1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480148114821483148414851486148714881489149014911492149314941495149614971498149915001501150215031504150515061507150815091510151115121513151415151516151715181519152015211522152315241525152615271528152915301531153215331534153515361537153815391540154115421543154415451546154715481549155015511552155315541555155615571558155915601561156215631564156515661567156815691570157115721573157415751576157715781579158015811582158315841585158615871588158915901591159215931594159515961597159815991600160116021603160416051606160716081609161016111612161316141615161616171618161916201621162216231624162516261627162816291630163116321633163416351636163716381639164016411642164316441645164616471648164916501651165216531654165516561657165816591660166116621663166416651666166716681669167016711672167316741675167616771678167916801681168216831684168516861687168816891690169116921693169416951696169716981699170017011702170317041705170617071708170917101711171217131714171517161717171817191720172117221723172417251726172717281729173017311732173317341735173617371738173917401741174217431744174517461747174817491750175117521753175417551756175717581759176017611762176317641765176617671768176917701771177217731774177517761777177817791780178117821783178417851786178717881789179017911792179317941795179617971798179918001801180218031804180518061807180818091810181118121813181418151816181718181819182018211822182318241825182618271828182918301831183218331834183518361837183818391840184118421843184418451846184718481849185018511852185318541855185618571858185918601861186218631864186518661867186818691870187118721873187418751876187718781879188018811882188318841885188618871888188918901891189218931894189518961897189818991900190119021903190419051906190719081909191019111912191319141915191619171918191919201921192219231924192519261927192819291930193119321933193419351936193719381939194019411942194319441945194619471948194919501951195219531954195519561957195819591960196119621963196419651966196719681969197019711972197319741975197619771978197919801981198219831984198519861987198819891990199119921993199419951996199719981999200020012002200320042005200620072008200920102011201220132014201520162017201820192020202120222023202420252026202720282029203020312032203320342035203620372038203920402041204220432044204520462047204820492050205120522053205420552056205720582059206020612062206320642065206620672068206920702071207220732074207520762077207820792080208120822083208420852086208720882089209020912092209320942095209620972098209921002101210221032104210521062107210821092110211121122113211421152116211721182119212021212122212321242125212621272128212921302131213221332134213521362137213821392140214121422143214421452146214721482149215021512152215321542155215621572158215921602161216221632164216521662167216821692170217121722173217421752176217721782179218021812182218321842185218621872188218921902191219221932194219521962197219821992200220122022203220422052206220722082209221022112212221322142215221622172218221922202221222222232224222522262227222822292230223122322233223422352236223722382239224022412242224322442245224622472248224922502251225222532254225522562257225822592260226122622263226422652266226722682269227022712272227322742275227622772278227922802281228222832284228522862287228822892290229122922293229422952296229722982299230023012302230323042305230623072308230923102311231223132314231523162317231823192320232123222323232423252326232723282329233023312332233323342335233623372338233923402341234223432344234523462347234823492350235123522353235423552356235723582359236023612362236323642365236623672368236923702371237223732374237523762377237823792380238123822383238423852386238723882389239023912392239323942395239623972398239924002401240224032404240524062407240824092410241124122413241424152416241724182419242024212422242324242425242624272428242924302431243224332434243524362437243824392440244124422443244424452446244724482449245024512452245324542455245624572458245924602461246224632464246524662467246824692470247124722473247424752476247724782479248024812482248324842485248624872488248924902491249224932494249524962497249824992500250125022503250425052506250725082509251025112512251325142515251625172518251925202521252225232524252525262527252825292530253125322533253425352536253725382539254025412542254325442545254625472548254925502551255225532554255525562557255825592560256125622563256425652566256725682569257025712572257325742575257625772578257925802581258225832584258525862587258825892590259125922593259425952596259725982599260026012602260326042605260626072608260926102611261226132614261526162617261826192620262126222623262426252626262726282629263026312632263326342635263626372638263926402641264226432644264526462647264826492650265126522653265426552656265726582659266026612662266326642665266626672668266926702671267226732674267526762677267826792680268126822683268426852686268726882689269026912692269326942695269626972698269927002701270227032704270527062707270827092710271127122713271427152716271727182719272027212722272327242725272627272728272927302731273227332734273527362737273827392740274127422743274427452746274727482749275027512752275327542755275627572758275927602761276227632764276527662767276827692770277127722773277427752776277727782779278027812782278327842785278627872788278927902791279227932794279527962797279827992800280128022803280428052806280728082809281028112812281328142815281628172818281928202821282228232824282528262827282828292830283128322833283428352836283728382839284028412842284328442845284628472848284928502851285228532854285528562857285828592860286128622863286428652866286728682869287028712872287328742875287628772878287928802881288228832884288528862887288828892890289128922893289428952896289728982899290029012902290329042905290629072908290929102911291229132914291529162917291829192920292129222923292429252926292729282929293029312932293329342935293629372938293929402941294229432944294529462947294829492950295129522953295429552956295729582959296029612962296329642965296629672968296929702971297229732974297529762977297829792980298129822983298429852986298729882989299029912992299329942995299629972998299930003001300230033004300530063007300830093010301130123013301430153016301730183019302030213022302330243025302630273028302930303031303230333034303530363037303830393040304130423043304430453046304730483049305030513052305330543055305630573058305930603061306230633064306530663067306830693070307130723073307430753076307730783079308030813082308330843085308630873088308930903091309230933094309530963097309830993100310131023103310431053106310731083109311031113112311331143115311631173118311931203121312231233124312531263127312831293130313131323133313431353136313731383139314031413142314331443145314631473148314931503151315231533154315531563157315831593160316131623163316431653166316731683169317031713172317331743175317631773178317931803181318231833184318531863187318831893190319131923193319431953196319731983199320032013202320332043205320632073208320932103211321232133214321532163217321832193220322132223223322432253226322732283229323032313232323332343235323632373238323932403241324232433244324532463247324832493250325132523253325432553256325732583259326032613262326332643265326632673268326932703271327232733274327532763277327832793280328132823283328432853286328732883289329032913292329332943295329632973298329933003301330233033304330533063307330833093310331133123313331433153316331733183319332033213322332333243325332633273328332933303331333233333334333533363337333833393340334133423343334433453346334733483349335033513352335333543355335633573358335933603361336233633364336533663367336833693370337133723373337433753376337733783379338033813382338333843385338633873388338933903391339233933394339533963397339833993400340134023403340434053406340734083409341034113412341334143415341634173418341934203421342234233424342534263427342834293430343134323433343434353436343734383439344034413442344334443445344634473448344934503451345234533454345534563457345834593460346134623463346434653466346734683469347034713472347334743475347634773478347934803481348234833484348534863487348834893490349134923493349434953496349734983499350035013502350335043505350635073508350935103511351235133514351535163517351835193520352135223523352435253526352735283529353035313532353335343535353635373538353935403541354235433544354535463547354835493550355135523553355435553556355735583559356035613562356335643565356635673568356935703571357235733574357535763577357835793580358135823583358435853586358735883589359035913592359335943595359635973598359936003601360236033604360536063607360836093610361136123613361436153616361736183619362036213622362336243625362636273628362936303631363236333634363536363637363836393640364136423643364436453646364736483649365036513652365336543655365636573658365936603661366236633664366536663667366836693670367136723673367436753676367736783679368036813682368336843685368636873688368936903691369236933694369536963697369836993700370137023703370437053706370737083709371037113712371337143715371637173718371937203721372237233724372537263727372837293730373137323733373437353736373737383739374037413742374337443745374637473748374937503751375237533754375537563757375837593760376137623763376437653766376737683769377037713772377337743775377637773778377937803781378237833784378537863787378837893790379137923793379437953796379737983799380038013802380338043805380638073808380938103811381238133814381538163817381838193820382138223823382438253826382738283829383038313832383338343835383638373838383938403841384238433844384538463847384838493850385138523853385438553856385738583859386038613862386338643865386638673868386938703871387238733874387538763877387838793880388138823883388438853886388738883889389038913892389338943895389638973898389939003901390239033904390539063907390839093910391139123913391439153916391739183919392039213922392339243925392639273928392939303931393239333934393539363937393839393940394139423943394439453946394739483949395039513952395339543955395639573958395939603961396239633964396539663967396839693970397139723973397439753976397739783979398039813982398339843985398639873988398939903991399239933994399539963997399839994000400140024003400440054006400740084009401040114012401340144015401640174018401940204021402240234024402540264027402840294030403140324033403440354036403740384039404040414042404340444045404640474048404940504051405240534054405540564057405840594060406140624063406440654066406740684069407040714072407340744075407640774078407940804081408240834084408540864087408840894090409140924093409440954096409740984099410041014102410341044105410641074108410941104111411241134114411541164117411841194120412141224123412441254126412741284129413041314132413341344135413641374138413941404141414241434144414541464147414841494150415141524153415441554156415741584159416041614162416341644165416641674168416941704171417241734174417541764177417841794180418141824183418441854186418741884189419041914192419341944195419641974198419942004201420242034204420542064207420842094210421142124213421442154216421742184219422042214222422342244225422642274228422942304231423242334234423542364237423842394240424142424243424442454246424742484249425042514252425342544255425642574258425942604261426242634264426542664267426842694270427142724273427442754276427742784279428042814282428342844285428642874288428942904291429242934294429542964297429842994300430143024303430443054306430743084309431043114312431343144315431643174318431943204321432243234324432543264327432843294330433143324333433443354336433743384339434043414342434343444345434643474348434943504351435243534354435543564357435843594360436143624363436443654366436743684369437043714372437343744375437643774378437943804381438243834384438543864387438843894390439143924393439443954396439743984399440044014402440344044405440644074408440944104411441244134414441544164417441844194420442144224423442444254426442744284429443044314432443344344435443644374438443944404441444244434444444544464447444844494450445144524453445444554456445744584459446044614462446344644465446644674468446944704471447244734474447544764477447844794480448144824483448444854486448744884489449044914492449344944495449644974498449945004501450245034504450545064507450845094510451145124513451445154516451745184519452045214522452345244525452645274528452945304531453245334534453545364537453845394540454145424543454445454546454745484549455045514552455345544555455645574558455945604561456245634564456545664567456845694570457145724573457445754576457745784579458045814582458345844585458645874588458945904591459245934594459545964597459845994600460146024603460446054606460746084609461046114612461346144615461646174618461946204621462246234624462546264627462846294630463146324633463446354636463746384639464046414642464346444645464646474648464946504651465246534654465546564657465846594660466146624663466446654666466746684669467046714672467346744675467646774678467946804681468246834684468546864687468846894690469146924693469446954696469746984699470047014702470347044705470647074708470947104711471247134714471547164717471847194720472147224723472447254726472747284729473047314732473347344735473647374738473947404741474247434744474547464747474847494750475147524753475447554756475747584759476047614762476347644765476647674768476947704771477247734774477547764777477847794780478147824783478447854786478747884789479047914792479347944795479647974798479948004801480248034804480548064807480848094810481148124813481448154816481748184819482048214822482348244825482648274828482948304831483248334834483548364837483848394840484148424843484448454846484748484849485048514852485348544855485648574858485948604861486248634864486548664867486848694870487148724873487448754876487748784879488048814882488348844885488648874888488948904891489248934894489548964897489848994900490149024903490449054906490749084909491049114912491349144915491649174918491949204921492249234924492549264927492849294930493149324933493449354936493749384939494049414942494349444945494649474948494949504951495249534954495549564957495849594960496149624963496449654966496749684969497049714972497349744975497649774978497949804981498249834984498549864987498849894990499149924993499449954996499749984999500050015002500350045005500650075008500950105011501250135014501550165017501850195020502150225023502450255026502750285029503050315032503350345035503650375038503950405041504250435044504550465047504850495050505150525053505450555056505750585059506050615062506350645065506650675068506950705071507250735074507550765077507850795080508150825083508450855086508750885089509050915092509350945095509650975098509951005101510251035104510551065107510851095110511151125113511451155116511751185119512051215122512351245125512651275128512951305131513251335134513551365137513851395140514151425143514451455146514751485149515051515152515351545155515651575158515951605161516251635164516551665167516851695170517151725173517451755176517751785179518051815182518351845185518651875188518951905191519251935194519551965197519851995200520152025203520452055206520752085209521052115212521352145215521652175218521952205221522252235224522552265227522852295230523152325233523452355236523752385239524052415242524352445245524652475248524952505251525252535254525552565257525852595260526152625263526452655266526752685269527052715272527352745275527652775278527952805281528252835284528552865287528852895290529152925293529452955296529752985299530053015302530353045305530653075308530953105311531253135314531553165317531853195320532153225323532453255326532753285329533053315332533353345335533653375338533953405341534253435344534553465347534853495350535153525353535453555356535753585359536053615362536353645365536653675368536953705371537253735374537553765377537853795380538153825383538453855386538753885389539053915392539353945395539653975398539954005401540254035404540554065407540854095410541154125413541454155416541754185419542054215422542354245425542654275428542954305431543254335434543554365437543854395440544154425443544454455446544754485449545054515452545354545455545654575458545954605461546254635464546554665467546854695470547154725473547454755476547754785479548054815482548354845485548654875488548954905491549254935494549554965497549854995500550155025503550455055506550755085509551055115512551355145515551655175518551955205521552255235524552555265527552855295530553155325533553455355536553755385539554055415542554355445545554655475548554955505551555255535554555555565557555855595560556155625563556455655566556755685569557055715572557355745575557655775578557955805581558255835584558555865587558855895590559155925593559455955596559755985599560056015602560356045605560656075608560956105611561256135614561556165617561856195620562156225623562456255626562756285629563056315632563356345635563656375638563956405641564256435644564556465647564856495650565156525653565456555656565756585659566056615662566356645665566656675668566956705671567256735674567556765677567856795680568156825683568456855686568756885689569056915692569356945695569656975698569957005701570257035704570557065707570857095710571157125713571457155716571757185719572057215722572357245725572657275728572957305731573257335734573557365737573857395740574157425743574457455746574757485749575057515752575357545755575657575758575957605761576257635764576557665767576857695770577157725773577457755776577757785779578057815782578357845785578657875788578957905791579257935794579557965797579857995800580158025803580458055806580758085809581058115812581358145815581658175818581958205821582258235824582558265827582858295830583158325833583458355836583758385839584058415842584358445845584658475848584958505851585258535854585558565857585858595860586158625863586458655866586758685869587058715872587358745875587658775878587958805881588258835884588558865887588858895890589158925893589458955896589758985899590059015902590359045905590659075908590959105911591259135914591559165917591859195920592159225923592459255926592759285929593059315932593359345935593659375938593959405941594259435944594559465947594859495950595159525953595459555956595759585959596059615962596359645965596659675968596959705971597259735974597559765977597859795980598159825983598459855986598759885989599059915992599359945995599659975998599960006001600260036004600560066007600860096010601160126013601460156016601760186019602060216022602360246025602660276028602960306031603260336034603560366037603860396040604160426043604460456046604760486049605060516052605360546055605660576058605960606061606260636064606560666067606860696070607160726073607460756076607760786079608060816082608360846085608660876088608960906091609260936094609560966097609860996100610161026103610461056106610761086109611061116112611361146115611661176118611961206121612261236124612561266127612861296130613161326133613461356136613761386139614061416142614361446145614661476148614961506151615261536154615561566157615861596160616161626163616461656166616761686169617061716172617361746175617661776178617961806181618261836184618561866187618861896190619161926193619461956196619761986199620062016202620362046205620662076208620962106211621262136214621562166217621862196220622162226223622462256226622762286229623062316232623362346235623662376238623962406241624262436244624562466247624862496250625162526253625462556256625762586259626062616262626362646265626662676268626962706271627262736274627562766277627862796280628162826283628462856286628762886289629062916292629362946295629662976298629963006301630263036304630563066307630863096310631163126313631463156316631763186319632063216322632363246325632663276328632963306331633263336334633563366337633863396340634163426343634463456346634763486349635063516352635363546355635663576358635963606361636263636364636563666367636863696370637163726373637463756376637763786379638063816382638363846385638663876388638963906391639263936394639563966397639863996400640164026403640464056406640764086409641064116412641364146415641664176418641964206421642264236424642564266427642864296430643164326433643464356436643764386439644064416442644364446445644664476448644964506451645264536454645564566457645864596460646164626463646464656466646764686469647064716472647364746475647664776478647964806481648264836484648564866487648864896490649164926493649464956496649764986499650065016502650365046505650665076508650965106511651265136514651565166517651865196520652165226523652465256526652765286529653065316532653365346535653665376538653965406541654265436544654565466547654865496550655165526553655465556556655765586559656065616562656365646565656665676568656965706571657265736574657565766577657865796580658165826583658465856586658765886589659065916592659365946595659665976598659966006601660266036604660566066607660866096610661166126613661466156616661766186619662066216622662366246625662666276628662966306631663266336634663566366637663866396640664166426643664466456646664766486649665066516652665366546655665666576658665966606661666266636664666566666667666866696670667166726673667466756676667766786679668066816682668366846685668666876688668966906691669266936694669566966697669866996700670167026703670467056706670767086709671067116712671367146715671667176718671967206721672267236724672567266727672867296730673167326733673467356736673767386739674067416742674367446745674667476748674967506751675267536754675567566757675867596760676167626763676467656766676767686769677067716772677367746775677667776778677967806781678267836784678567866787678867896790679167926793679467956796679767986799680068016802680368046805680668076808680968106811681268136814681568166817681868196820682168226823682468256826682768286829683068316832683368346835683668376838683968406841684268436844684568466847684868496850685168526853685468556856685768586859686068616862686368646865686668676868686968706871687268736874687568766877687868796880688168826883688468856886688768886889689068916892689368946895689668976898689969006901690269036904690569066907690869096910691169126913691469156916691769186919692069216922692369246925692669276928692969306931693269336934693569366937693869396940694169426943694469456946694769486949695069516952695369546955695669576958695969606961696269636964696569666967696869696970697169726973697469756976697769786979698069816982698369846985698669876988698969906991699269936994699569966997699869997000700170027003700470057006700770087009701070117012701370147015701670177018701970207021702270237024702570267027702870297030703170327033703470357036703770387039704070417042704370447045704670477048704970507051705270537054705570567057705870597060706170627063706470657066706770687069707070717072707370747075707670777078707970807081708270837084708570867087708870897090709170927093709470957096709770987099710071017102710371047105710671077108710971107111711271137114711571167117711871197120712171227123712471257126712771287129713071317132713371347135713671377138713971407141714271437144714571467147714871497150715171527153715471557156715771587159716071617162716371647165716671677168716971707171717271737174717571767177717871797180718171827183718471857186718771887189719071917192719371947195719671977198719972007201720272037204720572067207720872097210721172127213721472157216721772187219722072217222722372247225722672277228722972307231723272337234723572367237723872397240724172427243724472457246724772487249725072517252725372547255725672577258725972607261726272637264726572667267726872697270727172727273727472757276727772787279728072817282728372847285728672877288728972907291729272937294729572967297729872997300730173027303730473057306730773087309731073117312731373147315731673177318731973207321732273237324732573267327732873297330733173327333733473357336733773387339734073417342734373447345734673477348734973507351735273537354735573567357735873597360736173627363736473657366736773687369737073717372737373747375737673777378737973807381738273837384738573867387738873897390739173927393739473957396739773987399740074017402740374047405740674077408740974107411741274137414741574167417741874197420742174227423742474257426742774287429743074317432743374347435743674377438743974407441744274437444744574467447744874497450745174527453745474557456745774587459746074617462746374647465746674677468746974707471747274737474747574767477747874797480748174827483748474857486748774887489749074917492749374947495749674977498749975007501750275037504750575067507750875097510751175127513751475157516751775187519752075217522752375247525752675277528752975307531753275337534753575367537753875397540754175427543754475457546754775487549755075517552755375547555755675577558755975607561756275637564756575667567756875697570757175727573757475757576757775787579758075817582758375847585758675877588758975907591759275937594759575967597759875997600760176027603760476057606760776087609761076117612761376147615761676177618761976207621762276237624762576267627762876297630763176327633763476357636763776387639764076417642764376447645764676477648764976507651765276537654765576567657765876597660766176627663766476657666766776687669767076717672767376747675767676777678767976807681768276837684768576867687768876897690769176927693769476957696769776987699770077017702770377047705770677077708770977107711771277137714771577167717771877197720772177227723772477257726772777287729773077317732773377347735773677377738773977407741774277437744774577467747774877497750775177527753775477557756775777587759776077617762776377647765776677677768776977707771777277737774777577767777777877797780778177827783778477857786778777887789779077917792779377947795779677977798779978007801780278037804780578067807780878097810781178127813781478157816781778187819782078217822782378247825782678277828782978307831783278337834783578367837783878397840784178427843784478457846784778487849785078517852785378547855785678577858785978607861786278637864786578667867786878697870787178727873787478757876787778787879788078817882788378847885788678877888788978907891789278937894789578967897789878997900790179027903790479057906790779087909791079117912791379147915791679177918791979207921792279237924792579267927792879297930793179327933793479357936793779387939794079417942794379447945794679477948794979507951795279537954795579567957795879597960796179627963796479657966796779687969797079717972797379747975797679777978797979807981798279837984798579867987798879897990799179927993799479957996799779987999800080018002800380048005800680078008800980108011801280138014801580168017801880198020802180228023802480258026802780288029803080318032803380348035803680378038803980408041804280438044804580468047804880498050805180528053805480558056805780588059806080618062806380648065806680678068806980708071807280738074807580768077807880798080808180828083808480858086808780888089809080918092809380948095809680978098809981008101810281038104810581068107810881098110811181128113811481158116811781188119812081218122812381248125812681278128812981308131813281338134813581368137813881398140814181428143814481458146814781488149815081518152815381548155815681578158815981608161816281638164816581668167816881698170817181728173817481758176817781788179818081818182818381848185818681878188818981908191819281938194819581968197819881998200820182028203820482058206820782088209821082118212821382148215821682178218821982208221822282238224822582268227822882298230823182328233823482358236823782388239824082418242824382448245824682478248824982508251825282538254825582568257825882598260826182628263826482658266826782688269827082718272827382748275827682778278827982808281828282838284828582868287828882898290829182928293829482958296829782988299830083018302830383048305830683078308830983108311831283138314831583168317831883198320832183228323832483258326832783288329833083318332833383348335833683378338833983408341834283438344834583468347834883498350835183528353835483558356835783588359836083618362836383648365836683678368836983708371837283738374837583768377837883798380838183828383838483858386838783888389839083918392839383948395839683978398839984008401840284038404840584068407840884098410841184128413841484158416841784188419842084218422842384248425842684278428842984308431843284338434843584368437843884398440844184428443844484458446844784488449845084518452845384548455845684578458845984608461846284638464846584668467846884698470847184728473847484758476847784788479848084818482848384848485848684878488848984908491849284938494849584968497849884998500850185028503850485058506850785088509851085118512851385148515851685178518851985208521852285238524852585268527852885298530853185328533853485358536853785388539854085418542854385448545854685478548854985508551855285538554855585568557855885598560856185628563856485658566856785688569857085718572857385748575857685778578857985808581858285838584858585868587858885898590859185928593859485958596859785988599860086018602860386048605860686078608860986108611861286138614861586168617861886198620862186228623862486258626862786288629863086318632863386348635863686378638863986408641864286438644864586468647864886498650865186528653865486558656865786588659866086618662866386648665866686678668866986708671867286738674867586768677867886798680868186828683868486858686868786888689869086918692869386948695869686978698869987008701870287038704870587068707870887098710871187128713871487158716871787188719872087218722872387248725872687278728872987308731873287338734873587368737873887398740874187428743874487458746874787488749875087518752875387548755875687578758875987608761876287638764876587668767876887698770877187728773877487758776877787788779878087818782878387848785878687878788878987908791879287938794879587968797879887998800880188028803880488058806880788088809881088118812881388148815881688178818881988208821882288238824882588268827882888298830883188328833883488358836883788388839884088418842884388448845884688478848884988508851885288538854885588568857885888598860886188628863886488658866886788688869887088718872887388748875887688778878887988808881888288838884888588868887888888898890889188928893889488958896889788988899890089018902890389048905890689078908890989108911891289138914891589168917891889198920892189228923892489258926892789288929893089318932893389348935893689378938893989408941894289438944894589468947894889498950895189528953895489558956895789588959896089618962896389648965896689678968896989708971897289738974897589768977897889798980898189828983898489858986898789888989899089918992899389948995899689978998899990009001900290039004900590069007900890099010901190129013901490159016901790189019902090219022902390249025902690279028902990309031903290339034903590369037903890399040904190429043904490459046904790489049905090519052905390549055905690579058905990609061906290639064906590669067906890699070907190729073907490759076907790789079908090819082908390849085908690879088908990909091909290939094909590969097909890999100910191029103910491059106910791089109911091119112911391149115911691179118911991209121912291239124912591269127912891299130913191329133913491359136913791389139914091419142914391449145914691479148914991509151915291539154915591569157915891599160916191629163916491659166916791689169917091719172917391749175917691779178917991809181918291839184918591869187918891899190919191929193919491959196919791989199920092019202920392049205920692079208920992109211921292139214921592169217921892199220922192229223922492259226922792289229923092319232923392349235923692379238923992409241924292439244924592469247924892499250925192529253925492559256925792589259926092619262926392649265926692679268926992709271927292739274927592769277927892799280928192829283928492859286928792889289929092919292929392949295929692979298929993009301930293039304930593069307930893099310931193129313931493159316931793189319932093219322932393249325932693279328932993309331933293339334933593369337933893399340934193429343934493459346934793489349935093519352935393549355935693579358935993609361936293639364936593669367936893699370937193729373937493759376937793789379938093819382938393849385938693879388938993909391939293939394939593969397939893999400940194029403940494059406940794089409941094119412941394149415941694179418941994209421942294239424942594269427942894299430943194329433943494359436943794389439944094419442944394449445944694479448944994509451945294539454945594569457945894599460946194629463946494659466946794689469947094719472947394749475947694779478947994809481948294839484948594869487948894899490949194929493949494959496949794989499950095019502950395049505950695079508950995109511951295139514951595169517951895199520952195229523952495259526952795289529953095319532953395349535953695379538953995409541954295439544954595469547954895499550955195529553955495559556955795589559956095619562956395649565956695679568956995709571957295739574957595769577957895799580958195829583958495859586958795889589959095919592959395949595959695979598959996009601960296039604960596069607960896099610961196129613961496159616961796189619962096219622962396249625962696279628962996309631963296339634963596369637963896399640964196429643964496459646964796489649965096519652965396549655965696579658965996609661966296639664966596669667966896699670967196729673967496759676967796789679968096819682968396849685968696879688968996909691969296939694969596969697969896999700970197029703970497059706970797089709971097119712971397149715971697179718971997209721972297239724972597269727972897299730973197329733973497359736973797389739974097419742974397449745974697479748974997509751975297539754975597569757975897599760976197629763976497659766976797689769977097719772977397749775977697779778977997809781978297839784978597869787978897899790979197929793979497959796979797989799980098019802980398049805980698079808980998109811981298139814981598169817981898199820982198229823982498259826982798289829983098319832983398349835983698379838983998409841984298439844984598469847984898499850985198529853985498559856985798589859986098619862986398649865986698679868986998709871987298739874987598769877987898799880988198829883988498859886988798889889989098919892989398949895989698979898989999009901990299039904990599069907990899099910991199129913991499159916991799189919992099219922992399249925992699279928992999309931993299339934993599369937993899399940994199429943994499459946994799489949995099519952995399549955995699579958995999609961996299639964996599669967996899699970997199729973997499759976997799789979998099819982998399849985998699879988998999909991999299939994999599969997999899991000010001100021000310004100051000610007100081000910010100111001210013100141001510016100171001810019100201002110022100231002410025100261002710028100291003010031 |
- Done
- Total = 4016
- one_only = 434
- one_plus = 342
- Total: 3582
- Opening url: https://lists.debian.org/debian-lts-announce/2014/01/msg00000.html
- Opening url: https://lists.debian.org/debian-lts-announce/2014/01/msg00001.html
- Opening url: https://lists.debian.org/debian-lts-announce/2014/01/msg00002.html
- []
- Opening url: https://lists.debian.org/debian-lts-announce/2014/02/msg00000.html
- Opening url: https://lists.debian.org/debian-lts-announce/2014/02/msg00001.html
- Opening url: https://lists.debian.org/debian-lts-announce/2014/02/msg00002.html
- []
- Opening url: https://lists.debian.org/debian-lts-announce/2014/03/msg00000.html
- Opening url: https://lists.debian.org/debian-lts-announce/2014/03/msg00001.html
- Opening url: https://lists.debian.org/debian-lts-announce/2014/03/msg00002.html
- []
- Opening url: https://lists.debian.org/debian-lts-announce/2014/04/msg00000.html
- Opening url: https://lists.debian.org/debian-lts-announce/2014/04/msg00001.html
- Opening url: https://lists.debian.org/debian-lts-announce/2014/04/msg00002.html
- []
- Opening url: https://lists.debian.org/debian-lts-announce/2014/05/msg00000.html
- <!-- MHonArc v2.6.19 -->
- <!--X-Subject: This is just a test -->
- <!--X-From-R13: Oyrknaqre Iveg <sbezbereNsbezbere.qr> -->
- <!--X-Date: Thu, 15 May 2014 19:48:22 +0000 (UTC) -->
- <!--X-Message-Id: 20140515194754.GC3215@formorer.de -->
- <!--X-Content-Type: multipart/signed -->
- <!--X-Derived: pgpmlquBaIwgI.pgp -->
- <!--X-Head-End-->
- <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"
- "http://www.w3.org/TR/html4/loose.dtd">
- <html>
- <head>
- <title>This is just a test</title>
- <link rev="made" href="mailto:formorer@formorer.de">
- <link rel="index" href="maillist.html">
- <link rel="top" href="threads.html">
- <link rel="up" href="msg00000.html">
- <link rel="prev" href="">
- <link rel="next" href="">
- </head>
- <body>
- <!--X-Body-Begin-->
- <!--X-User-Header-->
- <!--X-User-Header-End-->
- <!--X-TopPNI-->
- <hr>
- <form method="POST" action="/cgi-bin/spam-report.pl">
- <input type="hidden" name="listname" value="debian-lts-announce" />
- <input type="hidden" name="msg" value="msg00000.html" />
- <input type="hidden" name="date" value="2014/05" />
- <input type="submit" value="Report as spam" style="float: right" />
- [Date Prev][Date Next]
- [Thread Prev][Thread Next]
- [<a href="maillist.html#00000">Date Index</a>]
- [<a href="threads.html#00000">Thread Index</a>]
- </form>
- <!--X-TopPNI-End-->
- <!--X-MsgBody-->
- <!--X-Subject-Header-Begin-->
- <h1>This is just a test</h1>
- <hr>
- <!--X-Subject-Header-End-->
- <!--X-Head-of-Message-->
- <ul>
- <li><em>To</em>: <a href="mailto:debian-lts-announce%40lists.debian.org">debian-lts-announce@lists.debian.org</a></li>
- <li><em>Subject</em>: This is just a test</li>
- <li><em>From</em>: Alexander Wirt <<a href="mailto:formorer%40formorer.de">formorer@formorer.de</a>></li>
- <li><em>Date</em>: Thu, 15 May 2014 21:47:54 +0200</li>
- <li><em>Message-id</em>: <<a href="msg00000.html">20140515194754.GC3215@formorer.de</a>></li>
- <li><em>Mail-followup-to</em>: <a href="mailto:debian-devel%40lists.debian.org">debian-devel@lists.debian.org</a></li>
- </ul>
- <!--X-Head-of-Message-End-->
- <!--X-Head-Body-Sep-Begin-->
- <hr>
- <!--X-Head-Body-Sep-End-->
- <!--X-Body-of-Message-->
- <pre>Hi,
- this is just a test.
