_banking:12.0.3</product>
<product>flexcube_universal_banking:12.1.0</product>
<product>flexcube_universal_banking:12.2.0</product>
</cve>
<cve id="CVE-2016-8304" level="MEDIUM">
<product>flexcube_universal_banking:11.3.0</product>
<product>flexcube_universal_banking:11.4.0</product>
<product>flexcube_universal_banking:12.0.1</product>
<product>flexcube_universal_banking:12.0.2</product>
<product>flexcube_universal_banking:12.0.3</product>
<product>flexcube_universal_banking:12.1.0</product>
<product>flexcube_universal_banking:12.2.0</product>
</cve>
<cve id="CVE-2016-5964" level="LOW">
<product>security_privileged_identity_manager:2.0.2</product>
</cve>
<cve id="CVE-2016-8306" level="LOW">
<product>flexcube_investor_servicing:12.0.1</product>
<product>flexcube_investor_servicing:12.0.2</product>
<product>flexcube_investor_servicing:12.0.4</product>
<product>flexcube_investor_servicing:12.1.0</product>
<product>flexcube_investor_servicing:12.3.0</product>
</cve>
<cve id="CVE-2016-5746" level="HIGH">
<product>libstorage:-</product>
<product>libstorage-ng:-</product>
<product>yast-storage:-</product>
<product>leap:42.1</product>
</cve>
<cve id="CVE-2016-8300" level="MEDIUM">
<product>flexcube_private_banking:2.0.1</product>
<product>flexcube_private_banking:2.2.0</product>
<product>flexcube_private_banking:12.0.1</product>
</cve>
<cve id="CVE-2016-8303" level="MEDIUM">
<product>flexcube_universal_banking:11.3.0</product>
<product>flexcube_universal_banking:11.4.0</product>
<product>flexcube_universal_banking:12.0.1</product>
<product>flexcube_universal_banking:12.0.2</product>
<product>flexcube_universal_banking:12.0.3</product>
<product>flexcube_universal_banking:12.1.0</product>
<product>flexcube_universal_banking:12.2.0</product>
</cve>
<cve id="CVE-2016-8302" level="LOW">
<product>flexcube_universal_banking:11.3.0</product>
<product>flexcube_universal_banking:11.4.0</product>
<product>flexcube_universal_banking:12.0.1</product>
<product>flexcube_universal_banking:12.0.2</product>
<product>flexcube_universal_banking:12.0.3</product>
<product>flexcube_universal_banking:12.1.0</product>
<product>flexcube_universal_banking:12.2.0</product>
</cve>
<cve id="CVE-2016-10459" level="LOW">
<product>mdm9206_firmware:-</product>
<product>mdm9615_firmware:-</product>
<product>mdm9625_firmware:-</product>
<product>mdm9635m_firmware:-</product>
<product>mdm9640_firmware:-</product>
<product>mdm9645_firmware:-</product>
<product>sd_205_firmware:-</product>
<product>sd_210_firmware:-</product>
<product>sd_212_firmware:-</product>
<product>sd_400_firmware:-</product>
<product>sd_410_firmware:-</product>
<product>sd_412_firmware:-</product>
<product>sd_415_firmware:-</product>
<product>sd_615_firmware:-</product>
<product>sd_616_firmware:-</product>
<product>sd_617_firmware:-</product>
<product>sd_800_firmware:-</product>
<product>sd_810_firmware:-</product>
<product>sd_820_firmware:-</product>
</cve>
<cve id="CVE-2016-10458" level="LOW">
<product>sd_205_firmware:-</product>
<product>sd_210_firmware:-</product>
<product>sd_212_firmware:-</product>
<product>sd_410_firmware:-</product>
<product>sd_412_firmware:-</product>
<product>sd_415_firmware:-</product>
<product>sd_425_firmware:-</product>
<product>sd_427_firmware:-</product>
<product>sd_430_firmware:-</product>
<product>sd_450_firmware:-</product>
<product>sd_615_firmware:-</product>
<product>sd_616_firmware:-</product>
<product>sd_617_firmware:-</product>
<product>sd_625_firmware:-</product>
<product>sd_650_firmware:-</product>
<product>sd_652_firmware:-</product>
<product>sd_808_firmware:-</product>
<product>sd_810_firmware:-</product>
<product>sd_820_firmware:-</product>
<product>sd_835_firmware:-</product>
<product>sd_845_firmware:-</product>
<product>sdm630_firmware:-</product>
<product>sdm636_firmware:-</product>
<product>sdm660_firmware:-</product>
<product>sdx20_firmware:-</product>
</cve>
<cve id="CVE-2016-6426" level="MEDIUM">
<product>unified_contact_center_express:10.0%281%29</product>
<product>unified_contact_center_express:10.5%281%29</product>
<product>unified_contact_center_express:10.6%281%29</product>
<product>unified_contact_center_express:11.0%281%29</product>
<product>unified_intelligence_center:8.5.4</product>
<product>unified_intelligence_center:9.0%282%29</product>
<product>unified_intelligence_center:9.1%281%29</product>
</cve>
<cve id="CVE-2016-10455" level="LOW">
<product>mdm9206_firmware:-</product>
<product>mdm9607_firmware:-</product>
<product>mdm9615_firmware:-</product>
<product>mdm9625_firmware:-</product>
<product>mdm9635m_firmware:-</product>
<product>mdm9640_firmware:-</product>
<product>mdm9645_firmware:-</product>
<product>mdm9650_firmware:-</product>
<product>mdm9655_firmware:-</product>
<product>msm8909w_firmware:-</product>
<product>sd_205_firmware:-</product>
<product>sd_210_firmware:-</product>
<product>sd_212_firmware:-</product>
<product>sd_400_firmware:-</product>
<product>sd_410_firmware:-</product>
<product>sd_412_firmware:-</product>
<product>sd_415_firmware:-</product>
<product>sd_425_firmware:-</product>
<product>sd_430_firmware:-</product>
<product>sd_450_firmware:-</product>
<product>sd_615_firmware:-</product>
<product>sd_616_firmware:-</product>
<product>sd_617_firmware:-</product>
<product>sd_625_firmware:-</product>
<product>sd_650_firmware:-</product>
<product>sd_652_firmware:-</product>
<product>sd_800_firmware:-</product>
<product>sd_808_firmware:-</product>
<product>sd_810_firmware:-</product>
<product>sd_820_firmware:-</product>
<product>sd_835_firmware:-</product>
<product>sd_845_firmware:-</product>
<product>sd_850_firmware:-</product>
<product>sdx20_firmware:-</product>
</cve>
<cve id="CVE-2016-10454" level="LOW">
<product>sd_425_firmware:-</product>
<product>sd_430_firmware:-</product>
<product>sd_450_firmware:-</product>
<product>sd_625_firmware:-</product>
</cve>
<cve id="CVE-2016-10457" level="LOW">
<product>mdm9206_firmware:-</product>
<product>mdm9607_firmware:-</product>
<product>mdm9650_firmware:-</product>
<product>msm8909w_firmware:-</product>
<product>sd_205_firmware:-</product>
<product>sd_210_firmware:-</product>
<product>sd_212_firmware:-</product>
<product>sd_400_firmware:-</product>
<product>sd_410_firmware:-</product>
<product>sd_412_firmware:-</product>
<product>sd_415_firmware:-</product>
<product>sd_425_firmware:-</product>
<product>sd_430_firmware:-</product>
<product>sd_450_firmware:-</product>
<product>sd_615_firmware:-</product>
<product>sd_616_firmware:-</product>
<product>sd_617_firmware:-</product>
<product>sd_625_firmware:-</product>
<product>sd_650_firmware:-</product>
<product>sd_652_firmware:-</product>
<product>sd_800_firmware:-</product>
<product>sd_808_firmware:-</product>
<product>sd_810_firmware:-</product>
<product>sd_820_firmware:-</product>
<product>sd_835_firmware:-</product>
<product>sdx20_firmware:-</product>
</cve>
<cve id="CVE-2016-10456" level="LOW">
<product>mdm9206_firmware:-</product>
<product>mdm9607_firmware:-</product>
<product>mdm9615_firmware:-</product>
<product>mdm9635m_firmware:-</product>
<product>mdm9640_firmware:-</product>
<product>mdm9650_firmware:-</product>
<product>msm8909w_firmware:-</product>
<product>sd_205_firmware:-</product>
<product>sd_210_firmware:-</product>
<product>sd_212_firmware:-</product>
<product>sd_400_firmware:-</product>
<product>sd_410_firmware:-</product>
<product>sd_412_firmware:-</product>
<product>sd_415_firmware:-</product>
<product>sd_425_firmware:-</product>
<product>sd_430_firmware:-</product>
<product>sd_450_firmware:-</product>
<product>sd_600_firmware:-</product>
<product>sd_615_firmware:-</product>
<product>sd_616_firmware:-</product>
<product>sd_617_firmware:-</product>
<product>sd_625_firmware:-</product>
<product>sd_650_firmware:-</product>
<product>sd_652_firmware:-</product>
<product>sd_800_firmware:-</product>
<product>sd_808_firmware:-</product>
<product>sd_810_firmware:-</product>
<product>sd_820_firmware:-</product>
<product>sd_835_firmware:-</product>
<product>sdx20_firmware:-</product>
</cve>
<cve id="CVE-2016-10451" level="LOW">
<product>mdm9206_firmware:-</product>
<product>mdm9607_firmware:-</product>
<product>mdm9635m_firmware:-</product>
<product>mdm9640_firmware:-</product>
<product>mdm9650_firmware:-</product>
<product>msm8909w_firmware:-</product>
<product>sd_205_firmware:-</product>
<product>sd_210_firmware:-</product>
<product>sd_212_firmware:-</product>
<product>sd_400_firmware:-</product>
<product>sd_410_firmware:-</product>
<product>sd_412_firmware:-</product>
<product>sd_415_firmware:-</product>
<product>sd_425_firmware:-</product>
<product>sd_430_firmware:-</product>
<product>sd_450_firmware:-</product>
<product>sd_615_firmware:-</product>
<product>sd_616_firmware:-</product>
<product>sd_617_firmware:-</product>
<product>sd_625_firmware:-</product>
<product>sd_650_firmware:-</product>
<product>sd_652_firmware:-</product>
<product>sd_800_firmware:-</product>
<product>sd_808_firmware:-</product>
<product>sd_810_firmware:-</product>
<product>sd_820_firmware:-</product>
<product>sd_835_firmware:-</product>
<product>sdx20_firmware:-</product>
</cve>
<cve id="CVE-2016-10450" level="LOW">
<product>fsm9055_firmware:-</product>
<product>mdm9206_firmware:-</product>
<product>mdm9607_firmware:-</product>
<product>mdm9635m_firmware:-</product>
<product>mdm9640_firmware:-</product>
<product>mdm9650_firmware:-</product>
<product>msm8909w_firmware:-</product>
<product>sd_205_firmware:-</product>
<product>sd_210_firmware:-</product>
<product>sd_212_firmware:-</product>
<product>sd_400_firmware:-</product>
<product>sd_410_firmware:-</product>
<product>sd_412_firmware:-</product>
<product>sd_415_firmware:-</product>
<product>sd_425_firmware:-</product>
<product>sd_430_firmware:-</product>
<product>sd_450_firmware:-</product>
<product>sd_615_firmware:-</product>
<product>sd_616_firmware:-</product>
<product>sd_617_firmware:-</product>
<product>sd_625_firmware:-</product>
<product>sd_650_firmware:-</product>
<product>sd_652_firmware:-</product>
<product>sd_800_firmware:-</product>
<product>sd_808_firmware:-</product>
<product>sd_810_firmware:-</product>
<product>sd_820_firmware:-</product>
<product>sd_835_firmware:-</product>
<product>sdx20_firmware:-</product>
</cve>
<cve id="CVE-2016-10452" level="LOW">
<product>sd_410_firmware:-</product>
<product>sd_412_firmware:-</product>
<product>sd_415_firmware:-</product>
<product>sd_425_firmware:-</product>
<product>sd_430_firmware:-</product>
<product>sd_450_firmware:-</product>
<product>sd_615_firmware:-</product>
<product>sd_616_firmware:-</product>
<product>sd_617_firmware:-</product>
<product>sd_625_firmware:-</product>
<product>sd_650_firmware:-</product>
<product>sd_652_firmware:-</product>
<product>sd_808_firmware:-</product>
<product>sd_810_firmware:-</product>
<product>sd_820_firmware:-</product>
<product>sd_820a_firmware:-</product>
<product>sd_835_firmware:-</product>
</cve>
<cve id="CVE-2016-6427" level="MEDIUM">
<product>unified_contact_center_express:10.0%281%29</product>
<product>unified_contact_center_express:10.5%281%29</product>
<product>unified_contact_center_express:10.6%281%29</product>
<product>unified_contact_center_express:11.0%281%29</product>
<product>unified_intelligence_center:8.5.4</product>
<product>unified_intelligence_center:9.0%282%29</product>
<product>unified_intelligence_center:9.1%281%29</product>
</cve>
<cve id="CVE-2016-1089" level="LOW">
<product>acrobat:11.0.17</product>
<product>acrobat_dc:15.006.30201</product>
<product>acrobat_dc:15.017.20053</product>
<product>acrobat_reader_dc:15.006.30201</product>
<product>acrobat_reader_dc:15.017.20053</product>
<product>reader:11.0.17</product>
</cve>
<cve id="CVE-2016-1088" level="LOW">
<product>acrobat:11.0.15</product>
<product>acrobat_dc:15.006.30121</product>
<product>acrobat_dc:15.010.20060</product>
<product>acrobat_reader_dc:15.006.30121</product>
<product>acrobat_reader_dc:15.010.20060</product>
<product>reader:11.0.15</product>
</cve>
<cve id="CVE-2016-1085" level="LOW">
<product>acrobat:11.0.15</product>
<product>acrobat_dc:15.006.30121</product>
<product>acrobat_dc:15.010.20060</product>
<product>acrobat_reader_dc:15.006.30121</product>
<product>acrobat_reader_dc:15.010.20060</product>
<product>reader:11.0.15</product>
</cve>
<cve id="CVE-2016-1084" level="LOW">
<product>acrobat:11.0.15</product>
<product>acrobat_dc:15.006.30121</product>
<product>acrobat_dc:15.010.20060</product>
<product>acrobat_reader_dc:15.006.30121</product>
<product>acrobat_reader_dc:15.010.20060</product>
<product>reader:11.0.15</product>
</cve>
<cve id="CVE-2016-1087" level="LOW">
<product>acrobat:11.0.15</product>
<product>acrobat_dc:15.006.30121</product>
<product>acrobat_dc:15.010.20060</product>
<product>acrobat_reader_dc:15.006.30121</product>
<product>acrobat_reader_dc:15.010.20060</product>
<product>reader:11.0.15</product>
</cve>
<cve id="CVE-2016-1086" level="LOW">
<product>acrobat:11.0.15</product>
<product>acrobat_dc:15.006.30121</product>
<product>acrobat_dc:15.010.20060</product>
<product>acrobat_reader_dc:15.006.30121</product>
<product>acrobat_reader_dc:15.010.20060</product>
<product>reader:11.0.15</product>
</cve>
<cve id="CVE-2016-1081" level="LOW">
<product>acrobat:11.0.15</product>
<product>acrobat_dc:15.006.30121</product>
<product>acrobat_dc:15.010.20060</product>
<product>acrobat_reader_dc:15.006.30121</product>
<product>acrobat_reader_dc:15.010.20060</product>
<product>reader:11.0.15</product>
</cve>
<cve id="CVE-2016-4560" level="LOW">
<product>installanywhere:-</product>
</cve>
<cve id="CVE-2016-4563" level="MEDIUM">
<product>imagemagick:6.9.3-0</product>
<product>imagemagick:7.0.0-0</product>
<product>imagemagick:7.0.1-0</product>
<product>imagemagick:7.0.1-1</product>
</cve>
<cve id="CVE-2016-4562" level="MEDIUM">
<product>imagemagick:6.9.3-0</product>
<product>imagemagick:7.0.0-0</product>
<product>imagemagick:7.0.1-0</product>
<product>imagemagick:7.0.1-1</product>
</cve>
<cve id="CVE-2016-6424" level="LOW">
<product>adaptive_security_appliance_software:8.4.7.29</product>
<product>adaptive_security_appliance_software:9.1.7.4</product>
</cve>
<cve id="CVE-2016-2214" level="MEDIUM">
<product>agile_controller-campus:v100r001c00spc315</product>
</cve>
<cve id="CVE-2016-2217" level="LOW">
<product>socat:1.7.3.0</product>
<product>socat:2.0.0</product>
</cve>
<cve id="CVE-2016-2216" level="MEDIUM">
<product>node.js:0.10.0</product>
<product>node.js:0.10.1</product>
<product>node.js:0.10.2</product>
<product>node.js:0.10.3</product>
<product>node.js:0.10.4</product>
<product>node.js:0.10.5</product>
<product>node.js:0.10.6</product>
<product>node.js:0.10.7</product>
<product>node.js:0.10.8</product>
<product>node.js:0.10.9</product>
<product>node.js:0.10.10</product>
<product>node.js:0.10.11</product>
<product>node.js:0.10.12</product>
<product>node.js:0.10.13</product>
<product>node.js:0.10.14</product>
<product>node.js:0.10.15</product>
<product>node.js:0.10.16</product>
<product>node.js:0.10.16-isaacs-manual</product>
<product>node.js:0.10.17</product>
<product>node.js:0.10.18</product>
<product>node.js:0.10.19</product>
<product>node.js:0.10.20</product>
<product>node.js:0.10.21</product>
<product>node.js:0.10.22</product>
<product>node.js:0.10.23</product>
<product>node.js:0.10.24</product>
<product>node.js:0.10.25</product>
<product>node.js:0.10.26</product>
<product>node.js:0.10.27</product>
<product>node.js:0.10.28</product>
<product>node.js:0.10.29</product>
<product>node.js:0.10.30</product>
<product>node.js:0.10.31</product>
<product>node.js:0.10.32</product>
<product>node.js:0.10.33</product>
<product>node.js:0.10.34</product>
<product>node.js:0.10.35</product>
<product>node.js:0.10.36</product>
<product>node.js:0.10.37</product>
<product>node.js:0.10.38</product>
<product>node.js:0.10.39</product>
<product>node.js:0.10.40</product>
<product>node.js:0.10.41</product>
<product>node.js:0.11.6</product>
<product>node.js:0.11.7</product>
<product>node.js:0.11.8</product>
<product>node.js:0.11.9</product>
<product>node.js:0.11.10</product>
<product>node.js:0.11.11</product>
<product>node.js:0.11.12</product>
<product>node.js:0.11.13</product>
<product>node.js:0.11.14</product>
<product>node.js:0.11.15</product>
<product>node.js:0.11.16</product>
<product>node.js:0.12.0</product>
<product>node.js:0.12.1</product>
<product>node.js:0.12.2</product>
<product>node.js:0.12.3</product>
<product>node.js:0.12.4</product>
<product>node.js:0.12.5</product>
<product>node.js:0.12.6</product>
<product>node.js:0.12.7</product>
<product>node.js:0.12.8</product>
<product>node.js:0.12.9</product>
<product>node.js:4.0.0</product>
<product>node.js:4.1.0</product>
<product>node.js:4.1.1</product>
<product>node.js:4.1.2</product>
<product>node.js:4.2.0</product>
<product>node.js:4.2.1</product>
<product>node.js:4.2.2</product>
<product>node.js:4.2.3</product>
<product>node.js:4.2.4</product>
<product>node.js:4.2.5</product>
<product>node.js:4.2.6</product>
<product>node.js:5.0.0</product>
<product>node.js:5.1.0</product>
<product>node.js:5.1.1</product>
<product>node.js:5.2.0</product>
<product>node.js:5.3.0</product>
<product>node.js:5.4.0</product>
<product>node.js:5.4.1</product>
<product>node.js:5.5.0</product>
<product>fedora:22</product>
<product>fedora:23</product>
</cve>
<cve id="CVE-2016-2211" level="MEDIUM">
<product>advanced_threat_protection:2.0.3</product>
<product>csapi:10.0.4</product>
<product>data_center_security_server:6.0</product>
<product>data_center_security_server:6.0</product>
<product>data_center_security_server:6.5</product>
<product>data_center_security_server:6.5</product>
<product>data_center_security_server:6.6</product>
<product>data_center_security_server:6.6</product>
<product>endpoint_protection:12.1.6</product>
<product>endpoint_protection:12.1.6</product>
<product>endpoint_protection:12.1.6</product>
<product>mail_security_for_domino:8.0.9</product>
<product>mail_security_for_domino:8.1.3</product>
<product>mail_security_for_microsoft_exchange:6.5.8</product>
<product>mail_security_for_microsoft_exchange:7.0.4</product>
<product>mail_security_for_microsoft_exchange:7.5.4</product>
<product>message_gateway:10.6.1-3</product>
<product>message_gateway_for_service_providers:10.5</product>
<product>message_gateway_for_service_providers:10.6</product>
<product>ngc:22.6</product>
<product>norton_360</product>
<product>norton_antivirus</product>
<product>norton_bootable_removal_tool:2016.0</product>
<product>norton_internet_security</product>
<product>norton_power_eraser:5.0</product>
<product>norton_security</product>
<product>norton_security:13.0.1</product>
<product>norton_security_with_backup</product>
<product>protection_engine:7.0.5</product>
<product>protection_engine:7.5.4</product>
<product>protection_engine:7.8.0</product>
<product>protection_for_sharepoint_servers:6.03</product>
<product>protection_for_sharepoint_servers:6.04</product>
<product>protection_for_sharepoint_servers:6.05</product>
<product>protection_for_sharepoint_servers:6.06</product>
</cve>
<cve id="CVE-2016-2210" level="LOW">
<product>advanced_threat_protection:2.0.3</product>
<product>csapi:10.0.4</product>
<product>data_center_security_server:6.0</product>
<product>data_center_security_server:6.0</product>
<product>data_center_security_server:6.5</product>
<product>data_center_security_server:6.5</product>
<product>data_center_security_server:6.6</product>
<product>data_center_security_server:6.6</product>
<product>endpoint_protection:12.1.6</product>
<product>endpoint_protection:12.1.6</product>
<product>endpoint_protection:12.1.6</product>
<product>mail_security_for_domino:8.0.9</product>
<product>mail_security_for_domino:8.1.3</product>
<product>mail_security_for_microsoft_exchange:6.5.8</product>
<product>mail_security_for_microsoft_exchange:7.0.4</product>
<product>mail_security_for_microsoft_exchange:7.5.4</product>
<product>message_gateway:10.6.1-3</product>
<product>message_gateway_for_service_providers:10.5</product>
<product>message_gateway_for_service_providers:10.6</product>
<product>ngc:22.6</product>
<product>norton_360</product>
<product>norton_antivirus</product>
<product>norton_bootable_removal_tool:2016.0</product>
<product>norton_internet_security</product>
<product>norton_power_eraser:5.0</product>
<product>norton_security</product>
<product>norton_security:13.0.1</product>
<product>norton_security_with_backup</product>
<product>protection_engine:7.0.5</product>
<product>protection_engine:7.5.4</product>
<product>protection_engine:7.8.0</product>
<product>protection_for_sharepoint_servers:6.03</product>
<product>protection_for_sharepoint_servers:6.04</product>
<product>protection_for_sharepoint_servers:6.05</product>
<product>protection_for_sharepoint_servers:6.06</product>
</cve>
<cve id="CVE-2016-2212" level="LOW">
<product>magento:1.9.2.2</product>
<product>magento:1.14.2.2</product>
</cve>
<cve id="CVE-2016-2219" level="MEDIUM">
<product>pan-os:7.0</product>
<product>pan-os:7.0.1</product>
<product>pan-os:7.0.2</product>
<product>pan-os:7.0.3</product>
<product>pan-os:7.0.4</product>
<product>pan-os:7.0.5</product>
<product>pan-os:7.0.6</product>
<product>pan-os:7.0.7</product>
</cve>
<cve id="CVE-2016-6471" level="LOW">
<product>firesight_system_software:5.4.1.6</product>
</cve>
<cve id="CVE-2016-6470" level="LOW">
<product>hybrid_media_service:1.0_base</product>
</cve>
<cve id="CVE-2016-6472" level="MEDIUM">
<product>unified_communications_manager:11.5%281.2%29</product>
</cve>
<cve id="CVE-2016-6468" level="MEDIUM">
<product>emergency_responder:11.5%281.10000.4%29</product>
</cve>
<cve id="CVE-2016-3109" level="LOW">
<product>shopware:5.1.4</product>
</cve>
<cve id="CVE-2016-3102" level="LOW">
<product>script_security:1.0</product>
<product>script_security:1.1</product>
<product>script_security:1.2</product>
<product>script_security:1.3</product>
<product>script_security:1.4</product>
<product>script_security:1.5</product>
<product>script_security:1.6</product>
<product>script_security:1.7</product>
<product>script_security:1.8</product>
<product>script_security:1.9</product>
<product>script_security:1.10</product>
<product>script_security:1.11</product>
<product>script_security:1.12</product>
<product>script_security:1.13</product>
<product>script_security:1.14</product>
<product>script_security:1.15</product>
<product>script_security:1.16</product>
<product>script_security:1.17</product>
<product>script_security:1.18</product>
</cve>
<cve id="CVE-2016-6463" level="LOW">
<product>email_security_appliance_firmware:9.7.0-125</product>
<product>email_security_appliance_firmware:9.7.1-06</product>
<product>email_security_appliance_firmware:10.0.0-082</product>
</cve>
<cve id="CVE-2016-6460" level="LOW">
<product>firesight_system_software:5.4.0.2</product>
<product>firesight_system_software:5.4.1.1</product>
<product>firesight_system_software:5.4.1.6</product>
<product>firesight_system_software:6.0.0</product>
<product>firesight_system_software:6.1.0</product>
<product>firesight_system_software:6.2.0</product>
</cve>
<cve id="CVE-2016-3116" level="LOW">
<product>dropbear_ssh:2015.71</product>
</cve>
<cve id="CVE-2016-3106" level="LOW">
<product>pulp:2.8.2-1</product>
</cve>
<cve id="CVE-2016-6467" level="LOW">
<product>asr_5000_series_software:20.0.0</product>
<product>asr_5000_series_software:21.0.0</product>
<product>asr_5000_series_software:21.0.m0.64702</product>
</cve>
<cve id="CVE-2016-3104" level="LOW">
<product>mongodb:2.4.0</product>
<product>mongodb:2.6.0</product>
</cve>
<cve id="CVE-2016-4061" level="LOW">
<product>foxit_reader:7.3.0.118</product>
<product>phantompdf:7.3.0.118</product>
</cve>
<cve id="CVE-2016-0107" level="HIGH">
<product>internet_explorer:9</product>
<product>internet_explorer:10</product>
<product>internet_explorer:11</product>
</cve>
<cve id="CVE-2016-0454" level="LOW">
<product>e-business_suite:12.1</product>
<product>e-business_suite:12.2</product>
</cve>
<cve id="CVE-2016-7489" level="LOW">
<product>virtual_machine:15.10</product>
</cve>
<cve id="CVE-2016-7488" level="LOW">
<product>virtual_machine:15.10</product>
</cve>
<cve id="CVE-2016-0451" level="LOW">
<product>goldengate:11.2</product>
<product>goldengate:12.1.2</product>
</cve>
<cve id="CVE-2016-4062" level="MEDIUM">
<product>foxit_reader:7.3.0.118</product>
<product>phantompdf:7.3.0.118</product>
</cve>
<cve id="CVE-2016-0453" level="HIGH">
<product>fusion_middleware:3.1.2</product>
</cve>
<cve id="CVE-2016-0452" level="LOW">
<product>goldengate:11.2</product>
<product>goldengate:12.1.2</product>
</cve>
<cve id="CVE-2016-4063" level="MEDIUM">
<product>foxit_reader:7.3.0.118</product>
<product>phantompdf:7.3.0.118</product>
</cve>
<cve id="CVE-2016-0459" level="LOW">
<product>e-business_suite:11.5.10.2</product>
<product>e-business_suite:12.1.3</product>
<product>e-business_suite:12.2.3</product>
<product>e-business_suite:12.2.4</product>
<product>e-business_suite:12.2.5</product>
</cve>
<cve id="CVE-2016-0109" level="HIGH">
<product>edge</product>
<product>internet_explorer:11</product>
</cve>
<cve id="CVE-2016-0108" level="HIGH">
<product>internet_explorer:11</product>
</cve>
<cve id="CVE-2016-4820" level="MEDIUM">
<product>etx-r_firmware:-</product>
</cve>
<cve id="CVE-2016-4821" level="LOW">
<product>etx-r_firmware:-</product>
</cve>
<cve id="CVE-2016-4822" level="LOW">
<product>cg-wlbargnl_firmware:-</product>
</cve>
<cve id="CVE-2016-4823" level="LOW">
<product>cg-wlbaragm_firmware:-</product>
</cve>
<cve id="CVE-2016-4824" level="LOW">
<product>cg-wlr300gnv-w_firmware:-</product>
<product>cg-wlr300gnv_firmware:-</product>
</cve>
<cve id="CVE-2016-4825" level="MEDIUM">
<product>e-commerce:1.8.2</product>
</cve>
<cve id="CVE-2016-4826" level="MEDIUM">
<product>e-commerce:1.8.2</product>
</cve>
<cve id="CVE-2016-4827" level="MEDIUM">
<product>e-commerce:1.8.2</product>
</cve>
<cve id="CVE-2016-4828" level="LOW">
<product>e-commerce:1.8.2</product>
</cve>
<cve id="CVE-2016-4829" level="MEDIUM">
<product>ppv_play_player:1.2.0</product>
<product>ppv_play_player:2.1.2</product>
</cve>
<cve id="CVE-2016-7150" level="MEDIUM">
<product>b2evolution:6.7.5</product>
</cve>
<cve id="CVE-2016-7155" level="LOW">
<product>qemu:-</product>
</cve>
<cve id="CVE-2016-7154" level="LOW">
<product>xen:4.4.0</product>
<product>xen:4.4.1</product>
<product>xen:4.4.2</product>
<product>xen:4.4.3</product>
<product>xen:4.4.4</product>
</cve>
<cve id="CVE-2016-7157" level="LOW">
<product>qemu:-</product>
</cve>
<cve id="CVE-2016-7156" level="LOW">
<product>qemu:-</product>
</cve>
<cve id="CVE-2016-10600" level="MEDIUM">
<product>webrtc-native:1.4.0</product>
</cve>
<cve id="CVE-2016-10601" level="MEDIUM">
<product>webdrvr:2.43.0-1</product>
</cve>
<cve id="CVE-2016-10602" level="MEDIUM">
<product>haxe:5.0.10</product>
</cve>
<cve id="CVE-2016-10603" level="MEDIUM">
<product>air-sdk:16.0.0-272-16</product>
</cve>
<cve id="CVE-2016-10604" level="MEDIUM">
<product>dalekjs:0.0.11</product>
</cve>
<cve id="CVE-2016-10605" level="MEDIUM">
<product>dalekjs:0.0.5</product>
</cve>
<cve id="CVE-2016-10606" level="MEDIUM">
<product>grunt-webdriver-qunit:0.2.6</product>
</cve>
<cve id="CVE-2016-10607" level="MEDIUM">
<product>openframe-glslviewer:0.2.7</product>
</cve>
<cve id="CVE-2016-10608" level="MEDIUM">
<product>robot-js:2.0.0</product>
</cve>
<cve id="CVE-2016-8688" level="MEDIUM">
<product>libarchive:3.2.1</product>
<product>leap:42.2</product>
</cve>
<cve id="CVE-2016-8689" level="LOW">
<product>libarchive:3.2.1</product>
<product>leap:42.2</product>
</cve>
<cve id="CVE-2016-8680" level="MEDIUM">
<product>libdwarf:20161001</product>
</cve>
<cve id="CVE-2016-8681" level="MEDIUM">
<product>libdwarf:20161001</product>
</cve>
<cve id="CVE-2016-8685" level="MEDIUM">
<product>potrace:1.12</product>
</cve>
<cve id="CVE-2016-8686" level="MEDIUM">
<product>potrace:1.12</product>
</cve>
<cve id="CVE-2016-8687" level="LOW">
<product>libarchive:3.2.1</product>
<product>leap:42.2</product>
</cve>
<cve id="CVE-2016-1276" level="MEDIUM">
<product>junos:12.1x46</product>
<product>junos:12.1x47</product>
<product>junos:12.3x48</product>
<product>junos:15.1x49</product>
</cve>
<cve id="CVE-2016-4357" level="LOW">
<product>matrix_operating_environment:7.5</product>
<product>systems_insight_manager:7.5</product>
</cve>
<cve id="CVE-2016-1274" level="LOW">
<product>junos:14.1x53</product>
<product>junos:14.1x53</product>
<product>junos:14.1x53</product>
<product>junos:14.1x53</product>
<product>junos:14.1x53</product>
<product>junos:14.1x53</product>
</cve>
<cve id="CVE-2016-1275" level="LOW">
<product>junos:13.3</product>
<product>junos:14.1</product>
<product>junos:14.1</product>
<product>junos:14.1</product>
<product>junos:14.1</product>
<product>junos:14.1</product>
<product>junos:14.1</product>
<product>junos:14.1</product>
</cve>
<cve id="CVE-2016-4352" level="MEDIUM">
<product>libavformat:57.34.103</product>
</cve>
<cve id="CVE-2016-1273" level="MEDIUM">
<product>junos:13.2x51</product>
<product>junos:14.1x53</product>
<product>junos:14.1x53</product>
<product>junos:14.1x53</product>
<product>junos:14.1x53</product>
<product>junos:14.1x53</product>
<product>junos:14.1x53</product>
<product>junos:15.1</product>
<product>junos:15.1</product>
<product>junos:15.1</product>
<product>junos:15.1</product>
<product>junos:15.1x49</product>
<product>junos:15.1x49</product>
<product>junos:15.1x53</product>
</cve>
<cve id="CVE-2016-1270" level="LOW">
<product>junos:12.1x44</product>
<product>junos:12.1x46</product>
<product>junos:12.1x46</product>
<product>junos:12.1x46</product>
<product>junos:12.1x46</product>
<product>junos:12.1x46</product>
<product>junos:12.1x46</product>
<product>junos:12.1x46</product>
<product>junos:12.1x46</product>
<product>junos:12.1x47</product>
<product>junos:12.1x47</product>
<product>junos:12.1x47</product>
<product>junos:12.1x47</product>
<product>junos:12.1x47</product>
<product>junos:12.3</product>
<product>junos:12.3</product>
<product>junos:12.3</product>
<product>junos:12.3</product>
<product>junos:12.3</product>
<product>junos:12.3</product>
<product>junos:12.3</product>
<product>junos:12.3</product>
<product>junos:12.3</product>
<product>junos:12.3x48</product>
<product>junos:12.3x48</product>
<product>junos:13.2</product>
<product>junos:13.2</product>
<product>junos:13.2</product>
<product>junos:13.2</product>
<product>junos:13.2</product>
<product>junos:13.2</product>
<product>junos:13.2</product>
<product>junos:13.2x51</product>
<product>junos:13.2x51</product>
<product>junos:13.2x51</product>
<product>junos:13.2x51</product>
<product>junos:13.2x51</product>
<product>junos:13.2x51</product>
<product>junos:13.2x51</product>
<product>junos:13.3</product>
<product>junos:13.3</product>
<product>junos:13.3</product>
<product>junos:13.3</product>
<product>junos:13.3</product>
<product>junos:13.3</product>
<product>junos:13.3</product>
<product>junos:14.1</product>
<product>junos:14.1</product>
<product>junos:14.1</product>
<product>junos:14.1</product>
<product>junos:14.2</product>
</cve>
<cve id="CVE-2016-1271" level="LOW">
<product>junos:12.1x46</product>
<product>junos:12.1x47</product>
<product>junos:12.1x47</product>
<product>junos:12.1x47</product>
<product>junos:12.1x47</product>
<product>junos:12.1x47</product>
<product>junos:12.3</product>
<product>junos:12.3</product>
<product>junos:12.3</product>
<product>junos:12.3</product>
<product>junos:12.3</product>
<product>junos:12.3</product>
<product>junos:12.3</product>
<product>junos:12.3</product>
<product>junos:12.3</product>
<product>junos:12.3</product>
<product>junos:12.3</product>
<product>junos:12.3x48</product>
<product>junos:12.3x48</product>
<product>junos:12.3x48</product>
<product>junos:13.2</product>
<product>junos:13.2</product>
<product>junos:13.2</product>
<product>junos:13.2</product>
<product>junos:13.2</product>
<product>junos:13.2</product>
<product>junos:13.2</product>
<product>junos:13.2</product>
<product>junos:13.3</product>
<product>junos:13.3</product>
<product>junos:13.3</product>
<product>junos:13.3</product>
<product>junos:13.3</product>
<product>junos:13.3</product>
<product>junos:13.3</product>
<product>junos:14.1</product>
<product>junos:14.1</product>
<product>junos:14.1</product>
<product>junos:14.1</product>
<product>junos:14.1</product>
<product>junos:14.2</product>
<product>junos:14.2</product>
<product>junos:14.2</product>
<product>junos:15.1</product>
<product>junos:15.1x49</product>
</cve>
<cve id="CVE-2016-1278" level="MEDIUM">
<product>junos:12.1x46</product>
</cve>
<cve id="CVE-2016-1279" level="LOW">
<product>junos:12.1x46</product>
<product>junos:12.1x46</product>
<product>junos:12.1x47</product>
<product>junos:12.1x47</product>
<product>junos:12.1x47</product>
<product>junos:12.1x47</product>
<product>junos:12.1x47</product>
<product>junos:12.1x47</product>
<product>junos:12.3</product>
<product>junos:12.3</product>
<product>junos:12.3</product>
<product>junos:12.3</product>
<product>junos:12.3</product>
<product>junos:12.3</product>
<product>junos:12.3</product>
<product>junos:12.3</product>
<product>junos:12.3</product>
<product>junos:12.3</product>
<product>junos:12.3</product>
<product>junos:12.3</product>
<product>junos:12.3x48</product>
<product>junos:12.3x48</product>
<product>junos:13.3</product>
<product>junos:13.3</product>
<product>junos:13.3</product>
<product>junos:13.3</product>
<product>junos:13.3</product>
<product>junos:13.3</product>
<product>junos:13.3</product>
<product>junos:13.3</product>
<product>junos:13.3</product>
<product>junos:13.3</product>
<product>junos:13.3</product>
<product>junos:14.1</product>
<product>junos:14.1</product>
<product>junos:14.1</product>
<product>junos:14.1</product>
<product>junos:14.1</product>
<product>junos:14.1</product>
<product>junos:14.1</product>
<product>junos:14.1x53</product>
<product>junos:14.1x53</product>
<product>junos:14.1x53</product>
<product>junos:14.1x53</product>
<product>junos:14.1x53</product>
<product>junos:14.1x53</product>
<product>junos:14.1x53</product>
<product>junos:14.1x53</product>
<product>junos:14.2</product>
<product>junos:14.2</product>
<product>junos:14.2</product>
<product>junos:14.2</product>
<product>junos:14.2</product>
<product>junos:15.1</product>
<product>junos:15.1</product>
<product>junos:15.1</product>
<product>junos:15.1</product>
<product>junos:15.1</product>
<product>junos:15.1</product>
<product>junos:15.1</product>
<product>junos:15.1</product>
<product>junos:15.1</product>
<product>junos:15.1x49</product>
<product>junos:15.1x49</product>
</cve>
<cve id="CVE-2016-9221" level="LOW">
<product>aironet_access_point_software:8.2%28121.12%29</product>
<product>aironet_access_point_software:8.4%281.82%29</product>
</cve>
<cve id="CVE-2016-9220" level="LOW">
<product>aironet_access_point_software:8.2%28130.0%29</product>
</cve>
<cve id="CVE-2016-9223" level="LOW">
<product>cloudcenter_orchestrator:4.4.0</product>
<product>cloudcenter_orchestrator:4.5.0</product>
<product>cloudcenter_orchestrator:4.6.0</product>
<product>cloudcenter_orchestrator:4.6.1</product>
</cve>
<cve id="CVE-2016-9222" level="MEDIUM">
<product>netflow_generation_appliance:1.0%282%29</product>
</cve>
<cve id="CVE-2016-9225" level="LOW">
<product>asa_cx_context-aware_security_software:9.0.1</product>
<product>asa_cx_context-aware_security_software:9.0.1-40</product>
<product>asa_cx_context-aware_security_software:9.0.2</product>
<product>asa_cx_context-aware_security_software:9.0.2-68</product>
<product>asa_cx_context-aware_security_software:9.0_base</product>
<product>asa_cx_context-aware_security_software:9.1.2-29</product>
<product>asa_cx_context-aware_security_software:9.1.2-42</product>
<product>asa_cx_context-aware_security_software:9.1.3-8</product>
<product>asa_cx_context-aware_security_software:9.1.3-10</product>
<product>asa_cx_context-aware_security_software:9.1.3-13</product>
<product>asa_cx_context-aware_security_software:9.2.1-1</product>
<product>asa_cx_context-aware_security_software:9.2.2-1</product>
<product>asa_cx_context-aware_security_software:9.3%281.1.112%29</product>
<product>asa_cx_context-aware_security_software:9.3.1-1</product>
<product>asa_cx_context-aware_security_software:9.3.2-1</product>
<product>asa_cx_context-aware_security_software:9.3.3.1-13</product>
<product>asa_cx_context-aware_security_software:9.3.4-1</product>
<product>asa_cx_context-aware_security_software:9.3.4-2</product>
<product>asa_cx_context-aware_security_software:9.3.4-3</product>
<product>asa_cx_context-aware_security_software:9.3.4-4</product>
<product>asa_cx_context-aware_security_software:9.3.4-5</product>
<product>asa_cx_context-aware_security_software:9.3.4-6</product>
<product>asa_cx_context-aware_security_software:9.3.4.1.11</product>
<product>asa_cx_context-aware_security_software:9.3_base</product>
</cve>
<cve id="CVE-2016-9224" level="LOW">
<product>jabber_guest:10.0.0</product>
<product>jabber_guest:10.0.2</product>
<product>jabber_guest:10.5.0</product>
<product>jabber_guest:10.6.8</product>
<product>jabber_guest:10.6.9</product>
</cve>
<cve id="CVE-2016-1413" level="LOW">
<product>firepower_management_center:5.4.0</product>
<product>firepower_management_center:5.4.0.2</product>
<product>firepower_management_center:5.4.1</product>
<product>firepower_management_center:5.4.1.1</product>
<product>firepower_management_center:5.4.1.2</product>
<product>firepower_management_center:5.4.1.3</product>
<product>firepower_management_center:5.4.1.4</product>
<product>firepower_management_center:5.4.1.5</product>
<product>firepower_management_center:5.4.1.6</product>
<product>firepower_management_center:6.0.0.1</product>
</cve>
<cve id="CVE-2016-1410" level="LOW">
<product>webex_meeting_center:-</product>
</cve>
<cve id="CVE-2016-1411" level="MEDIUM">
<product>content_security_management_appliance:9.1.0</product>
<product>content_security_management_appliance:9.1.0-004</product>
<product>content_security_management_appliance:9.1.0-031</product>
<product>content_security_management_appliance:9.1.0-033</product>
<product>content_security_management_appliance:9.1.0-103</product>
<product>content_security_management_appliance:9.6.0</product>
<product>email_security_appliance:7.5.2-201</product>
<product>email_security_appliance:7.5.2-hp2-303</product>
<product>email_security_appliance:7.6.3-025</product>
<product>email_security_appliance:8.0.1-023</product>
<product>email_security_appliance:8.5.0-000</product>
<product>email_security_appliance:8.5.0-er1-198</product>
<product>email_security_appliance:8.5.1-021</product>
<product>web_security_appliance:7.7.0-608</product>
<product>web_security_appliance:7.7.5-835</product>
<product>web_security_appliance:8.8.0-000</product>
</cve>
<cve id="CVE-2016-1416" level="LOW">
<product>prime_collaboration_provisioning:10.6.2</product>
</cve>
<cve id="CVE-2016-1417" level="MEDIUM">
<product>snort:2.9.7.0</product>
</cve>
<cve id="CVE-2016-1415" level="MEDIUM">
<product>webex_wrf_player_t29:sp10_base</product>
</cve>
<cve id="CVE-2016-1418" level="LOW">
<product>aironet_access_point_software_:8.2_%28100.0%29</product>
</cve>
<cve id="CVE-2016-1419" level="LOW">
<product>aironet_access_point_software:8.2%28102.43%29</product>
</cve>
<cve id="CVE-2016-5889" level="MEDIUM">
<product>interact:8.6</product>
<product>interact:9.0</product>
<product>interact:9.1</product>
<product>interact:9.1.1</product>
<product>interact:9.1.2</product>
<product>interact:10.0</product>
</cve>
<cve id="CVE-2016-5888" level="MEDIUM">
<product>interact:8.6</product>
<product>interact:9.0</product>
<product>interact:9.1</product>
<product>interact:9.1.1</product>
<product>interact:9.1.2</product>
<product>interact:10.0</product>
</cve>
<cve id="CVE-2016-5881" level="MEDIUM">
<product>inotes:8.5.1.0</product>
<product>inotes:8.5.1.1</product>
<product>inotes:8.5.1.2</product>
<product>inotes:8.5.1.3</product>
<product>inotes:8.5.1.4</product>
<product>inotes:8.5.1.5</product>
<product>inotes:8.5.2.0</product>
<product>inotes:8.5.2.1</product>
<product>inotes:8.5.2.2</product>
<product>inotes:8.5.2.3</product>
<product>inotes:8.5.3.0</product>
<product>inotes:8.5.3.1</product>
<product>inotes:8.5.3.2</product>
<product>inotes:8.5.3.3</product>
<product>inotes:8.5.3.4</product>
<product>inotes:8.5.3.5</product>
<product>inotes:8.5.3.6</product>
<product>inotes:9.0.0.0</product>
<product>inotes:9.0.1.0</product>
<product>inotes:9.0.1.1</product>
<product>inotes:9.0.1.2</product>
<product>inotes:9.0.1.3</product>
<product>inotes:9.0.1.4</product>
<product>inotes:9.0.1.5</product>
<product>inotes:9.0.1.6</product>
</cve>
<cve id="CVE-2016-5880" level="MEDIUM">
<product>domino:8.5.1.0</product>
<product>domino:8.5.1.1</product>
<product>domino:8.5.1.2</product>
<product>domino:8.5.1.3</product>
<product>domino:8.5.1.4</product>
<product>domino:8.5.1.5</product>
<product>domino:8.5.2.0</product>
<product>domino:8.5.2.1</product>
<product>domino:8.5.2.2</product>
<product>domino:8.5.2.3</product>
<product>domino:8.5.2.4</product>
<product>domino:8.5.3.0</product>
<product>domino:8.5.3.1</product>
<product>domino:8.5.3.2</product>
<product>domino:8.5.3.3</product>
<product>domino:8.5.3.4</product>
<product>domino:8.5.3.5</product>
<product>domino:8.5.3.6</product>
<product>domino:9.0.0.0</product>
<product>domino:9.0.1.0</product>
<product>domino:9.0.1.1</product>
<product>domino:9.0.1.2</product>
<product>domino:9.0.1.3</product>
<product>domino:9.0.1.4</product>
<product>domino:9.0.1.5</product>
<product>domino:9.0.1.6</product>
<product>inotes:8.5.1.0</product>
<product>inotes:8.5.1.1</product>
<product>inotes:8.5.1.2</product>
<product>inotes:8.5.1.3</product>
<product>inotes:8.5.1.4</product>
<product>inotes:8.5.1.5</product>
<product>inotes:8.5.2.0</product>
<product>inotes:8.5.2.1</product>
<product>inotes:8.5.2.2</product>
<product>inotes:8.5.2.3</product>
<product>inotes:8.5.3.0</product>
<product>inotes:8.5.3.1</product>
<product>inotes:8.5.3.2</product>
<product>inotes:8.5.3.3</product>
<product>inotes:8.5.3.4</product>
<product>inotes:8.5.3.5</product>
<product>inotes:8.5.3.6</product>
<product>inotes:9.0.0.0</product>
<product>inotes:9.0.1.0</product>
<product>inotes:9.0.1.1</product>
<product>inotes:9.0.1.2</product>
<product>inotes:9.0.1.3</product>
<product>inotes:9.0.1.4</product>
<product>inotes:9.0.1.5</product>
<product>inotes:9.0.1.6</product>
</cve>
<cve id="CVE-2016-5883" level="MEDIUM">
<product>inotes:8.5.1.0</product>
<product>inotes:8.5.1.1</product>
<product>inotes:8.5.1.2</product>
<product>inotes:8.5.1.3</product>
<product>inotes:8.5.1.4</product>
<product>inotes:8.5.1.5</product>
<product>inotes:8.5.2.0</product>
<product>inotes:8.5.2.1</product>
<product>inotes:8.5.2.2</product>
<product>inotes:8.5.2.3</product>
<product>inotes:8.5.3.0</product>
<product>inotes:8.5.3.1</product>
<product>inotes:8.5.3.2</product>
<product>inotes:8.5.3.3</product>
<product>inotes:8.5.3.4</product>
<product>inotes:8.5.3.5</product>
<product>inotes:8.5.3.6</product>
<product>inotes:9.0.0.0</product>
<product>inotes:9.0.1.0</product>
<product>inotes:9.0.1.1</product>
<product>inotes:9.0.1.2</product>
<product>inotes:9.0.1.3</product>
<product>inotes:9.0.1.4</product>
<product>inotes:9.0.1.5</product>
<product>inotes:9.0.1.6</product>
</cve>
<cve id="CVE-2016-5882" level="MEDIUM">
<product>domino:8.5.1.0</product>
<product>domino:8.5.1.1</product>
<product>domino:8.5.1.2</product>
<product>domino:8.5.1.3</product>
<product>domino:8.5.1.4</product>
<product>domino:8.5.1.5</product>
<product>domino:8.5.2.0</product>
<product>domino:8.5.2.1</product>
<product>domino:8.5.2.2</product>
<product>domino:8.5.2.3</product>
<product>domino:8.5.2.4</product>
<product>domino:8.5.3.0</product>
<product>domino:8.5.3.1</product>
<product>domino:8.5.3.2</product>
<product>domino:8.5.3.3</product>
<product>domino:8.5.3.4</product>
<product>domino:8.5.3.5</product>
<product>domino:8.5.3.6</product>
<product>domino:9.0.0.0</product>
<product>domino:9.0.1.0</product>
<product>domino:9.0.1.1</product>
<product>domino:9.0.1.2</product>
<product>domino:9.0.1.3</product>
<product>domino:9.0.1.4</product>
<product>domino:9.0.1.5</product>
<product>domino:9.0.1.6</product>
<product>inotes:8.5.1.0</product>
<product>inotes:8.5.1.1</product>
<product>inotes:8.5.1.2</product>
<product>inotes:8.5.1.3</product>
<product>inotes:8.5.1.4</product>
<product>inotes:8.5.1.5</product>
<product>inotes:8.5.2.0</product>
<product>inotes:8.5.2.1</product>
<product>inotes:8.5.2.2</product>
<product>inotes:8.5.2.3</product>
<product>inotes:8.5.3.0</product>
<product>inotes:8.5.3.1</product>
<product>inotes:8.5.3.2</product>
<product>inotes:8.5.3.3</product>
<product>inotes:8.5.3.4</product>
<product>inotes:8.5.3.5</product>
<product>inotes:8.5.3.6</product>
<product>inotes:9.0.0.0</product>
<product>inotes:9.0.1.0</product>
<product>inotes:9.0.1.1</product>
<product>inotes:9.0.1.2</product>
<product>inotes:9.0.1.3</product>
<product>inotes:9.0.1.4</product>
<product>inotes:9.0.1.5</product>
<product>inotes:9.0.1.6</product>
</cve>
<cve id="CVE-2016-5884" level="MEDIUM">
<product>domino:8.5.1.0</product>
<product>domino:8.5.1.1</product>
<product>domino:8.5.1.2</product>
<product>domino:8.5.1.3</product>
<product>domino:8.5.1.4</product>
<product>domino:8.5.1.5</product>
<product>domino:8.5.2.0</product>
<product>domino:8.5.2.1</product>
<product>domino:8.5.2.2</product>
<product>domino:8.5.2.3</product>
<product>domino:8.5.2.4</product>
<product>domino:8.5.3.0</product>
<product>domino:8.5.3.1</product>
<product>domino:8.5.3.2</product>
<product>domino:8.5.3.3</product>
<product>domino:8.5.3.4</product>
<product>domino:8.5.3.5</product>
<product>domino:8.5.3.6</product>
<product>domino:9.0.0.0</product>
<product>domino:9.0.1.0</product>
<product>domino:9.0.1.1</product>
<product>domino:9.0.1.2</product>
<product>domino:9.0.1.3</product>
<product>domino:9.0.1.4</product>
<product>domino:9.0.1.5</product>
<product>domino:9.0.1.6</product>
<product>inotes:8.5.1.0</product>
<product>inotes:8.5.1.1</product>
<product>inotes:8.5.1.2</product>
<product>inotes:8.5.1.3</product>
<product>inotes:8.5.1.4</product>
<product>inotes:8.5.1.5</product>
<product>inotes:8.5.2.0</product>
<product>inotes:8.5.2.1</product>
<product>inotes:8.5.2.2</product>
<product>inotes:8.5.2.3</product>
<product>inotes:8.5.3.0</product>
<product>inotes:8.5.3.1</product>
<product>inotes:8.5.3.2</product>
<product>inotes:8.5.3.3</product>
<product>inotes:8.5.3.4</product>
<product>inotes:8.5.3.5</product>
<product>inotes:8.5.3.6</product>
<product>inotes:9.0.0.0</product>
<product>inotes:9.0.1.0</product>
<product>inotes:9.0.1.1</product>
<product>inotes:9.0.1.2</product>
<product>inotes:9.0.1.3</product>
<product>inotes:9.0.1.4</product>
<product>inotes:9.0.1.5</product>
<product>inotes:9.0.1.6</product>
</cve>
<cve id="CVE-2016-5081" level="LOW">
<product>zp-ibh-13w:-</product>
<product>zp-ne-14-s:-</product>
</cve>
<cve id="CVE-2016-5080" level="LOW">
<product>asn1c:7.0.1</product>
</cve>
<cve id="CVE-2016-5085" level="LOW">
<product>onetouch_ping_firmware:-</product>
</cve>
<cve id="CVE-2016-5084" level="LOW">
<product>onetouch_ping_firmware:-</product>
</cve>
<cve id="CVE-2016-5087" level="LOW">
<product>alertus_desktop_notification_for_os_x:2.9.30.1700</product>
</cve>
<cve id="CVE-2016-5086" level="MEDIUM">
<product>onetouch_ping_firmware:-</product>
</cve>
<cve id="CVE-2016-0222" level="LOW">
<product>maximo_asset_management:7.6.0.0</product>
<product>maximo_asset_management:7.6.0.1</product>
<product>maximo_asset_management:7.6.0.2</product>
<product>maximo_asset_management:7.6.0.3</product>
<product>maximo_for_government:-</product>
<product>maximo_for_life_sciences:-</product>
<product>maximo_for_nuclear_power:-</product>
<product>maximo_for_oil_and_gas:-</product>
<product>maximo_for_transportation:-</product>
<product>maximo_for_utilities:-</product>
<product>smartcloud_control_desk:-</product>
</cve>
<cve id="CVE-2016-5229" level="LOW">
<product>bamboo:5.11.3</product>
<product>bamboo:5.12.0</product>
<product>bamboo:5.12.1</product>
<product>bamboo:5.12.2</product>
</cve>
<cve id="CVE-2016-5228" level="LOW">
<product>rumba:9.4</product>
</cve>
<cve id="CVE-2016-5558" level="LOW">
<product>outside_in_technology:8.4.0</product>
<product>outside_in_technology:8.5.1</product>
<product>outside_in_technology:8.5.2</product>
<product>outside_in_technology:8.5.3</product>
</cve>
<cve id="CVE-2016-5557" level="MEDIUM">
<product>advanced_pricing:12.1.1</product>
<product>advanced_pricing:12.1.2</product>
<product>advanced_pricing:12.1.3</product>
<product>advanced_pricing:12.2.3</product>
<product>advanced_pricing:12.2.4</product>
<product>advanced_pricing:12.2.5</product>
<product>advanced_pricing:12.2.6</product>
</cve>
<cve id="CVE-2016-5556" level="MEDIUM">
<product>jdk:1.6.0</product>
<product>jdk:1.7.0</product>
<product>jdk:1.8.0</product>
<product>jre:1.6.0</product>
<product>jre:1.7.0</product>
<product>jre:1.8.0</product>
</cve>
<cve id="CVE-2016-5554" level="MEDIUM">
<product>jdk:1.6.0</product>
<product>jdk:1.7.0</product>
<product>jdk:1.8.0</product>
<product>jdk:1.8.0</product>
<product>jre:1.6.0</product>
<product>jre:1.7.0</product>
<product>jre:1.8.0</product>
<product>jre:1.8.0</product>
</cve>
<cve id="CVE-2016-5552" level="LOW">
<product>jdk:1.6</product>
<product>jdk:1.7</product>
<product>jdk:1.8</product>
<product>jdk:1.8</product>
<product>jre:1.6</product>
<product>jre:1.7</product>
<product>jre:1.8</product>
<product>jre:1.8</product>
<product>jrockit:r28.3.12</product>
</cve>
<cve id="CVE-2016-0223" level="MEDIUM">
<product>forms_server:4.0.0.0</product>
<product>forms_server:8.0.0.0</product>
<product>forms_server:8.0.1.0</product>
<product>forms_server:8.1.0.0</product>
<product>forms_server:8.2.0.0</product>
</cve>
<cve id="CVE-2016-2028" level="LOW">
<product>matrix_operating_environment:7.5</product>
<product>systems_insight_manager:7.5</product>
</cve>
<cve id="CVE-2016-2029" level="LOW">
<product>matrix_operating_environment:7.5</product>
<product>systems_insight_manager:7.5</product>
</cve>
<cve id="CVE-2016-2026" level="LOW">
<product>matrix_operating_environment:7.5</product>
<product>systems_insight_manager:7.5</product>
</cve>
<cve id="CVE-2016-2027" level="LOW">
<product>matrix_operating_environment:7.5</product>
<product>systems_insight_manager:7.5</product>
</cve>
<cve id="CVE-2016-2024" level="LOW">
<product>insight_contol:7.5</product>
<product>server_migration_package:7.5</product>
</cve>
<cve id="CVE-2016-2025" level="LOW">
<product>service_manager:9.30</product>
<product>service_manager:9.31</product>
<product>service_manager:9.32</product>
<product>service_manager:9.33</product>
<product>service_manager:9.34</product>
<product>service_manager:9.35</product>
<product>service_manager:9.40</product>
<product>service_manager:9.41</product>
</cve>
<cve id="CVE-2016-2022" level="LOW">
<product>matrix_operating_environment:7.5</product>
<product>systems_insight_manager:7.5</product>
</cve>
<cve id="CVE-2016-2023" level="LOW">
<product>restful_interface_tool:1.40</product>
</cve>
<cve id="CVE-2016-2020" level="LOW">
<product>matrix_operating_environment:7.5</product>
<product>systems_insight_manager:7.5</product>
</cve>
<cve id="CVE-2016-2021" level="LOW">
<product>matrix_operating_environment:7.5</product>
<product>systems_insight_manager:7.5</product>
</cve>
<cve id="CVE-2016-6853" level="MEDIUM">
<product>ox_guard:2.4.2</product>
</cve>
<cve id="CVE-2016-6852" level="MEDIUM">
<product>open-xchange_appsuite:7.8.2</product>
</cve>
<cve id="CVE-2016-6851" level="MEDIUM">
<product>ox_guard:2.4.2</product>
</cve>
<cve id="CVE-2016-6850" level="MEDIUM">
<product>open-xchange_appsuite:7.8.2</product>
</cve>
<cve id="CVE-2016-6857" level="MEDIUM">
<product>hybris:5.2.0.12</product>
<product>hybris:5.3.0.10</product>
<product>hybris:5.4.0.10</product>
<product>hybris:5.5.0.9</product>
<product>hybris:5.5.1.10</product>
<product>hybris:5.6.0.10</product>
<product>hybris:5.7.0.14</product>
<product>hybris:6.0</product>
</cve>
<cve id="CVE-2016-6856" level="MEDIUM">
<product>hybris:5.6.0.10</product>
</cve>
<cve id="CVE-2016-6854" level="MEDIUM">
<product>ox_guard:2.4.2</product>
</cve>
<cve id="CVE-2016-6859" level="LOW">
<product>hybris</product>
</cve>
<cve id="CVE-2016-6858" level="MEDIUM">
<product>hybris:5.0.4.10</product>
<product>hybris:5.1.0.10</product>
<product>hybris:5.1.1.11</product>
<product>hybris:5.2.0.13</product>
<product>hybris:5.3.0.9</product>
<product>hybris:5.5.0.8</product>
<product>hybris:5.5.1.9</product>
<product>hybris:5.6.0.7</product>
<product>hybris:5.7.0.8</product>
<product>hybris:6.0</product>
</cve>
<cve id="CVE-2016-3649" level="LOW">
<product>endpoint_protection_manager:12.1.6</product>
</cve>
<cve id="CVE-2016-3648" level="LOW">
<product>endpoint_protection_manager:12.1.6</product>
</cve>
<cve id="CVE-2016-6149" level="LOW">
<product>hana_sps09:1.00.091.00.14186593</product>
</cve>
<cve id="CVE-2016-6148" level="LOW">
<product>hana:1.00.73.00.389160</product>
</cve>
<cve id="CVE-2016-10142" level="LOW">
<product>ipv6:-</product>
</cve>
<cve id="CVE-2016-6145" level="LOW">
<product>hana_db:1.00.091.00.1418659308</product>
</cve>
<cve id="CVE-2016-6144" level="MEDIUM">
<product>hana:1.00.73.00.389160</product>
</cve>
<cve id="CVE-2016-3643" level="LOW">
<product>virtualization_manager:6.3.1</product>
</cve>
<cve id="CVE-2016-6146" level="LOW">
<product>trex:7.10</product>
</cve>
<cve id="CVE-2016-3645" level="LOW">
<product>advanced_threat_protection:2.0.3</product>
<product>csapi:10.0.4</product>
<product>data_center_security_server:6.0</product>
<product>data_center_security_server:6.0</product>
<product>data_center_security_server:6.5</product>
<product>data_center_security_server:6.5</product>
<product>data_center_security_server:6.6</product>
<product>data_center_security_server:6.6</product>
<product>endpoint_protection:12.1.6</product>
<product>endpoint_protection:12.1.6</product>
<product>endpoint_protection:12.1.6</product>
<product>mail_security_for_domino:8.0.9</product>
<product>mail_security_for_domino:8.1.3</product>
<product>mail_security_for_microsoft_exchange:6.5.8</product>
<product>mail_security_for_microsoft_exchange:7.0.4</product>
<product>mail_security_for_microsoft_exchange:7.5.4</product>
<product>message_gateway:10.6.1-3</product>
<product>message_gateway_for_service_providers:10.5</product>
<product>message_gateway_for_service_providers:10.6</product>
<product>ngc:22.6</product>
<product>norton_360</product>
<product>norton_antivirus</product>
<product>norton_bootable_removal_tool:2016.0</product>
<product>norton_internet_security</product>
<product>norton_power_eraser:5.0</product>
<product>norton_security</product>
<product>norton_security:13.0.1</product>
<product>norton_security_with_backup</product>
<product>protection_engine:7.0.5</product>
<product>protection_engine:7.5.4</product>
<product>protection_engine:7.8.0</product>
<product>protection_for_sharepoint_servers:6.03</product>
<product>protection_for_sharepoint_servers:6.04</product>
<product>protection_for_sharepoint_servers:6.05</product>
<product>protection_for_sharepoint_servers:6.06</product>
</cve>
<cve id="CVE-2016-6140" level="HIGH">
<product>trex:7.10</product>
</cve>
<cve id="CVE-2016-6143" level="LOW">
<product>hana:1.00.73.00.389160</product>
</cve>
<cve id="CVE-2016-6142" level="LOW">
<product>hana:1.00.73.00.389160</product>
</cve>
<cve id="CVE-2016-10140" level="LOW">
<product>zoneminder:1.30.0</product>
</cve>
<cve id="CVE-2016-10146" level="LOW">
<product>imagemagick</product>
</cve>
<cve id="CVE-2016-10145" level="LOW">
<product>imagemagick</product>
</cve>
<cve id="CVE-2016-10632" level="MEDIUM">
<product>apk-parser2:0.1.1</product>
</cve>
<cve id="CVE-2016-5971" level="LOW">
<product>security_privileged_identity_manager_virtual_appliance:2.0.2</product>
</cve>
<cve id="CVE-2016-7818" level="MEDIUM">
<product>device_data_encryption_program:1.00</product>
<product>specification_check_program:9.00</product>
<product>todokesho_creation_program:15.00</product>
<product>todokesho_print_program:5.00</product>
</cve>
<cve id="CVE-2016-7819" level="LOW">
<product>ts-wrla_firmware:1.01.02</product>
<product>ts-wrlp_firmware:1.01.02</product>
</cve>
<cve id="CVE-2016-7810" level="MEDIUM">
<product>cg-wlr300nx_firmware:1.20</product>
</cve>
<cve id="CVE-2016-7811" level="LOW">
<product>cg-wlr300nx_firmware:1.20</product>
</cve>
<cve id="CVE-2016-7812" level="MEDIUM">
<product>mitsubishi_ufj:5.2.2</product>
<product>mitsubishi_ufj:5.3.1</product>
</cve>
<cve id="CVE-2016-7813" level="MEDIUM">
<product>deraemon-cms:0.8.9</product>
</cve>
<cve id="CVE-2016-7814" level="LOW">
<product>ts-wrla_firmware:1.00.01</product>
<product>ts-wrlp_firmware:1.00.01</product>
</cve>
<cve id="CVE-2016-7815" level="MEDIUM">
<product>remote_service_manager:3.0.0</product>
<product>remote_service_manager:3.0.1</product>
<product>remote_service_manager:3.1.0</product>
<product>remote_service_manager:3.1.1</product>
<product>remote_service_manager:3.1.2</product>
<product>remote_service_manager:3.1.3</product>
<product>remote_service_manager:3.1.4</product>
</cve>
<cve id="CVE-2016-7816" level="MEDIUM">
<product>kintone:1.0.6</product>
</cve>
<cve id="CVE-2016-7817" level="MEDIUM">
<product>simple_keitai_chat:2.0</product>
</cve>
<cve id="CVE-2016-9418" level="LOW">
<product>merge_system:1.8.7</product>
<product>mybb:1.8.7</product>
</cve>
<cve id="CVE-2016-9419" level="MEDIUM">
<product>mybb:1.8.7</product>
</cve>
<cve id="CVE-2016-9412" level="LOW">
<product>merge_system:1.8.6</product>
<product>mybb:1.8.6</product>
</cve>
<cve id="CVE-2016-9413" level="MEDIUM">
<product>merge_system:1.8.6</product>
<product>mybb:1.8.6</product>
</cve>
<cve id="CVE-2016-9410" level="LOW">
<product>merge_system:1.8.6</product>
<product>mybb:1.8.6</product>
</cve>
<cve id="CVE-2016-9411" level="LOW">
<product>merge_system:1.8.6</product>
<product>mybb:1.8.6</product>
</cve>
<cve id="CVE-2016-9416" level="LOW">
<product>merge_system:1.8.7</product>
<product>mybb:1.8.7</product>
</cve>
<cve id="CVE-2016-9417" level="MEDIUM">
<product>merge_system:1.8.7</product>
<product>mybb:1.8.7</product>
</cve>
<cve id="CVE-2016-9414" level="LOW">
<product>merge_system:1.8.6</product>
<product>mybb:1.8.6</product>
</cve>
<cve id="CVE-2016-9415" level="LOW">
<product>merge_system:1.8.7</product>
<product>mybb:1.8.7</product>
</cve>
<cve id="CVE-2016-5944" level="MEDIUM">
<product>spectrum_control:5.2.8</product>
<product>spectrum_control:5.2.9</product>
<product>spectrum_control:5.2.10</product>
<product>spectrum_control:5.2.10.1</product>
<product>tivoli_storage_productivity_center:5.2.0</product>
<product>tivoli_storage_productivity_center:5.2.1</product>
<product>tivoli_storage_productivity_center:5.2.1.1</product>
<product>tivoli_storage_productivity_center:5.2.2</product>
<product>tivoli_storage_productivity_center:5.2.3</product>
<product>tivoli_storage_productivity_center:5.2.4</product>
<product>tivoli_storage_productivity_center:5.2.4.1</product>
<product>tivoli_storage_productivity_center:5.2.5</product>
<product>tivoli_storage_productivity_center:5.2.5.1</product>
<product>tivoli_storage_productivity_center:5.2.6</product>
<product>tivoli_storage_productivity_center:5.2.7</product>
<product>tivoli_storage_productivity_center:5.2.7.1</product>
</cve>
<cve id="CVE-2016-5945" level="LOW">
<product>spectrum_control:5.2.8</product>
<product>spectrum_control:5.2.9</product>
<product>spectrum_control:5.2.10</product>
<product>spectrum_control:5.2.10.1</product>
<product>tivoli_storage_productivity_center:5.2.0</product>
<product>tivoli_storage_productivity_center:5.2.1</product>
<product>tivoli_storage_productivity_center:5.2.1.1</product>
<product>tivoli_storage_productivity_center:5.2.2</product>
<product>tivoli_storage_productivity_center:5.2.3</product>
<product>tivoli_storage_productivity_center:5.2.4</product>
<product>tivoli_storage_productivity_center:5.2.4.1</product>
<product>tivoli_storage_productivity_center:5.2.5</product>
<product>tivoli_storage_productivity_center:5.2.5.1</product>
<product>tivoli_storage_productivity_center:5.2.6</product>
<product>tivoli_storage_productivity_center:5.2.7</product>
<product>tivoli_storage_productivity_center:5.2.7.1</product>
</cve>
<cve id="CVE-2016-5946" level="LOW">
<product>spectrum_control:5.2.8</product>
<product>spectrum_control:5.2.9</product>
<product>spectrum_control:5.2.10</product>
<product>spectrum_control:5.2.10.1</product>
<product>tivoli_storage_productivity_center:5.2.0</product>
<product>tivoli_storage_productivity_center:5.2.1</product>
<product>tivoli_storage_productivity_center:5.2.1.1</product>
<product>tivoli_storage_productivity_center:5.2.2</product>
<product>tivoli_storage_productivity_center:5.2.3</product>
<product>tivoli_storage_productivity_center:5.2.4</product>
<product>tivoli_storage_productivity_center:5.2.4.1</product>
<product>tivoli_storage_productivity_center:5.2.5</product>
<product>tivoli_storage_productivity_center:5.2.5.1</product>
<product>tivoli_storage_productivity_center:5.2.6</product>
<product>tivoli_storage_productivity_center:5.2.7</product>
<product>tivoli_storage_productivity_center:5.2.7.1</product>
</cve>
<cve id="CVE-2016-8328" level="MEDIUM">
<product>jdk:1.8</product>
<product>jre:1.8</product>
</cve>
<cve id="CVE-2016-5940" level="MEDIUM">
<product>kenexa_lms:4.1</product>
<product>kenexa_lms:4.2</product>
<product>kenexa_lms:4.2.2</product>
<product>kenexa_lms:4.2.3</product>
<product>kenexa_lms:4.2.4</product>
<product>kenexa_lms:5.0</product>
<product>kenexa_lms:5.1</product>
<product>kenexa_lms:5.2</product>
</cve>
<cve id="CVE-2016-5941" level="MEDIUM">
<product>kenexa_lms:4.1</product>
<product>kenexa_lms:4.2</product>
<product>kenexa_lms:4.2.2</product>
<product>kenexa_lms:4.2.3</product>
<product>kenexa_lms:4.2.4</product>
<product>kenexa_lms:5.0</product>
<product>kenexa_lms:5.1</product>
<product>kenexa_lms:5.2</product>
</cve>
<cve id="CVE-2016-5942" level="MEDIUM">
<product>kenexa_lms:4.1</product>
<product>kenexa_lms:4.2</product>
<product>kenexa_lms:4.2.2</product>
<product>kenexa_lms:4.2.3</product>
<product>kenexa_lms:4.2.4</product>
<product>kenexa_lms:5.0</product>
<product>kenexa_lms:5.1</product>
<product>kenexa_lms:5.2</product>
</cve>
<cve id="CVE-2016-5767" level="MEDIUM">
<product>libgd:2.0.33</product>
</cve>
<cve id="CVE-2016-8323" level="LOW">
<product>flexcube_core_banking:5.1.0</product>
<product>flexcube_core_banking:5.2.0</product>
<product>flexcube_core_banking:11.5.0</product>
</cve>
<cve id="CVE-2016-8322" level="LOW">
<product>flexcube_core_banking:5.1.0</product>
<product>flexcube_core_banking:5.2.0</product>
<product>flexcube_core_banking:11.5.0</product>
</cve>
<cve id="CVE-2016-8320" level="MEDIUM">
<product>flexcube_enterprise_limits_and_collateral_management:12.0.0</product>
<product>flexcube_enterprise_limits_and_collateral_management:12.0.2</product>
</cve>
<cve id="CVE-2016-5948" level="MEDIUM">
<product>kenexa_lcms_premier:9.0</product>
<product>kenexa_lcms_premier:9.1</product>
<product>kenexa_lcms_premier:9.2</product>
<product>kenexa_lcms_premier:9.2.1</product>
<product>kenexa_lcms_premier:9.3</product>
<product>kenexa_lcms_premier:9.4</product>
<product>kenexa_lcms_premier:9.5</product>
<product>kenexa_lcms_premier:10.0</product>
<product>kenexa_lcms_premier:10.1</product>
<product>kenexa_lcms_premier:10.2</product>
</cve>
<cve id="CVE-2016-5949" level="LOW">
<product>kenexa_lcms_premier:9.1</product>
<product>kenexa_lcms_premier:9.2</product>
<product>kenexa_lcms_premier:9.3</product>
<product>kenexa_lcms_premier:9.4</product>
<product>kenexa_lcms_premier:9.5</product>
<product>kenexa_lcms_premier:10.0</product>
<product>kenexa_lcms_premier:10.1</product>
</cve>
<cve id="CVE-2016-8325" level="LOW">
<product>one-to-one_fulfillment:12.1.1</product>
<product>one-to-one_fulfillment:12.1.2</product>
<product>one-to-one_fulfillment:12.1.3</product>
<product>one-to-one_fulfillment:12.2.3</product>
<product>one-to-one_fulfillment:12.2.4</product>
<product>one-to-one_fulfillment:12.2.5</product>
<product>one-to-one_fulfillment:12.2.6</product>
</cve>
<cve id="CVE-2016-8324" level="LOW">
<product>flexcube_core_banking:5.1.0</product>
<product>flexcube_core_banking:5.2.0</product>
<product>flexcube_core_banking:11.5.0</product>
</cve>
<cve id="CVE-2016-3468" level="LOW">
<product>agile_engineering_data_management:6.1.3.0</product>
<product>agile_engineering_data_management:6.2.0.0</product>
</cve>
<cve id="CVE-2016-7206" level="MEDIUM">
<product>edge</product>
</cve>
<cve id="CVE-2016-10477" level="LOW">
<product>sd_205_firmware:-</product>
<product>sd_210_firmware:-</product>
<product>sd_212_firmware:-</product>
<product>sd_400_firmware:-</product>
<product>sd_415_firmware:-</product>
<product>sd_430_firmware:-</product>
<product>sd_615_firmware:-</product>
<product>sd_616_firmware:-</product>
<product>sd_617_firmware:-</product>
<product>sd_625_firmware:-</product>
<product>sd_650_firmware:-</product>
<product>sd_652_firmware:-</product>
<product>sd_800_firmware:-</product>
<product>sd_808_firmware:-</product>
<product>sd_810_firmware:-</product>
<product>sd_820_firmware:-</product>
</cve>
<cve id="CVE-2016-10476" level="LOW">
<product>mdm9206_firmware:-</product>
<product>mdm9607_firmware:-</product>
<product>mdm9650_firmware:-</product>
<product>msm8909w_firmware:-</product>
<product>sd_205_firmware:-</product>
<product>sd_210_firmware:-</product>
<product>sd_212_firmware:-</product>
<product>sd_400_firmware:-</product>
<product>sd_410_firmware:-</product>
<product>sd_412_firmware:-</product>
<product>sd_415_firmware:-</product>
<product>sd_425_firmware:-</product>
<product>sd_430_firmware:-</product>
<product>sd_450_firmware:-</product>
<product>sd_615_firmware:-</product>
<product>sd_616_firmware:-</product>
<product>sd_617_firmware:-</product>
<product>sd_625_firmware:-</product>
<product>sd_650_firmware:-</product>
<product>sd_652_firmware:-</product>
<product>sd_800_firmware:-</product>
<product>sd_808_firmware:-</product>
<product>sd_810_firmware:-</product>
<product>sd_820_firmware:-</product>
<product>sd_835_firmware:-</product>
<product>sdx20_firmware:-</product>
</cve>
<cve id="CVE-2016-10475" level="LOW">
<product>sd_205_firmware:-</product>
<product>sd_210_firmware:-</product>
<product>sd_212_firmware:-</product>
<product>sd_400_firmware:-</product>
<product>sd_415_firmware:-</product>
<product>sd_430_firmware:-</product>
<product>sd_615_firmware:-</product>
<product>sd_616_firmware:-</product>
<product>sd_617_firmware:-</product>
<product>sd_625_firmware:-</product>
<product>sd_650_firmware:-</product>
<product>sd_652_firmware:-</product>
<product>sd_800_firmware:-</product>
<product>sd_808_firmware:-</product>
<product>sd_810_firmware:-</product>
<product>sd_820_firmware:-</product>
</cve>
<cve id="CVE-2016-10474" level="LOW">
<product>ipq4019_firmware:-</product>
<product>mdm9206_firmware:-</product>
<product>mdm9607_firmware:-</product>
<product>mdm9650_firmware:-</product>
<product>msm8909w_firmware:-</product>
<product>sd_205_firmware:-</product>
<product>sd_210_firmware:-</product>
<product>sd_212_firmware:-</product>
<product>sd_410_firmware:-</product>
<product>sd_412_firmware:-</product>
<product>sd_415_firmware:-</product>
<product>sd_425_firmware:-</product>
<product>sd_430_firmware:-</product>
<product>sd_450_firmware:-</product>
<product>sd_615_firmware:-</product>
<product>sd_616_firmware:-</product>
<product>sd_617_firmware:-</product>
<product>sd_625_firmware:-</product>
<product>sd_650_firmware:-</product>
<product>sd_652_firmware:-</product>
<product>sd_808_firmware:-</product>
<product>sd_810_firmware:-</product>
<product>sd_820_firmware:-</product>
<product>sd_820a_firmware:-</product>
<product>sd_835_firmware:-</product>
<product>sd_845_firmware:-</product>
<product>sd_850_firmware:-</product>
</cve>
<cve id="CVE-2016-10473" level="LOW">
<product>mdm9206_firmware:-</product>
<product>mdm9607_firmware:-</product>
<product>mdm9650_firmware:-</product>
<product>msm8909w_firmware:-</product>
<product>sd_205_firmware:-</product>
<product>sd_210_firmware:-</product>
<product>sd_212_firmware:-</product>
<product>sd_400_firmware:-</product>
<product>sd_410_firmware:-</product>
<product>sd_412_firmware:-</product>
<product>sd_415_firmware:-</product>
<product>sd_425_firmware:-</product>
<product>sd_430_firmware:-</product>
<product>sd_450_firmware:-</product>
<product>sd_600_firmware:-</product>
<product>sd_615_firmware:-</product>
<product>sd_616_firmware:-</product>
<product>sd_617_firmware:-</product>
<product>sd_625_firmware:-</product>
<product>sd_650_firmware:-</product>
<product>sd_652_firmware:-</product>
<product>sd_800_firmware:-</product>
<product>sd_808_firmware:-</product>
<product>sd_810_firmware:-</product>
<product>sd_820_firmware:-</product>
<product>sd_835_firmware:-</product>
<product>sdx20_firmware:-</product>
</cve>
<cve id="CVE-2016-10472" level="LOW">
<product>mdm9206_firmware:-</product>
<product>mdm9607_firmware:-</product>
<product>mdm9650_firmware:-</product>
<product>msm8909w_firmware:-</product>
<product>sd_205_firmware:-</product>
<product>sd_210_firmware:-</product>
<product>sd_212_firmware:-</product>
<product>sd_400_firmware:-</product>
<product>sd_410_firmware:-</product>
<product>sd_412_firmware:-</product>
<product>sd_415_firmware:-</product>
<product>sd_425_firmware:-</product>
<product>sd_430_firmware:-</product>
<product>sd_450_firmware:-</product>
<product>sd_600_firmware:-</product>
<product>sd_615_firmware:-</product>
<product>sd_616_firmware:-</product>
<product>sd_617_firmware:-</product>
<product>sd_625_firmware:-</product>
<product>sd_650_firmware:-</product>
<product>sd_652_firmware:-</product>
<product>sd_800_firmware:-</product>
<product>sd_808_firmware:-</product>
<product>sd_810_firmware:-</product>
<product>sd_820_firmware:-</product>
<product>sd_835_firmware:-</product>
<product>sdx20_firmware:-</product>
</cve>
<cve id="CVE-2016-10471" level="LOW">
<product>sd_425_firmware:-</product>
<product>sd_430_firmware:-</product>
<product>sd_450_firmware:-</product>
<product>sd_625_firmware:-</product>
<product>sd_650_firmware:-</product>
<product>sd_652_firmware:-</product>
<product>sd_820_firmware:-</product>
<product>sd_820a_firmware:-</product>
</cve>
<cve id="CVE-2016-10479" level="LOW">
<product>mdm9607_firmware:-</product>
<product>mdm9615_firmware:-</product>
<product>mdm9635m_firmware:-</product>
<product>mdm9640_firmware:-</product>
<product>sd_205_firmware:-</product>
<product>sd_210_firmware:-</product>
<product>sd_212_firmware:-</product>
<product>sd_400_firmware:-</product>
<product>sd_415_firmware:-</product>
<product>sd_600_firmware:-</product>
<product>sd_615_firmware:-</product>
<product>sd_616_firmware:-</product>
<product>sd_617_firmware:-</product>
<product>sd_650_firmware:-</product>
<product>sd_652_firmware:-</product>
<product>sd_800_firmware:-</product>
<product>sd_810_firmware:-</product>
<product>sd_820_firmware:-</product>
</cve>
<cve id="CVE-2016-10478" level="LOW">
<product>sd_617_firmware:-</product>
</cve>
<cve id="CVE-2016-1117" level="LOW">
<product>acrobat:11.0.15</product>
<product>acrobat_dc:15.006.30121</product>
<product>acrobat_dc:15.010.20060</product>
<product>acrobat_reader_dc:15.006.30121</product>
<product>acrobat_reader_dc:15.010.20060</product>
<product>reader:11.0.15</product>
</cve>
<cve id="CVE-2016-6461" level="MEDIUM">
<product>adaptive_security_appliance_software:9.1.6.10</product>
<product>adaptive_security_appliance_software:9.1.7.4</product>
<product>adaptive_security_appliance_software:9.1.7.7</product>
<product>adaptive_security_appliance_software:9.1.7.9</product>
<product>adaptive_security_appliance_software:9.1.7.11</product>
<product>adaptive_security_appliance_software:9.1.7.12</product>
<product>adaptive_security_appliance_software:9.2%280.0%29</product>
<product>adaptive_security_appliance_software:9.2%280.104%29</product>
<product>adaptive_security_appliance_software:9.2%283.1%29</product>
<product>adaptive_security_appliance_software:9.2.1</product>
<product>adaptive_security_appliance_software:9.2.2</product>
<product>adaptive_security_appliance_software:9.2.2.4</product>
<product>adaptive_security_appliance_software:9.2.2.7</product>
<product>adaptive_security_appliance_software:9.2.2.8</product>
<product>adaptive_security_appliance_software:9.2.3</product>
<product>adaptive_security_appliance_software:9.2.3.3</product>
<product>adaptive_security_appliance_software:9.2.3.4</product>
<product>adaptive_security_appliance_software:9.2.4</product>
<product>adaptive_security_appliance_software:9.2.4.4</product>
<product>adaptive_security_appliance_software:9.2.4.8</product>
<product>adaptive_security_appliance_software:9.2.4.10</product>
<product>adaptive_security_appliance_software:9.2.4.13</product>
<product>adaptive_security_appliance_software:9.2.4.14</product>
<product>adaptive_security_appliance_software:9.2.4.16</product>
<product>adaptive_security_appliance_software:9.2.4.17</product>
<product>adaptive_security_appliance_software:9.3%281.50%29</product>
<product>adaptive_security_appliance_software:9.3%281.105%29</product>
<product>adaptive_security_appliance_software:9.3%282.100%29</product>
<product>adaptive_security_appliance_software:9.3%282.243%29</product>
<product>adaptive_security_appliance_software:9.3.1</product>
<product>adaptive_security_appliance_software:9.3.1.1</product>
<product>adaptive_security_appliance_software:9.3.2</product>
<product>adaptive_security_appliance_software:9.3.2.2</product>
<product>adaptive_security_appliance_software:9.3.3</product>
<product>adaptive_security_appliance_software:9.3.3.1</product>
<product>adaptive_security_appliance_software:9.3.3.2</product>
<product>adaptive_security_appliance_software:9.3.3.5</product>
<product>adaptive_security_appliance_software:9.3.3.6</product>
<product>adaptive_security_appliance_software:9.3.3.9</product>
<product>adaptive_security_appliance_software:9.3.3.10</product>
<product>adaptive_security_appliance_software:9.3.3.11</product>
<product>adaptive_security_appliance_software:9.3.5</product>
<product>adaptive_security_appliance_software:9.4.0.115</product>
<product>adaptive_security_appliance_software:9.4.1</product>
<product>adaptive_security_appliance_software:9.4.1.1</product>
<product>adaptive_security_appliance_software:9.4.1.2</product>
<product>adaptive_security_appliance_software:9.4.1.3</product>
<product>adaptive_security_appliance_software:9.4.1.5</product>
<product>adaptive_security_appliance_software:9.4.2</product>
<product>adaptive_security_appliance_software:9.4.2.3</product>
<product>adaptive_security_appliance_software:9.4.3</product>
<product>adaptive_security_appliance_software:9.4.3.3</product>
<product>adaptive_security_appliance_software:9.4.3.4</product>
<product>adaptive_security_appliance_software:9.4.3.6</product>
<product>adaptive_security_appliance_software:9.4.3.8</product>
<product>adaptive_security_appliance_software:9.4.3.11</product>
<product>adaptive_security_appliance_software:9.4.3.12</product>
<product>adaptive_security_appliance_software:9.4.4</product>
<product>adaptive_security_appliance_software:9.5.1</product>
<product>adaptive_security_appliance_software:9.5.2</product>
<product>adaptive_security_appliance_software:9.5.2.6</product>
<product>adaptive_security_appliance_software:9.5.2.10</product>
<product>adaptive_security_appliance_software:9.5.2.14</product>
</cve>
<cve id="CVE-2016-4547" level="LOW">
<product>samsung_mobile:4.4</product>
<product>samsung_mobile:5.0</product>
<product>samsung_mobile:5.1</product>
<product>samsung_mobile:6.0</product>
</cve>
<cve id="CVE-2016-4546" level="LOW">
<product>samsung_mobile:4.4</product>
<product>samsung_mobile:5.0</product>
<product>samsung_mobile:5.1</product>
</cve>
<cve id="CVE-2016-4545" level="LOW">
<product>big-ip_access_policy_manager:11.5.4</product>
<product>big-ip_advanced_firewall_manager:11.5.4</product>
<product>big-ip_analytics:11.5.4</product>
<product>big-ip_application_acceleration_manager:11.5.4</product>
<product>big-ip_application_security_manager:11.5.4</product>
<product>big-ip_global_traffic_manager:11.5.4</product>
<product>big-ip_link_controller:11.5.4</product>
<product>big-ip_local_traffic_manager:11.5.4</product>
<product>big-ip_policy_enforcement_manager:11.5.4</product>
</cve>
<cve id="CVE-2016-4341" level="LOW">
<product>clustered_data_ontap:8.3.2</product>
</cve>
<cve id="CVE-2016-4340" level="LOW">
<product>gitlab:8.2.0</product>
<product>gitlab:8.2.1</product>
<product>gitlab:8.2.2</product>
<product>gitlab:8.2.3</product>
<product>gitlab:8.2.4</product>
<product>gitlab:8.3.0</product>
<product>gitlab:8.3.1</product>
<product>gitlab:8.3.2</product>
<product>gitlab:8.3.3</product>
<product>gitlab:8.3.4</product>
<product>gitlab:8.3.5</product>
<product>gitlab:8.3.6</product>
<product>gitlab:8.3.7</product>
<product>gitlab:8.3.8</product>
<product>gitlab:8.4.0</product>
<product>gitlab:8.4.1</product>
<product>gitlab:8.4.2</product>
<product>gitlab:8.4.3</product>
<product>gitlab:8.4.4</product>
<product>gitlab:8.4.5</product>
<product>gitlab:8.4.6</product>
<product>gitlab:8.4.7</product>
<product>gitlab:8.4.8</product>
<product>gitlab:8.4.9</product>
<product>gitlab:8.5.0</product>
<product>gitlab:8.5.1</product>
<product>gitlab:8.5.2</product>
<product>gitlab:8.5.3</product>
<product>gitlab:8.5.4</product>
<product>gitlab:8.5.5</product>
<product>gitlab:8.5.6</product>
<product>gitlab:8.5.7</product>
<product>gitlab:8.5.8</product>
<product>gitlab:8.5.9</product>
<product>gitlab:8.5.10</product>
<product>gitlab:8.5.11</product>
<product>gitlab:8.6.0</product>
<product>gitlab:8.6.1</product>
<product>gitlab:8.6.2</product>
<product>gitlab:8.6.3</product>
<product>gitlab:8.6.4</product>
<product>gitlab:8.6.5</product>
<product>gitlab:8.6.6</product>
<product>gitlab:8.6.7</product>
<product>gitlab:8.7.0</product>
</cve>
<cve id="CVE-2016-2233" level="LOW">
<product>hexchat:2.10.2</product>
</cve>
<cve id="CVE-2016-2232" level="LOW">
<product>asterisk:1.8.0</product>
<product>asterisk:1.8.0</product>
<product>asterisk:1.8.0</product>
<product>asterisk:1.8.0</product>
<product>asterisk:1.8.0</product>
<product>asterisk:1.8.0</product>
<product>asterisk:1.8.0</product>
<product>asterisk:1.8.0</product>
<product>asterisk:1.8.0</product>
<product>asterisk:1.8.0</product>
<product>asterisk:1.8.1</product>
<product>asterisk:1.8.1</product>
<product>asterisk:1.8.1.1</product>
<product>asterisk:1.8.1.2</product>
<product>asterisk:1.8.2</product>
<product>asterisk:1.8.2.1</product>
<product>asterisk:1.8.2.2</product>
<product>asterisk:1.8.2.3</product>
<product>asterisk:1.8.2.4</product>
<product>asterisk:1.8.3</product>
<product>asterisk:1.8.3</product>
<product>asterisk:1.8.3</product>
<product>asterisk:1.8.3</product>
<product>asterisk:1.8.3.1</product>
<product>asterisk:1.8.3.2</product>
<product>asterisk:1.8.3.3</product>
<product>asterisk:1.8.4</product>
<product>asterisk:1.8.4</product>
<product>asterisk:1.8.4</product>
<product>asterisk:1.8.4</product>
<product>asterisk:1.8.4.1</product>
<product>asterisk:1.8.4.2</product>
<product>asterisk:1.8.4.3</product>
<product>asterisk:1.8.4.4</product>
<product>asterisk:1.8.5</product>
<product>asterisk:1.8.5</product>
<product>asterisk:1.8.5.0</product>
<product>asterisk:1.8.6.0</product>
<product>asterisk:1.8.6.0</product>
<product>asterisk:1.8.6.0</product>
<product>asterisk:1.8.6.0</product>
<product>asterisk:1.8.7.0</product>
<product>asterisk:1.8.7.0</product>
<product>asterisk:1.8.7.0</product>
<product>asterisk:1.8.7.1</product>
<product>asterisk:1.8.8.0</product>
<product>asterisk:1.8.8.0</product>
<product>asterisk:1.8.8.0</product>
<product>asterisk:1.8.8.0</product>
<product>asterisk:1.8.8.0</product>
<product>asterisk:1.8.8.0</product>
<product>asterisk:1.8.8.0</product>
<product>asterisk:1.8.8.0</product>
<product>asterisk:1.8.8.1</product>
<product>asterisk:1.8.8.2</product>
<product>asterisk:1.8.9.0</product>
<product>asterisk:1.8.9.0</product>
<product>asterisk:1.8.9.0</product>
<product>asterisk:1.8.9.0</product>
<product>asterisk:1.8.9.0</product>
<product>asterisk:1.8.9.1</product>
<product>asterisk:1.8.9.2</product>
<product>asterisk:1.8.9.3</product>
<product>asterisk:1.8.10.0</product>
<product>asterisk:1.8.10.0</product>
<product>asterisk:1.8.10.0</product>
<product>asterisk:1.8.10.0</product>
<product>asterisk:1.8.10.0</product>
<product>asterisk:1.8.10.0</product>
<product>asterisk:1.8.10.1</product>
<product>asterisk:1.8.11.0</product>
<product>asterisk:1.8.11.0</product>
<product>asterisk:1.8.11.0</product>
<product>asterisk:1.8.11.0</product>
<product>asterisk:1.8.11.0</product>
<product>asterisk:1.8.11.1</product>
<product>asterisk:1.8.11.1</product>
<product>asterisk:1.8.11.1</product>
<product>asterisk:1.8.12</product>
<product>asterisk:1.8.12.0</product>
<product>asterisk:1.8.12.0</product>
<product>asterisk:1.8.12.0</product>
<product>asterisk:1.8.12.0</product>
<product>asterisk:1.8.12.0</product>
<product>asterisk:1.8.12.1</product>
<product>asterisk:1.8.12.2</product>
<product>asterisk:1.8.13.0</product>
<product>asterisk:1.8.13.0</product>
<product>asterisk:1.8.13.0</product>
<product>asterisk:1.8.13.1</product>
<product>asterisk:1.8.14.0</product>
<product>asterisk:1.8.14.0</product>
<product>asterisk:1.8.14.0</product>
<product>asterisk:1.8.14.0</product>
<product>asterisk:1.8.14.1</product>
<product>asterisk:1.8.14.1</product>
<product>asterisk:1.8.14.1</product>
<product>asterisk:1.8.15.0</product>
<product>asterisk:1.8.15.0</product>
<product>asterisk:1.8.15.0</product>
<product>asterisk:1.8.15.1</product>
<product>asterisk:1.8.16.0</product>
<product>asterisk:1.8.16.0</product>
<product>asterisk:1.8.16.0</product>
<product>asterisk:1.8.16.0</product>
<product>asterisk:1.8.17.0</product>
<product>asterisk:1.8.17.0</product>
<product>asterisk:1.8.17.0</product>
<product>asterisk:1.8.17.0</product>
<product>asterisk:1.8.17.0</product>
<product>asterisk:1.8.17.0</product>
<product>asterisk:1.8.18.0</product>
<product>asterisk:1.8.18.0</product>
<product>asterisk:1.8.18.0</product>
<product>asterisk:1.8.18.1</product>
<product>asterisk:1.8.19.0</product>
<product>asterisk:1.8.19.0</product>
<product>asterisk:1.8.19.0</product>
<product>asterisk:1.8.19.0</product>
<product>asterisk:1.8.19.1</product>
<product>asterisk:1.8.20.0</product>
<product>asterisk:1.8.20.0</product>
<product>asterisk:1.8.20.0</product>
<product>asterisk:1.8.20.0</product>
<product>asterisk:1.8.20.1</product>
<product>asterisk:1.8.20.1</product>
<product>asterisk:1.8.20.2</product>
<product>asterisk:1.8.20.2</product>
<product>asterisk:1.8.21.0</product>
<product>asterisk:1.8.21.0</product>
<product>asterisk:1.8.21.0</product>
<product>asterisk:1.8.22.0</product>
<product>asterisk:1.8.22.0</product>
<product>asterisk:1.8.22.0</product>
<product>asterisk:1.8.23.0</product>
<product>asterisk:1.8.23.0</product>
<product>asterisk:1.8.23.0</product>
<product>asterisk:1.8.23.0</product>
<product>asterisk:1.8.23.1</product>
<product>asterisk:1.8.24.0</product>
<product>asterisk:1.8.24.0</product>
<product>asterisk:1.8.24.0</product>
<product>asterisk:1.8.24.1</product>
<product>asterisk:1.8.25.0</product>
<product>asterisk:1.8.25.0</product>
<product>asterisk:1.8.25.0</product>
<product>asterisk:1.8.26.0</product>
<product>asterisk:1.8.26.0</product>
<product>asterisk:1.8.26.1</product>
<product>asterisk:1.8.27.0</product>
<product>asterisk:1.8.27.0</product>
<product>asterisk:1.8.27.0</product>
<product>asterisk:1.8.28.0</product>
<product>asterisk:1.8.28.0</product>
<product>asterisk:1.8.28.1</product>
<product>asterisk:1.8.28.2</product>
<product>asterisk:1.8.32.0</product>
<product>asterisk:11.0.0</product>
<product>asterisk:11.0.0</product>
<product>asterisk:11.0.0</product>
<product>asterisk:11.0.0</product>
<product>asterisk:11.0.0</product>
<product>asterisk:11.0.1</product>
<product>asterisk:11.0.2</product>
<product>asterisk:11.1.0</product>
<product>asterisk:11.1.0</product>
<product>asterisk:11.1.0</product>
<product>asterisk:11.1.0</product>
<product>asterisk:11.1.1</product>
<product>asterisk:11.1.2</product>
<product>asterisk:11.2.0</product>
<product>asterisk:11.4.0</product>
<product>asterisk:11.6.0</product>
<product>asterisk:11.6.0</product>
<product>asterisk:11.6.0</product>
<product>asterisk:11.7.0</product>
<product>asterisk:11.7.0</product>
<product>asterisk:11.7.0</product>
<product>asterisk:11.8.0</product>
<product>asterisk:11.8.0</product>
<product>asterisk:11.8.0</product>
<product>asterisk:11.8.0</product>
<product>asterisk:11.8.1</product>
<product>asterisk:11.9.0</product>
<product>asterisk:11.9.0</product>
<product>asterisk:11.9.0</product>
<product>asterisk:11.9.0</product>
<product>asterisk:11.10.0</product>
<product>asterisk:11.10.0</product>
<product>asterisk:11.10.1</product>
<product>asterisk:11.10.1</product>
<product>asterisk:11.11.0</product>
<product>asterisk:11.11.0</product>
<product>asterisk:11.12.0</product>
<product>asterisk:11.12.0</product>
<product>asterisk:11.13.0</product>
<product>asterisk:11.13.0</product>
<product>asterisk:11.14.0</product>
<product>asterisk:11.14.0</product>
<product>asterisk:11.14.0</product>
<product>asterisk:11.15.0</product>
<product>asterisk:11.15.0</product>
<product>asterisk:11.15.0</product>
<product>asterisk:11.16.0</product>
<product>asterisk:11.16.0</product>
<product>asterisk:11.17.0</product>
<product>asterisk:11.18.0</product>
<product>asterisk:11.18.0</product>
<product>asterisk:11.19.0</product>
<product>asterisk:11.20.0</product>
<product>asterisk:11.21.0</product>
<product>asterisk:11.21.0</product>
<product>asterisk:11.21.0</product>
<product>asterisk:11.21.0</product>
<product>asterisk:12.0.0</product>
<product>asterisk:12.1.0</product>
<product>asterisk:12.1.0</product>
<product>asterisk:12.1.0</product>
<product>asterisk:12.1.0</product>
<product>asterisk:12.1.1</product>
<product>asterisk:12.2.0</product>
<product>asterisk:12.2.0</product>
<product>asterisk:12.2.0</product>
<product>asterisk:12.2.0</product>
<product>asterisk:12.3.0</product>
<product>asterisk:12.3.0</product>
<product>asterisk:12.3.0</product>
<product>asterisk:12.3.1</product>
<product>asterisk:12.3.2</product>
<product>asterisk:12.4.0</product>
<product>asterisk:12.4.0</product>
<product>asterisk:12.5.0</product>
<product>asterisk:12.5.0</product>
<product>asterisk:12.6.0</product>
<product>asterisk:12.6.0</product>
<product>asterisk:12.7.0</product>
<product>asterisk:12.7.0</product>
<product>asterisk:12.7.0</product>
<product>asterisk:12.7.0</product>
<product>asterisk:12.7.1</product>
<product>asterisk:12.8.0</product>
<product>asterisk:12.8.0</product>
<product>asterisk:12.8.0</product>
<product>asterisk:12.8.1</product>
<product>asterisk:12.8.2</product>
<product>asterisk:13.0.0</product>
<product>asterisk:13.0.1</product>
<product>asterisk:13.1.0</product>
<product>asterisk:13.1.0</product>
<product>asterisk:13.1.0</product>
<product>asterisk:13.2.0</product>
<product>asterisk:13.2.0</product>
<product>asterisk:13.3.0</product>
<product>asterisk:13.4.0</product>
<product>asterisk:13.4.0</product>
<product>asterisk:13.5.0</product>
<product>asterisk:13.5.0</product>
<product>asterisk:13.6.0</product>
<product>asterisk:13.7.0</product>
<product>asterisk:13.7.0</product>
<product>asterisk:13.7.0</product>
<product>asterisk:13.7.0</product>
<product>certified_asterisk:1.8.28</product>
<product>certified_asterisk:11.6</product>
<product>certified_asterisk:11.6</product>
<product>certified_asterisk:11.6</product>
<product>certified_asterisk:11.6</product>
<product>certified_asterisk:11.6</product>
<product>certified_asterisk:11.6</product>
<product>certified_asterisk:11.6</product>
<product>certified_asterisk:11.6</product>
<product>certified_asterisk:11.6</product>
<product>certified_asterisk:11.6</product>
<product>certified_asterisk:11.6</product>
<product>certified_asterisk:11.6</product>
<product>certified_asterisk:11.6</product>
<product>certified_asterisk:11.6</product>
<product>certified_asterisk:11.6</product>
<product>certified_asterisk:11.6.0</product>
<product>certified_asterisk:11.6.0</product>
<product>certified_asterisk:11.6.0</product>
<product>certified_asterisk:11.6.0</product>
<product>certified_asterisk:13.1</product>
<product>certified_asterisk:13.1</product>
<product>certified_asterisk:13.1</product>
<product>certified_asterisk:13.1.0</product>
<product>certified_asterisk:13.1.0</product>
<product>certified_asterisk:13.1.0</product>
</cve>
<cve id="CVE-2016-2231" level="LOW">
<product>mt882_firmware:v200r002b022</product>
</cve>
<cve id="CVE-2016-2230" level="LOW">
<product>openelec</product>
</cve>
<cve id="CVE-2016-4349" level="LOW">
<product>webex_productivity_tools:2.40.5001.10012</product>
</cve>
<cve id="CVE-2016-7837" level="LOW">
<product>bluez:5.41</product>
</cve>
<cve id="CVE-2016-3476" level="LOW">
<product>knowledge:8.5</product>
</cve>
<cve id="CVE-2016-6485" level="LOW">
<product>magento2:-</product>
</cve>
<cve id="CVE-2016-6486" level="LOW">
<product>sinema_server:-</product>
</cve>
<cve id="CVE-2016-3475" level="LOW">
<product>knowledge:8.5</product>
</cve>
<cve id="CVE-2016-3472" level="MEDIUM">
<product>siebel_engineering-installer_and_deployment:8.1.1</product>
<product>siebel_engineering-installer_and_deployment:8.2.2</product>
<product>siebel_engineering-installer_and_deployment:2014</product>
<product>siebel_engineering-installer_and_deployment:2015</product>
<product>siebel_engineering-installer_and_deployment:2016</product>
</cve>
<cve id="CVE-2016-3473" level="LOW">
<product>business_intelligence_publisher:11.1.1.7.0</product>
<product>business_intelligence_publisher:11.1.1.9.0</product>
<product>business_intelligence_publisher:12.2.1.0.0</product>
</cve>
<cve id="CVE-2016-3470" level="LOW">
<product>transportation_management:6.4.1</product>
</cve>
<cve id="CVE-2016-6483" level="LOW">
<product>vbulletin:3.8.7</product>
<product>vbulletin:3.8.8</product>
<product>vbulletin:3.8.9</product>
<product>vbulletin:4.2.2</product>
<product>vbulletin:4.2.3</product>
<product>vbulletin:5.2.0</product>
<product>vbulletin:5.2.1</product>
<product>vbulletin:5.2.2</product>
</cve>
<cve id="CVE-2016-0899" level="MEDIUM">
<product>rsa_archer_egrc:5.5</product>
<product>rsa_archer_egrc:5.5</product>
<product>rsa_archer_egrc:5.5.1</product>
<product>rsa_archer_egrc:5.5.1.3</product>
<product>rsa_archer_egrc:5.5.2.3</product>
</cve>
<cve id="CVE-2016-3478" level="MEDIUM">
<product>peoplesoft_enterprise_peopletools:8.53</product>
<product>peoplesoft_enterprise_peopletools:8.54</product>
<product>peoplesoft_enterprise_peopletools:8.55</product>
</cve>
<cve id="CVE-2016-0895" level="MEDIUM">
<product>rsa_data_loss_prevention:9.6</product>
<product>rsa_data_loss_prevention:9.6.1</product>
<product>rsa_data_loss_prevention:9.6.2</product>
<product>rsa_data_loss_prevention:9.6.2.1</product>
<product>rsa_data_loss_prevention:9.6.2.2</product>
<product>rsa_data_loss_prevention:9.6.2.3</product>
<product>rsa_data_loss_prevention:9.6.2.4</product>
</cve>
<cve id="CVE-2016-0894" level="LOW">
<product>rsa_data_loss_prevention:9.6</product>
<product>rsa_data_loss_prevention:9.6.1</product>
<product>rsa_data_loss_prevention:9.6.2</product>
<product>rsa_data_loss_prevention:9.6.2.1</product>
<product>rsa_data_loss_prevention:9.6.2.2</product>
<product>rsa_data_loss_prevention:9.6.2.3</product>
<product>rsa_data_loss_prevention:9.6.2.4</product>
</cve>
<cve id="CVE-2016-0897" level="LOW">
<product>operations_manager:1.6.16</product>
<product>operations_manager:1.7.0</product>
<product>operations_manager:1.7.1</product>
<product>operations_manager:1.7.2</product>
<product>operations_manager:1.7.3</product>
<product>operations_manager:1.7.4</product>
<product>operations_manager:1.7.5</product>
<product>operations_manager:1.7.6</product>
<product>operations_manager:1.7.7</product>
</cve>
<cve id="CVE-2016-0896" level="LOW">
<product>cloud_foundry_elastic_runtime:1.6.33</product>
<product>cloud_foundry_elastic_runtime:1.7.0</product>
<product>cloud_foundry_elastic_runtime:1.7.1</product>
<product>cloud_foundry_elastic_runtime:1.7.2</product>
<product>cloud_foundry_elastic_runtime:1.7.3</product>
<product>cloud_foundry_elastic_runtime:1.7.4</product>
<product>cloud_foundry_elastic_runtime:1.7.5</product>
<product>cloud_foundry_elastic_runtime:1.7.6</product>
<product>cloud_foundry_elastic_runtime:1.7.7</product>
<product>cloud_foundry_elastic_runtime:1.7.8</product>
<product>cloud_foundry_elastic_runtime:1.7.9</product>
<product>cloud_foundry_elastic_runtime:1.7.10</product>
<product>cloud_foundry_elastic_runtime:1.7.11</product>
</cve>
<cve id="CVE-2016-0891" level="MEDIUM">
<product>vipr_srm:3.6.4</product>
</cve>
<cve id="CVE-2016-0890" level="MEDIUM">
<product>powerpath_virtual_appliance:2.0</product>
<product>powerpath_virtual_appliance:2.0</product>
</cve>
<cve id="CVE-2016-0893" level="LOW">
<product>rsa_data_loss_prevention:9.6</product>
<product>rsa_data_loss_prevention:9.6.1</product>
<product>rsa_data_loss_prevention:9.6.2</product>
<product>rsa_data_loss_prevention:9.6.2.1</product>
<product>rsa_data_loss_prevention:9.6.2.2</product>
<product>rsa_data_loss_prevention:9.6.2.3</product>
<product>rsa_data_loss_prevention:9.6.2.4</product>
</cve>
<cve id="CVE-2016-0892" level="MEDIUM">
<product>rsa_data_loss_prevention:9.6</product>
<product>rsa_data_loss_prevention:9.6.1</product>
<product>rsa_data_loss_prevention:9.6.2</product>
<product>rsa_data_loss_prevention:9.6.2.1</product>
<product>rsa_data_loss_prevention:9.6.2.2</product>
<product>rsa_data_loss_prevention:9.6.2.3</product>
<product>rsa_data_loss_prevention:9.6.2.4</product>
</cve>
<cve id="CVE-2016-6440" level="MEDIUM">
<product>unified_communications_manager:11.5%280.99838.4%29</product>
</cve>
<cve id="CVE-2016-6337" level="LOW">
<product>mediawiki:1.27.0</product>
</cve>
<cve id="CVE-2016-6334" level="MEDIUM">
<product>mediawiki:1.23.14</product>
<product>mediawiki:1.26.0</product>
<product>mediawiki:1.26.1</product>
<product>mediawiki:1.26.2</product>
<product>mediawiki:1.26.3</product>
<product>mediawiki:1.26.4</product>
<product>mediawiki:1.27.0</product>
</cve>
<cve id="CVE-2016-6335" level="LOW">
<product>mediawiki:1.23.14</product>
<product>mediawiki:1.26.0</product>
<product>mediawiki:1.26.1</product>
<product>mediawiki:1.26.2</product>
<product>mediawiki:1.26.3</product>
<product>mediawiki:1.26.4</product>
<product>mediawiki:1.27.0</product>
</cve>
<cve id="CVE-2016-3124" level="LOW">
<product>simplesamlphp:1.14</product>
</cve>
<cve id="CVE-2016-6333" level="MEDIUM">
<product>mediawiki:1.23.14</product>
<product>mediawiki:1.26.0</product>
<product>mediawiki:1.26.1</product>
<product>mediawiki:1.26.2</product>
<product>mediawiki:1.26.3</product>
<product>mediawiki:1.26.4</product>
<product>mediawiki:1.27.0</product>
</cve>
<cve id="CVE-2016-6446" level="LOW">
<product>meeting_server:1.8.15</product>
<product>meeting_server:1.8_base</product>
<product>meeting_server:1.9.0</product>
<product>meeting_server:1.9.2</product>
<product>meeting_server:2.0.0</product>
<product>meeting_server:2.0.1</product>
<product>meeting_server:2.0.3</product>
<product>meeting_server:2.0.4</product>
<product>meeting_server:2.0.5</product>
</cve>
<cve id="CVE-2016-6447" level="LOW">
<product>meeting_app:1.8.0</product>
<product>meeting_app:1.9.0</product>
<product>meeting_server:1.8_base</product>
<product>meeting_server:1.9.0</product>
<product>meeting_server:2.0.0</product>
</cve>
<cve id="CVE-2016-3128" level="LOW">
<product>enterprise_service:12.0.0</product>
<product>enterprise_service:12.0.1</product>
<product>enterprise_service:12.1.0</product>
<product>enterprise_service:12.2.0</product>
<product>enterprise_service:12.2.1</product>
<product>enterprise_service:12.3.0</product>
<product>enterprise_service:12.3.1</product>
<product>enterprise_service:12.4.0</product>
<product>enterprise_service:12.4.1</product>
<product>enterprise_service:12.5.0a</product>
<product>enterprise_service:12.5.1</product>
<product>enterprise_service:12.5.2</product>
</cve>
<cve id="CVE-2016-3129" level="MEDIUM">
<product>good_enterprise_mobility_server:2.2.22.25</product>
</cve>
<cve id="CVE-2016-7001" level="LOW">
<product>acrobat:11.0.17</product>
<product>acrobat_dc:15.006.30201</product>
<product>acrobat_dc:15.017.20053</product>
<product>acrobat_reader_dc:15.006.30201</product>
<product>acrobat_reader_dc:15.017.20053</product>
<product>reader:11.0.17</product>
</cve>
<cve id="CVE-2016-6338" level="LOW">
<product>enterprise_virtualization:4.0</product>
</cve>
<cve id="CVE-2016-0473" level="MEDIUM">
<product>peoplesoft_enterprise_peopletools:8.54</product>
<product>peoplesoft_enterprise_peopletools:8.55</product>
</cve>
<cve id="CVE-2016-0471" level="MEDIUM">
<product>peoplesoft_enterprise_peopletools:8.53</product>
<product>peoplesoft_enterprise_peopletools:8.54</product>
</cve>
<cve id="CVE-2016-0470" level="LOW">
<product>fusion_middleware:11.1.1.7.0</product>
<product>fusion_middleware:11.1.1.9</product>
<product>fusion_middleware:12.2.1</product>
</cve>
<cve id="CVE-2016-0477" level="LOW">
<product>application_testing_suite:12.4.0.2</product>
<product>application_testing_suite:12.5.0.2</product>
</cve>
<cve id="CVE-2016-0476" level="LOW">
<product>enterprise_manager_grid_control:12.4.0.2</product>
<product>enterprise_manager_grid_control:12.5.0.2</product>
</cve>
<cve id="CVE-2016-0475" level="MEDIUM">
<product>jdk:1.8.0</product>
<product>jre:1.8.0</product>
<product>jrockit:r28.3.8</product>
</cve>
<cve id="CVE-2016-0474" level="MEDIUM">
<product>peoplesoft_enterprise_peopletools:8.54</product>
<product>peoplesoft_enterprise_peopletools:8.55</product>
</cve>
<cve id="CVE-2016-0479" level="MEDIUM">
<product>business_intelligence:11.1.1.7.0</product>
<product>business_intelligence:11.1.1.9.0</product>
<product>business_intelligence:12.2.1.0.0</product>
</cve>
<cve id="CVE-2016-0478" level="LOW">
<product>application_testing_suite:12.4.0.2</product>
<product>application_testing_suite:12.5.0.2</product>
</cve>
<cve id="CVE-2016-1905" level="LOW">
<product>kubernetes:-</product>
</cve>
<cve id="CVE-2016-1906" level="LOW">
<product>kubernetes:-</product>
</cve>
<cve id="CVE-2016-5742" level="LOW">
<product>movable_type:6.0</product>
<product>movable_type:6.0</product>
<product>movable_type:6.0.1</product>
<product>movable_type:6.0.1</product>
<product>movable_type:6.0.2</product>
<product>movable_type:6.0.2</product>
<product>movable_type:6.0.3</product>
<product>movable_type:6.0.3</product>
<product>movable_type:6.0.4</product>
<product>movable_type:6.0.4</product>
<product>movable_type:6.0.5</product>
<product>movable_type:6.0.5</product>
<product>movable_type:6.0.6</product>
<product>movable_type:6.0.6</product>
<product>movable_type:6.0.7</product>
<product>movable_type:6.0.7</product>
<product>movable_type:6.0.8</product>
<product>movable_type:6.0.8</product>
<product>movable_type:6.1.0</product>
<product>movable_type:6.1.0</product>
<product>movable_type:6.1.1</product>
<product>movable_type:6.1.1</product>
<product>movable_type:6.1.2</product>
<product>movable_type:6.1.2</product>
<product>movable_type:6.2.0</product>
<product>movable_type:6.2.0</product>
<product>movable_type:6.2.2</product>
<product>movable_type:6.2.2</product>
<product>movable_type:6.2.4</product>
<product>movable_type:6.2.4</product>
<product>movable_type_open_source:5.2.13</product>
</cve>
<cve id="CVE-2016-1907" level="LOW">
<product>openssh:6.8</product>
<product>openssh:6.8</product>
<product>openssh:6.9</product>
<product>openssh:6.9</product>
<product>openssh:7.0</product>
<product>openssh:7.0</product>
<product>openssh:7.1</product>
<product>openssh:7.1</product>
</cve>
<cve id="CVE-2016-5967" level="LOW">
<product>rational_asset_analyzer:6.1.0</product>
<product>rational_asset_analyzer:6.1.0.1</product>
<product>rational_asset_analyzer:6.1.0.2</product>
<product>rational_asset_analyzer:6.1.0.3</product>
<product>rational_asset_analyzer:6.1.0.4</product>
<product>rational_asset_analyzer:6.1.0.5</product>
<product>rational_asset_analyzer:6.1.0.6</product>
<product>rational_asset_analyzer:6.1.0.7</product>
<product>rational_asset_analyzer:6.1.0.8</product>
<product>rational_asset_analyzer:6.1.0.9</product>
</cve>
<cve id="CVE-2016-5740" level="MEDIUM">
<product>open-xchange_appsuite:7.8.2</product>
</cve>
<cve id="CVE-2016-8301" level="MEDIUM">
<product>flexcube_universal_banking:11.3.0</product>
<product>flexcube_universal_banking:11.4.0</product>
<product>flexcube_universal_banking:12.0.1</product>
<product>flexcube_universal_banking:12.0.2</product>
<product>flexcube_universal_banking:12.0.3</product>
<product>flexcube_universal_banking:12.1.0</product>
<product>flexcube_universal_banking:12.2.0</product>
</cve>
<cve id="CVE-2016-5747" level="LOW">
<product>edirectory:9.0</product>
</cve>
<cve id="CVE-2016-6000" level="MEDIUM">
<product>tririga_application_platform:3.3.0.0</product>
<product>tririga_application_platform:3.3.0.1</product>
<product>tririga_application_platform:3.3.0.2</product>
<product>tririga_application_platform:3.3.1.0</product>
<product>tririga_application_platform:3.3.1.1</product>
<product>tririga_application_platform:3.3.1.2</product>
<product>tririga_application_platform:3.3.1.3</product>
<product>tririga_application_platform:3.3.2.0</product>
<product>tririga_application_platform:3.3.2.1</product>
<product>tririga_application_platform:3.3.2.2</product>
<product>tririga_application_platform:3.3.2.3</product>
<product>tririga_application_platform:3.3.2.4</product>
<product>tririga_application_platform:3.3.2.5</product>
<product>tririga_application_platform:3.4.0.0</product>
<product>tririga_application_platform:3.4.0.1</product>
<product>tririga_application_platform:3.4.1.0</product>
<product>tririga_application_platform:3.4.1.1</product>
<product>tririga_application_platform:3.4.1.2</product>
<product>tririga_application_platform:3.4.1.3</product>
<product>tririga_application_platform:3.4.2.0</product>
<product>tririga_application_platform:3.4.2.1</product>
<product>tririga_application_platform:3.4.2.2</product>
<product>tririga_application_platform:3.4.2.3</product>
<product>tririga_application_platform:3.4.2.4</product>
<product>tririga_application_platform:3.5.0.0</product>
<product>tririga_application_platform:3.5.0.1</product>
<product>tririga_application_platform:3.5.1.0</product>
<product>tririga_application_platform:3.5.1.1</product>
</cve>
<cve id="CVE-2016-10668" level="MEDIUM">
<product>libsbml:0.0.2</product>
</cve>
<cve id="CVE-2016-10669" level="MEDIUM">
<product>soci:0.0.1</product>
</cve>
<cve id="CVE-2016-5960" level="LOW">
<product>security_privileged_identity_manager:2.0.2</product>
<product>security_privileged_identity_manager:2.1</product>
</cve>
<cve id="CVE-2016-6001" level="MEDIUM">
<product>forms_experience_builder:8.5</product>
<product>forms_experience_builder:8.5.1</product>
<product>forms_experience_builder:8.6.0</product>
</cve>
<cve id="CVE-2016-10662" level="MEDIUM">
<product>tomita:-</product>
</cve>
<cve id="CVE-2016-10663" level="MEDIUM">
<product>wixtoolset:-</product>
</cve>
<cve id="CVE-2016-10660" level="MEDIUM">
<product>fis-parser-sass-bin:-</product>
</cve>
<cve id="CVE-2016-5745" level="LOW">
<product>big-ip_local_traffic_manager:11.0.0</product>
<product>big-ip_local_traffic_manager:11.1.0</product>
<product>big-ip_local_traffic_manager:11.2.0</product>
<product>big-ip_local_traffic_manager:11.2.1</product>
<product>big-ip_local_traffic_manager:11.3.0</product>
<product>big-ip_local_traffic_manager:11.4.0</product>
<product>big-ip_local_traffic_manager:11.4.1</product>
<product>big-ip_local_traffic_manager:11.5.0</product>
<product>big-ip_local_traffic_manager:11.5.1</product>
<product>big-ip_local_traffic_manager:11.5.2</product>
<product>big-ip_local_traffic_manager:11.5.3</product>
<product>big-ip_local_traffic_manager:11.5.4</product>
<product>big-ip_local_traffic_manager:11.6.0</product>
<product>big-ip_local_traffic_manager:11.6.1</product>
<product>big-ip_local_traffic_manager:12.0.0</product>
<product>big-ip_local_traffic_manager:12.1.0</product>
</cve>
<cve id="CVE-2016-10666" level="MEDIUM">
<product>tomita-parser:0.0.3</product>
</cve>
<cve id="CVE-2016-10667" level="MEDIUM">
<product>selenium-portal:0.0.1-2</product>
</cve>
<cve id="CVE-2016-10664" level="MEDIUM">
<product>mystem:-</product>
</cve>
<cve id="CVE-2016-10665" level="MEDIUM">
<product>herbivore:0.0.3</product>
</cve>
<cve id="CVE-2016-3071" level="LOW">
<product>libreswan:3.16</product>
<product>fedora:23</product>
<product>fedora:24</product>
</cve>
<cve id="CVE-2016-3077" level="LOW">
<product>ovirt:-</product>
</cve>
<cve id="CVE-2016-8667" level="MEDIUM">
<product>qemu:-</product>
</cve>
<cve id="CVE-2016-8661" level="LOW">
<product>little_snitch:3.0</product>
<product>little_snitch:3.0.1</product>
<product>little_snitch:3.0.2</product>
<product>little_snitch:3.0.3</product>
<product>little_snitch:3.0.4</product>
<product>little_snitch:3.1</product>
<product>little_snitch:3.1.1</product>
<product>little_snitch:3.3</product>
<product>little_snitch:3.3.1</product>
<product>little_snitch:3.3.2</product>
<product>little_snitch:3.3.3</product>
<product>little_snitch:3.3.4</product>
<product>little_snitch:3.4</product>
<product>little_snitch:3.4.1</product>
<product>little_snitch:3.4.2</product>
<product>little_snitch:3.5</product>
<product>little_snitch:3.5.1</product>
<product>little_snitch:3.5.2</product>
<product>little_snitch:3.5.3</product>
<product>little_snitch:3.6</product>
<product>little_snitch:3.6.1</product>
</cve>
<cve id="CVE-2016-4165" level="LOW">
<product>brackets:1.6</product>
</cve>
<cve id="CVE-2016-8668" level="MEDIUM">
<product>qemu:-</product>
</cve>
<cve id="CVE-2016-4164" level="MEDIUM">
<product>brackets:1.6</product>
</cve>
<cve id="CVE-2016-7977" level="MEDIUM">
<product>ghostscript:9.20</product>
</cve>
<cve id="CVE-2016-1258" level="LOW">
<product>junos:12.1x44</product>
<product>junos:12.1x44</product>
<product>junos:12.1x44</product>
<product>junos:12.1x44</product>
<product>junos:12.1x44</product>
<product>junos:12.1x44</product>
<product>junos:12.1x44</product>
<product>junos:12.1x44</product>
<product>junos:12.1x44</product>
<product>junos:12.1x44</product>
<product>junos:12.1x44</product>
<product>junos:12.1x46</product>
<product>junos:12.1x46</product>
<product>junos:12.1x46</product>
<product>junos:12.1x46</product>
<product>junos:12.1x46</product>
<product>junos:12.1x46</product>
<product>junos:12.1x46</product>
<product>junos:12.1x46</product>
<product>junos:12.1x47</product>
<product>junos:12.1x47</product>
<product>junos:12.1x47</product>
<product>junos:12.1x47</product>
<product>junos:12.1x47</product>
<product>junos:12.3</product>
<product>junos:12.3</product>
<product>junos:12.3</product>
<product>junos:12.3</product>
<product>junos:12.3</product>
<product>junos:12.3</product>
<product>junos:12.3</product>
<product>junos:12.3</product>
<product>junos:12.3</product>
<product>junos:12.3</product>
<product>junos:12.3x48</product>
<product>junos:12.3x48</product>
<product>junos:12.3x48</product>
<product>junos:13.2x51</product>
<product>junos:13.2x51</product>
<product>junos:13.2x51</product>
<product>junos:13.2x51</product>
<product>junos:13.2x51</product>
<product>junos:13.2x51</product>
<product>junos:13.2x51</product>
<product>junos:13.2x51</product>
<product>junos:13.3</product>
<product>junos:13.3</product>
<product>junos:13.3</product>
<product>junos:13.3</product>
<product>junos:13.3</product>
<product>junos:13.3</product>
<product>junos:13.3</product>
<product>junos:13.3</product>
<product>junos:14.1</product>
<product>junos:14.1</product>
<product>junos:14.1</product>
<product>junos:14.1</product>
<product>junos:14.1</product>
<product>junos:14.1</product>
<product>junos:14.2</product>
<product>junos:14.2</product>
<product>junos:14.2</product>
<product>junos:14.2</product>
<product>junos:14.2</product>
</cve>
<cve id="CVE-2016-4379" level="MEDIUM">
<product>integrated_lights-out_3_firmware:1.87</product>
</cve>
<cve id="CVE-2016-0524" level="LOW">
<product>e-business_suite:11.5.10.2</product>
</cve>
<cve id="CVE-2016-4374" level="LOW">
<product>release_control:9.13</product>
<product>release_control:9.20</product>
<product>release_control:9.21</product>
</cve>
<cve id="CVE-2016-4375" level="LOW">
<product>integrated_lights-out_3_firmware:1.87</product>
<product>integrated_lights-out_4_firmware:2.43</product>
<product>integrated_lights-out_4_mrca_firmware:2.31</product>
</cve>
<cve id="CVE-2016-4376" level="LOW">
<product>fabric_os:7.4.1</product>
<product>fabric_os:8.0.0</product>
</cve>
<cve id="CVE-2016-1257" level="MEDIUM">
<product>junos:13.2</product>
<product>junos:13.2</product>
<product>junos:13.2</product>
<product>junos:13.2</product>
<product>junos:13.2</product>
<product>junos:13.3</product>
<product>junos:13.3</product>
<product>junos:13.3</product>
<product>junos:13.3</product>
<product>junos:13.3</product>
<product>junos:13.3</product>
<product>junos:13.3</product>
<product>junos:14.1</product>
<product>junos:14.1</product>
<product>junos:14.1</product>
<product>junos:14.1</product>
<product>junos:14.1</product>
<product>junos:14.1x51</product>
<product>junos:14.1x51</product>
<product>junos:14.1x53</product>
<product>junos:14.1x53</product>
<product>junos:14.1x53</product>
<product>junos:14.1x53</product>
<product>junos:14.1x53</product>
<product>junos:14.2</product>
<product>junos:14.2</product>
<product>junos:14.2</product>
<product>junos:14.2</product>
<product>junos:15.1</product>
<product>junos:15.1</product>
<product>junos:15.1</product>
<product>junos:15.1</product>
<product>junos:15.1</product>
<product>junos:15.1x49</product>
<product>junos:15.1x49</product>
</cve>
<cve id="CVE-2016-4370" level="LOW">
<product>project_and_portfolio_management_center:9.20</product>
<product>project_and_portfolio_management_center:9.21</product>
<product>project_and_portfolio_management_center:9.22</product>
<product>project_and_portfolio_management_center:9.30</product>
<product>project_and_portfolio_management_center:9.31</product>
<product>project_and_portfolio_management_center:9.32</product>
</cve>
<cve id="CVE-2016-4371" level="MEDIUM">
<product>service_manager:9.30</product>
<product>service_manager:9.31</product>
<product>service_manager:9.32</product>
<product>service_manager:9.33</product>
<product>service_manager:9.34</product>
<product>service_manager:9.35</product>
<product>service_manager:9.40</product>
<product>service_manager:9.41</product>
<product>service_manager_mobility:9.30</product>
<product>service_manager_mobility:9.31</product>
<product>service_manager_mobility:9.32</product>
<product>service_manager_mobility:9.33</product>
<product>service_manager_mobility:9.34</product>
<product>service_manager_mobility:9.35</product>
<product>service_manager_mobility:9.40</product>
<product>service_manager_mobility:9.41</product>
<product>service_manager_server:9.30</product>
<product>service_manager_server:9.31</product>
<product>service_manager_server:9.32</product>
<product>service_manager_server:9.33</product>
<product>service_manager_server:9.34</product>
<product>service_manager_server:9.35</product>
<product>service_manager_server:9.40</product>
<product>service_manager_server:9.41</product>
<product>service_manager_service_request_catalog:9.30</product>
<product>service_manager_service_request_catalog:9.31</product>
<product>service_manager_service_request_catalog:9.32</product>
<product>service_manager_service_request_catalog:9.33</product>
<product>service_manager_service_request_catalog:9.34</product>
<product>service_manager_service_request_catalog:9.35</product>
<product>service_manager_service_request_catalog:9.40</product>
<product>service_manager_service_request_catalog:9.41</product>
<product>service_manager_web_client:9.30</product>
<product>service_manager_web_client:9.31</product>
<product>service_manager_web_client:9.32</product>
<product>service_manager_web_client:9.33</product>
<product>service_manager_web_client:9.34</product>
<product>service_manager_web_client:9.35</product>
<product>service_manager_web_client:9.40</product>
<product>service_manager_web_client:9.41</product>
<product>service_manager_windows_client:9.30</product>
<product>service_manager_windows_client:9.31</product>
<product>service_manager_windows_client:9.32</product>
<product>service_manager_windows_client:9.33</product>
<product>service_manager_windows_client:9.34</product>
<product>service_manager_windows_client:9.35</product>
<product>service_manager_windows_client:9.40</product>
<product>service_manager_windows_client:9.41</product>
</cve>
<cve id="CVE-2016-1252" level="MEDIUM">
<product>apt:0.7.21</product>
<product>apt:0.7.22</product>
<product>apt:0.7.22.1</product>
<product>apt:0.7.23</product>
<product>apt:0.7.23.1</product>
<product>apt:0.7.24</product>
<product>apt:0.7.24ubuntu1</product>
<product>apt:0.7.25</product>
<product>apt:0.7.25.1</product>
<product>apt:0.7.25.3</product>
<product>apt:0.7.25.3ubuntu1</product>
<product>apt:0.7.25.3ubuntu2</product>
<product>apt:0.7.25.3ubuntu3</product>
<product>apt:0.7.25.3ubuntu4</product>
<product>apt:0.7.25.3ubuntu5</product>
<product>apt:0.7.25.3ubuntu6</product>
<product>apt:0.7.25.3ubuntu7</product>
<product>apt:0.7.25.3ubuntu8</product>
<product>apt:0.7.25ubuntu1</product>
<product>apt:0.8.0</product>
<product>apt:0.8.1</product>
<product>apt:0.8.2</product>
<product>apt:0.8.3</product>
<product>apt:0.8.4</product>
<product>apt:0.8.5</product>
<product>apt:0.8.6</product>
<product>apt:0.8.7</product>
<product>apt:0.8.8</product>
<product>apt:0.8.9</product>
<product>apt:0.8.10</product>
<product>apt:0.8.10.1</product>
<product>apt:0.8.10.2</product>
<product>apt:0.8.10.3</product>
<product>apt:0.8.11</product>
<product>apt:0.8.11.1</product>
<product>apt:0.8.11.2</product>
<product>apt:0.8.11.3</product>
<product>apt:0.8.11.4</product>
<product>apt:0.8.11.5</product>
<product>apt:0.8.12</product>
<product>apt:0.8.13</product>
<product>apt:0.8.13.1</product>
<product>apt:0.8.13.2</product>
<product>apt:0.8.14</product>
<product>apt:0.8.14.1</product>
<product>apt:0.8.15</product>
<product>apt:0.8.15.1</product>
<product>apt:0.8.15.2</product>
<product>apt:0.8.15.3</product>
<product>apt:0.8.15.4</product>
<product>apt:0.8.15.5</product>
<product>apt:0.8.15.6</product>
<product>apt:0.8.15.7</product>
<product>apt:0.8.15.8</product>
<product>apt:0.8.15.9</product>
<product>apt:0.9.0</product>
<product>apt:0.9.1</product>
<product>apt:0.9.2</product>
<product>apt:0.9.3</product>
<product>apt:0.9.4</product>
<product>apt:0.9.5</product>
<product>apt:0.9.5.1</product>
<product>apt:0.9.6</product>
<product>apt:0.9.7</product>
<product>apt:0.9.7.1</product>
<product>apt:0.9.7.2</product>
<product>apt:0.9.7.3</product>
<product>apt:0.9.7.4</product>
<product>apt:0.9.7.5</product>
<product>apt:0.9.7.6</product>
<product>apt:0.9.7.7</product>
<product>apt:0.9.7.8</product>
<product>apt:0.9.7.9</product>
<product>apt:0.9.8</product>
<product>apt:0.9.8.1</product>
<product>apt:0.9.9</product>
<product>apt:0.9.9.1</product>
<product>apt:0.9.9.2</product>
<product>apt:0.9.9.3</product>
<product>apt:0.9.9.4</product>
<product>apt:0.9.10</product>
<product>apt:0.9.11</product>
<product>apt:0.9.11.1</product>
<product>apt:0.9.11.2</product>
<product>apt:0.9.11.3</product>
<product>apt:0.9.11.4</product>
<product>apt:0.9.12</product>
<product>apt:0.9.12.1</product>
<product>apt:0.9.13.1</product>
<product>apt:0.9.13.1.ubuntu1</product>
<product>apt:0.9.13.1ubuntu1</product>
<product>apt:0.9.13.exp1</product>
<product>apt:0.9.13.exp1ubuntu1</product>
<product>apt:0.9.13_exp1</product>
<product>apt:0.9.14</product>
<product>apt:0.9.14.1</product>
<product>apt:0.9.14.2</product>
<product>apt:0.9.14.3.exp1</product>
<product>apt:0.9.14.3.exp2</product>
<product>apt:0.9.14.3.exp3</product>
<product>apt:0.9.14.3.exp4</product>
<product>apt:0.9.14.3.exp5</product>
<product>apt:0.9.14ubuntu1</product>
<product>apt:0.9.15</product>
<product>apt:0.9.15.1</product>
<product>apt:0.9.15.1ubuntu1</product>
<product>apt:0.9.15.2</product>
<product>apt:0.9.15.2ubuntu1</product>
<product>apt:0.9.15.3</product>
<product>apt:0.9.15.3ubuntu1</product>
<product>apt:0.9.15.4</product>
<product>apt:0.9.15.4ubuntu1</product>
<product>apt:0.9.15.4ubuntu2</product>
<product>apt:0.9.15.4ubuntu3</product>
<product>apt:0.9.15.5</product>
<product>apt:0.9.16</product>
<product>apt:0.9.16.1</product>
<product>apt:1.0.1</product>
<product>apt:1.0.1ubuntu1</product>
<product>apt:1.0.1ubuntu2</product>
<product>apt:1.0.1ubuntu2.1</product>
<product>apt:1.0.1ubuntu2.2</product>
<product>apt:1.0.2</product>
<product>apt:1.0.2ubuntu1</product>
<product>apt:1.0.3</product>
<product>apt:1.0.4</product>
<product>apt:1.0.4ubuntu1</product>
<product>apt:1.0.4ubuntu2</product>
<product>apt:1.0.4ubuntu3</product>
<product>apt:1.0.4ubuntu4</product>
<product>apt:1.0.5</product>
<product>apt:1.0.6</product>
<product>apt:1.0.7</product>
<product>apt:1.0.8</product>
<product>apt:1.0.8ubuntu1</product>
<product>apt:1.0.9.1</product>
<product>apt:1.0.9.2</product>
<product>apt:1.0.9.2ubuntu1</product>
<product>apt:1.0.9.2ubuntu2</product>
<product>apt:1.0.9.3</product>
<product>apt:1.0.9.3ubuntu1</product>
<product>apt:1.0.9.4</product>
<product>apt:1.0.9.5</product>
<product>apt:1.0.9.6</product>
<product>apt:1.0.9.7</product>
<product>apt:1.0.9.7ubuntu1</product>
<product>apt:1.0.9.7ubuntu2</product>
<product>apt:1.0.9.7ubuntu3</product>
<product>apt:1.0.9.7ubuntu4</product>
<product>apt:1.0.9.7ubuntu5</product>
<product>apt:1.0.9.8</product>
<product>apt:1.0.9.8.1</product>
<product>apt:1.0.9.8.2</product>
<product>apt:1.0.9.8.3</product>
<product>apt:1.0.9.8.4</product>
<product>apt:1.0.9.9</product>
<product>apt:1.0.9.9ubuntu1</product>
<product>apt:1.0.9.10</product>
<product>apt:1.0.9.10ubuntu1</product>
<product>apt:1.0.9.10ubuntu5</product>
<product>apt:1.0.9.10ubuntu7</product>
<product>apt:1.0.10</product>
<product>apt:1.0.10.1</product>
<product>apt:1.0.10.2</product>
<product>apt:1.0.10.2ubuntu1</product>
<product>apt:1.1.1</product>
<product>apt:1.1.2</product>
<product>apt:1.1.3</product>
<product>apt:1.1.4</product>
<product>apt:1.1.5</product>
<product>apt:1.1.6</product>
<product>apt:1.1.7</product>
<product>apt:1.1.8</product>
<product>apt:1.1.9</product>
<product>apt:1.1.10</product>
<product>apt:1.1.exp1</product>
<product>apt:1.1.exp2</product>
<product>apt:1.1.exp3</product>
<product>apt:1.1.exp4</product>
<product>apt:1.1.exp5</product>
<product>apt:1.1.exp6</product>
<product>apt:1.1.exp7</product>
<product>apt:1.1.exp8</product>
<product>apt:1.1.exp9</product>
<product>apt:1.1.exp10</product>
<product>apt:1.1.exp11</product>
<product>apt:1.1.exp12</product>
<product>apt:1.1.exp13</product>
<product>apt:1.1_exp14</product>
<product>apt:1.1_exp15</product>
<product>apt:1.1_exp16</product>
<product>apt:1.2.1</product>
<product>apt:1.2.2</product>
<product>apt:1.2.3</product>
<product>apt:1.2.4</product>
<product>apt:1.2.5</product>
<product>apt:1.2.6</product>
<product>apt:1.2.7</product>
<product>apt:1.2.8</product>
<product>apt:1.2.9</product>
<product>apt:1.2.10</product>
<product>apt:1.2.11</product>
<product>apt:1.2.12</product>
<product>apt:1.2.13</product>
<product>apt:1.2.14</product>
<product>apt:1.2.15</product>
<product>apt:1.2.16</product>
<product>apt:1.2.17</product>
<product>apt:1.2.18</product>
<product>apt:1.2.19</product>
<product>apt:1.2.20</product>
<product>apt:1.2.21</product>
<product>apt:1.2.22</product>
<product>apt:1.2.23</product>
<product>apt:1.2.24</product>
<product>apt:1.2.25</product>
<product>apt:1.2_exp1</product>
<product>apt:1.3.1</product>
<product>apt:1.3.2</product>
</cve>
<cve id="CVE-2016-4373" level="LOW">
<product>operations_manager:9.20.0</product>
<product>operations_manager:9.20.0</product>
<product>operations_manager:9.20.0</product>
<product>operations_manager:9.21.120</product>
<product>operations_manager:9.21.120</product>
<product>operations_manager:9.21.120</product>
</cve>
<cve id="CVE-2016-0254" level="LOW">
<product>cognos_business_intelligence:10.1.1</product>
<product>cognos_business_intelligence:10.2</product>
<product>cognos_business_intelligence:10.2.1</product>
<product>cognos_business_intelligence:10.2.1.1</product>
<product>cognos_business_intelligence:10.2.2</product>
</cve>
<cve id="CVE-2016-4168" level="MEDIUM">
<product>experience_manager:5.6.1</product>
<product>experience_manager:6.0.0</product>
<product>experience_manager:6.1.0</product>
</cve>
<cve id="CVE-2016-0253" level="MEDIUM">
<product>financial_transaction_manager:2.1.1.2</product>
<product>financial_transaction_manager:2.1.1.2</product>
<product>financial_transaction_manager:2.1.1.2</product>
<product>financial_transaction_manager:3.0.0.0</product>
<product>financial_transaction_manager:3.0.0.0</product>
<product>financial_transaction_manager:3.0.0.0</product>
<product>financial_transaction_manager:3.0.0.1</product>
<product>financial_transaction_manager:3.0.0.1</product>
<product>financial_transaction_manager:3.0.0.1</product>
<product>financial_transaction_manager:3.0.0.2</product>
<product>financial_transaction_manager:3.0.0.2</product>
<product>financial_transaction_manager:3.0.0.2</product>
<product>financial_transaction_manager:3.0.0.3</product>
<product>financial_transaction_manager:3.0.0.3</product>
<product>financial_transaction_manager:3.0.0.3</product>
<product>financial_transaction_manager:3.0.0.4</product>
<product>financial_transaction_manager:3.0.0.4</product>
<product>financial_transaction_manager:3.0.0.4</product>
<product>financial_transaction_manager:3.0.0.5</product>
<product>financial_transaction_manager:3.0.0.5</product>
<product>financial_transaction_manager:3.0.0.5</product>
<product>financial_transaction_manager:3.0.0.6</product>
<product>financial_transaction_manager:3.0.0.6</product>
<product>financial_transaction_manager:3.0.0.6</product>
<product>financial_transaction_manager:3.0.0.7</product>
<product>financial_transaction_manager:3.0.0.7</product>
<product>financial_transaction_manager:3.0.0.7</product>
<product>financial_transaction_manager:3.0.0.8</product>
<product>financial_transaction_manager:3.0.0.8</product>
<product>financial_transaction_manager:3.0.0.8</product>
<product>financial_transaction_manager:3.0.0.9</product>
<product>financial_transaction_manager:3.0.0.9</product>
<product>financial_transaction_manager:3.0.0.9</product>
<product>financial_transaction_manager:3.0.0.10</product>
<product>financial_transaction_manager:3.0.0.10</product>
<product>financial_transaction_manager:3.0.0.10</product>
<product>financial_transaction_manager:3.0.0.11</product>
<product>financial_transaction_manager:3.0.0.11</product>
<product>financial_transaction_manager:3.0.0.11</product>
<product>financial_transaction_manager:3.0.0.12</product>
<product>financial_transaction_manager:3.0.0.12</product>
<product>financial_transaction_manager:3.0.0.12</product>
</cve>
<cve id="CVE-2016-1789" level="MEDIUM">
<product>ibooks_author:2.4.0</product>
</cve>
<cve id="CVE-2016-7200" level="HIGH">
<product>edge</product>
</cve>
<cve id="CVE-2016-0523" level="LOW">
<product>interaction_blending:11.5.10.2</product>
<product>interaction_blending:12.1.1</product>
<product>interaction_blending:12.1.2</product>
<product>interaction_blending:12.1.3</product>
<product>interaction_blending:12.2.3</product>
<product>interaction_blending:12.2.4</product>
<product>interaction_blending:12.2.5</product>
</cve>
<cve id="CVE-2016-0250" level="LOW">
<product>infosphere_information_server:11.3</product>
<product>infosphere_information_server:11.3.1</product>
<product>infosphere_information_server:11.5</product>
</cve>
<cve id="CVE-2016-0789" level="MEDIUM">
<product>jenkins:1.642.1</product>
<product>jenkins:1.649</product>
<product>openshift:3.1</product>
</cve>
<cve id="CVE-2016-0788" level="LOW">
<product>jenkins:1.642.1</product>
<product>jenkins:1.649</product>
<product>openshift:3.1</product>
</cve>
<cve id="CVE-2016-0781" level="MEDIUM">
<product>cloud_foundry:208</product>
<product>cloud_foundry:209</product>
<product>cloud_foundry:210</product>
<product>cloud_foundry:211</product>
<product>cloud_foundry:212</product>
<product>cloud_foundry:213</product>
<product>cloud_foundry:214</product>
<product>cloud_foundry:215</product>
<product>cloud_foundry:216</product>
<product>cloud_foundry:217</product>
<product>cloud_foundry:218</product>
<product>cloud_foundry:219</product>
<product>cloud_foundry:220</product>
<product>cloud_foundry:221</product>
<product>cloud_foundry:222</product>
<product>cloud_foundry:223</product>
<product>cloud_foundry:224</product>
<product>cloud_foundry:225</product>
<product>cloud_foundry:226</product>
<product>cloud_foundry:227</product>
<product>cloud_foundry:228</product>
<product>cloud_foundry:229</product>
<product>cloud_foundry:230</product>
<product>cloud_foundry:231</product>
<product>cloud_foundry:241</product>
<product>cloud_foundry_elastic_runtime:1.6.0</product>
<product>cloud_foundry_elastic_runtime:1.6.1</product>
<product>cloud_foundry_elastic_runtime:1.6.2</product>
<product>cloud_foundry_elastic_runtime:1.6.3</product>
<product>cloud_foundry_elastic_runtime:1.6.4</product>
<product>cloud_foundry_elastic_runtime:1.6.5</product>
<product>cloud_foundry_elastic_runtime:1.6.6</product>
<product>cloud_foundry_elastic_runtime:1.6.7</product>
<product>cloud_foundry_elastic_runtime:1.6.8</product>
<product>cloud_foundry_elastic_runtime:1.6.9</product>
<product>cloud_foundry_elastic_runtime:1.6.10</product>
<product>cloud_foundry_elastic_runtime:1.6.11</product>
<product>cloud_foundry_elastic_runtime:1.6.12</product>
<product>cloud_foundry_elastic_runtime:1.6.13</product>
<product>cloud_foundry_elastic_runtime:1.6.14</product>
<product>cloud_foundry_elastic_runtime:1.6.15</product>
<product>cloud_foundry_elastic_runtime:1.6.16</product>
<product>cloud_foundry_elastic_runtime:1.6.17</product>
<product>cloud_foundry_elastic_runtime:1.6.18</product>
<product>cloud_foundry_elastic_runtime:1.6.19</product>
<product>cloud_foundry_uaa:2.7.4.1</product>
<product>cloud_foundry_uaa:3.0.0</product>
<product>cloud_foundry_uaa:3.0.1</product>
<product>cloud_foundry_uaa:3.1.0</product>
<product>cloud_foundry_uaa:3.2.0</product>
<product>cloud_foundry_uaa_release:2</product>
<product>cloud_foundry_uaa_release:3</product>
<product>cloud_foundry_uaa_release:4</product>
<product>cloud_foundry_uaa_release:5</product>
<product>cloud_foundry_uaa_release:6</product>
<product>cloud_foundry_uaa_release:7</product>
<product>login-server:-</product>
</cve>
<cve id="CVE-2016-0780" level="LOW">
<product>cloud_foundry_elastic_runtime:1.5.0</product>
<product>cloud_foundry_elastic_runtime:1.5.1</product>
<product>cloud_foundry_elastic_runtime:1.5.2</product>
<product>cloud_foundry_elastic_runtime:1.5.3</product>
<product>cloud_foundry_elastic_runtime:1.5.4</product>
<product>cloud_foundry_elastic_runtime:1.5.5</product>
<product>cloud_foundry_elastic_runtime:1.5.6</product>
<product>cloud_foundry_elastic_runtime:1.5.7</product>
<product>cloud_foundry_elastic_runtime:1.5.8</product>
<product>cloud_foundry_elastic_runtime:1.5.9</product>
<product>cloud_foundry_elastic_runtime:1.5.10</product>
<product>cloud_foundry_elastic_runtime:1.5.11</product>
<product>cloud_foundry_elastic_runtime:1.5.12</product>
<product>cloud_foundry_elastic_runtime:1.5.13</product>
<product>cloud_foundry_elastic_runtime:1.5.14</product>
<product>cloud_foundry_elastic_runtime:1.5.15</product>
<product>cloud_foundry_elastic_runtime:1.5.16</product>
<product>cloud_foundry_elastic_runtime:1.6.0</product>
<product>cloud_foundry_elastic_runtime:1.6.1</product>
<product>cloud_foundry_elastic_runtime:1.6.2</product>
<product>cloud_foundry_elastic_runtime:1.6.3</product>
<product>cloud_foundry_elastic_runtime:1.6.4</product>
<product>cloud_foundry_elastic_runtime:1.6.5</product>
<product>cloud_foundry_elastic_runtime:1.6.6</product>
<product>cloud_foundry_elastic_runtime:1.6.7</product>
<product>cloud_foundry_elastic_runtime:1.6.8</product>
<product>cloud_foundry_elastic_runtime:1.6.9</product>
<product>cloud_foundry_elastic_runtime:1.6.10</product>
<product>cloud_foundry_elastic_runtime:1.6.11</product>
<product>cloud_foundry_elastic_runtime:1.6.12</product>
<product>cloud_foundry_elastic_runtime:1.6.13</product>
<product>cloud_foundry_elastic_runtime:1.6.14</product>
<product>cloud_foundry_elastic_runtime:1.6.15</product>
<product>cloud_foundry_elastic_runtime:1.6.16</product>
<product>cloud_foundry_elastic_runtime:1.6.17</product>
<product>cloud_foundry_elastic_runtime_cf_release:231</product>
</cve>
<cve id="CVE-2016-0783" level="LOW">
<product>openmeetings:3.1.0</product>
</cve>
<cve id="CVE-2016-0782" level="MEDIUM">
<product>activemq:5.1.0</product>
<product>activemq:5.2.0</product>
<product>activemq:5.3.0</product>
<product>activemq:5.3.1</product>
<product>activemq:5.3.2</product>
<product>activemq:5.4.0</product>
<product>activemq:5.4.1</product>
<product>activemq:5.4.2</product>
<product>activemq:5.4.3</product>
<product>activemq:5.5.0</product>
<product>activemq:5.5.1</product>
<product>activemq:5.6.0</product>
<product>activemq:5.7.0</product>
<product>activemq:5.8.0</product>
<product>activemq:5.9.0</product>
<product>activemq:5.9.1</product>
<product>activemq:5.10.0</product>
<product>activemq:5.10.1</product>
<product>activemq:5.10.2</product>
<product>activemq:5.11.0</product>
<product>activemq:5.11.1</product>
<product>activemq:5.11.2</product>
<product>activemq:5.11.3</product>
<product>activemq:5.12.0</product>
<product>activemq:5.12.1</product>
<product>activemq:5.12.2</product>
<product>activemq:5.13.0</product>
<product>activemq:5.13.1</product>
</cve>
<cve id="CVE-2016-0785" level="LOW">
<product>struts:2.3.24.1</product>
</cve>
<cve id="CVE-2016-7172" level="LOW">
<product>snap_creator_framework:4.3.0</product>
</cve>
<cve id="CVE-2016-7171" level="MEDIUM">
<product>netapp_plug-in:2.0</product>
</cve>
<cve id="CVE-2016-7170" level="LOW">
<product>qemu:-</product>
</cve>
<cve id="CVE-2016-1438" level="LOW">
<product>asyncos:9.7.0-125</product>
</cve>
<cve id="CVE-2016-1439" level="MEDIUM">
<product>unified_contact_center_enterprise:4.6%282%29</product>
<product>unified_contact_center_enterprise:4.6%282%29</product>
<product>unified_contact_center_enterprise:4.6%282%29</product>
<product>unified_contact_center_enterprise:4.6%282%29</product>
<product>unified_contact_center_enterprise:4.6%282%29</product>
<product>unified_contact_center_enterprise:4.6%282%29</product>
<product>unified_contact_center_enterprise:4.6.2</product>
<product>unified_contact_center_enterprise:5.0%280%29</product>
<product>unified_contact_center_enterprise:5.0%280%29</product>
<product>unified_contact_center_enterprise:5.0%280%29</product>
<product>unified_contact_center_enterprise:5.0%280%29</product>
<product>unified_contact_center_enterprise:5.0%280%29</product>
<product>unified_contact_center_enterprise:5.0%280%29</product>
<product>unified_contact_center_enterprise:5.0%280%29</product>
<product>unified_contact_center_enterprise:5.0%280%29</product>
<product>unified_contact_center_enterprise:5.0%280%29</product>
<product>unified_contact_center_enterprise:5.0%280%29</product>
<product>unified_contact_center_enterprise:5.0%280%29</product>
<product>unified_contact_center_enterprise:5.0%280%29</product>
<product>unified_contact_center_enterprise:6.0%280%29</product>
<product>unified_contact_center_enterprise:6.0%280%29</product>
<product>unified_contact_center_enterprise:6.0%280%29</product>
<product>unified_contact_center_enterprise:6.0%280%29</product>
<product>unified_contact_center_enterprise:6.0%280%29</product>
<product>unified_contact_center_enterprise:6.0%280%29</product>
<product>unified_contact_center_enterprise:6.0%280%29</product>
<product>unified_contact_center_enterprise:6.0%280%29</product>
<product>unified_contact_center_enterprise:6.0%280%29</product>
<product>unified_contact_center_enterprise:6.0%280%29</product>
<product>unified_contact_center_enterprise:6.0%280%29</product>
<product>unified_contact_center_enterprise:6.0%280%29</product>
<product>unified_contact_center_enterprise:7.0%280%29</product>
<product>unified_contact_center_enterprise:7.0%280%29</product>
<product>unified_contact_center_enterprise:7.0%280%29</product>
<product>unified_contact_center_enterprise:7.0%280%29</product>
<product>unified_contact_center_enterprise:7.1%282%29</product>
<product>unified_contact_center_enterprise:7.1%283%29</product>
<product>unified_contact_center_enterprise:7.1%284%29</product>
<product>unified_contact_center_enterprise:7.1%285%29</product>
<product>unified_contact_center_enterprise:7.1.0</product>
<product>unified_contact_center_enterprise:7.2%281%29</product>
<product>unified_contact_center_enterprise:7.2%282%29</product>
<product>unified_contact_center_enterprise:7.2%283%29</product>
<product>unified_contact_center_enterprise:7.2%284%29</product>
<product>unified_contact_center_enterprise:7.2%285%29</product>
<product>unified_contact_center_enterprise:7.2%286%29</product>
<product>unified_contact_center_enterprise:7.2%287%29</product>
<product>unified_contact_center_enterprise:7.5%282%29</product>
<product>unified_contact_center_enterprise:7.5%283%29</product>
<product>unified_contact_center_enterprise:7.5%284%29</product>
<product>unified_contact_center_enterprise:7.5%285%29</product>
<product>unified_contact_center_enterprise:7.5%286%29</product>
<product>unified_contact_center_enterprise:7.5%287%29</product>
<product>unified_contact_center_enterprise:7.5%288%29</product>
<product>unified_contact_center_enterprise:7.5%289%29</product>
<product>unified_contact_center_enterprise:7.5%2810%29</product>
<product>unified_contact_center_enterprise:8.0%282%29</product>
<product>unified_contact_center_enterprise:8.0%283%29</product>
<product>unified_contact_center_enterprise:8.5%281%29</product>
<product>unified_contact_center_enterprise:8.5%282%29</product>
<product>unified_contact_center_enterprise:8.5%283%29</product>
<product>unified_contact_center_enterprise:8.5%284%29</product>
<product>unified_contact_center_enterprise:9.0%282%29</product>
<product>unified_contact_center_enterprise:9.0%283%29</product>
<product>unified_contact_center_enterprise:9.0%284%29</product>
<product>unified_contact_center_enterprise:10.0%281%29</product>
<product>unified_contact_center_enterprise:10.0%282%29</product>
<product>unified_contact_center_enterprise:10.5%281%29</product>
<product>unified_contact_center_enterprise:10.5%282%29</product>
</cve>
<cve id="CVE-2016-10089" level="LOW">
<product>nagios:4.2.4</product>
</cve>
<cve id="CVE-2016-10086" level="LOW">
<product>service_desk_management:14.1</product>
<product>service_desk_manager:12.9</product>
</cve>
<cve id="CVE-2016-10087" level="LOW">
<product>libpng:0.8</product>
<product>libpng:0.71</product>
<product>libpng:0.81</product>
<product>libpng:0.82</product>
<product>libpng:0.85</product>
<product>libpng:0.86</product>
<product>libpng:0.87</product>
<product>libpng:0.88</product>
<product>libpng:0.89</product>
<product>libpng:0.89c</product>
<product>libpng:0.90</product>
<product>libpng:0.95</product>
<product>libpng:0.96</product>
<product>libpng:0.97</product>