- Alex - Listmaster of the day
- </pre><p><strong>Attachment:
- <a href="pgpmlquBaIwgI.pgp" ><tt>pgpmlquBaIwgI.pgp</tt></a></strong><br>
- <em>Description:</em> PGP signature</p>
- <!--X-Body-of-Message-End-->
- <!--X-MsgBody-End-->
- <!--X-Follow-Ups-->
- <hr />
- <strong>Reply to:</strong>
- <ul>
- <li><a href="mailto:debian-lts-announce@lists.debian.org?In-Reply-To=<20140515194754.GC3215@formorer.de>&Subject=Re:%20This is just a test">debian-lts-announce@lists.debian.org</a></li>
- <li><a href="mailto:formorer@formorer.de?In-Reply-To=<20140515194754.GC3215@formorer.de>&Subject=Re:%20This is just a test&CC=debian-lts-announce@lists.debian.org">Alexander Wirt (on-list)</a></li>
- <li><a href="mailto:formorer@formorer.de?In-Reply-To=<20140515194754.GC3215@formorer.de>&Subject=Re:%20This is just a test">Alexander Wirt (off-list)</a></li>
- </ul>
- <hr />
- <!--X-Follow-Ups-End-->
- <!--X-References-->
- <!--X-References-End-->
- <!--X-BotPNI-->
- <ul>
- <li>Index(es):
- <ul>
- <li><a href="maillist.html#00000"><strong>Date</strong></a></li>
- <li><a href="threads.html#00000"><strong>Thread</strong></a></li>
- </ul>
- </li>
- </ul>
- <!--X-BotPNI-End-->
- <!--X-User-Footer-->
- <!--X-User-Footer-End-->
- </body>
- </html>
- Problem with
- None
- ################################################################################
- Opening url: https://lists.debian.org/debian-lts-announce/2014/05/msg00001.html
- Opening url: https://lists.debian.org/debian-lts-announce/2014/05/msg00002.html
- []
- Opening url: https://lists.debian.org/debian-lts-announce/2014/06/msg00000.html
- Package : gnutls26
- gnutls28
- Opening url: https://lists.debian.org/debian-lts-announce/2014/06/msg00001.html
- Package : chkrootkit
- chkrootkit
- Opening url: https://lists.debian.org/debian-lts-announce/2014/06/msg00002.html
- Package: openssl
- openssl
- Opening url: https://lists.debian.org/debian-lts-announce/2014/06/msg00003.html
- Package : dovecot
- dovecot
- Opening url: https://lists.debian.org/debian-lts-announce/2014/06/msg00004.html
- Package : apt
- apt
- Opening url: https://lists.debian.org/debian-lts-announce/2014/06/msg00005.html
- Package : scheme48
- scheme48
- Opening url: https://lists.debian.org/debian-lts-announce/2014/06/msg00006.html
- Package : linux-2.6
- linux
- Opening url: https://lists.debian.org/debian-lts-announce/2014/06/msg00007.html
- Package: openssl
- openssl
- Opening url: https://lists.debian.org/debian-lts-announce/2014/06/msg00008.html
- Package : lxml
- lxml
- Opening url: https://lists.debian.org/debian-lts-announce/2014/06/msg00009.html
- Package : php5
- php5
- Opening url: https://lists.debian.org/debian-lts-announce/2014/06/msg00010.html
- Package : libemail-address-perl
- libemail-address-perl
- Opening url: https://lists.debian.org/debian-lts-announce/2014/06/msg00011.html
- Package : gnupg
- gnupg2
- Opening url: https://lists.debian.org/debian-lts-announce/2014/06/msg00012.html
- ['CVE-2014-3466', 'CVE-2014-0476', 'CVE-2014-0221', 'CVE-2014-0076', 'CVE-2014-0224', 'CVE-2014-0195', 'CVE-2014-3470', 'CVE-2014-3430', 'CVE-2011-3634', 'CVE-2014-0478', 'CVE-2014-4150', 'CVE-2014-3153', 'CVE-2014-1438', 'CVE-2014-0224', 'CVE-2012-4929', 'CVE-2014-3146', 'CVE-2014-4049', 'CVE-2014-0477', 'CVE-2014-4617']
- Opening url: https://lists.debian.org/debian-lts-announce/2014/07/msg00000.html
- Package : tiff
- tiff
- Opening url: https://lists.debian.org/debian-lts-announce/2014/07/msg00001.html
- Package : phpmyadmin
- phpmyadmin
- Opening url: https://lists.debian.org/debian-lts-announce/2014/07/msg00002.html
- Package : linux-2.6
- linux
- Opening url: https://lists.debian.org/debian-lts-announce/2014/07/msg00003.html
- Package : cacti
- cacti
- Opening url: https://lists.debian.org/debian-lts-announce/2014/07/msg00004.html
- Package : libxml2
- libxml2
- Opening url: https://lists.debian.org/debian-lts-announce/2014/07/msg00005.html
- Package : libxml2
- libxml2
- Opening url: https://lists.debian.org/debian-lts-announce/2014/07/msg00006.html
- Package : php5
- php5
- Opening url: https://lists.debian.org/debian-lts-announce/2014/07/msg00007.html
- Package : fail2ban
- fail2ban
- Opening url: https://lists.debian.org/debian-lts-announce/2014/07/msg00008.html
- Package : postgresql-8.4
- postgresql-9.6
- Opening url: https://lists.debian.org/debian-lts-announce/2014/07/msg00009.html
- Package : cups
- cups
- Opening url: https://lists.debian.org/debian-lts-announce/2014/07/msg00010.html
- Package : python-scipy
- python-scipy
- Opening url: https://lists.debian.org/debian-lts-announce/2014/07/msg00011.html
- Package : nss
- nss
- Opening url: https://lists.debian.org/debian-lts-announce/2014/07/msg00012.html
- Package : poppler
- poppler
- Opening url: https://lists.debian.org/debian-lts-announce/2014/07/msg00013.html
- Package : file
- file
- Opening url: https://lists.debian.org/debian-lts-announce/2014/07/msg00014.html
- Package : python2.6
- python3.5
- Opening url: https://lists.debian.org/debian-lts-announce/2014/07/msg00015.html
- Package : tor
- tor
- Opening url: https://lists.debian.org/debian-lts-announce/2014/07/msg00016.html
- ['CVE-2013-4243', 'CVE-2013-5003', 'CVE-2013-4995', 'CVE-2013-3239', 'CVE-2013-4996', 'CVE-2015-3145', 'CVE-2013-4470', 'CVE-2014-3145', 'CVE-2014-3144', 'CVE-2014-0203', 'CVE-2014-4652', 'CVE-2014-4667', 'CVE-2014-2678', 'CVE-2013-4387', 'CVE-2014-3122', 'CVE-2014-4656', 'CVE-2014-3917', 'CVE-2014-4699', 'CVE-2014-2328', 'CVE-2014-2326', 'CVE-2014-4002', 'CVE-2014-2709', 'CVE-2014-2708', 'CVE-2014-2327', 'CVE-2014-0191', 'CVE-2014-0191', 'CVE-2014-3480', 'CVE-2014-4721', 'CVE-2014-3515', 'CVE-2014-0207', 'CVE-2013-7177', 'CVE-2013-7176', 'CVE-2014-0067', 'CVE-2014-5029', 'CVE-2014-5030', 'CVE-2014-5031', 'CVE-2014-3537', 'CVE-2013-4251', 'CVE-2013-1741', 'CVE-2014-1491', 'CVE-2014-1492', 'CVE-2013-5606', 'CVE-2010-5110', 'CVE-2014-0238', 'CVE-2014-3479', 'CVE-2014-3478', 'CVE-2014-3480', 'CVE-2014-3487', 'CVE-2014-0237', 'CVE-2014-0207', 'CVE-2012-1150', 'CVE-2014-1912', 'CVE-2011-1521', 'CVE-2012-0845', 'CVE-2011-1015', 'CVE-2013-4238', 'CVE-2011-4940', 'CVE-2011-4944']
- Opening url: https://lists.debian.org/debian-lts-announce/2014/08/msg00000.html
- Package : puppet
- puppet
- Opening url: https://lists.debian.org/debian-lts-announce/2014/08/msg00001.html
- Package : augeas
- augeas
- Opening url: https://lists.debian.org/debian-lts-announce/2014/08/msg00002.html
- Package : python2.6
- python3.5
- Opening url: https://lists.debian.org/debian-lts-announce/2014/08/msg00003.html
- Package : acpi-support
- acpi-support
- Opening url: https://lists.debian.org/debian-lts-announce/2014/08/msg00004.html
- Package : munin
- munin
- Opening url: https://lists.debian.org/debian-lts-announce/2014/08/msg00005.html
- Package : reportbug
- reportbug
- Opening url: https://lists.debian.org/debian-lts-announce/2014/08/msg00006.html
- Package : nspr
- nspr
- Opening url: https://lists.debian.org/debian-lts-announce/2014/08/msg00007.html
- Package : openssl
- openssl
- Opening url: https://lists.debian.org/debian-lts-announce/2014/08/msg00008.html
- Package : libapache-mod-security
- libapache-mod-security
- Opening url: https://lists.debian.org/debian-lts-announce/2014/08/msg00009.html
- Package : lzo2
- lzo2
- Opening url: https://lists.debian.org/debian-lts-announce/2014/08/msg00010.html
- Package : polarssl
- polarssl
- Opening url: https://lists.debian.org/debian-lts-announce/2014/08/msg00011.html
- Package : python2.6
- python3.5
- Opening url: https://lists.debian.org/debian-lts-announce/2014/08/msg00012.html
- Package : krb5
- krb5
- Opening url: https://lists.debian.org/debian-lts-announce/2014/08/msg00013.html
- Package : gpgme1.0
- gpgme1.0
- Opening url: https://lists.debian.org/debian-lts-announce/2014/08/msg00014.html
- Package : cacti
- cacti
- Opening url: https://lists.debian.org/debian-lts-announce/2014/08/msg00015.html
- Package : python-imaging
- python-imaging
- Opening url: https://lists.debian.org/debian-lts-announce/2014/08/msg00016.html
- Package : live-config
- live-config
- Opening url: https://lists.debian.org/debian-lts-announce/2014/08/msg00017.html
- ['CVE-2012-6120', 'CVE-2012-0786', 'CVE-2013-6412', 'CVE-2012-0787', 'CVE-2014-1419', 'CVE-2013-6048', 'CVE-2012-3512', 'CVE-2013-6359', 'CVE-2014-0479', 'CVE-2014-1545', 'CVE-2014-3507', 'CVE-2014-3505', 'CVE-2014-3506', 'CVE-2014-3508', 'CVE-2014-3510', 'CVE-2013-5705', 'CVE-2014-4607', 'CVE-2014-4911', 'CVE-2014-4343', 'CVE-2014-4341', 'CVE-2014-4342', 'CVE-2014-4345', 'CVE-2014-4344', 'CVE-2014-3564', 'CVE-2014-5025', 'CVE-2014-4002', 'CVE-2014-5261', 'CVE-2014-5262', 'CVE-2014-5026', 'CVE-2014-3589']
- Opening url: https://lists.debian.org/debian-lts-announce/2014/09/msg00000.html
- Package : eglibc
- glibc
- Opening url: https://lists.debian.org/debian-lts-announce/2014/09/msg00001.html
- Package : libwpd
- libwpd
- Opening url: https://lists.debian.org/debian-lts-announce/2014/09/msg00002.html
- Package : squid3
- squid3
- Opening url: https://lists.debian.org/debian-lts-announce/2014/09/msg00003.html
- Package : procmail
- procmail
- Opening url: https://lists.debian.org/debian-lts-announce/2014/09/msg00004.html
- Package : lua5.1
- lua5.1
- Opening url: https://lists.debian.org/debian-lts-announce/2014/09/msg00005.html
- Package : bind9
- bind9
- Opening url: https://lists.debian.org/debian-lts-announce/2014/09/msg00006.html
- Package : file
- file
- Opening url: https://lists.debian.org/debian-lts-announce/2014/09/msg00007.html
- Package : gnupg2
- gnupg2
- Opening url: https://lists.debian.org/debian-lts-announce/2014/09/msg00008.html
- Package : ia32-libs, ia32-libs-gtk
- ia32-libs, ia32-libs-gtk
- Opening url: https://lists.debian.org/debian-lts-announce/2014/09/msg00009.html
- Package : gnupg
- gnupg2
- Opening url: https://lists.debian.org/debian-lts-announce/2014/09/msg00010.html
- Package : apt
- apt
- Opening url: https://lists.debian.org/debian-lts-announce/2014/09/msg00011.html
- Package : nginx
- nginx
- Opening url: https://lists.debian.org/debian-lts-announce/2014/09/msg00012.html
- Package : acpi-support
- acpi-support
- Opening url: https://lists.debian.org/debian-lts-announce/2014/09/msg00013.html
- Package : wordpress
- wordpress
- Opening url: https://lists.debian.org/debian-lts-announce/2014/09/msg00014.html
- Package : libstruts1.2-java
- libstruts1.2-java
- Opening url: https://lists.debian.org/debian-lts-announce/2014/09/msg00015.html
- Package : apt
- apt
- Opening url: https://lists.debian.org/debian-lts-announce/2014/09/msg00016.html
- Package : bash
- bash
- Opening url: https://lists.debian.org/debian-lts-announce/2014/09/msg00017.html
- Package : icinga
- icinga
- Opening url: https://lists.debian.org/debian-lts-announce/2014/09/msg00018.html
- Package : libplack-perl
- libplack-perl
- Opening url: https://lists.debian.org/debian-lts-announce/2014/09/msg00019.html
- Package : nss
- nss
- Opening url: https://lists.debian.org/debian-lts-announce/2014/09/msg00020.html
- Package : bash
- bash
- Opening url: https://lists.debian.org/debian-lts-announce/2014/09/msg00021.html
- Package : curl
- curl
- Opening url: https://lists.debian.org/debian-lts-announce/2014/09/msg00022.html
- Package : python-django
- python-django
- Opening url: https://lists.debian.org/debian-lts-announce/2014/09/msg00023.html
- Package : apache2
- apache2
- Opening url: https://lists.debian.org/debian-lts-announce/2014/09/msg00024.html
- Package : php5
- php5
- Opening url: https://lists.debian.org/debian-lts-announce/2014/09/msg00025.html
- Package : fex
- fex
- Opening url: https://lists.debian.org/debian-lts-announce/2014/09/msg00026.html
- ['CVE-2014-5119', 'CVE-2014-0475', 'CVE-2012-2149', 'CVE-2014-3609', 'CVE-2014-3618', 'CVE-2014-5461', 'CVE-2014-0591', 'CVE-2014-3587', 'CVE-2014-3538', 'CVE-2014-4617', 'CVE-2014-5270', 'CVE-2014-0488', 'CVE-2014-0489', 'CVE-2014-0487', 'CVE-2014-3616', 'CVE-2014-0484', 'CVE-2014-5240', 'CVE-2014-5205', 'CVE-2014-5204', 'CVE-2014-5265', 'CVE-2014-2053', 'CVE-2014-5266', 'CVE-2014-0114', 'CVE-2014-6273', 'CVE-2014-6271', 'CVE-2014-1878', 'CVE-2013-7108', 'CVE-2014-5269', 'CVE-2014-1568', 'CVE-2014-6271', 'CVE-2014-7169', 'CVE-2014-3613', 'CVE-2014-0480', 'CVE-2014-0482', 'CVE-2014-0483', 'CVE-2014-0481', 'CVE-2014-0226', 'CVE-2014-0118', 'CVE-2014-0231', 'CVE-2013-6438', 'CVE-2014-4670', 'CVE-2014-4049', 'CVE-2014-3597', 'CVE-2013-7345', 'CVE-2014-3587', 'CVE-2014-3538', 'CVE-2014-3876', 'CVE-2014-3877', 'CVE-2014-3875']
- Opening url: https://lists.debian.org/debian-lts-announce/2014/10/msg00000.html
- Package : exuberant-ctags
- exuberant-ctags
- Opening url: https://lists.debian.org/debian-lts-announce/2014/10/msg00001.html
- Package : tryton-server
- tryton-server
- Opening url: https://lists.debian.org/debian-lts-announce/2014/10/msg00002.html
- Package : apt
- apt
- Opening url: https://lists.debian.org/debian-lts-announce/2014/10/msg00003.html
- Package : apache2
- apache2
- Opening url: https://lists.debian.org/debian-lts-announce/2014/10/msg00004.html
- Package : rsylog
- rsylog
- Opening url: https://lists.debian.org/debian-lts-announce/2014/10/msg00005.html
- Package : rsyslog
- rsyslog
- Opening url: https://lists.debian.org/debian-lts-announce/2014/10/msg00006.html
- Package : tzdata
- tzdata
- Opening url: https://lists.debian.org/debian-lts-announce/2014/10/msg00007.html
- Package : ppp
- ppp
- Opening url: https://lists.debian.org/debian-lts-announce/2014/10/msg00008.html
- Package : mysql-5.1
- mysql-transitional
- Opening url: https://lists.debian.org/debian-lts-announce/2014/10/msg00009.html
- Package : kde4libs
- kdelibs
- Opening url: https://lists.debian.org/debian-lts-announce/2014/10/msg00010.html
- Package : libtasn1-3
- libtasn1-3
- Opening url: https://lists.debian.org/debian-lts-announce/2014/10/msg00011.html
- Package : torque
- torque
- Opening url: https://lists.debian.org/debian-lts-announce/2014/10/msg00012.html
- Package : apt
- apt
- Opening url: https://lists.debian.org/debian-lts-announce/2014/10/msg00013.html
- Package : dokuwiki
- dokuwiki
- Opening url: https://lists.debian.org/debian-lts-announce/2014/10/msg00014.html
- Package : libxml2
- libxml2
- Opening url: https://lists.debian.org/debian-lts-announce/2014/10/msg00015.html
- ['CVE-2014-7204', 'CVE-2014-6633', 'CVE-2014-6273', 'CVE-2014-3581', 'CVE-2013-5704', 'CVE-2014-3683', 'CVE-2014-3634', 'CVE-2014-3158', 'CVE-2013-2162', 'CVE-2014-4274', 'CVE-2014-0001', 'CVE-2014-5033', 'CVE-2014-3468', 'CVE-2014-3467', 'CVE-2014-3469', 'CVE-2014-3684', 'CVE-2014-8764', 'CVE-2014-8763', 'CVE-2014-0191', 'CVE-2014-3660']
- Opening url: https://lists.debian.org/debian-lts-announce/2014/11/msg00000.html
- Package : openssl
- openssl
- Opening url: https://lists.debian.org/debian-lts-announce/2014/11/msg00001.html
- Package : wget
- wget
- Opening url: https://lists.debian.org/debian-lts-announce/2014/11/msg00002.html
- Package : ffmpeg
- ffmpeg
- Opening url: https://lists.debian.org/debian-lts-announce/2014/11/msg00003.html
- Package : curl
- curl
- Opening url: https://lists.debian.org/debian-lts-announce/2014/11/msg00004.html
- Package : libxml-security-java
- libxml-security-java
- Opening url: https://lists.debian.org/debian-lts-announce/2014/11/msg00005.html
- Package : file
- file
- Opening url: https://lists.debian.org/debian-lts-announce/2014/11/msg00006.html
- Package : dbus
- dbus
- Opening url: https://lists.debian.org/debian-lts-announce/2014/11/msg00007.html
- Package : ruby1.8
- ruby2.3
- Opening url: https://lists.debian.org/debian-lts-announce/2014/11/msg00008.html
- Package : nss
- nss
- Opening url: https://lists.debian.org/debian-lts-announce/2014/11/msg00009.html
- Package : imagemagick
- imagemagick
- Opening url: https://lists.debian.org/debian-lts-announce/2014/11/msg00010.html
- Package : tomcat6
- tomcat8
- Opening url: https://lists.debian.org/debian-lts-announce/2014/11/msg00011.html
- Package : tomcat-native
- tomcat-native
- Opening url: https://lists.debian.org/debian-lts-announce/2014/11/msg00012.html
- Package : libgcrypt11
- libgcrypt11
- Opening url: https://lists.debian.org/debian-lts-announce/2014/11/msg00013.html
- Package : php5
- php5
- Opening url: https://lists.debian.org/debian-lts-announce/2014/11/msg00014.html
- Package : openjdk-6
- openjdk-6
- Opening url: https://lists.debian.org/debian-lts-announce/2014/11/msg00015.html
- Package : eglibc
- glibc
- Opening url: https://lists.debian.org/debian-lts-announce/2014/11/msg00016.html
- ['CVE-2014-3566', 'CVE-2014-3569', 'CVE-2014-3568', 'CVE-2014-3567', 'CVE-2014-4877', 'CVE-2014-3707', 'CVE-2013-2172', 'CVE-2014-3710', 'CVE-2014-3638', 'CVE-2014-3639', 'CVE-2014-3477', 'CVE-2011-2686', 'CVE-2003-0900', 'CVE-2014-8090', 'CVE-2014-8080', 'CVE-2011-2705', 'CVE-2011-0188', 'CVE-2011-4815', 'CVE-2014-1544', 'CVE-2014-8716', 'CVE-2013-1571', 'CVE-2013-4286', 'CVE-2012-3439', 'CVE-2014-0033', 'CVE-2013-4590', 'CVE-2013-4322', 'CVE-2014-5270', 'CVE-2014-3668', 'CVE-2014-3670', 'CVE-2014-3710', 'CVE-2014-3669', 'CVE-2014-6502', 'CVE-2014-6511', 'CVE-2014-4262', 'CVE-2014-6506', 'CVE-2014-6504', 'CVE-2014-4263', 'CVE-2014-4268', 'CVE-2014-6512', 'CVE-2014-6457', 'CVE-2014-6531', 'CVE-2014-4216', 'CVE-2014-4209', 'CVE-2014-4218', 'CVE-2014-6519', 'CVE-2014-4244', 'CVE-2014-6517', 'CVE-2014-4219', 'CVE-2014-4266', 'CVE-2014-6558', 'CVE-2014-4252', 'CVE-2014-2490', 'CVE-2012-6656', 'CVE-2014-6040', 'CVE-2014-7817']
- Opening url: https://lists.debian.org/debian-lts-announce/2014/12/msg00000.html
- Package : openvpn
- openvpn
- Opening url: https://lists.debian.org/debian-lts-announce/2014/12/msg00001.html
- Package : clamav
- clamav
- Opening url: https://lists.debian.org/debian-lts-announce/2014/12/msg00002.html
- Package : flac
- flac
- Opening url: https://lists.debian.org/debian-lts-announce/2014/12/msg00003.html
- Package : mutt
- mutt
- Opening url: https://lists.debian.org/debian-lts-announce/2014/12/msg00004.html
- Package : jasper
- jasper
- Opening url: https://lists.debian.org/debian-lts-announce/2014/12/msg00005.html
- Package : tcpdump
- tcpdump
- Opening url: https://lists.debian.org/debian-lts-announce/2014/12/msg00006.html
- Package : linux-2.6
- linux
- Opening url: https://lists.debian.org/debian-lts-announce/2014/12/msg00007.html
- Package : pdns-recursor
- pdns-recursor
- Opening url: https://lists.debian.org/debian-lts-announce/2014/12/msg00008.html
- Package : graphviz
- graphviz
- Opening url: https://lists.debian.org/debian-lts-announce/2014/12/msg00009.html
- Package : getmail4
- getmail4
- Opening url: https://lists.debian.org/debian-lts-announce/2014/12/msg00010.html
- Package : unbound
- unbound
- Opening url: https://lists.debian.org/debian-lts-announce/2014/12/msg00011.html
- Package : nfs-utils
- nfs-utils
- Opening url: https://lists.debian.org/debian-lts-announce/2014/12/msg00012.html
- Package : libyaml
- libyaml
- Opening url: https://lists.debian.org/debian-lts-announce/2014/12/msg00013.html
- Package : libyaml-libyaml-perl
- libyaml-libyaml-perl
- Opening url: https://lists.debian.org/debian-lts-announce/2014/12/msg00014.html
- Package : cpio
- cpio
- Opening url: https://lists.debian.org/debian-lts-announce/2014/12/msg00015.html
- Package : bind9
- bind9
- Opening url: https://lists.debian.org/debian-lts-announce/2014/12/msg00016.html
- Package : bsd-mailx
- bsd-mailx
- Opening url: https://lists.debian.org/debian-lts-announce/2014/12/msg00017.html
- Package : heirloom-mailx
- heirloom-mailx
- Opening url: https://lists.debian.org/debian-lts-announce/2014/12/msg00018.html
- Package : ntp
- ntp
- Opening url: https://lists.debian.org/debian-lts-announce/2014/12/msg00019.html
- Package : qt4-x11
- qt4-x11
- Opening url: https://lists.debian.org/debian-lts-announce/2014/12/msg00020.html
- Package : linux-2.6
- linux
- Opening url: https://lists.debian.org/debian-lts-announce/2014/12/msg00021.html
- Package : subversion
- subversion
- Opening url: https://lists.debian.org/debian-lts-announce/2014/12/msg00022.html
- Package : xorg-server
- xorg-server
- Opening url: https://lists.debian.org/debian-lts-announce/2014/12/msg00023.html
- Package : jasper
- jasper
- Opening url: https://lists.debian.org/debian-lts-announce/2014/12/msg00024.html
- Package : eglibc
- glibc
- Opening url: https://lists.debian.org/debian-lts-announce/2014/12/msg00025.html
- Package : firebird2.5
- firebird3.0
- Opening url: https://lists.debian.org/debian-lts-announce/2014/12/msg00026.html
- Package : unzip
- unzip
- Opening url: https://lists.debian.org/debian-lts-announce/2014/12/msg00027.html
- Package : mime-support
- mime-support
- Opening url: https://lists.debian.org/debian-lts-announce/2014/12/msg00028.html
- Package : ettercap
- ettercap
- Opening url: https://lists.debian.org/debian-lts-announce/2014/12/msg00029.html
- ['CVE-2014-8104', 'CVE-2014-9050', 'CVE-2013-6497', 'CVE-2014-8962', 'CVE-2014-9028', 'CVE-2014-0467', 'CVE-2014-9029', 'CVE-2014-8767', 'CVE-2014-9140', 'CVE-2014-8769', 'CVE-2014-4653', 'CVE-2014-4157', 'CVE-2013-0228', 'CVE-2014-4508', 'CVE-2014-5472', 'CVE-2014-4654', 'CVE-2014-4943', 'CVE-2014-90902', 'CVE-2012-6657', 'CVE-2014-4655', 'CVE-2014-9090', 'CVE-2013-7266', 'CVE-2014-5471', 'CVE-2014-5077', 'CVE-2014-8601', 'CVE-2014-9157', 'CVE-2014-7273', 'CVE-2014-7274', 'CVE-2014-7275', 'CVE-2014-8602', 'CVE-2012-3541', 'CVE-2014-9130', 'CVE-2014-9130', 'CVE-2014-9112', 'CVE-2014-8500', 'CVE-2014-7844', 'CVE-2004-2771', 'CVE-2014-7844', 'CVE-2004-2771', 'CVE-2014-9295', 'CVE-2014-9296', 'CVE-2014-9293', 'CVE-2014-9294', 'CVE-2011-3193', 'CVE-2011-3194', 'CVE-2014-6410', 'CVE-2014-3185', 'CVE-2014-3687', 'CVE-2014-7841', 'CVE-2014-8884', 'CVE-2014-8709', 'CVE-2014-3688', 'CVE-2014-3580', 'CVE-2014-8091', 'CVE-2014-8094', 'CVE-2014-8092', 'CVE-2014-8095', 'CVE-2014-8098', 'CVE-2014-8099', 'CVE-2014-8101', 'CVE-2014-8100', 'CVE-2014-8102', 'CVE-2014-8096', 'CVE-2014-8097', 'CVE-2014-8093', 'CVE-2014-8137', 'CVE-2014-8138', 'CVE-2014-9402', 'CVE-2014-9323', 'CVE-2014-8139', 'CVE-2014-8141', 'CVE-2014-8140', 'CVE-2014-7209', 'CVE-2014-9380', 'CVE-2014-9381']
- Opening url: https://lists.debian.org/debian-lts-announce/2015/01/msg00000.html
- Package : pyyaml
- pyyaml
- Opening url: https://lists.debian.org/debian-lts-announce/2015/01/msg00001.html
- Package : polarssl
- polarssl
- Opening url: https://lists.debian.org/debian-lts-announce/2015/01/msg00002.html
- Package : sox
- sox
- Opening url: https://lists.debian.org/debian-lts-announce/2015/01/msg00003.html
- Package : firebird2.1
- firebird3.0
- Opening url: https://lists.debian.org/debian-lts-announce/2015/01/msg00004.html
- Package : file
- file
- Opening url: https://lists.debian.org/debian-lts-announce/2015/01/msg00005.html
- Package : openssl
- openssl
- Opening url: https://lists.debian.org/debian-lts-announce/2015/01/msg00006.html
- Package : unrtf
- unrtf
- Opening url: https://lists.debian.org/debian-lts-announce/2015/01/msg00007.html
- Package : curl
- curl
- Opening url: https://lists.debian.org/debian-lts-announce/2015/01/msg00008.html
- Package : ia32-libs, ia32-libs-gtk
- ia32-libs, ia32-libs-gtk
- Opening url: https://lists.debian.org/debian-lts-announce/2015/01/msg00009.html
- Package : tomcat6
- tomcat8
- Opening url: https://lists.debian.org/debian-lts-announce/2015/01/msg00010.html
- Package : websvn
- websvn
- Opening url: https://lists.debian.org/debian-lts-announce/2015/01/msg00011.html
- Package : libevent
- libevent
- Opening url: https://lists.debian.org/debian-lts-announce/2015/01/msg00012.html
- Package : eglibc
- glibc
- Opening url: https://lists.debian.org/debian-lts-announce/2015/01/msg00013.html
- Package : rpm
- rpm
- Opening url: https://lists.debian.org/debian-lts-announce/2015/01/msg00014.html
- Package : jasper
- jasper
- Opening url: https://lists.debian.org/debian-lts-announce/2015/01/msg00015.html
- Package : libksba
- libksba
- Opening url: https://lists.debian.org/debian-lts-announce/2015/01/msg00016.html
- Package : privoxy
- privoxy
- Opening url: https://lists.debian.org/debian-lts-announce/2015/01/msg00017.html
- Package : python-django
- python-django
- Opening url: https://lists.debian.org/debian-lts-announce/2015/01/msg00018.html
- Package : polarssl
- polarssl
- Opening url: https://lists.debian.org/debian-lts-announce/2015/01/msg00019.html
- Package : php5
- php5
- Opening url: https://lists.debian.org/debian-lts-announce/2015/01/msg00020.html
- ['CVE-2014-9130', 'CVE-2014-8628', 'CVE-2014-8145', 'CVE-2014-9323', 'CVE-2014-8116', 'CVE-2014-8117', 'CVE-2014-3571', 'CVE-2014-3570', 'CVE-2015-0204', 'CVE-2014-8275', 'CVE-2014-3572', 'CVE-2014-9274', 'CVE-2014-9275', 'CVE-2014-8150', 'CVE-2013-6892', 'CVE-2014-6272', 'CVE-2015-0235', 'CVE-2014-8118', 'CVE-2012-0815', 'CVE-2012-0061', 'CVE-2013-6435', 'CVE-2012-0060', 'CVE-2014-8157', 'CVE-2014-8158', 'CVE-2014-9087', 'CVE-2015-1031', 'CVE-2015-1382', 'CVE-2015-1381', 'CVE-2015-0221', 'CVE-2015-0222', 'CVE-2015-0219', 'CVE-2015-0220', 'CVE-2015-1182', 'CVE-2014-0238', 'CVE-2014-8117', 'CVE-2014-3478', 'CVE-2015-', 'CVE-2014-0237', 'CVE-2014-2270']
- Opening url: https://lists.debian.org/debian-lts-announce/2015/02/msg00000.html
- Package : wpasupplicant
- wpasupplicant
- Opening url: https://lists.debian.org/debian-lts-announce/2015/02/msg00001.html
- Package : sympa
- sympa
- Opening url: https://lists.debian.org/debian-lts-announce/2015/02/msg00002.html
- Package : krb5
- krb5
- Opening url: https://lists.debian.org/debian-lts-announce/2015/02/msg00003.html
- Package : unzip
- unzip
- Opening url: https://lists.debian.org/debian-lts-announce/2015/02/msg00004.html
- Package : ntp
- ntp
- Opening url: https://lists.debian.org/debian-lts-announce/2015/02/msg00005.html
- Package : libxml2
- libxml2
- Opening url: https://lists.debian.org/debian-lts-announce/2015/02/msg00006.html
- Package : postgresql-8.4
- postgresql-9.6
- Opening url: https://lists.debian.org/debian-lts-announce/2015/02/msg00007.html
- Package : e2fsprogs
- e2fsprogs
- Opening url: https://lists.debian.org/debian-lts-announce/2015/02/msg00008.html
- Package : nss
- nss
- Opening url: https://lists.debian.org/debian-lts-announce/2015/02/msg00009.html
- Package : linux-2.6
- linux
- Opening url: https://lists.debian.org/debian-lts-announce/2015/02/msg00010.html
- Package : samba
- samba
- Opening url: https://lists.debian.org/debian-lts-announce/2015/02/msg00011.html
- Package : openjdk-6
- openjdk-6
- Opening url: https://lists.debian.org/debian-lts-announce/2015/02/msg00012.html
- Package : request-tracker3.8
- request-tracker4
- Opening url: https://lists.debian.org/debian-lts-announce/2015/02/msg00013.html
- Package : cups
- cups
- Opening url: https://lists.debian.org/debian-lts-announce/2015/02/msg00014.html
- Package : sudo
- sudo
- Opening url: https://lists.debian.org/debian-lts-announce/2015/02/msg00015.html
- Package : libgtk2-perl
- libgtk2-perl
- Opening url: https://lists.debian.org/debian-lts-announce/2015/02/msg00016.html
- Package : e2fsprogs
- e2fsprogs
- Opening url: https://lists.debian.org/debian-lts-announce/2015/02/msg00017.html
- ['CVE-2014-3686', 'CVE-2015-1306', 'CVE-2014-9422', 'CVE-2014-5352', 'CVE-2014-9421', 'CVE-2014-9423', 'CVE-2014-8139', 'CVE-2014-9636', 'CVE-2014-9298', 'CVE-2014-9297', 'CVE-2014-0191', 'CVE-2014-3660', 'CVE-2014-8161', 'CVE-2015-0244', 'CVE-2015-0241', 'CVE-2015-0243', 'CVE-2015-0247', 'CVE-2011-3389', 'CVE-2014-1569', 'CVE-2015-1593', 'CVE-2014-7822', 'CVE-2014-9420', 'CVE-2015-1421', 'CVE-2014-8134', 'CVE-2014-9419', 'CVE-2014-8160', 'CVE-2014-9585', 'CVE-2013-6885', 'CVE-2014-9584', 'CVE-2014-8133', 'CVE-2015-0240', 'CVE-2015-0412', 'CVE-2015-0410', 'CVE-2015-0395', 'CVE-2015-0408', 'CVE-2014-3566', 'CVE-2014-6587', 'CVE-2014-6585', 'CVE-2015-0407', 'CVE-2014-6591', 'CVE-2014-6593', 'CVE-2015-0383', 'CVE-2014-6601', 'CVE-2015-1165', 'CVE-2015-1464', 'CVE-2014-9472', 'CVE-2014-9679', 'CVE-2014-9680', 'CVE-2014-0106', 'CVE-2015-0247', 'CVE-2015-1572']
- Opening url: https://lists.debian.org/debian-lts-announce/2015/03/msg00000.html
- Package : bind9
- bind9
- Opening url: https://lists.debian.org/debian-lts-announce/2015/03/msg00001.html
- Package : unace
- unace
- Opening url: https://lists.debian.org/debian-lts-announce/2015/03/msg00002.html
- Package : eglibc
- glibc
- Opening url: https://lists.debian.org/debian-lts-announce/2015/03/msg00003.html
- Package : libarchive
- libarchive
- Opening url: https://lists.debian.org/debian-lts-announce/2015/03/msg00004.html
- Package : redcloth
- redcloth
- Opening url: https://lists.debian.org/debian-lts-announce/2015/03/msg00005.html
- Package : konversation
- konversation
- Opening url: https://lists.debian.org/debian-lts-announce/2015/03/msg00006.html
- Package : axis
- axis
- Opening url: https://lists.debian.org/debian-lts-announce/2015/03/msg00007.html
- Package : mod-gnutls
- mod-gnutls
- Opening url: https://lists.debian.org/debian-lts-announce/2015/03/msg00008.html
- Package : libssh2
- libssh2
- Opening url: https://lists.debian.org/debian-lts-announce/2015/03/msg00009.html
- Package : libextlib-ruby
- libextlib-ruby
- Opening url: https://lists.debian.org/debian-lts-announce/2015/03/msg00010.html
- Package : putty
- putty
- Opening url: https://lists.debian.org/debian-lts-announce/2015/03/msg00011.html
- Package : tcpdump
- tcpdump
- Opening url: https://lists.debian.org/debian-lts-announce/2015/03/msg00012.html
- Package : gnupg
- gnupg2
- Opening url: https://lists.debian.org/debian-lts-announce/2015/03/msg00013.html
- Package : mono
- mono
- Opening url: https://lists.debian.org/debian-lts-announce/2015/03/msg00014.html
- Package : openssl
- openssl
- Opening url: https://lists.debian.org/debian-lts-announce/2015/03/msg00015.html
- Package : tor
- tor
- Opening url: https://lists.debian.org/debian-lts-announce/2015/03/msg00016.html
- Package : tzdata
- tzdata
- Opening url: https://lists.debian.org/debian-lts-announce/2015/03/msg00017.html
- Package : gnutls26
- gnutls28
- Opening url: https://lists.debian.org/debian-lts-announce/2015/03/msg00018.html
- Package : xerces-c
- xerces-c
- Opening url: https://lists.debian.org/debian-lts-announce/2015/03/msg00019.html
- Package : batik
- batik
- Opening url: https://lists.debian.org/debian-lts-announce/2015/03/msg00020.html
- Package : libxfont
- libxfont
- Opening url: https://lists.debian.org/debian-lts-announce/2015/03/msg00021.html
- Package : binutils
- binutils
- Opening url: https://lists.debian.org/debian-lts-announce/2015/03/msg00022.html
- Package : freetype
- freetype
- Opening url: https://lists.debian.org/debian-lts-announce/2015/03/msg00023.html
- ['CVE-2015-1349', 'CVE-2015-2063', 'CVE-2013-4332', 'CVE-2012-3406', 'CVE-2012-3480', 'CVE-2012-4424', 'CVE-2013-4237', 'CVE-2015-1473', 'CVE-2013-7424', 'CVE-2012-4412', 'CVE-2013-0242', 'CVE-2013-4357', 'CVE-2014-4043', 'CVE-2015-1472', 'CVE-2013-4788', 'CVE-2013-7423', 'CVE-2013-1914', 'CVE-2013-4458', 'CVE-2012-3405', 'CVE-2012-6684', 'CVE-2014-8483', 'CVE-2014-3596', 'CVE-2012-5784', 'CVE-2015-2091', 'CVE-2015-1782', 'CVE-2013-0156', 'CVE-2015-2157', 'CVE-2015-0261', 'CVE-2015-2154', 'CVE-2015-2155', 'CVE-2015-0837', 'CVE-2015-1606', 'CVE-2014-3591', 'CVE-2015-2318', 'CVE-2015-2320', 'CVE-2015-2319', 'CVE-2015-0289', 'CVE-2015-0287', 'CVE-2015-0292', 'CVE-2015-0286', 'CVE-2015-0293', 'CVE-2015-0288', 'CVE-2015-0209', 'CVE-2015-0294', 'CVE-2015-0282', 'CVE-2014-8155', 'CVE-2015-0252', 'CVE-2015-0250', 'CVE-2015-1803', 'CVE-2015-1802', 'CVE-2015-1804', 'CVE-2014-8484', 'CVE-2014-8501', 'CVE-2014-8502', 'CVE-2014-8737', 'CVE-2014-8504', 'CVE-2014-8738', 'CVE-2014-8485', 'CVE-2014-8503', 'CVE-2014-9666', 'CVE-2014-9670', 'CVE-2014-9661', 'CVE-2014-9663', 'CVE-2014-9660', 'CVE-2014-9671', 'CVE-2014-9675', 'CVE-2014-9664', 'CVE-2014-9656', 'CVE-2014-9658', 'CVE-2014-9673', 'CVE-2014-9674', 'CVE-2014-9665', 'CVE-2014-9672', 'CVE-2014-9657', 'CVE-2014-9669', 'CVE-2014-9667']
- Opening url: https://lists.debian.org/debian-lts-announce/2015/04/msg00000.html
- Package : mailman
- mailman
- Opening url: https://lists.debian.org/debian-lts-announce/2015/04/msg00001.html
- Package : tor
- tor
- Opening url: https://lists.debian.org/debian-lts-announce/2015/04/msg00002.html
- Package : arj
- arj
- Opening url: https://lists.debian.org/debian-lts-announce/2015/04/msg00003.html
- Package : libgd2
- libgd2
- Opening url: https://lists.debian.org/debian-lts-announce/2015/04/msg00004.html
- Package : libgcrypt11
- libgcrypt11
- Opening url: https://lists.debian.org/debian-lts-announce/2015/04/msg00005.html
- Package : checkpw
- checkpw
- Opening url: https://lists.debian.org/debian-lts-announce/2015/04/msg00006.html
- Package : ntp
- ntp
- Opening url: https://lists.debian.org/debian-lts-announce/2015/04/msg00007.html
- Package : das-watchdog
- das-watchdog
- Opening url: https://lists.debian.org/debian-lts-announce/2015/04/msg00008.html
- Package : chrony
- chrony
- Opening url: https://lists.debian.org/debian-lts-announce/2015/04/msg00009.html
- Package : libtasn1-3
- libtasn1-3
- Opening url: https://lists.debian.org/debian-lts-announce/2015/04/msg00010.html
- Package : ia32-libs, ia32-libs-gtk
- ia32-libs, ia32-libs-gtk
- Opening url: https://lists.debian.org/debian-lts-announce/2015/04/msg00011.html
- Package : libvncserver
- libvncserver
- Opening url: https://lists.debian.org/debian-lts-announce/2015/04/msg00012.html
- Package : libx11
- libx11
- Opening url: https://lists.debian.org/debian-lts-announce/2015/04/msg00013.html
- Package : ruby1.9.1
- ruby2.3
- Opening url: https://lists.debian.org/debian-lts-announce/2015/04/msg00014.html
- Package : tzdata
- tzdata
- Opening url: https://lists.debian.org/debian-lts-announce/2015/04/msg00015.html
- Package : wesnoth-1.8
- wesnoth-1.8
- Opening url: https://lists.debian.org/debian-lts-announce/2015/04/msg00016.html
- Package : openldap
- openldap
- Opening url: https://lists.debian.org/debian-lts-announce/2015/04/msg00017.html
- Package : file
- file
- Opening url: https://lists.debian.org/debian-lts-announce/2015/04/msg00018.html
- Package : ppp
- ppp
- Opening url: https://lists.debian.org/debian-lts-announce/2015/04/msg00019.html
- Package : python-django-markupfield
- python-django-markupfield
- Opening url: https://lists.debian.org/debian-lts-announce/2015/04/msg00020.html
- Package : wireshark
- wireshark
- Opening url: https://lists.debian.org/debian-lts-announce/2015/04/msg00021.html
- Package : subversion
- subversion
- Opening url: https://lists.debian.org/debian-lts-announce/2015/04/msg00022.html
- Package : tzdata
- tzdata
- Opening url: https://lists.debian.org/debian-lts-announce/2015/04/msg00023.html
- Package : jruby
- jruby
- Opening url: https://lists.debian.org/debian-lts-announce/2015/04/msg00024.html
- Package : curl
- curl
- Opening url: https://lists.debian.org/debian-lts-announce/2015/04/msg00025.html
- Package : php5
- php5
- Opening url: https://lists.debian.org/debian-lts-announce/2015/04/msg00026.html
- Package : qt4-x11
- qt4-x11
- Opening url: https://lists.debian.org/debian-lts-announce/2015/04/msg00027.html
- Package : openjdk-6
- openjdk-6
- Opening url: https://lists.debian.org/debian-lts-announce/2015/04/msg00028.html
- Package : libxml-libxml-perl
- libxml-libxml-perl
- Opening url: https://lists.debian.org/debian-lts-announce/2015/04/msg00029.html
- Package : libjson-ruby
- libjson-ruby
- Opening url: https://lists.debian.org/debian-lts-announce/2015/04/msg00030.html
- Package : squid
- squid3
- Opening url: https://lists.debian.org/debian-lts-announce/2015/04/msg00031.html
- ['CVE-2015-2775', 'CVE-2015-2928', 'CVE-2015-2929', 'CVE-2015-0557', 'CVE-2015-2782', 'CVE-2015-0556', 'CVE-2014-2497', 'CVE-2014-9709', 'CVE-2015-0837', 'CVE-2014-3591', 'CVE-2015-0885', 'CVE-2015-1798', 'CVE-2015-1799', 'CVE-2015-2831', 'CVE-2015-1822', 'CVE-2015-1821', 'CVE-2015-1853', 'CVE-2015-2806', 'CVE-2014-6055', 'CVE-2014-6051', 'CVE-2014-6053', 'CVE-2014-6054', 'CVE-2014-6052', 'CVE-2013-7439', 'CVE-2014-8090', 'CVE-2014-4975', 'CVE-2014-8080', 'CVE-2015-0844', 'CVE-2015-1545', 'CVE-2013-4449', 'CVE-2012-1164', 'CVE-2014-9713', 'CVE-2014-9653', 'CVE-2015-3310', 'CVE-2015-0846', 'CVE-2015-0564', 'CVE-2014-8711', 'CVE-2014-6432', 'CVE-2014-6429', 'CVE-2014-8712', 'CVE-2014-6431', 'CVE-2015-0562', 'CVE-2014-6428', 'CVE-2014-6422', 'CVE-2014-8713', 'CVE-2015-2191', 'CVE-2014-6430', 'CVE-2014-8714', 'CVE-2014-6423', 'CVE-2015-2188', 'CVE-2014-8710', 'CVE-2013-1849', 'CVE-2015-0248', 'CVE-2013-1847', 'CVE-2014-0032', 'CVE-2015-0251', 'CVE-2013-1845', 'CVE-2013-1846', 'CVE-2011-4838', 'CVE-2012-5370', 'CVE-2015-3143', 'CVE-2015-3148', 'CVE-2015-2331', 'CVE-2015-0232', 'CVE-2015-3330', 'CVE-2014-9705', 'CVE-2015-3329', 'CVE-2015-0231', 'CVE-2015-', 'CVE-2015-2787', 'CVE-2015-2301', 'CVE-2015-2783', 'CVE-2015-1860', 'CVE-2015-1858', 'CVE-2013-0254', 'CVE-2015-0295', 'CVE-2015-1859', 'CVE-2015-0478', 'CVE-2015-0488', 'CVE-2015-0470', 'CVE-2015-0460', 'CVE-2015-0469', 'CVE-2015-0477', 'CVE-2015-0480', 'CVE-2015-3451', 'CVE-2013-0269', 'CVE-2014-3609']
- Opening url: https://lists.debian.org/debian-lts-announce/2015/05/msg00000.html
- <!-- MHonArc v2.6.19 -->
- <!--X-Subject: [SECURITY] [DLA 217-1] xdg-utils security update -->
- <!--X-From-R13: [vxr Unoevry <fhajrnireNqrovna.bet> -->
- <!--X-Date: Fri, 1 May 2015 09:33:23 +0000 (UTC) -->
- <!--X-Message-Id: 20150501093219.GA739@minobo.das-netzwerkteam.de -->
- <!--X-Content-Type: multipart/signed -->
- <!--X-Derived: pgpYDpPR4uLoq.pgp -->
- <!--X-Head-End-->
- <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"
- "http://www.w3.org/TR/html4/loose.dtd">
- <html>
- <head>
- <title>[SECURITY] [DLA 217-1] xdg-utils security update</title>
- <link rev="made" href="mailto:sunweaver@debian.org">
- <link rel="index" href="maillist.html">
- <link rel="top" href="threads.html">
- <link rel="up" href="msg00000.html">
- <link rel="prev" href="">
- <link rel="next" href="msg00001.html">
- </head>
- <body>
- <!--X-Body-Begin-->
- <!--X-User-Header-->
- <!--X-User-Header-End-->
- <!--X-TopPNI-->
- <hr>
- <form method="POST" action="/cgi-bin/spam-report.pl">
- <input type="hidden" name="listname" value="debian-lts-announce" />
- <input type="hidden" name="msg" value="msg00000.html" />
- <input type="hidden" name="date" value="2015/05" />
- <input type="submit" value="Report as spam" style="float: right" />
- [Date Prev][<a href="msg00001.html">Date Next</a>]
- [Thread Prev][<a href="msg00001.html">Thread Next</a>]
- [<a href="maillist.html#00000">Date Index</a>]
- [<a href="threads.html#00000">Thread Index</a>]
- </form>
- <!--X-TopPNI-End-->
- <!--X-MsgBody-->
- <!--X-Subject-Header-Begin-->
- <h1>[SECURITY] [DLA 217-1] xdg-utils security update</h1>
- <hr>
- <!--X-Subject-Header-End-->
- <!--X-Head-of-Message-->
- <ul>
- <li><em>To</em>: <a href="mailto:debian-lts-announce%40lists.debian.org">debian-lts-announce@lists.debian.org</a></li>
- <li><em>Subject</em>: [SECURITY] [DLA 217-1] xdg-utils security update</li>
- <li><em>From</em>: Mike Gabriel <<a href="mailto:sunweaver%40debian.org">sunweaver@debian.org</a>></li>
- <li><em>Date</em>: Fri, 1 May 2015 11:32:20 +0200</li>
- <li><em>Message-id</em>: <<a href="msg00000.html">20150501093219.GA739@minobo.das-netzwerkteam.de</a>></li>
- <li><em>Mail-followup-to</em>: <a href="mailto:debian-lts%40lists.debian.org">debian-lts@lists.debian.org</a></li>
- <li><em>Reply-to</em>: <a href="mailto:debian-lts%40lists.debian.org">debian-lts@lists.debian.org</a></li>
- </ul>
- <!--X-Head-of-Message-End-->
- <!--X-Head-Body-Sep-Begin-->
- <hr>
- <!--X-Head-Body-Sep-End-->
- <!--X-Body-of-Message-->
- <pre>The two below CVE issues have recently been fixed in Debian squeeze-lts:
- CVE-2014-9622
- John Houwer discovered a way to cause xdg-open, a tool that automatically
- opens URLs in a user's preferred application, to execute arbitrary
- commands remotely.
- CVE-2015-1877
- Jiri Horner discovered a way to cause xdg-open, a tool that automatically
- opens URLs in a user's preferred application, to execute arbitrary
- commands remotely.
- This problem only affects /bin/sh implementations that don't sanitize
- local variables. Dash, which is the default /bin/sh in Debian is
- affected. Bash as /bin/sh is known to be unaffected.