<product>libpng:0.98</product>
<product>libpng:0.99</product>
<product>libpng:0.99a</product>
<product>libpng:0.99b</product>
<product>libpng:0.99c</product>
<product>libpng:0.99d</product>
<product>libpng:0.99e</product>
<product>libpng:0.99f</product>
<product>libpng:0.99g</product>
<product>libpng:0.99h</product>
<product>libpng:1.00</product>
<product>libpng:1.0.0</product>
<product>libpng:1.0.0a</product>
<product>libpng:1.0.0b</product>
<product>libpng:1.0.1</product>
<product>libpng:1.0.1a</product>
<product>libpng:1.0.1b</product>
<product>libpng:1.0.1c</product>
<product>libpng:1.0.1d</product>
<product>libpng:1.0.1e</product>
<product>libpng:1.0.2</product>
<product>libpng:1.0.2a</product>
<product>libpng:1.0.3</product>
<product>libpng:1.0.3a</product>
<product>libpng:1.0.3b</product>
<product>libpng:1.0.3d</product>
<product>libpng:1.0.4</product>
<product>libpng:1.0.4a</product>
<product>libpng:1.0.4b</product>
<product>libpng:1.0.4c</product>
<product>libpng:1.0.4d</product>
<product>libpng:1.0.4e</product>
<product>libpng:1.0.4f</product>
<product>libpng:1.0.5</product>
<product>libpng:1.0.5a</product>
<product>libpng:1.0.5b</product>
<product>libpng:1.0.5c</product>
<product>libpng:1.0.5d</product>
<product>libpng:1.0.5e</product>
<product>libpng:1.0.5f</product>
<product>libpng:1.0.5g</product>
<product>libpng:1.0.5h</product>
<product>libpng:1.0.5i</product>
<product>libpng:1.0.5j</product>
<product>libpng:1.0.5k</product>
<product>libpng:1.0.5l</product>
<product>libpng:1.0.5m</product>
<product>libpng:1.0.5n</product>
<product>libpng:1.0.5o</product>
<product>libpng:1.0.5p</product>
<product>libpng:1.0.5q</product>
<product>libpng:1.0.5r</product>
<product>libpng:1.0.5s</product>
<product>libpng:1.0.5t</product>
<product>libpng:1.0.5u</product>
<product>libpng:1.0.5v</product>
<product>libpng:1.0.6</product>
<product>libpng:1.0.6d</product>
<product>libpng:1.0.6e</product>
<product>libpng:1.0.6f</product>
<product>libpng:1.0.6g</product>
<product>libpng:1.0.6h</product>
<product>libpng:1.0.6i</product>
<product>libpng:1.0.6j</product>
<product>libpng:1.0.7</product>
<product>libpng:1.0.8</product>
<product>libpng:1.0.9</product>
<product>libpng:1.0.10</product>
<product>libpng:1.0.11</product>
<product>libpng:1.0.12</product>
<product>libpng:1.0.13</product>
<product>libpng:1.0.14</product>
<product>libpng:1.0.15</product>
<product>libpng:1.0.16</product>
<product>libpng:1.0.17</product>
<product>libpng:1.0.18</product>
<product>libpng:1.0.19</product>
<product>libpng:1.0.20</product>
<product>libpng:1.0.21</product>
<product>libpng:1.0.22</product>
<product>libpng:1.0.23</product>
<product>libpng:1.0.24</product>
<product>libpng:1.0.25</product>
<product>libpng:1.0.26</product>
<product>libpng:1.0.27</product>
<product>libpng:1.0.28</product>
<product>libpng:1.0.29</product>
<product>libpng:1.0.30</product>
<product>libpng:1.0.31</product>
<product>libpng:1.0.32</product>
<product>libpng:1.0.33</product>
<product>libpng:1.0.34</product>
<product>libpng:1.0.35</product>
<product>libpng:1.0.37</product>
<product>libpng:1.0.38</product>
<product>libpng:1.0.39</product>
<product>libpng:1.0.40</product>
<product>libpng:1.0.41</product>
<product>libpng:1.0.42</product>
<product>libpng:1.0.43</product>
<product>libpng:1.0.44</product>
<product>libpng:1.0.45</product>
<product>libpng:1.0.46</product>
<product>libpng:1.0.47</product>
<product>libpng:1.0.48</product>
<product>libpng:1.0.50</product>
<product>libpng:1.0.51</product>
<product>libpng:1.0.52</product>
<product>libpng:1.0.53</product>
<product>libpng:1.0.54</product>
<product>libpng:1.0.55</product>
<product>libpng:1.0.56</product>
<product>libpng:1.0.57</product>
<product>libpng:1.0.58</product>
<product>libpng:1.0.59</product>
<product>libpng:1.0.60</product>
<product>libpng:1.0.61</product>
<product>libpng:1.0.62</product>
<product>libpng:1.0.63</product>
<product>libpng:1.0.64</product>
<product>libpng:1.0.65</product>
<product>libpng:1.0.66</product>
<product>libpng:1.2.0</product>
<product>libpng:1.2.1</product>
<product>libpng:1.2.3</product>
<product>libpng:1.2.4</product>
<product>libpng:1.2.6</product>
<product>libpng:1.2.8</product>
<product>libpng:1.2.10</product>
<product>libpng:1.2.12</product>
<product>libpng:1.2.13</product>
<product>libpng:1.2.14</product>
<product>libpng:1.2.16</product>
<product>libpng:1.2.18</product>
<product>libpng:1.2.20</product>
<product>libpng:1.2.21</product>
<product>libpng:1.2.22</product>
<product>libpng:1.2.24</product>
<product>libpng:1.2.25</product>
<product>libpng:1.2.26</product>
<product>libpng:1.2.27</product>
<product>libpng:1.2.29</product>
<product>libpng:1.2.32</product>
<product>libpng:1.2.33</product>
<product>libpng:1.2.35</product>
<product>libpng:1.2.37</product>
<product>libpng:1.2.38</product>
<product>libpng:1.2.39</product>
<product>libpng:1.2.41</product>
<product>libpng:1.2.42</product>
<product>libpng:1.2.44</product>
<product>libpng:1.2.45</product>
<product>libpng:1.2.46</product>
<product>libpng:1.2.47</product>
<product>libpng:1.2.50</product>
<product>libpng:1.2.51</product>
<product>libpng:1.2.52</product>
<product>libpng:1.2.53</product>
<product>libpng:1.2.54</product>
<product>libpng:1.2.55</product>
<product>libpng:1.2.56</product>
<product>libpng:1.4.0</product>
<product>libpng:1.4.1</product>
<product>libpng:1.4.2</product>
<product>libpng:1.4.3</product>
<product>libpng:1.4.4</product>
<product>libpng:1.4.5</product>
<product>libpng:1.4.6</product>
<product>libpng:1.4.7</product>
<product>libpng:1.4.8</product>
<product>libpng:1.4.9</product>
<product>libpng:1.4.10</product>
<product>libpng:1.4.11</product>
<product>libpng:1.4.12</product>
<product>libpng:1.4.13</product>
<product>libpng:1.4.14</product>
<product>libpng:1.4.15</product>
<product>libpng:1.4.16</product>
<product>libpng:1.4.17</product>
<product>libpng:1.4.18</product>
<product>libpng:1.4.19</product>
<product>libpng:1.5.0</product>
<product>libpng:1.5.1</product>
<product>libpng:1.5.2</product>
<product>libpng:1.5.3</product>
<product>libpng:1.5.4</product>
<product>libpng:1.5.5</product>
<product>libpng:1.5.6</product>
<product>libpng:1.5.7</product>
<product>libpng:1.5.8</product>
<product>libpng:1.5.9</product>
<product>libpng:1.5.10</product>
<product>libpng:1.5.11</product>
<product>libpng:1.5.12</product>
<product>libpng:1.5.13</product>
<product>libpng:1.5.14</product>
<product>libpng:1.5.15</product>
<product>libpng:1.5.16</product>
<product>libpng:1.5.17</product>
<product>libpng:1.5.18</product>
<product>libpng:1.5.19</product>
<product>libpng:1.5.20</product>
<product>libpng:1.5.21</product>
<product>libpng:1.5.22</product>
<product>libpng:1.5.23</product>
<product>libpng:1.5.24</product>
<product>libpng:1.5.25</product>
<product>libpng:1.5.26</product>
<product>libpng:1.5.27</product>
<product>libpng:1.6.0</product>
<product>libpng:1.6.1</product>
<product>libpng:1.6.2</product>
<product>libpng:1.6.3</product>
<product>libpng:1.6.4</product>
<product>libpng:1.6.5</product>
<product>libpng:1.6.6</product>
<product>libpng:1.6.7</product>
<product>libpng:1.6.8</product>
<product>libpng:1.6.9</product>
<product>libpng:1.6.10</product>
<product>libpng:1.6.11</product>
<product>libpng:1.6.12</product>
<product>libpng:1.6.13</product>
<product>libpng:1.6.14</product>
<product>libpng:1.6.15</product>
<product>libpng:1.6.16</product>
<product>libpng:1.6.17</product>
<product>libpng:1.6.18</product>
<product>libpng:1.6.19</product>
<product>libpng:1.6.20</product>
<product>libpng:1.6.21</product>
<product>libpng:1.6.22</product>
<product>libpng:1.6.23</product>
<product>libpng:1.6.24</product>
<product>libpng:1.6.25</product>
<product>libpng:1.6.26</product>
</cve>
<cve id="CVE-2016-10084" level="LOW">
<product>piwigo:2.8.3</product>
</cve>
<cve id="CVE-2016-10085" level="LOW">
<product>piwigo:2.8.3</product>
</cve>
<cve id="CVE-2016-10082" level="LOW">
<product>serendipity:2.0.5</product>
</cve>
<cve id="CVE-2016-10083" level="MEDIUM">
<product>piwigo:2.8.3</product>
</cve>
<cve id="CVE-2016-1436" level="LOW">
<product>asr_5000_software:17.2.0</product>
<product>asr_5000_software:17.2.0.59184</product>
<product>asr_5000_software:17.3.1</product>
<product>asr_5000_software:17.7.0</product>
<product>asr_5000_software:18.0.0</product>
<product>asr_5000_software:18.0.0.57828</product>
<product>asr_5000_software:18.0.0.59167</product>
<product>asr_5000_software:18.0.0.59211</product>
<product>asr_5000_software:18.0.l0.59219</product>
<product>asr_5000_software:18.1.0</product>
<product>asr_5000_software:18.1.0.59776</product>
<product>asr_5000_software:18.1.0.59780</product>
<product>asr_5000_software:18.1_base</product>
<product>asr_5000_software:18.4.0</product>
<product>asr_5000_software:19.0.1</product>
<product>asr_5000_software:19.0.m0.60737</product>
<product>asr_5000_software:19.0.m0.60828</product>
<product>asr_5000_software:19.0.m0.61045</product>
<product>asr_5000_software:19.1.0</product>
<product>asr_5000_software:19.1.0.61559</product>
<product>asr_5000_software:19.2.0</product>
<product>asr_5000_software:19.3.0</product>
</cve>
<cve id="CVE-2016-10081" level="MEDIUM">
<product>shutter:0.93.1</product>
</cve>
<cve id="CVE-2016-0259" level="LOW">
<product>websphere_mq:8.0.0.1</product>
<product>websphere_mq:8.0.0.2</product>
<product>websphere_mq:8.0.0.3</product>
<product>websphere_mq:8.0.0.4</product>
</cve>
<cve id="CVE-2016-9209" level="MEDIUM">
<product>firepower_services_for_adaptive_security_appliance:5.3.0</product>
<product>firepower_services_for_adaptive_security_appliance:5.4.0</product>
<product>firepower_services_for_adaptive_security_appliance:5.4.1</product>
<product>firepower_services_for_adaptive_security_appliance:5.4.1.1</product>
<product>firepower_services_for_adaptive_security_appliance:5.4.1.2</product>
<product>firepower_services_for_adaptive_security_appliance:5.4.1.3</product>
<product>firepower_services_for_adaptive_security_appliance:5.4.1.4</product>
<product>firepower_services_for_adaptive_security_appliance:5.4.1.5</product>
<product>firepower_services_for_adaptive_security_appliance:5.4.1.6</product>
<product>firepower_services_for_adaptive_security_appliance:5.4.1.7</product>
<product>firepower_services_for_adaptive_security_appliance:6.0.0</product>
<product>firepower_services_for_adaptive_security_appliance:6.0.1</product>
<product>firepower_services_for_adaptive_security_appliance:6.1.0</product>
</cve>
<cve id="CVE-2016-9208" level="LOW">
<product>emergency_responder:11.5%282.10000.5%29</product>
</cve>
<cve id="CVE-2016-1000152" level="MEDIUM">
<product>tidio-form:1.0</product>
</cve>
<cve id="CVE-2016-1000153" level="MEDIUM">
<product>tidio-gallery:1.1</product>
</cve>
<cve id="CVE-2016-1000150" level="MEDIUM">
<product>simplified-content:1.0.0</product>
</cve>
<cve id="CVE-2016-9204" level="LOW">
<product>nexus_1000v_intercloud_firmware:2.2%281%29</product>
</cve>
<cve id="CVE-2016-9203" level="LOW">
<product>asr_5000_series_software:20.0.2.3.65026</product>
</cve>
<cve id="CVE-2016-9202" level="MEDIUM">
<product>email_security_appliance:9.1.1-036</product>
<product>email_security_appliance:9.1.2-023</product>
<product>email_security_appliance:9.1.2-028</product>
<product>email_security_appliance:9.1.2-036</product>
<product>email_security_appliance:9.4.0</product>
<product>email_security_appliance:9.4.4-000</product>
<product>email_security_appliance:9.5.0-000</product>
<product>email_security_appliance:9.5.0-201</product>
<product>email_security_appliance:9.6.0-000</product>
<product>email_security_appliance:9.6.0-042</product>
<product>email_security_appliance:9.6.0-051</product>
<product>email_security_appliance:9.7.0-125</product>
<product>email_security_appliance:9.7.1-066</product>
<product>email_security_appliance:9.7.2-046</product>
<product>email_security_appliance:9.7.2-047</product>
<product>email_security_appliance:9.7.2-054</product>
</cve>
<cve id="CVE-2016-1000154" level="MEDIUM">
<product>whizz:1.0.7</product>
</cve>
<cve id="CVE-2016-9200" level="MEDIUM">
<product>prime_collaboration_assurance:10.5.1</product>
<product>prime_collaboration_assurance:10.6.0</product>
</cve>
<cve id="CVE-2016-2004" level="MEDIUM">
<product>data_protector:7.03</product>
<product>data_protector:8.14</product>
<product>data_protector:9.05</product>
</cve>
<cve id="CVE-2016-2005" level="LOW">
<product>data_protector:7.03</product>
<product>data_protector:8.14</product>
<product>data_protector:9.05</product>
</cve>
<cve id="CVE-2016-2006" level="LOW">
<product>data_protector:7.03</product>
<product>data_protector:8.14</product>
<product>data_protector:9.05</product>
</cve>
<cve id="CVE-2016-2007" level="LOW">
<product>data_protector:7.03</product>
<product>data_protector:8.14</product>
<product>data_protector:9.05</product>
</cve>
<cve id="CVE-2016-2000" level="LOW">
<product>asset_manager:9.40</product>
<product>asset_manager:9.41</product>
<product>asset_manager:9.50</product>
<product>asset_manager_cloudsystem_chargeback:9.40</product>
</cve>
<cve id="CVE-2016-2001" level="MEDIUM">
<product>universal_cmbd_foundation:10.0</product>
<product>universal_cmbd_foundation:10.01</product>
<product>universal_cmbd_foundation:10.10</product>
<product>universal_cmbd_foundation:10.11</product>
<product>universal_cmbd_foundation:10.20</product>
</cve>
<cve id="CVE-2016-2002" level="LOW">
<product>vertica:7.0.2.12</product>
<product>vertica:7.1.2</product>
<product>vertica:7.2.0</product>
<product>vertica:7.2.1</product>
</cve>
<cve id="CVE-2016-2003" level="LOW">
<product>p9000_command_view_advanced_edition_software:-</product>
<product>xp7_command_view_advanced_edition_suite:-</product>
</cve>
<cve id="CVE-2016-2008" level="LOW">
<product>data_protector:7.03</product>
<product>data_protector:8.14</product>
<product>data_protector:9.05</product>
</cve>
<cve id="CVE-2016-2009" level="LOW">
<product>network_node_manager_i:9.20</product>
<product>network_node_manager_i:9.23</product>
<product>network_node_manager_i:9.24</product>
<product>network_node_manager_i:9.25</product>
<product>network_node_manager_i:10.00</product>
<product>network_node_manager_i:10.01</product>
</cve>
<cve id="CVE-2016-6839" level="MEDIUM">
<product>fusionaccess:v100r005c10</product>
<product>fusionaccess:v100r005c20</product>
<product>fusionaccess:v100r005c30</product>
</cve>
<cve id="CVE-2016-6838" level="MEDIUM">
<product>ch121_v3_server_firmware:v100r001c00</product>
<product>ch140_v3_server_firmware:v100r001c00</product>
<product>ch220_v3_server_firmware:v100r001c00</product>
<product>ch222_v3_server_firmware:v100r001c00</product>
<product>ch226_v3_server_firmware:v100r001c00</product>
<product>rh1288_v3_server_firmware:v100r003c00</product>
<product>rh2288_v3_server_firmware:v100r003c00</product>
<product>x6800_v3_server_firmware:v100r003c00</product>
<product>xh620_v3_server_firmware:v100r003c00</product>
</cve>
<cve id="CVE-2016-6831" level="LOW">
<product>chicken:4.11.0</product>
</cve>
<cve id="CVE-2016-6830" level="LOW">
<product>chicken:4.11.0</product>
</cve>
<cve id="CVE-2016-6833" level="LOW">
<product>qemu:-</product>
</cve>
<cve id="CVE-2016-6832" level="MEDIUM">
<product>libav:11.3</product>
</cve>
<cve id="CVE-2016-6835" level="LOW">
<product>qemu:-</product>
</cve>
<cve id="CVE-2016-6834" level="LOW">
<product>qemu:-</product>
</cve>
<cve id="CVE-2016-6836" level="LOW">
<product>qemu:-</product>
</cve>
<cve id="CVE-2016-6169" level="MEDIUM">
<product>foxit_reader:7.3.4.311</product>
<product>phantompdf:7.3.4.311</product>
</cve>
<cve id="CVE-2016-6168" level="MEDIUM">
<product>foxit_reader:7.3.4.311</product>
<product>phantompdf:7.3.4.311</product>
</cve>
<cve id="CVE-2016-6163" level="MEDIUM">
<product>librsvg:2.40.2</product>
</cve>
<cve id="CVE-2016-6160" level="LOW">
<product>tcpreplay:4.1.1</product>
</cve>
<cve id="CVE-2016-7780" level="LOW">
<product>exponent_cms:2.3.9</product>
</cve>
<cve id="CVE-2016-7781" level="LOW">
<product>exponent_cms:2.3.9</product>
</cve>
<cve id="CVE-2016-7782" level="LOW">
<product>exponent_cms:2.3.9</product>
</cve>
<cve id="CVE-2016-7783" level="LOW">
<product>exponent_cms:2.3.9</product>
</cve>
<cve id="CVE-2016-7784" level="LOW">
<product>exponent_cms:2.3.9</product>
</cve>
<cve id="CVE-2016-7786" level="LOW">
<product>cyberoam_cr25ing_utm_firmware:10.6.2</product>
</cve>
<cve id="CVE-2016-7788" level="LOW">
<product>exponent_cms:2.3.9</product>
</cve>
<cve id="CVE-2016-7789" level="LOW">
<product>exponent_cms:2.3.9</product>
</cve>
<cve id="CVE-2016-4564" level="LOW">
<product>imagemagick:6.9.3-0</product>
<product>imagemagick:7.0.0-0</product>
<product>imagemagick:7.0.1-0</product>
<product>imagemagick:7.0.1-1</product>
</cve>
<cve id="CVE-2016-1080" level="LOW">
<product>acrobat:11.0.15</product>
<product>acrobat_dc:15.006.30121</product>
<product>acrobat_dc:15.010.20060</product>
<product>acrobat_reader_dc:15.006.30121</product>
<product>acrobat_reader_dc:15.010.20060</product>
<product>reader:11.0.15</product>
</cve>
<cve id="CVE-2016-1083" level="LOW">
<product>acrobat:11.0.15</product>
<product>acrobat_dc:15.006.30121</product>
<product>acrobat_dc:15.010.20060</product>
<product>acrobat_reader_dc:15.006.30121</product>
<product>acrobat_reader_dc:15.010.20060</product>
<product>reader:11.0.15</product>
</cve>
<cve id="CVE-2016-1082" level="LOW">
<product>acrobat:11.0.15</product>
<product>acrobat_dc:15.006.30121</product>
<product>acrobat_dc:15.010.20060</product>
<product>acrobat_reader_dc:15.006.30121</product>
<product>acrobat_reader_dc:15.010.20060</product>
<product>reader:11.0.15</product>
</cve>
<cve id="CVE-2016-0316" level="MEDIUM">
<product>jazz_reporting_service:6.0</product>
<product>jazz_reporting_service:6.0.1</product>
<product>jazz_reporting_service:6.0.2</product>
</cve>
<cve id="CVE-2016-0317" level="MEDIUM">
<product>jazz_reporting_service:6.0</product>
<product>jazz_reporting_service:6.0.1</product>
</cve>
<cve id="CVE-2016-0314" level="LOW">
<product>jazz_reporting_service:5.0</product>
<product>jazz_reporting_service:5.0.1</product>
<product>jazz_reporting_service:5.0.2</product>
<product>jazz_reporting_service:6.0</product>
<product>jazz_reporting_service:6.0.1</product>
</cve>
<cve id="CVE-2016-0315" level="LOW">
<product>jazz_reporting_service:5.0</product>
<product>jazz_reporting_service:5.0.1</product>
<product>jazz_reporting_service:5.0.2</product>
<product>jazz_reporting_service:6.0</product>
<product>jazz_reporting_service:6.0.1</product>
</cve>
<cve id="CVE-2016-0312" level="LOW">
<product>tririga_application_platform:3.3.1</product>
</cve>
<cve id="CVE-2016-0313" level="MEDIUM">
<product>jazz_reporting_service:5.0</product>
<product>jazz_reporting_service:5.0.1</product>
<product>jazz_reporting_service:5.0.2</product>
<product>jazz_reporting_service:6.0</product>
<product>jazz_reporting_service:6.0.1</product>
</cve>
<cve id="CVE-2016-0310" level="MEDIUM">
<product>connections:4.0.0.0</product>
<product>connections:4.5.0.0</product>
<product>connections:5.0.0.0</product>
<product>connections:5.5.0.0</product>
</cve>
<cve id="CVE-2016-0311" level="MEDIUM">
<product>tivoli_business_service_manager:6.1.0</product>
<product>tivoli_business_service_manager:6.1.1</product>
</cve>
<cve id="CVE-2016-0318" level="MEDIUM">
<product>jazz_reporting_service:6.0</product>
<product>jazz_reporting_service:6.0.1</product>
</cve>
<cve id="CVE-2016-0319" level="LOW">
<product>jazz_reporting_service:6.0</product>
<product>jazz_reporting_service:6.0.1</product>
</cve>
<cve id="CVE-2016-9430" level="MEDIUM">
<product>w3m:0.5.3-30</product>
</cve>
<cve id="CVE-2016-9431" level="MEDIUM">
<product>w3m:0.5.3-30</product>
</cve>
<cve id="CVE-2016-9432" level="MEDIUM">
<product>w3m:0.5.3-30</product>
</cve>
<cve id="CVE-2016-9433" level="MEDIUM">
<product>w3m:0.5.3-30</product>
</cve>
<cve id="CVE-2016-9434" level="MEDIUM">
<product>w3m:0.5.3-30</product>
</cve>
<cve id="CVE-2016-9435" level="MEDIUM">
<product>w3m:0.5.3%2bgit20160718</product>
<product>leap:42.1</product>
<product>leap:42.2</product>
</cve>
<cve id="CVE-2016-9436" level="MEDIUM">
<product>w3m:0.5.3%2bgit20160718</product>
<product>leap:42.1</product>
<product>leap:42.2</product>
</cve>
<cve id="CVE-2016-9437" level="MEDIUM">
<product>w3m:0.5.3-30</product>
</cve>
<cve id="CVE-2016-9438" level="MEDIUM">
<product>w3m:0.5.3-30</product>
</cve>
<cve id="CVE-2016-9439" level="MEDIUM">
<product>w3m:0.5.3-30</product>
</cve>
<cve id="CVE-2016-10271" level="MEDIUM">
<product>libtiff:4.0.7</product>
</cve>
<cve id="CVE-2016-10270" level="MEDIUM">
<product>libtiff:4.0.7</product>
</cve>
<cve id="CVE-2016-10273" level="LOW">
<product>air%3alink_3g_firmware:2.23m</product>
<product>air%3alink_5000ac_firmware:1.13</product>
<product>air%3alink_59300_firmware:1.04</product>
</cve>
<cve id="CVE-2016-10272" level="MEDIUM">
<product>libtiff:4.0.7</product>
</cve>
<cve id="CVE-2016-8341" level="LOW">
<product>integraxor:5.0.413.0</product>
</cve>
<cve id="CVE-2016-7242" level="HIGH">
<product>edge</product>
</cve>
<cve id="CVE-2016-8343" level="LOW">
<product>web_scada:-</product>
</cve>
<cve id="CVE-2016-5927" level="LOW">
<product>tivoli_storage_manager_for_space_management:6.3.0</product>
<product>tivoli_storage_manager_for_space_management:6.3.2</product>
<product>tivoli_storage_manager_for_space_management:6.4.0</product>
<product>tivoli_storage_manager_for_space_management:6.4.0.0</product>
<product>tivoli_storage_manager_for_space_management:6.4.1</product>
<product>tivoli_storage_manager_for_space_management:6.4.2</product>
<product>tivoli_storage_manager_for_space_management:6.4.3</product>
<product>tivoli_storage_manager_for_space_management:7.1.0</product>
<product>tivoli_storage_manager_for_space_management:7.1.1</product>
<product>tivoli_storage_manager_for_space_management:7.1.2</product>
<product>tivoli_storage_manager_for_space_management:7.1.3</product>
<product>tivoli_storage_manager_for_space_management:7.1.4</product>
</cve>
<cve id="CVE-2016-8347" level="LOW">
<product>webdatorcentral:-</product>
</cve>
<cve id="CVE-2016-8346" level="LOW">
<product>edr-810_firmware:3.12</product>
</cve>
<cve id="CVE-2016-8348" level="LOW">
<product>liebert_sitescan_web:6.5</product>
</cve>
<cve id="CVE-2016-9698" level="LOW">
<product>rational_rhapsody_design_manager:4.0</product>
<product>rational_rhapsody_design_manager:4.0.1</product>
<product>rational_rhapsody_design_manager:4.0.2</product>
<product>rational_rhapsody_design_manager:4.0.3</product>
<product>rational_rhapsody_design_manager:4.0.4</product>
<product>rational_rhapsody_design_manager:4.0.5</product>
<product>rational_rhapsody_design_manager:4.0.6</product>
<product>rational_rhapsody_design_manager:4.0.7</product>
<product>rational_rhapsody_design_manager:5.0</product>
<product>rational_rhapsody_design_manager:5.0.1</product>
<product>rational_rhapsody_design_manager:5.0.2</product>
<product>rational_rhapsody_design_manager:6.0</product>
<product>rational_rhapsody_design_manager:6.0.1</product>
<product>rational_rhapsody_design_manager:6.0.2</product>
</cve>
<cve id="CVE-2016-9694" level="MEDIUM">
<product>rational_rhapsody_design_manager:4.0</product>
<product>rational_rhapsody_design_manager:4.0.1</product>
<product>rational_rhapsody_design_manager:4.0.2</product>
<product>rational_rhapsody_design_manager:4.0.3</product>
<product>rational_rhapsody_design_manager:4.0.4</product>
<product>rational_rhapsody_design_manager:4.0.5</product>
<product>rational_rhapsody_design_manager:4.0.6</product>
<product>rational_rhapsody_design_manager:4.0.7</product>
<product>rational_rhapsody_design_manager:5.0</product>
<product>rational_rhapsody_design_manager:5.0.1</product>
<product>rational_rhapsody_design_manager:5.0.2</product>
<product>rational_rhapsody_design_manager:6.0</product>
<product>rational_rhapsody_design_manager:6.0.1</product>
<product>rational_rhapsody_design_manager:6.0.2</product>
</cve>
<cve id="CVE-2016-9696" level="MEDIUM">
<product>rational_rhapsody_design_manager:4.0</product>
<product>rational_rhapsody_design_manager:4.0.1</product>
<product>rational_rhapsody_design_manager:4.0.2</product>
<product>rational_rhapsody_design_manager:4.0.3</product>
<product>rational_rhapsody_design_manager:4.0.4</product>
<product>rational_rhapsody_design_manager:4.0.5</product>
<product>rational_rhapsody_design_manager:4.0.6</product>
<product>rational_rhapsody_design_manager:4.0.7</product>
<product>rational_rhapsody_design_manager:5.0</product>
<product>rational_rhapsody_design_manager:5.0.1</product>
<product>rational_rhapsody_design_manager:5.0.2</product>
<product>rational_rhapsody_design_manager:6.0</product>
<product>rational_rhapsody_design_manager:6.0.1</product>
<product>rational_rhapsody_design_manager:6.0.2</product>
</cve>
<cve id="CVE-2016-9697" level="HIGH">
<product>rational_rhapsody_design_manager:4.0</product>
<product>rational_rhapsody_design_manager:4.0.1</product>
<product>rational_rhapsody_design_manager:4.0.2</product>
<product>rational_rhapsody_design_manager:4.0.3</product>
<product>rational_rhapsody_design_manager:4.0.4</product>
<product>rational_rhapsody_design_manager:4.0.5</product>
<product>rational_rhapsody_design_manager:4.0.6</product>
<product>rational_rhapsody_design_manager:4.0.7</product>
<product>rational_rhapsody_design_manager:5.0</product>
<product>rational_rhapsody_design_manager:5.0.1</product>
<product>rational_rhapsody_design_manager:5.0.2</product>
<product>rational_rhapsody_design_manager:6.0</product>
<product>rational_rhapsody_design_manager:6.0.1</product>
<product>rational_rhapsody_design_manager:6.0.2</product>
</cve>
<cve id="CVE-2016-9691" level="LOW">
<product>websphere_cast_iron_solution:7.0.0</product>
<product>websphere_cast_iron_solution:7.0.0.1</product>
<product>websphere_cast_iron_solution:7.0.0.2</product>
<product>websphere_cast_iron_solution:7.5.0.0</product>
<product>websphere_cast_iron_solution:7.5.0.1</product>
<product>websphere_cast_iron_solution:7.5.1.0</product>
</cve>
<cve id="CVE-2016-9692" level="LOW">
<product>websphere_cast_iron_solution:7.0.0</product>
<product>websphere_cast_iron_solution:7.0.0.1</product>
<product>websphere_cast_iron_solution:7.0.0.2</product>
<product>websphere_cast_iron_solution:7.5.0.0</product>
<product>websphere_cast_iron_solution:7.5.0.1</product>
<product>websphere_cast_iron_solution:7.5.1.0</product>
</cve>
<cve id="CVE-2016-9693" level="MEDIUM">
<product>business_process_manager:7.5.0.0</product>
<product>business_process_manager:7.5.0.0</product>
<product>business_process_manager:7.5.0.0</product>
<product>business_process_manager:7.5.0.0</product>
<product>business_process_manager:7.5.0.1</product>
<product>business_process_manager:7.5.0.1</product>
<product>business_process_manager:7.5.0.1</product>
<product>business_process_manager:7.5.0.1</product>
<product>business_process_manager:7.5.1.0</product>
<product>business_process_manager:7.5.1.0</product>
<product>business_process_manager:7.5.1.0</product>
<product>business_process_manager:7.5.1.0</product>
<product>business_process_manager:7.5.1.1</product>
<product>business_process_manager:7.5.1.1</product>
<product>business_process_manager:7.5.1.1</product>
<product>business_process_manager:7.5.1.1</product>
<product>business_process_manager:7.5.1.2</product>
<product>business_process_manager:7.5.1.2</product>
<product>business_process_manager:7.5.1.2</product>
<product>business_process_manager:7.5.1.2</product>
<product>business_process_manager:8.0.0.0</product>
<product>business_process_manager:8.0.0.0</product>
<product>business_process_manager:8.0.0.0</product>
<product>business_process_manager:8.0.0.0</product>
<product>business_process_manager:8.0.1.0</product>
<product>business_process_manager:8.0.1.0</product>
<product>business_process_manager:8.0.1.0</product>
<product>business_process_manager:8.0.1.0</product>
<product>business_process_manager:8.0.1.1</product>
<product>business_process_manager:8.0.1.1</product>
<product>business_process_manager:8.0.1.1</product>
<product>business_process_manager:8.0.1.1</product>
<product>business_process_manager:8.0.1.2</product>
<product>business_process_manager:8.0.1.2</product>
<product>business_process_manager:8.0.1.2</product>
<product>business_process_manager:8.0.1.2</product>
<product>business_process_manager:8.0.1.3</product>
<product>business_process_manager:8.0.1.3</product>
<product>business_process_manager:8.0.1.3</product>
<product>business_process_manager:8.0.1.3</product>
<product>business_process_manager:8.5.0.0</product>
<product>business_process_manager:8.5.0.0</product>
<product>business_process_manager:8.5.0.0</product>
<product>business_process_manager:8.5.0.0</product>
<product>business_process_manager:8.5.0.1</product>
<product>business_process_manager:8.5.0.1</product>
<product>business_process_manager:8.5.0.1</product>
<product>business_process_manager:8.5.0.1</product>
<product>business_process_manager:8.5.0.2</product>
<product>business_process_manager:8.5.0.2</product>
<product>business_process_manager:8.5.0.2</product>
<product>business_process_manager:8.5.0.2</product>
<product>business_process_manager:8.5.5.0</product>
<product>business_process_manager:8.5.5.0</product>
<product>business_process_manager:8.5.5.0</product>
<product>business_process_manager:8.5.5.0</product>
<product>business_process_manager:8.5.6.0</product>
<product>business_process_manager:8.5.6.0</product>
<product>business_process_manager:8.5.6.0</product>
<product>business_process_manager:8.5.6.0</product>
<product>business_process_manager:8.5.6.2</product>
<product>business_process_manager:8.5.6.2</product>
<product>business_process_manager:8.5.6.2</product>
<product>business_process_manager:8.5.6.2</product>
<product>business_process_manager:8.5.7.0</product>
<product>business_process_manager:8.5.7.0</product>
<product>business_process_manager:8.5.7.0</product>
<product>business_process_manager:8.5.7.0</product>
<product>websphere:7.2</product>
<product>websphere:7.2.0.1</product>
<product>websphere:7.2.0.2</product>
<product>websphere:7.2.0.3</product>
<product>websphere:7.2.0.4</product>
<product>websphere:7.2.0.5</product>
</cve>
<cve id="CVE-2016-10411" level="LOW">
<product>sd_205_firmware:-</product>
<product>sd_210_firmware:-</product>
<product>sd_212_firmware:-</product>
<product>sd_400_firmware:-</product>
<product>sd_410_firmware:-</product>
<product>sd_412_firmware:-</product>
<product>sd_415_firmware:-</product>
<product>sd_430_firmware:-</product>
<product>sd_450_firmware:-</product>
<product>sd_615_firmware:-</product>
<product>sd_616_firmware:-</product>
<product>sd_617_firmware:-</product>
<product>sd_625_firmware:-</product>
<product>sd_650_firmware:-</product>
<product>sd_652_firmware:-</product>
<product>sd_800_firmware:-</product>
<product>sd_808_firmware:-</product>
<product>sd_810_firmware:-</product>
<product>sd_820_firmware:-</product>
<product>sd_835_firmware:-</product>
</cve>
<cve id="CVE-2016-10410" level="LOW">
<product>mdm9206_firmware:-</product>
<product>mdm9607_firmware:-</product>
<product>mdm9615_firmware:-</product>
<product>mdm9625_firmware:-</product>
<product>mdm9635m_firmware:-</product>
<product>mdm9640_firmware:-</product>
<product>mdm9645_firmware:-</product>
<product>mdm9650_firmware:-</product>
<product>mdm9655_firmware:-</product>
<product>msm8909w_firmware:-</product>
<product>sd_205_firmware:-</product>
<product>sd_210_firmware:-</product>
<product>sd_212_firmware:-</product>
<product>sd_400_firmware:-</product>
<product>sd_410_firmware:-</product>
<product>sd_412_firmware:-</product>
<product>sd_415_firmware:-</product>
<product>sd_425_firmware:-</product>
<product>sd_430_firmware:-</product>
<product>sd_450_firmware:-</product>
<product>sd_615_firmware:-</product>
<product>sd_616_firmware:-</product>
<product>sd_617_firmware:-</product>
<product>sd_625_firmware:-</product>
<product>sd_650_firmware:-</product>
<product>sd_652_firmware:-</product>
<product>sd_800_firmware:-</product>
<product>sd_808_firmware:-</product>
<product>sd_810_firmware:-</product>
<product>sd_820_firmware:-</product>
<product>sd_835_firmware:-</product>
<product>sd_845_firmware:-</product>
<product>sd_850_firmware:-</product>
<product>sdx20_firmware:-</product>
</cve>
<cve id="CVE-2016-10412" level="LOW">
<product>fsm9055_firmware:-</product>
<product>mdm9206_firmware:-</product>
<product>mdm9607_firmware:-</product>
<product>mdm9615_firmware:-</product>
<product>mdm9635m_firmware:-</product>
<product>mdm9640_firmware:-</product>
<product>mdm9650_firmware:-</product>
<product>msm8909w_firmware:-</product>
<product>sd_205_firmware:-</product>
<product>sd_210_firmware:-</product>
<product>sd_212_firmware:-</product>
<product>sd_400_firmware:-</product>
<product>sd_410_firmware:-</product>
<product>sd_412_firmware:-</product>
<product>sd_415_firmware:-</product>
<product>sd_425_firmware:-</product>
<product>sd_430_firmware:-</product>
<product>sd_450_firmware:-</product>
<product>sd_600_firmware:-</product>
<product>sd_615_firmware:-</product>
<product>sd_616_firmware:-</product>
<product>sd_617_firmware:-</product>
<product>sd_625_firmware:-</product>
<product>sd_650_firmware:-</product>
<product>sd_652_firmware:-</product>
<product>sd_800_firmware:-</product>
<product>sd_808_firmware:-</product>
<product>sd_810_firmware:-</product>
<product>sd_820_firmware:-</product>
<product>sd_835_firmware:-</product>
<product>sdx20_firmware:-</product>
</cve>
<cve id="CVE-2016-10415" level="LOW">
<product>mdm9206_firmware:-</product>
<product>mdm9607_firmware:-</product>
<product>mdm9640_firmware:-</product>
<product>mdm9650_firmware:-</product>
<product>msm8909w_firmware:-</product>
<product>sd_205_firmware:-</product>
<product>sd_210_firmware:-</product>
<product>sd_212_firmware:-</product>
<product>sd_400_firmware:-</product>
<product>sd_410_firmware:-</product>
<product>sd_412_firmware:-</product>
<product>sd_415_firmware:-</product>
<product>sd_425_firmware:-</product>
<product>sd_430_firmware:-</product>
<product>sd_450_firmware:-</product>
<product>sd_600_firmware:-</product>
<product>sd_615_firmware:-</product>
<product>sd_616_firmware:-</product>
<product>sd_617_firmware:-</product>
<product>sd_625_firmware:-</product>
<product>sd_650_firmware:-</product>
<product>sd_652_firmware:-</product>
<product>sd_800_firmware:-</product>
<product>sd_808_firmware:-</product>
<product>sd_810_firmware:-</product>
<product>sd_820_firmware:-</product>
<product>sd_835_firmware:-</product>
<product>sdx20_firmware:-</product>
</cve>
<cve id="CVE-2016-10414" level="LOW">
<product>mdm9206_firmware:-</product>
<product>mdm9607_firmware:-</product>
<product>mdm9625_firmware:-</product>
<product>mdm9635m_firmware:-</product>
<product>mdm9640_firmware:-</product>
<product>mdm9645_firmware:-</product>
<product>mdm9650_firmware:-</product>
<product>mdm9655_firmware:-</product>
<product>msm8909w_firmware:-</product>
<product>sd_205_firmware:-</product>
<product>sd_210_firmware:-</product>
<product>sd_212_firmware:-</product>
<product>sd_400_firmware:-</product>
<product>sd_410_firmware:-</product>
<product>sd_412_firmware:-</product>
<product>sd_415_firmware:-</product>
<product>sd_425_firmware:-</product>
<product>sd_430_firmware:-</product>
<product>sd_450_firmware:-</product>
<product>sd_615_firmware:-</product>
<product>sd_616_firmware:-</product>
<product>sd_617_firmware:-</product>
<product>sd_625_firmware:-</product>
<product>sd_650_firmware:-</product>
<product>sd_652_firmware:-</product>
<product>sd_800_firmware:-</product>
<product>sd_808_firmware:-</product>
<product>sd_810_firmware:-</product>
<product>sd_820_firmware:-</product>
<product>sd_820a_firmware:-</product>
<product>sd_835_firmware:-</product>
<product>sd_845_firmware:-</product>
<product>sd_850_firmware:-</product>
<product>sdx20_firmware:-</product>
</cve>
<cve id="CVE-2016-10417" level="MEDIUM">
<product>ipq4019_firmware:-</product>
<product>mdm9206_firmware:-</product>
<product>mdm9607_firmware:-</product>
<product>mdm9625_firmware:-</product>
<product>mdm9635m_firmware:-</product>
<product>mdm9640_firmware:-</product>
<product>mdm9645_firmware:-</product>
<product>mdm9650_firmware:-</product>
<product>mdm9655_firmware:-</product>
<product>msm8909w_firmware:-</product>
<product>sd_205_firmware:-</product>
<product>sd_210_firmware:-</product>
<product>sd_212_firmware:-</product>
<product>sd_400_firmware:-</product>
<product>sd_410_firmware:-</product>
<product>sd_412_firmware:-</product>
<product>sd_415_firmware:-</product>
<product>sd_425_firmware:-</product>
<product>sd_430_firmware:-</product>
<product>sd_450_firmware:-</product>
<product>sd_615_firmware:-</product>
<product>sd_616_firmware:-</product>
<product>sd_617_firmware:-</product>
<product>sd_625_firmware:-</product>
<product>sd_650_firmware:-</product>
<product>sd_652_firmware:-</product>
<product>sd_800_firmware:-</product>
<product>sd_808_firmware:-</product>
<product>sd_810_firmware:-</product>
<product>sd_820_firmware:-</product>
<product>sd_820a_firmware:-</product>
<product>sdx20_firmware:-</product>
</cve>
<cve id="CVE-2016-10416" level="LOW">
<product>mdm9206_firmware:-</product>
<product>mdm9607_firmware:-</product>
<product>mdm9615_firmware:-</product>
<product>mdm9625_firmware:-</product>
<product>mdm9635m_firmware:-</product>
<product>mdm9640_firmware:-</product>
<product>mdm9645_firmware:-</product>
<product>msm8909w_firmware:-</product>
<product>sd_205_firmware:-</product>
<product>sd_210_firmware:-</product>
<product>sd_212_firmware:-</product>
<product>sd_400_firmware:-</product>
<product>sd_410_firmware:-</product>
<product>sd_412_firmware:-</product>
<product>sd_415_firmware:-</product>
<product>sd_425_firmware:-</product>
<product>sd_430_firmware:-</product>
<product>sd_450_firmware:-</product>
<product>sd_600_firmware:-</product>
<product>sd_615_firmware:-</product>
<product>sd_616_firmware:-</product>
<product>sd_617_firmware:-</product>
<product>sd_625_firmware:-</product>
<product>sd_650_firmware:-</product>
<product>sd_652_firmware:-</product>
<product>sd_800_firmware:-</product>
<product>sd_808_firmware:-</product>
<product>sd_810_firmware:-</product>
<product>sd_820_firmware:-</product>
</cve>
<cve id="CVE-2016-10419" level="LOW">
<product>mdm9640_firmware:-</product>
<product>mdm9645_firmware:-</product>
<product>mdm9650_firmware:-</product>
<product>mdm9655_firmware:-</product>
<product>sd_450_firmware:-</product>
<product>sd_625_firmware:-</product>
<product>sd_650_firmware:-</product>
<product>sd_652_firmware:-</product>
<product>sd_820_firmware:-</product>
<product>sd_835_firmware:-</product>
<product>sd_845_firmware:-</product>
<product>sd_850_firmware:-</product>
<product>sdx20_firmware:-</product>
</cve>
<cve id="CVE-2016-10418" level="LOW">
<product>mdm9206_firmware:-</product>
<product>mdm9650_firmware:-</product>
<product>sd_205_firmware:-</product>
<product>sd_210_firmware:-</product>
<product>sd_212_firmware:-</product>
<product>sd_425_firmware:-</product>
<product>sd_430_firmware:-</product>
<product>sd_450_firmware:-</product>
<product>sd_625_firmware:-</product>
<product>sd_650_firmware:-</product>
<product>sd_652_firmware:-</product>
<product>sd_820_firmware:-</product>
<product>sd_820a_firmware:-</product>
<product>sd_835_firmware:-</product>
</cve>
<cve id="CVE-2016-4521" level="LOW">
<product>bt-5_series_cellular_router_firmware:3.8.20</product>
<product>bt-5_series_cellular_router_firmware:3.9.7</product>
<product>bt-6_series_cellular_router_firmware:3.8.20</product>
<product>bt-6_series_cellular_router_firmware:3.9.7</product>
</cve>
<cve id="CVE-2016-4520" level="LOW">
<product>pelco_digital_sentry_video_management_system_firmware:7.6.32.9203</product>
</cve>
<cve id="CVE-2016-4523" level="LOW">
<product>vtscada:8.0.05</product>
<product>vtscada:8.0.12</product>
<product>vtscada:8.0.16</product>
<product>vtscada:8.0.18</product>
<product>vtscada:8.1.05</product>
<product>vtscada:8.1.06</product>
<product>vtscada:9.0.02</product>
<product>vtscada:9.0.03</product>
<product>vtscada:9.0.08</product>
<product>vtscada:9.1.02</product>
<product>vtscada:9.1.03</product>
<product>vtscada:9.1.05</product>
<product>vtscada:9.1.09</product>
<product>vtscada:9.1.11</product>
<product>vtscada:9.1.14</product>
<product>vtscada:9.1.20</product>
<product>vtscada:10.0.11</product>
<product>vtscada:10.0.13</product>
<product>vtscada:10.0.14</product>
<product>vtscada:10.0.16</product>
<product>vtscada:10.0.17</product>
<product>vtscada:10.1.05</product>
<product>vtscada:10.1.06</product>
<product>vtscada:10.1.07</product>
<product>vtscada:10.1.12</product>
<product>vtscada:10.2.05</product>
<product>vtscada:10.2.07</product>
<product>vtscada:10.2.08</product>
<product>vtscada:10.2.11</product>
<product>vtscada:10.2.13</product>
<product>vtscada:10.2.14</product>
<product>vtscada:10.2.15</product>
<product>vtscada:10.2.17</product>
<product>vtscada:10.2.19</product>
<product>vtscada:10.2.20</product>
<product>vtscada:10.2.21</product>
<product>vtscada:10.2.22</product>
<product>vtscada:11.0.05</product>
<product>vtscada:11.0.07</product>
<product>vtscada:11.1.05</product>
<product>vtscada:11.1.06</product>
<product>vtscada:11.1.09</product>
<product>vtscada:11.1.10</product>
<product>vtscada:11.1.13</product>
<product>vtscada:11.1.14</product>
<product>vtscada:11.1.15</product>
<product>vtscada:11.1.16</product>
<product>vtscada:11.1.17</product>
<product>vtscada:11.1.18</product>
<product>vtscada:11.1.19</product>
<product>vtscada:11.1.20</product>
<product>vtscada:11.1.21</product>
<product>vtscada:11.1.22</product>
<product>vtscada:11.1.24</product>
</cve>
<cve id="CVE-2016-4522" level="LOW">
<product>factorytalk_energrymetrix:2.10.00</product>
</cve>
<cve id="CVE-2016-4525" level="MEDIUM">
<product>webaccess:8.1</product>
</cve>
<cve id="CVE-2016-4524" level="LOW">
<product>pcm600:2.6</product>
</cve>
<cve id="CVE-2016-4527" level="MEDIUM">
<product>pcm600:2.6</product>
</cve>
<cve id="CVE-2016-4526" level="MEDIUM">
<product>tracer_sc:4.2.1134</product>
</cve>
<cve id="CVE-2016-4529" level="LOW">
<product>somachine_hvac_firmware:2.0.2</product>
</cve>
<cve id="CVE-2016-4528" level="MEDIUM">
<product>webaccess:8.1</product>
</cve>
<cve id="CVE-2016-4021" level="LOW">
<product>pgpdump:0.29</product>
<product>fedora:22</product>
<product>fedora:23</product>
<product>fedora:24</product>
</cve>
<cve id="CVE-2016-6405" level="LOW">
<product>fog_director:1.0%280%29</product>
</cve>
<cve id="CVE-2016-1127" level="LOW">
<product>acrobat:11.0.15</product>
<product>acrobat_dc:15.006.30121</product>
<product>acrobat_dc:15.010.20060</product>
<product>acrobat_reader_dc:15.006.30121</product>
<product>acrobat_reader_dc:15.010.20060</product>
<product>reader:11.0.15</product>
</cve>
<cve id="CVE-2016-4025" level="LOW">
<product>business_security:11.1.2241</product>
<product>business_security:11.1.2245</product>
<product>business_security:11.1.2253</product>
<product>business_security:11.1.2260</product>
<product>business_security:11.1.2261</product>
<product>business_security:11.1.2262</product>
<product>email_server_security:8.0.1606</product>
<product>email_server_security:8.0.1609</product>
<product>endpoint_protection:8.0.1606</product>
<product>endpoint_protection:8.0.1609</product>
<product>endpoint_protection_plus:8.0.1606</product>
<product>endpoint_protection_plus:8.0.1609</product>
<product>endpoint_protection_suite:8.0.1606</product>
<product>endpoint_protection_suite:8.0.1609</product>
<product>endpoint_protection_suite_plus:8.0.1606</product>
<product>endpoint_protection_suite_plus:8.0.1609</product>
<product>file_server_security:8.0.1606</product>
<product>file_server_security:8.0.1609</product>
<product>free_antivirus:11.1.2241</product>
<product>free_antivirus:11.1.2245</product>
<product>free_antivirus:11.1.2253</product>
<product>free_antivirus:11.1.2260</product>
<product>free_antivirus:11.1.2261</product>
<product>free_antivirus:11.1.2262</product>
<product>internet_security:11.1.2241</product>
<product>internet_security:11.1.2245</product>
<product>internet_security:11.1.2253</product>
<product>internet_security:11.1.2260</product>
<product>internet_security:11.1.2261</product>
<product>internet_security:11.1.2262</product>
<product>premier:11.1.2241</product>
<product>premier:11.1.2245</product>
<product>premier:11.1.2253</product>
<product>premier:11.1.2260</product>
<product>premier:11.1.2261</product>
<product>premier:11.1.2262</product>
<product>pro_antivirus:11.1.2241</product>
<product>pro_antivirus:11.1.2245</product>
<product>pro_antivirus:11.1.2253</product>
<product>pro_antivirus:11.1.2260</product>
<product>pro_antivirus:11.1.2261</product>
<product>pro_antivirus:11.1.2262</product>
</cve>
<cve id="CVE-2016-6318" level="LOW">
<product>cracklib:-</product>
<product>leap:42.1</product>
</cve>
<cve id="CVE-2016-6319" level="MEDIUM">
<product>foreman:1.12.1</product>
</cve>
<cve id="CVE-2016-6317" level="LOW">
<product>ruby_on_rails:4.2.0</product>
<product>ruby_on_rails:4.2.0</product>
<product>ruby_on_rails:4.2.0</product>
<product>ruby_on_rails:4.2.0</product>
<product>ruby_on_rails:4.2.0</product>
<product>ruby_on_rails:4.2.0</product>
<product>ruby_on_rails:4.2.0</product>
<product>ruby_on_rails:4.2.0</product>
<product>ruby_on_rails:4.2.1</product>
<product>ruby_on_rails:4.2.1</product>
<product>ruby_on_rails:4.2.1</product>
<product>ruby_on_rails:4.2.1</product>
<product>ruby_on_rails:4.2.1</product>
<product>ruby_on_rails:4.2.2</product>
<product>ruby_on_rails:4.2.3</product>
<product>ruby_on_rails:4.2.3</product>
<product>ruby_on_rails:4.2.4</product>
<product>ruby_on_rails:4.2.4</product>
<product>ruby_on_rails:4.2.5</product>
<product>ruby_on_rails:4.2.5</product>
<product>ruby_on_rails:4.2.5</product>
<product>ruby_on_rails:4.2.5.1</product>
<product>ruby_on_rails:4.2.5.2</product>
<product>ruby_on_rails:4.2.6</product>
<product>ruby_on_rails:4.2.6</product>
<product>ruby_on_rails:4.2.7</product>
<product>ruby_on_rails:4.2.7</product>
</cve>
<cve id="CVE-2016-6310" level="LOW">
<product>enterprise_virtualization:3.6</product>
</cve>
<cve id="CVE-2016-6311" level="LOW">
<product>jboss_enterprise_application_platform:7.0</product>
</cve>
<cve id="CVE-2016-10644" level="MEDIUM">
<product>slimerjs-edge:-</product>
</cve>
<cve id="CVE-2016-10645" level="MEDIUM">
<product>grunt-images:-</product>
</cve>
<cve id="CVE-2016-10646" level="MEDIUM">
<product>resourcehacker:-</product>
</cve>
<cve id="CVE-2016-10647" level="MEDIUM">
<product>node-air-sdk:-</product>
</cve>
<cve id="CVE-2016-10640" level="MEDIUM">
<product>node-thulac:-</product>
</cve>
<cve id="CVE-2016-10641" level="MEDIUM">
<product>node-bsdiff-android:0.1.5</product>
</cve>
<cve id="CVE-2016-10642" level="MEDIUM">
<product>cmake:-</product>
</cve>
<cve id="CVE-2016-10643" level="MEDIUM">
<product>jstestdriver:-</product>
</cve>
<cve id="CVE-2016-10648" level="MEDIUM">
<product>marionette-socket-host:-</product>
</cve>
<cve id="CVE-2016-10649" level="MEDIUM">
<product>frames-compiler:-</product>
</cve>
<cve id="CVE-2016-8946" level="MEDIUM">
<product>emptoris_sourcing:9.5</product>
<product>emptoris_sourcing:10.0.0</product>
<product>emptoris_sourcing:10.0.1</product>
<product>emptoris_sourcing:10.0.2</product>
<product>emptoris_sourcing:10.0.4</product>
<product>emptoris_sourcing:10.1.0</product>
<product>emptoris_sourcing:10.1.1</product>
</cve>
<cve id="CVE-2016-8649" level="LOW">
<product>lxc:1.0.8</product>
<product>lxc:2.0.0</product>
<product>lxc:2.0.0</product>
<product>lxc:2.0.0</product>
<product>lxc:2.0.0</product>
<product>lxc:2.0.0</product>
<product>lxc:2.0.0</product>
<product>lxc:2.0.0</product>
<product>lxc:2.0.0</product>
<product>lxc:2.0.0</product>
<product>lxc:2.0.0</product>
<product>lxc:2.0.0</product>
<product>lxc:2.0.0</product>
<product>lxc:2.0.0</product>
<product>lxc:2.0.0</product>
<product>lxc:2.0.0</product>
<product>lxc:2.0.1</product>
<product>lxc:2.0.2</product>
<product>lxc:2.0.3</product>
<product>lxc:2.0.4</product>
<product>lxc:2.0.5</product>
</cve>
<cve id="CVE-2016-8644" level="LOW">
<product>moodle:2.7.16</product>
<product>moodle:2.8</product>
<product>moodle:2.8.1</product>
<product>moodle:2.8.2</product>
<product>moodle:2.8.3</product>
<product>moodle:2.8.4</product>
<product>moodle:2.8.5</product>
<product>moodle:2.8.6</product>
<product>moodle:2.8.7</product>
<product>moodle:2.8.8</product>
<product>moodle:2.8.9</product>
<product>moodle:2.8.10</product>
<product>moodle:2.8.11</product>
<product>moodle:2.8.12</product>
<product>moodle:2.9</product>
<product>moodle:2.9.1</product>
<product>moodle:2.9.2</product>
<product>moodle:2.9.3</product>
<product>moodle:2.9.4</product>
<product>moodle:2.9.5</product>
<product>moodle:2.9.6</product>
<product>moodle:2.9.7</product>
<product>moodle:2.9.8</product>
<product>moodle:3.0</product>
<product>moodle:3.0.1</product>
<product>moodle:3.0.2</product>
<product>moodle:3.0.3</product>
<product>moodle:3.0.4</product>
<product>moodle:3.0.5</product>
<product>moodle:3.0.6</product>
<product>moodle:3.1.0</product>
<product>moodle:3.1.1</product>
<product>moodle:3.1.2</product>
</cve>
<cve id="CVE-2016-8647" level="LOW">
<product>virtualization:4.1</product>
</cve>
<cve id="CVE-2016-8642" level="LOW">
<product>moodle:2.7.16</product>
<product>moodle:2.8</product>
<product>moodle:2.8.1</product>
<product>moodle:2.8.2</product>
<product>moodle:2.8.3</product>
<product>moodle:2.8.4</product>
<product>moodle:2.8.5</product>
<product>moodle:2.8.6</product>
<product>moodle:2.8.7</product>
<product>moodle:2.8.8</product>
<product>moodle:2.8.9</product>
<product>moodle:2.8.10</product>
<product>moodle:2.8.11</product>
<product>moodle:2.8.12</product>
<product>moodle:2.9</product>
<product>moodle:2.9.1</product>
<product>moodle:2.9.2</product>
<product>moodle:2.9.3</product>
<product>moodle:2.9.4</product>
<product>moodle:2.9.5</product>
<product>moodle:2.9.6</product>
<product>moodle:2.9.7</product>
<product>moodle:2.9.8</product>
<product>moodle:3.0</product>
<product>moodle:3.0.1</product>
<product>moodle:3.0.2</product>
<product>moodle:3.0.3</product>
<product>moodle:3.0.4</product>
<product>moodle:3.0.5</product>
<product>moodle:3.0.6</product>
<product>moodle:3.1.0</product>
<product>moodle:3.1.1</product>
<product>moodle:3.1.2</product>
</cve>
<cve id="CVE-2016-8643" level="LOW">
<product>moodle:2.7.16</product>
<product>moodle:2.8</product>
<product>moodle:2.8.1</product>
<product>moodle:2.8.2</product>
<product>moodle:2.8.3</product>
<product>moodle:2.8.4</product>
<product>moodle:2.8.5</product>
<product>moodle:2.8.6</product>
<product>moodle:2.8.7</product>
<product>moodle:2.8.8</product>
<product>moodle:2.8.9</product>
<product>moodle:2.8.10</product>
<product>moodle:2.8.11</product>
<product>moodle:2.8.12</product>
<product>moodle:2.9</product>
<product>moodle:2.9.1</product>
<product>moodle:2.9.2</product>
<product>moodle:2.9.3</product>
<product>moodle:2.9.4</product>
<product>moodle:2.9.5</product>
<product>moodle:2.9.6</product>
<product>moodle:2.9.7</product>
<product>moodle:2.9.8</product>
<product>moodle:3.0</product>
<product>moodle:3.0.1</product>
<product>moodle:3.0.2</product>
<product>moodle:3.0.3</product>
<product>moodle:3.0.4</product>
<product>moodle:3.0.5</product>
<product>moodle:3.0.6</product>
<product>moodle:3.1.0</product>
<product>moodle:3.1.1</product>
<product>moodle:3.1.2</product>
</cve>
<cve id="CVE-2016-0411" level="LOW">
<product>enterprise_manager_grid_control:11.1.0.1</product>
<product>enterprise_manager_grid_control:11.2.0.4</product>
</cve>
<cve id="CVE-2016-0413" level="LOW">
<product>fusion_middleware:11.1.1.7</product>
</cve>
<cve id="CVE-2016-0412" level="MEDIUM">
<product>peoplesoft_supply_chain_management_eprocurement:9.1</product>
<product>peoplesoft_supply_chain_management_eprocurement:9.2</product>
</cve>
<cve id="CVE-2016-0415" level="MEDIUM">
<product>enterprise_manager_grid_control:11.1.0.1</product>
<product>enterprise_manager_grid_control:12.1.0.4</product>
<product>enterprise_manager_grid_control:12.1.0.5</product>
</cve>
<cve id="CVE-2016-4318" level="MEDIUM">
<product>jira:7.1.8</product>
</cve>
<cve id="CVE-2016-4319" level="MEDIUM">
<product>jira:7.1.8</product>
</cve>
<cve id="CVE-2016-5686" level="MEDIUM">
<product>onetouch_ping_firmware:-</product>
</cve>
<cve id="CVE-2016-4312" level="MEDIUM">
<product>identity_server:5.1.0</product>
</cve>
<cve id="CVE-2016-4313" level="MEDIUM">
<product>extplorer:2.1.9</product>
</cve>
<cve id="CVE-2016-1230" level="MEDIUM">
<product>webarena_service_formmail:2.2.0</product>
</cve>
<cve id="CVE-2016-4311" level="MEDIUM">
<product>identity_server:5.1.0</product>
</cve>
<cve id="CVE-2016-4316" level="MEDIUM">
<product>carbon:4.4.5</product>
</cve>
<cve id="CVE-2016-4317" level="MEDIUM">
<product>confluence:5.9.10</product>
</cve>
<cve id="CVE-2016-1234" level="LOW">
<product>glibc:2.2.3</product>
<product>fedora:23</product>
<product>opensuse:13.2</product>
</cve>
<cve id="CVE-2016-4315" level="MEDIUM">
<product>carbon:4.4.5</product>
</cve>
<cve id="CVE-2016-3509" level="MEDIUM">
<product>agile_product_lifecycle_management_framework:9.3.4</product>
<product>agile_product_lifecycle_management_framework:9.3.5</product>
</cve>
<cve id="CVE-2016-3506" level="MEDIUM">
<product>jdbc:11.2.0.4</product>
<product>jdbc:12.1.0.1</product>
<product>jdbc:12.1.0.2</product>
</cve>
<cve id="CVE-2016-3507" level="MEDIUM">
<product>agile_product_lifecycle_management_framework:9.3.4</product>
<product>agile_product_lifecycle_management_framework:9.3.5</product>
</cve>
<cve id="CVE-2016-3504" level="LOW">
<product>jdeveloper:11.1.1.7.0</product>
<product>jdeveloper:11.1.1.9.0</product>
<product>jdeveloper:11.1.2.4.0</product>
<product>jdeveloper:12.1.3.0.0</product>
<product>jdeveloper:12.2.1.0.0</product>
</cve>
<cve id="CVE-2016-3502" level="MEDIUM">
<product>webcenter_sites:11.1.1.8</product>
<product>webcenter_sites:12.2.1.0</product>
</cve>
<cve id="CVE-2016-3503" level="MEDIUM">
<product>jdk:1.6.0</product>
<product>jdk:1.7.0</product>
<product>jdk:1.8.0</product>
<product>jre:1.6.0</product>
<product>jre:1.7.0</product>
<product>jre:1.8.0</product>
</cve>
<cve id="CVE-2016-5680" level="LOW">
<product>readynas_surveillance:1.1.2</product>
<product>nvrmini_2:1.7.6</product>
<product>nvrmini_2:2.0.0</product>
<product>nvrmini_2:2.2.1</product>
<product>nvrmini_2:3.0.0</product>
</cve>
<cve id="CVE-2016-7195" level="HIGH">
<product>edge</product>
<product>internet_explorer:9</product>
<product>internet_explorer:10</product>
<product>internet_explorer:11</product>
</cve>
<cve id="CVE-2016-7194" level="HIGH">
<product>edge</product>
</cve>
<cve id="CVE-2016-7196" level="HIGH">
<product>edge</product>
<product>internet_explorer:10</product>
<product>internet_explorer:11</product>
</cve>
<cve id="CVE-2016-7191" level="MEDIUM">
<product>azure_active_directory_passport:1.0.0</product>
<product>azure_active_directory_passport:1.1.0</product>
<product>azure_active_directory_passport:1.1.1</product>
<product>azure_active_directory_passport:1.2.0</product>
<product>azure_active_directory_passport:1.3.0</product>
<product>azure_active_directory_passport:1.3.1</product>
<product>azure_active_directory_passport:1.3.2</product>
<product>azure_active_directory_passport:1.3.3</product>
<product>azure_active_directory_passport:1.3.4</product>
<product>azure_active_directory_passport:1.3.5</product>
<product>azure_active_directory_passport:1.3.6</product>
<product>azure_active_directory_passport:1.4.0</product>
<product>azure_active_directory_passport:1.4.1</product>
<product>azure_active_directory_passport:1.4.2</product>
<product>azure_active_directory_passport:1.4.3</product>
<product>azure_active_directory_passport:1.4.4</product>
<product>azure_active_directory_passport:1.4.5</product>
<product>azure_active_directory_passport:2.0.0</product>
</cve>
<cve id="CVE-2016-7190" level="HIGH">
<product>edge</product>
</cve>
<cve id="CVE-2016-7199" level="HIGH">
<product>edge</product>
<product>internet_explorer:9</product>
<product>internet_explorer:10</product>
<product>internet_explorer:11</product>
</cve>
<cve id="CVE-2016-7198" level="HIGH">
<product>edge</product>
<product>internet_explorer:9</product>
<product>internet_explorer:10</product>
<product>internet_explorer:11</product>
</cve>
<cve id="CVE-2016-7999" level="MEDIUM">
<product>spip:3.1.2</product>
</cve>
<cve id="CVE-2016-7998" level="LOW">
<product>spip:3.1.2</product>
</cve>
<cve id="CVE-2016-7995" level="LOW">
<product>qemu:-</product>
</cve>
<cve id="CVE-2016-7994" level="LOW">
<product>qemu:-</product>
</cve>
<cve id="CVE-2016-7997" level="LOW">
<product>graphicsmagick:1.3.25</product>
</cve>
<cve id="CVE-2016-7996" level="LOW">
<product>graphicsmagick:1.3.25</product>
</cve>
<cve id="CVE-2016-7993" level="LOW">
<product>tcpdump:4.8.1</product>
</cve>
<cve id="CVE-2016-7992" level="LOW">
<product>tcpdump:4.8.1</product>
</cve>
<cve id="CVE-2016-9599" level="MEDIUM">
<product>puppet-tripleo:5.5.0</product>
<product>puppet-tripleo:6.2.0</product>
<product>openstack:10.0</product>
</cve>
<cve id="CVE-2016-9595" level="LOW">
<product>satellite:6.3</product>
<product>satellite_capsule:6.3</product>
</cve>
<cve id="CVE-2016-9594" level="MEDIUM">
<product>curl:6.0</product>
<product>curl:6.1</product>
<product>curl:6.1</product>
<product>curl:6.2</product>
<product>curl:6.3</product>
<product>curl:6.3.1</product>
<product>curl:6.4</product>
<product>curl:6.5</product>
<product>curl:6.5.1</product>
<product>curl:6.5.2</product>
<product>curl:7.1</product>
<product>curl:7.1.1</product>
<product>curl:7.2</product>
<product>curl:7.2.1</product>
<product>curl:7.3</product>
<product>curl:7.4</product>
<product>curl:7.4.1</product>
<product>curl:7.4.2</product>
<product>curl:7.5</product>
<product>curl:7.5.1</product>
<product>curl:7.5.2</product>
<product>curl:7.6</product>
<product>curl:7.6.1</product>
<product>curl:7.7</product>
<product>curl:7.7.1</product>
<product>curl:7.7.2</product>
<product>curl:7.7.3</product>
<product>curl:7.8</product>
<product>curl:7.8.1</product>
<product>curl:7.9</product>
<product>curl:7.9.1</product>
<product>curl:7.9.2</product>
<product>curl:7.9.3</product>
<product>curl:7.9.4</product>
<product>curl:7.9.5</product>
<product>curl:7.9.6</product>
<product>curl:7.9.7</product>
<product>curl:7.9.8</product>
<product>curl:7.10</product>
<product>curl:7.10.1</product>
<product>curl:7.10.2</product>
<product>curl:7.10.3</product>
<product>curl:7.10.4</product>
<product>curl:7.10.5</product>
<product>curl:7.10.6</product>
<product>curl:7.10.7</product>
<product>curl:7.10.8</product>
<product>curl:7.11.0</product>
<product>curl:7.11.1</product>
<product>curl:7.11.2</product>
<product>curl:7.12.0</product>
<product>curl:7.12.1</product>
<product>curl:7.12.2</product>
<product>curl:7.12.3</product>
<product>curl:7.13.0</product>
<product>curl:7.13.1</product>
<product>curl:7.13.2</product>
<product>curl:7.14.0</product>
<product>curl:7.14.1</product>
<product>curl:7.15.0</product>
<product>curl:7.15.1</product>
<product>curl:7.15.2</product>
<product>curl:7.15.3</product>
<product>curl:7.15.4</product>
<product>curl:7.15.5</product>
<product>curl:7.16.0</product>
<product>curl:7.16.1</product>
<product>curl:7.16.2</product>
<product>curl:7.16.3</product>
<product>curl:7.16.4</product>
<product>curl:7.17.0</product>
<product>curl:7.17.1</product>
<product>curl:7.18.0</product>
<product>curl:7.18.1</product>
<product>curl:7.18.2</product>
<product>curl:7.19.0</product>
<product>curl:7.19.1</product>
<product>curl:7.19.2</product>
<product>curl:7.19.3</product>
<product>curl:7.19.4</product>
<product>curl:7.19.5</product>
<product>curl:7.19.6</product>
<product>curl:7.19.7</product>
<product>curl:7.20.0</product>
<product>curl:7.20.1</product>
<product>curl:7.21.0</product>
<product>curl:7.21.1</product>
<product>curl:7.21.2</product>
<product>curl:7.21.3</product>
<product>curl:7.21.4</product>
<product>curl:7.21.5</product>
<product>curl:7.21.6</product>
<product>curl:7.21.7</product>
<product>curl:7.22.0</product>
<product>curl:7.23.0</product>
<product>curl:7.23.1</product>
<product>curl:7.24.0</product>
<product>curl:7.25.0</product>
<product>curl:7.26.0</product>
<product>curl:7.27.0</product>
<product>curl:7.28.0</product>
<product>curl:7.28.1</product>
<product>curl:7.29.0</product>
<product>curl:7.30.0</product>
<product>curl:7.31.0</product>
<product>curl:7.32.0</product>
<product>curl:7.33.0</product>
<product>curl:7.34.0</product>
<product>curl:7.35.0</product>
<product>curl:7.36.0</product>
<product>curl:7.37.0</product>
<product>curl:7.37.1</product>
<product>curl:7.38.0</product>
<product>curl:7.39.0</product>
<product>curl:7.40.0</product>
<product>curl:7.41.0</product>
<product>curl:7.42.0</product>
<product>curl:7.42.1</product>
<product>curl:7.43.0</product>
<product>curl:7.44.0</product>
<product>curl:7.45.0</product>
<product>curl:7.46.0</product>
<product>curl:7.47.0</product>
<product>curl:7.47.1</product>
<product>curl:7.48.0</product>
<product>curl:7.49.0</product>
<product>curl:7.49.1</product>
<product>curl:7.50.0</product>
<product>curl:7.50.1</product>
<product>curl:7.50.2</product>
<product>curl:7.50.3</product>
<product>curl:7.51.0</product>
<product>curl:7.52.0</product>
</cve>
<cve id="CVE-2016-9593" level="LOW">
<product>satellite:6.0</product>
<product>foreman:0.1</product>
<product>foreman:0.2</product>
<product>foreman:0.3</product>
<product>foreman:0.4</product>
<product>foreman:0.4.1</product>
<product>foreman:1.0</product>
<product>foreman:1.1</product>
<product>foreman:1.2.0</product>
<product>foreman:1.2.0</product>
<product>foreman:1.2.0</product>
<product>foreman:1.2.1</product>
<product>foreman:1.2.2</product>
<product>foreman:1.2.3</product>
<product>foreman:1.4.0</product>
<product>foreman:1.4.1</product>
<product>foreman:1.4.2</product>
<product>foreman:1.4.3</product>
<product>foreman:1.4.4</product>
<product>foreman:1.4.5</product>
<product>foreman:1.5.0</product>
<product>foreman:1.5.1</product>
<product>foreman:1.5.3</product>
<product>foreman:1.6.0</product>
<product>foreman:1.6.1</product>
<product>foreman:1.8.3</product>
<product>foreman:1.8.4</product>
<product>foreman:1.9.0</product>
<product>foreman:1.9.1</product>
<product>foreman:1.9.2</product>
<product>foreman:1.9.3</product>
<product>foreman:1.10.1</product>
<product>foreman:1.10.2</product>
<product>foreman:1.10.3</product>
<product>foreman:1.10.4</product>
<product>foreman:1.11.0</product>
<product>foreman:1.11.0</product>
<product>foreman:1.11.0</product>
<product>foreman:1.11.0</product>
<product>foreman:1.11.1</product>
<product>foreman:1.11.2</product>
<product>foreman:1.11.3</product>
<product>foreman:1.11.4</product>
<product>foreman:1.12.0</product>
<product>foreman:1.12.1</product>
<product>foreman:1.12.2</product>
<product>foreman:1.12.3</product>
<product>foreman:1.12.4</product>
<product>foreman:1.13.1</product>
<product>foreman:1.13.2</product>
<product>foreman:1.13.3</product>
<product>foreman:1.13.4</product>
<product>foreman:1.14.1</product>
<product>foreman:1.14.2</product>
<product>foreman:1.14.3</product>
</cve>
<cve id="CVE-2016-9592" level="LOW">
<product>openshift:3.2.1.23</product>
<product>openshift:3.3.1.11</product>
<product>openshift:3.4</product>
</cve>
<cve id="CVE-2016-9590" level="LOW">
<product>openstack:8.0</product>
<product>openstack:9.0</product>
<product>openstack:10.0</product>
</cve>
<cve id="CVE-2016-7891" level="MEDIUM">
<product>robohelp:11.0</product>
<product>robohelp:2015.0.3</product>
</cve>
<cve id="CVE-2016-5045" level="MEDIUM">
<product>oncommand_system_manager:8.3</product>
<product>oncommand_system_manager:8.3.1</product>
<product>oncommand_system_manager:8.3.2</product>
</cve>
<cve id="CVE-2016-5044" level="LOW">
<product>libdwarf:20160613</product>
</cve>
<cve id="CVE-2016-5047" level="LOW">
<product>oncommand_system_manager:8.3</product>
<product>oncommand_system_manager:8.3.1</product>
<product>oncommand_system_manager:8.3.2</product>
</cve>
<cve id="CVE-2016-5041" level="LOW">
<product>libdwarf:20160922</product>
</cve>
<cve id="CVE-2016-5040" level="MEDIUM">
<product>libdwarf:20160613</product>
</cve>
<cve id="CVE-2016-5043" level="LOW">
<product>libdwarf:20160613</product>
</cve>
<cve id="CVE-2016-5042" level="LOW">
<product>libdwarf:20160613</product>
</cve>
<cve id="CVE-2016-5049" level="LOW">
<product>readydesk:9.1</product>
</cve>
<cve id="CVE-2016-5048" level="LOW">
<product>readydesk:9.1</product>
</cve>
<cve id="CVE-2016-9773" level="MEDIUM">
<product>imagemagick:7.0.3-8</product>
</cve>
<cve id="CVE-2016-9772" level="LOW">
<product>openafs:1.6.19</product>
</cve>
<cve id="CVE-2016-9776" level="LOW">
<product>qemu</product>
</cve>
<cve id="CVE-2016-5593" level="LOW">
<product>customer_interaction_history:12.1.1</product>
<product>customer_interaction_history:12.1.2</product>
<product>customer_interaction_history:12.1.3</product>
<product>customer_interaction_history:12.2.3</product>
<product>customer_interaction_history:12.2.4</product>
</cve>
<cve id="CVE-2016-5592" level="LOW">
<product>customer_interaction_history:12.1.1</product>
<product>customer_interaction_history:12.1.2</product>
<product>customer_interaction_history:12.1.3</product>
<product>customer_interaction_history:12.2.3</product>
<product>customer_interaction_history:12.2.4</product>
</cve>
<cve id="CVE-2016-5591" level="LOW">
<product>customer_interaction_history:12.1.1</product>
<product>customer_interaction_history:12.1.2</product>
<product>customer_interaction_history:12.1.3</product>
<product>customer_interaction_history:12.2.3</product>
<product>customer_interaction_history:12.2.4</product>
</cve>
<cve id="CVE-2016-5597" level="MEDIUM">
<product>jdk:1.6.0</product>
<product>jdk:1.7.0</product>
<product>jdk:1.8.0</product>
<product>jdk:1.8.0</product>
<product>jre:1.6.0</product>
<product>jre:1.7.0</product>
<product>jre:1.8.0</product>
<product>jre:1.8.0</product>
</cve>
<cve id="CVE-2016-5596" level="LOW">
<product>customer_relationship_management_technical_foundation:12.1.1</product>
<product>customer_relationship_management_technical_foundation:12.1.2</product>
<product>customer_relationship_management_technical_foundation:12.1.3</product>
<product>customer_relationship_management_technical_foundation:12.2.3</product>
<product>customer_relationship_management_technical_foundation:12.2.4</product>
<product>customer_relationship_management_technical_foundation:12.2.5</product>
<product>customer_relationship_management_technical_foundation:12.2.6</product>
</cve>
<cve id="CVE-2016-5595" level="LOW">
<product>customer_interaction_history:12.1.1</product>
<product>customer_interaction_history:12.1.2</product>
<product>customer_interaction_history:12.1.3</product>
<product>customer_interaction_history:12.2.3</product>
<product>customer_interaction_history:12.2.4</product>
</cve>
<cve id="CVE-2016-5594" level="LOW">
<product>flexcube_universal_banking:11.3.0</product>
<product>flexcube_universal_banking:11.4.0</product>
<product>flexcube_universal_banking:12.0.1</product>
<product>flexcube_universal_banking:12.0.2</product>
<product>flexcube_universal_banking:12.0.3</product>
</cve>
<cve id="CVE-2016-5599" level="LOW">
<product>advanced_supply_chain_planning:12.2.3</product>
<product>advanced_supply_chain_planning:12.2.4</product>
<product>advanced_supply_chain_planning:12.2.5</product>
</cve>
<cve id="CVE-2016-8492" level="MEDIUM">
<product>fortios:4.3.0</product>
<product>fortios:4.3.10</product>
<product>fortios:4.3.12</product>
<product>fortios:4.3.13</product>
<product>fortios:4.3.14</product>
<product>fortios:4.3.15</product>
<product>fortios:4.3.16</product>
<product>fortios:4.3.17</product>
<product>fortios:4.3.18</product>
</cve>
<cve id="CVE-2016-0267" level="LOW">
<product>urbancode_deploy:6.0</product>
<product>urbancode_deploy:6.0.1.0</product>
<product>urbancode_deploy:6.0.1.1</product>
<product>urbancode_deploy:6.0.1.2</product>
<product>urbancode_deploy:6.0.1.3</product>
<product>urbancode_deploy:6.0.1.4</product>
<product>urbancode_deploy:6.0.1.5</product>
<product>urbancode_deploy:6.0.1.6</product>
<product>urbancode_deploy:6.0.1.7</product>
<product>urbancode_deploy:6.0.1.8</product>
<product>urbancode_deploy:6.0.1.9</product>
<product>urbancode_deploy:6.0.1.10</product>
<product>urbancode_deploy:6.0.1.11</product>
<product>urbancode_deploy:6.0.1.12</product>
<product>urbancode_deploy:6.1</product>
<product>urbancode_deploy:6.1.0.1</product>
<product>urbancode_deploy:6.1.0.2</product>
<product>urbancode_deploy:6.1.0.3</product>
<product>urbancode_deploy:6.1.0.4</product>
<product>urbancode_deploy:6.1.1.0</product>
<product>urbancode_deploy:6.1.1.1</product>
<product>urbancode_deploy:6.1.1.2</product>
<product>urbancode_deploy:6.1.1.3</product>
<product>urbancode_deploy:6.1.1.4</product>
<product>urbancode_deploy:6.1.1.5</product>
<product>urbancode_deploy:6.1.1.6</product>
<product>urbancode_deploy:6.1.1.7</product>
<product>urbancode_deploy:6.1.1.8</product>
<product>urbancode_deploy:6.1.2</product>
<product>urbancode_deploy:6.1.3</product>
<product>urbancode_deploy:6.1.3.1</product>
<product>urbancode_deploy:6.1.3.2</product>
<product>urbancode_deploy:6.2.0.0</product>
<product>urbancode_deploy:6.2.0.1</product>
<product>urbancode_deploy:6.2.0.2</product>
<product>urbancode_deploy:6.2.1</product>
</cve>
<cve id="CVE-2016-6815" level="LOW">
<product>ranger:0.4.0</product>
<product>ranger:0.5.0</product>
<product>ranger:0.5.1</product>
<product>ranger:0.5.2</product>
<product>ranger:0.5.3</product>
<product>ranger:0.6.0</product>
<product>ranger:0.6.1</product>
</cve>
<cve id="CVE-2016-6813" level="LOW">
<product>cloudstack:4.1.0</product>
<product>cloudstack:4.1.1</product>
<product>cloudstack:4.2.0</product>
<product>cloudstack:4.4.4</product>
<product>cloudstack:4.5.1</product>
<product>cloudstack:4.5.2</product>
<product>cloudstack:4.6.0</product>
<product>cloudstack:4.6.1</product>
<product>cloudstack:4.6.2</product>
<product>cloudstack:4.7.0</product>
<product>cloudstack:4.8</product>
<product>cloudstack:4.9.0.0</product>
</cve>
<cve id="CVE-2016-6812" level="MEDIUM">
<product>cxf:3.0.11</product>
<product>cxf:3.1.0</product>
<product>cxf:3.1.1</product>
<product>cxf:3.1.2</product>
<product>cxf:3.1.3</product>
<product>cxf:3.1.4</product>
<product>cxf:3.1.5</product>
<product>cxf:3.1.6</product>
<product>cxf:3.1.7</product>
<product>cxf:3.1.8</product>
</cve>
<cve id="CVE-2016-6811" level="LOW">
<product>hadoop:2.2.0</product>
<product>hadoop:2.3.0</product>
<product>hadoop:2.4.0</product>
<product>hadoop:2.4.1</product>
<product>hadoop:2.5.0</product>
<product>hadoop:2.5.1</product>
<product>hadoop:2.6.0</product>
<product>hadoop:2.6.1</product>
<product>hadoop:2.6.2</product>
<product>hadoop:2.6.3</product>
<product>hadoop:2.6.4</product>
<product>hadoop:2.7.0</product>
<product>hadoop:2.7.1</product>
<product>hadoop:2.7.2</product>
<product>hadoop:2.7.3</product>
</cve>
<cve id="CVE-2016-6810" level="MEDIUM">
<product>activemq:5.0.0</product>
<product>activemq:5.1.0</product>
<product>activemq:5.2.0</product>
<product>activemq:5.3.0</product>
<product>activemq:5.3.1</product>
<product>activemq:5.3.2</product>
<product>activemq:5.4.0</product>
<product>activemq:5.4.1</product>
<product>activemq:5.4.2</product>
<product>activemq:5.4.3</product>
<product>activemq:5.5.0</product>
<product>activemq:5.5.1</product>
<product>activemq:5.6.0</product>
<product>activemq:5.7.0</product>
<product>activemq:5.8.0</product>
<product>activemq:5.9.0</product>
<product>activemq:5.9.1</product>
<product>activemq:5.10.0</product>
<product>activemq:5.10.1</product>
<product>activemq:5.10.2</product>
<product>activemq:5.11.0</product>
<product>activemq:5.11.1</product>
<product>activemq:5.11.2</product>
<product>activemq:5.11.3</product>
<product>activemq:5.12.0</product>
<product>activemq:5.12.1</product>
<product>activemq:5.13.1</product>
<product>activemq:5.13.3</product>
</cve>
<cve id="CVE-2016-6818" level="LOW">
<product>business_intelligence_platform:-</product>
</cve>
<cve id="CVE-2016-6933" level="MEDIUM">
<product>experience_manager:6.0.0</product>
<product>experience_manager:6.1.0</product>
<product>experience_manager:6.2.0</product>
<product>livecycle:10.0.4</product>
<product>livecycle:11.0.1</product>
</cve>
<cve id="CVE-2016-6100" level="MEDIUM">
<product>disposal_and_governance_management_for_it:6.0</product>
<product>disposal_and_governance_management_for_it:6.0.1.0</product>
<product>disposal_and_governance_management_for_it:6.0.1.1</product>
<product>disposal_and_governance_management_for_it:6.0.1.2</product>
<product>disposal_and_governance_management_for_it:6.0.1.3</product>
<product>disposal_and_governance_management_for_it:6.0.1.4</product>
<product>disposal_and_governance_management_for_it:6.0.1.5</product>
<product>disposal_and_governance_management_for_it:6.0.1.6</product>
<product>disposal_and_governance_management_for_it:6.0.1.7</product>
<product>disposal_and_governance_management_for_it:6.0.2</product>
<product>disposal_and_governance_management_for_it:6.0.3</product>
<product>disposal_and_governance_management_for_it:6.0.3.1</product>
<product>disposal_and_governance_management_for_it:6.0.3.2</product>
<product>disposal_and_governance_management_for_it:6.0.3.3</product>
<product>disposal_and_governance_management_for_it:6.0.3.4</product>
<product>global_retention_policy_and_schedule_management:6.0</product>
<product>global_retention_policy_and_schedule_management:6.0.1.0</product>
<product>global_retention_policy_and_schedule_management:6.0.1.1</product>
<product>global_retention_policy_and_schedule_management:6.0.1.2</product>
<product>global_retention_policy_and_schedule_management:6.0.1.3</product>
<product>global_retention_policy_and_schedule_management:6.0.1.4</product>
<product>global_retention_policy_and_schedule_management:6.0.1.5</product>
<product>global_retention_policy_and_schedule_management:6.0.1.6</product>
<product>global_retention_policy_and_schedule_management:6.0.1.7</product>
<product>global_retention_policy_and_schedule_management:6.0.2</product>
<product>global_retention_policy_and_schedule_management:6.0.3</product>
<product>global_retention_policy_and_schedule_management:6.0.3.1</product>
<product>global_retention_policy_and_schedule_management:6.0.3.2</product>
<product>global_retention_policy_and_schedule_management:6.0.3.3</product>
<product>global_retention_policy_and_schedule_management:6.0.3.4</product>
</cve>
<cve id="CVE-2016-6103" level="MEDIUM">
<product>security_key_lifecycle_manager:2.5.0</product>
<product>security_key_lifecycle_manager:2.5.0.0</product>
<product>security_key_lifecycle_manager:2.5.0.1</product>
<product>security_key_lifecycle_manager:2.5.0.2</product>
<product>security_key_lifecycle_manager:2.5.0.3</product>
<product>security_key_lifecycle_manager:2.5.0.4</product>
<product>security_key_lifecycle_manager:2.5.0.5</product>
<product>security_key_lifecycle_manager:2.5.0.6</product>
<product>security_key_lifecycle_manager:2.5.0.7</product>
<product>security_key_lifecycle_manager:2.6.0</product>
<product>security_key_lifecycle_manager:2.6.0.1</product>
<product>security_key_lifecycle_manager:2.6.0.2</product>
</cve>
<cve id="CVE-2016-6102" level="MEDIUM">
<product>security_key_lifecycle_manager:2.5.0</product>
<product>security_key_lifecycle_manager:2.5.0.0</product>
<product>security_key_lifecycle_manager:2.5.0.1</product>
<product>security_key_lifecycle_manager:2.5.0.2</product>
<product>security_key_lifecycle_manager:2.5.0.3</product>
<product>security_key_lifecycle_manager:2.5.0.4</product>
<product>security_key_lifecycle_manager:2.5.0.5</product>
<product>security_key_lifecycle_manager:2.5.0.6</product>
<product>security_key_lifecycle_manager:2.5.0.7</product>
<product>security_key_lifecycle_manager:2.6.0</product>
<product>security_key_lifecycle_manager:2.6.0.1</product>
<product>security_key_lifecycle_manager:2.6.0.2</product>
</cve>
<cve id="CVE-2016-6105" level="LOW">
<product>security_key_lifecycle_manager:2.5.0</product>
<product>security_key_lifecycle_manager:2.5.0.0</product>
<product>security_key_lifecycle_manager:2.5.0.1</product>
<product>security_key_lifecycle_manager:2.5.0.2</product>
<product>security_key_lifecycle_manager:2.5.0.3</product>
<product>security_key_lifecycle_manager:2.5.0.4</product>
<product>security_key_lifecycle_manager:2.5.0.5</product>
<product>security_key_lifecycle_manager:2.5.0.6</product>
<product>security_key_lifecycle_manager:2.5.0.7</product>
<product>security_key_lifecycle_manager:2.6.0</product>
<product>security_key_lifecycle_manager:2.6.0.1</product>
<product>security_key_lifecycle_manager:2.6.0.2</product>
</cve>
<cve id="CVE-2016-6104" level="LOW">
<product>security_key_lifecycle_manager:2.5.0</product>
<product>security_key_lifecycle_manager:2.5.0.0</product>
<product>security_key_lifecycle_manager:2.5.0.1</product>
<product>security_key_lifecycle_manager:2.5.0.2</product>
<product>security_key_lifecycle_manager:2.5.0.3</product>
<product>security_key_lifecycle_manager:2.5.0.4</product>
<product>security_key_lifecycle_manager:2.5.0.5</product>
<product>security_key_lifecycle_manager:2.5.0.6</product>
<product>security_key_lifecycle_manager:2.5.0.7</product>
<product>security_key_lifecycle_manager:2.6.0</product>
<product>security_key_lifecycle_manager:2.6.0.1</product>
<product>security_key_lifecycle_manager:2.6.0.2</product>
</cve>
<cve id="CVE-2016-6937" level="LOW">
<product>acrobat:11.0.16</product>
<product>acrobat_dc:15.006.30174</product>
<product>acrobat_dc:15.016.20045</product>
<product>acrobat_reader_dc:15.006.30174</product>
<product>acrobat_reader_dc:15.016.20045</product>
<product>reader:11.0.16</product>
</cve>
<cve id="CVE-2016-0338" level="LOW">
<product>security_identity_manager_adapter:7.0.0.0</product>
<product>security_identity_manager_adapter:7.0.0.1</product>
<product>security_identity_manager_adapter:7.0.0.2</product>
<product>security_identity_manager_adapter:7.0.0.3</product>
<product>security_identity_manager_adapter:7.0.1.0</product>
<product>security_identity_manager_adapter:7.0.1.1</product>
</cve>
<cve id="CVE-2016-0339" level="MEDIUM">
<product>security_identity_manager_adapter:7.0.0.0</product>
<product>security_identity_manager_adapter:7.0.0.1</product>
<product>security_identity_manager_adapter:7.0.0.2</product>
<product>security_identity_manager_adapter:7.0.0.3</product>
<product>security_identity_manager_adapter:7.0.1.0</product>
<product>security_identity_manager_adapter:7.0.1.1</product>
</cve>
<cve id="CVE-2016-0335" level="MEDIUM">
<product>security_identity_manager:7.0.0.0</product>
<product>security_identity_manager:7.0.0.1</product>
<product>security_identity_manager:7.0.0.2</product>
<product>security_identity_manager:7.0.0.3</product>
<product>security_identity_manager:7.0.1.0</product>
</cve>
<cve id="CVE-2016-0336" level="MEDIUM">
<product>security_identity_manager:7.0.0.0</product>
<product>security_identity_manager:7.0.0.1</product>
<product>security_identity_manager:7.0.0.2</product>
<product>security_identity_manager:7.0.0.3</product>
<product>security_identity_manager:7.0.1.0</product>
</cve>
<cve id="CVE-2016-0330" level="LOW">
<product>security_identity_manager_adapter:7.0.0.0</product>
<product>security_identity_manager_adapter:7.0.0.1</product>
<product>security_identity_manager_adapter:7.0.0.2</product>
<product>security_identity_manager_adapter:7.0.0.3</product>
<product>security_identity_manager_adapter:7.0.1.0</product>
<product>security_identity_manager_adapter:7.0.1.1</product>
</cve>
<cve id="CVE-2016-0331" level="MEDIUM">
<product>rational_collaborative_lifecycle_management:6.0.1</product>
<product>rational_collaborative_lifecycle_management:6.0.2</product>
<product>rational_team_concert:6.0.1</product>
<product>rational_team_concert:6.0.2</product>
</cve>
<cve id="CVE-2016-0332" level="LOW">
<product>security_identity_manager_virtual_appliance:7.0.0.0</product>
<product>security_identity_manager_virtual_appliance:7.0.0.1</product>
<product>security_identity_manager_virtual_appliance:7.0.0.2</product>
<product>security_identity_manager_virtual_appliance:7.0.0.3</product>
<product>security_identity_manager_virtual_appliance:7.0.1.0</product>
</cve>
<cve id="CVE-2016-9908" level="LOW">
<product>qemu:-</product>
</cve>
<cve id="CVE-2016-9909" level="MEDIUM">
<product>html5lib:0.99999999</product>
</cve>
<cve id="CVE-2016-9907" level="LOW">
<product>qemu:-</product>
</cve>
<cve id="CVE-2016-10259" level="MEDIUM">
<product>ssl_visibility_appliance_sv1800_firmware:3.8.4</product>
<product>ssl_visibility_appliance_sv1800_firmware:3.9</product>
<product>ssl_visibility_appliance_sv1800_firmware:3.10</product>
<product>ssl_visibility_appliance_sv1800_firmware:3.11</product>
<product>ssl_visibility_appliance_sv1800_firmware:3.11.1.1</product>
<product>ssl_visibility_appliance_sv1800_firmware:3.11.1.2</product>
<product>ssl_visibility_appliance_sv1800_firmware:3.11.2.1</product>
<product>ssl_visibility_appliance_sv2800_firmware:3.8.4</product>
<product>ssl_visibility_appliance_sv2800_firmware:3.9</product>
<product>ssl_visibility_appliance_sv2800_firmware:3.10</product>
<product>ssl_visibility_appliance_sv2800_firmware:3.11</product>
<product>ssl_visibility_appliance_sv2800_firmware:3.11.1.1</product>
<product>ssl_visibility_appliance_sv2800_firmware:3.11.1.2</product>
<product>ssl_visibility_appliance_sv2800_firmware:3.11.2.1</product>
<product>ssl_visibility_appliance_sv3800_firmware:3.8.4</product>
<product>ssl_visibility_appliance_sv3800_firmware:3.9</product>
<product>ssl_visibility_appliance_sv3800_firmware:3.10</product>
<product>ssl_visibility_appliance_sv3800_firmware:3.11</product>
<product>ssl_visibility_appliance_sv3800_firmware:3.11.1.1</product>
<product>ssl_visibility_appliance_sv3800_firmware:3.11.1.2</product>
<product>ssl_visibility_appliance_sv3800_firmware:3.11.2.1</product>
<product>ssl_visibility_appliance_sv800_firmware:3.8.4</product>
<product>ssl_visibility_appliance_sv800_firmware:3.9</product>
<product>ssl_visibility_appliance_sv800_firmware:3.10</product>
<product>ssl_visibility_appliance_sv800_firmware:3.11</product>
<product>ssl_visibility_appliance_sv800_firmware:3.11.1.1</product>
<product>ssl_visibility_appliance_sv800_firmware:3.11.1.2</product>
<product>ssl_visibility_appliance_sv800_firmware:3.11.2.1</product>
</cve>
<cve id="CVE-2016-10257" level="MEDIUM">
<product>advanced_secure_gateway:6.6</product>
<product>proxysg:6.6</product>
</cve>
<cve id="CVE-2016-10256" level="MEDIUM">
<product>proxysg:6.6</product>
</cve>
<cve id="CVE-2016-10255" level="MEDIUM">
<product>elfutils:0.167</product>
</cve>
<cve id="CVE-2016-10254" level="MEDIUM">
<product>elfutils:0.167</product>
</cve>
<cve id="CVE-2016-10253" level="LOW">
<product>erlang%2fotp:18.0</product>
<product>erlang%2fotp:18.0</product>
<product>erlang%2fotp:18.0</product>
<product>erlang%2fotp:18.0.1</product>
<product>erlang%2fotp:18.0.2</product>
<product>erlang%2fotp:18.0.3</product>
<product>erlang%2fotp:18.1</product>
<product>erlang%2fotp:18.1.1</product>
<product>erlang%2fotp:18.1.2</product>
<product>erlang%2fotp:18.1.3</product>
<product>erlang%2fotp:18.1.4</product>
<product>erlang%2fotp:18.1.5</product>
<product>erlang%2fotp:18.2</product>
<product>erlang%2fotp:18.2.1</product>
<product>erlang%2fotp:18.2.2</product>
<product>erlang%2fotp:18.2.3</product>
<product>erlang%2fotp:18.2.4</product>
<product>erlang%2fotp:18.2.4.1</product>
<product>erlang%2fotp:18.3</product>
<product>erlang%2fotp:18.3.1</product>
<product>erlang%2fotp:18.3.2</product>
<product>erlang%2fotp:18.3.3</product>
<product>erlang%2fotp:18.3.4</product>
<product>erlang%2fotp:18.3.4.1</product>
<product>erlang%2fotp:18.3.4.2</product>
<product>erlang%2fotp:18.3.4.3</product>
<product>erlang%2fotp:18.3.4.4</product>
<product>erlang%2fotp:18.3.4.5</product>
<product>erlang%2fotp:19.0</product>
<product>erlang%2fotp:19.0</product>
<product>erlang%2fotp:19.0</product>
<product>erlang%2fotp:19.0.1</product>
<product>erlang%2fotp:19.0.2</product>
<product>erlang%2fotp:19.0.3</product>
<product>erlang%2fotp:19.0.4</product>
<product>erlang%2fotp:19.0.5</product>
<product>erlang%2fotp:19.0.6</product>
<product>erlang%2fotp:19.0.7</product>
<product>erlang%2fotp:19.1</product>
<product>erlang%2fotp:19.1.1</product>
<product>erlang%2fotp:19.1.2</product>
<product>erlang%2fotp:19.1.3</product>
<product>erlang%2fotp:19.1.4</product>
<product>erlang%2fotp:19.1.5</product>
<product>erlang%2fotp:19.1.6</product>
<product>erlang%2fotp:19.1.6.1</product>
<product>erlang%2fotp:19.2</product>
<product>erlang%2fotp:19.2.1</product>
<product>erlang%2fotp:19.2.2</product>
<product>erlang%2fotp:19.2.3</product>
<product>erlang%2fotp:19.2.3.1</product>
<product>erlang%2fotp:19.3</product>
<product>erlang%2fotp:19.3.1</product>
<product>erlang%2fotp:19.3.2</product>
<product>erlang%2fotp:19.3.3</product>
<product>erlang%2fotp:19.3.4</product>
<product>erlang%2fotp:19.3.5</product>
<product>erlang%2fotp:19.3.6</product>
<product>erlang%2fotp:19.3.6.1</product>
<product>erlang%2fotp:19.3.6.2</product>
<product>erlang%2fotp:19.3.6.3</product>
<product>erlang%2fotp:19.3.6.4</product>
<product>erlang%2fotp:19.3.6.5</product>
<product>erlang%2fotp:19.3.6.6</product>
<product>erlang%2fotp:19.3.6.7</product>
<product>erlang%2fotp:19.3.6.8</product>
<product>erlang%2fotp:19.3.6.9</product>
</cve>
<cve id="CVE-2016-10252" level="LOW">
<product>imagemagick:6.9.2-1</product>
</cve>
<cve id="CVE-2016-10251" level="MEDIUM">
<product>jasper:1.900.19</product>
</cve>
<cve id="CVE-2016-10250" level="LOW">
<product>jasper:1.900.12</product>
</cve>
<cve id="CVE-2016-10439" level="MEDIUM">
<product>sd_425_firmware:-</product>
<product>sd_430_firmware:-</product>
<product>sd_450_firmware:-</product>
<product>sd_625_firmware:-</product>
<product>sd_650_firmware:-</product>
<product>sd_652_firmware:-</product>
<product>sd_820_firmware:-</product>
<product>sd_820a_firmware:-</product>
</cve>
<cve id="CVE-2016-7919" level="LOW">
<product>moodle:3.1.2</product>
</cve>
<cve id="CVE-2016-10433" level="MEDIUM">
<product>mdm9635m_firmware:-</product>
<product>mdm9640_firmware:-</product>
<product>mdm9645_firmware:-</product>
<product>msm8909w_firmware:-</product>
<product>sd_205_firmware:-</product>
<product>sd_210_firmware:-</product>
<product>sd_212_firmware:-</product>
<product>sd_400_firmware:-</product>
<product>sd_410_firmware:-</product>
<product>sd_412_firmware:-</product>
<product>sd_415_firmware:-</product>
<product>sd_425_firmware:-</product>
<product>sd_430_firmware:-</product>
<product>sd_450_firmware:-</product>
<product>sd_615_firmware:-</product>
<product>sd_616_firmware:-</product>
<product>sd_617_firmware:-</product>
<product>sd_625_firmware:-</product>
<product>sd_650_firmware:-</product>
<product>sd_652_firmware:-</product>
<product>sd_800_firmware:-</product>
<product>sd_808_firmware:-</product>
<product>sd_820_firmware:-</product>
<product>sd_820a_firmware:-</product>
</cve>
<cve id="CVE-2016-10432" level="MEDIUM">
<product>sd_410_firmware:-</product>
<product>sd_412_firmware:-</product>
<product>sd_425_firmware:-</product>
<product>sd_430_firmware:-</product>
<product>sd_450_firmware:-</product>
<product>sd_617_firmware:-</product>
<product>sd_625_firmware:-</product>
<product>sd_650_firmware:-</product>
<product>sd_652_firmware:-</product>
<product>sd_820_firmware:-</product>
<product>sd_820a_firmware:-</product>
</cve>
<cve id="CVE-2016-10431" level="LOW">
<product>mdm9206_firmware:-</product>
<product>mdm9650_firmware:-</product>
<product>sd_205_firmware:-</product>
<product>sd_210_firmware:-</product>
<product>sd_212_firmware:-</product>
<product>sd_425_firmware:-</product>
<product>sd_430_firmware:-</product>
<product>sd_450_firmware:-</product>
<product>sd_625_firmware:-</product>
<product>sd_650_firmware:-</product>
<product>sd_652_firmware:-</product>
<product>sd_820_firmware:-</product>
<product>sd_820a_firmware:-</product>
<product>sd_835_firmware:-</product>
<product>sd_845_firmware:-</product>
<product>sd_850_firmware:-</product>
</cve>
<cve id="CVE-2016-10430" level="LOW">
<product>sd_425_firmware:-</product>
<product>sd_430_firmware:-</product>
<product>sd_450_firmware:-</product>
<product>sd_625_firmware:-</product>
<product>sd_650_firmware:-</product>
<product>sd_652_firmware:-</product>
<product>sd_820_firmware:-</product>
<product>sd_820a_firmware:-</product>
</cve>
<cve id="CVE-2016-10437" level="LOW">
<product>fsm9055_firmware:-</product>
<product>mdm9206_firmware:-</product>
<product>mdm9607_firmware:-</product>
<product>mdm9635m_firmware:-</product>
<product>mdm9640_firmware:-</product>
<product>mdm9650_firmware:-</product>
<product>msm8909w_firmware:-</product>
<product>sd_205_firmware:-</product>
<product>sd_210_firmware:-</product>
<product>sd_212_firmware:-</product>
<product>sd_400_firmware:-</product>
<product>sd_410_firmware:-</product>
<product>sd_412_firmware:-</product>
<product>sd_415_firmware:-</product>
<product>sd_425_firmware:-</product>
<product>sd_430_firmware:-</product>
<product>sd_450_firmware:-</product>
<product>sd_615_firmware:-</product>
<product>sd_616_firmware:-</product>
<product>sd_617_firmware:-</product>
<product>sd_625_firmware:-</product>
<product>sd_650_firmware:-</product>
<product>sd_652_firmware:-</product>
<product>sd_808_firmware:-</product>
<product>sd_810_firmware:-</product>
<product>sd_820_firmware:-</product>
<product>sd_835_firmware:-</product>
<product>sdx20_firmware:-</product>
</cve>
<cve id="CVE-2016-10436" level="LOW">
<product>fsm9055_firmware:-</product>
<product>ipq4019_firmware:-</product>
<product>ipq8064_firmware:-</product>
<product>mdm9206_firmware:-</product>
<product>mdm9607_firmware:-</product>
<product>mdm9635m_firmware:-</product>
<product>mdm9640_firmware:-</product>
<product>mdm9645_firmware:-</product>
<product>mdm9650_firmware:-</product>
<product>msm8909w_firmware:-</product>
<product>qca4531_firmware:-</product>
<product>qca9980_firmware:-</product>
<product>sd_205_firmware:-</product>
<product>sd_210_firmware:-</product>
<product>sd_212_firmware:-</product>
<product>sd_400_firmware:-</product>
<product>sd_410_firmware:-</product>
<product>sd_412_firmware:-</product>
<product>sd_415_firmware:-</product>
<product>sd_425_firmware:-</product>
<product>sd_430_firmware:-</product>
<product>sd_450_firmware:-</product>
<product>sd_615_firmware:-</product>
<product>sd_616_firmware:-</product>
<product>sd_617_firmware:-</product>
<product>sd_625_firmware:-</product>
<product>sd_650_firmware:-</product>
<product>sd_652_firmware:-</product>
<product>sd_808_firmware:-</product>
<product>sd_810_firmware:-</product>
<product>sd_820_firmware:-</product>
<product>sd_835_firmware:-</product>
<product>sdx20_firmware:-</product>
</cve>
<cve id="CVE-2016-10435" level="MEDIUM">
<product>mdm9206_firmware:-</product>
<product>mdm9625_firmware:-</product>
<product>mdm9635m_firmware:-</product>
<product>mdm9640_firmware:-</product>
<product>mdm9645_firmware:-</product>
<product>msm8909w_firmware:-</product>
<product>sd_205_firmware:-</product>
<product>sd_210_firmware:-</product>
<product>sd_212_firmware:-</product>
<product>sd_400_firmware:-</product>
<product>sd_410_firmware:-</product>
<product>sd_412_firmware:-</product>
<product>sd_415_firmware:-</product>
<product>sd_425_firmware:-</product>
<product>sd_430_firmware:-</product>
<product>sd_450_firmware:-</product>
<product>sd_615_firmware:-</product>
<product>sd_616_firmware:-</product>
<product>sd_617_firmware:-</product>
<product>sd_625_firmware:-</product>
<product>sd_650_firmware:-</product>
<product>sd_652_firmware:-</product>
<product>sd_800_firmware:-</product>
<product>sd_808_firmware:-</product>
<product>sd_820_firmware:-</product>
<product>sd_820a_firmware:-</product>
</cve>
<cve id="CVE-2016-10434" level="LOW">
<product>sd_820_firmware:-</product>
<product>sd_820a_firmware:-</product>
</cve>
<cve id="CVE-2016-4059" level="MEDIUM">
<product>foxit_reader:7.3.0.118</product>
<product>phantompdf:7.3.0.118</product>
</cve>
<cve id="CVE-2016-4058" level="MEDIUM">
<product>policy_center:v100r003c00</product>
<product>policy_center:v100r003c10</product>
</cve>
<cve id="CVE-2016-4509" level="MEDIUM">
<product>elcsoft:2.4.01</product>
</cve>
<cve id="CVE-2016-4508" level="MEDIUM">
<product>bladecontrol-webvis:3.0.2</product>
</cve>
<cve id="CVE-2016-4507" level="LOW">
<product>bladecontrol-webvis:3.0.2</product>
</cve>
<cve id="CVE-2016-4506" level="MEDIUM">
<product>intuitive_650_tdb_controller:2.1</product>
</cve>
<cve id="CVE-2016-4505" level="LOW">
<product>intuitive_650_tdb_controller:2.1</product>
</cve>
<cve id="CVE-2016-4504" level="MEDIUM">
<product>weblog:-</product>
<product>weblog:-</product>
<product>weblog:-</product>
<product>weblog:-</product>
</cve>
<cve id="CVE-2016-4503" level="LOW">
<product>device_server_web_console_5232-n_firmware:-</product>
</cve>
<cve id="CVE-2016-4502" level="LOW">
<product>esc_8832_data_controller:3.02</product>
</cve>
<cve id="CVE-2016-4501" level="LOW">
<product>esc_8832_data_controller:3.02</product>
</cve>
<cve id="CVE-2016-4500" level="HIGH">
<product>uc-7408_lx-plus:-</product>
<product>uc-7408_lx-plus_firmware:-</product>
</cve>
<cve id="CVE-2016-8369" level="MEDIUM">
<product>jenesys_bas_bridge:1.1.8</product>
</cve>
<cve id="CVE-2016-8368" level="LOW">
<product>qj71e71-100_firmware:-</product>
<product>qj71e71-b2_firmware:-</product>
<product>qj71e71-b5_firmware:-</product>
</cve>
<cve id="CVE-2016-5900" level="MEDIUM">
<product>tealeaf_customer_experience_on_cloud_network_capture_add-on:16.1.01</product>
</cve>
<cve id="CVE-2016-8366" level="LOW">
<product>ilc_plcs_firmware:-</product>
</cve>
<cve id="CVE-2016-5902" level="MEDIUM">
<product>maximo_asset_management:7.1</product>
<product>maximo_asset_management:7.5</product>
<product>maximo_asset_management:7.6</product>
<product>maximo_for_aviation:7.1</product>
<product>maximo_for_aviation:7.5</product>
<product>maximo_for_aviation:7.6</product>
<product>maximo_for_energy_optimization:7.1</product>
<product>maximo_for_energy_optimization:7.5</product>
<product>maximo_for_energy_optimization:7.6</product>
<product>maximo_for_government:7.1</product>
<product>maximo_for_government:7.5</product>
<product>maximo_for_government:7.6</product>
<product>maximo_for_life_sciences:7.1</product>
<product>maximo_for_life_sciences:7.5</product>
<product>maximo_for_life_sciences:7.6</product>
<product>maximo_for_nuclear_power:7.1</product>
<product>maximo_for_nuclear_power:7.5</product>
<product>maximo_for_nuclear_power:7.6</product>
<product>maximo_for_oil_and_gas:7.1</product>
<product>maximo_for_oil_and_gas:7.5</product>
<product>maximo_for_oil_and_gas:7.6</product>
<product>maximo_for_transportation:7.1</product>
<product>maximo_for_transportation:7.5</product>
<product>maximo_for_transportation:7.6</product>
<product>maximo_for_utilities:7.1</product>
<product>maximo_for_utilities:7.5</product>
<product>maximo_for_utilities:7.6</product>
</cve>
<cve id="CVE-2016-8364" level="LOW">
<product>s7-softplc:4.12</product>
</cve>
<cve id="CVE-2016-8363" level="LOW">
<product>awk-1121_firmware:06-29-2017</product>
<product>awk-1127_firmware:06-29-2017</product>
<product>awk-1131a_firmware:10-31-2016</product>
<product>awk-3121-m12-rtg_firmware:06-29-2017</product>
<product>awk-3131-m12-rcc_firmware:06-29-2017</product>
<product>awk-3131a_firmware:10-31-2016</product>
<product>awk-3191_firmware:05-30-2017</product>
<product>awk-4131a_firmware:10-31-2016</product>
<product>awk-5232-m12-rcc_firmware:06-29-2017</product>
<product>awk-5232_firmware:05-30-2017</product>
<product>awk-6232_firmware:05-30-2017</product>
<product>oncellg3470a-lte_firmware:10-31-2016</product>
<product>wac-1001_v2_firmware:06-29-2017</product>
<product>wac-2004_firmware:06-29-2017</product>
</cve>
<cve id="CVE-2016-5905" level="MEDIUM">
<product>maximo_asset_management:7.5.0.0</product>
<product>maximo_asset_management:7.5.0.1</product>
<product>maximo_asset_management:7.5.0.2</product>
<product>maximo_asset_management:7.5.0.3</product>
<product>maximo_asset_management:7.5.0.4</product>
<product>maximo_asset_management:7.5.0.5</product>
<product>maximo_asset_management:7.5.0.6</product>
<product>maximo_asset_management:7.5.0.7</product>
<product>maximo_asset_management:7.5.0.8</product>
<product>maximo_asset_management:7.5.0.9</product>
<product>maximo_asset_management:7.6.0.0</product>
<product>maximo_asset_management:7.6.0.1</product>
<product>maximo_asset_management:7.6.0.2</product>
<product>maximo_asset_management:7.6.0.3</product>
<product>maximo_asset_management:7.6.0.4</product>
</cve>
<cve id="CVE-2016-8361" level="LOW">
<product>jenesys_bas_bridge:1.1.8</product>
</cve>
<cve id="CVE-2016-8360" level="MEDIUM">
<product>softcms:1.5</product>
</cve>
<cve id="CVE-2016-2277" level="MEDIUM">
<product>integrated_architecture_builder:9.6.0.7</product>
<product>integrated_architecture_builder:9.7.0.0</product>
<product>integrated_architecture_builder:9.7.0.1</product>
</cve>
<cve id="CVE-2016-2275" level="LOW">
<product>vesp211-232_firmware:1.5.1</product>
<product>vesp211-232_firmware:1.7.2</product>
<product>vesp211-eu_firmware:1.7.2</product>
</cve>
<cve id="CVE-2016-2274" level="MEDIUM">
<product>a850_telemetry_gateway_base_station_firmware:-</product>
</cve>
<cve id="CVE-2016-2901" level="MEDIUM">
<product>web_content_manager</product>
<product>websphere_portal:8.5.0.0</product>
</cve>
<cve id="CVE-2016-2272" level="LOW">
<product>eg2_web_control:4.04p</product>
</cve>
<cve id="CVE-2016-9018" level="MEDIUM">
<product>realplayer:18.1.5.705</product>
</cve>
<cve id="CVE-2016-9019" level="LOW">
<product>exponent_cms:2.3.9</product>
</cve>
<cve id="CVE-2016-9016" level="LOW">
<product>firejail:0.9.38.4</product>
</cve>
<cve id="CVE-2016-9017" level="LOW">
<product>mujs:5c337af4b3df80cf967e4f9f6a21522de84b392a</product>
</cve>
<cve id="CVE-2016-9015" level="HIGH">
<product>urllib3:1.17</product>
<product>urllib3:1.18</product>
</cve>
<cve id="CVE-2016-9012" level="LOW">
<product>cloudvision_portal:2016.1.2.0</product>
</cve>
<cve id="CVE-2016-2908" level="LOW">
<product>security_access_manager_9.0_firmware:9.0.0</product>
<product>security_access_manager_9.0_firmware:9.0.0.1</product>
<product>security_access_manager_9.0_firmware:9.0.1.0</product>
<product>security_access_manager_for_mobile_8.0_firmware:8.0.0.1</product>
<product>security_access_manager_for_mobile_8.0_firmware:8.0.0.2</product>
<product>security_access_manager_for_mobile_8.0_firmware:8.0.0.3</product>
<product>security_access_manager_for_mobile_8.0_firmware:8.0.0.5</product>
<product>security_access_manager_for_mobile_8.0_firmware:8.0.1.0</product>
<product>security_access_manager_for_mobile_8.0_firmware:8.0.1.2</product>
<product>security_access_manager_for_mobile_8.0_firmware:8.0.1.3</product>
<product>security_access_manager_for_mobile_8.0_firmware:8.0.1.4</product>
<product>security_access_manager_for_web_8.0_firmware:8.0.0.1</product>
<product>security_access_manager_for_web_8.0_firmware:8.0.0.2</product>
<product>security_access_manager_for_web_8.0_firmware:8.0.0.3</product>
<product>security_access_manager_for_web_8.0_firmware:8.0.0.5</product>
<product>security_access_manager_for_web_8.0_firmware:8.0.1.0</product>
<product>security_access_manager_for_web_8.0_firmware:8.0.1.2</product>
<product>security_access_manager_for_web_8.0_firmware:8.0.1.3</product>
<product>security_access_manager_for_web_8.0_firmware:8.0.1.4</product>
</cve>
<cve id="CVE-2016-9010" level="MEDIUM">
<product>integration_bus:9.0</product>
<product>integration_bus:10.0</product>
<product>websphere_message_broker:8.0</product>
</cve>
<cve id="CVE-2016-9011" level="MEDIUM">
<product>libwmf:0.2.8.4</product>
</cve>
<cve id="CVE-2016-5678" level="LOW">
<product>nvrmini_2:1.0.0</product>
<product>nvrmini_2:1.1.0</product>
<product>nvrmini_2:1.3.0</product>
<product>nvrmini_2:1.3.2</product>
<product>nvrmini_2:1.4.0</product>
<product>nvrmini_2:1.5.1</product>
<product>nvrmini_2:1.5.2</product>
<product>nvrmini_2:1.6.0</product>
<product>nvrmini_2:1.6.1</product>
<product>nvrmini_2:1.6.2</product>
<product>nvrmini_2:1.6.4</product>
<product>nvrmini_2:1.7.0</product>
<product>nvrmini_2:1.7.1</product>
<product>nvrmini_2:1.7.2</product>
<product>nvrmini_2:1.7.5</product>
<product>nvrmini_2:1.7.6</product>
<product>nvrmini_2:2.0.0</product>
<product>nvrmini_2:2.2.1</product>
<product>nvrmini_2:3.0.0</product>
<product>nvrsolo:1.0.0</product>
<product>nvrsolo:1.0.1</product>
<product>nvrsolo:1.1.0</product>
<product>nvrsolo:1.1.0.117</product>
<product>nvrsolo:1.1.1</product>
<product>nvrsolo:1.1.2</product>
<product>nvrsolo:1.2.0</product>
<product>nvrsolo:1.3.0</product>
<product>nvrsolo:1.75</product>
<product>nvrsolo:2.0.0</product>
<product>nvrsolo:2.0.1</product>
<product>nvrsolo:2.1.5</product>
<product>nvrsolo:2.2.2</product>
<product>nvrsolo:2.3</product>
<product>nvrsolo:2.3.1.20</product>
<product>nvrsolo:2.3.7.9</product>
<product>nvrsolo:2.3.7.10</product>
<product>nvrsolo:2.3.9.6</product>
<product>nvrsolo:3.0.0</product>
</cve>
<cve id="CVE-2016-5679" level="LOW">
<product>readynas_surveillance:1.1.2</product>
<product>nvrmini_2:1.7.6</product>
<product>nvrmini_2:2.0.0</product>
<product>nvrmini_2:2.2.1</product>
<product>nvrmini_2:3.0.0</product>
</cve>
<cve id="CVE-2016-5676" level="LOW">
<product>readynas_surveillance:1.1.1</product>
<product>readynas_surveillance:1.1.2</product>
<product>readynas_surveillance:1.2.0.4</product>
<product>readynas_surveillance:1.3.2.4</product>
<product>readynas_surveillance:1.3.2.14</product>
<product>readynas_surveillance:1.4.0</product>
<product>readynas_surveillance:1.4.1</product>
<product>readynas_surveillance:1.4.2</product>
<product>nvrmini_2:1.7.5</product>
<product>nvrmini_2:1.7.6</product>
<product>nvrmini_2:2.0.0</product>
<product>nvrmini_2:2.2.1</product>
<product>nvrmini_2:3.0.0</product>
<product>nvrsolo:1.75</product>
<product>nvrsolo:2.0.0</product>
<product>nvrsolo:2.0.1</product>
<product>nvrsolo:2.1.5</product>
<product>nvrsolo:2.2.2</product>
<product>nvrsolo:2.3</product>
<product>nvrsolo:2.3.1.20</product>
<product>nvrsolo:2.3.7.9</product>
<product>nvrsolo:2.3.7.10</product>
<product>nvrsolo:2.3.9.6</product>
<product>nvrsolo:3.0.0</product>
</cve>
<cve id="CVE-2016-5677" level="LOW">
<product>readynas_surveillance:1.1.1</product>
<product>readynas_surveillance:1.1.2</product>
<product>readynas_surveillance:1.2.0.4</product>
<product>readynas_surveillance:1.3.2.4</product>
<product>readynas_surveillance:1.3.2.14</product>
<product>readynas_surveillance:1.4.0</product>
<product>readynas_surveillance:1.4.1</product>
<product>readynas_surveillance:1.4.2</product>
<product>nvrmini_2:1.7.5</product>
<product>nvrmini_2:1.7.6</product>
<product>nvrmini_2:2.0.0</product>
<product>nvrmini_2:2.2.1</product>
<product>nvrmini_2:3.0.0</product>
<product>nvrsolo:1.0.0</product>
<product>nvrsolo:1.0.1</product>
<product>nvrsolo:1.1.0</product>
<product>nvrsolo:1.1.0.117</product>
<product>nvrsolo:1.1.1</product>
<product>nvrsolo:1.1.2</product>
<product>nvrsolo:1.2.0</product>
<product>nvrsolo:1.3.0</product>
<product>nvrsolo:1.75</product>
<product>nvrsolo:2.0.0</product>
<product>nvrsolo:2.0.1</product>
<product>nvrsolo:2.1.5</product>
<product>nvrsolo:2.2.2</product>
<product>nvrsolo:2.3</product>
<product>nvrsolo:2.3.1.20</product>
<product>nvrsolo:2.3.7.9</product>
<product>nvrsolo:2.3.7.10</product>
<product>nvrsolo:2.3.9.6</product>
<product>nvrsolo:3.0.0</product>
</cve>
<cve id="CVE-2016-5674" level="LOW">
<product>readynas_surveillance:1.1.1</product>
<product>readynas_surveillance:1.1.2</product>
<product>readynas_surveillance:1.2.0.4</product>
<product>readynas_surveillance:1.3.2.4</product>
<product>readynas_surveillance:1.3.2.14</product>
<product>readynas_surveillance:1.4.0</product>
<product>readynas_surveillance:1.4.1</product>
<product>readynas_surveillance:1.4.2</product>
<product>nvrmini_2:1.7.5</product>
<product>nvrmini_2:1.7.6</product>
<product>nvrmini_2:2.0.0</product>
<product>nvrmini_2:2.2.1</product>
<product>nvrmini_2:3.0.0</product>
<product>nvrsolo:1.75</product>
<product>nvrsolo:2.0.0</product>
<product>nvrsolo:2.0.1</product>
<product>nvrsolo:2.1.5</product>
<product>nvrsolo:2.2.2</product>
<product>nvrsolo:2.3</product>
<product>nvrsolo:2.3.1.20</product>
<product>nvrsolo:2.3.7.9</product>
<product>nvrsolo:2.3.7.10</product>
<product>nvrsolo:2.3.9.6</product>
<product>nvrsolo:3.0.0</product>
</cve>
<cve id="CVE-2016-5675" level="LOW">
<product>readynas_surveillance:1.1.1</product>
<product>readynas_surveillance:1.1.2</product>
<product>readynas_surveillance:1.2.0.4</product>
<product>readynas_surveillance:1.3.2.4</product>
<product>readynas_surveillance:1.3.2.14</product>
<product>readynas_surveillance:1.4.0</product>
<product>readynas_surveillance:1.4.1</product>
<product>readynas_surveillance:1.4.2</product>
<product>crystal:2.2.1</product>
<product>crystal:3.0.0</product>
<product>crystal:3.1.0</product>
<product>crystal:3.2.0</product>
<product>nvrmini_2:1.7.5</product>
<product>nvrmini_2:1.7.6</product>
<product>nvrmini_2:2.0.0</product>
<product>nvrmini_2:2.2.1</product>
<product>nvrmini_2:3.0.0</product>
<product>nvrsolo:1.0.0</product>
<product>nvrsolo:1.0.1</product>
<product>nvrsolo:1.1.0</product>
<product>nvrsolo:1.1.0.117</product>
<product>nvrsolo:1.1.1</product>
<product>nvrsolo:1.1.2</product>
<product>nvrsolo:1.2.0</product>
<product>nvrsolo:1.3.0</product>
<product>nvrsolo:1.75</product>
<product>nvrsolo:2.0.0</product>
<product>nvrsolo:2.0.1</product>
<product>nvrsolo:2.1.5</product>
<product>nvrsolo:2.2.2</product>
<product>nvrsolo:2.3</product>
<product>nvrsolo:2.3.1.20</product>
<product>nvrsolo:2.3.7.9</product>
<product>nvrsolo:2.3.7.10</product>
<product>nvrsolo:2.3.9.6</product>
<product>nvrsolo:3.0.0</product>
</cve>
<cve id="CVE-2016-5672" level="MEDIUM">
<product>crosswalk:19.49.514.4</product>
</cve>
<cve id="CVE-2016-5673" level="LOW">
<product>repeater:1201</product>
</cve>
<cve id="CVE-2016-5670" level="LOW">
<product>dm-txrx-100-str_firmware:1.2866.00026</product>
</cve>
<cve id="CVE-2016-5671" level="MEDIUM">
<product>dm-txrx-100-str_firmware:1.2866.00026</product>
</cve>
<cve id="CVE-2016-3108" level="LOW">
<product>pulp:2.8.2-1</product>
</cve>
<cve id="CVE-2016-8235" level="LOW">
<product>customer_care_software_development_kit:2.0.16</product>
</cve>
<cve id="CVE-2016-6469" level="LOW">
<product>web_security_appliance:9.0.1-162</product>
<product>web_security_appliance:9.1.1-074</product>
</cve>
<cve id="CVE-2016-8237" level="MEDIUM">
<product>updates:-</product>
</cve>
<cve id="CVE-2016-8231" level="LOW">
<product>lenovo_service_bridge:-</product>
</cve>
<cve id="CVE-2016-8230" level="LOW">
<product>lenovo_service_bridge:-</product>
</cve>
<cve id="CVE-2016-6462" level="LOW">
<product>email_security_appliance_firmware:9.7.1-06</product>
<product>email_security_appliance_firmware:10.0.0-082</product>
<product>email_security_appliance_firmware:10.0.0-125</product>
</cve>
<cve id="CVE-2016-8233" level="LOW">
<product>xclarity_administrator:1.2.1</product>
</cve>
<cve id="CVE-2016-3101" level="MEDIUM">
<product>extra_columns_plugin:1.16</product>
</cve>
<cve id="CVE-2016-6372" level="LOW">
<product>email_security_appliance:8.0.1-023</product>
<product>email_security_appliance:8.0_base</product>
<product>email_security_appliance:8.5.0-000</product>
<product>email_security_appliance:8.5.0-er1-198</product>
<product>email_security_appliance:8.5.6-052</product>
<product>email_security_appliance:8.5.6-073</product>
<product>email_security_appliance:8.5.6-074</product>
<product>email_security_appliance:8.5.6-106</product>
<product>email_security_appliance:8.5.6-113</product>
<product>email_security_appliance:8.5.7-042</product>
<product>email_security_appliance:8.6.0</product>
<product>email_security_appliance:8.6.0-011</product>
<product>email_security_appliance:8.9.0</product>
<product>email_security_appliance:8.9.1-000</product>
<product>email_security_appliance:8.9.2-032</product>
<product>email_security_appliance:9.0.0</product>
<product>email_security_appliance:9.0.0-212</product>
<product>email_security_appliance:9.0.0-461</product>
<product>email_security_appliance:9.0.5-000</product>
<product>email_security_appliance:9.1.0</product>
<product>email_security_appliance:9.1.0-011</product>
<product>email_security_appliance:9.1.0-032</product>
<product>email_security_appliance:9.1.0-101</product>
<product>email_security_appliance:9.1.1-000</product>
<product>email_security_appliance:9.4.0</product>
<product>email_security_appliance:9.4.4-000</product>
<product>email_security_appliance:9.5.0-000</product>
<product>email_security_appliance:9.5.0-201</product>
<product>email_security_appliance:9.6.0-000</product>
<product>email_security_appliance:9.6.0-042</product>
<product>email_security_appliance:9.6.0-051</product>
<product>email_security_appliance:9.7.0-125</product>
<product>email_security_appliance:9.7.1-066</product>
<product>email_security_appliance:9.9.6-026</product>
<product>email_security_appliance:9.9_base</product>
<product>web_security_appliance:5.6.0-623</product>
<product>web_security_appliance:6.0.0-000</product>
<product>web_security_appliance:7.1.0</product>
<product>web_security_appliance:7.1.1</product>
<product>web_security_appliance:7.1.2</product>
<product>web_security_appliance:7.1.3</product>
<product>web_security_appliance:7.1.4</product>
<product>web_security_appliance:7.5.0-000</product>
<product>web_security_appliance:7.5.0-825</product>
<product>web_security_appliance:7.5.1-000</product>
<product>web_security_appliance:7.5.2-000</product>
<product>web_security_appliance:7.5.2-hp2-303</product>
<product>web_security_appliance:7.7.0-000</product>
<product>web_security_appliance:7.7.0-608</product>
<product>web_security_appliance:7.7.1-000</product>
<product>web_security_appliance:7.7.5-835</product>
<product>web_security_appliance:8.0.0-000</product>
<product>web_security_appliance:8.0.5</product>
<product>web_security_appliance:8.0.6</product>
<product>web_security_appliance:8.0.6-078</product>
<product>web_security_appliance:8.0.6-119</product>
<product>web_security_appliance:8.0.7</product>
<product>web_security_appliance:8.0.7-142</product>
<product>web_security_appliance:8.0.8-mr-113</product>
<product>web_security_appliance:8.5.0-497</product>
<product>web_security_appliance:8.5.0.000</product>
<product>web_security_appliance:8.5.1-021</product>
<product>web_security_appliance:8.5.2-024</product>
<product>web_security_appliance:8.5.2-027</product>
<product>web_security_appliance:8.5.3-055</product>
<product>web_security_appliance:8.8.0-000</product>
<product>web_security_appliance:8.8.0-085</product>
<product>web_security_appliance:9.0.0-193</product>
<product>web_security_appliance:9.0_base</product>
<product>web_security_appliance:9.1.0-000</product>
<product>web_security_appliance:9.1.0-070</product>
<product>web_security_appliance:9.1_base</product>
<product>web_security_appliance:9.5.0-235</product>
<product>web_security_appliance:9.5.0-284</product>
<product>web_security_appliance:9.5.0-444</product>
<product>web_security_appliance:9.5_base</product>
<product>web_security_appliance_8.0.5:hot_patch_1</product>
</cve>
<cve id="CVE-2016-6466" level="LOW">
<product>asr_5000_series_software:20.0.0</product>
<product>asr_5000_series_software:20.0.2.3</product>
<product>asr_5000_series_software:20.0.2.v1</product>
<product>virtualized_packet_core:20.0_base</product>
</cve>
<cve id="CVE-2016-6370" level="LOW">
<product>hosted_collaboration_mediation_fulfillment:10.6%281%29_base</product>
<product>hosted_collaboration_mediation_fulfillment:10.6%282%29_base</product>
<product>hosted_collaboration_mediation_fulfillment:10.6%283%29_base</product>
</cve>
<cve id="CVE-2016-6371" level="LOW">
<product>hosted_collaboration_mediation_fulfillment:10.6%281%29_base</product>
<product>hosted_collaboration_mediation_fulfillment:10.6%282%29_base</product>
<product>hosted_collaboration_mediation_fulfillment:10.6%283%29_base</product>
</cve>
<cve id="CVE-2016-6376" level="LOW">
<product>wireless_lan_controller:3.0_base</product>
<product>wireless_lan_controller:3.1.59.24</product>
<product>wireless_lan_controller:3.1.105.0</product>
<product>wireless_lan_controller:3.1.111.0</product>
<product>wireless_lan_controller:3.2.78.0</product>
<product>wireless_lan_controller:3.2.116.21</product>
<product>wireless_lan_controller:3.2.150.6</product>
<product>wireless_lan_controller:3.2.150.10</product>
<product>wireless_lan_controller:3.2.171.5</product>
<product>wireless_lan_controller:3.2.171.6</product>
<product>wireless_lan_controller:3.2.185.0</product>
<product>wireless_lan_controller:3.2.193.5</product>
<product>wireless_lan_controller:3.2.195.10</product>
<product>wireless_lan_controller:3.6.0e</product>
<product>wireless_lan_controller:4.0.108</product>
<product>wireless_lan_controller:4.0.155.0</product>
<product>wireless_lan_controller:4.0.155.5</product>
<product>wireless_lan_controller:4.0.179.8</product>
<product>wireless_lan_controller:4.0.179.11</product>
<product>wireless_lan_controller:4.0.196</product>
<product>wireless_lan_controller:4.0.206.0</product>
<product>wireless_lan_controller:4.0.217.0</product>
<product>wireless_lan_controller:4.0.219.0</product>
<product>wireless_lan_controller:4.1.171.0</product>
<product>wireless_lan_controller:4.1.181.0</product>
<product>wireless_lan_controller:4.1.185.0</product>
<product>wireless_lan_controller:4.1_base</product>
<product>wireless_lan_controller:4.2.61.0</product>
<product>wireless_lan_controller:4.2.99.0</product>
<product>wireless_lan_controller:4.2.112.0</product>
<product>wireless_lan_controller:4.2.117.0</product>
<product>wireless_lan_controller:4.2.130.0</product>
<product>wireless_lan_controller:4.2.173.0</product>
<product>wireless_lan_controller:4.2.174.0</product>
<product>wireless_lan_controller:4.2.176.0</product>
<product>wireless_lan_controller:4.2.182.0</product>
<product>wireless_lan_controller:4.2_base</product>
<product>wireless_lan_controller:5.0.148.0</product>
<product>wireless_lan_controller:5.0.148.2</product>
<product>wireless_lan_controller:5.1.151.0</product>
<product>wireless_lan_controller:5.1.152.0</product>
<product>wireless_lan_controller:5.1.160.0</product>
<product>wireless_lan_controller:5.2.157.0</product>
<product>wireless_lan_controller:5.2.169.0</product>
<product>wireless_lan_controller:6.0_base</product>
<product>wireless_lan_controller:7.0_base</product>
<product>wireless_lan_controller:7.1_base</product>
<product>wireless_lan_controller:7.2_base</product>
<product>wireless_lan_controller:7.3.101.0</product>
<product>wireless_lan_controller:7.3.103.8</product>
<product>wireless_lan_controller:7.3.112</product>
<product>wireless_lan_controller:7.3_base</product>
<product>wireless_lan_controller:7.4.1.1</product>
<product>wireless_lan_controller:7.4.100</product>
<product>wireless_lan_controller:7.4.100.60</product>
<product>wireless_lan_controller:7.4.110.0</product>
<product>wireless_lan_controller:7.4.121.0</product>
<product>wireless_lan_controller:7.4_base</product>
<product>wireless_lan_controller:7.5.102.0</product>
<product>wireless_lan_controller:7.5.102.11</product>
<product>wireless_lan_controller:7.5_base</product>
<product>wireless_lan_controller:7.6.1.62</product>
<product>wireless_lan_controller:7.6.100.0</product>
<product>wireless_lan_controller:7.6.110.0</product>
<product>wireless_lan_controller:7.6.120.0</product>
<product>wireless_lan_controller:7.6.130.0</product>
<product>wireless_lan_controller:8.0.0</product>
<product>wireless_lan_controller:8.0.0.30220.385</product>
<product>wireless_lan_controller:8.0.72.140</product>
<product>wireless_lan_controller:8.0.100</product>
<product>wireless_lan_controller:8.0.115.0</product>
<product>wireless_lan_controller:8.0.120.0</product>
<product>wireless_lan_controller:8.0.121.0</product>
<product>wireless_lan_controller:8.1.0</product>
<product>wireless_lan_controller:8.1.104.37</product>
<product>wireless_lan_controller:8.1.111.0</product>
<product>wireless_lan_controller:8.1.122.0</product>
<product>wireless_lan_controller:8.1.130.0</product>
<product>wireless_lan_controller_6.0:182.0</product>
<product>wireless_lan_controller_6.0:188.0</product>
<product>wireless_lan_controller_6.0:196.0</product>
<product>wireless_lan_controller_6.0:199.4</product>
<product>wireless_lan_controller_6.0:202.0</product>
<product>wireless_lan_controller_7.0:98.0</product>
<product>wireless_lan_controller_7.0:98.218</product>
<product>wireless_lan_controller_7.0:116.0</product>
<product>wireless_lan_controller_7.0:220.0</product>
<product>wireless_lan_controller_7.0:240.0</product>
<product>wireless_lan_controller_7.0:250.0</product>
<product>wireless_lan_controller_7.0:252.0</product>
<product>wireless_lan_controller_7.1:91.0</product>
<product>wireless_lan_controller_7.2:103.0</product>
<product>wireless_lan_controller_7.4:1.19</product>
<product>wireless_lan_controller_7.4:1.54</product>
<product>wireless_lan_controller_7.4:140.0</product>
</cve>
<cve id="CVE-2016-6377" level="MEDIUM">
<product>media_origination_system_suite:2.3%281%29</product>
<product>media_origination_system_suite:2.3%282%29</product>
<product>media_origination_system_suite:2.3%286%29</product>
<product>media_origination_system_suite:2.3%287%29</product>
<product>media_origination_system_suite:2.3%288%29</product>
<product>media_origination_system_suite:2.3_base</product>
<product>media_origination_system_suite:2.4%281%29</product>
<product>media_origination_system_suite:2.4_base</product>
<product>media_origination_system_suite:2.5%280%29</product>
<product>media_origination_system_suite:2.5%281%29</product>
<product>media_origination_system_suite:2.5_base</product>
<product>media_origination_system_suite:2.6_base</product>
</cve>
<cve id="CVE-2016-6374" level="LOW">
<product>cloud_services_platform_2100:2.0.0_base</product>
</cve>
<cve id="CVE-2016-3107" level="LOW">
<product>pulp:2.8.2-1</product>
</cve>
<cve id="CVE-2016-6464" level="LOW">
<product>unified_communications_manager_im_and_presence_service:10.5%281%29</product>
<product>unified_communications_manager_im_and_presence_service:10.5%282%29</product>
<product>unified_communications_manager_im_and_presence_service:11.0%281%29</product>
<product>unified_communications_manager_im_and_presence_service:11.5%281%29</product>
</cve>
<cve id="CVE-2016-6465" level="MEDIUM">
<product>email_security_appliance:8.5.7-042</product>
<product>email_security_appliance:9.7.2-047</product>
<product>email_security_appliance:10.0.0-125</product>
<product>email_security_appliance:10.0.0-232</product>
</cve>
<cve id="CVE-2016-0455" level="LOW">
<product>enterprise_manager_grid_control:11.1.0.1</product>
<product>enterprise_manager_grid_control:11.2.0.4</product>
<product>enterprise_manager_grid_control:12.1.0.4</product>
<product>enterprise_manager_grid_control:12.1.0.5</product>
</cve>
<cve id="CVE-2016-0106" level="HIGH">
<product>internet_explorer:11</product>
</cve>
<cve id="CVE-2016-0457" level="LOW">
<product>e-business_suite:12.1</product>
<product>e-business_suite:12.2</product>
</cve>
<cve id="CVE-2016-0104" level="HIGH">
<product>internet_explorer:10</product>
</cve>
<cve id="CVE-2016-0103" level="HIGH">
<product>internet_explorer:11</product>
</cve>
<cve id="CVE-2016-0102" level="HIGH">
<product>edge</product>
<product>internet_explorer:11</product>
</cve>
<cve id="CVE-2016-6598" level="LOW">
<product>track-it%21:11.4</product>
<product>track-it%21:11.4</product>
<product>track-it%21:11.4</product>
</cve>
<cve id="CVE-2016-6599" level="LOW">
<product>track-it%21:11.4</product>
<product>track-it%21:11.4</product>
<product>track-it%21:11.4</product>
</cve>
<cve id="CVE-2016-6597" level="LOW">
<product>mobile_control_eas_proxy:3.5.0.3</product>
</cve>
<cve id="CVE-2016-6594" level="LOW">
<product>advanced_secure_gateway:6.6</product>
<product>cacheflow:3.4</product>
<product>proxysg:6.5</product>
<product>proxysg:6.6</product>
</cve>
<cve id="CVE-2016-6595" level="LOW">
<product>docker:1.12.0</product>
</cve>
<cve id="CVE-2016-8998" level="MEDIUM">
<product>tivoli_storage_manager:7.1.1</product>
<product>tivoli_storage_manager:7.1.1.1</product>
<product>tivoli_storage_manager:7.1.1.2</product>
<product>tivoli_storage_manager:7.1.1.100</product>
<product>tivoli_storage_manager:7.1.1.200</product>
<product>tivoli_storage_manager:7.1.1.300</product>
<product>tivoli_storage_manager:7.1.3</product>
<product>tivoli_storage_manager:7.1.3.000</product>
<product>tivoli_storage_manager:7.1.3.1</product>
<product>tivoli_storage_manager:7.1.3.2</product>
<product>tivoli_storage_manager:7.1.3.100</product>
<product>tivoli_storage_manager:7.1.4</product>
<product>tivoli_storage_manager:7.1.4.1</product>
<product>tivoli_storage_manager:7.1.4.2</product>
<product>tivoli_storage_manager:7.1.5</product>
<product>tivoli_storage_manager:7.1.5.200</product>
<product>tivoli_storage_manager:7.1.7</product>
</cve>
<cve id="CVE-2016-8999" level="MEDIUM">
<product>infosphere_datastage:8.7</product>
<product>infosphere_datastage:9.1</product>
<product>infosphere_datastage:11.3</product>
<product>infosphere_datastage:11.5</product>
<product>infosphere_information_server:8.7</product>
<product>infosphere_information_server:9.1</product>
<product>infosphere_information_server:11.3</product>
<product>infosphere_information_server:11.5</product>
<product>infosphere_information_server_on_cloud:11.5</product>
</cve>
<cve id="CVE-2016-8629" level="LOW">
<product>single_sign_on:7.1</product>
<product>single_sign_on:7.2</product>
</cve>
<cve id="CVE-2016-8623" level="LOW">
<product>curl:6.0</product>
<product>curl:6.1</product>
<product>curl:6.1</product>
<product>curl:6.2</product>
<product>curl:6.3</product>
<product>curl:6.3.1</product>
<product>curl:6.4</product>
<product>curl:6.5</product>
<product>curl:6.5.1</product>
<product>curl:6.5.2</product>
<product>curl:7.1</product>
<product>curl:7.1.1</product>
<product>curl:7.2</product>
<product>curl:7.2.1</product>
<product>curl:7.3</product>
<product>curl:7.4</product>
<product>curl:7.4.1</product>
<product>curl:7.4.2</product>
<product>curl:7.5</product>
<product>curl:7.5.1</product>
<product>curl:7.5.2</product>
<product>curl:7.6</product>
<product>curl:7.6.1</product>
<product>curl:7.7</product>
<product>curl:7.7.1</product>
<product>curl:7.7.2</product>
<product>curl:7.7.3</product>
<product>curl:7.8</product>
<product>curl:7.8.1</product>
<product>curl:7.9</product>
<product>curl:7.9.1</product>
<product>curl:7.9.2</product>
<product>curl:7.9.3</product>
<product>curl:7.9.4</product>
<product>curl:7.9.5</product>
<product>curl:7.9.6</product>
<product>curl:7.9.7</product>
<product>curl:7.9.8</product>
<product>curl:7.10</product>
<product>curl:7.10.1</product>
<product>curl:7.10.2</product>
<product>curl:7.10.3</product>
<product>curl:7.10.4</product>
<product>curl:7.10.5</product>
<product>curl:7.10.6</product>
<product>curl:7.10.7</product>
<product>curl:7.10.8</product>
<product>curl:7.11.0</product>
<product>curl:7.11.1</product>
<product>curl:7.11.2</product>
<product>curl:7.12.0</product>
<product>curl:7.12.1</product>
<product>curl:7.12.2</product>
<product>curl:7.12.3</product>
<product>curl:7.13.0</product>
<product>curl:7.13.1</product>
<product>curl:7.13.2</product>
<product>curl:7.14.0</product>
<product>curl:7.14.1</product>
<product>curl:7.15.0</product>
<product>curl:7.15.1</product>
<product>curl:7.15.2</product>
<product>curl:7.15.3</product>
<product>curl:7.15.4</product>
<product>curl:7.15.5</product>
<product>curl:7.16.0</product>
<product>curl:7.16.1</product>
<product>curl:7.16.2</product>
<product>curl:7.16.3</product>
<product>curl:7.16.4</product>
<product>curl:7.17.0</product>
<product>curl:7.17.1</product>
<product>curl:7.18.0</product>
<product>curl:7.18.1</product>
<product>curl:7.18.2</product>
<product>curl:7.19.0</product>
<product>curl:7.19.1</product>
<product>curl:7.19.2</product>
<product>curl:7.19.3</product>
<product>curl:7.19.4</product>
<product>curl:7.19.5</product>
<product>curl:7.19.6</product>
<product>curl:7.19.7</product>
<product>curl:7.20.0</product>
<product>curl:7.20.1</product>
<product>curl:7.21.0</product>
<product>curl:7.21.1</product>
<product>curl:7.21.2</product>
<product>curl:7.21.3</product>
<product>curl:7.21.4</product>
<product>curl:7.21.5</product>
<product>curl:7.21.6</product>
<product>curl:7.21.7</product>
<product>curl:7.22.0</product>
<product>curl:7.23.0</product>
<product>curl:7.23.1</product>
<product>curl:7.24.0</product>
<product>curl:7.25.0</product>
<product>curl:7.26.0</product>
<product>curl:7.27.0</product>
<product>curl:7.28.0</product>
<product>curl:7.28.1</product>
<product>curl:7.29.0</product>
<product>curl:7.30.0</product>
<product>curl:7.31.0</product>
<product>curl:7.32.0</product>
<product>curl:7.33.0</product>
<product>curl:7.34.0</product>
<product>curl:7.35.0</product>
<product>curl:7.36.0</product>
<product>curl:7.37.0</product>
<product>curl:7.37.1</product>
<product>curl:7.38.0</product>
<product>curl:7.39.0</product>
<product>curl:7.40.0</product>
<product>curl:7.41.0</product>
<product>curl:7.42.0</product>
<product>curl:7.42.1</product>
<product>curl:7.43.0</product>
<product>curl:7.44.0</product>
<product>curl:7.45.0</product>
<product>curl:7.46.0</product>
<product>curl:7.47.0</product>
<product>curl:7.47.1</product>
<product>curl:7.48.0</product>
<product>curl:7.49.0</product>
<product>curl:7.49.1</product>
<product>curl:7.50.0</product>
<product>curl:7.50.1</product>
<product>curl:7.50.2</product>
<product>curl:7.50.3</product>
</cve>
<cve id="CVE-2016-8620" level="LOW">
<product>curl:6.0</product>
<product>curl:6.1</product>
<product>curl:6.1</product>
<product>curl:6.2</product>
<product>curl:6.3</product>
<product>curl:6.3.1</product>
<product>curl:6.4</product>
<product>curl:6.5</product>
<product>curl:6.5.1</product>
<product>curl:6.5.2</product>
<product>curl:7.1</product>
<product>curl:7.1.1</product>
<product>curl:7.2</product>
<product>curl:7.2.1</product>
<product>curl:7.3</product>
<product>curl:7.4</product>
<product>curl:7.4.1</product>
<product>curl:7.4.2</product>
<product>curl:7.5</product>
<product>curl:7.5.1</product>
<product>curl:7.5.2</product>
<product>curl:7.6</product>
<product>curl:7.6.1</product>
<product>curl:7.7</product>
<product>curl:7.7.1</product>
<product>curl:7.7.2</product>
<product>curl:7.7.3</product>
<product>curl:7.8</product>
<product>curl:7.8.1</product>
<product>curl:7.9</product>
<product>curl:7.9.1</product>
<product>curl:7.9.2</product>
<product>curl:7.9.3</product>
<product>curl:7.9.4</product>
<product>curl:7.9.5</product>
<product>curl:7.9.6</product>
<product>curl:7.9.7</product>
<product>curl:7.9.8</product>
<product>curl:7.10</product>
<product>curl:7.10.1</product>
<product>curl:7.10.2</product>
<product>curl:7.10.3</product>
<product>curl:7.10.4</product>
<product>curl:7.10.5</product>
<product>curl:7.10.6</product>
<product>curl:7.10.7</product>
<product>curl:7.10.8</product>
<product>curl:7.11.0</product>
<product>curl:7.11.1</product>
<product>curl:7.11.2</product>
<product>curl:7.12.0</product>
<product>curl:7.12.1</product>
<product>curl:7.12.2</product>
<product>curl:7.12.3</product>
<product>curl:7.13.0</product>
<product>curl:7.13.1</product>
<product>curl:7.13.2</product>
<product>curl:7.14.0</product>
<product>curl:7.14.1</product>
<product>curl:7.15.0</product>
<product>curl:7.15.1</product>
<product>curl:7.15.2</product>
<product>curl:7.15.3</product>
<product>curl:7.15.4</product>
<product>curl:7.15.5</product>
<product>curl:7.16.0</product>
<product>curl:7.16.1</product>
<product>curl:7.16.2</product>
<product>curl:7.16.3</product>
<product>curl:7.16.4</product>
<product>curl:7.17.0</product>
<product>curl:7.17.1</product>
<product>curl:7.18.0</product>
<product>curl:7.18.1</product>
<product>curl:7.18.2</product>
<product>curl:7.19.0</product>
<product>curl:7.19.1</product>
<product>curl:7.19.2</product>
<product>curl:7.19.3</product>
<product>curl:7.19.4</product>
<product>curl:7.19.5</product>
<product>curl:7.19.6</product>
<product>curl:7.19.7</product>
<product>curl:7.20.0</product>
<product>curl:7.20.1</product>
<product>curl:7.21.0</product>
<product>curl:7.21.1</product>
<product>curl:7.21.2</product>
<product>curl:7.21.3</product>
<product>curl:7.21.4</product>
<product>curl:7.21.5</product>
<product>curl:7.21.6</product>
<product>curl:7.21.7</product>
<product>curl:7.22.0</product>
<product>curl:7.23.0</product>
<product>curl:7.23.1</product>
<product>curl:7.24.0</product>
<product>curl:7.25.0</product>
<product>curl:7.26.0</product>
<product>curl:7.27.0</product>
<product>curl:7.28.0</product>
<product>curl:7.28.1</product>
<product>curl:7.29.0</product>
<product>curl:7.30.0</product>
<product>curl:7.31.0</product>
<product>curl:7.32.0</product>
<product>curl:7.33.0</product>
<product>curl:7.34.0</product>
<product>curl:7.35.0</product>
<product>curl:7.36.0</product>
<product>curl:7.37.0</product>
<product>curl:7.37.1</product>
<product>curl:7.38.0</product>
<product>curl:7.39.0</product>
<product>curl:7.40.0</product>
<product>curl:7.41.0</product>
<product>curl:7.42.0</product>
<product>curl:7.42.1</product>
<product>curl:7.43.0</product>
<product>curl:7.44.0</product>
<product>curl:7.45.0</product>
<product>curl:7.46.0</product>
<product>curl:7.47.0</product>
<product>curl:7.47.1</product>
<product>curl:7.48.0</product>
<product>curl:7.49.0</product>
<product>curl:7.49.1</product>
<product>curl:7.50.0</product>
<product>curl:7.50.1</product>
<product>curl:7.50.2</product>
<product>curl:7.50.3</product>
</cve>
<cve id="CVE-2016-8627" level="MEDIUM">
<product>jboss_enterprise_application_platform:6.4.0</product>
<product>jboss_enterprise_application_platform:7.0.0</product>
<product>jboss_enterprise_application_platform:7.1.0</product>
<product>keycloak:-</product>
</cve>
<cve id="CVE-2016-10141" level="LOW">
<product>mujs:77ab465f1c394bb77f00966cd950650f3f53cb24</product>
</cve>
<cve id="CVE-2016-0437" level="MEDIUM">
<product>retail_applications:13.4</product>
<product>retail_applications:14.0</product>
<product>retail_applications:14.1</product>
</cve>
<cve id="CVE-2016-0436" level="MEDIUM">
<product>retail_applications:13.4</product>
<product>retail_applications:14.0</product>
<product>retail_applications:14.1</product>
</cve>
<cve id="CVE-2016-0435" level="MEDIUM">
<product>retail_applications:13.4</product>
<product>retail_applications:14.0</product>
<product>retail_applications:14.1</product>
</cve>
<cve id="CVE-2016-0434" level="MEDIUM">
<product>retail_applications:13.4</product>
<product>retail_applications:14.0</product>
<product>retail_applications:14.1</product>
</cve>
<cve id="CVE-2016-7421" level="LOW">
<product>qemu:-</product>
</cve>
<cve id="CVE-2016-7420" level="MEDIUM">
<product>crypto%2b%2b:5.6.4</product>
</cve>
<cve id="CVE-2016-7423" level="LOW">
<product>qemu:-</product>
</cve>
<cve id="CVE-2016-0430" level="MEDIUM">
<product>fusion_middleware:11.1.1.7.0</product>
<product>fusion_middleware:11.1.1.9</product>
</cve>
<cve id="CVE-2016-0439" level="LOW">
<product>fusion_middleware:11.1.1.7.0</product>
<product>fusion_middleware:11.1.1.9</product>
</cve>
<cve id="CVE-2016-0438" level="MEDIUM">
<product>retail_applications:13.4</product>
<product>retail_applications:14.0</product>
<product>retail_applications:14.1</product>
</cve>
<cve id="CVE-2016-4994" level="MEDIUM">
<product>gimp:2.8.16</product>
</cve>
<cve id="CVE-2016-4331" level="MEDIUM">
<product>hdf5:1.8.16</product>
</cve>
<cve id="CVE-2016-4996" level="MEDIUM">
<product>satellite:6.0</product>
</cve>
<cve id="CVE-2016-4333" level="MEDIUM">
<product>hdf5:1.8.16</product>
</cve>
<cve id="CVE-2016-4334" level="MEDIUM">
<product>jive:2016.3</product>
</cve>
<cve id="CVE-2016-4335" level="MEDIUM">
<product>perceptive_document_filters:-</product>
</cve>
<cve id="CVE-2016-4336" level="LOW">
<product>perceptive_document_filters:-</product>
</cve>
<cve id="CVE-2016-4337" level="LOW">
<product>photostore:4.7.4</product>
</cve>
<cve id="CVE-2016-4338" level="MEDIUM">
<product>zabbix:2.0.0</product>
<product>zabbix:2.0.1</product>
<product>zabbix:2.0.2</product>
<product>zabbix:2.0.3</product>
<product>zabbix:2.0.4</product>
<product>zabbix:2.0.5</product>
<product>zabbix:2.0.6</product>
<product>zabbix:2.0.7</product>
<product>zabbix:2.0.8</product>
<product>zabbix:2.0.9</product>
<product>zabbix:2.0.10</product>
<product>zabbix:2.0.11</product>
<product>zabbix:2.0.12</product>
<product>zabbix:2.0.13</product>
<product>zabbix:2.0.14</product>
<product>zabbix:2.0.15</product>
<product>zabbix:2.0.16</product>
<product>zabbix:2.0.17</product>
<product>zabbix:2.2.0</product>
<product>zabbix:2.2.1</product>
<product>zabbix:2.2.2</product>
<product>zabbix:2.2.3</product>
<product>zabbix:2.2.4</product>
<product>zabbix:2.2.5</product>
<product>zabbix:2.2.6</product>
<product>zabbix:2.2.7</product>
<product>zabbix:2.2.8</product>
<product>zabbix:2.2.9</product>
<product>zabbix:2.2.10</product>
<product>zabbix:2.2.11</product>
<product>zabbix:2.2.12</product>
<product>zabbix:3.0.0</product>
<product>zabbix:3.0.2</product>
</cve>
<cve id="CVE-2016-1219" level="LOW">
<product>garoon:4.2.1</product>
</cve>
<cve id="CVE-2016-4999" level="LOW">
<product>dashbuilder:-</product>
<product>jboss_bpm_suite:6.0.0</product>
<product>jboss_bpm_suite:6.0.1</product>
<product>jboss_bpm_suite:6.0.3</product>
<product>jboss_bpm_suite:6.1</product>
<product>jboss_bpm_suite:6.1.2</product>
<product>jboss_enterprise_brms_platform:5.0.0</product>
<product>jboss_enterprise_brms_platform:5.3.1</product>
<product>jboss_enterprise_brms_platform:6.0.0</product>
<product>jboss_enterprise_brms_platform:6.0.1</product>
<product>jboss_enterprise_brms_platform:6.0.2</product>
<product>jboss_enterprise_brms_platform:6.0.3</product>
<product>jboss_enterprise_brms_platform:6.1</product>
<product>jboss_enterprise_brms_platform:6.3</product>
</cve>
<cve id="CVE-2016-3524" level="LOW">
<product>e-business_suite:12.1.3</product>
<product>e-business_suite:12.2.3</product>
<product>e-business_suite:12.2.4</product>
<product>e-business_suite:12.2.5</product>
</cve>
<cve id="CVE-2016-3525" level="HIGH">
<product>applications_manager:12.1.3</product>
</cve>
<cve id="CVE-2016-3526" level="LOW">
<product>agile_product_lifecycle_management_framework:9.3.4</product>
<product>agile_product_lifecycle_management_framework:9.3.5</product>
</cve>
<cve id="CVE-2016-3527" level="LOW">
<product>demand_planning:12.1</product>
<product>demand_planning:12.2</product>
</cve>
<cve id="CVE-2016-3520" level="LOW">
<product>e-business_suite:12.1.3</product>
<product>e-business_suite:12.2.3</product>
<product>e-business_suite:12.2.4</product>
<product>e-business_suite:12.2.5</product>
</cve>
<cve id="CVE-2016-3522" level="LOW">
<product>web_applications_desktop_integrator:12.1.3</product>
<product>web_applications_desktop_integrator:12.2.3</product>
<product>web_applications_desktop_integrator:12.2.4</product>
<product>web_applications_desktop_integrator:12.2.5</product>
</cve>
<cve id="CVE-2016-3523" level="MEDIUM">
<product>web_applications_desktop_integrator:12.1.3</product>
<product>web_applications_desktop_integrator:12.2.3</product>
<product>web_applications_desktop_integrator:12.2.4</product>
<product>web_applications_desktop_integrator:12.2.5</product>
</cve>
<cve id="CVE-2016-3528" level="LOW">
<product>internet_expenses:12.1.1</product>
<product>internet_expenses:12.1.2</product>
<product>internet_expenses:12.1.3</product>
<product>internet_expenses:12.2.3</product>
<product>internet_expenses:12.2.4</product>
<product>internet_expenses:12.2.5</product>
</cve>
<cve id="CVE-2016-3529" level="LOW">
<product>agile_product_lifecycle_management_framework:9.3.4</product>
<product>agile_product_lifecycle_management_framework:9.3.5</product>
</cve>
<cve id="CVE-2016-4591" level="LOW">
<product>webkit</product>
</cve>
<cve id="CVE-2016-0299" level="LOW">
<product>tririga_application_platform:3.3.0.0</product>
<product>tririga_application_platform:3.3.0.1</product>
<product>tririga_application_platform:3.3.0.2</product>
<product>tririga_application_platform:3.3.1.0</product>
<product>tririga_application_platform:3.3.1.1</product>
<product>tririga_application_platform:3.3.1.2</product>
<product>tririga_application_platform:3.3.1.3</product>
<product>tririga_application_platform:3.3.2.0</product>
<product>tririga_application_platform:3.3.2.1</product>
<product>tririga_application_platform:3.3.2.3</product>
<product>tririga_application_platform:3.3.2.4</product>
<product>tririga_application_platform:3.3.2.5</product>
<product>tririga_application_platform:3.4.0.0</product>
<product>tririga_application_platform:3.4.1.1</product>
<product>tririga_application_platform:3.4.1.2</product>
<product>tririga_application_platform:3.4.1.3</product>
<product>tririga_application_platform:3.4.2.0</product>
<product>tririga_application_platform:3.4.2.1</product>
<product>tririga_application_platform:3.4.2.2</product>
<product>tririga_application_platform:3.5.0.0</product>
</cve>
<cve id="CVE-2016-0298" level="LOW">
<product>security_guardium:10.0</product>
</cve>
<cve id="CVE-2016-0293" level="MEDIUM">
<product>bigfix_platform:9.0.5</product>
<product>bigfix_platform:9.0.6</product>
<product>bigfix_platform:9.0.7</product>
<product>bigfix_platform:9.0.8</product>
<product>bigfix_platform:9.1.3</product>
<product>bigfix_platform:9.1.4</product>
<product>bigfix_platform:9.1.5</product>
<product>bigfix_platform:9.1.6</product>
<product>bigfix_platform:9.1.7</product>
<product>bigfix_platform:9.2.0</product>
<product>bigfix_platform:9.2.1</product>
<product>bigfix_platform:9.2.2</product>
<product>bigfix_platform:9.2.3</product>
<product>bigfix_platform:9.2.4</product>
<product>bigfix_platform:9.2.5</product>
<product>bigfix_platform:9.2.6</product>
<product>bigfix_platform:9.2.7</product>
</cve>
<cve id="CVE-2016-0292" level="LOW">
<product>bigfix:9.0</product>
<product>bigfix:9.1</product>
<product>bigfix:9.2</product>
<product>bigfix:9.5</product>
</cve>
<cve id="CVE-2016-0291" level="LOW">
<product>bigfix_platform:9.0</product>
<product>bigfix_platform:9.1</product>
<product>bigfix_platform:9.1.3</product>
<product>bigfix_platform:9.1.4</product>
<product>bigfix_platform:9.1.5</product>
<product>bigfix_platform:9.1.6</product>
<product>bigfix_platform:9.1.7</product>
<product>bigfix_platform:9.2</product>
<product>bigfix_platform:9.2.0</product>
<product>bigfix_platform:9.2.1</product>
<product>bigfix_platform:9.2.2</product>
<product>bigfix_platform:9.2.3</product>
<product>bigfix_platform:9.2.4</product>
<product>bigfix_platform:9.2.5</product>
<product>bigfix_platform:9.2.6</product>
<product>bigfix_platform:9.2.7</product>
</cve>
<cve id="CVE-2016-0297" level="MEDIUM">
<product>bigfix_platform:9.0</product>
<product>bigfix_platform:9.1</product>
<product>bigfix_platform:9.2</product>
<product>bigfix_platform:9.5</product>
</cve>
<cve id="CVE-2016-0296" level="LOW">
<product>bigfix_platform:9.0</product>
<product>bigfix_platform:9.1</product>
<product>bigfix_platform:9.2</product>
<product>bigfix_platform:9.5</product>
</cve>
<cve id="CVE-2016-0295" level="MEDIUM">
<product>bigfix_platform:9.0</product>
<product>bigfix_platform:9.1</product>
<product>bigfix_platform:9.2</product>
<product>bigfix_platform:9.5</product>
</cve>
<cve id="CVE-2016-9575" level="LOW">
<product>freeipa:4.2.0</product>
<product>freeipa:4.2.0</product>
<product>freeipa:4.2.1</product>
<product>freeipa:4.2.2</product>
<product>freeipa:4.2.3</product>
<product>freeipa:4.2.4</product>
<product>freeipa:4.3.0</product>
<product>freeipa:4.3.1</product>
<product>freeipa:4.3.2</product>
<product>freeipa:4.4.0</product>
<product>freeipa:4.4.1</product>
<product>freeipa:4.4.2</product>
</cve>
<cve id="CVE-2016-9570" level="LOW">
<product>carbon_black:5.1.1.60603</product>
</cve>
<cve id="CVE-2016-2862" level="MEDIUM">
<product>websphere_commerce:6.0</product>
<product>websphere_commerce:6.0.0.1</product>
<product>websphere_commerce:6.0.0.2</product>
<product>websphere_commerce:6.0.0.3</product>
<product>websphere_commerce:6.0.0.4</product>
<product>websphere_commerce:6.0.0.5</product>
<product>websphere_commerce:6.0.0.6</product>
<product>websphere_commerce:6.0.0.7</product>
<product>websphere_commerce:6.0.0.8</product>
<product>websphere_commerce:6.0.0.9</product>
<product>websphere_commerce:6.0.0.10</product>
<product>websphere_commerce:6.0.0.11</product>
<product>websphere_commerce:7.0</product>
<product>websphere_commerce:7.0.0.1</product>
<product>websphere_commerce:7.0.0.2</product>
<product>websphere_commerce:7.0.0.3</product>
<product>websphere_commerce:7.0.0.4</product>
<product>websphere_commerce:7.0.0.5</product>
<product>websphere_commerce:7.0.0.6</product>
<product>websphere_commerce:7.0.0.7</product>
<product>websphere_commerce:7.0.0.8</product>
<product>websphere_commerce:7.0.0.9</product>
<product>websphere_commerce:8.0</product>
<product>websphere_commerce:8.0.0.1</product>
<product>websphere_commerce:8.0.0.2</product>
<product>websphere_commerce:8.0.0.3</product>
<product>websphere_commerce:8.0.0.4</product>
</cve>
<cve id="CVE-2016-5063" level="LOW">
<product>server_automation:8.6</product>
<product>server_automation:8.7</product>
</cve>
<cve id="CVE-2016-5062" level="MEDIUM">
<product>aternity:9.0</product>
</cve>
<cve id="CVE-2016-5061" level="MEDIUM">
<product>aternity:9.0</product>
</cve>
<cve id="CVE-2016-5060" level="MEDIUM">
<product>ngrinder:3.3</product>
</cve>
<cve id="CVE-2016-5067" level="LOW">
<product>aleos_firmware:4.3.2</product>
</cve>
<cve id="CVE-2016-5066" level="LOW">
<product>aleos_firmware:4.3.2</product>
</cve>
<cve id="CVE-2016-5065" level="LOW">
<product>aleos_firmware:4.3.2</product>
</cve>
<cve id="CVE-2016-5069" level="LOW">
<product>aleos_firmware:4.3.2</product>
</cve>
<cve id="CVE-2016-5068" level="LOW">
<product>aleos_firmware:4.3.2</product>
</cve>
<cve id="CVE-2016-2863" level="MEDIUM">
<product>websphere_commerce:7.0</product>
<product>websphere_commerce:8.0</product>
<product>websphere_commerce:8.0.0.1</product>
<product>websphere_commerce:8.0.0.2</product>
<product>websphere_commerce:8.0.0.3</product>
<product>websphere_commerce:8.0.0.5</product>
<product>websphere_commerce:8.0.0.6</product>
<product>websphere_commerce:8.0.0.7</product>
<product>websphere_commerce:8.0.0.8</product>
<product>websphere_commerce:8.0.0.9</product>
</cve>
<cve id="CVE-2016-9711" level="LOW">
<product>cognos_analytics:11.0.0.0</product>
</cve>
<cve id="CVE-2016-9710" level="LOW">
<product>cognos_business_intelligence_server:10.1.1</product>
<product>cognos_business_intelligence_server:10.2.0</product>
<product>cognos_business_intelligence_server:10.2.1</product>
<product>cognos_business_intelligence_server:10.2.1.1</product>
<product>cognos_business_intelligence_server:10.2.2</product>
</cve>
<cve id="CVE-2016-9715" level="MEDIUM">
<product>infosphere_master_data_management_server:11.0</product>
<product>infosphere_master_data_management_server:11.3</product>
<product>infosphere_master_data_management_server:11.4</product>
<product>infosphere_master_data_management_server:11.5</product>
<product>infosphere_master_data_management_server:11.6</product>
</cve>
<cve id="CVE-2016-9714" level="MEDIUM">
<product>infosphere_master_data_management_server:10.1</product>
<product>infosphere_master_data_management_server:11.0</product>
<product>infosphere_master_data_management_server:11.3</product>
<product>infosphere_master_data_management_server:11.4</product>
<product>infosphere_master_data_management_server:11.5</product>
<product>infosphere_master_data_management_server:11.6</product>
</cve>
<cve id="CVE-2016-9717" level="LOW">
<product>infosphere_master_data_management_server:10.1</product>
<product>infosphere_master_data_management_server:11.0</product>
<product>infosphere_master_data_management_server:11.3</product>
<product>infosphere_master_data_management_server:11.4</product>
<product>infosphere_master_data_management_server:11.5</product>
<product>infosphere_master_data_management_server:11.6</product>
</cve>
<cve id="CVE-2016-9716" level="MEDIUM">
<product>infosphere_master_data_management_server:11.0</product>
<product>infosphere_master_data_management_server:11.3</product>
<product>infosphere_master_data_management_server:11.4</product>
<product>infosphere_master_data_management_server:11.5</product>
<product>infosphere_master_data_management_server:11.6</product>
</cve>
<cve id="CVE-2016-9719" level="MEDIUM">
<product>infosphere_master_data_management_server:10.1</product>
<product>infosphere_master_data_management_server:11.0</product>
<product>infosphere_master_data_management_server:11.3</product>
<product>infosphere_master_data_management_server:11.4</product>
<product>infosphere_master_data_management_server:11.5</product>
<product>infosphere_master_data_management_server:11.6</product>
</cve>
<cve id="CVE-2016-9718" level="MEDIUM">
<product>infosphere_master_data_management_server:10.1</product>
<product>infosphere_master_data_management_server:11.0</product>
<product>infosphere_master_data_management_server:11.3</product>
<product>infosphere_master_data_management_server:11.4</product>
<product>infosphere_master_data_management_server:11.5</product>
<product>infosphere_master_data_management_server:11.6</product>
</cve>
<cve id="CVE-2016-4196" level="MEDIUM">
<product>acrobat:11.0.16</product>
<product>acrobat_dc:15.006.30174</product>
<product>acrobat_dc:15.016.20045</product>
<product>acrobat_reader_dc:15.006.30174</product>
<product>acrobat_reader_dc:15.016.20045</product>
<product>reader:11.0.16</product>
</cve>
<cve id="CVE-2016-4197" level="MEDIUM">
<product>acrobat:11.0.16</product>
<product>acrobat_dc:15.006.30174</product>
<product>acrobat_dc:15.016.20045</product>
<product>acrobat_reader_dc:15.006.30174</product>
<product>acrobat_reader_dc:15.016.20045</product>
<product>reader:11.0.16</product>
</cve>
<cve id="CVE-2016-4191" level="LOW">
<product>acrobat:11.0.16</product>
<product>acrobat_dc:15.006.30174</product>
<product>acrobat_dc:15.016.20045</product>
<product>acrobat_reader_dc:15.006.30174</product>
<product>acrobat_reader_dc:15.016.20045</product>
<product>reader:11.0.16</product>
</cve>
<cve id="CVE-2016-4192" level="LOW">
<product>acrobat:11.0.16</product>
<product>acrobat_dc:15.006.30174</product>
<product>acrobat_dc:15.016.20045</product>
<product>acrobat_reader_dc:15.006.30174</product>
<product>acrobat_reader_dc:15.016.20045</product>
<product>reader:11.0.16</product>
</cve>
<cve id="CVE-2016-4193" level="LOW">
<product>acrobat:11.0.16</product>
<product>acrobat_dc:15.006.30174</product>
<product>acrobat_dc:15.016.20045</product>
<product>acrobat_reader_dc:15.006.30174</product>
<product>acrobat_reader_dc:15.016.20045</product>
<product>reader:11.0.16</product>
</cve>
<cve id="CVE-2016-5249" level="LOW">
<product>solution_center:3.3.002</product>
</cve>
<cve id="CVE-2016-5248" level="LOW">
<product>solution_center:3.3.002</product>
</cve>
<cve id="CVE-2016-5247" level="LOW">
<product>bios:-</product>
</cve>
<cve id="CVE-2016-5242" level="MEDIUM">
<product>xen:4.4.0</product>
<product>xen:4.4.0</product>
<product>xen:4.4.1</product>
<product>xen:4.4.2</product>
<product>xen:4.4.3</product>
<product>xen:4.4.4</product>
<product>xen:4.5.0</product>
<product>xen:4.5.1</product>
<product>xen:4.5.2</product>
<product>xen:4.5.3</product>
<product>xen:4.6.0</product>
<product>xen:4.6.1</product>
</cve>
<cve id="CVE-2016-5241" level="MEDIUM">
<product>graphicsmagick:1.3.23</product>
<product>leap:42.1</product>
<product>opensuse:13.2</product>
</cve>
<cve id="CVE-2016-5240" level="MEDIUM">
<product>graphicsmagick:1.3.23</product>
</cve>
<cve id="CVE-2016-2861" level="MEDIUM">
<product>websphere_extreme_scale:7.1.0</product>
<product>websphere_extreme_scale:7.1.0.2</product>
<product>websphere_extreme_scale:7.1.1</product>
<product>websphere_extreme_scale:8.5.0</product>
<product>websphere_extreme_scale:8.5.0.1</product>
<product>websphere_extreme_scale:8.5.0.2</product>
<product>websphere_extreme_scale:8.6.0</product>
<product>websphere_extreme_scale:8.6.0.0</product>
<product>websphere_extreme_scale:8.6.0.1</product>
<product>websphere_extreme_scale:8.6.0.2</product>
<product>websphere_extreme_scale:8.6.0.3</product>
<product>websphere_extreme_scale:8.6.0.4</product>
<product>websphere_extreme_scale:8.6.0.5</product>
<product>websphere_extreme_scale:8.6.0.6</product>
<product>websphere_extreme_scale:8.6.0.7</product>
</cve>
<cve id="CVE-2016-7976" level="MEDIUM">
<product>ghostscript:9.18</product>
<product>ghostscript:9.20</product>
</cve>
<cve id="CVE-2016-7975" level="LOW">
<product>tcpdump:4.8.1</product>
</cve>
<cve id="CVE-2016-7974" level="LOW">
<product>tcpdump:4.8.1</product>
</cve>
<cve id="CVE-2016-6484" level="MEDIUM">
<product>netmri:7.0.1</product>
</cve>
<cve id="CVE-2016-2864" level="MEDIUM">
<product>rational_collaborative_lifecycle_management:3.0.1.6</product>
<product>rational_collaborative_lifecycle_management:4.0.0</product>
<product>rational_collaborative_lifecycle_management:4.0.1</product>
<product>rational_collaborative_lifecycle_management:4.0.2</product>
<product>rational_collaborative_lifecycle_management:4.0.3</product>
<product>rational_collaborative_lifecycle_management:4.0.4</product>
<product>rational_collaborative_lifecycle_management:4.0.5</product>
<product>rational_collaborative_lifecycle_management:4.0.6</product>
<product>rational_collaborative_lifecycle_management:4.0.7</product>
<product>rational_collaborative_lifecycle_management:5.0.0</product>
<product>rational_collaborative_lifecycle_management:5.0.1</product>
<product>rational_collaborative_lifecycle_management:5.0.2</product>
<product>rational_collaborative_lifecycle_management:6.0.0</product>
<product>rational_collaborative_lifecycle_management:6.0.1</product>
<product>rational_collaborative_lifecycle_management:6.0.2</product>
<product>rational_doors_next_generation:4.0.0</product>
<product>rational_doors_next_generation:4.0.1</product>
<product>rational_doors_next_generation:4.0.2</product>
<product>rational_doors_next_generation:4.0.3</product>
<product>rational_doors_next_generation:4.0.4</product>
<product>rational_doors_next_generation:4.0.5</product>
<product>rational_doors_next_generation:4.0.6</product>
<product>rational_doors_next_generation:4.0.7</product>
<product>rational_doors_next_generation:5.0.0</product>
<product>rational_doors_next_generation:5.0.1</product>
<product>rational_doors_next_generation:5.0.2</product>
<product>rational_doors_next_generation:6.0.0</product>
<product>rational_doors_next_generation:6.0.1</product>
<product>rational_doors_next_generation:6.0.2</product>
<product>rational_engineering_lifecycle_manager:4.0.0</product>
<product>rational_engineering_lifecycle_manager:4.0.1</product>
<product>rational_engineering_lifecycle_manager:4.0.2</product>
<product>rational_engineering_lifecycle_manager:4.0.3</product>
<product>rational_engineering_lifecycle_manager:4.0.4</product>
<product>rational_engineering_lifecycle_manager:4.0.5</product>
<product>rational_engineering_lifecycle_manager:4.0.6</product>
<product>rational_engineering_lifecycle_manager:4.0.7</product>
<product>rational_engineering_lifecycle_manager:5.0.0</product>
<product>rational_engineering_lifecycle_manager:5.0.1</product>
<product>rational_engineering_lifecycle_manager:5.0.2</product>
<product>rational_engineering_lifecycle_manager:6.0.0</product>
<product>rational_engineering_lifecycle_manager:6.0.1</product>
<product>rational_engineering_lifecycle_manager:6.0.2</product>
<product>rational_quality_manager:3.0.1.6</product>
<product>rational_quality_manager:4.0.0</product>
<product>rational_quality_manager:4.0.1</product>
<product>rational_quality_manager:4.0.2</product>
<product>rational_quality_manager:4.0.3</product>
<product>rational_quality_manager:4.0.4</product>
<product>rational_quality_manager:4.0.5</product>
<product>rational_quality_manager:4.0.6</product>
<product>rational_quality_manager:4.0.7</product>
<product>rational_quality_manager:5.0.0</product>
<product>rational_quality_manager:5.0.1</product>
<product>rational_quality_manager:5.0.2</product>
<product>rational_quality_manager:6.0.0</product>
<product>rational_quality_manager:6.0.1</product>
<product>rational_quality_manager:6.0.2</product>
<product>rational_rhapsody_design_manager:4.0</product>
<product>rational_rhapsody_design_manager:4.0.1</product>
<product>rational_rhapsody_design_manager:4.0.2</product>
<product>rational_rhapsody_design_manager:4.0.3</product>
<product>rational_rhapsody_design_manager:4.0.4</product>
<product>rational_rhapsody_design_manager:4.0.5</product>
<product>rational_rhapsody_design_manager:4.0.6</product>
<product>rational_rhapsody_design_manager:4.0.7</product>
<product>rational_rhapsody_design_manager:5.0.0</product>
<product>rational_rhapsody_design_manager:5.0.1</product>
<product>rational_rhapsody_design_manager:5.0.2</product>
<product>rational_rhapsody_design_manager:6.0.0</product>
<product>rational_rhapsody_design_manager:6.0.1</product>
<product>rational_rhapsody_design_manager:6.0.2</product>
<product>rational_software_architect_design_manager:4.0.0</product>
<product>rational_software_architect_design_manager:4.0.1</product>
<product>rational_software_architect_design_manager:4.0.2</product>
<product>rational_software_architect_design_manager:4.0.3</product>
<product>rational_software_architect_design_manager:4.0.4</product>
<product>rational_software_architect_design_manager:4.0.5</product>
<product>rational_software_architect_design_manager:4.0.6</product>
<product>rational_software_architect_design_manager:4.0.7</product>
<product>rational_software_architect_design_manager:5.0.0</product>
<product>rational_software_architect_design_manager:5.0.1</product>
<product>rational_software_architect_design_manager:5.0.2</product>
<product>rational_software_architect_design_manager:6.0.0</product>
<product>rational_software_architect_design_manager:6.0.1</product>
<product>rational_software_architect_design_manager:6.0.2</product>
<product>rational_team_concert:3.0.1.6</product>
<product>rational_team_concert:4.0.0</product>
<product>rational_team_concert:4.0.1</product>
<product>rational_team_concert:4.0.2</product>
<product>rational_team_concert:4.0.3</product>
<product>rational_team_concert:4.0.4</product>
<product>rational_team_concert:4.0.5</product>
<product>rational_team_concert:4.0.6</product>
<product>rational_team_concert:4.0.7</product>
<product>rational_team_concert:5.0.0</product>
<product>rational_team_concert:5.0.1</product>
<product>rational_team_concert:5.0.2</product>
<product>rational_team_concert:6.0.0</product>
<product>rational_team_concert:6.0.1</product>
<product>rational_team_concert:6.0.2</product>
</cve>
<cve id="CVE-2016-7973" level="LOW">
<product>tcpdump:4.8.1</product>
</cve>
<cve id="CVE-2016-2048" level="MEDIUM">
<product>django:1.9</product>
<product>django:1.9.1</product>
</cve>
<cve id="CVE-2016-2049" level="MEDIUM">
<product>php-openid</product>
</cve>
<cve id="CVE-2016-2040" level="MEDIUM">
<product>phpmyadmin:4.0.0</product>
<product>phpmyadmin:4.0.0</product>
<product>phpmyadmin:4.0.0</product>
<product>phpmyadmin:4.0.1</product>
<product>phpmyadmin:4.0.10</product>
<product>phpmyadmin:4.0.10.1</product>
<product>phpmyadmin:4.0.10.2</product>
<product>phpmyadmin:4.0.10.3</product>
<product>phpmyadmin:4.0.10.4</product>
<product>phpmyadmin:4.0.10.5</product>
<product>phpmyadmin:4.0.10.6</product>
<product>phpmyadmin:4.0.10.7</product>
<product>phpmyadmin:4.0.10.8</product>
<product>phpmyadmin:4.0.10.9</product>
<product>phpmyadmin:4.0.10.10</product>
<product>phpmyadmin:4.0.10.11</product>
<product>phpmyadmin:4.0.10.12</product>
<product>phpmyadmin:4.4.0</product>
<product>phpmyadmin:4.4.1</product>
<product>phpmyadmin:4.4.1.1</product>
<product>phpmyadmin:4.4.2</product>
<product>phpmyadmin:4.4.3</product>
<product>phpmyadmin:4.4.4</product>
<product>phpmyadmin:4.4.5</product>
<product>phpmyadmin:4.4.6</product>
<product>phpmyadmin:4.4.6.1</product>
<product>phpmyadmin:4.4.7</product>
<product>phpmyadmin:4.4.8</product>
<product>phpmyadmin:4.4.9</product>
<product>phpmyadmin:4.4.10</product>
<product>phpmyadmin:4.4.11</product>
<product>phpmyadmin:4.4.12</product>
<product>phpmyadmin:4.4.13</product>
<product>phpmyadmin:4.4.13.1</product>
<product>phpmyadmin:4.4.14.1</product>
<product>phpmyadmin:4.4.15</product>
<product>phpmyadmin:4.4.15.1</product>
<product>phpmyadmin:4.4.15.2</product>
<product>phpmyadmin:4.4.15.3</product>
<product>phpmyadmin:4.5.0</product>
<product>phpmyadmin:4.5.0.1</product>
<product>phpmyadmin:4.5.0.2</product>
<product>phpmyadmin:4.5.1</product>
<product>phpmyadmin:4.5.2</product>
<product>phpmyadmin:4.5.3</product>
<product>fedora:22</product>
<product>fedora:23</product>
<product>leap:42.1</product>
<product>opensuse:13.1</product>
<product>opensuse:13.2</product>
</cve>
<cve id="CVE-2016-2041" level="LOW">
<product>phpmyadmin:4.0.0</product>
<product>phpmyadmin:4.0.0</product>
<product>phpmyadmin:4.0.0</product>
<product>phpmyadmin:4.0.1</product>
<product>phpmyadmin:4.0.10</product>
<product>phpmyadmin:4.0.10.1</product>
<product>phpmyadmin:4.0.10.2</product>
<product>phpmyadmin:4.0.10.3</product>
<product>phpmyadmin:4.0.10.4</product>
<product>phpmyadmin:4.0.10.5</product>
<product>phpmyadmin:4.0.10.6</product>
<product>phpmyadmin:4.0.10.7</product>
<product>phpmyadmin:4.0.10.8</product>
<product>phpmyadmin:4.0.10.9</product>
<product>phpmyadmin:4.0.10.10</product>
<product>phpmyadmin:4.0.10.11</product>
<product>phpmyadmin:4.0.10.12</product>
<product>phpmyadmin:4.4.0</product>
<product>phpmyadmin:4.4.1</product>
<product>phpmyadmin:4.4.1.1</product>
<product>phpmyadmin:4.4.2</product>
<product>phpmyadmin:4.4.3</product>
<product>phpmyadmin:4.4.4</product>
<product>phpmyadmin:4.4.5</product>
<product>phpmyadmin:4.4.6</product>
<product>phpmyadmin:4.4.6.1</product>
<product>phpmyadmin:4.4.7</product>
<product>phpmyadmin:4.4.8</product>
<product>phpmyadmin:4.4.9</product>
<product>phpmyadmin:4.4.10</product>
<product>phpmyadmin:4.4.11</product>
<product>phpmyadmin:4.4.12</product>
<product>phpmyadmin:4.4.13</product>
<product>phpmyadmin:4.4.13.1</product>
<product>phpmyadmin:4.4.14.1</product>
<product>phpmyadmin:4.4.15</product>
<product>phpmyadmin:4.4.15.1</product>
<product>phpmyadmin:4.4.15.2</product>
<product>phpmyadmin:4.4.15.3</product>
<product>phpmyadmin:4.5.0</product>
<product>phpmyadmin:4.5.0.1</product>
<product>phpmyadmin:4.5.0.2</product>
<product>phpmyadmin:4.5.1</product>
<product>phpmyadmin:4.5.2</product>
<product>phpmyadmin:4.5.3</product>
<product>fedora:22</product>
<product>fedora:23</product>
<product>leap:42.1</product>
<product>opensuse:13.1</product>
<product>opensuse:13.2</product>
</cve>
<cve id="CVE-2016-2042" level="LOW">
<product>phpmyadmin:4.4.1</product>
<product>phpmyadmin:4.4.1.1</product>
<product>phpmyadmin:4.4.2</product>
<product>phpmyadmin:4.4.3</product>
<product>phpmyadmin:4.4.4</product>
<product>phpmyadmin:4.4.5</product>
<product>phpmyadmin:4.4.6</product>
<product>phpmyadmin:4.4.6.1</product>
<product>phpmyadmin:4.4.7</product>
<product>phpmyadmin:4.4.8</product>
<product>phpmyadmin:4.4.9</product>
<product>phpmyadmin:4.4.10</product>
<product>phpmyadmin:4.4.11</product>
<product>phpmyadmin:4.4.12</product>
<product>phpmyadmin:4.4.13</product>
<product>phpmyadmin:4.4.13.1</product>
<product>phpmyadmin:4.4.14.1</product>
<product>phpmyadmin:4.4.15</product>
<product>phpmyadmin:4.4.15.1</product>
<product>phpmyadmin:4.4.15.2</product>
<product>phpmyadmin:4.4.15.3</product>
<product>phpmyadmin:4.5.0</product>
<product>phpmyadmin:4.5.0.1</product>
<product>phpmyadmin:4.5.0.2</product>
<product>phpmyadmin:4.5.1</product>
<product>phpmyadmin:4.5.2</product>
<product>phpmyadmin:4.5.3</product>
<product>fedora:22</product>
<product>fedora:23</product>
<product>leap:42.1</product>
<product>opensuse:13.1</product>
<product>opensuse:13.2</product>
</cve>
<cve id="CVE-2016-2043" level="MEDIUM">
<product>phpmyadmin:4.4.1</product>
<product>phpmyadmin:4.4.1.1</product>
<product>phpmyadmin:4.4.2</product>
<product>phpmyadmin:4.4.3</product>
<product>phpmyadmin:4.4.4</product>
<product>phpmyadmin:4.4.5</product>
<product>phpmyadmin:4.4.6</product>
<product>phpmyadmin:4.4.6.1</product>
<product>phpmyadmin:4.4.7</product>
<product>phpmyadmin:4.4.8</product>
<product>phpmyadmin:4.4.9</product>
<product>phpmyadmin:4.4.10</product>
<product>phpmyadmin:4.4.11</product>
<product>phpmyadmin:4.4.12</product>
<product>phpmyadmin:4.4.13</product>
<product>phpmyadmin:4.4.13.1</product>
<product>phpmyadmin:4.4.14.1</product>
<product>phpmyadmin:4.4.15</product>
<product>phpmyadmin:4.4.15.1</product>
<product>phpmyadmin:4.4.15.2</product>
<product>phpmyadmin:4.4.15.3</product>
<product>phpmyadmin:4.5.0</product>
<product>phpmyadmin:4.5.0.1</product>
<product>phpmyadmin:4.5.0.2</product>
<product>phpmyadmin:4.5.1</product>
<product>phpmyadmin:4.5.2</product>
<product>phpmyadmin:4.5.3</product>
<product>fedora:22</product>
<product>fedora:23</product>
<product>leap:42.1</product>
<product>opensuse:13.1</product>
<product>opensuse:13.2</product>
</cve>
<cve id="CVE-2016-2044" level="LOW">
<product>phpmyadmin:4.5.0</product>
<product>phpmyadmin:4.5.0.1</product>
<product>phpmyadmin:4.5.0.2</product>
<product>phpmyadmin:4.5.1</product>
<product>phpmyadmin:4.5.2</product>
<product>phpmyadmin:4.5.3</product>
<product>fedora:22</product>
<product>fedora:23</product>
</cve>
<cve id="CVE-2016-2045" level="MEDIUM">
<product>phpmyadmin:4.5.0</product>
<product>phpmyadmin:4.5.0.1</product>
<product>phpmyadmin:4.5.0.2</product>
<product>phpmyadmin:4.5.1</product>
<product>phpmyadmin:4.5.2</product>
<product>phpmyadmin:4.5.3</product>
<product>fedora:22</product>
<product>fedora:23</product>
</cve>
<cve id="CVE-2016-2046" level="MEDIUM">
<product>unified_threat_management_software:9.351</product>
</cve>
<cve id="CVE-2016-7972" level="LOW">
<product>libass:0.13.3</product>
<product>fedora:23</product>
<product>fedora:24</product>
<product>fedora:25</product>
<product>leap:42.1</product>
<product>opensuse:13.2</product>
</cve>
<cve id="CVE-2016-6293" level="LOW">
<product>international_components_for_unicode:57.1</product>
</cve>
<cve id="CVE-2016-6299" level="MEDIUM">
<product>scm_plugin:-</product>
<product>fedora:23</product>
<product>fedora:24</product>
<product>fedora:25</product>
</cve>
<cve id="CVE-2016-6298" level="MEDIUM">
<product>jwcrypto:0.3.1</product>
</cve>
<cve id="CVE-2016-7970" level="LOW">
<product>libass:0.13.3</product>
<product>fedora:23</product>
<product>fedora:24</product>
<product>fedora:25</product>
</cve>
<cve id="CVE-2016-6413" level="LOW">
<product>application_policy_infrastructure_controller:1.3%282f%29</product>
</cve>
<cve id="CVE-2016-6129" level="LOW">
<product>libtomcrypt:1.17</product>
<product>op-tee_os:2.1.0</product>
</cve>
<cve id="CVE-2016-6127" level="MEDIUM">
<product>request_tracker:4.0.0</product>
<product>request_tracker:4.0.1</product>
<product>request_tracker:4.0.2</product>
<product>request_tracker:4.0.3</product>
<product>request_tracker:4.0.4</product>
<product>request_tracker:4.0.5</product>
<product>request_tracker:4.0.6</product>
<product>request_tracker:4.0.7</product>
<product>request_tracker:4.0.8</product>
<product>request_tracker:4.0.9</product>
<product>request_tracker:4.0.10</product>
<product>request_tracker:4.0.11</product>
<product>request_tracker:4.0.12</product>
<product>request_tracker:4.0.13</product>
<product>request_tracker:4.0.14</product>
<product>request_tracker:4.0.15</product>
<product>request_tracker:4.0.16</product>
<product>request_tracker:4.0.17</product>
<product>request_tracker:4.0.18</product>
<product>request_tracker:4.0.19</product>
<product>request_tracker:4.0.20</product>
<product>request_tracker:4.0.21</product>
<product>request_tracker:4.0.22</product>
<product>request_tracker:4.0.23</product>
<product>request_tracker:4.0.24</product>
<product>request_tracker:4.2.0</product>
<product>request_tracker:4.2.1</product>
<product>request_tracker:4.2.2</product>
<product>request_tracker:4.2.3</product>
<product>request_tracker:4.2.4</product>
<product>request_tracker:4.2.5</product>
<product>request_tracker:4.2.6</product>
<product>request_tracker:4.2.7</product>
<product>request_tracker:4.2.8</product>
<product>request_tracker:4.2.9</product>
<product>request_tracker:4.2.10</product>
<product>request_tracker:4.2.11</product>
<product>request_tracker:4.2.12</product>
<product>request_tracker:4.2.13</product>
<product>request_tracker:4.4.0</product>
<product>request_tracker:4.4.1</product>
</cve>
<cve id="CVE-2016-6126" level="LOW">
<product>kenexa_lms_on_cloud:13.1</product>
<product>kenexa_lms_on_cloud:13.2</product>
<product>kenexa_lms_on_cloud:13.2.2</product>
<product>kenexa_lms_on_cloud:13.2.3</product>
<product>kenexa_lms_on_cloud:13.2.4</product>
</cve>
<cve id="CVE-2016-6125" level="MEDIUM">
<product>kenexa_lms_on_cloud:13.1</product>
<product>kenexa_lms_on_cloud:13.2</product>
<product>kenexa_lms_on_cloud:13.2.2</product>
<product>kenexa_lms_on_cloud:13.2.3</product>
<product>kenexa_lms_on_cloud:13.2.4</product>
</cve>
<cve id="CVE-2016-6124" level="LOW">
<product>kenexa_lms_on_cloud:13.1</product>
<product>kenexa_lms_on_cloud:13.2</product>
<product>kenexa_lms_on_cloud:13.2.2</product>
<product>kenexa_lms_on_cloud:13.2.3</product>
<product>kenexa_lms_on_cloud:13.2.4</product>
</cve>
<cve id="CVE-2016-6123" level="MEDIUM">
<product>kenexa_lms_on_cloud:13.1</product>
<product>kenexa_lms_on_cloud:13.2</product>
<product>kenexa_lms_on_cloud:13.2.2</product>
<product>kenexa_lms_on_cloud:13.2.3</product>
<product>kenexa_lms_on_cloud:13.2.4</product>
</cve>
<cve id="CVE-2016-6122" level="LOW">
<product>kenexa_lms_on_cloud:13.1</product>
<product>kenexa_lms_on_cloud:13.2</product>
<product>kenexa_lms_on_cloud:13.2.2</product>
<product>kenexa_lms_on_cloud:13.2.3</product>
<product>kenexa_lms_on_cloud:13.2.4</product>
</cve>
<cve id="CVE-2016-6121" level="MEDIUM">
<product>emptoris_strategic_supply_management:10.0.0.0</product>
<product>emptoris_strategic_supply_management:10.0.0.1</product>
<product>emptoris_strategic_supply_management:10.0.0.2</product>
<product>emptoris_strategic_supply_management:10.0.0.3</product>
<product>emptoris_strategic_supply_management:10.0.1.0</product>
<product>emptoris_strategic_supply_management:10.0.1.1</product>
<product>emptoris_strategic_supply_management:10.0.1.2</product>
<product>emptoris_strategic_supply_management:10.0.1.3</product>
<product>emptoris_strategic_supply_management:10.0.1.4</product>
<product>emptoris_strategic_supply_management:10.0.2.0</product>
<product>emptoris_strategic_supply_management:10.0.2.1</product>
<product>emptoris_strategic_supply_management:10.0.2.2</product>
<product>emptoris_strategic_supply_management:10.0.2.3</product>
<product>emptoris_strategic_supply_management:10.0.2.4</product>
<product>emptoris_strategic_supply_management:10.0.2.5</product>
<product>emptoris_strategic_supply_management:10.0.2.6</product>
<product>emptoris_strategic_supply_management:10.0.2.7</product>
<product>emptoris_strategic_supply_management:10.0.2.8</product>
<product>emptoris_strategic_supply_management:10.0.2.9</product>
<product>emptoris_strategic_supply_management:10.0.2.10</product>
<product>emptoris_strategic_supply_management:10.0.2.11</product>
<product>emptoris_strategic_supply_management:10.0.2.12</product>
<product>emptoris_strategic_supply_management:10.0.2.13</product>
<product>emptoris_strategic_supply_management:10.0.2.14</product>
<product>emptoris_strategic_supply_management:10.0.2.15</product>
<product>emptoris_strategic_supply_management:10.0.2.16</product>
<product>emptoris_strategic_supply_management:10.0.2.17</product>
<product>emptoris_strategic_supply_management:10.0.4.0</product>
<product>emptoris_strategic_supply_management:10.1.0.0</product>
<product>emptoris_strategic_supply_management:10.1.0.1</product>
<product>emptoris_strategic_supply_management:10.1.0.2</product>
<product>emptoris_strategic_supply_management:10.1.0.3</product>
<product>emptoris_strategic_supply_management:10.1.0.4</product>
<product>emptoris_strategic_supply_management:10.1.0.5</product>
<product>emptoris_strategic_supply_management:10.1.0.6</product>
<product>emptoris_strategic_supply_management:10.1.0.7</product>
<product>emptoris_strategic_supply_management:10.1.0.8</product>
<product>emptoris_strategic_supply_management:10.1.0.9</product>
<product>emptoris_strategic_supply_management:10.1.0.10</product>
<product>emptoris_strategic_supply_management:10.1.0.11</product>
<product>emptoris_strategic_supply_management:10.1.1.0</product>
<product>emptoris_strategic_supply_management:10.1.1.1</product>
<product>emptoris_strategic_supply_management:10.1.1.2</product>
<product>emptoris_strategic_supply_management:10.1.1.3</product>
<product>emptoris_strategic_supply_management:10.1.1.4</product>
<product>emptoris_strategic_supply_management:10.1.1.5</product>
<product>emptoris_strategic_supply_management:10.1.1.6</product>
<product>emptoris_strategic_supply_management:10.1.1.7</product>
<product>emptoris_strategic_supply_management:10.1.1.8</product>
<product>emptoris_strategic_supply_management:10.1.1.9</product>
<product>emptoris_strategic_supply_management:10.1.1.10</product>
<product>emptoris_supplier_lifecycle_management:10.0.0.0</product>
<product>emptoris_supplier_lifecycle_management:10.0.0.1</product>
<product>emptoris_supplier_lifecycle_management:10.0.0.2</product>
<product>emptoris_supplier_lifecycle_management:10.0.0.3</product>
<product>emptoris_supplier_lifecycle_management:10.0.1.0</product>
<product>emptoris_supplier_lifecycle_management:10.0.1.1</product>
<product>emptoris_supplier_lifecycle_management:10.0.1.2</product>
<product>emptoris_supplier_lifecycle_management:10.0.2.0</product>
<product>emptoris_supplier_lifecycle_management:10.0.2.2</product>
<product>emptoris_supplier_lifecycle_management:10.0.2.3</product>
<product>emptoris_supplier_lifecycle_management:10.0.2.5</product>
<product>emptoris_supplier_lifecycle_management:10.0.2.6</product>
<product>emptoris_supplier_lifecycle_management:10.0.2.7</product>
</cve>
<cve id="CVE-2016-0358" level="LOW">
<product>sametime:8.5.2.0</product>
<product>sametime:8.5.2.1</product>
<product>sametime:9.0.0.0</product>
<product>sametime:9.0.0.1</product>
<product>sametime:9.0.1</product>
</cve>
<cve id="CVE-2016-0359" level="MEDIUM">
<product>websphere_application_server:7.0</product>
<product>websphere_application_server:7.0.0.0</product>
<product>websphere_application_server:7.0.0.1</product>
<product>websphere_application_server:7.0.0.2</product>
<product>websphere_application_server:7.0.0.3</product>
<product>websphere_application_server:7.0.0.4</product>
<product>websphere_application_server:7.0.0.5</product>
<product>websphere_application_server:7.0.0.6</product>
<product>websphere_application_server:7.0.0.7</product>
<product>websphere_application_server:7.0.0.8</product>
<product>websphere_application_server:7.0.0.9</product>
<product>websphere_application_server:7.0.0.10</product>
<product>websphere_application_server:7.0.0.11</product>
<product>websphere_application_server:7.0.0.12</product>
<product>websphere_application_server:7.0.0.13</product>
<product>websphere_application_server:7.0.0.14</product>
<product>websphere_application_server:7.0.0.15</product>
<product>websphere_application_server:7.0.0.16</product>
<product>websphere_application_server:7.0.0.17</product>
<product>websphere_application_server:7.0.0.18</product>
<product>websphere_application_server:7.0.0.19</product>
<product>websphere_application_server:7.0.0.21</product>
<product>websphere_application_server:7.0.0.22</product>
<product>websphere_application_server:7.0.0.23</product>
<product>websphere_application_server:7.0.0.24</product>
<product>websphere_application_server:7.0.0.25</product>
<product>websphere_application_server:7.0.0.27</product>
<product>websphere_application_server:7.0.0.28</product>
<product>websphere_application_server:7.0.0.29</product>
<product>websphere_application_server:7.0.0.31</product>
<product>websphere_application_server:7.0.0.32</product>
<product>websphere_application_server:7.0.0.33</product>
<product>websphere_application_server:7.0.0.34</product>
<product>websphere_application_server:7.0.0.35</product>
<product>websphere_application_server:7.0.0.36</product>
<product>websphere_application_server:7.0.0.37</product>
<product>websphere_application_server:7.0.0.38</product>
<product>websphere_application_server:7.0.0.39</product>
<product>websphere_application_server:7.0.0.41</product>
<product>websphere_application_server:8.0</product>
<product>websphere_application_server:8.0.0.0</product>
<product>websphere_application_server:8.0.0.1</product>
<product>websphere_application_server:8.0.0.2</product>
<product>websphere_application_server:8.0.0.3</product>
<product>websphere_application_server:8.0.0.4</product>
<product>websphere_application_server:8.0.0.5</product>
<product>websphere_application_server:8.0.0.6</product>
<product>websphere_application_server:8.0.0.7</product>
<product>websphere_application_server:8.0.0.8</product>
<product>websphere_application_server:8.0.0.9</product>
<product>websphere_application_server:8.0.0.10</product>
<product>websphere_application_server:8.0.0.11</product>
<product>websphere_application_server:8.0.0.12</product>
<product>websphere_application_server:8.5.0.0</product>
<product>websphere_application_server:8.5.0.0</product>
<product>websphere_application_server:8.5.5.4</product>
<product>websphere_application_server:8.5.5.5</product>
<product>websphere_application_server:8.5.5.6</product>
<product>websphere_application_server:8.5.5.7</product>
<product>websphere_application_server:8.5.5.8</product>
<product>websphere_application_server:8.5.5.9</product>
</cve>
<cve id="CVE-2016-0353" level="MEDIUM">
<product>security_privileged_identity_manager:2.0.0</product>
<product>security_privileged_identity_manager:2.0.1</product>
<product>security_privileged_identity_manager:2.0.2</product>
</cve>
<cve id="CVE-2016-0350" level="MEDIUM">
<product>jazz_reporting_service:5.0</product>
<product>jazz_reporting_service:5.0.1</product>
<product>jazz_reporting_service:5.0.2</product>
<product>jazz_reporting_service:6.0</product>
<product>jazz_reporting_service:6.0.1</product>
</cve>
<cve id="CVE-2016-0351" level="MEDIUM">
<product>security_identity_manager_virtual_appliance:7.0.0.0</product>
<product>security_identity_manager_virtual_appliance:7.0.0.1</product>
<product>security_identity_manager_virtual_appliance:7.0.0.2</product>
<product>security_identity_manager_virtual_appliance:7.0.0.3</product>
<product>security_identity_manager_virtual_appliance:7.0.1.0</product>
<product>security_identity_manager_virtual_appliance:7.0.1.1</product>
<product>security_identity_manager_virtual_appliance:7.0.1.3</product>
</cve>
<cve id="CVE-2016-0356" level="LOW">
<product>sametime:8.5.2.0</product>
<product>sametime:8.5.2.1</product>
<product>sametime:9.0.0.0</product>
<product>sametime:9.0.0.1</product>
<product>sametime:9.0.1</product>
</cve>
<cve id="CVE-2016-0357" level="MEDIUM">
<product>security_identity_manager_adapter:7.0.0.0</product>
<product>security_identity_manager_adapter:7.0.0.1</product>
<product>security_identity_manager_adapter:7.0.0.2</product>
<product>security_identity_manager_adapter:7.0.0.3</product>
<product>security_identity_manager_adapter:7.0.1.0</product>
<product>security_identity_manager_adapter:7.0.1.1</product>
</cve>
<cve id="CVE-2016-0354" level="MEDIUM">
<product>sametime:8.5.2.0</product>
<product>sametime:8.5.2.1</product>
<product>sametime:9.0.0.0</product>
<product>sametime:9.0.0.1</product>
<product>sametime:9.0.1</product>
</cve>
<cve id="CVE-2016-0355" level="LOW">
<product>sametime:8.5.2.0</product>
<product>sametime:8.5.2.1</product>
<product>sametime:9.0.0.0</product>
<product>sametime:9.0.0.1</product>
<product>sametime:9.0.1</product>
</cve>
<cve id="CVE-2016-9962" level="MEDIUM">
<product>docker:1.11.0</product>
<product>docker:1.11.1</product>
<product>docker:1.11.2</product>
<product>docker:1.12.0</product>
<product>docker:1.12.1</product>
<product>docker:1.12.2</product>
<product>docker:1.12.3</product>
<product>docker:1.12.4</product>
<product>docker:1.12.5</product>
</cve>
<cve id="CVE-2016-9960" level="LOW">
<product>game-music-emu:0.6.0</product>
<product>fedora:24</product>
<product>fedora:25</product>
<product>suse_linux_enterprise_desktop:12.0</product>
<product>suse_linux_enterprise_desktop:12.0</product>
<product>suse_linux_enterprise_server:12.0</product>
<product>suse_linux_enterprise_server:12.0</product>
<product>suse_linux_enterprise_server:12.0</product>
<product>suse_linux_enterprise_software_development_kit:12.0</product>
<product>suse_linux_enterprise_software_development_kit:12.0</product>
<product>leap:42.1</product>
<product>leap:42.2</product>
</cve>
<cve id="CVE-2016-9961" level="LOW">
<product>game-music-emu:0.6.0</product>
<product>fedora:24</product>
<product>fedora:25</product>
<product>suse_linux_enterprise_desktop:12.0</product>
<product>suse_linux_enterprise_desktop:12.0</product>
<product>suse_linux_enterprise_server:12.0</product>
<product>suse_linux_enterprise_server:12.0</product>
<product>suse_linux_enterprise_server:12.0</product>
<product>suse_linux_enterprise_software_development_kit:12.0</product>
<product>suse_linux_enterprise_software_development_kit:12.0</product>
<product>leap:42.1</product>
<product>leap:42.2</product>
</cve>
<cve id="CVE-2016-9966" level="LOW">
<product>samsung_mobile:5.0</product>
<product>samsung_mobile:5.1</product>
<product>samsung_mobile:6.0</product>
<product>samsung_mobile:7.0</product>
</cve>
<cve id="CVE-2016-9967" level="LOW">
<product>samsung_mobile:5.0</product>
<product>samsung_mobile:5.1</product>
<product>samsung_mobile:6.0</product>
<product>samsung_mobile:7.0</product>
</cve>
<cve id="CVE-2016-9965" level="LOW">
<product>samsung_mobile:5.0</product>
<product>samsung_mobile:5.1</product>
<product>samsung_mobile:6.0</product>
<product>samsung_mobile:7.0</product>
</cve>
<cve id="CVE-2016-4330" level="MEDIUM">
<product>hdf5:1.8.16</product>
</cve>
<cve id="CVE-2016-4298" level="MEDIUM">
<product>hancom_office_2014:9.1.0.2176</product>
</cve>
<cve id="CVE-2016-4296" level="MEDIUM">
<product>hancom_office_2014:9.1.0.2176</product>
</cve>
<cve id="CVE-2016-4295" level="MEDIUM">
<product>hancom_office_2014:9.1.0.2176</product>
</cve>
<cve id="CVE-2016-4294" level="MEDIUM">
<product>hancom_office_2014:9.1.0.2176</product>
</cve>
<cve id="CVE-2016-4293" level="MEDIUM">
<product>hancom_office_2014:9.1.0.2176</product>
</cve>
<cve id="CVE-2016-4292" level="MEDIUM">
<product>hancom_office_2014:9.1.0.2176</product>
</cve>
<cve id="CVE-2016-4291" level="MEDIUM">
<product>hancom_office_2014:9.1.0.2176</product>
</cve>
<cve id="CVE-2016-4290" level="MEDIUM">
<product>hancom_office_2014:9.1.0.2176</product>
</cve>
<cve id="CVE-2016-3959" level="LOW">
<product>go:1.5</product>
<product>go:1.6</product>
<product>fedora:22</product>
<product>fedora:23</product>
<product>fedora:24</product>
<product>leap:42.1</product>
</cve>
<cve id="CVE-2016-3958" level="LOW">
<product>go:1.5</product>
<product>go:1.6</product>
</cve>
<cve id="CVE-2016-3954" level="LOW">
<product>web2py:1.76.1</product>
<product>web2py:1.76.2</product>
<product>web2py:1.76.3</product>
<product>web2py:1.76.4</product>
<product>web2py:1.76.5</product>
<product>web2py:1.77.1</product>
<product>web2py:1.77.2</product>
<product>web2py:1.77.3</product>
<product>web2py:1.78.1</product>
<product>web2py:1.78.3</product>
<product>web2py:1.79.1</product>
<product>web2py:1.79.2</product>
<product>web2py:1.80.1</product>
<product>web2py:1.81.1</product>
<product>web2py:1.81.2</product>
<product>web2py:1.81.3</product>
<product>web2py:1.81.4</product>
<product>web2py:1.81.5</product>
<product>web2py:1.82.1</product>
<product>web2py:1.83.1</product>
<product>web2py:1.83.2</product>
<product>web2py:1.84.1</product>
<product>web2py:1.84.4</product>
<product>web2py:1.85.1</product>
<product>web2py:1.85.3</product>
<product>web2py:1.86.1</product>
<product>web2py:1.86.3</product>
<product>web2py:1.87.1</product>
<product>web2py:1.87.2</product>
<product>web2py:1.87.3</product>
<product>web2py:1.88.1</product>
<product>web2py:1.89.1</product>
<product>web2py:1.89.5</product>
<product>web2py:1.90.1</product>
<product>web2py:1.90.2</product>
<product>web2py:1.90.4</product>
<product>web2py:1.90.5</product>
<product>web2py:1.90.6</product>
<product>web2py:1.91.1</product>
<product>web2py:1.91.2</product>
<product>web2py:1.91.5</product>
<product>web2py:1.91.6</product>
<product>web2py:1.92.1</product>
<product>web2py:1.93.1</product>
<product>web2py:1.93.2</product>
<product>web2py:1.94.1</product>
<product>web2py:1.94.2</product>
<product>web2py:1.94.3</product>
<product>web2py:1.94.4</product>
<product>web2py:1.94.5</product>
<product>web2py:1.94.6</product>
<product>web2py:1.95.1</product>
<product>web2py:1.96.1</product>
<product>web2py:1.96.2</product>
<product>web2py:1.96.4</product>
<product>web2py:1.97.1</product>
<product>web2py:1.98.1</product>
<product>web2py:1.98.2</product>
<product>web2py:1.99.1</product>
<product>web2py:1.99.2</product>
<product>web2py:1.99.3</product>
<product>web2py:1.99.4</product>
<product>web2py:1.99.5</product>
<product>web2py:1.99.7</product>
<product>web2py:2.0.1-11</product>
<product>web2py:2.1.0</product>
<product>web2py:2.2.1</product>
<product>web2py:2.3.1</product>
</cve>
<cve id="CVE-2016-3957" level="LOW">
<product>web2py:1.76.1</product>
<product>web2py:1.76.2</product>
<product>web2py:1.76.3</product>
<product>web2py:1.76.4</product>
<product>web2py:1.76.5</product>
<product>web2py:1.77.1</product>
<product>web2py:1.77.2</product>
<product>web2py:1.77.3</product>
<product>web2py:1.78.1</product>
<product>web2py:1.78.3</product>
<product>web2py:1.79.1</product>
<product>web2py:1.79.2</product>
<product>web2py:1.80.1</product>
<product>web2py:1.81.1</product>
<product>web2py:1.81.2</product>
<product>web2py:1.81.3</product>
<product>web2py:1.81.4</product>
<product>web2py:1.81.5</product>
<product>web2py:1.82.1</product>
<product>web2py:1.83.1</product>
<product>web2py:1.83.2</product>
<product>web2py:1.84.1</product>
<product>web2py:1.84.4</product>
<product>web2py:1.85.1</product>
<product>web2py:1.85.3</product>
<product>web2py:1.86.1</product>
<product>web2py:1.86.3</product>
<product>web2py:1.87.1</product>
<product>web2py:1.87.2</product>
<product>web2py:1.87.3</product>
<product>web2py:1.88.1</product>
<product>web2py:1.89.1</product>
<product>web2py:1.89.5</product>
<product>web2py:1.90.1</product>
<product>web2py:1.90.2</product>
<product>web2py:1.90.4</product>
<product>web2py:1.90.5</product>
<product>web2py:1.90.6</product>
<product>web2py:1.91.1</product>
<product>web2py:1.91.2</product>
<product>web2py:1.91.5</product>
<product>web2py:1.91.6</product>
<product>web2py:1.92.1</product>
<product>web2py:1.93.1</product>
<product>web2py:1.93.2</product>
<product>web2py:1.94.1</product>
<product>web2py:1.94.2</product>
<product>web2py:1.94.3</product>
<product>web2py:1.94.4</product>
<product>web2py:1.94.5</product>
<product>web2py:1.94.6</product>
<product>web2py:1.95.1</product>
<product>web2py:1.96.1</product>
<product>web2py:1.96.2</product>
<product>web2py:1.96.4</product>
<product>web2py:1.97.1</product>
<product>web2py:1.98.1</product>
<product>web2py:1.98.2</product>
<product>web2py:1.99.1</product>
<product>web2py:1.99.2</product>
<product>web2py:1.99.3</product>
<product>web2py:1.99.4</product>
<product>web2py:1.99.5</product>
<product>web2py:1.99.7</product>
<product>web2py:2.0.1-11</product>
<product>web2py:2.1.0</product>
<product>web2py:2.2.1</product>
<product>web2py:2.3.1</product>
</cve>
<cve id="CVE-2016-3956" level="LOW">
<product>sdk:1.1.0.20</product>
<product>sdk:1.2.0.10</product>
<product>sdk:4.4.1.0</product>
<product>node.js:0.10.0</product>
<product>node.js:0.10.1</product>
<product>node.js:0.10.2</product>
<product>node.js:0.10.3</product>
<product>node.js:0.10.4</product>
<product>node.js:0.10.5</product>
<product>node.js:0.10.6</product>
<product>node.js:0.10.7</product>
<product>node.js:0.10.8</product>
<product>node.js:0.10.9</product>
<product>node.js:0.10.10</product>
<product>node.js:0.10.11</product>
<product>node.js:0.10.12</product>
<product>node.js:0.10.13</product>
<product>node.js:0.10.14</product>
<product>node.js:0.10.15</product>
<product>node.js:0.10.16</product>
<product>node.js:0.10.16-isaacs-manual</product>
<product>node.js:0.10.17</product>
<product>node.js:0.10.18</product>
<product>node.js:0.10.19</product>
<product>node.js:0.10.20</product>
<product>node.js:0.10.21</product>
<product>node.js:0.10.22</product>
<product>node.js:0.10.23</product>
<product>node.js:0.10.24</product>
<product>node.js:0.10.25</product>
<product>node.js:0.10.26</product>
<product>node.js:0.10.27</product>
<product>node.js:0.10.28</product>
<product>node.js:0.10.29</product>
<product>node.js:0.10.30</product>
<product>node.js:0.10.31</product>
<product>node.js:0.10.32</product>
<product>node.js:0.10.33</product>
<product>node.js:0.10.34</product>
<product>node.js:0.10.35</product>
<product>node.js:0.10.36</product>
<product>node.js:0.10.37</product>
<product>node.js:0.10.38</product>
<product>node.js:0.10.39</product>
<product>node.js:0.10.40</product>
<product>node.js:0.10.41</product>
<product>node.js:0.12.0</product>
<product>node.js:0.12.1</product>
<product>node.js:0.12.2</product>
<product>node.js:0.12.3</product>
<product>node.js:0.12.4</product>
<product>node.js:0.12.5</product>
<product>node.js:0.12.6</product>
<product>node.js:0.12.7</product>
<product>node.js:0.12.8</product>
<product>node.js:0.12.9</product>
<product>node.js:4.0.0</product>
<product>node.js:4.1.0</product>
<product>node.js:4.1.1</product>
<product>node.js:4.1.2</product>
<product>node.js:4.2.0</product>
<product>node.js:4.2.1</product>
<product>node.js:4.2.2</product>
<product>node.js:4.2.3</product>
<product>node.js:4.2.4</product>
<product>node.js:4.2.5</product>
<product>node.js:4.2.6</product>
<product>node.js:4.3.0</product>
<product>node.js:4.3.1</product>
<product>node.js:4.3.1</product>
<product>node.js:4.3.1</product>
<product>node.js:4.3.2</product>
<product>node.js:4.4.0</product>
<product>node.js:4.4.0</product>
<product>node.js:4.4.0</product>
<product>node.js:4.4.0</product>
<product>node.js:4.4.0</product>
<product>node.js:4.4.1</product>
<product>node.js:5.0.0</product>
<product>node.js:5.1.0</product>
<product>node.js:5.1.1</product>
<product>node.js:5.2.0</product>
<product>node.js:5.3.0</product>
<product>node.js:5.4.0</product>
<product>node.js:5.4.1</product>
<product>node.js:5.5.0</product>
<product>node.js:5.6.0</product>
<product>node.js:5.7.0</product>
<product>node.js:5.7.1</product>
<product>node.js:5.8.0</product>
<product>node.js:5.8.1</product>
<product>node.js:5.9.0</product>
<product>node.js:5.9.1</product>
<product>npm:2.15.0</product>
<product>npm:3.0.0</product>
<product>npm:3.1.0</product>
<product>npm:3.1.1</product>
<product>npm:3.1.2</product>
<product>npm:3.1.3</product>
<product>npm:3.2.0</product>
<product>npm:3.2.1</product>
<product>npm:3.2.2</product>
<product>npm:3.3.0</product>
<product>npm:3.3.1</product>
<product>npm:3.3.2</product>
<product>npm:3.3.3</product>
<product>npm:3.3.4</product>
<product>npm:3.3.5</product>
<product>npm:3.3.6</product>
<product>npm:3.3.7</product>
<product>npm:3.3.8</product>
<product>npm:3.3.9</product>
<product>npm:3.3.10</product>
<product>npm:3.3.11</product>
<product>npm:3.3.12</product>
<product>npm:3.4.0</product>
<product>npm:3.4.1</product>
<product>npm:3.5.0</product>
<product>npm:3.5.1</product>
<product>npm:3.5.2</product>
<product>npm:3.5.3</product>
<product>npm:3.5.4</product>
<product>npm:3.6.0</product>
<product>npm:3.7.0</product>
<product>npm:3.7.1</product>
<product>npm:3.7.2</product>
<product>npm:3.7.3</product>
<product>npm:3.7.4</product>
<product>npm:3.7.5</product>
<product>npm:3.8.0</product>
<product>npm:3.8.1</product>
<product>npm:3.8.2</product>
</cve>
<cve id="CVE-2016-3950" level="LOW">
<product>ar3200_firmware:v200r005c20</product>
<product>ar3200_firmware:v200r005c30</product>
<product>ar3200_firmware:v200r005c32</product>
</cve>
<cve id="CVE-2016-3953" level="LOW">
<product>web2py:1.76.1</product>
<product>web2py:1.76.2</product>
<product>web2py:1.76.3</product>
<product>web2py:1.76.4</product>
<product>web2py:1.76.5</product>
<product>web2py:1.77.1</product>
<product>web2py:1.77.2</product>
<product>web2py:1.77.3</product>
<product>web2py:1.78.1</product>
<product>web2py:1.78.3</product>
<product>web2py:1.79.1</product>
<product>web2py:1.79.2</product>
<product>web2py:1.80.1</product>
<product>web2py:1.81.1</product>
<product>web2py:1.81.2</product>
<product>web2py:1.81.3</product>
<product>web2py:1.81.4</product>
<product>web2py:1.81.5</product>
<product>web2py:1.82.1</product>
<product>web2py:1.83.1</product>
<product>web2py:1.83.2</product>
<product>web2py:1.84.1</product>
<product>web2py:1.84.4</product>
<product>web2py:1.85.1</product>
<product>web2py:1.85.3</product>
<product>web2py:1.86.1</product>
<product>web2py:1.86.3</product>
<product>web2py:1.87.1</product>
<product>web2py:1.87.2</product>
<product>web2py:1.87.3</product>
<product>web2py:1.88.1</product>
<product>web2py:1.89.1</product>
<product>web2py:1.89.5</product>
<product>web2py:1.90.1</product>
<product>web2py:1.90.2</product>
<product>web2py:1.90.4</product>
<product>web2py:1.90.5</product>
<product>web2py:1.90.6</product>
<product>web2py:1.91.1</product>
<product>web2py:1.91.2</product>
<product>web2py:1.91.5</product>
<product>web2py:1.91.6</product>
<product>web2py:1.92.1</product>
<product>web2py:1.93.1</product>
<product>web2py:1.93.2</product>
<product>web2py:1.94.1</product>
<product>web2py:1.94.2</product>
<product>web2py:1.94.3</product>
<product>web2py:1.94.4</product>
<product>web2py:1.94.5</product>
<product>web2py:1.94.6</product>
<product>web2py:1.95.1</product>
<product>web2py:1.96.1</product>
<product>web2py:1.96.2</product>
<product>web2py:1.96.4</product>
<product>web2py:1.97.1</product>
<product>web2py:1.98.1</product>
<product>web2py:1.98.2</product>
<product>web2py:1.99.1</product>
<product>web2py:1.99.2</product>
<product>web2py:1.99.3</product>
<product>web2py:1.99.4</product>
<product>web2py:1.99.5</product>
<product>web2py:1.99.7</product>
<product>web2py:2.0.1-11</product>
<product>web2py:2.1.0</product>
<product>web2py:2.2.1</product>
<product>web2py:2.3.1</product>
</cve>
<cve id="CVE-2016-3952" level="LOW">
<product>web2py:1.76.1</product>
<product>web2py:1.76.2</product>
<product>web2py:1.76.3</product>
<product>web2py:1.76.4</product>
<product>web2py:1.76.5</product>
<product>web2py:1.77.1</product>
<product>web2py:1.77.2</product>
<product>web2py:1.77.3</product>
<product>web2py:1.78.1</product>
<product>web2py:1.78.3</product>
<product>web2py:1.79.1</product>
<product>web2py:1.79.2</product>
<product>web2py:1.80.1</product>
<product>web2py:1.81.1</product>
<product>web2py:1.81.2</product>
<product>web2py:1.81.3</product>
<product>web2py:1.81.4</product>
<product>web2py:1.81.5</product>
<product>web2py:1.82.1</product>
<product>web2py:1.83.1</product>
<product>web2py:1.83.2</product>
<product>web2py:1.84.1</product>
<product>web2py:1.84.4</product>
<product>web2py:1.85.1</product>
<product>web2py:1.85.3</product>
<product>web2py:1.86.1</product>
<product>web2py:1.86.3</product>
<product>web2py:1.87.1</product>
<product>web2py:1.87.2</product>
<product>web2py:1.87.3</product>
<product>web2py:1.88.1</product>
<product>web2py:1.89.1</product>
<product>web2py:1.89.5</product>
<product>web2py:1.90.1</product>
<product>web2py:1.90.2</product>
<product>web2py:1.90.4</product>
<product>web2py:1.90.5</product>
<product>web2py:1.90.6</product>
<product>web2py:1.91.1</product>
<product>web2py:1.91.2</product>
<product>web2py:1.91.5</product>
<product>web2py:1.91.6</product>
<product>web2py:1.92.1</product>
<product>web2py:1.93.1</product>
<product>web2py:1.93.2</product>
<product>web2py:1.94.1</product>
<product>web2py:1.94.2</product>
<product>web2py:1.94.3</product>
<product>web2py:1.94.4</product>
<product>web2py:1.94.5</product>
<product>web2py:1.94.6</product>
<product>web2py:1.95.1</product>
<product>web2py:1.96.1</product>
<product>web2py:1.96.2</product>
<product>web2py:1.96.4</product>
<product>web2py:1.97.1</product>
<product>web2py:1.98.1</product>
<product>web2py:1.98.2</product>
<product>web2py:1.99.1</product>
<product>web2py:1.99.2</product>
<product>web2py:1.99.3</product>
<product>web2py:1.99.4</product>
<product>web2py:1.99.5</product>
<product>web2py:1.99.7</product>
<product>web2py:2.0.1-11</product>
<product>web2py:2.1.0</product>
<product>web2py:2.2.1</product>
<product>web2py:2.3.1</product>
</cve>
<cve id="CVE-2016-9388" level="MEDIUM">
<product>jasper:1.900.14</product>
</cve>
<cve id="CVE-2016-9389" level="LOW">
<product>jasper:1.900.13</product>
</cve>
<cve id="CVE-2016-9386" level="LOW">
<product>xenserver:6.0.2</product>
<product>xenserver:6.2.0</product>
<product>xenserver:6.5</product>
<product>xenserver:7.0</product>
<product>xen</product>
</cve>
<cve id="CVE-2016-9387" level="MEDIUM">
<product>jasper:1.900.12</product>
</cve>
<cve id="CVE-2016-9384" level="LOW">
<product>xen:4.7.0</product>
<product>xen:4.7.1</product>
</cve>
<cve id="CVE-2016-9385" level="LOW">
<product>xenserver:6.0.2</product>
<product>xenserver:6.2.0</product>
<product>xenserver:6.5</product>
<product>xenserver:7.0</product>
<product>xen:4.4.0</product>
<product>xen:4.4.1</product>
<product>xen:4.4.2</product>
<product>xen:4.4.3</product>
<product>xen:4.4.4</product>
<product>xen:4.5.0</product>
<product>xen:4.5.1</product>
<product>xen:4.5.2</product>
<product>xen:4.5.3</product>
<product>xen:4.5.5</product>
<product>xen:4.6.0</product>
<product>xen:4.6.1</product>
<product>xen:4.6.3</product>
<product>xen:4.6.4</product>
<product>xen:4.7.0</product>
<product>xen:4.7.1</product>
</cve>
<cve id="CVE-2016-9382" level="LOW">
<product>xenserver:6.0.2</product>
<product>xenserver:6.2.0</product>
<product>xenserver:6.5</product>
<product>xenserver:7.0</product>
<product>xen:4.0.0</product>
<product>xen:4.0.1</product>
<product>xen:4.0.2</product>
<product>xen:4.0.3</product>
<product>xen:4.0.4</product>
<product>xen:4.1.0</product>
<product>xen:4.1.1</product>
<product>xen:4.1.2</product>
<product>xen:4.1.3</product>
<product>xen:4.1.4</product>
<product>xen:4.1.5</product>
<product>xen:4.1.6.1</product>
<product>xen:4.2.0</product>
<product>xen:4.2.1</product>
<product>xen:4.2.2</product>
<product>xen:4.2.3</product>
<product>xen:4.2.4</product>
<product>xen:4.2.5</product>
<product>xen:4.3.0</product>
<product>xen:4.3.1</product>
<product>xen:4.3.2</product>
<product>xen:4.3.3</product>
<product>xen:4.3.4</product>
<product>xen:4.4.0</product>
<product>xen:4.4.1</product>
<product>xen:4.4.2</product>
<product>xen:4.4.3</product>
<product>xen:4.4.4</product>
<product>xen:4.5.0</product>
<product>xen:4.5.1</product>
<product>xen:4.5.2</product>
<product>xen:4.5.3</product>
<product>xen:4.5.5</product>
<product>xen:4.6.0</product>
<product>xen:4.6.1</product>
<product>xen:4.6.3</product>
<product>xen:4.6.4</product>
<product>xen:4.7.0</product>
<product>xen:4.7.1</product>
</cve>
<cve id="CVE-2016-9383" level="LOW">
<product>xenserver:6.0.2</product>
<product>xenserver:6.2.0</product>
<product>xenserver:6.5</product>
<product>xenserver:7.0</product>
<product>xen</product>
</cve>
<cve id="CVE-2016-9380" level="LOW">
<product>xenserver:6.0.2</product>
<product>xenserver:6.2.0</product>
<product>xenserver:6.5</product>
<product>xenserver:7.0</product>
<product>xen</product>
</cve>
<cve id="CVE-2016-9381" level="MEDIUM">
<product>xenserver:6.0.2</product>
<product>xenserver:6.2.0</product>
<product>xenserver:6.5</product>
<product>xenserver:7.0</product>
<product>qemu</product>
</cve>
<cve id="CVE-2016-1007" level="LOW">
<product>acrobat:11.0.14</product>
<product>acrobat_dc:15.006.30119</product>
<product>acrobat_dc:15.010.20059</product>
<product>acrobat_reader:11.0.14</product>
<product>acrobat_reader_dc:15.006.30119</product>
<product>acrobat_reader_dc:15.010.20059</product>
</cve>
<cve id="CVE-2016-1558" level="LOW">
<product>dap-2230_firmware:1.02</product>
<product>dap-2310_firmware:2.06</product>
<product>dap-2330_firmware:1.06</product>
<product>dap-2360_firmware:2.06</product>
<product>dap-2553_firmware:3.05</product>
<product>dap-2660_firmware:1.11</product>
<product>dap-2690_firmware:3.15</product>
<product>dap-2695_firmware:1.16</product>
<product>dap-3320_firmware:1.00</product>
<product>dap-3662_firmware:1.01</product>
</cve>
<cve id="CVE-2016-1009" level="LOW">
<product>acrobat:11.0.14</product>
<product>acrobat_dc:15.006.30119</product>
<product>acrobat_dc:15.010.20059</product>
<product>acrobat_reader:11.0.14</product>
<product>acrobat_reader_dc:15.006.30119</product>
<product>acrobat_reader_dc:15.010.20059</product>
</cve>
<cve id="CVE-2016-1008" level="LOW">
<product>acrobat:11.0.14</product>
<product>acrobat_dc:15.006.30119</product>
<product>acrobat_dc:15.010.20059</product>
<product>acrobat_reader:11.0.14</product>
<product>acrobat_reader_dc:15.006.30119</product>
<product>acrobat_reader_dc:15.010.20059</product>
</cve>
<cve id="CVE-2016-1555" level="LOW">
<product>wn604_firmware:3.3.2</product>
<product>wn802tv2_firmware:3.0.5.0</product>
<product>wnap320_firmware:3.0.5.0</product>
<product>wndap210v2_firmware:3.0.5.0</product>
<product>wndap350_firmware:3.0.5.0</product>
<product>wndap360_firmware:3.0.5.0</product>
<product>wndap660_firmware:3.0.5.0</product>
</cve>
<cve id="CVE-2016-4074" level="LOW">
<product>jq:1.5</product>
</cve>
<cve id="CVE-2016-1277" level="MEDIUM">
<product>junos:12.1x46</product>
<product>junos:12.1x47</product>
<product>junos:12.1x47</product>
<product>junos:12.1x47</product>
<product>junos:12.1x47</product>
<product>junos:12.1x47</product>
<product>junos:12.1x47</product>
<product>junos:12.1x47</product>
<product>junos:12.3x48</product>
<product>junos:12.3x48</product>
<product>junos:12.3x48</product>
<product>junos:13.3</product>
<product>junos:13.3</product>
<product>junos:13.3</product>
<product>junos:13.3</product>
<product>junos:13.3</product>
<product>junos:13.3</product>
<product>junos:13.3</product>
<product>junos:13.3</product>
<product>junos:13.3</product>
<product>junos:13.3</product>
<product>junos:14.1</product>
<product>junos:14.1</product>
<product>junos:14.1</product>
<product>junos:14.1</product>
<product>junos:14.1</product>
<product>junos:14.1</product>
<product>junos:14.1</product>
<product>junos:14.1</product>
<product>junos:14.1x53</product>
<product>junos:14.1x53</product>
<product>junos:14.1x53</product>
<product>junos:14.1x53</product>
<product>junos:14.1x53</product>
<product>junos:14.1x53</product>
<product>junos:14.1x53</product>
<product>junos:14.1x53</product>
<product>junos:14.1x53</product>
<product>junos:14.2</product>
<product>junos:14.2</product>
<product>junos:14.2</product>
<product>junos:14.2</product>
<product>junos:14.2</product>
<product>junos:15.1</product>
<product>junos:15.1</product>
<product>junos:15.1</product>
<product>junos:15.1</product>
<product>junos:15.1</product>
<product>junos:15.1</product>
<product>junos:15.1</product>
<product>junos:15.1x49</product>
<product>junos:15.1x49</product>
<product>junos:15.1x49</product>
</cve>
<cve id="CVE-2016-8385" level="MEDIUM">
<product>argus:6.6.04</product>
</cve>
<cve id="CVE-2016-8384" level="MEDIUM">
<product>marklogic:8.0-5.5</product>
</cve>
<cve id="CVE-2016-8387" level="MEDIUM">
<product>argus:6.6.04</product>
</cve>
<cve id="CVE-2016-8386" level="MEDIUM">
<product>argus:6.6.04</product>
</cve>
<cve id="CVE-2016-8380" level="LOW">
<product>ilc_plcs_firmware:-</product>
</cve>
<cve id="CVE-2016-8383" level="MEDIUM">
<product>marklogic:8.0-5.5</product>
</cve>
<cve id="CVE-2016-8382" level="MEDIUM">
<product>marklogic:8.0-5.5</product>
</cve>
<cve id="CVE-2016-8389" level="MEDIUM">
<product>argus:6.6.04</product>
</cve>
<cve id="CVE-2016-8388" level="MEDIUM">
<product>argus:6.6.04</product>
</cve>
<cve id="CVE-2016-2923" level="LOW">
<product>websphere_application_server:8.5.5.0</product>
<product>websphere_application_server:8.5.5.1</product>
<product>websphere_application_server:8.5.5.2</product>
<product>websphere_application_server:8.5.5.3</product>
<product>websphere_application_server:8.5.5.4</product>
<product>websphere_application_server:8.5.5.5</product>
<product>websphere_application_server:8.5.5.6</product>
<product>websphere_application_server:8.5.5.7</product>
<product>websphere_application_server:8.5.5.8</product>
<product>websphere_application_server:8.5.5.9</product>
</cve>
<cve id="CVE-2016-9035" level="MEDIUM">
<product>smartos:20161110t013148z</product>
</cve>
<cve id="CVE-2016-9036" level="LOW">
<product>msgpuck:1.0.3</product>
</cve>
<cve id="CVE-2016-9037" level="LOW">
<product>tarantool:1.7.2</product>
</cve>
<cve id="CVE-2016-2927" level="MEDIUM">
<product>bigfix_remote_control:9.1.2</product>
</cve>
<cve id="CVE-2016-2926" level="MEDIUM">
<product>rational_collaborative_lifecycle_management:3.0.1.6</product>
<product>rational_collaborative_lifecycle_management:4.0.0</product>
<product>rational_collaborative_lifecycle_management:4.0.1</product>
<product>rational_collaborative_lifecycle_management:4.0.2</product>
<product>rational_collaborative_lifecycle_management:4.0.3</product>
<product>rational_collaborative_lifecycle_management:4.0.4</product>
<product>rational_collaborative_lifecycle_management:4.0.5</product>
<product>rational_collaborative_lifecycle_management:4.0.6</product>
<product>rational_collaborative_lifecycle_management:4.0.7</product>
<product>rational_collaborative_lifecycle_management:5.0.0</product>
<product>rational_collaborative_lifecycle_management:5.0.1</product>
<product>rational_collaborative_lifecycle_management:5.0.2</product>
<product>rational_collaborative_lifecycle_management:6.0.0</product>
<product>rational_collaborative_lifecycle_management:6.0.1</product>
<product>rational_collaborative_lifecycle_management:6.0.2</product>
<product>rational_doors_next_generation:4.0.0</product>
<product>rational_doors_next_generation:4.0.1</product>
<product>rational_doors_next_generation:4.0.2</product>
<product>rational_doors_next_generation:4.0.3</product>
<product>rational_doors_next_generation:4.0.4</product>
<product>rational_doors_next_generation:4.0.5</product>
<product>rational_doors_next_generation:4.0.6</product>
<product>rational_doors_next_generation:4.0.7</product>
<product>rational_doors_next_generation:5.0.0</product>
<product>rational_doors_next_generation:5.0.1</product>
<product>rational_doors_next_generation:5.0.2</product>
<product>rational_doors_next_generation:6.0.0</product>
<product>rational_doors_next_generation:6.0.1</product>
<product>rational_doors_next_generation:6.0.2</product>
<product>rational_engineering_lifecycle_manager:4.0.0</product>
<product>rational_engineering_lifecycle_manager:4.0.1</product>
<product>rational_engineering_lifecycle_manager:4.0.2</product>
<product>rational_engineering_lifecycle_manager:4.0.3</product>
<product>rational_engineering_lifecycle_manager:4.0.4</product>
<product>rational_engineering_lifecycle_manager:4.0.5</product>
<product>rational_engineering_lifecycle_manager:4.0.6</product>
<product>rational_engineering_lifecycle_manager:4.0.7</product>
<product>rational_engineering_lifecycle_manager:5.0.0</product>
<product>rational_engineering_lifecycle_manager:5.0.1</product>
<product>rational_engineering_lifecycle_manager:5.0.2</product>
<product>rational_engineering_lifecycle_manager:6.0.0</product>
<product>rational_engineering_lifecycle_manager:6.0.1</product>
<product>rational_engineering_lifecycle_manager:6.0.2</product>
<product>rational_quality_manager:3.0.1.6</product>
<product>rational_quality_manager:4.0.0</product>
<product>rational_quality_manager:4.0.1</product>
<product>rational_quality_manager:4.0.2</product>
<product>rational_quality_manager:4.0.3</product>
<product>rational_quality_manager:4.0.4</product>
<product>rational_quality_manager:4.0.5</product>
<product>rational_quality_manager:4.0.6</product>
<product>rational_quality_manager:4.0.7</product>
<product>rational_quality_manager:5.0.0</product>
<product>rational_quality_manager:5.0.1</product>
<product>rational_quality_manager:5.0.2</product>
<product>rational_quality_manager:6.0.0</product>
<product>rational_quality_manager:6.0.1</product>
<product>rational_quality_manager:6.0.2</product>
<product>rational_rhapsody_design_manager:4.0</product>
<product>rational_rhapsody_design_manager:4.0.1</product>
<product>rational_rhapsody_design_manager:4.0.2</product>
<product>rational_rhapsody_design_manager:4.0.3</product>
<product>rational_rhapsody_design_manager:4.0.4</product>
<product>rational_rhapsody_design_manager:4.0.5</product>
<product>rational_rhapsody_design_manager:4.0.6</product>
<product>rational_rhapsody_design_manager:4.0.7</product>
<product>rational_rhapsody_design_manager:5.0.0</product>
<product>rational_rhapsody_design_manager:5.0.1</product>
<product>rational_rhapsody_design_manager:5.0.2</product>
<product>rational_rhapsody_design_manager:6.0.0</product>
<product>rational_rhapsody_design_manager:6.0.1</product>
<product>rational_rhapsody_design_manager:6.0.2</product>
<product>rational_software_architect_design_manager:4.0.0</product>
<product>rational_software_architect_design_manager:4.0.1</product>
<product>rational_software_architect_design_manager:4.0.2</product>
<product>rational_software_architect_design_manager:4.0.3</product>
<product>rational_software_architect_design_manager:4.0.4</product>
<product>rational_software_architect_design_manager:4.0.5</product>
<product>rational_software_architect_design_manager:4.0.6</product>
<product>rational_software_architect_design_manager:4.0.7</product>
<product>rational_software_architect_design_manager:5.0.0</product>
<product>rational_software_architect_design_manager:5.0.1</product>
<product>rational_software_architect_design_manager:5.0.2</product>
<product>rational_software_architect_design_manager:6.0.0</product>
<product>rational_software_architect_design_manager:6.0.1</product>
<product>rational_software_architect_design_manager:6.0.2</product>
<product>rational_team_concert:3.0.1.6</product>
<product>rational_team_concert:4.0.0</product>
<product>rational_team_concert:4.0.1</product>
<product>rational_team_concert:4.0.2</product>
<product>rational_team_concert:4.0.3</product>
<product>rational_team_concert:4.0.4</product>
<product>rational_team_concert:4.0.5</product>
<product>rational_team_concert:4.0.6</product>
<product>rational_team_concert:4.0.7</product>
<product>rational_team_concert:5.0.0</product>
<product>rational_team_concert:5.0.1</product>
<product>rational_team_concert:5.0.2</product>
<product>rational_team_concert:6.0.0</product>
<product>rational_team_concert:6.0.1</product>
<product>rational_team_concert:6.0.2</product>
</cve>
<cve id="CVE-2016-2925" level="MEDIUM">
<product>websphere_portal:6.1.0.0</product>
<product>websphere_portal:6.1.0.1</product>
<product>websphere_portal:6.1.0.2</product>
<product>websphere_portal:6.1.0.3</product>
<product>websphere_portal:6.1.0.4</product>
<product>websphere_portal:6.1.0.5</product>
<product>websphere_portal:6.1.0.6</product>
<product>websphere_portal:6.1.5.0</product>
<product>websphere_portal:6.1.5.1</product>
<product>websphere_portal:6.1.5.2</product>
<product>websphere_portal:6.1.5.3</product>
<product>websphere_portal:7.0.0.0</product>
<product>websphere_portal:7.0.0.1</product>
<product>websphere_portal:7.0.0.2</product>
<product>websphere_portal:8.0.0.0</product>
<product>websphere_portal:8.0.0.1</product>
<product>websphere_portal:8.5.0.0</product>
</cve>
<cve id="CVE-2016-2924" level="MEDIUM">
<product>biginsights:4.2</product>
</cve>
<cve id="CVE-2016-2929" level="MEDIUM">
<product>bigfix_remote_control:9.1.2</product>
</cve>
<cve id="CVE-2016-2928" level="LOW">
<product>bigfix_remote_control:9.1.2</product>
</cve>
<cve id="CVE-2016-9038" level="MEDIUM">
<product>invincea-x:6.1.3-24058</product>
</cve>
<cve id="CVE-2016-9039" level="LOW">
<product>smartos:20161110t013148z</product>
</cve>
<cve id="CVE-2016-0674" level="LOW">
<product>siebel_core-common_components:8.1.1</product>
<product>siebel_core-common_components:8.2.2</product>
</cve>
<cve id="CVE-2016-0677" level="LOW">
<product>database:12.1.0.1</product>
<product>database:12.1.0.2</product>
</cve>
<cve id="CVE-2016-4358" level="LOW">
<product>matrix_operating_environment:7.5</product>
<product>systems_insight_manager:7.5</product>
</cve>
<cve id="CVE-2016-4359" level="LOW">
<product>loadrunner:11.52</product>
<product>loadrunner:12.00</product>
<product>loadrunner:12.01</product>
<product>loadrunner:12.02</product>
<product>loadrunner:12.50</product>
<product>performance_center:11.52</product>
<product>performance_center:12.00</product>
<product>performance_center:12.01</product>
<product>performance_center:12.20</product>
<product>performance_center:12.50</product>
</cve>
<cve id="CVE-2016-6915" level="LOW">
<product>video_driver:-</product>
<product>shield_tablet_firmware:4.3.0</product>
<product>shield_tablet_tk1_firmware:1.4.0</product>
<product>shield_tv_firmware:3.2</product>
</cve>
<cve id="CVE-2016-5654" level="MEDIUM">
<product>fusioncapital_opics_plus:-</product>
</cve>
<cve id="CVE-2016-5655" level="MEDIUM">
<product>fusioncapital_opics_plus:-</product>
</cve>
<cve id="CVE-2016-5650" level="LOW">
<product>zp-ibh-13w:-</product>
<product>zp-ne-14-s:-</product>
</cve>
<cve id="CVE-2016-5652" level="MEDIUM">
<product>libtiff:4.0.6</product>
</cve>
<cve id="CVE-2016-5653" level="LOW">
<product>fusioncapital_opics_plus:-</product>
</cve>
<cve id="CVE-2016-3193" level="MEDIUM">
<product>fortianalyzer_firmware:5.0.0</product>
<product>fortianalyzer_firmware:5.0.2</product>
<product>fortianalyzer_firmware:5.0.3</product>
<product>fortianalyzer_firmware:5.0.4</product>
<product>fortianalyzer_firmware:5.0.5</product>
<product>fortianalyzer_firmware:5.0.6</product>
<product>fortianalyzer_firmware:5.0.7</product>
<product>fortianalyzer_firmware:5.0.8</product>
<product>fortianalyzer_firmware:5.0.9</product>
<product>fortianalyzer_firmware:5.0.10</product>
<product>fortianalyzer_firmware:5.0.11</product>
<product>fortianalyzer_firmware:5.0.12</product>
<product>fortianalyzer_firmware:5.2.0</product>
<product>fortianalyzer_firmware:5.2.1</product>
<product>fortianalyzer_firmware:5.2.2</product>
<product>fortianalyzer_firmware:5.2.3</product>
<product>fortianalyzer_firmware:5.2.4</product>
<product>fortianalyzer_firmware:5.2.5</product>
<product>fortianalyzer_firmware:5.4.0</product>
<product>fortimanager_firmware:5.0.0</product>
<product>fortimanager_firmware:5.0.1</product>
<product>fortimanager_firmware:5.0.2</product>
<product>fortimanager_firmware:5.0.3</product>
<product>fortimanager_firmware:5.0.4</product>
<product>fortimanager_firmware:5.0.5</product>
<product>fortimanager_firmware:5.0.6</product>
<product>fortimanager_firmware:5.0.7</product>
<product>fortimanager_firmware:5.0.8</product>
<product>fortimanager_firmware:5.0.9</product>
<product>fortimanager_firmware:5.0.10</product>
<product>fortimanager_firmware:5.0.11</product>
<product>fortimanager_firmware:5.2.0</product>
<product>fortimanager_firmware:5.2.1</product>
<product>fortimanager_firmware:5.2.2</product>
<product>fortimanager_firmware:5.2.3</product>
<product>fortimanager_firmware:5.2.4</product>
<product>fortimanager_firmware:5.2.5</product>
<product>fortimanager_firmware:5.4.0</product>
</cve>
<cve id="CVE-2016-6967" level="LOW">
<product>acrobat:11.0.17</product>
<product>acrobat_dc:15.006.30201</product>
<product>acrobat_dc:15.017.20053</product>
<product>acrobat_reader_dc:15.006.30201</product>
<product>acrobat_reader_dc:15.017.20053</product>
<product>reader:11.0.17</product>
</cve>
<cve id="CVE-2016-6966" level="LOW">
<product>acrobat:11.0.17</product>
<product>acrobat_dc:15.006.30201</product>
<product>acrobat_dc:15.017.20053</product>
<product>acrobat_reader_dc:15.006.30201</product>
<product>acrobat_reader_dc:15.017.20053</product>
<product>reader:11.0.17</product>
</cve>
<cve id="CVE-2016-6964" level="LOW">
<product>acrobat:11.0.17</product>
<product>acrobat_dc:15.006.30201</product>
<product>acrobat_dc:15.017.20053</product>
<product>acrobat_reader_dc:15.006.30201</product>
<product>acrobat_reader_dc:15.017.20053</product>
<product>reader:11.0.17</product>
</cve>
<cve id="CVE-2016-3449" level="HIGH">
<product>jdk:1.6.0</product>
<product>jdk:1.7.0</product>
<product>jdk:1.8.0</product>
<product>jre:1.6.0</product>
<product>jre:1.7.0</product>
<product>jre:1.8.0</product>
</cve>
<cve id="CVE-2016-3448" level="MEDIUM">
<product>application_express:5.0.3</product>
</cve>
<cve id="CVE-2016-6350" level="LOW">
<product>openbsd:5.8</product>
<product>openbsd:5.9</product>
</cve>
<cve id="CVE-2016-6356" level="LOW">
<product>email_security_appliance:3.3.1-09</product>
<product>email_security_appliance:7.1.0</product>
<product>email_security_appliance:7.1.1</product>
<product>email_security_appliance:7.1.2</product>
<product>email_security_appliance:7.1.3</product>
<product>email_security_appliance:7.1.4</product>
<product>email_security_appliance:7.1.5</product>
<product>email_security_appliance:7.3.0</product>
<product>email_security_appliance:7.3.1</product>
<product>email_security_appliance:7.3.2</product>
<product>email_security_appliance:7.5.0</product>
<product>email_security_appliance:7.5.1</product>
<product>email_security_appliance:7.5.2</product>
<product>email_security_appliance:7.5.2-201</product>
<product>email_security_appliance:7.6.0</product>
<product>email_security_appliance:7.6.1-000</product>
<product>email_security_appliance:7.6.1-gpl-022</product>
<product>email_security_appliance:7.6.2</product>
<product>email_security_appliance:7.6.3-000</product>
<product>email_security_appliance:7.6.3-025</product>
<product>email_security_appliance:7.7.0-000</product>
<product>email_security_appliance:7.7.1-000</product>
<product>email_security_appliance:7.8.0</product>
<product>email_security_appliance:7.8.0-311</product>
<product>email_security_appliance:8.0.1-023</product>
<product>email_security_appliance:8.0_base</product>
<product>email_security_appliance:8.5.0-000</product>
<product>email_security_appliance:8.5.0-er1-198</product>
<product>email_security_appliance:8.5.6-052</product>
<product>email_security_appliance:8.5.6-073</product>
<product>email_security_appliance:8.5.6-074</product>
<product>email_security_appliance:8.5.6-106</product>
<product>email_security_appliance:8.5.6-113</product>
<product>email_security_appliance:8.5.7-042</product>
<product>email_security_appliance:8.6.0</product>
<product>email_security_appliance:8.6.0-011</product>
<product>email_security_appliance:8.9.0</product>
<product>email_security_appliance:8.9.1-000</product>
<product>email_security_appliance:8.9.2-032</product>
<product>email_security_appliance:9.0.0</product>
<product>email_security_appliance:9.0.0-212</product>
<product>email_security_appliance:9.0.0-461</product>
<product>email_security_appliance:9.0.5-000</product>
<product>email_security_appliance:9.1.0</product>
<product>email_security_appliance:9.1.0-011</product>
<product>email_security_appliance:9.1.0-032</product>
<product>email_security_appliance:9.1.0-101</product>
<product>email_security_appliance:9.4.0</product>
<product>email_security_appliance:9.4.4-000</product>
<product>email_security_appliance:9.5.0-000</product>
<product>email_security_appliance:9.5.0-201</product>
<product>email_security_appliance:9.6.0-000</product>
<product>email_security_appliance:9.6.0-042</product>
<product>email_security_appliance:9.6.0-051</product>
<product>email_security_appliance:9.7.0-125</product>
<product>email_security_appliance:9.7.1-066</product>
</cve>
<cve id="CVE-2016-6357" level="LOW">
<product>email_security_appliance:9.7.1-066</product>
<product>email_security_appliance:9.9.6-026</product>
</cve>
<cve id="CVE-2016-6358" level="LOW">
<product>email_security_appliance:9.7.1-066</product>
<product>email_security_appliance:9.7.2-046</product>
<product>email_security_appliance:9.7.2-047</product>
<product>email_security_appliance:9.7.2-054</product>
<product>email_security_appliance:9.9.6-026</product>
<product>email_security_appliance:9.9_base</product>
</cve>
<cve id="CVE-2016-6359" level="MEDIUM">
<product>transport_gateway_installation_software:4.1%284.0%29</product>
</cve>
<cve id="CVE-2016-5958" level="LOW">
<product>security_privileged_identity_manager:2.0.2</product>
<product>security_privileged_identity_manager:2.1</product>
</cve>
<cve id="CVE-2016-3047" level="MEDIUM">
<product>filenet_workplace:4.0.2</product>
</cve>
<cve id="CVE-2016-8819" level="LOW">
<product>gpu_driver:-</product>
</cve>
<cve id="CVE-2016-8818" level="LOW">
<product>gpu_driver:-</product>
</cve>
<cve id="CVE-2016-3046" level="LOW">
<product>security_access_manager_for_mobile</product>
<product>security_access_manager_9.0_firmware</product>
<product>security_access_manager_for_web_8.0_firmware</product>
</cve>
<cve id="CVE-2016-8815" level="LOW">
<product>gpu_driver:-</product>
</cve>
<cve id="CVE-2016-8814" level="LOW">
<product>gpu_driver:-</product>
</cve>
<cve id="CVE-2016-8817" level="LOW">
<product>gpu_driver:-</product>
</cve>
<cve id="CVE-2016-8816" level="LOW">
<product>gpu_driver:-</product>
</cve>
<cve id="CVE-2016-8811" level="LOW">
<product>gpu_driver:341.98</product>
<product>gpu_driver:373.06</product>
</cve>
<cve id="CVE-2016-8810" level="LOW">
<product>gpu_driver:341.98</product>
<product>gpu_driver:373.06</product>
</cve>
<cve id="CVE-2016-8813" level="LOW">
<product>gpu_driver:-</product>
</cve>
<cve id="CVE-2016-8812" level="LOW">
<product>geforce_experience:-</product>
</cve>
<cve id="CVE-2016-5953" level="MEDIUM">
<product>sterling_selling_and_fulfillment_foundation:9.1.0</product>
<product>sterling_selling_and_fulfillment_foundation:9.2.0</product>
<product>sterling_selling_and_fulfillment_foundation:9.2.1</product>
<product>sterling_selling_and_fulfillment_foundation:9.3</product>
<product>sterling_selling_and_fulfillment_foundation:9.4</product>
<product>sterling_selling_and_fulfillment_foundation:9.5</product>
</cve>
<cve id="CVE-2016-3044" level="LOW">
<product>powerkvm:2.1</product>
<product>powerkvm:2.1.0.2</product>
<product>powerkvm:2.1.1.0</product>
<product>powerkvm:2.1.1.2</product>
<product>powerkvm:2.1.1.3</product>
<product>powerkvm:3.1</product>
<product>powerkvm:3.1.0.1</product>
</cve>
<cve id="CVE-2016-5952" level="LOW">
<product>kenexa_lcms_premier:9.0</product>
<product>kenexa_lcms_premier:9.1</product>
<product>kenexa_lcms_premier:9.2</product>
<product>kenexa_lcms_premier:9.3</product>
<product>kenexa_lcms_premier:9.4</product>
<product>kenexa_lcms_premier:9.5</product>
<product>kenexa_lcms_premier:10.0</product>
</cve>
<cve id="CVE-2016-3043" level="MEDIUM">
<product>security_access_manager_for_mobile</product>
<product>security_access_manager_9.0_firmware</product>
<product>security_access_manager_for_web_7.0_firmware</product>
<product>security_access_manager_for_web_8.0_firmware</product>
</cve>
<cve id="CVE-2016-5951" level="MEDIUM">
<product>kenexa_lcms_premier:9.1</product>
<product>kenexa_lcms_premier:9.2</product>
<product>kenexa_lcms_premier:9.3</product>
<product>kenexa_lcms_premier:9.4</product>
<product>kenexa_lcms_premier:9.5</product>
<product>kenexa_lcms_premier:10.0</product>
<product>kenexa_lcms_premier:10.1</product>
<product>kenexa_lcms_premier:10.2</product>
</cve>
<cve id="CVE-2016-3042" level="MEDIUM">
<product>websphere_application_server:</product>
</cve>
<cve id="CVE-2016-5950" level="LOW">
<product>kenexa_lcms_premier:9.0</product>
<product>kenexa_lcms_premier:9.1</product>
<product>kenexa_lcms_premier:9.2</product>
<product>kenexa_lcms_premier:9.2.1</product>
<product>kenexa_lcms_premier:9.3</product>
<product>kenexa_lcms_premier:9.4</product>
<product>kenexa_lcms_premier:9.5</product>
<product>kenexa_lcms_premier:10.0</product>
<product>kenexa_lcms_premier:10.1</product>
<product>kenexa_lcms_premier:10.2</product>
</cve>
<cve id="CVE-2016-5957" level="LOW">
<product>security_privileged_identity_manager_virtual_appliance:2.0.2</product>
</cve>
<cve id="CVE-2016-3040" level="MEDIUM">
<product>security_privileged_identity_manager_virtual_appliance:2.0</product>
</cve>
<cve id="CVE-2016-3094" level="MEDIUM">
<product>qpid_java:6.0.2</product>
</cve>
<cve id="CVE-2016-3095" level="LOW">
<product>pulp:2.8.1</product>
<product>fedora:24</product>
</cve>
<cve id="CVE-2016-3096" level="LOW">
<product>ansible:1.9.6</product>
<product>ansible:2.0</product>
<product>ansible:2.0.1</product>
<product>fedora:22</product>
<product>fedora:23</product>
<product>fedora:24</product>
</cve>
<cve id="CVE-2016-3097" level="MEDIUM">
<product>network_satellite:5.7</product>
</cve>
<cve id="CVE-2016-3090" level="LOW">
<product>struts:2.0.1</product>
<product>struts:2.0.2</product>
<product>struts:2.0.3</product>
<product>struts:2.0.4</product>
<product>struts:2.0.5</product>
<product>struts:2.0.6</product>
<product>struts:2.0.7</product>
<product>struts:2.0.8</product>
<product>struts:2.0.9</product>
<product>struts:2.0.10</product>
<product>struts:2.0.11</product>
<product>struts:2.0.11.1</product>
<product>struts:2.0.11.2</product>
<product>struts:2.0.12</product>
<product>struts:2.0.13</product>
<product>struts:2.0.14</product>
<product>struts:2.1.0</product>
<product>struts:2.1.1</product>
<product>struts:2.1.2</product>
<product>struts:2.1.3</product>
<product>struts:2.1.4</product>
<product>struts:2.1.5</product>
<product>struts:2.1.6</product>
<product>struts:2.1.7</product>
<product>struts:2.1.8</product>
<product>struts:2.1.8.1</product>
<product>struts:2.2.1</product>
<product>struts:2.2.1.1</product>
<product>struts:2.2.3</product>
<product>struts:2.2.3.1</product>
<product>struts:2.3.1</product>
<product>struts:2.3.1.1</product>
<product>struts:2.3.1.2</product>
<product>struts:2.3.3</product>
<product>struts:2.3.4</product>
<product>struts:2.3.4.1</product>
<product>struts:2.3.5</product>
<product>struts:2.3.6</product>
<product>struts:2.3.7</product>
<product>struts:2.3.8</product>
<product>struts:2.3.9</product>
<product>struts:2.3.10</product>
<product>struts:2.3.11</product>
<product>struts:2.3.12</product>
<product>struts:2.3.13</product>
<product>struts:2.3.14</product>
<product>struts:2.3.14.1</product>
<product>struts:2.3.14.2</product>
<product>struts:2.3.14.3</product>
<product>struts:2.3.15</product>
<product>struts:2.3.15.1</product>
<product>struts:2.3.15.2</product>
<product>struts:2.3.15.3</product>
<product>struts:2.3.16</product>
<product>struts:2.3.16.1</product>
<product>struts:2.3.16.2</product>
<product>struts:2.3.16.3</product>
<product>struts:2.3.17</product>
<product>struts:2.3.19</product>
</cve>
<cve id="CVE-2016-3091" level="LOW">
<product>diego:0.1468.0</product>
<product>diego:0.1469.0</product>
<product>diego:0.1470.0</product>
</cve>
<cve id="CVE-2016-3720" level="LOW">
<product>jackson:2.7.3</product>
<product>fedora:24</product>
</cve>
<cve id="CVE-2016-3093" level="LOW">
<product>struts:2.0.0</product>
<product>struts:2.0.1</product>
<product>struts:2.0.2</product>
<product>struts:2.0.3</product>
<product>struts:2.0.4</product>
<product>struts:2.0.5</product>
<product>struts:2.0.6</product>
<product>struts:2.0.7</product>
<product>struts:2.0.8</product>
<product>struts:2.0.9</product>
<product>struts:2.0.10</product>
<product>struts:2.0.11</product>
<product>struts:2.0.11.1</product>
<product>struts:2.0.11.2</product>
<product>struts:2.0.12</product>
<product>struts:2.0.13</product>
<product>struts:2.0.14</product>
<product>struts:2.1.0</product>
<product>struts:2.1.1</product>
<product>struts:2.1.2</product>
<product>struts:2.1.3</product>
<product>struts:2.1.4</product>
<product>struts:2.1.5</product>
<product>struts:2.1.6</product>
<product>struts:2.1.8</product>
<product>struts:2.1.8.1</product>
<product>struts:2.2.1</product>
<product>struts:2.2.1.1</product>
<product>struts:2.2.3</product>
<product>struts:2.2.3.1</product>
<product>struts:2.3.1</product>
<product>struts:2.3.1.1</product>
<product>struts:2.3.1.2</product>
<product>struts:2.3.4</product>
<product>struts:2.3.4.1</product>
<product>struts:2.3.7</product>
<product>struts:2.3.8</product>
<product>struts:2.3.12</product>
<product>struts:2.3.14</product>
<product>struts:2.3.14.1</product>
<product>struts:2.3.14.2</product>
<product>struts:2.3.14.3</product>
<product>struts:2.3.15</product>
<product>struts:2.3.15.1</product>
<product>struts:2.3.15.2</product>
<product>struts:2.3.15.3</product>
<product>struts:2.3.16</product>
<product>struts:2.3.16.1</product>
<product>struts:2.3.16.2</product>
<product>struts:2.3.16.3</product>
<product>struts:2.3.20</product>
<product>struts:2.3.20.1</product>
<product>struts:2.3.20.3</product>
<product>struts:2.3.24</product>
<product>struts:2.3.24.1</product>
<product>ognl:3.0.11</product>
</cve>
<cve id="CVE-2016-8311" level="LOW">
<product>flexcube_universal_banking:11.3.0</product>
<product>flexcube_universal_banking:11.4.0</product>
<product>flexcube_universal_banking:12.0.1</product>
<product>flexcube_universal_banking:12.0.2</product>
<product>flexcube_universal_banking:12.0.3</product>
<product>flexcube_universal_banking:12.1.0</product>
<product>flexcube_universal_banking:12.2.0</product>
</cve>
<cve id="CVE-2016-3728" level="MEDIUM">
<product>foreman:1.10.3</product>
<product>foreman:1.11.0</product>
<product>foreman:1.11.0</product>
<product>foreman:1.11.0</product>
<product>foreman:1.11.0</product>
<product>foreman:1.11.1</product>
</cve>
<cve id="CVE-2016-3729" level="LOW">
<product>moodle:2.7</product>
<product>moodle:2.7.0</product>
<product>moodle:2.7.0</product>
<product>moodle:2.7.0</product>
<product>moodle:2.7.1</product>
<product>moodle:2.7.2</product>
<product>moodle:2.7.3</product>
<product>moodle:2.7.4</product>
<product>moodle:2.7.5</product>
<product>moodle:2.7.6</product>
<product>moodle:2.7.7</product>
<product>moodle:2.7.8</product>
<product>moodle:2.7.9</product>
<product>moodle:2.7.10</product>
<product>moodle:2.7.11</product>
<product>moodle:2.7.12</product>
<product>moodle:2.7.13</product>
<product>moodle:2.8</product>
<product>moodle:2.8.1</product>
<product>moodle:2.8.2</product>
<product>moodle:2.8.3</product>
<product>moodle:2.8.4</product>
<product>moodle:2.8.5</product>
<product>moodle:2.8.6</product>
<product>moodle:2.8.7</product>
<product>moodle:2.8.8</product>
<product>moodle:2.8.9</product>
<product>moodle:2.8.10</product>
<product>moodle:2.8.11</product>
<product>moodle:2.9</product>
<product>moodle:2.9.1</product>
<product>moodle:2.9.2</product>
<product>moodle:2.9.3</product>
<product>moodle:2.9.4</product>
<product>moodle:2.9.5</product>
<product>moodle:3.0</product>
<product>moodle:3.0.0</product>
<product>moodle:3.0.0</product>
<product>moodle:3.0.0</product>
<product>moodle:3.0.0</product>
<product>moodle:3.0.0</product>
<product>moodle:3.0.1</product>
<product>moodle:3.0.2</product>
<product>moodle:3.0.3</product>
</cve>
<cve id="CVE-2016-8600" level="LOW">
<product>dotcms:3.2.1</product>
</cve>
<cve id="CVE-2016-8977" level="LOW">
<product>bigfix_inventory:9.2</product>
<product>license_metric_tool:9.2.0</product>
</cve>
<cve id="CVE-2016-8974" level="LOW">
<product>rational_rhapsody_design_manager:4.0</product>
<product>rational_rhapsody_design_manager:4.0.1</product>
<product>rational_rhapsody_design_manager:4.0.2</product>
<product>rational_rhapsody_design_manager:4.0.3</product>
<product>rational_rhapsody_design_manager:4.0.4</product>
<product>rational_rhapsody_design_manager:4.0.5</product>
<product>rational_rhapsody_design_manager:4.0.6</product>
<product>rational_rhapsody_design_manager:4.0.7</product>
<product>rational_rhapsody_design_manager:5.0</product>
<product>rational_rhapsody_design_manager:5.0.1</product>
<product>rational_rhapsody_design_manager:5.0.2</product>
<product>rational_rhapsody_design_manager:6.0</product>
<product>rational_rhapsody_design_manager:6.0.1</product>
<product>rational_rhapsody_design_manager:6.0.2</product>
</cve>
<cve id="CVE-2016-8975" level="MEDIUM">
<product>rhapsody_design_manager:5.0</product>
<product>rhapsody_design_manager:5.0.1</product>
<product>rhapsody_design_manager:5.0.2</product>
<product>rhapsody_design_manager:6.0</product>
<product>rhapsody_design_manager:6.0.1</product>
<product>rhapsody_design_manager:6.0.2</product>
<product>rhapsody_design_manager:6.0.3</product>
</cve>
<cve id="CVE-2016-8972" level="LOW">
<product>aix:6.1</product>
<product>aix:7.1</product>
<product>aix:7.2</product>
<product>vios:2.2.0.0</product>
<product>vios:2.2.0.10</product>
<product>vios:2.2.0.11</product>
<product>vios:2.2.0.12</product>
<product>vios:2.2.0.13</product>
<product>vios:2.2.1.0</product>
<product>vios:2.2.1.1</product>
<product>vios:2.2.1.3</product>
<product>vios:2.2.1.4</product>
<product>vios:2.2.1.5</product>
<product>vios:2.2.1.6</product>
<product>vios:2.2.1.7</product>
<product>vios:2.2.1.8</product>
<product>vios:2.2.2.0</product>
<product>vios:2.2.2.1</product>
<product>vios:2.2.2.2</product>
<product>vios:2.2.2.3</product>
<product>vios:2.2.2.4</product>
<product>vios:2.2.2.6</product>
<product>vios:2.2.2.70</product>
<product>vios:2.2.3.0</product>
<product>vios:2.2.3.1</product>
<product>vios:2.2.3.2</product>
<product>vios:2.2.3.3</product>
<product>vios:2.2.3.4</product>
<product>vios:2.2.3.50</product>
<product>vios:2.2.3.51</product>
<product>vios:2.2.3.52</product>
<product>vios:2.2.3.60</product>
<product>vios:2.2.3.70</product>
<product>vios:2.2.3.80</product>
<product>vios:2.2.4.0</product>
<product>vios:2.2.4.10</product>
<product>vios:2.2.4.21</product>
<product>vios:2.2.4.22</product>
<product>vios:2.2.4.23</product>
<product>vios:2.2.4.30</product>
<product>vios:2.2.5.0</product>
<product>vios:2.2.5.10</product>
</cve>
<cve id="CVE-2016-8605" level="LOW">
<product>guile:2.0.12</product>
<product>fedora:23</product>
<product>fedora:24</product>
<product>fedora:25</product>
</cve>
<cve id="CVE-2016-8606" level="LOW">
<product>guile:2.0.12</product>
<product>fedora:23</product>
<product>fedora:24</product>
<product>fedora:25</product>
</cve>
<cve id="CVE-2016-8971" level="LOW">
<product>websphere_mq:8.0</product>
<product>websphere_mq:8.0.0.1</product>
<product>websphere_mq:8.0.0.2</product>
<product>websphere_mq:8.0.0.3</product>
<product>websphere_mq:8.0.0.4</product>
<product>websphere_mq:8.0.0.5</product>
</cve>
<cve id="CVE-2016-4170" level="MEDIUM">
<product>experience_manager:5.6.1</product>
<product>experience_manager:6.0.0</product>
<product>experience_manager:6.1.0</product>
<product>experience_manager:6.2.0</product>
</cve>
<cve id="CVE-2016-7402" level="LOW">
<product>adaptive_server_enterprise:16.0</product>
</cve>
<cve id="CVE-2016-7400" level="LOW">
<product>exponent_cms:2.3.9</product>
</cve>
<cve id="CVE-2016-7407" level="LOW">
<product>dropbear_ssh:2016.73</product>
</cve>
<cve id="CVE-2016-7406" level="LOW">
<product>dropbear_ssh:2016.73</product>
</cve>
<cve id="CVE-2016-7405" level="LOW">
<product>adodb:5.00</product>
<product>adodb:5.01</product>
<product>adodb:5.02</product>
<product>adodb:5.02</product>
<product>adodb:5.03</product>
<product>adodb:5.04</product>
<product>adodb:5.04</product>
<product>adodb:5.05</product>
<product>adodb:5.06</product>
<product>adodb:5.06</product>
<product>adodb:5.07</product>
<product>adodb:5.08</product>
<product>adodb:5.08</product>
<product>adodb:5.09</product>
<product>adodb:5.09</product>
<product>adodb:5.10</product>
<product>adodb:5.11</product>
<product>adodb:5.12</product>
<product>adodb:5.13</product>
<product>adodb:5.14</product>
<product>adodb:5.15</product>
<product>adodb:5.16</product>
<product>adodb:5.16</product>
<product>adodb:5.17</product>
<product>adodb:5.18</product>
<product>adodb:5.18</product>
<product>adodb:5.19</product>
<product>adodb:5.20.0</product>
<product>adodb:5.20.1</product>
<product>adodb:5.20.2</product>
<product>adodb:5.20.3</product>
<product>adodb:5.20.4</product>
<product>adodb:5.20.5</product>
<product>adodb:5.20.6</product>
<product>fedora:25</product>
</cve>
<cve id="CVE-2016-7409" level="LOW">
<product>dropbear_ssh:2016.73</product>
</cve>
<cve id="CVE-2016-7408" level="LOW">
<product>dropbear_ssh:2016.73</product>
</cve>
<cve id="CVE-2016-0536" level="MEDIUM">
<product>universal_work_queue:11.5.10.2</product>
</cve>
<cve id="CVE-2016-0241" level="LOW">
<product>security_guardium_database_activity_monitor:8.2</product>
<product>security_guardium_database_activity_monitor:9.0</product>
<product>security_guardium_database_activity_monitor:9.1</product>
<product>security_guardium_database_activity_monitor:9.5</product>
<product>security_guardium_database_activity_monitor:10.0</product>
<product>security_guardium_database_activity_monitor:10.1</product>
</cve>
<cve id="CVE-2016-0242" level="LOW">
<product>security_guardium:10.0</product>
<product>security_guardium:10.01</product>
</cve>
<cve id="CVE-2016-3542" level="LOW">
<product>knowledge_management:12.1.1</product>
<product>knowledge_management:12.1.2</product>
<product>knowledge_management:12.1.3</product>
<product>knowledge_management:12.2.3</product>
<product>knowledge_management:12.2.4</product>
<product>knowledge_management:12.2.5</product>
</cve>
<cve id="CVE-2016-3543" level="LOW">
<product>common_applications_calendar:12.1.1</product>
<product>common_applications_calendar:12.1.2</product>
<product>common_applications_calendar:12.1.3</product>
<product>common_applications_calendar:12.2.3</product>
<product>common_applications_calendar:12.2.4</product>
<product>common_applications_calendar:12.2.5</product>
</cve>
<cve id="CVE-2016-3540" level="MEDIUM">
<product>enterprise_manager_base_platform:12.1.0.5</product>
<product>enterprise_manager_base_platform:13.1.0.0</product>
</cve>
<cve id="CVE-2016-3541" level="LOW">
<product>common_applications_calendar:12.1.1</product>
<product>common_applications_calendar:12.1.2</product>
<product>common_applications_calendar:12.1.3</product>
<product>common_applications_calendar:12.2.3</product>
<product>common_applications_calendar:12.2.4</product>
<product>common_applications_calendar:12.2.5</product>
</cve>
<cve id="CVE-2016-3546" level="LOW">
<product>advanced_collections:12.1.1</product>
<product>advanced_collections:12.1.2</product>
<product>advanced_collections:12.1.3</product>
</cve>
<cve id="CVE-2016-3547" level="LOW">
<product>one-to-one_fulfillment:12.1.1</product>
<product>one-to-one_fulfillment:12.1.2</product>
<product>one-to-one_fulfillment:12.1.3</product>
<product>one-to-one_fulfillment:12.2.3</product>
<product>one-to-one_fulfillment:12.2.4</product>
<product>one-to-one_fulfillment:12.2.5</product>
</cve>
<cve id="CVE-2016-3544" level="MEDIUM">
<product>business_intelligence:11.1.1.7.0</product>
<product>business_intelligence:11.1.1.9.0</product>
<product>business_intelligence:11.2.1.0.0</product>
</cve>
<cve id="CVE-2016-3545" level="LOW">
<product>application_object_library:12.1.3</product>
<product>application_object_library:12.2.3</product>
<product>application_object_library:12.2.4</product>
<product>application_object_library:12.2.5</product>
</cve>
<cve id="CVE-2016-0532" level="LOW">
<product>crm_technical_foundation:11.5.10.2</product>
<product>crm_technical_foundation:12.1.3</product>
<product>crm_technical_foundation:12.2.3</product>
<product>crm_technical_foundation:12.2.4</product>
<product>crm_technical_foundation:12.2.5</product>
</cve>
<cve id="CVE-2016-3548" level="LOW">
<product>marketing:12.1.1</product>
<product>marketing:12.1.2</product>
<product>marketing:12.1.3</product>
<product>marketing:12.2.3</product>
<product>marketing:12.2.4</product>
<product>marketing:12.2.5</product>
</cve>
<cve id="CVE-2016-3549" level="LOW">
<product>e-business_suite_secure_enterprise_search:12.1.3</product>
<product>e-business_suite_secure_enterprise_search:12.2.3</product>
<product>e-business_suite_secure_enterprise_search:12.2.4</product>
<product>e-business_suite_secure_enterprise_search:12.2.5</product>
</cve>
<cve id="CVE-2016-0533" level="MEDIUM">
<product>crm_technical_foundation:11.5.10.2</product>
<product>crm_technical_foundation:12.1.3</product>
</cve>
<cve id="CVE-2016-0530" level="LOW">
<product>customer_interaction_history:12.1.1</product>
<product>customer_interaction_history:12.1.2</product>
<product>customer_interaction_history:12.1.3</product>
<product>customer_interaction_history:12.2.3</product>
<product>customer_interaction_history:12.2.4</product>
<product>customer_interaction_history:12.2.5</product>
</cve>
<cve id="CVE-2016-0531" level="LOW">
<product>applications_manager:12.1.3</product>
</cve>
<cve id="CVE-2016-6615" level="MEDIUM">
<product>phpmyadmin:4.4.0</product>
<product>phpmyadmin:4.4.1</product>
<product>phpmyadmin:4.4.1.1</product>
<product>phpmyadmin:4.4.2</product>
<product>phpmyadmin:4.4.3</product>
<product>phpmyadmin:4.4.4</product>
<product>phpmyadmin:4.4.5</product>
<product>phpmyadmin:4.4.6</product>
<product>phpmyadmin:4.4.6.1</product>
<product>phpmyadmin:4.4.7</product>
<product>phpmyadmin:4.4.8</product>
<product>phpmyadmin:4.4.9</product>
<product>phpmyadmin:4.4.10</product>
<product>phpmyadmin:4.4.11</product>
<product>phpmyadmin:4.4.12</product>
<product>phpmyadmin:4.4.13</product>
<product>phpmyadmin:4.4.13.1</product>
<product>phpmyadmin:4.4.14.1</product>
<product>phpmyadmin:4.4.15</product>
<product>phpmyadmin:4.4.15.1</product>
<product>phpmyadmin:4.4.15.2</product>
<product>phpmyadmin:4.4.15.3</product>
<product>phpmyadmin:4.4.15.4</product>
<product>phpmyadmin:4.4.15.5</product>
<product>phpmyadmin:4.4.15.6</product>
<product>phpmyadmin:4.4.15.7</product>
<product>phpmyadmin:4.6.0</product>
<product>phpmyadmin:4.6.0</product>
<product>phpmyadmin:4.6.0</product>
<product>phpmyadmin:4.6.0</product>
<product>phpmyadmin:4.6.1</product>
<product>phpmyadmin:4.6.2</product>
<product>phpmyadmin:4.6.3</product>
</cve>
<cve id="CVE-2016-6614" level="MEDIUM">
<product>phpmyadmin:4.0.0</product>
<product>phpmyadmin:4.0.1</product>
<product>phpmyadmin:4.0.2</product>
<product>phpmyadmin:4.0.3</product>
<product>phpmyadmin:4.0.4</product>
<product>phpmyadmin:4.0.4.1</product>
<product>phpmyadmin:4.0.4.2</product>
<product>phpmyadmin:4.0.5</product>
<product>phpmyadmin:4.0.6</product>
<product>phpmyadmin:4.0.7</product>
<product>phpmyadmin:4.0.8</product>
<product>phpmyadmin:4.0.9</product>
<product>phpmyadmin:4.0.10</product>
<product>phpmyadmin:4.0.10.1</product>
<product>phpmyadmin:4.0.10.2</product>
<product>phpmyadmin:4.0.10.3</product>
<product>phpmyadmin:4.0.10.4</product>
<product>phpmyadmin:4.0.10.5</product>
<product>phpmyadmin:4.0.10.6</product>
<product>phpmyadmin:4.0.10.7</product>
<product>phpmyadmin:4.0.10.8</product>
<product>phpmyadmin:4.0.10.9</product>
<product>phpmyadmin:4.0.10.10</product>
<product>phpmyadmin:4.0.10.11</product>
<product>phpmyadmin:4.0.10.12</product>
<product>phpmyadmin:4.0.10.13</product>
<product>phpmyadmin:4.0.10.14</product>
<product>phpmyadmin:4.0.10.15</product>
<product>phpmyadmin:4.0.10.16</product>
<product>phpmyadmin:4.4.0</product>
<product>phpmyadmin:4.4.1</product>
<product>phpmyadmin:4.4.1.1</product>
<product>phpmyadmin:4.4.2</product>
<product>phpmyadmin:4.4.3</product>
<product>phpmyadmin:4.4.4</product>
<product>phpmyadmin:4.4.5</product>
<product>phpmyadmin:4.4.6</product>
<product>phpmyadmin:4.4.6.1</product>
<product>phpmyadmin:4.4.7</product>
<product>phpmyadmin:4.4.8</product>
<product>phpmyadmin:4.4.9</product>
<product>phpmyadmin:4.4.10</product>
<product>phpmyadmin:4.4.11</product>
<product>phpmyadmin:4.4.12</product>
<product>phpmyadmin:4.4.13</product>
<product>phpmyadmin:4.4.13.1</product>
<product>phpmyadmin:4.4.14</product>
<product>phpmyadmin:4.4.14.1</product>
<product>phpmyadmin:4.4.15</product>
<product>phpmyadmin:4.4.15.1</product>
<product>phpmyadmin:4.4.15.2</product>
<product>phpmyadmin:4.4.15.3</product>
<product>phpmyadmin:4.4.15.4</product>
<product>phpmyadmin:4.4.15.5</product>
<product>phpmyadmin:4.4.15.6</product>
<product>phpmyadmin:4.4.15.7</product>
<product>phpmyadmin:4.6.0</product>
<product>phpmyadmin:4.6.1</product>
<product>phpmyadmin:4.6.2</product>
<product>phpmyadmin:4.6.3</product>
</cve>
<cve id="CVE-2016-3995" level="LOW">
<product>crypto%2b%2b:5.6.3</product>
</cve>
<cve id="CVE-2016-3222" level="MEDIUM">
<product>edge:-</product>
</cve>
<cve id="CVE-2016-6613" level="HIGH">
<product>phpmyadmin:4.0.0</product>
<product>phpmyadmin:4.0.1</product>
<product>phpmyadmin:4.0.2</product>
<product>phpmyadmin:4.0.3</product>
<product>phpmyadmin:4.0.4</product>
<product>phpmyadmin:4.0.4.1</product>
<product>phpmyadmin:4.0.4.2</product>
<product>phpmyadmin:4.0.5</product>
<product>phpmyadmin:4.0.6</product>
<product>phpmyadmin:4.0.7</product>
<product>phpmyadmin:4.0.8</product>
<product>phpmyadmin:4.0.9</product>
<product>phpmyadmin:4.0.10</product>
<product>phpmyadmin:4.0.10.1</product>
<product>phpmyadmin:4.0.10.2</product>
<product>phpmyadmin:4.0.10.3</product>
<product>phpmyadmin:4.0.10.4</product>
<product>phpmyadmin:4.0.10.5</product>
<product>phpmyadmin:4.0.10.6</product>
<product>phpmyadmin:4.0.10.7</product>
<product>phpmyadmin:4.0.10.8</product>
<product>phpmyadmin:4.0.10.9</product>
<product>phpmyadmin:4.0.10.10</product>
<product>phpmyadmin:4.0.10.11</product>
<product>phpmyadmin:4.0.10.12</product>
<product>phpmyadmin:4.0.10.13</product>
<product>phpmyadmin:4.0.10.14</product>
<product>phpmyadmin:4.0.10.15</product>
<product>phpmyadmin:4.0.10.16</product>
<product>phpmyadmin:4.4.0</product>
<product>phpmyadmin:4.4.1</product>
<product>phpmyadmin:4.4.1.1</product>
<product>phpmyadmin:4.4.2</product>
<product>phpmyadmin:4.4.3</product>
<product>phpmyadmin:4.4.4</product>
<product>phpmyadmin:4.4.5</product>
<product>phpmyadmin:4.4.6</product>
<product>phpmyadmin:4.4.6.1</product>
<product>phpmyadmin:4.4.7</product>
<product>phpmyadmin:4.4.8</product>
<product>phpmyadmin:4.4.9</product>
<product>phpmyadmin:4.4.10</product>
<product>phpmyadmin:4.4.11</product>
<product>phpmyadmin:4.4.12</product>
<product>phpmyadmin:4.4.13</product>
<product>phpmyadmin:4.4.13.1</product>
<product>phpmyadmin:4.4.14</product>
<product>phpmyadmin:4.4.14.1</product>
<product>phpmyadmin:4.4.15</product>
<product>phpmyadmin:4.4.15.1</product>
<product>phpmyadmin:4.4.15.2</product>
<product>phpmyadmin:4.4.15.3</product>
<product>phpmyadmin:4.4.15.4</product>
<product>phpmyadmin:4.4.15.5</product>
<product>phpmyadmin:4.4.15.6</product>
<product>phpmyadmin:4.4.15.7</product>
<product>phpmyadmin:4.6.0</product>
<product>phpmyadmin:4.6.1</product>
<product>phpmyadmin:4.6.2</product>
<product>phpmyadmin:4.6.3</product>
</cve>
<cve id="CVE-2016-6612" level="LOW">
<product>phpmyadmin:4.0.0</product>
<product>phpmyadmin:4.0.1</product>
<product>phpmyadmin:4.0.2</product>
<product>phpmyadmin:4.0.3</product>
<product>phpmyadmin:4.0.4</product>
<product>phpmyadmin:4.0.4.1</product>
<product>phpmyadmin:4.0.4.2</product>
<product>phpmyadmin:4.0.5</product>
<product>phpmyadmin:4.0.6</product>
<product>phpmyadmin:4.0.7</product>
<product>phpmyadmin:4.0.8</product>
<product>phpmyadmin:4.0.9</product>
<product>phpmyadmin:4.0.10</product>
<product>phpmyadmin:4.0.10.1</product>
<product>phpmyadmin:4.0.10.2</product>
<product>phpmyadmin:4.0.10.3</product>
<product>phpmyadmin:4.0.10.4</product>
<product>phpmyadmin:4.0.10.5</product>
<product>phpmyadmin:4.0.10.6</product>
<product>phpmyadmin:4.0.10.7</product>
<product>phpmyadmin:4.0.10.8</product>
<product>phpmyadmin:4.0.10.9</product>
<product>phpmyadmin:4.0.10.10</product>
<product>phpmyadmin:4.0.10.11</product>
<product>phpmyadmin:4.0.10.12</product>
<product>phpmyadmin:4.0.10.13</product>
<product>phpmyadmin:4.0.10.14</product>
<product>phpmyadmin:4.0.10.15</product>
<product>phpmyadmin:4.0.10.16</product>
<product>phpmyadmin:4.4.0</product>
<product>phpmyadmin:4.4.1</product>
<product>phpmyadmin:4.4.1.1</product>
<product>phpmyadmin:4.4.2</product>
<product>phpmyadmin:4.4.3</product>
<product>phpmyadmin:4.4.4</product>
<product>phpmyadmin:4.4.5</product>
<product>phpmyadmin:4.4.6</product>
<product>phpmyadmin:4.4.6.1</product>
<product>phpmyadmin:4.4.7</product>
<product>phpmyadmin:4.4.8</product>
<product>phpmyadmin:4.4.9</product>
<product>phpmyadmin:4.4.10</product>
<product>phpmyadmin:4.4.11</product>
<product>phpmyadmin:4.4.12</product>
<product>phpmyadmin:4.4.13</product>
<product>phpmyadmin:4.4.13.1</product>
<product>phpmyadmin:4.4.14</product>
<product>phpmyadmin:4.4.14.1</product>
<product>phpmyadmin:4.4.15</product>
<product>phpmyadmin:4.4.15.1</product>
<product>phpmyadmin:4.4.15.2</product>
<product>phpmyadmin:4.4.15.3</product>
<product>phpmyadmin:4.4.15.4</product>
<product>phpmyadmin:4.4.15.5</product>
<product>phpmyadmin:4.4.15.6</product>
<product>phpmyadmin:4.4.15.7</product>
<product>phpmyadmin:4.6.0</product>
<product>phpmyadmin:4.6.1</product>
<product>phpmyadmin:4.6.2</product>
<product>phpmyadmin:4.6.3</product>
</cve>
<cve id="CVE-2016-9553" level="LOW">
<product>web_appliance:4.2.1.3</product>
</cve>
<cve id="CVE-2016-9557" level="MEDIUM">
<product>jasper:1.900.24</product>
</cve>
<cve id="CVE-2016-9554" level="LOW">
<product>web_appliance:4.2.1.3</product>
</cve>
<cve id="CVE-2016-1765" level="LOW">
<product>xcode:7.2.1</product>
</cve>
<cve id="CVE-2016-9559" level="MEDIUM">
<product>imagemagick:7.0.3-6</product>
</cve>
<cve id="CVE-2016-9558" level="LOW">
<product>libdwarf:2016-10-21</product>
</cve>
<cve id="CVE-2016-5001" level="LOW">
<product>hadoop:2.6.3</product>
<product>hadoop:2.7.0</product>
<product>hadoop:2.7.1</product>
</cve>
<cve id="CVE-2016-5000" level="MEDIUM">
<product>poi:3.13</product>
</cve>
<cve id="CVE-2016-5003" level="LOW">
<product>ws-xmlrpc:3.1.3</product>
</cve>
<cve id="CVE-2016-5002" level="MEDIUM">
<product>xml-rpc:3.1.3</product>
</cve>
<cve id="CVE-2016-5005" level="MEDIUM">
<product>archiva:1.3.9</product>
</cve>
<cve id="CVE-2016-5004" level="MEDIUM">
<product>ws-xmlrpc:3.1.3</product>
</cve>
<cve id="CVE-2016-5007" level="LOW">
<product>spring_framework:3.2.0</product>
<product>spring_framework:3.2.1</product>
<product>spring_framework:3.2.2</product>
<product>spring_framework:3.2.3</product>
<product>spring_framework:3.2.4</product>
<product>spring_framework:3.2.5</product>
<product>spring_framework:3.2.6</product>
<product>spring_framework:3.2.7</product>
<product>spring_framework:3.2.8</product>
<product>spring_framework:3.2.9</product>
<product>spring_framework:3.2.10</product>
<product>spring_framework:3.2.11</product>
<product>spring_framework:3.2.12</product>
<product>spring_framework:3.2.13</product>
<product>spring_framework:3.2.14</product>
<product>spring_framework:3.2.15</product>
<product>spring_framework:3.2.16</product>
<product>spring_framework:3.2.17</product>
<product>spring_framework:3.2.18</product>
<product>spring_framework:4.0.0</product>
<product>spring_framework:4.0.1</product>
<product>spring_framework:4.0.2</product>
<product>spring_framework:4.0.3</product>
<product>spring_framework:4.0.4</product>
<product>spring_framework:4.0.5</product>
<product>spring_framework:4.0.6</product>
<product>spring_framework:4.0.7</product>
<product>spring_framework:4.0.8</product>
<product>spring_framework:4.0.9</product>
<product>spring_framework:4.1.0</product>
<product>spring_framework:4.1.1</product>
<product>spring_framework:4.1.2</product>
<product>spring_framework:4.1.3</product>
<product>spring_framework:4.1.4</product>
<product>spring_framework:4.1.5</product>
<product>spring_framework:4.1.6</product>
<product>spring_framework:4.1.7</product>
<product>spring_framework:4.1.8</product>
<product>spring_framework:4.1.9</product>
<product>spring_framework:4.2.0</product>
<product>spring_framework:4.2.1</product>
<product>spring_framework:4.2.2</product>
<product>spring_framework:4.2.3</product>
<product>spring_framework:4.2.4</product>
<product>spring_framework:4.2.5</product>
<product>spring_framework:4.2.6</product>
<product>spring_framework:4.2.7</product>
<product>spring_framework:4.2.8</product>
<product>spring_framework:4.2.9</product>
<product>spring_security:3.2.0</product>
<product>spring_security:3.2.1</product>
<product>spring_security:3.2.2</product>
<product>spring_security:3.2.3</product>
<product>spring_security:3.2.4</product>
<product>spring_security:3.2.5</product>
<product>spring_security:3.2.6</product>
<product>spring_security:3.2.7</product>
<product>spring_security:3.2.8</product>
<product>spring_security:3.2.9</product>
<product>spring_security:3.2.10</product>
<product>spring_security:4.0.0</product>
<product>spring_security:4.0.1</product>
<product>spring_security:4.0.2</product>
<product>spring_security:4.0.3</product>
<product>spring_security:4.0.4</product>
<product>spring_security:4.1.0</product>
</cve>
<cve id="CVE-2016-5006" level="LOW">
<product>cloud_foundry:238.0</product>
<product>cloud_foundry_elastic_runtime:1.6.32</product>
<product>cloud_foundry_elastic_runtime:1.7.0</product>
<product>cloud_foundry_elastic_runtime:1.7.1</product>
<product>cloud_foundry_elastic_runtime:1.7.2</product>
<product>cloud_foundry_elastic_runtime:1.7.3</product>
<product>cloud_foundry_elastic_runtime:1.7.4</product>
<product>cloud_foundry_elastic_runtime:1.7.5</product>
<product>cloud_foundry_elastic_runtime:1.7.6</product>
<product>cloud_foundry_elastic_runtime:1.7.7</product>
<product>cloud_foundry_elastic_runtime:1.7.8</product>
<product>cloud_foundry_elastic_runtime:1.7.9</product>
<product>cloud_foundry_elastic_runtime:1.7.10</product>
</cve>
<cve id="CVE-2016-0011" level="MEDIUM">
<product>sharepoint_foundation:2013</product>
<product>sharepoint_server:2013</product>
</cve>
<cve id="CVE-2016-9739" level="LOW">
<product>security_identity_manager:7.0.0.0</product>
<product>security_identity_manager:7.0.0.1</product>
<product>security_identity_manager:7.0.0.2</product>
<product>security_identity_manager:7.0.0.3</product>
<product>security_identity_manager:7.0.1.0</product>
<product>security_identity_manager:7.0.1.1</product>
<product>security_identity_manager:7.0.1.2</product>
<product>security_identity_manager:7.0.1.3</product>
<product>security_identity_manager:7.0.1.4</product>
</cve>
<cve id="CVE-2016-9738" level="LOW">
<product>qradar_security_information_and_event_manager:7.2.0</product>
<product>qradar_security_information_and_event_manager:7.2.1</product>
<product>qradar_security_information_and_event_manager:7.2.2</product>
<product>qradar_security_information_and_event_manager:7.2.3</product>
<product>qradar_security_information_and_event_manager:7.2.4</product>
<product>qradar_security_information_and_event_manager:7.2.5</product>
<product>qradar_security_information_and_event_manager:7.2.6</product>
<product>qradar_security_information_and_event_manager:7.2.7</product>
<product>qradar_security_information_and_event_manager:7.2.8</product>
<product>qradar_security_information_and_event_manager:7.2.8</product>
<product>qradar_security_information_and_event_manager:7.2.8</product>
<product>qradar_security_information_and_event_manager:7.2.8</product>
<product>qradar_security_information_and_event_manager:7.2.8</product>
<product>qradar_security_information_and_event_manager:7.2.8</product>
<product>qradar_security_information_and_event_manager:7.2.8</product>
<product>qradar_security_information_and_event_manager:7.3.0</product>
<product>qradar_security_information_and_event_manager:7.3.0</product>
</cve>
<cve id="CVE-2016-9737" level="MEDIUM">
<product>tririga_application_platform:3.3.0.0</product>
<product>tririga_application_platform:3.3.0.1</product>
<product>tririga_application_platform:3.3.0.2</product>
<product>tririga_application_platform:3.3.1.0</product>
<product>tririga_application_platform:3.3.1.1</product>
<product>tririga_application_platform:3.3.1.2</product>
<product>tririga_application_platform:3.3.1.3</product>
<product>tririga_application_platform:3.3.2.0</product>
<product>tririga_application_platform:3.3.2.1</product>
<product>tririga_application_platform:3.3.2.2</product>
<product>tririga_application_platform:3.3.2.3</product>
<product>tririga_application_platform:3.3.2.4</product>
<product>tririga_application_platform:3.3.2.5</product>
<product>tririga_application_platform:3.4.0.0</product>
<product>tririga_application_platform:3.4.0.1</product>
<product>tririga_application_platform:3.4.1.0</product>
<product>tririga_application_platform:3.4.1.1</product>
<product>tririga_application_platform:3.4.1.2</product>
<product>tririga_application_platform:3.4.1.3</product>
<product>tririga_application_platform:3.4.2.0</product>
<product>tririga_application_platform:3.4.2.1</product>
<product>tririga_application_platform:3.4.2.2</product>
<product>tririga_application_platform:3.4.2.3</product>
<product>tririga_application_platform:3.4.2.4</product>
<product>tririga_application_platform:3.4.2.5</product>
<product>tririga_application_platform:3.5.2</product>
</cve>
<cve id="CVE-2016-9736" level="LOW">
<product>websphere_application_server:8.0</product>
<product>websphere_application_server:8.5</product>
<product>websphere_application_server:9.0</product>
</cve>
<cve id="CVE-2016-9735" level="LOW">
<product>rational_collaborative_lifecycle_management:4.0</product>
<product>rational_collaborative_lifecycle_management:4.0.2</product>
<product>rational_collaborative_lifecycle_management:4.0.3</product>
<product>rational_collaborative_lifecycle_management:4.0.4</product>
<product>rational_collaborative_lifecycle_management:4.0.5</product>
<product>rational_collaborative_lifecycle_management:4.0.6</product>
<product>rational_collaborative_lifecycle_management:4.0.7</product>
<product>rational_collaborative_lifecycle_management:5.0</product>
<product>rational_collaborative_lifecycle_management:5.0.1</product>
<product>rational_collaborative_lifecycle_management:5.0.2</product>
<product>rational_collaborative_lifecycle_management:6.0</product>
<product>rational_collaborative_lifecycle_management:6.0.1</product>
<product>rational_collaborative_lifecycle_management:6.0.2</product>
<product>rational_collaborative_lifecycle_management:6.0.3</product>
<product>rational_doors_next_generation:4.0</product>
<product>rational_doors_next_generation:4.0.1</product>
<product>rational_doors_next_generation:4.0.2</product>
<product>rational_doors_next_generation:4.0.3</product>
<product>rational_doors_next_generation:4.0.4</product>
<product>rational_doors_next_generation:4.0.5</product>
<product>rational_doors_next_generation:4.0.6</product>
<product>rational_doors_next_generation:4.0.7</product>
<product>rational_doors_next_generation:5.0</product>
<product>rational_doors_next_generation:5.0.1</product>
<product>rational_doors_next_generation:5.0.2</product>
<product>rational_doors_next_generation:6.0</product>
<product>rational_doors_next_generation:6.0.1</product>
<product>rational_doors_next_generation:6.0.2</product>
<product>rational_doors_next_generation:6.0.3</product>
<product>rational_engineering_lifecycle_manager:4.0</product>
<product>rational_engineering_lifecycle_manager:4.0.1</product>
<product>rational_engineering_lifecycle_manager:4.0.2</product>
<product>rational_engineering_lifecycle_manager:4.0.3</product>
<product>rational_engineering_lifecycle_manager:4.0.4</product>
<product>rational_engineering_lifecycle_manager:4.0.5</product>
<product>rational_engineering_lifecycle_manager:4.0.6</product>
<product>rational_engineering_lifecycle_manager:4.0.7</product>
<product>rational_engineering_lifecycle_manager:5.0</product>
<product>rational_engineering_lifecycle_manager:5.0.1</product>
<product>rational_engineering_lifecycle_manager:5.0.2</product>
<product>rational_engineering_lifecycle_manager:6.0</product>
<product>rational_engineering_lifecycle_manager:6.0.1</product>
<product>rational_engineering_lifecycle_manager:6.0.2</product>
<product>rational_engineering_lifecycle_manager:6.0.3</product>
<product>rational_quality_manager:4.0</product>
<product>rational_quality_manager:4.0.1</product>
<product>rational_quality_manager:4.0.2</product>
<product>rational_quality_manager:4.0.3</product>
<product>rational_quality_manager:4.0.4</product>
<product>rational_quality_manager:4.0.5</product>
<product>rational_quality_manager:4.0.6</product>
<product>rational_quality_manager:4.0.7</product>
<product>rational_quality_manager:5.0</product>
<product>rational_quality_manager:5.0.1</product>
<product>rational_quality_manager:5.0.2</product>
<product>rational_quality_manager:6.0</product>
<product>rational_quality_manager:6.0.1</product>
<product>rational_quality_manager:6.0.2</product>
<product>rational_quality_manager:6.0.3</product>
<product>rational_rhapsody_design_manager:4.0</product>
<product>rational_rhapsody_design_manager:4.0.1</product>
<product>rational_rhapsody_design_manager:4.0.2</product>
<product>rational_rhapsody_design_manager:4.0.3</product>
<product>rational_rhapsody_design_manager:4.0.4</product>
<product>rational_rhapsody_design_manager:4.0.5</product>
<product>rational_rhapsody_design_manager:4.0.6</product>
<product>rational_rhapsody_design_manager:4.0.7</product>
<product>rational_rhapsody_design_manager:5.0</product>
<product>rational_rhapsody_design_manager:5.0.1</product>
<product>rational_rhapsody_design_manager:5.0.2</product>
<product>rational_rhapsody_design_manager:6.0</product>
<product>rational_rhapsody_design_manager:6.0.1</product>
<product>rational_rhapsody_design_manager:6.0.2</product>
<product>rational_rhapsody_design_manager:6.0.3</product>
<product>rational_software_architect_design_manager:4.0</product>
<product>rational_software_architect_design_manager:4.0.1</product>
<product>rational_software_architect_design_manager:4.0.2</product>
<product>rational_software_architect_design_manager:4.0.3</product>
<product>rational_software_architect_design_manager:4.0.4</product>
<product>rational_software_architect_design_manager:4.0.5</product>
<product>rational_software_architect_design_manager:4.0.6</product>
<product>rational_software_architect_design_manager:4.0.7</product>
<product>rational_software_architect_design_manager:5.0</product>
<product>rational_software_architect_design_manager:5.0.1</product>
<product>rational_software_architect_design_manager:5.0.2</product>
<product>rational_software_architect_design_manager:6.0</product>
<product>rational_software_architect_design_manager:6.0.1</product>
<product>rational_software_architect_design_manager:6.0.2</product>
<product>rational_software_architect_design_manager:6.0.3</product>
<product>rational_team_concert:4.0</product>
<product>rational_team_concert:4.0.1</product>
<product>rational_team_concert:4.0.2</product>
<product>rational_team_concert:4.0.3</product>
<product>rational_team_concert:4.0.4</product>
<product>rational_team_concert:4.0.5</product>
<product>rational_team_concert:4.0.6</product>
<product>rational_team_concert:4.0.7</product>
<product>rational_team_concert:5.0</product>
<product>rational_team_concert:5.0.1</product>
<product>rational_team_concert:5.0.2</product>
<product>rational_team_concert:6.0</product>
<product>rational_team_concert:6.0.1</product>
<product>rational_team_concert:6.0.2</product>
<product>rational_team_concert:6.0.3</product>
</cve>
<cve id="CVE-2016-9733" level="MEDIUM">
<product>rational_collaborative_lifecycle_management:4.0</product>
<product>rational_collaborative_lifecycle_management:4.0.0</product>
<product>rational_collaborative_lifecycle_management:4.0.1</product>
<product>rational_collaborative_lifecycle_management:4.0.2</product>
<product>rational_collaborative_lifecycle_management:4.0.3</product>
<product>rational_collaborative_lifecycle_management:4.0.4</product>
<product>rational_collaborative_lifecycle_management:4.0.5</product>
<product>rational_collaborative_lifecycle_management:4.0.6</product>
<product>rational_collaborative_lifecycle_management:4.0.7</product>
<product>rational_collaborative_lifecycle_management:5.0</product>
<product>rational_collaborative_lifecycle_management:5.0.0</product>
<product>rational_collaborative_lifecycle_management:5.0.1</product>
<product>rational_collaborative_lifecycle_management:5.0.2</product>
<product>rational_collaborative_lifecycle_management:6.0</product>
<product>rational_collaborative_lifecycle_management:6.0.0</product>
<product>rational_collaborative_lifecycle_management:6.0.1</product>
<product>rational_collaborative_lifecycle_management:6.0.3</product>
<product>rational_team_concert:4.0</product>
<product>rational_team_concert:4.0.0</product>
<product>rational_team_concert:4.0.0.1</product>
<product>rational_team_concert:4.0.0.2</product>
<product>rational_team_concert:4.0.1</product>
<product>rational_team_concert:4.0.2</product>
<product>rational_team_concert:4.0.3</product>
<product>rational_team_concert:4.0.4</product>
<product>rational_team_concert:4.0.5</product>
<product>rational_team_concert:4.0.6</product>
<product>rational_team_concert:4.0.7</product>
<product>rational_team_concert:5.0</product>
<product>rational_team_concert:5.0.0</product>
<product>rational_team_concert:5.0.1</product>
<product>rational_team_concert:5.0.2</product>
<product>rational_team_concert:6.0</product>
<product>rational_team_concert:6.0.0</product>
<product>rational_team_concert:6.0.1</product>
<product>rational_team_concert:6.0.2</product>
<product>rational_team_concert:6.0.3</product>
</cve>
<cve id="CVE-2016-9732" level="MEDIUM">
<product>curam_social_program_management:6.0.4.0</product>
<product>curam_social_program_management:6.0.4.1</product>
<product>curam_social_program_management:6.0.4.2</product>
<product>curam_social_program_management:6.0.4.3</product>
<product>curam_social_program_management:6.0.4.4</product>
<product>curam_social_program_management:6.0.4.5</product>
<product>curam_social_program_management:6.0.4.6</product>
<product>curam_social_program_management:6.0.4.7</product>
<product>curam_social_program_management:6.0.4.8</product>
<product>curam_social_program_management:6.0.4.9</product>
<product>curam_social_program_management:6.0.5</product>
<product>curam_social_program_management:6.0.5.0</product>
<product>curam_social_program_management:6.0.5.1</product>
<product>curam_social_program_management:6.0.5.2</product>
<product>curam_social_program_management:6.0.5.3</product>
<product>curam_social_program_management:6.0.5.4</product>
<product>curam_social_program_management:6.0.5.5</product>
<product>curam_social_program_management:6.0.5.6</product>
<product>curam_social_program_management:6.0.5.7</product>
<product>curam_social_program_management:6.0.5.8</product>
<product>curam_social_program_management:6.0.5.9</product>
<product>curam_social_program_management:6.0.5.10</product>
<product>curam_social_program_management:6.1.0.0</product>
<product>curam_social_program_management:6.1.0.1</product>
<product>curam_social_program_management:6.1.0.2</product>
<product>curam_social_program_management:6.1.0.3</product>
<product>curam_social_program_management:6.1.0.4</product>
<product>curam_social_program_management:6.1.1.0</product>
<product>curam_social_program_management:6.1.1.1</product>
<product>curam_social_program_management:6.1.1.2</product>
<product>curam_social_program_management:6.1.1.3</product>
<product>curam_social_program_management:6.1.1.4</product>
<product>curam_social_program_management:6.2.0.0</product>
<product>curam_social_program_management:6.2.0.1</product>
<product>curam_social_program_management:6.2.0.2</product>
<product>curam_social_program_management:6.2.0.3</product>
<product>curam_social_program_management:6.2.0.4</product>
<product>curam_social_program_management:7.0.0.0</product>
<product>curam_social_program_management:7.0.0.1</product>
</cve>
<cve id="CVE-2016-9731" level="MEDIUM">
<product>business_process_manager:8.5.7.0</product>
</cve>
<cve id="CVE-2016-9730" level="MEDIUM">
<product>qradar_incident_forensics:7.2.0</product>
<product>qradar_incident_forensics:7.2.1</product>
<product>qradar_incident_forensics:7.2.2</product>
<product>qradar_incident_forensics:7.2.3</product>
<product>qradar_incident_forensics:7.2.4</product>
<product>qradar_incident_forensics:7.2.5</product>
<product>qradar_incident_forensics:7.2.6</product>
<product>qradar_incident_forensics:7.2.7</product>
<product>qradar_incident_forensics:7.2.8</product>
<product>qradar_security_information_and_event_manager:7.2.0</product>
<product>qradar_security_information_and_event_manager:7.2.1</product>
<product>qradar_security_information_and_event_manager:7.2.2</product>
<product>qradar_security_information_and_event_manager:7.2.3</product>
<product>qradar_security_information_and_event_manager:7.2.4</product>
<product>qradar_security_information_and_event_manager:7.2.5</product>
<product>qradar_security_information_and_event_manager:7.2.6</product>
<product>qradar_security_information_and_event_manager:7.2.7</product>
<product>qradar_security_information_and_event_manager:7.2.8</product>
</cve>
<cve id="CVE-2016-1498" level="MEDIUM">
<product>owncloud:7.0.11</product>
<product>owncloud:8.0.0</product>
<product>owncloud:8.0.2</product>
<product>owncloud:8.0.3</product>
<product>owncloud:8.0.4</product>
<product>owncloud:8.0.5</product>
<product>owncloud:8.0.6</product>
<product>owncloud:8.0.8</product>
<product>owncloud:8.0.9</product>
<product>owncloud:8.1.0</product>
<product>owncloud:8.1.1</product>
<product>owncloud:8.1.3</product>
<product>owncloud:8.1.4</product>
<product>owncloud:8.2.0</product>
<product>owncloud:8.2.1</product>
</cve>
<cve id="CVE-2016-1499" level="LOW">
<product>owncloud:8.0.9</product>
<product>owncloud:8.1.0</product>
<product>owncloud:8.1.1</product>
<product>owncloud:8.1.3</product>
<product>owncloud:8.1.4</product>
<product>owncloud:8.2.0</product>
<product>owncloud:8.2.1</product>
</cve>
<cve id="CVE-2016-1492" level="MEDIUM">
<product>shareit:3.0.18_ww</product>
</cve>
<cve id="CVE-2016-1493" level="HIGH">
<product>driver_update_utility:2.0</product>
<product>driver_update_utility:2.1</product>
<product>driver_update_utility:2.2</product>
<product>driver_update_utility:2.3</product>
</cve>
<cve id="CVE-2016-1490" level="LOW">
<product>shareit:2.5.1.1</product>
</cve>
<cve id="CVE-2016-1491" level="MEDIUM">
<product>shareit:2.5.1.1</product>
</cve>
<cve id="CVE-2016-1496" level="MEDIUM">
<product>p8_firmware:gra-cl00c92b220</product>
<product>p8_firmware:gra-cl10c92b220</product>
<product>p8_firmware:gra-tl00c01b220</product>
<product>p8_firmware:gra-ul00c00b220</product>
<product>p8_firmware:gra-ul10c00b220</product>
</cve>
<cve id="CVE-2016-1497" level="LOW">
<product>big-ip_access_policy_manager:11.0.0</product>
<product>big-ip_access_policy_manager:11.1.0</product>
<product>big-ip_access_policy_manager:11.2.0</product>
<product>big-ip_access_policy_manager:11.2.1</product>
<product>big-ip_access_policy_manager:11.3.0</product>
<product>big-ip_access_policy_manager:11.4.0</product>
<product>big-ip_access_policy_manager:11.4.1</product>
<product>big-ip_access_policy_manager:11.5.0</product>
<product>big-ip_access_policy_manager:11.5.1</product>
<product>big-ip_access_policy_manager:11.5.2</product>
<product>big-ip_access_policy_manager:11.5.3</product>
<product>big-ip_access_policy_manager:11.5.4</product>
<product>big-ip_access_policy_manager:11.6.0</product>
<product>big-ip_access_policy_manager:12.0.0</product>
<product>big-ip_advanced_firewall_manager:11.2.1</product>
<product>big-ip_advanced_firewall_manager:11.3.0</product>
<product>big-ip_advanced_firewall_manager:11.4.0</product>
<product>big-ip_advanced_firewall_manager:11.4.1</product>
<product>big-ip_advanced_firewall_manager:11.5.0</product>
<product>big-ip_advanced_firewall_manager:11.5.1</product>
<product>big-ip_advanced_firewall_manager:11.5.2</product>
<product>big-ip_advanced_firewall_manager:11.5.3</product>
<product>big-ip_advanced_firewall_manager:11.5.4</product>
<product>big-ip_advanced_firewall_manager:11.6.0</product>
<product>big-ip_advanced_firewall_manager:12.0.0</product>
<product>big-ip_analytics:11.0.0</product>
<product>big-ip_analytics:11.1.0</product>
<product>big-ip_analytics:11.2.0</product>
<product>big-ip_analytics:11.2.1</product>
<product>big-ip_analytics:11.3.0</product>
<product>big-ip_analytics:11.4.0</product>
<product>big-ip_analytics:11.4.1</product>
<product>big-ip_analytics:11.5.0</product>
<product>big-ip_analytics:11.5.1</product>
<product>big-ip_analytics:11.5.2</product>
<product>big-ip_analytics:11.5.3</product>
<product>big-ip_analytics:11.5.4</product>
<product>big-ip_analytics:11.6.0</product>
<product>big-ip_analytics:12.0.0</product>
<product>big-ip_application_acceleration_manager:11.4.0</product>
<product>big-ip_application_acceleration_manager:11.4.1</product>
<product>big-ip_application_acceleration_manager:11.5.0</product>
<product>big-ip_application_acceleration_manager:11.5.1</product>
<product>big-ip_application_acceleration_manager:11.5.2</product>
<product>big-ip_application_acceleration_manager:11.5.3</product>
<product>big-ip_application_acceleration_manager:11.5.4</product>
<product>big-ip_application_acceleration_manager:11.6.0</product>
<product>big-ip_application_acceleration_manager:12.0.0</product>
<product>big-ip_application_security_manager:11.0.0</product>
<product>big-ip_application_security_manager:11.1.0</product>
<product>big-ip_application_security_manager:11.2.0</product>
<product>big-ip_application_security_manager:11.2.1</product>
<product>big-ip_application_security_manager:11.3.0</product>
<product>big-ip_application_security_manager:11.4.0</product>
<product>big-ip_application_security_manager:11.4.1</product>
<product>big-ip_application_security_manager:11.5.0</product>
<product>big-ip_application_security_manager:11.5.1</product>
<product>big-ip_application_security_manager:11.5.2</product>
<product>big-ip_application_security_manager:11.5.3</product>
<product>big-ip_application_security_manager:11.5.4</product>
<product>big-ip_application_security_manager:11.6.0</product>
<product>big-ip_application_security_manager:12.0.0</product>
<product>big-ip_domain_name_system:12.0.0</product>
<product>big-ip_edge_gateway:11.0.0</product>
<product>big-ip_edge_gateway:11.1.0</product>
<product>big-ip_edge_gateway:11.2.0</product>
<product>big-ip_edge_gateway:11.2.1</product>
<product>big-ip_edge_gateway:11.3.0</product>