- --
- mike gabriel aka sunweaver (Debian Developer)
- fon: +49 (1520) 1976 148
- GnuPG Fingerprint: 9BFB AEE8 6C0A A5FF BF22 0782 9AF4 6B30 2577 1B31
- mail: sunweaver@debian.org, <a rel="nofollow" href="http://sunweavers.net">http://sunweavers.net</a>
- </pre><p><strong>Attachment:
- <a href="pgpYDpPR4uLoq.pgp" ><tt>signature.asc</tt></a></strong><br>
- <em>Description:</em> Digital signature</p>
- <!--X-Body-of-Message-End-->
- <!--X-MsgBody-End-->
- <!--X-Follow-Ups-->
- <hr />
- <strong>Reply to:</strong>
- <ul>
- <li><a href="mailto:debian-lts-announce@lists.debian.org?In-Reply-To=<20150501093219.GA739@minobo.das-netzwerkteam.de>&Subject=Re:%20[SECURITY] [DLA 217-1] xdg-utils security update">debian-lts-announce@lists.debian.org</a></li>
- <li><a href="mailto:sunweaver@debian.org?In-Reply-To=<20150501093219.GA739@minobo.das-netzwerkteam.de>&Subject=Re:%20[SECURITY] [DLA 217-1] xdg-utils security update&CC=debian-lts-announce@lists.debian.org">Mike Gabriel (on-list)</a></li>
- <li><a href="mailto:sunweaver@debian.org?In-Reply-To=<20150501093219.GA739@minobo.das-netzwerkteam.de>&Subject=Re:%20[SECURITY] [DLA 217-1] xdg-utils security update">Mike Gabriel (off-list)</a></li>
- </ul>
- <hr />
- <!--X-Follow-Ups-End-->
- <!--X-References-->
- <!--X-References-End-->
- <!--X-BotPNI-->
- <ul>
- <li>Next by Date:
- <strong><a href="msg00001.html">[SECURITY] [DLA 218-1] xorg-server security update</a></strong>
- </li>
- <li>Next by thread:
- <strong><a href="msg00001.html">[SECURITY] [DLA 218-1] xorg-server security update</a></strong>
- </li>
- <li>Index(es):
- <ul>
- <li><a href="maillist.html#00000"><strong>Date</strong></a></li>
- <li><a href="threads.html#00000"><strong>Thread</strong></a></li>
- </ul>
- </li>
- </ul>
- <!--X-BotPNI-End-->
- <!--X-User-Footer-->
- <!--X-User-Footer-End-->
- </body>
- </html>
- Problem with
- None
- ################################################################################
- Opening url: https://lists.debian.org/debian-lts-announce/2015/05/msg00001.html
- Package : xorg-server
- xorg-server
- Opening url: https://lists.debian.org/debian-lts-announce/2015/05/msg00002.html
- Package : xorg-server
- xorg-server
- Opening url: https://lists.debian.org/debian-lts-announce/2015/05/msg00003.html
- Package : icu
- icu
- Opening url: https://lists.debian.org/debian-lts-announce/2015/05/msg00004.html
- Package : dpkg
- dpkg
- Opening url: https://lists.debian.org/debian-lts-announce/2015/05/msg00005.html
- Package : tiff
- tiff
- Opening url: https://lists.debian.org/debian-lts-announce/2015/05/msg00006.html
- Package : nbd
- nbd
- Opening url: https://lists.debian.org/debian-lts-announce/2015/05/msg00007.html
- Package : ruby1.8
- ruby2.3
- Opening url: https://lists.debian.org/debian-lts-announce/2015/05/msg00008.html
- Package : commons-httpclient
- commons-httpclient
- Opening url: https://lists.debian.org/debian-lts-announce/2015/05/msg00009.html
- Package : dnsmasq
- dnsmasq
- Opening url: https://lists.debian.org/debian-lts-announce/2015/05/msg00010.html
- Package : ntfs-3g
- ntfs-3g
- Opening url: https://lists.debian.org/debian-lts-announce/2015/05/msg00011.html
- Package : ntfs-3g
- ntfs-3g
- Opening url: https://lists.debian.org/debian-lts-announce/2015/05/msg00012.html
- Package : libnokogiri-ruby
- libnokogiri-ruby
- Opening url: https://lists.debian.org/debian-lts-announce/2015/05/msg00013.html
- Package : eglibc
- glibc
- Opening url: https://lists.debian.org/debian-lts-announce/2015/05/msg00014.html
- Package : dulwich
- dulwich
- Opening url: https://lists.debian.org/debian-lts-announce/2015/05/msg00015.html
- Package : exactimage
- exactimage
- Opening url: https://lists.debian.org/debian-lts-announce/2015/05/msg00016.html
- Package : tomcat6
- tomcat8
- Opening url: https://lists.debian.org/debian-lts-announce/2015/05/msg00017.html
- Package : clamav
- clamav
- Opening url: https://lists.debian.org/debian-lts-announce/2015/05/msg00018.html
- Package : postgresql-8.4
- postgresql-9.6
- Opening url: https://lists.debian.org/debian-lts-announce/2015/05/msg00019.html
- Package : ipsec-tools
- ipsec-tools
- Opening url: https://lists.debian.org/debian-lts-announce/2015/05/msg00020.html
- Package : ruby1.9.1
- ruby2.3
- Opening url: https://lists.debian.org/debian-lts-announce/2015/05/msg00021.html
- ['CVE-2015-0255', 'CVE-2014-8092', 'CVE-2015-3418', 'CVE-2013-1569', 'CVE-2013-2383', 'CVE-2014-7923', 'CVE-2014-6585', 'CVE-2013-2384', 'CVE-2014-9654', 'CVE-2014-6591', 'CVE-2014-7940', 'CVE-2014-7926', 'CVE-2013-2419', 'CVE-2015-0840', 'CVE-2014-9330', 'CVE-2014-8128', 'CVE-2014-9655', 'CVE-2014-8129', 'CVE-2015-0847', 'CVE-2015-1855', 'CVE-2012-6153', 'CVE-2014-3577', 'CVE-2012-5783', 'CVE-2015-3294', 'CVE-2015-3202', 'CVE-2015-3202', 'CVE-2012-6685', 'CVE-2015-1781', 'CVE-2015-0838', 'CVE-2015-3885', 'CVE-2014-7810', 'CVE-2014-0230', 'CVE-2014-0227', 'CVE-2015-1462', 'CVE-2015-2221', 'CVE-2015-2222', 'CVE-2015-2668', 'CVE-2015-1463', 'CVE-2014-9328', 'CVE-2014-9556', 'CVE-2015-2170', 'CVE-2015-1461', 'CVE-2015-3166', 'CVE-2015-3167', 'CVE-2015-3165', 'CVE-2015-4047', 'CVE-2015-1855', 'CVE-2012-4522', 'CVE-2013-0256', 'CVE-2013-2065', 'CVE-2011-2705', 'CVE-2011-0188']
- Opening url: https://lists.debian.org/debian-lts-announce/2015/06/msg00000.html
- Package : wordpress
- wordpress
- Opening url: https://lists.debian.org/debian-lts-announce/2015/06/msg00001.html
- Package : mercurial
- mercurial
- Opening url: https://lists.debian.org/debian-lts-announce/2015/06/msg00002.html
- Package : fuse
- fuse
- Opening url: https://lists.debian.org/debian-lts-announce/2015/06/msg00003.html
- Package : cups
- cups
- Opening url: https://lists.debian.org/debian-lts-announce/2015/06/msg00004.html
- Package : libapache-mod-jk
- libapache-mod-jk
- Opening url: https://lists.debian.org/debian-lts-announce/2015/06/msg00005.html
- Package : libraw
- libraw
- Opening url: https://lists.debian.org/debian-lts-announce/2015/06/msg00006.html
- Package : wireshark
- wireshark
- Opening url: https://lists.debian.org/debian-lts-announce/2015/06/msg00007.html
- Package : libraw
- libraw
- Opening url: https://lists.debian.org/debian-lts-announce/2015/06/msg00008.html
- Package : imagemagick
- imagemagick
- Opening url: https://lists.debian.org/debian-lts-announce/2015/06/msg00009.html
- Package : strongswan
- strongswan
- Opening url: https://lists.debian.org/debian-lts-announce/2015/06/msg00010.html
- Package : p7zip
- p7zip
- Opening url: https://lists.debian.org/debian-lts-announce/2015/06/msg00011.html
- Package : linux-2.6
- linux
- Opening url: https://lists.debian.org/debian-lts-announce/2015/06/msg00012.html
- Package : linux-2.6
- linux
- Opening url: https://lists.debian.org/debian-lts-announce/2015/06/msg00013.html
- Package : openssl
- openssl
- Opening url: https://lists.debian.org/debian-lts-announce/2015/06/msg00014.html
- Package : qemu
- qemu
- Opening url: https://lists.debian.org/debian-lts-announce/2015/06/msg00015.html
- Package : qemu-kvm
- qemu
- Opening url: https://lists.debian.org/debian-lts-announce/2015/06/msg00016.html
- Package : libclamunrar
- libclamunrar
- Opening url: https://lists.debian.org/debian-lts-announce/2015/06/msg00017.html
- Package : zendframework
- zendframework
- Opening url: https://lists.debian.org/debian-lts-announce/2015/06/msg00018.html
- Package : postgresql-8.4
- postgresql-9.6
- Opening url: https://lists.debian.org/debian-lts-announce/2015/06/msg00019.html
- Package : zendframework
- zendframework
- Opening url: https://lists.debian.org/debian-lts-announce/2015/06/msg00020.html
- Package : libwmf
- libwmf
- Opening url: https://lists.debian.org/debian-lts-announce/2015/06/msg00021.html
- Package : librack-ruby
- ruby-rack
- Opening url: https://lists.debian.org/debian-lts-announce/2015/06/msg00022.html
- Package : cacti
- cacti
- Opening url: https://lists.debian.org/debian-lts-announce/2015/06/msg00023.html
- Package : t1utils
- t1utils
- Opening url: https://lists.debian.org/debian-lts-announce/2015/06/msg00024.html
- Package : libwmf
- libwmf
- Opening url: https://lists.debian.org/debian-lts-announce/2015/06/msg00025.html
- Package : jqueryui
- jqueryui
- Opening url: https://lists.debian.org/debian-lts-announce/2015/06/msg00026.html
- Package : shibboleth-sp2
- shibboleth-sp2
- Opening url: https://lists.debian.org/debian-lts-announce/2015/06/msg00027.html
- Package : hostapd
- hostapd
- Opening url: https://lists.debian.org/debian-lts-announce/2015/06/msg00028.html
- Package : aptdaemon
- aptdaemon
- Opening url: https://lists.debian.org/debian-lts-announce/2015/06/msg00029.html
- Package : libcrypto++
- libcrypto++
- Opening url: https://lists.debian.org/debian-lts-announce/2015/06/msg00030.html
- ['CVE-2014-9033', 'CVE-2014-9031', 'CVE-2014-9037', 'CVE-2014-9036', 'CVE-2015-3438', 'CVE-2014-9034', 'CVE-2015-3440', 'CVE-2015-3439', 'CVE-2014-9035', 'CVE-2014-9038', 'CVE-2014-9039', 'CVE-2014-9462', 'CVE-2014-9390', 'CVE-2015-3202', 'CVE-2015-1159', 'CVE-2015-1158', 'CVE-2014-8111', 'CVE-2015-3885', 'CVE-2015-3811', 'CVE-2015-3885', 'CVE-2014-8562', 'CVE-2012-3437', 'CVE-2014-8354', 'CVE-2014-8355', 'CVE-2015-4171', 'CVE-2015-1038', 'CVE-2014-8159', 'CVE-2015-1805', 'CVE-2014-9728', 'CVE-2015-2922', 'CVE-2011-5321', 'CVE-2015-3339', 'CVE-2015-4167', 'CVE-2014-3184', 'CVE-2014-9729', 'CVE-2015-2830', 'CVE-2015-2041', 'CVE-2012-6689', 'CVE-2015-2042', 'CVE-2014-9730', 'CVE-2014-9731', 'CVE-2014-9683', 'CVE-2014-8159', 'CVE-2015-1805', 'CVE-2014-9728', 'CVE-2015-2922', 'CVE-2011-5321', 'CVE-2015-3339', 'CVE-2015-4167', 'CVE-2014-3184', 'CVE-2014-9729', 'CVE-2015-2830', 'CVE-2015-2041', 'CVE-2012-6689', 'CVE-2015-2042', 'CVE-2014-9730', 'CVE-2014-9731', 'CVE-2014-9683', 'CVE-2015-1789', 'CVE-2015-1790', 'CVE-2015-1791', 'CVE-2014-8176', 'CVE-2015-4000', 'CVE-2015-1792', 'CVE-2015-3456', 'CVE-2015-3456', 'CVE-2014-2683', 'CVE-2014-8088', 'CVE-2014-2685', 'CVE-2015-3154', 'CVE-2014-4914', 'CVE-2012-5657', 'CVE-2014-2684', 'CVE-2012-6531', 'CVE-2014-8089', 'CVE-2014-2682', 'CVE-2014-2681', 'CVE-2012-6532', 'CVE-2014-2683', 'CVE-2014-8088', 'CVE-2014-2685', 'CVE-2015-3154', 'CVE-2014-4914', 'CVE-2012-5657', 'CVE-2014-2684', 'CVE-2012-6531', 'CVE-2014-8089', 'CVE-2014-2682', 'CVE-2014-2681', 'CVE-2012-6532', 'CVE-2015-4588', 'CVE-2015-0848', 'CVE-2015-3225', 'CVE-2015-4454', 'CVE-2015-4342', 'CVE-2015-2665', 'CVE-2015-3905', 'CVE-2015-4696', 'CVE-2015-4695', 'CVE-2010-5312', 'CVE-2015-2684', 'CVE-2015-4142', 'CVE-2015-1323', 'CVE-2015-2141']
- Opening url: https://lists.debian.org/debian-lts-announce/2015/07/msg00000.html
- Package : ruby1.9.1
- ruby2.3
- Opening url: https://lists.debian.org/debian-lts-announce/2015/07/msg00001.html
- Package : libmodule-signature-perl
- libmodule-signature-perl
- Opening url: https://lists.debian.org/debian-lts-announce/2015/07/msg00002.html
- Package : unattended-upgrades
- unattended-upgrades
- Opening url: https://lists.debian.org/debian-lts-announce/2015/07/msg00003.html
- Package : pykerberos
- pykerberos
- Opening url: https://lists.debian.org/debian-lts-announce/2015/07/msg00004.html
- Package : libxml2
- libxml2
- Opening url: https://lists.debian.org/debian-lts-announce/2015/07/msg00005.html
- Package : aptdaemon
- aptdaemon
- Opening url: https://lists.debian.org/debian-lts-announce/2015/07/msg00006.html
- Package : virtualbox-ose
- virtualbox-ose
- Opening url: https://lists.debian.org/debian-lts-announce/2015/07/msg00007.html
- Package : linux-ftpd-ssl
- linux
- Opening url: https://lists.debian.org/debian-lts-announce/2015/07/msg00008.html
- Package : bind9
- bind9
- Opening url: https://lists.debian.org/debian-lts-announce/2015/07/msg00009.html
- Package : libunwind
- libunwind
- Opening url: https://lists.debian.org/debian-lts-announce/2015/07/msg00010.html
- Package : python-django
- python-django
- Opening url: https://lists.debian.org/debian-lts-announce/2015/07/msg00011.html
- Package : tidy
- tidy
- Opening url: https://lists.debian.org/debian-lts-announce/2015/07/msg00012.html
- Package : inspircd
- inspircd
- Opening url: https://lists.debian.org/debian-lts-announce/2015/07/msg00013.html
- Package : groovy
- groovy
- Opening url: https://lists.debian.org/debian-lts-announce/2015/07/msg00014.html
- Package : ruby1.9.1
- ruby2.3
- Opening url: https://lists.debian.org/debian-lts-announce/2015/07/msg00015.html
- Package : libidn
- libidn
- Opening url: https://lists.debian.org/debian-lts-announce/2015/07/msg00016.html
- Package : cacti
- cacti
- Opening url: https://lists.debian.org/debian-lts-announce/2015/07/msg00017.html
- Package : cacti
- cacti
- Opening url: https://lists.debian.org/debian-lts-announce/2015/07/msg00018.html
- Package : python-tornado
- python-tornado
- Opening url: https://lists.debian.org/debian-lts-announce/2015/07/msg00019.html
- Package : lighttpd
- lighttpd
- Opening url: https://lists.debian.org/debian-lts-announce/2015/07/msg00020.html
- Package : ghostscript
- ghostscript
- Opening url: https://lists.debian.org/debian-lts-announce/2015/07/msg00021.html
- Package : expat
- expat
- Opening url: https://lists.debian.org/debian-lts-announce/2015/07/msg00022.html
- Package : icu
- icu
- Opening url: https://lists.debian.org/debian-lts-announce/2015/07/msg00023.html
- Package : bind9
- bind9
- Opening url: https://lists.debian.org/debian-lts-announce/2015/07/msg00024.html
- Package : apache2
- apache2
- Opening url: https://lists.debian.org/debian-lts-announce/2015/07/msg00025.html
- Package : squid3
- squid3
- Opening url: https://lists.debian.org/debian-lts-announce/2015/07/msg00026.html
- ['CVE-2012-5371', 'CVE-2011-4815', 'CVE-2013-0269', 'CVE-2015-3407', 'CVE-2015-3406', 'CVE-2015-3409', 'CVE-2015-3408', 'CVE-2015-1330', 'CVE-2015-3206', 'CVE-2015-1819', 'CVE-2015-1323', 'CVE-2015-0377', 'CVE-2015-0418', 'CVE-2015-3456', 'CVE-2015-4620', 'CVE-2015-3239', 'CVE-2015-2317', 'CVE-2015-5144', 'CVE-2015-5143', 'CVE-2015-5522', 'CVE-2015-5523', 'CVE-2012-1836', 'CVE-2015-3253', 'CVE-2014-6438', 'CVE-2015-2059', 'CVE-2015-4634', 'CVE-2014-9720', 'CVE-2014-3566', 'CVE-2015-3228', 'CVE-2015-2716', 'CVE-2015-1283', 'CVE-2015-4760', 'CVE-2015-5477', 'CVE-2015-3183', 'CVE-2015-5400']
- Opening url: https://lists.debian.org/debian-lts-announce/2015/08/msg00000.html
- Package : ia32-libs, ia32-libs-gtk
- ia32-libs, ia32-libs-gtk
- Opening url: https://lists.debian.org/debian-lts-announce/2015/08/msg00001.html
- Package : openssh
- openssl
- Opening url: https://lists.debian.org/debian-lts-announce/2015/08/msg00002.html
- Package : remind
- remind
- Opening url: https://lists.debian.org/debian-lts-announce/2015/08/msg00003.html
- Package : xmltooling
- xmltooling
- Opening url: https://lists.debian.org/debian-lts-announce/2015/08/msg00004.html
- Package : opensaml2
- opensaml2
- Opening url: https://lists.debian.org/debian-lts-announce/2015/08/msg00005.html
- Package : libidn
- libidn
- Opening url: https://lists.debian.org/debian-lts-announce/2015/08/msg00006.html
- Package : subversion
- subversion
- Opening url: https://lists.debian.org/debian-lts-announce/2015/08/msg00007.html
- Package : libstruts1.2-java
- libstruts1.2-java
- Opening url: https://lists.debian.org/debian-lts-announce/2015/08/msg00008.html
- Package : wordpress
- wordpress
- Opening url: https://lists.debian.org/debian-lts-announce/2015/08/msg00009.html
- Package : conntrack
- conntrack
- Opening url: https://lists.debian.org/debian-lts-announce/2015/08/msg00010.html
- Package : extplorer
- extplorer
- Opening url: https://lists.debian.org/debian-lts-announce/2015/08/msg00011.html
- Package : wesnoth-1.8
- wesnoth-1.8
- Opening url: https://lists.debian.org/debian-lts-announce/2015/08/msg00012.html
- Package : roundup
- roundup
- Opening url: https://lists.debian.org/debian-lts-announce/2015/08/msg00013.html
- Package : ruby1.8
- ruby2.3
- Opening url: https://lists.debian.org/debian-lts-announce/2015/08/msg00014.html
- Package : ruby1.9.1
- ruby2.3
- Opening url: https://lists.debian.org/debian-lts-announce/2015/08/msg00015.html
- Package : pykerberos
- pykerberos
- Opening url: https://lists.debian.org/debian-lts-announce/2015/08/msg00016.html
- Package : python-django
- python-django
- Opening url: https://lists.debian.org/debian-lts-announce/2015/08/msg00017.html
- Package : zendframework
- zendframework
- Opening url: https://lists.debian.org/debian-lts-announce/2015/08/msg00018.html
- Package : openjdk-6
- openjdk-6
- Opening url: https://lists.debian.org/debian-lts-announce/2015/08/msg00019.html
- ['CVE-2015-5352', 'CVE-2015-5600', 'CVE-2015-5957', 'CVE-2015-0851', 'CVE-2015-0851', 'CVE-2015-2059', 'CVE-2015-3187', 'CVE-2014-0899', 'CVE-2015-5731', 'CVE-2015-5734', 'CVE-2015-2213', 'CVE-2015-5732', 'CVE-2015-5622', 'CVE-2015-6496', 'CVE-2015-0896', 'CVE-2015-5070', 'CVE-2015-5069', 'CVE-2012-6131', 'CVE-2012-6132', 'CVE-2012-6130', 'CVE-2012-6133', 'CVE-2009-5147', 'CVE-2009-5147', 'CVE-2015-3206', 'CVE-2015-5964', 'CVE-2015-5963', 'CVE-2015-5161', 'CVE-2015-4732', 'CVE-2015-4731', 'CVE-2015-4733', 'CVE-2015-4748', 'CVE-2015-4760', 'CVE-2015-2590', 'CVE-2015-2628', 'CVE-2015-2625', 'CVE-2015-4000', 'CVE-2015-2621', 'CVE-2015-2601', 'CVE-2015-4749', 'CVE-2015-2632', 'CVE-2015-2808']
- Opening url: https://lists.debian.org/debian-lts-announce/2015/09/msg00000.html
- Package : openslp-dfsg
- openslp-dfsg
- Opening url: https://lists.debian.org/debian-lts-announce/2015/09/msg00001.html
- Package : screen
- screen
- Opening url: https://lists.debian.org/debian-lts-announce/2015/09/msg00002.html
- Package : php5
- php5
- Opening url: https://lists.debian.org/debian-lts-announce/2015/09/msg00003.html
- Package : bind9
- bind9
- Opening url: https://lists.debian.org/debian-lts-announce/2015/09/msg00004.html
- Package : libvdpau
- libvdpau
- Opening url: https://lists.debian.org/debian-lts-announce/2015/09/msg00005.html
- Package : openldap
- openldap
- Opening url: https://lists.debian.org/debian-lts-announce/2015/09/msg00006.html
- Package : rpcbind
- rpcbind
- Opening url: https://lists.debian.org/debian-lts-announce/2015/09/msg00007.html
- Package : libtorrent-rasterbar
- libtorrent-rasterbar
- Opening url: https://lists.debian.org/debian-lts-announce/2015/09/msg00008.html
- Package : linux-2.6
- linux
- Opening url: https://lists.debian.org/debian-lts-announce/2015/09/msg00009.html
- Package : cups
- cups
- Opening url: https://lists.debian.org/debian-lts-announce/2015/09/msg00010.html
- Package : nss
- nss
- Opening url: https://lists.debian.org/debian-lts-announce/2015/09/msg00011.html
- Package : eglibc
- glibc
- Opening url: https://lists.debian.org/debian-lts-announce/2015/09/msg00012.html
- Package : vorbis-tools
- vorbis-tools
- Opening url: https://lists.debian.org/debian-lts-announce/2015/09/msg00013.html
- Package : virtualbox-ose
- virtualbox-ose
- Opening url: https://lists.debian.org/debian-lts-announce/2015/09/msg00014.html
- Package : flightgear
- flightgear
- Opening url: https://lists.debian.org/debian-lts-announce/2015/09/msg00015.html
- Package : openssh
- openssl
- Opening url: https://lists.debian.org/debian-lts-announce/2015/09/msg00016.html
- Package : libemail-address-perl
- libemail-address-perl
- Opening url: https://lists.debian.org/debian-lts-announce/2015/09/msg00017.html
- Package : freetype
- freetype
- Opening url: https://lists.debian.org/debian-lts-announce/2015/09/msg00018.html
- Package : wordpress
- wordpress
- Opening url: https://lists.debian.org/debian-lts-announce/2015/09/msg00019.html
- ['CVE-2010-3609', 'CVE-2015-5177', 'CVE-2012-4428', 'CVE-2015-6806', 'CVE-2015-4026', 'CVE-2015-3412', 'CVE-2015-4148', 'CVE-2015-4025', 'CVE-2006-7243', 'CVE-2015-4598', 'CVE-2015-4147', 'CVE-2015-4602', 'CVE-2015-4601', 'CVE-2015-4643', 'CVE-2015-4644', 'CVE-2015-5590', 'CVE-2015-3411', 'CVE-2015-4605', 'CVE-2015-4604', 'CVE-2015-5589', 'CVE-2015-', 'CVE-2015-4021', 'CVE-2015-4600', 'CVE-2015-3307', 'CVE-2015-4022', 'CVE-2015-4599', 'CVE-2015-5722', 'CVE-2015-5198', 'CVE-2015-5199', 'CVE-2015-5200', 'CVE-2015-6908', 'CVE-2015-7236', 'CVE-2015-5685', 'CVE-2015-5366', 'CVE-2015-5156', 'CVE-2015-5707', 'CVE-2015-0272', 'CVE-2015-6937', 'CVE-2015-5364', 'CVE-2015-5697', 'CVE-2015-3258', 'CVE-2015-3279', 'CVE-2015-2721', 'CVE-2015-2730', 'CVE-2014-8121', 'CVE-2015-6749', 'CVE-2014-9639', 'CVE-2014-9638', 'CVE-2014-9640', 'CVE-2014-2486', 'CVE-2014-2488', 'CVE-2014-2489', 'CVE-2013-3792', 'CVE-2015-2594', 'CVE-2015-5600', 'CVE-2014-9745', 'CVE-2014-9747', 'CVE-2014-9746', 'CVE-2015-5715', 'CVE-2015-5714']
- Opening url: https://lists.debian.org/debian-lts-announce/2015/10/msg00000.html
- Package : commons-httpclient
- commons-httpclient
- Opening url: https://lists.debian.org/debian-lts-announce/2015/10/msg00001.html
- Package : fuseiso
- fuseiso
- Opening url: https://lists.debian.org/debian-lts-announce/2015/10/msg00002.html
- Package : binutils
- binutils
- Opening url: https://lists.debian.org/debian-lts-announce/2015/10/msg00003.html
- Package : linux-2.6
- linux
- Opening url: https://lists.debian.org/debian-lts-announce/2015/10/msg00004.html
- Package : zendframework
- zendframework
- Opening url: https://lists.debian.org/debian-lts-announce/2015/10/msg00005.html
- Package : freeimage
- freeimage
- Opening url: https://lists.debian.org/debian-lts-announce/2015/10/msg00006.html
- Package : tzdata
- tzdata
- Opening url: https://lists.debian.org/debian-lts-announce/2015/10/msg00007.html
- Package : postgresql-8.4
- postgresql-9.6
- Opening url: https://lists.debian.org/debian-lts-announce/2015/10/msg00008.html
- Package : unzip
- unzip
- Opening url: https://lists.debian.org/debian-lts-announce/2015/10/msg00009.html
- Package : polarssl
- polarssl
- Opening url: https://lists.debian.org/debian-lts-announce/2015/10/msg00010.html
- Package : optipng
- optipng
- Opening url: https://lists.debian.org/debian-lts-announce/2015/10/msg00011.html
- Package : cakephp
- cakephp
- Opening url: https://lists.debian.org/debian-lts-announce/2015/10/msg00012.html
- Package : libxml2
- libxml2
- Opening url: https://lists.debian.org/debian-lts-announce/2015/10/msg00013.html
- Package : libxml2
- libxml2
- Opening url: https://lists.debian.org/debian-lts-announce/2015/10/msg00014.html
- Package : phpmyadmin
- phpmyadmin
- Opening url: https://lists.debian.org/debian-lts-announce/2015/10/msg00015.html
- Package : ntp
- ntp
- Opening url: https://lists.debian.org/debian-lts-announce/2015/10/msg00016.html
- Package : busybox
- busybox
- Opening url: https://lists.debian.org/debian-lts-announce/2015/10/msg00017.html
- Package : xscreensaver
- xscreensaver
- Opening url: https://lists.debian.org/debian-lts-announce/2015/10/msg00018.html
- ['CVE-2015-5262', 'CVE-2012-3509', 'CVE-2015-2925', 'CVE-2015-5257', 'CVE-2015-7613', 'CVE-2015-7695', 'CVE-2015-0852', 'CVE-2015-5288', 'CVE-2015-7696', 'CVE-2015-7697', 'CVE-2015-5291', 'CVE-2015-7801', 'CVE-2015-7942', 'CVE-2014-9218', 'CVE-2015-2206', 'CVE-2015-3902', 'CVE-2014-8958', 'CVE-2015-5146', 'CVE-2015-5300', 'CVE-2015-7691', 'CVE-2015-7851', 'CVE-2015-7855', 'CVE-2015-7852', 'CVE-2015-7871', 'CVE-2015-7692', 'CVE-2015-7701', 'CVE-2015-7704', 'CVE-2015-7850', 'CVE-2015-7702', 'CVE-2015-5195', 'CVE-2015-5194', 'CVE-2015-7703', 'CVE-2014-9750', 'CVE-2015-5219', 'CVE-2015-8025']
- Opening url: https://lists.debian.org/debian-lts-announce/2015/11/msg00000.html
- Package : libhtml-scrubber-perl
- libhtml-scrubber-perl
- Opening url: https://lists.debian.org/debian-lts-announce/2015/11/msg00001.html
- Package : krb5
- krb5
- Opening url: https://lists.debian.org/debian-lts-announce/2015/11/msg00002.html
- Package : php5
- php5
- Opening url: https://lists.debian.org/debian-lts-announce/2015/11/msg00003.html
- Package : libpng
- libpng1.6
- Opening url: https://lists.debian.org/debian-lts-announce/2015/11/msg00004.html
- Package : openafs
- openafs
- Opening url: https://lists.debian.org/debian-lts-announce/2015/11/msg00005.html
- Package : strongswan
- strongswan
- Opening url: https://lists.debian.org/debian-lts-announce/2015/11/msg00006.html
- Package : nspr
- nspr
- Opening url: https://lists.debian.org/debian-lts-announce/2015/11/msg00007.html
- Package : openjdk-6
- openjdk-6
- Opening url: https://lists.debian.org/debian-lts-announce/2015/11/msg00008.html
- Package        : putty
- putty
- Opening url: https://lists.debian.org/debian-lts-announce/2015/11/msg00009.html
- Package : python-django
- python-django
- Opening url: https://lists.debian.org/debian-lts-announce/2015/11/msg00010.html
- Package : redmine
- redmine
- Opening url: https://lists.debian.org/debian-lts-announce/2015/11/msg00011.html
- Package : eglibc
- glibc
- Opening url: https://lists.debian.org/debian-lts-announce/2015/11/msg00012.html
- Package : libcommons-collections3-java
- libcommons-collections3-java
- Opening url: https://lists.debian.org/debian-lts-announce/2015/11/msg00013.html
- Package : smokeping
- smokeping
- Opening url: https://lists.debian.org/debian-lts-announce/2015/11/msg00014.html
- Package : imagemagick
- imagemagick
- Opening url: https://lists.debian.org/debian-lts-announce/2015/11/msg00015.html
- Package : nss
- nss
- Opening url: https://lists.debian.org/debian-lts-announce/2015/11/msg00016.html
- Package : libxml2
- libxml2
- Opening url: https://lists.debian.org/debian-lts-announce/2015/11/msg00017.html
- Package : libsndfile
- libsndfile
- Opening url: https://lists.debian.org/debian-lts-announce/2015/11/msg00018.html
- Package : libphp-snoopy
- libphp-snoopy
- Opening url: https://lists.debian.org/debian-lts-announce/2015/11/msg00019.html
- ['CVE-2015-5667', 'CVE-2015-2695', 'CVE-2015-2697', 'CVE-2015-7803', 'CVE-2015-7804', 'CVE-2015-6831', 'CVE-2015-6832', 'CVE-2015-6837', 'CVE-2015-6838', 'CVE-2015-6836', 'CVE-2015-6834', 'CVE-2015-6833', 'CVE-2015-7981', 'CVE-2015-8126', 'CVE-2012-3425', 'CVE-2015-3285', 'CVE-2015-3283', 'CVE-2015-3282', 'CVE-2015-7762', 'CVE-2015-6587', 'CVE-2015-7763', 'CVE-2015-8023', 'CVE-2015-7183', 'CVE-2015-4843', 'CVE-2015-4893', 'CVE-2015-4911', 'CVE-2015-4842', 'CVE-2015-4903', 'CVE-2015-4872', 'CVE-2015-4806', 'CVE-2015-4883', 'CVE-2015-4860', 'CVE-2015-4882', 'CVE-2015-4844', 'CVE-2015-4803', 'CVE-2015-4881', 'CVE-2015-4835', 'CVE-2015-4734', 'CVE-2015-4805', 'CVE-2015-5309', 'CVE-2015-8213', 'CVE-2015-8346', 'CVE-2012-4412', 'CVE-2012-4424', 'CVE-2013-4168', 'CVE-2015-7182', 'CVE-2015-7181', 'CVE-2015-8241', 'CVE-2015-7942', 'CVE-2015-8317', 'CVE-2014-9496', 'CVE-2014-9756', 'CVE-2015-7805', 'CVE-2008-7313', 'CVE-2014-5008']
- Opening url: https://lists.debian.org/debian-lts-announce/2015/12/msg00000.html
- Package : openssl
- openssl
- Opening url: https://lists.debian.org/debian-lts-announce/2015/12/msg00001.html
- Package : bouncycastle
- bouncycastle
- Opening url: https://lists.debian.org/debian-lts-announce/2015/12/msg00002.html
- Package        : linux-2.6
- linux
- Opening url: https://lists.debian.org/debian-lts-announce/2015/12/msg00003.html
- Package : dhcpcd
- dhcpcd5
- Opening url: https://lists.debian.org/debian-lts-announce/2015/12/msg00004.html
- Package : libphp-phpmailer
- libphp-phpmailer
- Opening url: https://lists.debian.org/debian-lts-announce/2015/12/msg00005.html
- Package : gnutls26
- gnutls28
- Opening url: https://lists.debian.org/debian-lts-announce/2015/12/msg00006.html
- Package : foomatic-filters
- foomatic-filters
- Opening url: https://lists.debian.org/debian-lts-announce/2015/12/msg00007.html
- Package : arts
- arts
- Opening url: https://lists.debian.org/debian-lts-announce/2015/12/msg00008.html
- Package : kdelibs
- kdelibs
- Opening url: https://lists.debian.org/debian-lts-announce/2015/12/msg00009.html
- Package : grub2
- grub2
- Opening url: https://lists.debian.org/debian-lts-announce/2015/12/msg00010.html
- Package : pygments
- pygments
- Opening url: https://lists.debian.org/debian-lts-announce/2015/12/msg00011.html
- <!-- MHonArc v2.6.19 -->
- <!--X-Subject: [SECURITY] [DLA 359-1] MySQL 5.5 packages added; end of support for MySQL 5.1 -->
- <!--X-From-R13: Enagvntb Dhnab =?vfb-8859-1?C?Dvap=T3a?= <fnagvntbeeNevfrhc.arg> -->
- <!--X-Date: Wed, 16 Dec 2015 07:58:20 +0000 (UTC) -->
- <!--X-Message-Id: 20151216075802.GA26571@nomada -->
- <!--X-Content-Type: multipart/signed -->
- <!--X-Derived: pgpiqFlifBjY1.pgp -->
- <!--X-Head-End-->
- <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"
- "http://www.w3.org/TR/html4/loose.dtd">
- <html>
- <head>
- <title>[SECURITY] [DLA 359-1] MySQL 5.5 packages added; end of support for MySQL 5.1</title>
- <link rev="made" href="mailto:santiagorr@riseup.net">
- <link rel="index" href="maillist.html">
- <link rel="top" href="threads.html">
- <link rel="up" href="msg00011.html">
- <link rel="prev" href="msg00010.html">
- <link rel="next" href="msg00012.html">
- <meta name="viewport" content="width=device-width, initial-scale=1">
- <style>
- pre {
- white-space: pre-wrap;
- }
- </style>
- </head>
- <body>
- <!--X-Body-Begin-->
- <!--X-User-Header-->
- <!--X-User-Header-End-->
- <!--X-TopPNI-->
- <hr>
- <form method="POST" action="/cgi-bin/spam-report.pl">
- <input type="hidden" name="listname" value="debian-lts-announce" />
- <input type="hidden" name="msg" value="msg00011.html" />
- <input type="hidden" name="date" value="2015/12" />
- <input type="submit" value="Report as spam" style="float: right" />
- [<a href="msg00010.html">Date Prev</a>][<a href="msg00012.html">Date Next</a>]
- [<a href="msg00010.html">Thread Prev</a>][<a href="msg00012.html">Thread Next</a>]
- [<a href="maillist.html#00011">Date Index</a>]
- [<a href="threads.html#00011">Thread Index</a>]
- </form>
- <!--X-TopPNI-End-->
- <!--X-MsgBody-->
- <!--X-Subject-Header-Begin-->
- <h1>[SECURITY] [DLA 359-1] MySQL 5.5 packages added; end of support for MySQL 5.1</h1>
- <hr>
- <!--X-Subject-Header-End-->
- <!--X-Head-of-Message-->
- <ul>
- <li><em>To</em>: <a href="mailto:debian-lts-announce%40lists.debian.org">debian-lts-announce@lists.debian.org</a></li>
- <li><em>Subject</em>: [SECURITY] [DLA 359-1] MySQL 5.5 packages added; end of support for MySQL 5.1</li>
- <li><em>From</em>: Santiago Ruano Rincón <<a href="mailto:santiagorr%40riseup.net">santiagorr@riseup.net</a>></li>
- <li><em>Date</em>: Wed, 16 Dec 2015 08:58:02 +0100</li>
- <li><em>Message-id</em>: <<A HREF="/msgid-search/20151216075802.GA26571@nomada">[🔎]</a> <a href="msg00011.html">20151216075802.GA26571@nomada</A>></li>
- <li><em>Mail-followup-to</em>: <a href="mailto:debian-lts%40lists.debian.org">debian-lts@lists.debian.org</a></li>
- <li><em>Reply-to</em>: <a href="mailto:debian-lts%40lists.debian.org">debian-lts@lists.debian.org</a></li>
- </ul>
- <!--X-Head-of-Message-End-->
- <!--X-Head-Body-Sep-Begin-->
- <hr>
- <!--X-Head-Body-Sep-End-->
- <!--X-Body-of-Message-->
- <pre>Oracle, the upstream maintainer of MySQL, no longer supports MySQL
- version 5.1, which is included in Debian 6.0 "squeeze". MySQL 5.1 likely
- suffers from multiple vulnerabilities fixed in newer versions after the
- end of upstream support, but Oracle does not disclose enough information
- either to verify or to fix them.