<product>big-ip_global_traffic_manager:11.0.0</product>
<product>big-ip_global_traffic_manager:11.1.0</product>
<product>big-ip_global_traffic_manager:11.2.0</product>
<product>big-ip_global_traffic_manager:11.2.1</product>
<product>big-ip_global_traffic_manager:11.3.0</product>
<product>big-ip_global_traffic_manager:11.4.0</product>
<product>big-ip_global_traffic_manager:11.4.1</product>
<product>big-ip_global_traffic_manager:11.5.0</product>
<product>big-ip_global_traffic_manager:11.5.1</product>
<product>big-ip_global_traffic_manager:11.5.2</product>
<product>big-ip_global_traffic_manager:11.5.3</product>
<product>big-ip_global_traffic_manager:11.5.4</product>
<product>big-ip_global_traffic_manager:11.6.0</product>
<product>big-ip_link_controller:11.0.0</product>
<product>big-ip_link_controller:11.1.0</product>
<product>big-ip_link_controller:11.2.0</product>
<product>big-ip_link_controller:11.2.1</product>
<product>big-ip_link_controller:11.3.0</product>
<product>big-ip_link_controller:11.4.0</product>
<product>big-ip_link_controller:11.4.1</product>
<product>big-ip_link_controller:11.5.0</product>
<product>big-ip_link_controller:11.5.1</product>
<product>big-ip_link_controller:11.5.2</product>
<product>big-ip_link_controller:11.5.3</product>
<product>big-ip_link_controller:11.5.4</product>
<product>big-ip_link_controller:11.6.0</product>
<product>big-ip_link_controller:12.0.0</product>
<product>big-ip_local_traffic_manager:11.0.0</product>
<product>big-ip_local_traffic_manager:11.1.0</product>
<product>big-ip_local_traffic_manager:11.2.0</product>
<product>big-ip_local_traffic_manager:11.2.1</product>
<product>big-ip_local_traffic_manager:11.3.0</product>
<product>big-ip_local_traffic_manager:11.4.0</product>
<product>big-ip_local_traffic_manager:11.4.1</product>
<product>big-ip_local_traffic_manager:11.5.0</product>
<product>big-ip_local_traffic_manager:11.5.1</product>
<product>big-ip_local_traffic_manager:11.5.2</product>
<product>big-ip_local_traffic_manager:11.5.3</product>
<product>big-ip_local_traffic_manager:11.5.4</product>
<product>big-ip_local_traffic_manager:11.6.0</product>
<product>big-ip_local_traffic_manager:12.0.0</product>
<product>big-ip_policy_enforcement_manager:11.3.0</product>
<product>big-ip_policy_enforcement_manager:11.4.0</product>
<product>big-ip_policy_enforcement_manager:11.4.1</product>
<product>big-ip_policy_enforcement_manager:11.5.0</product>
<product>big-ip_policy_enforcement_manager:11.5.1</product>
<product>big-ip_policy_enforcement_manager:11.5.2</product>
<product>big-ip_policy_enforcement_manager:11.5.3</product>
<product>big-ip_policy_enforcement_manager:11.5.4</product>
<product>big-ip_policy_enforcement_manager:11.6.0</product>
<product>big-ip_policy_enforcement_manager:12.0.0</product>
<product>big-ip_wan_optimization_manager:11.0.0</product>
<product>big-ip_wan_optimization_manager:11.1.0</product>
<product>big-ip_wan_optimization_manager:11.2.0</product>
<product>big-ip_wan_optimization_manager:11.2.1</product>
<product>big-ip_wan_optimization_manager:11.3.0</product>
<product>big-ip_webaccelerator:11.0.0</product>
<product>big-ip_webaccelerator:11.1.0</product>
<product>big-ip_webaccelerator:11.2.0</product>
<product>big-ip_webaccelerator:11.2.1</product>
<product>big-ip_webaccelerator:11.3.0</product>
<product>big-ip_protocol_security_manager:11.0.0</product>
<product>big-ip_protocol_security_manager:11.1.0</product>
<product>big-ip_protocol_security_manager:11.2.0</product>
<product>big-ip_protocol_security_manager:11.2.1</product>
<product>big-ip_protocol_security_manager:11.3.0</product>
<product>big-ip_protocol_security_manager:11.4.0</product>
<product>big-ip_protocol_security_manager:11.4.1</product>
</cve>
<cve id="CVE-2016-1494" level="LOW">
<product>python:3.2.6</product>
</cve>
<cve id="CVE-2016-1495" level="MEDIUM">
<product>mate_s_firmware:crr-cl00c92b153</product>
<product>mate_s_firmware:crr-tl00c01b153sp01</product>
<product>mate_s_firmware:crr-ul00c00b153</product>
</cve>
<cve id="CVE-2016-7098" level="MEDIUM">
<product>wget:1.17</product>
</cve>
<cve id="CVE-2016-1095" level="LOW">
<product>acrobat:11.0.15</product>
<product>acrobat_dc:15.006.30121</product>
<product>acrobat_dc:15.010.20060</product>
<product>acrobat_reader_dc:15.006.30121</product>
<product>acrobat_reader_dc:15.010.20060</product>
<product>reader:11.0.15</product>
</cve>
<cve id="CVE-2016-7090" level="MEDIUM">
<product>scalance_m-800_firmware:4.01</product>
<product>scalance_s615_firmware:4.01</product>
</cve>
<cve id="CVE-2016-7092" level="LOW">
<product>xen:-</product>
</cve>
<cve id="CVE-2016-7093" level="LOW">
<product>xen:4.5.3</product>
<product>xen:4.6.3</product>
<product>xen:4.7.0</product>
</cve>
<cve id="CVE-2016-7094" level="MEDIUM">
<product>xen:4.7.0</product>
</cve>
<cve id="CVE-2016-7095" level="LOW">
<product>exponent_cms:2.3.8</product>
</cve>
<cve id="CVE-2016-1093" level="LOW">
<product>acrobat:11.0.15</product>
<product>acrobat_dc:15.006.30121</product>
<product>acrobat_dc:15.010.20060</product>
<product>acrobat_reader_dc:15.006.30121</product>
<product>acrobat_reader_dc:15.010.20060</product>
<product>reader:11.0.15</product>
</cve>
<cve id="CVE-2016-1090" level="LOW">
<product>acrobat:11.0.15</product>
<product>acrobat_dc:15.006.30121</product>
<product>acrobat_dc:15.010.20060</product>
<product>acrobat_reader_dc:15.006.30121</product>
<product>acrobat_reader_dc:15.010.20060</product>
<product>reader:11.0.15</product>
</cve>
<cve id="CVE-2016-1091" level="LOW">
<product>acrobat:11.0.17</product>
<product>acrobat_dc:15.006.30201</product>
<product>acrobat_dc:15.017.20053</product>
<product>acrobat_reader_dc:15.006.30201</product>
<product>acrobat_reader_dc:15.017.20053</product>
<product>reader:11.0.17</product>
</cve>
<cve id="CVE-2016-3392" level="HIGH">
<product>edge:-</product>
</cve>
<cve id="CVE-2016-3391" level="HIGH">
<product>edge:-</product>
<product>internet_explorer:10</product>
<product>internet_explorer:11</product>
</cve>
<cve id="CVE-2016-3390" level="HIGH">
<product>edge:-</product>
<product>internet_explorer:11</product>
</cve>
<cve id="CVE-2016-0370" level="MEDIUM">
<product>forms_experience_builder:8.5.0.0</product>
<product>forms_experience_builder:8.5.1.0</product>
<product>forms_experience_builder:8.5.1.1</product>
<product>forms_experience_builder:8.6.0.0</product>
<product>forms_experience_builder:8.6.1</product>
<product>forms_experience_builder:8.6.1.1</product>
<product>forms_experience_builder:8.6.2</product>
<product>forms_experience_builder:8.6.2.1</product>
</cve>
<cve id="CVE-2016-0371" level="MEDIUM">
<product>tivoli_storage_manager:5.5</product>
<product>tivoli_storage_manager:6.1</product>
<product>tivoli_storage_manager:6.2</product>
<product>tivoli_storage_manager:6.3.0.0</product>
<product>tivoli_storage_manager:6.3.2.5</product>
<product>tivoli_storage_manager:6.4.0.0</product>
<product>tivoli_storage_manager:6.4.3.3</product>
<product>tivoli_storage_manager:7.1.0.0</product>
<product>tivoli_storage_manager:7.1.6.2</product>
</cve>
<cve id="CVE-2016-0372" level="MEDIUM">
<product>rational_collaborative_lifecycle_management:3.0.1.6</product>
<product>rational_collaborative_lifecycle_management:4.0.0</product>
<product>rational_collaborative_lifecycle_management:4.0.1</product>
<product>rational_collaborative_lifecycle_management:4.0.2</product>
<product>rational_collaborative_lifecycle_management:4.0.3</product>
<product>rational_collaborative_lifecycle_management:4.0.4</product>
<product>rational_collaborative_lifecycle_management:4.0.5</product>
<product>rational_collaborative_lifecycle_management:4.0.6</product>
<product>rational_collaborative_lifecycle_management:4.0.7</product>
<product>rational_collaborative_lifecycle_management:5.0.0</product>
<product>rational_collaborative_lifecycle_management:5.0.1</product>
<product>rational_collaborative_lifecycle_management:5.0.2</product>
<product>rational_collaborative_lifecycle_management:6.0.0</product>
<product>rational_collaborative_lifecycle_management:6.0.1</product>
<product>rational_collaborative_lifecycle_management:6.0.2</product>
<product>rational_doors_next_generation:4.0.0</product>
<product>rational_doors_next_generation:4.0.1</product>
<product>rational_doors_next_generation:4.0.2</product>
<product>rational_doors_next_generation:4.0.3</product>
<product>rational_doors_next_generation:4.0.4</product>
<product>rational_doors_next_generation:4.0.5</product>
<product>rational_doors_next_generation:4.0.6</product>
<product>rational_doors_next_generation:4.0.7</product>
<product>rational_doors_next_generation:5.0.0</product>
<product>rational_doors_next_generation:5.0.1</product>
<product>rational_doors_next_generation:5.0.2</product>
<product>rational_doors_next_generation:6.0.0</product>
<product>rational_doors_next_generation:6.0.1</product>
<product>rational_doors_next_generation:6.0.2</product>
<product>rational_engineering_lifecycle_manager:4.0.0</product>
<product>rational_engineering_lifecycle_manager:4.0.1</product>
<product>rational_engineering_lifecycle_manager:4.0.2</product>
<product>rational_engineering_lifecycle_manager:4.0.3</product>
<product>rational_engineering_lifecycle_manager:4.0.4</product>
<product>rational_engineering_lifecycle_manager:4.0.5</product>
<product>rational_engineering_lifecycle_manager:4.0.6</product>
<product>rational_engineering_lifecycle_manager:4.0.7</product>
<product>rational_engineering_lifecycle_manager:5.0.0</product>
<product>rational_engineering_lifecycle_manager:5.0.1</product>
<product>rational_engineering_lifecycle_manager:5.0.2</product>
<product>rational_engineering_lifecycle_manager:6.0.0</product>
<product>rational_engineering_lifecycle_manager:6.0.1</product>
<product>rational_engineering_lifecycle_manager:6.0.2</product>
<product>rational_quality_manager:3.0.1.6</product>
<product>rational_quality_manager:4.0.0</product>
<product>rational_quality_manager:4.0.1</product>
<product>rational_quality_manager:4.0.2</product>
<product>rational_quality_manager:4.0.3</product>
<product>rational_quality_manager:4.0.4</product>
<product>rational_quality_manager:4.0.5</product>
<product>rational_quality_manager:4.0.6</product>
<product>rational_quality_manager:4.0.7</product>
<product>rational_quality_manager:5.0.0</product>
<product>rational_quality_manager:5.0.1</product>
<product>rational_quality_manager:5.0.2</product>
<product>rational_quality_manager:6.0.0</product>
<product>rational_quality_manager:6.0.1</product>
<product>rational_quality_manager:6.0.2</product>
<product>rational_rhapsody_design_manager:4.0</product>
<product>rational_rhapsody_design_manager:4.0.1</product>
<product>rational_rhapsody_design_manager:4.0.2</product>
<product>rational_rhapsody_design_manager:4.0.3</product>
<product>rational_rhapsody_design_manager:4.0.4</product>
<product>rational_rhapsody_design_manager:4.0.5</product>
<product>rational_rhapsody_design_manager:4.0.6</product>
<product>rational_rhapsody_design_manager:4.0.7</product>
<product>rational_rhapsody_design_manager:5.0.0</product>
<product>rational_rhapsody_design_manager:5.0.1</product>
<product>rational_rhapsody_design_manager:5.0.2</product>
<product>rational_rhapsody_design_manager:6.0.0</product>
<product>rational_rhapsody_design_manager:6.0.1</product>
<product>rational_rhapsody_design_manager:6.0.2</product>
<product>rational_software_architect_design_manager:4.0.0</product>
<product>rational_software_architect_design_manager:4.0.1</product>
<product>rational_software_architect_design_manager:4.0.2</product>
<product>rational_software_architect_design_manager:4.0.3</product>
<product>rational_software_architect_design_manager:4.0.4</product>
<product>rational_software_architect_design_manager:4.0.5</product>
<product>rational_software_architect_design_manager:4.0.6</product>
<product>rational_software_architect_design_manager:4.0.7</product>
<product>rational_software_architect_design_manager:5.0.0</product>
<product>rational_software_architect_design_manager:5.0.1</product>
<product>rational_software_architect_design_manager:5.0.2</product>
<product>rational_software_architect_design_manager:6.0.0</product>
<product>rational_software_architect_design_manager:6.0.1</product>
<product>rational_software_architect_design_manager:6.0.2</product>
<product>rational_team_concert:3.0.1.6</product>
<product>rational_team_concert:4.0.0</product>
<product>rational_team_concert:4.0.1</product>
<product>rational_team_concert:4.0.2</product>
<product>rational_team_concert:4.0.3</product>
<product>rational_team_concert:4.0.4</product>
<product>rational_team_concert:4.0.5</product>
<product>rational_team_concert:4.0.6</product>
<product>rational_team_concert:4.0.7</product>
<product>rational_team_concert:5.0.0</product>
<product>rational_team_concert:5.0.1</product>
<product>rational_team_concert:5.0.2</product>
<product>rational_team_concert:6.0.0</product>
<product>rational_team_concert:6.0.1</product>
<product>rational_team_concert:6.0.2</product>
</cve>
<cve id="CVE-2016-0374" level="LOW">
<product>tririga_application_platform:3.3.0.0</product>
<product>tririga_application_platform:3.3.0.1</product>
<product>tririga_application_platform:3.3.0.2</product>
<product>tririga_application_platform:3.3.1.0</product>
<product>tririga_application_platform:3.3.1.1</product>
<product>tririga_application_platform:3.3.1.2</product>
<product>tririga_application_platform:3.3.1.3</product>
<product>tririga_application_platform:3.3.2.0</product>
<product>tririga_application_platform:3.3.2.1</product>
<product>tririga_application_platform:3.3.2.2</product>
<product>tririga_application_platform:3.3.2.3</product>
<product>tririga_application_platform:3.3.2.4</product>
<product>tririga_application_platform:3.3.2.5</product>
<product>tririga_application_platform:3.4.0.0</product>
<product>tririga_application_platform:3.4.0.1</product>
<product>tririga_application_platform:3.4.1.0</product>
<product>tririga_application_platform:3.4.1.1</product>
<product>tririga_application_platform:3.4.1.2</product>
<product>tririga_application_platform:3.4.1.3</product>
<product>tririga_application_platform:3.4.2.0</product>
<product>tririga_application_platform:3.4.2.1</product>
<product>tririga_application_platform:3.4.2.2</product>
<product>tririga_application_platform:3.4.2.3</product>
<product>tririga_application_platform:3.5.0.0</product>
<product>tririga_application_platform:3.5.0.1</product>
</cve>
<cve id="CVE-2016-0375" level="LOW">
<product>messagesight:1.1.0.0</product>
<product>messagesight:1.1.0.1</product>
<product>messagesight:1.2</product>
<product>messagesight:1.2.0.0</product>
<product>messagesight:1.2.0.1</product>
<product>messagesight:1.2.0.2</product>
<product>messagesight:1.2.0.3</product>
<product>messagesight:2.0.0.0</product>
</cve>
<cve id="CVE-2016-0377" level="LOW">
<product>websphere_application_server:7.0.0.0</product>
<product>websphere_application_server:7.0.0.1</product>
<product>websphere_application_server:7.0.0.2</product>
<product>websphere_application_server:7.0.0.3</product>
<product>websphere_application_server:7.0.0.4</product>
<product>websphere_application_server:7.0.0.5</product>
<product>websphere_application_server:7.0.0.6</product>
<product>websphere_application_server:7.0.0.7</product>
<product>websphere_application_server:7.0.0.8</product>
<product>websphere_application_server:7.0.0.9</product>
<product>websphere_application_server:7.0.0.10</product>
<product>websphere_application_server:7.0.0.11</product>
<product>websphere_application_server:7.0.0.12</product>
<product>websphere_application_server:7.0.0.13</product>
<product>websphere_application_server:7.0.0.14</product>
<product>websphere_application_server:7.0.0.15</product>
<product>websphere_application_server:7.0.0.16</product>
<product>websphere_application_server:7.0.0.17</product>
<product>websphere_application_server:7.0.0.18</product>
<product>websphere_application_server:7.0.0.19</product>
<product>websphere_application_server:7.0.0.21</product>
<product>websphere_application_server:7.0.0.22</product>
<product>websphere_application_server:7.0.0.23</product>
<product>websphere_application_server:7.0.0.24</product>
<product>websphere_application_server:7.0.0.25</product>
<product>websphere_application_server:7.0.0.27</product>
<product>websphere_application_server:7.0.0.28</product>
<product>websphere_application_server:7.0.0.29</product>
<product>websphere_application_server:7.0.0.31</product>
<product>websphere_application_server:7.0.0.32</product>
<product>websphere_application_server:7.0.0.33</product>
<product>websphere_application_server:7.0.0.34</product>
<product>websphere_application_server:7.0.0.35</product>
<product>websphere_application_server:7.0.0.36</product>
<product>websphere_application_server:7.0.0.37</product>
<product>websphere_application_server:7.0.0.38</product>
<product>websphere_application_server:7.0.0.39</product>
<product>websphere_application_server:7.0.0.40</product>
<product>websphere_application_server:7.0.0.41</product>
<product>websphere_application_server:7.0.0.42</product>
<product>websphere_application_server:8.0.0.0</product>
<product>websphere_application_server:8.0.0.1</product>
<product>websphere_application_server:8.0.0.2</product>
<product>websphere_application_server:8.0.0.3</product>
<product>websphere_application_server:8.0.0.4</product>
<product>websphere_application_server:8.0.0.5</product>
<product>websphere_application_server:8.0.0.6</product>
<product>websphere_application_server:8.0.0.7</product>
<product>websphere_application_server:8.0.0.8</product>
<product>websphere_application_server:8.0.0.9</product>
<product>websphere_application_server:8.0.0.10</product>
<product>websphere_application_server:8.0.0.11</product>
<product>websphere_application_server:8.0.0.12</product>
<product>websphere_application_server:8.5.0.0</product>
<product>websphere_application_server:8.5.0.1</product>
<product>websphere_application_server:8.5.0.2</product>
<product>websphere_application_server:8.5.5.0</product>
<product>websphere_application_server:8.5.5.1</product>
<product>websphere_application_server:8.5.5.2</product>
<product>websphere_application_server:8.5.5.3</product>
<product>websphere_application_server:8.5.5.4</product>
<product>websphere_application_server:8.5.5.5</product>
<product>websphere_application_server:8.5.5.6</product>
<product>websphere_application_server:8.5.5.7</product>
<product>websphere_application_server:8.5.5.8</product>
<product>websphere_application_server:8.5.5.9</product>
</cve>
<cve id="CVE-2016-0378" level="MEDIUM">
<product>websphere_application_server:16.0.0.2</product>
</cve>
<cve id="CVE-2016-0379" level="MEDIUM">
<product>websphere_mq:7.5</product>
<product>websphere_mq:7.5.0.1</product>
<product>websphere_mq:7.5.0.2</product>
<product>websphere_mq:7.5.0.3</product>
<product>websphere_mq:7.5.0.4</product>
<product>websphere_mq:7.5.0.5</product>
<product>websphere_mq:7.5.0.6</product>
<product>websphere_mq:8.0</product>
<product>websphere_mq:8.0.0.1</product>
<product>websphere_mq:8.0.0.2</product>
<product>websphere_mq:8.0.0.3</product>
<product>websphere_mq:8.0.0.4</product>
</cve>
<cve id="CVE-2016-9941" level="LOW">
<product>libvncserver:0.9.10</product>
</cve>
<cve id="CVE-2016-9942" level="LOW">
<product>libvncserver:0.9.10</product>
</cve>
<cve id="CVE-2016-10213" level="MEDIUM">
<product>advanced_core_operating_system:2.7.2</product>
</cve>
<cve id="CVE-2016-10212" level="MEDIUM">
<product>alteon:30.0.5.10</product>
<product>alteon:30.2.1.1</product>
</cve>
<cve id="CVE-2016-10211" level="LOW">
<product>yara:3.5.0</product>
</cve>
<cve id="CVE-2016-10210" level="LOW">
<product>yara:3.5.0</product>
</cve>
<cve id="CVE-2016-10217" level="MEDIUM">
<product>ghostscript:9.20</product>
</cve>
<cve id="CVE-2016-10216" level="MEDIUM">
<product>it_items_database:1.23</product>
</cve>
<cve id="CVE-2016-10215" level="MEDIUM">
<product>bigtree-form-builder:1.1</product>
</cve>
<cve id="CVE-2016-10214" level="LOW">
<product>virglrenderer:0.5.0</product>
</cve>
<cve id="CVE-2016-10219" level="MEDIUM">
<product>ghostscript:9.20</product>
</cve>
<cve id="CVE-2016-10218" level="MEDIUM">
<product>ghostscript:9.20</product>
</cve>
<cve id="CVE-2016-4270" level="LOW">
<product>acrobat:11.0.16</product>
<product>acrobat_dc:15.006.30174</product>
<product>acrobat_dc:15.016.20045</product>
<product>acrobat_reader_dc:15.006.30174</product>
<product>acrobat_reader_dc:15.016.20045</product>
<product>reader:11.0.16</product>
</cve>
<cve id="CVE-2016-3979" level="LOW">
<product>java_as:7.4</product>
</cve>
<cve id="CVE-2016-3978" level="MEDIUM">
<product>fortios:5.0.0</product>
<product>fortios:5.0.1</product>
<product>fortios:5.0.2</product>
<product>fortios:5.0.3</product>
<product>fortios:5.0.4</product>
<product>fortios:5.0.5</product>
<product>fortios:5.0.6</product>
<product>fortios:5.0.7</product>
<product>fortios:5.0.8</product>
<product>fortios:5.0.9</product>
<product>fortios:5.0.10</product>
<product>fortios:5.0.11</product>
<product>fortios:5.0.12</product>
<product>fortios:5.2.0</product>
<product>fortios:5.2.1</product>
<product>fortios:5.2.2</product>
<product>fortios:5.4</product>
</cve>
<cve id="CVE-2016-3973" level="LOW">
<product>netweaver:7.40</product>
</cve>
<cve id="CVE-2016-3972" level="LOW">
<product>dotcms:3.5</product>
</cve>
<cve id="CVE-2016-3971" level="MEDIUM">
<product>dotcms:3.5</product>
</cve>
<cve id="CVE-2016-3977" level="MEDIUM">
<product>giflib:5.1.2</product>
<product>opensuse:13.2</product>
</cve>
<cve id="CVE-2016-3976" level="LOW">
<product>netweaver:7.10</product>
<product>netweaver:7.20</product>
<product>netweaver:7.30</product>
<product>netweaver:7.31</product>
<product>netweaver:7.40</product>
<product>netweaver:7.50</product>
</cve>
<cve id="CVE-2016-3975" level="MEDIUM">
<product>netweaver:7.40</product>
</cve>
<cve id="CVE-2016-3974" level="LOW">
<product>netweaver:7.40</product>
</cve>
<cve id="CVE-2016-8017" level="LOW">
<product>virusscan_enterprise:2.0.3</product>
</cve>
<cve id="CVE-2016-8016" level="MEDIUM">
<product>virusscan_enterprise:2.0.3</product>
</cve>
<cve id="CVE-2016-8011" level="MEDIUM">
<product>endpoint_security_web_control:10.2.0.408</product>
</cve>
<cve id="CVE-2016-8010" level="LOW">
<product>application_control:7.0.0</product>
<product>endpoint_security:10.2</product>
</cve>
<cve id="CVE-2016-8012" level="LOW">
<product>data_loss_prevention_endpoint:9.3.600</product>
<product>data_loss_prevention_endpoint:9.4.200</product>
</cve>
<cve id="CVE-2016-8019" level="MEDIUM">
<product>virusscan_enterprise:2.0.3</product>
</cve>
<cve id="CVE-2016-8018" level="MEDIUM">
<product>virusscan_enterprise:2.0.3</product>
</cve>
<cve id="CVE-2016-1531" level="MEDIUM">
<product>exim:4.86</product>
</cve>
<cve id="CVE-2016-4010" level="LOW">
<product>magento:2.0.5</product>
<product>magento:2.0.5</product>
</cve>
<cve id="CVE-2016-4015" level="LOW">
<product>netweaver:7.1</product>
<product>netweaver:7.2</product>
<product>netweaver:7.3</product>
<product>netweaver:7.4</product>
</cve>
<cve id="CVE-2016-4014" level="LOW">
<product>netweaver:7.4</product>
</cve>
<cve id="CVE-2016-4017" level="LOW">
<product>hana:-</product>
</cve>
<cve id="CVE-2016-4016" level="MEDIUM">
<product>java_as:7.4</product>
</cve>
<cve id="CVE-2016-4019" level="MEDIUM">
<product>zimbra_collaboration_suite:8.6.0</product>
</cve>
<cve id="CVE-2016-4018" level="LOW">
<product>hana:-</product>
</cve>
<cve id="CVE-2016-1113" level="MEDIUM">
<product>coldfusion:10.0</product>
<product>coldfusion:11.0</product>
<product>coldfusion:2016.00</product>
</cve>
<cve id="CVE-2016-5636" level="LOW">
<product>python:2.7.11</product>
<product>python:3.0</product>
<product>python:3.0.1</product>
<product>python:3.1.0</product>
<product>python:3.1.1</product>
<product>python:3.1.2</product>
<product>python:3.1.3</product>
<product>python:3.1.4</product>
<product>python:3.1.5</product>
<product>python:3.2.0</product>
<product>python:3.2.1</product>
<product>python:3.2.2</product>
<product>python:3.2.3</product>
<product>python:3.2.4</product>
<product>python:3.2.5</product>
<product>python:3.2.6</product>
<product>python:3.3.0</product>
<product>python:3.3.1</product>
<product>python:3.3.2</product>
<product>python:3.3.3</product>
<product>python:3.3.4</product>
<product>python:3.3.5</product>
<product>python:3.3.6</product>
<product>python:3.4.0</product>
<product>python:3.4.1</product>
<product>python:3.4.2</product>
<product>python:3.4.3</product>
<product>python:3.4.4</product>
<product>python:3.5.0</product>
<product>python:3.5.1</product>
</cve>
<cve id="CVE-2016-5637" level="MEDIUM">
<product>libbpg:0.9.5</product>
<product>libbpg:0.9.6</product>
<product>libbpg:0.9.7</product>
</cve>
<cve id="CVE-2016-1112" level="LOW">
<product>acrobat:11.0.15</product>
<product>acrobat_dc:15.006.30121</product>
<product>acrobat_dc:15.010.20060</product>
<product>acrobat_reader_dc:15.006.30121</product>
<product>acrobat_reader_dc:15.010.20060</product>
<product>reader:11.0.15</product>
</cve>
<cve id="CVE-2016-5639" level="LOW">
<product>airmedia_am-100_firmware:1.4.0.12</product>
</cve>
<cve id="CVE-2016-1111" level="MEDIUM">
<product>acrobat:11.0.13</product>
<product>acrobat_dc:15.006.30097</product>
<product>acrobat_dc:15.009.20077</product>
<product>acrobat_reader_dc:15.006.30097</product>
<product>acrobat_reader_dc:15.009.20077</product>
<product>reader:11.0.13</product>
</cve>
<cve id="CVE-2016-2949" level="LOW">
<product>bigfix_remote_control:9.1.2</product>
</cve>
<cve id="CVE-2016-2948" level="LOW">
<product>bigfix_remote_control:9.1.2</product>
</cve>
<cve id="CVE-2016-9922" level="LOW">
<product>qemu</product>
</cve>
<cve id="CVE-2016-2941" level="LOW">
<product>urbancode_deploy:6.0</product>
<product>urbancode_deploy:6.0.1</product>
<product>urbancode_deploy:6.0.1.1</product>
<product>urbancode_deploy:6.0.1.2</product>
<product>urbancode_deploy:6.0.1.3</product>
<product>urbancode_deploy:6.0.1.4</product>
<product>urbancode_deploy:6.0.1.5</product>
<product>urbancode_deploy:6.0.1.6</product>
<product>urbancode_deploy:6.0.1.7</product>
<product>urbancode_deploy:6.0.1.8</product>
<product>urbancode_deploy:6.0.1.9</product>
<product>urbancode_deploy:6.0.1.10</product>
<product>urbancode_deploy:6.0.1.11</product>
<product>urbancode_deploy:6.0.1.12</product>
<product>urbancode_deploy:6.0.1.13</product>
<product>urbancode_deploy:6.0.1.14</product>
<product>urbancode_deploy:6.1</product>
<product>urbancode_deploy:6.1.0.1</product>
<product>urbancode_deploy:6.1.0.2</product>
<product>urbancode_deploy:6.1.0.3</product>
<product>urbancode_deploy:6.1.0.4</product>
<product>urbancode_deploy:6.1.1</product>
<product>urbancode_deploy:6.1.1.1</product>
<product>urbancode_deploy:6.1.1.2</product>
<product>urbancode_deploy:6.1.1.3</product>
<product>urbancode_deploy:6.1.1.4</product>
<product>urbancode_deploy:6.1.1.5</product>
<product>urbancode_deploy:6.1.1.6</product>
<product>urbancode_deploy:6.1.1.7</product>
<product>urbancode_deploy:6.1.1.8</product>
<product>urbancode_deploy:6.1.2</product>
<product>urbancode_deploy:6.1.3</product>
<product>urbancode_deploy:6.1.3.1</product>
<product>urbancode_deploy:6.1.3.2</product>
<product>urbancode_deploy:6.1.3.3</product>
<product>urbancode_deploy:6.2.0.0</product>
<product>urbancode_deploy:6.2.0.1</product>
<product>urbancode_deploy:6.2.0.2</product>
<product>urbancode_deploy:6.2.1</product>
<product>urbancode_deploy:6.2.1.1</product>
<product>urbancode_deploy:6.2.2</product>
<product>urbancode_deploy:6.2.2.1</product>
</cve>
<cve id="CVE-2016-2940" level="LOW">
<product>bigfix_remote_control:9.1.2</product>
</cve>
<cve id="CVE-2016-2943" level="MEDIUM">
<product>bigfix_remote_control:9.1.2</product>
</cve>
<cve id="CVE-2016-2942" level="MEDIUM">
<product>urbancode_deploy:6.0</product>
<product>urbancode_deploy:6.0.1</product>
<product>urbancode_deploy:6.0.1.1</product>
<product>urbancode_deploy:6.0.1.2</product>
<product>urbancode_deploy:6.0.1.3</product>
<product>urbancode_deploy:6.0.1.4</product>
<product>urbancode_deploy:6.0.1.5</product>
<product>urbancode_deploy:6.0.1.6</product>
<product>urbancode_deploy:6.0.1.7</product>
<product>urbancode_deploy:6.0.1.8</product>
<product>urbancode_deploy:6.0.1.9</product>
<product>urbancode_deploy:6.0.1.10</product>
<product>urbancode_deploy:6.0.1.11</product>
<product>urbancode_deploy:6.0.1.12</product>
<product>urbancode_deploy:6.0.1.13</product>
<product>urbancode_deploy:6.0.1.14</product>
<product>urbancode_deploy:6.1</product>
<product>urbancode_deploy:6.1.0.1</product>
<product>urbancode_deploy:6.1.0.2</product>
<product>urbancode_deploy:6.1.0.3</product>
<product>urbancode_deploy:6.1.0.4</product>
<product>urbancode_deploy:6.1.1</product>
<product>urbancode_deploy:6.1.1.1</product>
<product>urbancode_deploy:6.1.1.2</product>
<product>urbancode_deploy:6.1.1.3</product>
<product>urbancode_deploy:6.1.1.4</product>
<product>urbancode_deploy:6.1.1.5</product>
<product>urbancode_deploy:6.1.1.6</product>
<product>urbancode_deploy:6.1.1.7</product>
<product>urbancode_deploy:6.1.1.8</product>
<product>urbancode_deploy:6.1.2</product>
<product>urbancode_deploy:6.1.3</product>
<product>urbancode_deploy:6.1.3.1</product>
<product>urbancode_deploy:6.1.3.2</product>
<product>urbancode_deploy:6.1.3.3</product>
<product>urbancode_deploy:6.2.0.0</product>
<product>urbancode_deploy:6.2.0.1</product>
<product>urbancode_deploy:6.2.0.2</product>
<product>urbancode_deploy:6.2.1</product>
<product>urbancode_deploy:6.2.1.1</product>
<product>urbancode_deploy:6.2.2</product>
<product>urbancode_deploy:6.2.2.1</product>
</cve>
<cve id="CVE-2016-2945" level="MEDIUM">
<product>websphere_application_server:8.5.5.8</product>
<product>websphere_application_server:8.5.5.9</product>
</cve>
<cve id="CVE-2016-2944" level="LOW">
<product>bigfix_remote_control:9.1.2</product>
</cve>
<cve id="CVE-2016-2947" level="LOW">
<product>rational_collaborative_lifecycle_management:3.0.1.6</product>
<product>rational_collaborative_lifecycle_management:4.0.0</product>
<product>rational_collaborative_lifecycle_management:4.0.1</product>
<product>rational_collaborative_lifecycle_management:4.0.2</product>
<product>rational_collaborative_lifecycle_management:4.0.3</product>
<product>rational_collaborative_lifecycle_management:4.0.4</product>
<product>rational_collaborative_lifecycle_management:4.0.5</product>
<product>rational_collaborative_lifecycle_management:4.0.6</product>
<product>rational_collaborative_lifecycle_management:4.0.7</product>
<product>rational_collaborative_lifecycle_management:5.0.0</product>
<product>rational_collaborative_lifecycle_management:5.0.1</product>
<product>rational_collaborative_lifecycle_management:5.0.2</product>
<product>rational_collaborative_lifecycle_management:6.0.0</product>
<product>rational_collaborative_lifecycle_management:6.0.1</product>
<product>rational_collaborative_lifecycle_management:6.0.2</product>
<product>rational_doors_next_generation:4.0.0</product>
<product>rational_doors_next_generation:4.0.1</product>
<product>rational_doors_next_generation:4.0.2</product>
<product>rational_doors_next_generation:4.0.3</product>
<product>rational_doors_next_generation:4.0.4</product>
<product>rational_doors_next_generation:4.0.5</product>
<product>rational_doors_next_generation:4.0.6</product>
<product>rational_doors_next_generation:4.0.7</product>
<product>rational_doors_next_generation:5.0.0</product>
<product>rational_doors_next_generation:5.0.1</product>
<product>rational_doors_next_generation:5.0.2</product>
<product>rational_doors_next_generation:6.0.0</product>
<product>rational_doors_next_generation:6.0.1</product>
<product>rational_doors_next_generation:6.0.2</product>
<product>rational_engineering_lifecycle_manager:4.0.0</product>
<product>rational_engineering_lifecycle_manager:4.0.1</product>
<product>rational_engineering_lifecycle_manager:4.0.2</product>
<product>rational_engineering_lifecycle_manager:4.0.3</product>
<product>rational_engineering_lifecycle_manager:4.0.4</product>
<product>rational_engineering_lifecycle_manager:4.0.5</product>
<product>rational_engineering_lifecycle_manager:4.0.6</product>
<product>rational_engineering_lifecycle_manager:4.0.7</product>
<product>rational_engineering_lifecycle_manager:5.0.0</product>
<product>rational_engineering_lifecycle_manager:5.0.1</product>
<product>rational_engineering_lifecycle_manager:5.0.2</product>
<product>rational_engineering_lifecycle_manager:6.0.0</product>
<product>rational_engineering_lifecycle_manager:6.0.1</product>
<product>rational_engineering_lifecycle_manager:6.0.2</product>
<product>rational_quality_manager:3.0.1.6</product>
<product>rational_quality_manager:4.0.0</product>
<product>rational_quality_manager:4.0.1</product>
<product>rational_quality_manager:4.0.2</product>
<product>rational_quality_manager:4.0.3</product>
<product>rational_quality_manager:4.0.4</product>
<product>rational_quality_manager:4.0.5</product>
<product>rational_quality_manager:4.0.6</product>
<product>rational_quality_manager:4.0.7</product>
<product>rational_quality_manager:5.0.0</product>
<product>rational_quality_manager:5.0.1</product>
<product>rational_quality_manager:5.0.2</product>
<product>rational_quality_manager:6.0.0</product>
<product>rational_quality_manager:6.0.1</product>
<product>rational_quality_manager:6.0.2</product>
<product>rational_rhapsody_design_manager:4.0</product>
<product>rational_rhapsody_design_manager:4.0.1</product>
<product>rational_rhapsody_design_manager:4.0.2</product>
<product>rational_rhapsody_design_manager:4.0.3</product>
<product>rational_rhapsody_design_manager:4.0.4</product>
<product>rational_rhapsody_design_manager:4.0.5</product>
<product>rational_rhapsody_design_manager:4.0.6</product>
<product>rational_rhapsody_design_manager:4.0.7</product>
<product>rational_rhapsody_design_manager:5.0.0</product>
<product>rational_rhapsody_design_manager:5.0.1</product>
<product>rational_rhapsody_design_manager:5.0.2</product>
<product>rational_rhapsody_design_manager:6.0.0</product>
<product>rational_rhapsody_design_manager:6.0.1</product>
<product>rational_rhapsody_design_manager:6.0.2</product>
<product>rational_software_architect_design_manager:4.0.0</product>
<product>rational_software_architect_design_manager:4.0.1</product>
<product>rational_software_architect_design_manager:4.0.2</product>
<product>rational_software_architect_design_manager:4.0.3</product>
<product>rational_software_architect_design_manager:4.0.4</product>
<product>rational_software_architect_design_manager:4.0.5</product>
<product>rational_software_architect_design_manager:4.0.6</product>
<product>rational_software_architect_design_manager:4.0.7</product>
<product>rational_software_architect_design_manager:5.0.0</product>
<product>rational_software_architect_design_manager:5.0.1</product>
<product>rational_software_architect_design_manager:5.0.2</product>
<product>rational_software_architect_design_manager:6.0.0</product>
<product>rational_software_architect_design_manager:6.0.1</product>
<product>rational_software_architect_design_manager:6.0.2</product>
<product>rational_team_concert:3.0.1.6</product>
<product>rational_team_concert:4.0.0</product>
<product>rational_team_concert:4.0.1</product>
<product>rational_team_concert:4.0.2</product>
<product>rational_team_concert:4.0.3</product>
<product>rational_team_concert:4.0.4</product>
<product>rational_team_concert:4.0.5</product>
<product>rational_team_concert:4.0.6</product>
<product>rational_team_concert:4.0.7</product>
<product>rational_team_concert:5.0.0</product>
<product>rational_team_concert:5.0.1</product>
<product>rational_team_concert:5.0.2</product>
<product>rational_team_concert:6.0.0</product>
<product>rational_team_concert:6.0.1</product>
<product>rational_team_concert:6.0.2</product>
</cve>
<cve id="CVE-2016-2946" level="LOW">
<product>tivoli_monitoring:6.2.2</product>
<product>tivoli_monitoring:6.2.2.1</product>
<product>tivoli_monitoring:6.2.2.2</product>
<product>tivoli_monitoring:6.2.2.3</product>
<product>tivoli_monitoring:6.2.2.4</product>
<product>tivoli_monitoring:6.2.2.5</product>
<product>tivoli_monitoring:6.2.2.6</product>
<product>tivoli_monitoring:6.2.2.7</product>
<product>tivoli_monitoring:6.2.2.8</product>
<product>tivoli_monitoring:6.2.2.9</product>
<product>tivoli_monitoring:6.2.3</product>
<product>tivoli_monitoring:6.3.0</product>
</cve>
<cve id="CVE-2016-1115" level="MEDIUM">
<product>coldfusion:10.0</product>
<product>coldfusion:11.0</product>
<product>coldfusion:2016.00</product>
</cve>
<cve id="CVE-2016-1114" level="LOW">
<product>coldfusion:10.0</product>
<product>coldfusion:11.0</product>
<product>coldfusion:2016.00</product>
</cve>
<cve id="CVE-2016-9923" level="LOW">
<product>qemu:-</product>
</cve>
<cve id="CVE-2016-1118" level="LOW">
<product>acrobat:11.0.15</product>
<product>acrobat_dc:15.006.30121</product>
<product>acrobat_dc:15.010.20060</product>
<product>acrobat_reader_dc:15.006.30121</product>
<product>acrobat_reader_dc:15.010.20060</product>
<product>reader:11.0.15</product>
</cve>
<cve id="CVE-2016-2364" level="LOW">
<product>fonality:12.6</product>
<product>fonality:12.8</product>
<product>fonality:14.1i</product>
<product>hud_web:1.4.1</product>
</cve>
<cve id="CVE-2016-2363" level="LOW">
<product>fonality:12.6</product>
<product>fonality:12.8</product>
<product>fonality:14.1i</product>
</cve>
<cve id="CVE-2016-2362" level="LOW">
<product>fonality:12.6</product>
<product>fonality:12.8</product>
<product>fonality:14.1i</product>
</cve>
<cve id="CVE-2016-8561" level="MEDIUM">
<product>simatic_cp_1543-1_firmware:-</product>
</cve>
<cve id="CVE-2016-8563" level="LOW">
<product>automation_license_manager:5.3</product>
</cve>
<cve id="CVE-2016-8297" level="LOW">
<product>flexcube_universal_banking:11.3.0</product>
<product>flexcube_universal_banking:11.4.0</product>
<product>flexcube_universal_banking:12.0.1</product>
<product>flexcube_universal_banking:12.0.2</product>
<product>flexcube_universal_banking:12.0.3</product>
<product>flexcube_universal_banking:12.1.0</product>
<product>flexcube_universal_banking:12.2.0</product>
</cve>
<cve id="CVE-2016-8564" level="LOW">
<product>automation_license_manager:5.3</product>
</cve>
<cve id="CVE-2016-3708" level="LOW">
<product>openshift:3.2</product>
</cve>
<cve id="CVE-2016-8295" level="LOW">
<product>peoplesoft_enterprise_human_capital_management_time_and_labor:9.2</product>
</cve>
<cve id="CVE-2016-3704" level="LOW">
<product>pulp:2.8.4</product>
<product>fedora:24</product>
</cve>
<cve id="CVE-2016-3706" level="LOW">
<product>glibc</product>
<product>opensuse:13.2</product>
</cve>
<cve id="CVE-2016-8566" level="LOW">
<product>sicam_pas:-</product>
</cve>
<cve id="CVE-2016-3702" level="LOW">
<product>cloudforms_management_engine:5.0</product>
</cve>
<cve id="CVE-2016-3703" level="MEDIUM">
<product>openshift:3.1</product>
<product>openshift:3.2</product>
</cve>
<cve id="CVE-2016-8954" level="LOW">
<product>dashdb_local:1.0.0</product>
<product>dashdb_local:1.1.0</product>
<product>dashdb_local:1.1.1</product>
<product>dashdb_local:1.2.0</product>
<product>dashdb_local:1.2.1</product>
<product>dashdb_local:1.3.0</product>
<product>dashdb_local:1.3.1</product>
</cve>
<cve id="CVE-2016-8950" level="MEDIUM">
<product>emptoris_sourcing:9.5</product>
<product>emptoris_sourcing:9.5.0.1</product>
<product>emptoris_sourcing:9.5.1.1</product>
<product>emptoris_sourcing:9.5.1.2</product>
<product>emptoris_sourcing:9.5.1.3</product>
<product>emptoris_sourcing:10.0.0</product>
<product>emptoris_sourcing:10.0.1</product>
<product>emptoris_sourcing:10.0.2</product>
<product>emptoris_sourcing:10.0.4</product>
<product>emptoris_sourcing:10.1.0</product>
<product>emptoris_sourcing:10.1.1</product>
</cve>
<cve id="CVE-2016-8951" level="LOW">
<product>emptoris_strategic_supply_management:10.0.0.0</product>
<product>emptoris_strategic_supply_management:10.0.0.1</product>
<product>emptoris_strategic_supply_management:10.0.0.2</product>
<product>emptoris_strategic_supply_management:10.0.0.3</product>
<product>emptoris_strategic_supply_management:10.0.1.0</product>
<product>emptoris_strategic_supply_management:10.0.1.1</product>
<product>emptoris_strategic_supply_management:10.0.1.2</product>
<product>emptoris_strategic_supply_management:10.0.1.3</product>
<product>emptoris_strategic_supply_management:10.0.1.4</product>
<product>emptoris_strategic_supply_management:10.0.2.0</product>
<product>emptoris_strategic_supply_management:10.0.2.1</product>
<product>emptoris_strategic_supply_management:10.0.2.2</product>
<product>emptoris_strategic_supply_management:10.0.2.3</product>
<product>emptoris_strategic_supply_management:10.0.2.4</product>
<product>emptoris_strategic_supply_management:10.0.2.5</product>
<product>emptoris_strategic_supply_management:10.0.2.6</product>
<product>emptoris_strategic_supply_management:10.0.2.7</product>
<product>emptoris_strategic_supply_management:10.0.2.8</product>
<product>emptoris_strategic_supply_management:10.0.2.9</product>
<product>emptoris_strategic_supply_management:10.0.2.10</product>
<product>emptoris_strategic_supply_management:10.0.2.11</product>
<product>emptoris_strategic_supply_management:10.0.2.12</product>
<product>emptoris_strategic_supply_management:10.0.2.13</product>
<product>emptoris_strategic_supply_management:10.0.2.14</product>
<product>emptoris_strategic_supply_management:10.0.2.15</product>
<product>emptoris_strategic_supply_management:10.0.2.16</product>
<product>emptoris_strategic_supply_management:10.0.2.17</product>
<product>emptoris_strategic_supply_management:10.0.4.0</product>
<product>emptoris_strategic_supply_management:10.1.0.0</product>
<product>emptoris_strategic_supply_management:10.1.0.1</product>
<product>emptoris_strategic_supply_management:10.1.0.2</product>
<product>emptoris_strategic_supply_management:10.1.0.3</product>
<product>emptoris_strategic_supply_management:10.1.0.4</product>
<product>emptoris_strategic_supply_management:10.1.0.5</product>
<product>emptoris_strategic_supply_management:10.1.0.6</product>
<product>emptoris_strategic_supply_management:10.1.0.7</product>
<product>emptoris_strategic_supply_management:10.1.0.8</product>
<product>emptoris_strategic_supply_management:10.1.0.9</product>
<product>emptoris_strategic_supply_management:10.1.0.10</product>
<product>emptoris_strategic_supply_management:10.1.0.11</product>
<product>emptoris_strategic_supply_management:10.1.0.12</product>
<product>emptoris_strategic_supply_management:10.1.1.0</product>
<product>emptoris_strategic_supply_management:10.1.1.1</product>
<product>emptoris_strategic_supply_management:10.1.1.2</product>
<product>emptoris_strategic_supply_management:10.1.1.3</product>
<product>emptoris_strategic_supply_management:10.1.1.4</product>
<product>emptoris_strategic_supply_management:10.1.1.5</product>
<product>emptoris_strategic_supply_management:10.1.1.6</product>
<product>emptoris_strategic_supply_management:10.1.1.7</product>
<product>emptoris_strategic_supply_management:10.1.1.8</product>
<product>emptoris_strategic_supply_management:10.1.1.9</product>
<product>emptoris_strategic_supply_management:10.1.1.10</product>
</cve>
<cve id="CVE-2016-8952" level="MEDIUM">
<product>emptoris_strategic_supply_management:10.0.0.0</product>
<product>emptoris_strategic_supply_management:10.0.0.1</product>
<product>emptoris_strategic_supply_management:10.0.0.2</product>
<product>emptoris_strategic_supply_management:10.0.0.3</product>
<product>emptoris_strategic_supply_management:10.0.1.0</product>
<product>emptoris_strategic_supply_management:10.0.1.1</product>
<product>emptoris_strategic_supply_management:10.0.1.2</product>
<product>emptoris_strategic_supply_management:10.0.1.3</product>
<product>emptoris_strategic_supply_management:10.0.1.4</product>
<product>emptoris_strategic_supply_management:10.0.2.0</product>
<product>emptoris_strategic_supply_management:10.0.2.1</product>
<product>emptoris_strategic_supply_management:10.0.2.2</product>
<product>emptoris_strategic_supply_management:10.0.2.3</product>
<product>emptoris_strategic_supply_management:10.0.2.4</product>
<product>emptoris_strategic_supply_management:10.0.2.5</product>
<product>emptoris_strategic_supply_management:10.0.2.6</product>
<product>emptoris_strategic_supply_management:10.0.2.7</product>
<product>emptoris_strategic_supply_management:10.0.2.8</product>
<product>emptoris_strategic_supply_management:10.0.2.9</product>
<product>emptoris_strategic_supply_management:10.0.2.10</product>
<product>emptoris_strategic_supply_management:10.0.2.11</product>
<product>emptoris_strategic_supply_management:10.0.2.12</product>
<product>emptoris_strategic_supply_management:10.0.2.13</product>
<product>emptoris_strategic_supply_management:10.0.2.14</product>
<product>emptoris_strategic_supply_management:10.0.2.15</product>
<product>emptoris_strategic_supply_management:10.0.2.16</product>
<product>emptoris_strategic_supply_management:10.0.2.17</product>
<product>emptoris_strategic_supply_management:10.0.4.0</product>
<product>emptoris_strategic_supply_management:10.1.0.0</product>
<product>emptoris_strategic_supply_management:10.1.0.1</product>
<product>emptoris_strategic_supply_management:10.1.0.2</product>
<product>emptoris_strategic_supply_management:10.1.0.3</product>
<product>emptoris_strategic_supply_management:10.1.0.4</product>
<product>emptoris_strategic_supply_management:10.1.0.5</product>
<product>emptoris_strategic_supply_management:10.1.0.6</product>
<product>emptoris_strategic_supply_management:10.1.0.7</product>
<product>emptoris_strategic_supply_management:10.1.0.8</product>
<product>emptoris_strategic_supply_management:10.1.0.9</product>
<product>emptoris_strategic_supply_management:10.1.0.10</product>
<product>emptoris_strategic_supply_management:10.1.0.11</product>
<product>emptoris_strategic_supply_management:10.1.0.12</product>
<product>emptoris_strategic_supply_management:10.1.1.0</product>
<product>emptoris_strategic_supply_management:10.1.1.1</product>
<product>emptoris_strategic_supply_management:10.1.1.2</product>
<product>emptoris_strategic_supply_management:10.1.1.3</product>
<product>emptoris_strategic_supply_management:10.1.1.4</product>
<product>emptoris_strategic_supply_management:10.1.1.5</product>
<product>emptoris_strategic_supply_management:10.1.1.6</product>
<product>emptoris_strategic_supply_management:10.1.1.7</product>
<product>emptoris_strategic_supply_management:10.1.1.8</product>
<product>emptoris_strategic_supply_management:10.1.1.9</product>
<product>emptoris_strategic_supply_management:10.1.1.10</product>
</cve>
<cve id="CVE-2016-8953" level="MEDIUM">
<product>emptoris_sourcing:9.5</product>
<product>emptoris_sourcing:9.5.0.1</product>
<product>emptoris_sourcing:9.5.1.1</product>
<product>emptoris_sourcing:9.5.1.2</product>
<product>emptoris_sourcing:9.5.1.3</product>
<product>emptoris_sourcing:10.0.0</product>
<product>emptoris_sourcing:10.0.1</product>
<product>emptoris_sourcing:10.0.2</product>
<product>emptoris_sourcing:10.0.4</product>
<product>emptoris_sourcing:10.1.0</product>
<product>emptoris_sourcing:10.1.1</product>
</cve>
<cve id="CVE-2016-7469" level="MEDIUM">
<product>big-ip_access_policy_manager:11.2.1</product>
<product>big-ip_access_policy_manager:11.4.0</product>
<product>big-ip_access_policy_manager:11.4.1</product>
<product>big-ip_access_policy_manager:11.5.0</product>
<product>big-ip_access_policy_manager:11.5.1</product>
<product>big-ip_access_policy_manager:11.5.2</product>
<product>big-ip_access_policy_manager:11.5.3</product>
<product>big-ip_access_policy_manager:11.5.4</product>
<product>big-ip_access_policy_manager:11.6.0</product>
<product>big-ip_access_policy_manager:11.6.1</product>
<product>big-ip_access_policy_manager:12.0.0</product>
<product>big-ip_access_policy_manager:12.1.0</product>
<product>big-ip_access_policy_manager:12.1.1</product>
<product>big-ip_access_policy_manager:12.1.2</product>
<product>big-ip_advanced_firewall_manager:11.2.1</product>
<product>big-ip_advanced_firewall_manager:11.4.0</product>
<product>big-ip_advanced_firewall_manager:11.4.1</product>
<product>big-ip_advanced_firewall_manager:11.5.0</product>
<product>big-ip_advanced_firewall_manager:11.5.1</product>
<product>big-ip_advanced_firewall_manager:11.5.2</product>
<product>big-ip_advanced_firewall_manager:11.5.3</product>
<product>big-ip_advanced_firewall_manager:11.5.4</product>
<product>big-ip_advanced_firewall_manager:11.6.0</product>
<product>big-ip_advanced_firewall_manager:11.6.1</product>
<product>big-ip_advanced_firewall_manager:12.0.0</product>
<product>big-ip_advanced_firewall_manager:12.1.0</product>
<product>big-ip_advanced_firewall_manager:12.1.1</product>
<product>big-ip_advanced_firewall_manager:12.1.2</product>
<product>big-ip_analytics:11.2.1</product>
<product>big-ip_analytics:11.4.0</product>
<product>big-ip_analytics:11.4.1</product>
<product>big-ip_analytics:11.5.0</product>
<product>big-ip_analytics:11.5.1</product>
<product>big-ip_analytics:11.5.2</product>
<product>big-ip_analytics:11.5.3</product>
<product>big-ip_analytics:11.5.4</product>
<product>big-ip_analytics:11.6.0</product>
<product>big-ip_analytics:11.6.1</product>
<product>big-ip_analytics:12.0.0</product>
<product>big-ip_analytics:12.1.0</product>
<product>big-ip_analytics:12.1.1</product>
<product>big-ip_analytics:12.1.2</product>
<product>big-ip_application_acceleration_manager:11.4.0</product>
<product>big-ip_application_acceleration_manager:11.4.1</product>
<product>big-ip_application_acceleration_manager:11.5.0</product>
<product>big-ip_application_acceleration_manager:11.5.1</product>
<product>big-ip_application_acceleration_manager:11.5.2</product>
<product>big-ip_application_acceleration_manager:11.5.3</product>
<product>big-ip_application_acceleration_manager:11.5.4</product>
<product>big-ip_application_acceleration_manager:11.6.0</product>
<product>big-ip_application_acceleration_manager:11.6.1</product>
<product>big-ip_application_acceleration_manager:12.0.0</product>
<product>big-ip_application_acceleration_manager:12.1.0</product>
<product>big-ip_application_acceleration_manager:12.1.1</product>
<product>big-ip_application_acceleration_manager:12.1.2</product>
<product>big-ip_application_security_manager:11.2.1</product>
<product>big-ip_application_security_manager:11.4.0</product>
<product>big-ip_application_security_manager:11.4.1</product>
<product>big-ip_application_security_manager:11.5.0</product>
<product>big-ip_application_security_manager:11.5.1</product>
<product>big-ip_application_security_manager:11.5.2</product>
<product>big-ip_application_security_manager:11.5.3</product>
<product>big-ip_application_security_manager:11.5.4</product>
<product>big-ip_application_security_manager:11.6.0</product>
<product>big-ip_application_security_manager:11.6.1</product>
<product>big-ip_application_security_manager:12.0.0</product>
<product>big-ip_application_security_manager:12.1.0</product>
<product>big-ip_application_security_manager:12.1.1</product>
<product>big-ip_application_security_manager:12.1.2</product>
<product>big-ip_domain_name_system:12.0.0</product>
<product>big-ip_domain_name_system:12.1.0</product>
<product>big-ip_domain_name_system:12.1.1</product>
<product>big-ip_domain_name_system:12.1.2</product>
<product>big-ip_edge_gateway:11.2.1</product>
<product>big-ip_global_traffic_manager:11.2.1</product>
<product>big-ip_global_traffic_manager:11.4.0</product>
<product>big-ip_global_traffic_manager:11.4.1</product>
<product>big-ip_global_traffic_manager:11.5.0</product>
<product>big-ip_global_traffic_manager:11.5.1</product>
<product>big-ip_global_traffic_manager:11.5.2</product>
<product>big-ip_global_traffic_manager:11.5.3</product>
<product>big-ip_global_traffic_manager:11.5.4</product>
<product>big-ip_global_traffic_manager:11.6.0</product>
<product>big-ip_global_traffic_manager:11.6.1</product>
<product>big-ip_link_controller:11.2.1</product>
<product>big-ip_link_controller:11.4.0</product>
<product>big-ip_link_controller:11.4.1</product>
<product>big-ip_link_controller:11.5.0</product>
<product>big-ip_link_controller:11.5.1</product>
<product>big-ip_link_controller:11.5.2</product>
<product>big-ip_link_controller:11.5.3</product>
<product>big-ip_link_controller:11.5.4</product>
<product>big-ip_link_controller:11.6.0</product>
<product>big-ip_link_controller:11.6.1</product>
<product>big-ip_link_controller:12.0.0</product>
<product>big-ip_link_controller:12.1.0</product>
<product>big-ip_link_controller:12.1.1</product>
<product>big-ip_link_controller:12.1.2</product>
<product>big-ip_local_traffic_manager:11.2.1</product>
<product>big-ip_local_traffic_manager:11.4.0</product>
<product>big-ip_local_traffic_manager:11.4.1</product>
<product>big-ip_local_traffic_manager:11.5.0</product>
<product>big-ip_local_traffic_manager:11.5.1</product>
<product>big-ip_local_traffic_manager:11.5.2</product>
<product>big-ip_local_traffic_manager:11.5.3</product>
<product>big-ip_local_traffic_manager:11.5.4</product>
<product>big-ip_local_traffic_manager:11.6.0</product>
<product>big-ip_local_traffic_manager:11.6.1</product>
<product>big-ip_local_traffic_manager:12.0.0</product>
<product>big-ip_local_traffic_manager:12.1.0</product>
<product>big-ip_local_traffic_manager:12.1.1</product>
<product>big-ip_local_traffic_manager:12.1.2</product>
<product>big-ip_policy_enforcement_manager:11.4.0</product>
<product>big-ip_policy_enforcement_manager:11.4.1</product>
<product>big-ip_policy_enforcement_manager:11.5.0</product>
<product>big-ip_policy_enforcement_manager:11.5.1</product>
<product>big-ip_policy_enforcement_manager:11.5.2</product>
<product>big-ip_policy_enforcement_manager:11.5.3</product>
<product>big-ip_policy_enforcement_manager:11.5.4</product>
<product>big-ip_policy_enforcement_manager:11.6.0</product>
<product>big-ip_policy_enforcement_manager:11.6.1</product>
<product>big-ip_policy_enforcement_manager:12.0.0</product>
<product>big-ip_policy_enforcement_manager:12.1.0</product>
<product>big-ip_policy_enforcement_manager:12.1.1</product>
<product>big-ip_policy_enforcement_manager:12.1.2</product>
<product>big-ip_wan_optimization_manager:11.2.1</product>
<product>big-ip_webaccelerator:11.2.1</product>
<product>big-ip_websafe:11.6.0</product>
<product>big-ip_websafe:11.6.1</product>
<product>big-ip_websafe:12.0.0</product>
<product>big-ip_websafe:12.1.0</product>
<product>big-ip_websafe:12.1.1</product>
<product>big-ip_websafe:12.1.2</product>
<product>enterprise_manager:3.1.1</product>
<product>big-ip_protocol_security_manager:11.4.0</product>
<product>big-ip_protocol_security_manager:11.4.1</product>
</cve>
<cve id="CVE-2016-7468" level="MEDIUM">
<product>big-ip_access_policy_manager:11.4.0</product>
<product>big-ip_access_policy_manager:11.4.1</product>
<product>big-ip_access_policy_manager:11.5.0</product>
<product>big-ip_access_policy_manager:11.5.1</product>
<product>big-ip_access_policy_manager:11.5.2</product>
<product>big-ip_access_policy_manager:11.5.3</product>
<product>big-ip_access_policy_manager:11.5.4</product>
<product>big-ip_advanced_firewall_manager:11.4.0</product>
<product>big-ip_advanced_firewall_manager:11.4.1</product>
<product>big-ip_advanced_firewall_manager:11.5.0</product>
<product>big-ip_advanced_firewall_manager:11.5.1</product>
<product>big-ip_advanced_firewall_manager:11.5.2</product>
<product>big-ip_advanced_firewall_manager:11.5.3</product>
<product>big-ip_advanced_firewall_manager:11.5.4</product>
<product>big-ip_analytics:11.4.0</product>
<product>big-ip_analytics:11.4.1</product>
<product>big-ip_analytics:11.5.0</product>
<product>big-ip_analytics:11.5.1</product>
<product>big-ip_analytics:11.5.2</product>
<product>big-ip_analytics:11.5.3</product>
<product>big-ip_analytics:11.5.4</product>
<product>big-ip_application_acceleration_manager:11.4.0</product>
<product>big-ip_application_acceleration_manager:11.4.1</product>
<product>big-ip_application_acceleration_manager:11.5.0</product>
<product>big-ip_application_acceleration_manager:11.5.1</product>
<product>big-ip_application_acceleration_manager:11.5.2</product>
<product>big-ip_application_acceleration_manager:11.5.3</product>
<product>big-ip_application_acceleration_manager:11.5.4</product>
<product>big-ip_application_security_manager:11.4.0</product>
<product>big-ip_application_security_manager:11.4.1</product>
<product>big-ip_application_security_manager:11.5.0</product>
<product>big-ip_application_security_manager:11.5.1</product>
<product>big-ip_application_security_manager:11.5.2</product>
<product>big-ip_application_security_manager:11.5.3</product>
<product>big-ip_application_security_manager:11.5.4</product>
<product>big-ip_global_traffic_manager:11.4.0</product>
<product>big-ip_global_traffic_manager:11.4.1</product>
<product>big-ip_global_traffic_manager:11.5.0</product>
<product>big-ip_global_traffic_manager:11.5.1</product>
<product>big-ip_global_traffic_manager:11.5.2</product>
<product>big-ip_global_traffic_manager:11.5.3</product>
<product>big-ip_global_traffic_manager:11.5.4</product>
<product>big-ip_link_controller:11.4.0</product>
<product>big-ip_link_controller:11.4.1</product>
<product>big-ip_link_controller:11.5.0</product>
<product>big-ip_link_controller:11.5.1</product>
<product>big-ip_link_controller:11.5.2</product>
<product>big-ip_link_controller:11.5.3</product>
<product>big-ip_link_controller:11.5.4</product>
<product>big-ip_local_traffic_manager:11.4.0</product>
<product>big-ip_local_traffic_manager:11.4.1</product>
<product>big-ip_local_traffic_manager:11.5.0</product>
<product>big-ip_local_traffic_manager:11.5.1</product>
<product>big-ip_local_traffic_manager:11.5.2</product>
<product>big-ip_local_traffic_manager:11.5.3</product>
<product>big-ip_local_traffic_manager:11.5.4</product>
<product>big-ip_policy_enforcement_manager:11.4.0</product>
<product>big-ip_policy_enforcement_manager:11.4.1</product>
<product>big-ip_policy_enforcement_manager:11.5.0</product>
<product>big-ip_policy_enforcement_manager:11.5.1</product>
<product>big-ip_policy_enforcement_manager:11.5.2</product>
<product>big-ip_policy_enforcement_manager:11.5.3</product>
<product>big-ip_policy_enforcement_manager:11.5.4</product>
<product>big-ip_protocol_security_manager:11.4.0</product>
<product>big-ip_protocol_security_manager:11.4.1</product>
</cve>
<cve id="CVE-2016-7461" level="LOW">
<product>fusion:8.0.0</product>
<product>fusion:8.0.1</product>
<product>fusion:8.0.2</product>
<product>fusion:8.1.0</product>
<product>fusion:8.1.1</product>
<product>fusion:8.5.0</product>
<product>fusion:8.5.1</product>
<product>fusion_pro:8.0.0</product>
<product>fusion_pro:8.0.1</product>
<product>fusion_pro:8.0.2</product>
<product>fusion_pro:8.1.0</product>
<product>fusion_pro:8.1.1</product>
<product>fusion_pro:8.5.0</product>
<product>fusion_pro:8.5.1</product>
<product>workstation_player:12.0.0</product>
<product>workstation_player:12.0.1</product>
<product>workstation_player:12.1.0</product>
<product>workstation_player:12.1.1</product>
<product>workstation_player:12.5.0</product>
<product>workstation_player:12.5.1</product>
<product>workstation_pro:12.0.0</product>
<product>workstation_pro:12.0.1</product>
<product>workstation_pro:12.1.0</product>
<product>workstation_pro:12.1.1</product>
<product>workstation_pro:12.5.0</product>
<product>workstation_pro:12.5.1</product>
</cve>
<cve id="CVE-2016-7460" level="LOW">
<product>vrealize_automation:6.0.0</product>
<product>vrealize_automation:6.0.1</product>
<product>vrealize_automation:6.0.1.1</product>
<product>vrealize_automation:6.0.1.2</product>
<product>vrealize_automation:6.1.0</product>
<product>vrealize_automation:6.1.1</product>
<product>vrealize_automation:6.2.0</product>
<product>vrealize_automation:6.2.1</product>
<product>vrealize_automation:6.2.2</product>
<product>vrealize_automation:6.2.3</product>
<product>vrealize_automation:6.2.4</product>
</cve>
<cve id="CVE-2016-7463" level="MEDIUM">
<product>esxi:5.5</product>
<product>esxi:6.0</product>
</cve>
<cve id="CVE-2016-7462" level="LOW">
<product>vrealize_operations:6.0.0</product>
<product>vrealize_operations:6.1.0</product>
<product>vrealize_operations:6.2.0a</product>
<product>vrealize_operations:6.2.1</product>
<product>vrealize_operations:6.3.0</product>
</cve>
<cve id="CVE-2016-7467" level="MEDIUM">
<product>big-ip_access_policy_manager:11.5.4</product>
<product>big-ip_access_policy_manager:11.6.0</product>
<product>big-ip_access_policy_manager:11.6.1</product>
<product>big-ip_access_policy_manager:12.0.0</product>
<product>big-ip_access_policy_manager:12.1.0</product>
<product>big-ip_access_policy_manager:12.1.1</product>
</cve>
<cve id="CVE-2016-7466" level="LOW">
<product>qemu:-</product>
</cve>
<cve id="CVE-2016-3568" level="MEDIUM">
<product>primavera_p6_enterprise_project_portfolio_management:8.3</product>
<product>primavera_p6_enterprise_project_portfolio_management:8.4</product>
<product>primavera_p6_enterprise_project_portfolio_management:15.1</product>
<product>primavera_p6_enterprise_project_portfolio_management:15.2</product>
<product>primavera_p6_enterprise_project_portfolio_management:16.1</product>
</cve>
<cve id="CVE-2016-3569" level="MEDIUM">
<product>primavera_p6_enterprise_project_portfolio_management:8.3</product>
<product>primavera_p6_enterprise_project_portfolio_management:8.4</product>
<product>primavera_p6_enterprise_project_portfolio_management:15.1</product>
<product>primavera_p6_enterprise_project_portfolio_management:15.2</product>
<product>primavera_p6_enterprise_project_portfolio_management:16.1</product>
</cve>
<cve id="CVE-2016-3560" level="LOW">
<product>agile_product_lifecycle_management_framework:9.3.4</product>
<product>agile_product_lifecycle_management_framework:9.3.5</product>
</cve>
<cve id="CVE-2016-3561" level="LOW">
<product>agile_product_lifecycle_management_framework:9.3.4</product>
<product>agile_product_lifecycle_management_framework:9.3.5</product>
</cve>
<cve id="CVE-2016-3563" level="MEDIUM">
<product>enterprise_manager_base_platform:12.1.0.5</product>
</cve>
<cve id="CVE-2016-3564" level="MEDIUM">
<product>toplink:12.1.3.0</product>
<product>toplink:12.2.1.0</product>
<product>toplink:12.2.1.1</product>
</cve>
<cve id="CVE-2016-3565" level="LOW">
<product>retail_order_broker_cloud_service:5.1</product>
<product>retail_order_broker_cloud_service:5.2</product>
</cve>
<cve id="CVE-2016-3566" level="MEDIUM">
<product>primavera_p6_enterprise_project_portfolio_management:8.3</product>
<product>primavera_p6_enterprise_project_portfolio_management:8.4</product>
<product>primavera_p6_enterprise_project_portfolio_management:15.1</product>
<product>primavera_p6_enterprise_project_portfolio_management:15.2</product>
<product>primavera_p6_enterprise_project_portfolio_management:16.1</product>
</cve>
<cve id="CVE-2016-3567" level="MEDIUM">
<product>primavera_p6_enterprise_project_portfolio_management:8.3</product>
<product>primavera_p6_enterprise_project_portfolio_management:8.4</product>
<product>primavera_p6_enterprise_project_portfolio_management:15.1</product>
<product>primavera_p6_enterprise_project_portfolio_management:15.2</product>
<product>primavera_p6_enterprise_project_portfolio_management:16.1</product>
</cve>
<cve id="CVE-2016-1379" level="LOW">
<product>adaptive_security_appliance_software:9.0.1</product>
<product>adaptive_security_appliance_software:9.0.2</product>
<product>adaptive_security_appliance_software:9.0.2.10</product>
<product>adaptive_security_appliance_software:9.0.3</product>
<product>adaptive_security_appliance_software:9.0.3.6</product>
<product>adaptive_security_appliance_software:9.0.3.8</product>
<product>adaptive_security_appliance_software:9.0.4</product>
<product>adaptive_security_appliance_software:9.0.4.1</product>
<product>adaptive_security_appliance_software:9.0.4.5</product>
<product>adaptive_security_appliance_software:9.0.4.7</product>
<product>adaptive_security_appliance_software:9.0.4.17</product>
<product>adaptive_security_appliance_software:9.0.4.20</product>
<product>adaptive_security_appliance_software:9.0.4.24</product>
<product>adaptive_security_appliance_software:9.0.4.26</product>
<product>adaptive_security_appliance_software:9.0.4.29</product>
<product>adaptive_security_appliance_software:9.0.4.33</product>
<product>adaptive_security_appliance_software:9.0.4.35</product>
<product>adaptive_security_appliance_software:9.0.4.37</product>
<product>adaptive_security_appliance_software:9.1.1</product>
<product>adaptive_security_appliance_software:9.1.1.4</product>
<product>adaptive_security_appliance_software:9.1.2</product>
<product>adaptive_security_appliance_software:9.1.2.8</product>
<product>adaptive_security_appliance_software:9.1.3</product>
<product>adaptive_security_appliance_software:9.1.3.2</product>
<product>adaptive_security_appliance_software:9.1.4</product>
<product>adaptive_security_appliance_software:9.1.4.5</product>
<product>adaptive_security_appliance_software:9.1.5</product>
<product>adaptive_security_appliance_software:9.1.5.10</product>
<product>adaptive_security_appliance_software:9.1.5.12</product>
<product>adaptive_security_appliance_software:9.1.5.15</product>
<product>adaptive_security_appliance_software:9.1.5.21</product>
<product>adaptive_security_appliance_software:9.1.6</product>
<product>adaptive_security_appliance_software:9.1.6.1</product>
<product>adaptive_security_appliance_software:9.1.6.4</product>
<product>adaptive_security_appliance_software:9.1.6.6</product>
<product>adaptive_security_appliance_software:9.1.6.8</product>
<product>adaptive_security_appliance_software:9.2%280.0%29</product>
<product>adaptive_security_appliance_software:9.2%280.104%29</product>
<product>adaptive_security_appliance_software:9.2%283.1%29</product>
<product>adaptive_security_appliance_software:9.2.1</product>
<product>adaptive_security_appliance_software:9.2.2</product>
<product>adaptive_security_appliance_software:9.2.2.4</product>
<product>adaptive_security_appliance_software:9.2.2.7</product>
<product>adaptive_security_appliance_software:9.2.2.8</product>
<product>adaptive_security_appliance_software:9.2.3</product>
<product>adaptive_security_appliance_software:9.2.3.3</product>
<product>adaptive_security_appliance_software:9.2.3.4</product>
<product>adaptive_security_appliance_software:9.2.4</product>
<product>adaptive_security_appliance_software:9.3%281.50%29</product>
<product>adaptive_security_appliance_software:9.3%281.105%29</product>
<product>adaptive_security_appliance_software:9.3%282.100%29</product>
<product>adaptive_security_appliance_software:9.3%282.243%29</product>
<product>adaptive_security_appliance_software:9.3.1</product>
<product>adaptive_security_appliance_software:9.3.1.1</product>
<product>adaptive_security_appliance_software:9.3.2</product>
<product>adaptive_security_appliance_software:9.3.2.2</product>
<product>adaptive_security_appliance_software:9.3.3</product>
<product>adaptive_security_appliance_software:9.3.3.1</product>
<product>adaptive_security_appliance_software:9.3.3.2</product>
<product>adaptive_security_appliance_software:9.3.3.5</product>
<product>adaptive_security_appliance_software:9.3.3.6</product>
<product>adaptive_security_appliance_software:9.4.0.115</product>
<product>adaptive_security_appliance_software:9.4.1</product>
<product>adaptive_security_appliance_software:9.4.1.1</product>
<product>adaptive_security_appliance_software:9.4.1.2</product>
<product>adaptive_security_appliance_software:9.4.1.3</product>
<product>adaptive_security_appliance_software:9.4.1.5</product>
<product>adaptive_security_appliance_software:9.5.1</product>
</cve>
<cve id="CVE-2016-5697" level="LOW">
<product>ruby-saml:1.2.0</product>
</cve>
<cve id="CVE-2016-1375" level="MEDIUM">
<product>ip_interoperability_and_collaboration_system:4.10</product>
</cve>
<cve id="CVE-2016-1374" level="LOW">
<product>unified_computing_system_performance_manager:1.0_base</product>
<product>unified_computing_system_performance_manager:1.1.0</product>
<product>unified_computing_system_performance_manager:1.1.1</product>
<product>unified_computing_system_performance_manager:2.0.0</product>
</cve>
<cve id="CVE-2016-7289" level="MEDIUM">
<product>publisher:2010</product>
</cve>
<cve id="CVE-2016-7288" level="HIGH">
<product>edge:-</product>
</cve>
<cve id="CVE-2016-7284" level="MEDIUM">
<product>internet_explorer:10</product>
<product>internet_explorer:11</product>
</cve>
<cve id="CVE-2016-7287" level="HIGH">
<product>edge:-</product>
<product>internet_explorer:11</product>
</cve>
<cve id="CVE-2016-7286" level="HIGH">
<product>edge:-</product>
</cve>
<cve id="CVE-2016-7281" level="HIGH">
<product>edge:-</product>
<product>internet_explorer:10</product>
<product>internet_explorer:11</product>
</cve>
<cve id="CVE-2016-7280" level="MEDIUM">
<product>edge:-</product>
</cve>
<cve id="CVE-2016-7283" level="MEDIUM">
<product>internet_explorer:9</product>
<product>internet_explorer:10</product>
<product>internet_explorer:11</product>
</cve>
<cve id="CVE-2016-7282" level="MEDIUM">
<product>edge:-</product>
<product>internet_explorer:9</product>
<product>internet_explorer:10</product>
<product>internet_explorer:11</product>
</cve>
<cve id="CVE-2016-9539" level="LOW">
<product>libtiff:4.0.6</product>
</cve>
<cve id="CVE-2016-9538" level="LOW">
<product>libtiff:4.0.6</product>
</cve>
<cve id="CVE-2016-9533" level="LOW">
<product>libtiff:4.0.6</product>
</cve>
<cve id="CVE-2016-9535" level="LOW">
<product>libtiff:4.0.6</product>
</cve>
<cve id="CVE-2016-9534" level="LOW">
<product>libtiff:4.0.6</product>
</cve>
<cve id="CVE-2016-9537" level="LOW">
<product>libtiff:4.0.6</product>
</cve>
<cve id="CVE-2016-9536" level="LOW">
<product>libtiff:4.0.6</product>
</cve>
<cve id="CVE-2016-4451" level="MEDIUM">
<product>foreman:1.11.2</product>
<product>foreman:1.12.0</product>
</cve>
<cve id="CVE-2016-5027" level="MEDIUM">
<product>libdwarf:20160115</product>
</cve>
<cve id="CVE-2016-5026" level="LOW">
<product>onionshare:0.9.0</product>
</cve>
<cve id="CVE-2016-5025" level="LOW">
<product>gpu_driver:341.95</product>
<product>gpu_driver:354.74</product>
<product>gpu_driver:362.00</product>
<product>gpu_driver:368.22</product>
<product>gpu_driver:368.39</product>
</cve>
<cve id="CVE-2016-5024" level="MEDIUM">
<product>big-ip_access_policy_manager:11.6.1</product>
<product>big-ip_access_policy_manager:12.1.0</product>
<product>big-ip_access_policy_manager:12.1.1</product>
<product>big-ip_advanced_firewall_manager:11.6.1</product>
<product>big-ip_advanced_firewall_manager:12.1.0</product>
<product>big-ip_advanced_firewall_manager:12.1.1</product>
<product>big-ip_analytics:11.6.1</product>
<product>big-ip_analytics:12.1.0</product>
<product>big-ip_analytics:12.1.1</product>
<product>big-ip_application_acceleration_manager:11.6.1</product>
<product>big-ip_application_acceleration_manager:12.1.0</product>
<product>big-ip_application_acceleration_manager:12.1.1</product>
<product>big-ip_application_security_manager:11.6.1</product>
<product>big-ip_application_security_manager:12.1.0</product>
<product>big-ip_application_security_manager:12.1.1</product>
<product>big-ip_domain_name_system:12.1.0</product>
<product>big-ip_domain_name_system:12.1.1</product>
<product>big-ip_global_traffic_manager:11.6.1</product>
<product>big-ip_link_controller:11.6.1</product>
<product>big-ip_link_controller:12.1.0</product>
<product>big-ip_link_controller:12.1.1</product>
<product>big-ip_local_traffic_manager:11.6.1</product>
<product>big-ip_local_traffic_manager:12.1.0</product>
<product>big-ip_local_traffic_manager:12.1.1</product>
<product>big-ip_policy_enforcement_manager:11.6.1</product>
<product>big-ip_policy_enforcement_manager:12.1.0</product>
<product>big-ip_policy_enforcement_manager:12.1.1</product>
</cve>
<cve id="CVE-2016-5023" level="LOW">
<product>big-ip_access_policy_manager:11.2.1</product>
<product>big-ip_access_policy_manager:11.4.1</product>
<product>big-ip_access_policy_manager:11.5.3</product>
<product>big-ip_access_policy_manager:11.5.4</product>
<product>big-ip_access_policy_manager:11.6.0</product>
<product>big-ip_access_policy_manager:12.0.0</product>
<product>big-ip_advanced_firewall_manager:11.4.1</product>
<product>big-ip_advanced_firewall_manager:11.5.3</product>
<product>big-ip_advanced_firewall_manager:11.5.4</product>
<product>big-ip_advanced_firewall_manager:11.6.0</product>
<product>big-ip_advanced_firewall_manager:12.0.0</product>
<product>big-ip_analytics:11.2.1</product>
<product>big-ip_analytics:11.4.1</product>
<product>big-ip_analytics:11.5.3</product>
<product>big-ip_analytics:11.5.4</product>
<product>big-ip_analytics:11.6.0</product>
<product>big-ip_analytics:12.0.0</product>
<product>big-ip_application_acceleration_manager:11.4.1</product>
<product>big-ip_application_acceleration_manager:11.5.3</product>
<product>big-ip_application_acceleration_manager:11.5.4</product>
<product>big-ip_application_acceleration_manager:11.6.0</product>
<product>big-ip_application_acceleration_manager:12.0.0</product>
<product>big-ip_application_security_manager:11.2.1</product>
<product>big-ip_application_security_manager:11.4.1</product>
<product>big-ip_application_security_manager:11.5.3</product>
<product>big-ip_application_security_manager:11.5.4</product>
<product>big-ip_application_security_manager:11.6.0</product>
<product>big-ip_application_security_manager:12.0.0</product>
<product>big-ip_domain_name_system:12.0.0</product>
<product>big-ip_edge_gateway:11.2.1</product>
<product>big-ip_global_traffic_manager:11.2.1</product>
<product>big-ip_global_traffic_manager:11.4.1</product>
<product>big-ip_global_traffic_manager:11.5.3</product>
<product>big-ip_global_traffic_manager:11.5.4</product>
<product>big-ip_global_traffic_manager:11.6.0</product>
<product>big-ip_link_controller:11.2.1</product>
<product>big-ip_link_controller:11.4.1</product>
<product>big-ip_link_controller:11.5.3</product>
<product>big-ip_link_controller:11.5.4</product>
<product>big-ip_link_controller:11.6.0</product>
<product>big-ip_link_controller:12.0.0</product>
<product>big-ip_policy_enforcement_manager:11.4.1</product>
<product>big-ip_policy_enforcement_manager:11.5.3</product>
<product>big-ip_policy_enforcement_manager:11.5.4</product>
<product>big-ip_policy_enforcement_manager:11.6.0</product>
<product>big-ip_policy_enforcement_manager:12.0.0</product>
<product>big-ip_wan_optimization_manager:11.2.1</product>
<product>big-ip_webaccelerator:11.2.1</product>
<product>big-ip_protocol_security_manager:11.2.1</product>
<product>big-ip_protocol_security_manager:11.4.1</product>
</cve>
<cve id="CVE-2016-5022" level="LOW">
<product>big-ip_access_policy_manager:11.2.0</product>
<product>big-ip_access_policy_manager:11.2.1</product>
<product>big-ip_access_policy_manager:11.3.0</product>
<product>big-ip_access_policy_manager:11.4.0</product>
<product>big-ip_access_policy_manager:11.4.1</product>
<product>big-ip_access_policy_manager:11.5.0</product>
<product>big-ip_access_policy_manager:11.5.1</product>
<product>big-ip_access_policy_manager:11.5.2</product>
<product>big-ip_access_policy_manager:11.5.3</product>
<product>big-ip_access_policy_manager:11.5.4</product>
<product>big-ip_access_policy_manager:11.6.0</product>
<product>big-ip_access_policy_manager:11.6.1</product>
<product>big-ip_access_policy_manager:12.0.0</product>
<product>big-ip_advanced_firewall_manager:11.4.0</product>
<product>big-ip_advanced_firewall_manager:11.4.1</product>
<product>big-ip_advanced_firewall_manager:11.5.0</product>
<product>big-ip_advanced_firewall_manager:11.5.1</product>
<product>big-ip_advanced_firewall_manager:11.5.2</product>
<product>big-ip_advanced_firewall_manager:11.5.3</product>
<product>big-ip_advanced_firewall_manager:11.5.4</product>
<product>big-ip_advanced_firewall_manager:11.6.0</product>
<product>big-ip_advanced_firewall_manager:11.6.1</product>
<product>big-ip_advanced_firewall_manager:12.0.0</product>
<product>big-ip_analytics:11.2.0</product>
<product>big-ip_analytics:11.2.1</product>
<product>big-ip_analytics:11.3.0</product>
<product>big-ip_analytics:11.4.0</product>
<product>big-ip_analytics:11.4.1</product>
<product>big-ip_analytics:11.5.0</product>
<product>big-ip_analytics:11.5.1</product>
<product>big-ip_analytics:11.5.2</product>
<product>big-ip_analytics:11.5.3</product>
<product>big-ip_analytics:11.5.4</product>
<product>big-ip_analytics:11.6.0</product>
<product>big-ip_analytics:11.6.1</product>
<product>big-ip_analytics:12.0.0</product>
<product>big-ip_application_acceleration_manager:11.4.0</product>
<product>big-ip_application_acceleration_manager:11.4.1</product>
<product>big-ip_application_acceleration_manager:11.5.0</product>
<product>big-ip_application_acceleration_manager:11.5.1</product>
<product>big-ip_application_acceleration_manager:11.5.2</product>
<product>big-ip_application_acceleration_manager:11.5.3</product>
<product>big-ip_application_acceleration_manager:11.5.4</product>
<product>big-ip_application_acceleration_manager:11.6.0</product>
<product>big-ip_application_acceleration_manager:11.6.1</product>
<product>big-ip_application_acceleration_manager:12.0.0</product>
<product>big-ip_application_security_manager:11.2.0</product>
<product>big-ip_application_security_manager:11.2.1</product>
<product>big-ip_application_security_manager:11.3.0</product>
<product>big-ip_application_security_manager:11.4.0</product>
<product>big-ip_application_security_manager:11.4.1</product>
<product>big-ip_application_security_manager:11.5.0</product>
<product>big-ip_application_security_manager:11.5.1</product>
<product>big-ip_application_security_manager:11.5.2</product>
<product>big-ip_application_security_manager:11.5.3</product>
<product>big-ip_application_security_manager:11.5.4</product>
<product>big-ip_application_security_manager:11.6.0</product>
<product>big-ip_application_security_manager:11.6.1</product>
<product>big-ip_application_security_manager:12.0.0</product>
<product>big-ip_domain_name_system:12.0.0</product>
<product>big-ip_edge_gateway:11.2.0</product>
<product>big-ip_edge_gateway:11.2.1</product>
<product>big-ip_edge_gateway:11.3.0</product>
<product>big-ip_global_traffic_manager:11.2.0</product>
<product>big-ip_global_traffic_manager:11.2.1</product>
<product>big-ip_global_traffic_manager:11.3.0</product>
<product>big-ip_global_traffic_manager:11.4.0</product>
<product>big-ip_global_traffic_manager:11.4.1</product>
<product>big-ip_global_traffic_manager:11.5.0</product>
<product>big-ip_global_traffic_manager:11.5.1</product>
<product>big-ip_global_traffic_manager:11.5.2</product>
<product>big-ip_global_traffic_manager:11.5.3</product>
<product>big-ip_global_traffic_manager:11.5.4</product>
<product>big-ip_global_traffic_manager:11.6.0</product>
<product>big-ip_global_traffic_manager:11.6.1</product>
<product>big-ip_link_controller:11.2.0</product>
<product>big-ip_link_controller:11.2.1</product>
<product>big-ip_link_controller:11.3.0</product>
<product>big-ip_link_controller:11.4.0</product>
<product>big-ip_link_controller:11.4.1</product>
<product>big-ip_link_controller:11.5.0</product>
<product>big-ip_link_controller:11.5.1</product>
<product>big-ip_link_controller:11.5.2</product>
<product>big-ip_link_controller:11.5.3</product>
<product>big-ip_link_controller:11.5.4</product>
<product>big-ip_link_controller:11.6.0</product>
<product>big-ip_link_controller:11.6.1</product>
<product>big-ip_link_controller:12.0.0</product>
<product>big-ip_local_traffic_manager:11.2.0</product>
<product>big-ip_local_traffic_manager:11.2.1</product>
<product>big-ip_local_traffic_manager:11.3.0</product>
<product>big-ip_local_traffic_manager:11.4.0</product>
<product>big-ip_local_traffic_manager:11.4.1</product>
<product>big-ip_local_traffic_manager:11.5.0</product>
<product>big-ip_local_traffic_manager:11.5.1</product>
<product>big-ip_local_traffic_manager:11.5.2</product>
<product>big-ip_local_traffic_manager:11.5.3</product>
<product>big-ip_local_traffic_manager:11.5.4</product>
<product>big-ip_local_traffic_manager:11.6.0</product>
<product>big-ip_local_traffic_manager:11.6.1</product>
<product>big-ip_local_traffic_manager:12.0.0</product>
<product>big-ip_policy_enforcement_manager:11.4.0</product>
<product>big-ip_policy_enforcement_manager:11.4.1</product>
<product>big-ip_policy_enforcement_manager:11.5.0</product>
<product>big-ip_policy_enforcement_manager:11.5.1</product>
<product>big-ip_policy_enforcement_manager:11.5.2</product>
<product>big-ip_policy_enforcement_manager:11.5.3</product>
<product>big-ip_policy_enforcement_manager:11.5.4</product>
<product>big-ip_policy_enforcement_manager:11.6.0</product>
<product>big-ip_policy_enforcement_manager:11.6.1</product>
<product>big-ip_policy_enforcement_manager:12.0.0</product>
<product>big-ip_wan_optimization_manager:11.2.0</product>
<product>big-ip_wan_optimization_manager:11.2.1</product>
<product>big-ip_wan_optimization_manager:11.3.0</product>
<product>big-ip_webaccelerator:11.2.0</product>
<product>big-ip_webaccelerator:11.2.1</product>
<product>big-ip_webaccelerator:11.3.0</product>
<product>big-iq_application_delivery_controller:4.5.0</product>
<product>big-iq_centralized_management:4.6.0</product>
<product>big-iq_cloud:4.0.0</product>
<product>big-iq_cloud:4.1.0</product>
<product>big-iq_cloud:4.2.0</product>
<product>big-iq_cloud:4.3.0</product>
<product>big-iq_cloud:4.4.0</product>
<product>big-iq_cloud:4.5.0</product>
<product>big-iq_cloud_and_orchestration:1.0.0</product>
<product>big-iq_device:4.2.0</product>
<product>big-iq_device:4.3.0</product>
<product>big-iq_device:4.4.0</product>
<product>big-iq_device:4.5.0</product>
<product>big-iq_security:4.0.0</product>
<product>big-iq_security:4.1.0</product>
<product>big-iq_security:4.2.0</product>
<product>big-iq_security:4.3.0</product>
<product>big-iq_security:4.4.0</product>
<product>big-iq_security:4.5.0</product>
<product>enterprise_manager:3.1.1</product>
<product>f5_iworkflow:2.0.0</product>
<product>big-ip_protocol_security_manager:11.2.0</product>
<product>big-ip_protocol_security_manager:11.2.1</product>
<product>big-ip_protocol_security_manager:11.3.0</product>
<product>big-ip_protocol_security_manager:11.4.0</product>
<product>big-ip_protocol_security_manager:11.4.1</product>
</cve>
<cve id="CVE-2016-8228" level="LOW">
<product>lenovo_service_bridge:-</product>
</cve>
<cve id="CVE-2016-5020" level="LOW">
<product>big-ip_access_policy_manager:10.2.1</product>
<product>big-ip_access_policy_manager:10.2.2</product>
<product>big-ip_access_policy_manager:10.2.3</product>
<product>big-ip_access_policy_manager:10.2.4</product>
<product>big-ip_access_policy_manager:11.2.1</product>
<product>big-ip_access_policy_manager:11.4.0</product>
<product>big-ip_access_policy_manager:11.4.1</product>
<product>big-ip_access_policy_manager:11.5.0</product>
<product>big-ip_access_policy_manager:11.5.1</product>
<product>big-ip_access_policy_manager:11.5.2</product>
<product>big-ip_access_policy_manager:11.5.3</product>
<product>big-ip_access_policy_manager:11.5.4</product>
<product>big-ip_access_policy_manager:11.6.0</product>
<product>big-ip_access_policy_manager:11.6.1</product>
<product>big-ip_access_policy_manager:12.0.0</product>
<product>big-ip_advanced_firewall_manager:11.4.0</product>
<product>big-ip_advanced_firewall_manager:11.4.1</product>
<product>big-ip_advanced_firewall_manager:11.5.0</product>
<product>big-ip_advanced_firewall_manager:11.5.1</product>
<product>big-ip_advanced_firewall_manager:11.5.2</product>
<product>big-ip_advanced_firewall_manager:11.5.3</product>
<product>big-ip_advanced_firewall_manager:11.5.4</product>
<product>big-ip_advanced_firewall_manager:11.6.0</product>
<product>big-ip_advanced_firewall_manager:11.6.1</product>
<product>big-ip_advanced_firewall_manager:12.0.0</product>
<product>big-ip_analytics:11.2.1</product>
<product>big-ip_analytics:11.4.0</product>
<product>big-ip_analytics:11.4.1</product>
<product>big-ip_analytics:11.5.0</product>
<product>big-ip_analytics:11.5.1</product>
<product>big-ip_analytics:11.5.2</product>
<product>big-ip_analytics:11.5.3</product>
<product>big-ip_analytics:11.5.4</product>
<product>big-ip_analytics:11.6.0</product>
<product>big-ip_analytics:11.6.1</product>
<product>big-ip_analytics:12.0.0</product>
<product>big-ip_application_acceleration_manager:11.4.0</product>
<product>big-ip_application_acceleration_manager:11.4.1</product>
<product>big-ip_application_acceleration_manager:11.5.0</product>
<product>big-ip_application_acceleration_manager:11.5.1</product>
<product>big-ip_application_acceleration_manager:11.5.2</product>
<product>big-ip_application_acceleration_manager:11.5.3</product>
<product>big-ip_application_acceleration_manager:11.5.4</product>
<product>big-ip_application_acceleration_manager:11.6.0</product>
<product>big-ip_application_acceleration_manager:11.6.1</product>
<product>big-ip_application_acceleration_manager:12.0.0</product>
<product>big-ip_application_acceleration_manager:12.1.0</product>
<product>big-ip_application_security_manager:10.2.1</product>
<product>big-ip_application_security_manager:10.2.2</product>
<product>big-ip_application_security_manager:10.2.3</product>
<product>big-ip_application_security_manager:10.2.4</product>
<product>big-ip_application_security_manager:11.2.1</product>
<product>big-ip_application_security_manager:11.4.0</product>
<product>big-ip_application_security_manager:11.4.1</product>
<product>big-ip_application_security_manager:11.5.0</product>
<product>big-ip_application_security_manager:11.5.1</product>
<product>big-ip_application_security_manager:11.5.2</product>
<product>big-ip_application_security_manager:11.5.3</product>
<product>big-ip_application_security_manager:11.5.4</product>
<product>big-ip_application_security_manager:11.6.0</product>
<product>big-ip_application_security_manager:11.6.1</product>
<product>big-ip_application_security_manager:12.0.0</product>
<product>big-ip_domain_name_system:12.0.0</product>
<product>big-ip_edge_gateway:10.2.1</product>
<product>big-ip_edge_gateway:10.2.2</product>
<product>big-ip_edge_gateway:10.2.3</product>
<product>big-ip_edge_gateway:10.2.4</product>
<product>big-ip_edge_gateway:11.2.1</product>
<product>big-ip_global_traffic_manager:10.2.1</product>
<product>big-ip_global_traffic_manager:10.2.2</product>
<product>big-ip_global_traffic_manager:10.2.3</product>
<product>big-ip_global_traffic_manager:10.2.4</product>
<product>big-ip_global_traffic_manager:11.2.1</product>
<product>big-ip_global_traffic_manager:11.4.0</product>
<product>big-ip_global_traffic_manager:11.4.1</product>
<product>big-ip_global_traffic_manager:11.5.0</product>
<product>big-ip_global_traffic_manager:11.5.1</product>
<product>big-ip_global_traffic_manager:11.5.2</product>
<product>big-ip_global_traffic_manager:11.5.3</product>
<product>big-ip_global_traffic_manager:11.5.4</product>
<product>big-ip_global_traffic_manager:11.6.0</product>
<product>big-ip_global_traffic_manager:11.6.1</product>
<product>big-ip_link_controller:10.2.1</product>
<product>big-ip_link_controller:10.2.2</product>
<product>big-ip_link_controller:10.2.3</product>
<product>big-ip_link_controller:10.2.4</product>
<product>big-ip_link_controller:11.2.1</product>
<product>big-ip_link_controller:11.4.0</product>
<product>big-ip_link_controller:11.4.1</product>
<product>big-ip_link_controller:11.5.0</product>
<product>big-ip_link_controller:11.5.1</product>
<product>big-ip_link_controller:11.5.2</product>
<product>big-ip_link_controller:11.5.3</product>
<product>big-ip_link_controller:11.5.4</product>
<product>big-ip_link_controller:11.6.0</product>
<product>big-ip_link_controller:11.6.1</product>
<product>big-ip_link_controller:12.0.0</product>
<product>big-ip_local_traffic_manager:10.2.1</product>
<product>big-ip_local_traffic_manager:10.2.2</product>
<product>big-ip_local_traffic_manager:10.2.3</product>
<product>big-ip_local_traffic_manager:10.2.4</product>
<product>big-ip_local_traffic_manager:11.2.1</product>
<product>big-ip_local_traffic_manager:11.4.0</product>
<product>big-ip_local_traffic_manager:11.4.1</product>
<product>big-ip_local_traffic_manager:11.5.0</product>
<product>big-ip_local_traffic_manager:11.5.1</product>
<product>big-ip_local_traffic_manager:11.5.2</product>
<product>big-ip_local_traffic_manager:11.5.3</product>
<product>big-ip_local_traffic_manager:11.5.4</product>
<product>big-ip_local_traffic_manager:11.6.0</product>
<product>big-ip_local_traffic_manager:11.6.1</product>
<product>big-ip_local_traffic_manager:12.0.0</product>
<product>big-ip_policy_enforcement_manager:11.4.0</product>
<product>big-ip_policy_enforcement_manager:11.4.1</product>
<product>big-ip_policy_enforcement_manager:11.5.0</product>
<product>big-ip_policy_enforcement_manager:11.5.1</product>
<product>big-ip_policy_enforcement_manager:11.5.2</product>
<product>big-ip_policy_enforcement_manager:11.5.3</product>
<product>big-ip_policy_enforcement_manager:11.5.4</product>
<product>big-ip_policy_enforcement_manager:11.6.0</product>
<product>big-ip_policy_enforcement_manager:11.6.1</product>
<product>big-ip_policy_enforcement_manager:12.0.0</product>
<product>big-ip_wan_optimization_manager:10.2.1</product>
<product>big-ip_wan_optimization_manager:10.2.2</product>
<product>big-ip_wan_optimization_manager:10.2.3</product>
<product>big-ip_wan_optimization_manager:10.2.4</product>
<product>big-ip_wan_optimization_manager:11.2.1</product>
<product>big-ip_webaccelerator:10.2.1</product>
<product>big-ip_webaccelerator:10.2.2</product>
<product>big-ip_webaccelerator:10.2.3</product>
<product>big-ip_webaccelerator:10.2.4</product>
<product>big-ip_webaccelerator:11.2.1</product>
<product>big-ip_protocol_security_manager:10.2.1</product>
<product>big-ip_protocol_security_manager:10.2.2</product>
<product>big-ip_protocol_security_manager:10.2.3</product>
<product>big-ip_protocol_security_manager:10.2.4</product>
<product>big-ip_protocol_security_manager:11.3.0</product>
<product>big-ip_protocol_security_manager:11.4.0</product>
<product>big-ip_protocol_security_manager:11.4.1</product>
</cve>
<cve id="CVE-2016-8226" level="LOW">
<product>flex_system_x240_m5_bios:-</product>
<product>flex_system_x280_m6_bios:-</product>
<product>flex_system_x480_x6_bios:-</product>
<product>flex_system_x880_x6_bios:-</product>
<product>nextscale_nx360_m5_bios:-</product>
<product>system_x3250_m6_bios:-</product>
<product>system_x3500_m5_bios:-</product>
<product>system_x3550_m5_bios:-</product>
<product>system_x3650_m5_bios:-</product>
<product>system_x3850_x6_bios:-</product>
<product>system_x3950_x6_bios:-</product>
</cve>
<cve id="CVE-2016-8227" level="LOW">
<product>transition:-</product>
</cve>
<cve id="CVE-2016-8224" level="LOW">
<product>bios:-</product>
<product>notebook_110_14ibr_bios:-</product>
<product>notebook_110_15ibr_bios:-</product>
<product>notebook_b70_80_bios:-</product>
<product>notebook_e31_80_bios:-</product>
<product>notebook_e40_80_bios:-</product>
<product>notebook_e41_80_bios:-</product>
<product>notebook_e51_80_bios:-</product>
<product>notebook_g40_80_bios:-</product>
<product>notebook_g50_80_bios:-</product>
<product>notebook_g50_80_touch_bios:-</product>
<product>notebook_ideapad_300_14ibr_bios:-</product>
<product>notebook_ideapad_300_14isk_bios:-</product>
<product>notebook_ideapad_300_15ibr_bios:-</product>
<product>notebook_ideapad_300_15isk_bios:-</product>
<product>notebook_ideapad_300_17isk_bios:-</product>
<product>notebook_ideapad_510s_12isk_bios:-</product>
<product>notebook_k21_80_bios:-</product>
<product>notebook_k41_80_bios:-</product>
<product>notebook_miix_710_12ikb_bios:-</product>
<product>notebook_xiaoxin_air_12_bios:-</product>
<product>notebook_yoga_510_14isk_bios:-</product>
<product>notebook_yoga_510_15isk_bios:-</product>
<product>notebook_yoga_710_11ikb_bios:-</product>
<product>notebook_yoga_710_11isk_bios:-</product>
<product>notebook_yoga_900_13isk_bios:-</product>
<product>notebook_yoga_900s_12isk_bios:-</product>
<product>thinkserver_ts150_bios:-</product>
<product>thinkserver_ts450_bios:-</product>
</cve>
<cve id="CVE-2016-8225" level="LOW">
<product>edge_keyboard_driver:1.20</product>
<product>slim_usb_keyboard_driver:1.20</product>
</cve>
<cve id="CVE-2016-8222" level="MEDIUM">
<product>thinkpad_10_ella_2_bios:-</product>
<product>thinkpad_11e_beema_bios:-</product>
<product>thinkpad_11e_braswell_bios:-</product>
<product>thinkpad_11e_broadwell_bios:-</product>
<product>thinkpad_11e_skylake_bios:-</product>
<product>thinkpad_13e_bios:-</product>
<product>thinkpad_e450_bios:-</product>
<product>thinkpad_e450c_bios:-</product>
<product>thinkpad_e455_bios:-</product>
<product>thinkpad_e460_bios:-</product>
<product>thinkpad_e465_bios:-</product>
<product>thinkpad_e550_bios:-</product>
<product>thinkpad_e550c_bios:-</product>
<product>thinkpad_e555_bios:-</product>
<product>thinkpad_e560_bios:-</product>
<product>thinkpad_e565_bios:-</product>
<product>thinkpad_edge_e440_bios:-</product>
<product>thinkpad_edge_e445_bios:-</product>
<product>thinkpad_edge_e540_bios:-</product>
<product>thinkpad_edge_e545_bios:-</product>
<product>thinkpad_helix_20cg_bios:-</product>
<product>thinkpad_helix_20ch_bios:-</product>
<product>thinkpad_l440_bios:-</product>
<product>thinkpad_l450_bios:-</product>
<product>thinkpad_l460_bios:-</product>
<product>thinkpad_l540_bios:-</product>
<product>thinkpad_l560_bios:-</product>
<product>thinkpad_p50_bios:-</product>
<product>thinkpad_p50s_bios:-</product>
<product>thinkpad_p70_bios:-</product>
<product>thinkpad_s1_yoga_12_bios:-</product>
<product>thinkpad_s1_yoga_non_vpro_bios:-</product>
<product>thinkpad_s1_yoga_vpro_bios:-</product>
<product>thinkpad_s3_s440_bios:-</product>
<product>thinkpad_s3_yoga_14_bios:-</product>
<product>thinkpad_s540_bios:-</product>
<product>thinkpad_s5_e560p_bios:-</product>
<product>thinkpad_s5_yoga_15_bios:-</product>
<product>thinkpad_t440_bios:-</product>
<product>thinkpad_t440p_bios:-</product>
<product>thinkpad_t440s_bios:-</product>
<product>thinkpad_t440u_bios:-</product>
<product>thinkpad_t450_bios:-</product>
<product>thinkpad_t450s_bios:-</product>
<product>thinkpad_t460_bios:-</product>
<product>thinkpad_t460p_bios:-</product>
<product>thinkpad_t460s_bios:-</product>
<product>thinkpad_t540_bios:-</product>
<product>thinkpad_t540p_bios:-</product>
<product>thinkpad_t550_bios:-</product>
<product>thinkpad_t560_bios:-</product>
<product>thinkpad_tablet_10_bios:-</product>
<product>thinkpad_tablet_8_bios:-</product>
<product>thinkpad_w540_bios:-</product>
<product>thinkpad_w541_bios:-</product>
<product>thinkpad_w550s_bios:-</product>
<product>thinkpad_x140e_amd_bios:-</product>
<product>thinkpad_x1_carbon_20ax_bios:-</product>
<product>thinkpad_x1_carbon_20bx_bios:-</product>
<product>thinkpad_x1_carbon_bios:-</product>
<product>thinkpad_x1_tablet_bios:-</product>
<product>thinkpad_x1_yoga_bios:-</product>
<product>thinkpad_x240_bios:-</product>
<product>thinkpad_x240s_bios:-</product>
<product>thinkpad_x250_broadwell_bios:-</product>
<product>thinkpad_x250_sharkbay_bios:-</product>
<product>thinkpad_x260_bios:-</product>
<product>thinkpad_yoga_11e_beema_bios:-</product>
<product>thinkpad_yoga_11e_bios:-</product>
<product>thinkpad_yoga_11e_braswell_bios:-</product>
<product>thinkpad_yoga_11e_broadwell_bios:-</product>
<product>thinkpad_yoga_11e_skylake_bios:-</product>
<product>thinkpad_yoga_14_460_s3_bios:-</product>
<product>thinkpad_yoga_260_s1_bios:-</product>
</cve>
<cve id="CVE-2016-8223" level="LOW">
<product>system_interface_foundation:1.0.66.0</product>
</cve>
<cve id="CVE-2016-5029" level="MEDIUM">
<product>libdwarf:20160613</product>
</cve>
<cve id="CVE-2016-5028" level="MEDIUM">
<product>libdwarf:20160613</product>
</cve>
<cve id="CVE-2016-0039" level="MEDIUM">
<product>sharepoint_foundation:2013</product>
</cve>
<cve id="CVE-2016-0032" level="MEDIUM">
<product>exchange_server:2013</product>
<product>exchange_server:2013</product>
<product>exchange_server:2013</product>
<product>exchange_server:2016</product>
</cve>
<cve id="CVE-2016-0031" level="MEDIUM">
<product>exchange_server:2016</product>
</cve>
<cve id="CVE-2016-0030" level="MEDIUM">
<product>exchange_server:2013</product>
<product>exchange_server:2013</product>
<product>exchange_server:2016</product>
</cve>
<cve id="CVE-2016-0034" level="MEDIUM">
<product>silverlight:5.0</product>
</cve>
<cve id="CVE-2016-9287" level="LOW">
<product>exponent_cms:2.4.0</product>
</cve>
<cve id="CVE-2016-9286" level="LOW">
<product>exponent_cms:2.4.0</product>
</cve>
<cve id="CVE-2016-9285" level="LOW">
<product>exponent_cms:2.4.0</product>
</cve>
<cve id="CVE-2016-9284" level="LOW">
<product>exponent_cms:2.4.0</product>
</cve>
<cve id="CVE-2016-9283" level="LOW">
<product>exponent_cms:2.4.0</product>
</cve>
<cve id="CVE-2016-9282" level="LOW">
<product>exponent_cms:2.4.0</product>
</cve>
<cve id="CVE-2016-9288" level="LOW">
<product>exponent_cms:2.4.0</product>
</cve>
<cve id="CVE-2016-10006" level="MEDIUM">
<product>antisamy:1.5.4</product>
</cve>
<cve id="CVE-2016-10007" level="LOW">
<product>dotcms:1.9</product>
<product>dotcms:1.9.2.1</product>
<product>dotcms:1.9.5.1</product>
<product>dotcms:2.0</product>
<product>dotcms:2.0.1</product>
<product>dotcms:2.1</product>
<product>dotcms:2.1.1</product>
<product>dotcms:2.2</product>
<product>dotcms:2.2.1</product>
<product>dotcms:2.3</product>
<product>dotcms:2.3.1</product>
<product>dotcms:2.3.2</product>
<product>dotcms:2.5</product>
<product>dotcms:2.5.1</product>
<product>dotcms:2.5.2</product>
<product>dotcms:2.5.3</product>
<product>dotcms:2.5.4</product>
<product>dotcms:3.0</product>
<product>dotcms:3.0.1</product>
<product>dotcms:3.1</product>
<product>dotcms:3.2</product>
<product>dotcms:3.2.1</product>
<product>dotcms:3.2.2</product>
<product>dotcms:3.2.3</product>
<product>dotcms:3.2.4</product>
<product>dotcms:3.3</product>
<product>dotcms:3.3.1</product>
<product>dotcms:3.3.2</product>
<product>dotcms:3.5</product>
<product>dotcms:3.5.1</product>
<product>dotcms:3.6.0</product>
<product>dotcms:3.6.1</product>
<product>dotcms:3.6.2</product>
<product>dotcms:3.7.0</product>
<product>dotcms:3.7.1</product>
<product>dotcms:4.0.0</product>
<product>dotcms:4.0.1</product>
<product>dotcms:4.1.0</product>
</cve>
<cve id="CVE-2016-10005" level="LOW">
<product>solution_manager:7.1</product>
<product>solution_manager:7.1</product>
<product>solution_manager:7.1</product>
<product>solution_manager:7.1</product>
<product>solution_manager:7.1</product>
<product>solution_manager:7.2</product>
<product>solution_manager:7.2</product>
<product>solution_manager:7.2</product>
<product>solution_manager:7.31</product>
</cve>
<cve id="CVE-2016-10003" level="LOW">
<product>squid:3.5.0.1</product>
<product>squid:3.5.0.2</product>
<product>squid:3.5.0.3</product>
<product>squid:3.5.0.4</product>
<product>squid:3.5.1</product>
<product>squid:3.5.2</product>
<product>squid:3.5.3</product>
<product>squid:3.5.4</product>
<product>squid:3.5.5</product>
<product>squid:3.5.6</product>
<product>squid:3.5.7</product>
<product>squid:3.5.8</product>
<product>squid:3.5.9</product>
<product>squid:3.5.10</product>
<product>squid:3.5.11</product>
<product>squid:3.5.12</product>
<product>squid:3.5.13</product>
<product>squid:3.5.14</product>
<product>squid:3.5.15</product>
<product>squid:3.5.16</product>
<product>squid:3.5.17</product>
<product>squid:3.5.18</product>
<product>squid:3.5.19</product>
<product>squid:3.5.20</product>
<product>squid:3.5.21</product>
<product>squid:3.5.22</product>
<product>squid:4.0.1</product>
<product>squid:4.0.2</product>
<product>squid:4.0.3</product>
<product>squid:4.0.4</product>
<product>squid:4.0.5</product>
<product>squid:4.0.6</product>
<product>squid:4.0.7</product>
<product>squid:4.0.8</product>
<product>squid:4.0.9</product>
<product>squid:4.0.10</product>
<product>squid:4.0.11</product>
<product>squid:4.0.12</product>
<product>squid:4.0.13</product>
<product>squid:4.0.14</product>
<product>squid:4.0.15</product>
<product>squid:4.0.16</product>
</cve>
<cve id="CVE-2016-10550" level="LOW">
<product>sequelize:3.16.0</product>
</cve>
<cve id="CVE-2016-10551" level="LOW">
<product>waterline-sequel:0.5.0</product>
</cve>
<cve id="CVE-2016-10552" level="MEDIUM">
<product>igniteui:0.0.5</product>
</cve>
<cve id="CVE-2016-10553" level="LOW">
<product>sequelize:2.1.3</product>
</cve>
<cve id="CVE-2016-10554" level="LOW">
<product>sequelize:1.6.0</product>
<product>sequelize:1.7.0</product>
<product>sequelize:1.7.0</product>
</cve>
<cve id="CVE-2016-10555" level="LOW">
<product>jwt-simple:0.3.0</product>
</cve>
<cve id="CVE-2016-10556" level="LOW">
<product>sequelize:3.19.3</product>
</cve>
<cve id="CVE-2016-10009" level="LOW">
<product>openssh:7.3</product>
</cve>
<cve id="CVE-2016-4488" level="MEDIUM">
<product>libiberty</product>
</cve>
<cve id="CVE-2016-4489" level="MEDIUM">
<product>libiberty</product>
</cve>
<cve id="CVE-2016-4487" level="MEDIUM">
<product>libiberty</product>
</cve>
<cve id="CVE-2016-4484" level="LOW">
<product>cryptsetup:2.1.7.3-2</product>
</cve>
<cve id="CVE-2016-4480" level="LOW">
<product>vm_server:3.2</product>
<product>vm_server:3.3</product>
<product>vm_server:3.4</product>
<product>xen:4.6.1</product>
</cve>
<cve id="CVE-2016-2556" level="LOW">
<product>r340:431.61</product>
<product>r352:353.82</product>
</cve>
<cve id="CVE-2016-2557" level="LOW">
<product>r340:431.61</product>
<product>r352:353.82</product>
</cve>
<cve id="CVE-2016-2555" level="LOW">
<product>atutor:2.2.1</product>
</cve>
<cve id="CVE-2016-2880" level="LOW">
<product>qradar_security_information_and_event_manager:7.2.0</product>
<product>qradar_security_information_and_event_manager:7.2.1</product>
<product>qradar_security_information_and_event_manager:7.2.2</product>
<product>qradar_security_information_and_event_manager:7.2.3</product>
<product>qradar_security_information_and_event_manager:7.2.4</product>
<product>qradar_security_information_and_event_manager:7.2.5</product>
<product>qradar_security_information_and_event_manager:7.2.6</product>
<product>qradar_security_information_and_event_manager:7.2.7</product>
</cve>
<cve id="CVE-2016-2881" level="LOW">
<product>qradar_security_information_and_event_manager:7.1.0</product>
<product>qradar_security_information_and_event_manager:7.2.0</product>
<product>qradar_security_information_and_event_manager:7.2.1</product>
<product>qradar_security_information_and_event_manager:7.2.2</product>
<product>qradar_security_information_and_event_manager:7.2.3</product>
<product>qradar_security_information_and_event_manager:7.2.4</product>
<product>qradar_security_information_and_event_manager:7.2.5</product>
<product>qradar_security_information_and_event_manager:7.2.6</product>
</cve>
<cve id="CVE-2016-2882" level="LOW">
<product>tririga_application_platform:3.3.0.0</product>
<product>tririga_application_platform:3.3.0.1</product>
<product>tririga_application_platform:3.3.0.2</product>
<product>tririga_application_platform:3.3.1.0</product>
<product>tririga_application_platform:3.3.1.1</product>
<product>tririga_application_platform:3.3.1.2</product>
<product>tririga_application_platform:3.3.1.3</product>
<product>tririga_application_platform:3.3.2.0</product>
<product>tririga_application_platform:3.3.2.1</product>
<product>tririga_application_platform:3.3.2.3</product>
<product>tririga_application_platform:3.3.2.4</product>
<product>tririga_application_platform:3.3.2.5</product>
<product>tririga_application_platform:3.4.0.0</product>
<product>tririga_application_platform:3.4.1.1</product>
<product>tririga_application_platform:3.4.1.2</product>
<product>tririga_application_platform:3.4.1.3</product>
<product>tririga_application_platform:3.4.2.0</product>
<product>tririga_application_platform:3.4.2.1</product>
<product>tririga_application_platform:3.4.2.2</product>
<product>tririga_application_platform:3.4.2.3</product>
<product>tririga_application_platform:3.5.0.0</product>
<product>tririga_application_platform:3.5.0.1</product>
</cve>
<cve id="CVE-2016-2883" level="MEDIUM">
<product>tririga_application_platform:3.3.0.0</product>
<product>tririga_application_platform:3.3.0.1</product>
<product>tririga_application_platform:3.3.0.2</product>
<product>tririga_application_platform:3.3.1.0</product>
<product>tririga_application_platform:3.3.1.1</product>
<product>tririga_application_platform:3.3.1.2</product>
<product>tririga_application_platform:3.3.1.3</product>
<product>tririga_application_platform:3.3.2.0</product>
<product>tririga_application_platform:3.3.2.1</product>
<product>tririga_application_platform:3.3.2.3</product>
<product>tririga_application_platform:3.3.2.4</product>
<product>tririga_application_platform:3.3.2.5</product>
<product>tririga_application_platform:3.4.0.0</product>
<product>tririga_application_platform:3.4.1.1</product>
<product>tririga_application_platform:3.4.1.2</product>
<product>tririga_application_platform:3.4.1.3</product>
<product>tririga_application_platform:3.4.2.0</product>
<product>tririga_application_platform:3.4.2.1</product>
<product>tririga_application_platform:3.4.2.2</product>
<product>tririga_application_platform:3.4.2.3</product>
<product>tririga_application_platform:3.5.0.0</product>
<product>tririga_application_platform:3.5.0.1</product>
</cve>
<cve id="CVE-2016-2888" level="MEDIUM">
<product>jazz_reporting_service:5.0</product>
<product>jazz_reporting_service:5.0.1</product>
<product>jazz_reporting_service:5.0.2</product>
<product>jazz_reporting_service:6.0</product>
<product>jazz_reporting_service:6.0.1</product>
</cve>
<cve id="CVE-2016-2889" level="MEDIUM">
<product>jazz_reporting_service:5.0</product>
<product>jazz_reporting_service:5.0.1</product>
<product>jazz_reporting_service:5.0.2</product>
<product>jazz_reporting_service:6.0</product>
<product>jazz_reporting_service:6.0.1</product>
<product>jazz_reporting_service:6.0.2</product>
</cve>
<cve id="CVE-2016-2558" level="LOW">
<product>r340:431.61</product>
<product>r352:353.82</product>
</cve>
<cve id="CVE-2016-2559" level="MEDIUM">
<product>phpmyadmin:4.5.0</product>
<product>phpmyadmin:4.5.0</product>
<product>phpmyadmin:4.5.0</product>
<product>phpmyadmin:4.5.0</product>
<product>phpmyadmin:4.5.0.1</product>
<product>phpmyadmin:4.5.0.2</product>
<product>phpmyadmin:4.5.1</product>
<product>phpmyadmin:4.5.2</product>
<product>phpmyadmin:4.5.3</product>
<product>phpmyadmin:4.5.3.1</product>
<product>phpmyadmin:4.5.4</product>
<product>phpmyadmin:4.5.4.1</product>
<product>phpmyadmin:4.5.5</product>
</cve>
<cve id="CVE-2016-1000156" level="LOW">
<product>mailcwp:1.100</product>
</cve>
<cve id="CVE-2016-2088" level="MEDIUM">
<product>bind:9.10.0</product>
<product>bind:9.10.0</product>
<product>bind:9.10.0</product>
<product>bind:9.10.0</product>
<product>bind:9.10.0</product>
<product>bind:9.10.0</product>
<product>bind:9.10.0</product>
<product>bind:9.10.0</product>
<product>bind:9.10.0</product>
<product>bind:9.10.1</product>
<product>bind:9.10.1</product>
<product>bind:9.10.1</product>
<product>bind:9.10.1</product>
<product>bind:9.10.1</product>
<product>bind:9.10.1</product>
<product>bind:9.10.1</product>
<product>bind:9.10.2</product>
<product>bind:9.10.2</product>
<product>bind:9.10.2</product>
<product>bind:9.10.2</product>
<product>bind:9.10.2</product>
<product>bind:9.10.2</product>
<product>bind:9.10.2</product>
<product>bind:9.10.3</product>
<product>bind:9.10.3</product>
<product>bind:9.10.3</product>
<product>bind:9.10.3</product>
<product>bind:9.10.3</product>
<product>bind:9.10.3</product>
</cve>
<cve id="CVE-2016-2089" level="MEDIUM">
<product>jasper:1.900.1</product>
</cve>
<cve id="CVE-2016-2084" level="HIGH">
<product>big-ip_access_policy_manager:11.3.0</product>
<product>big-ip_access_policy_manager:11.4.0</product>
<product>big-ip_access_policy_manager:11.4.1</product>
<product>big-ip_access_policy_manager:11.5.0</product>
<product>big-ip_access_policy_manager:11.5.1</product>
<product>big-ip_access_policy_manager:11.5.2</product>
<product>big-ip_access_policy_manager:11.5.3</product>
<product>big-ip_access_policy_manager:11.5.4</product>
<product>big-ip_access_policy_manager:11.6.0</product>
<product>big-ip_access_policy_manager:12.0.0</product>
<product>big-ip_advanced_firewall_manager:11.3.0</product>
<product>big-ip_advanced_firewall_manager:11.4.0</product>
<product>big-ip_advanced_firewall_manager:11.4.1</product>
<product>big-ip_advanced_firewall_manager:11.5.0</product>
<product>big-ip_advanced_firewall_manager:11.5.1</product>
<product>big-ip_advanced_firewall_manager:11.5.2</product>
<product>big-ip_advanced_firewall_manager:11.5.3</product>
<product>big-ip_advanced_firewall_manager:11.5.4</product>
<product>big-ip_advanced_firewall_manager:11.6.0</product>
<product>big-ip_advanced_firewall_manager:12.0.0</product>
<product>big-ip_analytics:11.3.0</product>
<product>big-ip_analytics:11.4.0</product>
<product>big-ip_analytics:11.4.1</product>
<product>big-ip_analytics:11.5.0</product>
<product>big-ip_analytics:11.5.1</product>
<product>big-ip_analytics:11.5.2</product>
<product>big-ip_analytics:11.5.3</product>
<product>big-ip_analytics:11.5.4</product>
<product>big-ip_analytics:11.6.0</product>
<product>big-ip_analytics:12.0.0</product>
<product>big-ip_application_acceleration_manager:11.4.1</product>
<product>big-ip_application_acceleration_manager:11.5.0</product>
<product>big-ip_application_acceleration_manager:11.5.1</product>
<product>big-ip_application_acceleration_manager:11.5.2</product>
<product>big-ip_application_acceleration_manager:11.5.3</product>
<product>big-ip_application_acceleration_manager:11.5.4</product>
<product>big-ip_application_acceleration_manager:11.6.0</product>
<product>big-ip_application_acceleration_manager:12.0.0</product>
<product>big-ip_application_security_manager:11.3.0</product>
<product>big-ip_application_security_manager:11.4.0</product>
<product>big-ip_application_security_manager:11.4.1</product>
<product>big-ip_application_security_manager:11.5.0</product>
<product>big-ip_application_security_manager:11.5.1</product>
<product>big-ip_application_security_manager:11.5.2</product>
<product>big-ip_application_security_manager:11.5.3</product>
<product>big-ip_application_security_manager:11.5.4</product>
<product>big-ip_application_security_manager:11.6.0</product>
<product>big-ip_application_security_manager:12.0.0</product>
<product>big-ip_domain_name_system:12.0.0</product>
<product>big-ip_edge_gateway:11.3.0</product>
<product>big-ip_global_traffic_manager:11.3.0</product>
<product>big-ip_global_traffic_manager:11.4.0</product>
<product>big-ip_global_traffic_manager:11.4.1</product>
<product>big-ip_global_traffic_manager:11.5.0</product>
<product>big-ip_global_traffic_manager:11.5.1</product>
<product>big-ip_global_traffic_manager:11.5.2</product>
<product>big-ip_global_traffic_manager:11.5.3</product>
<product>big-ip_global_traffic_manager:11.5.4</product>
<product>big-ip_global_traffic_manager:11.6.0</product>
<product>big-ip_link_controller:11.3.0</product>
<product>big-ip_link_controller:11.4.0</product>
<product>big-ip_link_controller:11.4.1</product>
<product>big-ip_link_controller:11.5.0</product>
<product>big-ip_link_controller:11.5.1</product>
<product>big-ip_link_controller:11.5.2</product>
<product>big-ip_link_controller:11.5.3</product>
<product>big-ip_link_controller:11.5.4</product>
<product>big-ip_link_controller:11.6.0</product>
<product>big-ip_link_controller:12.0.0</product>
<product>big-ip_local_traffic_manager:11.3.0</product>
<product>big-ip_local_traffic_manager:11.4.0</product>
<product>big-ip_local_traffic_manager:11.4.1</product>
<product>big-ip_local_traffic_manager:11.5.0</product>
<product>big-ip_local_traffic_manager:11.5.1</product>
<product>big-ip_local_traffic_manager:11.5.2</product>
<product>big-ip_local_traffic_manager:11.5.3</product>
<product>big-ip_local_traffic_manager:11.5.4</product>
<product>big-ip_local_traffic_manager:11.6.0</product>
<product>big-ip_local_traffic_manager:12.0.0</product>
<product>big-ip_policy_enforcement_manager:11.3.0</product>
<product>big-ip_policy_enforcement_manager:11.4.0</product>
<product>big-ip_policy_enforcement_manager:11.4.1</product>
<product>big-ip_policy_enforcement_manager:11.5.0</product>
<product>big-ip_policy_enforcement_manager:11.5.1</product>
<product>big-ip_policy_enforcement_manager:11.5.2</product>
<product>big-ip_policy_enforcement_manager:11.5.3</product>
<product>big-ip_policy_enforcement_manager:11.5.4</product>
<product>big-ip_policy_enforcement_manager:11.6.0</product>
<product>big-ip_policy_enforcement_manager:12.0.0</product>
<product>big-ip_protocol_security_module:11.3.0</product>
<product>big-ip_protocol_security_module:11.4.0</product>
<product>big-ip_wan_optimization_manager:11.3.0</product>
<product>big-ip_webaccelerator:11.3.0</product>
<product>big-iq_application_delivery_controller:4.5.0</product>
<product>big-iq_cloud:4.2.0</product>
<product>big-iq_cloud:4.3.0</product>
<product>big-iq_cloud:4.4.0</product>
<product>big-iq_cloud:4.5.0</product>
<product>big-iq_device:4.2.0</product>
<product>big-iq_device:4.3.0</product>
<product>big-iq_device:4.4.0</product>
<product>big-iq_device:4.5.0</product>
<product>big-iq_security:4.2.0</product>
<product>big-iq_security:4.3.0</product>
<product>big-iq_security:4.4.0</product>
<product>big-iq_security:4.5.0</product>
</cve>
<cve id="CVE-2016-2086" level="LOW">
<product>node.js:0.10.0</product>
<product>node.js:0.10.1</product>
<product>node.js:0.10.2</product>
<product>node.js:0.10.3</product>
<product>node.js:0.10.4</product>
<product>node.js:0.10.5</product>
<product>node.js:0.10.6</product>
<product>node.js:0.10.7</product>
<product>node.js:0.10.8</product>
<product>node.js:0.10.9</product>
<product>node.js:0.10.10</product>
<product>node.js:0.10.11</product>
<product>node.js:0.10.12</product>
<product>node.js:0.10.13</product>
<product>node.js:0.10.14</product>
<product>node.js:0.10.15</product>
<product>node.js:0.10.16</product>
<product>node.js:0.10.16-isaacs-manual</product>
<product>node.js:0.10.17</product>
<product>node.js:0.10.18</product>
<product>node.js:0.10.19</product>
<product>node.js:0.10.20</product>
<product>node.js:0.10.21</product>
<product>node.js:0.10.22</product>
<product>node.js:0.10.23</product>
<product>node.js:0.10.24</product>
<product>node.js:0.10.25</product>
<product>node.js:0.10.26</product>
<product>node.js:0.10.27</product>
<product>node.js:0.10.28</product>
<product>node.js:0.10.29</product>
<product>node.js:0.10.30</product>
<product>node.js:0.10.31</product>
<product>node.js:0.10.32</product>
<product>node.js:0.10.33</product>
<product>node.js:0.10.34</product>
<product>node.js:0.10.35</product>
<product>node.js:0.10.36</product>
<product>node.js:0.10.37</product>
<product>node.js:0.10.38</product>
<product>node.js:0.10.39</product>
<product>node.js:0.10.40</product>
<product>node.js:0.10.41</product>
<product>node.js:0.12.0</product>
<product>node.js:0.12.1</product>
<product>node.js:0.12.2</product>
<product>node.js:0.12.3</product>
<product>node.js:0.12.4</product>
<product>node.js:0.12.5</product>
<product>node.js:0.12.6</product>
<product>node.js:0.12.7</product>
<product>node.js:0.12.8</product>
<product>node.js:0.12.9</product>
<product>node.js:4.0.0</product>
<product>node.js:4.1.0</product>
<product>node.js:4.1.1</product>
<product>node.js:4.1.2</product>
<product>node.js:4.2.0</product>
<product>node.js:4.2.1</product>
<product>node.js:4.2.2</product>
<product>node.js:4.2.3</product>
<product>node.js:4.2.4</product>
<product>node.js:4.2.5</product>
<product>node.js:4.2.6</product>
<product>node.js:5.0.0</product>
<product>node.js:5.1.0</product>
<product>node.js:5.1.1</product>
<product>node.js:5.2.0</product>
<product>node.js:5.3.0</product>
<product>node.js:5.4.0</product>
<product>node.js:5.4.1</product>
<product>node.js:5.5.0</product>
<product>fedora:22</product>
<product>fedora:23</product>
</cve>
<cve id="CVE-2016-2087" level="MEDIUM">
<product>hexchat:2.11.0</product>
</cve>
<cve id="CVE-2016-2081" level="MEDIUM">
<product>vrealize_log_insight:2.0</product>
<product>vrealize_log_insight:2.0.5</product>
<product>vrealize_log_insight:2.5</product>
<product>vrealize_log_insight:2.5.1</product>
<product>vrealize_log_insight:3.0</product>
<product>vrealize_log_insight:3.0.1</product>
<product>vrealize_log_insight:3.3</product>
<product>vrealize_log_insight:3.3.1</product>
</cve>
<cve id="CVE-2016-2082" level="MEDIUM">
<product>vrealize_log_insight:2.0</product>
<product>vrealize_log_insight:2.0.5</product>
<product>vrealize_log_insight:2.5</product>
<product>vrealize_log_insight:2.5.1</product>
<product>vrealize_log_insight:3.0</product>
<product>vrealize_log_insight:3.0.1</product>
<product>vrealize_log_insight:3.3</product>
<product>vrealize_log_insight:3.3.1</product>
</cve>
<cve id="CVE-2016-2774" level="MEDIUM">
<product>dhcp:4.1-esv</product>
<product>dhcp:4.1-esv</product>
<product>dhcp:4.1-esv</product>
<product>dhcp:4.1-esv</product>
<product>dhcp:4.1-esv</product>
<product>dhcp:4.1-esv</product>
<product>dhcp:4.1-esv</product>
<product>dhcp:4.1-esv</product>
<product>dhcp:4.1-esv</product>
<product>dhcp:4.1-esv</product>
<product>dhcp:4.1-esv</product>
<product>dhcp:4.1-esv</product>
<product>dhcp:4.1-esv</product>
<product>dhcp:4.1-esv</product>
<product>dhcp:4.1-esv</product>
<product>dhcp:4.1-esv</product>
<product>dhcp:4.1-esv</product>
<product>dhcp:4.1-esv</product>
<product>dhcp:4.1-esv</product>
<product>dhcp:4.1-esv</product>
<product>dhcp:4.1-esv</product>
<product>dhcp:4.1-esv</product>
<product>dhcp:4.1-esv</product>
<product>dhcp:4.1-esv</product>
<product>dhcp:4.1-esv</product>
<product>dhcp:4.1-esv</product>
<product>dhcp:4.1.0</product>
<product>dhcp:4.1.0</product>
<product>dhcp:4.1.0</product>
<product>dhcp:4.1.0</product>
<product>dhcp:4.1.1</product>
<product>dhcp:4.1.1</product>
<product>dhcp:4.1.1</product>
<product>dhcp:4.1.1</product>
<product>dhcp:4.1.1</product>
<product>dhcp:4.1.1</product>
<product>dhcp:4.1.2</product>
<product>dhcp:4.1.2</product>
<product>dhcp:4.1.2</product>
<product>dhcp:4.1.2</product>
<product>dhcp:4.2.0</product>
<product>dhcp:4.2.0</product>
<product>dhcp:4.2.0</product>
<product>dhcp:4.2.0</product>
<product>dhcp:4.2.0</product>
<product>dhcp:4.2.0</product>
<product>dhcp:4.2.0</product>
<product>dhcp:4.2.0</product>
<product>dhcp:4.2.1</product>
<product>dhcp:4.2.1</product>
<product>dhcp:4.2.1</product>
<product>dhcp:4.2.1</product>
<product>dhcp:4.2.2</product>
<product>dhcp:4.2.2</product>
<product>dhcp:4.2.2</product>
<product>dhcp:4.2.3</product>
<product>dhcp:4.2.3</product>
<product>dhcp:4.2.3</product>
<product>dhcp:4.2.4</product>
<product>dhcp:4.2.4</product>
<product>dhcp:4.2.4</product>
<product>dhcp:4.2.4</product>
<product>dhcp:4.2.4</product>
<product>dhcp:4.2.4</product>
<product>dhcp:4.2.5</product>
<product>dhcp:4.2.5</product>
<product>dhcp:4.2.5</product>
<product>dhcp:4.2.5</product>
<product>dhcp:4.2.6</product>
<product>dhcp:4.2.6</product>
<product>dhcp:4.2.6</product>
<product>dhcp:4.2.7</product>
<product>dhcp:4.2.7</product>
<product>dhcp:4.2.7</product>
<product>dhcp:4.2.8</product>
<product>dhcp:4.2.8</product>
<product>dhcp:4.2.8</product>
<product>dhcp:4.2.8</product>
<product>dhcp:4.3.0</product>
<product>dhcp:4.3.0</product>
<product>dhcp:4.3.0</product>
<product>dhcp:4.3.0</product>
<product>dhcp:4.3.1</product>
<product>dhcp:4.3.1</product>
<product>dhcp:4.3.1</product>
<product>dhcp:4.3.2</product>
<product>dhcp:4.3.2</product>
<product>dhcp:4.3.2</product>
<product>dhcp:4.3.2</product>
<product>dhcp:4.3.3</product>
<product>dhcp:4.3.3</product>
</cve>
<cve id="CVE-2016-2775" level="MEDIUM">
<product>bind:9.2</product>
<product>bind:9.2.0</product>
<product>bind:9.2.0</product>
<product>bind:9.2.0</product>
<product>bind:9.2.0</product>
<product>bind:9.2.0</product>
<product>bind:9.2.0</product>
<product>bind:9.2.0</product>
<product>bind:9.2.0</product>
<product>bind:9.2.0</product>
<product>bind:9.2.0</product>
<product>bind:9.2.0</product>
<product>bind:9.2.0</product>
<product>bind:9.2.0</product>
<product>bind:9.2.0</product>
<product>bind:9.2.0</product>
<product>bind:9.2.0</product>
<product>bind:9.2.1</product>
<product>bind:9.2.1</product>
<product>bind:9.2.1</product>
<product>bind:9.2.2</product>
<product>bind:9.2.2</product>
<product>bind:9.2.2</product>
<product>bind:9.2.2</product>
<product>bind:9.2.3</product>
<product>bind:9.2.3</product>
<product>bind:9.2.3</product>
<product>bind:9.2.3</product>
<product>bind:9.2.3</product>
<product>bind:9.2.4</product>
<product>bind:9.2.4</product>
<product>bind:9.2.4</product>
<product>bind:9.2.4</product>
<product>bind:9.2.4</product>
<product>bind:9.2.4</product>
<product>bind:9.2.4</product>
<product>bind:9.2.4</product>
<product>bind:9.2.5</product>
<product>bind:9.2.5</product>
<product>bind:9.2.5</product>
<product>bind:9.2.6</product>
<product>bind:9.2.6</product>
<product>bind:9.2.7</product>
<product>bind:9.2.7</product>
<product>bind:9.2.7</product>
<product>bind:9.2.7</product>
<product>bind:9.2.8</product>
<product>bind:9.2.9</product>
<product>bind:9.2.9</product>
<product>bind:9.3</product>
<product>bind:9.3.0</product>
<product>bind:9.3.0</product>
<product>bind:9.3.0</product>
<product>bind:9.3.0</product>
<product>bind:9.3.0</product>
<product>bind:9.3.0</product>
<product>bind:9.3.0</product>
<product>bind:9.3.0</product>
<product>bind:9.3.1</product>
<product>bind:9.3.1</product>
<product>bind:9.3.1</product>
<product>bind:9.3.2</product>
<product>bind:9.3.2</product>
<product>bind:9.3.3</product>
<product>bind:9.3.3</product>
<product>bind:9.3.3</product>
<product>bind:9.3.3</product>
<product>bind:9.3.4</product>
<product>bind:9.3.5</product>
<product>bind:9.3.5</product>
<product>bind:9.3.5</product>
<product>bind:9.3.5</product>
<product>bind:9.3.6</product>
<product>bind:9.3.6</product>
<product>bind:9.4</product>
<product>bind:9.4</product>
<product>bind:9.4</product>
<product>bind:9.4</product>
<product>bind:9.4</product>
<product>bind:9.4</product>
<product>bind:9.4</product>
<product>bind:9.4</product>
<product>bind:9.4</product>
<product>bind:9.4</product>
<product>bind:9.4</product>
<product>bind:9.4</product>
<product>bind:9.4.0</product>
<product>bind:9.4.0</product>
<product>bind:9.4.0</product>
<product>bind:9.4.0</product>
<product>bind:9.4.0</product>
<product>bind:9.4.0</product>
<product>bind:9.4.0</product>
<product>bind:9.4.0</product>
<product>bind:9.4.0</product>
<product>bind:9.4.0</product>
<product>bind:9.4.0</product>
<product>bind:9.4.0</product>
<product>bind:9.4.0</product>
<product>bind:9.4.1</product>
<product>bind:9.4.2</product>
<product>bind:9.4.2</product>
<product>bind:9.4.2</product>
<product>bind:9.4.2</product>
<product>bind:9.4.3</product>
<product>bind:9.4.3</product>
<product>bind:9.4.3</product>
<product>bind:9.4.3</product>
<product>bind:9.4.3</product>
<product>bind:9.4.3</product>
<product>bind:9.4.3</product>
<product>bind:9.4.3</product>
<product>bind:9.4.3</product>
<product>bind:9.4.3</product>
<product>bind:9.5</product>
<product>bind:9.5.0</product>
<product>bind:9.5.0</product>
<product>bind:9.5.0</product>
<product>bind:9.5.0</product>
<product>bind:9.5.0</product>
<product>bind:9.5.0</product>
<product>bind:9.5.0</product>
<product>bind:9.5.0</product>
<product>bind:9.5.0</product>
<product>bind:9.5.0</product>
<product>bind:9.5.0</product>
<product>bind:9.5.0</product>
<product>bind:9.5.0</product>
<product>bind:9.5.0</product>
<product>bind:9.5.0</product>
<product>bind:9.5.0</product>
<product>bind:9.5.1</product>
<product>bind:9.5.1</product>
<product>bind:9.5.1</product>
<product>bind:9.5.1</product>
<product>bind:9.5.1</product>
<product>bind:9.5.1</product>
<product>bind:9.5.2</product>
<product>bind:9.5.2</product>
<product>bind:9.5.2</product>
<product>bind:9.5.2</product>
<product>bind:9.5.2</product>
<product>bind:9.5.2</product>
<product>bind:9.5.2</product>
<product>bind:9.5.3</product>
<product>bind:9.5.3</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6.0</product>
<product>bind:9.6.0</product>
<product>bind:9.6.0</product>
<product>bind:9.6.0</product>
<product>bind:9.6.0</product>
<product>bind:9.6.0</product>
<product>bind:9.6.1</product>
<product>bind:9.6.1</product>
<product>bind:9.6.1</product>
<product>bind:9.6.1</product>
<product>bind:9.6.1</product>
<product>bind:9.6.1</product>
<product>bind:9.6.2</product>
<product>bind:9.6.2</product>
<product>bind:9.6.2</product>
<product>bind:9.6.2</product>
<product>bind:9.6.2</product>
<product>bind:9.6.2</product>
<product>bind:9.6.3</product>
<product>bind:9.6.3</product>
<product>bind:9.6.3</product>
<product>bind:9.7.0</product>
<product>bind:9.7.0</product>
<product>bind:9.7.0</product>
<product>bind:9.7.0</product>
<product>bind:9.7.0</product>
<product>bind:9.7.0</product>
<product>bind:9.7.0</product>
<product>bind:9.7.0</product>
<product>bind:9.7.0</product>
<product>bind:9.7.0</product>
<product>bind:9.7.0</product>
<product>bind:9.7.1</product>
<product>bind:9.7.1</product>
<product>bind:9.7.1</product>
<product>bind:9.7.1</product>
<product>bind:9.7.1</product>
<product>bind:9.7.2</product>
<product>bind:9.7.2</product>
<product>bind:9.7.2</product>
<product>bind:9.7.2</product>
<product>bind:9.7.2</product>
<product>bind:9.7.3</product>
<product>bind:9.7.3</product>
<product>bind:9.7.3</product>
<product>bind:9.7.3</product>
<product>bind:9.7.4</product>
<product>bind:9.7.4</product>
<product>bind:9.7.4</product>
<product>bind:9.7.4</product>
<product>bind:9.7.5</product>
<product>bind:9.7.5</product>
<product>bind:9.7.5</product>
<product>bind:9.7.5</product>
<product>bind:9.7.6</product>
<product>bind:9.7.6</product>
<product>bind:9.7.6</product>
<product>bind:9.7.6</product>
<product>bind:9.7.6</product>
<product>bind:9.7.7</product>
<product>bind:9.8.0</product>
<product>bind:9.8.0</product>
<product>bind:9.8.0</product>
<product>bind:9.8.0</product>
<product>bind:9.8.0</product>
<product>bind:9.8.0</product>
<product>bind:9.8.0</product>
<product>bind:9.8.1</product>
<product>bind:9.8.1</product>
<product>bind:9.8.1</product>
<product>bind:9.8.1</product>
<product>bind:9.8.1</product>
<product>bind:9.8.1</product>
<product>bind:9.8.2</product>
<product>bind:9.8.2</product>
<product>bind:9.8.2</product>
<product>bind:9.8.2</product>
<product>bind:9.8.3</product>
<product>bind:9.8.3</product>
<product>bind:9.8.3</product>
<product>bind:9.8.3</product>
<product>bind:9.8.3</product>
<product>bind:9.8.4</product>
<product>bind:9.8.5</product>
<product>bind:9.8.5</product>
<product>bind:9.8.5</product>
<product>bind:9.8.5</product>
<product>bind:9.8.5</product>
<product>bind:9.8.5</product>
<product>bind:9.8.5</product>
<product>bind:9.8.6</product>
<product>bind:9.8.6</product>
<product>bind:9.8.6</product>
<product>bind:9.9.0</product>
<product>bind:9.9.0</product>
<product>bind:9.9.0</product>
<product>bind:9.9.0</product>
<product>bind:9.9.0</product>
<product>bind:9.9.0</product>
<product>bind:9.9.0</product>
<product>bind:9.9.0</product>
<product>bind:9.9.0</product>
<product>bind:9.9.0</product>
<product>bind:9.9.1</product>
<product>bind:9.9.1</product>
<product>bind:9.9.1</product>
<product>bind:9.9.1</product>
<product>bind:9.9.1</product>
<product>bind:9.9.2</product>
<product>bind:9.9.3</product>
<product>bind:9.9.3</product>
<product>bind:9.9.3</product>
<product>bind:9.9.3</product>
<product>bind:9.9.3</product>
<product>bind:9.9.3</product>
<product>bind:9.9.3</product>
<product>bind:9.9.4</product>
<product>bind:9.9.5</product>
<product>bind:9.9.6</product>
<product>bind:9.9.6</product>
<product>bind:9.9.7</product>
<product>bind:9.9.7</product>
<product>bind:9.9.7</product>
<product>bind:9.9.7</product>
<product>bind:9.9.8</product>
<product>bind:9.9.8</product>
<product>bind:9.9.8</product>
<product>bind:9.9.8</product>
<product>bind:9.9.8</product>
<product>bind:9.9.8</product>
<product>bind:9.9.8</product>
<product>bind:9.9.8</product>
<product>bind:9.9.8</product>
<product>bind:9.9.8</product>
<product>bind:9.9.8</product>
<product>bind:9.9.9</product>
<product>bind:9.9.9</product>
<product>bind:9.9.9</product>
<product>bind:9.9.9</product>
<product>bind:9.9.9</product>
<product>bind:9.9.9</product>
<product>bind:9.9.9</product>
<product>bind:9.10.0</product>
<product>bind:9.10.0</product>
<product>bind:9.10.0</product>
<product>bind:9.10.0</product>
<product>bind:9.10.0</product>
<product>bind:9.10.0</product>
<product>bind:9.10.0</product>
<product>bind:9.10.0</product>
<product>bind:9.10.0</product>
<product>bind:9.10.1</product>
<product>bind:9.10.1</product>
<product>bind:9.10.1</product>
<product>bind:9.10.1</product>
<product>bind:9.10.1</product>
<product>bind:9.10.1</product>
<product>bind:9.10.1</product>
<product>bind:9.10.2</product>
<product>bind:9.10.2</product>
<product>bind:9.10.2</product>
<product>bind:9.10.2</product>
<product>bind:9.10.2</product>
<product>bind:9.10.2</product>
<product>bind:9.10.2</product>
<product>bind:9.10.3</product>
<product>bind:9.10.3</product>
<product>bind:9.10.3</product>
<product>bind:9.10.3</product>
<product>bind:9.10.3</product>
<product>bind:9.10.3</product>
<product>bind:9.10.3</product>
<product>bind:9.10.4</product>
<product>bind:9.10.4</product>
<product>bind:9.10.4</product>
<product>bind:9.10.4</product>
<product>bind:9.10.4</product>
<product>bind:9.11.0</product>
<product>bind:9.11.0</product>
<product>bind:9.11.0</product>
<product>bind:9.11.0</product>
<product>hp-ux:b.11.31</product>
</cve>
<cve id="CVE-2016-2779" level="LOW">
<product>util-linux:2.24.2-1</product>
</cve>
<cve id="CVE-2016-6257" level="LOW">
<product>km714_firmware:012.005.00028</product>
<product>firmware:-</product>
<product>km632_firmware:-</product>
<product>ultraslim_firmware:-</product>
<product>unifying_firmware:012.005.00028</product>
<product>unifying_firmware:024.003.00027</product>
</cve>
<cve id="CVE-2016-6256" level="MEDIUM">
<product>business_one:1.2.3</product>
</cve>
<cve id="CVE-2016-6253" level="LOW">
<product>netbsd:6.0</product>
<product>netbsd:6.0.1</product>
<product>netbsd:6.0.2</product>
<product>netbsd:6.0.3</product>
<product>netbsd:6.0.4</product>
<product>netbsd:6.0.5</product>
<product>netbsd:6.0.6</product>
<product>netbsd:6.1</product>
<product>netbsd:6.1.1</product>
<product>netbsd:6.1.2</product>
<product>netbsd:6.1.3</product>
<product>netbsd:6.1.4</product>
<product>netbsd:6.1.5</product>
<product>netbsd:7.0</product>
</cve>
<cve id="CVE-2016-6252" level="LOW">
<product>shadow:4.2.1</product>
</cve>
<cve id="CVE-2016-6259" level="LOW">
<product>xenserver:6.0</product>
<product>xenserver:6.0.2</product>
<product>xenserver:6.1</product>
<product>xenserver:6.2.0</product>
<product>xenserver:6.5.0</product>
<product>xenserver:7.0</product>
<product>xen:4.5.0</product>
<product>xen:4.5.1</product>
<product>xen:4.5.2</product>
<product>xen:4.5.3</product>
<product>xen:4.6.0</product>
<product>xen:4.6.1</product>
<product>xen:4.6.3</product>
<product>xen:4.7.0</product>
</cve>
<cve id="CVE-2016-6258" level="LOW">
<product>xenserver:6.0</product>
<product>xenserver:6.0.2</product>
<product>xenserver:6.1</product>
<product>xenserver:6.2.0</product>
<product>xenserver:6.5.0</product>
<product>xenserver:7.0</product>
<product>xen:3.4.0</product>
<product>xen:3.4.2</product>
<product>xen:3.4.3</product>
<product>xen:3.4.4</product>
<product>xen:4.0.0</product>
<product>xen:4.0.1</product>
<product>xen:4.0.3</product>
<product>xen:4.0.4</product>
<product>xen:4.1.0</product>
<product>xen:4.1.1</product>
<product>xen:4.1.2</product>
<product>xen:4.1.3</product>
<product>xen:4.1.4</product>
<product>xen:4.1.5</product>
<product>xen:4.2.0</product>
<product>xen:4.2.1</product>
<product>xen:4.2.2</product>
<product>xen:4.2.3</product>
<product>xen:4.3.0</product>
<product>xen:4.3.1</product>
<product>xen:4.4.0</product>
<product>xen:4.4.1</product>
<product>xen:4.5.0</product>
<product>xen:4.6.0</product>
<product>xen:4.6.1</product>
<product>xen:4.6.3</product>
<product>xen:4.7.0</product>
</cve>
<cve id="CVE-2016-7079" level="LOW">
<product>tools:9.0.0</product>
<product>tools:9.0.1</product>
<product>tools:9.0.5</product>
<product>tools:9.0.10</product>
<product>tools:9.0.11</product>
<product>tools:9.0.12</product>
<product>tools:9.0.13</product>
<product>tools:9.0.15</product>
<product>tools:9.0.16</product>
<product>tools:9.0.17</product>
<product>tools:9.4.0</product>
<product>tools:9.4.5</product>
<product>tools:9.4.10</product>
<product>tools:9.4.11</product>
<product>tools:9.4.12</product>
<product>tools:9.4.15</product>
<product>tools:9.10.0</product>
<product>tools:9.10.1</product>
<product>tools:9.10.5</product>
<product>tools:10.0.0</product>
<product>tools:10.0.5</product>
<product>tools:10.0.6</product>
<product>tools:10.0.8</product>
</cve>
<cve id="CVE-2016-7614" level="LOW">
<product>icloud:6.0.1</product>
</cve>
<cve id="CVE-2016-4265" level="LOW">
<product>acrobat:11.0.16</product>
<product>acrobat_dc:15.006.30174</product>
<product>acrobat_dc:15.016.20045</product>
<product>acrobat_reader_dc:15.006.30174</product>
<product>acrobat_reader_dc:15.016.20045</product>
<product>reader:11.0.16</product>
</cve>
<cve id="CVE-2016-10499" level="LOW">
<product>mdm9206_firmware:-</product>
<product>mdm9607_firmware:-</product>
<product>mdm9615_firmware:-</product>
<product>mdm9625_firmware:-</product>
<product>mdm9635m_firmware:-</product>
<product>mdm9640_firmware:-</product>
<product>mdm9645_firmware:-</product>
<product>mdm9650_firmware:-</product>
<product>mdm9655_firmware:-</product>
<product>msm8909w_firmware:-</product>
<product>sd_205_firmware:-</product>
<product>sd_210_firmware:-</product>
<product>sd_212_firmware:-</product>
<product>sd_400_firmware:-</product>
<product>sd_410_firmware:-</product>
<product>sd_412_firmware:-</product>
<product>sd_415_firmware:-</product>
<product>sd_425_firmware:-</product>
<product>sd_430_firmware:-</product>
<product>sd_450_firmware:-</product>
<product>sd_615_firmware:-</product>
<product>sd_616_firmware:-</product>
<product>sd_617_firmware:-</product>
<product>sd_625_firmware:-</product>
<product>sd_650_firmware:-</product>
<product>sd_652_firmware:-</product>
<product>sd_800_firmware:-</product>
<product>sd_808_firmware:-</product>
<product>sd_810_firmware:-</product>
<product>sd_820_firmware:-</product>
<product>sd_835_firmware:-</product>
<product>sd_845_firmware:-</product>
<product>sd_850_firmware:-</product>
<product>sdx20_firmware:-</product>
</cve>
<cve id="CVE-2016-10498" level="LOW">
<product>mdm9206_firmware:-</product>
<product>mdm9607_firmware:-</product>
<product>mdm9615_firmware:-</product>
<product>mdm9625_firmware:-</product>
<product>mdm9635m_firmware:-</product>
<product>mdm9645_firmware:-</product>
<product>mdm9650_firmware:-</product>
<product>mdm9655_firmware:-</product>
<product>sd_205_firmware:-</product>
<product>sd_210_firmware:-</product>
<product>sd_212_firmware:-</product>
<product>sd_400_firmware:-</product>
<product>sd_410_firmware:-</product>
<product>sd_412_firmware:-</product>
<product>sd_415_firmware:-</product>
<product>sd_425_firmware:-</product>
<product>sd_427_firmware:-</product>
<product>sd_430_firmware:-</product>
<product>sd_435_firmware:-</product>
<product>sd_450_firmware:-</product>
<product>sd_615_firmware:-</product>
<product>sd_616_firmware:-</product>
<product>sd_617_firmware:-</product>
<product>sd_625_firmware:-</product>