- As an alternative, the Debian LTS team is providing MySQL 5.5 packages
- for use in Debian 6.0 "squeeze". We recommend that Squeeze LTS users
- install them and migrate their MySQL databases.
- Please note that a dist-upgrade will not consider these MySQL 5.5
- packages automatically, so users need to install them explicitly.
- If you are running a MySQL server:
- apt-get install mysql-server-5.5
- If you only need the MySQL client:
- apt-get install mysql-client-5.5
- Compatibility updates
- =====================
- Some packages were updated to solve incompatibility issues, that were
- fixed in the following versions:
- * bacula-director-mysql 5.0.2-2.2+squeeze2
- * cacti 0.8.7g-1+squeeze9
- * phpmyadmin 4:3.3.7-10
- * postfix-policyd 1.82-2+deb6u1
- * prelude-manager 1.0.0-1+deb6u1
- We recommend that you upgrade these packages before upgrading to
- MySQL 5.5. A common dist-upgrade should be enough.
- We have done our best to provide you with reliable MySQL 5.5 packages. We
- have made available test packages for some time, although we did not get
- any feedback from users. In any case, don't hesitate to report any issues
- related to this MySQL upgrade to debian-lts@lists.debian.org.
- </pre><p><strong>Attachment:
- <a href="pgpiqFlifBjY1.pgp" ><tt>signature.asc</tt></a></strong><br>
- <em>Description:</em> Digital signature</p>
- <!--X-Body-of-Message-End-->
- <!--X-MsgBody-End-->
- <!--X-Follow-Ups-->
- <hr />
- <strong>Reply to:</strong>
- <ul>
- <li><a href="mailto:debian-lts-announce@lists.debian.org?In-Reply-To=<20151216075802.GA26571@nomada>&Subject=Re:%20[SECURITY] [DLA 359-1] MySQL 5.5 packages added; end of support for MySQL 5.1">debian-lts-announce@lists.debian.org</a></li>
- <li><a href="mailto:santiagorr@riseup.net?In-Reply-To=<20151216075802.GA26571@nomada>&Subject=Re:%20[SECURITY] [DLA 359-1] MySQL 5.5 packages added; end of support for MySQL 5.1&CC=debian-lts-announce@lists.debian.org">Santiago Ruano Rincón (on-list)</a></li>
- <li><a href="mailto:santiagorr@riseup.net?In-Reply-To=<20151216075802.GA26571@nomada>&Subject=Re:%20[SECURITY] [DLA 359-1] MySQL 5.5 packages added; end of support for MySQL 5.1">Santiago Ruano Rincón (off-list)</a></li>
- </ul>
- <hr />
- <!--X-Follow-Ups-End-->
- <!--X-References-->
- <!--X-References-End-->
- <!--X-BotPNI-->
- <ul>
- <li>Prev by Date:
- <strong><a href="msg00010.html">[SECURITY] [DLA 369-1] pygments security update</a></strong>
- </li>
- <li>Next by Date:
- <strong><a href="msg00012.html">[SECURITY] [DLA 370-1] bind9 security update</a></strong>
- </li>
- <li>Previous by thread:
- <strong><a href="msg00010.html">[SECURITY] [DLA 369-1] pygments security update</a></strong>
- </li>
- <li>Next by thread:
- <strong><a href="msg00012.html">[SECURITY] [DLA 370-1] bind9 security update</a></strong>
- </li>
- <li>Index(es):
- <ul>
- <li><a href="maillist.html#00011"><strong>Date</strong></a></li>
- <li><a href="threads.html#00011"><strong>Thread</strong></a></li>
- </ul>
- </li>
- </ul>
- <!--X-BotPNI-End-->
- <!--X-User-Footer-->
- <!--X-User-Footer-End-->
- </body>
- </html>
- Problem with
- None
- ################################################################################
- Opening url: https://lists.debian.org/debian-lts-announce/2015/12/msg00012.html
- Package : bind9
- bind9
- Opening url: https://lists.debian.org/debian-lts-announce/2015/12/msg00013.html
- Package : foomatic-filters
- foomatic-filters
- Opening url: https://lists.debian.org/debian-lts-announce/2015/12/msg00014.html
- Package : virtualbox-ose
- virtualbox-ose
- Opening url: https://lists.debian.org/debian-lts-announce/2015/12/msg00015.html
- Package : libxml2
- libxml2
- Opening url: https://lists.debian.org/debian-lts-announce/2015/12/msg00016.html
- Package : cacti
- cacti
- Opening url: https://lists.debian.org/debian-lts-announce/2015/12/msg00017.html
- Package : libpng
- libpng1.6
- Opening url: https://lists.debian.org/debian-lts-announce/2015/12/msg00018.html
- Package : mono
- mono
- Opening url: https://lists.debian.org/debian-lts-announce/2015/12/msg00019.html
- Package : cacti
- cacti
- Opening url: https://lists.debian.org/debian-lts-announce/2015/12/msg00020.html
- ['CVE-2015-3195', 'CVE-2015-7940', 'CVE-2015-8324', 'CVE-2013-7446', 'CVE-2015-7833', 'CVE-2015-6937', 'CVE-2015-7990', 'CVE-2015-7799', 'CVE-2012-6699', 'CVE-2012-6700', 'CVE-2012-6698', 'CVE-2015-8476', 'CVE-2015-8313', 'CVE-2015-8327', 'CVE-2015-7543', 'CVE-2015-7543', 'CVE-2015-8370', 'CVE-2015-8557', 'CVE-2015-8000', 'CVE-2015-8560', 'CVE-2015-7500', 'CVE-2015-7498', 'CVE-2015-7499', 'CVE-2015-7497', 'CVE-2015-5312', 'CVE-2015-8377', 'CVE-2015-8369', 'CVE-2015-8126', 'CVE-2015-8472', 'CVE-2015-8540', 'CVE-2012-3425', 'CVE-2009-0689', 'CVE-2015-8369']
- Opening url: https://lists.debian.org/debian-lts-announce/2016/01/msg00000.html
- Package : ia32-libs
- ia32-libs
- Opening url: https://lists.debian.org/debian-lts-announce/2016/01/msg00001.html
- Package : samba
- samba
- Opening url: https://lists.debian.org/debian-lts-announce/2016/01/msg00002.html
- Package : cacti
- cacti
- Opening url: https://lists.debian.org/debian-lts-announce/2016/01/msg00003.html
- Package : libvncserver
- libvncserver
- Opening url: https://lists.debian.org/debian-lts-announce/2016/01/msg00004.html
- Package        : linux-2.6
- linux
- Opening url: https://lists.debian.org/debian-lts-announce/2016/01/msg00005.html
- Package        : sudo
- sudo
- Opening url: https://lists.debian.org/debian-lts-announce/2016/01/msg00006.html
- Package : icu
- icu
- Opening url: https://lists.debian.org/debian-lts-announce/2016/01/msg00007.html
- Package        : claws-mail
- claws-mail
- Opening url: https://lists.debian.org/debian-lts-announce/2016/01/msg00008.html
- Package        : inspircd
- inspircd
- Opening url: https://lists.debian.org/debian-lts-announce/2016/01/msg00009.html
- Package : cacti
- cacti
- Opening url: https://lists.debian.org/debian-lts-announce/2016/01/msg00010.html
- Package : openssh
- openssl
- Opening url: https://lists.debian.org/debian-lts-announce/2016/01/msg00011.html
- Package : isc-dhcp
- isc-dhcp
- Opening url: https://lists.debian.org/debian-lts-announce/2016/01/msg00012.html
- Package : dwarfutils
- dwarfutils
- Opening url: https://lists.debian.org/debian-lts-announce/2016/01/msg00013.html
- Package : giflib
- giflib
- Opening url: https://lists.debian.org/debian-lts-announce/2016/01/msg00014.html
- Package : dbconfig-common
- dbconfig-common
- Opening url: https://lists.debian.org/debian-lts-announce/2016/01/msg00015.html
- Package : prosody
- prosody
- Opening url: https://lists.debian.org/debian-lts-announce/2016/01/msg00016.html
- Package : roundcube
- roundcube
- Opening url: https://lists.debian.org/debian-lts-announce/2016/01/msg00017.html
- Package : srtp
- srtp
- Opening url: https://lists.debian.org/debian-lts-announce/2016/01/msg00018.html
- Package : passenger
- passenger
- Opening url: https://lists.debian.org/debian-lts-announce/2016/01/msg00019.html
- Package : isc-dhcp
- isc-dhcp
- Opening url: https://lists.debian.org/debian-lts-announce/2016/01/msg00020.html
- Package : librsvg
- librsvg
- Opening url: https://lists.debian.org/debian-lts-announce/2016/01/msg00021.html
- Package : bind9
- bind9
- Opening url: https://lists.debian.org/debian-lts-announce/2016/01/msg00022.html
- Package : ecryptfs-utils
- ecryptfs-utils
- Opening url: https://lists.debian.org/debian-lts-announce/2016/01/msg00023.html
- Package : foomatic-filters
- foomatic-filters
- Opening url: https://lists.debian.org/debian-lts-announce/2016/01/msg00024.html
- Package : privoxy
- privoxy
- Opening url: https://lists.debian.org/debian-lts-announce/2016/01/msg00025.html
- Package : pound
- pound
- Opening url: https://lists.debian.org/debian-lts-announce/2016/01/msg00026.html
- Package : imlib2
- imlib2
- Opening url: https://lists.debian.org/debian-lts-announce/2016/01/msg00027.html
- Package : tiff
- tiff
- Opening url: https://lists.debian.org/debian-lts-announce/2016/01/msg00028.html
- Package : radicale
- radicale
- Opening url: https://lists.debian.org/debian-lts-announce/2016/01/msg00029.html
- Package : nginx
- nginx
- Opening url: https://lists.debian.org/debian-lts-announce/2016/01/msg00030.html
- Package : tiff
- tiff
- Opening url: https://lists.debian.org/debian-lts-announce/2016/01/msg00031.html
- Package : phpmyadmin
- phpmyadmin
- Opening url: https://lists.debian.org/debian-lts-announce/2016/01/msg00032.html
- Package : prosody
- prosody
- Opening url: https://lists.debian.org/debian-lts-announce/2016/01/msg00033.html
- Package : gosa
- gosa
- Opening url: https://lists.debian.org/debian-lts-announce/2016/01/msg00034.html
- ['CVE-2015-5296', 'CVE-2015-5299', 'CVE-2015-5252', 'CVE-2015-8369', 'CVE-2015-7550', 'CVE-2015-8575', 'CVE-2015-8543', 'CVE-2015-5602', 'CVE-2015-2632', 'CVE-2015-8708', 'CVE-2015-8614', 'CVE-2015-8702', 'CVE-2015-8604', 'CVE-2016-0777', 'CVE-2016-0778', 'CVE-2015-8605', 'CVE-2015-8750', 'CVE-2015-7555', 'CVE-2016-1232', 'CVE-2015-8770', 'CVE-2015-6360', 'CVE-2015-7519', 'CVE-2015-8605', 'CVE-2015-7557', 'CVE-2015-8704', 'CVE-2016-1572', 'CVE-2016-1983', 'CVE-2016-1982', 'CVE-2014-3566', 'CVE-2011-3389', 'CVE-2009-3555', 'CVE-2012-4929', 'CVE-2014-9762', 'CVE-2014-9763', 'CVE-2014-9764', 'CVE-2015-8683', 'CVE-2015-8665', 'CVE-2015-8748', 'CVE-2015-8747', 'CVE-2016-0742', 'CVE-2015-8781', 'CVE-2015-8783', 'CVE-2015-8784', 'CVE-2015-8782', 'CVE-2016-2041', 'CVE-2016-2039', 'CVE-2016-1232', 'CVE-2016-0756', 'CVE-2015-8771']
- Opening url: https://lists.debian.org/debian-lts-announce/2016/02/msg00000.html
- Package : mysql-5.5
- mysql-transitional
- Opening url: https://lists.debian.org/debian-lts-announce/2016/02/msg00001.html
- Package : openjdk-6
- openjdk-6
- Opening url: https://lists.debian.org/debian-lts-announce/2016/02/msg00002.html
- Package : eglibc
- glibc
- Opening url: https://lists.debian.org/debian-lts-announce/2016/02/msg00003.html
- Package        : linux-2.6
- linux
- Opening url: https://lists.debian.org/debian-lts-announce/2016/02/msg00004.html
- Package : gajim
- gajim
- Opening url: https://lists.debian.org/debian-lts-announce/2016/02/msg00005.html
- Package : eglibc
- glibc
- Opening url: https://lists.debian.org/debian-lts-announce/2016/02/msg00006.html
- Package : chrony
- chrony
- Opening url: https://lists.debian.org/debian-lts-announce/2016/02/msg00007.html
- Package : cpio
- cpio
- Opening url: https://lists.debian.org/debian-lts-announce/2016/02/msg00008.html
- Package : xdelta3
- xdelta3
- Opening url: https://lists.debian.org/debian-lts-announce/2016/02/msg00009.html
- Package : eglibc
- glibc
- Opening url: https://lists.debian.org/debian-lts-announce/2016/02/msg00010.html
- Package : wordpress
- wordpress
- Opening url: https://lists.debian.org/debian-lts-announce/2016/02/msg00011.html
- Package : gtk+2.0
- gtk+2.0
- Opening url: https://lists.debian.org/debian-lts-announce/2016/02/msg00012.html
- Package : libmatroska
- libmatroska
- Opening url: https://lists.debian.org/debian-lts-announce/2016/02/msg00013.html
- Package : openssl
- openssl
- Opening url: https://lists.debian.org/debian-lts-announce/2016/02/msg00014.html
- Package : python-imaging
- python-imaging
- Opening url: https://lists.debian.org/debian-lts-announce/2016/02/msg00015.html
- Package : didiwiki
- didiwiki
- Opening url: https://lists.debian.org/debian-lts-announce/2016/02/msg00016.html
- Package : krb5
- krb5
- Opening url: https://lists.debian.org/debian-lts-announce/2016/02/msg00017.html
- Package        : libssh
- libssh
- Opening url: https://lists.debian.org/debian-lts-announce/2016/02/msg00018.html
- Package        : libssh2
- libssh2
- Opening url: https://lists.debian.org/debian-lts-announce/2016/02/msg00019.html
- Package : nss
- nss
- Opening url: https://lists.debian.org/debian-lts-announce/2016/02/msg00020.html
- Package : websvn
- websvn
- Opening url: https://lists.debian.org/debian-lts-announce/2016/02/msg00021.html
- Package : pixman
- pixman
- Opening url: https://lists.debian.org/debian-lts-announce/2016/02/msg00022.html
- Package : libfcgi
- libfcgi
- Opening url: https://lists.debian.org/debian-lts-announce/2016/02/msg00023.html
- Package : libfcgi-perl
- libfcgi-perl
- Opening url: https://lists.debian.org/debian-lts-announce/2016/02/msg00024.html
- Package : postgresql-8.4
- postgresql-9.6
- Opening url: https://lists.debian.org/debian-lts-announce/2016/02/msg00025.html
- Package : xerces-c
- xerces-c
- Opening url: https://lists.debian.org/debian-lts-announce/2016/02/msg00026.html
- Package : gtk+2.0
- gtk+2.0
- Opening url: https://lists.debian.org/debian-lts-announce/2016/02/msg00027.html
- Package : tomcat6
- tomcat8
- Opening url: https://lists.debian.org/debian-lts-announce/2016/02/msg00028.html
- Package : clamav
- clamav
- Opening url: https://lists.debian.org/debian-lts-announce/2016/02/msg00029.html
- Package : ia32-libs, ia32-libs-gtk
- ia32-libs, ia32-libs-gtk
- Opening url: https://lists.debian.org/debian-lts-announce/2016/02/msg00030.html
- Package : libebml
- libebml
- Opening url: https://lists.debian.org/debian-lts-announce/2016/02/msg00031.html
- Package : dansguardian
- dansguardian
- Opening url: https://lists.debian.org/debian-lts-announce/2016/02/msg00032.html
- Package : pcre3
- pcre3
- Opening url: https://lists.debian.org/debian-lts-announce/2016/02/msg00033.html
- Package : lxc
- lxc
- Opening url: https://lists.debian.org/debian-lts-announce/2016/02/msg00034.html
- Package : bsh
- bsh
- Opening url: https://lists.debian.org/debian-lts-announce/2016/02/msg00035.html
- Package : php5
- php5
- Opening url: https://lists.debian.org/debian-lts-announce/2016/02/msg00036.html
- Package        : linux-2.6
- linux
- Opening url: https://lists.debian.org/debian-lts-announce/2016/02/msg00037.html
- Package : squid3
- squid3
- Opening url: https://lists.debian.org/debian-lts-announce/2016/02/msg00038.html
- ['CVE-2016-0606', 'CVE-2016-0505', 'CVE-2016-0598', 'CVE-2016-0596', 'CVE-2016-0597', 'CVE-2016-0616', 'CVE-2016-0546', 'CVE-2016-0608', 'CVE-2016-0609', 'CVE-2016-0600', 'CVE-2015-7575', 'CVE-2016-0448', 'CVE-2016-0483', 'CVE-2016-0494', 'CVE-2015-8472', 'CVE-2016-0402', 'CVE-2015-8126', 'CVE-2016-0466', 'CVE-2014-9761', 'CVE-2015-8779', 'CVE-2015-8776', 'CVE-2015-8778', 'CVE-2016-2069', 'CVE-2016-0723', 'CVE-2015-8767', 'CVE-2015-7566', 'CVE-2015-8785', 'CVE-2015-8688', 'CVE-2014-9761', 'CVE-2016-1567', 'CVE-2016-2037', 'CVE-2014-9765', 'CVE-2014-9761', 'CVE-2015-7547', 'CVE-2016-2222', 'CVE-2016-2221', 'CVE-2013-7447', 'CVE-2014-9765', 'CVE-2015-3197', 'CVE-2016-0775', 'CVE-2013-7448', 'CVE-2015-8629', 'CVE-2015-8631', 'CVE-2016-0739', 'CVE-2016-0787', 'CVE-2016-1938', 'CVE-2016-2511', 'CVE-2014-9766', 'CVE-2012-6687', 'CVE-2012-6687', 'CVE-2016-0773', 'CVE-2016-0729', 'CVE-2015-7674', 'CVE-2015-4491', 'CVE-2015-7673', 'CVE-2015-5351', 'CVE-2016-0763', 'CVE-2015-5174', 'CVE-2016-0714', 'CVE-2016-0706', 'CVE-2015-5345', 'CVE-2015-8790', 'CVE-2015-8791', 'CVE-2013-6441', 'CVE-2015-1335', 'CVE-2016-2510', 'CVE-2016-', 'CVE-2006-7243', 'CVE-2015-2348', 'CVE-2015-2305', 'CVE-2016-0774', 'CVE-2015-1805', 'CVE-2016-2384', 'CVE-2015-8812', 'CVE-2016-2571', 'CVE-2016-2569']
- Opening url: https://lists.debian.org/debian-lts-announce/2016/03/msg00000.html
- <!-- MHonArc v2.6.19 -->
- <!--X-Subject: [SECURITY] Debian 6 Squeeze has reached end-of-life -->
- <!--X-From-R13: [nexhf Ybfpunal <ncbNqrovna.bet> -->
- <!--X-Date: Tue, 1 Mar 2016 11:35:15 +0000 (UTC) -->
- <!--X-Message-Id: 56D57E60.6010607@debian.org -->
- <!--X-Content-Type: text/plain -->
- <!--X-Head-End-->
- <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"
- "http://www.w3.org/TR/html4/loose.dtd">
- <html>
- <head>
- <title>[SECURITY] Debian 6 Squeeze has reached end-of-life</title>
- <link rev="made" href="mailto:apo@debian.org">
- <link rel="index" href="maillist.html">
- <link rel="top" href="threads.html">
- <link rel="up" href="msg00000.html">
- <link rel="prev" href="">
- <link rel="next" href="msg00001.html">
- <meta name="viewport" content="width=device-width, initial-scale=1">
- <style>
- pre {
- white-space: pre-wrap;
- }
- </style>
- </head>
- <body>
- <!--X-Body-Begin-->
- <!--X-User-Header-->
- <!--X-User-Header-End-->
- <!--X-TopPNI-->
- <hr>
- <form method="POST" action="/cgi-bin/spam-report.pl">
- <input type="hidden" name="listname" value="debian-lts-announce" />
- <input type="hidden" name="msg" value="msg00000.html" />
- <input type="hidden" name="date" value="2016/03" />
- <input type="submit" value="Report as spam" style="float: right" />
- [Date Prev][<a href="msg00001.html">Date Next</a>]
- [Thread Prev][<a href="msg00001.html">Thread Next</a>]
- [<a href="maillist.html#00000">Date Index</a>]
- [<a href="threads.html#00000">Thread Index</a>]
- </form>
- <!--X-TopPNI-End-->
- <!--X-MsgBody-->
- <!--X-Subject-Header-Begin-->
- <h1>[SECURITY] Debian 6 Squeeze has reached end-of-life</h1>
- <hr>
- <!--X-Subject-Header-End-->
- <!--X-Head-of-Message-->
- <ul>
- <li><em>To</em>: <a href="mailto:debian-lts-announce%40lists.debian.org">debian-lts-announce@lists.debian.org</a></li>
- <li><em>Subject</em>: [SECURITY] Debian 6 Squeeze has reached end-of-life</li>
- <li><em>From</em>: Markus Koschany <<a href="mailto:apo%40debian.org">apo@debian.org</a>></li>
- <li><em>Date</em>: Tue, 1 Mar 2016 12:34:56 +0100</li>
- <li><em>Message-id</em>: <<A HREF="/msgid-search/56D57E60.6010607@debian.org">[🔎]</a> <a href="msg00000.html">56D57E60.6010607@debian.org</A>></li>
- <li><em>Mail-followup-to</em>: <a href="mailto:debian-lts%40lists.debian.org">debian-lts@lists.debian.org</a></li>
- <li><em>Reply-to</em>: <a href="mailto:debian-lts%40lists.debian.org">debian-lts@lists.debian.org</a></li>
- </ul>
- <!--X-Head-of-Message-End-->
- <!--X-Head-Body-Sep-Begin-->
- <hr>
- <!--X-Head-Body-Sep-End-->
- <!--X-Body-of-Message-->
- <pre>-----BEGIN PGP SIGNED MESSAGE-----
- Hash: SHA512
- The Debian Long Term Support (LTS) Team hereby announces that Debian 6
- ("Squeeze") support has reached its end-of-life on February 29, 2016,
- five years after its initial release on February 6, 2011.
- There will be no further security support for Debian 6.0.
- The LTS Team will prepare the transition to Debian 7 ("wheezy"), which
- is the current oldstable release. The LTS team will take over support
- from the Security Team on April 26, 2016.
- Debian 7 will also receive Long Term Support for five years after its
- initial release with support ending on May 31, 2018.
- We recommend that you upgrade your systems. Instructions can be found
- at
- <a rel="nofollow" href="https://wiki.debian.org/LTS/Using">https://wiki.debian.org/LTS/Using</a>
- Debian and its LTS Team would like to thank all contributing users,
- developers and sponsors who are making it possible to extend the life
- of previous stable releases, and who have made this LTS a success.
- If you rely on Debian LTS, please consider joining the team, providing
- patches, testing or funding the efforts. More information can be found
- at
- <a rel="nofollow" href="https://wiki.debian.org/LTS/">https://wiki.debian.org/LTS/</a>
- -----BEGIN PGP SIGNATURE-----
- Version: GnuPG v2
- iQJ8BAEBCgBmBQJW1X5gXxSAAAAAAC4AKGlzc3Vlci1mcHJAbm90YXRpb25zLm9w
- ZW5wZ3AuZmlmdGhob3JzZW1hbi5uZXRBQ0YzRDA4OEVGMzJFREVGNkExQTgzNUZE
- OUFEMTRCOTUxM0I1MUU0AAoJENmtFLlRO1HkSy0QALLH3SoYYSwzwIIfa1jfjcn5
- pl4BPQBgEBBigf1srFDJFOoRBgVBVChXDLiQtej9z3HfHwAuQ/cRvGOYwmTcOFc4
- 02DtKOCSdgQyc3H4W4YdNoST/K/d8ERB/yQ6IYkHwAOKnDtIdHLn/L4mlsgGviL4
- IH1XK2JbUAcqIcJJDDKi20by53WsDB9p8rPiEeSNC5SWSwlt+GRGVTDQSVq+Rhcb
- 9oFtt4iCYOl7K1kX+Z51aI3CtVBPuW6RposcVIj1xFzO0llfVhzcOQFck7qPdaA7
- 8/kAasnNuRLxF3Ay3oftU9jCKbi2ew1AXQhxuE0BAdYl9YfDnebAICvsQsgwW56d
- /rmwRkwLlVs2D/DqeSgkCpcLPrBIvw68nWJKLWIS5nKDaFTNJ113AszILFbbzgfs
- qtY0CkEl/8Ee2BipN5h0lQfLJrgdwNsDaSkgBCZ3jMHZa0fsH/6+qLz52fVM9P8u
- 4M1F4s8ZsY8pV1UStBBCIvOzCW98MlHmgRimfN8rOCgKXPkXYXutbEVy/HiflnCy
- p3roY9xBNbeivQtVaH455FajuGtci+K5JspAL+BDIiiB1SK4h+lEJKE1UraS4+Ez
- CggXHl3pa+tNaeg4/jWzm79J5NiGIfosvhfvLc7HusLONYtFWoDFI9Zx3MG2P57L
- v9RNP641ExEj4j7oeG9A
- =uka/
- -----END PGP SIGNATURE-----
- </pre>
- <!--X-Body-of-Message-End-->
- <!--X-MsgBody-End-->
- <!--X-Follow-Ups-->
- <hr />
- <strong>Reply to:</strong>
- <ul>
- <li><a href="mailto:debian-lts-announce@lists.debian.org?In-Reply-To=<56D57E60.6010607@debian.org>&Subject=Re:%20[SECURITY] Debian 6 Squeeze has reached end-of-life">debian-lts-announce@lists.debian.org</a></li>
- <li><a href="mailto:apo@debian.org?In-Reply-To=<56D57E60.6010607@debian.org>&Subject=Re:%20[SECURITY] Debian 6 Squeeze has reached end-of-life&CC=debian-lts-announce@lists.debian.org">Markus Koschany (on-list)</a></li>
- <li><a href="mailto:apo@debian.org?In-Reply-To=<56D57E60.6010607@debian.org>&Subject=Re:%20[SECURITY] Debian 6 Squeeze has reached end-of-life">Markus Koschany (off-list)</a></li>
- </ul>
- <hr />
- <!--X-Follow-Ups-End-->
- <!--X-References-->
- <!--X-References-End-->
- <!--X-BotPNI-->
- <ul>
- <li>Next by Date:
- <strong><a href="msg00001.html">[SECURITY] [DLA 445-2] squid3 regression update</a></strong>
- </li>
- <li>Next by thread:
- <strong><a href="msg00001.html">[SECURITY] [DLA 445-2] squid3 regression update</a></strong>
- </li>
- <li>Index(es):
- <ul>
- <li><a href="maillist.html#00000"><strong>Date</strong></a></li>
- <li><a href="threads.html#00000"><strong>Thread</strong></a></li>
- </ul>
- </li>
- </ul>
- <!--X-BotPNI-End-->
- <!--X-User-Footer-->
- <!--X-User-Footer-End-->
- </body>
- </html>
- Problem with
- None
- ################################################################################
- Opening url: https://lists.debian.org/debian-lts-announce/2016/03/msg00001.html
- Package : squid3
- squid3
- Opening url: https://lists.debian.org/debian-lts-announce/2016/03/msg00002.html
- ['CVE-2016-2569']
- Opening url: https://lists.debian.org/debian-lts-announce/2016/04/msg00000.html
- <!-- MHonArc v2.6.19 -->
- <!--X-Subject: [SECURITY] Security support for Wheezy handed over to the LTS team -->
- <!--X-From-R13: [nexhf Ybfpunal <ncbNqrovna.bet> -->
- <!--X-Date: Mon, 25 Apr 2016 10:25:30 +0000 (UTC) -->
- <!--X-Message-Id: 571DF08C.4010507@debian.org -->
- <!--X-Content-Type: text/plain -->
- <!--X-Head-End-->
- <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"
- "http://www.w3.org/TR/html4/loose.dtd">
- <html>
- <head>
- <title>[SECURITY] Security support for Wheezy handed over to the LTS team</title>
- <link rev="made" href="mailto:apo@debian.org">
- <link rel="index" href="maillist.html">
- <link rel="top" href="threads.html">
- <link rel="up" href="msg00000.html">
- <link rel="prev" href="">
- <link rel="next" href="msg00001.html">
- <meta name="viewport" content="width=device-width, initial-scale=1">
- <style>
- pre {
- white-space: pre-wrap;
- }
- </style>
- </head>
- <body>
- <!--X-Body-Begin-->
- <!--X-User-Header-->
- <!--X-User-Header-End-->
- <!--X-TopPNI-->
- <hr>
- <form method="POST" action="/cgi-bin/spam-report.pl">
- <input type="hidden" name="listname" value="debian-lts-announce" />
- <input type="hidden" name="msg" value="msg00000.html" />
- <input type="hidden" name="date" value="2016/04" />
- <input type="submit" value="Report as spam" style="float: right" />
- [Date Prev][<a href="msg00001.html">Date Next</a>]
- [Thread Prev][<a href="msg00001.html">Thread Next</a>]
- [<a href="maillist.html#00000">Date Index</a>]
- [<a href="threads.html#00000">Thread Index</a>]
- </form>
- <!--X-TopPNI-End-->
- <!--X-MsgBody-->
- <!--X-Subject-Header-Begin-->
- <h1>[SECURITY] Security support for Wheezy handed over to the LTS team</h1>
- <hr>
- <!--X-Subject-Header-End-->
- <!--X-Head-of-Message-->
- <ul>
- <li><em>To</em>: <a href="mailto:debian-lts-announce%40lists.debian.org">debian-lts-announce@lists.debian.org</a></li>
- <li><em>Subject</em>: [SECURITY] Security support for Wheezy handed over to the LTS team</li>
- <li><em>From</em>: Markus Koschany <<a href="mailto:apo%40debian.org">apo@debian.org</a>></li>
- <li><em>Date</em>: Mon, 25 Apr 2016 12:25:16 +0200</li>
- <li><em>Message-id</em>: <<A HREF="/msgid-search/571DF08C.4010507@debian.org">[🔎]</a> <a href="msg00000.html">571DF08C.4010507@debian.org</A>></li>
- <li><em>Mail-followup-to</em>: <a href="mailto:debian-lts%40lists.debian.org">debian-lts@lists.debian.org</a></li>
- <li><em>Reply-to</em>: <a href="mailto:debian-lts%40lists.debian.org">debian-lts@lists.debian.org</a></li>
- </ul>
- <!--X-Head-of-Message-End-->
- <!--X-Head-Body-Sep-Begin-->
- <hr>
- <!--X-Head-Body-Sep-End-->
- <!--X-Body-of-Message-->
- <pre>-----BEGIN PGP SIGNED MESSAGE-----
- Hash: SHA512
- As of 25 April, one year after the release of Debian 8, alias "Jessie",
- and nearly three years after the release of Debian 7, alias "Wheezy",
- regular security support for Wheezy comes to an end. The Debian Long
- Term Support (LTS) Team will take over security support.