<product>sd_650_firmware:-</product>
<product>sd_652_firmware:-</product>
<product>sd_810_firmware:-</product>
<product>sdm630_firmware:-</product>
<product>sdm636_firmware:-</product>
<product>sdm660_firmware:-</product>
</cve>
<cve id="CVE-2016-4251" level="LOW">
<product>acrobat:11.0.16</product>
<product>acrobat_dc:15.006.30174</product>
<product>acrobat_dc:15.016.20045</product>
<product>acrobat_reader_dc:15.006.30174</product>
<product>acrobat_reader_dc:15.016.20045</product>
<product>reader:11.0.16</product>
</cve>
<cve id="CVE-2016-4250" level="LOW">
<product>acrobat:11.0.16</product>
<product>acrobat_dc:15.006.30174</product>
<product>acrobat_dc:15.016.20045</product>
<product>acrobat_reader_dc:15.006.30174</product>
<product>acrobat_reader_dc:15.016.20045</product>
<product>reader:11.0.16</product>
</cve>
<cve id="CVE-2016-4257" level="LOW">
<product>digital_editions:4.5.1</product>
</cve>
<cve id="CVE-2016-4256" level="LOW">
<product>digital_editions:4.5.1</product>
</cve>
<cve id="CVE-2016-4255" level="MEDIUM">
<product>acrobat:11.0.16</product>
<product>acrobat_dc:15.006.30174</product>
<product>acrobat_dc:15.016.20045</product>
<product>acrobat_reader_dc:15.006.30174</product>
<product>acrobat_reader_dc:15.016.20045</product>
<product>reader:11.0.16</product>
</cve>
<cve id="CVE-2016-4254" level="LOW">
<product>acrobat:11.0.16</product>
<product>acrobat_dc:15.006.30174</product>
<product>acrobat_dc:15.016.20045</product>
<product>acrobat_reader_dc:15.006.30174</product>
<product>acrobat_reader_dc:15.016.20045</product>
<product>reader:11.0.16</product>
</cve>
<cve id="CVE-2016-10491" level="LOW">
<product>mdm9206_firmware:-</product>
<product>mdm9607_firmware:-</product>
<product>mdm9625_firmware:-</product>
<product>mdm9640_firmware:-</product>
<product>mdm9645_firmware:-</product>
<product>mdm9650_firmware:-</product>
<product>mdm9655_firmware:-</product>
<product>msm8909w_firmware:-</product>
<product>sd_205_firmware:-</product>
<product>sd_210_firmware:-</product>
<product>sd_212_firmware:-</product>
<product>sd_400_firmware:-</product>
<product>sd_410_firmware:-</product>
<product>sd_412_firmware:-</product>
<product>sd_415_firmware:-</product>
<product>sd_425_firmware:-</product>
<product>sd_430_firmware:-</product>
<product>sd_450_firmware:-</product>
<product>sd_615_firmware:-</product>
<product>sd_616_firmware:-</product>
<product>sd_617_firmware:-</product>
<product>sd_625_firmware:-</product>
<product>sd_650_firmware:-</product>
<product>sd_652_firmware:-</product>
<product>sd_800_firmware:-</product>
<product>sd_808_firmware:-</product>
<product>sd_810_firmware:-</product>
<product>sd_820_firmware:-</product>
<product>sd_835_firmware:-</product>
<product>sd_845_firmware:-</product>
<product>sd_850_firmware:-</product>
<product>sdx20_firmware:-</product>
</cve>
<cve id="CVE-2016-10490" level="LOW">
<product>mdm9206_firmware:-</product>
<product>mdm9607_firmware:-</product>
<product>mdm9625_firmware:-</product>
<product>mdm9635m_firmware:-</product>
<product>mdm9640_firmware:-</product>
<product>mdm9645_firmware:-</product>
<product>mdm9650_firmware:-</product>
<product>mdm9655_firmware:-</product>
<product>msm8909w_firmware:-</product>
<product>sd_205_firmware:-</product>
<product>sd_210_firmware:-</product>
<product>sd_212_firmware:-</product>
<product>sd_400_firmware:-</product>
<product>sd_410_firmware:-</product>
<product>sd_412_firmware:-</product>
<product>sd_415_firmware:-</product>
<product>sd_425_firmware:-</product>
<product>sd_430_firmware:-</product>
<product>sd_450_firmware:-</product>
<product>sd_615_firmware:-</product>
<product>sd_616_firmware:-</product>
<product>sd_617_firmware:-</product>
<product>sd_625_firmware:-</product>
<product>sd_650_firmware:-</product>
<product>sd_652_firmware:-</product>
<product>sd_800_firmware:-</product>
<product>sd_808_firmware:-</product>
<product>sd_810_firmware:-</product>
<product>sd_820_firmware:-</product>
<product>sd_820a_firmware:-</product>
<product>sd_835_firmware:-</product>
<product>sd_845_firmware:-</product>
<product>sd_850_firmware:-</product>
<product>sdx20_firmware:-</product>
</cve>
<cve id="CVE-2016-10493" level="LOW">
<product>mdm9206_firmware:-</product>
<product>mdm9607_firmware:-</product>
<product>mdm9635m_firmware:-</product>
<product>mdm9640_firmware:-</product>
<product>mdm9645_firmware:-</product>
<product>mdm9650_firmware:-</product>
<product>mdm9655_firmware:-</product>
<product>msm8909w_firmware:-</product>
<product>sd_205_firmware:-</product>
<product>sd_210_firmware:-</product>
<product>sd_212_firmware:-</product>
<product>sd_415_firmware:-</product>
<product>sd_425_firmware:-</product>
<product>sd_430_firmware:-</product>
<product>sd_450_firmware:-</product>
<product>sd_617_firmware:-</product>
<product>sd_625_firmware:-</product>
<product>sd_650_firmware:-</product>
<product>sd_652_firmware:-</product>
<product>sd_808_firmware:-</product>
<product>sd_810_firmware:-</product>
<product>sd_820_firmware:-</product>
<product>sd_820a_firmware:-</product>
<product>sd_835_firmware:-</product>
<product>sd_845_firmware:-</product>
<product>sd_850_firmware:-</product>
<product>sdx20_firmware:-</product>
</cve>
<cve id="CVE-2016-10492" level="LOW">
<product>mdm9206_firmware:-</product>
<product>mdm9607_firmware:-</product>
<product>mdm9615_firmware:-</product>
<product>mdm9635m_firmware:-</product>
<product>mdm9640_firmware:-</product>
<product>mdm9645_firmware:-</product>
<product>mdm9650_firmware:-</product>
<product>msm8909w_firmware:-</product>
<product>sd_205_firmware:-</product>
<product>sd_210_firmware:-</product>
<product>sd_212_firmware:-</product>
<product>sd_400_firmware:-</product>
<product>sd_410_firmware:-</product>
<product>sd_412_firmware:-</product>
<product>sd_415_firmware:-</product>
<product>sd_425_firmware:-</product>
<product>sd_430_firmware:-</product>
<product>sd_450_firmware:-</product>
<product>sd_615_firmware:-</product>
<product>sd_616_firmware:-</product>
<product>sd_617_firmware:-</product>
<product>sd_625_firmware:-</product>
<product>sd_650_firmware:-</product>
<product>sd_652_firmware:-</product>
<product>sd_800_firmware:-</product>
<product>sd_808_firmware:-</product>
<product>sd_810_firmware:-</product>
<product>sd_820_firmware:-</product>
<product>sd_820a_firmware:-</product>
<product>sd_835_firmware:-</product>
<product>sd_845_firmware:-</product>
<product>sd_850_firmware:-</product>
<product>sdx20_firmware:-</product>
</cve>
<cve id="CVE-2016-10495" level="LOW">
<product>mdm9635m_firmware:-</product>
</cve>
<cve id="CVE-2016-10494" level="LOW">
<product>mdm9635m_firmware:-</product>
<product>mdm9640_firmware:-</product>
<product>mdm9645_firmware:-</product>
<product>msm8909w_firmware:-</product>
<product>sd_205_firmware:-</product>
<product>sd_210_firmware:-</product>
<product>sd_212_firmware:-</product>
<product>sd_400_firmware:-</product>
<product>sd_410_firmware:-</product>
<product>sd_412_firmware:-</product>
<product>sd_415_firmware:-</product>
<product>sd_425_firmware:-</product>
<product>sd_430_firmware:-</product>
<product>sd_450_firmware:-</product>
<product>sd_615_firmware:-</product>
<product>sd_616_firmware:-</product>
<product>sd_617_firmware:-</product>
<product>sd_625_firmware:-</product>
<product>sd_650_firmware:-</product>
<product>sd_652_firmware:-</product>
<product>sd_800_firmware:-</product>
<product>sd_808_firmware:-</product>
<product>sd_820_firmware:-</product>
<product>sd_820a_firmware:-</product>
</cve>
<cve id="CVE-2016-10497" level="LOW">
<product>mdm9206_firmware:-</product>
<product>mdm9607_firmware:-</product>
<product>mdm9615_firmware:-</product>
<product>mdm9625_firmware:-</product>
<product>mdm9635m_firmware:-</product>
<product>mdm9640_firmware:-</product>
<product>mdm9645_firmware:-</product>
<product>mdm9650_firmware:-</product>
<product>mdm9655_firmware:-</product>
<product>msm8909w_firmware:-</product>
<product>sd_205_firmware:-</product>
<product>sd_210_firmware:-</product>
<product>sd_212_firmware:-</product>
<product>sd_400_firmware:-</product>
<product>sd_410_firmware:-</product>
<product>sd_412_firmware:-</product>
<product>sd_415_firmware:-</product>
<product>sd_425_firmware:-</product>
<product>sd_430_firmware:-</product>
<product>sd_450_firmware:-</product>
<product>sd_615_firmware:-</product>
<product>sd_616_firmware:-</product>
<product>sd_617_firmware:-</product>
<product>sd_625_firmware:-</product>
<product>sd_650_firmware:-</product>
<product>sd_652_firmware:-</product>
<product>sd_800_firmware:-</product>
<product>sd_808_firmware:-</product>
<product>sd_810_firmware:-</product>
<product>sd_820_firmware:-</product>
<product>sd_835_firmware:-</product>
<product>sd_845_firmware:-</product>
<product>sd_850_firmware:-</product>
<product>sdx20_firmware:-</product>
</cve>
<cve id="CVE-2016-10496" level="LOW">
<product>mdm9635m_firmware:-</product>
<product>sd_205_firmware:-</product>
<product>sd_210_firmware:-</product>
<product>sd_212_firmware:-</product>
<product>sd_410_firmware:-</product>
<product>sd_412_firmware:-</product>
<product>sd_415_firmware:-</product>
<product>sd_450_firmware:-</product>
<product>sd_615_firmware:-</product>
<product>sd_616_firmware:-</product>
<product>sd_625_firmware:-</product>
<product>sd_650_firmware:-</product>
<product>sd_652_firmware:-</product>
<product>sd_808_firmware:-</product>
<product>sd_810_firmware:-</product>
</cve>
<cve id="CVE-2016-8032" level="MEDIUM">
<product>anti-malware_scan_engine:5200</product>
<product>anti-malware_scan_engine:5200</product>
<product>anti-malware_scan_engine:5200</product>
<product>anti-malware_scan_engine:5300</product>
<product>anti-malware_scan_engine:5300</product>
<product>anti-malware_scan_engine:5300</product>
<product>anti-malware_scan_engine:5400</product>
<product>anti-malware_scan_engine:5400</product>
<product>anti-malware_scan_engine:5400</product>
<product>anti-malware_scan_engine:5500</product>
<product>anti-malware_scan_engine:5500</product>
<product>anti-malware_scan_engine:5500</product>
<product>anti-malware_scan_engine:5600</product>
<product>anti-malware_scan_engine:5600</product>
<product>anti-malware_scan_engine:5600</product>
<product>anti-malware_scan_engine:5700</product>
<product>anti-malware_scan_engine:5700</product>
<product>anti-malware_scan_engine:5700</product>
<product>anti-malware_scan_engine:5800</product>
<product>anti-malware_scan_engine:5800</product>
<product>anti-malware_scan_engine:5800</product>
</cve>
<cve id="CVE-2016-8031" level="MEDIUM">
<product>anti-malware_scan_engine_for_aix:5200</product>
<product>anti-malware_scan_engine_for_aix:5300</product>
<product>anti-malware_scan_engine_for_aix:5400</product>
<product>anti-malware_scan_engine_for_aix:5500</product>
<product>anti-malware_scan_engine_for_aix:5600</product>
<product>anti-malware_scan_engine_for_aix:5700</product>
<product>anti-malware_scan_engine_for_aix:5800</product>
<product>anti-malware_scan_engine_for_freebsd:5200</product>
<product>anti-malware_scan_engine_for_freebsd:5300</product>
<product>anti-malware_scan_engine_for_freebsd:5400</product>
<product>anti-malware_scan_engine_for_freebsd:5500</product>
<product>anti-malware_scan_engine_for_freebsd:5600</product>
<product>anti-malware_scan_engine_for_freebsd:5700</product>
<product>anti-malware_scan_engine_for_freebsd:5800</product>
<product>anti-malware_scan_engine_for_hp-ux:5200</product>
<product>anti-malware_scan_engine_for_hp-ux:5300</product>
<product>anti-malware_scan_engine_for_hp-ux:5400</product>
<product>anti-malware_scan_engine_for_hp-ux:5500</product>
<product>anti-malware_scan_engine_for_hp-ux:5600</product>
<product>anti-malware_scan_engine_for_hp-ux:5700</product>
<product>anti-malware_scan_engine_for_hp-ux:5800</product>
<product>anti-malware_scan_engine_for_linux:5200</product>
<product>anti-malware_scan_engine_for_linux:5300</product>
<product>anti-malware_scan_engine_for_linux:5400</product>
<product>anti-malware_scan_engine_for_linux:5500</product>
<product>anti-malware_scan_engine_for_linux:5600</product>
<product>anti-malware_scan_engine_for_linux:5700</product>
<product>anti-malware_scan_engine_for_linux:5800</product>
<product>anti-malware_scan_engine_for_sun_solaris:5200</product>
<product>anti-malware_scan_engine_for_sun_solaris:5300</product>
<product>anti-malware_scan_engine_for_sun_solaris:5400</product>
<product>anti-malware_scan_engine_for_sun_solaris:5500</product>
<product>anti-malware_scan_engine_for_sun_solaris:5600</product>
<product>anti-malware_scan_engine_for_sun_solaris:5700</product>
<product>anti-malware_scan_engine_for_sun_solaris:5800</product>
<product>anti-malware_scan_engine_for_windows:5200</product>
<product>anti-malware_scan_engine_for_windows:5300</product>
<product>anti-malware_scan_engine_for_windows:5400</product>
<product>anti-malware_scan_engine_for_windows:5500</product>
<product>anti-malware_scan_engine_for_windows:5600</product>
<product>anti-malware_scan_engine_for_windows:5700</product>
<product>anti-malware_scan_engine_for_windows:5800</product>
</cve>
<cve id="CVE-2016-8030" level="MEDIUM">
<product>virusscan_enterprise:8.8.0</product>
</cve>
<cve id="CVE-2016-4268" level="LOW">
<product>acrobat:11.0.16</product>
<product>acrobat_dc:15.006.30174</product>
<product>acrobat_dc:15.016.20045</product>
<product>acrobat_reader_dc:15.006.30174</product>
<product>acrobat_reader_dc:15.016.20045</product>
<product>reader:11.0.16</product>
</cve>
<cve id="CVE-2016-4269" level="LOW">
<product>acrobat:11.0.16</product>
<product>acrobat_dc:15.006.30174</product>
<product>acrobat_dc:15.016.20045</product>
<product>acrobat_reader_dc:15.006.30174</product>
<product>acrobat_reader_dc:15.016.20045</product>
<product>reader:11.0.16</product>
</cve>
<cve id="CVE-2016-1049" level="LOW">
<product>acrobat:11.0.15</product>
<product>acrobat_dc:15.006.30121</product>
<product>acrobat_dc:15.010.20060</product>
<product>acrobat_reader_dc:15.006.30121</product>
<product>acrobat_reader_dc:15.010.20060</product>
<product>reader:11.0.15</product>
</cve>
<cve id="CVE-2016-1048" level="LOW">
<product>acrobat:11.0.15</product>
<product>acrobat_dc:15.006.30121</product>
<product>acrobat_dc:15.010.20060</product>
<product>acrobat_reader_dc:15.006.30121</product>
<product>acrobat_reader_dc:15.010.20060</product>
<product>reader:11.0.15</product>
</cve>
<cve id="CVE-2016-1519" level="MEDIUM">
<product>wave:1.0.1.26</product>
</cve>
<cve id="CVE-2016-1518" level="MEDIUM">
<product>wave:1.0.1.26</product>
</cve>
<cve id="CVE-2016-1041" level="LOW">
<product>acrobat:11.0.15</product>
<product>acrobat_dc:15.006.30121</product>
<product>acrobat_dc:15.010.20060</product>
<product>acrobat_reader_dc:15.006.30121</product>
<product>acrobat_reader_dc:15.010.20060</product>
<product>reader:11.0.15</product>
</cve>
<cve id="CVE-2016-1040" level="LOW">
<product>acrobat:11.0.15</product>
<product>acrobat_dc:15.006.30121</product>
<product>acrobat_dc:15.010.20060</product>
<product>acrobat_reader_dc:15.006.30121</product>
<product>acrobat_reader_dc:15.010.20060</product>
<product>reader:11.0.15</product>
</cve>
<cve id="CVE-2016-1043" level="LOW">
<product>acrobat:11.0.15</product>
<product>acrobat_dc:15.006.30121</product>
<product>acrobat_dc:15.010.20060</product>
<product>acrobat_reader_dc:15.006.30121</product>
<product>acrobat_reader_dc:15.010.20060</product>
<product>reader:11.0.15</product>
</cve>
<cve id="CVE-2016-1042" level="LOW">
<product>acrobat:11.0.15</product>
<product>acrobat_dc:15.006.30121</product>
<product>acrobat_dc:15.010.20060</product>
<product>acrobat_reader_dc:15.006.30121</product>
<product>acrobat_reader_dc:15.010.20060</product>
<product>reader:11.0.15</product>
</cve>
<cve id="CVE-2016-1045" level="LOW">
<product>acrobat:11.0.15</product>
<product>acrobat_dc:15.006.30121</product>
<product>acrobat_dc:15.010.20060</product>
<product>acrobat_reader_dc:15.006.30121</product>
<product>acrobat_reader_dc:15.010.20060</product>
<product>reader:11.0.15</product>
</cve>
<cve id="CVE-2016-1044" level="LOW">
<product>acrobat:11.0.15</product>
<product>acrobat_dc:15.006.30121</product>
<product>acrobat_dc:15.010.20060</product>
<product>acrobat_reader_dc:15.006.30121</product>
<product>acrobat_reader_dc:15.010.20060</product>
<product>reader:11.0.15</product>
</cve>
<cve id="CVE-2016-1047" level="LOW">
<product>acrobat:11.0.15</product>
<product>acrobat_dc:15.006.30121</product>
<product>acrobat_dc:15.010.20060</product>
<product>acrobat_reader_dc:15.006.30121</product>
<product>acrobat_reader_dc:15.010.20060</product>
<product>reader:11.0.15</product>
</cve>
<cve id="CVE-2016-1046" level="LOW">
<product>acrobat:11.0.15</product>
<product>acrobat_dc:15.006.30121</product>
<product>acrobat_dc:15.010.20060</product>
<product>acrobat_reader_dc:15.006.30121</product>
<product>acrobat_reader_dc:15.010.20060</product>
<product>reader:11.0.15</product>
</cve>
<cve id="CVE-2016-5618" level="MEDIUM">
<product>data_integrator:11.1.1.7.0</product>
<product>data_integrator:11.1.1.9.0</product>
<product>data_integrator:12.1.2.0.0</product>
<product>data_integrator:12.1.3.0.0</product>
<product>data_integrator:12.2.1.0.0</product>
<product>data_integrator:12.2.1.1.0</product>
</cve>
<cve id="CVE-2016-5619" level="LOW">
<product>flexcube_universal_banking:11.3.0</product>
<product>flexcube_universal_banking:11.4.0</product>
<product>flexcube_universal_banking:12.0.1</product>
<product>flexcube_universal_banking:12.0.2</product>
<product>flexcube_universal_banking:12.0.3</product>
<product>flexcube_universal_banking:12.1.0</product>
<product>flexcube_universal_banking:12.2.0</product>
</cve>
<cve id="CVE-2016-5610" level="LOW">
<product>vm_virtualbox:5.0.26</product>
<product>vm_virtualbox:5.1.6</product>
</cve>
<cve id="CVE-2016-5611" level="LOW">
<product>vm_virtualbox:5.0.26</product>
<product>vm_virtualbox:5.1.6</product>
</cve>
<cve id="CVE-2016-5613" level="LOW">
<product>vm_virtualbox:5.0.26</product>
<product>vm_virtualbox:5.1.6</product>
</cve>
<cve id="CVE-2016-5614" level="LOW">
<product>flexcube_private_banking:2.0.1</product>
<product>flexcube_private_banking:2.2.0</product>
<product>flexcube_private_banking:12.0.1</product>
</cve>
<cve id="CVE-2016-2967" level="MEDIUM">
<product>sametime:8.5.2.0</product>
<product>sametime:8.5.2.1</product>
<product>sametime:9.0.0.0</product>
<product>sametime:9.0.0.1</product>
<product>sametime:9.0.1</product>
</cve>
<cve id="CVE-2016-2966" level="LOW">
<product>sametime:8.5.1.0</product>
<product>sametime:8.5.1.1</product>
<product>sametime:8.5.2.0</product>
<product>sametime:8.5.2.1</product>
<product>sametime:9.0.0.0</product>
<product>sametime:9.0.0.1</product>
<product>sametime:9.0.1</product>
</cve>
<cve id="CVE-2016-2965" level="MEDIUM">
<product>sametime:8.5.2.0</product>
<product>sametime:8.5.2.1</product>
<product>sametime:9.0.0.0</product>
<product>sametime:9.0.0.1</product>
<product>sametime:9.0.1</product>
</cve>
<cve id="CVE-2016-2964" level="LOW">
<product>sametime:8.5.2.0</product>
<product>sametime:8.5.2.1</product>
<product>sametime:9.0.0.0</product>
<product>sametime:9.0.0.1</product>
<product>sametime:9.0.1</product>
</cve>
<cve id="CVE-2016-2963" level="MEDIUM">
<product>bigfix_remote_control:9.1.2</product>
</cve>
<cve id="CVE-2016-2961" level="LOW">
<product>integration_bus:9.0</product>
<product>integration_bus:9.0.0.1</product>
<product>integration_bus:9.0.0.2</product>
<product>integration_bus:9.0.0.3</product>
<product>integration_bus:9.0.0.4</product>
<product>integration_bus:9.0.0.5</product>
<product>integration_bus:10.0</product>
<product>integration_bus:10.0.0.1</product>
<product>integration_bus:10.0.0.2</product>
<product>integration_bus:10.0.0.3</product>
<product>integration_bus:10.0.0.4</product>
<product>websphere_message_broker:8.0</product>
<product>websphere_message_broker:8.0.0.1</product>
<product>websphere_message_broker:8.0.0.2</product>
<product>websphere_message_broker:8.0.0.3</product>
<product>websphere_message_broker:8.0.0.4</product>
<product>websphere_message_broker:8.0.0.5</product>
<product>websphere_message_broker:8.0.0.6</product>
<product>websphere_message_broker:8.0.0.7</product>
</cve>
<cve id="CVE-2016-2960" level="MEDIUM">
<product>websphere_application_server:7.0</product>
<product>websphere_application_server:7.0.0.0</product>
<product>websphere_application_server:7.0.0.1</product>
<product>websphere_application_server:7.0.0.2</product>
<product>websphere_application_server:7.0.0.3</product>
<product>websphere_application_server:7.0.0.4</product>
<product>websphere_application_server:7.0.0.5</product>
<product>websphere_application_server:7.0.0.6</product>
<product>websphere_application_server:7.0.0.7</product>
<product>websphere_application_server:7.0.0.8</product>
<product>websphere_application_server:7.0.0.9</product>
<product>websphere_application_server:7.0.0.10</product>
<product>websphere_application_server:7.0.0.11</product>
<product>websphere_application_server:7.0.0.12</product>
<product>websphere_application_server:7.0.0.13</product>
<product>websphere_application_server:7.0.0.14</product>
<product>websphere_application_server:7.0.0.15</product>
<product>websphere_application_server:7.0.0.16</product>
<product>websphere_application_server:7.0.0.17</product>
<product>websphere_application_server:7.0.0.18</product>
<product>websphere_application_server:7.0.0.19</product>
<product>websphere_application_server:7.0.0.21</product>
<product>websphere_application_server:7.0.0.22</product>
<product>websphere_application_server:7.0.0.23</product>
<product>websphere_application_server:7.0.0.24</product>
<product>websphere_application_server:7.0.0.25</product>
<product>websphere_application_server:7.0.0.27</product>
<product>websphere_application_server:7.0.0.28</product>
<product>websphere_application_server:7.0.0.29</product>
<product>websphere_application_server:7.0.0.31</product>
<product>websphere_application_server:7.0.0.32</product>
<product>websphere_application_server:7.0.0.33</product>
<product>websphere_application_server:7.0.0.34</product>
<product>websphere_application_server:7.0.0.35</product>
<product>websphere_application_server:7.0.0.36</product>
<product>websphere_application_server:7.0.0.37</product>
<product>websphere_application_server:7.0.0.38</product>
<product>websphere_application_server:7.0.0.39</product>
<product>websphere_application_server:7.0.0.41</product>
<product>websphere_application_server:8.0</product>
<product>websphere_application_server:8.0.0.0</product>
<product>websphere_application_server:8.0.0.1</product>
<product>websphere_application_server:8.0.0.2</product>
<product>websphere_application_server:8.0.0.3</product>
<product>websphere_application_server:8.0.0.4</product>
<product>websphere_application_server:8.0.0.5</product>
<product>websphere_application_server:8.0.0.6</product>
<product>websphere_application_server:8.0.0.7</product>
<product>websphere_application_server:8.0.0.8</product>
<product>websphere_application_server:8.0.0.9</product>
<product>websphere_application_server:8.0.0.10</product>
<product>websphere_application_server:8.0.0.11</product>
<product>websphere_application_server:8.0.0.12</product>
<product>websphere_application_server:8.5.0.0</product>
<product>websphere_application_server:8.5.0.0</product>
<product>websphere_application_server:8.5.0.1</product>
<product>websphere_application_server:8.5.0.2</product>
<product>websphere_application_server:8.5.5.0</product>
<product>websphere_application_server:8.5.5.1</product>
<product>websphere_application_server:8.5.5.2</product>
<product>websphere_application_server:8.5.5.4</product>
<product>websphere_application_server:8.5.5.5</product>
<product>websphere_application_server:8.5.5.6</product>
<product>websphere_application_server:8.5.5.7</product>
<product>websphere_application_server:8.5.5.8</product>
<product>websphere_application_server:8.5.5.9</product>
<product>websphere_application_server:9.0.0.0</product>
</cve>
<cve id="CVE-2016-2969" level="LOW">
<product>sametime:8.5.2.0</product>
<product>sametime:8.5.2.1</product>
<product>sametime:9.0.0.0</product>
<product>sametime:9.0.0.1</product>
<product>sametime:9.0.1</product>
</cve>
<cve id="CVE-2016-2968" level="LOW">
<product>security_qradar_incident_forensics:7.2.0</product>
<product>security_qradar_incident_forensics:7.2.1</product>
<product>security_qradar_incident_forensics:7.2.2</product>
<product>security_qradar_incident_forensics:7.2.3</product>
<product>security_qradar_incident_forensics:7.2.4</product>
<product>security_qradar_incident_forensics:7.2.5</product>
<product>security_qradar_incident_forensics:7.2.6</product>
</cve>
<cve id="CVE-2016-5021" level="LOW">
<product>big-ip_access_policy_manager:11.5.0</product>
<product>big-ip_access_policy_manager:11.5.1</product>
<product>big-ip_access_policy_manager:11.5.2</product>
<product>big-ip_access_policy_manager:11.5.3</product>
<product>big-ip_access_policy_manager:11.6.0</product>
<product>big-ip_access_policy_manager:12.0.0</product>
<product>big-ip_advanced_firewall_manager:11.5.0</product>
<product>big-ip_advanced_firewall_manager:11.5.1</product>
<product>big-ip_advanced_firewall_manager:11.5.2</product>
<product>big-ip_advanced_firewall_manager:11.5.3</product>
<product>big-ip_advanced_firewall_manager:11.6.0</product>
<product>big-ip_advanced_firewall_manager:12.0.0</product>
<product>big-ip_analytics:11.5.0</product>
<product>big-ip_analytics:11.5.1</product>
<product>big-ip_analytics:11.5.2</product>
<product>big-ip_analytics:11.5.3</product>
<product>big-ip_analytics:11.6.0</product>
<product>big-ip_analytics:12.0.0</product>
<product>big-ip_application_acceleration_manager:11.5.0</product>
<product>big-ip_application_acceleration_manager:11.5.1</product>
<product>big-ip_application_acceleration_manager:11.5.2</product>
<product>big-ip_application_acceleration_manager:11.5.3</product>
<product>big-ip_application_acceleration_manager:11.6.0</product>
<product>big-ip_application_acceleration_manager:12.0.0</product>
<product>big-ip_application_security_manager:11.5.0</product>
<product>big-ip_application_security_manager:11.5.1</product>
<product>big-ip_application_security_manager:11.5.2</product>
<product>big-ip_application_security_manager:11.5.3</product>
<product>big-ip_application_security_manager:11.6.0</product>
<product>big-ip_application_security_manager:12.0.0</product>
<product>big-ip_domain_name_system:12.0.0</product>
<product>big-ip_global_traffic_manager:11.5.0</product>
<product>big-ip_global_traffic_manager:11.5.1</product>
<product>big-ip_global_traffic_manager:11.5.2</product>
<product>big-ip_global_traffic_manager:11.5.3</product>
<product>big-ip_global_traffic_manager:11.6.0</product>
<product>big-ip_link_controller:11.5.0</product>
<product>big-ip_link_controller:11.5.1</product>
<product>big-ip_link_controller:11.5.2</product>
<product>big-ip_link_controller:11.5.3</product>
<product>big-ip_link_controller:11.6.0</product>
<product>big-ip_link_controller:12.0.0</product>
<product>big-ip_local_traffic_manager:11.5.0</product>
<product>big-ip_local_traffic_manager:11.5.1</product>
<product>big-ip_local_traffic_manager:11.5.2</product>
<product>big-ip_local_traffic_manager:11.5.3</product>
<product>big-ip_local_traffic_manager:11.6.0</product>
<product>big-ip_local_traffic_manager:12.0.0</product>
<product>big-ip_policy_enforcement_manager:11.5.0</product>
<product>big-ip_policy_enforcement_manager:11.5.1</product>
<product>big-ip_policy_enforcement_manager:11.5.2</product>
<product>big-ip_policy_enforcement_manager:11.5.3</product>
<product>big-ip_policy_enforcement_manager:11.6.0</product>
<product>big-ip_policy_enforcement_manager:12.0.0</product>
<product>big-iq_application_delivery_controller:4.5.0</product>
<product>big-iq_centralized_management:4.6.0</product>
<product>big-iq_cloud:4.0.0</product>
<product>big-iq_cloud:4.1.0</product>
<product>big-iq_cloud:4.2.0</product>
<product>big-iq_cloud:4.3.0</product>
<product>big-iq_cloud:4.4.0</product>
<product>big-iq_cloud:4.5.0</product>
<product>big-iq_cloud_and_orchestration:1.0.0</product>
<product>big-iq_device:4.2.0</product>
<product>big-iq_device:4.3.0</product>
<product>big-iq_device:4.4.0</product>
<product>big-iq_device:4.5.0</product>
<product>big-iq_security:4.0.0</product>
<product>big-iq_security:4.1.0</product>
<product>big-iq_security:4.2.0</product>
<product>big-iq_security:4.3.0</product>
<product>big-iq_security:4.4.0</product>
<product>big-iq_security:4.5.0</product>
</cve>
<cve id="CVE-2016-8229" level="MEDIUM">
<product>lenovo_service_bridge:-</product>
</cve>
<cve id="CVE-2016-6321" level="LOW">
<product>tar:1.14</product>
<product>tar:1.15</product>
<product>tar:1.15.1</product>
<product>tar:1.15.90</product>
<product>tar:1.15.91</product>
<product>tar:1.16</product>
<product>tar:1.16.1</product>
<product>tar:1.17</product>
<product>tar:1.18</product>
<product>tar:1.19</product>
<product>tar:1.20</product>
<product>tar:1.21</product>
<product>tar:1.22</product>
<product>tar:1.23</product>
<product>tar:1.24</product>
<product>tar:1.25</product>
<product>tar:1.26</product>
<product>tar:1.27</product>
<product>tar:1.27.1</product>
<product>tar:1.28</product>
<product>tar:1.29</product>
</cve>
<cve id="CVE-2016-6452" level="LOW">
<product>prime_home:5.0_base</product>
<product>prime_home:5.1_base</product>
<product>prime_home:5.2.0</product>
</cve>
<cve id="CVE-2016-6323" level="LOW">
<product>glibc:2.24</product>
<product>fedora:23</product>
<product>fedora:24</product>
<product>fedora:25</product>
<product>opensuse:13.2</product>
</cve>
<cve id="CVE-2016-3130" level="MEDIUM">
<product>enterprise_service:12.0.0</product>
<product>enterprise_service:12.0.1</product>
<product>enterprise_service:12.1.0</product>
<product>enterprise_service:12.2.0</product>
<product>enterprise_service:12.2.1</product>
<product>enterprise_service:12.3.0</product>
<product>enterprise_service:12.3.1</product>
<product>enterprise_service:12.4.0</product>
<product>enterprise_service:12.4.1</product>
<product>enterprise_service:12.5.0a</product>
<product>enterprise_service:12.5.1</product>
<product>enterprise_service:12.5.2</product>
</cve>
<cve id="CVE-2016-8221" level="MEDIUM">
<product>xclarity_administrator:1.1.1</product>
</cve>
<cve id="CVE-2016-2349" level="LOW">
<product>remedy_action_request_system:8.1</product>
<product>remedy_action_request_system:9.0</product>
<product>remedy_action_request_system:9.0</product>
<product>remedy_action_request_system:9.1</product>
</cve>
<cve id="CVE-2016-2343" level="LOW">
<product>eaglesoft:17.0</product>
</cve>
<cve id="CVE-2016-5754" level="LOW">
<product>access_manager:4.1</product>
<product>access_manager:4.1</product>
<product>access_manager:4.1</product>
<product>access_manager:4.2</product>
<product>access_manager:4.2</product>
</cve>
<cve id="CVE-2016-2340" level="LOW">
<product>granite_data_services:3.1.1-snapshot</product>
</cve>
<cve id="CVE-2016-2346" level="MEDIUM">
<product>pl%2fsql_developer:11.0</product>
<product>pl%2fsql_developer:11.0.1</product>
<product>pl%2fsql_developer:11.0.2</product>
<product>pl%2fsql_developer:11.0.3</product>
<product>pl%2fsql_developer:11.0.4</product>
<product>pl%2fsql_developer:11.0.5</product>
</cve>
<cve id="CVE-2016-2345" level="LOW">
<product>mini_remote_control:12.0</product>
</cve>
<cve id="CVE-2016-2344" level="LOW">
<product>autodesk_backburner:2016.0.0.2150</product>
</cve>
<cve id="CVE-2016-0446" level="LOW">
<product>enterprise_manager_grid_control:11.1.0.1</product>
<product>enterprise_manager_grid_control:11.2.0.4</product>
<product>enterprise_manager_grid_control:12.1.0.4</product>
<product>enterprise_manager_grid_control:12.1.0.5</product>
</cve>
<cve id="CVE-2016-4004" level="LOW">
<product>openmanage_server_administrator:8.2</product>
</cve>
<cve id="CVE-2016-0447" level="LOW">
<product>enterprise_manager_grid_control:11.1.0.1</product>
<product>enterprise_manager_grid_control:11.2.0.4</product>
<product>enterprise_manager_grid_control:12.1.0.4</product>
<product>enterprise_manager_grid_control:12.1.0.5</product>
</cve>
<cve id="CVE-2016-4005" level="LOW">
<product>hilink_app:3.19.1</product>
</cve>
<cve id="CVE-2016-0444" level="MEDIUM">
<product>enterprise_manager_grid_control:11.1.0.1</product>
<product>enterprise_manager_grid_control:11.2.0.4</product>
<product>enterprise_manager_grid_control:12.1.0.4</product>
<product>enterprise_manager_grid_control:12.1.0.5</product>
</cve>
<cve id="CVE-2016-0445" level="LOW">
<product>enterprise_manager_grid_control:11.1.0.1</product>
<product>enterprise_manager_grid_control:11.2.0.4</product>
<product>enterprise_manager_grid_control:12.1.0.4</product>
<product>enterprise_manager_grid_control:12.1.0.5</product>
</cve>
<cve id="CVE-2016-0114" level="HIGH">
<product>internet_explorer:11</product>
</cve>
<cve id="CVE-2016-8855" level="MEDIUM">
<product>experience_platform:8.1</product>
</cve>
<cve id="CVE-2016-8856" level="LOW">
<product>reader:2.1.0.0804</product>
<product>reader:2.1.0.0805</product>
</cve>
<cve id="CVE-2016-8859" level="LOW">
<product>musl:1.1.15</product>
</cve>
<cve id="CVE-2016-8858" level="LOW">
<product>openssh:6.8</product>
<product>openssh:6.9</product>
<product>openssh:7.0</product>
<product>openssh:7.1</product>
<product>openssh:7.2</product>
<product>openssh:7.3</product>
</cve>
<cve id="CVE-2016-3640" level="LOW">
<product>hana_db:1.00.091.00.14186593</product>
</cve>
<cve id="CVE-2016-3315" level="MEDIUM">
<product>onenote:2007</product>
<product>onenote:2010</product>
<product>onenote:2013</product>
<product>onenote:2013</product>
<product>onenote:2016</product>
<product>onenote_for_mac:2016</product>
</cve>
<cve id="CVE-2016-3642" level="LOW">
<product>virtualization_manager:6.3.1</product>
</cve>
<cve id="CVE-2016-6068" level="LOW">
<product>urbancode_deploy:6.0</product>
<product>urbancode_deploy:6.0.1</product>
<product>urbancode_deploy:6.0.1.1</product>
<product>urbancode_deploy:6.0.1.2</product>
<product>urbancode_deploy:6.0.1.3</product>
<product>urbancode_deploy:6.0.1.4</product>
<product>urbancode_deploy:6.0.1.5</product>
<product>urbancode_deploy:6.0.1.6</product>
<product>urbancode_deploy:6.0.1.7</product>
<product>urbancode_deploy:6.0.1.8</product>
<product>urbancode_deploy:6.0.1.9</product>
<product>urbancode_deploy:6.0.1.10</product>
<product>urbancode_deploy:6.0.1.11</product>
<product>urbancode_deploy:6.0.1.12</product>
<product>urbancode_deploy:6.0.1.13</product>
<product>urbancode_deploy:6.0.1.14</product>
<product>urbancode_deploy:6.1</product>
<product>urbancode_deploy:6.1.0.1</product>
<product>urbancode_deploy:6.1.0.2</product>
<product>urbancode_deploy:6.1.0.3</product>
<product>urbancode_deploy:6.1.0.4</product>
<product>urbancode_deploy:6.1.1</product>
<product>urbancode_deploy:6.1.1.1</product>
<product>urbancode_deploy:6.1.1.2</product>
<product>urbancode_deploy:6.1.1.3</product>
<product>urbancode_deploy:6.1.1.4</product>
<product>urbancode_deploy:6.1.1.5</product>
<product>urbancode_deploy:6.1.1.6</product>
<product>urbancode_deploy:6.1.1.7</product>
<product>urbancode_deploy:6.1.1.8</product>
<product>urbancode_deploy:6.1.2</product>
<product>urbancode_deploy:6.1.3</product>
<product>urbancode_deploy:6.1.3.1</product>
<product>urbancode_deploy:6.1.3.2</product>
<product>urbancode_deploy:6.1.3.3</product>
<product>urbancode_deploy:6.2.0.0</product>
<product>urbancode_deploy:6.2.0.1</product>
<product>urbancode_deploy:6.2.0.2</product>
<product>urbancode_deploy:6.2.1</product>
<product>urbancode_deploy:6.2.1.1</product>
<product>urbancode_deploy:6.2.2</product>
<product>urbancode_deploy:6.2.2.1</product>
</cve>
<cve id="CVE-2016-6065" level="LOW">
<product>security_guardium:8.2</product>
<product>security_guardium:9.0</product>
<product>security_guardium:9.1</product>
<product>security_guardium:9.5</product>
<product>security_guardium:10.0</product>
<product>security_guardium:10.0.1</product>
<product>security_guardium:10.1</product>
<product>security_guardium:10.1.2</product>
</cve>
<cve id="CVE-2016-6062" level="MEDIUM">
<product>resilient:26.0</product>
<product>resilient:26.1</product>
<product>resilient:26.2</product>
</cve>
<cve id="CVE-2016-6060" level="LOW">
<product>rational_doors_next_generation:5.0</product>
<product>rational_doors_next_generation:5.0.0</product>
<product>rational_doors_next_generation:5.0.1</product>
<product>rational_doors_next_generation:5.0.2</product>
<product>rational_doors_next_generation:6.0.0</product>
<product>rational_doors_next_generation:6.0.1</product>
<product>rational_doors_next_generation:6.0.2</product>
<product>rational_requirements_composer:4.0.1</product>
<product>rational_requirements_composer:4.0.2</product>
<product>rational_requirements_composer:4.0.3</product>
<product>rational_requirements_composer:4.0.4</product>
<product>rational_requirements_composer:4.0.5</product>
<product>rational_requirements_composer:4.0.6</product>
<product>rational_requirements_composer:4.0.7</product>
</cve>
<cve id="CVE-2016-6061" level="MEDIUM">
<product>rational_collaborative_lifecycle_management:4.0.0</product>
<product>rational_collaborative_lifecycle_management:4.0.1</product>
<product>rational_collaborative_lifecycle_management:4.0.2</product>
<product>rational_collaborative_lifecycle_management:4.0.3</product>
<product>rational_collaborative_lifecycle_management:4.0.4</product>
<product>rational_collaborative_lifecycle_management:4.0.5</product>
<product>rational_collaborative_lifecycle_management:4.0.6</product>
<product>rational_collaborative_lifecycle_management:4.0.7</product>
<product>rational_collaborative_lifecycle_management:5.0.0</product>
<product>rational_collaborative_lifecycle_management:5.0.1</product>
<product>rational_collaborative_lifecycle_management:5.0.2</product>
<product>rational_collaborative_lifecycle_management:6.0.0</product>
<product>rational_collaborative_lifecycle_management:6.0.1</product>
<product>rational_collaborative_lifecycle_management:6.0.2</product>
</cve>
<cve id="CVE-2016-8938" level="LOW">
<product>urbancode_deploy:6.0</product>
<product>urbancode_deploy:6.0.1</product>
<product>urbancode_deploy:6.0.1.1</product>
<product>urbancode_deploy:6.0.1.2</product>
<product>urbancode_deploy:6.0.1.3</product>
<product>urbancode_deploy:6.0.1.4</product>
<product>urbancode_deploy:6.0.1.5</product>
<product>urbancode_deploy:6.0.1.6</product>
<product>urbancode_deploy:6.0.1.7</product>
<product>urbancode_deploy:6.0.1.8</product>
<product>urbancode_deploy:6.0.1.9</product>
<product>urbancode_deploy:6.0.1.10</product>
<product>urbancode_deploy:6.0.1.11</product>
<product>urbancode_deploy:6.0.1.12</product>
<product>urbancode_deploy:6.0.1.13</product>
<product>urbancode_deploy:6.0.1.14</product>
<product>urbancode_deploy:6.1</product>
<product>urbancode_deploy:6.1.0.1</product>
<product>urbancode_deploy:6.1.0.2</product>
<product>urbancode_deploy:6.1.0.3</product>
<product>urbancode_deploy:6.1.0.4</product>
<product>urbancode_deploy:6.1.1</product>
<product>urbancode_deploy:6.1.1.1</product>
<product>urbancode_deploy:6.1.1.2</product>
<product>urbancode_deploy:6.1.1.3</product>
<product>urbancode_deploy:6.1.1.4</product>
<product>urbancode_deploy:6.1.1.5</product>
<product>urbancode_deploy:6.1.1.6</product>
<product>urbancode_deploy:6.1.1.7</product>
<product>urbancode_deploy:6.1.1.8</product>
<product>urbancode_deploy:6.1.2</product>
<product>urbancode_deploy:6.1.3</product>
<product>urbancode_deploy:6.1.3.1</product>
<product>urbancode_deploy:6.1.3.2</product>
<product>urbancode_deploy:6.1.3.3</product>
<product>urbancode_deploy:6.2.0.0</product>
<product>urbancode_deploy:6.2.0.1</product>
<product>urbancode_deploy:6.2.0.2</product>
<product>urbancode_deploy:6.2.1</product>
<product>urbancode_deploy:6.2.1.1</product>
<product>urbancode_deploy:6.2.2</product>
<product>urbancode_deploy:6.2.2.1</product>
</cve>
<cve id="CVE-2016-8939" level="LOW">
<product>tivoli_storage_manager:6.1</product>
<product>tivoli_storage_manager:6.1.0</product>
<product>tivoli_storage_manager:6.1.1</product>
<product>tivoli_storage_manager:6.1.2</product>
<product>tivoli_storage_manager:6.1.3</product>
<product>tivoli_storage_manager:6.1.4</product>
<product>tivoli_storage_manager:6.1.5</product>
<product>tivoli_storage_manager:6.1.5.4</product>
<product>tivoli_storage_manager:6.1.5.5</product>
<product>tivoli_storage_manager:6.1.5.6</product>
<product>tivoli_storage_manager:6.2.0</product>
<product>tivoli_storage_manager:6.2.1</product>
<product>tivoli_storage_manager:6.2.2</product>
<product>tivoli_storage_manager:6.2.3</product>
<product>tivoli_storage_manager:6.2.4</product>
<product>tivoli_storage_manager:6.3</product>
<product>tivoli_storage_manager:6.3.0.5</product>
<product>tivoli_storage_manager:6.3.0.15</product>
<product>tivoli_storage_manager:6.3.0.17</product>
<product>tivoli_storage_manager:6.3.1</product>
<product>tivoli_storage_manager:6.3.1.2</product>
<product>tivoli_storage_manager:6.3.2.2</product>
<product>tivoli_storage_manager:6.3.3</product>
<product>tivoli_storage_manager:6.3.4</product>
<product>tivoli_storage_manager:6.3.5</product>
<product>tivoli_storage_manager:6.3.5.1</product>
<product>tivoli_storage_manager:6.3.6</product>
<product>tivoli_storage_manager:6.3.6.100</product>
<product>tivoli_storage_manager:6.4.1</product>
<product>tivoli_storage_manager:6.4.1.0</product>
<product>tivoli_storage_manager:6.4.2</product>
<product>tivoli_storage_manager:6.4.2.100</product>
<product>tivoli_storage_manager:6.4.2.200</product>
<product>tivoli_storage_manager:6.4.2.500</product>
<product>tivoli_storage_manager:6.4.2.600</product>
<product>tivoli_storage_manager:6.4.3</product>
<product>tivoli_storage_manager:6.4.3.1</product>
<product>tivoli_storage_manager:7.1</product>
<product>tivoli_storage_manager:7.1..5.100</product>
<product>tivoli_storage_manager:7.1.0.1</product>
<product>tivoli_storage_manager:7.1.0.2</product>
<product>tivoli_storage_manager:7.1.0.3</product>
<product>tivoli_storage_manager:7.1.1</product>
<product>tivoli_storage_manager:7.1.1.1</product>
<product>tivoli_storage_manager:7.1.1.2</product>
<product>tivoli_storage_manager:7.1.1.100</product>
<product>tivoli_storage_manager:7.1.1.200</product>
<product>tivoli_storage_manager:7.1.1.300</product>
<product>tivoli_storage_manager:7.1.3</product>
<product>tivoli_storage_manager:7.1.3.000</product>
<product>tivoli_storage_manager:7.1.3.1</product>
<product>tivoli_storage_manager:7.1.3.2</product>
<product>tivoli_storage_manager:7.1.3.100</product>
<product>tivoli_storage_manager:7.1.4</product>
<product>tivoli_storage_manager:7.1.4.1</product>
<product>tivoli_storage_manager:7.1.4.2</product>
<product>tivoli_storage_manager:7.1.5</product>
<product>tivoli_storage_manager:7.1.5.200</product>
<product>tivoli_storage_manager:7.1.6</product>
<product>tivoli_storage_manager:7.1.7</product>
<product>tivoli_storage_manager:7.1.7.100</product>
<product>tivoli_storage_manager:7.1.7.200</product>
<product>tivoli_storage_manager:8.1.0</product>
<product>tivoli_storage_manager:8.1.1</product>
<product>tivoli_storage_manager:8.1.1.100</product>
</cve>
<cve id="CVE-2016-3647" level="LOW">
<product>endpoint_protection_manager:12.1.6</product>
</cve>
<cve id="CVE-2016-8932" level="LOW">
<product>kenexa_lms:4.1</product>
<product>kenexa_lms:4.2</product>
<product>kenexa_lms:4.2.2</product>
<product>kenexa_lms:4.2.3</product>
<product>kenexa_lms:4.2.4</product>
<product>kenexa_lms:5.0</product>
<product>kenexa_lms:5.1</product>
<product>kenexa_lms:5.2</product>
</cve>
<cve id="CVE-2016-8933" level="LOW">
<product>kenexa_lms:4.1</product>
<product>kenexa_lms:4.2</product>
<product>kenexa_lms:4.2.2</product>
<product>kenexa_lms:4.2.3</product>
<product>kenexa_lms:4.2.4</product>
<product>kenexa_lms:5.0</product>
<product>kenexa_lms:5.1</product>
<product>kenexa_lms:5.2</product>
</cve>
<cve id="CVE-2016-8930" level="LOW">
<product>kenexa_lms:4.1</product>
<product>kenexa_lms:4.2</product>
<product>kenexa_lms:4.2.2</product>
<product>kenexa_lms:4.2.3</product>
<product>kenexa_lms:4.2.4</product>
<product>kenexa_lms:5.0</product>
<product>kenexa_lms:5.1</product>
<product>kenexa_lms:5.2</product>
</cve>
<cve id="CVE-2016-8931" level="LOW">
<product>kenexa_lms:4.1</product>
<product>kenexa_lms:4.2</product>
<product>kenexa_lms:4.2.2</product>
<product>kenexa_lms:4.2.3</product>
<product>kenexa_lms:4.2.4</product>
<product>kenexa_lms:5.0</product>
<product>kenexa_lms:5.1</product>
<product>kenexa_lms:5.2</product>
</cve>
<cve id="CVE-2016-8936" level="MEDIUM">
<product>social_rendering_templates_for_digital_data_connector:1.0</product>
</cve>
<cve id="CVE-2016-8937" level="LOW">
<product>tivoli_storage_manager:6.1</product>
<product>tivoli_storage_manager:6.1.0</product>
<product>tivoli_storage_manager:6.1.1</product>
<product>tivoli_storage_manager:6.1.2</product>
<product>tivoli_storage_manager:6.1.3</product>
<product>tivoli_storage_manager:6.1.4</product>
<product>tivoli_storage_manager:6.1.5</product>
<product>tivoli_storage_manager:6.1.5.4</product>
<product>tivoli_storage_manager:6.1.5.5</product>
<product>tivoli_storage_manager:6.1.5.6</product>
<product>tivoli_storage_manager:6.2.0</product>
<product>tivoli_storage_manager:6.2.1</product>
<product>tivoli_storage_manager:6.2.2</product>
<product>tivoli_storage_manager:6.2.3</product>
<product>tivoli_storage_manager:6.2.4</product>
<product>tivoli_storage_manager:6.3</product>
<product>tivoli_storage_manager:6.3.0.5</product>
<product>tivoli_storage_manager:6.3.0.15</product>
<product>tivoli_storage_manager:6.3.0.17</product>
<product>tivoli_storage_manager:6.3.1</product>
<product>tivoli_storage_manager:6.3.1.2</product>
<product>tivoli_storage_manager:6.3.2.2</product>
<product>tivoli_storage_manager:6.3.3</product>
<product>tivoli_storage_manager:6.3.4</product>
<product>tivoli_storage_manager:6.3.5</product>
<product>tivoli_storage_manager:6.3.5.1</product>
<product>tivoli_storage_manager:6.3.6</product>
<product>tivoli_storage_manager:6.3.6.100</product>
<product>tivoli_storage_manager:6.4.1</product>
<product>tivoli_storage_manager:6.4.1.0</product>
<product>tivoli_storage_manager:6.4.2</product>
<product>tivoli_storage_manager:6.4.2.100</product>
<product>tivoli_storage_manager:6.4.2.200</product>
<product>tivoli_storage_manager:6.4.2.500</product>
<product>tivoli_storage_manager:6.4.2.600</product>
<product>tivoli_storage_manager:6.4.3</product>
<product>tivoli_storage_manager:6.4.3.1</product>
<product>tivoli_storage_manager:7.1</product>
<product>tivoli_storage_manager:7.1..5.100</product>
<product>tivoli_storage_manager:7.1.0.1</product>
<product>tivoli_storage_manager:7.1.0.2</product>
<product>tivoli_storage_manager:7.1.0.3</product>
<product>tivoli_storage_manager:7.1.1</product>
<product>tivoli_storage_manager:7.1.1.1</product>
<product>tivoli_storage_manager:7.1.1.2</product>
<product>tivoli_storage_manager:7.1.1.100</product>
<product>tivoli_storage_manager:7.1.1.200</product>
<product>tivoli_storage_manager:7.1.1.300</product>
<product>tivoli_storage_manager:7.1.3</product>
<product>tivoli_storage_manager:7.1.3.000</product>
<product>tivoli_storage_manager:7.1.3.1</product>
<product>tivoli_storage_manager:7.1.3.2</product>
<product>tivoli_storage_manager:7.1.3.100</product>
<product>tivoli_storage_manager:7.1.4</product>
<product>tivoli_storage_manager:7.1.4.1</product>
<product>tivoli_storage_manager:7.1.4.2</product>
<product>tivoli_storage_manager:7.1.5</product>
<product>tivoli_storage_manager:7.1.5.200</product>
<product>tivoli_storage_manager:7.1.6</product>
<product>tivoli_storage_manager:7.1.7</product>
<product>tivoli_storage_manager:7.1.7.100</product>
<product>tivoli_storage_manager:7.1.7.200</product>
<product>tivoli_storage_manager:8.1.0</product>
<product>tivoli_storage_manager:8.1.1</product>
<product>tivoli_storage_manager:8.1.1.100</product>
</cve>
<cve id="CVE-2016-8934" level="MEDIUM">
<product>websphere_application_server:8.5.5.0</product>
<product>websphere_application_server:8.5.5.0</product>
<product>websphere_application_server:8.5.5.1</product>
<product>websphere_application_server:8.5.5.1</product>
<product>websphere_application_server:8.5.5.2</product>
<product>websphere_application_server:8.5.5.2</product>
<product>websphere_application_server:8.5.5.3</product>
<product>websphere_application_server:8.5.5.3</product>
<product>websphere_application_server:8.5.5.4</product>
<product>websphere_application_server:8.5.5.4</product>
<product>websphere_application_server:8.5.5.5</product>
<product>websphere_application_server:8.5.5.5</product>
<product>websphere_application_server:8.5.5.6</product>
<product>websphere_application_server:8.5.5.6</product>
<product>websphere_application_server:8.5.5.7</product>
<product>websphere_application_server:8.5.5.8</product>
<product>websphere_application_server:8.5.5.9</product>
<product>websphere_application_server:8.5.5.10</product>
<product>websphere_application_server:8.5.5.11</product>
<product>websphere_application_server:9.0.0.0</product>
<product>websphere_application_server:9.0.0.1</product>
<product>websphere_application_server:9.0.0.2</product>
</cve>
<cve id="CVE-2016-8935" level="MEDIUM">
<product>kenexa_lms:4.1</product>
<product>kenexa_lms:4.2</product>
<product>kenexa_lms:4.2.2</product>
<product>kenexa_lms:4.2.3</product>
<product>kenexa_lms:4.2.4</product>
<product>kenexa_lms:5.0</product>
</cve>
<cve id="CVE-2016-7447" level="LOW">
<product>graphicsmagick:1.3.24</product>
<product>leap:42.1</product>
<product>opensuse:13.2</product>
</cve>
<cve id="CVE-2016-7446" level="LOW">
<product>graphicsmagick:1.3.24</product>
<product>leap:42.1</product>
<product>opensuse:13.2</product>
</cve>
<cve id="CVE-2016-7445" level="LOW">
<product>openjpeg:2.1.1</product>
<product>leap:42.1</product>
</cve>
<cve id="CVE-2016-7444" level="LOW">
<product>gnutls:3.4.14</product>
<product>gnutls:3.5.0</product>
<product>gnutls:3.5.1</product>
<product>gnutls:3.5.2</product>
<product>gnutls:3.5.3</product>
</cve>
<cve id="CVE-2016-7443" level="LOW">
<product>exponent_cms:2.3.0</product>
<product>exponent_cms:2.3.1</product>
<product>exponent_cms:2.3.1</product>
<product>exponent_cms:2.3.2</product>
<product>exponent_cms:2.3.2</product>
<product>exponent_cms:2.3.3</product>
<product>exponent_cms:2.3.3</product>
<product>exponent_cms:2.3.4</product>
<product>exponent_cms:2.3.4</product>
<product>exponent_cms:2.3.5</product>
<product>exponent_cms:2.3.7</product>
<product>exponent_cms:2.3.8</product>
</cve>
<cve id="CVE-2016-7442" level="LOW">
<product>unified_threat_management_software:9.405-5</product>
</cve>
<cve id="CVE-2016-7449" level="LOW">
<product>graphicsmagick:1.3.24</product>
<product>leap:42.1</product>
<product>opensuse:13.2</product>
</cve>
<cve id="CVE-2016-7448" level="LOW">
<product>graphicsmagick:1.3.24</product>
<product>leap:42.1</product>
<product>opensuse:13.2</product>
</cve>
<cve id="CVE-2016-3585" level="MEDIUM">
<product>integrated_lights_out_manager_firmware:3.0</product>
<product>integrated_lights_out_manager_firmware:3.1</product>
<product>integrated_lights_out_manager_firmware:3.2</product>
</cve>
<cve id="CVE-2016-3582" level="LOW">
<product>outside_in_technology:8.5.0</product>
<product>outside_in_technology:8.5.1</product>
<product>outside_in_technology:8.5.2</product>
</cve>
<cve id="CVE-2016-3583" level="LOW">
<product>outside_in_technology:8.5.0</product>
<product>outside_in_technology:8.5.1</product>
<product>outside_in_technology:8.5.2</product>
</cve>
<cve id="CVE-2016-3580" level="LOW">
<product>outside_in_technology:8.5.0</product>
<product>outside_in_technology:8.5.1</product>
<product>outside_in_technology:8.5.2</product>
</cve>
<cve id="CVE-2016-3581" level="LOW">
<product>outside_in_technology:8.5.0</product>
<product>outside_in_technology:8.5.1</product>
<product>outside_in_technology:8.5.2</product>
</cve>
<cve id="CVE-2016-3589" level="MEDIUM">
<product>flexcube_direct_banking:12.0.1</product>
<product>flexcube_direct_banking:12.0.2</product>
<product>flexcube_direct_banking:12.0.3</product>
</cve>
<cve id="CVE-2016-0235" level="LOW">
<product>security_guardium_database_activity_monitor:10.0</product>
</cve>
<cve id="CVE-2016-0589" level="LOW">
<product>application_object_library:11.5.10.2</product>
</cve>
<cve id="CVE-2016-0588" level="MEDIUM">
<product>general_ledger:11.5.10.2</product>
</cve>
<cve id="CVE-2016-0231" level="LOW">
<product>financial_transaction_manager:3.0.0.0</product>
</cve>
<cve id="CVE-2016-0230" level="LOW">
<product>power_hardware_management_console:7.3.0</product>
<product>power_hardware_management_console:7.3.0</product>
<product>power_hardware_management_console:7.3.0</product>
<product>power_hardware_management_console:7.3.0</product>
<product>power_hardware_management_console:7.3.0</product>
<product>power_hardware_management_console:7.9.0</product>
<product>power_hardware_management_console:7.9.0</product>
<product>power_hardware_management_console:7.9.0</product>
<product>power_hardware_management_console:7.9.0</product>
<product>power_hardware_management_console:8.1.0</product>
<product>power_hardware_management_console:8.1.0</product>
<product>power_hardware_management_console:8.1.0</product>
<product>power_hardware_management_console:8.1.0</product>
<product>power_hardware_management_console:8.2.0</product>
<product>power_hardware_management_console:8.2.0</product>
<product>power_hardware_management_console:8.2.0</product>
<product>power_hardware_management_console:8.3.0</product>
<product>power_hardware_management_console:8.3.0</product>
<product>power_hardware_management_console:8.3.0</product>
<product>power_hardware_management_console:8.4.0</product>
<product>power_hardware_management_console:8.4.0</product>
<product>power_hardware_management_console:8.5.0</product>
</cve>
<cve id="CVE-2016-0233" level="LOW">
<product>marketing_platform:8.5.0.0</product>
<product>marketing_platform:8.5.0.1</product>
<product>marketing_platform:8.5.0.2</product>
<product>marketing_platform:8.5.0.3</product>
<product>marketing_platform:8.5.0.4</product>
<product>marketing_platform:8.5.0.5</product>
<product>marketing_platform:8.5.0.6</product>
<product>marketing_platform:8.5.0.7</product>
<product>marketing_platform:8.6.0.0</product>
<product>marketing_platform:8.6.0.1</product>
<product>marketing_platform:8.6.0.2</product>
<product>marketing_platform:8.6.0.3</product>
<product>marketing_platform:8.6.0.4</product>
<product>marketing_platform:8.6.0.5</product>
<product>marketing_platform:8.6.0.6</product>
<product>marketing_platform:8.6.0.7</product>
<product>marketing_platform:8.6.0.8</product>
<product>marketing_platform:8.6.0.9</product>
<product>marketing_platform:8.6.0.10</product>
<product>marketing_platform:8.6.0.11</product>
<product>marketing_platform:9.0.0.0</product>
<product>marketing_platform:9.0.0.1</product>
<product>marketing_platform:9.0.0.2</product>
<product>marketing_platform:9.0.0.3</product>
<product>marketing_platform:9.0.0.4</product>
<product>marketing_platform:9.1.0.0</product>
<product>marketing_platform:9.1.0.1</product>
<product>marketing_platform:9.1.0.2</product>
<product>marketing_platform:9.1.0.3</product>
<product>marketing_platform:9.1.0.4</product>
<product>marketing_platform:9.1.0.5</product>
<product>marketing_platform:9.1.0.6</product>
<product>marketing_platform:9.1.0.7</product>
<product>marketing_platform:9.1.0.8</product>
<product>marketing_platform:9.1.0.9</product>
<product>marketing_platform:9.1.0.10</product>
<product>marketing_platform:9.1.1.0</product>
<product>marketing_platform:9.1.1.1</product>
<product>marketing_platform:9.1.1.2</product>
<product>marketing_platform:9.1.1.3</product>
<product>marketing_platform:9.1.1.4</product>
<product>marketing_platform:9.1.2.0</product>
</cve>
<cve id="CVE-2016-0232" level="LOW">
<product>financial_transaction_manager:3.0.0.0</product>
<product>financial_transaction_manager:3.0.0.0</product>
<product>financial_transaction_manager:3.0.0.0</product>
<product>financial_transaction_manager:3.0.0.1</product>
<product>financial_transaction_manager:3.0.0.1</product>
<product>financial_transaction_manager:3.0.0.1</product>
<product>financial_transaction_manager:3.0.0.2</product>
<product>financial_transaction_manager:3.0.0.2</product>
<product>financial_transaction_manager:3.0.0.2</product>
<product>financial_transaction_manager:3.0.0.3</product>
<product>financial_transaction_manager:3.0.0.3</product>
<product>financial_transaction_manager:3.0.0.3</product>
<product>financial_transaction_manager:3.0.0.4</product>
<product>financial_transaction_manager:3.0.0.4</product>
<product>financial_transaction_manager:3.0.0.4</product>
<product>financial_transaction_manager:3.0.0.5</product>
<product>financial_transaction_manager:3.0.0.5</product>
<product>financial_transaction_manager:3.0.0.5</product>
<product>financial_transaction_manager:3.0.0.6</product>
<product>financial_transaction_manager:3.0.0.6</product>
<product>financial_transaction_manager:3.0.0.6</product>
<product>financial_transaction_manager:3.0.0.7</product>
<product>financial_transaction_manager:3.0.0.7</product>
<product>financial_transaction_manager:3.0.0.7</product>
<product>financial_transaction_manager:3.0.0.8</product>
<product>financial_transaction_manager:3.0.0.8</product>
<product>financial_transaction_manager:3.0.0.8</product>
<product>financial_transaction_manager:3.0.0.9</product>
<product>financial_transaction_manager:3.0.0.9</product>
<product>financial_transaction_manager:3.0.0.9</product>
<product>financial_transaction_manager:3.0.0.10</product>
<product>financial_transaction_manager:3.0.0.10</product>
<product>financial_transaction_manager:3.0.0.10</product>
<product>financial_transaction_manager:3.0.0.11</product>
<product>financial_transaction_manager:3.0.0.11</product>
<product>financial_transaction_manager:3.0.0.11</product>
</cve>
<cve id="CVE-2016-0583" level="MEDIUM">
<product>crm_technical_foundation:11.5.10.2</product>
</cve>
<cve id="CVE-2016-0582" level="MEDIUM">
<product>customer_relationship_management_technical_foundation:11.5.10.2</product>
</cve>
<cve id="CVE-2016-0581" level="LOW">
<product>approvals_management:11.5.10.2</product>
</cve>
<cve id="CVE-2016-0580" level="LOW">
<product>report_manager:11.5.10.2</product>
</cve>
<cve id="CVE-2016-0587" level="LOW">
<product>peoplesoft_enterprise_peopletools:8.53</product>
<product>peoplesoft_enterprise_peopletools:8.54</product>
<product>peoplesoft_enterprise_peopletools:8.55</product>
</cve>
<cve id="CVE-2016-0586" level="MEDIUM">
<product>application_object_library:11.5.10.2</product>
</cve>
<cve id="CVE-2016-0585" level="LOW">
<product>application_object_library:11.5.10.2</product>
</cve>
<cve id="CVE-2016-0584" level="MEDIUM">
<product>customer_relationship_management_technical_foundation:11.5.10.2</product>
</cve>
<cve id="CVE-2016-10008" level="LOW">
<product>dotcms:1.9</product>
<product>dotcms:1.9.2.1</product>
<product>dotcms:1.9.5.1</product>
<product>dotcms:2.0</product>
<product>dotcms:2.0.1</product>
<product>dotcms:2.1</product>
<product>dotcms:2.1.1</product>
<product>dotcms:2.2</product>
<product>dotcms:2.2.1</product>
<product>dotcms:2.3</product>
<product>dotcms:2.3.1</product>
<product>dotcms:2.3.2</product>
<product>dotcms:2.5</product>
<product>dotcms:2.5.1</product>
<product>dotcms:2.5.2</product>
<product>dotcms:2.5.3</product>
<product>dotcms:2.5.4</product>
<product>dotcms:3.0</product>
<product>dotcms:3.0.1</product>
<product>dotcms:3.1</product>
<product>dotcms:3.2</product>
<product>dotcms:3.2.1</product>
<product>dotcms:3.2.2</product>
<product>dotcms:3.2.3</product>
<product>dotcms:3.2.4</product>
<product>dotcms:3.3</product>
<product>dotcms:3.3.1</product>
<product>dotcms:3.3.2</product>
<product>dotcms:3.5</product>
<product>dotcms:3.5.1</product>
<product>dotcms:3.6.0</product>
<product>dotcms:3.6.1</product>
<product>dotcms:3.6.2</product>
<product>dotcms:3.7.0</product>
<product>dotcms:3.7.1</product>
<product>dotcms:4.0.0</product>
<product>dotcms:4.0.1</product>
<product>dotcms:4.1.0</product>
</cve>
<cve id="CVE-2016-4930" level="MEDIUM">
<product>junos_space:15.2</product>
</cve>
<cve id="CVE-2016-4931" level="LOW">
<product>junos_space:15.2</product>
</cve>
<cve id="CVE-2016-8204" level="LOW">
<product>network_advisor:14.0.2</product>
</cve>
<cve id="CVE-2016-8205" level="LOW">
<product>network_advisor:14.0.2</product>
</cve>
<cve id="CVE-2016-8206" level="LOW">
<product>network_advisor:14.0.2</product>
</cve>
<cve id="CVE-2016-8207" level="LOW">
<product>network_advisor:14.0.2</product>
</cve>
<cve id="CVE-2016-8201" level="MEDIUM">
<product>virtual_traffic_manager:11.0</product>
</cve>
<cve id="CVE-2016-8202" level="LOW">
<product>fabric_os:7.4.1c</product>
<product>fabric_os:8.0.1b</product>
</cve>
<cve id="CVE-2016-8203" level="LOW">
<product>netiron_os:5.8.00e</product>
<product>netiron_os:5.9.00bd</product>
<product>netiron_os:6.0.00</product>
<product>netiron_os:6.0.00a</product>
</cve>
<cve id="CVE-2016-8209" level="LOW">
<product>netiron_cer_series_firmware:-</product>
<product>netiron_ces_series_firmware:-</product>
<product>netiron_mlx_series_firmware:-</product>
<product>netiron_xmr_series_firmware:-</product>
</cve>
<cve id="CVE-2016-0059" level="MEDIUM">
<product>internet_explorer:9</product>
<product>internet_explorer:10</product>
<product>internet_explorer:11</product>
</cve>
<cve id="CVE-2016-10532" level="LOW">
<product>console-io:2.2.13</product>
</cve>
<cve id="CVE-2016-10533" level="LOW">
<product>express-restify-mongoose:2.4.2</product>
</cve>
<cve id="CVE-2016-10530" level="MEDIUM">
<product>airbrake:0.3.8</product>
</cve>
<cve id="CVE-2016-10531" level="MEDIUM">
<product>marked:0.3.5</product>
</cve>
<cve id="CVE-2016-10536" level="MEDIUM">
<product>engine.io-client:1.6.8</product>
</cve>
<cve id="CVE-2016-10025" level="LOW">
<product>xenserver:6.0.2</product>
<product>xenserver:6.2.0</product>
<product>xenserver:6.5</product>
<product>xenserver:7.0</product>
<product>xen:4.6.0</product>
<product>xen:4.6.1</product>
<product>xen:4.6.3</product>
<product>xen:4.6.4</product>
<product>xen:4.7.0</product>
<product>xen:4.7.1</product>
<product>xen:4.8.0</product>
</cve>
<cve id="CVE-2016-10026" level="LOW">
<product>ikiwiki:3.20161219</product>
</cve>
<cve id="CVE-2016-10027" level="HIGH">
<product>smack:4.1.8</product>
<product>fedora:25</product>
</cve>
<cve id="CVE-2016-10028" level="LOW">
<product>qemu</product>
</cve>
<cve id="CVE-2016-10029" level="LOW">
<product>qemu</product>
</cve>
<cve id="CVE-2016-10539" level="LOW">
<product>negotiator:0.6.0</product>
</cve>
<cve id="CVE-2016-1184" level="MEDIUM">
<product>tokyo_star_bank:1.3</product>
</cve>
<cve id="CVE-2016-1185" level="HIGH">
<product>kintone:1.0.0</product>
<product>kintone:1.0.1</product>
<product>kintone:1.0.2</product>
<product>kintone:1.0.3</product>
<product>kintone:1.0.4</product>
<product>kintone:1.0.5</product>
</cve>
<cve id="CVE-2016-1186" level="MEDIUM">
<product>kintone:1.0.0</product>
<product>kintone:1.0.1</product>
<product>kintone:1.0.2</product>
<product>kintone:1.0.3</product>
<product>kintone:1.0.4</product>
<product>kintone:1.0.5</product>
</cve>
<cve id="CVE-2016-1187" level="MEDIUM">
<product>kunai:2.0.3</product>
<product>kunai:2.0.3.1</product>
<product>kunai:2.0.4</product>
<product>kunai:2.0.5</product>
<product>kunai:2.1.0</product>
<product>kunai:2.1.1</product>
<product>kunai:2.1.2</product>
<product>kunai:2.1.3</product>
<product>kunai:3.0.0</product>
<product>kunai:3.0.0</product>
<product>kunai:3.0.1</product>
<product>kunai:3.0.1</product>
<product>kunai:3.0.2</product>
<product>kunai:3.0.2</product>
<product>kunai:3.0.3</product>
<product>kunai:3.0.3</product>
<product>kunai:3.0.4</product>
<product>kunai:3.0.4</product>
<product>kunai:3.0.6</product>
<product>kunai:3.0.7</product>
<product>kunai:3.0._5</product>
<product>kunai:3.1.0</product>
<product>kunai:3.1.1</product>
<product>kunai:3.1.2</product>
<product>kunai:3.1.3</product>
<product>kunai:3.1.4</product>
<product>kunai:3.1.5</product>
</cve>
<cve id="CVE-2016-1180" level="MEDIUM">
<product>social-button_premium:1.0</product>
</cve>
<cve id="CVE-2016-1181" level="MEDIUM">
<product>struts:1.0</product>
<product>struts:1.0.2</product>
<product>struts:1.1</product>
<product>struts:1.1</product>
<product>struts:1.1</product>
<product>struts:1.1</product>
<product>struts:1.1</product>
<product>struts:1.1</product>
<product>struts:1.2.2</product>
<product>struts:1.2.4</product>
<product>struts:1.2.6</product>
<product>struts:1.2.7</product>
<product>struts:1.2.8</product>
<product>struts:1.2.9</product>
<product>struts:1.3.5</product>
<product>struts:1.3.8</product>
<product>struts:1.3.10</product>
<product>banking_platform:2.3.0</product>
<product>banking_platform:2.4.0</product>
<product>banking_platform:2.4.1</product>
<product>banking_platform:2.5.0</product>
<product>portal:11.1.1.6</product>
</cve>
<cve id="CVE-2016-1182" level="LOW">
<product>struts:1.0</product>
<product>struts:1.0.2</product>
<product>struts:1.1</product>
<product>struts:1.1</product>
<product>struts:1.1</product>
<product>struts:1.1</product>
<product>struts:1.1</product>
<product>struts:1.1</product>
<product>struts:1.2.2</product>
<product>struts:1.2.4</product>
<product>struts:1.2.6</product>
<product>struts:1.2.7</product>
<product>struts:1.2.8</product>
<product>struts:1.2.9</product>
<product>struts:1.3.5</product>
<product>struts:1.3.8</product>
<product>struts:1.3.10</product>
</cve>
<cve id="CVE-2016-1183" level="MEDIUM">
<product>terasoluna_server_framework_for_java_web:2.0.0.1</product>
<product>terasoluna_server_framework_for_java_web:2.0.0.2</product>
<product>terasoluna_server_framework_for_java_web:2.0.1.0</product>
<product>terasoluna_server_framework_for_java_web:2.0.2.0</product>
<product>terasoluna_server_framework_for_java_web:2.0.5.1</product>
<product>terasoluna_server_framework_for_java_web:2.0.5.2</product>
<product>terasoluna_server_framework_for_java_web:2.0.5.3</product>
<product>terasoluna_server_framework_for_java_web:2.0.6.1</product>
</cve>
<cve id="CVE-2016-1188" level="LOW">
<product>garoon:3.1.0</product>
<product>garoon:3.1.1</product>
<product>garoon:3.1.2</product>
<product>garoon:3.1.3</product>
<product>garoon:3.5.0</product>
<product>garoon:3.5.1</product>
<product>garoon:3.5.2</product>
<product>garoon:3.5.3</product>
<product>garoon:3.5.4</product>
<product>garoon:3.5.5</product>
<product>garoon:3.7.0</product>
<product>garoon:3.7.1</product>
<product>garoon:3.7.2</product>
<product>garoon:3.7.3</product>
<product>garoon:3.7.4</product>
<product>garoon:3.7.5</product>
<product>garoon:4.0.0</product>
<product>garoon:4.0.1</product>
<product>garoon:4.0.2</product>
<product>garoon:4.0.3</product>
<product>garoon:4.2.0</product>
</cve>
<cve id="CVE-2016-1189" level="LOW">
<product>garoon:3.1.0</product>
<product>garoon:3.1.1</product>
<product>garoon:3.1.2</product>
<product>garoon:3.1.3</product>
<product>garoon:3.5.0</product>
<product>garoon:3.5.1</product>
<product>garoon:3.5.2</product>
<product>garoon:3.5.3</product>
<product>garoon:3.5.4</product>
<product>garoon:3.5.5</product>
<product>garoon:3.7.0</product>
<product>garoon:3.7.1</product>
<product>garoon:3.7.2</product>
<product>garoon:3.7.3</product>
<product>garoon:3.7.4</product>
<product>garoon:3.7.5</product>
<product>garoon:4.0.0</product>
<product>garoon:4.0.1</product>
<product>garoon:4.0.2</product>
<product>garoon:4.0.3</product>
<product>garoon:4.2.0</product>
</cve>
<cve id="CVE-2016-2570" level="LOW">
<product>squid:3.0</product>
<product>squid:3.0</product>
<product>squid:3.0</product>
<product>squid:3.0</product>
<product>squid:3.0</product>
<product>squid:3.0</product>
<product>squid:3.0</product>
<product>squid:3.0</product>
<product>squid:3.0</product>
<product>squid:3.0.stable1</product>
<product>squid:3.0.stable2</product>
<product>squid:3.0.stable3</product>
<product>squid:3.0.stable4</product>
<product>squid:3.0.stable5</product>
<product>squid:3.0.stable6</product>
<product>squid:3.0.stable7</product>
<product>squid:3.0.stable8</product>
<product>squid:3.0.stable9</product>
<product>squid:3.0.stable10</product>
<product>squid:3.0.stable11</product>
<product>squid:3.0.stable11</product>
<product>squid:3.0.stable12</product>
<product>squid:3.0.stable13</product>
<product>squid:3.0.stable14</product>
<product>squid:3.0.stable15</product>
<product>squid:3.0.stable16</product>
<product>squid:3.0.stable16</product>
<product>squid:3.0.stable17</product>
<product>squid:3.0.stable18</product>
<product>squid:3.0.stable19</product>
<product>squid:3.0.stable20</product>
<product>squid:3.0.stable21</product>
<product>squid:3.0.stable22</product>
<product>squid:3.0.stable23</product>
<product>squid:3.0.stable24</product>
<product>squid:3.0.stable25</product>
<product>squid:3.1</product>
<product>squid:3.1.0.1</product>
<product>squid:3.1.0.2</product>
<product>squid:3.1.0.3</product>
<product>squid:3.1.0.4</product>
<product>squid:3.1.0.5</product>
<product>squid:3.1.0.6</product>
<product>squid:3.1.0.7</product>
<product>squid:3.1.0.8</product>
<product>squid:3.1.0.9</product>
<product>squid:3.1.0.10</product>
<product>squid:3.1.0.11</product>
<product>squid:3.1.0.12</product>
<product>squid:3.1.0.13</product>
<product>squid:3.1.0.14</product>
<product>squid:3.1.0.15</product>
<product>squid:3.1.0.16</product>
<product>squid:3.1.0.17</product>
<product>squid:3.1.0.18</product>
<product>squid:3.1.1</product>
<product>squid:3.1.2</product>
<product>squid:3.1.3</product>
<product>squid:3.1.4</product>
<product>squid:3.1.5</product>
<product>squid:3.1.5.1</product>
<product>squid:3.1.6</product>
<product>squid:3.1.7</product>
<product>squid:3.1.8</product>
<product>squid:3.1.9</product>
<product>squid:3.1.10</product>
<product>squid:3.1.11</product>
<product>squid:3.1.12</product>
<product>squid:3.1.13</product>
<product>squid:3.1.14</product>
<product>squid:3.1.15</product>
<product>squid:3.2.0.1</product>
<product>squid:3.2.0.2</product>
<product>squid:3.2.0.3</product>
<product>squid:3.2.0.4</product>
<product>squid:3.2.0.5</product>
<product>squid:3.2.0.6</product>
<product>squid:3.2.0.7</product>
<product>squid:3.2.0.8</product>
<product>squid:3.2.0.9</product>
<product>squid:3.2.0.10</product>
<product>squid:3.2.0.11</product>
<product>squid:3.2.0.12</product>
<product>squid:3.2.0.13</product>
<product>squid:3.2.0.14</product>
<product>squid:3.2.0.15</product>
<product>squid:3.2.0.16</product>
<product>squid:3.2.0.17</product>
<product>squid:3.2.0.18</product>
<product>squid:3.2.0.19</product>
<product>squid:3.2.1</product>
<product>squid:3.2.2</product>
<product>squid:3.2.3</product>
<product>squid:3.2.4</product>
<product>squid:3.2.5</product>
<product>squid:3.2.6</product>
<product>squid:3.2.7</product>
<product>squid:3.2.8</product>
<product>squid:3.2.9</product>
<product>squid:3.2.10</product>
<product>squid:3.2.11</product>
<product>squid:3.2.12</product>
<product>squid:3.2.13</product>
<product>squid:3.3.0</product>
<product>squid:3.3.0.2</product>
<product>squid:3.3.0.3</product>
<product>squid:3.3.1</product>
<product>squid:3.3.2</product>
<product>squid:3.3.3</product>
<product>squid:3.3.4</product>
<product>squid:3.3.5</product>
<product>squid:3.3.6</product>
<product>squid:3.3.7</product>
<product>squid:3.3.8</product>
<product>squid:3.3.9</product>
<product>squid:3.3.10</product>
<product>squid:3.3.11</product>
<product>squid:3.3.12</product>
<product>squid:3.3.13</product>
<product>squid:3.4.0.1</product>
<product>squid:3.4.0.2</product>
<product>squid:3.4.0.3</product>
<product>squid:3.4.1</product>
<product>squid:3.4.2</product>
<product>squid:3.4.3</product>
<product>squid:3.4.4</product>
<product>squid:3.4.8</product>
<product>squid:3.4.9</product>
<product>squid:3.4.10</product>
<product>squid:3.4.11</product>
<product>squid:3.4.12</product>
<product>squid:3.4.13</product>
<product>squid:3.5.0.1</product>
<product>squid:3.5.0.2</product>
<product>squid:3.5.0.3</product>
<product>squid:3.5.0.4</product>
<product>squid:3.5.1</product>
<product>squid:4.0.1</product>
<product>squid:4.0.2</product>
<product>squid:4.0.3</product>
<product>squid:4.0.4</product>
<product>squid:4.0.5</product>
<product>squid:4.0.6</product>
</cve>
<cve id="CVE-2016-2571" level="LOW">
<product>squid:3.0</product>
<product>squid:3.0</product>
<product>squid:3.0</product>
<product>squid:3.0</product>
<product>squid:3.0</product>
<product>squid:3.0</product>
<product>squid:3.0</product>
<product>squid:3.0</product>
<product>squid:3.0</product>
<product>squid:3.0.stable1</product>
<product>squid:3.0.stable2</product>
<product>squid:3.0.stable3</product>
<product>squid:3.0.stable4</product>
<product>squid:3.0.stable5</product>
<product>squid:3.0.stable6</product>
<product>squid:3.0.stable7</product>
<product>squid:3.0.stable8</product>
<product>squid:3.0.stable9</product>
<product>squid:3.0.stable10</product>
<product>squid:3.0.stable11</product>
<product>squid:3.0.stable11</product>
<product>squid:3.0.stable12</product>
<product>squid:3.0.stable13</product>
<product>squid:3.0.stable14</product>
<product>squid:3.0.stable15</product>
<product>squid:3.0.stable16</product>
<product>squid:3.0.stable16</product>
<product>squid:3.0.stable17</product>
<product>squid:3.0.stable18</product>
<product>squid:3.0.stable19</product>
<product>squid:3.0.stable20</product>
<product>squid:3.0.stable21</product>
<product>squid:3.0.stable22</product>
<product>squid:3.0.stable23</product>
<product>squid:3.0.stable24</product>
<product>squid:3.0.stable25</product>
<product>squid:3.1</product>
<product>squid:3.1.0.1</product>
<product>squid:3.1.0.2</product>
<product>squid:3.1.0.3</product>
<product>squid:3.1.0.4</product>
<product>squid:3.1.0.5</product>
<product>squid:3.1.0.6</product>
<product>squid:3.1.0.7</product>
<product>squid:3.1.0.8</product>
<product>squid:3.1.0.9</product>
<product>squid:3.1.0.10</product>
<product>squid:3.1.0.11</product>
<product>squid:3.1.0.12</product>
<product>squid:3.1.0.13</product>
<product>squid:3.1.0.14</product>
<product>squid:3.1.0.15</product>
<product>squid:3.1.0.16</product>
<product>squid:3.1.0.17</product>
<product>squid:3.1.0.18</product>
<product>squid:3.1.1</product>
<product>squid:3.1.2</product>
<product>squid:3.1.3</product>
<product>squid:3.1.4</product>
<product>squid:3.1.5</product>
<product>squid:3.1.5.1</product>
<product>squid:3.1.6</product>
<product>squid:3.1.7</product>
<product>squid:3.1.8</product>
<product>squid:3.1.9</product>
<product>squid:3.1.10</product>
<product>squid:3.1.11</product>
<product>squid:3.1.12</product>
<product>squid:3.1.13</product>
<product>squid:3.1.14</product>
<product>squid:3.1.15</product>
<product>squid:3.2.0.1</product>
<product>squid:3.2.0.2</product>
<product>squid:3.2.0.3</product>
<product>squid:3.2.0.4</product>
<product>squid:3.2.0.5</product>
<product>squid:3.2.0.6</product>
<product>squid:3.2.0.7</product>
<product>squid:3.2.0.8</product>
<product>squid:3.2.0.9</product>
<product>squid:3.2.0.10</product>
<product>squid:3.2.0.11</product>
<product>squid:3.2.0.12</product>
<product>squid:3.2.0.13</product>
<product>squid:3.2.0.14</product>
<product>squid:3.2.0.15</product>
<product>squid:3.2.0.16</product>
<product>squid:3.2.0.17</product>
<product>squid:3.2.0.18</product>
<product>squid:3.2.0.19</product>
<product>squid:3.2.1</product>
<product>squid:3.2.2</product>
<product>squid:3.2.3</product>
<product>squid:3.2.4</product>
<product>squid:3.2.5</product>
<product>squid:3.2.6</product>
<product>squid:3.2.7</product>
<product>squid:3.2.8</product>
<product>squid:3.2.9</product>
<product>squid:3.2.10</product>
<product>squid:3.2.11</product>
<product>squid:3.2.12</product>
<product>squid:3.2.13</product>
<product>squid:3.3.0</product>
<product>squid:3.3.0.2</product>
<product>squid:3.3.0.3</product>
<product>squid:3.3.1</product>
<product>squid:3.3.2</product>
<product>squid:3.3.3</product>
<product>squid:3.3.4</product>
<product>squid:3.3.5</product>
<product>squid:3.3.6</product>
<product>squid:3.3.7</product>
<product>squid:3.3.8</product>
<product>squid:3.3.9</product>
<product>squid:3.3.10</product>
<product>squid:3.3.11</product>
<product>squid:3.3.12</product>
<product>squid:3.3.13</product>
<product>squid:3.4.0.1</product>
<product>squid:3.4.0.2</product>
<product>squid:3.4.0.3</product>
<product>squid:3.4.1</product>
<product>squid:3.4.2</product>
<product>squid:3.4.3</product>
<product>squid:3.4.4</product>
<product>squid:3.4.8</product>
<product>squid:3.4.9</product>
<product>squid:3.4.10</product>
<product>squid:3.4.11</product>
<product>squid:3.4.12</product>
<product>squid:3.4.13</product>
<product>squid:3.5.0.1</product>
<product>squid:3.5.0.2</product>
<product>squid:3.5.0.3</product>
<product>squid:3.5.0.4</product>
<product>squid:3.5.1</product>
<product>squid:4.0.1</product>
<product>squid:4.0.2</product>
<product>squid:4.0.3</product>
<product>squid:4.0.4</product>
<product>squid:4.0.5</product>
<product>squid:4.0.6</product>
</cve>
<cve id="CVE-2016-2572" level="LOW">
<product>squid:4.0.1</product>
<product>squid:4.0.2</product>
<product>squid:4.0.3</product>
<product>squid:4.0.4</product>
<product>squid:4.0.5</product>
<product>squid:4.0.6</product>
</cve>
<cve id="CVE-2016-4754" level="LOW">
<product>os_x_server:5.1</product>
</cve>
<cve id="CVE-2016-5409" level="LOW">
<product>openshift:2.0</product>
</cve>
<cve id="CVE-2016-5407" level="LOW">
<product>libxv:1.0.10</product>
<product>fedora:24</product>
<product>fedora:25</product>
</cve>
<cve id="CVE-2016-5406" level="LOW">
<product>jboss_enterprise_application_platform:7.0.1</product>
</cve>
<cve id="CVE-2016-5401" level="MEDIUM">
<product>jboss_bpm_suite:6.0.0</product>
<product>jboss_enterprise_brms_platform:6.0.0</product>
</cve>
<cve id="CVE-2016-6273" level="LOW">
<product>license_server:11.14.0.0</product>
<product>license_server_vpx:11.14.0.0</product>
</cve>
<cve id="CVE-2016-6272" level="LOW">
<product>mychart:-</product>
</cve>
<cve id="CVE-2016-6271" level="LOW">
<product>bzrtp:1.0.0</product>
<product>bzrtp:1.0.2</product>
<product>bzrtp:1.0.3</product>
</cve>
<cve id="CVE-2016-6270" level="LOW">
<product>virtual_mobile_infrastructure:5.0</product>
</cve>
<cve id="CVE-2016-6277" level="MEDIUM">
<product>d6220_firmware:1.0.0.22</product>
<product>d6400_firmware:1.0.0.56</product>
<product>r6250_firmware:1.0.4.6_10.1.12</product>
<product>r6400_firmware:1.0.1.18</product>
<product>r6700_firmware:1.0.1.14</product>
<product>r6900_firmware:1.0.1.14</product>
<product>r7000_firmware:1.0.7.2_1.1.93</product>
<product>r7100lg_firmware:1.0.0.28</product>
<product>r7300dst_firmware:1.0.0.46</product>
<product>r7900_firmware:1.0.1.8</product>
<product>r8000_firmware:1.0.3.26</product>
</cve>
<cve id="CVE-2016-7583" level="LOW">
<product>icloud:6.0.0</product>
</cve>
<cve id="CVE-2016-6189" level="LOW">
<product>sogo:2.3.11</product>
<product>sogo:3.0.0</product>
<product>sogo:3.0.0</product>
<product>sogo:3.0.0</product>
<product>sogo:3.0.0</product>
<product>sogo:3.0.0</product>
<product>sogo:3.0.0</product>
<product>sogo:3.0.1</product>
<product>sogo:3.0.2</product>
<product>sogo:3.1.0</product>
</cve>
<cve id="CVE-2016-6188" level="LOW">
<product>sogo:2..3.7</product>
</cve>
<cve id="CVE-2016-6181" level="MEDIUM">
<product>honor_4c_firmware:chm-tl00c01_b535</product>
<product>honor_4c_firmware:chm-tl00c01b556</product>
<product>honor_4c_firmware:chm-tl00hc00_b535</product>
<product>honor_4c_firmware:chm-tl00hc00b556</product>
<product>honor_4c_firmware:chm-ul00c00b535</product>
<product>honor_4c_firmware:chm-ul00c00b556</product>
</cve>
<cve id="CVE-2016-6180" level="MEDIUM">
<product>honor_4c_firmware:chm-tl00c01_b535</product>
<product>honor_4c_firmware:chm-tl00c01b556</product>
<product>honor_4c_firmware:chm-tl00hc00_b535</product>
<product>honor_4c_firmware:chm-tl00hc00b556</product>
<product>honor_4c_firmware:chm-ul00c00b535</product>
<product>honor_4c_firmware:chm-ul00c00b556</product>
</cve>
<cve id="CVE-2016-6183" level="MEDIUM">
<product>honor_4c_firmware:chm-tl00c01_b535</product>
<product>honor_4c_firmware:chm-tl00c01b556</product>
<product>honor_4c_firmware:chm-tl00hc00_b535</product>
<product>honor_4c_firmware:chm-tl00hc00b556</product>
<product>honor_4c_firmware:chm-ul00c00b535</product>
<product>honor_4c_firmware:chm-ul00c00b556</product>
</cve>
<cve id="CVE-2016-6182" level="MEDIUM">
<product>honor_4c_firmware:chm-tl00c01_b535</product>
<product>honor_4c_firmware:chm-tl00c01b556</product>
<product>honor_4c_firmware:chm-tl00hc00_b535</product>
<product>honor_4c_firmware:chm-tl00hc00b556</product>
<product>honor_4c_firmware:chm-ul00c00b535</product>
<product>honor_4c_firmware:chm-ul00c00b556</product>
</cve>
<cve id="CVE-2016-6184" level="MEDIUM">
<product>honor_4c_firmware:chm-tl00c01_b535</product>
<product>honor_4c_firmware:chm-tl00c01b556</product>
<product>honor_4c_firmware:chm-tl00hc00_b535</product>
<product>honor_4c_firmware:chm-tl00hc00b556</product>
<product>honor_4c_firmware:chm-ul00c00b535</product>
<product>honor_4c_firmware:chm-ul00c00b556</product>
</cve>
<cve id="CVE-2016-10709" level="LOW">
<product>pfsense:2.2.6</product>
</cve>
<cve id="CVE-2016-10701" level="MEDIUM">
<product>pentaho_business_analytics:8.0</product>
</cve>
<cve id="CVE-2016-10700" level="LOW">
<product>cacti:0.8</product>
<product>cacti:0.8.1</product>
<product>cacti:0.8.2</product>
<product>cacti:0.8.2a</product>
<product>cacti:0.8.3</product>
<product>cacti:0.8.3a</product>
<product>cacti:0.8.4</product>
<product>cacti:0.8.5</product>
<product>cacti:0.8.5a</product>
<product>cacti:0.8.6</product>
<product>cacti:0.8.6a</product>
<product>cacti:0.8.6b</product>
<product>cacti:0.8.6c</product>
<product>cacti:0.8.6d</product>
<product>cacti:0.8.6e</product>
<product>cacti:0.8.6f</product>
<product>cacti:0.8.6g</product>
<product>cacti:0.8.6h</product>
<product>cacti:0.8.6i</product>
<product>cacti:0.8.6j</product>
<product>cacti:0.8.6k</product>
<product>cacti:0.8.7</product>
<product>cacti:0.8.7a</product>
<product>cacti:0.8.7b</product>
<product>cacti:0.8.7c</product>
<product>cacti:0.8.7d</product>
<product>cacti:0.8.7e</product>
<product>cacti:0.8.7f</product>
<product>cacti:0.8.7g</product>
<product>cacti:0.8.7h</product>
<product>cacti:0.8.7i</product>
<product>cacti:0.8.8</product>
<product>cacti:0.8.8a</product>
<product>cacti:0.8.8b</product>
<product>cacti:0.8.8c</product>
<product>cacti:0.8.8d</product>
<product>cacti:0.8.8f</product>
<product>cacti:0.8.8g</product>
</cve>
<cve id="CVE-2016-10702" level="MEDIUM">
<product>pebble_firmware:4.3</product>
</cve>
<cve id="CVE-2016-10705" level="MEDIUM">
<product>jetpack:4.0.3</product>
</cve>
<cve id="CVE-2016-10704" level="MEDIUM">
<product>magento:1.9.1.0</product>
<product>magento:1.9.2.2</product>
<product>magento:1.14.1.0</product>
<product>magento:1.14.2.2</product>
</cve>
<cve id="CVE-2016-10707" level="LOW">
<product>jquery:3.0.0</product>
</cve>
<cve id="CVE-2016-10706" level="MEDIUM">
<product>jetpack:1.2</product>
<product>jetpack:1.2.1</product>
<product>jetpack:1.2.2</product>
<product>jetpack:1.2.3</product>
<product>jetpack:1.2.4</product>
<product>jetpack:1.3</product>
<product>jetpack:1.3.1</product>
<product>jetpack:1.3.2</product>
<product>jetpack:1.3.3</product>
<product>jetpack:1.3.4</product>
<product>jetpack:1.4</product>
<product>jetpack:1.4.1</product>
<product>jetpack:1.4.2</product>
<product>jetpack:1.5</product>
<product>jetpack:1.6</product>
<product>jetpack:1.6.1</product>
<product>jetpack:1.7</product>
<product>jetpack:1.8</product>
<product>jetpack:1.8.1</product>
<product>jetpack:1.8.2</product>
<product>jetpack:1.8.3</product>
<product>jetpack:1.9</product>
<product>jetpack:1.9.1</product>
<product>jetpack:1.9.2</product>
<product>jetpack:2.0</product>
<product>jetpack:2.0.1</product>
<product>jetpack:2.0.2</product>
<product>jetpack:2.0.3</product>
<product>jetpack:2.0.4</product>
<product>jetpack:2.1</product>
<product>jetpack:2.1.1</product>
<product>jetpack:2.1.2</product>
<product>jetpack:2.2</product>
<product>jetpack:2.2.1</product>
<product>jetpack:2.2.2</product>
<product>jetpack:2.2.3</product>
<product>jetpack:2.2.4</product>
<product>jetpack:2.2.5</product>
<product>jetpack:2.3</product>
<product>jetpack:2.3.1</product>
<product>jetpack:2.3.2</product>
<product>jetpack:2.3.3</product>
<product>jetpack:2.3.4</product>
<product>jetpack:2.3.5</product>
<product>jetpack:2.4</product>
<product>jetpack:2.4.1</product>
<product>jetpack:2.4.2</product>
<product>jetpack:2.5</product>
<product>jetpack:2.6</product>
<product>jetpack:2.6.1</product>
<product>jetpack:2.7</product>
<product>jetpack:2.8</product>
<product>jetpack:2.9</product>
<product>jetpack:2.9.1</product>
<product>jetpack:2.9.2</product>
<product>jetpack:2.9.3</product>
</cve>
<cve id="CVE-2016-2884" level="MEDIUM">
<product>forms_experience_builder:8.5.0.0</product>
<product>forms_experience_builder:8.5.1.0</product>
<product>forms_experience_builder:8.5.1.1</product>
<product>forms_experience_builder:8.6.0.0</product>
<product>forms_experience_builder:8.6.1</product>
<product>forms_experience_builder:8.6.1.1</product>
<product>forms_experience_builder:8.6.2</product>
<product>forms_experience_builder:8.6.2.1</product>
<product>forms_experience_builder:8.6.3</product>
</cve>
<cve id="CVE-2016-6988" level="LOW">
<product>acrobat:11.0.17</product>
<product>acrobat_dc:15.006.30201</product>
<product>acrobat_dc:15.017.20053</product>
<product>acrobat_reader_dc:15.006.30201</product>
<product>acrobat_reader_dc:15.017.20053</product>
<product>reader:11.0.17</product>
</cve>
<cve id="CVE-2016-2887" level="LOW">
<product>ims_enterprise_suite:3.2.0.0</product>
</cve>
<cve id="CVE-2016-7054" level="LOW">
<product>openssl:1.1.0</product>
<product>openssl:1.1.0a</product>
<product>openssl:1.1.0b</product>
</cve>
<cve id="CVE-2016-7055" level="HIGH">
<product>openssl:1.0.2</product>
<product>openssl:1.1.0b</product>
</cve>
<cve id="CVE-2016-7051" level="LOW">
<product>jackson:2.7.7</product>
<product>jackson:2.8.0</product>
<product>jackson:2.8.0</product>
<product>jackson:2.8.0</product>
<product>jackson:2.8.1</product>
<product>jackson:2.8.2</product>
<product>jackson:2.8.3</product>
</cve>
<cve id="CVE-2016-7052" level="LOW">
<product>openssl:1.0.2i</product>
<product>suse_linux_enterprise_module_for_web_scripting:12.0</product>
</cve>
<cve id="CVE-2016-7053" level="LOW">
<product>openssl:1.1.0</product>
<product>openssl:1.1.0a</product>
<product>openssl:1.1.0b</product>
</cve>
<cve id="CVE-2016-3248" level="MEDIUM">
<product>edge</product>
<product>internet_explorer:9</product>
<product>internet_explorer:10</product>
<product>internet_explorer:11</product>
</cve>
<cve id="CVE-2016-3245" level="MEDIUM">
<product>internet_explorer:9</product>
<product>internet_explorer:10</product>
<product>internet_explorer:11</product>
</cve>
<cve id="CVE-2016-3244" level="MEDIUM">
<product>edge</product>
</cve>
<cve id="CVE-2016-3247" level="HIGH">
<product>edge:-</product>
<product>internet_explorer:11</product>
</cve>
<cve id="CVE-2016-3246" level="HIGH">
<product>edge</product>
</cve>
<cve id="CVE-2016-3241" level="HIGH">
<product>internet_explorer:9</product>
<product>internet_explorer:10</product>
<product>internet_explorer:11</product>
</cve>
<cve id="CVE-2016-3240" level="HIGH">
<product>internet_explorer:9</product>
<product>internet_explorer:10</product>
<product>internet_explorer:11</product>
</cve>
<cve id="CVE-2016-3243" level="HIGH">
<product>internet_explorer:10</product>
<product>internet_explorer:11</product>
</cve>
<cve id="CVE-2016-3242" level="HIGH">
<product>internet_explorer:9</product>
<product>internet_explorer:10</product>
<product>internet_explorer:11</product>
</cve>
<cve id="CVE-2016-1067" level="LOW">
<product>acrobat:11.0.15</product>
<product>acrobat_dc:15.006.30121</product>
<product>acrobat_dc:15.010.20060</product>
<product>acrobat_reader_dc:15.006.30121</product>
<product>acrobat_reader_dc:15.010.20060</product>
<product>reader:11.0.15</product>
</cve>
<cve id="CVE-2016-1066" level="LOW">
<product>acrobat:11.0.15</product>
<product>acrobat_dc:15.006.30121</product>
<product>acrobat_dc:15.010.20060</product>
<product>acrobat_reader_dc:15.006.30121</product>
<product>acrobat_reader_dc:15.010.20060</product>
<product>reader:11.0.15</product>
</cve>
<cve id="CVE-2016-1065" level="LOW">
<product>acrobat:11.0.15</product>
<product>acrobat_dc:15.006.30121</product>
<product>acrobat_dc:15.010.20060</product>
<product>acrobat_reader_dc:15.006.30121</product>
<product>acrobat_reader_dc:15.010.20060</product>
<product>reader:11.0.15</product>
</cve>
<cve id="CVE-2016-1064" level="LOW">
<product>acrobat:11.0.15</product>
<product>acrobat_dc:15.006.30121</product>
<product>acrobat_dc:15.010.20060</product>
<product>acrobat_reader_dc:15.006.30121</product>
<product>acrobat_reader_dc:15.010.20060</product>
<product>reader:11.0.15</product>
</cve>
<cve id="CVE-2016-1063" level="LOW">
<product>acrobat:11.0.15</product>
<product>acrobat_dc:15.006.30121</product>
<product>acrobat_dc:15.010.20060</product>
<product>acrobat_reader_dc:15.006.30121</product>
<product>acrobat_reader_dc:15.010.20060</product>
<product>reader:11.0.15</product>
</cve>
<cve id="CVE-2016-1062" level="LOW">
<product>acrobat:11.0.15</product>
<product>acrobat_dc:15.006.30121</product>
<product>acrobat_dc:15.010.20060</product>
<product>acrobat_reader_dc:15.006.30121</product>
<product>acrobat_reader_dc:15.010.20060</product>
<product>reader:11.0.15</product>
</cve>
<cve id="CVE-2016-1061" level="LOW">
<product>acrobat:11.0.15</product>
<product>acrobat_dc:15.006.30121</product>
<product>acrobat_dc:15.010.20060</product>
<product>acrobat_reader_dc:15.006.30121</product>
<product>acrobat_reader_dc:15.010.20060</product>
<product>reader:11.0.15</product>
</cve>
<cve id="CVE-2016-1060" level="LOW">
<product>acrobat:11.0.15</product>
<product>acrobat_dc:15.006.30121</product>
<product>acrobat_dc:15.010.20060</product>
<product>acrobat_reader_dc:15.006.30121</product>
<product>acrobat_reader_dc:15.010.20060</product>
<product>reader:11.0.15</product>
</cve>
<cve id="CVE-2016-1069" level="LOW">
<product>acrobat:11.0.15</product>
<product>acrobat_dc:15.006.30121</product>
<product>acrobat_dc:15.010.20060</product>
<product>acrobat_reader_dc:15.006.30121</product>
<product>acrobat_reader_dc:15.010.20060</product>
<product>reader:11.0.15</product>
</cve>
<cve id="CVE-2016-1068" level="LOW">
<product>acrobat:11.0.15</product>
<product>acrobat_dc:15.006.30121</product>
<product>acrobat_dc:15.010.20060</product>
<product>acrobat_reader_dc:15.006.30121</product>
<product>acrobat_reader_dc:15.010.20060</product>
<product>reader:11.0.15</product>
</cve>
<cve id="CVE-2016-5980" level="MEDIUM">
<product>tririga_application_platform:3.3.0.0</product>
<product>tririga_application_platform:3.3.0.1</product>
<product>tririga_application_platform:3.3.0.2</product>
<product>tririga_application_platform:3.3.1.0</product>
<product>tririga_application_platform:3.3.1.1</product>
<product>tririga_application_platform:3.3.1.2</product>
<product>tririga_application_platform:3.3.1.3</product>
<product>tririga_application_platform:3.3.2.0</product>
<product>tririga_application_platform:3.3.2.1</product>
<product>tririga_application_platform:3.3.2.2</product>
<product>tririga_application_platform:3.3.2.3</product>
<product>tririga_application_platform:3.3.2.4</product>
<product>tririga_application_platform:3.3.2.5</product>
<product>tririga_application_platform:3.4.0.0</product>
<product>tririga_application_platform:3.4.0.1</product>
<product>tririga_application_platform:3.4.1.0</product>
<product>tririga_application_platform:3.4.1.1</product>
<product>tririga_application_platform:3.4.1.2</product>
<product>tririga_application_platform:3.4.1.3</product>
<product>tririga_application_platform:3.4.2.0</product>
<product>tririga_application_platform:3.4.2.1</product>
<product>tririga_application_platform:3.4.2.2</product>
<product>tririga_application_platform:3.4.2.3</product>
<product>tririga_application_platform:3.4.2.4</product>
<product>tririga_application_platform:3.5.0.0</product>
<product>tririga_application_platform:3.5.0.1</product>
<product>tririga_application_platform:3.5.1.0</product>
<product>tririga_application_platform:3.5.1.1</product>
</cve>
<cve id="CVE-2016-5981" level="MEDIUM">
<product>filenet_workplace:4.0.2.14-p8ae-if001</product>
<product>filenet_workplace_xt:1.1.5.2-wpxt-la011</product>
</cve>
<cve id="CVE-2016-5983" level="LOW">
<product>websphere_application_server:7.0</product>
<product>websphere_application_server:7.0.0.0</product>
<product>websphere_application_server:7.0.0.1</product>
<product>websphere_application_server:7.0.0.2</product>
<product>websphere_application_server:7.0.0.3</product>
<product>websphere_application_server:7.0.0.4</product>
<product>websphere_application_server:7.0.0.5</product>
<product>websphere_application_server:7.0.0.6</product>
<product>websphere_application_server:7.0.0.7</product>
<product>websphere_application_server:7.0.0.8</product>
<product>websphere_application_server:7.0.0.9</product>
<product>websphere_application_server:7.0.0.10</product>
<product>websphere_application_server:7.0.0.11</product>
<product>websphere_application_server:7.0.0.12</product>
<product>websphere_application_server:7.0.0.13</product>
<product>websphere_application_server:7.0.0.14</product>
<product>websphere_application_server:7.0.0.15</product>
<product>websphere_application_server:7.0.0.16</product>
<product>websphere_application_server:7.0.0.17</product>
<product>websphere_application_server:7.0.0.18</product>
<product>websphere_application_server:7.0.0.19</product>
<product>websphere_application_server:7.0.0.21</product>
<product>websphere_application_server:7.0.0.22</product>
<product>websphere_application_server:7.0.0.23</product>
<product>websphere_application_server:7.0.0.24</product>
<product>websphere_application_server:7.0.0.25</product>
<product>websphere_application_server:7.0.0.27</product>
<product>websphere_application_server:7.0.0.28</product>
<product>websphere_application_server:7.0.0.29</product>
<product>websphere_application_server:7.0.0.31</product>
<product>websphere_application_server:7.0.0.32</product>
<product>websphere_application_server:7.0.0.33</product>
<product>websphere_application_server:7.0.0.34</product>
<product>websphere_application_server:7.0.0.35</product>
<product>websphere_application_server:7.0.0.36</product>
<product>websphere_application_server:7.0.0.37</product>
<product>websphere_application_server:7.0.0.38</product>
<product>websphere_application_server:7.0.0.39</product>
<product>websphere_application_server:7.0.0.41</product>
<product>websphere_application_server:8.0</product>
<product>websphere_application_server:8.0.0.0</product>
<product>websphere_application_server:8.0.0.1</product>
<product>websphere_application_server:8.0.0.2</product>
<product>websphere_application_server:8.0.0.3</product>
<product>websphere_application_server:8.0.0.4</product>
<product>websphere_application_server:8.0.0.5</product>
<product>websphere_application_server:8.0.0.6</product>
<product>websphere_application_server:8.0.0.7</product>
<product>websphere_application_server:8.0.0.8</product>
<product>websphere_application_server:8.0.0.9</product>
<product>websphere_application_server:8.0.0.10</product>
<product>websphere_application_server:8.0.0.11</product>
<product>websphere_application_server:8.0.0.12</product>
<product>websphere_application_server:8.5.0.0</product>
<product>websphere_application_server:8.5.0.0</product>
<product>websphere_application_server:8.5.0.1</product>
<product>websphere_application_server:8.5.0.2</product>
<product>websphere_application_server:8.5.5.0</product>
<product>websphere_application_server:8.5.5.1</product>
<product>websphere_application_server:8.5.5.2</product>
<product>websphere_application_server:8.5.5.4</product>
<product>websphere_application_server:8.5.5.5</product>
<product>websphere_application_server:8.5.5.6</product>
<product>websphere_application_server:8.5.5.7</product>
<product>websphere_application_server:8.5.5.8</product>
<product>websphere_application_server:8.5.5.9</product>
<product>websphere_application_server:8.5.5.10</product>
<product>websphere_application_server:9.0.0.0</product>
<product>websphere_application_server:9.0.0.1</product>
</cve>
<cve id="CVE-2016-5984" level="MEDIUM">
<product>infosphere_information_server:8.7</product>
<product>infosphere_information_server:9.1</product>
<product>infosphere_information_server:11.3</product>
<product>infosphere_information_server:11.5</product>
<product>infosphere_information_server_on_cloud:11.5</product>
</cve>
<cve id="CVE-2016-5985" level="LOW">
<product>tivoli_storage_manager:5.5</product>
<product>tivoli_storage_manager:6.1</product>
<product>tivoli_storage_manager:6.2</product>
<product>tivoli_storage_manager:6.3.0.0</product>
<product>tivoli_storage_manager:6.3.2.5</product>
<product>tivoli_storage_manager:6.4.0.0</product>
<product>tivoli_storage_manager:6.4.3.3</product>
<product>tivoli_storage_manager:7.1.0.0</product>
<product>tivoli_storage_manager:7.1.6.2</product>
</cve>
<cve id="CVE-2016-5986" level="LOW">
<product>websphere_application_server:7.0</product>
<product>websphere_application_server:7.0.0.0</product>
<product>websphere_application_server:7.0.0.1</product>
<product>websphere_application_server:7.0.0.2</product>
<product>websphere_application_server:7.0.0.3</product>
<product>websphere_application_server:7.0.0.4</product>
<product>websphere_application_server:7.0.0.5</product>
<product>websphere_application_server:7.0.0.6</product>
<product>websphere_application_server:7.0.0.7</product>
<product>websphere_application_server:7.0.0.8</product>
<product>websphere_application_server:7.0.0.9</product>
<product>websphere_application_server:7.0.0.10</product>
<product>websphere_application_server:7.0.0.11</product>
<product>websphere_application_server:7.0.0.12</product>
<product>websphere_application_server:7.0.0.13</product>
<product>websphere_application_server:7.0.0.14</product>
<product>websphere_application_server:7.0.0.15</product>
<product>websphere_application_server:7.0.0.16</product>
<product>websphere_application_server:7.0.0.17</product>
<product>websphere_application_server:7.0.0.18</product>
<product>websphere_application_server:7.0.0.19</product>
<product>websphere_application_server:7.0.0.21</product>
<product>websphere_application_server:7.0.0.22</product>
<product>websphere_application_server:7.0.0.23</product>
<product>websphere_application_server:7.0.0.24</product>
<product>websphere_application_server:7.0.0.25</product>
<product>websphere_application_server:7.0.0.27</product>
<product>websphere_application_server:7.0.0.28</product>
<product>websphere_application_server:7.0.0.29</product>
<product>websphere_application_server:7.0.0.31</product>
<product>websphere_application_server:7.0.0.32</product>
<product>websphere_application_server:7.0.0.33</product>
<product>websphere_application_server:7.0.0.34</product>
<product>websphere_application_server:7.0.0.35</product>
<product>websphere_application_server:7.0.0.36</product>
<product>websphere_application_server:7.0.0.37</product>
<product>websphere_application_server:7.0.0.38</product>
<product>websphere_application_server:7.0.0.39</product>
<product>websphere_application_server:7.0.0.41</product>
<product>websphere_application_server:8.0</product>
<product>websphere_application_server:8.0.0.0</product>
<product>websphere_application_server:8.0.0.1</product>
<product>websphere_application_server:8.0.0.2</product>
<product>websphere_application_server:8.0.0.3</product>
<product>websphere_application_server:8.0.0.4</product>
<product>websphere_application_server:8.0.0.5</product>
<product>websphere_application_server:8.0.0.6</product>
<product>websphere_application_server:8.0.0.7</product>
<product>websphere_application_server:8.0.0.8</product>
<product>websphere_application_server:8.0.0.9</product>
<product>websphere_application_server:8.0.0.10</product>
<product>websphere_application_server:8.0.0.11</product>
<product>websphere_application_server:8.0.0.12</product>
<product>websphere_application_server:8.5.0.0</product>
<product>websphere_application_server:8.5.0.0</product>
<product>websphere_application_server:8.5.0.1</product>
<product>websphere_application_server:8.5.0.2</product>
<product>websphere_application_server:8.5.5.0</product>
<product>websphere_application_server:8.5.5.1</product>
<product>websphere_application_server:8.5.5.2</product>
<product>websphere_application_server:8.5.5.4</product>
<product>websphere_application_server:8.5.5.5</product>
<product>websphere_application_server:8.5.5.6</product>
<product>websphere_application_server:8.5.5.7</product>
<product>websphere_application_server:8.5.5.8</product>
<product>websphere_application_server:8.5.5.9</product>
<product>websphere_application_server:8.5.5.10</product>
<product>websphere_application_server:9.0.0.0</product>
<product>websphere_application_server:9.0.0.1</product>
</cve>
<cve id="CVE-2016-5987" level="LOW">
<product>maximo_asset_management:7.1.0.0</product>
<product>maximo_asset_management:7.1.1</product>
<product>maximo_asset_management:7.1.1.1</product>
<product>maximo_asset_management:7.1.1.2</product>
<product>maximo_asset_management:7.1.1.3</product>
<product>maximo_asset_management:7.1.1.5</product>
<product>maximo_asset_management:7.1.1.6</product>
<product>maximo_asset_management:7.1.1.7</product>
<product>maximo_asset_management:7.1.1.8</product>
<product>maximo_asset_management:7.1.1.9</product>
<product>maximo_asset_management:7.1.1.10</product>
<product>maximo_asset_management:7.1.1.11</product>
<product>maximo_asset_management:7.1.1.12</product>
<product>maximo_asset_management:7.1.1.13</product>
<product>maximo_asset_management:7.1.2</product>
<product>maximo_asset_management:7.5.0.0</product>
<product>maximo_asset_management:7.5.0.1</product>
<product>maximo_asset_management:7.5.0.2</product>
<product>maximo_asset_management:7.5.0.3</product>
<product>maximo_asset_management:7.5.0.4</product>
<product>maximo_asset_management:7.5.0.5</product>
<product>maximo_asset_management:7.5.0.6</product>
<product>maximo_asset_management:7.5.0.7</product>
<product>maximo_asset_management:7.5.0.8</product>
<product>maximo_asset_management:7.5.0.9</product>
<product>maximo_asset_management:7.5.0.10</product>
<product>maximo_asset_management:7.6.0.0</product>
<product>maximo_asset_management:7.6.0.1</product>
<product>maximo_asset_management:7.6.0.2</product>
<product>maximo_asset_management:7.6.0.3</product>
<product>maximo_asset_management:7.6.0.4</product>
</cve>
<cve id="CVE-2016-5988" level="LOW">
<product>security_privileged_identity_manager:2.0.2</product>
<product>security_privileged_identity_manager:2.1</product>
</cve>
<cve id="CVE-2016-1241" level="MEDIUM">
<product>tryton:3.2.0</product>
<product>tryton:3.2.16</product>
<product>tryton:3.4.0</product>
<product>tryton:3.4.1</product>
<product>tryton:3.4.2</product>
<product>tryton:3.4.3</product>
<product>tryton:3.4.4</product>
<product>tryton:3.4.5</product>
<product>tryton:3.4.6</product>
<product>tryton:3.4.7</product>
<product>tryton:3.4.8</product>
<product>tryton:3.4.9</product>
<product>tryton:3.4.10</product>
<product>tryton:3.4.11</product>
<product>tryton:3.4.12</product>
<product>tryton:3.4.13</product>
<product>tryton:3.6.0</product>
<product>tryton:3.6.1</product>
<product>tryton:3.6.2</product>
<product>tryton:3.6.3</product>
<product>tryton:3.6.4</product>
<product>tryton:3.6.5</product>
<product>tryton:3.6.6</product>
<product>tryton:3.6.7</product>
<product>tryton:3.6.8</product>
<product>tryton:3.6.9</product>
<product>tryton:3.6.10</product>
<product>tryton:3.6.11</product>
<product>tryton:3.8.0</product>
<product>tryton:3.8.1</product>
<product>tryton:3.8.2</product>
<product>tryton:3.8.3</product>
<product>tryton:3.8.4</product>
<product>tryton:3.8.5</product>
<product>tryton:3.8.6</product>
<product>tryton:3.8.7</product>
<product>tryton:4.0.0</product>
<product>tryton:4.0.1</product>
<product>tryton:4.0.2</product>
<product>tryton:4.0.3</product>
</cve>
<cve id="CVE-2016-1247" level="LOW">
<product>nginx:1.4.3</product>
<product>nginx:1.6.2</product>
<product>nginx:1.10.0</product>
<product>nginx:1.10.1</product>
</cve>
<cve id="CVE-2016-1249" level="MEDIUM">
<product>dbd-mysql:4.038_01</product>
</cve>
<cve id="CVE-2016-3454" level="HIGH">
<product>database:11.2.0.4</product>
<product>database:12.1.0.1</product>
<product>database:12.1.0.2</product>
</cve>
<cve id="CVE-2016-1000219" level="LOW">
<product>kibana:4.1.10</product>
<product>kibana:4.5.3</product>
</cve>
<cve id="CVE-2016-1000218" level="MEDIUM">
<product>kibana_reporting:2.4.0</product>
</cve>
<cve id="CVE-2016-3455" level="LOW">
<product>outside_in_technology:8.5.0</product>
<product>outside_in_technology:8.5.1</product>
<product>outside_in_technology:8.5.2</product>
</cve>
<cve id="CVE-2016-1000215" level="LOW">
<product>wireless_h500:-</product>
</cve>
<cve id="CVE-2016-1000214" level="LOW">
<product>wireless_h500:-</product>
</cve>
<cve id="CVE-2016-1000217" level="LOW">
<product>zotpress:6.1.2</product>
</cve>
<cve id="CVE-2016-1000216" level="LOW">
<product>wireless_h500:-</product>
</cve>
<cve id="CVE-2016-9892" level="MEDIUM">
<product>endpoint_antivirus:6.3.70.1</product>
<product>endpoint_security:6.3.70.1</product>
</cve>
<cve id="CVE-2016-3456" level="MEDIUM">
<product>complex_maintenance_repair_and_overhaul:12.1.1</product>
<product>complex_maintenance_repair_and_overhaul:12.1.2</product>
<product>complex_maintenance_repair_and_overhaul:12.1.3</product>
</cve>
<cve id="CVE-2016-1000213" level="MEDIUM">
<product>wireless_h500:-</product>
</cve>
<cve id="CVE-2016-9891" level="MEDIUM">
<product>dotclear:2.10.4</product>
</cve>
<cve id="CVE-2016-3457" level="MEDIUM">
<product>peoplesoft_enterprise_human_capital_management_eperformance:9.2</product>
</cve>
<cve id="CVE-2016-3450" level="MEDIUM">
<product>siebel_core-server_framework:8.1.1</product>
<product>siebel_core-server_framework:8.2.2</product>
<product>siebel_core-server_framework:2014</product>
<product>siebel_core-server_framework:2015</product>
<product>siebel_core-server_framework:2016</product>
</cve>
<cve id="CVE-2016-3451" level="MEDIUM">
<product>integrated_lights_out_manager_firmware:3.0</product>
<product>integrated_lights_out_manager_firmware:3.1</product>
<product>integrated_lights_out_manager_firmware:3.2</product>
</cve>
<cve id="CVE-2016-5365" level="LOW">
<product>honor_ws851_firmware:1.1.21.1</product>
</cve>
<cve id="CVE-2016-5366" level="LOW">
<product>honor_ws851_firmware:1.1.21.1</product>
</cve>
<cve id="CVE-2016-5367" level="LOW">
<product>honor_ws851_firmware:1.1.21.1</product>
</cve>
<cve id="CVE-2016-5361" level="LOW">
<product>libreswan:3.16</product>
</cve>
<cve id="CVE-2016-5362" level="LOW">
<product>neutron:7.0.3</product>
<product>neutron:8.0.0</product>
<product>neutron:8.1.0</product>
</cve>
<cve id="CVE-2016-5363" level="LOW">
<product>neutron:7.0.0</product>
<product>neutron:7.0.1</product>
<product>neutron:7.0.2</product>
<product>neutron:7.0.3</product>
<product>neutron:7.0.4</product>
<product>neutron:8.0.0</product>
<product>neutron:8.1.0</product>
</cve>
<cve id="CVE-2016-5368" level="LOW">
<product>ar3200_firmware:v200r005c20</product>
<product>ar3200_firmware:v200r005c32</product>
<product>ar3200_firmware:v200r007c00</product>
</cve>
<cve id="CVE-2016-9097" level="LOW">
<product>advanced_secure_gateway:6.6</product>
<product>advanced_secure_gateway:6.6.3</product>
<product>advanced_secure_gateway:6.6.4</product>
<product>advanced_secure_gateway:6.6.4.3</product>
<product>advanced_secure_gateway:6.6.5.1</product>
<product>proxysg:6.5</product>
<product>proxysg:6.5.1</product>
<product>proxysg:6.5.2</product>
<product>proxysg:6.5.2.10</product>
<product>proxysg:6.5.4.1</product>
<product>proxysg:6.5.5.7</product>
<product>proxysg:6.5.6.1</product>
<product>proxysg:6.5.7.6</product>
<product>proxysg:6.5.9.2</product>
<product>proxysg:6.5.9.8</product>
<product>proxysg:6.5.9.10</product>
<product>proxysg:6.5.9.14</product>
<product>proxysg:6.6</product>
<product>proxysg:6.6.2</product>
<product>proxysg:6.6.2.1</product>
<product>proxysg:6.6.2.2</product>
<product>proxysg:6.6.3</product>
<product>proxysg:6.6.3.2</product>
<product>proxysg:6.6.4</product>
<product>proxysg:6.6.4.1</product>
<product>proxysg:6.6.4.3</product>
<product>proxysg:6.6.5</product>
<product>proxysg:6.7</product>
<product>proxysg:6.7.1.1</product>
</cve>
<cve id="CVE-2016-9094" level="MEDIUM">
<product>endpoint_protection:12.1.6</product>
<product>endpoint_protection:14.0</product>
</cve>
<cve id="CVE-2016-9092" level="MEDIUM">
<product>content_analysis:1.3</product>
<product>content_analysis:2.1</product>
<product>mail_threat_defense:1.1</product>
</cve>
<cve id="CVE-2016-9093" level="MEDIUM">
<product>endpoint_protection:12.1.6</product>
<product>endpoint_protection:12.1.6</product>
<product>endpoint_protection:12.1.6</product>
<product>endpoint_protection:12.1.6</product>
<product>endpoint_protection:12.1.6</product>
<product>endpoint_protection:12.1.6</product>
<product>endpoint_protection:12.1.6</product>
<product>endpoint_protection:12.1.6</product>
</cve>
<cve id="CVE-2016-9091" level="LOW">
<product>advanced_secure_gateway:6.6.5.2</product>
<product>content_analysis_system_software:1.3.7.3</product>
</cve>
<cve id="CVE-2016-9099" level="MEDIUM">
<product>advanced_secure_gateway:6.6</product>
<product>proxysg:6.6</product>
</cve>
<cve id="CVE-2016-0859" level="LOW">
<product>webaccess:8.0</product>
</cve>
<cve id="CVE-2016-0858" level="MEDIUM">
<product>webaccess:8.0</product>
</cve>
<cve id="CVE-2016-3003" level="MEDIUM">
<product>connections:4.0.0.0</product>
<product>connections:4.5.0.0</product>
<product>connections:5.0.0.0</product>
<product>connections:5.5.0.0</product>
</cve>
<cve id="CVE-2016-0851" level="LOW">
<product>webaccess:8.0</product>
</cve>
<cve id="CVE-2016-0853" level="LOW">
<product>webaccess:8.0</product>
</cve>
<cve id="CVE-2016-0852" level="LOW">
<product>webaccess:8.0</product>
</cve>
<cve id="CVE-2016-0855" level="LOW">
<product>webaccess:8.0</product>
</cve>
<cve id="CVE-2016-0854" level="LOW">
<product>webaccess:8.0</product>
</cve>
<cve id="CVE-2016-0857" level="LOW">
<product>webaccess:8.0</product>
</cve>
<cve id="CVE-2016-0856" level="LOW">
<product>webaccess:8.0</product>
</cve>
<cve id="CVE-2016-3002" level="LOW">
<product>connections:4.0.0.0</product>
<product>connections:4.5.0.0</product>
<product>connections:5.0.0.0</product>
</cve>
<cve id="CVE-2016-5760" level="MEDIUM">
<product>groupwise:2014</product>
<product>groupwise:2014_r2</product>
</cve>
<cve id="CVE-2016-5761" level="MEDIUM">
<product>groupwise:2014</product>
<product>groupwise:2014_r2</product>
</cve>
<cve id="CVE-2016-3007" level="MEDIUM">
<product>connections:4.0.0.0</product>
<product>connections:4.5.0.0</product>
<product>connections:5.0.0.0</product>
<product>connections:5.5.0.0</product>
</cve>
<cve id="CVE-2016-5762" level="LOW">
<product>groupwise:2014</product>
<product>groupwise:2014_r2</product>
</cve>
<cve id="CVE-2016-5947" level="MEDIUM">
<product>spectrum_control:5.2.8</product>
<product>spectrum_control:5.2.9</product>
<product>spectrum_control:5.2.10</product>
<product>spectrum_control:5.2.10.1</product>
<product>tivoli_storage_productivity_center:5.2.0</product>
<product>tivoli_storage_productivity_center:5.2.1</product>
<product>tivoli_storage_productivity_center:5.2.1.1</product>
<product>tivoli_storage_productivity_center:5.2.2</product>
<product>tivoli_storage_productivity_center:5.2.3</product>
<product>tivoli_storage_productivity_center:5.2.4</product>
<product>tivoli_storage_productivity_center:5.2.4.1</product>
<product>tivoli_storage_productivity_center:5.2.5</product>
<product>tivoli_storage_productivity_center:5.2.5.1</product>
<product>tivoli_storage_productivity_center:5.2.6</product>
<product>tivoli_storage_productivity_center:5.2.7</product>
<product>tivoli_storage_productivity_center:5.2.7.1</product>
</cve>
<cve id="CVE-2016-8879" level="MEDIUM">
<product>phantompdf:8.0.5</product>
<product>reader:8.0.5</product>
</cve>
<cve id="CVE-2016-8878" level="MEDIUM">
<product>phantompdf:8.0.5</product>
<product>reader:8.0.5</product>
</cve>
<cve id="CVE-2016-8877" level="MEDIUM">
<product>phantompdf:8.0.5</product>
<product>reader:8.0.5</product>
</cve>
<cve id="CVE-2016-5764" level="MEDIUM">
<product>rumba_ftp:4.0</product>
<product>rumba_ftp:4.1</product>
<product>rumba_ftp:4.2</product>
<product>rumba_ftp:4.3</product>
<product>rumba_ftp:4.4</product>
<product>rumba_ftp:4.5</product>
</cve>
<cve id="CVE-2016-8875" level="MEDIUM">
<product>phantompdf:8.0.5</product>
<product>reader:8.0.5</product>
</cve>
<cve id="CVE-2016-8871" level="LOW">
<product>botan:1.11.29</product>
<product>botan:1.11.30</product>
<product>botan:1.11.31</product>
<product>botan:1.11.32</product>
</cve>
<cve id="CVE-2016-5765" level="MEDIUM">
<product>host_access_management_and_security_server:12.2</product>
<product>host_access_management_and_security_server:12.3</product>
<product>reflection_for_the_web:12.1</product>
<product>reflection_for_the_web:12.2</product>
<product>reflection_for_the_web:12.3</product>
<product>reflection_security_gateway:12.1</product>
<product>reflection_zfe:1.4.0.14</product>
<product>reflection_zfe:2.0.0.52</product>
<product>reflection_zfe:2.0.1.18</product>
</cve>
<cve id="CVE-2016-5943" level="LOW">
<product>spectrum_control:5.2.0</product>
<product>spectrum_control:5.2.1</product>
<product>spectrum_control:5.2.1.1</product>
<product>spectrum_control:5.2.2</product>
<product>spectrum_control:5.2.3</product>
<product>spectrum_control:5.2.4</product>
<product>spectrum_control:5.2.4.1</product>
<product>spectrum_control:5.2.5</product>
<product>spectrum_control:5.2.5.1</product>
<product>spectrum_control:5.2.6</product>
<product>spectrum_control:5.2.7</product>
<product>spectrum_control:5.2.7.1</product>
<product>spectrum_control:5.2.8</product>
<product>spectrum_control:5.2.9</product>
<product>spectrum_control:5.2.10</product>
<product>spectrum_control:5.2.10.1</product>
</cve>
<cve id="CVE-2016-6044" level="LOW">
<product>tivoli_storage_manager:6.4.1</product>
<product>tivoli_storage_manager:6.4.1.1</product>
<product>tivoli_storage_manager:6.4.2</product>
<product>tivoli_storage_manager:6.4.2.1</product>
<product>tivoli_storage_manager:6.4.2.2</product>
<product>tivoli_storage_manager:6.4.2.3</product>
<product>tivoli_storage_manager:6.4.2.4</product>
<product>tivoli_storage_manager:7.1</product>
<product>tivoli_storage_manager:7.1.0.1</product>
<product>tivoli_storage_manager:7.1.0.2</product>
<product>tivoli_storage_manager:7.1.1.1</product>
<product>tivoli_storage_manager:7.1.1.2</product>
<product>tivoli_storage_manager:7.1.3</product>
<product>tivoli_storage_manager:7.1.3.1</product>
<product>tivoli_storage_manager:7.1.3.2</product>
<product>tivoli_storage_manager:7.1.4</product>
<product>tivoli_storage_manager:7.1.4.1</product>
<product>tivoli_storage_manager:7.1.4.2</product>
<product>tivoli_storage_manager:7.1.7</product>
</cve>
<cve id="CVE-2016-6517" level="LOW">
<product>liferay:5.1.0</product>
</cve>
<cve id="CVE-2016-3034" level="LOW">
<product>security_appscan_source:9.0.1</product>
<product>security_appscan_source:9.0.2</product>
<product>security_appscan_source:9.0.3</product>
</cve>
<cve id="CVE-2016-6047" level="MEDIUM">
<product>jazz_reporting_service:6.0.2</product>
</cve>
<cve id="CVE-2016-6040" level="MEDIUM">
<product>rational_collaborative_lifecycle_management:4.0.0</product>
<product>rational_collaborative_lifecycle_management:4.0.1</product>
<product>rational_collaborative_lifecycle_management:4.0.2</product>
<product>rational_collaborative_lifecycle_management:4.0.3</product>
<product>rational_collaborative_lifecycle_management:4.0.4</product>
<product>rational_collaborative_lifecycle_management:4.0.5</product>
<product>rational_collaborative_lifecycle_management:4.0.6</product>
<product>rational_collaborative_lifecycle_management:4.0.7</product>
<product>rational_collaborative_lifecycle_management:5.0.0</product>
<product>rational_collaborative_lifecycle_management:5.0.1</product>
<product>rational_collaborative_lifecycle_management:5.0.2</product>
<product>rational_collaborative_lifecycle_management:6.0.0</product>
<product>rational_collaborative_lifecycle_management:6.0.1</product>
<product>rational_collaborative_lifecycle_management:6.0.2</product>
</cve>
<cve id="CVE-2016-3033" level="LOW">
<product>appscan_source:8.7</product>
<product>appscan_source:8.7.0.1</product>
<product>appscan_source:8.8</product>
<product>appscan_source:9.0</product>
<product>appscan_source:9.0.0.1</product>
<product>appscan_source:9.0.1</product>
<product>appscan_source:9.0.2</product>
<product>appscan_source:9.0.3</product>
<product>appscan_source:9.0.3.1</product>
<product>appscan_source:9.0.3.2</product>
<product>appscan_source:9.0.3.3</product>
</cve>
<cve id="CVE-2016-6042" level="MEDIUM">
<product>security_appscan:9.0.0.0</product>
<product>security_appscan:9.0.0.1</product>
<product>security_appscan:9.0.1.0</product>
<product>security_appscan:9.0.1.1</product>
<product>security_appscan:9.0.2.0</product>
<product>security_appscan:9.0.2.1</product>
<product>security_appscan:9.0.3.0</product>
<product>security_appscan:9.0.3.1</product>
</cve>
<cve id="CVE-2016-6043" level="MEDIUM">
<product>tivoli_storage_manager:6.4.1</product>
<product>tivoli_storage_manager:6.4.1.1</product>
<product>tivoli_storage_manager:6.4.2</product>
<product>tivoli_storage_manager:6.4.2.1</product>
<product>tivoli_storage_manager:6.4.2.2</product>
<product>tivoli_storage_manager:6.4.2.3</product>
<product>tivoli_storage_manager:6.4.2.4</product>
<product>tivoli_storage_manager:7.1</product>
<product>tivoli_storage_manager:7.1.0.1</product>
<product>tivoli_storage_manager:7.1.0.2</product>
<product>tivoli_storage_manager:7.1.1.1</product>
<product>tivoli_storage_manager:7.1.1.2</product>
<product>tivoli_storage_manager:7.1.3</product>
<product>tivoli_storage_manager:7.1.3.1</product>
<product>tivoli_storage_manager:7.1.3.2</product>
<product>tivoli_storage_manager:7.1.4</product>
<product>tivoli_storage_manager:7.1.4.1</product>
<product>tivoli_storage_manager:7.1.4.2</product>
<product>tivoli_storage_manager:7.1.7</product>
</cve>
<cve id="CVE-2016-6518" level="LOW">
<product>s12700_firmware:v200r005c00</product>
<product>s12700_firmware:v200r006c00</product>
<product>s12700_firmware:v200r008c00</product>
<product>s5300_firmware:v200r001c00</product>
<product>s5300_firmware:v200r002c00</product>
<product>s5300_firmware:v200r003c00</product>
<product>s5300_firmware:v200r005c00</product>
<product>s5300_firmware:v200r005c01</product>
<product>s5300_firmware:v200r005c02</product>
<product>s5300_firmware:v200r006c00</product>
<product>s5300_firmware:v200r007c00</product>
<product>s5300_firmware:v200r008c00</product>
<product>s5700_firmware:v200r001c00</product>
<product>s5700_firmware:v200r001c01</product>
<product>s5700_firmware:v200r002c00</product>
<product>s5700_firmware:v200r003c00</product>
<product>s5700_firmware:v200r003c02</product>
<product>s5700_firmware:v200r005c00</product>
<product>s5700_firmware:v200r006c00</product>
<product>s5700_firmware:v200r008c00</product>
<product>s6300_firmware:v200r001c00</product>
<product>s6300_firmware:v200r002c00</product>
<product>s6300_firmware:v200r003c00</product>
<product>s6300_firmware:v200r005c00</product>
<product>s6300_firmware:v200r005c01</product>
<product>s6300_firmware:v200r005c02</product>
<product>s6300_firmware:v200r008c00</product>
<product>s6700_firmware:v200r001c00</product>
<product>s6700_firmware:v200r001c01</product>
<product>s6700_firmware:v200r002c00</product>
<product>s6700_firmware:v200r003c00</product>
<product>s6700_firmware:v200r008c00</product>
<product>s7700_firmware:v200r001c00</product>
<product>s7700_firmware:v200r002c00</product>
<product>s7700_firmware:v200r003c00</product>
<product>s7700_firmware:v200r005c00</product>
<product>s7700_firmware:v200r006c00</product>
<product>s7700_firmware:v200r008c00</product>
<product>s9300_firmware:v200r001c00</product>
<product>s9300_firmware:v200r003c00</product>
<product>s9300_firmware:v200r005c00</product>
<product>s9300_firmware:v200r006c00</product>
<product>s9300_firmware:v200r008c00</product>
<product>s9700_firmware:v200r001c00</product>
<product>s9700_firmware:v200r001c01</product>
<product>s9700_firmware:v200r002c00</product>
<product>s9700_firmware:v200r003c00</product>
<product>s9700_firmware:v200r005c00</product>
<product>s9700_firmware:v200r006c00</product>
<product>s9700_firmware:v200r008c00</product>
</cve>
<cve id="CVE-2016-6519" level="MEDIUM">
<product>manila:2.5</product>
<product>openstack:7.0</product>
<product>openstack:8.0</product>
<product>openstack:9.0</product>
</cve>
<cve id="CVE-2016-8910" level="MEDIUM">
<product>qemu:-</product>
</cve>
<cve id="CVE-2016-8911" level="MEDIUM">
<product>kenexa_lms_on_cloud:13.1</product>
<product>kenexa_lms_on_cloud:13.2</product>
<product>kenexa_lms_on_cloud:13.2.2</product>
<product>kenexa_lms_on_cloud:13.2.3</product>
<product>kenexa_lms_on_cloud:13.2.4</product>
</cve>
<cve id="CVE-2016-8912" level="LOW">
<product>kenexa_lms_on_cloud:13.1</product>
<product>kenexa_lms_on_cloud:13.2</product>
<product>kenexa_lms_on_cloud:13.2.2</product>
<product>kenexa_lms_on_cloud:13.2.3</product>
<product>kenexa_lms_on_cloud:13.2.4</product>
</cve>
<cve id="CVE-2016-8913" level="LOW">
<product>kenexa_lms_on_cloud:13.1</product>
<product>kenexa_lms_on_cloud:13.2</product>
<product>kenexa_lms_on_cloud:13.2.2</product>
<product>kenexa_lms_on_cloud:13.2.3</product>
<product>kenexa_lms_on_cloud:13.2.4</product>
</cve>
<cve id="CVE-2016-8915" level="LOW">
<product>websphere_mq:8.0</product>
<product>websphere_mq:8.0.0.0</product>
<product>websphere_mq:8.0.0.1</product>
<product>websphere_mq:8.0.0.2</product>
<product>websphere_mq:8.0.0.3</product>
<product>websphere_mq:8.0.0.4</product>
<product>websphere_mq:8.0.0.5</product>
</cve>
<cve id="CVE-2016-8916" level="LOW">
<product>tivoli_storage_manager:6.3</product>
<product>tivoli_storage_manager:6.4.0.0</product>
<product>tivoli_storage_manager:6.4.1</product>
<product>tivoli_storage_manager:6.4.1.0</product>
<product>tivoli_storage_manager:6.4.2</product>
<product>tivoli_storage_manager:6.4.2.100</product>
<product>tivoli_storage_manager:6.4.2.200</product>
<product>tivoli_storage_manager:6.4.2.500</product>
<product>tivoli_storage_manager:6.4.2.600</product>
<product>tivoli_storage_manager:6.4.3</product>
<product>tivoli_storage_manager:6.4.3.1</product>
<product>tivoli_storage_manager:7.1</product>
<product>tivoli_storage_manager:7.1..5.100</product>
<product>tivoli_storage_manager:7.1.0.1</product>
<product>tivoli_storage_manager:7.1.0.2</product>
<product>tivoli_storage_manager:7.1.0.3</product>
<product>tivoli_storage_manager:7.1.1</product>
<product>tivoli_storage_manager:7.1.1.1</product>
<product>tivoli_storage_manager:7.1.1.2</product>
<product>tivoli_storage_manager:7.1.1.100</product>
<product>tivoli_storage_manager:7.1.1.200</product>
<product>tivoli_storage_manager:7.1.1.300</product>
<product>tivoli_storage_manager:7.1.3</product>
<product>tivoli_storage_manager:7.1.3.000</product>
<product>tivoli_storage_manager:7.1.3.1</product>
<product>tivoli_storage_manager:7.1.3.2</product>
<product>tivoli_storage_manager:7.1.3.100</product>
<product>tivoli_storage_manager:7.1.4</product>
<product>tivoli_storage_manager:7.1.4.1</product>
<product>tivoli_storage_manager:7.1.4.2</product>
<product>tivoli_storage_manager:7.1.5</product>
<product>tivoli_storage_manager:7.1.5.200</product>
<product>tivoli_storage_manager:7.1.6</product>
<product>tivoli_storage_manager:7.1.6.2</product>
<product>tivoli_storage_manager:7.1.6.3</product>
<product>tivoli_storage_manager:7.1.6.4</product>
</cve>
<cve id="CVE-2016-8917" level="MEDIUM">
<product>sterling_selling_and_fulfillment_foundation:9.2.0</product>
<product>sterling_selling_and_fulfillment_foundation:9.2.1</product>
<product>sterling_selling_and_fulfillment_foundation:9.3.0</product>
<product>sterling_selling_and_fulfillment_foundation:9.4.0</product>
<product>sterling_selling_and_fulfillment_foundation:9.5.0</product>
</cve>
<cve id="CVE-2016-8918" level="MEDIUM">
<product>integration_bus:10.0</product>
</cve>
<cve id="CVE-2016-8919" level="LOW">
<product>websphere_application_server:7.0</product>
<product>websphere_application_server:8.0</product>
<product>websphere_application_server:8.5.5</product>
<product>websphere_application_server:9.0</product>
</cve>
<cve id="CVE-2016-1896" level="LOW">
<product>printer_firmware:atl.02.048</product>
<product>printer_firmware:cb.02.048</product>
<product>printer_firmware:pp.02.048</product>
<product>printer_firmware:yk.02.048</product>
</cve>
<cve id="CVE-2016-1894" level="MEDIUM">
<product>oncommand_workflow_automation:3.1</product>
</cve>
<cve id="CVE-2016-1895" level="LOW">
<product>data_ontap:8.2.4</product>
<product>data_ontap:8.3.2p12</product>
<product>data_ontap:9.0</product>
</cve>
<cve id="CVE-2016-1899" level="MEDIUM">
<product>cgit:0.11.2</product>
<product>fedora:22</product>
</cve>
<cve id="CVE-2016-0507" level="MEDIUM">
<product>e-business_suite:11.5.10.2</product>
</cve>
<cve id="CVE-2016-3983" level="LOW">
<product>advanced_threat_defense:3.4.4.142</product>
</cve>
<cve id="CVE-2016-3980" level="LOW">
<product>java_as:7.4</product>
</cve>
<cve id="CVE-2016-3986" level="MEDIUM">
<product>avast:-</product>
</cve>
<cve id="CVE-2016-3987" level="LOW">
<product>password_manager:-</product>
</cve>
<cve id="CVE-2016-0213" level="LOW">
<product>tivoli_storage_manager_fastback:5.5.0</product>
<product>tivoli_storage_manager_fastback:6.1.0</product>
<product>tivoli_storage_manager_fastback:6.1.0.0</product>
<product>tivoli_storage_manager_fastback:6.1.0.1</product>
<product>tivoli_storage_manager_fastback:6.1.1</product>
<product>tivoli_storage_manager_fastback:6.1.1.0</product>
<product>tivoli_storage_manager_fastback:6.1.2</product>
<product>tivoli_storage_manager_fastback:6.1.2.0</product>
<product>tivoli_storage_manager_fastback:6.1.3</product>
<product>tivoli_storage_manager_fastback:6.1.3.0</product>
<product>tivoli_storage_manager_fastback:6.1.4</product>
<product>tivoli_storage_manager_fastback:6.1.4.0</product>
<product>tivoli_storage_manager_fastback:6.1.5</product>
<product>tivoli_storage_manager_fastback:6.1.5.0</product>
<product>tivoli_storage_manager_fastback:6.1.5.2</product>
<product>tivoli_storage_manager_fastback:6.1.6</product>
<product>tivoli_storage_manager_fastback:6.1.6.0</product>
<product>tivoli_storage_manager_fastback:6.1.6.1</product>
<product>tivoli_storage_manager_fastback:6.1.6.2</product>
<product>tivoli_storage_manager_fastback:6.1.7</product>
<product>tivoli_storage_manager_fastback:6.1.7.0</product>
<product>tivoli_storage_manager_fastback:6.1.7.1</product>
<product>tivoli_storage_manager_fastback:6.1.7.2</product>
<product>tivoli_storage_manager_fastback:6.1.8</product>
<product>tivoli_storage_manager_fastback:6.1.8.0</product>
<product>tivoli_storage_manager_fastback:6.1.8.1</product>
<product>tivoli_storage_manager_fastback:6.1.9</product>
<product>tivoli_storage_manager_fastback:6.1.9.0</product>
<product>tivoli_storage_manager_fastback:6.1.9.1</product>
<product>tivoli_storage_manager_fastback:6.1.10</product>
<product>tivoli_storage_manager_fastback:6.1.10.0</product>
<product>tivoli_storage_manager_fastback:6.1.10.1</product>
<product>tivoli_storage_manager_fastback:6.1.11</product>
<product>tivoli_storage_manager_fastback:6.1.11.0</product>
<product>tivoli_storage_manager_fastback:6.1.11.1</product>
</cve>
<cve id="CVE-2016-7932" level="LOW">
<product>tcpdump:4.8.1</product>
</cve>
<cve id="CVE-2016-0211" level="LOW">
<product>db2:9.7</product>
<product>db2:9.7</product>
<product>db2:9.7</product>
<product>db2:9.7</product>
<product>db2:9.7</product>
<product>db2:9.7</product>
<product>db2:9.7.0.1</product>
<product>db2:9.7.0.1</product>
<product>db2:9.7.0.1</product>
<product>db2:9.7.0.1</product>
<product>db2:9.7.0.1</product>
<product>db2:9.7.0.1</product>
<product>db2:9.7.0.2</product>
<product>db2:9.7.0.2</product>
<product>db2:9.7.0.2</product>
<product>db2:9.7.0.2</product>
<product>db2:9.7.0.2</product>
<product>db2:9.7.0.2</product>
<product>db2:9.7.0.3</product>
<product>db2:9.7.0.3</product>
<product>db2:9.7.0.3</product>
<product>db2:9.7.0.3</product>
<product>db2:9.7.0.3</product>
<product>db2:9.7.0.3</product>
<product>db2:9.7.0.4</product>
<product>db2:9.7.0.4</product>
<product>db2:9.7.0.4</product>
<product>db2:9.7.0.4</product>
<product>db2:9.7.0.4</product>
<product>db2:9.7.0.4</product>
<product>db2:9.7.0.5</product>
<product>db2:9.7.0.5</product>
<product>db2:9.7.0.5</product>
<product>db2:9.7.0.5</product>
<product>db2:9.7.0.5</product>
<product>db2:9.7.0.5</product>
<product>db2:9.7.0.6</product>
<product>db2:9.7.0.6</product>
<product>db2:9.7.0.6</product>
<product>db2:9.7.0.6</product>
<product>db2:9.7.0.6</product>
<product>db2:9.7.0.6</product>
<product>db2:9.7.0.7</product>
<product>db2:9.7.0.7</product>
<product>db2:9.7.0.7</product>
<product>db2:9.7.0.7</product>
<product>db2:9.7.0.7</product>
<product>db2:9.7.0.7</product>
<product>db2:9.7.0.8</product>
<product>db2:9.7.0.8</product>
<product>db2:9.7.0.8</product>
<product>db2:9.7.0.8</product>
<product>db2:9.7.0.8</product>
<product>db2:9.7.0.8</product>
<product>db2:9.7.0.9</product>
<product>db2:9.7.0.9</product>
<product>db2:9.7.0.9</product>
<product>db2:9.7.0.9</product>
<product>db2:9.7.0.9</product>
<product>db2:9.7.0.9</product>
<product>db2:9.7.0.10</product>
<product>db2:9.7.0.10</product>
<product>db2:9.7.0.10</product>
<product>db2:9.7.0.10</product>
<product>db2:9.7.0.10</product>
<product>db2:9.7.0.10</product>
<product>db2:9.7.0.11</product>
<product>db2:9.7.0.11</product>
<product>db2:9.7.0.11</product>
<product>db2:9.7.0.11</product>
<product>db2:9.7.0.11</product>
<product>db2:9.7.0.11</product>
<product>db2:9.8</product>
<product>db2:9.8</product>
<product>db2:9.8</product>
<product>db2:9.8</product>
<product>db2:9.8</product>
<product>db2:9.8</product>
<product>db2:9.8.0.1</product>
<product>db2:9.8.0.1</product>
<product>db2:9.8.0.1</product>
<product>db2:9.8.0.1</product>
<product>db2:9.8.0.1</product>
<product>db2:9.8.0.1</product>
<product>db2:9.8.0.2</product>
<product>db2:9.8.0.2</product>
<product>db2:9.8.0.2</product>
<product>db2:9.8.0.2</product>
<product>db2:9.8.0.2</product>
<product>db2:9.8.0.2</product>
<product>db2:9.8.0.3</product>
<product>db2:9.8.0.3</product>
<product>db2:9.8.0.3</product>
<product>db2:9.8.0.3</product>
<product>db2:9.8.0.3</product>
<product>db2:9.8.0.3</product>
<product>db2:9.8.0.4</product>
<product>db2:9.8.0.4</product>
<product>db2:9.8.0.4</product>
<product>db2:9.8.0.4</product>
<product>db2:9.8.0.4</product>
<product>db2:9.8.0.4</product>
<product>db2:9.8.0.5</product>
<product>db2:9.8.0.5</product>
<product>db2:9.8.0.5</product>
<product>db2:9.8.0.5</product>
<product>db2:9.8.0.5</product>
<product>db2:9.8.0.5</product>
<product>db2:10.1</product>
<product>db2:10.1</product>
<product>db2:10.1</product>
<product>db2:10.1</product>
<product>db2:10.1</product>
<product>db2:10.1</product>
<product>db2:10.1.0.1</product>
<product>db2:10.1.0.1</product>
<product>db2:10.1.0.1</product>
<product>db2:10.1.0.1</product>
<product>db2:10.1.0.1</product>
<product>db2:10.1.0.1</product>
<product>db2:10.1.0.2</product>
<product>db2:10.1.0.2</product>
<product>db2:10.1.0.2</product>
<product>db2:10.1.0.2</product>
<product>db2:10.1.0.2</product>
<product>db2:10.1.0.2</product>
<product>db2:10.1.0.3</product>
<product>db2:10.1.0.3</product>
<product>db2:10.1.0.3</product>
<product>db2:10.1.0.3</product>
<product>db2:10.1.0.3</product>
<product>db2:10.1.0.3</product>
<product>db2:10.1.0.4</product>
<product>db2:10.1.0.4</product>
<product>db2:10.1.0.4</product>
<product>db2:10.1.0.4</product>
<product>db2:10.1.0.4</product>
<product>db2:10.1.0.4</product>
<product>db2:10.1.0.5</product>
<product>db2:10.1.0.5</product>
<product>db2:10.1.0.5</product>
<product>db2:10.1.0.5</product>
<product>db2:10.1.0.5</product>
<product>db2:10.1.0.5</product>
<product>db2:10.5</product>
<product>db2:10.5</product>
<product>db2:10.5</product>
<product>db2:10.5</product>
<product>db2:10.5</product>
<product>db2:10.5</product>
<product>db2:10.5.0.1</product>
<product>db2:10.5.0.1</product>
<product>db2:10.5.0.1</product>
<product>db2:10.5.0.1</product>
<product>db2:10.5.0.1</product>
<product>db2:10.5.0.1</product>
<product>db2:10.5.0.2</product>
<product>db2:10.5.0.2</product>
<product>db2:10.5.0.2</product>
<product>db2:10.5.0.2</product>
<product>db2:10.5.0.2</product>
<product>db2:10.5.0.2</product>
<product>db2:10.5.0.3</product>
<product>db2:10.5.0.3</product>
<product>db2:10.5.0.3</product>
<product>db2:10.5.0.3</product>
<product>db2:10.5.0.3</product>
<product>db2:10.5.0.3</product>
<product>db2:10.5.0.4</product>
<product>db2:10.5.0.4</product>
<product>db2:10.5.0.4</product>
<product>db2:10.5.0.4</product>
<product>db2:10.5.0.4</product>
<product>db2:10.5.0.4</product>
<product>db2:10.5.0.5</product>
<product>db2:10.5.0.5</product>
<product>db2:10.5.0.5</product>
<product>db2:10.5.0.5</product>
<product>db2:10.5.0.5</product>
<product>db2:10.5.0.5</product>
<product>db2:10.5.0.6</product>
<product>db2:10.5.0.6</product>
<product>db2:10.5.0.6</product>
<product>db2:10.5.0.6</product>
<product>db2:10.5.0.6</product>
<product>db2:10.5.0.6</product>
<product>db2:10.5.0.7</product>
<product>db2:10.5.0.7</product>
<product>db2:10.5.0.7</product>
<product>db2:10.5.0.7</product>
<product>db2:10.5.0.7</product>
<product>db2:10.5.0.7</product>
<product>db2_connect:9.7</product>
<product>db2_connect:9.7</product>
<product>db2_connect:9.7</product>
<product>db2_connect:9.7.0.1</product>
<product>db2_connect:9.7.0.1</product>
<product>db2_connect:9.7.0.1</product>
<product>db2_connect:9.7.0.2</product>
<product>db2_connect:9.7.0.2</product>
<product>db2_connect:9.7.0.2</product>
<product>db2_connect:9.7.0.3</product>
<product>db2_connect:9.7.0.3</product>
<product>db2_connect:9.7.0.3</product>
<product>db2_connect:9.7.0.4</product>
<product>db2_connect:9.7.0.4</product>
<product>db2_connect:9.7.0.4</product>
<product>db2_connect:9.7.0.5</product>
<product>db2_connect:9.7.0.5</product>
<product>db2_connect:9.7.0.5</product>
<product>db2_connect:9.7.0.6</product>
<product>db2_connect:9.7.0.6</product>
<product>db2_connect:9.7.0.6</product>
<product>db2_connect:9.7.0.7</product>
<product>db2_connect:9.7.0.7</product>
<product>db2_connect:9.7.0.7</product>
<product>db2_connect:9.7.0.8</product>
<product>db2_connect:9.7.0.8</product>
<product>db2_connect:9.7.0.8</product>
<product>db2_connect:9.7.0.9</product>
<product>db2_connect:9.7.0.9</product>
<product>db2_connect:9.7.0.9</product>
<product>db2_connect:9.7.0.10</product>
<product>db2_connect:9.7.0.10</product>
<product>db2_connect:9.7.0.10</product>
<product>db2_connect:9.7.0.11</product>
<product>db2_connect:9.7.0.11</product>
<product>db2_connect:9.7.0.11</product>
<product>db2_connect:9.8</product>
<product>db2_connect:9.8</product>
<product>db2_connect:9.8</product>
<product>db2_connect:9.8.0.1</product>
<product>db2_connect:9.8.0.1</product>