- Information for users
- =====================
- Wheezy LTS will be supported from 26 April 2016 to 31 May 2018.
- For Debian 7 Wheezy LTS there will be no requirement to add a separate
- wheezy-lts suite to your sources.list any more and your current setup
- will continue to work without further changes.
- For how to use Debian Long Term Support please read
- <a rel="nofollow" href="https://wiki.debian.org/LTS/Using">https://wiki.debian.org/LTS/Using</a>
- Important information and changes regarding Wheezy LTS can be found at
- <a rel="nofollow" href="https://wiki.debian.org/LTS/Wheezy">https://wiki.debian.org/LTS/Wheezy</a>
- Most notably OpenJDK 7 will be made the new Java default JRE/JDK on 26
- June 2016 to ensure full security support until Wheezy LTS reaches its
- end-of-life.
- You should also subscribe to the announcement mailing list for
- security updates for Wheezy LTS:
- <a rel="nofollow" href="https://lists.debian.org/debian-lts-announce/">https://lists.debian.org/debian-lts-announce/</a>
- A few packages are not covered by the Wheezy LTS support. These can be
- detected by installing the debian-security-support package. If
- debian-security-support detects an unsupported package which is critical
- to you, please get in touch with debian-lts@lists.debian.org.
- Mailing lists
- =============
- The whole coordination of the Debian LTS effort is handled through the
- debian-lts mailing list:
- <a rel="nofollow" href="https://lists.debian.org/debian-lts/">https://lists.debian.org/debian-lts/</a>
- Please subscribe or follow us via GMANE (gmane.linux.debian.devel.lts)
- Aside from the debian-lts-announce list, there is also a list for
- following all uploads in Wheezy LTS:
- <a rel="nofollow" href="https://lists.debian.org/debian-lts-changes/">https://lists.debian.org/debian-lts-changes/</a>
- Security Tracker
- ================
- All information on the status of vulnerabilities (e.g. if the version in
- Wheezy LTS happens to be unaffected while Jessie is affected) will be
- tracked in the Debian Security Tracker:
- <a rel="nofollow" href="http://security-tracker.debian.org">http://security-tracker.debian.org</a>
- If you happen to spot an error in the data, please see
- <a rel="nofollow" href="https://security-tracker.debian.org/tracker/data/report">https://security-tracker.debian.org/tracker/data/report</a>
- -----BEGIN PGP SIGNATURE-----
- Version: GnuPG v2
- iQJ8BAEBCgBmBQJXHfCLXxSAAAAAAC4AKGlzc3Vlci1mcHJAbm90YXRpb25zLm9w
- ZW5wZ3AuZmlmdGhob3JzZW1hbi5uZXRBQ0YzRDA4OEVGMzJFREVGNkExQTgzNUZE
- OUFEMTRCOTUxM0I1MUU0AAoJENmtFLlRO1HkkPoQAIixNUUwDel2fCT7RTsr8fM5
- 4ik15vXDYgqCIvfMKWNMqe1Haxway9p0pBjVWnAjeWslLp2liMKlbB/PiikpNesQ
- 3e8AJvNtSsMTDG+pDBbQIPb3fjir65qcayWSclVvDuFZK6rdWkYcvqh8fRE6BZ81
- NiufvWN0o4wLZm6GiAF9PNSIeeRJCjCMUYU0Myl16jDbrfCUaQr+70UkIUp69h/M
- nZ65vZKuXD+78CtGUfgHfrcG8lbWq/pDG98P/Pc63JNr+A6VhKrJM4ncR1lHQOf8
- 6fBhf9v1UfvR9pZWBakmaHnXpD6VxY44xzv+txOcuYWqxW23Mvg0OAU3KW/zofy7
- 3NSDEj7Kw4RoQY7NqjdhW2o01bn9QtB6VNh6qY7I8Vf4P2OqgpAYfZdvmBqdOw6a
- lWavtSr40jwRu7YryoWnIMgdrv4u3G9OTVRmyUcMruvC7EkPSfKHOByW4Ew/VUaI
- f6zc7PApotOwT+iuBWI4u/7k9I6SvBNjiS84Ph4V0y65axRm1CK/XZANCJW870DR
- 6JV7atxQoXXAhP0McCoxpVBSPTQqfV+ADaStzgnQ1/Ax8KMNfAD4QcXAxcCnDGDz
- 9jUeYhdKpuKKM7dukOVsnWX+pJ9nfet2VtfRo3wO8B9Pp3L5EzpE9sLL8o/4hPG8
- OjFDxD9gween3PaSarCU
- =kjwD
- -----END PGP SIGNATURE-----
- </pre>
- <!--X-Body-of-Message-End-->
- <!--X-MsgBody-End-->
- <!--X-Follow-Ups-->
- <hr />
- <strong>Reply to:</strong>
- <ul>
- <li><a href="mailto:debian-lts-announce@lists.debian.org?In-Reply-To=<571DF08C.4010507@debian.org>&Subject=Re:%20[SECURITY] Security support for Wheezy handed over to the LTS team">debian-lts-announce@lists.debian.org</a></li>
- <li><a href="mailto:apo@debian.org?In-Reply-To=<571DF08C.4010507@debian.org>&Subject=Re:%20[SECURITY] Security support for Wheezy handed over to the LTS team&CC=debian-lts-announce@lists.debian.org">Markus Koschany (on-list)</a></li>
- <li><a href="mailto:apo@debian.org?In-Reply-To=<571DF08C.4010507@debian.org>&Subject=Re:%20[SECURITY] Security support for Wheezy handed over to the LTS team">Markus Koschany (off-list)</a></li>
- </ul>
- <hr />
- <!--X-Follow-Ups-End-->
- <!--X-References-->
- <!--X-References-End-->
- <!--X-BotPNI-->
- <ul>
- <li>Next by Date:
- <strong><a href="msg00001.html">[SECURITY] [DLA 446-1] poppler security update</a></strong>
- </li>
- <li>Next by thread:
- <strong><a href="msg00001.html">[SECURITY] [DLA 446-1] poppler security update</a></strong>
- </li>
- <li>Index(es):
- <ul>
- <li><a href="maillist.html#00000"><strong>Date</strong></a></li>
- <li><a href="threads.html#00000"><strong>Thread</strong></a></li>
- </ul>
- </li>
- </ul>
- <!--X-BotPNI-End-->
- <!--X-User-Footer-->
- <!--X-User-Footer-End-->
- </body>
- </html>
- Problem with
- None
- ################################################################################
- Opening url: https://lists.debian.org/debian-lts-announce/2016/04/msg00001.html
- Package : poppler
- poppler
- Opening url: https://lists.debian.org/debian-lts-announce/2016/04/msg00002.html
- Package : mysql-5.5
- mysql-transitional
- Opening url: https://lists.debian.org/debian-lts-announce/2016/04/msg00003.html
- Package : botan1.10
- botan1.10
- Opening url: https://lists.debian.org/debian-lts-announce/2016/04/msg00004.html
- Package : gdk-pixbuf
- gdk-pixbuf
- Opening url: https://lists.debian.org/debian-lts-announce/2016/04/msg00005.html
- ['CVE-2015-8868', 'CVE-2016-0640', 'CVE-2016-0648', 'CVE-2016-2047', 'CVE-2016-0666', 'CVE-2016-0641', 'CVE-2016-0649', 'CVE-2016-0642', 'CVE-2016-0646', 'CVE-2016-0650', 'CVE-2016-0643', 'CVE-2016-0644', 'CVE-2016-0647', 'CVE-2015-5727', 'CVE-2014-9742', 'CVE-2016-2195', 'CVE-2015-7827', 'CVE-2016-2849', 'CVE-2016-2194', 'CVE-2015-5726', 'CVE-2015-7674', 'CVE-2015-7552']
- Opening url: https://lists.debian.org/debian-lts-announce/2016/05/msg00000.html
- Package : subversion
- subversion
- Opening url: https://lists.debian.org/debian-lts-announce/2016/05/msg00001.html
- Package : openjdk-7
- openjdk-7
- Opening url: https://lists.debian.org/debian-lts-announce/2016/05/msg00002.html
- Package : smarty3
- smarty3
- Opening url: https://lists.debian.org/debian-lts-announce/2016/05/msg00003.html
- Package : minissdpd
- minissdpd
- Opening url: https://lists.debian.org/debian-lts-announce/2016/05/msg00004.html
- Package : extplorer
- extplorer
- Opening url: https://lists.debian.org/debian-lts-announce/2016/05/msg00005.html
- Package : asterisk
- asterisk
- Opening url: https://lists.debian.org/debian-lts-announce/2016/05/msg00006.html
- Package : openssl
- openssl
- Opening url: https://lists.debian.org/debian-lts-announce/2016/05/msg00007.html
- Package : java-common
- java-common
- Opening url: https://lists.debian.org/debian-lts-announce/2016/05/msg00008.html
- Package : mplayer
- mplayer
- Opening url: https://lists.debian.org/debian-lts-announce/2016/05/msg00009.html
- Package : mplayer2
- mplayer2
- Opening url: https://lists.debian.org/debian-lts-announce/2016/05/msg00010.html
- Package : mercurial
- mercurial
- Opening url: https://lists.debian.org/debian-lts-announce/2016/05/msg00011.html
- Package : file
- file
- Opening url: https://lists.debian.org/debian-lts-announce/2016/05/msg00012.html
- Package : nagios3
- nagios
- Opening url: https://lists.debian.org/debian-lts-announce/2016/05/msg00013.html
- Package : websvn
- websvn
- Opening url: https://lists.debian.org/debian-lts-announce/2016/05/msg00014.html
- Package : ikiwiki
- ikiwiki
- Opening url: https://lists.debian.org/debian-lts-announce/2016/05/msg00015.html
- Package : libav
- libav
- Opening url: https://lists.debian.org/debian-lts-announce/2016/05/msg00016.html
- Package : botan1.10
- botan1.10
- Opening url: https://lists.debian.org/debian-lts-announce/2016/05/msg00017.html
- Package : debian-security-support
- debian-security-support
- Opening url: https://lists.debian.org/debian-lts-announce/2016/05/msg00018.html
- Package : ocaml
- ocaml
- Opening url: https://lists.debian.org/debian-lts-announce/2016/05/msg00019.html
- Package : xerces-c
- xerces-c
- Opening url: https://lists.debian.org/debian-lts-announce/2016/05/msg00020.html
- Package : libgwenhywfar
- libgwenhywfar
- Opening url: https://lists.debian.org/debian-lts-announce/2016/05/msg00021.html
- Package : libuser
- libuser
- Opening url: https://lists.debian.org/debian-lts-announce/2016/05/msg00022.html
- Package : libksba
- libksba
- Opening url: https://lists.debian.org/debian-lts-announce/2016/05/msg00023.html
- Package : jansson
- jansson
- Opening url: https://lists.debian.org/debian-lts-announce/2016/05/msg00024.html
- Package : icedove
- icedove
- Opening url: https://lists.debian.org/debian-lts-announce/2016/05/msg00025.html
- Package : wpa
- wpa
- Opening url: https://lists.debian.org/debian-lts-announce/2016/05/msg00026.html
- Package : dosfstools
- dosfstools
- Opening url: https://lists.debian.org/debian-lts-announce/2016/05/msg00027.html
- Package : python-tornado
- python-tornado
- Opening url: https://lists.debian.org/debian-lts-announce/2016/05/msg00028.html
- Package : squid3
- squid3
- Opening url: https://lists.debian.org/debian-lts-announce/2016/05/msg00029.html
- Package : libidn
- libidn
- Opening url: https://lists.debian.org/debian-lts-announce/2016/05/msg00030.html
- Package : librsvg
- librsvg
- Opening url: https://lists.debian.org/debian-lts-announce/2016/05/msg00031.html
- Package : xen
- xen
- Opening url: https://lists.debian.org/debian-lts-announce/2016/05/msg00032.html
- Package : nss
- nss
- Opening url: https://lists.debian.org/debian-lts-announce/2016/05/msg00033.html
- Package : phpmyadmin
- phpmyadmin
- Opening url: https://lists.debian.org/debian-lts-announce/2016/05/msg00034.html
- Package : icedove
- icedove
- Opening url: https://lists.debian.org/debian-lts-announce/2016/05/msg00035.html
- Package : libgd2
- libgd2
- Opening url: https://lists.debian.org/debian-lts-announce/2016/05/msg00036.html
- Package : expat
- expat
- Opening url: https://lists.debian.org/debian-lts-announce/2016/05/msg00037.html
- <!-- MHonArc v2.6.19 -->
- <!--X-Subject: [SECURITY] [DLA 484-1] graphicsmagick security update -->
- <!--X-From-R13: [nexhf Ybfpunal <ncbNqrovna.bet> -->
- <!--X-Date: Sat, 21 May 2016 18:52:25 +0000 (UTC) -->
- <!--X-Message-Id: 5740AE4D.6000206@debian.org -->
- <!--X-Content-Type: text/plain -->
- <!--X-Head-End-->
- <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"
- "http://www.w3.org/TR/html4/loose.dtd">
- <html>
- <head>
- <title>[SECURITY] [DLA 484-1] graphicsmagick security update</title>
- <link rev="made" href="mailto:apo@debian.org">
- <link rel="index" href="maillist.html">
- <link rel="top" href="threads.html">
- <link rel="up" href="msg00037.html">
- <link rel="prev" href="msg00036.html">
- <link rel="next" href="msg00038.html">
- <meta name="viewport" content="width=device-width, initial-scale=1">
- <style>
- pre {
- white-space: pre-wrap;
- }
- </style>
- </head>
- <body>
- <!--X-Body-Begin-->
- <!--X-User-Header-->
- <!--X-User-Header-End-->
- <!--X-TopPNI-->
- <hr>
- <form method="POST" action="/cgi-bin/spam-report.pl">
- <input type="hidden" name="listname" value="debian-lts-announce" />
- <input type="hidden" name="msg" value="msg00037.html" />
- <input type="hidden" name="date" value="2016/05" />
- <input type="submit" value="Report as spam" style="float: right" />
- [<a href="msg00036.html">Date Prev</a>][<a href="msg00038.html">Date Next</a>]
- [<a href="msg00036.html">Thread Prev</a>][<a href="msg00038.html">Thread Next</a>]
- [<a href="maillist.html#00037">Date Index</a>]
- [<a href="threads.html#00037">Thread Index</a>]
- </form>
- <!--X-TopPNI-End-->
- <!--X-MsgBody-->
- <!--X-Subject-Header-Begin-->
- <h1>[SECURITY] [DLA 484-1] graphicsmagick security update</h1>
- <hr>
- <!--X-Subject-Header-End-->
- <!--X-Head-of-Message-->
- <ul>
- <li><em>To</em>: <a href="mailto:debian-lts-announce%40lists.debian.org">debian-lts-announce@lists.debian.org</a></li>
- <li><em>Subject</em>: [SECURITY] [DLA 484-1] graphicsmagick security update</li>
- <li><em>From</em>: Markus Koschany <<a href="mailto:apo%40debian.org">apo@debian.org</a>></li>
- <li><em>Date</em>: Sat, 21 May 2016 20:51:57 +0200</li>
- <li><em>Message-id</em>: <<A HREF="/msgid-search/5740AE4D.6000206@debian.org">[🔎]</a> <a href="msg00037.html">5740AE4D.6000206@debian.org</A>></li>
- <li><em>Mail-followup-to</em>: <a href="mailto:debian-lts%40lists.debian.org">debian-lts@lists.debian.org</a></li>
- <li><em>Reply-to</em>: <a href="mailto:debian-lts%40lists.debian.org">debian-lts@lists.debian.org</a></li>
- </ul>
- <!--X-Head-of-Message-End-->
- <!--X-Head-Body-Sep-Begin-->
- <hr>
- <!--X-Head-Body-Sep-End-->
- <!--X-Body-of-Message-->
- <pre>-----BEGIN PGP SIGNED MESSAGE-----
- Hash: SHA512
- Version : 1.3.16-1.1+deb7u1
- CVE ID : CVE-2015-8808 CVE-2016-2317 CVE-2016-2318
- CVE-2016-3714 CVE-2016-3715 CVE-2016-3716
- CVE-2016-3717 CVE-2016-3718
- Debian Bug : 814732
- Several security vulnerabilities were discovered in graphicsmagick a
- tool to manipulate image files.
- GraphicsMagick is a fork of ImageMagick and also affected by
- vulnerabilities collectively known as ImageTragick, that are the
- consequence of lack of sanitization of untrusted input. An attacker
- with control on the image input could, with the privileges of the user
- running the application, execute code (CVE-2016-3714), make HTTP GET
- or FTP requests (CVE-2016-3718), or delete (CVE-2016-3715), move
- (CVE-2016-3716), or read (CVE-2016-3717) local files.
- To address these concerns the following changes have been made:
- 1. Remove automatic detection/execution of MVG based on file header or
- file extension.
- 2. Remove the ability to cause an input file to be deleted based on a
- filename specification.
- 3. Improve the safety of delegates.mgk by removing gnuplot support,
- removing manual page support, and by adding -dSAFER to all
- ghostscript invocations.
- 4. Sanity check the MVG image primitive filename argument to assure
- that "magick:" prefix strings will not be interpreted. Please note
- that this patch will break intentional uses of magick prefix
- strings in MVG and so some MVG scripts may fail. We will search
- for a more flexible solution.
- In addition the following issues have been fixed:
- CVE-2015-8808
- Assure that GIF decoder does not use unitialized data and cause an
- out-of-bound read.
- CVE-2016-2317 and CVE-2016-2318
- Vulnerabilities that allow to read or write outside memory bounds
- (heap, stack) as well as some null-pointer derreferences to cause a
- denial of service when parsing SVG files.
- For Debian 7 "Wheezy", these problems have been fixed in version
- 1.3.16-1.1+deb7u1.
- We recommend that you upgrade your graphicsmagick packages.
- Further information about Debian LTS security advisories, how to apply
- these updates to your system and frequently asked questions can be
- found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a>
- -----BEGIN PGP SIGNATURE-----
- Version: GnuPG v2
- iQJ8BAEBCgBmBQJXQK5MXxSAAAAAAC4AKGlzc3Vlci1mcHJAbm90YXRpb25zLm9w
- ZW5wZ3AuZmlmdGhob3JzZW1hbi5uZXRBQ0YzRDA4OEVGMzJFREVGNkExQTgzNUZE
- OUFEMTRCOTUxM0I1MUU0AAoJENmtFLlRO1Hk8soQAMpVhjIJOvDoIE7TtGZzMO2O
- r4tla9Bqa9ty+j08wnFNKWT7oPqHPipV9zkubII4wi2s/13cxrWSX3RxfB5ONrjz
- B8x0p5vStXbDiWHmYxK6/CpnIfIaGAL3BLnoAIDDG6DeauCg1EiB4f6KoeY+Rk/6
- CJUpCUlUjrJUshC4o2g6+6IXefZJZK1qQcL5bKn4w1zJlfqVOqflFgOpFT/aWtOa
- M2Y2hh8/ia+K7bxrvbppkTj04JmRVFsHqO++X+EtxBH7Mt94046uxhFQ2TesAnmJ
- fv93nGORLtvri/OS+vhOfMBnWmFpCtebuSvjebx/RXDAnz9u5dcfVhFqYzgHzZLK
- KKcAXLQps6974y1mPGvwcT+ak/j+AwBCj+HLf1mmu8nJWxkHYHaULpXnOnzDO/R6
- NXRD5lBD4zDmR+A+MLSDNUAUlLKeN4I0/b9JUq26vI7QBP8fdAyfN7CXzXwQiSMn
- MYApNwzTfy/b6B6mmal3g+KG887JfOtyHnX9qmdQDVVWhZqowwo4QTNvazJBbwqI
- L+oY8es/EUqd5OC7xAYj3cI02HgsoJYvssL/EO9SGBde0EZudlXdv5NUj/7sUNOM
- ngYhSi5eCUIeiiL8ldYV/iiEF1mISJ5DyWUPHf20D3HnT/IucDxTqd6LPnGk7Wxg
- NbQCIc/xIPXKS6El+9rk
- =ieJh
- -----END PGP SIGNATURE-----
- </pre>
- <!--X-Body-of-Message-End-->
- <!--X-MsgBody-End-->
- <!--X-Follow-Ups-->
- <hr />
- <strong>Reply to:</strong>
- <ul>
- <li><a href="mailto:debian-lts-announce@lists.debian.org?In-Reply-To=<5740AE4D.6000206@debian.org>&Subject=Re:%20[SECURITY] [DLA 484-1] graphicsmagick security update">debian-lts-announce@lists.debian.org</a></li>
- <li><a href="mailto:apo@debian.org?In-Reply-To=<5740AE4D.6000206@debian.org>&Subject=Re:%20[SECURITY] [DLA 484-1] graphicsmagick security update&CC=debian-lts-announce@lists.debian.org">Markus Koschany (on-list)</a></li>
- <li><a href="mailto:apo@debian.org?In-Reply-To=<5740AE4D.6000206@debian.org>&Subject=Re:%20[SECURITY] [DLA 484-1] graphicsmagick security update">Markus Koschany (off-list)</a></li>
- </ul>
- <hr />
- <!--X-Follow-Ups-End-->
- <!--X-References-->
- <!--X-References-End-->
- <!--X-BotPNI-->
- <ul>
- <li>Prev by Date:
- <strong><a href="msg00036.html">[SECURITY] [DLA 483-1] expat security update</a></strong>
- </li>
- <li>Next by Date:
- <strong><a href="msg00038.html">[SECURITY] [DLA 485-1] extplorer security update</a></strong>
- </li>
- <li>Previous by thread:
- <strong><a href="msg00036.html">[SECURITY] [DLA 483-1] expat security update</a></strong>
- </li>
- <li>Next by thread:
- <strong><a href="msg00038.html">[SECURITY] [DLA 485-1] extplorer security update</a></strong>
- </li>
- <li>Index(es):
- <ul>
- <li><a href="maillist.html#00037"><strong>Date</strong></a></li>
- <li><a href="threads.html#00037"><strong>Thread</strong></a></li>
- </ul>
- </li>
- </ul>
- <!--X-BotPNI-End-->
- <!--X-User-Footer-->
- <!--X-User-Footer-End-->
- </body>
- </html>
- Opening url: https://lists.debian.org/debian-lts-announce/2016/05/msg00038.html
- Package : extplorer
- extplorer
- Opening url: https://lists.debian.org/debian-lts-announce/2016/05/msg00039.html
- Package : imagemagick
- imagemagick
- Opening url: https://lists.debian.org/debian-lts-announce/2016/05/msg00040.html
- Package : xymon
- xymon
- Opening url: https://lists.debian.org/debian-lts-announce/2016/05/msg00041.html
- Package : ruby-mail
- ruby2.3
- Opening url: https://lists.debian.org/debian-lts-announce/2016/05/msg00042.html
- Package : debian-security-support
- debian-security-support
- Opening url: https://lists.debian.org/debian-lts-announce/2016/05/msg00043.html
- Package : bozohttpd
- bozohttpd
- Opening url: https://lists.debian.org/debian-lts-announce/2016/05/msg00044.html
- Package : postgresql-9.1
- postgresql-9.6
- Opening url: https://lists.debian.org/debian-lts-announce/2016/05/msg00045.html
- Package : openafs
- openafs
- Opening url: https://lists.debian.org/debian-lts-announce/2016/05/msg00046.html
- Package : pdns
- pdns
- Opening url: https://lists.debian.org/debian-lts-announce/2016/05/msg00047.html
- Package : eglibc
- glibc
- Opening url: https://lists.debian.org/debian-lts-announce/2016/05/msg00048.html
- Package : phpmyadmin
- phpmyadmin
- Opening url: https://lists.debian.org/debian-lts-announce/2016/05/msg00049.html
- Package : libtasn1-3
- libtasn1-3
- Opening url: https://lists.debian.org/debian-lts-announce/2016/05/msg00050.html
- Package : ruby-activerecord-3.2
- ruby2.3
- Opening url: https://lists.debian.org/debian-lts-announce/2016/05/msg00051.html
- Package : wireshark
- wireshark
- Opening url: https://lists.debian.org/debian-lts-announce/2016/05/msg00052.html
- Package : ruby-activemodel-3.2
- ruby2.3
- Opening url: https://lists.debian.org/debian-lts-announce/2016/05/msg00053.html
- Package : php5
- php5
- Opening url: https://lists.debian.org/debian-lts-announce/2016/05/msg00054.html
- ['CVE-2016-2167', 'CVE-2016-2168', 'CVE-2016-3425', 'CVE-2016-0695', 'CVE-2016-0687', 'CVE-2016-3427', 'CVE-2016-0636', 'CVE-2016-0686', 'CVE-2016-3426', 'CVE-2014-8350', 'CVE-2016-3178', 'CVE-2016-3179', 'CVE-2015-0896', 'CVE-2015-3008', 'CVE-2014-8412', 'CVE-2014-2286', 'CVE-2014-4046', 'CVE-2014-8418', 'CVE-2014-6610', 'CVE-2016-2105', 'CVE-2016-2107', 'CVE-2016-2106', 'CVE-2016-2109', 'CVE-2016-2176', 'CVE-2016-2108', 'CVE-2016-4352', 'CVE-2016-4352', 'CVE-2016-3105', 'CVE-2015-8865', 'CVE-2014-1878', 'CVE-2016-1236', 'CVE-2016-4561', 'CVE-2014-9676', 'CVE-2015-8869', 'CVE-2016-2099', 'CVE-2015-7542', 'CVE-2015-3245', 'CVE-2015-3246', 'CVE-2016-4579', 'CVE-2016-4425', 'CVE-2016-1979', 'CVE-2016-2807', 'CVE-2016-2805', 'CVE-2016-4477', 'CVE-2016-4476', 'CVE-2016-4804', 'CVE-2015-8872', 'CVE-2014-9720', 'CVE-2016-4053', 'CVE-2016-4556', 'CVE-2016-4051', 'CVE-2016-4054', 'CVE-2016-4052', 'CVE-2016-4554', 'CVE-2016-4555', 'CVE-2015-2059', 'CVE-2015-7558', 'CVE-2016-4347', 'CVE-2016-4348', 'CVE-2015-5165', 'CVE-2015-7971', 'CVE-2016-2270', 'CVE-2015-8554', 'CVE-2015-7969', 'CVE-2015-5307', 'CVE-2015-8340', 'CVE-2015-8550', 'CVE-2015-7972', 'CVE-2015-7970', 'CVE-2016-1570', 'CVE-2015-2752', 'CVE-2015-8615', 'CVE-2016-2271', 'CVE-2016-1571', 'CVE-2015-8339', 'CVE-2015-8555', 'CVE-2015-8104', 'CVE-2015-2756', 'CVE-2015-7182', 'CVE-2015-7181', 'CVE-2016-1978', 'CVE-2016-1950', 'CVE-2016-1938', 'CVE-2016-1979', 'CVE-2016-2560', 'CVE-2016-2045', 'CVE-2016-2038', 'CVE-2016-1927', 'CVE-2016-2040', 'CVE-2016-2041', 'CVE-2016-2039', 'CVE-2016-1979', 'CVE-2016-2807', 'CVE-2016-2805', 'CVE-2015-8874', 'CVE-2016-0718', 'CVE-2016-3718', 'CVE-2016-3715', 'CVE-2016-2318', 'CVE-2015-8808', 'CVE-2016-3716', 'CVE-2016-3717', 'CVE-2016-2317', 'CVE-2016-3714', 'CVE-2015-5660', 'CVE-2016-3718', 'CVE-2016-3715', 'CVE-2016-3716', 'CVE-2016-3717', 'CVE-2016-3714', 'CVE-2016-2055', 'CVE-2016-2058', 'CVE-2016-2056', 'CVE-2016-2054', 'CVE-2014-5015', 'CVE-2015-8212', 'CVE-2016-4536', 'CVE-2016-2860', 'CVE-2015-8312', 'CVE-2014-7210', 'CVE-2013-4458', 'CVE-2016-3706', 'CVE-2016-1234', 'CVE-2016-3075', 'CVE-2016-2560', 'CVE-2016-2045', 'CVE-2016-2038', 'CVE-2016-1927', 'CVE-2016-2040', 'CVE-2016-2041', 'CVE-2016-2039', 'CVE-2016-4008', 'CVE-2015-7577', 'CVE-2012-6058', 'CVE-2012-6057', 'CVE-2012-6061', 'CVE-2013-7112', 'CVE-2016-4006', 'CVE-2016-4081', 'CVE-2013-1572', 'CVE-2013-2487', 'CVE-2013-1579', 'CVE-2015-6243', 'CVE-2013-4929', 'CVE-2013-2485', 'CVE-2016-4079', 'CVE-2015-6246', 'CVE-2016-4080', 'CVE-2012-6056', 'CVE-2013-1580', 'CVE-2012-6052', 'CVE-2013-2482', 'CVE-2013-1577', 'CVE-2013-1575', 'CVE-2013-1576', 'CVE-2013-1574', 'CVE-2012-6059', 'CVE-2012-6054', 'CVE-2013-2486', 'CVE-2016-4082', 'CVE-2013-5721', 'CVE-2012-6060', 'CVE-2012-6055', 'CVE-2013-1578', 'CVE-2013-5719', 'CVE-2016-4085', 'CVE-2013-1573', 'CVE-2013-1581', 'CVE-2012-6062', 'CVE-2013-2479', 'CVE-2015-6248', 'CVE-2012-6053', 'CVE-2013-4079', 'CVE-2013-4080', 'CVE-2013-2476', 'CVE-2013-4927', 'CVE-2013-6339', 'CVE-2013-4931', 'CVE-2016-0753', 'CVE-2016-4541', 'CVE-2015-8879', 'CVE-2016-4543', 'CVE-2016-4542', 'CVE-2015-8865', 'CVE-2016-4072', 'CVE-2016-4343', 'CVE-2016-4544', 'CVE-2015-8866', 'CVE-2016-4073', 'CVE-2015-8878', 'CVE-2016-4537', 'CVE-2015-5161', 'CVE-2016-4070', 'CVE-2016-4539', 'CVE-2016-4071', 'CVE-2016-4540']
- Opening url: https://lists.debian.org/debian-lts-announce/2016/06/msg00000.html
- Package : gdk-pixbuf
- gdk-pixbuf
- Opening url: https://lists.debian.org/debian-lts-announce/2016/06/msg00001.html
- <!-- MHonArc v2.6.19 -->
- <!--X-Subject: [SECURITY] Debian 7 Wheezy LTS now supporting armel and armhf -->
- <!--X-From-R13: [nexhf Ybfpunal <ncbNqrovna.bet> -->
- <!--X-Date: Thu, 2 Jun 2016 08:42:20 +0000 (UTC) -->
- <!--X-Message-Id: e1dfc74c-ba18-b8df-2887-03708f9cfaaf@debian.org -->
- <!--X-Content-Type: text/plain -->
- <!--X-Head-End-->
- <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"
- "http://www.w3.org/TR/html4/loose.dtd">
- <html>
- <head>
- <title>[SECURITY] Debian 7 Wheezy LTS now supporting armel and armhf</title>
- <link rev="made" href="mailto:apo@debian.org">
- <link rel="index" href="maillist.html">
- <link rel="top" href="threads.html">
- <link rel="up" href="msg00001.html">
- <link rel="prev" href="msg00000.html">
- <link rel="next" href="msg00002.html">
- <meta name="viewport" content="width=device-width, initial-scale=1">
- <style>
- pre {
- white-space: pre-wrap;
- }
- </style>
- </head>
- <body>
- <!--X-Body-Begin-->
- <!--X-User-Header-->
- <!--X-User-Header-End-->
- <!--X-TopPNI-->
- <hr>
- <form method="POST" action="/cgi-bin/spam-report.pl">
- <input type="hidden" name="listname" value="debian-lts-announce" />
- <input type="hidden" name="msg" value="msg00001.html" />
- <input type="hidden" name="date" value="2016/06" />
- <input type="submit" value="Report as spam" style="float: right" />
- [<a href="msg00000.html">Date Prev</a>][<a href="msg00002.html">Date Next</a>]
- [<a href="msg00000.html">Thread Prev</a>][<a href="msg00002.html">Thread Next</a>]
- [<a href="maillist.html#00001">Date Index</a>]
- [<a href="threads.html#00001">Thread Index</a>]
- </form>
- <!--X-TopPNI-End-->
- <!--X-MsgBody-->
- <!--X-Subject-Header-Begin-->
- <h1>[SECURITY] Debian 7 Wheezy LTS now supporting armel and armhf</h1>
- <hr>
- <!--X-Subject-Header-End-->
- <!--X-Head-of-Message-->
- <ul>
- <li><em>To</em>: <a href="mailto:debian-lts-announce%40lists.debian.org">debian-lts-announce@lists.debian.org</a></li>
- <li><em>Subject</em>: [SECURITY] Debian 7 Wheezy LTS now supporting armel and armhf</li>
- <li><em>From</em>: Markus Koschany <<a href="mailto:apo%40debian.org">apo@debian.org</a>></li>
- <li><em>Date</em>: Thu, 2 Jun 2016 10:42:00 +0200</li>
- <li><em>Message-id</em>: <<A HREF="/msgid-search/e1dfc74c-ba18-b8df-2887-03708f9cfaaf@debian.org">[🔎]</a> <a href="msg00001.html">e1dfc74c-ba18-b8df-2887-03708f9cfaaf@debian.org</A>></li>
- <li><em>Mail-followup-to</em>: <a href="mailto:debian-lts%40lists.debian.org">debian-lts@lists.debian.org</a></li>
- <li><em>Reply-to</em>: <a href="mailto:debian-lts%40lists.debian.org">debian-lts@lists.debian.org</a></li>
- </ul>
- <!--X-Head-of-Message-End-->
- <!--X-Head-Body-Sep-Begin-->
- <hr>
- <!--X-Head-Body-Sep-End-->
- <!--X-Body-of-Message-->
- <pre>-----BEGIN PGP SIGNED MESSAGE-----
- Hash: SHA512
- Debian Long Term Support (LTS) is a project created to extend the life
- of all Debian stable releases to (at least) 5 years.