<product>db2_connect:9.8.0.1</product>
<product>db2_connect:9.8.0.2</product>
<product>db2_connect:9.8.0.2</product>
<product>db2_connect:9.8.0.2</product>
<product>db2_connect:9.8.0.3</product>
<product>db2_connect:9.8.0.3</product>
<product>db2_connect:9.8.0.3</product>
<product>db2_connect:9.8.0.4</product>
<product>db2_connect:9.8.0.4</product>
<product>db2_connect:9.8.0.4</product>
<product>db2_connect:9.8.0.5</product>
<product>db2_connect:9.8.0.5</product>
<product>db2_connect:9.8.0.5</product>
<product>db2_connect:10.1</product>
<product>db2_connect:10.1</product>
<product>db2_connect:10.1</product>
<product>db2_connect:10.1.0.1</product>
<product>db2_connect:10.1.0.1</product>
<product>db2_connect:10.1.0.1</product>
<product>db2_connect:10.1.0.2</product>
<product>db2_connect:10.1.0.2</product>
<product>db2_connect:10.1.0.2</product>
<product>db2_connect:10.1.0.3</product>
<product>db2_connect:10.1.0.3</product>
<product>db2_connect:10.1.0.3</product>
<product>db2_connect:10.1.0.4</product>
<product>db2_connect:10.1.0.4</product>
<product>db2_connect:10.1.0.4</product>
<product>db2_connect:10.1.0.5</product>
<product>db2_connect:10.1.0.5</product>
<product>db2_connect:10.1.0.5</product>
<product>db2_connect:10.5</product>
<product>db2_connect:10.5</product>
<product>db2_connect:10.5</product>
<product>db2_connect:10.5.0.1</product>
<product>db2_connect:10.5.0.1</product>
<product>db2_connect:10.5.0.1</product>
<product>db2_connect:10.5.0.2</product>
<product>db2_connect:10.5.0.2</product>
<product>db2_connect:10.5.0.2</product>
<product>db2_connect:10.5.0.3</product>
<product>db2_connect:10.5.0.3</product>
<product>db2_connect:10.5.0.3</product>
<product>db2_connect:10.5.0.4</product>
<product>db2_connect:10.5.0.4</product>
<product>db2_connect:10.5.0.4</product>
<product>db2_connect:10.5.0.5</product>
<product>db2_connect:10.5.0.5</product>
<product>db2_connect:10.5.0.5</product>
<product>db2_connect:10.5.0.6</product>
<product>db2_connect:10.5.0.6</product>
<product>db2_connect:10.5.0.6</product>
<product>db2_connect:10.5.0.7</product>
<product>db2_connect:10.5.0.7</product>
<product>db2_connect:10.5.0.7</product>
</cve>
<cve id="CVE-2016-0210" level="LOW">
<product>sterling_b2b_integrator:5.1</product>
<product>sterling_b2b_integrator:5.2</product>
</cve>
<cve id="CVE-2016-7937" level="LOW">
<product>tcpdump:4.8.1</product>
</cve>
<cve id="CVE-2016-0216" level="LOW">
<product>tivoli_storage_manager_fastback:5.5.0</product>
<product>tivoli_storage_manager_fastback:6.1.0</product>
<product>tivoli_storage_manager_fastback:6.1.0.1</product>
<product>tivoli_storage_manager_fastback:6.1.1</product>
<product>tivoli_storage_manager_fastback:6.1.1.0</product>
<product>tivoli_storage_manager_fastback:6.1.2</product>
<product>tivoli_storage_manager_fastback:6.1.2.0</product>
<product>tivoli_storage_manager_fastback:6.1.3</product>
<product>tivoli_storage_manager_fastback:6.1.3.0</product>
<product>tivoli_storage_manager_fastback:6.1.4</product>
<product>tivoli_storage_manager_fastback:6.1.4.0</product>
<product>tivoli_storage_manager_fastback:6.1.5</product>
<product>tivoli_storage_manager_fastback:6.1.5.0</product>
<product>tivoli_storage_manager_fastback:6.1.5.2</product>
<product>tivoli_storage_manager_fastback:6.1.6</product>
<product>tivoli_storage_manager_fastback:6.1.6.0</product>
<product>tivoli_storage_manager_fastback:6.1.6.1</product>
<product>tivoli_storage_manager_fastback:6.1.6.2</product>
<product>tivoli_storage_manager_fastback:6.1.7</product>
<product>tivoli_storage_manager_fastback:6.1.7.0</product>
<product>tivoli_storage_manager_fastback:6.1.7.1</product>
<product>tivoli_storage_manager_fastback:6.1.7.2</product>
<product>tivoli_storage_manager_fastback:6.1.8</product>
<product>tivoli_storage_manager_fastback:6.1.8.0</product>
<product>tivoli_storage_manager_fastback:6.1.9</product>
<product>tivoli_storage_manager_fastback:6.1.9.0</product>
<product>tivoli_storage_manager_fastback:6.1.9.1</product>
<product>tivoli_storage_manager_fastback:6.1.10</product>
<product>tivoli_storage_manager_fastback:6.1.10.0</product>
<product>tivoli_storage_manager_fastback:6.1.10.1</product>
<product>tivoli_storage_manager_fastback:6.1.11</product>
<product>tivoli_storage_manager_fastback:6.1.11.0</product>
<product>tivoli_storage_manager_fastback:6.1.11.1</product>
</cve>
<cve id="CVE-2016-0215" level="LOW">
<product>db2:9.7</product>
<product>db2:9.7</product>
<product>db2:9.7</product>
<product>db2:9.7</product>
<product>db2:9.7</product>
<product>db2:9.7</product>
<product>db2:9.7</product>
<product>db2:9.7</product>
<product>db2:9.7</product>
<product>db2:9.8</product>
<product>db2:10.1</product>
<product>db2:10.1</product>
<product>db2:10.1</product>
<product>db2:10.1</product>
<product>db2:10.1</product>
<product>db2:10.1</product>
<product>db2:10.1</product>
<product>db2:10.1</product>
<product>db2:10.1</product>
<product>db2:10.5</product>
<product>db2:10.5</product>
<product>db2:10.5</product>
<product>db2:10.5</product>
<product>db2:10.5</product>
<product>db2:10.5</product>
<product>db2:10.5</product>
<product>db2:10.5</product>
<product>db2:10.5</product>
</cve>
<cve id="CVE-2016-7934" level="LOW">
<product>tcpdump:4.8.1</product>
</cve>
<cve id="CVE-2016-0219" level="LOW">
<product>rational_collaborative_lifecycle_management:3.0.1</product>
<product>rational_collaborative_lifecycle_management:3.0.1.1</product>
<product>rational_collaborative_lifecycle_management:3.0.1.2</product>
<product>rational_collaborative_lifecycle_management:3.0.1.3</product>
<product>rational_collaborative_lifecycle_management:3.0.1.4</product>
<product>rational_collaborative_lifecycle_management:3.0.1.5</product>
<product>rational_collaborative_lifecycle_management:3.0.1.6</product>
<product>rational_collaborative_lifecycle_management:4.0</product>
<product>rational_collaborative_lifecycle_management:4.0.1</product>
<product>rational_collaborative_lifecycle_management:4.0.2</product>
<product>rational_collaborative_lifecycle_management:4.0.3</product>
<product>rational_collaborative_lifecycle_management:4.0.4</product>
<product>rational_collaborative_lifecycle_management:4.0.5</product>
<product>rational_collaborative_lifecycle_management:4.0.6</product>
<product>rational_collaborative_lifecycle_management:4.0.7</product>
<product>rational_collaborative_lifecycle_management:5.0</product>
<product>rational_collaborative_lifecycle_management:5.0.1</product>
<product>rational_collaborative_lifecycle_management:5.0.2</product>
<product>rational_collaborative_lifecycle_management:6.0</product>
<product>rational_collaborative_lifecycle_management:6.0.1</product>
<product>rational_doors_next_generation:4.0</product>
<product>rational_doors_next_generation:4.0.1</product>
<product>rational_doors_next_generation:4.0.2</product>
<product>rational_doors_next_generation:4.0.3</product>
<product>rational_doors_next_generation:4.0.4</product>
<product>rational_doors_next_generation:4.0.5</product>
<product>rational_doors_next_generation:4.0.6</product>
<product>rational_doors_next_generation:4.0.7</product>
<product>rational_doors_next_generation:5.0</product>
<product>rational_doors_next_generation:5.0.1</product>
<product>rational_doors_next_generation:5.0.2</product>
<product>rational_doors_next_generation:6.0</product>
<product>rational_doors_next_generation:6.0.1</product>
<product>rational_engineering_lifecycle_manager:4.0.3</product>
<product>rational_engineering_lifecycle_manager:4.0.4</product>
<product>rational_engineering_lifecycle_manager:4.0.5</product>
<product>rational_engineering_lifecycle_manager:4.0.6</product>
<product>rational_engineering_lifecycle_manager:4.0.7</product>
<product>rational_engineering_lifecycle_manager:5.0</product>
<product>rational_engineering_lifecycle_manager:5.0.1</product>
<product>rational_engineering_lifecycle_manager:5.0.2</product>
<product>rational_engineering_lifecycle_manager:6.0</product>
<product>rational_engineering_lifecycle_manager:6.0.1</product>
<product>rational_quality_manager:3.0</product>
<product>rational_quality_manager:3.0.1</product>
<product>rational_quality_manager:3.0.1.1</product>
<product>rational_quality_manager:3.0.1.2</product>
<product>rational_quality_manager:3.0.1.3</product>
<product>rational_quality_manager:3.0.1.4</product>
<product>rational_quality_manager:3.0.1.5</product>
<product>rational_quality_manager:3.0.1.6</product>
<product>rational_quality_manager:4.0</product>
<product>rational_quality_manager:4.0.0.1</product>
<product>rational_quality_manager:4.0.0.2</product>
<product>rational_quality_manager:4.0.1</product>
<product>rational_quality_manager:4.0.2</product>
<product>rational_quality_manager:4.0.3</product>
<product>rational_quality_manager:4.0.4</product>
<product>rational_quality_manager:4.0.5</product>
<product>rational_quality_manager:4.0.7</product>
<product>rational_quality_manager:5.0</product>
<product>rational_quality_manager:5.0.1</product>
<product>rational_quality_manager:5.0.2</product>
<product>rational_quality_manager:6.0</product>
<product>rational_quality_manager:6.0.1</product>
<product>rational_requirements_composer:3.0</product>
<product>rational_requirements_composer:3.0.1</product>
<product>rational_requirements_composer:3.0.1.1</product>
<product>rational_requirements_composer:3.0.1.2</product>
<product>rational_requirements_composer:3.0.1.3</product>
<product>rational_requirements_composer:3.0.1.4</product>
<product>rational_requirements_composer:3.0.1.5</product>
<product>rational_requirements_composer:3.0.1.6</product>
<product>rational_requirements_composer:4.0</product>
<product>rational_requirements_composer:4.0.1</product>
<product>rational_requirements_composer:4.0.2</product>
<product>rational_requirements_composer:4.0.3</product>
<product>rational_requirements_composer:4.0.4</product>
<product>rational_requirements_composer:4.0.5</product>
<product>rational_requirements_composer:4.0.6</product>
<product>rational_requirements_composer:4.0.7</product>
<product>rational_rhapsody_design_manager:4.0</product>
<product>rational_rhapsody_design_manager:4.0.1</product>
<product>rational_rhapsody_design_manager:4.0.2</product>
<product>rational_rhapsody_design_manager:4.0.3</product>
<product>rational_rhapsody_design_manager:4.0.4</product>
<product>rational_rhapsody_design_manager:4.0.5</product>
<product>rational_rhapsody_design_manager:4.0.6</product>
<product>rational_rhapsody_design_manager:4.0.7</product>
<product>rational_rhapsody_design_manager:5.0</product>
<product>rational_rhapsody_design_manager:5.0.1</product>
<product>rational_rhapsody_design_manager:5.0.2</product>
<product>rational_rhapsody_design_manager:6.0</product>
<product>rational_rhapsody_design_manager:6.0.1</product>
<product>rational_software_architect_design_manager:4.0</product>
<product>rational_software_architect_design_manager:4.0.1</product>
<product>rational_software_architect_design_manager:4.0.2</product>
<product>rational_software_architect_design_manager:4.0.3</product>
<product>rational_software_architect_design_manager:4.0.4</product>
<product>rational_software_architect_design_manager:4.0.5</product>
<product>rational_software_architect_design_manager:4.0.6</product>
<product>rational_software_architect_design_manager:4.0.7</product>
<product>rational_software_architect_design_manager:5.0</product>
<product>rational_software_architect_design_manager:5.0.1</product>
<product>rational_software_architect_design_manager:5.0.2</product>
<product>rational_software_architect_design_manager:6.0</product>
<product>rational_software_architect_design_manager:6.0.1</product>
<product>rational_team_concert:3.0</product>
<product>rational_team_concert:3.0.1</product>
<product>rational_team_concert:3.0.1.1</product>
<product>rational_team_concert:3.0.1.2</product>
<product>rational_team_concert:3.0.1.3</product>
<product>rational_team_concert:3.0.1.4</product>
<product>rational_team_concert:3.0.1.5</product>
<product>rational_team_concert:3.0.1.6</product>
<product>rational_team_concert:4.0</product>
<product>rational_team_concert:4.0.0.1</product>
<product>rational_team_concert:4.0.0.2</product>
<product>rational_team_concert:4.0.1</product>
<product>rational_team_concert:4.0.2</product>
<product>rational_team_concert:4.0.3</product>
<product>rational_team_concert:4.0.4</product>
<product>rational_team_concert:4.0.5</product>
<product>rational_team_concert:4.0.6</product>
<product>rational_team_concert:4.0.7</product>
<product>rational_team_concert:5.0</product>
<product>rational_team_concert:5.0.1</product>
<product>rational_team_concert:5.0.2</product>
<product>rational_team_concert:6.0</product>
<product>rational_team_concert:6.0.1</product>
</cve>
<cve id="CVE-2016-7938" level="LOW">
<product>tcpdump:4.8.1</product>
</cve>
<cve id="CVE-2016-4910" level="LOW">
<product>garoon:3.0.0</product>
<product>garoon:3.0.1</product>
<product>garoon:3.0.2</product>
<product>garoon:3.0.3</product>
<product>garoon:3.1.0</product>
<product>garoon:3.1.1</product>
<product>garoon:3.1.2</product>
<product>garoon:3.1.3</product>
<product>garoon:3.5.0</product>
<product>garoon:3.5.1</product>
<product>garoon:3.5.2</product>
<product>garoon:3.5.3</product>
<product>garoon:3.5.4</product>
<product>garoon:3.5.5</product>
<product>garoon:3.7.0</product>
<product>garoon:3.7.1</product>
<product>garoon:3.7.2</product>
<product>garoon:3.7.3</product>
<product>garoon:3.7.4</product>
<product>garoon:3.7.5</product>
<product>garoon:4.0.0</product>
<product>garoon:4.0.1</product>
<product>garoon:4.0.2</product>
<product>garoon:4.0.3</product>
<product>garoon:4.2.0</product>
<product>garoon:4.2.1</product>
<product>garoon:4.2.2</product>
</cve>
<cve id="CVE-2016-4911" level="LOW">
<product>openstack_identity:9.0.0.0</product>
<product>openstack_identity:9.0.0.0</product>
<product>openstack_identity:9.0.0.0</product>
</cve>
<cve id="CVE-2016-4912" level="LOW">
<product>openslp:2.0.0</product>
</cve>
<cve id="CVE-2016-0077" level="MEDIUM">
<product>edge:-</product>
<product>internet_explorer:9</product>
<product>internet_explorer:10</product>
<product>internet_explorer:11</product>
</cve>
<cve id="CVE-2016-0072" level="MEDIUM">
<product>internet_explorer:9</product>
<product>internet_explorer:10</product>
<product>internet_explorer:11</product>
</cve>
<cve id="CVE-2016-0071" level="MEDIUM">
<product>internet_explorer:9</product>
</cve>
<cve id="CVE-2016-9799" level="LOW">
<product>bluez:5.42</product>
</cve>
<cve id="CVE-2016-9798" level="LOW">
<product>bluez:5.42</product>
</cve>
<cve id="CVE-2016-9795" level="LOW">
<product>client_automation:12.8</product>
<product>client_automation:12.9</product>
<product>client_automation:14.0</product>
<product>systemedge:5.8.2</product>
<product>systemedge:5.9</product>
<product>systems_performance_for_infrastructure_managers:12.8</product>
<product>systems_performance_for_infrastructure_managers:12.9</product>
<product>universal_job_management_agent:11.2</product>
<product>virtual_assurance_for_infrastructure_managers:12.8</product>
<product>virtual_assurance_for_infrastructure_managers:12.9</product>
<product>workload_automation_ae:11.0</product>
<product>workload_automation_ae:11.3</product>
<product>workload_automation_ae:11.3.5</product>
<product>workload_automation_ae:11.3.6</product>
</cve>
<cve id="CVE-2016-9797" level="LOW">
<product>bluez:5.42</product>
</cve>
<cve id="CVE-2016-9796" level="LOW">
<product>omnivista_8770_network_management_system:2.0</product>
<product>omnivista_8770_network_management_system:2.6</product>
<product>omnivista_8770_network_management_system:3.0</product>
</cve>
<cve id="CVE-2016-10048" level="LOW">
<product>imagemagick:6.9.4-7</product>
<product>leap:42.1</product>
</cve>
<cve id="CVE-2016-10049" level="MEDIUM">
<product>imagemagick:6.9.4-3</product>
</cve>
<cve id="CVE-2016-10514" level="MEDIUM">
<product>piwigo:2.8.2</product>
</cve>
<cve id="CVE-2016-10515" level="MEDIUM">
<product>redmine:3.2.2</product>
</cve>
<cve id="CVE-2016-10516" level="MEDIUM">
<product>werkzeug:0.1</product>
<product>werkzeug:0.2</product>
<product>werkzeug:0.3</product>
<product>werkzeug:0.3.1</product>
<product>werkzeug:0.4</product>
<product>werkzeug:0.4.1</product>
<product>werkzeug:0.5</product>
<product>werkzeug:0.5.1</product>
<product>werkzeug:0.6</product>
<product>werkzeug:0.6.1</product>
<product>werkzeug:0.6.2</product>
<product>werkzeug:0.7</product>
<product>werkzeug:0.7.1</product>
<product>werkzeug:0.7.2</product>
<product>werkzeug:0.8</product>
<product>werkzeug:0.8.2</product>
<product>werkzeug:0.8.3</product>
<product>werkzeug:0.9</product>
<product>werkzeug:0.9.1</product>
<product>werkzeug:0.9.2</product>
<product>werkzeug:0.9.3</product>
<product>werkzeug:0.9.4</product>
<product>werkzeug:0.9.5</product>
<product>werkzeug:0.9.6</product>
<product>werkzeug:0.10</product>
<product>werkzeug:0.10.1</product>
<product>werkzeug:0.10.2</product>
<product>werkzeug:0.10.3</product>
<product>werkzeug:0.10.4</product>
<product>werkzeug:0.11</product>
<product>werkzeug:0.11.1</product>
<product>werkzeug:0.11.2</product>
<product>werkzeug:0.11.3</product>
<product>werkzeug:0.11.4</product>
<product>werkzeug:0.11.5</product>
<product>werkzeug:0.11.6</product>
<product>werkzeug:0.11.7</product>
<product>werkzeug:0.11.8</product>
<product>werkzeug:0.11.9</product>
<product>werkzeug:0.11.10</product>
</cve>
<cve id="CVE-2016-10517" level="MEDIUM">
<product>redis:1.3.6</product>
<product>redis:1.3.7</product>
<product>redis:1.3.8</product>
<product>redis:1.3.9</product>
<product>redis:1.3.10</product>
<product>redis:1.3.11</product>
<product>redis:1.3.12</product>
<product>redis:2.0.0</product>
<product>redis:2.0.0</product>
<product>redis:2.0.0</product>
<product>redis:2.0.0</product>
<product>redis:2.0.0</product>
<product>redis:2.0.0</product>
<product>redis:2.0.1</product>
<product>redis:2.0.2</product>
<product>redis:2.0.3</product>
<product>redis:2.0.4</product>
<product>redis:2.0.5</product>
<product>redis:2.1.1</product>
<product>redis:2.2</product>
<product>redis:2.2</product>
<product>redis:2.2</product>
<product>redis:2.2</product>
<product>redis:2.2</product>
<product>redis:2.2</product>
<product>redis:2.2</product>
<product>redis:2.2.0</product>
<product>redis:2.2.0</product>
<product>redis:2.2.0</product>
<product>redis:2.2.0</product>
<product>redis:2.2.0</product>
<product>redis:2.2.2</product>
<product>redis:2.2.3</product>
<product>redis:2.2.4</product>
<product>redis:2.2.5</product>
<product>redis:2.2.6</product>
<product>redis:2.2.7</product>
<product>redis:2.2.8</product>
<product>redis:2.2.9</product>
<product>redis:2.2.10</product>
<product>redis:2.2.11</product>
<product>redis:2.2.12</product>
<product>redis:2.2.13</product>
<product>redis:2.2.14</product>
<product>redis:2.2.15</product>
<product>redis:2.2.105</product>
<product>redis:2.2.106</product>
<product>redis:2.2.107</product>
<product>redis:2.2.110</product>
<product>redis:2.2.111</product>
<product>redis:2.3</product>
<product>redis:2.4.0</product>
<product>redis:2.4.0</product>
<product>redis:2.4.0</product>
<product>redis:2.4.0</product>
<product>redis:2.4.0</product>
<product>redis:2.4.0</product>
<product>redis:2.4.0</product>
<product>redis:2.4.0</product>
<product>redis:2.4.0</product>
<product>redis:2.4.1</product>
<product>redis:2.4.2</product>
<product>redis:2.4.3</product>
<product>redis:2.4.4</product>
<product>redis:2.4.5</product>
<product>redis:2.4.6</product>
<product>redis:2.4.7</product>
<product>redis:2.4.8</product>
<product>redis:2.4.9</product>
<product>redis:2.4.10</product>
<product>redis:2.4.11</product>
<product>redis:2.4.12</product>
<product>redis:2.4.13</product>
<product>redis:2.4.14</product>
<product>redis:2.4.15</product>
<product>redis:2.4.16</product>
<product>redis:2.4.17</product>
<product>redis:2.4.18</product>
<product>redis:2.6.0</product>
<product>redis:2.6.0</product>
<product>redis:2.6.0</product>
<product>redis:2.6.0</product>
<product>redis:2.6.0</product>
<product>redis:2.6.0</product>
<product>redis:2.6.0</product>
<product>redis:2.6.0</product>
<product>redis:2.6.0</product>
<product>redis:2.6.1</product>
<product>redis:2.6.2</product>
<product>redis:2.6.3</product>
<product>redis:2.6.4</product>
<product>redis:2.6.5</product>
<product>redis:2.6.6</product>
<product>redis:2.6.7</product>
<product>redis:2.6.7-1</product>
<product>redis:2.6.8</product>
<product>redis:2.6.8-1</product>
<product>redis:2.6.9</product>
<product>redis:2.6.9-1</product>
<product>redis:2.6.10</product>
<product>redis:2.6.10-1</product>
<product>redis:2.6.10-2</product>
<product>redis:2.6.10-3</product>
<product>redis:2.6.11</product>
<product>redis:2.6.12</product>
<product>redis:2.6.13</product>
<product>redis:2.6.14</product>
<product>redis:2.6.14-1</product>
<product>redis:2.6.14-2</product>
<product>redis:2.6.15</product>
<product>redis:2.6.16</product>
<product>redis:2.6.17</product>
<product>redis:2.8.0</product>
<product>redis:2.8.0</product>
<product>redis:2.8.0</product>
<product>redis:2.8.0</product>
<product>redis:2.8.0</product>
<product>redis:2.8.0</product>
<product>redis:2.8.0</product>
<product>redis:2.8.1</product>
<product>redis:2.8.2</product>
<product>redis:2.8.3</product>
<product>redis:2.8.4</product>
<product>redis:2.8.5</product>
<product>redis:2.8.6</product>
<product>redis:2.8.7</product>
<product>redis:2.8.8</product>
<product>redis:2.8.9</product>
<product>redis:2.8.10</product>
<product>redis:2.8.11</product>
<product>redis:2.8.12</product>
<product>redis:2.8.13</product>
<product>redis:2.8.14</product>
<product>redis:2.8.15</product>
<product>redis:2.8.16</product>
<product>redis:2.8.17</product>
<product>redis:2.8.18</product>
<product>redis:2.8.19</product>
<product>redis:2.8.20</product>
<product>redis:2.8.21</product>
<product>redis:2.8.22</product>
<product>redis:2.8.23</product>
<product>redis:2.8.24</product>
<product>redis:3.0</product>
<product>redis:3.0.0</product>
<product>redis:3.0.0</product>
<product>redis:3.0.0</product>
<product>redis:3.0.0</product>
<product>redis:3.0.0</product>
<product>redis:3.0.0</product>
<product>redis:3.0.0</product>
<product>redis:3.0.0</product>
<product>redis:3.0.0</product>
<product>redis:3.0.0</product>
<product>redis:3.0.0</product>
<product>redis:3.0.0</product>
<product>redis:3.0.0</product>
<product>redis:3.0.0</product>
<product>redis:3.0.0</product>
<product>redis:3.0.1</product>
<product>redis:3.0.2</product>
<product>redis:3.0.3</product>
<product>redis:3.0.4</product>
<product>redis:3.0.5</product>
<product>redis:3.0.6</product>
<product>redis:3.0.7</product>
<product>redis:3.2</product>
<product>redis:3.2.0</product>
<product>redis:3.2.0</product>
<product>redis:3.2.0</product>
<product>redis:3.2.1</product>
<product>redis:3.2.2</product>
<product>redis:3.2.3</product>
<product>redis:3.2.4</product>
<product>redis:3.2.5</product>
<product>redis:3.2.6</product>
</cve>
<cve id="CVE-2016-10046" level="MEDIUM">
<product>imagemagick:6.9.5-4</product>
</cve>
<cve id="CVE-2016-10511" level="MEDIUM">
<product>twitter:6.62</product>
<product>twitter:6.62.1</product>
</cve>
<cve id="CVE-2016-10512" level="LOW">
<product>faxfinder:-</product>
</cve>
<cve id="CVE-2016-10513" level="MEDIUM">
<product>piwigo:2.8.2</product>
</cve>
<cve id="CVE-2016-9139" level="MEDIUM">
<product>otrs:3.0.0</product>
<product>otrs:3.0.0</product>
<product>otrs:3.0.0</product>
<product>otrs:3.0.0</product>
<product>otrs:3.0.0</product>
<product>otrs:3.0.0</product>
<product>otrs:3.0.0</product>
<product>otrs:3.0.1</product>
<product>otrs:3.0.2</product>
<product>otrs:3.0.3</product>
<product>otrs:3.0.4</product>
<product>otrs:3.0.5</product>
<product>otrs:3.0.6</product>
<product>otrs:3.0.7</product>
<product>otrs:3.0.8</product>
<product>otrs:3.0.9</product>
<product>otrs:3.0.10</product>
<product>otrs:3.0.11</product>
<product>otrs:3.0.12</product>
<product>otrs:3.0.13</product>
<product>otrs:3.0.14</product>
<product>otrs:3.0.15</product>
<product>otrs:3.0.16</product>
<product>otrs:3.0.17</product>
<product>otrs:3.1.0</product>
<product>otrs:3.1.1</product>
<product>otrs:3.1.2</product>
<product>otrs:3.1.3</product>
<product>otrs:3.1.4</product>
<product>otrs:3.1.5</product>
<product>otrs:3.1.6</product>
<product>otrs:3.1.7</product>
<product>otrs:3.1.8</product>
<product>otrs:3.1.9</product>
<product>otrs:3.1.10</product>
<product>otrs:3.1.11</product>
<product>otrs:3.1.13</product>
<product>otrs:3.1.14</product>
<product>otrs:3.1.15</product>
<product>otrs:3.1.16</product>
<product>otrs:3.1.17</product>
<product>otrs:3.1.18</product>
<product>otrs:3.1.19</product>
<product>otrs:3.1.20</product>
<product>otrs:3.1.21</product>
<product>otrs:3.2.0</product>
<product>otrs:3.2.0</product>
<product>otrs:3.2.0</product>
<product>otrs:3.2.0</product>
<product>otrs:3.2.0</product>
<product>otrs:3.2.0</product>
<product>otrs:3.2.0</product>
<product>otrs:3.2.1</product>
<product>otrs:3.2.2</product>
<product>otrs:3.2.3</product>
<product>otrs:3.2.4</product>
<product>otrs:3.2.5</product>
<product>otrs:3.2.6</product>
<product>otrs:3.2.7</product>
<product>otrs:3.2.8</product>
<product>otrs:3.2.9</product>
<product>otrs:3.2.10</product>
<product>otrs:3.2.11</product>
<product>otrs:3.2.12</product>
<product>otrs:3.2.13</product>
<product>otrs:3.2.14</product>
<product>otrs:3.2.15</product>
<product>otrs:3.2.16</product>
<product>otrs:3.3.0</product>
<product>otrs:3.3.0</product>
<product>otrs:3.3.0</product>
<product>otrs:3.3.0</product>
<product>otrs:3.3.0</product>
<product>otrs:3.3.0</product>
<product>otrs:3.3.0</product>
<product>otrs:3.3.1</product>
<product>otrs:3.3.2</product>
<product>otrs:3.3.3</product>
<product>otrs:3.3.4</product>
<product>otrs:3.3.5</product>
<product>otrs:3.3.6</product>
<product>otrs:3.3.7</product>
<product>otrs:3.3.8</product>
<product>otrs:3.3.9</product>
<product>otrs:3.3.10</product>
<product>otrs:3.3.11</product>
<product>otrs:3.3.12</product>
<product>otrs:3.3.13</product>
<product>otrs:3.3.14</product>
<product>otrs:3.3.15</product>
<product>otrs:4.0.0</product>
<product>otrs:4.0.0</product>
<product>otrs:4.0.0</product>
<product>otrs:4.0.0</product>
<product>otrs:4.0.0</product>
<product>otrs:4.0.0</product>
<product>otrs:4.0.1</product>
<product>otrs:4.0.2</product>
<product>otrs:4.0.3</product>
<product>otrs:4.0.4</product>
<product>otrs:4.0.5</product>
<product>otrs:4.0.6</product>
<product>otrs:4.0.7</product>
<product>otrs:4.0.8</product>
<product>otrs:4.0.9</product>
<product>otrs:4.0.10</product>
<product>otrs:4.0.11</product>
<product>otrs:4.0.12</product>
<product>otrs:4.0.13</product>
<product>otrs:4.0.14</product>
<product>otrs:4.0.15</product>
<product>otrs:4.0.16</product>
<product>otrs:4.0.17</product>
<product>otrs:4.0.18</product>
<product>otrs:5.0.0</product>
<product>otrs:5.0.0</product>
<product>otrs:5.0.0</product>
<product>otrs:5.0.0</product>
<product>otrs:5.0.0</product>
<product>otrs:5.0.0</product>
<product>otrs:5.0.1</product>
<product>otrs:5.0.2</product>
<product>otrs:5.0.3</product>
<product>otrs:5.0.4</product>
<product>otrs:5.0.5</product>
<product>otrs:5.0.6</product>
<product>otrs:5.0.7</product>
<product>otrs:5.0.8</product>
<product>otrs:5.0.9</product>
<product>otrs:5.0.10</product>
<product>otrs:5.0.11</product>
<product>otrs:5.0.12</product>
<product>otrs:5.0.13</product>
</cve>
<cve id="CVE-2016-9135" level="LOW">
<product>exponent_cms:2.3.9</product>
</cve>
<cve id="CVE-2016-9134" level="LOW">
<product>exponent_cms:2.3.9</product>
</cve>
<cve id="CVE-2016-9136" level="LOW">
<product>mujs:b6de34ac6d8bb7dd5461c57940acfbd3ee7fd93e</product>
</cve>
<cve id="CVE-2016-9131" level="LOW">
<product>bind:9.0</product>
<product>bind:9.0.0</product>
<product>bind:9.0.0</product>
<product>bind:9.0.0</product>
<product>bind:9.0.0</product>
<product>bind:9.0.0</product>
<product>bind:9.0.0</product>
<product>bind:9.0.1</product>
<product>bind:9.0.1</product>
<product>bind:9.0.1</product>
<product>bind:9.1</product>
<product>bind:9.1.0</product>
<product>bind:9.1.1</product>
<product>bind:9.1.1</product>
<product>bind:9.1.1</product>
<product>bind:9.1.1</product>
<product>bind:9.1.1</product>
<product>bind:9.1.1</product>
<product>bind:9.1.1</product>
<product>bind:9.1.1</product>
<product>bind:9.1.2</product>
<product>bind:9.1.2</product>
<product>bind:9.1.3</product>
<product>bind:9.1.3</product>
<product>bind:9.1.3</product>
<product>bind:9.1.3</product>
<product>bind:9.2</product>
<product>bind:9.2.0</product>
<product>bind:9.2.0</product>
<product>bind:9.2.0</product>
<product>bind:9.2.0</product>
<product>bind:9.2.0</product>
<product>bind:9.2.0</product>
<product>bind:9.2.0</product>
<product>bind:9.2.0</product>
<product>bind:9.2.0</product>
<product>bind:9.2.0</product>
<product>bind:9.2.0</product>
<product>bind:9.2.0</product>
<product>bind:9.2.0</product>
<product>bind:9.2.0</product>
<product>bind:9.2.0</product>
<product>bind:9.2.0</product>
<product>bind:9.2.1</product>
<product>bind:9.2.1</product>
<product>bind:9.2.1</product>
<product>bind:9.2.2</product>
<product>bind:9.2.2</product>
<product>bind:9.2.2</product>
<product>bind:9.2.2</product>
<product>bind:9.2.3</product>
<product>bind:9.2.3</product>
<product>bind:9.2.3</product>
<product>bind:9.2.3</product>
<product>bind:9.2.3</product>
<product>bind:9.2.4</product>
<product>bind:9.2.4</product>
<product>bind:9.2.4</product>
<product>bind:9.2.4</product>
<product>bind:9.2.4</product>
<product>bind:9.2.4</product>
<product>bind:9.2.4</product>
<product>bind:9.2.4</product>
<product>bind:9.2.5</product>
<product>bind:9.2.5</product>
<product>bind:9.2.5</product>
<product>bind:9.2.6</product>
<product>bind:9.2.6</product>
<product>bind:9.2.7</product>
<product>bind:9.2.7</product>
<product>bind:9.2.7</product>
<product>bind:9.2.7</product>
<product>bind:9.2.8</product>
<product>bind:9.2.9</product>
<product>bind:9.2.9</product>
<product>bind:9.3</product>
<product>bind:9.3.0</product>
<product>bind:9.3.0</product>
<product>bind:9.3.0</product>
<product>bind:9.3.0</product>
<product>bind:9.3.0</product>
<product>bind:9.3.0</product>
<product>bind:9.3.0</product>
<product>bind:9.3.0</product>
<product>bind:9.3.1</product>
<product>bind:9.3.1</product>
<product>bind:9.3.1</product>
<product>bind:9.3.2</product>
<product>bind:9.3.2</product>
<product>bind:9.3.3</product>
<product>bind:9.3.3</product>
<product>bind:9.3.3</product>
<product>bind:9.3.3</product>
<product>bind:9.3.4</product>
<product>bind:9.3.5</product>
<product>bind:9.3.5</product>
<product>bind:9.3.5</product>
<product>bind:9.3.5</product>
<product>bind:9.3.6</product>
<product>bind:9.3.6</product>
<product>bind:9.4</product>
<product>bind:9.4</product>
<product>bind:9.4</product>
<product>bind:9.4</product>
<product>bind:9.4</product>
<product>bind:9.4</product>
<product>bind:9.4</product>
<product>bind:9.4</product>
<product>bind:9.4</product>
<product>bind:9.4</product>
<product>bind:9.4</product>
<product>bind:9.4</product>
<product>bind:9.4.0</product>
<product>bind:9.4.0</product>
<product>bind:9.4.0</product>
<product>bind:9.4.0</product>
<product>bind:9.4.0</product>
<product>bind:9.4.0</product>
<product>bind:9.4.0</product>
<product>bind:9.4.0</product>
<product>bind:9.4.0</product>
<product>bind:9.4.0</product>
<product>bind:9.4.0</product>
<product>bind:9.4.0</product>
<product>bind:9.4.0</product>
<product>bind:9.4.1</product>
<product>bind:9.4.2</product>
<product>bind:9.4.2</product>
<product>bind:9.4.2</product>
<product>bind:9.4.2</product>
<product>bind:9.4.3</product>
<product>bind:9.4.3</product>
<product>bind:9.4.3</product>
<product>bind:9.4.3</product>
<product>bind:9.4.3</product>
<product>bind:9.4.3</product>
<product>bind:9.4.3</product>
<product>bind:9.4.3</product>
<product>bind:9.4.3</product>
<product>bind:9.4.3</product>
<product>bind:9.5</product>
<product>bind:9.5.0</product>
<product>bind:9.5.0</product>
<product>bind:9.5.0</product>
<product>bind:9.5.0</product>
<product>bind:9.5.0</product>
<product>bind:9.5.0</product>
<product>bind:9.5.0</product>
<product>bind:9.5.0</product>
<product>bind:9.5.0</product>
<product>bind:9.5.0</product>
<product>bind:9.5.0</product>
<product>bind:9.5.0</product>
<product>bind:9.5.0</product>
<product>bind:9.5.0</product>
<product>bind:9.5.0</product>
<product>bind:9.5.0</product>
<product>bind:9.5.1</product>
<product>bind:9.5.1</product>
<product>bind:9.5.1</product>
<product>bind:9.5.1</product>
<product>bind:9.5.1</product>
<product>bind:9.5.1</product>
<product>bind:9.5.2</product>
<product>bind:9.5.2</product>
<product>bind:9.5.2</product>
<product>bind:9.5.2</product>
<product>bind:9.5.2</product>
<product>bind:9.5.2</product>
<product>bind:9.5.2</product>
<product>bind:9.5.3</product>
<product>bind:9.5.3</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6</product>
<product>bind:9.6.0</product>
<product>bind:9.6.0</product>
<product>bind:9.6.0</product>
<product>bind:9.6.0</product>
<product>bind:9.6.0</product>
<product>bind:9.6.0</product>
<product>bind:9.6.1</product>
<product>bind:9.6.1</product>
<product>bind:9.6.1</product>
<product>bind:9.6.1</product>
<product>bind:9.6.1</product>
<product>bind:9.6.1</product>
<product>bind:9.6.2</product>
<product>bind:9.6.2</product>
<product>bind:9.6.2</product>
<product>bind:9.6.2</product>
<product>bind:9.6.2</product>
<product>bind:9.6.2</product>
<product>bind:9.6.3</product>
<product>bind:9.6.3</product>
<product>bind:9.6.3</product>
<product>bind:9.7.0</product>
<product>bind:9.7.0</product>
<product>bind:9.7.0</product>
<product>bind:9.7.0</product>
<product>bind:9.7.0</product>
<product>bind:9.7.0</product>
<product>bind:9.7.0</product>
<product>bind:9.7.0</product>
<product>bind:9.7.0</product>
<product>bind:9.7.0</product>
<product>bind:9.7.0</product>
<product>bind:9.7.1</product>
<product>bind:9.7.1</product>
<product>bind:9.7.1</product>
<product>bind:9.7.1</product>
<product>bind:9.7.1</product>
<product>bind:9.7.2</product>
<product>bind:9.7.2</product>
<product>bind:9.7.2</product>
<product>bind:9.7.2</product>
<product>bind:9.7.2</product>
<product>bind:9.7.3</product>
<product>bind:9.7.3</product>
<product>bind:9.7.3</product>
<product>bind:9.7.3</product>
<product>bind:9.7.4</product>
<product>bind:9.7.4</product>
<product>bind:9.7.4</product>
<product>bind:9.7.4</product>
<product>bind:9.7.5</product>
<product>bind:9.7.5</product>
<product>bind:9.7.5</product>
<product>bind:9.7.5</product>
<product>bind:9.7.6</product>
<product>bind:9.7.6</product>
<product>bind:9.7.6</product>
<product>bind:9.7.6</product>
<product>bind:9.7.6</product>
<product>bind:9.7.7</product>
<product>bind:9.8.0</product>
<product>bind:9.8.0</product>
<product>bind:9.8.0</product>
<product>bind:9.8.0</product>
<product>bind:9.8.0</product>
<product>bind:9.8.0</product>
<product>bind:9.8.0</product>
<product>bind:9.8.1</product>
<product>bind:9.8.1</product>
<product>bind:9.8.1</product>
<product>bind:9.8.1</product>
<product>bind:9.8.1</product>
<product>bind:9.8.1</product>
<product>bind:9.8.2</product>
<product>bind:9.8.2</product>
<product>bind:9.8.2</product>
<product>bind:9.8.2</product>
<product>bind:9.8.3</product>
<product>bind:9.8.3</product>
<product>bind:9.8.3</product>
<product>bind:9.8.3</product>
<product>bind:9.8.3</product>
<product>bind:9.8.4</product>
<product>bind:9.8.5</product>
<product>bind:9.8.5</product>
<product>bind:9.8.5</product>
<product>bind:9.8.5</product>
<product>bind:9.8.5</product>
<product>bind:9.8.5</product>
<product>bind:9.8.5</product>
<product>bind:9.8.6</product>
<product>bind:9.8.6</product>
<product>bind:9.8.6</product>
<product>bind:9.9.0</product>
<product>bind:9.9.0</product>
<product>bind:9.9.0</product>
<product>bind:9.9.0</product>
<product>bind:9.9.0</product>
<product>bind:9.9.0</product>
<product>bind:9.9.0</product>
<product>bind:9.9.0</product>
<product>bind:9.9.0</product>
<product>bind:9.9.0</product>
<product>bind:9.9.1</product>
<product>bind:9.9.1</product>
<product>bind:9.9.1</product>
<product>bind:9.9.1</product>
<product>bind:9.9.1</product>
<product>bind:9.9.2</product>
<product>bind:9.9.2</product>
<product>bind:9.9.2</product>
<product>bind:9.9.3</product>
<product>bind:9.9.3</product>
<product>bind:9.9.3</product>
<product>bind:9.9.3</product>
<product>bind:9.9.3</product>
<product>bind:9.9.3</product>
<product>bind:9.9.3</product>
<product>bind:9.9.4</product>
<product>bind:9.9.5</product>
<product>bind:9.9.6</product>
<product>bind:9.9.6</product>
<product>bind:9.9.7</product>
<product>bind:9.9.7</product>
<product>bind:9.9.7</product>
<product>bind:9.9.7</product>
<product>bind:9.9.8</product>
<product>bind:9.9.8</product>
<product>bind:9.9.8</product>
<product>bind:9.9.8</product>
<product>bind:9.9.8</product>
<product>bind:9.9.8</product>
<product>bind:9.9.8</product>
<product>bind:9.9.8</product>
<product>bind:9.9.8</product>
<product>bind:9.9.8</product>
<product>bind:9.9.8</product>
<product>bind:9.9.9</product>
<product>bind:9.9.9</product>
<product>bind:9.9.9</product>
<product>bind:9.9.9</product>
<product>bind:9.9.9</product>
<product>bind:9.9.9</product>
<product>bind:9.10.0</product>
<product>bind:9.10.0</product>
<product>bind:9.10.0</product>
<product>bind:9.10.0</product>
<product>bind:9.10.0</product>
<product>bind:9.10.0</product>
<product>bind:9.10.0</product>
<product>bind:9.10.0</product>
<product>bind:9.10.0</product>
<product>bind:9.10.1</product>
<product>bind:9.10.1</product>
<product>bind:9.10.1</product>
<product>bind:9.10.1</product>
<product>bind:9.10.1</product>
<product>bind:9.10.1</product>
<product>bind:9.10.1</product>
<product>bind:9.10.2</product>
<product>bind:9.10.2</product>
<product>bind:9.10.2</product>
<product>bind:9.10.2</product>
<product>bind:9.10.2</product>
<product>bind:9.10.2</product>
<product>bind:9.10.2</product>
<product>bind:9.10.3</product>
<product>bind:9.10.3</product>
<product>bind:9.10.3</product>
<product>bind:9.10.3</product>
<product>bind:9.10.3</product>
<product>bind:9.10.3</product>
<product>bind:9.10.3</product>
<product>bind:9.10.4</product>
<product>bind:9.10.4</product>
<product>bind:9.10.4</product>
<product>bind:9.10.4</product>
<product>bind:9.10.4</product>
<product>bind:9.10.4</product>
<product>bind:9.11.0</product>
<product>bind:9.11.0</product>
<product>bind:9.11.0</product>
<product>bind:9.11.0</product>
<product>bind:9.11.0</product>
<product>bind:9.11.0</product>
<product>bind:9.11.0</product>
<product>bind:9.11.0</product>
</cve>
<cve id="CVE-2016-9130" level="MEDIUM">
<product>revive_adserver:3.2.2</product>
</cve>
<cve id="CVE-2016-9132" level="LOW">
<product>botan:1.8.0</product>
<product>botan:1.8.1</product>
<product>botan:1.8.2</product>
<product>botan:1.8.3</product>
<product>botan:1.8.4</product>
<product>botan:1.8.5</product>
<product>botan:1.8.6</product>
<product>botan:1.8.7</product>
<product>botan:1.8.8</product>
<product>botan:1.8.9</product>
<product>botan:1.8.10</product>
<product>botan:1.8.11</product>
<product>botan:1.8.12</product>
<product>botan:1.8.13</product>
<product>botan:1.8.14</product>
<product>botan:1.8.15</product>
<product>botan:1.9.0</product>
<product>botan:1.9.1</product>
<product>botan:1.9.2</product>
<product>botan:1.9.3</product>
<product>botan:1.9.4</product>
<product>botan:1.9.5</product>
<product>botan:1.9.6</product>
<product>botan:1.9.7</product>
<product>botan:1.9.8</product>
<product>botan:1.9.9</product>
<product>botan:1.9.10</product>
<product>botan:1.9.11</product>
<product>botan:1.9.12</product>
<product>botan:1.9.13</product>
<product>botan:1.9.14</product>
<product>botan:1.9.15</product>
<product>botan:1.9.16</product>
<product>botan:1.9.17</product>
<product>botan:1.9.18</product>
<product>botan:1.10.0</product>
<product>botan:1.10.1</product>
<product>botan:1.10.2</product>
<product>botan:1.10.3</product>
<product>botan:1.10.4</product>
<product>botan:1.10.5</product>
<product>botan:1.10.6</product>
<product>botan:1.10.7</product>
<product>botan:1.10.8</product>
<product>botan:1.10.9</product>
<product>botan:1.10.10</product>
<product>botan:1.10.11</product>
<product>botan:1.10.12</product>
<product>botan:1.10.13</product>
<product>botan:1.10.14</product>
<product>botan:1.10.15</product>
<product>botan:1.11.0</product>
<product>botan:1.11.1</product>
<product>botan:1.11.2</product>
<product>botan:1.11.3</product>
<product>botan:1.11.4</product>
<product>botan:1.11.5</product>
<product>botan:1.11.6</product>
<product>botan:1.11.7</product>
<product>botan:1.11.8</product>
<product>botan:1.11.9</product>
<product>botan:1.11.10</product>
<product>botan:1.11.11</product>
<product>botan:1.11.12</product>
<product>botan:1.11.13</product>
<product>botan:1.11.14</product>
<product>botan:1.11.15</product>
<product>botan:1.11.16</product>
<product>botan:1.11.17</product>
<product>botan:1.11.18</product>
<product>botan:1.11.19</product>
<product>botan:1.11.20</product>
<product>botan:1.11.21</product>
<product>botan:1.11.23</product>
<product>botan:1.11.24</product>
<product>botan:1.11.25</product>
<product>botan:1.11.26</product>
<product>botan:1.11.27</product>
<product>botan:1.11.28</product>
<product>botan:1.11.29</product>
<product>botan:1.11.30</product>
<product>botan:1.11.31</product>
<product>botan:1.11.32</product>
<product>botan:1.11.33</product>
</cve>
<cve id="CVE-2016-1308" level="LOW">
<product>unified_communications_manager:10.5%5c%282.13900.9%5c%29</product>
</cve>
<cve id="CVE-2016-1309" level="MEDIUM">
<product>webex_meetings_server:2.5.1.5</product>
</cve>
<cve id="CVE-2016-1306" level="MEDIUM">
<product>fog_director:1.0%5c%280%5c%29</product>
</cve>
<cve id="CVE-2016-1307" level="LOW">
<product>finesse:10.5%5c%281%5c%29_base</product>
<product>finesse:11.0%5c%281%5c%29_base</product>
<product>unified_contact_center_express:10.6%5c%281%5c%29</product>
</cve>
<cve id="CVE-2016-1304" level="MEDIUM">
<product>unity_connection:10.5%282.3009%29</product>
</cve>
<cve id="CVE-2016-1305" level="MEDIUM">
<product>application_policy_infrastructure_controller_enterprise_module:1.1_base</product>
</cve>
<cve id="CVE-2016-1302" level="LOW">
<product>application_policy_infrastructure_controller:1.0%5c%281e%5c%29</product>
<product>application_policy_infrastructure_controller:1.0%5c%281h%5c%29</product>
<product>application_policy_infrastructure_controller:1.0%5c%281k%5c%29</product>
<product>application_policy_infrastructure_controller:1.0%5c%281n%5c%29</product>
<product>application_policy_infrastructure_controller:1.0%5c%282j%5c%29</product>
<product>application_policy_infrastructure_controller:1.0%5c%282m%5c%29</product>
<product>application_policy_infrastructure_controller:1.0%5c%283f%5c%29</product>
<product>application_policy_infrastructure_controller:1.1%5c%280.920a%5c%29</product>
<product>nx-os:11.0%5c%281b%5c%29</product>
<product>nx-os:11.0%5c%281c%5c%29</product>
<product>nx-os:11.0%5c%281d%5c%29</product>
<product>nx-os:11.0%5c%281e%5c%29</product>
<product>nx-os:11.0%5c%282j%5c%29</product>
<product>nx-os:11.0%5c%282m%5c%29</product>
<product>nx-os:11.0%5c%283f%5c%29</product>
<product>nx-os:base</product>
</cve>
<cve id="CVE-2016-1303" level="LOW">
<product>500_series_switch_firmware:1.2.0.92</product>
</cve>
<cve id="CVE-2016-1300" level="MEDIUM">
<product>unity_connection:10.5%282.3009%29</product>
</cve>
<cve id="CVE-2016-1301" level="MEDIUM">
<product>prime_security_manager:9.0.0</product>
<product>prime_security_manager:9.0.1-40</product>
<product>prime_security_manager:9.0.2-68</product>
<product>prime_security_manager:9.1.0</product>
<product>prime_security_manager:9.1.2-29</product>
<product>prime_security_manager:9.1.2-42</product>
<product>prime_security_manager:9.1.3-8</product>
<product>prime_security_manager:9.1.3-10</product>
<product>prime_security_manager:9.1.3-13</product>
<product>prime_security_manager:9.2.0</product>
<product>prime_security_manager:9.2.1-1</product>
<product>prime_security_manager:9.2.1-2</product>
<product>asa_cx_context-aware_security_software:9.0.1</product>
<product>asa_cx_context-aware_security_software:9.0.1-40</product>
<product>asa_cx_context-aware_security_software:9.0.2</product>
<product>asa_cx_context-aware_security_software:9.0.2-68</product>
<product>asa_cx_context-aware_security_software:9.0_base</product>
<product>asa_cx_context-aware_security_software:9.1.2-29</product>
<product>asa_cx_context-aware_security_software:9.1.2-42</product>
<product>asa_cx_context-aware_security_software:9.1.3-8</product>
<product>asa_cx_context-aware_security_software:9.1.3-10</product>
<product>asa_cx_context-aware_security_software:9.1.3-13</product>
<product>asa_cx_context-aware_security_software:9.2.1-1</product>
<product>asa_cx_context-aware_security_software:9.2.1-2</product>
<product>asa_cx_context-aware_security_software:9.2.1-3</product>
<product>asa_cx_context-aware_security_software:9.2.1-4</product>
</cve>
<cve id="CVE-2016-1000009" level="LOW">
<product>tp-link:-</product>
</cve>
<cve id="CVE-2016-5799" level="LOW">
<product>oncell_g3001_firmware:1.6</product>
<product>oncell_g3100v2_firmware:2.7</product>
</cve>
<cve id="CVE-2016-5798" level="LOW">
<product>automation_fv_designer:1.2.8.0</product>
<product>automation_pm_designer:2.1.2.2</product>
</cve>
<cve id="CVE-2016-5795" level="LOW">
<product>i-vu:6.5</product>
<product>sitescan_web:6.5</product>
<product>webctrl:6.5</product>
</cve>
<cve id="CVE-2016-1000001" level="MEDIUM">
<product>flask-oidc:0.1.2</product>
</cve>
<cve id="CVE-2016-5797" level="LOW">
<product>lighthouse_sms:5.1</product>
</cve>
<cve id="CVE-2016-5796" level="MEDIUM">
<product>automation_fv_designer:1.2.8.0</product>
<product>automation_pm_designer:2.1.2.2</product>
</cve>
<cve id="CVE-2016-5791" level="LOW">
<product>jtc-200_firmware</product>
</cve>
<cve id="CVE-2016-5790" level="LOW">
<product>lighthouse_sms:5.1</product>
</cve>
<cve id="CVE-2016-5793" level="LOW">
<product>active_opc_server:2.4.18</product>
</cve>
<cve id="CVE-2016-5792" level="LOW">
<product>softcms:1.4</product>
</cve>
<cve id="CVE-2016-4350" level="LOW">
<product>storage_resource_monitor:6.2.1</product>
</cve>
<cve id="CVE-2016-5429" level="MEDIUM">
<product>jose-php:2.2.0</product>
</cve>
<cve id="CVE-2016-5422" level="LOW">
<product>jboss_operations_network:3.3.6</product>
</cve>
<cve id="CVE-2016-5427" level="LOW">
<product>authoritative:3.4.9</product>
</cve>
<cve id="CVE-2016-5426" level="LOW">
<product>authoritative:3.4.9</product>
</cve>
<cve id="CVE-2016-4351" level="LOW">
<product>email_encryption_gateway:5.5</product>
</cve>
<cve id="CVE-2016-6210" level="MEDIUM">
<product>openssh:7.2</product>
</cve>
<cve id="CVE-2016-6212" level="LOW">
<product>drupal:7.0</product>
<product>drupal:7.0</product>
<product>drupal:7.0</product>
<product>drupal:7.0</product>
<product>drupal:7.0</product>
<product>drupal:7.0</product>
<product>drupal:7.0</product>
<product>drupal:7.0</product>
<product>drupal:7.0</product>
<product>drupal:7.0</product>
<product>drupal:7.0</product>
<product>drupal:7.0</product>
<product>drupal:7.0</product>
<product>drupal:7.0</product>
<product>drupal:7.0</product>
<product>drupal:7.0</product>
<product>drupal:7.1</product>
<product>drupal:7.2</product>
<product>drupal:7.3</product>
<product>drupal:7.4</product>
<product>drupal:7.5</product>
<product>drupal:7.6</product>
<product>drupal:7.7</product>
<product>drupal:7.8</product>
<product>drupal:7.9</product>
<product>drupal:7.10</product>
<product>drupal:7.11</product>
<product>drupal:7.12</product>
<product>drupal:7.13</product>
<product>drupal:7.14</product>
<product>drupal:7.15</product>
<product>drupal:7.16</product>
<product>drupal:7.17</product>
<product>drupal:7.18</product>
<product>drupal:7.19</product>
<product>drupal:7.20</product>
<product>drupal:7.21</product>
<product>drupal:7.22</product>
<product>drupal:7.23</product>
<product>drupal:7.24</product>
<product>drupal:7.25</product>
<product>drupal:7.26</product>
<product>drupal:7.27</product>
<product>drupal:7.28</product>
<product>drupal:7.29</product>
<product>drupal:7.30</product>
<product>drupal:7.31</product>
<product>drupal:7.32</product>
<product>drupal:7.33</product>
<product>drupal:7.34</product>
<product>drupal:7.35</product>
<product>drupal:7.36</product>
<product>drupal:7.37</product>
<product>drupal:7.38</product>
<product>drupal:7.39</product>
<product>drupal:7.40</product>
<product>drupal:7.41</product>
<product>drupal:7.42</product>
<product>drupal:7.43</product>
<product>drupal:7.x-dev</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.0</product>
<product>drupal:8.0.1</product>
<product>drupal:8.0.2</product>
<product>drupal:8.0.3</product>
<product>drupal:8.0.4</product>
<product>drupal:8.0.5</product>
<product>drupal:8.0.6</product>
<product>drupal:8.1.0</product>
<product>drupal:8.1.0</product>
<product>drupal:8.1.0</product>
<product>drupal:8.1.0</product>
<product>drupal:8.1.1</product>
<product>drupal:8.1.2</product>
</cve>
<cve id="CVE-2016-10721" level="LOW">
<product>partclone:0.2.87</product>
</cve>
<cve id="CVE-2016-3489" level="LOW">
<product>database:11.2.0.4</product>
<product>database:12.1.0.1</product>
<product>database:12.1.0.2</product>
</cve>
<cve id="CVE-2016-3488" level="LOW">
<product>database:12.1.0.2</product>
</cve>
<cve id="CVE-2016-3487" level="LOW">
<product>webcenter_sites:11.1.1.8</product>
<product>webcenter_sites:12.2.1.0</product>
</cve>
<cve id="CVE-2016-3485" level="LOW">
<product>jdk:1.6.0</product>
<product>jdk:1.7.0</product>
<product>jdk:1.8.0</product>
<product>jdk:1.8.0</product>
<product>jre:1.6.0</product>
<product>jre:1.7.0</product>
<product>jre:1.8.0</product>
<product>jre:1.8.0</product>
<product>jrockit:r28.3.10</product>
</cve>
<cve id="CVE-2016-3484" level="LOW">
<product>database:11.2.0.4</product>
<product>database:12.1.0.1</product>
<product>database:12.1.0.2</product>
</cve>
<cve id="CVE-2016-3483" level="LOW">
<product>peoplesoft_enterprise_peopletools:8.53</product>
<product>peoplesoft_enterprise_peopletools:8.54</product>
<product>peoplesoft_enterprise_peopletools:8.55</product>
</cve>
<cve id="CVE-2016-3481" level="LOW">
<product>integrated_lights_out_manager_firmware:3.0</product>
<product>integrated_lights_out_manager_firmware:3.1</product>
<product>integrated_lights_out_manager_firmware:3.2</product>
</cve>
<cve id="CVE-2016-7038" level="LOW">
<product>moodle:2.7.15</product>
<product>moodle:2.8</product>
<product>moodle:2.8.1</product>
<product>moodle:2.8.2</product>
<product>moodle:2.8.3</product>
<product>moodle:2.8.4</product>
<product>moodle:2.8.5</product>
<product>moodle:2.8.6</product>
<product>moodle:2.8.7</product>
<product>moodle:2.8.8</product>
<product>moodle:2.8.9</product>
<product>moodle:2.8.10</product>
<product>moodle:2.8.11</product>
<product>moodle:2.8.12</product>
<product>moodle:2.9</product>
<product>moodle:2.9.1</product>
<product>moodle:2.9.2</product>
<product>moodle:2.9.3</product>
<product>moodle:2.9.4</product>
<product>moodle:2.9.5</product>
<product>moodle:2.9.6</product>
<product>moodle:2.9.7</product>
<product>moodle:3.0</product>
<product>moodle:3.0.1</product>
<product>moodle:3.0.2</product>
<product>moodle:3.0.3</product>
<product>moodle:3.0.4</product>
<product>moodle:3.0.5</product>
<product>moodle:3.1.0</product>
<product>moodle:3.1.1</product>
</cve>
<cve id="CVE-2016-7032" level="MEDIUM">
<product>sudo:1.6.8</product>
<product>sudo:1.6.9</product>
<product>sudo:1.7.0</product>
<product>sudo:1.7.1</product>
<product>sudo:1.7.2</product>
<product>sudo:1.7.3</product>
<product>sudo:1.7.4</product>
<product>sudo:1.7.5</product>
<product>sudo:1.7.6</product>
<product>sudo:1.7.7</product>
<product>sudo:1.7.8</product>
<product>sudo:1.7.9</product>
<product>sudo:1.7.10</product>
<product>sudo:1.8.0</product>
<product>sudo:1.8.1</product>
<product>sudo:1.8.2</product>
<product>sudo:1.8.3</product>
<product>sudo:1.8.4</product>
<product>sudo:1.8.5</product>
<product>sudo:1.8.6</product>
<product>sudo:1.8.7</product>
<product>sudo:1.8.8</product>
<product>sudo:1.8.9</product>
<product>sudo:1.8.10</product>
<product>sudo:1.8.11</product>
<product>sudo:1.8.12</product>
<product>sudo:1.8.13</product>
<product>sudo:1.8.14</product>
</cve>
<cve id="CVE-2016-7033" level="MEDIUM">
<product>jboss_bpm_suite:6.3.2</product>
</cve>
<cve id="CVE-2016-7030" level="LOW">
<product>freeipa:4.6.0</product>
</cve>
<cve id="CVE-2016-7031" level="MEDIUM">
<product>ceph:10.0.0</product>
<product>ceph_storage:1.3.2</product>
</cve>
<cve id="CVE-2016-7036" level="LOW">
<product>python-jose:1.3.1</product>
</cve>
<cve id="CVE-2016-7037" level="LOW">
<product>jwt:1.0.2</product>
</cve>
<cve id="CVE-2016-7034" level="MEDIUM">
<product>jboss_bpm_suite:6.3.2</product>
</cve>
<cve id="CVE-2016-4216" level="LOW">
<product>xmp_toolkit:5.1.2</product>
</cve>
<cve id="CVE-2016-4215" level="LOW">
<product>acrobat:11.0.16</product>
<product>acrobat_dc:15.006.30174</product>
<product>acrobat_dc:15.016.20045</product>
<product>acrobat_reader_dc:15.006.30174</product>
<product>acrobat_reader_dc:15.016.20045</product>
<product>reader:11.0.16</product>
</cve>
<cve id="CVE-2016-4214" level="LOW">
<product>acrobat:11.0.16</product>
<product>acrobat_dc:15.006.30174</product>
<product>acrobat_dc:15.016.20045</product>
<product>acrobat_reader_dc:15.006.30174</product>
<product>acrobat_reader_dc:15.016.20045</product>
<product>reader:11.0.16</product>
</cve>
<cve id="CVE-2016-4213" level="LOW">
<product>acrobat:11.0.16</product>
<product>acrobat_dc:15.006.30174</product>
<product>acrobat_dc:15.016.20045</product>
<product>acrobat_reader_dc:15.006.30174</product>
<product>acrobat_reader_dc:15.016.20045</product>
<product>reader:11.0.16</product>
</cve>
<cve id="CVE-2016-4212" level="LOW">
<product>acrobat:11.0.16</product>
<product>acrobat_dc:15.006.30174</product>
<product>acrobat_dc:15.016.20045</product>
<product>acrobat_reader_dc:15.006.30174</product>
<product>acrobat_reader_dc:15.016.20045</product>
<product>reader:11.0.16</product>
</cve>
<cve id="CVE-2016-4211" level="LOW">
<product>acrobat:11.0.16</product>
<product>acrobat_dc:15.006.30174</product>
<product>acrobat_dc:15.016.20045</product>
<product>acrobat_reader_dc:15.006.30174</product>
<product>acrobat_reader_dc:15.016.20045</product>
<product>reader:11.0.16</product>
</cve>
<cve id="CVE-2016-4210" level="LOW">
<product>acrobat:11.0.16</product>
<product>acrobat_dc:15.006.30174</product>
<product>acrobat_dc:15.016.20045</product>
<product>acrobat_reader_dc:15.006.30174</product>
<product>acrobat_reader_dc:15.016.20045</product>
<product>reader:11.0.16</product>
</cve>
<cve id="CVE-2016-3269" level="MEDIUM">
<product>edge:-</product>
</cve>
<cve id="CVE-2016-3261" level="HIGH">
<product>internet_explorer:11</product>
</cve>
<cve id="CVE-2016-3260" level="MEDIUM">
<product>edge:-</product>
<product>internet_explorer:11</product>
</cve>
<cve id="CVE-2016-3267" level="MEDIUM">
<product>edge:-</product>
<product>internet_explorer:9</product>
<product>internet_explorer:10</product>
<product>internet_explorer:11</product>
</cve>
<cve id="CVE-2016-3265" level="MEDIUM">
<product>edge:-</product>
</cve>
<cve id="CVE-2016-3264" level="HIGH">
<product>edge:-</product>
<product>internet_explorer:9</product>
<product>internet_explorer:10</product>
<product>internet_explorer:11</product>
</cve>
<cve id="CVE-2016-0680" level="LOW">
<product>peoplesoft_supply_chain_management_eprocurement:9.1</product>
<product>peoplesoft_supply_chain_management_eprocurement:9.2</product>
</cve>
<cve id="CVE-2016-0681" level="LOW">
<product>olap:11.2.0.4</product>
<product>olap:12.1.0.1</product>
<product>olap:12.1.0.2</product>
</cve>
<cve id="CVE-2016-0682" level="MEDIUM">
<product>oracle_berkeley_db:11.2.5.0.32</product>
<product>oracle_berkeley_db:11.2.5.1.29</product>
<product>oracle_berkeley_db:11.2.5.2.42</product>
<product>oracle_berkeley_db:11.2.5.3.28</product>
<product>oracle_berkeley_db:12.1.6.0.35</product>
<product>oracle_berkeley_db:12.1.6.1.26</product>
</cve>
<cve id="CVE-2016-0683" level="LOW">
<product>peoplesoft_enterprise_peopletools:8.53</product>
<product>peoplesoft_enterprise_peopletools:8.54</product>
<product>peoplesoft_enterprise_peopletools:8.55</product>
</cve>
<cve id="CVE-2016-0684" level="LOW">
<product>micros_arspos:1.5</product>
</cve>
<cve id="CVE-2016-0685" level="LOW">
<product>peoplesoft_enterprise_peopletools:8.53</product>
<product>peoplesoft_enterprise_peopletools:8.54</product>
<product>peoplesoft_enterprise_peopletools:8.55</product>
</cve>
<cve id="CVE-2016-0686" level="LOW">
<product>jdk:1.6.0</product>
<product>jdk:1.7.0</product>
<product>jdk:1.8.0</product>
<product>jre:1.6.0</product>
<product>jre:1.7.0</product>
<product>jre:1.8.0</product>
</cve>
<cve id="CVE-2016-0687" level="LOW">
<product>jdk:1.6.0</product>
<product>jdk:1.7.0</product>
<product>jdk:1.8.0</product>
<product>jre:1.6.0</product>
<product>jre:1.7.0</product>
<product>jre:1.8.0</product>
</cve>
<cve id="CVE-2016-0689" level="MEDIUM">
<product>oracle_berkeley_db:11.2.5.0.32</product>
<product>oracle_berkeley_db:11.2.5.1.29</product>
<product>oracle_berkeley_db:11.2.5.2.42</product>
<product>oracle_berkeley_db:11.2.5.3.28</product>
<product>oracle_berkeley_db:12.1.6.0.35</product>
<product>oracle_berkeley_db:12.1.6.1.26</product>
</cve>
<cve id="CVE-2016-10187" level="MEDIUM">
<product>calibre:2.74.0</product>
</cve>
<cve id="CVE-2016-10186" level="LOW">
<product>dwr-932b_firmware:02.02eu</product>
</cve>
<cve id="CVE-2016-10185" level="LOW">
<product>dwr-932b_firmware:02.02eu</product>
</cve>
<cve id="CVE-2016-10184" level="LOW">
<product>dwr-932b_firmware:02.02eu</product>
</cve>
<cve id="CVE-2016-10183" level="LOW">
<product>dwr-932b_firmware:02.02eu</product>
</cve>
<cve id="CVE-2016-10182" level="LOW">
<product>dwr-932b_firmware:02.02eu</product>
</cve>
<cve id="CVE-2016-10181" level="LOW">
<product>dwr-932b_firmware:02.02eu</product>
</cve>
<cve id="CVE-2016-10180" level="LOW">
<product>dwr-932b_firmware:02.02eu</product>
</cve>
<cve id="CVE-2016-10189" level="LOW">
<product>bitlbee:3.4.2</product>
<product>bitlbee-libpurple:3.5</product>
</cve>
<cve id="CVE-2016-10188" level="LOW">
<product>bitlbee:3.4.2</product>
</cve>
<cve id="CVE-2016-3147" level="LOW">
<product>landesk_management_suite:10.0.0.271</product>
</cve>
<cve id="CVE-2016-3144" level="MEDIUM">
<product>block_class:7.x-2.0</product>
<product>block_class:7.x-2.1</product>
<product>fedora:24</product>
</cve>
<cve id="CVE-2016-1000144" level="MEDIUM">
<product>photoxhibit:2.1.8</product>
</cve>
<cve id="CVE-2016-3145" level="LOW">
<product>printer_firmware:atl.021.062</product>
<product>printer_firmware:cb.021.062</product>
<product>printer_firmware:pp.021.062</product>
<product>printer_firmware:yk.021.057</product>
<product>printer_firmware:yk.021.062</product>
</cve>
<cve id="CVE-2016-5234" level="MEDIUM">
<product>rse6500_firmware:v100r001c00</product>
<product>vp9600_series_firmware:v200r001c01</product>
<product>vp9600_series_firmware:v200r001c02</product>
<product>vp9600_series_firmware:v200r001c30</product>
</cve>
<cve id="CVE-2016-5233" level="MEDIUM">
<product>mate_8_firmware:-</product>
</cve>
<cve id="CVE-2016-9306" level="LOW">
<product>fbx_software_development_kit:2017.0</product>
</cve>
<cve id="CVE-2016-9307" level="LOW">
<product>fbx_software_development_kit:2017.0</product>
</cve>
<cve id="CVE-2016-9304" level="MEDIUM">
<product>fbx_software_development_kit:2017.0</product>
</cve>
<cve id="CVE-2016-9305" level="LOW">
<product>fbx_software_development_kit:2017.0</product>
</cve>
<cve id="CVE-2016-5546" level="LOW">
<product>jdk:1.6</product>
<product>jdk:1.7</product>
<product>jdk:1.8</product>
<product>jdk:1.8</product>
<product>jre:1.6</product>
<product>jre:1.7</product>
<product>jre:1.8</product>
<product>jre:1.8</product>
<product>jrockit:r28.3.12</product>
</cve>
<cve id="CVE-2016-9488" level="LOW">
<product>applications_manager:12.0</product>
<product>applications_manager:13.0</product>
</cve>
<cve id="CVE-2016-5547" level="LOW">
<product>jdk:1.7</product>
<product>jdk:1.8</product>
<product>jdk:1.8</product>
<product>jre:1.7</product>
<product>jre:1.8</product>
<product>jre:1.8</product>
<product>jrockit:r28.3.12</product>
</cve>
<cve id="CVE-2016-5302" level="LOW">
<product>xenserver:7.0</product>
</cve>
<cve id="CVE-2016-5303" level="MEDIUM">
<product>groupware:5.2.15</product>
<product>groupware:5.2.15</product>
</cve>
<cve id="CVE-2016-5301" level="LOW">
<product>libtorrent:1.1</product>
<product>leap:42.1</product>
<product>opensuse:13.2</product>
</cve>
<cve id="CVE-2016-5306" level="LOW">
<product>endpoint_protection_manager:12.1.6</product>
</cve>
<cve id="CVE-2016-5307" level="LOW">
<product>endpoint_protection_manager:12.1.6</product>
</cve>
<cve id="CVE-2016-5304" level="MEDIUM">
<product>endpoint_protection_manager:12.1.6</product>
</cve>
<cve id="CVE-2016-5305" level="MEDIUM">
<product>endpoint_protection_manager:12.1.6</product>
</cve>
<cve id="CVE-2016-5309" level="MEDIUM">
<product>advanced_threat_protection:-</product>
<product>csapi:10.0.4</product>
<product>data_center_security_server:-</product>
<product>email_security.cloud:-</product>
<product>endpoint_protection:12.1.4</product>
<product>endpoint_protection:12.1.6</product>
<product>endpoint_protection:12.1.6</product>
<product>endpoint_protection_cloud:-</product>
<product>endpoint_protection_cloud:-</product>
<product>endpoint_protection_for_small_business:-</product>
<product>endpoint_protection_for_small_business:12.1</product>
<product>mail_security_for_domino:8.0.9</product>
<product>mail_security_for_domino:8.1.2</product>
<product>mail_security_for_domino:8.1.3</product>
<product>mail_security_for_microsoft_exchange:6.5.8</product>
<product>mail_security_for_microsoft_exchange:7.0</product>
<product>mail_security_for_microsoft_exchange:7.0.1</product>
<product>mail_security_for_microsoft_exchange:7.0.2</product>
<product>mail_security_for_microsoft_exchange:7.0.3</product>
<product>mail_security_for_microsoft_exchange:7.0.4</product>
<product>mail_security_for_microsoft_exchange:7.5</product>
<product>mail_security_for_microsoft_exchange:7.5.1</product>
<product>mail_security_for_microsoft_exchange:7.5.2</product>
<product>mail_security_for_microsoft_exchange:7.5.3</product>
<product>mail_security_for_microsoft_exchange:7.5.4</product>
<product>messaging_gateway:10.6.1</product>
<product>messaging_gateway_for_service_providers:10.5</product>
<product>messaging_gateway_for_service_providers:10.6</product>
<product>protection_engine:7.0.5</product>
<product>protection_engine:7.5.0</product>
<product>protection_engine:7.5.1</product>
<product>protection_engine:7.5.2</product>
<product>protection_engine:7.5.3</product>
<product>protection_engine:7.5.4</product>
<product>protection_engine:7.5.5</product>
<product>protection_engine:7.8.0</product>
<product>protection_for_sharepoint_servers:6.0.3</product>
<product>protection_for_sharepoint_servers:6.0.4</product>
<product>protection_for_sharepoint_servers:6.0.5</product>
<product>protection_for_sharepoint_servers:6.0.6</product>
<product>protection_for_sharepoint_servers:6.0.7</product>
<product>web_gateway:-</product>
<product>web_security.cloud:-</product>
</cve>
<cve id="CVE-2016-0877" level="LOW">
<product>edr_g903_firmware:3.4.11</product>
</cve>
<cve id="CVE-2016-0876" level="LOW">
<product>edr_g903_firmware:3.4.11</product>
</cve>
<cve id="CVE-2016-0875" level="LOW">
<product>edr_g903_firmware:3.4.11</product>
</cve>
<cve id="CVE-2016-0871" level="LOW">
<product>eg2_web_control:4.04p</product>
</cve>
<cve id="CVE-2016-0870" level="LOW">
<product>tracer_sc:4.2.1134</product>
</cve>
<cve id="CVE-2016-0879" level="LOW">
<product>edr_g903_firmware:3.4.11</product>
</cve>
<cve id="CVE-2016-0878" level="LOW">
<product>edr_g903_firmware:3.4.11</product>
</cve>
<cve id="CVE-2016-2309" level="LOW">
<product>ruh2:-</product>
</cve>
<cve id="CVE-2016-2308" level="LOW">
<product>your_sha256_hashn:-</product>
<product>your_sha256_hash:2.0</product>
</cve>
<cve id="CVE-2016-2307" level="LOW">
<product>your_sha256_hashn:-</product>
<product>your_sha256_hash:2.0</product>
</cve>
<cve id="CVE-2016-2306" level="LOW">
<product>integraxor:4.2.4502</product>
</cve>
<cve id="CVE-2016-2305" level="MEDIUM">
<product>integraxor:4.2.4502</product>
</cve>
<cve id="CVE-2016-2304" level="MEDIUM">
<product>integraxor:4.2.4502</product>
</cve>
<cve id="CVE-2016-2303" level="LOW">
<product>integraxor:4.2.4502</product>
</cve>
<cve id="CVE-2016-2302" level="LOW">
<product>integraxor:4.2.4502</product>
</cve>
<cve id="CVE-2016-2301" level="LOW">
<product>integraxor:4.2.4502</product>
</cve>
<cve id="CVE-2016-2300" level="LOW">
<product>integraxor:4.2.4502</product>
</cve>
<cve id="CVE-2016-9371" level="MEDIUM">
<product>nport_5600-8-dtl_series_firmware:2.3</product>
<product>nport_5100_series_firmware:2.5</product>
<product>nport_5100_series_firmware:3.5</product>
<product>nport_5100a_series_firmware:1.2</product>
<product>nport_5200_series_firmware:2.7</product>
<product>nport_5200a_series_firmware:1.2</product>
<product>nport_5400_series_firmware:3.10</product>
<product>nport_5600_series_firmware:3.6</product>
<product>nport_5x50a1-m12_series_firmware:1.1</product>
<product>nport_6100_series_firmware:1.13</product>
<product>nport_p5150a_series_firmware:1.2</product>
</cve>
<cve id="CVE-2016-8920" level="MEDIUM">
<product>kenexa_lms_on_cloud:13.1</product>
<product>kenexa_lms_on_cloud:13.2</product>
<product>kenexa_lms_on_cloud:13.2.2</product>
<product>kenexa_lms_on_cloud:13.2.3</product>
<product>kenexa_lms_on_cloud:13.2.4</product>
</cve>
<cve id="CVE-2016-1580" level="LOW">
<product>ubuntu-core-launcher:1.0.27</product>
</cve>
<cve id="CVE-2016-8926" level="LOW">
<product>tivoli_application_dependency_discovery_manager:7.2.2</product>
<product>tivoli_application_dependency_discovery_manager:7.2.2.0</product>
<product>tivoli_application_dependency_discovery_manager:7.2.2.1</product>
<product>tivoli_application_dependency_discovery_manager:7.2.2.2</product>
<product>tivoli_application_dependency_discovery_manager:7.2.2.3</product>
<product>tivoli_application_dependency_discovery_manager:7.2.2.4</product>
<product>tivoli_application_dependency_discovery_manager:7.2.2.5</product>
<product>tivoli_application_dependency_discovery_manager:7.3.0</product>
<product>tivoli_application_dependency_discovery_manager:7.3.0.0</product>
<product>tivoli_application_dependency_discovery_manager:7.3.0.1</product>
<product>tivoli_application_dependency_discovery_manager:7.3.0.2</product>
<product>tivoli_application_dependency_discovery_manager:7.3.0.3</product>
</cve>
<cve id="CVE-2016-6022" level="MEDIUM">
<product>rational_quality_manager:4.0</product>
<product>rational_quality_manager:4.0.1</product>
<product>rational_quality_manager:4.0.2</product>
<product>rational_quality_manager:4.0.3</product>
<product>rational_quality_manager:4.0.4</product>
<product>rational_quality_manager:4.0.5</product>
<product>rational_quality_manager:4.0.6</product>
<product>rational_quality_manager:4.0.7</product>
<product>rational_quality_manager:5.0</product>
<product>rational_quality_manager:5.0.1</product>
<product>rational_quality_manager:5.0.2</product>
<product>rational_quality_manager:6.0</product>
<product>rational_quality_manager:6.0.1</product>
<product>rational_quality_manager:6.0.2</product>
<product>rational_quality_manager:6.0.3</product>
</cve>
<cve id="CVE-2016-6023" level="LOW">
<product>sterling_secure_proxy:3.4.2.0</product>
<product>sterling_secure_proxy:3.4.2.0</product>
<product>sterling_secure_proxy:3.4.2.0</product>
<product>sterling_secure_proxy:3.4.2.0</product>
<product>sterling_secure_proxy:3.4.2.0</product>
<product>sterling_secure_proxy:3.4.2.0</product>
<product>sterling_secure_proxy:3.4.2.0</product>
<product>sterling_secure_proxy:3.4.2.0</product>
<product>sterling_secure_proxy:3.4.3.0</product>
</cve>
<cve id="CVE-2016-6020" level="MEDIUM">
<product>sterling_b2b_integrator:5.2</product>
<product>sterling_b2b_integrator:5.2.1</product>
<product>sterling_b2b_integrator:5.2.2</product>
<product>sterling_b2b_integrator:5.2.4</product>
<product>sterling_b2b_integrator:5.2.4.1</product>
<product>sterling_b2b_integrator:5.2.4.2</product>
<product>sterling_b2b_integrator:5.2.5</product>
<product>sterling_b2b_integrator:5.2.6</product>
</cve>
<cve id="CVE-2016-6021" level="MEDIUM">
<product>emptoris_strategic_supply_management:10.0.0.0</product>
<product>emptoris_strategic_supply_management:10.0.0.1</product>
<product>emptoris_strategic_supply_management:10.0.0.2</product>
<product>emptoris_strategic_supply_management:10.0.0.3</product>
<product>emptoris_strategic_supply_management:10.0.1.0</product>
<product>emptoris_strategic_supply_management:10.0.1.1</product>
<product>emptoris_strategic_supply_management:10.0.1.2</product>
<product>emptoris_strategic_supply_management:10.0.1.3</product>
<product>emptoris_strategic_supply_management:10.0.1.4</product>
<product>emptoris_strategic_supply_management:10.0.2.0</product>
<product>emptoris_strategic_supply_management:10.0.2.1</product>
<product>emptoris_strategic_supply_management:10.0.2.2</product>
<product>emptoris_strategic_supply_management:10.0.2.3</product>
<product>emptoris_strategic_supply_management:10.0.2.4</product>
<product>emptoris_strategic_supply_management:10.0.2.5</product>
<product>emptoris_strategic_supply_management:10.0.2.6</product>
<product>emptoris_strategic_supply_management:10.0.2.7</product>
<product>emptoris_strategic_supply_management:10.0.2.8</product>
<product>emptoris_strategic_supply_management:10.0.2.9</product>
<product>emptoris_strategic_supply_management:10.0.2.10</product>
<product>emptoris_strategic_supply_management:10.0.2.11</product>
<product>emptoris_strategic_supply_management:10.0.2.12</product>
<product>emptoris_strategic_supply_management:10.0.2.13</product>
<product>emptoris_strategic_supply_management:10.0.2.14</product>
<product>emptoris_strategic_supply_management:10.0.2.15</product>
<product>emptoris_strategic_supply_management:10.0.4.0</product>
<product>emptoris_strategic_supply_management:10.1.0.0</product>
<product>emptoris_strategic_supply_management:10.1.0.1</product>
<product>emptoris_strategic_supply_management:10.1.0.2</product>
<product>emptoris_strategic_supply_management:10.1.0.3</product>
<product>emptoris_strategic_supply_management:10.1.0.4</product>
<product>emptoris_strategic_supply_management:10.1.0.5</product>
<product>emptoris_strategic_supply_management:10.1.0.6</product>
<product>emptoris_strategic_supply_management:10.1.0.7</product>
<product>emptoris_strategic_supply_management:10.1.0.8</product>
<product>emptoris_strategic_supply_management:10.1.0.9</product>
<product>emptoris_strategic_supply_management:10.1.0.10</product>
<product>emptoris_strategic_supply_management:10.1.1.0</product>
<product>emptoris_strategic_supply_management:10.1.1.1</product>
<product>emptoris_strategic_supply_management:10.1.1.2</product>
<product>emptoris_strategic_supply_management:10.1.1.3</product>
<product>emptoris_strategic_supply_management:10.1.1.4</product>
<product>emptoris_strategic_supply_management:10.1.1.5</product>
<product>emptoris_strategic_supply_management:10.1.1.6</product>
<product>emptoris_strategic_supply_management:10.1.1.7</product>
<product>emptoris_strategic_supply_management:10.1.1.8</product>
</cve>
<cve id="CVE-2016-6026" level="MEDIUM">
<product>sterling_secure_proxy:3.4.2.0</product>
<product>sterling_secure_proxy:3.4.2.0</product>
<product>sterling_secure_proxy:3.4.2.0</product>
<product>sterling_secure_proxy:3.4.2.0</product>
<product>sterling_secure_proxy:3.4.2.0</product>
<product>sterling_secure_proxy:3.4.2.0</product>
<product>sterling_secure_proxy:3.4.2.0</product>
<product>sterling_secure_proxy:3.4.2.0</product>
<product>sterling_secure_proxy:3.4.3.0</product>
</cve>
<cve id="CVE-2016-6027" level="MEDIUM">
<product>sterling_secure_proxy:3.4.2.0</product>
<product>sterling_secure_proxy:3.4.2.0</product>
<product>sterling_secure_proxy:3.4.2.0</product>
<product>sterling_secure_proxy:3.4.2.0</product>
<product>sterling_secure_proxy:3.4.2.0</product>
<product>sterling_secure_proxy:3.4.2.0</product>
<product>sterling_secure_proxy:3.4.2.0</product>
<product>sterling_secure_proxy:3.4.2.0</product>
<product>sterling_secure_proxy:3.4.3.0</product>
</cve>
<cve id="CVE-2016-6024" level="LOW">
<product>rational_collaborative_lifecycle_management:4.0</product>
<product>rational_collaborative_lifecycle_management:4.0.1</product>
<product>rational_collaborative_lifecycle_management:4.0.2</product>
<product>rational_collaborative_lifecycle_management:4.0.3</product>
<product>rational_collaborative_lifecycle_management:4.0.4</product>
<product>rational_collaborative_lifecycle_management:4.0.5</product>
<product>rational_collaborative_lifecycle_management:4.0.6</product>
<product>rational_collaborative_lifecycle_management:4.0.7</product>
<product>rational_collaborative_lifecycle_management:5.0</product>
<product>rational_collaborative_lifecycle_management:5.0.1</product>
<product>rational_collaborative_lifecycle_management:5.0.2</product>
<product>rational_collaborative_lifecycle_management:6.0</product>
<product>rational_collaborative_lifecycle_management:6.0.1</product>
<product>rational_collaborative_lifecycle_management:6.0.3</product>
<product>rational_collaborative_lifecycle_management:6.0.4</product>
<product>rational_doors_next_generation:4.0.1</product>
<product>rational_doors_next_generation:4.0.2</product>
<product>rational_doors_next_generation:4.0.3</product>
<product>rational_doors_next_generation:4.0.4</product>
<product>rational_doors_next_generation:4.0.5</product>
<product>rational_doors_next_generation:4.0.6</product>
<product>rational_doors_next_generation:4.0.7</product>
<product>rational_doors_next_generation:5.0</product>
<product>rational_doors_next_generation:5.0.1</product>
<product>rational_doors_next_generation:5.0.2</product>
<product>rational_doors_next_generation:6.0</product>
<product>rational_doors_next_generation:6.0.1</product>
<product>rational_doors_next_generation:6.0.2</product>
<product>rational_doors_next_generation:6.0.3</product>
<product>rational_doors_next_generation:6.0.4</product>
<product>rational_engineering_lifecycle_manager:4.0.3</product>
<product>rational_engineering_lifecycle_manager:4.0.4</product>
<product>rational_engineering_lifecycle_manager:4.0.5</product>
<product>rational_engineering_lifecycle_manager:4.0.6</product>
<product>rational_engineering_lifecycle_manager:4.0.7</product>
<product>rational_engineering_lifecycle_manager:5.0</product>
<product>rational_engineering_lifecycle_manager:5.0.1</product>
<product>rational_engineering_lifecycle_manager:5.0.2</product>
<product>rational_engineering_lifecycle_manager:6.0</product>
<product>rational_engineering_lifecycle_manager:6.0.1</product>
<product>rational_engineering_lifecycle_manager:6.0.2</product>
<product>rational_engineering_lifecycle_manager:6.0.3</product>
<product>rational_engineering_lifecycle_manager:6.0.4</product>
<product>rational_quality_manager:4.0</product>
<product>rational_quality_manager:4.0.0.1</product>
<product>rational_quality_manager:4.0.0.2</product>
<product>rational_quality_manager:4.0.1</product>
<product>rational_quality_manager:4.0.2</product>
<product>rational_quality_manager:4.0.3</product>
<product>rational_quality_manager:4.0.4</product>
<product>rational_quality_manager:4.0.5</product>
<product>rational_quality_manager:4.0.6</product>
<product>rational_quality_manager:4.0.7</product>
<product>rational_quality_manager:5.0</product>
<product>rational_quality_manager:5.0.1</product>
<product>rational_quality_manager:5.0.2</product>
<product>rational_quality_manager:6.0</product>
<product>rational_quality_manager:6.0.1</product>
<product>rational_quality_manager:6.0.2</product>
<product>rational_quality_manager:6.0.3</product>
<product>rational_quality_manager:6.0.4</product>
<product>rational_rhapsody_design_manager:4.0</product>
<product>rational_rhapsody_design_manager:4.0.1</product>
<product>rational_rhapsody_design_manager:4.0.2</product>
<product>rational_rhapsody_design_manager:4.0.3</product>
<product>rational_rhapsody_design_manager:4.0.4</product>
<product>rational_rhapsody_design_manager:4.0.5</product>
<product>rational_rhapsody_design_manager:4.0.6</product>
<product>rational_rhapsody_design_manager:4.0.7</product>
<product>rational_rhapsody_design_manager:5.0</product>
<product>rational_rhapsody_design_manager:5.0.1</product>
<product>rational_rhapsody_design_manager:5.0.2</product>
<product>rational_rhapsody_design_manager:6.0</product>
<product>rational_rhapsody_design_manager:6.0.1</product>
<product>rational_rhapsody_design_manager:6.0.2</product>
<product>rational_rhapsody_design_manager:6.0.3</product>
<product>rational_rhapsody_design_manager:6.0.4</product>
<product>rational_software_architect_design_manager:4.0</product>
<product>rational_software_architect_design_manager:4.0.1</product>
<product>rational_software_architect_design_manager:4.0.2</product>
<product>rational_software_architect_design_manager:4.0.3</product>
<product>rational_software_architect_design_manager:4.0.4</product>
<product>rational_software_architect_design_manager:4.0.5</product>
<product>rational_software_architect_design_manager:4.0.6</product>
<product>rational_software_architect_design_manager:4.0.7</product>
<product>rational_software_architect_design_manager:5.0</product>
<product>rational_software_architect_design_manager:5.0.1</product>
<product>rational_software_architect_design_manager:5.0.2</product>
<product>rational_software_architect_design_manager:6.0</product>
<product>rational_software_architect_design_manager:6.0.1</product>
<product>rational_team_concert:4.0</product>
<product>rational_team_concert:4.0.0.1</product>
<product>rational_team_concert:4.0.0.2</product>
<product>rational_team_concert:4.0.1</product>
<product>rational_team_concert:4.0.2</product>
<product>rational_team_concert:4.0.3</product>
<product>rational_team_concert:4.0.4</product>
<product>rational_team_concert:4.0.5</product>
<product>rational_team_concert:4.0.6</product>
<product>rational_team_concert:4.0.7</product>
<product>rational_team_concert:5.0</product>
<product>rational_team_concert:5.0.1</product>
<product>rational_team_concert:5.0.2</product>
<product>rational_team_concert:6.0</product>
<product>rational_team_concert:6.0.1</product>
<product>rational_team_concert:6.0.2</product>
<product>rational_team_concert:6.0.3</product>
<product>rational_team_concert:6.0.4</product>
</cve>
<cve id="CVE-2016-6025" level="LOW">
<product>sterling_secure_proxy:3.4.2.0</product>
<product>sterling_secure_proxy:3.4.2.0</product>
<product>sterling_secure_proxy:3.4.2.0</product>
<product>sterling_secure_proxy:3.4.2.0</product>
<product>sterling_secure_proxy:3.4.2.0</product>
<product>sterling_secure_proxy:3.4.2.0</product>
<product>sterling_secure_proxy:3.4.2.0</product>
<product>sterling_secure_proxy:3.4.2.0</product>
<product>sterling_secure_proxy:3.4.3.0</product>
</cve>
<cve id="CVE-2016-6028" level="LOW">
<product>rational_collaborative_lifecycle_management:4.0.0</product>
<product>rational_collaborative_lifecycle_management:4.0.1</product>
<product>rational_collaborative_lifecycle_management:4.0.2</product>
<product>rational_collaborative_lifecycle_management:4.0.3</product>
<product>rational_collaborative_lifecycle_management:4.0.4</product>
<product>rational_collaborative_lifecycle_management:4.0.5</product>
<product>rational_collaborative_lifecycle_management:4.0.6</product>
<product>rational_collaborative_lifecycle_management:4.0.7</product>
<product>rational_collaborative_lifecycle_management:5.0.0</product>
<product>rational_collaborative_lifecycle_management:5.0.1</product>
<product>rational_collaborative_lifecycle_management:5.0.2</product>
<product>rational_collaborative_lifecycle_management:6.0.0</product>
<product>rational_collaborative_lifecycle_management:6.0.1</product>
<product>rational_collaborative_lifecycle_management:6.0.2</product>
</cve>
<cve id="CVE-2016-6029" level="MEDIUM">
<product>emptoris_strategic_supply_management:10.0.0.0</product>
<product>emptoris_strategic_supply_management:10.0.0.1</product>
<product>emptoris_strategic_supply_management:10.0.0.2</product>
<product>emptoris_strategic_supply_management:10.0.0.3</product>
<product>emptoris_strategic_supply_management:10.0.1.0</product>
<product>emptoris_strategic_supply_management:10.0.1.1</product>
<product>emptoris_strategic_supply_management:10.0.1.2</product>
<product>emptoris_strategic_supply_management:10.0.1.3</product>
<product>emptoris_strategic_supply_management:10.0.1.4</product>
<product>emptoris_strategic_supply_management:10.0.2.0</product>
<product>emptoris_strategic_supply_management:10.0.2.1</product>
<product>emptoris_strategic_supply_management:10.0.2.2</product>
<product>emptoris_strategic_supply_management:10.0.2.3</product>
<product>emptoris_strategic_supply_management:10.0.2.4</product>
<product>emptoris_strategic_supply_management:10.0.2.5</product>
<product>emptoris_strategic_supply_management:10.0.2.6</product>
<product>emptoris_strategic_supply_management:10.0.2.7</product>
<product>emptoris_strategic_supply_management:10.0.2.8</product>
<product>emptoris_strategic_supply_management:10.0.2.9</product>
<product>emptoris_strategic_supply_management:10.0.2.10</product>
<product>emptoris_strategic_supply_management:10.0.2.11</product>
<product>emptoris_strategic_supply_management:10.0.2.12</product>
<product>emptoris_strategic_supply_management:10.0.2.13</product>
<product>emptoris_strategic_supply_management:10.0.2.14</product>
<product>emptoris_strategic_supply_management:10.0.2.15</product>
<product>emptoris_strategic_supply_management:10.0.4.0</product>
<product>emptoris_strategic_supply_management:10.1.0.0</product>
<product>emptoris_strategic_supply_management:10.1.0.1</product>
<product>emptoris_strategic_supply_management:10.1.0.2</product>
<product>emptoris_strategic_supply_management:10.1.0.3</product>
<product>emptoris_strategic_supply_management:10.1.0.4</product>
<product>emptoris_strategic_supply_management:10.1.0.5</product>
<product>emptoris_strategic_supply_management:10.1.0.6</product>
<product>emptoris_strategic_supply_management:10.1.0.7</product>
<product>emptoris_strategic_supply_management:10.1.0.8</product>
<product>emptoris_strategic_supply_management:10.1.0.9</product>
<product>emptoris_strategic_supply_management:10.1.0.10</product>
<product>emptoris_strategic_supply_management:10.1.1.0</product>
<product>emptoris_strategic_supply_management:10.1.1.1</product>
<product>emptoris_strategic_supply_management:10.1.1.2</product>
<product>emptoris_strategic_supply_management:10.1.1.3</product>
<product>emptoris_strategic_supply_management:10.1.1.4</product>
<product>emptoris_strategic_supply_management:10.1.1.5</product>
<product>emptoris_strategic_supply_management:10.1.1.6</product>
<product>emptoris_strategic_supply_management:10.1.1.7</product>
<product>emptoris_strategic_supply_management:10.1.1.8</product>
</cve>
<cve id="CVE-2016-7472" level="LOW">
<product>big-ip_application_security_manager:12.1.0</product>
<product>big-ip_application_security_manager:12.1.1</product>
</cve>
<cve id="CVE-2016-10686" level="MEDIUM">
<product>fis-sass-all:0.2.0</product>
</cve>
<cve id="CVE-2016-0423" level="HIGH">
<product>jd_edwards_products:9.1</product>
<product>jd_edwards_products:9.2</product>
</cve>
<cve id="CVE-2016-3018" level="MEDIUM">
<product>security_access_manager:9.0.0</product>
<product>security_access_manager:9.0.0.1</product>
<product>security_access_manager:9.0.1.0</product>
<product>security_access_manager_for_mobile:8.0.0.0</product>
<product>security_access_manager_for_mobile:8.0.0.1</product>
<product>security_access_manager_for_mobile:8.0.0.2</product>
<product>security_access_manager_for_mobile:8.0.0.3</product>
<product>security_access_manager_for_mobile:8.0.0.5</product>
<product>security_access_manager_for_mobile:8.0.1.0</product>
<product>security_access_manager_for_mobile:8.0.1.2</product>
<product>security_access_manager_for_mobile:8.0.1.3</product>
<product>security_access_manager_for_mobile:8.0.1.4</product>
<product>security_access_manager_for_web:8.0.0.0</product>
<product>security_access_manager_for_web:8.0.0.1</product>
<product>security_access_manager_for_web:8.0.0.2</product>
<product>security_access_manager_for_web:8.0.0.3</product>
<product>security_access_manager_for_web:8.0.0.5</product>
<product>security_access_manager_for_web:8.0.1.0</product>
<product>security_access_manager_for_web:8.0.1.2</product>
<product>security_access_manager_for_web:8.0.1.3</product>
<product>security_access_manager_for_web:8.0.1.4</product>
</cve>
<cve id="CVE-2016-3019" level="LOW">
<product>security_access_manager_9.0_firmware</product>
</cve>
<cve id="CVE-2016-6534" level="MEDIUM">
<product>network_management_information_system:4.3.6f</product>
<product>network_management_information_system:8.5.10g</product>
</cve>
<cve id="CVE-2016-6535" level="LOW">
<product>eh6108h%2b_firmware:x9.03.24.00.07l</product>
</cve>
<cve id="CVE-2016-6536" level="LOW">
<product>eh6108h%2b_firmware:x9.03.24.00.07l</product>
</cve>
<cve id="CVE-2016-3017" level="LOW">
<product>security_access_manager_9.0_firmware:9.0.0</product>
<product>security_access_manager_9.0_firmware:9.0.0.1</product>
<product>security_access_manager_9.0_firmware:9.0.1.0</product>
<product>security_access_manager_for_mobile_8.0_firmware:8.0.0.1</product>
<product>security_access_manager_for_mobile_8.0_firmware:8.0.0.2</product>
<product>security_access_manager_for_mobile_8.0_firmware:8.0.0.3</product>
<product>security_access_manager_for_mobile_8.0_firmware:8.0.0.5</product>
<product>security_access_manager_for_mobile_8.0_firmware:8.0.1.0</product>
<product>security_access_manager_for_mobile_8.0_firmware:8.0.1.2</product>
<product>security_access_manager_for_mobile_8.0_firmware:8.0.1.3</product>
<product>security_access_manager_for_mobile_8.0_firmware:8.0.1.4</product>
<product>security_access_manager_for_web_7.0_firmware:7.0.0.1</product>
<product>security_access_manager_for_web_7.0_firmware:7.0.0.2</product>
<product>security_access_manager_for_web_7.0_firmware:7.0.0.3</product>
<product>security_access_manager_for_web_7.0_firmware:7.0.0.4</product>
<product>security_access_manager_for_web_7.0_firmware:7.0.0.5</product>
<product>security_access_manager_for_web_7.0_firmware:7.0.0.6</product>
<product>security_access_manager_for_web_7.0_firmware:7.0.0.7</product>
<product>security_access_manager_for_web_7.0_firmware:7.0.0.8</product>
<product>security_access_manager_for_web_7.0_firmware:7.0.0.9</product>
<product>security_access_manager_for_web_7.0_firmware:7.0.0.10</product>
<product>security_access_manager_for_web_7.0_firmware:7.0.0.11</product>
<product>security_access_manager_for_web_7.0_firmware:7.0.0.12</product>
<product>security_access_manager_for_web_7.0_firmware:7.0.0.13</product>
<product>security_access_manager_for_web_7.0_firmware:7.0.0.14</product>
<product>security_access_manager_for_web_7.0_firmware:7.0.0.15</product>
<product>security_access_manager_for_web_7.0_firmware:7.0.0.16</product>
<product>security_access_manager_for_web_8.0_firmware:8.0.0.1</product>
<product>security_access_manager_for_web_8.0_firmware:8.0.0.2</product>
<product>security_access_manager_for_web_8.0_firmware:8.0.0.3</product>
<product>security_access_manager_for_web_8.0_firmware:8.0.0.5</product>
<product>security_access_manager_for_web_8.0_firmware:8.0.1.0</product>
<product>security_access_manager_for_web_8.0_firmware:8.0.1.2</product>
<product>security_access_manager_for_web_8.0_firmware:8.0.1.3</product>
<product>security_access_manager_for_web_8.0_firmware:8.0.1.4</product>
</cve>
<cve id="CVE-2016-6530" level="LOW">
<product>cdr_dicom:5.0</product>
</cve>
<cve id="CVE-2016-6531" level="LOW">
<product>opendental:16.1</product>
</cve>
<cve id="CVE-2016-6532" level="LOW">
<product>imaging_suite:10.0</product>
</cve>
<cve id="CVE-2016-3013" level="LOW">
<product>websphere_mq:8.0.0.5</product>
</cve>
<cve id="CVE-2016-7959" level="MEDIUM">
<product>simatic_step_7:13.010</product>
</cve>
<cve id="CVE-2016-0278" level="MEDIUM">
<product>domino:8.5.0</product>
<product>domino:8.5.1</product>
<product>domino:8.5.1.1</product>
<product>domino:8.5.1.2</product>
<product>domino:8.5.1.3</product>
<product>domino:8.5.1.4</product>
<product>domino:8.5.2</product>
<product>domino:8.5.2.1</product>
<product>domino:8.5.2.2</product>
<product>domino:8.5.2.3</product>
<product>domino:8.5.3</product>
<product>domino:8.5.3.1</product>
<product>domino:8.5.3.2</product>
<product>domino:8.5.3.3</product>
<product>domino:8.5.3.4</product>
<product>domino:8.5.3.5</product>
<product>domino:9.0.0</product>
<product>domino:9.0.1</product>
<product>domino:9.0.1.1</product>
<product>domino:9.0.1.2</product>
<product>domino:9.0.1.3</product>
<product>domino:9.0.1.4</product>
<product>domino:9.0.1.5</product>
</cve>
<cve id="CVE-2016-8790" level="LOW">
<product>cloudengine_12800_firmware:v100r003c10</product>
<product>cloudengine_12800_firmware:v100r005c00</product>
<product>cloudengine_12800_firmware:v100r005c10</product>
<product>cloudengine_12800_firmware:v100r006c00</product>
<product>cloudengine_5800_firmware:v100r003c10</product>
<product>cloudengine_5800_firmware:v100r005c00</product>
<product>cloudengine_5800_firmware:v100r005c10</product>
<product>cloudengine_5800_firmware:v100r006c00</product>
<product>cloudengine_6800_firmware:v100r003c10</product>
<product>cloudengine_6800_firmware:v100r005c00</product>
<product>cloudengine_6800_firmware:v100r005c10</product>
<product>cloudengine_6800_firmware:v100r006c00</product>
<product>cloudengine_7800_firmware:v100r003c10</product>
<product>cloudengine_7800_firmware:v100r005c00</product>
<product>cloudengine_7800_firmware:v100r005c10</product>
<product>cloudengine_7800_firmware:v100r006c00</product>
<product>cloudengine_8800_firmware:v100r006c00</product>
</cve>
<cve id="CVE-2016-8791" level="HIGH">
<product>mate_8_firmware:-</product>
<product>mate_s_firmware:-</product>
<product>p8_firmware:-</product>
</cve>
<cve id="CVE-2016-8796" level="LOW">
<product>usg9520_firmware:v300r001c01</product>
<product>usg9560_firmware:v300r001c01</product>
<product>usg9580_firmware:v300r001c01</product>
</cve>
<cve id="CVE-2016-8797" level="LOW">
<product>ar3200_firmware:v200r005c20</product>
<product>ar3200_firmware:v200r005c32</product>
<product>ar3200_firmware:v200r007c00</product>
<product>s12700_firmware:v200r007c00</product>
<product>s12700_firmware:v200r008c00</product>
<product>s5300_firmware:v200r006c00</product>
<product>s5300_firmware:v200r007c00</product>
<product>s5300_firmware:v200r008c00</product>
<product>s5700_firmware:v200r006c00</product>
<product>s5700_firmware:v200r007c00</product>
<product>s5700_firmware:v200r008c00</product>
<product>s6300_firmware:v200r007c00</product>
<product>s6300_firmware:v200r008c00</product>
<product>s6700_firmware:v200r007c00</product>
<product>s6700_firmware:v200r008c00</product>
<product>s7700_firmware:v200r006c00</product>
<product>s7700_firmware:v200r007c00</product>
<product>s7700_firmware:v200r008c00</product>
<product>s9300_firmware:v200r006c00</product>
<product>s9300_firmware:v200r007c00</product>
<product>s9300_firmware:v200r008c00</product>
<product>s9700_firmware:v200r006c00</product>
<product>s9700_firmware:v200r007c00</product>
<product>s9700_firmware:v200r008c00</product>
</cve>
<cve id="CVE-2016-8794" level="HIGH">
<product>mate_8_firmware:-</product>
<product>mate_s_firmware:-</product>
<product>p8_firmware:-</product>
</cve>
<cve id="CVE-2016-8795" level="MEDIUM">
<product>cloudengine_12800_firmware:v100r002c00</product>
<product>cloudengine_12800_firmware:v100r003c00</product>
<product>cloudengine_12800_firmware:v100r003c10</product>
<product>cloudengine_12800_firmware:v100r005c00</product>
<product>cloudengine_12800_firmware:v100r005c10</product>
<product>cloudengine_12800_firmware:v100r006c00</product>
<product>cloudengine_5800_firmware:v100r002c00</product>
<product>cloudengine_5800_firmware:v100r003c00</product>
<product>cloudengine_5800_firmware:v100r003c10</product>
<product>cloudengine_5800_firmware:v100r005c00</product>
<product>cloudengine_5800_firmware:v100r005c10</product>
<product>cloudengine_5800_firmware:v100r006c00</product>
<product>cloudengine_6800_firmware:v100r002c00</product>
<product>cloudengine_6800_firmware:v100r003c00</product>
<product>cloudengine_6800_firmware:v100r003c10</product>
<product>cloudengine_6800_firmware:v100r005c00</product>
<product>cloudengine_6800_firmware:v100r005c10</product>
<product>cloudengine_6800_firmware:v100r006c00</product>
<product>cloudengine_7800_firmware:v100r003c00</product>
<product>cloudengine_7800_firmware:v100r003c10</product>
<product>cloudengine_7800_firmware:v100r005c00</product>
<product>cloudengine_7800_firmware:v100r005c10</product>
<product>cloudengine_7800_firmware:v100r006c00</product>
<product>cloudengine_8800_firmware:v100r006c00</product>
<product>secospace_usg6600_firmware:v500r001c00</product>
</cve>
<cve id="CVE-2016-7951" level="LOW">
<product>libxtst:1.2.2</product>
<product>fedora:24</product>
<product>fedora:25</product>
</cve>
<cve id="CVE-2016-7950" level="LOW">
<product>libxrender:0.9.9</product>
<product>fedora:24</product>
<product>fedora:25</product>
</cve>
<cve id="CVE-2016-7953" level="LOW">
<product>libxvmc:1.0.9</product>
<product>fedora:24</product>
<product>fedora:25</product>
</cve>
<cve id="CVE-2016-0272" level="MEDIUM">
<product>financial_transaction_manager:2.1.1.2</product>
<product>financial_transaction_manager:2.1.1.2</product>
<product>financial_transaction_manager:2.1.1.2</product>
<product>financial_transaction_manager:3.0.0.0</product>
<product>financial_transaction_manager:3.0.0.0</product>
<product>financial_transaction_manager:3.0.0.0</product>
<product>financial_transaction_manager:3.0.0.1</product>
<product>financial_transaction_manager:3.0.0.1</product>
<product>financial_transaction_manager:3.0.0.1</product>
<product>financial_transaction_manager:3.0.0.2</product>
<product>financial_transaction_manager:3.0.0.2</product>
<product>financial_transaction_manager:3.0.0.2</product>
<product>financial_transaction_manager:3.0.0.3</product>
<product>financial_transaction_manager:3.0.0.3</product>
<product>financial_transaction_manager:3.0.0.3</product>
<product>financial_transaction_manager:3.0.0.4</product>
<product>financial_transaction_manager:3.0.0.4</product>
<product>financial_transaction_manager:3.0.0.4</product>
<product>financial_transaction_manager:3.0.0.5</product>
<product>financial_transaction_manager:3.0.0.5</product>
<product>financial_transaction_manager:3.0.0.5</product>
<product>financial_transaction_manager:3.0.0.6</product>
<product>financial_transaction_manager:3.0.0.6</product>
<product>financial_transaction_manager:3.0.0.6</product>
<product>financial_transaction_manager:3.0.0.7</product>
<product>financial_transaction_manager:3.0.0.7</product>
<product>financial_transaction_manager:3.0.0.7</product>
<product>financial_transaction_manager:3.0.0.8</product>
<product>financial_transaction_manager:3.0.0.8</product>
<product>financial_transaction_manager:3.0.0.8</product>
<product>financial_transaction_manager:3.0.0.9</product>
<product>financial_transaction_manager:3.0.0.9</product>
<product>financial_transaction_manager:3.0.0.9</product>
<product>financial_transaction_manager:3.0.0.10</product>
<product>financial_transaction_manager:3.0.0.10</product>
<product>financial_transaction_manager:3.0.0.10</product>
<product>financial_transaction_manager:3.0.0.11</product>
<product>financial_transaction_manager:3.0.0.11</product>
<product>financial_transaction_manager:3.0.0.11</product>
<product>financial_transaction_manager:3.0.0.12</product>
<product>financial_transaction_manager:3.0.0.12</product>
<product>financial_transaction_manager:3.0.0.12</product>
</cve>
<cve id="CVE-2016-0275" level="LOW">
<product>financial_transaction_manager:2.1.1.2</product>
<product>financial_transaction_manager:2.1.1.2</product>
<product>financial_transaction_manager:2.1.1.2</product>
<product>financial_transaction_manager:3.0.0.0</product>
<product>financial_transaction_manager:3.0.0.0</product>
<product>financial_transaction_manager:3.0.0.0</product>
<product>financial_transaction_manager:3.0.0.1</product>
<product>financial_transaction_manager:3.0.0.1</product>
<product>financial_transaction_manager:3.0.0.1</product>
<product>financial_transaction_manager:3.0.0.2</product>
<product>financial_transaction_manager:3.0.0.2</product>
<product>financial_transaction_manager:3.0.0.2</product>
<product>financial_transaction_manager:3.0.0.3</product>
<product>financial_transaction_manager:3.0.0.3</product>
<product>financial_transaction_manager:3.0.0.3</product>
<product>financial_transaction_manager:3.0.0.4</product>
<product>financial_transaction_manager:3.0.0.4</product>
<product>financial_transaction_manager:3.0.0.4</product>
<product>financial_transaction_manager:3.0.0.5</product>
<product>financial_transaction_manager:3.0.0.5</product>
<product>financial_transaction_manager:3.0.0.5</product>
<product>financial_transaction_manager:3.0.0.6</product>
<product>financial_transaction_manager:3.0.0.6</product>
<product>financial_transaction_manager:3.0.0.6</product>
<product>financial_transaction_manager:3.0.0.7</product>
<product>financial_transaction_manager:3.0.0.7</product>
<product>financial_transaction_manager:3.0.0.7</product>
<product>financial_transaction_manager:3.0.0.8</product>
<product>financial_transaction_manager:3.0.0.8</product>
<product>financial_transaction_manager:3.0.0.8</product>
<product>financial_transaction_manager:3.0.0.9</product>
<product>financial_transaction_manager:3.0.0.9</product>
<product>financial_transaction_manager:3.0.0.9</product>
<product>financial_transaction_manager:3.0.0.10</product>
<product>financial_transaction_manager:3.0.0.10</product>
<product>financial_transaction_manager:3.0.0.10</product>
<product>financial_transaction_manager:3.0.0.11</product>
<product>financial_transaction_manager:3.0.0.11</product>
<product>financial_transaction_manager:3.0.0.11</product>
<product>financial_transaction_manager:3.0.0.12</product>
<product>financial_transaction_manager:3.0.0.12</product>
<product>financial_transaction_manager:3.0.0.12</product>
</cve>
<cve id="CVE-2016-0274" level="MEDIUM">
<product>financial_transaction_manager:2.1.1.2</product>
<product>financial_transaction_manager:2.1.1.2</product>
<product>financial_transaction_manager:2.1.1.2</product>
<product>financial_transaction_manager:3.0.0.0</product>
<product>financial_transaction_manager:3.0.0.0</product>
<product>financial_transaction_manager:3.0.0.0</product>
<product>financial_transaction_manager:3.0.0.1</product>
<product>financial_transaction_manager:3.0.0.1</product>
<product>financial_transaction_manager:3.0.0.1</product>
<product>financial_transaction_manager:3.0.0.2</product>
<product>financial_transaction_manager:3.0.0.2</product>
<product>financial_transaction_manager:3.0.0.2</product>
<product>financial_transaction_manager:3.0.0.3</product>
<product>financial_transaction_manager:3.0.0.3</product>
<product>financial_transaction_manager:3.0.0.3</product>
<product>financial_transaction_manager:3.0.0.4</product>
<product>financial_transaction_manager:3.0.0.4</product>
<product>financial_transaction_manager:3.0.0.4</product>
<product>financial_transaction_manager:3.0.0.5</product>
<product>financial_transaction_manager:3.0.0.5</product>
<product>financial_transaction_manager:3.0.0.5</product>
<product>financial_transaction_manager:3.0.0.6</product>
<product>financial_transaction_manager:3.0.0.6</product>
<product>financial_transaction_manager:3.0.0.6</product>
<product>financial_transaction_manager:3.0.0.7</product>
<product>financial_transaction_manager:3.0.0.7</product>
<product>financial_transaction_manager:3.0.0.7</product>
<product>financial_transaction_manager:3.0.0.8</product>
<product>financial_transaction_manager:3.0.0.8</product>
<product>financial_transaction_manager:3.0.0.8</product>
<product>financial_transaction_manager:3.0.0.9</product>
<product>financial_transaction_manager:3.0.0.9</product>
<product>financial_transaction_manager:3.0.0.9</product>
<product>financial_transaction_manager:3.0.0.10</product>
<product>financial_transaction_manager:3.0.0.10</product>
<product>financial_transaction_manager:3.0.0.10</product>
<product>financial_transaction_manager:3.0.0.11</product>
<product>financial_transaction_manager:3.0.0.11</product>
<product>financial_transaction_manager:3.0.0.11</product>
<product>financial_transaction_manager:3.0.0.12</product>
<product>financial_transaction_manager:3.0.0.12</product>
<product>financial_transaction_manager:3.0.0.12</product>
</cve>
<cve id="CVE-2016-0277" level="MEDIUM">
<product>domino:8.5.0</product>
<product>domino:8.5.1</product>
<product>domino:8.5.1.1</product>
<product>domino:8.5.1.2</product>
<product>domino:8.5.1.3</product>
<product>domino:8.5.1.4</product>
<product>domino:8.5.2</product>
<product>domino:8.5.2.1</product>
<product>domino:8.5.2.2</product>
<product>domino:8.5.2.3</product>
<product>domino:8.5.3</product>
<product>domino:8.5.3.1</product>
<product>domino:8.5.3.2</product>
<product>domino:8.5.3.3</product>
<product>domino:8.5.3.4</product>
<product>domino:8.5.3.5</product>
<product>domino:9.0.0</product>
<product>domino:9.0.1</product>
<product>domino:9.0.1.1</product>
<product>domino:9.0.1.2</product>
<product>domino:9.0.1.3</product>
<product>domino:9.0.1.4</product>
<product>domino:9.0.1.5</product>
</cve>
<cve id="CVE-2016-0276" level="LOW">
<product>financial_transaction_manager:3.0.0.0</product>
<product>financial_transaction_manager:3.0.0.0</product>
<product>financial_transaction_manager:3.0.0.0</product>
<product>financial_transaction_manager:3.0.0.1</product>
<product>financial_transaction_manager:3.0.0.1</product>
<product>financial_transaction_manager:3.0.0.1</product>
<product>financial_transaction_manager:3.0.0.2</product>
<product>financial_transaction_manager:3.0.0.2</product>
<product>financial_transaction_manager:3.0.0.2</product>
<product>financial_transaction_manager:3.0.0.3</product>
<product>financial_transaction_manager:3.0.0.3</product>
<product>financial_transaction_manager:3.0.0.3</product>
<product>financial_transaction_manager:3.0.0.4</product>
<product>financial_transaction_manager:3.0.0.4</product>
<product>financial_transaction_manager:3.0.0.4</product>
<product>financial_transaction_manager:3.0.0.5</product>
<product>financial_transaction_manager:3.0.0.5</product>
<product>financial_transaction_manager:3.0.0.5</product>
<product>financial_transaction_manager:3.0.0.6</product>
<product>financial_transaction_manager:3.0.0.6</product>
<product>financial_transaction_manager:3.0.0.6</product>
<product>financial_transaction_manager:3.0.0.7</product>
<product>financial_transaction_manager:3.0.0.7</product>
<product>financial_transaction_manager:3.0.0.7</product>
<product>financial_transaction_manager:3.0.0.8</product>
<product>financial_transaction_manager:3.0.0.8</product>
<product>financial_transaction_manager:3.0.0.8</product>
<product>financial_transaction_manager:3.0.0.9</product>
<product>financial_transaction_manager:3.0.0.9</product>
<product>financial_transaction_manager:3.0.0.9</product>
<product>financial_transaction_manager:3.0.0.10</product>
<product>financial_transaction_manager:3.0.0.10</product>
<product>financial_transaction_manager:3.0.0.10</product>
<product>financial_transaction_manager:3.0.0.11</product>
<product>financial_transaction_manager:3.0.0.11</product>
<product>financial_transaction_manager:3.0.0.11</product>
<product>financial_transaction_manager:3.0.0.12</product>
<product>financial_transaction_manager:3.0.0.12</product>
<product>financial_transaction_manager:3.0.0.12</product>
</cve>
<cve id="CVE-2016-4978" level="MEDIUM">
<product>activemq_artemis:1.0.0</product>
<product>activemq_artemis:1.1.0</product>
<product>activemq_artemis:1.2.0</product>
<product>activemq_artemis:1.3.0</product>
</cve>
<cve id="CVE-2016-4972" level="LOW">
<product>mitaka-murano:2.0.0</product>
<product>murano:1.0.2</product>
<product>murano-dashboard:1.0.2</product>
<product>python-muranoclient:0.7.2</product>
</cve>
<cve id="CVE-2016-4973" level="LOW">
<product>libssp:-</product>
</cve>
<cve id="CVE-2016-4970" level="LOW">
<product>netty:4.0.0</product>
<product>netty:4.0.1</product>
<product>netty:4.0.2</product>
<product>netty:4.0.3</product>
<product>netty:4.0.4</product>
<product>netty:4.0.5</product>
<product>netty:4.0.6</product>
<product>netty:4.0.7</product>
<product>netty:4.0.8</product>
<product>netty:4.0.9</product>
<product>netty:4.0.10</product>
<product>netty:4.0.11</product>
<product>netty:4.0.12</product>
<product>netty:4.0.13</product>
<product>netty:4.0.14</product>
<product>netty:4.0.15</product>
<product>netty:4.0.16</product>
<product>netty:4.0.17</product>
<product>netty:4.0.18</product>
<product>netty:4.0.19</product>
<product>netty:4.0.20</product>
<product>netty:4.0.21</product>
<product>netty:4.0.22</product>
<product>netty:4.0.23</product>
<product>netty:4.0.24</product>
<product>netty:4.0.25</product>
<product>netty:4.0.26</product>
<product>netty:4.0.27</product>
<product>netty:4.0.28</product>
<product>netty:4.0.29</product>
<product>netty:4.0.30</product>
<product>netty:4.0.31</product>
<product>netty:4.0.32</product>
<product>netty:4.0.33</product>
<product>netty:4.0.34</product>
<product>netty:4.0.35</product>
<product>netty:4.0.36</product>
<product>netty:4.1</product>
</cve>
<cve id="CVE-2016-4976" level="LOW">
<product>ambari:2.0.0</product>
<product>ambari:2.0.1</product>
<product>ambari:2.0.2</product>
<product>ambari:2.1.0</product>
<product>ambari:2.1.1</product>
<product>ambari:2.1.2</product>
<product>ambari:2.2.0</product>
<product>ambari:2.2.1</product>
<product>ambari:2.2.2</product>
</cve>
<cve id="CVE-2016-4977" level="LOW">
<product>spring_security_oauth:1.0.0</product>
<product>spring_security_oauth:1.0.1</product>
<product>spring_security_oauth:1.0.2</product>
<product>spring_security_oauth:1.0.3</product>
<product>spring_security_oauth:1.0.4</product>
<product>spring_security_oauth:1.0.5</product>
<product>spring_security_oauth:2.0.0</product>
<product>spring_security_oauth:2.0.1</product>
<product>spring_security_oauth:2.0.2</product>
<product>spring_security_oauth:2.0.3</product>
<product>spring_security_oauth:2.0.4</product>
<product>spring_security_oauth:2.0.5</product>
<product>spring_security_oauth:2.0.6</product>
<product>spring_security_oauth:2.0.7</product>
<product>spring_security_oauth:2.0.8</product>
<product>spring_security_oauth:2.0.9</product>
</cve>
<cve id="CVE-2016-4974" level="MEDIUM">
<product>amqp_0-x_jms_client:6.0.3</product>
<product>jms_client_amqp:0.9.0</product>
</cve>
<cve id="CVE-2016-10064" level="MEDIUM">
<product>imagemagick:6.9.5-0</product>
<product>leap:42.1</product>
</cve>
<cve id="CVE-2016-10065" level="MEDIUM">
<product>imagemagick:6.9.7-10</product>
<product>leap:42.1</product>
</cve>
<cve id="CVE-2016-10066" level="MEDIUM">
<product>imagemagick:6.9.4-4</product>
</cve>
<cve id="CVE-2016-10067" level="LOW">
<product>imagemagick:6.9.4-4</product>
</cve>
<cve id="CVE-2016-10060" level="MEDIUM">
<product>imagemagick:7.0.1-9</product>
</cve>
<cve id="CVE-2016-10061" level="MEDIUM">
<product>imagemagick:7.0.1-9</product>
</cve>
<cve id="CVE-2016-10062" level="MEDIUM">
<product>imagemagick:-</product>
</cve>
<cve id="CVE-2016-10063" level="MEDIUM">
<product>imagemagick:6.9.5-0</product>
</cve>
<cve id="CVE-2016-10068" level="MEDIUM">
<product>imagemagick:6.9.6-3</product>
<product>leap:42.1</product>
<product>leap:42.2</product>
</cve>
<cve id="CVE-2016-10069" level="MEDIUM">
<product>imagemagick:6.9.4-4</product>
<product>leap:42.1</product>
</cve>
<cve id="CVE-2016-8534" level="LOW">
<product>matrix_operating_environment:7.6</product>
</cve>
<cve id="CVE-2016-8535" level="MEDIUM">
<product>matrix_operating_environment:7.6</product>
</cve>
<cve id="CVE-2016-8532" level="MEDIUM">
<product>matrix_operating_environment:7.6</product>
</cve>
<cve id="CVE-2016-8533" level="LOW">
<product>matrix_operating_environment:7.6</product>
</cve>
<cve id="CVE-2016-8530" level="LOW">
<product>intelligent_management_center:7.2</product>
<product>intelligent_management_center:7.2</product>
</cve>
<cve id="CVE-2016-8531" level="LOW">
<product>matrix_operating_environment:7.6</product>
</cve>
<cve id="CVE-2016-9118" level="LOW">
<product>openjpeg:2.1.2</product>
</cve>
<cve id="CVE-2016-2536" level="MEDIUM">
<product>sketchup</product>
<product>3d_visual_enterprise_viewer</product>
</cve>
<cve id="CVE-2016-2537" level="LOW">
<product>is_my_json_valid:2.12.3</product>
</cve>
<cve id="CVE-2016-9113" level="LOW">
<product>openjpeg:2.1.2</product>
</cve>
<cve id="CVE-2016-9112" level="LOW">
<product>openjpeg:2.1.2</product>
</cve>
<cve id="CVE-2016-9111" level="LOW">
<product>receiver_desktop:4.5</product>
</cve>
<cve id="CVE-2016-9117" level="MEDIUM">
<product>openjpeg:2.1.2</product>
</cve>
<cve id="CVE-2016-9116" level="MEDIUM">
<product>openjpeg:2.1.2</product>
</cve>
<cve id="CVE-2016-9115" level="MEDIUM">
<product>openjpeg:2.1.2</product>
</cve>
<cve id="CVE-2016-9114" level="LOW">
<product>openjpeg:2.1.2</product>
</cve>
<cve id="CVE-2016-1324" level="LOW">
<product>spark:2015-06_base</product>
</cve>
<cve id="CVE-2016-1325" level="LOW">
<product>dpc3939_wireless_residential_voice_gateway_firmware:130514acmcst_base</product>
</cve>
<cve id="CVE-2016-1326" level="LOW">
<product>dpq3925_8x4_docsis_3.your_sha256_hasher:r1_base</product>
</cve>
<cve id="CVE-2016-1327" level="LOW">
<product>dpc2203_cable_modem_firmware:r1_customer_image_base</product>
<product>epc2203_cable_modem_firmware:r1_customer_image_base</product>
</cve>
<cve id="CVE-2016-4792" level="LOW">
<product>pulse_connect_secure:8.2</product>
</cve>
<cve id="CVE-2016-4793" level="LOW">
<product>cakephp:3.2.4</product>
</cve>
<cve id="CVE-2016-1322" level="LOW">
<product>spark:2015-07-04_base</product>
</cve>
<cve id="CVE-2016-1323" level="LOW">
<product>spark:2015-06_base</product>
</cve>
<cve id="CVE-2016-1328" level="LOW">
<product>epc3928_firmware:-</product>
</cve>
<cve id="CVE-2016-1329" level="LOW">
<product>nx-os:6.0%5c%282%5c%29a6%5c%281%5c%29</product>
<product>nx-os:6.0%5c%282%5c%29a6%5c%282%5c%29</product>
<product>nx-os:6.0%5c%282%5c%29a6%5c%283%5c%29</product>
<product>nx-os:6.0%5c%282%5c%29a6%5c%284%5c%29</product>
<product>nx-os:6.0%5c%282%5c%29a6%5c%285%5c%29</product>
<product>nx-os:6.0%5c%282%5c%29u6%5c%281%5c%29</product>
<product>nx-os:6.0%5c%282%5c%29u6%5c%282%5c%29</product>
<product>nx-os:6.0%5c%282%5c%29u6%5c%283%5c%29</product>
<product>nx-os:6.0%5c%282%5c%29u6%5c%284%5c%29</product>
<product>nx-os:6.0%5c%282%5c%29u6%5c%285%5c%29</product>
<product>nx-ox:6.0%5c%282%5c%29a7%5c%281%5c%29</product>
</cve>
<cve id="CVE-2016-0442" level="LOW">
<product>enterprise_manager_grid_control:12.1.0.4</product>
<product>enterprise_manager_grid_control:12.1.0.5</product>
</cve>
<cve id="CVE-2016-5445" level="LOW">
<product>integrated_lights_out_manager_firmware:3.0</product>
<product>integrated_lights_out_manager_firmware:3.1</product>
<product>integrated_lights_out_manager_firmware:3.2</product>
</cve>
<cve id="CVE-2016-5447" level="LOW">
<product>integrated_lights_out_manager_firmware:3.0</product>
<product>integrated_lights_out_manager_firmware:3.1</product>
<product>integrated_lights_out_manager_firmware:3.2</product>
</cve>
<cve id="CVE-2016-5446" level="LOW">
<product>integrated_lights_out_manager_firmware:3.0</product>
<product>integrated_lights_out_manager_firmware:3.1</product>
<product>integrated_lights_out_manager_firmware:3.2</product>
</cve>
<cve id="CVE-2016-5449" level="LOW">
<product>integrated_lights_out_manager_firmware:3.0</product>
<product>integrated_lights_out_manager_firmware:3.1</product>
<product>integrated_lights_out_manager_firmware:3.2</product>
</cve>
<cve id="CVE-2016-5448" level="LOW">
<product>integrated_lights_out_manager_firmware:3.0</product>
<product>integrated_lights_out_manager_firmware:3.1</product>
<product>integrated_lights_out_manager_firmware:3.2</product>
</cve>
<cve id="CVE-2016-9987" level="MEDIUM">
<product>jazz_reporting_service:5.0</product>
<product>jazz_reporting_service:5.0.1</product>
<product>jazz_reporting_service:5.0.2</product>
<product>jazz_reporting_service:6.0</product>
<product>jazz_reporting_service:6.0.1</product>
<product>jazz_reporting_service:6.0.2</product>
<product>jazz_reporting_service:6.0.3</product>
</cve>
<cve id="CVE-2016-6237" level="MEDIUM">
<product>lepton:1.0</product>
</cve>
<cve id="CVE-2016-6236" level="MEDIUM">
<product>lepton:1.0</product>
</cve>
<cve id="CVE-2016-6235" level="MEDIUM">
<product>lepton:1.0</product>
</cve>
<cve id="CVE-2016-6234" level="MEDIUM">
<product>lepton:1.0</product>
</cve>
<cve id="CVE-2016-6233" level="LOW">
<product>zend_framework:1.12.19</product>
<product>fedora:23</product>
<product>fedora:24</product>
<product>fedora:25</product>
</cve>
<cve id="CVE-2016-6231" level="MEDIUM">
<product>safe_browser:1.6.0</product>
</cve>
<cve id="CVE-2016-6239" level="LOW">
<product>openbsd:5.8</product>
<product>openbsd:5.9</product>
</cve>
<cve id="CVE-2016-6238" level="MEDIUM">
<product>lepton:1.0</product>
</cve>
<cve id="CVE-2016-9982" level="LOW">
<product>sterling_b2b_integrator:5.2</product>
</cve>
<cve id="CVE-2016-9983" level="MEDIUM">
<product>sterling_b2b_integrator:5.2</product>
</cve>
<cve id="CVE-2016-6945" level="LOW">
<product>acrobat:11.0.17</product>
<product>acrobat_dc:15.006.30201</product>
<product>acrobat_dc:15.017.20053</product>
<product>acrobat_reader_dc:15.006.30201</product>
<product>acrobat_reader_dc:15.017.20053</product>
<product>reader:11.0.17</product>
</cve>
<cve id="CVE-2016-6944" level="LOW">
<product>acrobat:11.0.17</product>
<product>acrobat_dc:15.006.30201</product>
<product>acrobat_dc:15.017.20053</product>
<product>acrobat_reader_dc:15.006.30201</product>
<product>acrobat_reader_dc:15.017.20053</product>
<product>reader:11.0.17</product>
</cve>
<cve id="CVE-2016-6947" level="LOW">
<product>acrobat:11.0.17</product>
<product>acrobat_dc:15.006.30201</product>
<product>acrobat_dc:15.017.20053</product>
<product>acrobat_reader_dc:15.006.30201</product>
<product>acrobat_reader_dc:15.017.20053</product>
<product>reader:11.0.17</product>
</cve>
<cve id="CVE-2016-6946" level="LOW">
<product>acrobat:11.0.17</product>
<product>acrobat_dc:15.006.30201</product>
<product>acrobat_dc:15.017.20053</product>
<product>acrobat_reader_dc:15.006.30201</product>
<product>acrobat_reader_dc:15.017.20053</product>
<product>reader:11.0.17</product>
</cve>
<cve id="CVE-2016-6941" level="LOW">
<product>acrobat:11.0.17</product>
<product>acrobat_dc:15.006.30201</product>
<product>acrobat_dc:15.017.20053</product>
<product>acrobat_reader_dc:15.006.30201</product>
<product>acrobat_reader_dc:15.017.20053</product>
<product>reader:11.0.17</product>
</cve>
<cve id="CVE-2016-6940" level="LOW">
<product>acrobat:11.0.17</product>
<product>acrobat_dc:15.006.30201</product>
<product>acrobat_dc:15.017.20053</product>
<product>acrobat_reader_dc:15.006.30201</product>
<product>acrobat_reader_dc:15.017.20053</product>
<product>reader:11.0.17</product>
</cve>
<cve id="CVE-2016-6943" level="LOW">
<product>acrobat:11.0.17</product>
<product>acrobat_dc:15.006.30201</product>
<product>acrobat_dc:15.017.20053</product>
<product>acrobat_reader_dc:15.006.30201</product>
<product>acrobat_reader_dc:15.017.20053</product>
<product>reader:11.0.17</product>
</cve>
<cve id="CVE-2016-6942" level="LOW">
<product>acrobat:11.0.17</product>
<product>acrobat_dc:15.006.30201</product>
<product>acrobat_dc:15.017.20053</product>
<product>acrobat_reader_dc:15.006.30201</product>
<product>acrobat_reader_dc:15.017.20053</product>
<product>reader:11.0.17</product>
</cve>
<cve id="CVE-2016-6493" level="LOW">
<product>xenapp:6.0.0.0</product>
<product>xenapp:6.5.0.0</product>
<product>xenapp:7.0.0.0</product>
<product>xenapp:7.1.0.0</product>
<product>xenapp:7.5.0.0</product>
<product>xenapp:7.6.0.0</product>
<product>xenapp:7.7.0.0</product>
<product>xenapp:7.8.0.0</product>
<product>xendesktop:7.8</product>
</cve>
<cve id="CVE-2016-6490" level="LOW">
<product>qemu:-</product>
</cve>
<cve id="CVE-2016-6497" level="LOW">
<product>groovy</product>
</cve>
<cve id="CVE-2016-6496" level="LOW">
<product>crowd:2.8.4</product>
<product>crowd:2.9.0</product>
<product>crowd:2.9.1</product>
</cve>
<cve id="CVE-2016-6495" level="MEDIUM">
<product>data_ontap:8.2.4</product>
</cve>
<cve id="CVE-2016-6494" level="LOW">
<product>mongodb:1.2.0</product>
<product>mongodb:1.4.0</product>
<product>mongodb:1.6.0</product>
<product>mongodb:1.8.0</product>
<product>mongodb:2.0.0</product>
<product>mongodb:2.0.1</product>
<product>mongodb:2.0.2</product>
<product>mongodb:2.0.3</product>
<product>mongodb:2.0.4</product>
<product>mongodb:2.0.5</product>
<product>mongodb:2.0.6</product>
<product>mongodb:2.0.7</product>
<product>mongodb:2.0.8</product>
<product>mongodb:2.2.0</product>
<product>mongodb:2.2.1</product>
<product>mongodb:2.2.2</product>
<product>mongodb:2.2.3</product>
<product>mongodb:2.2.4</product>
<product>mongodb:2.2.5</product>
<product>mongodb:2.2.6</product>
<product>mongodb:2.2.7</product>
<product>mongodb:2.3.0</product>
<product>mongodb:2.3.1</product>
<product>mongodb:2.4.0</product>
<product>mongodb:2.4.1</product>
<product>mongodb:2.4.2</product>
<product>mongodb:2.4.3</product>
<product>mongodb:2.4.4</product>
<product>mongodb:2.4.5</product>
<product>mongodb:2.4.6</product>
<product>mongodb:2.4.7</product>
<product>mongodb:2.4.8</product>
<product>mongodb:2.4.9</product>
<product>mongodb:2.4.10</product>
<product>mongodb:2.4.11</product>
<product>mongodb:2.4.12</product>
<product>mongodb:2.4.13</product>
<product>mongodb:2.4.14</product>
<product>mongodb:2.5.0</product>
<product>mongodb:2.5.1</product>
<product>mongodb:2.6.0</product>
<product>mongodb:2.6.1</product>
<product>mongodb:2.6.2</product>
<product>mongodb:2.6.3</product>
<product>mongodb:2.6.4</product>
<product>mongodb:2.6.5</product>
<product>mongodb:2.6.6</product>
<product>mongodb:2.6.7</product>
<product>mongodb:2.6.8</product>
<product>mongodb:2.6.9</product>
<product>mongodb:2.6.10</product>
<product>mongodb:2.6.11</product>
<product>mongodb:2.6.12</product>
<product>mongodb:3.0</product>
<product>mongodb:3.0.1</product>
<product>mongodb:3.0.2</product>
<product>mongodb:3.0.3</product>
<product>mongodb:3.0.4</product>
<product>mongodb:3.0.5</product>
<product>mongodb:3.0.6</product>
<product>mongodb:3.0.7</product>
<product>mongodb:3.0.8</product>
<product>mongodb:3.0.9</product>
<product>mongodb:3.0.10</product>
<product>mongodb:3.0.11</product>
<product>mongodb:3.0.12</product>
<product>mongodb:3.0.13</product>
<product>mongodb:3.0.14</product>
<product>mongodb:3.2</product>
<product>mongodb:3.2.1</product>
<product>mongodb:3.2.2</product>
<product>mongodb:3.2.3</product>
<product>mongodb:3.2.4</product>
<product>mongodb:3.2.5</product>
<product>mongodb:3.2.6</product>
<product>mongodb:3.2.7</product>
<product>mongodb:3.2.8</product>
<product>mongodb:3.2.9</product>
<product>mongodb:3.2.10</product>
<product>mongodb:3.2.11</product>
<product>mongodb:3.2.12</product>
<product>mongodb:3.2.13</product>
<product>mongodb:3.3</product>
<product>mongodb:3.3.1</product>
<product>mongodb:3.3.2</product>
<product>mongodb:3.3.3</product>
<product>mongodb:3.3.4</product>
<product>mongodb:3.3.5</product>
<product>mongodb:3.3.6</product>
<product>mongodb:3.3.7</product>
<product>mongodb:3.3.8</product>
<product>mongodb:3.3.9</product>
<product>mongodb:3.3.10</product>
<product>mongodb:3.3.11</product>
<product>mongodb:3.3.12</product>
<product>mongodb:3.3.13</product>
<product>fedora:25</product>
</cve>
<cve id="CVE-2016-4253" level="LOW">
<product>experience_manager:5.6.1</product>
<product>experience_manager:6.0.0</product>
<product>experience_manager:6.1.0</product>
<product>experience_manager:6.2.0</product>
</cve>
<cve id="CVE-2016-4252" level="LOW">
<product>acrobat:11.0.16</product>
<product>acrobat_dc:15.006.30174</product>
<product>acrobat_dc:15.016.20045</product>
<product>acrobat_reader_dc:15.006.30174</product>
<product>acrobat_reader_dc:15.016.20045</product>
<product>reader:11.0.16</product>
</cve>
<cve id="CVE-2016-7010" level="LOW">
<product>acrobat:11.0.17</product>
<product>acrobat_dc:15.006.30201</product>
<product>acrobat_dc:15.017.20053</product>
<product>acrobat_reader_dc:15.006.30201</product>
<product>acrobat_reader_dc:15.017.20053</product>
<product>reader:11.0.17</product>
</cve>
<cve id="CVE-2016-7547" level="LOW">
<product>threat_discovery_appliance:2.6.1062</product>
</cve>
<cve id="CVE-2016-7544" level="LOW">
<product>crypto%2b%2b:5.6.4</product>
</cve>
<cve id="CVE-2016-7013" level="LOW">
<product>acrobat:11.0.17</product>
<product>acrobat_dc:15.006.30201</product>
<product>acrobat_dc:15.017.20053</product>
<product>acrobat_reader_dc:15.006.30201</product>
<product>acrobat_reader_dc:15.017.20053</product>
<product>reader:11.0.17</product>
</cve>
<cve id="CVE-2016-7542" level="LOW">
<product>fortios:5.2.0</product>
<product>fortios:5.2.1</product>
<product>fortios:5.2.2</product>
<product>fortios:5.2.3</product>
<product>fortios:5.2.4</product>
<product>fortios:5.2.5</product>
<product>fortios:5.2.6</product>
<product>fortios:5.2.7</product>
<product>fortios:5.2.8</product>
<product>fortios:5.2.9</product>
<product>fortios:5.4.0</product>
<product>fortios:5.4.1</product>
</cve>
<cve id="CVE-2016-7543" level="LOW">
<product>bash:4.3</product>
<product>fedora:23</product>
<product>fedora:24</product>
<product>fedora:25</product>
</cve>
<cve id="CVE-2016-7540" level="MEDIUM">
<product>imagemagick:6.9.4-9</product>
</cve>
<cve id="CVE-2016-7541" level="MEDIUM">
<product>fortios:5.0.0</product>
<product>fortios:5.0.1</product>
<product>fortios:5.0.2</product>
<product>fortios:5.0.3</product>
<product>fortios:5.0.4</product>
<product>fortios:5.0.5</product>
<product>fortios:5.0.6</product>
<product>fortios:5.0.7</product>
<product>fortios:5.0.8</product>
<product>fortios:5.0.9</product>
<product>fortios:5.0.10</product>
<product>fortios:5.0.11</product>
<product>fortios:5.0.12</product>
<product>fortios:5.0.13</product>
<product>fortios:5.0.14</product>
<product>fortios:5.2.0</product>
<product>fortios:5.2.1</product>
<product>fortios:5.2.2</product>
<product>fortios:5.2.3</product>
<product>fortios:5.2.4</product>
<product>fortios:5.2.5</product>
<product>fortios:5.2.6</product>
<product>fortios:5.2.7</product>
<product>fortios:5.2.8</product>
<product>fortios:5.2.9</product>
<product>fortios:5.2.10</product>
</cve>
<cve id="CVE-2016-1913" level="MEDIUM">
<product>redhen:7.x-1.0</product>
<product>redhen:7.x-1.0</product>
<product>redhen:7.x-1.0</product>
<product>redhen:7.x-1.0</product>
<product>redhen:7.x-1.0</product>
<product>redhen:7.x-1.0</product>
<product>redhen:7.x-1.0</product>
<product>redhen:7.x-1.1</product>
<product>redhen:7.x-1.2</product>
<product>redhen:7.x-1.3</product>
<product>redhen:7.x-1.4</product>
<product>redhen:7.x-1.5</product>
<product>redhen:7.x-1.6</product>
<product>redhen:7.x-1.7</product>
<product>redhen:7.x-1.8</product>
<product>redhen:7.x-1.10</product>
<product>redhen:7.x-1.x</product>
</cve>
<cve id="CVE-2016-1912" level="MEDIUM">
<product>dolibarr:3.8.2</product>
</cve>
<cve id="CVE-2016-1911" level="MEDIUM">
<product>netweaver:7.40</product>
</cve>
<cve id="CVE-2016-1910" level="LOW">
<product>netweaver:7.40</product>
</cve>
<cve id="CVE-2016-1917" level="MEDIUM">
<product>enterprise_server:12.4</product>
</cve>
<cve id="CVE-2016-1916" level="MEDIUM">
<product>enterprise_server:12.4</product>
</cve>
<cve id="CVE-2016-1915" level="MEDIUM">
<product>blackberry_enterprise_service:12.3.1</product>
</cve>
<cve id="CVE-2016-1914" level="MEDIUM">
<product>blackberry_enterprise_service:12.3.1</product>
</cve>
<cve id="CVE-2016-4891" level="MEDIUM">
<product>setucocms:-</product>
</cve>
<cve id="CVE-2016-4890" level="LOW">
<product>servicedesk_plus:9.1</product>
</cve>
<cve id="CVE-2016-4893" level="LOW">
<product>setucocms:-</product>
</cve>
<cve id="CVE-2016-4892" level="MEDIUM">
<product>setucocms:-</product>
</cve>
<cve id="CVE-2016-4895" level="LOW">
<product>setucocms:-</product>
</cve>
<cve id="CVE-2016-4894" level="LOW">
<product>setucocms:-</product>
</cve>
<cve id="CVE-2016-4897" level="MEDIUM">
<product>usermin:1.680</product>
</cve>
<cve id="CVE-2016-4896" level="LOW">
<product>setucocms:-</product>
</cve>
<cve id="CVE-2016-4899" level="LOW">
<product>novabackup_datacenter:-</product>
</cve>
<cve id="CVE-2016-4898" level="LOW">
<product>novabackup_datacenter:-</product>
</cve>
<cve id="CVE-2016-3202" level="HIGH">
<product>chakra_javascript</product>
<product>jscript</product>
<product>vbscript</product>
</cve>
<cve id="CVE-2016-3205" level="HIGH">
<product>jscript:5.8</product>
<product>vbscript:5.7</product>
<product>vbscript:5.8</product>
</cve>
<cve id="CVE-2016-3204" level="MEDIUM">
<product>internet_explorer:9</product>
<product>internet_explorer:10</product>
<product>internet_explorer:11</product>
</cve>
<cve id="CVE-2016-3207" level="HIGH">
<product>jscript:5.8</product>
<product>vbscript:5.7</product>
<product>vbscript:5.8</product>
</cve>
<cve id="CVE-2016-3206" level="HIGH">
<product>jscript:5.8</product>
<product>vbscript:5.7</product>
<product>vbscript:5.8</product>
</cve>
<cve id="CVE-2016-4259" level="LOW">
<product>digital_editions:4.5.1</product>
</cve>
<cve id="CVE-2016-4258" level="LOW">
<product>digital_editions:4.5.1</product>
</cve>
<cve id="CVE-2016-0521" level="MEDIUM">
<product>e-business_suite:11.5.10.2</product>
</cve>
<cve id="CVE-2016-9625" level="MEDIUM">
<product>w3m:0.5.3-32</product>
</cve>
<cve id="CVE-2016-9624" level="MEDIUM">
<product>w3m:0.5.3-32</product>
</cve>
<cve id="CVE-2016-9155" level="LOW">
<product>ccid1445-dn18_firmware:-</product>
<product>ccid1445-dn28_firmware:-</product>
<product>ccid1445-dn36_firmware:-</product>
<product>ccis1425_firmware:-</product>
<product>ccmd3025-dn18_firmware:-</product>
<product>ccms2025_firmware:-</product>
<product>ccmw1025_firmware:-</product>
<product>ccmw3025_firmware:-</product>
<product>ccpw3025_firmware:-</product>
<product>cfis1425_firmware:-</product>
<product>cfms2025_firmware:-</product>
<product>cfmw1025_firmware:-</product>
<product>cfmw3025_firmware:-</product>
<product>cvms2025-ir_firmware:-</product>
<product>cvmw3025-ir_firmware:-</product>
</cve>
<cve id="CVE-2016-0520" level="MEDIUM">
<product>application_object_library:11.5.10.2</product>
</cve>
<cve id="CVE-2016-9626" level="MEDIUM">
<product>w3m:0.5.3-32</product>
</cve>
<cve id="CVE-2016-2867" level="MEDIUM">
<product>infosphere_streams:4.0.1.1</product>
<product>streams:4.1.1.0</product>
</cve>
<cve id="CVE-2016-9623" level="MEDIUM">
<product>w3m:0.5.3-32</product>
</cve>
<cve id="CVE-2016-2865" level="LOW">
<product>rational_collaborative_lifecycle_management:5.0.0</product>
<product>rational_collaborative_lifecycle_management:5.0.1</product>
<product>rational_collaborative_lifecycle_management:5.0.2</product>
<product>rational_collaborative_lifecycle_management:6.0.0</product>
<product>rational_collaborative_lifecycle_management:6.0.1</product>
<product>rational_team_concert:5.0.0</product>
<product>rational_team_concert:5.0.1</product>
<product>rational_team_concert:5.0.2</product>
<product>rational_team_concert:6.0.0</product>
<product>rational_team_concert:6.0.1</product>
</cve>
<cve id="CVE-2016-0522" level="LOW">
<product>retail_open_commerce_platform_cloud_service:3.5</product>
<product>retail_open_commerce_platform_cloud_service:4.5</product>
<product>retail_open_commerce_platform_cloud_service:4.7</product>
<product>retail_open_commerce_platform_cloud_service:5.0</product>
</cve>
<cve id="CVE-2016-4099" level="LOW">
<product>acrobat:11.0.15</product>
<product>acrobat_dc:15.006.30121</product>
<product>acrobat_dc:15.010.20060</product>
<product>acrobat_reader_dc:15.006.30121</product>
<product>acrobat_reader_dc:15.010.20060</product>
<product>reader:11.0.15</product>
</cve>
<cve id="CVE-2016-4098" level="LOW">
<product>acrobat:11.0.15</product>
<product>acrobat_dc:15.006.30121</product>
<product>acrobat_dc:15.010.20060</product>
<product>acrobat_reader_dc:15.006.30121</product>
<product>acrobat_reader_dc:15.010.20060</product>
<product>reader:11.0.15</product>
</cve>
<cve id="CVE-2016-4091" level="LOW">
<product>acrobat:11.0.15</product>
<product>acrobat_dc:15.006.30121</product>
<product>acrobat_dc:15.010.20060</product>
<product>acrobat_reader_dc:15.006.30121</product>
<product>acrobat_reader_dc:15.010.20060</product>
<product>reader:11.0.15</product>
</cve>
<cve id="CVE-2016-4090" level="LOW">
<product>acrobat:11.0.15</product>
<product>acrobat_dc:15.006.30121</product>
<product>acrobat_dc:15.010.20060</product>
<product>acrobat_reader_dc:15.006.30121</product>
<product>acrobat_reader_dc:15.010.20060</product>
<product>reader:11.0.15</product>
</cve>
<cve id="CVE-2016-4093" level="LOW">
<product>acrobat:11.0.15</product>
<product>acrobat_dc:15.006.30121</product>
<product>acrobat_dc:15.010.20060</product>
<product>acrobat_reader_dc:15.006.30121</product>
<product>acrobat_reader_dc:15.010.20060</product>
<product>reader:11.0.15</product>
</cve>
<cve id="CVE-2016-4092" level="LOW">
<product>acrobat:11.0.15</product>
<product>acrobat_dc:15.006.30121</product>
<product>acrobat_dc:15.010.20060</product>
<product>acrobat_reader_dc:15.006.30121</product>
<product>acrobat_reader_dc:15.010.20060</product>
<product>reader:11.0.15</product>
</cve>
<cve id="CVE-2016-4095" level="LOW">
<product>acrobat:11.0.17</product>
<product>acrobat_dc:15.006.30201</product>
<product>acrobat_dc:15.017.20053</product>
<product>acrobat_reader_dc:15.006.30201</product>
<product>acrobat_reader_dc:15.017.20053</product>
<product>reader:11.0.17</product>
</cve>
<cve id="CVE-2016-4094" level="LOW">
<product>acrobat:11.0.15</product>
<product>acrobat_dc:15.006.30121</product>
<product>acrobat_dc:15.010.20060</product>
<product>acrobat_reader_dc:15.006.30121</product>
<product>acrobat_reader_dc:15.010.20060</product>
<product>reader:11.0.15</product>
</cve>
<cve id="CVE-2016-4097" level="LOW">
<product>acrobat:11.0.15</product>
<product>acrobat_dc:15.006.30121</product>
<product>acrobat_dc:15.010.20060</product>
<product>acrobat_reader_dc:15.006.30121</product>
<product>acrobat_reader_dc:15.010.20060</product>
<product>reader:11.0.15</product>
</cve>
<cve id="CVE-2016-4096" level="LOW">
<product>acrobat:11.0.15</product>
<product>acrobat_dc:15.006.30121</product>
<product>acrobat_dc:15.010.20060</product>
<product>acrobat_reader_dc:15.006.30121</product>
<product>acrobat_reader_dc:15.010.20060</product>
<product>reader:11.0.15</product>
</cve>
<cve id="CVE-2016-5328" level="LOW">
<product>tools:9.0.0</product>
<product>tools:9.0.1</product>
<product>tools:9.0.5</product>
<product>tools:9.0.10</product>
<product>tools:9.0.11</product>
<product>tools:9.0.12</product>
<product>tools:9.0.13</product>
<product>tools:9.0.15</product>
<product>tools:9.0.16</product>
<product>tools:9.0.17</product>
<product>tools:9.4.0</product>
<product>tools:9.4.5</product>
<product>tools:9.4.10</product>
<product>tools:9.4.11</product>
<product>tools:9.4.12</product>
<product>tools:9.4.15</product>
<product>tools:9.10.0</product>
<product>tools:9.10.1</product>
<product>tools:9.10.5</product>
<product>tools:10.0.0</product>
<product>tools:10.0.5</product>
<product>tools:10.0.6</product>
<product>tools:10.0.8</product>
</cve>
<cve id="CVE-2016-5329" level="LOW">
<product>fusion:8.0.0</product>
<product>fusion:8.0.1</product>
<product>fusion:8.0.2</product>
<product>fusion:8.1.0</product>
<product>fusion:8.1.1</product>
</cve>
<cve id="CVE-2016-4923" level="MEDIUM">
<product>junos:11.4</product>
<product>junos:11.4</product>
<product>junos:11.4</product>
<product>junos:11.4</product>
<product>junos:11.4</product>
<product>junos:11.4</product>
<product>junos:11.4</product>
<product>junos:11.4</product>
<product>junos:11.4</product>
<product>junos:11.4</product>
<product>junos:11.4</product>
<product>junos:11.4</product>
<product>junos:11.4</product>
<product>junos:11.4r13</product>
<product>junos:12.1x44</product>
<product>junos:12.1x44</product>
<product>junos:12.1x44</product>
<product>junos:12.1x44</product>
<product>junos:12.1x44</product>
<product>junos:12.1x44</product>
<product>junos:12.1x44</product>
<product>junos:12.1x44</product>
<product>junos:12.1x44</product>
<product>junos:12.1x44</product>
<product>junos:12.1x44</product>
<product>junos:12.1x46</product>
<product>junos:12.1x46</product>
<product>junos:12.1x46</product>
<product>junos:12.1x46</product>
<product>junos:12.1x46</product>
<product>junos:12.1x46</product>
<product>junos:12.1x46</product>
<product>junos:12.1x47</product>
<product>junos:12.1x47</product>
<product>junos:12.1x47</product>
<product>junos:12.1x47</product>
<product>junos:12.1x47</product>
<product>junos:12.3</product>
<product>junos:12.3</product>
<product>junos:12.3</product>
<product>junos:12.3</product>
<product>junos:12.3</product>
<product>junos:12.3</product>
<product>junos:12.3</product>
<product>junos:12.3</product>
<product>junos:12.3</product>
<product>junos:12.3</product>
<product>junos:12.3</product>
<product>junos:12.3x48</product>
<product>junos:12.3x48</product>
<product>junos:13.3</product>
<product>junos:13.3</product>
<product>junos:13.3</product>
<product>junos:13.3</product>
<product>junos:13.3</product>
<product>junos:13.3</product>
<product>junos:13.3</product>
<product>junos:13.3</product>
<product>junos:13.3</product>
<product>junos:13.3</product>
<product>junos:13.3</product>
<product>junos:14.1</product>
<product>junos:14.1</product>
<product>junos:14.1</product>
<product>junos:14.1</product>
<product>junos:14.1</product>
<product>junos:14.1</product>
<product>junos:14.2</product>
<product>junos:14.2</product>
<product>junos:14.2</product>
<product>junos:14.2</product>
<product>junos:14.2</product>
<product>junos:15.1</product>
<product>junos:15.1</product>
<product>junos:15.1x49</product>
<product>junos:15.1x53</product>
<product>junos:15.1x53</product>
<product>junos:15.1x53</product>
<product>junos:15.1x53</product>
<product>junos:15.1x53</product>
<product>junos:15.1x53</product>
<product>junos:15.1x53</product>
<product>junos:15.1x53</product>
<product>junos:15.1x53</product>
<product>junos:15.1x53</product>
<product>junos:15.1x53</product>
</cve>
<cve id="CVE-2016-5321" level="MEDIUM">
<product>libtiff:4.0.6</product>
<product>opensuse:13.1</product>
</cve>
<cve id="CVE-2016-5323" level="LOW">
<product>libtiff:4.0.6</product>
<product>opensuse:13.2</product>
</cve>
<cve id="CVE-2016-5852" level="LOW">
<product>geforce_experience:-</product>
</cve>
<cve id="CVE-2016-5850" level="MEDIUM">
<product>public_cloud_solution:1.0.0</product>
</cve>
<cve id="CVE-2016-5851" level="MEDIUM">
<product>python-docx:0.8.5</product>
</cve>
<cve id="CVE-2016-3045" level="MEDIUM">
<product>security_access_manager:9.0.0</product>
<product>security_access_manager:9.0.0.1</product>
<product>security_access_manager:9.0.1.0</product>
<product>security_access_manager_for_mobile:8.0.0.0</product>
<product>security_access_manager_for_mobile:8.0.0.5</product>
<product>security_access_manager_for_mobile:8.0.1</product>
<product>security_access_manager_for_mobile:8.0.1.2</product>
<product>security_access_manager_for_mobile:8.0.1.3</product>
<product>security_access_manager_for_mobile:8.0.1.4</product>
<product>security_access_manager_for_web:7.0.0</product>
<product>security_access_manager_for_web:8.0.0</product>
<product>security_access_manager_for_web:8.0.1</product>
<product>security_access_manager_for_web:8.0.1.1</product>
<product>security_access_manager_for_web:8.0.1.2</product>
<product>security_access_manager_for_web:8.0.1.3</product>
<product>security_access_manager_for_web:8.0.1.4</product>
</cve>
<cve id="CVE-2016-10309" level="LOW">
<product>fibeair_ip-10_firmware:7.1.0</product>
</cve>
<cve id="CVE-2016-10308" level="LOW">
<product>etherhaul_firmware:3.7.0</product>
<product>etherhaul_firmware:6.0</product>
</cve>
<cve id="CVE-2016-10305" level="LOW">
<product>apex_firmware:2.1.1</product>
<product>apex_lynx_firmware:1.2.3</product>
<product>apex_orion_firmware:1.2.3</product>
<product>apex_plus_firmware:3.2.0</product>
<product>giga_firmware:2.6.1</product>
<product>giga_lynx_firmware:1.2.3</product>
<product>giga_orion_firmware:1.2.3</product>
<product>giga_plus_firmware:3.2.3</product>
<product>giga_pro_firmware:1.4.1</product>
<product>stratalink_firmware:2.2.0</product>
<product>stratalink_pro_firmware:-</product>
</cve>
<cve id="CVE-2016-10304" level="LOW">
<product>netweaver:7.5</product>
</cve>
<cve id="CVE-2016-10307" level="LOW">
<product>apex_lynx_firmware:2.0</product>
<product>apex_orion_firmware:2.0</product>
<product>giga_lynx_firmware:2.0</product>
<product>giga_orion_firmware:2.0</product>
<product>stratalink_firmware:3.0</product>
</cve>
<cve id="CVE-2016-10306" level="LOW">
<product>a600_firmware:-</product>
</cve>
<cve id="CVE-2016-8219" level="LOW">
<product>capi-release:1.11.0</product>
<product>cf-release:249</product>
</cve>
<cve id="CVE-2016-8218" level="LOW">
<product>cf-release:203</product>
<product>cf-release:204</product>
<product>cf-release:205</product>
<product>cf-release:206</product>
<product>cf-release:207</product>
<product>cf-release:208</product>
<product>cf-release:209</product>
<product>cf-release:210</product>
<product>cf-release:211</product>
<product>cf-release:212</product>
<product>cf-release:213</product>
<product>cf-release:214</product>
<product>cf-release:215</product>
<product>cf-release:217</product>
<product>cf-release:218</product>
<product>cf-release:219</product>
<product>cf-release:220</product>
<product>cf-release:221</product>
<product>cf-release:222</product>
<product>cf-release:223</product>
<product>cf-release:224</product>
<product>cf-release:225</product>
<product>cf-release:226</product>
<product>cf-release:227</product>
<product>cf-release:228</product>
<product>cf-release:229</product>
<product>cf-release:230</product>
<product>cf-release:231</product>
<product>routing-release:0.141.0</product>
</cve>
<cve id="CVE-2016-3120" level="LOW">
<product>kerberos:5-1.13</product>
<product>kerberos:5-1.13.1</product>
<product>kerberos:5-1.13.2</product>
<product>kerberos:5-1.13.3</product>
<product>kerberos:5-1.13.4</product>
<product>kerberos:5-1.13.5</product>
<product>kerberos:5-1.13.6</product>
<product>kerberos:5-1.14</product>
<product>kerberos:5-1.14.1</product>
<product>kerberos:5-1.14.2</product>
</cve>
<cve id="CVE-2016-4038" level="LOW">
<product>samsung_mobile:4.4</product>
<product>samsung_mobile:5.0</product>
<product>samsung_mobile:5.1</product>
</cve>
<cve id="CVE-2016-6442" level="MEDIUM">
<product>finesse:11.0%281%29_base</product>
</cve>
<cve id="CVE-2016-1517" level="MEDIUM">
<product>opencv:3.0.0</product>
</cve>
<cve id="CVE-2016-6443" level="LOW">
<product>evolved_programmable_network_manager:1.2.0</product>
<product>evolved_programmable_network_manager:2.0.0</product>
<product>prime_infrastructure:1.2.0</product>
<product>prime_infrastructure:1.2.0.103</product>
<product>prime_infrastructure:1.2.1</product>
<product>prime_infrastructure:1.3.0</product>
<product>prime_infrastructure:1.3.0.20</product>
<product>prime_infrastructure:1.4.0</product>
<product>prime_infrastructure:1.4.0.45</product>
<product>prime_infrastructure:1.4.1</product>
<product>prime_infrastructure:1.4.2</product>
<product>prime_infrastructure:2.0.0</product>
<product>prime_infrastructure:2.1.0</product>
<product>prime_infrastructure:2.2%282%29</product>
<product>prime_infrastructure:2.2.0</product>
<product>prime_infrastructure:3.0.0</product>
<product>prime_infrastructure:3.0_base</product>
<product>prime_infrastructure:3.1.0</product>
<product>prime_infrastructure:3.1.1</product>
<product>prime_infrastructure:3.1_base</product>
</cve>
<cve id="CVE-2016-0529" level="LOW">
<product>customer_interaction_history:12.1.1</product>
<product>customer_interaction_history:12.1.2</product>
<product>customer_interaction_history:12.1.3</product>
<product>customer_interaction_history:12.2.3</product>
<product>customer_interaction_history:12.2.4</product>
<product>customer_interaction_history:12.2.5</product>
</cve>
<cve id="CVE-2016-1516" level="MEDIUM">
<product>opencv:3.0.0</product>
</cve>
<cve id="CVE-2016-6332" level="LOW">
<product>mediawiki:1.23.14</product>
<product>mediawiki:1.26.0</product>
<product>mediawiki:1.26.1</product>
<product>mediawiki:1.26.2</product>
<product>mediawiki:1.26.3</product>
<product>mediawiki:1.26.4</product>
<product>mediawiki:1.27.0</product>
</cve>
<cve id="CVE-2016-3125" level="LOW">
<product>proftpd:1.3.5</product>
<product>proftpd:1.3.6</product>
<product>fedora:22</product>
<product>fedora:23</product>
<product>opensuse:13.1</product>
</cve>
<cve id="CVE-2016-3126" level="MEDIUM">
<product>enterprise_server:12.4</product>
</cve>
<cve id="CVE-2016-1513" level="MEDIUM">
<product>openoffice:4.1.2</product>
</cve>
<cve id="CVE-2016-6501" level="LOW">
<product>artifactory:4.10</product>
</cve>
<cve id="CVE-2016-3127" level="LOW">
<product>good_control_server:2.2.511.26</product>
</cve>
<cve id="CVE-2016-4032" level="LOW">
<product>galaxy_note_3_firmware:n9005xxugbob6</product>
<product>galaxy_s4_firmware:i9505xxuhoj2</product>
<product>galaxy_s4_mini_firmware:i9192xxubnb1</product>
<product>galaxy_s4_mini_lte_firmware:i9195xxucol1</product>
<product>galaxy_s6_firmware:g920fxxu2coh2</product>
</cve>
<cve id="CVE-2016-6448" level="LOW">
<product>meeting_server:1.8.15</product>
<product>meeting_server:1.8_base</product>
<product>meeting_server:1.9.0</product>
<product>meeting_server:1.9.2</product>
<product>meeting_server:2.0.0</product>
<product>meeting_server:2.0.1</product>
<product>meeting_server:2.0.3</product>
<product>meeting_server:2.0.4</product>
<product>meeting_server:2.0.5</product>
</cve>
<cve id="CVE-2016-0528" level="LOW">
<product>e-business_suite:12.1.1</product>
<product>e-business_suite:12.1.2</product>
<product>e-business_suite:12.1.3</product>
<product>e-business_suite:12.2.3</product>
<product>e-business_suite:12.2.4</product>
<product>e-business_suite:12.2.5</product>
</cve>
<cve id="CVE-2016-4031" level="LOW">
<product>galaxy_note_3_firmware:n9005xxugbob6</product>
<product>galaxy_s4_firmware:i9505xxuhoj2</product>
<product>galaxy_s4_mini_firmware:i9192xxubnb1</product>
<product>galaxy_s4_mini_lte_firmware:i9195xxucol1</product>
<product>galaxy_s6_firmware:g920fxxu2coh2</product>
</cve>
<cve id="CVE-2016-6449" level="LOW">
<product>fireamp_connector_endpoint_software:4.4.0</product>
<product>fireamp_connector_endpoint_software:4.4.2.10200</product>
</cve>
<cve id="CVE-2016-4030" level="LOW">
<product>galaxy_note_3_firmware:n9005xxugbob6</product>
<product>galaxy_s4_firmware:i9505xxuhoj2</product>
<product>galaxy_s4_mini_firmware:i9192xxubnb1</product>
<product>galaxy_s4_mini_lte_firmware:i9195xxucol1</product>
<product>galaxy_s6_firmware:g920fxxu2coh2</product>
</cve>
<cve id="CVE-2016-6152" level="LOW">
<product>ehealth:6.2</product>
<product>ehealth:6.2.1</product>
<product>ehealth:6.2.2</product>
<product>ehealth:6.3</product>
<product>ehealth:6.3.1</product>
<product>ehealth:6.3.2</product>
<product>ehealth:6.3.2.01</product>
<product>ehealth:6.3.2.02</product>
<product>ehealth:6.3.2.03</product>
<product>ehealth:6.3.2.04</product>
<product>ehealth:6.3.2.05</product>
<product>ehealth:6.3.2.06</product>
<product>ehealth:6.3.2.07</product>
<product>ehealth:6.3.2.08</product>
<product>ehealth:6.3.2.09</product>
<product>ehealth:6.3.2.10</product>
<product>ehealth:6.3.2.11</product>
<product>ehealth:6.3.2.12</product>
</cve>
<cve id="CVE-2016-6153" level="LOW">
<product>sqlite:3.12.2</product>
<product>fedora:24</product>
<product>leap:42.1</product>
</cve>
<cve id="CVE-2016-6150" level="LOW">
<product>hana:-</product>
</cve>
<cve id="CVE-2016-6151" level="LOW">
<product>ehealth:6.2</product>
<product>ehealth:6.2.1</product>
<product>ehealth:6.2.2</product>
</cve>
<cve id="CVE-2016-6558" level="LOW">
<product>ea-n66_firmware:-</product>
<product>rp-ac52_firmware:1.0.1.1s</product>
<product>rp-ac56_firmware:-</product>
<product>rp-n12_firmware:-</product>
<product>rp-n14_firmware:-</product>
<product>rp-n53_firmware:-</product>
<product>wmp-n12_firmware:-</product>
</cve>
<cve id="CVE-2016-3079" level="MEDIUM">
<product>network_satellite:5.7</product>
<product>spacewalk-java:-</product>
</cve>
<cve id="CVE-2016-6552" level="LOW">
<product>dx-350_firmware:-</product>
</cve>
<cve id="CVE-2016-6553" level="LOW">
<product>nt-4040_titan_firmware:nt-4040_01.07.0000.0015_1120</product>
</cve>
<cve id="CVE-2016-6550" level="MEDIUM">
<product>the_u:1.5.4</product>
</cve>
<cve id="CVE-2016-6551" level="LOW">
<product>t100q_firmware:1.07</product>
<product>t100w_firmware:1.07</product>
<product>t110q_firmware:1.07</product>
<product>t110w_firmware:1.07</product>
<product>t130q_firmware:1.07</product>
<product>t130w_firmware:1.07</product>
<product>t240ck_firmware:1.07</product>
<product>t80q_firmware:1.07</product>
<product>t80w_firmware:1.07</product>
<product>v60_firmware:1.07</product>
<product>v60ka_firmware:1.07</product>
<product>v65_firmware:1.07</product>
<product>v80g_firmware:1.07</product>
</cve>
<cve id="CVE-2016-3076" level="MEDIUM">
<product>pillow:2.5.0</product>
<product>pillow:2.5.1</product>
<product>pillow:2.5.2</product>
<product>pillow:2.5.3</product>
<product>pillow:2.6.0</product>
<product>pillow:2.6.0</product>
<product>pillow:2.6.1</product>
<product>pillow:2.6.2</product>
<product>pillow:2.7.0</product>
<product>pillow:2.8.0</product>
<product>pillow:2.8.1</product>
<product>pillow:2.8.2</product>
<product>pillow:2.9.0</product>
<product>pillow:2.9.0</product>
<product>pillow:2.9.0</product>
<product>pillow:2.9.0</product>
<product>pillow:3.0.0</product>
<product>pillow:3.0.0</product>
<product>pillow:3.1.0</product>
</cve>
<cve id="CVE-2016-6557" level="MEDIUM">
<product>ea-n66_firmware:-</product>
<product>rp-ac52_firmware:1.0.1.1s</product>
<product>rp-ac56_firmware:-</product>
<product>rp-n12_firmware:-</product>
<product>rp-n14_firmware:-</product>
<product>rp-n53_firmware:-</product>
<product>wmp-n12_firmware:-</product>
</cve>
<cve id="CVE-2016-6554" level="LOW">
<product>ds107_firmware:3.1-1639</product>
<product>ds116_firmware:5.2-5644-1</product>
<product>ds213_firmware:5.2-5644-1</product>
</cve>
<cve id="CVE-2016-10010" level="MEDIUM">
<product>openssh:7.3</product>
</cve>
<cve id="CVE-2016-0525" level="LOW">
<product>universal_work_queue:11.5.10.2</product>
<product>universal_work_queue:12.1.1</product>
<product>universal_work_queue:12.1.2</product>
<product>universal_work_queue:12.1.3</product>
</cve>
<cve id="CVE-2016-7204" level="HIGH">
<product>edge</product>
</cve>
<cve id="CVE-2016-0527" level="LOW">
<product>e-business_suite:12.1.1</product>
<product>e-business_suite:12.1.2</product>
<product>e-business_suite:12.1.3</product>
<product>e-business_suite:12.2.3</product>
<product>e-business_suite:12.2.4</product>
<product>e-business_suite:12.2.5</product>
</cve>
<cve id="CVE-2016-0526" level="LOW">
<product>e-business_suite:11.5.10.2</product>
<product>e-business_suite:12.1.3</product>
<product>e-business_suite:12.2.3</product>
<product>e-business_suite:12.2.4</product>
<product>e-business_suite:12.2.5</product>
</cve>
<cve id="CVE-2016-7201" level="HIGH">
<product>edge</product>
</cve>
<cve id="CVE-2016-10013" level="LOW">
<product>xen:4.8.0</product>
</cve>
<cve id="CVE-2016-7203" level="HIGH">
<product>edge</product>
</cve>
<cve id="CVE-2016-7202" level="HIGH">
<product>edge</product>
</cve>
<cve id="CVE-2016-10540" level="LOW">
<product>minimatch:3.0.1</product>
</cve>
<cve id="CVE-2016-7209" level="HIGH">
<product>edge</product>
</cve>
<cve id="CVE-2016-7208" level="HIGH">
<product>edge</product>
</cve>
<cve id="CVE-2016-7979" level="LOW">
<product>ghostscript:9.20</product>
</cve>
<cve id="CVE-2016-7978" level="LOW">
<product>ghostscript:9.20</product>
</cve>
<cve id="CVE-2016-9746" level="MEDIUM">
<product>rational_collaborative_lifecycle_management:4.0.0</product>
<product>rational_collaborative_lifecycle_management:4.0.1</product>
<product>rational_collaborative_lifecycle_management:4.0.2</product>
<product>rational_collaborative_lifecycle_management:4.0.3</product>
<product>rational_collaborative_lifecycle_management:4.0.4</product>
<product>rational_collaborative_lifecycle_management:4.0.5</product>
<product>rational_collaborative_lifecycle_management:4.0.6</product>
<product>rational_collaborative_lifecycle_management:4.0.7</product>
<product>rational_collaborative_lifecycle_management:5.0</product>
<product>rational_collaborative_lifecycle_management:5.0.0</product>
<product>rational_collaborative_lifecycle_management:5.0.1</product>
<product>rational_collaborative_lifecycle_management:5.0.2</product>
<product>rational_collaborative_lifecycle_management:6.0</product>
<product>rational_collaborative_lifecycle_management:6.0.0</product>
<product>rational_collaborative_lifecycle_management:6.0.1</product>
<product>rational_collaborative_lifecycle_management:6.0.3</product>
<product>rational_team_concert:4.0</product>
<product>rational_team_concert:4.0.0</product>
<product>rational_team_concert:4.0.0.1</product>
<product>rational_team_concert:4.0.0.2</product>
<product>rational_team_concert:4.0.1</product>
<product>rational_team_concert:4.0.2</product>
<product>rational_team_concert:4.0.3</product>
<product>rational_team_concert:4.0.4</product>
<product>rational_team_concert:4.0.5</product>
<product>rational_team_concert:4.0.6</product>
<product>rational_team_concert:4.0.7</product>
<product>rational_team_concert:5.0</product>
<product>rational_team_concert:5.0.0</product>
<product>rational_team_concert:5.0.1</product>
<product>rational_team_concert:5.0.2</product>
<product>rational_team_concert:6.0</product>
<product>rational_team_concert:6.0.0</product>
<product>rational_team_concert:6.0.1</product>
<product>rational_team_concert:6.0.2</product>
<product>rational_team_concert:6.0.3</product>
</cve>
<cve id="CVE-2016-4950" level="LOW">
<product>manager:5.5.0</product>
</cve>
<cve id="CVE-2016-4959" level="LOW">
<product>gpu_driver:341.95</product>
<product>gpu_driver:354.74</product>
<product>gpu_driver:362.00</product>
<product>gpu_driver:368.22</product>
<product>gpu_driver:368.39</product>
</cve>
<cve id="CVE-2016-3696" level="LOW">
<product>pulp:2.8.4</product>
<product>fedora:24</product>
</cve>
<cve id="CVE-2016-3697" level="LOW">
<product>docker:1.11.1</product>
<product>runc:0.0.9</product>
<product>opensuse:13.2</product>
</cve>
<cve id="CVE-2016-3694" level="LOW">
<product>ecommerce_shopsoftware:2.0.0.0</product>
</cve>
<cve id="CVE-2016-3693" level="MEDIUM">
<product>safemode:1.2.3</product>
</cve>
<cve id="CVE-2016-3690" level="LOW">
<product>jboss_enterprise_application_platform:4.2.0</product>
<product>jboss_enterprise_application_platform:4.3.0</product>
<product>jboss_enterprise_application_platform:5.0.0</product>
<product>jboss_enterprise_application_platform:5.1.0</product>
<product>jboss_enterprise_application_platform:5.1.1</product>
<product>jboss_enterprise_application_platform:5.1.2</product>
<product>jboss_enterprise_application_platform:5.2.0</product>
</cve>
<cve id="CVE-2016-3691" level="MEDIUM">
<product>kallithea:0.3.1</product>
</cve>
<cve id="CVE-2016-1126" level="LOW">
<product>acrobat:11.0.15</product>
<product>acrobat_dc:15.006.30121</product>
<product>acrobat_dc:15.010.20060</product>
<product>acrobat_reader_dc:15.006.30121</product>
<product>acrobat_reader_dc:15.010.20060</product>
<product>reader:11.0.15</product>
</cve>
<cve id="CVE-2016-4407" level="LOW">
<product>sapcryptolib:5.555.38</product>
</cve>
<cve id="CVE-2016-1124" level="LOW">
<product>acrobat:11.0.15</product>
<product>acrobat_dc:15.006.30121</product>
<product>acrobat_dc:15.010.20060</product>
<product>acrobat_reader_dc:15.006.30121</product>
<product>acrobat_reader_dc:15.010.20060</product>
<product>reader:11.0.15</product>
</cve>
<cve id="CVE-2016-1125" level="LOW">
<product>acrobat:11.0.15</product>
<product>acrobat_dc:15.006.30121</product>
<product>acrobat_dc:15.010.20060</product>
<product>acrobat_reader_dc:15.006.30121</product>
<product>acrobat_reader_dc:15.010.20060</product>
<product>reader:11.0.15</product>
</cve>
<cve id="CVE-2016-1122" level="LOW">
<product>acrobat:11.0.15</product>
<product>acrobat_dc:15.006.30121</product>
<product>acrobat_dc:15.010.20060</product>
<product>acrobat_reader_dc:15.006.30121</product>
<product>acrobat_reader_dc:15.010.20060</product>
<product>reader:11.0.15</product>
</cve>
<cve id="CVE-2016-1123" level="LOW">
<product>acrobat:11.0.15</product>
<product>acrobat_dc:15.006.30121</product>
<product>acrobat_dc:15.010.20060</product>
<product>acrobat_reader_dc:15.006.30121</product>
<product>acrobat_reader_dc:15.010.20060</product>
<product>reader:11.0.15</product>
</cve>
<cve id="CVE-2016-1120" level="LOW">
<product>acrobat:11.0.15</product>
<product>acrobat_dc:15.006.30121</product>
<product>acrobat_dc:15.010.20060</product>
<product>acrobat_reader_dc:15.006.30121</product>
<product>acrobat_reader_dc:15.010.20060</product>
<product>reader:11.0.15</product>
</cve>
<cve id="CVE-2016-1121" level="LOW">
<product>acrobat_dc:15.006.30121</product>
<product>acrobat_dc:15.010.20060</product>
<product>acrobat_reader_dc:15.006.30121</product>
<product>acrobat_reader_dc:15.010.20060</product>
<product>acrobat_xi:11.0.15</product>
<product>reader_xi:11.0.15</product>
</cve>
<cve id="CVE-2016-1128" level="LOW">
<product>acrobat:11.0.15</product>
<product>acrobat_dc:15.006.30121</product>
<product>acrobat_dc:15.010.20060</product>
<product>acrobat_reader_dc:15.006.30121</product>
<product>acrobat_reader_dc:15.010.20060</product>
<product>reader:11.0.15</product>
</cve>
<cve id="CVE-2016-1129" level="LOW">
<product>acrobat:11.0.15</product>
<product>acrobat_dc:15.006.30121</product>
<product>acrobat_dc:15.010.20060</product>
<product>acrobat_reader_dc:15.006.30121</product>
<product>acrobat_reader_dc:15.010.20060</product>
<product>reader:11.0.15</product>
</cve>
<cve id="CVE-2016-8514" level="LOW">
<product>version_control_repository_manager:-</product>
<product>version_control_repository_manager:1.0.1288.1</product>
<product>version_control_repository_manager:1.0.2241.0</product>
<product>version_control_repository_manager:1.0.2289.0</product>
<product>version_control_repository_manager:1.0.2345.0</product>
<product>version_control_repository_manager:1.0.3085.0</product>
<product>version_control_repository_manager:1.0.3086.0</product>
<product>version_control_repository_manager:2.0.0.50</product>
<product>version_control_repository_manager:2.0.1.30</product>
<product>version_control_repository_manager:2.1.1.710</product>
<product>version_control_repository_manager:2.1.1.720</product>
<product>version_control_repository_manager:6.3.0.870</product>
<product>version_control_repository_manager:7.4.0</product>
</cve>
<cve id="CVE-2016-8515" level="LOW">
<product>version_control_repository_manager:-</product>
<product>version_control_repository_manager:1.0.1288.1</product>
<product>version_control_repository_manager:1.0.2241.0</product>
<product>version_control_repository_manager:1.0.2289.0</product>
<product>version_control_repository_manager:1.0.2345.0</product>
<product>version_control_repository_manager:1.0.3085.0</product>
<product>version_control_repository_manager:1.0.3086.0</product>
<product>version_control_repository_manager:2.0.0.50</product>
<product>version_control_repository_manager:2.0.1.30</product>
<product>version_control_repository_manager:2.1.1.710</product>
<product>version_control_repository_manager:2.1.1.720</product>
<product>version_control_repository_manager:6.3.0.870</product>
<product>version_control_repository_manager:7.4.0</product>
</cve>
<cve id="CVE-2016-8516" level="LOW">
<product>systems_insight_manager:-</product>
<product>systems_insight_manager:4.0</product>
<product>systems_insight_manager:4.1</product>
<product>systems_insight_manager:4.1</product>
<product>systems_insight_manager:4.2</product>
<product>systems_insight_manager:4.2</product>
<product>systems_insight_manager:4.2</product>
<product>systems_insight_manager:5.0</product>
<product>systems_insight_manager:6.0</product>
<product>systems_insight_manager:6.1</product>
<product>systems_insight_manager:7.4</product>
<product>systems_insight_manager:7.5</product>
</cve>
<cve id="CVE-2016-8517" level="MEDIUM">
<product>systems_insight_manager:-</product>
<product>systems_insight_manager:4.0</product>
<product>systems_insight_manager:4.1</product>
<product>systems_insight_manager:4.1</product>
<product>systems_insight_manager:4.2</product>
<product>systems_insight_manager:4.2</product>
<product>systems_insight_manager:4.2</product>
<product>systems_insight_manager:5.0</product>
<product>systems_insight_manager:6.0</product>
<product>systems_insight_manager:6.1</product>
<product>systems_insight_manager:7.4</product>
<product>systems_insight_manager:7.5</product>
</cve>
<cve id="CVE-2016-8511" level="LOW">
<product>network_automation:9.10</product>
<product>network_automation:9.20</product>
<product>network_automation:9.22</product>
<product>network_automation:9.22.01</product>
<product>network_automation:9.22.02</product>
<product>network_automation:10.00</product>
<product>network_automation:10.00.01</product>
<product>network_automation:10.00.02</product>
<product>network_automation:10.10</product>
<product>network_automation:10.11</product>
<product>network_automation:10.11.01</product>
<product>network_automation:10.20</product>
</cve>
<cve id="CVE-2016-8512" level="LOW">
<product>loadrunner:-</product>
<product>performance_center:-</product>
</cve>
<cve id="CVE-2016-8513" level="MEDIUM">
<product>version_control_repository_manager:-</product>
<product>version_control_repository_manager:1.0.1288.1</product>
<product>version_control_repository_manager:1.0.2241.0</product>
<product>version_control_repository_manager:1.0.2289.0</product>
<product>version_control_repository_manager:1.0.2345.0</product>
<product>version_control_repository_manager:1.0.3085.0</product>
<product>version_control_repository_manager:1.0.3086.0</product>
<product>version_control_repository_manager:2.0.0.50</product>
<product>version_control_repository_manager:2.0.1.30</product>
<product>version_control_repository_manager:2.1.1.710</product>
<product>version_control_repository_manager:2.1.1.720</product>
<product>version_control_repository_manager:6.3.0.870</product>
<product>version_control_repository_manager:7.4.0</product>
</cve>
<cve id="CVE-2016-8518" level="LOW">
<product>systems_insight_manager:-</product>
<product>systems_insight_manager:4.0</product>
<product>systems_insight_manager:4.1</product>
<product>systems_insight_manager:4.1</product>
<product>systems_insight_manager:4.2</product>
<product>systems_insight_manager:4.2</product>
<product>systems_insight_manager:4.2</product>
<product>systems_insight_manager:5.0</product>
<product>systems_insight_manager:6.0</product>
<product>systems_insight_manager:6.1</product>
<product>systems_insight_manager:7.4</product>
<product>systems_insight_manager:7.5</product>
</cve>
<cve id="CVE-2016-9740" level="LOW">
<product>qradar_security_information_and_event_manager:7.2.0</product>
<product>qradar_security_information_and_event_manager:7.2.1</product>
<product>qradar_security_information_and_event_manager:7.2.2</product>
<product>qradar_security_information_and_event_manager:7.2.3</product>
<product>qradar_security_information_and_event_manager:7.2.4</product>
<product>qradar_security_information_and_event_manager:7.2.5</product>
<product>qradar_security_information_and_event_manager:7.2.6</product>
<product>qradar_security_information_and_event_manager:7.2.7</product>
<product>qradar_security_information_and_event_manager:7.2.8</product>
</cve>
<cve id="CVE-2016-9177" level="LOW">
<product>spark:2.5</product>
</cve>
<cve id="CVE-2016-9176" level="LOW">
<product>rumba:9.4.0</product>
</cve>
<cve id="CVE-2016-9179" level="LOW">
<product>lynx</product>
</cve>
<cve id="CVE-2016-1342" level="LOW">
<product>firepower_management_center:5.3.0.3</product>
<product>firepower_management_center:5.3.1.3</product>
<product>firepower_management_center:5.3.1.4</product>
<product>firepower_management_center:5.3.1.5</product>
<product>firepower_management_center:5.3.1.6</product>
<product>firepower_management_center:5.3_base</product>
<product>firepower_management_center:5.4.0</product>
<product>firepower_management_center:5.4.1</product>
<product>firepower_management_center:5.4.1.1</product>
<product>firepower_management_center:5.4.1.2</product>
<product>firepower_management_center:5.4.1.3</product>
<product>firepower_management_center:5.4.1.4</product>
<product>firepower_management_center:5.4.1.5</product>
<product>firepower_management_center:5.4_base</product>
<product>firepower_management_center:6.0.0</product>
<product>firepower_management_center:6.0.0.1</product>
<product>firepower_management_center:6.0_base</product>
</cve>
<cve id="CVE-2016-1343" level="LOW">
<product>information_server:6.2_base</product>
</cve>
<cve id="CVE-2016-1340" level="LOW">
<product>unified_computing_system_platform_emulator:2.5%282%29ts4</product>
<product>unified_computing_system_platform_emulator:3.0%282c%29a</product>
<product>unified_computing_system_platform_emulator:3.0%282c%29ts9</product>
</cve>
<cve id="CVE-2016-1341" level="MEDIUM">
<product>nx-os:7.0%281%29n1%281%29</product>
<product>nx-os:7.0%281%29n1%283%29</product>
<product>nx-os:7.0%284%29n1%281%29</product>
</cve>
<cve id="CVE-2016-1346" level="MEDIUM">
<product>telepresence_server_software:3.0%5c%282.24%5c%29</product>
<product>telepresence_server_software:3.0%5c%282.46%5c%29</product>
<product>telepresence_server_software:3.0%5c%282.48%5c%29</product>
<product>telepresence_server_software:3.0%5c%282.49%5c%29</product>
<product>telepresence_server_software:3.1%5c%281.80%5c%29</product>
<product>telepresence_server_software:3.1%5c%281.82%5c%29</product>
<product>telepresence_server_software:3.1%5c%281.95%5c%29</product>
<product>telepresence_server_software:3.1%5c%281.96%5c%29</product>
<product>telepresence_server_software:3.1%5c%281.97%5c%29</product>
<product>telepresence_server_software:3.1%5c%281.98%5c%29</product>
<product>telepresence_server_software:4.0%5c%281.57%5c%29</product>
<product>telepresence_server_software:4.0%5c%282.8%5c%29</product>
<product>telepresence_server_software:4.1%5c%281.40%5c%29</product>
<product>telepresence_server_software:4.2%5c%284.17%5c%29</product>
<product>telepresence_server_software:4.2%5c%284.18%5c%29</product>
</cve>
<cve id="CVE-2016-1345" level="LOW">
<product>asa_with_firepower_services:5.4.0</product>
<product>asa_with_firepower_services:5.4.0.1</product>
<product>asa_with_firepower_services:5.4.0.2</product>
<product>asa_with_firepower_services:5.4.0.3</product>
<product>asa_with_firepower_services:5.4.0.4</product>
<product>asa_with_firepower_services:5.4.0.5</product>
<product>asa_with_firepower_services:5.4.0.6</product>
<product>asa_with_firepower_services:6.0.0</product>
<product>asa_with_firepower_services:6.0.0.1</product>
<product>firesight_system_software:5.4.0</product>
<product>firesight_system_software:5.4.0.1</product>
<product>firesight_system_software:5.4.0.2</product>
<product>firesight_system_software:5.4.0.3</product>
<product>firesight_system_software:5.4.0.4</product>
<product>firesight_system_software:5.4.0.5</product>
<product>firesight_system_software:5.4.0.6</product>
<product>firesight_system_software:5.4.1</product>
<product>firesight_system_software:5.4.1.2</product>
<product>firesight_system_software:5.4.1.3</product>
<product>firesight_system_software:5.4.1.4</product>
<product>firesight_system_software:6.0.0</product>
<product>firesight_system_software:6.0.0.1</product>
<product>firesight_system_software:6.0.1</product>
</cve>
<cve id="CVE-2016-2803" level="MEDIUM">
<product>bugzilla:2.2</product>
<product>bugzilla:2.4</product>
<product>bugzilla:2.6</product>
<product>bugzilla:2.8</product>
<product>bugzilla:2.9</product>
<product>bugzilla:2.16</product>
<product>bugzilla:2.16</product>
<product>bugzilla:2.16.1</product>
<product>bugzilla:2.16.2</product>
<product>bugzilla:2.16.3</product>
<product>bugzilla:2.16.4</product>
<product>bugzilla:2.16.5</product>
<product>bugzilla:2.16.6</product>
<product>bugzilla:2.16.7</product>
<product>bugzilla:2.16.8</product>
<product>bugzilla:2.16.9</product>
<product>bugzilla:2.16.10</product>
<product>bugzilla:2.16.11</product>
<product>bugzilla:2.16_rc2</product>
<product>bugzilla:2.17</product>
<product>bugzilla:2.17.1</product>
<product>bugzilla:2.17.2</product>
<product>bugzilla:2.17.3</product>
<product>bugzilla:2.17.4</product>
<product>bugzilla:2.17.5</product>
<product>bugzilla:2.17.6</product>
<product>bugzilla:2.17.7</product>
<product>bugzilla:2.18</product>
<product>bugzilla:2.18</product>
<product>bugzilla:2.18</product>
<product>bugzilla:2.18</product>
<product>bugzilla:2.18.1</product>
<product>bugzilla:2.18.2</product>
<product>bugzilla:2.18.3</product>
<product>bugzilla:2.18.4</product>
<product>bugzilla:2.18.5</product>
<product>bugzilla:2.18.6</product>
<product>bugzilla:2.18.6%2b</product>
<product>bugzilla:2.18.7</product>
<product>bugzilla:2.18.8</product>
<product>bugzilla:2.18.9</product>
<product>bugzilla:2.19</product>
<product>bugzilla:2.19.1</product>
<product>bugzilla:2.19.2</product>
<product>bugzilla:2.19.3</product>
<product>bugzilla:2.20</product>
<product>bugzilla:2.20</product>
<product>bugzilla:2.20</product>
<product>bugzilla:2.20.1</product>
<product>bugzilla:2.20.2</product>
<product>bugzilla:2.20.3</product>
<product>bugzilla:2.20.4</product>
<product>bugzilla:2.20.5</product>
<product>bugzilla:2.20.6</product>
<product>bugzilla:2.20.7</product>
<product>bugzilla:2.21</product>
<product>bugzilla:2.21.1</product>
<product>bugzilla:2.21.2</product>
<product>bugzilla:2.21.2</product>
<product>bugzilla:2.22</product>
<product>bugzilla:2.22</product>
<product>bugzilla:2.22.1</product>
<product>bugzilla:2.22.2</product>
<product>bugzilla:2.22.3</product>
<product>bugzilla:2.22.4</product>
<product>bugzilla:2.22.5</product>
<product>bugzilla:2.22.6</product>
<product>bugzilla:2.22.7</product>
<product>bugzilla:2.23</product>
<product>bugzilla:2.23.1</product>
<product>bugzilla:2.23.2</product>
<product>bugzilla:2.23.3</product>
<product>bugzilla:2.23.4</product>
<product>bugzilla:3.0</product>
<product>bugzilla:3.0</product>
<product>bugzilla:3.0.0</product>
<product>bugzilla:3.0.1</product>
<product>bugzilla:3.0.2</product>
<product>bugzilla:3.0.3</product>
<product>bugzilla:3.0.4</product>
<product>bugzilla:3.0.5</product>
<product>bugzilla:3.0.6</product>
<product>bugzilla:3.0.7</product>
<product>bugzilla:3.0.8</product>
<product>bugzilla:3.0.9</product>
<product>bugzilla:3.0.10</product>
<product>bugzilla:3.0.11</product>
<product>bugzilla:3.0_rc1</product>
<product>bugzilla:3.1.0</product>
<product>bugzilla:3.1.1</product>
<product>bugzilla:3.1.2</product>
<product>bugzilla:3.1.3</product>
<product>bugzilla:3.1.4</product>
<product>bugzilla:3.2</product>
<product>bugzilla:3.2</product>
<product>bugzilla:3.2</product>
<product>bugzilla:3.2.1</product>
<product>bugzilla:3.2.2</product>
<product>bugzilla:3.2.3</product>
<product>bugzilla:3.2.4</product>
<product>bugzilla:3.2.5</product>
<product>bugzilla:3.2.6</product>
<product>bugzilla:3.2.7</product>
<product>bugzilla:3.2.8</product>
<product>bugzilla:3.2.9</product>
<product>bugzilla:3.2.10</product>
<product>bugzilla:3.3</product>
<product>bugzilla:3.3.1</product>
<product>bugzilla:3.3.2</product>
<product>bugzilla:3.3.3</product>
<product>bugzilla:3.3.4</product>
<product>bugzilla:3.4</product>
<product>bugzilla:3.4</product>
<product>bugzilla:3.4.1</product>
<product>bugzilla:3.4.2</product>
<product>bugzilla:3.4.3</product>
<product>bugzilla:3.4.4</product>
<product>bugzilla:3.4.5</product>
<product>bugzilla:3.4.6</product>
<product>bugzilla:3.4.7</product>
<product>bugzilla:3.4.8</product>
<product>bugzilla:3.4.9</product>
<product>bugzilla:3.4.10</product>
<product>bugzilla:3.4.11</product>
<product>bugzilla:3.4.12</product>
<product>bugzilla:3.4.13</product>
<product>bugzilla:3.4.14</product>
<product>bugzilla:3.5</product>
<product>bugzilla:3.5.1</product>
<product>bugzilla:3.5.2</product>
<product>bugzilla:3.5.3</product>
<product>bugzilla:3.6</product>
<product>bugzilla:3.6</product>
<product>bugzilla:3.6.0</product>
<product>bugzilla:3.6.1</product>
<product>bugzilla:3.6.2</product>
<product>bugzilla:3.6.3</product>
<product>bugzilla:3.6.4</product>
<product>bugzilla:3.6.5</product>
<product>bugzilla:3.6.6</product>
<product>bugzilla:3.6.7</product>
<product>bugzilla:3.6.8</product>
<product>bugzilla:3.6.9</product>
<product>bugzilla:3.6.10</product>
<product>bugzilla:3.6.11</product>
<product>bugzilla:3.6.12</product>
<product>bugzilla:3.6.13</product>
<product>bugzilla:3.7</product>
<product>bugzilla:3.7.1</product>
<product>bugzilla:3.7.2</product>
<product>bugzilla:3.7.3</product>
<product>bugzilla:4.0</product>
<product>bugzilla:4.0</product>
<product>bugzilla:4.0</product>
<product>bugzilla:4.0.1</product>
<product>bugzilla:4.0.2</product>
<product>bugzilla:4.0.3</product>
<product>bugzilla:4.0.4</product>
<product>bugzilla:4.0.5</product>
<product>bugzilla:4.0.6</product>
<product>bugzilla:4.0.7</product>
<product>bugzilla:4.0.8</product>
<product>bugzilla:4.0.9</product>
<product>bugzilla:4.0.10</product>
<product>bugzilla:4.0.11</product>
<product>bugzilla:4.0.12</product>
<product>bugzilla:4.0.13</product>
<product>bugzilla:4.0.14</product>
<product>bugzilla:4.0.15</product>
<product>bugzilla:4.0.16</product>
<product>bugzilla:4.0.17</product>
<product>bugzilla:4.0.18</product>
<product>bugzilla:4.1</product>
<product>bugzilla:4.1.1</product>
<product>bugzilla:4.1.2</product>
<product>bugzilla:4.1.3</product>
<product>bugzilla:4.2</product>
<product>bugzilla:4.2</product>
<product>bugzilla:4.2</product>
<product>bugzilla:4.2.1</product>
<product>bugzilla:4.2.2</product>
<product>bugzilla:4.2.3</product>
<product>bugzilla:4.2.4</product>
<product>bugzilla:4.2.5</product>
<product>bugzilla:4.2.6</product>
<product>bugzilla:4.2.7</product>
<product>bugzilla:4.2.8</product>
<product>bugzilla:4.2.9</product>
<product>bugzilla:4.2.10</product>
<product>bugzilla:4.2.11</product>
<product>bugzilla:4.2.12</product>
<product>bugzilla:4.2.13</product>
<product>bugzilla:4.2.14</product>
<product>bugzilla:4.2.15</product>
<product>bugzilla:4.3</product>
<product>bugzilla:4.3.1</product>
<product>bugzilla:4.3.2</product>
<product>bugzilla:4.3.3</product>
<product>bugzilla:4.4</product>
<product>bugzilla:4.4</product>
<product>bugzilla:4.4</product>
<product>bugzilla:4.4.1</product>
<product>bugzilla:4.4.2</product>
<product>bugzilla:4.4.3</product>
<product>bugzilla:4.4.4</product>
<product>bugzilla:4.4.5</product>
<product>bugzilla:4.4.6</product>
<product>bugzilla:4.4.7</product>
<product>bugzilla:4.4.8</product>
<product>bugzilla:4.4.9</product>
<product>bugzilla:4.4.10</product>
<product>bugzilla:4.4.11</product>
<product>bugzilla:4.5.1</product>
<product>bugzilla:4.5.2</product>
<product>bugzilla:4.5.3</product>
<product>bugzilla:4.5.4</product>
<product>bugzilla:4.5.5</product>
<product>bugzilla:4.5.6</product>
<product>bugzilla:5.0</product>
<product>bugzilla:5.0</product>
<product>bugzilla:5.0</product>
<product>bugzilla:5.0</product>
<product>bugzilla:5.0.1</product>
<product>bugzilla:5.0.2</product>
</cve>
<cve id="CVE-2016-5468" level="LOW">
<product>siebel_ui_framework:8.1.1</product>
<product>siebel_ui_framework:8.2.2</product>
<product>siebel_ui_framework:2014</product>
<product>siebel_ui_framework:2015</product>
<product>siebel_ui_framework:2016</product>
</cve>
<cve id="CVE-2016-5467" level="LOW">
<product>peoplesoft_enterprise_scm_eprocurement:9.1</product>
<product>peoplesoft_enterprise_scm_eprocurement:9.2</product>
</cve>
<cve id="CVE-2016-5466" level="MEDIUM">
<product>siebel_core-server_framework:8.1.1</product>
<product>siebel_core-server_framework:8.2.2</product>
<product>siebel_core-server_framework:2014</product>
<product>siebel_core-server_framework:2015</product>
<product>siebel_core-server_framework:2016</product>
</cve>
<cve id="CVE-2016-5465" level="MEDIUM">
<product>peoplesoft_enterprise_peopletools:8.53</product>
<product>peoplesoft_enterprise_peopletools:8.54</product>
<product>peoplesoft_enterprise_peopletools:8.55</product>
</cve>
<cve id="CVE-2016-5464" level="MEDIUM">
<product>siebel_ui_framework:8.1.1</product>
<product>siebel_ui_framework:8.2.2</product>
<product>siebel_ui_framework:2014</product>
<product>siebel_ui_framework:2015</product>
<product>siebel_ui_framework:2016</product>
</cve>
<cve id="CVE-2016-5463" level="MEDIUM">
<product>siebel_ui_framework:8.1.1</product>
<product>siebel_ui_framework:8.2.2</product>
<product>siebel_ui_framework:2014</product>
<product>siebel_ui_framework:2015</product>
<product>siebel_ui_framework:2016</product>
</cve>
<cve id="CVE-2016-5462" level="LOW">
<product>siebel_core-server_framework:8.1.1</product>
<product>siebel_core-server_framework:8.2.2</product>
<product>siebel_core-server_framework:2014</product>
<product>siebel_core-server_framework:2015</product>
<product>siebel_core-server_framework:2016</product>
</cve>
<cve id="CVE-2016-5461" level="LOW">
<product>siebel_core-server_framework:8.1.1</product>
<product>siebel_core-server_framework:8.2.2</product>
<product>siebel_core-server_framework:2014</product>
<product>siebel_core-server_framework:2015</product>
<product>siebel_core-server_framework:2016</product>
</cve>
<cve id="CVE-2016-5460" level="MEDIUM">
<product>siebel_core-server_framework:8.1.1</product>
<product>siebel_core-server_framework:8.2.2</product>
<product>siebel_core-server_framework:2014</product>
<product>siebel_core-server_framework:2015</product>
<product>siebel_core-server_framework:2016</product>
</cve>
<cve id="CVE-2016-10661" level="MEDIUM">
<product>phantomjs-cheniu:-</product>
</cve>
<cve id="CVE-2016-3443" level="LOW">
<product>jdk:1.6.0</product>
<product>jdk:1.7.0</product>
<product>jdk:1.8.0</product>
<product>jre:1.6.0</product>
<product>jre:1.7.0</product>
<product>jre:1.8.0</product>
</cve>
<cve id="CVE-2016-3442" level="MEDIUM">
<product>peoplesoft_enterprise_peopletools:8.53</product>
<product>peoplesoft_enterprise_peopletools:8.54</product>
<product>peoplesoft_enterprise_peopletools:8.55</product>
</cve>
<cve id="CVE-2016-6961" level="LOW">
<product>acrobat:11.0.17</product>
<product>acrobat_dc:15.006.30201</product>
<product>acrobat_dc:15.017.20053</product>
<product>acrobat_reader_dc:15.006.30201</product>
<product>acrobat_reader_dc:15.017.20053</product>
<product>reader:11.0.17</product>
</cve>
<cve id="CVE-2016-6960" level="LOW">
<product>acrobat:11.0.17</product>
<product>acrobat_dc:15.006.30201</product>
<product>acrobat_dc:15.017.20053</product>
<product>acrobat_reader_dc:15.006.30201</product>
<product>acrobat_reader_dc:15.017.20053</product>
<product>reader:11.0.17</product>
</cve>
<cve id="CVE-2016-3447" level="HIGH">
<product>applications_framework:12.1.3</product>
<product>applications_framework:12.2.3</product>
<product>applications_framework:12.2.4</product>
<product>applications_framework:12.2.5</product>
</cve>
<cve id="CVE-2016-3446" level="LOW">
<product>business_intelligence:11.1.1.7.0</product>
<product>business_intelligence:11.1.1.9.0</product>
</cve>
<cve id="CVE-2016-6965" level="LOW">
<product>acrobat:11.0.17</product>
<product>acrobat_dc:15.006.30201</product>
<product>acrobat_dc:15.017.20053</product>
<product>acrobat_reader_dc:15.006.30201</product>
<product>acrobat_reader_dc:15.017.20053</product>
<product>reader:11.0.17</product>
</cve>
<cve id="CVE-2016-3444" level="LOW">
<product>retail_integration_bus:13.0</product>
<product>retail_integration_bus:13.1</product>
<product>retail_integration_bus:13.2</product>
<product>retail_integration_bus:14.0</product>
<product>retail_integration_bus:14.1</product>
<product>retail_integration_bus:15.0</product>
</cve>
<cve id="CVE-2016-3199" level="MEDIUM">
<product>edge:-</product>
</cve>
<cve id="CVE-2016-3198" level="MEDIUM">
<product>edge:-</product>
</cve>
<cve id="CVE-2016-6969" level="LOW">
<product>acrobat:11.0.17</product>
<product>acrobat_dc:15.006.30201</product>
<product>acrobat_dc:15.017.20053</product>
<product>acrobat_reader_dc:15.006.30201</product>
<product>acrobat_reader_dc:15.017.20053</product>
<product>reader:11.0.17</product>
</cve>
<cve id="CVE-2016-6968" level="LOW">
<product>acrobat:11.0.17</product>
<product>acrobat_dc:15.006.30201</product>
<product>acrobat_dc:15.017.20053</product>
<product>acrobat_reader_dc:15.006.30201</product>
<product>acrobat_reader_dc:15.017.20053</product>
<product>reader:11.0.17</product>
</cve>
<cve id="CVE-2016-7568" level="LOW">
<product>libgd:2.2.3</product>
</cve>
<cve id="CVE-2016-7569" level="MEDIUM">
<product>docker2aci:0.12.3</product>
</cve>
<cve id="CVE-2016-7564" level="LOW">
<product>mujs:-</product>
</cve>
<cve id="CVE-2016-7565" level="LOW">
<product>exponent_cms:2.3.9</product>
</cve>
<cve id="CVE-2016-7567" level="LOW">
<product>openslp:2.0</product>
</cve>
<cve id="CVE-2016-7560" level="LOW">
<product>fortiwlc:6.1-2-29</product>
<product>fortiwlc:7.0-9-1</product>
<product>fortiwlc:7.0-10-0</product>
<product>fortiwlc:8.0-5-0</product>
<product>fortiwlc:8.1-2-0</product>
<product>fortiwlc:8.2-4-0</product>
</cve>
<cve id="CVE-2016-7561" level="LOW">
<product>fortiwlc:6.1-2-29</product>
<product>fortiwlc:7.0-9-1</product>
<product>fortiwlc:7.0-10-0</product>
<product>fortiwlc:8.0-5-0</product>
<product>fortiwlc:8.1-2-0</product>
<product>fortiwlc:8.2-4-0</product>
</cve>
<cve id="CVE-2016-7563" level="LOW">
<product>mujs:-</product>
</cve>
<cve id="CVE-2016-8669" level="MEDIUM">
<product>qemu:-</product>
</cve>
<cve id="CVE-2016-3999" level="MEDIUM">
<product>zimbra_collaboration_suite:8.6.0</product>
</cve>
<cve id="CVE-2016-3998" level="HIGH">
<product>altavault:4.1</product>
</cve>
<cve id="CVE-2016-6619" level="LOW">
<product>phpmyadmin:4.0.0</product>
<product>phpmyadmin:4.0.1</product>
<product>phpmyadmin:4.0.2</product>
<product>phpmyadmin:4.0.3</product>
<product>phpmyadmin:4.0.4</product>
<product>phpmyadmin:4.0.4.1</product>
<product>phpmyadmin:4.0.4.2</product>
<product>phpmyadmin:4.0.5</product>
<product>phpmyadmin:4.0.6</product>
<product>phpmyadmin:4.0.7</product>
<product>phpmyadmin:4.0.8</product>
<product>phpmyadmin:4.0.9</product>
<product>phpmyadmin:4.0.10</product>
<product>phpmyadmin:4.0.10.1</product>
<product>phpmyadmin:4.0.10.2</product>
<product>phpmyadmin:4.0.10.3</product>
<product>phpmyadmin:4.0.10.4</product>
<product>phpmyadmin:4.0.10.5</product>
<product>phpmyadmin:4.0.10.6</product>
<product>phpmyadmin:4.0.10.7</product>
<product>phpmyadmin:4.0.10.8</product>
<product>phpmyadmin:4.0.10.9</product>
<product>phpmyadmin:4.0.10.10</product>
<product>phpmyadmin:4.0.10.11</product>
<product>phpmyadmin:4.0.10.12</product>
<product>phpmyadmin:4.0.10.13</product>
<product>phpmyadmin:4.0.10.14</product>
<product>phpmyadmin:4.0.10.15</product>
<product>phpmyadmin:4.0.10.16</product>
<product>phpmyadmin:4.4.0</product>
<product>phpmyadmin:4.4.1</product>
<product>phpmyadmin:4.4.1.1</product>
<product>phpmyadmin:4.4.2</product>
<product>phpmyadmin:4.4.3</product>
<product>phpmyadmin:4.4.4</product>
<product>phpmyadmin:4.4.5</product>
<product>phpmyadmin:4.4.6</product>
<product>phpmyadmin:4.4.6.1</product>
<product>phpmyadmin:4.4.7</product>
<product>phpmyadmin:4.4.8</product>
<product>phpmyadmin:4.4.9</product>
<product>phpmyadmin:4.4.10</product>
<product>phpmyadmin:4.4.11</product>
<product>phpmyadmin:4.4.12</product>
<product>phpmyadmin:4.4.13</product>
<product>phpmyadmin:4.4.13.1</product>
<product>phpmyadmin:4.4.14</product>
<product>phpmyadmin:4.4.14.1</product>
<product>phpmyadmin:4.4.15</product>
<product>phpmyadmin:4.4.15.1</product>
<product>phpmyadmin:4.4.15.2</product>
<product>phpmyadmin:4.4.15.3</product>
<product>phpmyadmin:4.4.15.4</product>
<product>phpmyadmin:4.4.15.5</product>
<product>phpmyadmin:4.4.15.6</product>
<product>phpmyadmin:4.4.15.7</product>
<product>phpmyadmin:4.6.0</product>
<product>phpmyadmin:4.6.1</product>
<product>phpmyadmin:4.6.2</product>
<product>phpmyadmin:4.6.3</product>
</cve>
<cve id="CVE-2016-6618" level="LOW">
<product>phpmyadmin:4.0.0</product>
<product>phpmyadmin:4.0.1</product>
<product>phpmyadmin:4.0.2</product>
<product>phpmyadmin:4.0.3</product>
<product>phpmyadmin:4.0.4</product>
<product>phpmyadmin:4.0.4.1</product>
<product>phpmyadmin:4.0.4.2</product>
<product>phpmyadmin:4.0.5</product>
<product>phpmyadmin:4.0.6</product>
<product>phpmyadmin:4.0.7</product>
<product>phpmyadmin:4.0.8</product>
<product>phpmyadmin:4.0.9</product>
<product>phpmyadmin:4.0.10</product>
<product>phpmyadmin:4.0.10.1</product>
<product>phpmyadmin:4.0.10.2</product>
<product>phpmyadmin:4.0.10.3</product>
<product>phpmyadmin:4.0.10.4</product>
<product>phpmyadmin:4.0.10.5</product>
<product>phpmyadmin:4.0.10.6</product>
<product>phpmyadmin:4.0.10.7</product>
<product>phpmyadmin:4.0.10.8</product>
<product>phpmyadmin:4.0.10.9</product>
<product>phpmyadmin:4.0.10.10</product>
<product>phpmyadmin:4.0.10.11</product>
<product>phpmyadmin:4.0.10.12</product>
<product>phpmyadmin:4.0.10.13</product>
<product>phpmyadmin:4.0.10.14</product>
<product>phpmyadmin:4.0.10.15</product>
<product>phpmyadmin:4.0.10.16</product>
<product>phpmyadmin:4.4.0</product>
<product>phpmyadmin:4.4.1</product>
<product>phpmyadmin:4.4.1.1</product>
<product>phpmyadmin:4.4.2</product>
<product>phpmyadmin:4.4.3</product>
<product>phpmyadmin:4.4.4</product>
<product>phpmyadmin:4.4.5</product>
<product>phpmyadmin:4.4.6</product>
<product>phpmyadmin:4.4.6.1</product>
<product>phpmyadmin:4.4.7</product>
<product>phpmyadmin:4.4.8</product>
<product>phpmyadmin:4.4.9</product>
<product>phpmyadmin:4.4.10</product>
<product>phpmyadmin:4.4.11</product>
<product>phpmyadmin:4.4.12</product>
<product>phpmyadmin:4.4.13</product>
<product>phpmyadmin:4.4.13.1</product>
<product>phpmyadmin:4.4.14</product>
<product>phpmyadmin:4.4.14.1</product>
<product>phpmyadmin:4.4.15</product>
<product>phpmyadmin:4.4.15.1</product>
<product>phpmyadmin:4.4.15.2</product>
<product>phpmyadmin:4.4.15.3</product>
<product>phpmyadmin:4.4.15.4</product>
<product>phpmyadmin:4.4.15.5</product>
<product>phpmyadmin:4.4.15.6</product>
<product>phpmyadmin:4.4.15.7</product>
<product>phpmyadmin:4.6.0</product>
<product>phpmyadmin:4.6.1</product>
<product>phpmyadmin:4.6.2</product>
<product>phpmyadmin:4.6.3</product>
</cve>
<cve id="CVE-2016-3991" level="MEDIUM">
<product>libtiff:4.0.6</product>
<product>vm_server:3.3</product>
<product>vm_server:3.4</product>
</cve>
<cve id="CVE-2016-3990" level="MEDIUM">
<product>libtiff:4.0.6</product>
<product>vm_server:3.3</product>
<product>vm_server:3.4</product>
</cve>
<cve id="CVE-2016-6617" level="MEDIUM">
<product>phpmyadmin:4.6.0</product>
<product>phpmyadmin:4.6.1</product>
<product>phpmyadmin:4.6.2</product>
<product>phpmyadmin:4.6.3</product>
</cve>
<cve id="CVE-2016-6616" level="MEDIUM">
<product>phpmyadmin:4.4.0</product>
<product>phpmyadmin:4.4.1</product>
<product>phpmyadmin:4.4.1.1</product>
<product>phpmyadmin:4.4.2</product>
<product>phpmyadmin:4.4.3</product>
<product>phpmyadmin:4.4.4</product>
<product>phpmyadmin:4.4.5</product>
<product>phpmyadmin:4.4.6</product>
<product>phpmyadmin:4.4.6.1</product>
<product>phpmyadmin:4.4.7</product>
<product>phpmyadmin:4.4.8</product>
<product>phpmyadmin:4.4.9</product>
<product>phpmyadmin:4.4.10</product>
<product>phpmyadmin:4.4.11</product>
<product>phpmyadmin:4.4.12</product>
<product>phpmyadmin:4.4.13</product>
<product>phpmyadmin:4.4.13.1</product>
<product>phpmyadmin:4.4.14.1</product>
<product>phpmyadmin:4.4.15</product>
<product>phpmyadmin:4.4.15.1</product>
<product>phpmyadmin:4.4.15.2</product>
<product>phpmyadmin:4.4.15.3</product>
<product>phpmyadmin:4.4.15.4</product>
<product>phpmyadmin:4.4.15.5</product>
<product>phpmyadmin:4.4.15.6</product>
<product>phpmyadmin:4.4.15.7</product>
<product>phpmyadmin:4.6.0</product>
<product>phpmyadmin:4.6.0</product>
<product>phpmyadmin:4.6.0</product>
<product>phpmyadmin:4.6.0</product>
<product>phpmyadmin:4.6.1</product>
<product>phpmyadmin:4.6.2</product>
<product>phpmyadmin:4.6.3</product>
</cve>
<cve id="CVE-2016-6611" level="HIGH">
<product>phpmyadmin:4.0.0</product>
<product>phpmyadmin:4.0.0</product>
<product>phpmyadmin:4.0.0</product>
<product>phpmyadmin:4.0.1</product>
<product>phpmyadmin:4.0.2</product>
<product>phpmyadmin:4.0.3</product>
<product>phpmyadmin:4.0.4</product>
<product>phpmyadmin:4.0.4.1</product>
<product>phpmyadmin:4.0.4.2</product>
<product>phpmyadmin:4.0.5</product>
<product>phpmyadmin:4.0.6</product>
<product>phpmyadmin:4.0.7</product>
<product>phpmyadmin:4.0.8</product>
<product>phpmyadmin:4.0.9</product>
<product>phpmyadmin:4.0.10</product>
<product>phpmyadmin:4.0.10.1</product>
<product>phpmyadmin:4.0.10.2</product>
<product>phpmyadmin:4.0.10.3</product>
<product>phpmyadmin:4.0.10.4</product>
<product>phpmyadmin:4.0.10.5</product>
<product>phpmyadmin:4.0.10.6</product>
<product>phpmyadmin:4.0.10.7</product>
<product>phpmyadmin:4.0.10.8</product>
<product>phpmyadmin:4.0.10.9</product>
<product>phpmyadmin:4.0.10.10</product>
<product>phpmyadmin:4.0.10.11</product>
<product>phpmyadmin:4.0.10.12</product>
<product>phpmyadmin:4.0.10.13</product>
<product>phpmyadmin:4.0.10.14</product>
<product>phpmyadmin:4.0.10.15</product>
<product>phpmyadmin:4.0.10.16</product>
<product>phpmyadmin:4.4.0</product>
<product>phpmyadmin:4.4.1</product>
<product>phpmyadmin:4.4.1.1</product>
<product>phpmyadmin:4.4.2</product>
<product>phpmyadmin:4.4.3</product>
<product>phpmyadmin:4.4.4</product>
<product>phpmyadmin:4.4.5</product>
<product>phpmyadmin:4.4.6</product>
<product>phpmyadmin:4.4.6.1</product>
<product>phpmyadmin:4.4.7</product>
<product>phpmyadmin:4.4.8</product>
<product>phpmyadmin:4.4.9</product>
<product>phpmyadmin:4.4.10</product>
<product>phpmyadmin:4.4.11</product>
<product>phpmyadmin:4.4.12</product>
<product>phpmyadmin:4.4.13</product>
<product>phpmyadmin:4.4.13.1</product>
<product>phpmyadmin:4.4.14.1</product>
<product>phpmyadmin:4.4.15</product>
<product>phpmyadmin:4.4.15.1</product>
<product>phpmyadmin:4.4.15.2</product>
<product>phpmyadmin:4.4.15.3</product>
<product>phpmyadmin:4.4.15.4</product>
<product>phpmyadmin:4.4.15.5</product>
<product>phpmyadmin:4.4.15.6</product>
<product>phpmyadmin:4.4.15.7</product>
<product>phpmyadmin:4.6.0</product>
<product>phpmyadmin:4.6.0</product>
<product>phpmyadmin:4.6.0</product>
<product>phpmyadmin:4.6.0</product>
<product>phpmyadmin:4.6.1</product>
<product>phpmyadmin:4.6.2</product>
<product>phpmyadmin:4.6.3</product>
</cve>
<cve id="CVE-2016-6610" level="LOW">
<product>phpmyadmin:4.0.0</product>
<product>phpmyadmin:4.0.1</product>
<product>phpmyadmin:4.0.2</product>
<product>phpmyadmin:4.0.3</product>
<product>phpmyadmin:4.0.4</product>
<product>phpmyadmin:4.0.4.1</product>
<product>phpmyadmin:4.0.4.2</product>
<product>phpmyadmin:4.0.5</product>
<product>phpmyadmin:4.0.6</product>
<product>phpmyadmin:4.0.7</product>
<product>phpmyadmin:4.0.8</product>
<product>phpmyadmin:4.0.9</product>
<product>phpmyadmin:4.0.10</product>
<product>phpmyadmin:4.0.10.1</product>
<product>phpmyadmin:4.0.10.2</product>
<product>phpmyadmin:4.0.10.3</product>
<product>phpmyadmin:4.0.10.4</product>
<product>phpmyadmin:4.0.10.5</product>
<product>phpmyadmin:4.0.10.6</product>
<product>phpmyadmin:4.0.10.7</product>
<product>phpmyadmin:4.0.10.8</product>
<product>phpmyadmin:4.0.10.9</product>
<product>phpmyadmin:4.0.10.10</product>
<product>phpmyadmin:4.0.10.11</product>
<product>phpmyadmin:4.0.10.12</product>
<product>phpmyadmin:4.0.10.13</product>
<product>phpmyadmin:4.0.10.14</product>
<product>phpmyadmin:4.0.10.15</product>
<product>phpmyadmin:4.0.10.16</product>
<product>phpmyadmin:4.4.0</product>
<product>phpmyadmin:4.4.1</product>
<product>phpmyadmin:4.4.1.1</product>
<product>phpmyadmin:4.4.2</product>
<product>phpmyadmin:4.4.3</product>
<product>phpmyadmin:4.4.4</product>
<product>phpmyadmin:4.4.5</product>
<product>phpmyadmin:4.4.6</product>
<product>phpmyadmin:4.4.6.1</product>
<product>phpmyadmin:4.4.7</product>
<product>phpmyadmin:4.4.8</product>
<product>phpmyadmin:4.4.9</product>
<product>phpmyadmin:4.4.10</product>
<product>phpmyadmin:4.4.11</product>
<product>phpmyadmin:4.4.12</product>
<product>phpmyadmin:4.4.13</product>
<product>phpmyadmin:4.4.13.1</product>
<product>phpmyadmin:4.4.14</product>
<product>phpmyadmin:4.4.14.1</product>
<product>phpmyadmin:4.4.15</product>
<product>phpmyadmin:4.4.15.1</product>
<product>phpmyadmin:4.4.15.2</product>
<product>phpmyadmin:4.4.15.3</product>
<product>phpmyadmin:4.4.15.4</product>
<product>phpmyadmin:4.4.15.5</product>
<product>phpmyadmin:4.4.15.6</product>
<product>phpmyadmin:4.4.15.7</product>
<product>phpmyadmin:4.6.0</product>
<product>phpmyadmin:4.6.1</product>
<product>phpmyadmin:4.6.2</product>
<product>phpmyadmin:4.6.3</product>
</cve>
<cve id="CVE-2016-3997" level="MEDIUM">
<product>clustered_data_ontap:8.3.1</product>
</cve>
<cve id="CVE-2016-3996" level="MEDIUM">
<product>knox:1.0</product>
<product>knox:2.3.0</product>
</cve>
<cve id="CVE-2016-4378" level="LOW">
<product>xp7_command_view:8.4.0</product>
<product>xp_9000_command_view:8.4.0</product>
</cve>
<cve id="CVE-2016-8792" level="HIGH">
<product>mate_8_firmware:-</product>
<product>mate_s_firmware:-</product>
<product>p8_firmware:-</product>
</cve>
<cve id="CVE-2016-1256" level="LOW">
<product>junos:12.1x44</product>
<product>junos:12.1x44</product>
<product>junos:12.1x44</product>
<product>junos:12.1x44</product>
<product>junos:12.1x44</product>
<product>junos:12.1x44</product>
<product>junos:12.1x44</product>
<product>junos:12.1x44</product>
<product>junos:12.1x44</product>
<product>junos:12.1x44</product>
<product>junos:12.1x46</product>
<product>junos:12.1x46</product>
<product>junos:12.1x46</product>
<product>junos:12.1x46</product>
<product>junos:12.1x46</product>
<product>junos:12.1x46</product>
<product>junos:12.1x46</product>
<product>junos:12.1x47</product>
<product>junos:12.1x47</product>
<product>junos:12.1x47</product>
<product>junos:12.1x47</product>
<product>junos:12.3</product>
<product>junos:12.3</product>
<product>junos:12.3</product>
<product>junos:12.3</product>
<product>junos:12.3</product>
<product>junos:12.3</product>
<product>junos:12.3</product>
<product>junos:12.3</product>
<product>junos:12.3</product>
<product>junos:12.3</product>
<product>junos:12.3x48</product>
<product>junos:12.3x48</product>
<product>junos:13.2</product>
<product>junos:13.2</product>
<product>junos:13.2</product>
<product>junos:13.2</product>
<product>junos:13.2</product>
<product>junos:13.2</product>
<product>junos:13.2x51</product>
<product>junos:13.2x51</product>
<product>junos:13.2x51</product>
<product>junos:13.2x51</product>
<product>junos:13.2x51</product>
<product>junos:13.2x51</product>
<product>junos:13.2x51</product>
<product>junos:13.3</product>
<product>junos:13.3</product>
<product>junos:13.3</product>
<product>junos:13.3</product>
<product>junos:13.3</product>
<product>junos:13.3</product>
<product>junos:13.3</product>
<product>junos:13.3</product>
<product>junos:14.1</product>
<product>junos:14.1</product>
<product>junos:14.1</product>
<product>junos:14.1</product>
<product>junos:14.1</product>
<product>junos:14.1x53</product>
<product>junos:14.1x53</product>
<product>junos:14.1x53</product>
<product>junos:14.1x55</product>
<product>junos:14.2</product>
<product>junos:14.2</product>
<product>junos:14.2</product>
<product>junos:15.1</product>
</cve>
<cve id="CVE-2016-4377" level="HIGH">
<product>converged_infrastructure_solution_sizer_suite:2.13.0</product>
<product>insight_management_sizer:16.12.0</product>
<product>power_advisor:7.8.1</product>
<product>sap_sizing_tool:16.12.0</product>
<product>sizer_for_converged_systems_virtualization:16.7.0</product>
<product>sizer_for_microsoft_exchange_server_2010:16.12.0</product>
<product>sizer_for_microsoft_exchange_server_2013:16.12.0</product>
<product>sizer_for_microsoft_exchange_server_2016:16.12.0</product>
<product>sizer_for_microsoft_lync_server_2013:16.12.0</product>
<product>sizer_for_microsoft_sharepoint_2010:16.11.0</product>
<product>sizer_for_microsoft_sharepoint_2013:16.13.0</product>
<product>sizer_for_microsoft_skype_for_business_server_2015:16.5.0</product>
<product>sizing_tool_for_sap_business_suite_powered_by_hana:16.11.0</product>
<product>storage_sizing_tool:13.0</product>
<product>synergy_planning_tool:3.2</product>
</cve>
<cve id="CVE-2016-1251" level="MEDIUM">
<product>dbd-mysql:3.0000_0</product>
<product>dbd-mysql:3.0001_1</product>
<product>dbd-mysql:3.0001_2</product>
<product>dbd-mysql:3.0001_3</product>
<product>dbd-mysql:3.0002_1</product>
<product>dbd-mysql:3.0002_2</product>
<product>dbd-mysql:3.0002_3</product>
<product>dbd-mysql:3.0002_4</product>
<product>dbd-mysql:3.0002_5</product>
<product>dbd-mysql:3.0003_1</product>
<product>dbd-mysql:3.0004_1</product>
<product>dbd-mysql:3.0005</product>
<product>dbd-mysql:3.0005_1</product>
<product>dbd-mysql:3.0007_2</product>
<product>dbd-mysql:3.0008_1</product>
<product>dbd-mysql:3.0009_1</product>
<product>dbd-mysql:4.00</product>
<product>dbd-mysql:4.001</product>
<product>dbd-mysql:4.002</product>
<product>dbd-mysql:4.003</product>
<product>dbd-mysql:4.004</product>
<product>dbd-mysql:4.005</product>
<product>dbd-mysql:4.006</product>
<product>dbd-mysql:4.007</product>
<product>dbd-mysql:4.008</product>
<product>dbd-mysql:4.009</product>
<product>dbd-mysql:4.010</product>
<product>dbd-mysql:4.011</product>
<product>dbd-mysql:4.012</product>
<product>dbd-mysql:4.013</product>
<product>dbd-mysql:4.014</product>
<product>dbd-mysql:4.015</product>
<product>dbd-mysql:4.016</product>
<product>dbd-mysql:4.017</product>
<product>dbd-mysql:4.018</product>
<product>dbd-mysql:4.019</product>
<product>dbd-mysql:4.020</product>
<product>dbd-mysql:4.021</product>
<product>dbd-mysql:4.022</product>
<product>dbd-mysql:4.023</product>
<product>dbd-mysql:4.024</product>
<product>dbd-mysql:4.025</product>
<product>dbd-mysql:4.026</product>
<product>dbd-mysql:4.027</product>
<product>dbd-mysql:4.028</product>
<product>dbd-mysql:4.029</product>
<product>dbd-mysql:4.030_01</product>
<product>dbd-mysql:4.030_02</product>
<product>dbd-mysql:4.031</product>
<product>dbd-mysql:4.032</product>
<product>dbd-mysql:4.032_01</product>
<product>dbd-mysql:4.032_02</product>
<product>dbd-mysql:4.032_03</product>
<product>dbd-mysql:4.033</product>
<product>dbd-mysql:4.033_01</product>
<product>dbd-mysql:4.033_02</product>
<product>dbd-mysql:4.033_03</product>
<product>dbd-mysql:4.034</product>
<product>dbd-mysql:4.035</product>
<product>dbd-mysql:4.035_01</product>
<product>dbd-mysql:4.035_02</product>
<product>dbd-mysql:4.035_03</product>
<product>dbd-mysql:4.036</product>
<product>dbd-mysql:4.037</product>
<product>dbd-mysql:4.037_01</product>
<product>dbd-mysql:4.038</product>
<product>dbd-mysql:4.038_01</product>
<product>dbd-mysql:4.039</product>
<product>dbd-mysql:4.040</product>
</cve>
<cve id="CVE-2016-4372" level="LOW">
<product>intelligent_management_center_application_performance_manager:7.2</product>
<product>your_sha256_hashem:7.2</product>
<product>intelligent_management_center_endpoint_admission_defense:7.2</product>
<product>intelligent_management_center_network_traffic_analyzer:7.2</product>
<product>intelligent_management_center_platform:7.2</product>
<product>intelligent_management_center_user_access_management:7.2</product>
</cve>
<cve id="CVE-2016-0300" level="LOW">
<product>tririga_application_platform:3.3.0.0</product>
<product>tririga_application_platform:3.3.0.1</product>
<product>tririga_application_platform:3.3.0.2</product>
<product>tririga_application_platform:3.3.1.0</product>
<product>tririga_application_platform:3.3.1.1</product>
<product>tririga_application_platform:3.3.1.2</product>
<product>tririga_application_platform:3.3.1.3</product>
<product>tririga_application_platform:3.3.2.0</product>
<product>tririga_application_platform:3.3.2.1</product>
<product>tririga_application_platform:3.3.2.3</product>
<product>tririga_application_platform:3.3.2.4</product>
<product>tririga_application_platform:3.3.2.5</product>
<product>tririga_application_platform:3.4.0.0</product>
<product>tririga_application_platform:3.4.1.1</product>
<product>tririga_application_platform:3.4.1.2</product>
<product>tririga_application_platform:3.4.1.3</product>
<product>tririga_application_platform:3.4.2.0</product>
<product>tririga_application_platform:3.4.2.1</product>
<product>tririga_application_platform:3.4.2.2</product>
<product>tririga_application_platform:3.5.0.0</product>
</cve>
<cve id="CVE-2016-3429" level="MEDIUM">
<product>retail_xstore_point_of_service:5.0</product>
<product>retail_xstore_point_of_service:5.5</product>
<product>retail_xstore_point_of_service:6.0</product>
<product>retail_xstore_point_of_service:6.5</product>
<product>retail_xstore_point_of_service:7.0</product>
<product>retail_xstore_point_of_service:7.1</product>
</cve>
<cve id="CVE-2016-3428" level="HIGH">
<product>agile_engineering_data_management:6.1.3.0</product>
<product>agile_engineering_data_management:6.2.0.0</product>
</cve>
<cve id="CVE-2016-5124" level="MEDIUM">
<product>open-xchange_appsuite:7.8.1</product>
</cve>
<cve id="CVE-2016-0756" level="LOW">
<product>prosody:0.9.9</product>
</cve>
<cve id="CVE-2016-0757" level="LOW">
<product>image_registry_and_delivery_service_%28glance%29:11.0.0</product>
<product>image_registry_and_delivery_service_%28glance%29:11.0.1</product>
<product>image_registry_and_delivery_service_%28glance%29:2015.1.2</product>
</cve>
<cve id="CVE-2016-0754" level="LOW">
<product>curl:7.46.0</product>
</cve>
<cve id="CVE-2016-0752" level="LOW">
<product>ruby_on_rails:3.2.22</product>
<product>ruby_on_rails:4.0.0</product>
<product>ruby_on_rails:4.0.0</product>
<product>ruby_on_rails:4.0.0</product>
<product>ruby_on_rails:4.0.0</product>
<product>ruby_on_rails:4.0.1</product>
<product>ruby_on_rails:4.0.1</product>
<product>ruby_on_rails:4.0.1</product>
<product>ruby_on_rails:4.0.1</product>
<product>ruby_on_rails:4.0.1</product>
<product>ruby_on_rails:4.0.2</product>
<product>ruby_on_rails:4.0.3</product>
<product>ruby_on_rails:4.0.4</product>
<product>ruby_on_rails:4.0.5</product>
<product>ruby_on_rails:4.0.6</product>
<product>ruby_on_rails:4.0.6</product>
<product>ruby_on_rails:4.0.6</product>
<product>ruby_on_rails:4.0.6</product>
<product>ruby_on_rails:4.0.7</product>
<product>ruby_on_rails:4.0.8</product>
<product>ruby_on_rails:4.0.9</product>
<product>ruby_on_rails:4.0.10</product>
<product>ruby_on_rails:4.1.0</product>
<product>ruby_on_rails:4.1.0</product>
<product>ruby_on_rails:4.1.1</product>
<product>ruby_on_rails:4.1.2</product>
<product>ruby_on_rails:4.1.2</product>
<product>ruby_on_rails:4.1.2</product>
<product>ruby_on_rails:4.1.2</product>
<product>ruby_on_rails:4.1.3</product>
<product>ruby_on_rails:4.1.4</product>
<product>ruby_on_rails:4.1.5</product>
<product>ruby_on_rails:4.1.6</product>
<product>ruby_on_rails:4.1.7</product>
<product>ruby_on_rails:4.1.8</product>
<product>ruby_on_rails:4.1.9</product>
<product>ruby_on_rails:4.1.10</product>
<product>ruby_on_rails:4.1.11</product>
<product>ruby_on_rails:4.1.12</product>
<product>ruby_on_rails:4.1.13</product>
<product>ruby_on_rails:4.1.14</product>
<product>ruby_on_rails:4.2.0</product>
<product>ruby_on_rails:4.2.1</product>
<product>ruby_on_rails:4.2.2</product>
<product>ruby_on_rails:4.2.3</product>
<product>ruby_on_rails:4.2.3</product>
<product>ruby_on_rails:4.2.4</product>
<product>ruby_on_rails:4.2.4</product>
<product>ruby_on_rails:4.2.5</product>
<product>ruby_on_rails:4.2.5</product>
<product>ruby_on_rails:4.2.5</product>
<product>ruby_on_rails:5.0.0</product>
</cve>
<cve id="CVE-2016-0753" level="LOW">
<product>ruby_on_rails:4.1.0</product>
<product>ruby_on_rails:4.1.0</product>
<product>ruby_on_rails:4.1.1</product>
<product>ruby_on_rails:4.1.2</product>
<product>ruby_on_rails:4.1.2</product>
<product>ruby_on_rails:4.1.2</product>
<product>ruby_on_rails:4.1.2</product>
<product>ruby_on_rails:4.1.3</product>
<product>ruby_on_rails:4.1.4</product>
<product>ruby_on_rails:4.1.5</product>
<product>ruby_on_rails:4.1.6</product>
<product>ruby_on_rails:4.1.7</product>
<product>ruby_on_rails:4.1.8</product>
<product>ruby_on_rails:4.1.9</product>
<product>ruby_on_rails:4.1.10</product>
<product>ruby_on_rails:4.1.11</product>
<product>ruby_on_rails:4.1.12</product>
<product>ruby_on_rails:4.1.13</product>
<product>ruby_on_rails:4.1.14</product>
<product>ruby_on_rails:4.2.0</product>
<product>ruby_on_rails:4.2.0</product>
<product>ruby_on_rails:4.2.0</product>
<product>ruby_on_rails:4.2.0</product>
<product>ruby_on_rails:4.2.0</product>
<product>ruby_on_rails:4.2.0</product>
<product>ruby_on_rails:4.2.0</product>
<product>ruby_on_rails:4.2.1</product>
<product>ruby_on_rails:4.2.1</product>
<product>ruby_on_rails:4.2.1</product>
<product>ruby_on_rails:4.2.1</product>
<product>ruby_on_rails:4.2.1</product>
<product>ruby_on_rails:4.2.2</product>
<product>ruby_on_rails:4.2.3</product>
<product>ruby_on_rails:4.2.3</product>
<product>ruby_on_rails:4.2.4</product>
<product>ruby_on_rails:4.2.4</product>
<product>ruby_on_rails:4.2.5</product>
<product>ruby_on_rails:4.2.5</product>
<product>ruby_on_rails:4.2.5</product>
<product>ruby_on_rails:5.0.0</product>
</cve>
<cve id="CVE-2016-0751" level="LOW">
<product>ruby_on_rails:3.2.22</product>
<product>ruby_on_rails:4.0.0</product>
<product>ruby_on_rails:4.0.0</product>
<product>ruby_on_rails:4.0.0</product>
<product>ruby_on_rails:4.0.0</product>
<product>ruby_on_rails:4.0.1</product>
<product>ruby_on_rails:4.0.1</product>
<product>ruby_on_rails:4.0.1</product>
<product>ruby_on_rails:4.0.1</product>
<product>ruby_on_rails:4.0.1</product>
<product>ruby_on_rails:4.0.2</product>
<product>ruby_on_rails:4.0.3</product>
<product>ruby_on_rails:4.0.4</product>
<product>ruby_on_rails:4.0.5</product>
<product>ruby_on_rails:4.0.6</product>
<product>ruby_on_rails:4.0.6</product>
<product>ruby_on_rails:4.0.6</product>
<product>ruby_on_rails:4.0.6</product>
<product>ruby_on_rails:4.0.7</product>
<product>ruby_on_rails:4.0.8</product>
<product>ruby_on_rails:4.0.9</product>
<product>ruby_on_rails:4.0.10</product>
<product>ruby_on_rails:4.0.10</product>
<product>ruby_on_rails:4.0.10</product>
<product>ruby_on_rails:4.0.11</product>
<product>ruby_on_rails:4.0.11.1</product>
<product>ruby_on_rails:4.0.12</product>
<product>ruby_on_rails:4.0.13</product>
<product>ruby_on_rails:4.0.13</product>
<product>ruby_on_rails:4.1.0</product>
<product>ruby_on_rails:4.1.0</product>
<product>ruby_on_rails:4.1.1</product>
<product>ruby_on_rails:4.1.2</product>
<product>ruby_on_rails:4.1.2</product>
<product>ruby_on_rails:4.1.2</product>
<product>ruby_on_rails:4.1.2</product>
<product>ruby_on_rails:4.1.3</product>
<product>ruby_on_rails:4.1.4</product>
<product>ruby_on_rails:4.1.5</product>
<product>ruby_on_rails:4.1.6</product>
<product>ruby_on_rails:4.1.7</product>
<product>ruby_on_rails:4.1.8</product>
<product>ruby_on_rails:4.1.9</product>
<product>ruby_on_rails:4.1.10</product>
<product>ruby_on_rails:4.1.11</product>
<product>ruby_on_rails:4.1.12</product>
<product>ruby_on_rails:4.1.13</product>
<product>ruby_on_rails:4.2.0</product>
<product>ruby_on_rails:4.2.0</product>
<product>ruby_on_rails:4.2.0</product>
<product>ruby_on_rails:4.2.0</product>
<product>ruby_on_rails:4.2.0</product>
<product>ruby_on_rails:4.2.0</product>
<product>ruby_on_rails:4.2.0</product>
<product>ruby_on_rails:4.2.1</product>
<product>ruby_on_rails:4.2.1</product>
<product>ruby_on_rails:4.2.1</product>
<product>ruby_on_rails:4.2.1</product>
<product>ruby_on_rails:4.2.1</product>
<product>ruby_on_rails:4.2.2</product>
<product>ruby_on_rails:4.2.3</product>
<product>ruby_on_rails:4.2.3</product>
<product>ruby_on_rails:4.2.4</product>
<product>ruby_on_rails:4.2.4</product>
<product>ruby_on_rails:4.2.5</product>
<product>ruby_on_rails:4.2.5</product>
<product>ruby_on_rails:4.2.5</product>
<product>ruby_on_rails:5.0.0</product>
</cve>
<cve id="CVE-2016-9348" level="LOW">
<product>nport_5600-8-dtl_series_firmware:2.3</product>
<product>nport_5100_series_firmware:2.5</product>
<product>nport_5100_series_firmware:3.5</product>
<product>nport_5100a_series_firmware:1.2</product>
<product>nport_5200_series_firmware:2.7</product>
<product>nport_5200a_series_firmware:1.2</product>
<product>nport_5400_series_firmware:3.10</product>
<product>nport_5600_series_firmware:3.6</product>
<product>nport_5x50a1-m12_series_firmware:1.1</product>
<product>nport_6100_series_firmware:1.13</product>
<product>nport_p5150a_series_firmware:1.2</product>
</cve>
<cve id="CVE-2016-9349" level="LOW">
<product>susiaccess:3.0</product>
</cve>
<cve id="CVE-2016-9343" level="LOW">
<product>1768_compact_guardlogix_l4xs_controller_firmware:18.00</product>
<product>1768_compact_guardlogix_l4xs_controller_firmware:19.00</product>
<product>1768_compact_guardlogix_l4xs_controller_firmware:20.00</product>
<product>1768_compact_guardlogix_l4xs_controller_firmware:20.011</product>
<product>1768_compact_guardlogix_l4xs_controller_firmware:20.013</product>
<product>1768_compactlogix_l4x_controller_firmware:16.00</product>
<product>1768_compactlogix_l4x_controller_firmware:16.020</product>
<product>1768_compactlogix_l4x_controller_firmware:16.025</product>
<product>1768_compactlogix_l4x_controller_firmware:17.00</product>
<product>1768_compactlogix_l4x_controller_firmware:18.00</product>
<product>1768_compactlogix_l4x_controller_firmware:19.00</product>
<product>1768_compactlogix_l4x_controller_firmware:20.00</product>
<product>1768_compactlogix_l4x_controller_firmware:20.011</product>
<product>1768_compactlogix_l4x_controller_firmware:20.016</product>
<product>1769_compactlogix_5370_l1_controller_firmware:20.00</product>
<product>1769_compactlogix_5370_l1_controller_firmware:20.010</product>
<product>1769_compactlogix_5370_l1_controller_firmware:20.013</product>
<product>1769_compactlogix_5370_l1_controller_firmware:21.00</product>
<product>1769_compactlogix_5370_l2_controller_firmware:20.00</product>
<product>1769_compactlogix_5370_l2_controller_firmware:20.010</product>
<product>1769_compactlogix_5370_l2_controller_firmware:20.013</product>
<product>1769_compactlogix_5370_l2_controller_firmware:21.00</product>
<product>1769_compactlogix_5370_l3_controller_firmware:20.00</product>
<product>1769_compactlogix_5370_l3_controller_firmware:20.010</product>
<product>1769_compactlogix_5370_l3_controller_firmware:20.013</product>
<product>1769_compactlogix_5370_l3_controller_firmware:21.00</product>
<product>1769_compactlogix_l23x_controller_firmware:16.00</product>
<product>1769_compactlogix_l23x_controller_firmware:17.00</product>
<product>1769_compactlogix_l23x_controller_firmware:18.00</product>
<product>1769_compactlogix_l23x_controller_firmware:19.00</product>
<product>1769_compactlogix_l23x_controller_firmware:20.00</product>
<product>1769_compactlogix_l23x_controller_firmware:20.010</product>
<product>1769_compactlogix_l23x_controller_firmware:20.013</product>
<product>1769_compactlogix_l3x_controller_firmware:16.00</product>
<product>1769_compactlogix_l3x_controller_firmware:16.020</product>
<product>1769_compactlogix_l3x_controller_firmware:16.023</product>
<product>1769_compactlogix_l3x_controller_firmware:17.00</product>
<product>1769_compactlogix_l3x_controller_firmware:18.00</product>
<product>1769_compactlogix_l3x_controller_firmware:19.00</product>
<product>1769_compactlogix_l3x_controller_firmware:20.00</product>
<product>1769_compactlogix_l3x_controller_firmware:20.010</product>
<product>1769_compactlogix_l3x_controller_firmware:20.013</product>
<product>controllogix_5560_controller_firmware:16.00</product>
<product>controllogix_5560_controller_firmware:16.020</product>
<product>controllogix_5560_controller_firmware:16.022</product>
<product>controllogix_5560_controller_firmware:17.00</product>
<product>controllogix_5560_controller_firmware:18.00</product>
<product>controllogix_5560_controller_firmware:19.00</product>
<product>controllogix_5560_controller_firmware:20.00</product>
<product>controllogix_5560_controller_firmware:20.010</product>
<product>controllogix_5560_controller_firmware:20.013</product>
<product>controllogix_5560_redundant_controller_firmware:16.00</product>
<product>controllogix_5560_redundant_controller_firmware:19.00</product>
<product>controllogix_5560_redundant_controller_firmware:20.00</product>
<product>controllogix_5560_redundant_controller_firmware:20.050</product>
<product>controllogix_5560_redundant_controller_firmware:20.055</product>
<product>controllogix_5570_controller_firmware:18.00</product>
<product>controllogix_5570_controller_firmware:19.00</product>
<product>controllogix_5570_controller_firmware:20.010</product>
<product>controllogix_5570_controller_firmware:20.013</product>
<product>controllogix_5570_controller_firmware:21.00</product>
<product>controllogix_5570_redundant_controller_firmware:20.00</product>
<product>controllogix_5570_redundant_controller_firmware:20.050</product>
<product>controllogix_5570_redundant_controller_firmware:20.055</product>
<product>controllogix_5570_redundant_controller_firmware:21.00</product>
<product>controllogix_l55_controller_firmware:16.00</product>
<product>controllogix_l55_controller_firmware:16.020</product>
<product>controllogix_l55_controller_firmware:16.022</product>
<product>flexlogix_l34_controller_firmware:16.00</product>
<product>guardlogix_5570_controller_firmware:16.00</product>
<product>guardlogix_5570_controller_firmware:17.00</product>
<product>guardlogix_5570_controller_firmware:18.00</product>
<product>guardlogix_5570_controller_firmware:19.00</product>
<product>guardlogix_5570_controller_firmware:20.00</product>
<product>guardlogix_5570_controller_firmware:20.010</product>
<product>guardlogix_5570_controller_firmware:20.017</product>
<product>guardlogix_5570_controller_firmware:21.00</product>
<product>rslogix_emulate_5000_firmware:18.00</product>
<product>rslogix_emulate_5000_firmware:19.00</product>
<product>rslogix_emulate_5000_firmware:20.00</product>
<product>rslogix_emulate_5000_firmware:21.00</product>
<product>softlogix_5800_controller_firmware:18.00</product>
<product>softlogix_5800_controller_firmware:19.00</product>
<product>softlogix_5800_controller_firmware:20.00</product>
<product>softlogix_5800_controller_firmware:21.00</product>
</cve>
<cve id="CVE-2016-9346" level="LOW">
<product>miineport_e1_firmware:1.7</product>
<product>miineport_e2_firmware:1.3</product>
<product>miineport_e3_firmware:1.0</product>
</cve>
<cve id="CVE-2016-9347" level="MEDIUM">
<product>se4801t0x_redundant_wireless_i%2fo_card_firmware:13.3</product>
<product>se4801t1x_simplex_wireless_i%2fo_card_firmware:13.3</product>
</cve>
<cve id="CVE-2016-9344" level="LOW">
<product>miineport_e1_firmware:1.7</product>
<product>miineport_e2_firmware:1.3</product>
<product>miineport_e3_firmware:1.0</product>
</cve>
<cve id="CVE-2016-9345" level="MEDIUM">
<product>deltav:12.3</product>
<product>deltav:12.3.1</product>
<product>deltav:13.3</product>
</cve>
<cve id="CVE-2016-1597" level="LOW">
<product>access_governance_suite:6.0</product>
<product>access_governance_suite:6.1</product>
<product>access_governance_suite:6.2</product>
<product>access_governance_suite:6.3</product>
<product>access_governance_suite:6.4</product>
</cve>
<cve id="CVE-2016-1596" level="MEDIUM">
<product>service_desk:7.1</product>
</cve>
<cve id="CVE-2016-1595" level="LOW">
<product>service_desk:7.1</product>
</cve>
<cve id="CVE-2016-1594" level="LOW">
<product>service_desk:7.1</product>
</cve>
<cve id="CVE-2016-1593" level="LOW">
<product>service_desk:7.1</product>
</cve>
<cve id="CVE-2016-1592" level="MEDIUM">
<product>identity_manager:4.5.2</product>
</cve>
<cve id="CVE-2016-3420" level="HIGH">
<product>agile_product_lifecycle_management_framework:9.3.1.1</product>
<product>agile_product_lifecycle_management_framework:9.3.1.2</product>
<product>agile_product_lifecycle_management_framework:9.3.2</product>
<product>agile_product_lifecycle_management_framework:9.3.3</product>
</cve>
<cve id="CVE-2016-3423" level="MEDIUM">
<product>peoplesoft_enterprise_peopletools:8.53</product>
<product>peoplesoft_enterprise_peopletools:8.54</product>
<product>peoplesoft_enterprise_peopletools:8.55</product>
</cve>
<cve id="CVE-2016-1599" level="MEDIUM">
<product>self_service_password_reset:2.0</product>
<product>self_service_password_reset:3.0</product>
<product>self_service_password_reset:3.1</product>
<product>self_service_password_reset:3.2</product>
<product>self_service_password_reset:3.3</product>
<product>self_service_password_reset:3.3.1</product>
</cve>
<cve id="CVE-2016-1598" level="MEDIUM">
<product>identity_manager:4.5</product>
<product>identity_manager_identity_applications:4.5.3</product>
</cve>
<cve id="CVE-2016-5874" level="LOW">
<product>simatic_net_pc-software:13</product>
</cve>
<cve id="CVE-2016-5876" level="MEDIUM">
<product>owncloud:8.2.5</product>
<product>owncloud:9.0.0</product>
<product>owncloud:9.0.1</product>
<product>owncloud:9.0.2</product>
</cve>
<cve id="CVE-2016-3422" level="LOW">
<product>jdk:1.6.0</product>
<product>jdk:1.7.0</product>
<product>jdk:1.8.0</product>
<product>jre:1.6.0</product>
<product>jre:1.7.0</product>
<product>jre:1.8.0</product>
</cve>
<cve id="CVE-2016-5873" level="LOW">
<product>pecl_http:3.0.1</product>
</cve>
<cve id="CVE-2016-5699" level="MEDIUM">
<product>python:2.7.9</product>
<product>python:3.0</product>
<product>python:3.0.1</product>
<product>python:3.1.0</product>
<product>python:3.1.1</product>
<product>python:3.1.2</product>
<product>python:3.1.3</product>
<product>python:3.1.4</product>
<product>python:3.1.5</product>
<product>python:3.2.0</product>
<product>python:3.2.1</product>
<product>python:3.2.2</product>
<product>python:3.2.3</product>
<product>python:3.2.4</product>
<product>python:3.2.5</product>
<product>python:3.2.6</product>
<product>python:3.3.0</product>
<product>python:3.3.1</product>
<product>python:3.3.2</product>
<product>python:3.3.3</product>
<product>python:3.3.4</product>
<product>python:3.3.5</product>
<product>python:3.3.6</product>
<product>python:3.4.0</product>
<product>python:3.4.1</product>
<product>python:3.4.2</product>
<product>python:3.4.3</product>
</cve>
<cve id="CVE-2016-5878" level="MEDIUM">
<product>filenet_workplace:4.0.2.0</product>
<product>filenet_workplace:4.0.2.1</product>
<product>filenet_workplace:4.0.2.2</product>
<product>filenet_workplace:4.0.2.3</product>
<product>filenet_workplace:4.0.2.4</product>
<product>filenet_workplace:4.0.2.5</product>
<product>filenet_workplace:4.0.2.6</product>
<product>filenet_workplace:4.0.2.7</product>
<product>filenet_workplace:4.0.2.8</product>
<product>filenet_workplace:4.0.2.9</product>
<product>filenet_workplace:4.0.2.10</product>
<product>filenet_workplace:4.0.2.11</product>
<product>filenet_workplace:4.0.2.12</product>
<product>filenet_workplace:4.0.2.13</product>
</cve>
<cve id="CVE-2016-5879" level="LOW">
<product>mq_appliance_firmware:8.0</product>
</cve>
<cve id="CVE-2016-3426" level="MEDIUM">
<product>jdk:1.8.0</product>
<product>jre:1.8.0</product>
</cve>
<cve id="CVE-2016-9933" level="LOW">
<product>libgd:2.2.1</product>
</cve>
<cve id="CVE-2016-9932" level="LOW">
<product>xen:3.3.0</product>
<product>xen:3.3.1</product>
<product>xen:3.3.2</product>
<product>xen:3.4.0</product>
<product>xen:3.4.1</product>
<product>xen:3.4.2</product>
<product>xen:3.4.3</product>
<product>xen:3.4.4</product>
<product>xen:4.0.0</product>
<product>xen:4.0.1</product>
<product>xen:4.0.2</product>
<product>xen:4.0.3</product>
<product>xen:4.0.4</product>
<product>xen:4.1.0</product>
<product>xen:4.1.1</product>
<product>xen:4.1.2</product>
<product>xen:4.1.3</product>
<product>xen:4.1.4</product>
<product>xen:4.1.5</product>
<product>xen:4.1.6</product>
<product>xen:4.1.6.1</product>
<product>xen:4.2.0</product>
<product>xen:4.2.1</product>
<product>xen:4.2.2</product>
<product>xen:4.2.3</product>
<product>xen:4.2.4</product>
<product>xen:4.2.5</product>
<product>xen:4.3.0</product>
<product>xen:4.3.1</product>
<product>xen:4.3.2</product>
<product>xen:4.3.3</product>
<product>xen:4.3.4</product>
<product>xen:4.4.0</product>
<product>xen:4.4.1</product>
<product>xen:4.4.2</product>
<product>xen:4.4.3</product>
<product>xen:4.4.4</product>
<product>xen:4.5.0</product>
<product>xen:4.5.1</product>
<product>xen:4.5.2</product>
<product>xen:4.5.3</product>
<product>xen:4.5.5</product>
<product>xen:4.6.0</product>
<product>xen:4.6.3</product>
<product>xen:4.7.0</product>
</cve>
<cve id="CVE-2016-10327" level="LOW">
<product>libreoffice:5.3.0.0</product>
</cve>
<cve id="CVE-2016-10326" level="LOW">
<product>osip:4.1.0</product>
</cve>
<cve id="CVE-2016-10325" level="LOW">
<product>osip:4.1.0</product>
</cve>
<cve id="CVE-2016-10324" level="LOW">
<product>osip:4.1.0</product>
</cve>
<cve id="CVE-2016-10323" level="LOW">
<product>photo_station:6.0-2638</product>
<product>photo_station:6.0-2639</product>
<product>photo_station:6.0-2640</product>
<product>photo_station:6.3</product>
<product>photo_station:6.3-2944</product>
</cve>
<cve id="CVE-2016-10322" level="LOW">
<product>photo_station:6.3-2954</product>
</cve>
<cve id="CVE-2016-10321" level="LOW">
<product>web2py:2.14.5</product>
</cve>
<cve id="CVE-2016-10320" level="MEDIUM">
<product>textract:1.4.0</product>
</cve>
<cve id="CVE-2016-10329" level="LOW">
<product>photo_station:6.5.2-3225</product>
</cve>
<cve id="CVE-2016-10328" level="LOW">
<product>freetype2:2.7</product>
</cve>
<cve id="CVE-2016-4610" level="LOW">
<product>libxslt</product>
</cve>
<cve id="CVE-2016-4616" level="LOW">
<product>libxml2:-</product>
</cve>
<cve id="CVE-2016-4615" level="LOW">
<product>libxml2:-</product>
</cve>
<cve id="CVE-2016-4614" level="LOW">
<product>libxml2:-</product>
</cve>
<cve id="CVE-2016-7509" level="MEDIUM">
<product>glpi:0.90.4</product>
</cve>
<cve id="CVE-2016-8798" level="LOW">
<product>usg5500_firmware:v300r001c00</product>
<product>usg5500_firmware:v300r001c10</product>
</cve>
<cve id="CVE-2016-3675" level="LOW">
<product>policy_center_firmware:v100r003c00</product>
<product>policy_center_firmware:v100r003c10</product>
</cve>
<cve id="CVE-2016-0784" level="LOW">
<product>openmeetings:3.1.0</product>
</cve>
<cve id="CVE-2016-4159" level="MEDIUM">
<product>coldfusion:10.0</product>
<product>coldfusion:11.0</product>
<product>coldfusion:2016.00</product>
</cve>
<cve id="CVE-2016-1951" level="LOW">
<product>netscape_portable_runtime:4.11</product>
</cve>
<cve id="CVE-2016-7505" level="LOW">
<product>mujs:a3a4fe840b80706c706e86160352af5936f292d8</product>
</cve>
<cve id="CVE-2016-8331" level="MEDIUM">
<product>libtiff:4.0.6</product>
</cve>
<cve id="CVE-2016-8332" level="MEDIUM">
<product>openjpeg:2.1.1</product>
</cve>
<cve id="CVE-2016-1430" level="LOW">
<product>rv180_vpn_router_firmware</product>
<product>rv180w_vpn_router_firmware</product>
</cve>
<cve id="CVE-2016-1431" level="MEDIUM">
<product>firepower_management_center:4.10.3</product>
<product>firepower_management_center:5.2.0</product>
<product>firepower_management_center:5.3.0</product>
<product>firepower_management_center:5.3.1</product>
<product>firepower_management_center:5.4.0</product>
</cve>
<cve id="CVE-2016-1434" level="LOW">
<product>ip_phone_8800_series_firmware:11.0%281%29</product>
</cve>
<cve id="CVE-2016-1435" level="HIGH">
<product>ip_phone_8800_series_firmware:11.0%281%29</product>
</cve>
<cve id="CVE-2016-4157" level="MEDIUM">
<product>creative_cloud:3.6.0.248</product>
</cve>
<cve id="CVE-2016-3051" level="LOW">
<product>security_access_manager_9.0_firmware</product>
</cve>
<cve id="CVE-2016-3052" level="MEDIUM">
<product>websphere_mq:8.0.0.5</product>
</cve>
<cve id="CVE-2016-3053" level="LOW">
<product>aix</product>
</cve>
<cve id="CVE-2016-3054" level="MEDIUM">
<product>filenet_workplace:4.0.2</product>
</cve>
<cve id="CVE-2016-3055" level="LOW">
<product>filenet_workplace:4.0.2</product>
</cve>
<cve id="CVE-2016-3056" level="MEDIUM">
<product>business_process_manager:7.5.0.0</product>
<product>business_process_manager:7.5.0.0</product>
<product>business_process_manager:7.5.0.0</product>
<product>business_process_manager:7.5.0.0</product>
<product>business_process_manager:7.5.0.1</product>
<product>business_process_manager:7.5.0.1</product>
<product>business_process_manager:7.5.0.1</product>
<product>business_process_manager:7.5.0.1</product>
<product>business_process_manager:7.5.1.0</product>
<product>business_process_manager:7.5.1.0</product>
<product>business_process_manager:7.5.1.0</product>
<product>business_process_manager:7.5.1.0</product>
<product>business_process_manager:7.5.1.1</product>
<product>business_process_manager:7.5.1.1</product>
<product>business_process_manager:7.5.1.1</product>
<product>business_process_manager:7.5.1.1</product>
<product>business_process_manager:7.5.1.2</product>
<product>business_process_manager:7.5.1.2</product>
<product>business_process_manager:7.5.1.2</product>
<product>business_process_manager:7.5.1.2</product>
<product>business_process_manager:8.0.0.0</product>
<product>business_process_manager:8.0.0.0</product>
<product>business_process_manager:8.0.0.0</product>
<product>business_process_manager:8.0.0.0</product>
<product>business_process_manager:8.0.1.0</product>
<product>business_process_manager:8.0.1.0</product>
<product>business_process_manager:8.0.1.0</product>
<product>business_process_manager:8.0.1.0</product>
<product>business_process_manager:8.0.1.1</product>
<product>business_process_manager:8.0.1.1</product>
<product>business_process_manager:8.0.1.1</product>
<product>business_process_manager:8.0.1.1</product>
<product>business_process_manager:8.0.1.2</product>
<product>business_process_manager:8.0.1.2</product>
<product>business_process_manager:8.0.1.2</product>
<product>business_process_manager:8.0.1.2</product>
<product>business_process_manager:8.0.1.3</product>
<product>business_process_manager:8.0.1.3</product>
<product>business_process_manager:8.0.1.3</product>
<product>business_process_manager:8.0.1.3</product>
<product>business_process_manager:8.5.0.0</product>
<product>business_process_manager:8.5.0.0</product>
<product>business_process_manager:8.5.0.0</product>
<product>business_process_manager:8.5.0.0</product>
<product>business_process_manager:8.5.0.1</product>
<product>business_process_manager:8.5.0.1</product>
<product>business_process_manager:8.5.0.1</product>
<product>business_process_manager:8.5.0.1</product>
<product>business_process_manager:8.5.0.2</product>
<product>business_process_manager:8.5.0.2</product>
<product>business_process_manager:8.5.0.2</product>
<product>business_process_manager:8.5.0.2</product>
<product>business_process_manager:8.5.5.0</product>
<product>business_process_manager:8.5.5.0</product>
<product>business_process_manager:8.5.5.0</product>
<product>business_process_manager:8.5.5.0</product>
<product>business_process_manager:8.5.6.0</product>
<product>business_process_manager:8.5.6.0</product>
<product>business_process_manager:8.5.6.0</product>
<product>business_process_manager:8.5.6.0</product>
<product>business_process_manager:8.5.6.2</product>
<product>business_process_manager:8.5.6.2</product>
<product>business_process_manager:8.5.6.2</product>
<product>business_process_manager:8.5.6.2</product>
<product>business_process_manager:8.5.7.0</product>
<product>business_process_manager:8.5.7.0</product>
<product>business_process_manager:8.5.7.0</product>
<product>business_process_manager:8.5.7.0</product>
</cve>
<cve id="CVE-2016-3057" level="MEDIUM">
<product>sterling_b2b_integrator:5.2</product>
</cve>
<cve id="CVE-2016-6578" level="MEDIUM">
<product>filecloud:13.0.0.32841</product>
</cve>
<cve id="CVE-2016-3059" level="LOW">
<product>tivoli_storage_flashcopy_manager_for_sql_server:3.1.1.7</product>
<product>tivoli_storage_flashcopy_manager_for_sql_server:3.2.1.5</product>
<product>your_sha256_hashft_sql_server:6.3.1.5</product>
<product>your_sha256_hashft_sql_server:6.4.1.7</product>
</cve>
<cve id="CVE-2016-0501" level="LOW">
<product>secure_global_desktop:5.2</product>
</cve>
<cve id="CVE-2016-0500" level="LOW">
<product>retail_order_broker_cloud_service:4.0</product>
<product>retail_order_broker_cloud_service:4.1</product>
</cve>
<cve id="CVE-2016-7227" level="HIGH">
<product>edge</product>
<product>internet_explorer:9</product>
<product>internet_explorer:10</product>
<product>internet_explorer:11</product>
</cve>
<cve id="CVE-2016-0506" level="MEDIUM">
<product>retail_order_management_system_cloud_service:3.5</product>
<product>retail_order_management_system_cloud_service:4.5</product>
<product>retail_order_management_system_cloud_service:4.7</product>
<product>retail_order_management_system_cloud_service:5.0</product>
<product>retail_order_management_system_cloud_service:15.0</product>
</cve>
<cve id="CVE-2016-0509" level="MEDIUM">
<product>e-business_suite:11.5.10.2</product>
</cve>
<cve id="CVE-2016-0508" level="MEDIUM">
<product>ilearning:6.0</product>
<product>ilearning:6.1</product>
</cve>
<cve id="CVE-2016-8756" level="MEDIUM">
<product>mate_8_firmware:nxt-al10c00b197</product>
<product>mate_8_firmware:nxt-cl10c00b197</product>
<product>mate_8_firmware:nxt-dl10c00b197</product>
<product>mate_8_firmware:nxt-tl10c00b197</product>
</cve>
<cve id="CVE-2016-8757" level="MEDIUM">
<product>p9_firmware:eva-al10c00b192</product>
<product>p9_firmware:eva-cl10c00b192</product>
<product>p9_firmware:eva-dl10c00b192</product>
<product>p9_firmware:eva-tl10c00b192</product>
</cve>
<cve id="CVE-2016-8754" level="MEDIUM">
<product>oceanstor_5600_v3_firmware:v300r003c00</product>
</cve>
<cve id="CVE-2016-8752" level="LOW">
<product>atlas:0.6.0</product>
<product>atlas:0.6.0</product>
<product>atlas:0.6.0</product>
<product>atlas:0.7.0</product>
<product>atlas:0.7.0</product>
<product>atlas:0.7.0</product>
<product>atlas:0.7.1</product>
<product>atlas:0.7.1</product>
<product>atlas:0.7.1</product>
<product>atlas:0.7.1</product>
</cve>
<cve id="CVE-2016-8751" level="MEDIUM">
<product>ranger:0.5.3</product>
</cve>
<cve id="CVE-2016-8758" level="MEDIUM">
<product>mate_8_firmware:nxt-al10c00b561</product>
<product>mate_8_firmware:nxt-cl10c00b561</product>
<product>mate_8_firmware:nxt-dl10c00b561</product>
<product>mate_8_firmware:nxt-tl10c00b561</product>
</cve>
<cve id="CVE-2016-8759" level="MEDIUM">
<product>honor_6_firmware:-</product>
<product>p9_firmware:-</product>
<product>p9_plus_firmware:-</product>
</cve>
<cve id="CVE-2016-9481" level="LOW">
<product>exponent_cms:2.4.0</product>
</cve>
<cve id="CVE-2016-9480" level="LOW">
<product>libdwarf:2016-10-21</product>
</cve>
<cve id="CVE-2016-9483" level="LOW">
<product>php_formmail_generator:-</product>
</cve>
<cve id="CVE-2016-9482" level="LOW">
<product>php_formmail_generator:-</product>
</cve>
<cve id="CVE-2016-9485" level="LOW">
<product>secureconnector:-</product>
</cve>
<cve id="CVE-2016-4429" level="LOW">
<product>glibc</product>
<product>opensuse:13.2</product>
</cve>
<cve id="CVE-2016-9487" level="MEDIUM">
<product>epubcheck:4.0.1</product>
</cve>
<cve id="CVE-2016-9486" level="LOW">
<product>secureconnector:-</product>
</cve>
<cve id="CVE-2016-9489" level="LOW">
<product>manageengine_applications_manager:12.0</product>
<product>manageengine_applications_manager:13.0</product>
</cve>
<cve id="CVE-2016-4425" level="LOW">
<product>jansson:2.7</product>
</cve>
<cve id="CVE-2016-8285" level="MEDIUM">
<product>your_sha256_hash:9.2</product>
</cve>
<cve id="CVE-2016-8280" level="LOW">
<product>esight:v300r002c00</product>
<product>esight:v300r003c10</product>
<product>esight:v300r003c20</product>
</cve>
<cve id="CVE-2016-8281" level="LOW">
<product>platform_security_for_java:12.1.3.0.0</product>
<product>platform_security_for_java:12.2.1.0.0</product>
<product>platform_security_for_java:12.2.1.1.0</product>
</cve>
<cve id="CVE-2016-8282" level="MEDIUM">
<product>flexcube_private_banking:2.0.1</product>
<product>flexcube_private_banking:2.2.0</product>
<product>flexcube_private_banking:12.0.1</product>
</cve>
<cve id="CVE-2016-8576" level="MEDIUM">
<product>qemu:-</product>
</cve>
<cve id="CVE-2016-8577" level="MEDIUM">
<product>qemu:-</product>
</cve>
<cve id="CVE-2016-8574" level="LOW">
<product>tcpdump:4.8.1</product>
</cve>
<cve id="CVE-2016-8575" level="LOW">
<product>tcpdump:4.8.1</product>
</cve>
<cve id="CVE-2016-8578" level="MEDIUM">
<product>qemu:-</product>
</cve>
<cve id="CVE-2016-8579" level="LOW">
<product>docker2aci:0.12.3</product>
</cve>
<cve id="CVE-2016-1368" level="LOW">
<product>firesight_system_software:5.2.0</product>
<product>firesight_system_software:5.2.0.1</product>
<product>firesight_system_software:5.2.0.2</product>
<product>firesight_system_software:5.2.0.3</product>
<product>firesight_system_software:5.2.0.4</product>
<product>firesight_system_software:5.2.0.5</product>
<product>firesight_system_software:5.2.0.6</product>
<product>firesight_system_software:5.2.0.8</product>
<product>firesight_system_software:5.3.0</product>
<product>firesight_system_software:5.3.0.1</product>
<product>firesight_system_software:5.3.0.2</product>
<product>firesight_system_software:5.3.0.3</product>
<product>firesight_system_software:5.3.0.4</product>
<product>firesight_system_software:5.3.0.5</product>
<product>firesight_system_software:5.3.0.6</product>
<product>firesight_system_software:5.3.0.7</product>
<product>firesight_system_software:5.3.1</product>
<product>firesight_system_software:5.3.1.1</product>
<product>firesight_system_software:5.3.1.2</product>
<product>firesight_system_software:5.3.1.3</product>
<product>firesight_system_software:5.3.1.4</product>
<product>firesight_system_software:5.3.1.5</product>
<product>firesight_system_software:5.3.1.6</product>
<product>firesight_system_software:5.3.1.7</product>
<product>firesight_system_software:5.4.0</product>
<product>firesight_system_software:5.4.0.1</product>
<product>firesight_system_software:5.4.0.2</product>
<product>firesight_system_software:5.4.0.3</product>
</cve>
<cve id="CVE-2016-1369" level="LOW">
<product>asa_with_firepower_services:5.3.1</product>
<product>asa_with_firepower_services:5.3.1.1</product>
<product>asa_with_firepower_services:5.4.0</product>
<product>asa_with_firepower_services:5.4.0.1</product>
<product>asa_with_firepower_services:5.4.0.2</product>
<product>asa_with_firepower_services:5.4.0.3</product>
<product>asa_with_firepower_services:5.4.0.4</product>
<product>asa_with_firepower_services:5.4.0.5</product>
<product>asa_with_firepower_services:5.4.0.6</product>
<product>asa_with_firepower_services:5.4.1</product>
<product>asa_with_firepower_services:5.4.1.1</product>
<product>asa_with_firepower_services:5.4.1.2</product>
<product>asa_with_firepower_services:5.4.1.3</product>
<product>asa_with_firepower_services:5.4.1.4</product>
<product>asa_with_firepower_services:5.4.1.5</product>
<product>asa_with_firepower_services:5.4.05</product>
<product>asa_with_firepower_services:6.0.0</product>
</cve>
<cve id="CVE-2016-1360" level="MEDIUM">
<product>prime_lan_management_solution:4.1_base</product>
<product>prime_lan_management_solution:4.2.1</product>
<product>prime_lan_management_solution:4.2.2</product>
<product>prime_lan_management_solution:4.2.3</product>
<product>prime_lan_management_solution:4.2.4</product>
<product>prime_lan_management_solution:4.2.5</product>
<product>prime_lan_management_solution:4.2_base</product>
</cve>
<cve id="CVE-2016-1362" level="LOW">
<product>aireos:4.1_base</product>
<product>aireos:7.4</product>
<product>aireos:7.5_base</product>
<product>aireos:7.6</product>
</cve>
<cve id="CVE-2016-1363" level="LOW">
<product>wireless_lan_controller_software:7.4.1.1</product>
<product>wireless_lan_controller_software:7.4.1.19</product>
<product>wireless_lan_controller_software:7.4.1.54</product>
<product>wireless_lan_controller_software:7.4.100</product>
<product>wireless_lan_controller_software:7.4.100.60</product>
<product>wireless_lan_controller_software:7.4.110.0</product>
<product>wireless_lan_controller_software:7.4.121.0</product>
<product>wireless_lan_controller_software:7.5.102.0</product>
<product>wireless_lan_controller_software:7.5.102.11</product>
<product>wireless_lan_controller_software:7.6.1.62</product>
<product>wireless_lan_controller_software:7.6.100.0</product>
<product>wireless_lan_controller_software:7.6.110.0</product>
<product>wireless_lan_controller_software:7.6.120.0</product>
<product>wireless_lan_controller_software:7.6.130.0</product>
<product>wireless_lan_controller_software:8.0.72.140</product>
<product>wireless_lan_controller_software:8.0.100</product>
<product>wireless_lan_controller_software:8.1.0</product>
</cve>
<cve id="CVE-2016-1364" level="LOW">
<product>wireless_lan_controller_software:7.4.1.1</product>
<product>wireless_lan_controller_software:7.4.1.19</product>
<product>wireless_lan_controller_software:7.4.1.54</product>
<product>wireless_lan_controller_software:7.4.100</product>
<product>wireless_lan_controller_software:7.4.100.60</product>
<product>wireless_lan_controller_software:7.4.110.0</product>
<product>wireless_lan_controller_software:7.4.121.0</product>
<product>wireless_lan_controller_software:7.5.102.0</product>
<product>wireless_lan_controller_software:7.5.102.11</product>
<product>wireless_lan_controller_software:7.6.1.62</product>
<product>wireless_lan_controller_software:7.6.100.0</product>
<product>wireless_lan_controller_software:7.6.110.0</product>
<product>wireless_lan_controller_software:7.6.120.0</product>
<product>wireless_lan_controller_software:7.6.130.0</product>
<product>wireless_lan_controller_software:8.0.0</product>
<product>wireless_lan_controller_software:8.0.72.140</product>
<product>wireless_lan_controller_software:8.0.100</product>
</cve>
<cve id="CVE-2016-1365" level="MEDIUM">
<product>application_policy_infrastructure_controller_enterprise_module:1.0.10</product>
</cve>
<cve id="CVE-2016-1367" level="LOW">
<product>adaptive_security_appliance_software:9.4.1</product>
</cve>
<cve id="CVE-2016-2868" level="LOW">
<product>qradar_security_information_and_event_manager:7.2.6</product>
</cve>
<cve id="CVE-2016-2869" level="MEDIUM">
<product>qradar_security_information_and_event_manager:7.1.0</product>
<product>qradar_security_information_and_event_manager:7.2.0</product>
<product>qradar_security_information_and_event_manager:7.2.1</product>
<product>qradar_security_information_and_event_manager:7.2.2</product>
<product>qradar_security_information_and_event_manager:7.2.3</product>
<product>qradar_security_information_and_event_manager:7.2.4</product>
<product>qradar_security_information_and_event_manager:7.2.5</product>
<product>qradar_security_information_and_event_manager:7.2.6</product>
</cve>
<cve id="CVE-2016-9629" level="MEDIUM">
<product>w3m:0.5.3-32</product>
</cve>
<cve id="CVE-2016-9628" level="MEDIUM">
<product>w3m:0.5.3-32</product>
</cve>
<cve id="CVE-2016-9159" level="MEDIUM">
<product>simatic_s7-300_cpu_firmware:-</product>
<product>simatic_s7-400_cpu_firmware:-</product>
</cve>
<cve id="CVE-2016-9158" level="LOW">
<product>simatic_s7-300_cpu_firmware:-</product>
<product>simatic_s7-400_cpu_firmware:-</product>
</cve>
<cve id="CVE-2016-9157" level="LOW">
<product>sicam_pas:8.08</product>
</cve>
<cve id="CVE-2016-9156" level="LOW">
<product>sicam_pas:8.08</product>
</cve>
<cve id="CVE-2016-9627" level="MEDIUM">
<product>w3m:0.5.3-32</product>
</cve>
<cve id="CVE-2016-9154" level="LOW">
<product>desigo_web_module_pxa30-w0_firmware:6.00.00</product>
<product>desigo_web_module_pxa30-w1_firmware:6.00.00</product>
<product>desigo_web_module_pxa30-w2_firmware:6.00.00</product>
<product>desigo_web_module_pxa40-w0_firmware:6.00.00</product>
<product>desigo_web_module_pxa40-w1_firmware:6.00.00</product>
<product>desigo_web_module_pxa40-w2_firmware:6.00.00</product>
</cve>
<cve id="CVE-2016-2866" level="LOW">
<product>rational_collaborative_lifecycle_management:4.0.0</product>
<product>rational_collaborative_lifecycle_management:4.0.1</product>
<product>rational_collaborative_lifecycle_management:4.0.2</product>
<product>rational_collaborative_lifecycle_management:4.0.3</product>
<product>rational_collaborative_lifecycle_management:4.0.4</product>
<product>rational_collaborative_lifecycle_management:4.0.5</product>
<product>rational_collaborative_lifecycle_management:4.0.6</product>
<product>rational_collaborative_lifecycle_management:4.0.7</product>
<product>rational_collaborative_lifecycle_management:5.0.0</product>
<product>rational_collaborative_lifecycle_management:5.0.1</product>
<product>rational_collaborative_lifecycle_management:5.0.2</product>
<product>rational_collaborative_lifecycle_management:6.0.0</product>
<product>rational_collaborative_lifecycle_management:6.0.1</product>
<product>rational_collaborative_lifecycle_management:6.0.2</product>
<product>rational_collaborative_lifecycle_management:6.0.3</product>
</cve>
<cve id="CVE-2016-9152" level="MEDIUM">
<product>spip:3.1.3</product>
</cve>
<cve id="CVE-2016-9151" level="LOW">
<product>pan-os:5.0.19</product>
<product>pan-os:5.1.12</product>
<product>pan-os:6.0.14</product>
<product>pan-os:7.0.10</product>
<product>pan-os:7.1.5</product>
</cve>
<cve id="CVE-2016-9622" level="MEDIUM">
<product>w3m:0.5.3-32</product>
</cve>
<cve id="CVE-2016-3413" level="LOW">
<product>zimbra_collaboration_suite:8.6.0</product>
</cve>
<cve id="CVE-2016-5486" level="LOW">
<product>sun_zfs_storage_appliance_kit:ak_2013</product>
</cve>
<cve id="CVE-2016-5481" level="MEDIUM">
<product>sun_zfs_storage_appliance_kit:ak_2013</product>
</cve>
<cve id="CVE-2016-5482" level="MEDIUM">
<product>commerce_guided_search:6.2.2</product>
<product>commerce_guided_search:6.3.0</product>
<product>commerce_guided_search:6.4.1.2</product>
<product>commerce_guided_search:6.5.0</product>
<product>commerce_guided_search:6.5.1</product>
<product>commerce_guided_search:6.5.2</product>
</cve>
<cve id="CVE-2016-5489" level="MEDIUM">
<product>istore:12.1.1</product>
<product>istore:12.1.2</product>
<product>istore:12.1.3</product>
<product>istore:12.2.3</product>
<product>istore:12.2.4</product>
</cve>
<cve id="CVE-2016-2288" level="LOW">
<product>cogent_datahub:7.3.9</product>
</cve>
<cve id="CVE-2016-2289" level="LOW">
<product>webhmi:9.0</product>
</cve>
<cve id="CVE-2016-2286" level="LOW">
<product>miineport_e1_4641_firmware:1.1.10</product>
<product>miineport_e1_7080_firmware:1.1.10</product>
<product>miineport_e2_1242_firmware:1.1</product>
<product>miineport_e2_4561_firmware:1.1</product>
<product>miineport_e3_firmware:1.0</product>
</cve>
<cve id="CVE-2016-2287" level="MEDIUM">
<product>442sr_os:-</product>
</cve>
<cve id="CVE-2016-2285" level="MEDIUM">
<product>miineport_e1_4641_firmware:1.1.10</product>
<product>miineport_e1_7080_firmware:1.1.10</product>
<product>miineport_e2_1242_firmware:1.1</product>
<product>miineport_e2_4561_firmware:1.1</product>
<product>miineport_e3_firmware:1.0</product>
</cve>
<cve id="CVE-2016-2282" level="LOW">
<product>ioadmin_firmware:3.17</product>
<product>iologik_firmware:3.11</product>
</cve>
<cve id="CVE-2016-2283" level="LOW">
<product>ioadmin_firmware:3.17</product>
<product>iologik_firmware:3.11</product>
</cve>
<cve id="CVE-2016-2280" level="LOW">
<product>uniformance_process_history_database:r310</product>
<product>uniformance_process_history_database:r320</product>
<product>uniformance_process_history_database:r321</product>
</cve>
<cve id="CVE-2016-2281" level="HIGH">
<product>panel_builder_800:5.1</product>
</cve>
<cve id="CVE-2016-9498" level="LOW">
<product>manageengine_applications_manager:12.0</product>
<product>manageengine_applications_manager:13.0</product>
</cve>
<cve id="CVE-2016-6909" level="LOW">
<product>fortios:4.1.10</product>
<product>fortios:4.2.12</product>
<product>fortios:4.3.8</product>
<product>fortiswitch:3.4.2</product>
</cve>
<cve id="CVE-2016-6908" level="MEDIUM">
<product>opera_browser:37.0.2192.105088</product>
</cve>
<cve id="CVE-2016-6901" level="LOW">
<product>ar_firmware:v200r005</product>
<product>ar_firmware:v200r006</product>
<product>ar_firmware:v200r007c00</product>
<product>netengine_16ex_firmware:v200r005</product>
<product>netengine_16ex_firmware:v200r006</product>
<product>netengine_16ex_firmware:v200r007c00</product>
</cve>
<cve id="CVE-2016-6900" level="LOW">
<product>rh1288_v3_server_firmware:v100r003c00</product>
<product>rh2288_v3_server_firmware:v100r003c00</product>
<product>rh2288h_v3_server_firmware:v100r003c00</product>
<product>rh5885_v3_server_firmware:v100r003c01</product>
<product>xh620_v3_server_firmware:v100r003c00</product>
<product>xh622_v3_server_firmware:v100r003c00</product>
<product>xh628_v3_server_firmware:v100r003c00</product>
</cve>
<cve id="CVE-2016-6903" level="LOW">
<product>lshell:0.9.16</product>
</cve>
<cve id="CVE-2016-6902" level="LOW">
<product>lshell:0.9.16</product>
</cve>
<cve id="CVE-2016-6905" level="MEDIUM">
<product>libgd:2.2.2</product>
<product>leap:42.1</product>
<product>opensuse:13.2</product>
</cve>
<cve id="CVE-2016-6904" level="MEDIUM">
<product>vasa_provider:7.0</product>
</cve>
<cve id="CVE-2016-3427" level="LOW">
<product>jdk:1.6.0</product>
<product>jdk:1.7.0</product>
<product>jdk:1.8.0</product>
<product>jre:1.6.0</product>
<product>jre:1.7.0</product>
<product>jre:1.8.0</product>
<product>jrockit:r28.3.9</product>
</cve>
<cve id="CVE-2016-6906" level="MEDIUM">
<product>libgd:2.2.3</product>
</cve>
<cve id="CVE-2016-9207" level="LOW">
<product>expressway:x8.7.2</product>
<product>expressway:x8.8.3</product>
</cve>
<cve id="CVE-2016-9206" level="MEDIUM">
<product>unified_communications_manager:11.5%281.10000.6%29</product>
</cve>
<cve id="CVE-2016-9757" level="MEDIUM">
<product>nexpose:6.4.12</product>
</cve>
<cve id="CVE-2016-7508" level="MEDIUM">
<product>glpi:0.90.4</product>
</cve>
<cve id="CVE-2016-1000151" level="MEDIUM">
<product>tera-charts:1.0</product>
</cve>
<cve id="CVE-2016-9751" level="MEDIUM">
<product>piwigo:2.8.3</product>
</cve>
<cve id="CVE-2016-7506" level="LOW">
<product>mujs:8c805b4eb19cf2af689c860b77e6111d2ee439d5</product>
</cve>
<cve id="CVE-2016-7507" level="MEDIUM">
<product>glpi:0.90.4</product>
</cve>
<cve id="CVE-2016-7504" level="LOW">
<product>mujs:5000749f5afe3b956fc916e407309de840997f4a</product>
</cve>
<cve id="CVE-2016-9750" level="LOW">
<product>qradar_security_information_and_event_manager:7.2.0</product>
<product>qradar_security_information_and_event_manager:7.3.0</product>
</cve>
<cve id="CVE-2016-1000155" level="MEDIUM">
<product>wpsolr-search-engine:7.6</product>
</cve>
<cve id="CVE-2016-6639" level="LOW">
<product>cloud_foundry_elastic_runtime:1.6.37</product>
<product>cloud_foundry_elastic_runtime:1.7.0</product>
<product>cloud_foundry_elastic_runtime:1.7.1</product>
<product>cloud_foundry_elastic_runtime:1.7.2</product>
<product>cloud_foundry_elastic_runtime:1.7.3</product>
<product>cloud_foundry_elastic_runtime:1.7.4</product>
<product>cloud_foundry_elastic_runtime:1.7.5</product>
<product>cloud_foundry_elastic_runtime:1.7.6</product>
<product>cloud_foundry_elastic_runtime:1.7.7</product>
<product>cloud_foundry_elastic_runtime:1.7.8</product>
<product>cloud_foundry_elastic_runtime:1.7.9</product>
<product>cloud_foundry_elastic_runtime:1.7.10</product>
<product>cloud_foundry_elastic_runtime:1.7.11</product>
<product>cloud_foundry_elastic_runtime:1.7.12</product>
<product>cloud_foundry_elastic_runtime:1.7.13</product>
<product>cloud_foundry_elastic_runtime:1.7.14</product>
<product>cloud_foundry_elastic_runtime:1.7.15</product>
<product>cloud_foundry_elastic_runtime:1.7.16</product>
<product>cloud_foundry_elastic_runtime:1.7.17</product>
<product>cloud_foundry_elastic_runtime:1.7.18</product>
<product>cloud_foundry_php_buildpack:4.3.17</product>
</cve>
<cve id="CVE-2016-6633" level="MEDIUM">
<product>phpmyadmin:4.0.0</product>
<product>phpmyadmin:4.0.1</product>
<product>phpmyadmin:4.0.2</product>
<product>phpmyadmin:4.0.3</product>
<product>phpmyadmin:4.0.4</product>
<product>phpmyadmin:4.0.4.1</product>
<product>phpmyadmin:4.0.4.2</product>
<product>phpmyadmin:4.0.5</product>
<product>phpmyadmin:4.0.6</product>
<product>phpmyadmin:4.0.7</product>
<product>phpmyadmin:4.0.8</product>
<product>phpmyadmin:4.0.9</product>
<product>phpmyadmin:4.0.10</product>
<product>phpmyadmin:4.0.10.1</product>
<product>phpmyadmin:4.0.10.2</product>
<product>phpmyadmin:4.0.10.3</product>
<product>phpmyadmin:4.0.10.4</product>
<product>phpmyadmin:4.0.10.5</product>
<product>phpmyadmin:4.0.10.6</product>
<product>phpmyadmin:4.0.10.7</product>
<product>phpmyadmin:4.0.10.8</product>
<product>phpmyadmin:4.0.10.9</product>
<product>phpmyadmin:4.0.10.10</product>
<product>phpmyadmin:4.0.10.11</product>
<product>phpmyadmin:4.0.10.12</product>
<product>phpmyadmin:4.0.10.13</product>
<product>phpmyadmin:4.0.10.14</product>
<product>phpmyadmin:4.0.10.15</product>
<product>phpmyadmin:4.0.10.16</product>
<product>phpmyadmin:4.4.0</product>
<product>phpmyadmin:4.4.1</product>
<product>phpmyadmin:4.4.1.1</product>
<product>phpmyadmin:4.4.2</product>
<product>phpmyadmin:4.4.3</product>
<product>phpmyadmin:4.4.4</product>
<product>phpmyadmin:4.4.5</product>
<product>phpmyadmin:4.4.6</product>
<product>phpmyadmin:4.4.6.1</product>
<product>phpmyadmin:4.4.7</product>
<product>phpmyadmin:4.4.8</product>
<product>phpmyadmin:4.4.9</product>
<product>phpmyadmin:4.4.10</product>
<product>phpmyadmin:4.4.11</product>
<product>phpmyadmin:4.4.12</product>
<product>phpmyadmin:4.4.13</product>
<product>phpmyadmin:4.4.13.1</product>
<product>phpmyadmin:4.4.14</product>
<product>phpmyadmin:4.4.14.1</product>
<product>phpmyadmin:4.4.15</product>
<product>phpmyadmin:4.4.15.1</product>
<product>phpmyadmin:4.4.15.2</product>
<product>phpmyadmin:4.4.15.3</product>
<product>phpmyadmin:4.4.15.4</product>
<product>phpmyadmin:4.4.15.5</product>
<product>phpmyadmin:4.4.15.6</product>
<product>phpmyadmin:4.4.15.7</product>
<product>phpmyadmin:4.6.0</product>
<product>phpmyadmin:4.6.1</product>
<product>phpmyadmin:4.6.2</product>
<product>phpmyadmin:4.6.3</product>
</cve>
<cve id="CVE-2016-6632" level="MEDIUM">
<product>phpmyadmin:4.0.0</product>
<product>phpmyadmin:4.0.1</product>
<product>phpmyadmin:4.0.2</product>
<product>phpmyadmin:4.0.3</product>
<product>phpmyadmin:4.0.4</product>
<product>phpmyadmin:4.0.4.1</product>
<product>phpmyadmin:4.0.4.2</product>
<product>phpmyadmin:4.0.5</product>
<product>phpmyadmin:4.0.6</product>
<product>phpmyadmin:4.0.7</product>
<product>phpmyadmin:4.0.8</product>
<product>phpmyadmin:4.0.9</product>
<product>phpmyadmin:4.0.10</product>
<product>phpmyadmin:4.0.10.1</product>
<product>phpmyadmin:4.0.10.2</product>
<product>phpmyadmin:4.0.10.3</product>
<product>phpmyadmin:4.0.10.4</product>
<product>phpmyadmin:4.0.10.5</product>
<product>phpmyadmin:4.0.10.6</product>
<product>phpmyadmin:4.0.10.7</product>
<product>phpmyadmin:4.0.10.8</product>
<product>phpmyadmin:4.0.10.9</product>
<product>phpmyadmin:4.0.10.10</product>
<product>phpmyadmin:4.0.10.11</product>
<product>phpmyadmin:4.0.10.12</product>
<product>phpmyadmin:4.0.10.13</product>
<product>phpmyadmin:4.0.10.14</product>
<product>phpmyadmin:4.0.10.15</product>
<product>phpmyadmin:4.0.10.16</product>
<product>phpmyadmin:4.4.0</product>
<product>phpmyadmin:4.4.1</product>
<product>phpmyadmin:4.4.1.1</product>
<product>phpmyadmin:4.4.2</product>
<product>phpmyadmin:4.4.3</product>
<product>phpmyadmin:4.4.4</product>
<product>phpmyadmin:4.4.5</product>
<product>phpmyadmin:4.4.6</product>
<product>phpmyadmin:4.4.6.1</product>
<product>phpmyadmin:4.4.7</product>
<product>phpmyadmin:4.4.8</product>
<product>phpmyadmin:4.4.9</product>
<product>phpmyadmin:4.4.10</product>
<product>phpmyadmin:4.4.11</product>
<product>phpmyadmin:4.4.12</product>
<product>phpmyadmin:4.4.13</product>
<product>phpmyadmin:4.4.13.1</product>
<product>phpmyadmin:4.4.14</product>
<product>phpmyadmin:4.4.14.1</product>
<product>phpmyadmin:4.4.15</product>
<product>phpmyadmin:4.4.15.1</product>
<product>phpmyadmin:4.4.15.2</product>
<product>phpmyadmin:4.4.15.3</product>
<product>phpmyadmin:4.4.15.4</product>
<product>phpmyadmin:4.4.15.5</product>
<product>phpmyadmin:4.4.15.6</product>
<product>phpmyadmin:4.4.15.7</product>
<product>phpmyadmin:4.6.0</product>
<product>phpmyadmin:4.6.1</product>
<product>phpmyadmin:4.6.2</product>
<product>phpmyadmin:4.6.3</product>
</cve>
<cve id="CVE-2016-6631" level="MEDIUM">
<product>phpmyadmin:4.0.0</product>
<product>phpmyadmin:4.0.1</product>
<product>phpmyadmin:4.0.2</product>
<product>phpmyadmin:4.0.3</product>
<product>phpmyadmin:4.0.4</product>
<product>phpmyadmin:4.0.4.1</product>
<product>phpmyadmin:4.0.4.2</product>
<product>phpmyadmin:4.0.5</product>
<product>phpmyadmin:4.0.6</product>
<product>phpmyadmin:4.0.7</product>
<product>phpmyadmin:4.0.8</product>
<product>phpmyadmin:4.0.9</product>
<product>phpmyadmin:4.0.10</product>
<product>phpmyadmin:4.0.10.1</product>
<product>phpmyadmin:4.0.10.2</product>
<product>phpmyadmin:4.0.10.3</product>
<product>phpmyadmin:4.0.10.4</product>
<product>phpmyadmin:4.0.10.5</product>
<product>phpmyadmin:4.0.10.6</product>
<product>phpmyadmin:4.0.10.7</product>
<product>phpmyadmin:4.0.10.8</product>
<product>phpmyadmin:4.0.10.9</product>
<product>phpmyadmin:4.0.10.10</product>
<product>phpmyadmin:4.0.10.11</product>
<product>phpmyadmin:4.0.10.12</product>
<product>phpmyadmin:4.0.10.13</product>
<product>phpmyadmin:4.0.10.14</product>
<product>phpmyadmin:4.0.10.15</product>
<product>phpmyadmin:4.0.10.16</product>
<product>phpmyadmin:4.4.0</product>
<product>phpmyadmin:4.4.1</product>
<product>phpmyadmin:4.4.1.1</product>
<product>phpmyadmin:4.4.2</product>
<product>phpmyadmin:4.4.3</product>
<product>phpmyadmin:4.4.4</product>
<product>phpmyadmin:4.4.5</product>
<product>phpmyadmin:4.4.6</product>
<product>phpmyadmin:4.4.6.1</product>
<product>phpmyadmin:4.4.7</product>
<product>phpmyadmin:4.4.8</product>
<product>phpmyadmin:4.4.9</product>
<product>phpmyadmin:4.4.10</product>
<product>phpmyadmin:4.4.11</product>
<product>phpmyadmin:4.4.12</product>
<product>phpmyadmin:4.4.13</product>
<product>phpmyadmin:4.4.13.1</product>
<product>phpmyadmin:4.4.14</product>
<product>phpmyadmin:4.4.14.1</product>
<product>phpmyadmin:4.4.15</product>
<product>phpmyadmin:4.4.15.1</product>
<product>phpmyadmin:4.4.15.2</product>
<product>phpmyadmin:4.4.15.3</product>
<product>phpmyadmin:4.4.15.4</product>
<product>phpmyadmin:4.4.15.5</product>
<product>phpmyadmin:4.4.15.6</product>
<product>phpmyadmin:4.4.15.7</product>
<product>phpmyadmin:4.6.0</product>
<product>phpmyadmin:4.6.1</product>
<product>phpmyadmin:4.6.2</product>
<product>phpmyadmin:4.6.3</product>
</cve>
<cve id="CVE-2016-6630" level="LOW">
<product>phpmyadmin:4.0.0</product>
<product>phpmyadmin:4.0.1</product>
<product>phpmyadmin:4.0.2</product>
<product>phpmyadmin:4.0.3</product>
<product>phpmyadmin:4.0.4</product>
<product>phpmyadmin:4.0.4.1</product>
<product>phpmyadmin:4.0.4.2</product>
<product>phpmyadmin:4.0.5</product>
<product>phpmyadmin:4.0.6</product>
<product>phpmyadmin:4.0.7</product>
<product>phpmyadmin:4.0.8</product>
<product>phpmyadmin:4.0.9</product>
<product>phpmyadmin:4.0.10</product>
<product>phpmyadmin:4.0.10.1</product>
<product>phpmyadmin:4.0.10.2</product>
<product>phpmyadmin:4.0.10.3</product>
<product>phpmyadmin:4.0.10.4</product>
<product>phpmyadmin:4.0.10.5</product>
<product>phpmyadmin:4.0.10.6</product>
<product>phpmyadmin:4.0.10.7</product>
<product>phpmyadmin:4.0.10.8</product>
<product>phpmyadmin:4.0.10.9</product>
<product>phpmyadmin:4.0.10.10</product>
<product>phpmyadmin:4.0.10.11</product>
<product>phpmyadmin:4.0.10.12</product>
<product>phpmyadmin:4.0.10.13</product>
<product>phpmyadmin:4.0.10.14</product>
<product>phpmyadmin:4.0.10.15</product>
<product>phpmyadmin:4.0.10.16</product>
<product>phpmyadmin:4.4.0</product>
<product>phpmyadmin:4.4.1</product>
<product>phpmyadmin:4.4.1.1</product>
<product>phpmyadmin:4.4.2</product>
<product>phpmyadmin:4.4.3</product>
<product>phpmyadmin:4.4.4</product>
<product>phpmyadmin:4.4.5</product>
<product>phpmyadmin:4.4.6</product>
<product>phpmyadmin:4.4.6.1</product>
<product>phpmyadmin:4.4.7</product>
<product>phpmyadmin:4.4.8</product>
<product>phpmyadmin:4.4.9</product>
<product>phpmyadmin:4.4.10</product>
<product>phpmyadmin:4.4.11</product>
<product>phpmyadmin:4.4.12</product>
<product>phpmyadmin:4.4.13</product>
<product>phpmyadmin:4.4.13.1</product>
<product>phpmyadmin:4.4.14</product>
<product>phpmyadmin:4.4.14.1</product>
<product>phpmyadmin:4.4.15</product>
<product>phpmyadmin:4.4.15.1</product>
<product>phpmyadmin:4.4.15.2</product>
<product>phpmyadmin:4.4.15.3</product>
<product>phpmyadmin:4.4.15.4</product>
<product>phpmyadmin:4.4.15.5</product>
<product>phpmyadmin:4.4.15.6</product>
<product>phpmyadmin:4.4.15.7</product>
<product>phpmyadmin:4.6.0</product>
<product>phpmyadmin:4.6.1</product>
<product>phpmyadmin:4.6.2</product>
<product>phpmyadmin:4.6.3</product>
</cve>
<cve id="CVE-2016-6637" level="MEDIUM">
<product>cloud_foundry:241</product>
<product>cloud_foundry_elastic_runtime:1.6.0</product>
<product>cloud_foundry_elastic_runtime:1.6.1</product>
<product>cloud_foundry_elastic_runtime:1.6.2</product>
<product>cloud_foundry_elastic_runtime:1.6.3</product>
<product>cloud_foundry_elastic_runtime:1.6.4</product>
<product>cloud_foundry_elastic_runtime:1.6.5</product>
<product>cloud_foundry_elastic_runtime:1.6.6</product>
<product>cloud_foundry_elastic_runtime:1.6.7</product>
<product>cloud_foundry_elastic_runtime:1.6.8</product>
<product>cloud_foundry_elastic_runtime:1.6.9</product>
<product>cloud_foundry_elastic_runtime:1.6.10</product>
<product>cloud_foundry_elastic_runtime:1.6.11</product>
<product>cloud_foundry_elastic_runtime:1.6.12</product>
<product>cloud_foundry_elastic_runtime:1.6.13</product>
<product>cloud_foundry_elastic_runtime:1.6.14</product>
<product>cloud_foundry_elastic_runtime:1.6.15</product>
<product>cloud_foundry_elastic_runtime:1.6.17</product>
<product>cloud_foundry_elastic_runtime:1.6.18</product>
<product>cloud_foundry_elastic_runtime:1.6.19</product>
<product>cloud_foundry_elastic_runtime:1.6.20</product>
<product>cloud_foundry_elastic_runtime:1.6.21</product>
<product>cloud_foundry_elastic_runtime:1.6.22</product>
<product>cloud_foundry_elastic_runtime:1.6.23</product>
<product>cloud_foundry_elastic_runtime:1.6.25</product>
<product>cloud_foundry_elastic_runtime:1.6.26</product>
<product>cloud_foundry_elastic_runtime:1.6.27</product>
<product>cloud_foundry_elastic_runtime:1.6.28</product>
<product>cloud_foundry_elastic_runtime:1.6.29</product>
<product>cloud_foundry_elastic_runtime:1.6.30</product>
<product>cloud_foundry_elastic_runtime:1.6.31</product>
<product>cloud_foundry_elastic_runtime:1.6.32</product>
<product>cloud_foundry_elastic_runtime:1.6.33</product>
<product>cloud_foundry_elastic_runtime:1.6.34</product>
<product>cloud_foundry_elastic_runtime:1.6.35</product>
<product>cloud_foundry_elastic_runtime:1.6.36</product>
<product>cloud_foundry_elastic_runtime:1.6.37</product>
<product>cloud_foundry_elastic_runtime:1.6.38</product>
<product>cloud_foundry_elastic_runtime:1.6.39</product>
<product>cloud_foundry_elastic_runtime:1.7.0</product>
<product>cloud_foundry_elastic_runtime:1.7.1</product>
<product>cloud_foundry_elastic_runtime:1.7.2</product>
<product>cloud_foundry_elastic_runtime:1.7.3</product>
<product>cloud_foundry_elastic_runtime:1.7.4</product>
<product>cloud_foundry_elastic_runtime:1.7.5</product>
<product>cloud_foundry_elastic_runtime:1.7.6</product>
<product>cloud_foundry_elastic_runtime:1.7.7</product>
<product>cloud_foundry_elastic_runtime:1.7.8</product>
<product>cloud_foundry_elastic_runtime:1.7.9</product>
<product>cloud_foundry_elastic_runtime:1.7.10</product>
<product>cloud_foundry_elastic_runtime:1.7.11</product>
<product>cloud_foundry_elastic_runtime:1.7.12</product>
<product>cloud_foundry_elastic_runtime:1.7.13</product>
<product>cloud_foundry_elastic_runtime:1.7.14</product>
<product>cloud_foundry_elastic_runtime:1.7.15</product>
<product>cloud_foundry_elastic_runtime:1.7.16</product>
<product>cloud_foundry_elastic_runtime:1.7.17</product>
<product>cloud_foundry_elastic_runtime:1.7.18</product>
<product>cloud_foundry_elastic_runtime:1.7.19</product>
<product>cloud_foundry_elastic_runtime:1.7.20</product>
<product>cloud_foundry_elastic_runtime:1.8.0</product>
<product>cloud_foundry_ops_manager:1.7.0</product>
<product>cloud_foundry_ops_manager:1.7.1</product>
<product>cloud_foundry_ops_manager:1.7.2</product>
<product>cloud_foundry_ops_manager:1.7.3</product>
<product>cloud_foundry_ops_manager:1.7.4</product>
<product>cloud_foundry_ops_manager:1.7.5</product>
<product>cloud_foundry_ops_manager:1.7.6</product>
<product>cloud_foundry_ops_manager:1.7.7</product>
<product>cloud_foundry_ops_manager:1.7.8</product>
<product>cloud_foundry_ops_manager:1.7.9</product>
<product>cloud_foundry_ops_manager:1.7.10</product>
<product>cloud_foundry_ops_manager:1.7.11</product>
<product>cloud_foundry_ops_manager:1.7.12</product>
<product>cloud_foundry_ops_manager:1.8.0</product>
<product>cloud_foundry_uaa:2.3.0</product>
<product>cloud_foundry_uaa:2.3.1</product>
<product>cloud_foundry_uaa:2.4.0</product>
<product>cloud_foundry_uaa:2.5.1</product>
<product>cloud_foundry_uaa:2.6.1</product>
<product>cloud_foundry_uaa:2.7.0.2</product>
<product>cloud_foundry_uaa:2.7.0.3</product>
<product>cloud_foundry_uaa:2.7.1</product>
<product>cloud_foundry_uaa:2.7.2</product>
<product>cloud_foundry_uaa:2.7.3</product>
<product>cloud_foundry_uaa:2.7.4.6</product>
<product>cloud_foundry_uaa:3.0.0</product>
<product>cloud_foundry_uaa:3.0.1</product>
<product>cloud_foundry_uaa:3.1.0</product>
<product>cloud_foundry_uaa:3.2.0</product>
<product>cloud_foundry_uaa:3.2.1</product>
<product>cloud_foundry_uaa:3.3.0</product>
<product>cloud_foundry_uaa:3.3.0.1</product>
<product>cloud_foundry_uaa:3.4.0</product>
<product>cloud_foundry_uaa:3.4.1</product>
<product>cloud_foundry_uaa:3.4.2</product>
<product>cloud_foundry_uaa_bosh:15.0</product>
</cve>
<cve id="CVE-2016-6636" level="LOW">
<product>cloud_foundry:241</product>
<product>cloud_foundry_elastic_runtime:1.6.0</product>
<product>cloud_foundry_elastic_runtime:1.6.1</product>
<product>cloud_foundry_elastic_runtime:1.6.2</product>
<product>cloud_foundry_elastic_runtime:1.6.3</product>
<product>cloud_foundry_elastic_runtime:1.6.4</product>
<product>cloud_foundry_elastic_runtime:1.6.5</product>
<product>cloud_foundry_elastic_runtime:1.6.6</product>
<product>cloud_foundry_elastic_runtime:1.6.7</product>
<product>cloud_foundry_elastic_runtime:1.6.8</product>
<product>cloud_foundry_elastic_runtime:1.6.9</product>
<product>cloud_foundry_elastic_runtime:1.6.10</product>
<product>cloud_foundry_elastic_runtime:1.6.11</product>
<product>cloud_foundry_elastic_runtime:1.6.12</product>
<product>cloud_foundry_elastic_runtime:1.6.13</product>
<product>cloud_foundry_elastic_runtime:1.6.14</product>
<product>cloud_foundry_elastic_runtime:1.6.15</product>
<product>cloud_foundry_elastic_runtime:1.6.17</product>
<product>cloud_foundry_elastic_runtime:1.6.18</product>
<product>cloud_foundry_elastic_runtime:1.6.19</product>
<product>cloud_foundry_elastic_runtime:1.6.20</product>
<product>cloud_foundry_elastic_runtime:1.6.21</product>
<product>cloud_foundry_elastic_runtime:1.6.22</product>
<product>cloud_foundry_elastic_runtime:1.6.23</product>
<product>cloud_foundry_elastic_runtime:1.6.25</product>
<product>cloud_foundry_elastic_runtime:1.6.26</product>
<product>cloud_foundry_elastic_runtime:1.6.27</product>
<product>cloud_foundry_elastic_runtime:1.6.28</product>
<product>cloud_foundry_elastic_runtime:1.6.29</product>
<product>cloud_foundry_elastic_runtime:1.6.30</product>
<product>cloud_foundry_elastic_runtime:1.6.31</product>
<product>cloud_foundry_elastic_runtime:1.6.32</product>
<product>cloud_foundry_elastic_runtime:1.6.33</product>
<product>cloud_foundry_elastic_runtime:1.6.34</product>
<product>cloud_foundry_elastic_runtime:1.6.35</product>
<product>cloud_foundry_elastic_runtime:1.6.36</product>
<product>cloud_foundry_elastic_runtime:1.6.37</product>
<product>cloud_foundry_elastic_runtime:1.6.38</product>
<product>cloud_foundry_elastic_runtime:1.6.39</product>
<product>cloud_foundry_elastic_runtime:1.7.0</product>
<product>cloud_foundry_elastic_runtime:1.7.1</product>
<product>cloud_foundry_elastic_runtime:1.7.2</product>
<product>cloud_foundry_elastic_runtime:1.7.3</product>
<product>cloud_foundry_elastic_runtime:1.7.4</product>
<product>cloud_foundry_elastic_runtime:1.7.5</product>
<product>cloud_foundry_elastic_runtime:1.7.6</product>
<product>cloud_foundry_elastic_runtime:1.7.7</product>
<product>cloud_foundry_elastic_runtime:1.7.8</product>
<product>cloud_foundry_elastic_runtime:1.7.9</product>
<product>cloud_foundry_elastic_runtime:1.7.10</product>
<product>cloud_foundry_elastic_runtime:1.7.11</product>
<product>cloud_foundry_elastic_runtime:1.7.12</product>
<product>cloud_foundry_elastic_runtime:1.7.13</product>
<product>cloud_foundry_elastic_runtime:1.7.14</product>
<product>cloud_foundry_elastic_runtime:1.7.15</product>
<product>cloud_foundry_elastic_runtime:1.7.16</product>
<product>cloud_foundry_elastic_runtime:1.7.17</product>
<product>cloud_foundry_elastic_runtime:1.7.18</product>
<product>cloud_foundry_elastic_runtime:1.7.19</product>
<product>cloud_foundry_elastic_runtime:1.7.20</product>
<product>cloud_foundry_elastic_runtime:1.8.0</product>
<product>cloud_foundry_ops_manager:1.7.0</product>
<product>cloud_foundry_ops_manager:1.7.1</product>
<product>cloud_foundry_ops_manager:1.7.2</product>
<product>cloud_foundry_ops_manager:1.7.3</product>
<product>cloud_foundry_ops_manager:1.7.4</product>
<product>cloud_foundry_ops_manager:1.7.5</product>
<product>cloud_foundry_ops_manager:1.7.6</product>
<product>cloud_foundry_ops_manager:1.7.7</product>
<product>cloud_foundry_ops_manager:1.7.8</product>
<product>cloud_foundry_ops_manager:1.7.9</product>
<product>cloud_foundry_ops_manager:1.7.10</product>
<product>cloud_foundry_ops_manager:1.7.11</product>
<product>cloud_foundry_ops_manager:1.7.12</product>
<product>cloud_foundry_ops_manager:1.8.0</product>
<product>cloud_foundry_uaa:2.3.0</product>
<product>cloud_foundry_uaa:2.3.1</product>
<product>cloud_foundry_uaa:2.4.0</product>
<product>cloud_foundry_uaa:2.5.1</product>
<product>cloud_foundry_uaa:2.6.1</product>
<product>cloud_foundry_uaa:2.7.0.2</product>
<product>cloud_foundry_uaa:2.7.0.3</product>
<product>cloud_foundry_uaa:2.7.1</product>
<product>cloud_foundry_uaa:2.7.2</product>
<product>cloud_foundry_uaa:2.7.3</product>
<product>cloud_foundry_uaa:2.7.4.6</product>
<product>cloud_foundry_uaa:3.0.0</product>
<product>cloud_foundry_uaa:3.0.1</product>
<product>cloud_foundry_uaa:3.1.0</product>
<product>cloud_foundry_uaa:3.2.0</product>
<product>cloud_foundry_uaa:3.2.1</product>
<product>cloud_foundry_uaa:3.3.0</product>
<product>cloud_foundry_uaa:3.3.0.1</product>
<product>cloud_foundry_uaa:3.4.0</product>
<product>cloud_foundry_uaa:3.4.1</product>
<product>cloud_foundry_uaa:3.4.2</product>
<product>cloud_foundry_uaa_bosh:12.3</product>
</cve>
<cve id="CVE-2016-0519" level="MEDIUM">
<product>e-business_suite:11.5.10.2</product>
</cve>
<cve id="CVE-2016-8213" level="MEDIUM">
<product>documentum_administrator:7.0</product>
<product>documentum_administrator:7.1</product>
<product>documentum_administrator:7.2</product>
<product>documentum_capital_projects:1.9</product>
<product>documentum_capital_projects:1.10</product>
<product>documentum_taskspace:6.7</product>
<product>documentum_webtop:6.8</product>
<product>documentum_webtop:6.8.1</product>
</cve>
<cve id="CVE-2016-0199" level="MEDIUM">
<product>internet_explorer:9</product>
<product>internet_explorer:10</product>
<product>internet_explorer:11</product>
</cve>
<cve id="CVE-2016-0191" level="HIGH">
<product>edge:-</product>
</cve>
<cve id="CVE-2016-0192" level="HIGH">
<product>edge:-</product>
<product>internet_explorer:9</product>
<product>internet_explorer:10</product>
<product>internet_explorer:11</product>
</cve>
<cve id="CVE-2016-0193" level="HIGH">
<product>edge:-</product>
</cve>
<cve id="CVE-2016-0194" level="HIGH">
<product>internet_explorer:10</product>
<product>internet_explorer:11</product>
</cve>
<cve id="CVE-2016-7236" level="MEDIUM">
<product>excel:2010</product>
<product>excel_for_mac:2011</product>
<product>excel_for_mac:2016</product>
<product>sharepoint_server:2010</product>
</cve>
<cve id="CVE-2016-8212" level="MEDIUM">
<product>rsa_bsafe_crypto-j:6.2.1</product>
</cve>
<cve id="CVE-2016-0517" level="LOW">
<product>e-business_suite:11.5.10.2</product>
</cve>
<cve id="CVE-2016-4855" level="MEDIUM">
<product>adodb:5.20.5</product>
</cve>
<cve id="CVE-2016-4854" level="MEDIUM">
<product>l-04d_firmware:v10a</product>
<product>l-04d_firmware:v10b</product>
</cve>
<cve id="CVE-2016-4857" level="MEDIUM">
<product>splunk:6.2.0</product>
<product>splunk:6.2.1</product>
<product>splunk:6.2.2</product>
<product>splunk:6.2.3</product>
<product>splunk:6.2.4</product>
<product>splunk:6.2.5</product>
<product>splunk:6.2.6</product>
<product>splunk:6.2.7</product>
<product>splunk:6.2.8</product>
<product>splunk:6.2.9</product>
<product>splunk:6.2.10</product>
<product>splunk:6.3.0</product>
<product>splunk:6.3.1</product>
<product>splunk:6.3.2</product>
<product>splunk:6.3.3</product>
<product>splunk:6.3.4</product>
<product>splunk:6.3.5</product>
<product>splunk:6.4.0</product>
<product>splunk:6.4.1</product>
<product>splunk:6.4.2</product>
</cve>
<cve id="CVE-2016-4856" level="MEDIUM">
<product>splunk:6.3.0</product>
<product>splunk:6.3.0</product>
<product>splunk:6.3.1</product>
<product>splunk:6.3.1</product>
<product>splunk:6.3.2</product>
<product>splunk:6.3.2</product>
<product>splunk:6.3.3</product>
<product>splunk:6.3.3</product>
<product>splunk:6.3.4</product>
<product>splunk:6.3.4</product>
</cve>
<cve id="CVE-2016-4851" level="MEDIUM">
<product>simple_chat:-</product>
</cve>
<cve id="CVE-2016-4850" level="MEDIUM">
<product>line:4.8.2.1125</product>
</cve>
<cve id="CVE-2016-4853" level="MEDIUM">
<product>happy_wardrobe:-</product>
</cve>
<cve id="CVE-2016-4852" level="MEDIUM">
<product>yorufukurou:2.84</product>
</cve>
<cve id="CVE-2016-4859" level="MEDIUM">
<product>splunk:5.0.0</product>
<product>splunk:5.0.1</product>
<product>splunk:5.0.2</product>
<product>splunk:5.0.3</product>
<product>splunk:5.0.4</product>
<product>splunk:5.0.5</product>
<product>splunk:5.0.6</product>
<product>splunk:5.0.7</product>
<product>splunk:5.0.8</product>
<product>splunk:5.0.9</product>
<product>splunk:5.0.10</product>
<product>splunk:5.0.11</product>
<product>splunk:5.0.12</product>
<product>splunk:5.0.13</product>
<product>splunk:5.0.14</product>
<product>splunk:5.0.15</product>
<product>splunk:6.0.0</product>
<product>splunk:6.0.1</product>
<product>splunk:6.0.2</product>
<product>splunk:6.0.3</product>
<product>splunk:6.0.4</product>
<product>splunk:6.0.5</product>
<product>splunk:6.0.6</product>
<product>splunk:6.0.7</product>
<product>splunk:6.0.8</product>
<product>splunk:6.0.9</product>
<product>splunk:6.0.10</product>
<product>splunk:6.0.11</product>
<product>splunk:6.1.0</product>
<product>splunk:6.1.1</product>
<product>splunk:6.1.2</product>
<product>splunk:6.1.3</product>
<product>splunk:6.1.4</product>
<product>splunk:6.1.5</product>
<product>splunk:6.1.6</product>
<product>splunk:6.1.7</product>
<product>splunk:6.1.8</product>
<product>splunk:6.1.9</product>
<product>splunk:6.1.10</product>
<product>splunk:6.2.0</product>
<product>splunk:6.2.1</product>
<product>splunk:6.2.2</product>
<product>splunk:6.2.3</product>
<product>splunk:6.2.4</product>
<product>splunk:6.2.5</product>
<product>splunk:6.2.6</product>
<product>splunk:6.2.7</product>
<product>splunk:6.2.8</product>
<product>splunk:6.2.9</product>
<product>splunk:6.3.0</product>
<product>splunk:6.3.1</product>
<product>splunk:6.3.2</product>
<product>splunk:6.3.3</product>
<product>splunk:6.3.4</product>
<product>splunk:6.3.5</product>
<product>splunk:6.4.0</product>
<product>splunk:6.4.1</product>
<product>splunk:6.4.2</product>
</cve>
<cve id="CVE-2016-4858" level="MEDIUM">
<product>splunk:5.0.0</product>
<product>splunk:5.0.1</product>
<product>splunk:5.0.2</product>
<product>splunk:5.0.3</product>
<product>splunk:5.0.4</product>
<product>splunk:5.0.5</product>
<product>splunk:5.0.6</product>
<product>splunk:5.0.7</product>
<product>splunk:5.0.8</product>
<product>splunk:5.0.9</product>
<product>splunk:5.0.10</product>
<product>splunk:5.0.11</product>
<product>splunk:5.0.12</product>
<product>splunk:5.0.13</product>
<product>splunk:5.0.14</product>
<product>splunk:5.0.15</product>
<product>splunk:6.0.0</product>
<product>splunk:6.0.1</product>
<product>splunk:6.0.2</product>
<product>splunk:6.0.3</product>
<product>splunk:6.0.4</product>
<product>splunk:6.0.5</product>
<product>splunk:6.0.6</product>
<product>splunk:6.0.7</product>
<product>splunk:6.0.8</product>
<product>splunk:6.0.9</product>
<product>splunk:6.0.10</product>
<product>splunk:6.0.11</product>
<product>splunk:6.1.0</product>
<product>splunk:6.1.1</product>
<product>splunk:6.1.2</product>
<product>splunk:6.1.3</product>
<product>splunk:6.1.4</product>
<product>splunk:6.1.5</product>
<product>splunk:6.1.6</product>
<product>splunk:6.1.7</product>
<product>splunk:6.1.8</product>
<product>splunk:6.1.9</product>
<product>splunk:6.1.10</product>
<product>splunk:6.2.0</product>
<product>splunk:6.2.1</product>
<product>splunk:6.2.2</product>
<product>splunk:6.2.3</product>
<product>splunk:6.2.4</product>
<product>splunk:6.2.5</product>
<product>splunk:6.2.6</product>
<product>splunk:6.2.7</product>
<product>splunk:6.2.8</product>
<product>splunk:6.2.9</product>
<product>splunk:6.2.10</product>
<product>splunk:6.3.0</product>
<product>splunk:6.3.1</product>
<product>splunk:6.3.2</product>
<product>splunk:6.3.3</product>
<product>splunk:6.3.4</product>
<product>splunk:6.3.5</product>
<product>splunk:6.4.0</product>
<product>splunk:6.4.1</product>
<product>splunk:6.4.2</product>
</cve>
</cobra>
``` | /content/code_sandbox/rules/CVI-999016.xml | xml | 2016-04-15T08:41:15 | 2024-08-16T10:33:17 | Cobra | FeeiCN/Cobra | 3,133 | 1,016,066 |
```xml
/*
* This software is released under MIT license.