- Thanks to the LTS sponsors, Debian's buildd maintainers and the Debian
- FTP Team are excited to announce that two new architectures, armel and
- armhf, are going to be supported in Debian 7 Wheezy LTS. These
- architectures along with i386 and amd64 will receive two additional
- years of extended security support.
- Security updates for Debian LTS are not handled by the native Debian
- Security Team, but instead by a separate group of volunteers and
- companies interested in making it a success.
- Wheezy's LTS period started [1] a few weeks ago and more than fifty
- updates have been announced so far. If you use Debian 7 Wheezy, you do
- not need to change anything in your system to start receiving those
- updates.
- More information about how to use Debian Long Term Support and other
- important changes regarding Wheezy LTS is available at
- <a rel="nofollow" href="https://wiki.debian.org/LTS/Using">https://wiki.debian.org/LTS/Using</a>
- [1] <a rel="nofollow" href="https://www.debian.org/News/2016/20160425">https://www.debian.org/News/2016/20160425</a>
- -----BEGIN PGP SIGNATURE-----
- Version: GnuPG v2
- iQJ8BAEBCgBmBQJXT/FYXxSAAAAAAC4AKGlzc3Vlci1mcHJAbm90YXRpb25zLm9w
- ZW5wZ3AuZmlmdGhob3JzZW1hbi5uZXRBQ0YzRDA4OEVGMzJFREVGNkExQTgzNUZE
- OUFEMTRCOTUxM0I1MUU0AAoJENmtFLlRO1HkYw0QAIN9tkGDcFzqVmwyLDwuC9Fm
- ZS3dqrO2OAd2FK2KCLkDV/d+BmEfdaaBdrcOCPJ5zyX2LExB6HB82lPwy7ELstgk
- 2YZF2bZXscfd1eT4k/nu0U/g9fMiXDEPEEGoU4Kt0WuuSpnHwgFXHqg6NTFiJEdZ
- XnJa1n23bn+iWS2oxsac09Z+dv5QauIP2u3uH+VK8wpMLu0+tqFvAoQO6Sl6gEQM
- /lA8AigPIq3VvEVA9uSxD/oQxqqsqI5QFbeb/52uVchxeRlX2PWfx5tBPThTt0WY
- xtIOPZQt0x3FQZr8RnVKbfqlNwHlWYNT1/C/La6CP+6yX1QA0cxxdaBE00CIEswO
- Uj7A8k9PxA+Tx3KdMZVSQPs1wkDnPcLkXlbIwNbEmR2V7zM86CzxVGK21aPkFDcB
- s/xra3mTgwNFIp6xNJirbu7IdLscyfdvlt1t8n3WQI+xVKFWDt3+xZZDfXF93VLP
- HcQTSnKZAOqqw+3STDmyVJbGjjmQyUqyvp70Llzhlkrbd+dDjA5QDMW2pltXZsYm
- n0Em3v0ixbQblyKvp047i/vz0C8Trq2zGPeEZ3DMC1m5IPpEE/BZmqQVwW1Z/J1A
- zIkz+71eqj+EOLHcIP0ex6YnULrXLkmBT23TcWp4VuMmjD1YdiPy266ZuBVLd60T
- kjF6hGNonySotZ46jHC0
- =r8TS
- -----END PGP SIGNATURE-----
- </pre>
- <!--X-Body-of-Message-End-->
- <!--X-MsgBody-End-->
- <!--X-Follow-Ups-->
- <hr />
- <strong>Reply to:</strong>
- <ul>
- <li><a href="mailto:debian-lts-announce@lists.debian.org?In-Reply-To=<e1dfc74c-ba18-b8df-2887-03708f9cfaaf@debian.org>&Subject=Re:%20[SECURITY] Debian 7 Wheezy LTS now supporting armel and armhf">debian-lts-announce@lists.debian.org</a></li>
- <li><a href="mailto:apo@debian.org?In-Reply-To=<e1dfc74c-ba18-b8df-2887-03708f9cfaaf@debian.org>&Subject=Re:%20[SECURITY] Debian 7 Wheezy LTS now supporting armel and armhf&CC=debian-lts-announce@lists.debian.org">Markus Koschany (on-list)</a></li>
- <li><a href="mailto:apo@debian.org?In-Reply-To=<e1dfc74c-ba18-b8df-2887-03708f9cfaaf@debian.org>&Subject=Re:%20[SECURITY] Debian 7 Wheezy LTS now supporting armel and armhf">Markus Koschany (off-list)</a></li>
- </ul>
- <hr />
- <!--X-Follow-Ups-End-->
- <!--X-References-->
- <!--X-References-End-->
- <!--X-BotPNI-->
- <ul>
- <li>Prev by Date:
- <strong><a href="msg00000.html">[SECURITY] [DLA 501-1] gdk-pixbuf security update</a></strong>
- </li>
- <li>Next by Date:
- <strong><a href="msg00002.html">[SECURITY] [DLA 502-1] graphicsmagick security update</a></strong>
- </li>
- <li>Previous by thread:
- <strong><a href="msg00000.html">[SECURITY] [DLA 501-1] gdk-pixbuf security update</a></strong>
- </li>
- <li>Next by thread:
- <strong><a href="msg00002.html">[SECURITY] [DLA 502-1] graphicsmagick security update</a></strong>
- </li>
- <li>Index(es):
- <ul>
- <li><a href="maillist.html#00001"><strong>Date</strong></a></li>
- <li><a href="threads.html#00001"><strong>Thread</strong></a></li>
- </ul>
- </li>
- </ul>
- <!--X-BotPNI-End-->
- <!--X-User-Footer-->
- <!--X-User-Footer-End-->
- </body>
- </html>
- Problem with
- None
- ################################################################################
- Opening url: https://lists.debian.org/debian-lts-announce/2016/06/msg00002.html
- Package : graphicsmagick
- graphicsmagick
- Opening url: https://lists.debian.org/debian-lts-announce/2016/06/msg00003.html
- Package : imagemagick
- imagemagick
- Opening url: https://lists.debian.org/debian-lts-announce/2016/06/msg00004.html
- Package : libxml2
- libxml2
- Opening url: https://lists.debian.org/debian-lts-announce/2016/06/msg00005.html
- Package : dhcpcd5
- dhcpcd5
- Opening url: https://lists.debian.org/debian-lts-announce/2016/06/msg00006.html
- Package : nss
- nss
- Opening url: https://lists.debian.org/debian-lts-announce/2016/06/msg00007.html
- Package : libxstream-java
- libxstream-java
- Opening url: https://lists.debian.org/debian-lts-announce/2016/06/msg00008.html
- Package : libpdfbox-java
- libpdfbox-java
- Opening url: https://lists.debian.org/debian-lts-announce/2016/06/msg00009.html
- Package : expat
- expat
- Opening url: https://lists.debian.org/debian-lts-announce/2016/06/msg00010.html
- Package : samba
- samba
- Opening url: https://lists.debian.org/debian-lts-announce/2016/06/msg00011.html
- Package : p7zip
- p7zip
- Opening url: https://lists.debian.org/debian-lts-announce/2016/06/msg00012.html
- Package : libtorrent-rasterbar
- libtorrent-rasterbar
- Opening url: https://lists.debian.org/debian-lts-announce/2016/06/msg00013.html
- Package : mantis
- mantis
- Opening url: https://lists.debian.org/debian-lts-announce/2016/06/msg00014.html
- Package : nspr
- nspr
- Opening url: https://lists.debian.org/debian-lts-announce/2016/06/msg00015.html
- Package : libxslt
- libxslt
- Opening url: https://lists.debian.org/debian-lts-announce/2016/06/msg00016.html
- Package : libav
- libav
- Opening url: https://lists.debian.org/debian-lts-announce/2016/06/msg00017.html
- Package : imagemagick
- imagemagick
- Opening url: https://lists.debian.org/debian-lts-announce/2016/06/msg00018.html
- Package : linux
- linux
- Opening url: https://lists.debian.org/debian-lts-announce/2016/06/msg00019.html
- Package : mozilla-devscripts
- firefox-esr
- Opening url: https://lists.debian.org/debian-lts-announce/2016/06/msg00020.html
- Package : horizon
- horizon
- Opening url: https://lists.debian.org/debian-lts-announce/2016/06/msg00021.html
- Package : firefox-esr
- firefox-esr
- Opening url: https://lists.debian.org/debian-lts-announce/2016/06/msg00022.html
- Package : python2.7
- python3.5
- Opening url: https://lists.debian.org/debian-lts-announce/2016/06/msg00023.html
- Package : icedove
- icedove
- Opening url: https://lists.debian.org/debian-lts-announce/2016/06/msg00024.html
- Package : squidguard
- squid3
- Opening url: https://lists.debian.org/debian-lts-announce/2016/06/msg00025.html
- Package : enigmail
- enigmail
- Opening url: https://lists.debian.org/debian-lts-announce/2016/06/msg00026.html
- Package : gimp
- gimp
- Opening url: https://lists.debian.org/debian-lts-announce/2016/06/msg00027.html
- Package : mysql-connector-java
- mysql-transitional
- Opening url: https://lists.debian.org/debian-lts-announce/2016/06/msg00028.html
- Package : nss
- nss
- Opening url: https://lists.debian.org/debian-lts-announce/2016/06/msg00029.html
- Package : libcommons-fileupload-java
- libcommons-fileupload-java
- Opening url: https://lists.debian.org/debian-lts-announce/2016/06/msg00030.html
- Package : tomcat7
- tomcat8
- Opening url: https://lists.debian.org/debian-lts-announce/2016/06/msg00031.html
- Package : java-common
- java-common
- Opening url: https://lists.debian.org/debian-lts-announce/2016/06/msg00032.html
- Package : movabletype-opensource
- movabletype-opensource
- Opening url: https://lists.debian.org/debian-lts-announce/2016/06/msg00033.html
- Package : spice
- spice
- Opening url: https://lists.debian.org/debian-lts-announce/2016/06/msg00034.html
- Package : php5
- php5
- Opening url: https://lists.debian.org/debian-lts-announce/2016/06/msg00035.html
- Package : xerces-c
- xerces-c
- Opening url: https://lists.debian.org/debian-lts-announce/2016/06/msg00036.html
- Package : libgd2
- libgd2
- Opening url: https://lists.debian.org/debian-lts-announce/2016/06/msg00037.html
- Package : wget
- wget
- Opening url: https://lists.debian.org/debian-lts-announce/2016/06/msg00038.html
- Package : roundcube
- roundcube
- Opening url: https://lists.debian.org/debian-lts-announce/2016/06/msg00039.html
- Package : wireshark
- wireshark
- Opening url: https://lists.debian.org/debian-lts-announce/2016/06/msg00040.html
- ['CVE-2015-7552', 'CVE-2016-5118', 'CVE-2016-5118', 'CVE-2016-1840', 'CVE-2016-4449', 'CVE-2016-1835', 'CVE-2016-1838', 'CVE-2016-4483', 'CVE-2016-4447', 'CVE-2016-1834', 'CVE-2016-3627', 'CVE-2016-1839', 'CVE-2016-2073', 'CVE-2016-1762', 'CVE-2015-8806', 'CVE-2016-3705', 'CVE-2016-1837', 'CVE-2016-1833', 'CVE-2014-7913', 'CVE-2014-7912', 'CVE-2015-4000', 'CVE-2016-3674', 'CVE-2016-2175', 'CVE-2012-6702', 'CVE-2012-0876', 'CVE-2016-5300', 'CVE-2016-2115', 'CVE-2016-2335', 'CVE-2016-5301', 'CVE-2016-5364', 'CVE-2016-1951', 'CVE-2015-7995', 'CVE-2016-1684', 'CVE-2016-1683', 'CVE-2016-3062', 'CVE-2016-4562', 'CVE-2016-4563', 'CVE-2016-4564', 'CVE-2016-4486', 'CVE-2016-5244', 'CVE-2016-3140', 'CVE-2016-2187', 'CVE-2016-3955', 'CVE-2016-4482', 'CVE-2016-2186', 'CVE-2016-3672', 'CVE-2016-2184', 'CVE-2016-4580', 'CVE-2016-3134', 'CVE-2016-4578', 'CVE-2016-5243', 'CVE-2016-2185', 'CVE-2016-1583', 'CVE-2016-4565', 'CVE-2016-3136', 'CVE-2016-4913', 'CVE-2016-4485', 'CVE-2016-3157', 'CVE-2016-3138', 'CVE-2016-3137', 'CVE-2016-3951', 'CVE-2016-0821', 'CVE-2016-4569', 'CVE-2016-3961', 'CVE-2016-4428', 'CVE-2016-2821', 'CVE-2016-2828', 'CVE-2016-2831', 'CVE-2016-2822', 'CVE-2016-2819', 'CVE-2016-2818', 'CVE-2016-0772', 'CVE-2016-5699', 'CVE-2016-5636', 'CVE-2016-2806', 'CVE-2015-8936', 'CVE-2016-4994', 'CVE-2015-2575', 'CVE-2016-2834', 'CVE-2016-3092', 'CVE-2016-3092', 'CVE-2016-5742', 'CVE-2016-2150', 'CVE-2016-5093', 'CVE-2016-5095', 'CVE-2016-5094', 'CVE-2016-5096', 'CVE-2016-4463', 'CVE-2016-5766', 'CVE-2016-4971', 'CVE-2015-8864', 'CVE-2016-4068', 'CVE-2016-5354', 'CVE-2016-5351', 'CVE-2016-5357', 'CVE-2016-5350', 'CVE-2016-5353', 'CVE-2016-5355', 'CVE-2016-5356', 'CVE-2016-5359']
- Opening url: https://lists.debian.org/debian-lts-announce/2016/07/msg00000.html
- Package : qemu-kvm
- qemu
- Opening url: https://lists.debian.org/debian-lts-announce/2016/07/msg00001.html
- Package : libvirt
- libvirt
- Opening url: https://lists.debian.org/debian-lts-announce/2016/07/msg00002.html
- Package : qemu
- qemu
- Opening url: https://lists.debian.org/debian-lts-announce/2016/07/msg00003.html
- Package : pidgin
- pidgin
- Opening url: https://lists.debian.org/debian-lts-announce/2016/07/msg00004.html
- Package : sqlite3
- sqlite3
- Opening url: https://lists.debian.org/debian-lts-announce/2016/07/msg00005.html
- Package : tcpreplay
- tcpreplay
- Opening url: https://lists.debian.org/debian-lts-announce/2016/07/msg00006.html
- Package : icu
- icu
- Opening url: https://lists.debian.org/debian-lts-announce/2016/07/msg00007.html
- Package : clamav
- clamav
- Opening url: https://lists.debian.org/debian-lts-announce/2016/07/msg00008.html
- Package : graphicsmagick
- graphicsmagick
- Opening url: https://lists.debian.org/debian-lts-announce/2016/07/msg00009.html
- Package : drupal7
- drupal7
- Opening url: https://lists.debian.org/debian-lts-announce/2016/07/msg00010.html
- Package : clamav
- clamav
- Opening url: https://lists.debian.org/debian-lts-announce/2016/07/msg00011.html
- Package : drupal7
- drupal7
- Opening url: https://lists.debian.org/debian-lts-announce/2016/07/msg00012.html
- Package : ruby-eventmachine
- ruby2.3
- Opening url: https://lists.debian.org/debian-lts-announce/2016/07/msg00013.html
- Package : phpmyadmin
- phpmyadmin
- Opening url: https://lists.debian.org/debian-lts-announce/2016/07/msg00014.html
- Package : binutils
- binutils
- Opening url: https://lists.debian.org/debian-lts-announce/2016/07/msg00015.html
- Package : apache2
- apache2
- Opening url: https://lists.debian.org/debian-lts-announce/2016/07/msg00016.html
- Package : libarchive
- libarchive
- Opening url: https://lists.debian.org/debian-lts-announce/2016/07/msg00017.html
- Package : python-django
- python-django
- Opening url: https://lists.debian.org/debian-lts-announce/2016/07/msg00018.html
- Package : squid3
- squid3
- Opening url: https://lists.debian.org/debian-lts-announce/2016/07/msg00019.html
- Package : squid
- squid3
- Opening url: https://lists.debian.org/debian-lts-announce/2016/07/msg00020.html
- Package : dietlibc
- dietlibc
- Opening url: https://lists.debian.org/debian-lts-announce/2016/07/msg00021.html
- Package : ntp
- ntp
- Opening url: https://lists.debian.org/debian-lts-announce/2016/07/msg00022.html
- Package : cacti
- cacti
- Opening url: https://lists.debian.org/debian-lts-announce/2016/07/msg00023.html
- Package : uclibc
- uclibc
- Opening url: https://lists.debian.org/debian-lts-announce/2016/07/msg00024.html
- Package : gosa
- gosa
- Opening url: https://lists.debian.org/debian-lts-announce/2016/07/msg00025.html
- Package : libgd2
- libgd2
- Opening url: https://lists.debian.org/debian-lts-announce/2016/07/msg00026.html
- Package : tardiff
- tardiff
- Opening url: https://lists.debian.org/debian-lts-announce/2016/07/msg00027.html
- Package : perl
- perl
- Opening url: https://lists.debian.org/debian-lts-announce/2016/07/msg00028.html
- Package : cakephp
- cakephp
- Opening url: https://lists.debian.org/debian-lts-announce/2016/07/msg00029.html
- Package : wordpress
- wordpress
- Opening url: https://lists.debian.org/debian-lts-announce/2016/07/msg00030.html
- Package : xmlrpc-epi
- xmlrpc-epi
- Opening url: https://lists.debian.org/debian-lts-announce/2016/07/msg00031.html
- Package : kde4libs
- kdelibs
- Opening url: https://lists.debian.org/debian-lts-announce/2016/07/msg00032.html
- Package : xen
- xen
- Opening url: https://lists.debian.org/debian-lts-announce/2016/07/msg00033.html
- Package : collectd
- collectd
- Opening url: https://lists.debian.org/debian-lts-announce/2016/07/msg00034.html
- Package : qemu
- qemu
- Opening url: https://lists.debian.org/debian-lts-announce/2016/07/msg00035.html
- Package : qemu-kvm
- qemu
- Opening url: https://lists.debian.org/debian-lts-announce/2016/07/msg00036.html
- Package : libdbd-mysql-perl
- libdbd-mysql-perl
- Opening url: https://lists.debian.org/debian-lts-announce/2016/07/msg00037.html
- Package : icedove
- icedove
- Opening url: https://lists.debian.org/debian-lts-announce/2016/07/msg00038.html
- Package : redis
- redis
- Opening url: https://lists.debian.org/debian-lts-announce/2016/07/msg00039.html
- Package : openssh
- openssl
- Opening url: https://lists.debian.org/debian-lts-announce/2016/07/msg00040.html
- ['CVE-2016-3712', 'CVE-2016-3710', 'CVE-2016-5008', 'CVE-2016-3712', 'CVE-2016-3710', 'CVE-2016-2371', 'CVE-2016-2366', 'CVE-2016-2374', 'CVE-2016-2373', 'CVE-2016-2369', 'CVE-2016-2368', 'CVE-2016-2367', 'CVE-2016-2375', 'CVE-2016-2370', 'CVE-2016-2377', 'CVE-2016-4323', 'CVE-2016-2380', 'CVE-2016-2376', 'CVE-2016-2378', 'CVE-2016-2365', 'CVE-2016-2372', 'CVE-2016-6153', 'CVE-2016-6160', 'CVE-2016-0494', 'CVE-2015-4844', 'CVE-2015-2632', 'CVE-2016-5241', 'CVE-2016-5240', 'CVE-2015-7943', 'CVE-2016-6211', 'CVE-2016-5731', 'CVE-2016-5739', 'CVE-2016-5733', 'CVE-2016-4493', 'CVE-2016-4489', 'CVE-2016-4487', 'CVE-2016-6131', 'CVE-2016-4488', 'CVE-2016-4490', 'CVE-2016-2226', 'CVE-2016-4492', 'CVE-2016-5387', 'CVE-2016-4302', 'CVE-2016-4809', 'CVE-2015-8917', 'CVE-2015-8925', 'CVE-2016-5844', 'CVE-2015-8931', 'CVE-2015-8922', 'CVE-2015-8932', 'CVE-2015-8920', 'CVE-2015-8921', 'CVE-2016-4300', 'CVE-2015-8930', 'CVE-2015-8924', 'CVE-2015-8934', 'CVE-2015-8926', 'CVE-2015-8919', 'CVE-2015-8933', 'CVE-2015-8923', 'CVE-2016-6186', 'CVE-2016-4051', 'CVE-2016-4554', 'CVE-2015-7978', 'CVE-2016-1547', 'CVE-2016-2516', 'CVE-2015-8138', 'CVE-2015-7974', 'CVE-2016-1550', 'CVE-2016-2518', 'CVE-2015-8158', 'CVE-2015-7979', 'CVE-2015-7977', 'CVE-2016-1548', 'CVE-2016-3172', 'CVE-2016-2313', 'CVE-2016-3659', 'CVE-2016-2224', 'CVE-2016-2225', 'CVE-2016-6264', 'CVE-2015-8771', 'CVE-2016-6161', 'CVE-2015-0857', 'CVE-2015-0858', 'CVE-2016-6185', 'CVE-2016-1238', 'CVE-2016-5835', 'CVE-2016-5839', 'CVE-2016-5387', 'CVE-2016-5834', 'CVE-2016-5838', 'CVE-2016-5832', 'CVE-2016-6296', 'CVE-2016-6232', 'CVE-2016-3712', 'CVE-2014-3672', 'CVE-2016-3159', 'CVE-2016-3158', 'CVE-2016-6258', 'CVE-2016-3960', 'CVE-2016-4480', 'CVE-2016-3710', 'CVE-2016-6254', 'CVE-2016-6351', 'CVE-2016-4020', 'CVE-2016-4439', 'CVE-2016-2857', 'CVE-2015-5239', 'CVE-2016-5403', 'CVE-2016-6351', 'CVE-2016-4020', 'CVE-2016-4439', 'CVE-2016-2857', 'CVE-2015-5239', 'CVE-2016-5403', 'CVE-2015-8949', 'CVE-2014-9906', 'CVE-2016-2818', 'CVE-2013-7458', 'CVE-2016-6210']
- Opening url: https://lists.debian.org/debian-lts-announce/2016/08/msg00000.html
- Package : graphite2
- graphite2
- Opening url: https://lists.debian.org/debian-lts-announce/2016/08/msg00001.html
- Package : libidn
- libidn
- Opening url: https://lists.debian.org/debian-lts-announce/2016/08/msg00002.html
- Package : lighttpd
- lighttpd
- Opening url: https://lists.debian.org/debian-lts-announce/2016/08/msg00003.html
- Package : libreoffice
- libreoffice
- Opening url: https://lists.debian.org/debian-lts-announce/2016/08/msg00004.html
- Package : collectd
- collectd
- Opening url: https://lists.debian.org/debian-lts-announce/2016/08/msg00005.html
- Package : firefox-esr
- firefox-esr
- Opening url: https://lists.debian.org/debian-lts-announce/2016/08/msg00006.html
- Package : libsys-syslog-perl
- libsys-syslog-perl
- Opening url: https://lists.debian.org/debian-lts-announce/2016/08/msg00007.html
- Package : curl
- curl
- Opening url: https://lists.debian.org/debian-lts-announce/2016/08/msg00008.html
- Package : mysql-5.5
- mysql-transitional
- Opening url: https://lists.debian.org/debian-lts-announce/2016/08/msg00009.html
- Package : openjdk-7
- openjdk-7
- Opening url: https://lists.debian.org/debian-lts-announce/2016/08/msg00010.html
- Package : icedtea-web
- icedtea-web
- Opening url: https://lists.debian.org/debian-lts-announce/2016/08/msg00011.html
- Package : mongodb
- mongodb
- Opening url: https://lists.debian.org/debian-lts-announce/2016/08/msg00012.html
- Package : mupdf
- mupdf
- Opening url: https://lists.debian.org/debian-lts-announce/2016/08/msg00013.html
- Package : python-django
- python-django
- Opening url: https://lists.debian.org/debian-lts-announce/2016/08/msg00014.html
- Package : libreoffice
- libreoffice
- Opening url: https://lists.debian.org/debian-lts-announce/2016/08/msg00015.html
- Package : fontconfig
- fontconfig
- Opening url: https://lists.debian.org/debian-lts-announce/2016/08/msg00016.html
- Package : mongodb
- mongodb
- Opening url: https://lists.debian.org/debian-lts-announce/2016/08/msg00017.html
- Package : postgresql-9.1
- postgresql-9.6
- Opening url: https://lists.debian.org/debian-lts-announce/2016/08/msg00018.html
- Package : nettle
- nettle
- Opening url: https://lists.debian.org/debian-lts-announce/2016/08/msg00019.html
- Package : openssh
- openssl
- Opening url: https://lists.debian.org/debian-lts-announce/2016/08/msg00020.html
- Package : wireshark
- wireshark
- Opening url: https://lists.debian.org/debian-lts-announce/2016/08/msg00021.html
- Package : extplorer
- extplorer
- Opening url: https://lists.debian.org/debian-lts-announce/2016/08/msg00022.html
- Package : libupnp
- libupnp
- Opening url: https://lists.debian.org/debian-lts-announce/2016/08/msg00023.html
- Package : suckless-tools
- suckless-tools
- Opening url: https://lists.debian.org/debian-lts-announce/2016/08/msg00024.html
- Package : cracklib2
- cracklib2
- Opening url: https://lists.debian.org/debian-lts-announce/2016/08/msg00025.html
- Package : libgcrypt11
- libgcrypt11
- Opening url: https://lists.debian.org/debian-lts-announce/2016/08/msg00026.html
- Package : quagga
- quagga
- Opening url: https://lists.debian.org/debian-lts-announce/2016/08/msg00027.html
- Package : ruby-activesupport-3.2
- ruby2.3
- Opening url: https://lists.debian.org/debian-lts-announce/2016/08/msg00028.html
- Package : ruby-actionpack-3.2
- ruby2.3
- Opening url: https://lists.debian.org/debian-lts-announce/2016/08/msg00029.html
- Package : eog
- eog
- Opening url: https://lists.debian.org/debian-lts-announce/2016/08/msg00030.html
- Package : gnupg
- gnupg2
- Opening url: https://lists.debian.org/debian-lts-announce/2016/08/msg00031.html
- Package : tiff
- tiff
- Opening url: https://lists.debian.org/debian-lts-announce/2016/08/msg00032.html
- ['CVE-2015-8948', 'CVE-2016-6261', 'CVE-2016-6263', 'CVE-2016-1000212', 'CVE-2016-4324', 'CVE-2016-5252', 'CVE-2016-2837', 'CVE-2016-5265', 'CVE-2016-5264', 'CVE-2016-5262', 'CVE-2016-5254', 'CVE-2016-2836', 'CVE-2016-5259', 'CVE-2016-2830', 'CVE-2016-5258', 'CVE-2016-2838', 'CVE-2016-5263', 'CVE-2016-1238', 'CVE-2016-5419', 'CVE-2016-5420', 'CVE-2016-3477', 'CVE-2016-3615', 'CVE-2016-3521', 'CVE-2016-5440', 'CVE-2016-3500', 'CVE-2016-3550', 'CVE-2016-3458', 'CVE-2016-3508', 'CVE-2016-3606', 'CVE-2016-6494', 'CVE-2016-6525', 'CVE-2016-1513', 'CVE-2016-5384', 'CVE-2016-6494', 'CVE-2016-5423', 'CVE-2016-5424', 'CVE-2016-6489', 'CVE-2016-6515', 'CVE-2016-6511', 'CVE-2016-6505', 'CVE-2016-6504', 'CVE-2016-6507', 'CVE-2016-6509', 'CVE-2016-6510', 'CVE-2016-6506', 'CVE-2016-6508', 'CVE-2016-4313', 'CVE-2016-6255', 'CVE-2016-6866', 'CVE-2016-6318', 'CVE-2016-6313', 'CVE-2016-4049', 'CVE-2016-4036', 'CVE-2015-7576', 'CVE-2015-3227', 'CVE-2015-7576', 'CVE-2016-2098', 'CVE-2016-2097', 'CVE-2016-6316', 'CVE-2016-0751', 'CVE-2016-0752', 'CVE-2016-6855', 'CVE-2016-6313', 'CVE-2016-5321', 'CVE-2016-5323', 'CVE-2016-5322', 'CVE-2016-5315', 'CVE-2016-5317', 'CVE-2016-5316', 'CVE-2016-5314', 'CVE-2016-3991', 'CVE-2016-5320', 'CVE-2016-5875']