* The full license information can be found in LICENSE in the root directory of this project.
*/
import { html, TemplateResult } from 'lit';
import { query } from 'lit/decorators/query.js';
import {
animate,
AnimationModalEnterName,
i18n,
I18nService,
isScrollable,
HTMLAttributeTuple,
property,
reverseAnimation,
querySlot,
getElementUpdates,
} from '@cds/core/internal';
import { CdsInternalOverlay } from '@cds/core/internal-components/overlay';
import styles from './modal.element.scss';
import { CdsModalHeader } from './modal-header.element';
import { CdsModalActions } from './modal-actions.element';
/**
* Web component modal.
*
* ```typescript
* import '@cds/core/modal/register.js';
* ```
*
* ```html
* <cds-modal>
* <cds-modal-header>
* <h3 cds-text="title">My Modal</h3>
* </cds-modal-header>
* <cds-modal-content>
* <p>Lorem Ipsum</p>
* </cds-modal-content>
* <cds-modal-actions>
* <cds-button>Ok</cds-button>
* </cds-modal-actions>
* </cds-modal>
* ```
*
* @element cds-modal
* @slot
* @slot cds-modal-content
* @slot cds-modal-header
* @slot cds-modal-actions
* @event closeChange - notify when the user has clicked the close button
* @cssprop --backdrop-background - inherited from the internal overlay component
* @cssprop --layered-backdrop-background - inherited from the internal overlay component
* @cssprop --border-color
* @cssprop --border-width
* @cssprop --border-radius
* @cssprop --background
* @cssprop --box-shadow
* @cssprop --width
* @cssprop --content-overflow - set as { x, y }. take care when customizing because overflow settings can have unintended side effects.
* @cssprop --max-height - sets hard limit on height of modal
* @cssprop --tablet-max-height - sets hard limit on height of modal when on a tablet in landscape mode
*/
@animate({
hidden: {
true: reverseAnimation(AnimationModalEnterName),
false: AnimationModalEnterName,
},
})
export class CdsModal extends CdsInternalOverlay {
protected get customBumpers(): [HTMLElement, HTMLElement] {
return [this.modalHeader, this.modalFooter];
}
static get styles() {
return [...super.styles, styles];
}
@i18n() i18n = I18nService.keys.modal;
/** If false, the modal will not render the close button. */
@property({ type: Boolean })
closable = true;
/** Sets the overall height and width of the modal and icon based on value */
@property({ type: String })
size: 'default' | 'sm' | 'lg' | 'xl';
@query('.modal-body') content: HTMLElement;
@querySlot('cds-modal-header') modalHeader: CdsModalHeader;
@querySlot('cds-modal-actions') modalFooter: CdsModalActions;
protected get closeButtonAttrs(): HTMLAttributeTuple[] {
return [
['cds-layout', 'align:top'],
['slot', 'close-button'],
['aria-label', this.i18n.closeButtonAriaLabel],
['icon-size', '24'],
];
}
protected isScrollable = false;
private get modalFooterTemplate(): TemplateResult {
if (this.modalFooter) {
return html`<div cds-layout="align-stretch p-x:lg p-b:lg">
<slot name="modal-actions"></slot>
</div>`;
} else {
return html``;
}
}
protected observers: (MutationObserver | ResizeObserver)[] = [];
// modal-body requires a tab index so it can be scrolled
render() {
return html`
${this.backdropTemplate}
<div class="modal-dialog private-host" tabindex="-1" cds-layout="m:md m@md:xl">
<div cds-layout="display:screen-reader-only">${this.i18n.contentStart}</div>
<div class="modal-content" cds-layout="vertical gap:sm gap@md:lg align:stretch">
<div cds-layout="horizontal gap:sm wrap:none align:vertical-center p-x:lg p-t:lg">
<div>
<slot name="modal-header"></slot>
</div>
<div cds-layout="align:right">
<slot name="modal-header-actions"></slot>
</div>
${this.closable ? this.closeButtonTemplate : ''}
</div>
<div class="modal-body" cds-layout="p-x:lg">
<slot></slot>
</div>
${this.modalFooterTemplate}
</div>
<div cds-layout="display:screen-reader-only">${this.i18n.contentEnd}</div>
</div>
`;
}
connectedCallback() {
super.connectedCallback();
this.observers.push(getElementUpdates(this, 'hidden', () => this.setScrollableProperties()));
}
disconnectedCallback() {
super.disconnectedCallback();
this.observers.forEach(o => o.disconnect());
}
private async setScrollableProperties() {
if (this.hidden === false) {
await this.updateComplete; // wait until after render to measure if scrollable
this.isScrollable = isScrollable(this.content);
this.content.tabIndex = this.isScrollable ? 0 : -1;
this.content.ariaLabel = this.isScrollable ? this.i18n.contentBox : null;
}
}
}
``` | /content/code_sandbox/packages/core/src/modal/modal.element.ts | xml | 2016-09-29T17:24:17 | 2024-08-11T17:06:15 | clarity | vmware-archive/clarity | 6,431 | 1,251 |
```xml
import { AsyncIterableX } from '../../asynciterable/asynciterablex.js';
import { retry } from '../../asynciterable/operators/retry.js';
/**
* @ignore
*/
export function retryProto<T>(this: AsyncIterableX<T>, count = -1): AsyncIterableX<T> {
return retry<T>(count)(this);
}
AsyncIterableX.prototype.retry = retryProto;
declare module '../../asynciterable/asynciterablex' {
interface AsyncIterableX<T> {
retry: typeof retryProto;
}
}
``` | /content/code_sandbox/src/add/asynciterable-operators/retry.ts | xml | 2016-02-22T20:04:19 | 2024-08-09T18:46:41 | IxJS | ReactiveX/IxJS | 1,319 | 113 |
```xml
import Button from "@erxes/ui/src/components/Button";
import ControlLabel from "@erxes/ui/src/components/form/Label";
import FormControl from "@erxes/ui/src/components/form/Control";
import FormGroup from "@erxes/ui/src/components/form/Group";
import { INTEGRATION_KINDS } from "@erxes/ui/src/constants/integrations";
import { IntegrationMutationVariables } from "../../types";
import { ModalFooter } from "@erxes/ui/src/styles/main";
import React from "react";
import SelectBrand from "../../containers/SelectBrand";
import SelectChannels from "../../containers/SelectChannels";
import { __ } from "@erxes/ui/src/utils";
import { loadDynamicComponent } from "@erxes/ui/src/utils/core";
type CommonTypes = {
name: string;
brandId: string;
channelIds: string[];
webhookData: any;
isSubmitted: boolean;
details: any;
};
type Props = {
integrationId: string;
integrationKind: string;
name: string;
brandId: string;
channelIds: string[];
webhookData: any;
details: any;
onSubmit: (
id: string,
{ name, brandId, channelIds, details }: IntegrationMutationVariables,
callback: () => void
) => void;
closeModal: () => void;
};
class CommonFieldForm extends React.PureComponent<Props, CommonTypes> {
constructor(props: Props) {
super(props);
this.state = {
name: props.name || "",
brandId: props.brandId || "",
channelIds: props.channelIds || [],
webhookData: props.webhookData || {},
details: props.details || {},
isSubmitted: false,
};
}
renderScript = () => {
const { integrationKind } = this.props;
if (integrationKind !== INTEGRATION_KINDS.WEBHOOK) {
return null;
}
const { webhookData } = this.state;
const onChangeWebhookData = (e) => {
webhookData[e.target.name] = e.target.value;
this.setState({
webhookData: { ...webhookData },
});
};
return (
<>
<FormGroup>
<ControlLabel required={false}>Token</ControlLabel>
<FormControl
name="token"
required={false}
autoFocus={false}
defaultValue={webhookData.token}
onChange={onChangeWebhookData}
/>
</FormGroup>
<FormGroup>
<ControlLabel required={false}>Origin</ControlLabel>
<FormControl
name="origin"
required={false}
autoFocus={false}
defaultValue={webhookData.origin}
onChange={onChangeWebhookData}
/>
</FormGroup>
<FormGroup>
<ControlLabel required={false}>{__("Script")}</ControlLabel>
<FormControl
name="script"
componentclass="textarea"
required={true}
defaultValue={webhookData.script}
onChange={onChangeWebhookData}
/>
</FormGroup>
</>
);
};
render() {
const { integrationId, onSubmit, closeModal } = this.props;
const { name, brandId, channelIds, webhookData, details } = this.state;
const onBrandChange = (e) => {
this.setState({ brandId: e.target.value });
};
const onChannelChange = (values: string[]) => {
this.setState({ channelIds: values });
};
const onDetailsChange = (key: string, value: any) => {
this.setState({ details: { ...details, [key]: value } });
};
const onNameBlur = (e) => {
this.setState({ name: e.target.value });
};
const saveIntegration = (e) => {
e.preventDefault();
this.setState({ isSubmitted: true });
let data: any;
switch (this.props.integrationKind) {
case "webhook": {
data = webhookData;
break;
}
}
onSubmit(integrationId, { name, brandId, channelIds, details }, () => {
this.setState({ isSubmitted: false });
closeModal();
});
};
return (
<>
<FormGroup>
<ControlLabel required={true}>{__("Name")}</ControlLabel>
<FormControl
required={true}
defaultValue={name}
onBlur={onNameBlur}
autoFocus={true}
/>
</FormGroup>
{this.renderScript()}
{loadDynamicComponent(
"integrationDetailsForm",
{
integrationKind: this.props.integrationKind,
details: this.state.details,
onChange: onDetailsChange,
},
true
)}
<SelectBrand
isRequired={true}
defaultValue={brandId}
onChange={onBrandChange}
description={__(
"Which specific Brand does this integration belong to?"
)}
/>
<SelectChannels
defaultValue={channelIds}
isRequired={true}
onChange={onChannelChange}
/>
<ModalFooter>
<Button
btnStyle="simple"
type="button"
onClick={closeModal}
icon="times-circle"
>
Cancel
</Button>
<Button
onClick={saveIntegration}
type="submit"
btnStyle="success"
icon="check-circle"
>
{__("Save")}
</Button>
</ModalFooter>
</>
);
}
}
export default CommonFieldForm;
``` | /content/code_sandbox/packages/ui-inbox/src/settings/integrations/components/common/CommonFieldForm.tsx | xml | 2016-11-11T06:54:50 | 2024-08-16T10:26:06 | erxes | erxes/erxes | 3,479 | 1,150 |
```xml
/*
* @license Apache-2.0
*
*
*
* path_to_url
*
* Unless required by applicable law or agreed to in writing, software
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
*/
// TypeScript Version: 4.1
/**
* Computes the arcsine (in degrees) of a double-precision floating-point number.
*
* @param x - input value
* @returns arcsine (in degrees)
*
* @example
* var v = asind( 0.0 );
* // returns 0.0
*
* @example
* var v = asind( 0.5 );
* // returns ~30.0
*
* @example
* var sqrt = require( '@stdlib/math/base/special/sqrt' );
*
* var v = asindf( sqrt( 2.0 ) / 2.0 );
* // returns ~45.0
*
* @example
* var sqrt = require( '@stdlib/math/base/special/sqrt' );
*
** var v = asindf( sqrt( 3.0 ) / 2.0 );
* // returns ~60.0
*
* @example
* var v = asind( NaN );
* // returns NaN
*/
declare function asind( x: number ): number;
// EXPORTS //
export = asind;
``` | /content/code_sandbox/lib/node_modules/@stdlib/math/base/special/asind/docs/types/index.d.ts | xml | 2016-03-24T04:19:52 | 2024-08-16T09:03:19 | stdlib | stdlib-js/stdlib | 4,266 | 288 |
```xml
import { Meta } from '@storybook/react';
import { Image } from '@fluentui/react-northstar';
import ImageExampleRtl from '../../examples/components/Image/Rtl/ImageExample.rtl';
import ImageExample from '../../examples/components/Image/Types/ImageExample.shorthand';
import ImageExampleAvatar from '../../examples/components/Image/Types/ImageExampleAvatar.shorthand';
import ImageExampleCircular from '../../examples/components/Image/Variations/ImageExampleCircular';
import ImageExampleFluent from '../../examples/components/Image/Variations/ImageExampleFluid';
export default { component: Image, title: 'Image' } as Meta<typeof Image>;
export { ImageExampleRtl, ImageExample, ImageExampleAvatar, ImageExampleCircular, ImageExampleFluent };
``` | /content/code_sandbox/packages/fluentui/docs/src/vr-tests/Image/Image.stories.tsx | xml | 2016-06-06T15:03:44 | 2024-08-16T18:49:29 | fluentui | microsoft/fluentui | 18,221 | 147 |
```xml
import { Range, TextEditor } from 'vscode';
import { IDocumentManager } from '../../client/common/application/types';
export interface IMockTextEditor extends TextEditor {}
export interface IMockDocumentManager extends IDocumentManager {
changeDocument(file: string, changes: { range: Range; newText: string }[]): void;
}
``` | /content/code_sandbox/src/test/mocks/mockTypes.ts | xml | 2016-01-19T10:50:01 | 2024-08-12T21:05:24 | pythonVSCode | DonJayamanne/pythonVSCode | 2,078 | 69 |
```xml
<?xml version="1.0" encoding="UTF-8"?>
<ui version="4.0">
<class>CADtexturingControl</class>
<widget class="QDockWidget" name="CADtexturingControl">
<property name="geometry">
<rect>
<x>0</x>
<y>0</y>
<width>173</width>
<height>87</height>
</rect>
</property>
<property name="windowTitle">
<string>CADtexturingControl</string>
</property>
<widget class="QWidget" name="dockWidgetContents">
<widget class="QPushButton" name="saverendering">
<property name="enabled">
<bool>true</bool>
</property>
<property name="geometry">
<rect>
<x>40</x>
<y>10</y>
<width>71</width>
<height>23</height>
</rect>
</property>
<property name="toolTip">
<string>save rendering from the camera of the currently selected raster layer</string>
</property>
<property name="text">
<string>save view</string>
</property>
<property name="default">
<bool>false</bool>
</property>
</widget>
<widget class="QCheckBox" name="render_edges">
<property name="geometry">
<rect>
<x>40</x>
<y>40</y>
<width>101</width>
<height>17</height>
</rect>
</property>
<property name="toolTip">
<string>crease angle edge render mode</string>
</property>
<property name="text">
<string>render edges</string>
</property>
</widget>
</widget>
</widget>
<resources/>
<connections/>
</ui>
``` | /content/code_sandbox/unsupported/plugins_experimental/edit_CADtexturing/CADtexturingControl.ui | xml | 2016-11-07T00:03:21 | 2024-08-16T16:55:49 | meshlab | cnr-isti-vclab/meshlab | 4,633 | 418 |
```xml
import { CommandObject } from '../view/CommandAbstract';
export interface CommandsConfig {
/**
* Style prefix
* @default 'com-'
*/
stylePrefix?: string;
/**
* Default commands
* @default {}
*/
defaults?: Record<string, CommandObject>;
/**
* If true, stateful commands (with `run` and `stop` methods) can't be executed multiple times.
* If the command is already active, running it again will not execute the `run` method.
* @default true
*/
strict?: boolean;
}
const config: CommandsConfig = {
stylePrefix: 'com-',
defaults: {},
strict: true,
};
export default config;
``` | /content/code_sandbox/src/commands/config/config.ts | xml | 2016-01-22T00:23:19 | 2024-08-16T11:20:59 | grapesjs | GrapesJS/grapesjs | 21,687 | 156 |
```xml
import React from 'react';
type IconProps = React.SVGProps<SVGSVGElement>;
export declare const IcFolders: (props: IconProps) => React.JSX.Element;
export {};
``` | /content/code_sandbox/packages/icons/lib/icFolders.d.ts | xml | 2016-06-08T11:16:51 | 2024-08-16T14:14:27 | WebClients | ProtonMail/WebClients | 4,300 | 42 |
```xml
/**
* @license
*
* path_to_url
*
* Unless required by applicable law or agreed to in writing, software
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
*/
import { BossDataSource } from "#src/datasource/boss/frontend.js";
import { registerProvider } from "#src/datasource/default_provider.js";
registerProvider(
"boss",
(options) => new BossDataSource(options.credentialsManager),
);
``` | /content/code_sandbox/src/datasource/boss/register_default.ts | xml | 2016-05-27T02:37:25 | 2024-08-16T07:24:25 | neuroglancer | google/neuroglancer | 1,045 | 94 |
```xml
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "path_to_url">
<plist version="1.0">
<dict>
<key>ACPI</key>
<dict>
<key>DSDT</key>
<dict>
<key>Debug</key>
<false/>
<key>DropOEM_DSM</key>
<false/>
<key>Name</key>
<string>DSDT.aml</string>
<key>Patches</key>
<array>
<dict>
<key>Comment</key>
<string>change GFX0 to IGPU</string>
<key>Disabled</key>
<false/>
<key>Find</key>
<data>
R0ZYMA==
</data>
<key>Replace</key>
<data>
SUdQVQ==
</data>
</dict>
<dict>
<key>Comment</key>
<string>change EHC1 to EH01</string>
<key>Disabled</key>
<false/>
<key>Find</key>
<data>
RUhDMQ==
</data>
<key>Replace</key>
<data>
RUgwMQ==
</data>
</dict>
<dict>
<key>Comment</key>
<string>change EHC2 to EH02</string>
<key>Disabled</key>
<false/>
<key>Find</key>
<data>
RUhDMg==
</data>
<key>Replace</key>
<data>
RUgwMg==
</data>
</dict>
<dict>
<key>Comment</key>
<string>change HDAS to HDEF</string>
<key>Disabled</key>
<false/>
<key>Find</key>
<data>
SERBUw==
</data>
<key>Replace</key>
<data>
SERFRg==
</data>
</dict>
<dict>
<key>Comment</key>
<string>change SAT0 to SATA</string>
<key>Disabled</key>
<false/>
<key>Find</key>
<data>
U0FUMA==
</data>
<key>Replace</key>
<data>
U0FUQQ==
</data>
</dict>
<dict>
<key>Comment</key>
<string>change LPC to LPCB</string>
<key>Disabled</key>
<false/>
<key>Find</key>
<data>
TFBDXw==
</data>
<key>Replace</key>
<data>
TFBDQg==
</data>
</dict>
<dict>
<key>Comment</key>
<string>change HECI to IMEI</string>
<key>Disabled</key>
<false/>
<key>Find</key>
<data>
SEVDSQ==
</data>
<key>Replace</key>
<data>
SU1FSQ==
</data>
</dict>
</array>
<key>ReuseFFFF</key>
<false/>
</dict>
<key>SSDT</key>
<dict>
<key>DropOem</key>
<false/>
<key>EnableC6</key>
<true/>
<key>Generate</key>
<dict>
<key>CStates</key>
<true/>
<key>PStates</key>
<true/>
</dict>
</dict>
<key>SortedOrder</key>
<array>
<string>SSDT-XCPM.aml</string>
</array>
</dict>
<key>Boot</key>
<dict>
<key>Arguments</key>
<string>dart=0 -xcpm nvda_drv=1 abm_firstpolldelay=16000 slide=0 rootless=0 kext-dev-mode=1</string>
<key>Debug</key>
<false/>
<key>DefaultVolume</key>
<string>mac osx</string>
<key>Legacy</key>
<string>PBR</string>
<key>Secure</key>
<false/>
<key>Timeout</key>
<integer>2</integer>
<key>XMPDetection</key>
<false/>
</dict>
<key>CPU</key>
<dict>
<key>UseARTFrequency</key>
<false/>
</dict>
<key>Devices</key>
<dict>
<key>Audio</key>
<dict>
<key>Inject</key>
<string>3</string>
</dict>
<key>USB</key>
<dict>
<key>AddClockID</key>
<true/>
<key>FixOwnership</key>
<true/>
<key>Inject</key>
<true/>
</dict>
<key>UseIntelHDMI</key>
<true/>
</dict>
<key>DisableDrivers</key>
<array>
<string>Nothing</string>
</array>
<key>GUI</key>
<dict>
<key>Hide</key>
<array>
<string>Preboot</string>
</array>
<key>Language</key>
<string>zh_CN:0</string>
<key>Mouse</key>
<dict>
<key>DoubleClick</key>
<integer>500</integer>
<key>Enabled</key>
<true/>
<key>Mirror</key>
<false/>
<key>Speed</key>
<integer>8</integer>
</dict>
<key>Scan</key>
<dict>
<key>Entries</key>
<true/>
<key>Legacy</key>
<false/>
<key>Linux</key>
<false/>
<key>Tool</key>
<true/>
</dict>
<key>Theme</key>
<string>YosemiteLogin</string>
</dict>
<key>Graphics</key>
<dict>
<key>EDID</key>
<dict>
<key>Custom</key>
<data>
AP///////wAw5HoEAAAAAAAXAQSVHxF46kV1oFtVkicMUFQAAAAB
AQEBAQEBAQEBAQEBAQEBLjaAoHA4H0AwZDUANa4QAAAaAAAAAAAA
AAAAAAAAAAAAAAAAAAAA/gBMRyBEaXNwbGF5CiAgAAAA/gBMUDE0
MFdGMy1TUEwyAC8=
</data>
<key>Inject</key>
<true/>
</dict>
<key>Inject</key>
<dict>
<key>ATI</key>
<false/>
<key>Intel</key>
<true/>
<key>NVidia</key>
<false/>
</dict>
<key>NvidiaSingle</key>
<false/>
<key>ig-platform-id</key>
<string>0x16160002</string>
</dict>
<key>KernelAndKextPatches</key>
<dict>
<key>AppleIntelCPUPM</key>
<true/>
<key>AppleRTC</key>
<true/>
<key>Debug</key>
<false/>
<key>KernelCpu</key>
<false/>
<key>KernelLapic</key>
<false/>
<key>KernelPm</key>
<true/>
<key>KernelXCPM</key>
<false/>
<key>KextsToPatch</key>
<array>
<dict>
<key>Comment</key>
<string>Disable minStolenSize less or equal fStolenMemorySize assertion, 10.12.0 ( (based on Austere.J patch)</string>
<key>Disabled</key>
<false/>
<key>Find</key>
<data>
iUXIOcd2Tw==
</data>
<key>InfoPlistPatch</key>
<false/>
<key>MatchOS</key>
<string>10.12.x</string>
<key>Name</key>
<string>AppleIntelBDWGraphicsFramebuffer</string>
<key>Replace</key>
<data>
iUXIOcfrTw==
</data>
</dict>
<dict>
<key>Comment</key>
<string>AirPortBrcm4360 Patch 1</string>
<key>Disabled</key>
<false/>
<key>Find</key>
<data>
QTnEdRs=
</data>
<key>InfoPlistPatch</key>
<false/>
<key>Name</key>
<string>AirPortBrcm4360</string>
<key>Replace</key>
<data>
QTnEZpA=
</data>
</dict>
<dict>
<key>Comment</key>
<string>AirPortBrcm4360 Patch 3</string>
<key>Disabled</key>
<false/>
<key>Find</key>
<data>
g33EBHQG
</data>
<key>InfoPlistPatch</key>
<false/>
<key>Name</key>
<string>AirPortBrcm4360</string>
<key>Replace</key>
<data>
g33EBGaQ
</data>
</dict>
<dict>
<key>Comment</key>
<string>External icons patch</string>
<key>Disabled</key>
<false/>
<key>Find</key>
<data>
RXh0ZXJuYWw=
</data>
<key>InfoPlistPatch</key>
<false/>
<key>Name</key>
<string>AppleAHCIPort</string>
<key>Replace</key>
<data>
SW50ZXJuYWw=
</data>
</dict>
<dict>
<key>Comment</key>
<string>94352xyao</string>
<key>Disabled</key>
<false/>
<key>Find</key>
<data>
gflSqgAAdSk=
</data>
<key>InfoPlistPatch</key>
<false/>
<key>Name</key>
<string>AirPortBrcm4360</string>
<key>Replace</key>
<data>
gflSqgAAZpA=
</data>
</dict>
<dict>
<key>Comment</key>
<string>AirPort Extreme</string>
<key>Disabled</key>
<false/>
<key>Find</key>
<data>
axAAAHUN
</data>
<key>InfoPlistPatch</key>
<false/>
<key>Name</key>
<string>AirPortBrcm4360</string>
<key>Replace</key>
<data>
axAAAJCQ
</data>
</dict>
<dict>
<key>Comment</key>
<string>AirPortBrcm4360 Patch 2</string>
<key>Disabled</key>
<false/>
<key>Find</key>
<data>
QQ+3zTnBdQw=
</data>
<key>InfoPlistPatch</key>
<false/>
<key>Name</key>
<string>AirPortBrcm4360</string>
<key>Replace</key>
<data>
QQ+3zTnBZpA=
</data>
</dict>
</array>
</dict>
<key>RtVariables</key>
<dict>
<key>BooterConfig</key>
<string>0x28</string>
<key>CsrActiveConfig</key>
<string>0x67</string>
<key>MLB</key>
<string>C02722100CDDJWKA8</string>
<key>ROM</key>
<data>
jFVY0hhT
</data>
</dict>
<key>SMBIOS</key>
<dict>
<key>BiosReleaseDate</key>
<string>08/07/2017</string>
<key>BiosVendor</key>
<string>Apple Inc.</string>
<key>BiosVersion</key>
<string>MBA71.88Z.0171.B00.1708072210</string>
<key>Board-ID</key>
<string>Mac-937CB26E2E02BB01</string>
<key>BoardManufacturer</key>
<string>Apple Inc.</string>
<key>BoardSerialNumber</key>
<string>C02722100CDDJWKA8</string>
<key>BoardType</key>
<integer>10</integer>
<key>BoardVersion</key>
<string>1.0</string>
<key>ChassisAssetTag</key>
<string>Air-Enclosure</string>
<key>ChassisManufacturer</key>
<string>Apple Inc.</string>
<key>ChassisType</key>
<string>0x09</string>
<key>Family</key>
<string>MacBook Air</string>
<key>FirmwareFeatures</key>
<string>0xE00FE137</string>
<key>FirmwareFeaturesMask</key>
<string>0xFF1FFF3F</string>
<key>LocationInChassis</key>
<string>Part Component</string>
<key>Manufacturer</key>
<string>Apple Inc.</string>
<key>Mobile</key>
<true/>
<key>PlatformFeature</key>
<string>0xFFFF</string>
<key>ProductName</key>
<string>MacBookAir7,2</string>
<key>SerialNumber</key>
<string>C02TT2AIG940</string>
<key>SmUUID</key>
<string>D058C7C8-86A9-58C7-8843-0A2A11D21853</string>
<key>Version</key>
<string>1.0</string>
</dict>
<key>SystemParameters</key>
<dict>
<key>CustomUUID</key>
<string>951B54C7-2FE4-4F7F-9229-84EE676FD592</string>
<key>InjectKexts</key>
<string>Yes</string>
<key>InjectSystemID</key>
<true/>
</dict>
</dict>
</plist>
``` | /content/code_sandbox/Clover-Configs/Dell/Dell Inspiron 15 3543/CLOVER/config.plist | xml | 2016-11-05T04:22:54 | 2024-08-12T19:25:53 | Hackintosh-Installer-University | huangyz0918/Hackintosh-Installer-University | 3,937 | 3,725 |
```xml
<View id="root" frame="0, 0, sys.contW, sys.contH" css="{flex-direction='column'}" bg="0xeeeeee" >
<View css="{height=sys.contH/11}" bg="0x004B97">
<Text css="{flex=1, margin=10}" text="Local Image" fontSize="20" textColor="0xffffff"></Text>
</View>
<View css="{flex=1, justify-content='center', align-items='center'}">
<Image css="{height=sys.contW/4, width=sys.contW/4}" image="luaview.png"></Image>
</View>
<View css="{height=sys.contH/11}" bg="0x004B97">
<Text css="{flex=1, margin=10}" text="Http Image" fontSize="20" textColor="0xffffff"></Text>
</View>
<View css="{flex=1, justify-content='center', align-items='center'}">
<Image css="{height=sys.contW/5, width=sys.contW/5}" image="path_to_url"></Image>
</View>
<View css="{height=sys.contH/11}" bg="0x004B97">
<Text css="{flex=1, margin=10}" text="Gif Image" fontSize="20" textColor="0xffffff"></Text>
</View>
<View css="{flex=1, justify-content='center', align-items='center'}">
<Image css="{height=sys.contW/6, width=sys.contW/6}" image="path_to_url"></Image>
</View>
</View>
``` | /content/code_sandbox/IOS/luaviewEx/Example/luaviewEx/playground/widget/image.xml | xml | 2016-01-07T08:55:50 | 2024-08-16T13:34:26 | LuaViewSDK | alibaba/LuaViewSDK | 3,733 | 353 |
```xml
import { FlexItem, LeftItem } from "@erxes/ui/src/components/step/styles";
import ControlLabel from "@erxes/ui/src/components/form/Label";
import { FlexRow } from "@erxes/ui-inbox/src/settings/integrations/styles";
import FormControl from "@erxes/ui/src/components/form/Control";
import FormGroup from "@erxes/ui/src/components/form/Group";
import React from "react";
import { __ } from "coreui/utils";
type Props = {
onChange: (
name: "title" | "location" | "duration" | "cancellationPolicy",
value: string | number
) => void;
title?: string;
location?: string;
duration?: number;
cancellationPolicy?: string;
};
type State = {
title?: string;
location?: string;
duration?: number;
cancellationPolicy?: string;
};
class Event extends React.Component<Props, State> {
constructor(props: Props) {
super(props);
const { duration } = props;
this.state = {
title: "",
location: "",
duration: duration || 45,
};
}
onChangeInput = (
name: "title" | "location" | "duration" | "cancellationPolicy",
e: React.FormEvent
) => {
const val = (e.target as HTMLInputElement).value;
const value = name === "duration" ? parseInt(val, 10) : val;
this.setState({ [name]: value }, () => this.props.onChange(name, value));
};
render() {
const { title, location, duration, cancellationPolicy } = this.props;
return (
<FlexItem>
<LeftItem>
<FormGroup>
<ControlLabel>Event title</ControlLabel>
<FormControl
placeholder={__("Write here Event title") + "."}
rows={3}
value={title}
onChange={this.onChangeInput.bind(null, "title")}
/>
</FormGroup>
<FormGroup>
<ControlLabel>Event location</ControlLabel>
<FormControl
placeholder={__("Write here Event location") + "."}
rows={3}
value={location}
onChange={this.onChangeInput.bind(null, "location")}
/>
</FormGroup>
<FlexRow>
<div className="flex-item">
<FormGroup>
<ControlLabel>Duration</ControlLabel>
<FormControl
value={duration}
name="duration"
onChange={this.onChangeInput.bind(null, "duration")}
componentclass="select"
>
<option value={15}>15</option>
<option value={30}>30</option>
<option value={45}>45</option>
<option value={60}>60</option>
<option value={75}>75</option>
<option value={90}>90</option>
</FormControl>
</FormGroup>
</div>
<div className="flex-item" />
<div className="flex-item" />
</FlexRow>
<FormGroup>
<ControlLabel>Cancellation Policy</ControlLabel>
<FormControl
componentclass="textarea"
rows={3}
value={cancellationPolicy}
onChange={this.onChangeInput.bind(null, "cancellationPolicy")}
/>
</FormGroup>
</LeftItem>
</FlexItem>
);
}
}
export default Event;
``` | /content/code_sandbox/packages/plugin-calendar-ui/src/settings/components/scheduler/steps/Event.tsx | xml | 2016-11-11T06:54:50 | 2024-08-16T10:26:06 | erxes | erxes/erxes | 3,479 | 714 |
```xml
import * as compose from "lodash.flowright";
import { Alert, confirm, withProps } from "@erxes/ui/src/utils";
import {
ResolveAllMutationResponse,
ResolveAllMutationVariables,
} from "@erxes/ui-inbox/src/inbox/types";
import {
getConfig,
refetchSidebarConversationsOptions,
setConfig,
} from "@erxes/ui-inbox/src/inbox/utils";
import { mutations, queries } from "@erxes/ui-inbox/src/inbox/graphql";
import { AppConsumer } from "coreui/appContext";
import Bulk from "@erxes/ui/src/components/Bulk";
import DumbSidebar from "../../components/leftSidebar/Sidebar";
import { IBulkContentProps } from "@erxes/ui/src/components/Bulk";
import { InboxManagementActionConsumer } from "../InboxCore";
import React from "react";
import { gql } from "@apollo/client";
import { graphql } from "@apollo/client/react/hoc";
type Props = {
queryParams: any;
currentConversationId?: string;
};
type FinalProps = Props & ResolveAllMutationResponse;
const STORAGE_KEY = "erxes_additional_sidebar_config";
class Sidebar extends React.Component<FinalProps> {
toggle = ({ isOpen }: { isOpen: boolean }) => {
const config = getConfig(STORAGE_KEY);
config.showAddition = isOpen;
setConfig(STORAGE_KEY, config);
};
// resolve all conversation
resolveAll = (notifyHandler) => () => {
const message = "Are you sure you want to resolve all conversations?";
confirm(message).then(() => {
this.props
.resolveAllMutation({ variables: this.props.queryParams })
.then(() => {
if (notifyHandler) {
notifyHandler();
}
Alert.success("The conversation has been resolved!");
})
.catch((e) => {
Alert.error(e.message);
});
});
};
render() {
if (!localStorage.getItem(STORAGE_KEY)) {
setConfig(STORAGE_KEY, {
showAddition: false,
showChannels: true,
showBrands: false,
showIntegrations: false,
showTags: false,
showSegments: false,
});
}
const { currentConversationId, queryParams } = this.props;
const content = ({ bulk, toggleBulk, emptyBulk }: IBulkContentProps) => {
return (
<AppConsumer>
{({ currentUser }) => (
<InboxManagementActionConsumer>
{({ notifyConsumersOfManagementAction }) => (
<DumbSidebar
currentUser={currentUser}
currentConversationId={currentConversationId}
queryParams={queryParams}
bulk={bulk}
emptyBulk={emptyBulk}
toggleBulk={toggleBulk}
config={getConfig(STORAGE_KEY)}
toggleSidebar={this.toggle}
resolveAll={this.resolveAll(
notifyConsumersOfManagementAction
)}
/>
)}
</InboxManagementActionConsumer>
)}
</AppConsumer>
);
};
return <Bulk content={content} />;
}
}
export default withProps<Props>(
compose(
graphql<Props, ResolveAllMutationResponse, ResolveAllMutationVariables>(
gql(mutations.resolveAll),
{
name: "resolveAllMutation",
options: () => refetchSidebarConversationsOptions(),
}
)
)(Sidebar)
);
``` | /content/code_sandbox/packages/plugin-inbox-ui/src/inbox/containers/leftSidebar/Sidebar.tsx | xml | 2016-11-11T06:54:50 | 2024-08-16T10:26:06 | erxes | erxes/erxes | 3,479 | 703 |
```xml
/*
* @license Apache-2.0
*
*
*
* path_to_url
*
* Unless required by applicable law or agreed to in writing, software
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
*/
// TypeScript Version: 4.1
/// <reference types="@stdlib/types"/>
import { TypedIterator, TypedIterableIterator } from '@stdlib/types/iter';
import { ArrayLike } from '@stdlib/types/array';
import { typedndarray } from '@stdlib/types/ndarray';
// Define a union type representing both iterable and non-iterable iterators:
type Iterator<T> = TypedIterator<T> | TypedIterableIterator<T>;
/**
* Interface defining function options.
*/
interface Options {
/**
* Boolean indicating whether returned views should be read-only (default: true).
*
* ## Notes
*
* - If the input array is read-only, setting this option to `false` raises an exception.
*/
readonly?: boolean;
}
/**
* Returns an iterator which iterates over each subarray in a stack of subarrays according to a list of specified stack dimensions.
*
* @param x - input value
* @param dims - indices of dimensions to stack
* @param options - function options
* @param options.readonly - boolean indicating whether returned views should be read-only
* @returns iterator
*
* @example
* var array = require( '@stdlib/ndarray/array' );
* var ndarray2array = require( '@stdlib/ndarray/to-array' );
*
* var x = array( [ [ [ 1, 2 ], [ 3, 4 ] ], [ [ 5, 6 ], [ 7, 8 ] ] ], {
* 'dtype': 'float64'
* });
* // returns <ndarray>
*
* var iter = nditerStacks( x, [ 1, 2 ] );
*
* var v = iter.next().value;
* // returns <ndarray>
*
* var arr = ndarray2array( v );
* // returns [ [ 1, 2 ], [ 3, 4 ] ]
*
* v = iter.next().value;
* // returns <ndarray>
*
* arr = ndarray2array( v );
* // returns [ [ 5, 6 ], [ 7, 8 ] ]
*
* // ...
*/
declare function nditerStacks<T = unknown>( x: typedndarray<T>, dims: ArrayLike<number>, options?: Options ): Iterator<typedndarray<T>>;
// EXPORTS //
export = nditerStacks;
``` | /content/code_sandbox/lib/node_modules/@stdlib/ndarray/iter/stacks/docs/types/index.d.ts | xml | 2016-03-24T04:19:52 | 2024-08-16T09:03:19 | stdlib | stdlib-js/stdlib | 4,266 | 543 |
```xml
import {getSpec, Post, Returns, SpecTypes} from "@tsed/schema";
import {Controller} from "@tsed/di";
import {Pagination} from "../models/Pagination";
import {Product} from "../models/Product";
@Controller("/")
class MyController {
@Post("/")
@Returns(200, Pagination).Of(Product).Description("description")
async method(): Promise<Pagination<Product> | null> {
return null;
}
}
const spec = getSpec(MyController, {specType: SpecTypes.OPENAPI});
console.log(spec);
``` | /content/code_sandbox/docs/docs/snippets/model/get-spec-generics-controller1.ts | xml | 2016-02-21T18:38:47 | 2024-08-14T21:19:48 | tsed | tsedio/tsed | 2,817 | 115 |
```xml
import { Measure } from "../entities/measure/Measure"
import { SongProvider } from "../song/SongProvider"
export default class Quantizer {
private denominator: number
private songStore: SongProvider
private isEnabled: boolean = true
constructor(
songStore: SongProvider,
denominator: number,
isEnabled: boolean,
) {
this.songStore = songStore
// N N
// n-remnant note n
this.denominator = denominator
this.isEnabled = isEnabled
}
private get timebase() {
return this.songStore.song.timebase
}
private calc(tick: number, fn: (tick: number) => number) {
if (!this.isEnabled) {
return Math.round(tick)
}
const measureStart = Measure.getMeasureStart(
this.songStore.song.measures,
tick,
this.songStore.song.timebase,
)
const beats = this.denominator === 1 ? measureStart.numerator ?? 4 : 4
const u = (this.timebase * beats) / this.denominator
const offset = measureStart?.tick ?? 0
return fn((tick - offset) / u) * u + offset
}
round(tick: number) {
return this.calc(tick, Math.round)
}
ceil(tick: number) {
return this.calc(tick, Math.ceil)
}
floor(tick: number) {
return this.calc(tick, Math.floor)
}
get unit() {
return (this.timebase * 4) / this.denominator
}
}
``` | /content/code_sandbox/app/src/quantizer/Quantizer.ts | xml | 2016-03-06T15:19:53 | 2024-08-15T14:27:10 | signal | ryohey/signal | 1,238 | 349 |
```xml
<?xml version="1.0" encoding="UTF-8"?>
<resources>
<dimen name="activity_horizontal_margin">32.0000dp</dimen>
<dimen name="activity_vertical_margin">32.0000dp</dimen>
<dimen name="heart_anim_bezier_x_rand">80.0000dp</dimen>
<dimen name="heart_anim_init_x">100.0000dp</dimen>
<dimen name="heart_anim_init_y">50.0000dp</dimen>
<dimen name="heart_anim_length">200.0000dp</dimen>
<dimen name="heart_anim_length_rand">300.0000dp</dimen>
<dimen name="heart_anim_x_point_factor">60.0000dp</dimen>
<dimen name="heart_size_height">54.6000dp</dimen>
<dimen name="heart_size_width">65.0000dp</dimen>
<dimen name="textSize_sidebar">20.0000sp</dimen>
<dimen name="large_textSize_sidebar">64.0000sp</dimen>
<dimen name="textSize_sidebar_choose">24.0000sp</dimen>
<dimen name="textSize_sidebar_padding">40.0000sp</dimen>
<dimen name="radius_sidebar">40.0000dp</dimen>
<dimen name="ball_radius_sidebar">48.0000dp</dimen>
<dimen name="default_slider_height">72.0000dp</dimen>
<dimen name="default_slider_margin">48.0000dp</dimen>
<dimen name="default_slider_bar_height">8.0000dp</dimen>
<dimen name="default_slider_handler_radius">20.0000dp</dimen>
<dimen name="default_padding_side">48.0000dp</dimen>
<dimen name="default_preview_height">80.0000dp</dimen>
<dimen name="default_preview_image_height">72.0000dp</dimen>
<dimen name="default_slider_margin_btw_title">40.0000dp</dimen>
<dimen name="rxauto_imageview_left">-200.0000dp</dimen>
<dimen name="rxauto_imageview_Right">-600.0000dp</dimen>
<dimen name="sp_1">2.0000sp</dimen>
<dimen name="sp_2">4.0000sp</dimen>
<dimen name="sp_3">6.0000sp</dimen>
<dimen name="sp_4">8.0000sp</dimen>
<dimen name="sp_5">10.0000sp</dimen>
<dimen name="sp_6">12.0000sp</dimen>
<dimen name="sp_7">14.0000sp</dimen>
<dimen name="sp_8">16.0000sp</dimen>
<dimen name="sp_9">18.0000sp</dimen>
<dimen name="sp_10">20.0000sp</dimen>
<dimen name="sp_11">22.0000sp</dimen>
<dimen name="sp_12">24.0000sp</dimen>
<dimen name="sp_13">26.0000sp</dimen>
<dimen name="sp_14">28.0000sp</dimen>
<dimen name="sp_15">30.0000sp</dimen>
<dimen name="sp_16">32.0000sp</dimen>
<dimen name="sp_17">34.0000sp</dimen>
<dimen name="sp_18">36.0000sp</dimen>
<dimen name="sp_19">38.0000sp</dimen>
<dimen name="sp_20">40.0000sp</dimen>
<dimen name="sp_21">42.0000sp</dimen>
<dimen name="sp_22">44.0000sp</dimen>
<dimen name="sp_23">46.0000sp</dimen>
<dimen name="sp_24">48.0000sp</dimen>
<dimen name="sp_25">50.0000sp</dimen>
<dimen name="sp_26">52.0000sp</dimen>
<dimen name="sp_27">54.0000sp</dimen>
<dimen name="sp_28">56.0000sp</dimen>
<dimen name="sp_29">58.0000sp</dimen>
<dimen name="sp_30">60.0000sp</dimen>
<dimen name="sp_31">62.0000sp</dimen>
<dimen name="sp_32">64.0000sp</dimen>
<dimen name="sp_33">66.0000sp</dimen>
<dimen name="sp_34">68.0000sp</dimen>
<dimen name="sp_35">70.0000sp</dimen>
<dimen name="sp_36">72.0000sp</dimen>
<dimen name="sp_37">74.0000sp</dimen>
<dimen name="sp_38">76.0000sp</dimen>
<dimen name="sp_39">78.0000sp</dimen>
<dimen name="sp_40">80.0000sp</dimen>
<dimen name="sp_41">82.0000sp</dimen>
<dimen name="sp_42">84.0000sp</dimen>
<dimen name="sp_43">86.0000sp</dimen>
<dimen name="sp_44">88.0000sp</dimen>
<dimen name="sp_45">90.0000sp</dimen>
<dimen name="sp_46">92.0000sp</dimen>
<dimen name="sp_47">94.0000sp</dimen>
<dimen name="sp_48">96.0000sp</dimen>
<dimen name="sp_49">98.0000sp</dimen>
<dimen name="sp_50">100.0000sp</dimen>
<dimen name="sp_51">102.0000sp</dimen>
<dimen name="sp_52">104.0000sp</dimen>
<dimen name="sp_53">106.0000sp</dimen>
<dimen name="sp_54">108.0000sp</dimen>
<dimen name="sp_55">110.0000sp</dimen>
<dimen name="sp_56">112.0000sp</dimen>
<dimen name="sp_57">114.0000sp</dimen>
<dimen name="sp_58">116.0000sp</dimen>
<dimen name="sp_59">118.0000sp</dimen>
<dimen name="sp_60">120.0000sp</dimen>
<dimen name="sp_61">122.0000sp</dimen>
<dimen name="sp_62">124.0000sp</dimen>
<dimen name="sp_63">126.0000sp</dimen>
<dimen name="sp_64">128.0000sp</dimen>
<dimen name="sp_65">130.0000sp</dimen>
<dimen name="sp_66">132.0000sp</dimen>
<dimen name="sp_67">134.0000sp</dimen>
<dimen name="sp_68">136.0000sp</dimen>
<dimen name="sp_69">138.0000sp</dimen>
<dimen name="sp_70">140.0000sp</dimen>
<dimen name="sp_71">142.0000sp</dimen>
<dimen name="sp_72">144.0000sp</dimen>
<dimen name="sp_73">146.0000sp</dimen>
<dimen name="sp_74">148.0000sp</dimen>
<dimen name="sp_75">150.0000sp</dimen>
<dimen name="sp_76">152.0000sp</dimen>
<dimen name="sp_77">154.0000sp</dimen>
<dimen name="sp_78">156.0000sp</dimen>
<dimen name="sp_79">158.0000sp</dimen>
<dimen name="sp_80">160.0000sp</dimen>
<dimen name="sp_81">162.0000sp</dimen>
<dimen name="sp_82">164.0000sp</dimen>
<dimen name="sp_83">166.0000sp</dimen>
<dimen name="sp_84">176.0000sp</dimen>
<dimen name="sp_85">170.0000sp</dimen>
<dimen name="sp_86">172.0000sp</dimen>
<dimen name="sp_87">174.0000sp</dimen>
<dimen name="sp_88">176.0000sp</dimen>
<dimen name="sp_89">178.0000sp</dimen>
<dimen name="sp_90">180.0000sp</dimen>
<dimen name="sp_91">182.0000sp</dimen>
<dimen name="sp_92">184.0000sp</dimen>
<dimen name="sp_93">186.0000sp</dimen>
<dimen name="sp_94">188.0000sp</dimen>
<dimen name="sp_95">190.0000sp</dimen>
<dimen name="sp_96">192.0000sp</dimen>
<dimen name="sp_97">194.0000sp</dimen>
<dimen name="sp_98">196.0000sp</dimen>
<dimen name="sp_99">198.0000sp</dimen>
<dimen name="sp_100">200.0000sp</dimen>
<dimen name="dp_1">2.0000dp</dimen>
<dimen name="dp_2">4.0000dp</dimen>
<dimen name="dp_3">6.0000dp</dimen>
<dimen name="dp_4">8.0000dp</dimen>
<dimen name="dp_5">10.0000dp</dimen>
<dimen name="dp_6">12.0000dp</dimen>
<dimen name="dp_7">14.0000dp</dimen>
<dimen name="dp_8">16.0000dp</dimen>
<dimen name="dp_9">18.0000dp</dimen>
<dimen name="dp_10">20.0000dp</dimen>
<dimen name="dp_11">22.0000dp</dimen>
<dimen name="dp_12">24.0000dp</dimen>
<dimen name="dp_13">26.0000dp</dimen>
<dimen name="dp_14">28.0000dp</dimen>
<dimen name="dp_15">30.0000dp</dimen>
<dimen name="dp_16">32.0000dp</dimen>
<dimen name="dp_17">34.0000dp</dimen>
<dimen name="dp_18">36.0000dp</dimen>
<dimen name="dp_19">38.0000dp</dimen>
<dimen name="dp_20">40.0000dp</dimen>
<dimen name="dp_21">42.0000dp</dimen>
<dimen name="dp_22">44.0000dp</dimen>
<dimen name="dp_23">46.0000dp</dimen>
<dimen name="dp_24">48.0000dp</dimen>
<dimen name="dp_25">50.0000dp</dimen>
<dimen name="dp_26">52.0000dp</dimen>
<dimen name="dp_27">54.0000dp</dimen>
<dimen name="dp_28">56.0000dp</dimen>
<dimen name="dp_29">58.0000dp</dimen>
<dimen name="dp_30">60.0000dp</dimen>
<dimen name="dp_31">62.0000dp</dimen>
<dimen name="dp_32">64.0000dp</dimen>
<dimen name="dp_33">66.0000dp</dimen>
<dimen name="dp_34">68.0000dp</dimen>
<dimen name="dp_35">70.0000dp</dimen>
<dimen name="dp_36">72.0000dp</dimen>
<dimen name="dp_37">74.0000dp</dimen>
<dimen name="dp_38">76.0000dp</dimen>
<dimen name="dp_39">78.0000dp</dimen>
<dimen name="dp_40">80.0000dp</dimen>
<dimen name="dp_41">82.0000dp</dimen>
<dimen name="dp_42">84.0000dp</dimen>
<dimen name="dp_43">86.0000dp</dimen>
<dimen name="dp_44">88.0000dp</dimen>
<dimen name="dp_45">90.0000dp</dimen>
<dimen name="dp_46">92.0000dp</dimen>
<dimen name="dp_47">94.0000dp</dimen>
<dimen name="dp_48">96.0000dp</dimen>
<dimen name="dp_49">98.0000dp</dimen>
<dimen name="dp_50">100.0000dp</dimen>
<dimen name="dp_51">102.0000dp</dimen>
<dimen name="dp_52">104.0000dp</dimen>
<dimen name="dp_53">106.0000dp</dimen>
<dimen name="dp_54">108.0000dp</dimen>
<dimen name="dp_55">110.0000dp</dimen>
<dimen name="dp_56">112.0000dp</dimen>
<dimen name="dp_57">114.0000dp</dimen>
<dimen name="dp_58">116.0000dp</dimen>
<dimen name="dp_59">118.0000dp</dimen>
<dimen name="dp_60">120.0000dp</dimen>
<dimen name="dp_61">122.0000dp</dimen>
<dimen name="dp_62">124.0000dp</dimen>
<dimen name="dp_63">126.0000dp</dimen>
<dimen name="dp_64">128.0000dp</dimen>
<dimen name="dp_65">130.0000dp</dimen>
<dimen name="dp_66">132.0000dp</dimen>
<dimen name="dp_67">134.0000dp</dimen>
<dimen name="dp_68">136.0000dp</dimen>
<dimen name="dp_69">138.0000dp</dimen>
<dimen name="dp_70">140.0000dp</dimen>
<dimen name="dp_71">142.0000dp</dimen>
<dimen name="dp_72">144.0000dp</dimen>
<dimen name="dp_73">146.0000dp</dimen>
<dimen name="dp_74">148.0000dp</dimen>
<dimen name="dp_75">150.0000dp</dimen>
<dimen name="dp_76">152.0000dp</dimen>
<dimen name="dp_77">154.0000dp</dimen>
<dimen name="dp_78">156.0000dp</dimen>
<dimen name="dp_79">158.0000dp</dimen>
<dimen name="dp_80">160.0000dp</dimen>
<dimen name="dp_81">162.0000dp</dimen>
<dimen name="dp_82">164.0000dp</dimen>
<dimen name="dp_83">166.0000dp</dimen>
<dimen name="dp_84">176.0000dp</dimen>
<dimen name="dp_85">170.0000dp</dimen>
<dimen name="dp_86">172.0000dp</dimen>
<dimen name="dp_87">174.0000dp</dimen>
<dimen name="dp_88">176.0000dp</dimen>
<dimen name="dp_89">178.0000dp</dimen>
<dimen name="dp_90">180.0000dp</dimen>
<dimen name="dp_91">182.0000dp</dimen>
<dimen name="dp_92">184.0000dp</dimen>
<dimen name="dp_93">186.0000dp</dimen>
<dimen name="dp_94">188.0000dp</dimen>
<dimen name="dp_95">190.0000dp</dimen>
<dimen name="dp_96">192.0000dp</dimen>
<dimen name="dp_97">194.0000dp</dimen>
<dimen name="dp_98">196.0000dp</dimen>
<dimen name="dp_99">198.0000dp</dimen>
<dimen name="dp_100">200.0000dp</dimen>
<dimen name="dp_101">202.0000dp</dimen>
<dimen name="dp_102">204.0000dp</dimen>
<dimen name="dp_103">206.0000dp</dimen>
<dimen name="dp_104">208.0000dp</dimen>
<dimen name="dp_105">210.0000dp</dimen>
<dimen name="dp_106">212.0000dp</dimen>
<dimen name="dp_107">214.0000dp</dimen>
<dimen name="dp_108">216.0000dp</dimen>
<dimen name="dp_109">218.0000dp</dimen>
<dimen name="dp_110">220.0000dp</dimen>
<dimen name="dp_111">222.0000dp</dimen>
<dimen name="dp_112">224.0000dp</dimen>
<dimen name="dp_113">226.0000dp</dimen>
<dimen name="dp_114">228.0000dp</dimen>
<dimen name="dp_115">230.0000dp</dimen>
<dimen name="dp_116">232.0000dp</dimen>
<dimen name="dp_117">234.0000dp</dimen>
<dimen name="dp_118">236.0000dp</dimen>
<dimen name="dp_119">238.0000dp</dimen>
<dimen name="dp_120">240.0000dp</dimen>
<dimen name="dp_121">242.0000dp</dimen>
<dimen name="dp_122">244.0000dp</dimen>
<dimen name="dp_123">246.0000dp</dimen>
<dimen name="dp_124">248.0000dp</dimen>
<dimen name="dp_125">250.0000dp</dimen>
<dimen name="dp_126">252.0000dp</dimen>
<dimen name="dp_127">254.0000dp</dimen>
<dimen name="dp_128">256.0000dp</dimen>
<dimen name="dp_129">258.0000dp</dimen>
<dimen name="dp_130">260.0000dp</dimen>
<dimen name="dp_131">262.0000dp</dimen>
<dimen name="dp_132">264.0000dp</dimen>
<dimen name="dp_133">266.0000dp</dimen>
<dimen name="dp_134">268.0000dp</dimen>
<dimen name="dp_135">270.0000dp</dimen>
<dimen name="dp_136">272.0000dp</dimen>
<dimen name="dp_137">274.0000dp</dimen>
<dimen name="dp_138">276.0000dp</dimen>
<dimen name="dp_139">278.0000dp</dimen>
<dimen name="dp_140">280.0000dp</dimen>
<dimen name="dp_141">282.0000dp</dimen>
<dimen name="dp_142">284.0000dp</dimen>
<dimen name="dp_143">286.0000dp</dimen>
<dimen name="dp_144">288.0000dp</dimen>
<dimen name="dp_145">290.0000dp</dimen>
<dimen name="dp_146">292.0000dp</dimen>
<dimen name="dp_147">294.0000dp</dimen>
<dimen name="dp_148">296.0000dp</dimen>
<dimen name="dp_149">298.0000dp</dimen>
<dimen name="dp_150">300.0000dp</dimen>
<dimen name="dp_151">302.0000dp</dimen>
<dimen name="dp_152">304.0000dp</dimen>
<dimen name="dp_153">306.0000dp</dimen>
<dimen name="dp_154">308.0000dp</dimen>
<dimen name="dp_155">310.0000dp</dimen>
<dimen name="dp_156">312.0000dp</dimen>
<dimen name="dp_157">314.0000dp</dimen>
<dimen name="dp_158">316.0000dp</dimen>
<dimen name="dp_159">318.0000dp</dimen>
<dimen name="dp_160">320.0000dp</dimen>
<dimen name="dp_161">322.0000dp</dimen>
<dimen name="dp_162">324.0000dp</dimen>
<dimen name="dp_163">326.0000dp</dimen>
<dimen name="dp_164">328.0000dp</dimen>
<dimen name="dp_165">330.0000dp</dimen>
<dimen name="dp_166">332.0000dp</dimen>
<dimen name="dp_167">334.0000dp</dimen>
<dimen name="dp_168">336.0000dp</dimen>
<dimen name="dp_169">338.0000dp</dimen>
<dimen name="dp_170">340.0000dp</dimen>
<dimen name="dp_171">342.0000dp</dimen>
<dimen name="dp_172">344.0000dp</dimen>
<dimen name="dp_173">346.0000dp</dimen>
<dimen name="dp_174">348.0000dp</dimen>
<dimen name="dp_175">350.0000dp</dimen>
<dimen name="dp_176">352.0000dp</dimen>
<dimen name="dp_177">354.0000dp</dimen>
<dimen name="dp_178">356.0000dp</dimen>
<dimen name="dp_179">358.0000dp</dimen>
<dimen name="dp_180">360.0000dp</dimen>
<dimen name="dp_181">362.0000dp</dimen>
<dimen name="dp_182">364.0000dp</dimen>
<dimen name="dp_183">366.0000dp</dimen>
<dimen name="dp_184">376.0000dp</dimen>
<dimen name="dp_185">370.0000dp</dimen>
<dimen name="dp_186">372.0000dp</dimen>
<dimen name="dp_187">374.0000dp</dimen>
<dimen name="dp_188">376.0000dp</dimen>
<dimen name="dp_189">378.0000dp</dimen>
<dimen name="dp_190">380.0000dp</dimen>
<dimen name="dp_191">382.0000dp</dimen>
<dimen name="dp_192">384.0000dp</dimen>
<dimen name="dp_193">386.0000dp</dimen>
<dimen name="dp_194">388.0000dp</dimen>
<dimen name="dp_195">390.0000dp</dimen>
<dimen name="dp_196">392.0000dp</dimen>
<dimen name="dp_197">394.0000dp</dimen>
<dimen name="dp_198">396.0000dp</dimen>
<dimen name="dp_199">398.0000dp</dimen>
<dimen name="dp_200">400.0000dp</dimen>
<dimen name="dp_201">402.0000dp</dimen>
<dimen name="dp_202">404.0000dp</dimen>
<dimen name="dp_203">406.0000dp</dimen>
<dimen name="dp_204">408.0000dp</dimen>
<dimen name="dp_205">410.0000dp</dimen>
<dimen name="dp_206">412.0000dp</dimen>
<dimen name="dp_207">414.0000dp</dimen>
<dimen name="dp_208">416.0000dp</dimen>
<dimen name="dp_209">418.0000dp</dimen>
<dimen name="dp_210">420.0000dp</dimen>
<dimen name="dp_211">422.0000dp</dimen>
<dimen name="dp_212">424.0000dp</dimen>
<dimen name="dp_213">426.0000dp</dimen>
<dimen name="dp_214">428.0000dp</dimen>
<dimen name="dp_215">430.0000dp</dimen>
<dimen name="dp_216">432.0000dp</dimen>
<dimen name="dp_217">434.0000dp</dimen>
<dimen name="dp_218">436.0000dp</dimen>
<dimen name="dp_219">438.0000dp</dimen>
<dimen name="dp_220">440.0000dp</dimen>
<dimen name="dp_221">442.0000dp</dimen>
<dimen name="dp_222">444.0000dp</dimen>
<dimen name="dp_223">446.0000dp</dimen>
<dimen name="dp_224">448.0000dp</dimen>
<dimen name="dp_225">450.0000dp</dimen>
<dimen name="dp_226">452.0000dp</dimen>
<dimen name="dp_227">454.0000dp</dimen>
<dimen name="dp_228">456.0000dp</dimen>
<dimen name="dp_229">458.0000dp</dimen>
<dimen name="dp_230">460.0000dp</dimen>
<dimen name="dp_231">462.0000dp</dimen>
<dimen name="dp_232">464.0000dp</dimen>
<dimen name="dp_233">466.0000dp</dimen>
<dimen name="dp_234">468.0000dp</dimen>
<dimen name="dp_235">470.0000dp</dimen>
<dimen name="dp_236">472.0000dp</dimen>
<dimen name="dp_237">474.0000dp</dimen>
<dimen name="dp_238">476.0000dp</dimen>
<dimen name="dp_239">478.0000dp</dimen>
<dimen name="dp_240">480.0000dp</dimen>
<dimen name="dp_241">482.0000dp</dimen>
<dimen name="dp_242">484.0000dp</dimen>
<dimen name="dp_243">486.0000dp</dimen>
<dimen name="dp_244">488.0000dp</dimen>
<dimen name="dp_245">490.0000dp</dimen>
<dimen name="dp_246">492.0000dp</dimen>
<dimen name="dp_247">494.0000dp</dimen>
<dimen name="dp_248">496.0000dp</dimen>
<dimen name="dp_249">498.0000dp</dimen>
<dimen name="dp_250">500.0000dp</dimen>
<dimen name="dp_251">502.0000dp</dimen>
<dimen name="dp_252">504.0000dp</dimen>
<dimen name="dp_253">506.0000dp</dimen>
<dimen name="dp_254">508.0000dp</dimen>
<dimen name="dp_255">510.0000dp</dimen>
<dimen name="dp_256">512.0000dp</dimen>
<dimen name="dp_257">514.0000dp</dimen>
<dimen name="dp_258">516.0000dp</dimen>
<dimen name="dp_259">518.0000dp</dimen>
<dimen name="dp_260">520.0000dp</dimen>
<dimen name="dp_261">522.0000dp</dimen>
<dimen name="dp_262">524.0000dp</dimen>
<dimen name="dp_263">526.0000dp</dimen>
<dimen name="dp_264">528.0000dp</dimen>
<dimen name="dp_265">530.0000dp</dimen>
<dimen name="dp_266">532.0000dp</dimen>
<dimen name="dp_267">534.0000dp</dimen>
<dimen name="dp_268">536.0000dp</dimen>
<dimen name="dp_269">538.0000dp</dimen>
<dimen name="dp_270">540.0000dp</dimen>
<dimen name="dp_271">542.0000dp</dimen>
<dimen name="dp_272">544.0000dp</dimen>
<dimen name="dp_273">546.0000dp</dimen>
<dimen name="dp_274">548.0000dp</dimen>
<dimen name="dp_275">550.0000dp</dimen>
<dimen name="dp_276">552.0000dp</dimen>
<dimen name="dp_277">554.0000dp</dimen>
<dimen name="dp_278">556.0000dp</dimen>
<dimen name="dp_279">558.0000dp</dimen>
<dimen name="dp_280">560.0000dp</dimen>
<dimen name="dp_281">562.0000dp</dimen>
<dimen name="dp_282">564.0000dp</dimen>
<dimen name="dp_283">566.0000dp</dimen>
<dimen name="dp_284">576.0000dp</dimen>
<dimen name="dp_285">570.0000dp</dimen>
<dimen name="dp_286">572.0000dp</dimen>
<dimen name="dp_287">574.0000dp</dimen>
<dimen name="dp_288">576.0000dp</dimen>
<dimen name="dp_289">578.0000dp</dimen>
<dimen name="dp_290">580.0000dp</dimen>
<dimen name="dp_291">582.0000dp</dimen>
<dimen name="dp_292">584.0000dp</dimen>
<dimen name="dp_293">586.0000dp</dimen>
<dimen name="dp_294">588.0000dp</dimen>
<dimen name="dp_295">590.0000dp</dimen>
<dimen name="dp_296">592.0000dp</dimen>
<dimen name="dp_297">594.0000dp</dimen>
<dimen name="dp_298">596.0000dp</dimen>
<dimen name="dp_299">598.0000dp</dimen>
<dimen name="dp_300">600.0000dp</dimen>
<dimen name="dp_301">602.0000dp</dimen>
<dimen name="dp_302">604.0000dp</dimen>
<dimen name="dp_303">606.0000dp</dimen>
<dimen name="dp_304">608.0000dp</dimen>
<dimen name="dp_305">610.0000dp</dimen>
<dimen name="dp_306">612.0000dp</dimen>
<dimen name="dp_307">614.0000dp</dimen>
<dimen name="dp_308">616.0000dp</dimen>
<dimen name="dp_309">618.0000dp</dimen>
<dimen name="dp_310">620.0000dp</dimen>
<dimen name="dp_311">622.0000dp</dimen>
<dimen name="dp_312">624.0000dp</dimen>
<dimen name="dp_313">626.0000dp</dimen>
<dimen name="dp_314">628.0000dp</dimen>
<dimen name="dp_315">630.0000dp</dimen>
<dimen name="dp_316">632.0000dp</dimen>
<dimen name="dp_317">634.0000dp</dimen>
<dimen name="dp_318">636.0000dp</dimen>
<dimen name="dp_319">638.0000dp</dimen>
<dimen name="dp_320">640.0000dp</dimen>
<dimen name="dp_321">642.0000dp</dimen>
<dimen name="dp_322">644.0000dp</dimen>
<dimen name="dp_323">646.0000dp</dimen>
<dimen name="dp_324">648.0000dp</dimen>
<dimen name="dp_325">650.0000dp</dimen>
<dimen name="dp_326">652.0000dp</dimen>
<dimen name="dp_327">654.0000dp</dimen>
<dimen name="dp_328">656.0000dp</dimen>
<dimen name="dp_329">658.0000dp</dimen>
<dimen name="dp_330">660.0000dp</dimen>
<dimen name="dp_331">662.0000dp</dimen>
<dimen name="dp_332">664.0000dp</dimen>
<dimen name="dp_333">666.0000dp</dimen>
<dimen name="dp_334">668.0000dp</dimen>
<dimen name="dp_335">670.0000dp</dimen>
<dimen name="dp_336">672.0000dp</dimen>
<dimen name="dp_337">674.0000dp</dimen>
<dimen name="dp_338">676.0000dp</dimen>
<dimen name="dp_339">678.0000dp</dimen>
<dimen name="dp_340">680.0000dp</dimen>
<dimen name="dp_341">682.0000dp</dimen>
<dimen name="dp_342">684.0000dp</dimen>
<dimen name="dp_343">686.0000dp</dimen>
<dimen name="dp_344">688.0000dp</dimen>
<dimen name="dp_345">690.0000dp</dimen>
<dimen name="dp_346">692.0000dp</dimen>
<dimen name="dp_347">694.0000dp</dimen>
<dimen name="dp_348">696.0000dp</dimen>
<dimen name="dp_349">698.0000dp</dimen>
<dimen name="dp_350">700.0000dp</dimen>
<dimen name="dp_351">702.0000dp</dimen>
<dimen name="dp_352">704.0000dp</dimen>
<dimen name="dp_353">706.0000dp</dimen>
<dimen name="dp_354">708.0000dp</dimen>
<dimen name="dp_355">710.0000dp</dimen>
<dimen name="dp_356">712.0000dp</dimen>
<dimen name="dp_357">714.0000dp</dimen>
<dimen name="dp_358">716.0000dp</dimen>
<dimen name="dp_359">718.0000dp</dimen>
<dimen name="dp_360">720.0000dp</dimen>
<dimen name="dp_361">722.0000dp</dimen>
<dimen name="dp_362">724.0000dp</dimen>
<dimen name="dp_363">726.0000dp</dimen>
<dimen name="dp_364">728.0000dp</dimen>
<dimen name="dp_365">730.0000dp</dimen>
<dimen name="dp_366">732.0000dp</dimen>
<dimen name="dp_367">734.0000dp</dimen>
<dimen name="dp_368">736.0000dp</dimen>
<dimen name="dp_369">738.0000dp</dimen>
<dimen name="dp_370">740.0000dp</dimen>
<dimen name="dp_371">742.0000dp</dimen>
<dimen name="dp_372">744.0000dp</dimen>
<dimen name="dp_373">746.0000dp</dimen>
<dimen name="dp_374">748.0000dp</dimen>
<dimen name="dp_375">750.0000dp</dimen>
<dimen name="dp_376">752.0000dp</dimen>
<dimen name="dp_377">754.0000dp</dimen>
<dimen name="dp_378">756.0000dp</dimen>
<dimen name="dp_379">758.0000dp</dimen>
<dimen name="dp_380">760.0000dp</dimen>
<dimen name="dp_381">762.0000dp</dimen>
<dimen name="dp_382">764.0000dp</dimen>
<dimen name="dp_383">766.0000dp</dimen>
<dimen name="dp_384">776.0000dp</dimen>
<dimen name="dp_385">770.0000dp</dimen>
<dimen name="dp_386">772.0000dp</dimen>
<dimen name="dp_387">774.0000dp</dimen>
<dimen name="dp_388">776.0000dp</dimen>
<dimen name="dp_389">778.0000dp</dimen>
<dimen name="dp_390">780.0000dp</dimen>
<dimen name="dp_391">782.0000dp</dimen>
<dimen name="dp_392">784.0000dp</dimen>
<dimen name="dp_393">786.0000dp</dimen>
<dimen name="dp_394">788.0000dp</dimen>
<dimen name="dp_395">790.0000dp</dimen>
<dimen name="dp_396">792.0000dp</dimen>
<dimen name="dp_397">794.0000dp</dimen>
<dimen name="dp_398">796.0000dp</dimen>
<dimen name="dp_399">798.0000dp</dimen>
<dimen name="dp_400">800.0000dp</dimen>
<dimen name="dp_401">802.0000dp</dimen>
<dimen name="dp_402">804.0000dp</dimen>
<dimen name="dp_403">806.0000dp</dimen>
<dimen name="dp_404">808.0000dp</dimen>
<dimen name="dp_405">810.0000dp</dimen>
<dimen name="dp_406">812.0000dp</dimen>
<dimen name="dp_407">814.0000dp</dimen>
<dimen name="dp_408">816.0000dp</dimen>
<dimen name="dp_409">818.0000dp</dimen>
<dimen name="dp_410">820.0000dp</dimen>
<dimen name="dp_411">822.0000dp</dimen>
<dimen name="dp_412">824.0000dp</dimen>
<dimen name="dp_413">826.0000dp</dimen>
<dimen name="dp_414">828.0000dp</dimen>
<dimen name="dp_415">830.0000dp</dimen>
<dimen name="dp_416">832.0000dp</dimen>
<dimen name="dp_417">834.0000dp</dimen>
<dimen name="dp_418">836.0000dp</dimen>
<dimen name="dp_419">838.0000dp</dimen>
<dimen name="dp_420">840.0000dp</dimen>
<dimen name="dp_421">842.0000dp</dimen>
<dimen name="dp_422">844.0000dp</dimen>
<dimen name="dp_423">846.0000dp</dimen>
<dimen name="dp_424">848.0000dp</dimen>
<dimen name="dp_425">850.0000dp</dimen>
<dimen name="dp_426">852.0000dp</dimen>
<dimen name="dp_427">854.0000dp</dimen>
<dimen name="dp_428">856.0000dp</dimen>
<dimen name="dp_429">858.0000dp</dimen>
<dimen name="dp_430">860.0000dp</dimen>
<dimen name="dp_431">862.0000dp</dimen>
<dimen name="dp_432">864.0000dp</dimen>
<dimen name="dp_433">866.0000dp</dimen>
<dimen name="dp_434">868.0000dp</dimen>
<dimen name="dp_435">870.0000dp</dimen>
<dimen name="dp_436">872.0000dp</dimen>
<dimen name="dp_437">874.0000dp</dimen>
<dimen name="dp_438">876.0000dp</dimen>
<dimen name="dp_439">878.0000dp</dimen>
<dimen name="dp_440">880.0000dp</dimen>
<dimen name="dp_441">882.0000dp</dimen>
<dimen name="dp_442">884.0000dp</dimen>
<dimen name="dp_443">886.0000dp</dimen>
<dimen name="dp_444">888.0000dp</dimen>
<dimen name="dp_445">890.0000dp</dimen>
<dimen name="dp_446">892.0000dp</dimen>
<dimen name="dp_447">894.0000dp</dimen>
<dimen name="dp_448">896.0000dp</dimen>
<dimen name="dp_449">898.0000dp</dimen>
<dimen name="dp_450">900.0000dp</dimen>
<dimen name="dp_451">902.0000dp</dimen>
<dimen name="dp_452">904.0000dp</dimen>
<dimen name="dp_453">906.0000dp</dimen>
<dimen name="dp_454">908.0000dp</dimen>
<dimen name="dp_455">910.0000dp</dimen>
<dimen name="dp_456">912.0000dp</dimen>
<dimen name="dp_457">914.0000dp</dimen>
<dimen name="dp_458">916.0000dp</dimen>
<dimen name="dp_459">918.0000dp</dimen>
<dimen name="dp_460">920.0000dp</dimen>
<dimen name="dp_461">922.0000dp</dimen>
<dimen name="dp_462">924.0000dp</dimen>
<dimen name="dp_463">926.0000dp</dimen>
<dimen name="dp_464">928.0000dp</dimen>
<dimen name="dp_465">930.0000dp</dimen>
<dimen name="dp_466">932.0000dp</dimen>
<dimen name="dp_467">934.0000dp</dimen>
<dimen name="dp_468">936.0000dp</dimen>
<dimen name="dp_469">938.0000dp</dimen>
<dimen name="dp_470">940.0000dp</dimen>
<dimen name="dp_471">942.0000dp</dimen>
<dimen name="dp_472">944.0000dp</dimen>
<dimen name="dp_473">946.0000dp</dimen>
<dimen name="dp_474">948.0000dp</dimen>
<dimen name="dp_475">950.0000dp</dimen>
<dimen name="dp_476">952.0000dp</dimen>
<dimen name="dp_477">954.0000dp</dimen>
<dimen name="dp_478">956.0000dp</dimen>
<dimen name="dp_479">958.0000dp</dimen>
<dimen name="dp_480">960.0000dp</dimen>
<dimen name="dp_481">962.0000dp</dimen>
<dimen name="dp_482">964.0000dp</dimen>
<dimen name="dp_483">966.0000dp</dimen>
<dimen name="dp_484">976.0000dp</dimen>
<dimen name="dp_485">970.0000dp</dimen>
<dimen name="dp_486">972.0000dp</dimen>
<dimen name="dp_487">974.0000dp</dimen>
<dimen name="dp_488">976.0000dp</dimen>
<dimen name="dp_489">978.0000dp</dimen>
<dimen name="dp_490">980.0000dp</dimen>
<dimen name="dp_491">982.0000dp</dimen>
<dimen name="dp_492">984.0000dp</dimen>
<dimen name="dp_493">986.0000dp</dimen>
<dimen name="dp_494">988.0000dp</dimen>
<dimen name="dp_495">990.0000dp</dimen>
<dimen name="dp_496">992.0000dp</dimen>
<dimen name="dp_497">994.0000dp</dimen>
<dimen name="dp_498">996.0000dp</dimen>
<dimen name="dp_499">998.0000dp</dimen>
<dimen name="dp_500">1000.0000dp</dimen>
<dimen name="dp_501">1002.0000dp</dimen>
<dimen name="dp_502">1004.0000dp</dimen>
<dimen name="dp_503">1006.0000dp</dimen>
<dimen name="dp_504">1008.0000dp</dimen>
<dimen name="dp_505">1010.0000dp</dimen>
<dimen name="dp_506">1012.0000dp</dimen>
<dimen name="dp_507">1014.0000dp</dimen>
<dimen name="dp_508">1016.0000dp</dimen>
<dimen name="dp_509">1018.0000dp</dimen>
<dimen name="dp_510">1020.0000dp</dimen>
<dimen name="dp_511">1022.0000dp</dimen>
<dimen name="dp_512">1024.0000dp</dimen>
<dimen name="dp_513">1026.0000dp</dimen>
<dimen name="dp_514">1028.0000dp</dimen>
<dimen name="dp_515">1030.0000dp</dimen>
<dimen name="dp_516">1032.0000dp</dimen>
<dimen name="dp_517">1034.0000dp</dimen>
<dimen name="dp_518">1036.0000dp</dimen>
<dimen name="dp_519">1038.0000dp</dimen>
<dimen name="dp_520">1040.0000dp</dimen>
<dimen name="dp_521">1042.0000dp</dimen>
<dimen name="dp_522">1044.0000dp</dimen>
<dimen name="dp_523">1046.0000dp</dimen>
<dimen name="dp_524">1048.0000dp</dimen>
<dimen name="dp_525">1050.0000dp</dimen>
<dimen name="dp_526">1052.0000dp</dimen>
<dimen name="dp_527">1054.0000dp</dimen>
<dimen name="dp_528">1056.0000dp</dimen>
<dimen name="dp_529">1058.0000dp</dimen>
<dimen name="dp_530">1060.0000dp</dimen>
<dimen name="dp_531">1062.0000dp</dimen>
<dimen name="dp_532">1064.0000dp</dimen>
<dimen name="dp_533">1066.0000dp</dimen>
<dimen name="dp_534">1068.0000dp</dimen>
<dimen name="dp_535">1070.0000dp</dimen>
<dimen name="dp_536">1072.0000dp</dimen>
<dimen name="dp_537">1074.0000dp</dimen>
<dimen name="dp_538">1076.0000dp</dimen>
<dimen name="dp_539">1078.0000dp</dimen>
<dimen name="dp_540">1080.0000dp</dimen>
<dimen name="dp_541">1082.0000dp</dimen>
<dimen name="dp_542">1084.0000dp</dimen>
<dimen name="dp_543">1086.0000dp</dimen>
<dimen name="dp_544">1088.0000dp</dimen>
<dimen name="dp_545">1090.0000dp</dimen>
<dimen name="dp_546">1092.0000dp</dimen>
<dimen name="dp_547">1094.0000dp</dimen>
<dimen name="dp_548">1096.0000dp</dimen>
<dimen name="dp_549">1098.0000dp</dimen>
<dimen name="dp_550">1100.0000dp</dimen>
<dimen name="dp_551">1102.0000dp</dimen>
<dimen name="dp_552">1104.0000dp</dimen>
<dimen name="dp_553">1106.0000dp</dimen>
<dimen name="dp_554">1108.0000dp</dimen>
<dimen name="dp_555">1110.0000dp</dimen>
<dimen name="dp_556">1112.0000dp</dimen>
<dimen name="dp_557">1114.0000dp</dimen>
<dimen name="dp_558">1116.0000dp</dimen>
<dimen name="dp_559">1118.0000dp</dimen>
<dimen name="dp_560">1120.0000dp</dimen>
<dimen name="dp_561">1122.0000dp</dimen>
<dimen name="dp_562">1124.0000dp</dimen>
<dimen name="dp_563">1126.0000dp</dimen>
<dimen name="dp_564">1128.0000dp</dimen>
<dimen name="dp_565">1130.0000dp</dimen>
<dimen name="dp_566">1132.0000dp</dimen>
<dimen name="dp_567">1134.0000dp</dimen>
<dimen name="dp_568">1136.0000dp</dimen>
<dimen name="dp_569">1138.0000dp</dimen>
<dimen name="dp_570">1140.0000dp</dimen>
<dimen name="dp_571">1142.0000dp</dimen>
<dimen name="dp_572">1144.0000dp</dimen>
<dimen name="dp_573">1146.0000dp</dimen>
<dimen name="dp_574">1148.0000dp</dimen>
<dimen name="dp_575">1150.0000dp</dimen>
<dimen name="dp_576">1152.0000dp</dimen>
<dimen name="dp_577">1154.0000dp</dimen>
<dimen name="dp_578">1156.0000dp</dimen>
<dimen name="dp_579">1158.0000dp</dimen>
<dimen name="dp_580">1160.0000dp</dimen>
<dimen name="dp_581">1162.0000dp</dimen>
<dimen name="dp_582">1164.0000dp</dimen>
<dimen name="dp_583">1166.0000dp</dimen>
<dimen name="dp_584">1176.0000dp</dimen>
<dimen name="dp_585">1170.0000dp</dimen>
<dimen name="dp_586">1172.0000dp</dimen>
<dimen name="dp_587">1174.0000dp</dimen>
<dimen name="dp_588">1176.0000dp</dimen>
<dimen name="dp_589">1178.0000dp</dimen>
<dimen name="dp_590">1180.0000dp</dimen>
<dimen name="dp_591">1182.0000dp</dimen>
<dimen name="dp_592">1184.0000dp</dimen>
<dimen name="dp_593">1186.0000dp</dimen>
<dimen name="dp_594">1188.0000dp</dimen>
<dimen name="dp_595">1190.0000dp</dimen>
<dimen name="dp_596">1192.0000dp</dimen>
<dimen name="dp_597">1194.0000dp</dimen>
<dimen name="dp_598">1196.0000dp</dimen>
<dimen name="dp_599">1198.0000dp</dimen>
<dimen name="dp_600">1200.0000dp</dimen>
<dimen name="dp_601">1202.0000dp</dimen>
<dimen name="dp_602">1204.0000dp</dimen>
<dimen name="dp_603">1206.0000dp</dimen>
<dimen name="dp_604">1208.0000dp</dimen>
<dimen name="dp_605">1210.0000dp</dimen>
<dimen name="dp_606">1212.0000dp</dimen>
<dimen name="dp_607">1214.0000dp</dimen>
<dimen name="dp_608">1216.0000dp</dimen>
<dimen name="dp_609">1218.0000dp</dimen>
<dimen name="dp_610">1220.0000dp</dimen>
<dimen name="dp_611">1222.0000dp</dimen>
<dimen name="dp_612">1224.0000dp</dimen>
<dimen name="dp_613">1226.0000dp</dimen>
<dimen name="dp_614">1228.0000dp</dimen>
<dimen name="dp_615">1230.0000dp</dimen>
<dimen name="dp_616">1232.0000dp</dimen>
<dimen name="dp_617">1234.0000dp</dimen>
<dimen name="dp_618">1236.0000dp</dimen>
<dimen name="dp_619">1238.0000dp</dimen>
<dimen name="dp_620">1240.0000dp</dimen>
<dimen name="dp_621">1242.0000dp</dimen>
<dimen name="dp_622">1244.0000dp</dimen>
<dimen name="dp_623">1246.0000dp</dimen>
<dimen name="dp_624">1248.0000dp</dimen>
<dimen name="dp_625">1250.0000dp</dimen>
<dimen name="dp_626">1252.0000dp</dimen>
<dimen name="dp_627">1254.0000dp</dimen>
<dimen name="dp_628">1256.0000dp</dimen>
<dimen name="dp_629">1258.0000dp</dimen>
<dimen name="dp_630">1260.0000dp</dimen>
<dimen name="dp_631">1262.0000dp</dimen>
<dimen name="dp_632">1264.0000dp</dimen>
<dimen name="dp_633">1266.0000dp</dimen>
<dimen name="dp_634">1268.0000dp</dimen>
<dimen name="dp_635">1270.0000dp</dimen>
<dimen name="dp_636">1272.0000dp</dimen>
<dimen name="dp_637">1274.0000dp</dimen>
<dimen name="dp_638">1276.0000dp</dimen>
<dimen name="dp_639">1278.0000dp</dimen>
<dimen name="dp_640">1280.0000dp</dimen>
<dimen name="dp_641">1282.0000dp</dimen>
<dimen name="dp_642">1284.0000dp</dimen>
<dimen name="dp_643">1286.0000dp</dimen>
<dimen name="dp_644">1288.0000dp</dimen>
<dimen name="dp_645">1290.0000dp</dimen>
<dimen name="dp_646">1292.0000dp</dimen>
<dimen name="dp_647">1294.0000dp</dimen>
<dimen name="dp_648">1296.0000dp</dimen>
<dimen name="dp_649">1298.0000dp</dimen>
<dimen name="dp_650">1300.0000dp</dimen>
<dimen name="dp_651">1302.0000dp</dimen>
<dimen name="dp_652">1304.0000dp</dimen>
<dimen name="dp_653">1306.0000dp</dimen>
<dimen name="dp_654">1308.0000dp</dimen>
<dimen name="dp_655">1310.0000dp</dimen>
<dimen name="dp_656">1312.0000dp</dimen>
<dimen name="dp_657">1314.0000dp</dimen>
<dimen name="dp_658">1316.0000dp</dimen>
<dimen name="dp_659">1318.0000dp</dimen>
<dimen name="dp_660">1320.0000dp</dimen>
<dimen name="dp_661">1322.0000dp</dimen>
<dimen name="dp_662">1324.0000dp</dimen>
<dimen name="dp_663">1326.0000dp</dimen>
<dimen name="dp_664">1328.0000dp</dimen>
<dimen name="dp_665">1330.0000dp</dimen>
<dimen name="dp_666">1332.0000dp</dimen>
<dimen name="dp_667">1334.0000dp</dimen>
<dimen name="dp_668">1336.0000dp</dimen>
<dimen name="dp_669">1338.0000dp</dimen>
<dimen name="dp_670">1340.0000dp</dimen>
<dimen name="dp_671">1342.0000dp</dimen>
<dimen name="dp_672">1344.0000dp</dimen>
<dimen name="dp_673">1346.0000dp</dimen>
<dimen name="dp_674">1348.0000dp</dimen>
<dimen name="dp_675">1350.0000dp</dimen>
<dimen name="dp_676">1352.0000dp</dimen>
<dimen name="dp_677">1354.0000dp</dimen>
<dimen name="dp_678">1356.0000dp</dimen>
<dimen name="dp_679">1358.0000dp</dimen>
<dimen name="dp_680">1360.0000dp</dimen>
<dimen name="dp_681">1362.0000dp</dimen>
<dimen name="dp_682">1364.0000dp</dimen>
<dimen name="dp_683">1366.0000dp</dimen>
<dimen name="dp_684">1376.0000dp</dimen>
<dimen name="dp_685">1370.0000dp</dimen>
<dimen name="dp_686">1372.0000dp</dimen>
<dimen name="dp_687">1374.0000dp</dimen>
<dimen name="dp_688">1376.0000dp</dimen>
<dimen name="dp_689">1378.0000dp</dimen>
<dimen name="dp_690">1380.0000dp</dimen>
<dimen name="dp_691">1382.0000dp</dimen>
<dimen name="dp_692">1384.0000dp</dimen>
<dimen name="dp_693">1386.0000dp</dimen>
<dimen name="dp_694">1388.0000dp</dimen>
<dimen name="dp_695">1390.0000dp</dimen>
<dimen name="dp_696">1392.0000dp</dimen>
<dimen name="dp_697">1394.0000dp</dimen>
<dimen name="dp_698">1396.0000dp</dimen>
<dimen name="dp_699">1398.0000dp</dimen>
<dimen name="dp_700">1400.0000dp</dimen>
<dimen name="dp_701">1402.0000dp</dimen>
<dimen name="dp_702">1404.0000dp</dimen>
<dimen name="dp_703">1406.0000dp</dimen>
<dimen name="dp_704">1408.0000dp</dimen>
<dimen name="dp_705">1410.0000dp</dimen>
<dimen name="dp_706">1412.0000dp</dimen>
<dimen name="dp_707">1414.0000dp</dimen>
<dimen name="dp_708">1416.0000dp</dimen>
<dimen name="dp_709">1418.0000dp</dimen>
<dimen name="dp_710">1420.0000dp</dimen>
<dimen name="dp_711">1422.0000dp</dimen>
<dimen name="dp_712">1424.0000dp</dimen>
<dimen name="dp_713">1426.0000dp</dimen>
<dimen name="dp_714">1428.0000dp</dimen>
<dimen name="dp_715">1430.0000dp</dimen>
<dimen name="dp_716">1432.0000dp</dimen>
<dimen name="dp_717">1434.0000dp</dimen>
<dimen name="dp_718">1436.0000dp</dimen>
<dimen name="dp_719">1438.0000dp</dimen>
<dimen name="dp_720">1440.0000dp</dimen>
<dimen name="dp_721">1442.0000dp</dimen>
<dimen name="dp_722">1444.0000dp</dimen>
<dimen name="dp_723">1446.0000dp</dimen>
<dimen name="dp_724">1448.0000dp</dimen>
<dimen name="dp_725">1450.0000dp</dimen>
<dimen name="dp_726">1452.0000dp</dimen>
<dimen name="dp_727">1454.0000dp</dimen>
<dimen name="dp_728">1456.0000dp</dimen>
<dimen name="dp_729">1458.0000dp</dimen>
<dimen name="dp_730">1460.0000dp</dimen>
<dimen name="dp_731">1462.0000dp</dimen>
<dimen name="dp_732">1464.0000dp</dimen>
<dimen name="dp_733">1466.0000dp</dimen>
<dimen name="dp_734">1468.0000dp</dimen>
<dimen name="dp_735">1470.0000dp</dimen>
<dimen name="dp_736">1472.0000dp</dimen>
<dimen name="dp_737">1474.0000dp</dimen>
<dimen name="dp_738">1476.0000dp</dimen>
<dimen name="dp_739">1478.0000dp</dimen>
<dimen name="dp_740">1480.0000dp</dimen>
<dimen name="dp_741">1482.0000dp</dimen>
<dimen name="dp_742">1484.0000dp</dimen>
<dimen name="dp_743">1486.0000dp</dimen>
<dimen name="dp_744">1488.0000dp</dimen>
<dimen name="dp_745">1490.0000dp</dimen>
<dimen name="dp_746">1492.0000dp</dimen>
<dimen name="dp_747">1494.0000dp</dimen>
<dimen name="dp_748">1496.0000dp</dimen>
<dimen name="dp_749">1498.0000dp</dimen>
<dimen name="dp_750">1500.0000dp</dimen>
<dimen name="dp_751">1502.0000dp</dimen>
<dimen name="dp_752">1504.0000dp</dimen>
<dimen name="dp_753">1506.0000dp</dimen>
<dimen name="dp_754">1508.0000dp</dimen>
<dimen name="dp_755">1510.0000dp</dimen>
<dimen name="dp_756">1512.0000dp</dimen>
<dimen name="dp_757">1514.0000dp</dimen>
<dimen name="dp_758">1516.0000dp</dimen>
<dimen name="dp_759">1518.0000dp</dimen>
<dimen name="dp_760">1520.0000dp</dimen>
<dimen name="dp_761">1522.0000dp</dimen>
<dimen name="dp_762">1524.0000dp</dimen>
<dimen name="dp_763">1526.0000dp</dimen>
<dimen name="dp_764">1528.0000dp</dimen>
<dimen name="dp_765">1530.0000dp</dimen>
<dimen name="dp_766">1532.0000dp</dimen>
<dimen name="dp_767">1534.0000dp</dimen>
<dimen name="dp_768">1536.0000dp</dimen>
<dimen name="dp_769">1538.0000dp</dimen>
<dimen name="dp_770">1540.0000dp</dimen>
<dimen name="dp_771">1542.0000dp</dimen>
<dimen name="dp_772">1544.0000dp</dimen>
<dimen name="dp_773">1546.0000dp</dimen>
<dimen name="dp_774">1548.0000dp</dimen>
<dimen name="dp_775">1550.0000dp</dimen>
<dimen name="dp_776">1552.0000dp</dimen>
<dimen name="dp_777">1554.0000dp</dimen>
<dimen name="dp_778">1556.0000dp</dimen>
<dimen name="dp_779">1558.0000dp</dimen>
<dimen name="dp_780">1560.0000dp</dimen>
<dimen name="dp_781">1562.0000dp</dimen>
<dimen name="dp_782">1564.0000dp</dimen>
<dimen name="dp_783">1566.0000dp</dimen>
<dimen name="dp_784">1576.0000dp</dimen>
<dimen name="dp_785">1570.0000dp</dimen>
<dimen name="dp_786">1572.0000dp</dimen>
<dimen name="dp_787">1574.0000dp</dimen>
<dimen name="dp_788">1576.0000dp</dimen>
<dimen name="dp_789">1578.0000dp</dimen>
<dimen name="dp_790">1580.0000dp</dimen>
<dimen name="dp_791">1582.0000dp</dimen>
<dimen name="dp_792">1584.0000dp</dimen>
<dimen name="dp_793">1586.0000dp</dimen>
<dimen name="dp_794">1588.0000dp</dimen>
<dimen name="dp_795">1590.0000dp</dimen>
<dimen name="dp_796">1592.0000dp</dimen>
<dimen name="dp_797">1594.0000dp</dimen>
<dimen name="dp_798">1596.0000dp</dimen>
<dimen name="dp_799">1598.0000dp</dimen>
<dimen name="dp_800">1600.0000dp</dimen>
<dimen name="dp_801">1602.0000dp</dimen>
<dimen name="dp_802">1604.0000dp</dimen>
<dimen name="dp_803">1606.0000dp</dimen>
<dimen name="dp_804">1608.0000dp</dimen>
<dimen name="dp_805">1610.0000dp</dimen>
<dimen name="dp_806">1612.0000dp</dimen>
<dimen name="dp_807">1614.0000dp</dimen>
<dimen name="dp_808">1616.0000dp</dimen>
<dimen name="dp_809">1618.0000dp</dimen>
<dimen name="dp_810">1620.0000dp</dimen>
<dimen name="dp_811">1622.0000dp</dimen>
<dimen name="dp_812">1624.0000dp</dimen>
<dimen name="dp_813">1626.0000dp</dimen>
<dimen name="dp_814">1628.0000dp</dimen>
<dimen name="dp_815">1630.0000dp</dimen>
<dimen name="dp_816">1632.0000dp</dimen>
<dimen name="dp_817">1634.0000dp</dimen>
<dimen name="dp_818">1636.0000dp</dimen>
<dimen name="dp_819">1638.0000dp</dimen>
<dimen name="dp_820">1640.0000dp</dimen>
<dimen name="dp_821">1642.0000dp</dimen>
<dimen name="dp_822">1644.0000dp</dimen>
<dimen name="dp_823">1646.0000dp</dimen>
<dimen name="dp_824">1648.0000dp</dimen>
<dimen name="dp_825">1650.0000dp</dimen>
<dimen name="dp_826">1652.0000dp</dimen>
<dimen name="dp_827">1654.0000dp</dimen>
<dimen name="dp_828">1656.0000dp</dimen>
<dimen name="dp_829">1658.0000dp</dimen>
<dimen name="dp_830">1660.0000dp</dimen>
<dimen name="dp_831">1662.0000dp</dimen>
<dimen name="dp_832">1664.0000dp</dimen>
<dimen name="dp_833">1666.0000dp</dimen>
<dimen name="dp_834">1668.0000dp</dimen>
<dimen name="dp_835">1670.0000dp</dimen>
<dimen name="dp_836">1672.0000dp</dimen>
<dimen name="dp_837">1674.0000dp</dimen>
<dimen name="dp_838">1676.0000dp</dimen>
<dimen name="dp_839">1678.0000dp</dimen>
<dimen name="dp_840">1680.0000dp</dimen>
<dimen name="dp_841">1682.0000dp</dimen>
<dimen name="dp_842">1684.0000dp</dimen>
<dimen name="dp_843">1686.0000dp</dimen>
<dimen name="dp_844">1688.0000dp</dimen>
<dimen name="dp_845">1690.0000dp</dimen>
<dimen name="dp_846">1692.0000dp</dimen>
<dimen name="dp_847">1694.0000dp</dimen>
<dimen name="dp_848">1696.0000dp</dimen>
<dimen name="dp_849">1698.0000dp</dimen>
<dimen name="dp_850">1700.0000dp</dimen>
<dimen name="dp_851">1702.0000dp</dimen>
<dimen name="dp_852">1704.0000dp</dimen>
<dimen name="dp_853">1706.0000dp</dimen>
<dimen name="dp_854">1708.0000dp</dimen>
<dimen name="dp_855">1710.0000dp</dimen>
<dimen name="dp_856">1712.0000dp</dimen>
<dimen name="dp_857">1714.0000dp</dimen>
<dimen name="dp_858">1716.0000dp</dimen>
<dimen name="dp_859">1718.0000dp</dimen>
<dimen name="dp_860">1720.0000dp</dimen>
<dimen name="dp_861">1722.0000dp</dimen>
<dimen name="dp_862">1724.0000dp</dimen>
<dimen name="dp_863">1726.0000dp</dimen>
<dimen name="dp_864">1728.0000dp</dimen>
<dimen name="dp_865">1730.0000dp</dimen>
<dimen name="dp_866">1732.0000dp</dimen>
<dimen name="dp_867">1734.0000dp</dimen>
<dimen name="dp_868">1736.0000dp</dimen>
<dimen name="dp_869">1738.0000dp</dimen>
<dimen name="dp_870">1740.0000dp</dimen>
<dimen name="dp_871">1742.0000dp</dimen>
<dimen name="dp_872">1744.0000dp</dimen>
<dimen name="dp_873">1746.0000dp</dimen>
<dimen name="dp_874">1748.0000dp</dimen>
<dimen name="dp_875">1750.0000dp</dimen>
<dimen name="dp_876">1752.0000dp</dimen>
<dimen name="dp_877">1754.0000dp</dimen>
<dimen name="dp_878">1756.0000dp</dimen>
<dimen name="dp_879">1758.0000dp</dimen>
<dimen name="dp_880">1760.0000dp</dimen>
<dimen name="dp_881">1762.0000dp</dimen>
<dimen name="dp_882">1764.0000dp</dimen>
<dimen name="dp_883">1766.0000dp</dimen>
<dimen name="dp_884">1776.0000dp</dimen>
<dimen name="dp_885">1770.0000dp</dimen>
<dimen name="dp_886">1772.0000dp</dimen>
<dimen name="dp_887">1774.0000dp</dimen>
<dimen name="dp_888">1776.0000dp</dimen>
<dimen name="dp_889">1778.0000dp</dimen>
<dimen name="dp_890">1780.0000dp</dimen>
<dimen name="dp_891">1782.0000dp</dimen>
<dimen name="dp_892">1784.0000dp</dimen>
<dimen name="dp_893">1786.0000dp</dimen>
<dimen name="dp_894">1788.0000dp</dimen>
<dimen name="dp_895">1790.0000dp</dimen>
<dimen name="dp_896">1792.0000dp</dimen>
<dimen name="dp_897">1794.0000dp</dimen>
<dimen name="dp_898">1796.0000dp</dimen>
<dimen name="dp_899">1798.0000dp</dimen>
<dimen name="dp_900">1800.0000dp</dimen>
<dimen name="dp_901">1802.0000dp</dimen>
<dimen name="dp_902">1804.0000dp</dimen>
<dimen name="dp_903">1806.0000dp</dimen>
<dimen name="dp_904">1808.0000dp</dimen>
<dimen name="dp_905">1810.0000dp</dimen>
<dimen name="dp_906">1812.0000dp</dimen>
<dimen name="dp_907">1814.0000dp</dimen>
<dimen name="dp_908">1816.0000dp</dimen>
<dimen name="dp_909">1818.0000dp</dimen>
<dimen name="dp_910">1820.0000dp</dimen>
<dimen name="dp_911">1822.0000dp</dimen>
<dimen name="dp_912">1824.0000dp</dimen>
<dimen name="dp_913">1826.0000dp</dimen>
<dimen name="dp_914">1828.0000dp</dimen>
<dimen name="dp_915">1830.0000dp</dimen>
<dimen name="dp_916">1832.0000dp</dimen>
<dimen name="dp_917">1834.0000dp</dimen>
<dimen name="dp_918">1836.0000dp</dimen>
<dimen name="dp_919">1838.0000dp</dimen>
<dimen name="dp_920">1840.0000dp</dimen>
<dimen name="dp_921">1842.0000dp</dimen>
<dimen name="dp_922">1844.0000dp</dimen>
<dimen name="dp_923">1846.0000dp</dimen>
<dimen name="dp_924">1848.0000dp</dimen>
<dimen name="dp_925">1850.0000dp</dimen>
<dimen name="dp_926">1852.0000dp</dimen>
<dimen name="dp_927">1854.0000dp</dimen>
<dimen name="dp_928">1856.0000dp</dimen>
<dimen name="dp_929">1858.0000dp</dimen>
<dimen name="dp_930">1860.0000dp</dimen>
<dimen name="dp_931">1862.0000dp</dimen>
<dimen name="dp_932">1864.0000dp</dimen>
<dimen name="dp_933">1866.0000dp</dimen>
<dimen name="dp_934">1868.0000dp</dimen>
<dimen name="dp_935">1870.0000dp</dimen>
<dimen name="dp_936">1872.0000dp</dimen>
<dimen name="dp_937">1874.0000dp</dimen>
<dimen name="dp_938">1876.0000dp</dimen>
<dimen name="dp_939">1878.0000dp</dimen>
<dimen name="dp_940">1880.0000dp</dimen>
<dimen name="dp_941">1882.0000dp</dimen>
<dimen name="dp_942">1884.0000dp</dimen>
<dimen name="dp_943">1886.0000dp</dimen>
<dimen name="dp_944">1888.0000dp</dimen>
<dimen name="dp_945">1890.0000dp</dimen>
<dimen name="dp_946">1892.0000dp</dimen>
<dimen name="dp_947">1894.0000dp</dimen>
<dimen name="dp_948">1896.0000dp</dimen>
<dimen name="dp_949">1898.0000dp</dimen>
<dimen name="dp_950">1900.0000dp</dimen>
<dimen name="dp_951">1902.0000dp</dimen>
<dimen name="dp_952">1904.0000dp</dimen>
<dimen name="dp_953">1906.0000dp</dimen>
<dimen name="dp_954">1908.0000dp</dimen>
<dimen name="dp_955">1910.0000dp</dimen>
<dimen name="dp_956">1912.0000dp</dimen>
<dimen name="dp_957">1914.0000dp</dimen>
<dimen name="dp_958">1916.0000dp</dimen>
<dimen name="dp_959">1918.0000dp</dimen>
<dimen name="dp_960">1920.0000dp</dimen>
<dimen name="dp_961">1922.0000dp</dimen>
<dimen name="dp_962">1924.0000dp</dimen>
<dimen name="dp_963">1926.0000dp</dimen>
<dimen name="dp_964">1928.0000dp</dimen>
<dimen name="dp_965">1930.0000dp</dimen>
<dimen name="dp_966">1932.0000dp</dimen>
<dimen name="dp_967">1934.0000dp</dimen>
<dimen name="dp_968">1936.0000dp</dimen>
<dimen name="dp_969">1938.0000dp</dimen>
<dimen name="dp_970">1940.0000dp</dimen>
<dimen name="dp_971">1942.0000dp</dimen>
<dimen name="dp_972">1944.0000dp</dimen>
<dimen name="dp_973">1946.0000dp</dimen>
<dimen name="dp_974">1948.0000dp</dimen>
<dimen name="dp_975">1950.0000dp</dimen>
<dimen name="dp_976">1952.0000dp</dimen>
<dimen name="dp_977">1954.0000dp</dimen>
<dimen name="dp_978">1956.0000dp</dimen>
<dimen name="dp_979">1958.0000dp</dimen>
<dimen name="dp_980">1960.0000dp</dimen>
<dimen name="dp_981">1962.0000dp</dimen>
<dimen name="dp_982">1964.0000dp</dimen>
<dimen name="dp_983">1966.0000dp</dimen>
<dimen name="dp_984">1976.0000dp</dimen>
<dimen name="dp_985">1970.0000dp</dimen>
<dimen name="dp_986">1972.0000dp</dimen>
<dimen name="dp_987">1974.0000dp</dimen>
<dimen name="dp_988">1976.0000dp</dimen>
<dimen name="dp_989">1978.0000dp</dimen>
<dimen name="dp_990">1980.0000dp</dimen>
<dimen name="dp_991">1982.0000dp</dimen>
<dimen name="dp_992">1984.0000dp</dimen>
<dimen name="dp_993">1986.0000dp</dimen>
<dimen name="dp_994">1988.0000dp</dimen>
<dimen name="dp_995">1990.0000dp</dimen>
<dimen name="dp_996">1992.0000dp</dimen>
<dimen name="dp_997">1994.0000dp</dimen>
<dimen name="dp_998">1996.0000dp</dimen>
<dimen name="dp_999">1998.0000dp</dimen>
<dimen name="dp_1000">2000.0000dp</dimen>
</resources>
``` | /content/code_sandbox/RxUI/src/main/res/values-sw720dp/dimens.xml | xml | 2016-09-24T09:30:45 | 2024-08-16T09:54:41 | RxTool | Tamsiree/RxTool | 12,242 | 20,813 |
```xml
import fluxString from 'src/flux/helpers/fluxString'
describe('Flux.helpers.fluxString', () => {
;[
{
js: ``,
flux: `""`,
},
{
js: `ab_cd`,
flux: `"ab_cd"`,
},
{
js: '\r\n\t"\\',
flux: `"\\r\\n\\t\\"\\\\"`,
name: '\\r\\n\\t"\\',
},
{
js: '${\u03A9$',
flux: '"\\${\u03A9$"',
},
].forEach(({js, flux, name}) =>
it(`creates flux sring from "${name ? name : JSON.stringify(js)}"`, () => {
expect(fluxString(js)).toEqual(flux)
})
)
})
``` | /content/code_sandbox/ui/test/flux/helpers/fluxString.test.ts | xml | 2016-08-24T23:28:56 | 2024-08-13T19:50:03 | chronograf | influxdata/chronograf | 1,494 | 180 |
```xml
<?xml version="1.0" encoding="utf-8"?><!--
~
~
~ Permission is hereby granted, free of charge, to any person obtaining a copy
~ of this software and associated documentation files (the "Software"), to deal
~ in the Software without restriction, including without limitation the rights
~ to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
~ copies of the Software, and to permit persons to whom the Software is
~ furnished to do so, subject to the following conditions:
~
~ The above copyright notice and this permission notice shall be included in all
~ copies or substantial portions of the Software.
~
~ THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
~ IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
~ FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
~ AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
~ LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
~ OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
~ SOFTWARE.
-->
<layer-list xmlns:android="path_to_url">
<item android:drawable="@drawable/mi_ic_next" />
<item android:drawable="@drawable/mi_ic_finish" />
</layer-list>
``` | /content/code_sandbox/library/src/main/res/drawable/mi_ic_next_finish.xml | xml | 2016-02-18T21:20:47 | 2024-07-30T10:09:54 | material-intro | janheinrichmerker/material-intro | 1,737 | 306 |
```xml
import Link from "next/link";
export default function Home() {
return (
<ul>
<li>
<Link href="/a">/a (Pages Router)</Link>
</li>
<li>
<Link href="/b">b (App Router)</Link>
</li>
</ul>
);
}
``` | /content/code_sandbox/examples/custom-server/pages/index.tsx | xml | 2016-10-05T23:32:51 | 2024-08-16T19:44:30 | next.js | vercel/next.js | 124,056 | 73 |
```xml
import { isProtonDocument } from '@proton/shared/lib/helpers/mimetype';
import type { Api } from '@proton/shared/lib/interfaces';
import { ExperimentGroup, Features, measureFeaturePerformance } from '../../../utils/telemetry';
import type {
DownloadCallbacks,
DownloadStreamControls,
GetChildrenCallback,
LinkDownload,
LogCallback,
OnContainsDocumentCallback,
OnInitCallback,
OnProgressCallback,
OnSignatureIssueCallback,
} from '../interface';
import ArchiveGenerator from './archiveGenerator';
import ConcurrentIterator from './concurrentIterator';
import { FolderTreeLoader } from './downloadLinkFolder';
import type { NestedLinkDownload } from './interface';
/**
* initDownloadLinks prepares controls to download archive of passed `links`.
* All links are in the root of the generated archive.
*/
export default function initDownloadLinks(
links: LinkDownload[],
callbacks: DownloadCallbacks,
log: LogCallback,
isNewFolderTreeAlgorithmEnabled: boolean,
api: Api,
options?: { virusScan?: boolean }
): DownloadStreamControls {
const folderLoaders: Map<String, FolderTreeLoader> = new Map();
const concurrentIterator = new ConcurrentIterator();
const archiveGenerator = new ArchiveGenerator();
const measureTotalSizeComputation = measureFeaturePerformance(
api,
Features.totalSizeComputation,
isNewFolderTreeAlgorithmEnabled ? ExperimentGroup.treatment : ExperimentGroup.control
);
const cancel = () => {
Array.from(folderLoaders.values()).forEach((folderLoader) => folderLoader.cancel());
archiveGenerator.cancel();
concurrentIterator.cancel();
measureTotalSizeComputation.clear();
};
const start = () => {
measureTotalSizeComputation.start();
// To get link into progresses right away so potentially loader can be displayed.
callbacks.onProgress?.(
links.map(({ linkId }) => linkId),
0
);
loadTotalSize(
links,
folderLoaders,
log,
callbacks.getChildren,
isNewFolderTreeAlgorithmEnabled,
callbacks.onInit,
callbacks.onSignatureIssue,
callbacks.onProgress,
callbacks.onContainsDocument
)
.then(({ linkSizes }) => {
measureTotalSizeComputation.end({ quantity: Object.keys(linkSizes).length });
})
.catch((err: Error) => {
log(`initDownloadLinks => loadTotalSize failed: ${err}`);
callbacks.onError?.(err);
cancel();
});
const linksIterator = iterateAllLinks(links, folderLoaders, callbacks.onContainsDocument);
const linksWithStreamsIterator = concurrentIterator.iterate(linksIterator, callbacks, log, options);
archiveGenerator
.writeLinks(linksWithStreamsIterator)
.then(() => {
callbacks.onFinish?.();
})
.catch((err: Error) => {
log(`initDownloadLinks => archiveGenerator failed: ${err}`);
callbacks.onError?.(err);
cancel();
});
return archiveGenerator.stream;
};
return {
start,
pause: () => concurrentIterator.pause(),
resume: () => concurrentIterator.resume(),
cancel,
};
}
function loadTotalSize(
links: LinkDownload[],
folderLoaders: Map<String, FolderTreeLoader>,
log: LogCallback,
getChildren: GetChildrenCallback,
isNewFolderTreeAlgorithmEnabled: boolean,
onInit?: OnInitCallback,
onSignatureIssue?: OnSignatureIssueCallback,
onProgress?: OnProgressCallback,
onContainsDocument?: OnContainsDocumentCallback
) {
const sizePromises = links.map(async (link) => {
// Proton Documents are skipped, so let's set them as 0 size
if (isProtonDocument(link.mimeType)) {
return { size: 0, linkSizes: { [link.linkId]: 0 } };
}
if (link.isFile) {
return { size: link.size, linkSizes: Object.fromEntries([[link.linkId, link.size]]) };
}
const folderLoader = new FolderTreeLoader(link, log, isNewFolderTreeAlgorithmEnabled);
folderLoaders.set(link.shareId + link.linkId, folderLoader);
const result = await folderLoader.load(getChildren, onSignatureIssue, onProgress, onContainsDocument);
result.linkSizes[link.linkId] = result.size;
return result;
});
return Promise.all(sizePromises).then((results) => {
const size = results.reduce((total, { size }) => total + size, 0);
const linkSizes = results.reduce((sum, { linkSizes }) => ({ ...sum, ...linkSizes }), {});
onInit?.(size, linkSizes);
return { size, linkSizes };
});
}
async function* iterateAllLinks(
links: LinkDownload[],
folderLoaders: Map<String, FolderTreeLoader>,
onContainsDocument?: OnContainsDocumentCallback
): AsyncGenerator<NestedLinkDownload> {
for (const link of links) {
// If this is removed, remove it in `loadTotalSize` as well.
if (isProtonDocument(link.mimeType)) {
await onContainsDocument?.(new AbortController().signal);
continue;
}
yield {
parentLinkIds: [],
parentPath: [],
...link,
};
if (!link.isFile) {
const f = folderLoaders.get(link.shareId + link.linkId) as FolderTreeLoader;
for await (const childLink of f.iterateAllChildren()) {
yield {
...childLink,
parentPath: [link.name, ...childLink.parentPath],
};
}
}
}
}
``` | /content/code_sandbox/applications/drive/src/app/store/_downloads/download/downloadLinks.ts | xml | 2016-06-08T11:16:51 | 2024-08-16T14:14:27 | WebClients | ProtonMail/WebClients | 4,300 | 1,183 |
```xml
import * as React from 'react'
import * as Path from 'path'
import { Dispatcher } from '../dispatcher'
import {
initGitRepository,
createCommit,
getStatus,
getAuthorIdentity,
getRepositoryType,
RepositoryType,
} from '../../lib/git'
import { sanitizedRepositoryName } from './sanitized-repository-name'
import { TextBox } from '../lib/text-box'
import { Button } from '../lib/button'
import { Row } from '../lib/row'
import { Checkbox, CheckboxValue } from '../lib/checkbox'
import { writeDefaultReadme } from './write-default-readme'
import { Select } from '../lib/select'
import { writeGitDescription } from '../../lib/git/description'
import { getGitIgnoreNames, writeGitIgnore } from './gitignores'
import { writeGitAttributes } from './git-attributes'
import { getDefaultDir, setDefaultDir } from '../lib/default-dir'
import { Dialog, DialogContent, DialogFooter, DialogError } from '../dialog'
import { LinkButton } from '../lib/link-button'
import { PopupType } from '../../models/popup'
import { Ref } from '../lib/ref'
import { enableReadmeOverwriteWarning } from '../../lib/feature-flag'
import { OkCancelButtonGroup } from '../dialog/ok-cancel-button-group'
import { showOpenDialog } from '../main-process-proxy'
import { pathExists } from '../lib/path-exists'
import { mkdir } from 'fs/promises'
import { directoryExists } from '../../lib/directory-exists'
import { FoldoutType } from '../../lib/app-state'
import { join } from 'path'
import { isTopMostDialog } from '../dialog/is-top-most'
import { InputError } from '../lib/input-description/input-error'
import { InputWarning } from '../lib/input-description/input-warning'
/** The sentinel value used to indicate no gitignore should be used. */
const NoGitIgnoreValue = 'None'
/** The sentinel value used to indicate no license should be used. */
name: 'None',
featured: false,
body: '',
hidden: false,
}
/** Is the path a git repository? */
export const isGitRepository = async (path: string) => {
const type = await getRepositoryType(path).catch(e => {
log.error(`Unable to determine repository type`, e)
return { kind: 'missing' } as RepositoryType
})
if (type.kind === 'unsafe') {
// If the path is considered unsafe by Git we won't be able to
// verify that it's a repository (or worktree). So we'll fall back to this
// naive approximation.
return directoryExists(join(path, '.git'))
}
return type.kind !== 'missing'
}
interface ICreateRepositoryProps {
readonly dispatcher: Dispatcher
readonly onDismissed: () => void
/** Prefills path input so user doesn't have to. */
readonly initialPath?: string
/** Whether the dialog is the top most in the dialog stack */
readonly isTopMost: boolean
}
interface ICreateRepositoryState {
readonly path: string | null
readonly name: string
readonly description: string
/** Is the given path able to be written to? */
readonly isValidPath: boolean | null
/** Is the given path already a repository? */
readonly isRepository: boolean
/** Should the repository be created with a default README? */
readonly createWithReadme: boolean
/** Is the repository currently in the process of being created? */
readonly creating: boolean
/** The names for the available gitignores. */
readonly gitIgnoreNames: ReadonlyArray<string> | null
/** The gitignore to include in the repository. */
readonly gitIgnore: string
/** The available licenses. */
/** The license to include in the repository. */
readonly license: string
/**
* Whether or not a README.md file already exists in the
* directory that may be overwritten by initializing with
* a new README.md.
*/
readonly readMeExists: boolean
}
/** The Create New Repository component. */
export class CreateRepository extends React.Component<
ICreateRepositoryProps,
ICreateRepositoryState
> {
private checkIsTopMostDialog = isTopMostDialog(
() => {
this.updateReadMeExists(this.state.path, this.state.name)
window.addEventListener('focus', this.onWindowFocus)
},
() => {
window.removeEventListener('focus', this.onWindowFocus)
}
)
public constructor(props: ICreateRepositoryProps) {
super(props)
const path = this.props.initialPath ? this.props.initialPath : null
const name = this.props.initialPath
? sanitizedRepositoryName(Path.basename(this.props.initialPath))
: ''
this.state = {
path,
name,
description: '',
createWithReadme: false,
creating: false,
gitIgnoreNames: null,
gitIgnore: NoGitIgnoreValue,
licenses: null,
isValidPath: null,
isRepository: false,
readMeExists: false,
}
if (path === null) {
this.initializePath()
}
}
public async componentDidMount() {
this.checkIsTopMostDialog(this.props.isTopMost)
const gitIgnoreNames = await getGitIgnoreNames()
this.setState({ gitIgnoreNames, licenses })
const path = this.state.path ?? (await getDefaultDir())
this.updateIsRepository(path, this.state.name)
this.updateReadMeExists(path, this.state.name)
}
public componentDidUpdate(): void {
this.checkIsTopMostDialog(this.props.isTopMost)
}
public componentWillUnmount(): void {
this.checkIsTopMostDialog(false)
}
private initializePath = async () => {
const path = await getDefaultDir()
this.setState(s => (s.path === null ? { path } : null))
}
private onPathChanged = async (path: string) => {
this.setState({ path, isValidPath: null, isRepository: false })
this.updateIsRepository(path, this.state.name)
this.updateReadMeExists(path, this.state.name)
}
private onNameChanged = (name: string) => {
const { path } = this.state
this.setState({ name })
if (path === null) {
return
}
this.updateIsRepository(path, name)
this.updateReadMeExists(this.state.path, name)
}
private async updateIsRepository(path: string, name: string) {
const fullPath = Path.join(path, sanitizedRepositoryName(name))
const isRepository = await isGitRepository(fullPath)
// Only update isRepository if the path is still the same one we were using
// to check whether it looked like a repository.
this.setState(state =>
state.path === path && state.name === name ? { isRepository } : null
)
}
private onDescriptionChanged = (description: string) => {
this.setState({ description })
}
private showFilePicker = async () => {
const path = await showOpenDialog({
properties: ['createDirectory', 'openDirectory'],
})
if (path === null) {
return
}
this.setState({ path, isRepository: false })
this.updateIsRepository(path, this.state.name)
}
private async updateReadMeExists(path: string | null, name: string) {
if (!enableReadmeOverwriteWarning() || path === null) {
return
}
const fullPath = Path.join(path, sanitizedRepositoryName(name), 'README.md')
const readMeExists = await pathExists(fullPath)
// Only update readMeExists if the path is still the same
this.setState(state => (state.path === path ? { readMeExists } : null))
}
private resolveRepositoryRoot = async (): Promise<string | null> => {
const currentPath = this.state.path
if (currentPath === null) {
return null
}
if (this.props.initialPath && this.props.initialPath === currentPath) {
// if the user provided an initial path and didn't change it, we should
// validate it is an existing path and use that for the repository
try {
await mkdir(currentPath, { recursive: true })
return currentPath
} catch {}
}
return Path.join(currentPath, sanitizedRepositoryName(this.state.name))
}
private createRepository = async () => {
const fullPath = await this.resolveRepositoryRoot()
if (fullPath === null) {
// Shouldn't be able to get here with a null full path, but if you did,
// display error.
this.setState({ isValidPath: true })
return
}
try {
await mkdir(fullPath, { recursive: true })
this.setState({ isValidPath: true })
} catch (e) {
if (e.code === 'EACCES' && e.errno === -13) {
return this.setState({ isValidPath: false })
}
log.error(
`createRepository: the directory at ${fullPath} is not valid`,
e
)
return this.props.dispatcher.postError(e)
}
this.setState({ creating: true })
try {
await initGitRepository(fullPath)
} catch (e) {
this.setState({ creating: false })
log.error(
`createRepository: unable to initialize a Git repository at ${fullPath}`,
e
)
return this.props.dispatcher.postError(e)
}
const repositories = await this.props.dispatcher.addRepositories([fullPath])
if (repositories.length < 1) {
return
}
const repository = repositories[0]
if (this.state.createWithReadme) {
try {
await writeDefaultReadme(
fullPath,
this.state.name,
this.state.description
)
} catch (e) {
log.error(`createRepository: unable to write README at ${fullPath}`, e)
this.props.dispatcher.postError(e)
}
}
const gitIgnore = this.state.gitIgnore
if (gitIgnore !== NoGitIgnoreValue) {
try {
await writeGitIgnore(fullPath, gitIgnore)
} catch (e) {
log.error(
`createRepository: unable to write .gitignore file at ${fullPath}`,
e
)
this.props.dispatcher.postError(e)
}
}
const description = this.state.description
if (description) {
try {
await writeGitDescription(fullPath, description)
} catch (e) {
log.error(
`createRepository: unable to write .git/description file at ${fullPath}`,
e
)
this.props.dispatcher.postError(e)
}
}
const licenseName =
const license = (this.state.licenses || []).find(
l => l.name === licenseName
)
if (license) {
try {
const author = await getAuthorIdentity(repository)
fullname: author ? author.name : '',
email: author ? author.email : '',
year: new Date().getFullYear().toString(),
description: '',
project: this.state.name,
})
} catch (e) {
log.error(`createRepository: unable to write LICENSE at ${fullPath}`, e)
this.props.dispatcher.postError(e)
}
}
try {
const gitAttributes = Path.join(fullPath, '.gitattributes')
const gitAttributesExists = await pathExists(gitAttributes)
if (!gitAttributesExists) {
await writeGitAttributes(fullPath)
}
} catch (e) {
log.error(
`createRepository: unable to write .gitattributes at ${fullPath}`,
e
)
this.props.dispatcher.postError(e)
}
const status = await getStatus(repository)
if (status === null) {
this.props.dispatcher.postError(
new Error(
`Unable to create the new repository because there are too many new files in this directory`
)
)
return
}
try {
const wd = status.workingDirectory
const files = wd.files
if (files.length > 0) {
await createCommit(repository, 'Initial commit', files)
}
} catch (e) {
log.error(`createRepository: initial commit failed at ${fullPath}`, e)
this.props.dispatcher.postError(e)
}
this.setState({ creating: false })
this.updateDefaultDirectory()
this.props.dispatcher.closeFoldout(FoldoutType.Repository)
this.props.dispatcher.selectRepository(repository)
this.props.dispatcher.recordCreateRepository()
this.props.onDismissed()
}
private updateDefaultDirectory = () => {
// don't update the default directory as a result of creating the
// repository from an empty folder, because this value will be the
// repository path itself
if (!this.props.initialPath && this.state.path !== null) {
setDefaultDir(this.state.path)
}
}
private onCreateWithReadmeChange = (
event: React.FormEvent<HTMLInputElement>
) => {
this.setState({
createWithReadme: event.currentTarget.checked,
})
}
private renderSanitizedName() {
const sanitizedName = sanitizedRepositoryName(this.state.name)
if (this.state.name === sanitizedName) {
return null
}
return (
<InputWarning
id="repo-sanitized-name-warning"
trackedUserInput={this.state.name}
ariaLiveMessage={`Will be created as ${sanitizedName}. Spaces and invalid characters have been replaced by hyphens.`}
>
<p>Will be created as {sanitizedName}</p>
<span className="sr-only">
Spaces and invalid characters have been replaced by hyphens.
</span>
</InputWarning>
)
}
private onGitIgnoreChange = (event: React.FormEvent<HTMLSelectElement>) => {
const gitIgnore = event.currentTarget.value
this.setState({ gitIgnore })
}
const license = event.currentTarget.value
this.setState({ license })
}
private renderGitIgnores() {
const gitIgnores = this.state.gitIgnoreNames || []
const options = [NoGitIgnoreValue, ...gitIgnores]
return (
<Row>
<Select
label={__DARWIN__ ? 'Git Ignore' : 'Git ignore'}
value={this.state.gitIgnore}
onChange={this.onGitIgnoreChange}
>
{options.map(n => (
<option key={n} value={n}>
{n}
</option>
))}
</Select>
</Row>
)
}
const licenses = this.state.licenses || []
...licenses.filter(l => l.featured),
]
return (
<Row>
<Select
value={this.state.license}
>
<option key={l.name} value={l.name}>
{l.name}
</option>
))}
<option disabled={true}></option>
<option key={l.name} value={l.name}>
{l.name}
</option>
))}
</Select>
</Row>
)
}
private renderInvalidPathError() {
const isValidPath = this.state.isValidPath
const pathSet = isValidPath !== null
if (!pathSet || isValidPath) {
return null
}
return (
<DialogError>
Directory could not be created at this path. You may not have
permissions to create a directory here.
</DialogError>
)
}
private renderGitRepositoryError() {
const isRepo = this.state.isRepository
if (!this.state.path || this.state.path.length === 0 || !isRepo) {
return null
}
return (
<Row>
<InputError
id="existing-repository-path-error"
trackedUserInput={this.state.path + this.state.name}
ariaLiveMessage={
'This directory appears to be a Git repository. Would you like to add this repository instead?'
}
>
This directory appears to be a Git repository. Would you like to{' '}
<LinkButton onClick={this.onAddRepositoryClicked}>
add this repository
</LinkButton>{' '}
instead?
</InputError>
</Row>
)
}
private renderReadmeOverwriteWarning() {
if (!enableReadmeOverwriteWarning()) {
return null
}
if (
this.state.createWithReadme === false ||
this.state.readMeExists === false
) {
return null
}
return (
<Row>
<InputWarning
id="readme-overwrite-warning"
trackedUserInput={this.state.createWithReadme}
ariaLiveMessage="This directory contains a README.md file already. Checking
this box will result in the existing file being overwritten."
>
This directory contains a <Ref>README.md</Ref> file already. Checking
this box will result in the existing file being overwritten.
</InputWarning>
</Row>
)
}
private onAddRepositoryClicked = () => {
this.props.onDismissed()
const { path, name } = this.state
// Shouldn't be able to even get here if path is null.
if (path !== null) {
this.props.dispatcher.showPopup({
type: PopupType.AddRepository,
path: Path.join(path, sanitizedRepositoryName(name)),
})
}
}
public render() {
const disabled =
this.state.path === null ||
this.state.path.length === 0 ||
this.state.name.length === 0 ||
this.state.creating ||
this.state.isRepository
const readOnlyPath = !!this.props.initialPath
const loadingDefaultDir = this.state.path === null
return (
<Dialog
id="create-repository"
title={
__DARWIN__ ? 'Create a New Repository' : 'Create a new repository'
}
loading={this.state.creating}
onSubmit={this.createRepository}
onDismissed={this.props.onDismissed}
>
{this.renderInvalidPathError()}
<DialogContent>
<Row>
<TextBox
value={this.state.name}
label="Name"
placeholder="repository name"
onValueChanged={this.onNameChanged}
ariaDescribedBy="existing-repository-path-error repo-sanitized-name-warning"
/>
</Row>
{this.renderSanitizedName()}
<Row>
<TextBox
value={this.state.description}
label="Description"
onValueChanged={this.onDescriptionChanged}
/>
</Row>
<Row>
<TextBox
value={this.state.path ?? ''}
label={__DARWIN__ ? 'Local Path' : 'Local path'}
placeholder="repository path"
onValueChanged={this.onPathChanged}
disabled={readOnlyPath || loadingDefaultDir}
ariaDescribedBy="existing-repository-path-error"
/>
<Button
onClick={this.showFilePicker}
disabled={readOnlyPath || loadingDefaultDir}
>
Choose
</Button>
</Row>
{this.renderGitRepositoryError()}
<Row>
<Checkbox
label="Initialize this repository with a README"
value={
this.state.createWithReadme
? CheckboxValue.On
: CheckboxValue.Off
}
onChange={this.onCreateWithReadmeChange}
ariaDescribedBy="readme-overwrite-warning"
/>
</Row>
{this.renderReadmeOverwriteWarning()}
{this.renderGitIgnores()}
</DialogContent>
<DialogFooter>
<OkCancelButtonGroup
okButtonText={
__DARWIN__ ? 'Create Repository' : 'Create repository'
}
okButtonDisabled={disabled || loadingDefaultDir}
/>
</DialogFooter>
</Dialog>
)
}
private onWindowFocus = () => {
// Verify whether or not a README.md file exists at the chosen directory
// in case one has been added or removed and the warning can be displayed.
this.updateReadMeExists(this.state.path, this.state.name)
}
}
``` | /content/code_sandbox/app/src/ui/add-repository/create-repository.tsx | xml | 2016-05-11T15:59:00 | 2024-08-16T17:00:41 | desktop | desktop/desktop | 19,544 | 4,319 |
```xml
<?xml version="1.0" encoding="UTF-8" ?>
<definitions id="definitions"
targetNamespace="path_to_url"
xmlns="path_to_url"
xmlns:activiti="path_to_url">
<process id="FormPropertyDetails">
<startEvent id="start">
<extensionElements>
<activiti:formProperty id="speaker"
name="Speaker"
variable="SpeakerName"
type="string" />
<activiti:formProperty id="start"
type="date"
datePattern="dd-MMM-yyyy" />
<activiti:formProperty id="direction" type="enum">
<activiti:value id="left" name="Go Left" />
<activiti:value id="right" name="Go Right" />
<activiti:value id="up" name="Go Up" />
<activiti:value id="down" name="Go Down" />
</activiti:formProperty>
</extensionElements>
</startEvent>
</process>
</definitions>
``` | /content/code_sandbox/modules/flowable5-test/src/test/resources/org/activiti/engine/test/api/form/FormServiceTest.testFormPropertyDetails.bpmn20.xml | xml | 2016-10-13T07:21:43 | 2024-08-16T15:23:14 | flowable-engine | flowable/flowable-engine | 7,715 | 232 |
```xml
import type { GraphQLSchema, GraphQLType } from 'graphql';
import React, { Fragment, PureComponent } from 'react';
import { GraphQLExplorerTypeLink } from './graph-ql-explorer-type-link';
interface Props {
onNavigateType: (type: GraphQLType) => void;
schema: GraphQLSchema;
}
export class GraphQLExplorerSchema extends PureComponent<Props> {
renderQueryType() {
const { schema, onNavigateType } = this.props;
const type = schema.getQueryType();
if (!type) {
return null;
}
return (
<Fragment>
<span className="success">query</span>:{' '}
<GraphQLExplorerTypeLink onNavigate={onNavigateType} type={type} />
</Fragment>
);
}
renderMutationType() {
const { schema, onNavigateType } = this.props;
const type = schema.getMutationType();
if (!type) {
return null;
}
return (
<Fragment>
<span className="success">mutation</span>:{' '}
<GraphQLExplorerTypeLink onNavigate={onNavigateType} type={type} />
</Fragment>
);
}
renderSubscriptionType() {
const { schema, onNavigateType } = this.props;
const type = schema.getSubscriptionType();
if (!type) {
return null;
}
return (
<Fragment>
<span className="success">subscription</span>:{' '}
<GraphQLExplorerTypeLink onNavigate={onNavigateType} type={type} />
</Fragment>
);
}
render() {
return (
<div className="graphql-explorer__schema">
<p>A GraphQL schema provides a root type for each kind of operation.</p>
<h2 className="graphql-explorer__subheading">Root Types</h2>
<ul className="graphql-explorer__defs">
<li>{this.renderQueryType()}</li>
<li>{this.renderMutationType()}</li>
<li>{this.renderSubscriptionType()}</li>
</ul>
</div>
);
}
}
``` | /content/code_sandbox/packages/insomnia/src/ui/components/graph-ql-explorer/graph-ql-explorer-schema.tsx | xml | 2016-04-23T03:54:26 | 2024-08-16T16:50:44 | insomnia | Kong/insomnia | 34,054 | 450 |
```xml
function mergeRects(rects: DOMRect[]): DOMRect {
const left = Math.min(...rects.map((rect) => rect.left))
const top = Math.min(...rects.map((rect) => rect.top))
const right = Math.max(...rects.map((rect) => rect.right))
const bottom = Math.max(...rects.map((rect) => rect.bottom))
return new DOMRect(left, top, right - left, bottom - top)
}
export function getDOMRangeRect(nativeSelection: Selection, rootElement: HTMLElement): DOMRect {
const domRange = nativeSelection.getRangeAt(0)
const startContainer = domRange.startContainer
let rect
if (nativeSelection.anchorNode === rootElement) {
let inner = rootElement
while (inner.firstElementChild != null) {
inner = inner.firstElementChild as HTMLElement
}
if (inner !== rootElement) {
rect = inner.getBoundingClientRect()
} else {
// If there are no children in the root element, we calculate
// the rect based on the root's padding and line height
const rootRect = rootElement.getBoundingClientRect()
const rootElementStyles = getComputedStyle(rootElement)
const topPadding = parseFloat(rootElementStyles.paddingTop)
const lineHeight = parseFloat(rootElementStyles.lineHeight)
const top = rootRect.top + topPadding + lineHeight
const leftPadding = parseFloat(rootElementStyles.paddingLeft)
const left = rootRect.left + leftPadding
rect = new DOMRect(left, top, 0, 0)
}
} else {
const clientRects = domRange.getClientRects()
if (clientRects.length > 0) {
// Merge all client rects into one if there are multiple
rect = mergeRects(Array.from(clientRects))
} else {
rect = domRange.getBoundingClientRect()
// If the range is collapsed, use the start container's rect
if (rect.width === 0 && rect.height === 0 && startContainer instanceof Element) {
rect = startContainer.getBoundingClientRect()
}
}
}
return rect
}
``` | /content/code_sandbox/applications/docs-editor/src/app/Utils/getDOMRangeRect.ts | xml | 2016-06-08T11:16:51 | 2024-08-16T14:14:27 | WebClients | ProtonMail/WebClients | 4,300 | 452 |
```xml
<?xml version="1.0" encoding="UTF-8"?>
<web-app version="3.0"
xmlns="path_to_url"
xmlns:xsi="path_to_url"
xsi:schemaLocation="path_to_url
path_to_url">
<display-name></display-name>
<filter>
<filter-name>gzip</filter-name>
<filter-class>cn.hncu.filter.GzipFilter</filter-class>
</filter>
<filter-mapping>
<filter-name>gzip</filter-name>
<url-pattern>/*</url-pattern>
</filter-mapping>
<servlet>
<servlet-name>FirstGzipServlet</servlet-name>
<servlet-class>cn.hncu.servlets.FirstGzipServlet</servlet-class>
</servlet>
<servlet>
<servlet-name>SecondServlet</servlet-name>
<servlet-class>cn.hncu.servlets.SecondServlet</servlet-class>
</servlet>
<servlet>
<servlet-name>ThirdServlet</servlet-name>
<servlet-class>cn.hncu.servlets.ThirdServlet</servlet-class>
</servlet>
<servlet-mapping>
<servlet-name>FirstGzipServlet</servlet-name>
<url-pattern>/FirstGzipServlet</url-pattern>
</servlet-mapping>
<servlet-mapping>
<servlet-name>SecondServlet</servlet-name>
<url-pattern>/servlet/SecondServlet</url-pattern>
</servlet-mapping>
<servlet-mapping>
<servlet-name>ThirdServlet</servlet-name>
<url-pattern>/servlet/ThirdServlet</url-pattern>
</servlet-mapping>
<welcome-file-list>
<welcome-file>index.jsp</welcome-file>
</welcome-file-list>
</web-app>
``` | /content/code_sandbox/myGzipWeb/WebRoot/WEB-INF/web.xml | xml | 2016-04-25T16:39:57 | 2024-08-16T08:33:16 | Java | chenhaoxiang/Java | 1,250 | 421 |
```xml
import { getCommitsBetweenCommits } from '../../lib/git'
import { promiseWithMinimumTimeout } from '../../lib/promise'
import { Branch } from '../../models/branch'
import { ComputedAction } from '../../models/computed-action'
import { MultiCommitOperationKind } from '../../models/multi-commit-operation'
import { RebasePreview } from '../../models/rebase'
import { Repository } from '../../models/repository'
import { IDropdownSelectButtonOption } from '../dropdown-select-button'
export function getMergeOptions(): ReadonlyArray<IDropdownSelectButtonOption> {
return [
{
label: 'Create a merge commit',
description:
'The commits from the selected branch will be added to the current branch via a merge commit.',
id: MultiCommitOperationKind.Merge,
},
{
label: 'Squash and merge',
description:
'The commits in the selected branch will be combined into one commit in the current branch.',
id: MultiCommitOperationKind.Squash,
},
{
label: 'Rebase',
description:
'The commits from the selected branch will be rebased and added to the current branch.',
id: MultiCommitOperationKind.Rebase,
},
]
}
export async function updateRebasePreview(
baseBranch: Branch,
targetBranch: Branch,
repository: Repository,
onUpdate: (rebasePreview: RebasePreview | null) => void
) {
const computingRebaseForBranch = baseBranch.name
onUpdate({
kind: ComputedAction.Loading,
})
const commits = await promiseWithMinimumTimeout(
() =>
getCommitsBetweenCommits(
repository,
baseBranch.tip.sha,
targetBranch.tip.sha
),
500
)
// if the branch being track has changed since we started this work, abandon
// any further state updates (this function is re-entrant if the user is
// using the keyboard to quickly switch branches)
if (computingRebaseForBranch !== baseBranch.name) {
onUpdate(null)
return
}
// if we are unable to find any commits to rebase, indicate that we're
// unable to proceed with the rebase
if (commits === null) {
onUpdate({
kind: ComputedAction.Invalid,
})
return
}
onUpdate({
kind: ComputedAction.Clean,
commits,
})
}
``` | /content/code_sandbox/app/src/ui/lib/update-branch.ts | xml | 2016-05-11T15:59:00 | 2024-08-16T17:00:41 | desktop | desktop/desktop | 19,544 | 514 |
```xml
<RelativeLayout xmlns:android="path_to_url"
xmlns:tools="path_to_url" android:layout_width="match_parent"
android:layout_height="match_parent" android:paddingLeft="@dimen/activity_horizontal_margin"
android:paddingRight="@dimen/activity_horizontal_margin"
android:paddingTop="@dimen/activity_vertical_margin"
android:paddingBottom="@dimen/activity_vertical_margin" tools:context=".MainActivity">
<android.support.v7.widget.RecyclerView
android:layout_width="match_parent"
android:layout_height="match_parent"
android:id="@+id/rv"
/>
</RelativeLayout>
``` | /content/code_sandbox/sample/src/main/res/layout/activity_main.xml | xml | 2016-08-16T12:50:30 | 2024-08-13T08:27:46 | StateProgressBar | kofigyan/StateProgressBar | 1,537 | 131 |
```xml
import { c } from 'ttag';
import { PassCryptoItemError } from './errors';
/* this is roughly equivalent to a 7kb binary blob */
export const MAX_ITEM_CONTENT_B64_LENGTH = 53248;
export const validateItemContentSize = (base64Content: string): string => {
if (base64Content.length > MAX_ITEM_CONTENT_B64_LENGTH) {
throw new PassCryptoItemError(c('Error').t`Item content cannot exceed 40KB`);
}
return base64Content;
};
``` | /content/code_sandbox/packages/pass/lib/crypto/utils/validators.ts | xml | 2016-06-08T11:16:51 | 2024-08-16T14:14:27 | WebClients | ProtonMail/WebClients | 4,300 | 109 |
```xml
import React from 'react';
/**
* Create a React ref object that is friendly for snapshots.
* It will be represented as `[React.ref]` in snapshots.
* @returns a React ref object.
*/
export declare function createSnapshotFriendlyRef<T>(): React.RefObject<T>;
//# sourceMappingURL=Refs.d.ts.map
``` | /content/code_sandbox/packages/expo-modules-core/build/Refs.d.ts | xml | 2016-08-15T17:14:25 | 2024-08-16T19:54:44 | expo | expo/expo | 32,004 | 65 |
```xml
<?xml version="1.0" encoding="UTF-8"?>
<project xmlns="path_to_url">
<type>org.netbeans.modules.java.j2seproject</type>
<configuration>
<data xmlns="path_to_url">
<name>j2se-simple</name>
<minimum-ant-version>1.6</minimum-ant-version>
<source-roots>
<root id="src.dir"/>
</source-roots>
<test-roots>
<root id="test.src.dir"/>
</test-roots>
</data>
</configuration>
</project>
``` | /content/code_sandbox/visualvm/libs.profiler/lib.profiler/test/qa-functional/data/projects/j2se-simple/nbproject/project.xml | xml | 2016-09-12T14:44:30 | 2024-08-16T14:41:50 | visualvm | oracle/visualvm | 2,821 | 129 |
```xml
<!--
~ contributor license agreements. See the NOTICE file distributed with
~ this work for additional information regarding copyright ownership.
~
~ path_to_url
~
~ Unless required by applicable law or agreed to in writing, software
~ WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
-->
<dataset>
<metadata>
<column name="constraint_catalog" />
<column name="constraint_schema" />
<column name="constraint_name" />
<column name="unique_constraint_catalog" />
<column name="unique_constraint_schema" />
<column name="unique_constraint_name" />
<column name="match_option" />
<column name="update_rule" />
<column name="delete_rule" />
<column name="table_name" />
<column name="referenced_table_name" />
</metadata>
</dataset>
``` | /content/code_sandbox/test/e2e/sql/src/test/resources/cases/dql/dataset/empty_storage_units/mysql/select_mysql_information_schema_referential_constraints.xml | xml | 2016-01-18T12:49:26 | 2024-08-16T15:48:11 | shardingsphere | apache/shardingsphere | 19,707 | 190 |
```xml
<!--
// THE CODE IS PROVIDED AS IS, WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED,
// INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
// FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT.
// IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM,
// DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT,
// TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH
// THE CODE OR THE USE OR OTHER DEALINGS IN THE CODE.
-->
<ResourceDictionary xmlns="path_to_url"
xmlns:x="path_to_url">
<ResourceDictionary.MergedDictionaries>
<ResourceDictionary Source="ms-appx:///Microsoft.Toolkit.Uwp.UI.Controls.DataGrid/DataGrid/DataGrid.xaml"/>
</ResourceDictionary.MergedDictionaries>
</ResourceDictionary>
``` | /content/code_sandbox/Microsoft.Toolkit.Uwp.UI.Controls.DataGrid/Themes/Generic.xaml | xml | 2016-06-17T21:29:46 | 2024-08-16T09:32:00 | WindowsCommunityToolkit | CommunityToolkit/WindowsCommunityToolkit | 5,842 | 160 |
```xml
import { arrayMove } from "@dnd-kit/sortable"
import styled from "@emotion/styled"
import { range } from "lodash"
import ChevronDoubleLeftIcon from "mdi-react/ChevronDoubleLeftIcon"
import ChevronDoubleRightIcon from "mdi-react/ChevronDoubleRightIcon"
import { observer } from "mobx-react-lite"
import { useCallback, useState } from "react"
import { useStores } from "../../hooks/useStores"
import { Localized } from "../../localize/useLocalization"
import {
ControlMode,
controlModeKey,
defaultControlModes,
isEqualControlMode,
} from "../../stores/ControlStore"
import { ControlName } from "../ControlPane/ControlName"
import {
Dialog,
DialogActions,
DialogContent,
DialogTitle,
} from "../Dialog/Dialog"
import { Button } from "../ui/Button"
import { DraggableList } from "./DraggableList"
const nonControllerControlModes: ControlMode[] = [
{
type: "velocity",
},
{
type: "pitchBend",
},
]
const getAllControlModes = (): ControlMode[] =>
nonControllerControlModes.concat(
range(0, 128).map((i) => ({ type: "controller", controllerType: i })),
)
const Item = styled.div<{ isSelected: boolean }>`
padding: 0.5rem 1rem;
background: ${({ theme, isSelected }) =>
isSelected ? theme.themeColor : "transparent"};
white-space: nowrap;
`
const Content = styled.div`
max-height: 30rem;
display: flex;
`
const Pane = styled.div`
flex-grow: 1;
flex-basis: 0;
overflow: auto;
background: ${({ theme }) => theme.secondaryBackgroundColor};
`
const CenterPane = styled.div`
display: flex;
flex-direction: column;
align-items: center;
justify-content: center;
padding: 1rem;
`
const InsertButton = styled(Button)`
background: ${({ theme }) => theme.secondaryBackgroundColor};
display: flex;
align-items: center;
margin-bottom: 1rem;
min-width: 7rem;
justify-content: center;
`
export const ControlSettingDialog = observer(() => {
const rootStore = useStores()
const { rootViewStore, controlStore } = rootStore
const { openControlSettingDialog: open } = rootViewStore
const [selectedLeftMode, setSelectedLeftMode] = useState<ControlMode | null>(
null,
)
const [selectedRightMode, setSelectedRightMode] =
useState<ControlMode | null>(null)
const leftModes = controlStore.controlModes
const rightModes = getAllControlModes().filter(
(mode) =>
!controlStore.controlModes.some((m) => isEqualControlMode(m, mode)),
)
const leftItems = leftModes.map((mode) => ({
mode,
isSelected:
selectedLeftMode !== null && isEqualControlMode(mode, selectedLeftMode),
}))
const rightItems = rightModes.map((mode) => ({
mode,
isSelected:
selectedRightMode !== null && isEqualControlMode(mode, selectedRightMode),
}))
const onClose = useCallback(
() => (rootViewStore.openControlSettingDialog = false),
[rootViewStore],
)
const onClickAdd = () => {
if (selectedRightMode) {
controlStore.controlModes.push(selectedRightMode)
setSelectedRightMode(null)
}
}
const onClickRemove = () => {
if (selectedLeftMode) {
controlStore.controlModes = controlStore.controlModes.filter(
(mode) => !isEqualControlMode(mode, selectedLeftMode),
)
setSelectedLeftMode(null)
}
}
const onLeftItemMoved = (fromId: string, toId: string) => {
const fromIndex = leftItems.findIndex(
(item) => controlModeKey(item.mode) === fromId,
)
const toIndex = leftItems.findIndex(
(item) => controlModeKey(item.mode) === toId,
)
if (fromIndex === -1 || toIndex === -1) {
return
}
controlStore.controlModes = arrayMove(
controlStore.controlModes,
fromIndex,
toIndex,
)
}
const onClickRestoreDefaults = () => {
controlStore.controlModes = defaultControlModes
}
return (
<Dialog open={open} onOpenChange={onClose} style={{ maxWidth: "40rem" }}>
<DialogTitle>
<Localized name="control-settings" />
</DialogTitle>
<DialogContent>
<Content>
<Pane>
<DraggableList
items={leftItems}
getItemId={(item) => controlModeKey(item.mode)}
onItemMoved={onLeftItemMoved}
render={(item) => (
<Item
key={controlModeKey(item.mode)}
isSelected={item.isSelected}
onClick={() => {
setSelectedLeftMode(item.mode)
setSelectedRightMode(null)
}}
>
<ControlName mode={item.mode} />
</Item>
)}
/>
</Pane>
<CenterPane>
<InsertButton onClick={onClickAdd}>
<ChevronDoubleLeftIcon style={{ width: "1.25rem" }} /> Add
</InsertButton>
<InsertButton onClick={onClickRemove}>
Remove <ChevronDoubleRightIcon style={{ width: "1.25rem" }} />
</InsertButton>
</CenterPane>
<Pane>
{rightItems.map((item) => (
<Item
key={controlModeKey(item.mode)}
isSelected={item.isSelected}
onClick={() => {
setSelectedLeftMode(null)
setSelectedRightMode(item.mode)
}}
>
<ControlName mode={item.mode} />
</Item>
))}
</Pane>
</Content>
</DialogContent>
<DialogActions>
<Button onClick={onClickRestoreDefaults}>
<Localized name="restore-defaults" />
</Button>
<div style={{ flex: 1 }} />
<Button onClick={onClose}>
<Localized name="close" />
</Button>
</DialogActions>
</Dialog>
)
})
``` | /content/code_sandbox/app/src/components/ControlSettingDialog/ControlSettingDialog.tsx | xml | 2016-03-06T15:19:53 | 2024-08-15T14:27:10 | signal | ryohey/signal | 1,238 | 1,333 |
```xml
import * as React from 'react';
import { Header } from '@fluentui/react-northstar';
const HeaderExampleRtl = () => (
<Header as="h2" content=" " description=" ." />
);
export default HeaderExampleRtl;
``` | /content/code_sandbox/packages/fluentui/docs/src/examples/components/Header/Rtl/HeaderExample.rtl.tsx | xml | 2016-06-06T15:03:44 | 2024-08-16T18:49:29 | fluentui | microsoft/fluentui | 18,221 | 56 |
```xml
import { CommonModule } from "@angular/common";
import { ChangeDetectionStrategy, Component } from "@angular/core";
@Component({
selector: "bit-card",
standalone: true,
imports: [CommonModule],
template: `<ng-content></ng-content>`,
changeDetection: ChangeDetectionStrategy.OnPush,
host: {
class:
"tw-box-border tw-block tw-bg-background tw-text-main tw-border-solid tw-border-b tw-border-0 tw-border-b-secondary-300 tw-rounded-lg tw-py-4 tw-px-3",
},
})
export class CardComponent {}
``` | /content/code_sandbox/libs/components/src/card/card.component.ts | xml | 2016-03-09T23:14:01 | 2024-08-16T15:07:51 | clients | bitwarden/clients | 8,877 | 123 |
```xml
import React from 'react';
import { fireEvent, render, waitFor, screen } from '@testing-library/react';
import sinon from 'sinon';
import { testStandardProps } from '@test/utils';
import Message from '../Message';
import ToastContext from '../../toaster/ToastContext';
describe('Message', () => {
testStandardProps(<Message />);
it('Should render a Message', () => {
render(<Message />);
expect(screen.getByRole('alert')).to.class('rs-message');
});
it('Should render a title', () => {
render(<Message header="title" />);
expect(screen.getByRole('alert').className).to.include('rs-message-has-title');
expect(screen.getByRole('alert')).to.text('title');
});
it('Should render a description', () => {
render(<Message>description</Message>);
expect(screen.getByRole('alert')).to.text('description');
});
it('Should be bordered', () => {
render(<Message bordered />);
expect(screen.getByRole('alert')).to.have.class('rs-message-bordered');
});
it('Should be centered', () => {
render(<Message centered />);
expect(screen.getByRole('alert')).to.have.class('rs-message-centered');
});
it('Should have a type', () => {
render(<Message type="info" />);
expect(screen.getByRole('alert').className).to.include('rs-message-info');
});
it('Should display icon', () => {
render(<Message showIcon type="info" />);
// eslint-disable-next-line testing-library/no-node-access
expect(screen.getByRole('alert').querySelector('.rs-icon')).to.exist;
expect(screen.getByRole('alert').className).to.include('rs-message-has-icon');
});
it('Should be full', () => {
render(<Message full />);
expect(screen.getByRole('alert').className).to.include('rs-message-full');
});
it('Should be closable', () => {
render(<Message closable />);
expect(screen.getByRole('button', { name: /close/i })).to.exist;
});
it('Should call onClose callback', () => {
const onCloseSpy = sinon.spy();
render(<Message closable onClose={onCloseSpy} />);
fireEvent.click(screen.getByRole('button', { name: /close/i }));
expect(onCloseSpy).to.have.been.calledOnce;
});
it('Should call onClose callback by usedToaster', async () => {
const onCloseSpy = sinon.spy();
render(
<ToastContext.Provider value={{ usedToaster: true }}>
<Message duration={1} onClose={onCloseSpy} />
</ToastContext.Provider>
);
await waitFor(() => {
expect(onCloseSpy).to.have.been.calledOnce;
});
});
});
``` | /content/code_sandbox/src/Message/test/MessageSpec.tsx | xml | 2016-06-06T02:27:46 | 2024-08-16T16:41:54 | rsuite | rsuite/rsuite | 8,263 | 600 |
```xml
<?xml version="1.0" encoding="UTF-8"?>
<!--
*** GENERATED FROM project.xml - DO NOT EDIT ***
*** EDIT ../build.xml INSTEAD ***
-->
<project name="org.graalvm.visualizer.selectioncoordinator-impl" basedir="..">
<fail message="Please build using Ant 1.7.1 or higher.">
<condition>
<not>
<antversion atleast="1.7.1"/>
</not>
</condition>
</fail>
<property file="nbproject/private/suite-private.properties"/>
<property file="nbproject/suite.properties"/>
<fail unless="suite.dir">You must set 'suite.dir' to point to your containing module suite</fail>
<property file="${suite.dir}/nbproject/private/platform-private.properties"/>
<property file="${suite.dir}/nbproject/platform.properties"/>
<macrodef name="property" uri="path_to_url">
<attribute name="name"/>
<attribute name="value"/>
<sequential>
<property name="@{name}" value="${@{value}}"/>
</sequential>
</macrodef>
<macrodef name="evalprops" uri="path_to_url">
<attribute name="property"/>
<attribute name="value"/>
<sequential>
<property name="@{property}" value="@{value}"/>
</sequential>
</macrodef>
<property file="${user.properties.file}"/>
<nbmproject2:property name="harness.dir" value="nbplatform.${nbplatform.active}.harness.dir" xmlns:nbmproject2="path_to_url"/>
<nbmproject2:property name="nbplatform.active.dir" value="nbplatform.${nbplatform.active}.netbeans.dest.dir" xmlns:nbmproject2="path_to_url"/>
<nbmproject2:evalprops property="cluster.path.evaluated" value="${cluster.path}" xmlns:nbmproject2="path_to_url"/>
<fail message="Path to 'platform' cluster missing in $${cluster.path} property or using corrupt Netbeans Platform (missing harness).">
<condition>
<not>
<contains string="${cluster.path.evaluated}" substring="platform"/>
</not>
</condition>
</fail>
<import file="${harness.dir}/build.xml"/>
</project>
``` | /content/code_sandbox/visualizer/IdealGraphVisualizer/SelectionCoordinator/nbproject/build-impl.xml | xml | 2016-01-14T17:11:35 | 2024-08-16T17:54:25 | graal | oracle/graal | 20,129 | 499 |
```xml
/*************************************************************
*
*
*
* path_to_url
*
* Unless required by applicable law or agreed to in writing, software
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
*/
import * as Entities from '../Entities.js';
Entities.add({
Barv: '\u2AE7',
Barwed: '\u2306',
Bcy: '\u0411',
Bernoullis: '\u212C',
Beta: '\u0392',
Bumpeq: '\u224E',
bNot: '\u2AED',
backcong: '\u224C',
backepsilon: '\u03F6',
barvee: '\u22BD',
barwed: '\u2305',
barwedge: '\u2305',
bbrk: '\u23B5',
bbrktbrk: '\u23B6',
bcong: '\u224C',
bcy: '\u0431',
bdquo: '\u201E',
becaus: '\u2235',
because: '\u2235',
bemptyv: '\u29B0',
bepsi: '\u03F6',
bernou: '\u212C',
bigcap: '\u22C2',
bigcup: '\u22C3',
bigvee: '\u22C1',
bigwedge: '\u22C0',
bkarow: '\u290D',
blacksquare: '\u25AA',
blacktriangleright: '\u25B8',
blank: '\u2423',
blk12: '\u2592',
blk14: '\u2591',
blk34: '\u2593',
block: '\u2588',
bne: '\u003D\u20E5',
bnequiv: '\u2261\u20E5',
bnot: '\u2310',
bot: '\u22A5',
bottom: '\u22A5',
boxDL: '\u2557',
boxDR: '\u2554',
boxDl: '\u2556',
boxDr: '\u2553',
boxH: '\u2550',
boxHD: '\u2566',
boxHU: '\u2569',
boxHd: '\u2564',
boxHu: '\u2567',
boxUL: '\u255D',
boxUR: '\u255A',
boxUl: '\u255C',
boxUr: '\u2559',
boxV: '\u2551',
boxVH: '\u256C',
boxVL: '\u2563',
boxVR: '\u2560',
boxVh: '\u256B',
boxVl: '\u2562',
boxVr: '\u255F',
boxbox: '\u29C9',
boxdL: '\u2555',
boxdR: '\u2552',
boxh: '\u2500',
boxhD: '\u2565',
boxhU: '\u2568',
boxhd: '\u252C',
boxhu: '\u2534',
boxuL: '\u255B',
boxuR: '\u2558',
boxv: '\u2502',
boxvH: '\u256A',
boxvL: '\u2561',
boxvR: '\u255E',
boxvh: '\u253C',
boxvl: '\u2524',
boxvr: '\u251C',
bprime: '\u2035',
breve: '\u02D8',
brvbar: '\u00A6',
bsemi: '\u204F',
bsim: '\u223D',
bsime: '\u22CD',
bsolb: '\u29C5',
bsolhsub: '\u27C8',
bullet: '\u2022',
bump: '\u224E',
bumpE: '\u2AAE',
bumpe: '\u224F',
bumpeq: '\u224F'
}, 'b');
``` | /content/code_sandbox/ts/util/entities/b.ts | xml | 2016-02-23T09:52:03 | 2024-08-16T04:46:50 | MathJax-src | mathjax/MathJax-src | 2,017 | 919 |
```xml
import { mockStore, screen, simpleRender } from 'test-utils';
import { fAccounts } from '@fixtures';
import { translateRaw } from '@translations';
import { ClaimState, ClaimType, ITxValue } from '@types';
import { ClaimSubHead } from '../components/ClaimSubHead';
function getComponent() {
return simpleRender(<ClaimSubHead type={ClaimType.UNI} />, {
initialState: mockStore({
dataStoreState: {
claims: {
claims: {
[ClaimType.UNI]: [
{
address: fAccounts[0].address,
state: ClaimState.UNCLAIMED,
amount: '403' as ITxValue
}
]
},
error: false
}
}
})
});
}
describe('ClaimSubHead', () => {
test('Render the subHeading', async () => {
getComponent();
expect(
screen.getByText(
new RegExp(
translateRaw('UNI_CLAIM_SUBHEAD', {
$total: '1'
}),
'i'
)
)
).toBeDefined();
});
});
``` | /content/code_sandbox/src/components/ActionsPanel/__tests__/ClaimSubHead.test.tsx | xml | 2016-12-04T01:35:27 | 2024-08-14T21:41:58 | MyCrypto | MyCryptoHQ/MyCrypto | 1,347 | 239 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.