- Opening url: https://lists.debian.org/debian-lts-announce/2016/09/msg00000.html
- Package : cacti
- cacti
- Opening url: https://lists.debian.org/debian-lts-announce/2016/09/msg00001.html
- Package : mailman
- mailman
- Opening url: https://lists.debian.org/debian-lts-announce/2016/09/msg00002.html
- Package : linux
- linux
- Opening url: https://lists.debian.org/debian-lts-announce/2016/09/msg00003.html
- Package : tiff3
- tiff3
- Opening url: https://lists.debian.org/debian-lts-announce/2016/09/msg00004.html
- Package : jsch
- jsch
- Opening url: https://lists.debian.org/debian-lts-announce/2016/09/msg00005.html
- Package : libtomcrypt
- libtomcrypt
- Opening url: https://lists.debian.org/debian-lts-announce/2016/09/msg00006.html
- Package : roundcube
- roundcube
- Opening url: https://lists.debian.org/debian-lts-announce/2016/09/msg00007.html
- Package : icu
- icu
- Opening url: https://lists.debian.org/debian-lts-announce/2016/09/msg00008.html
- Package : xen
- xen
- Opening url: https://lists.debian.org/debian-lts-announce/2016/09/msg00009.html
- Package : curl
- curl
- Opening url: https://lists.debian.org/debian-lts-announce/2016/09/msg00010.html
- Package : libarchive
- libarchive
- Opening url: https://lists.debian.org/debian-lts-announce/2016/09/msg00011.html
- Package : qemu
- qemu
- Opening url: https://lists.debian.org/debian-lts-announce/2016/09/msg00012.html
- Package : qemu-kvm
- qemu
- Opening url: https://lists.debian.org/debian-lts-announce/2016/09/msg00013.html
- Package : libphp-adodb
- libphp-adodb
- Opening url: https://lists.debian.org/debian-lts-announce/2016/09/msg00014.html
- Package : autotrace
- autotrace
- Opening url: https://lists.debian.org/debian-lts-announce/2016/09/msg00015.html
- Package : tomcat6
- tomcat8
- Opening url: https://lists.debian.org/debian-lts-announce/2016/09/msg00016.html
- Package : tomcat7
- tomcat8
- Opening url: https://lists.debian.org/debian-lts-announce/2016/09/msg00017.html
- Package : mysql-5.5
- mysql-transitional
- Opening url: https://lists.debian.org/debian-lts-announce/2016/09/msg00018.html
- Package : curl
- curl
- Opening url: https://lists.debian.org/debian-lts-announce/2016/09/msg00019.html
- Package : phpmyadmin
- phpmyadmin
- Opening url: https://lists.debian.org/debian-lts-announce/2016/09/msg00020.html
- Package : pdns
- pdns
- Opening url: https://lists.debian.org/debian-lts-announce/2016/09/msg00021.html
- Package : php5
- php5
- Opening url: https://lists.debian.org/debian-lts-announce/2016/09/msg00022.html
- Package : jackrabbit
- jackrabbit
- Opening url: https://lists.debian.org/debian-lts-announce/2016/09/msg00023.html
- Package : zookeeper
- zookeeper
- Opening url: https://lists.debian.org/debian-lts-announce/2016/09/msg00024.html
- Package : unadf
- unadf
- Opening url: https://lists.debian.org/debian-lts-announce/2016/09/msg00025.html
- Package : wireshark
- wireshark
- Opening url: https://lists.debian.org/debian-lts-announce/2016/09/msg00026.html
- Package : wordpress
- wordpress
- Opening url: https://lists.debian.org/debian-lts-announce/2016/09/msg00027.html
- Package : dropbear
- dropbear
- Opening url: https://lists.debian.org/debian-lts-announce/2016/09/msg00028.html
- Package : dwarfutils
- dwarfutils
- Opening url: https://lists.debian.org/debian-lts-announce/2016/09/msg00029.html
- Package : openssl
- openssl
- Opening url: https://lists.debian.org/debian-lts-announce/2016/09/msg00030.html
- Package : policycoreutils
- policycoreutils
- Opening url: https://lists.debian.org/debian-lts-announce/2016/09/msg00031.html
- Package : mactelnet
- mactelnet
- Opening url: https://lists.debian.org/debian-lts-announce/2016/09/msg00032.html
- Package : firefox-esr
- firefox-esr
- Opening url: https://lists.debian.org/debian-lts-announce/2016/09/msg00033.html
- Package : icedove
- icedove
- Opening url: https://lists.debian.org/debian-lts-announce/2016/09/msg00034.html
- Package : ruby-activesupport-3.2
- ruby2.3
- Opening url: https://lists.debian.org/debian-lts-announce/2016/09/msg00035.html
- Package : chicken
- chicken
- Opening url: https://lists.debian.org/debian-lts-announce/2016/09/msg00036.html
- Package : firefox-esr
- firefox-esr
- Opening url: https://lists.debian.org/debian-lts-announce/2016/09/msg00037.html
- Package : ruby-activerecord-3.2
- ruby2.3
- Opening url: https://lists.debian.org/debian-lts-announce/2016/09/msg00038.html
- ['CVE-2016-2313', 'CVE-2016-6893', 'CVE-2016-7118', 'CVE-2016-6480', 'CVE-2016-6828', 'CVE-2016-5696', 'CVE-2016-6136', 'CVE-2016-5829', 'CVE-2016-3857', 'CVE-2016-4470', 'CVE-2014-8128', 'CVE-2015-1547', 'CVE-2014-8129', 'CVE-2016-5321', 'CVE-2016-5323', 'CVE-2016-3186', 'CVE-2014-9655', 'CVE-2016-5316', 'CVE-2016-5314', 'CVE-2016-5320', 'CVE-2016-5875', 'CVE-2016-3945', 'CVE-2016-5315', 'CVE-2015-8665', 'CVE-2016-6223', 'CVE-2016-5322', 'CVE-2015-8683', 'CVE-2016-3990', 'CVE-2016-3623', 'CVE-2013-1961', 'CVE-2016-5317', 'CVE-2016-3991', 'CVE-2010-2596', 'CVE-2016-5725', 'CVE-2016-6129', 'CVE-2016-4069', 'CVE-2014-9587', 'CVE-2015-1433', 'CVE-2016-6293', 'CVE-2016-7092', 'CVE-2016-7094', 'CVE-2016-7141', 'CVE-2015-8915', 'CVE-2016-7166', 'CVE-2016-7116', 'CVE-2016-7116', 'CVE-2016-7392', 'CVE-2016-1240', 'CVE-2016-1240', 'CVE-2016-6662', 'CVE-2016-7167', 'CVE-2016-6622', 'CVE-2016-6606', 'CVE-2016-6609', 'CVE-2016-6623', 'CVE-2016-6631', 'CVE-2016-6620', 'CVE-2016-6607', 'CVE-2016-6624', 'CVE-2016-6614', 'CVE-2016-6611', 'CVE-2016-6612', 'CVE-2016-6630', 'CVE-2016-6613', 'CVE-2016-5426', 'CVE-2016-6172', 'CVE-2016-5427', 'CVE-2016-6294', 'CVE-2016-6290', 'CVE-2016-6292', 'CVE-2016-4537', 'CVE-2016-5096', 'CVE-2016-6296', 'CVE-2016-5114', 'CVE-2016-5771', 'CVE-2016-5399', 'CVE-2016-4538', 'CVE-2016-5772', 'CVE-2016-5768', 'CVE-2016-5773', 'CVE-2016-6289', 'CVE-2016-5770', 'CVE-2016-6291', 'CVE-2016-6295', 'CVE-2016-6297', 'CVE-2016-5769', 'CVE-2016-4473', 'CVE-2016-6801', 'CVE-2016-5017', 'CVE-2016-1244', 'CVE-2016-1243', 'CVE-2016-7176', 'CVE-2016-7179', 'CVE-2016-7178', 'CVE-2016-7177', 'CVE-2016-7180', 'CVE-2016-5836', 'CVE-2015-8834', 'CVE-2016-4029', 'CVE-2015-3440', 'CVE-2016-6634', 'CVE-2016-6635', 'CVE-2016-7169', 'CVE-2016-7168', 'CVE-2016-7406', 'CVE-2016-7407', 'CVE-2016-7510', 'CVE-2016-7511', 'CVE-2016-2177', 'CVE-2016-6306', 'CVE-2016-2183', 'CVE-2016-2181', 'CVE-2016-6302', 'CVE-2016-2178', 'CVE-2016-2180', 'CVE-2016-6304', 'CVE-2016-6303', 'CVE-2016-2179', 'CVE-2016-2182', 'CVE-2016-7545', 'CVE-2016-7115', 'CVE-2016-5278', 'CVE-2016-5261', 'CVE-2016-5280', 'CVE-2016-5270', 'CVE-2016-5272', 'CVE-2016-5257', 'CVE-2016-5274', 'CVE-2016-5250', 'CVE-2016-5276', 'CVE-2016-5277', 'CVE-2016-5281', 'CVE-2016-5284', 'CVE-2016-2836', 'CVE-2016-0753', 'CVE-2016-6830', 'CVE-2016-6831', 'CVE-2016-0753']
- Opening url: https://lists.debian.org/debian-lts-announce/2016/10/msg00000.html
- Package : libav
- libav
- Opening url: https://lists.debian.org/debian-lts-announce/2016/10/msg00001.html
- Package : bind9
- bind9
- Opening url: https://lists.debian.org/debian-lts-announce/2016/10/msg00002.html
- Package : zendframework
- zendframework
- Opening url: https://lists.debian.org/debian-lts-announce/2016/10/msg00003.html
- Package : freeimage
- freeimage
- Opening url: https://lists.debian.org/debian-lts-announce/2016/10/msg00004.html
- Package : c-ares
- c-ares
- Opening url: https://lists.debian.org/debian-lts-announce/2016/10/msg00005.html
- Package : python-django
- python-django
- Opening url: https://lists.debian.org/debian-lts-announce/2016/10/msg00006.html
- Package : mat
- mat
- Opening url: https://lists.debian.org/debian-lts-announce/2016/10/msg00007.html
- Package : graphicsmagick
- graphicsmagick
- Opening url: https://lists.debian.org/debian-lts-announce/2016/10/msg00008.html
- Package : qemu
- qemu
- Opening url: https://lists.debian.org/debian-lts-announce/2016/10/msg00009.html
- Package : qemu-kvm
- qemu
- Opening url: https://lists.debian.org/debian-lts-announce/2016/10/msg00010.html
- Package : libxfixes
- libxfixes
- Opening url: https://lists.debian.org/debian-lts-announce/2016/10/msg00011.html
- <!-- MHonArc v2.6.19 -->
- <!--X-Subject: [SECURITY] [DLA 655-1] mpg123 security update -->
- <!--X-From-R13: Xbanf [rhere <zrwbNqrovna.bet> -->
- <!--X-Date: Sat, 15 Oct 2016 11:09:44 +0000 (UTC) -->
- <!--X-Message-Id: bc563b69-2257-3978-6400-dc4ba05aae54@debian.org -->
- <!--X-Content-Type: text/plain -->
- <!--X-Head-End-->
- <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"
- "http://www.w3.org/TR/html4/loose.dtd">
- <html>
- <head>
- <title>[SECURITY] [DLA 655-1] mpg123 security update</title>
- <link rev="made" href="mailto:mejo@debian.org">
- <link rel="index" href="maillist.html">
- <link rel="top" href="threads.html">
- <link rel="up" href="msg00011.html">
- <link rel="prev" href="msg00010.html">
- <link rel="next" href="msg00012.html">
- <meta name="viewport" content="width=device-width, initial-scale=1">
- <style>
- pre {
- white-space: pre-wrap;
- }
- </style>
- </head>
- <body>
- <!--X-Body-Begin-->
- <!--X-User-Header-->
- <!--X-User-Header-End-->
- <!--X-TopPNI-->
- <hr>
- <form method="POST" action="/cgi-bin/spam-report.pl">
- <input type="hidden" name="listname" value="debian-lts-announce" />
- <input type="hidden" name="msg" value="msg00011.html" />
- <input type="hidden" name="date" value="2016/10" />
- <input type="submit" value="Report as spam" style="float: right" />
- [<a href="msg00010.html">Date Prev</a>][<a href="msg00012.html">Date Next</a>]
- [<a href="msg00010.html">Thread Prev</a>][<a href="msg00012.html">Thread Next</a>]
- [<a href="maillist.html#00011">Date Index</a>]
- [<a href="threads.html#00011">Thread Index</a>]
- </form>
- <!--X-TopPNI-End-->
- <!--X-MsgBody-->
- <!--X-Subject-Header-Begin-->
- <h1>[SECURITY] [DLA 655-1] mpg123 security update</h1>
- <hr>
- <!--X-Subject-Header-End-->
- <!--X-Head-of-Message-->
- <ul>
- <li><em>To</em>: <a href="mailto:debian-lts-announce%40lists.debian.org">debian-lts-announce@lists.debian.org</a></li>
- <li><em>Subject</em>: [SECURITY] [DLA 655-1] mpg123 security update</li>
- <li><em>From</em>: Jonas Meurer <<a href="mailto:mejo%40debian.org">mejo@debian.org</a>></li>
- <li><em>Date</em>: Sat, 15 Oct 2016 13:09:14 +0200</li>
- <li><em>Message-id</em>: <<A HREF="/msgid-search/bc563b69-2257-3978-6400-dc4ba05aae54@debian.org">[🔎]</a> <a href="msg00011.html">bc563b69-2257-3978-6400-dc4ba05aae54@debian.org</A>></li>
- <li><em>Mail-followup-to</em>: <a href="mailto:debian-lts%40lists.debian.org">debian-lts@lists.debian.org</a></li>
- <li><em>Reply-to</em>: <a href="mailto:debian-lts%40lists.debian.org">debian-lts@lists.debian.org</a></li>
- </ul>
- <!--X-Head-of-Message-End-->
- <!--X-Head-Body-Sep-Begin-->
- <hr>
- <!--X-Head-Body-Sep-End-->
- <!--X-Body-of-Message-->
- <pre>-----BEGIN PGP SIGNED MESSAGE-----
- Hash: SHA256
- Several security vulnerabilities have been discovered in mpg123, an
- MPEG layer 1/2/3 audio decoder and player. An attacker could take
- advantage of these flaws to cause a denial of service against mpg123
- or applications using the libmpg123 library with a carefully crafted
- input file.
- CVE-2014-9497
- Myautsai PAN discovered a flaw in the decoder initialization code
- of libmpg123. A specially crafted mp3 input file can be used to
- cause a buffer overflow, resulting in a denial of service.
- CVE-2016-1000247
- Jerold Hoong discovered a flaw in the id3 tag processing code of
- libmpg123. A specially crafted mp3 input file could be used to
- cause a buffer over-read, resulting in a denial of service.
- For Debian 7 "Wheezy", these problems have been fixed in version
- 1.14.4-1+deb7u1.
- We recommend that you upgrade your mpg123 packages.
- Further information about Debian LTS security advisories, how to apply
- these updates to your system and frequently asked questions can be
- found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a>
- - --
- Jonas Meurer
- -----BEGIN PGP SIGNATURE-----
- iQItBAEBCAAXBQJYAg5ZEBxtZWpvQGRlYmlhbi5vcmcACgkQUmLn/0kQSf5U1g//
- dO1tJFriBYqoUKJfmEaUplQ51DQDZYu5JkWfL+TvtEKtr9VVSQttjJrcQBwtNSJB
- jPnCqhfDLTGpLpGVmraSfGqs0edQj859qNCs0Dd2B1nKVVK9wq1LjCjsXrLwS9J5
- LxOnnfEGR946lIo+L3SnpAHns0ACsLibaz+dEs4oaglfsO2z6jXzKKyC/6YoYkS6
- KplLoWtimWaCtwZAweHScXT2UG2Smln7+Plx+gf68vCrCWLdqMO0SnstHWOc+aML
- 7/lkFYvNLN3XCFuHPfXuSuWZwMUzGfP/EHUagkSxExBIJFLri/OFck5zFDZCxVCP
- inCcO85JzFvneGSv9Yr+l0t0a7Iu6pez+C5RWzkTuRjl8jfNmbHFA5BP1Yw2OFOR
- BAWQyO1LxFE59lcAnJwRNwIjnVK3Q8nb9Z5K3mThnwWe3Oq9S8/WK5eS2LqKDsU+
- 17/IJfmLboCXLG7oFGLC6NTeNo6C7cDX08DQL29s7K+CBOZ5EmzTJ9XiCQMzkaH7
- 11GMvnD2uqGQEBI3MEqTBHOqMK+6uNxE77jEUHJvmb/4Wyt02xW7yN8/iaCwMJbj
- AiRsvE/kJ44Qu+wLKjKgPOOIiy5xQOgxEODdjqDDayCRTJpctscHMDFWWlWXcLE3
- EDyLQ6S0UF+wFFTYXQYsVdDa1P53e9xj9mfwKMreoPM=
- =8+cb
- -----END PGP SIGNATURE-----
- </pre>
- <!--X-Body-of-Message-End-->
- <!--X-MsgBody-End-->
- <!--X-Follow-Ups-->
- <hr />
- <strong>Reply to:</strong>
- <ul>
- <li><a href="mailto:debian-lts-announce@lists.debian.org?In-Reply-To=<bc563b69-2257-3978-6400-dc4ba05aae54@debian.org>&Subject=Re:%20[SECURITY] [DLA 655-1] mpg123 security update">debian-lts-announce@lists.debian.org</a></li>
- <li><a href="mailto:mejo@debian.org?In-Reply-To=<bc563b69-2257-3978-6400-dc4ba05aae54@debian.org>&Subject=Re:%20[SECURITY] [DLA 655-1] mpg123 security update&CC=debian-lts-announce@lists.debian.org">Jonas Meurer (on-list)</a></li>
- <li><a href="mailto:mejo@debian.org?In-Reply-To=<bc563b69-2257-3978-6400-dc4ba05aae54@debian.org>&Subject=Re:%20[SECURITY] [DLA 655-1] mpg123 security update">Jonas Meurer (off-list)</a></li>
- </ul>
- <hr />
- <!--X-Follow-Ups-End-->
- <!--X-References-->
- <!--X-References-End-->
- <!--X-BotPNI-->
- <ul>
- <li>Prev by Date:
- <strong><a href="msg00010.html">[SECURITY] [DLA 654-1] libxfixes security update</a></strong>
- </li>
- <li>Next by Date:
- <strong><a href="msg00012.html">[SECURITY] [DLA 656-1] libdbd-mysql-perl security update</a></strong>
- </li>
- <li>Previous by thread:
- <strong><a href="msg00010.html">[SECURITY] [DLA 654-1] libxfixes security update</a></strong>
- </li>
- <li>Next by thread:
- <strong><a href="msg00012.html">[SECURITY] [DLA 656-1] libdbd-mysql-perl security update</a></strong>
- </li>
- <li>Index(es):
- <ul>
- <li><a href="maillist.html#00011"><strong>Date</strong></a></li>
- <li><a href="threads.html#00011"><strong>Thread</strong></a></li>
- </ul>
- </li>
- </ul>
- <!--X-BotPNI-End-->
- <!--X-User-Footer-->
- <!--X-User-Footer-End-->
- </body>
- </html>
- Opening url: https://lists.debian.org/debian-lts-announce/2016/10/msg00012.html
- Package : libdbd-mysql-perl
- libdbd-mysql-perl
- Opening url: https://lists.debian.org/debian-lts-announce/2016/10/msg00013.html
- Package : libarchive
- libarchive
- Opening url: https://lists.debian.org/debian-lts-announce/2016/10/msg00014.html
- Package : icedove
- icedove
- Opening url: https://lists.debian.org/debian-lts-announce/2016/10/msg00015.html
- Package : libxrandr
- libxrandr
- Opening url: https://lists.debian.org/debian-lts-announce/2016/10/msg00016.html
- Package : libarchive
- libarchive
- Opening url: https://lists.debian.org/debian-lts-announce/2016/10/msg00017.html
- Package : quagga
- quagga
- Opening url: https://lists.debian.org/debian-lts-announce/2016/10/msg00018.html
- Package : libxrender
- libxrender
- Opening url: https://lists.debian.org/debian-lts-announce/2016/10/msg00019.html
- Package : tor
- tor
- Opening url: https://lists.debian.org/debian-lts-announce/2016/10/msg00020.html
- Package : libgd2
- libgd2
- Opening url: https://lists.debian.org/debian-lts-announce/2016/10/msg00021.html
- Package : guile-2.0
- guile-2.0
- Opening url: https://lists.debian.org/debian-lts-announce/2016/10/msg00022.html
- Package : libxv
- libxv
- Opening url: https://lists.debian.org/debian-lts-announce/2016/10/msg00023.html
- Package : libass
- libast2
- Opening url: https://lists.debian.org/debian-lts-announce/2016/10/msg00024.html
- Package : dwarfutils
- dwarfutils
- Opening url: https://lists.debian.org/debian-lts-announce/2016/10/msg00025.html
- Package : libxvmc
- libxvmc
- Opening url: https://lists.debian.org/debian-lts-announce/2016/10/msg00026.html
- Package : linux
- linux
- Opening url: https://lists.debian.org/debian-lts-announce/2016/10/msg00027.html
- Package : bind9
- bind9
- Opening url: https://lists.debian.org/debian-lts-announce/2016/10/msg00028.html
- Package : kdepimlibs
- kdepimlibs
- Opening url: https://lists.debian.org/debian-lts-announce/2016/10/msg00029.html
- Package : ghostscript
- ghostscript
- Opening url: https://lists.debian.org/debian-lts-announce/2016/10/msg00030.html
- Package : nss
- nss
- Opening url: https://lists.debian.org/debian-lts-announce/2016/10/msg00031.html
- Package : nspr
- nspr
- Opening url: https://lists.debian.org/debian-lts-announce/2016/10/msg00032.html
- Package : qemu
- qemu
- Opening url: https://lists.debian.org/debian-lts-announce/2016/10/msg00033.html
- Package : qemu-kvm
- qemu
- Opening url: https://lists.debian.org/debian-lts-announce/2016/10/msg00034.html
- Package : potrace
- potrace
- Opening url: https://lists.debian.org/debian-lts-announce/2016/10/msg00035.html
- Package : bash
- bash
- Opening url: https://lists.debian.org/debian-lts-announce/2016/10/msg00036.html
- Package : tzdata
- tzdata
- Opening url: https://lists.debian.org/debian-lts-announce/2016/10/msg00037.html
- Package : libdatetime-timezone-perl
- libdatetime-timezone-perl
- Opening url: https://lists.debian.org/debian-lts-announce/2016/10/msg00038.html
- Package : graphicsmagick
- graphicsmagick
- Opening url: https://lists.debian.org/debian-lts-announce/2016/10/msg00039.html
- Package : libx11
- libx11
- Opening url: https://lists.debian.org/debian-lts-announce/2016/10/msg00040.html
- Package : libxi
- libxi
- Opening url: https://lists.debian.org/debian-lts-announce/2016/10/msg00041.html
- Package : libxtst
- libxtst
- Opening url: https://lists.debian.org/debian-lts-announce/2016/10/msg00042.html
- Package : tre
- tre
- Opening url: https://lists.debian.org/debian-lts-announce/2016/10/msg00043.html
- Package : ghostscript
- ghostscript
- Opening url: https://lists.debian.org/debian-lts-announce/2016/10/msg00044.html
- Package : cairo
- cairo
- Opening url: https://lists.debian.org/debian-lts-announce/2016/10/msg00045.html
- Package : bash
- bash
- Opening url: https://lists.debian.org/debian-lts-announce/2016/10/msg00046.html
- Package : qemu-kvm
- qemu
- Opening url: https://lists.debian.org/debian-lts-announce/2016/10/msg00047.html
- Package : tar
- tar
- Opening url: https://lists.debian.org/debian-lts-announce/2016/10/msg00048.html
- Package : libxml2
- libxml2
- Opening url: https://lists.debian.org/debian-lts-announce/2016/10/msg00049.html
- ['CVE-2015-1872', 'CVE-2016-7393', 'CVE-2015-5479', 'CVE-2016-2776', 'CVE-2016-2775', 'CVE-2016-4861', 'CVE-2016-5684', 'CVE-2016-5180', 'CVE-2016-7401', 'CVE-2016-7447', 'CVE-2016-7800', 'CVE-2016-7446', 'CVE-2016-7449', 'CVE-2016-7170', 'CVE-2016-7161', 'CVE-2016-7908', 'CVE-2016-7170', 'CVE-2016-7161', 'CVE-2016-7908', 'CVE-2016-7944', 'CVE-2014-9497', 'CVE-2016-1000247', 'CVE-2016-1246', 'CVE-2016-5418', 'CVE-2016-5278', 'CVE-2016-5261', 'CVE-2016-5280', 'CVE-2016-5276', 'CVE-2016-5270', 'CVE-2016-5272', 'CVE-2016-5257', 'CVE-2016-5250', 'CVE-2016-5277', 'CVE-2016-5281', 'CVE-2016-5284', 'CVE-2016-7947', 'CVE-2016-7948', 'CVE-2016-8688', 'CVE-2016-8689', 'CVE-2016-8687', 'CVE-2016-1245', 'CVE-2016-7949', 'CVE-2016-7950', 'CVE-2016-8670', 'CVE-2016-6911', 'CVE-2016-8605', 'CVE-2016-8606', 'CVE-2016-5407', 'CVE-2016-7969', 'CVE-2016-7972', 'CVE-2016-5036', 'CVE-2016-2050', 'CVE-2016-5038', 'CVE-2016-5039', 'CVE-2016-2091', 'CVE-2015-8750', 'CVE-2016-5034', 'CVE-2016-5042', 'CVE-2015-8538', 'CVE-2016-7953', 'CVE-2016-7425', 'CVE-2016-5195', 'CVE-2016-7042', 'CVE-2015-8956', 'CVE-2016-2848', 'CVE-2016-7966', 'CVE-2016-7978', 'CVE-2016-7976', 'CVE-2016-8602', 'CVE-2016-7979', 'CVE-2013-5653', 'CVE-2016-7977', 'CVE-2016-8669', 'CVE-2016-8578', 'CVE-2016-8576', 'CVE-2016-8577', 'CVE-2016-8669', 'CVE-2016-8578', 'CVE-2016-8576', 'CVE-2016-8577', 'CVE-2016-8699', 'CVE-2016-8694', 'CVE-2016-8701', 'CVE-2016-8697', 'CVE-2016-8695', 'CVE-2016-8698', 'CVE-2016-8696', 'CVE-2016-8703', 'CVE-2013-7437', 'CVE-2016-8702', 'CVE-2016-8700', 'CVE-2016-7543', 'CVE-2016-8683', 'CVE-2016-7996', 'CVE-2016-8684', 'CVE-2016-7997', 'CVE-2016-8682', 'CVE-2016-7448', 'CVE-2016-7942', 'CVE-2016-7943', 'CVE-2016-7946', 'CVE-2016-7945', 'CVE-2016-7952', 'CVE-2016-7951', 'CVE-2016-8859', 'CVE-2016-9082', 'CVE-2016-7543', 'CVE-2016-7909', 'CVE-2016-8909', 'CVE-2016-8910', 'CVE-2016-6321', 'CVE-2016-4658', 'CVE-2016-5131']
- Opening url: https://lists.debian.org/debian-lts-announce/2016/11/msg00000.html
- Package : tiff3
- tiff3
- Opening url: https://lists.debian.org/debian-lts-announce/2016/11/msg00001.html
- Package : tiff
- tiff
- Opening url: https://lists.debian.org/debian-lts-announce/2016/11/msg00002.html
- Package : libwmf
- libwmf
- Opening url: https://lists.debian.org/debian-lts-announce/2016/11/msg00003.html
- Package : spip
- spip
- Opening url: https://lists.debian.org/debian-lts-announce/2016/11/msg00004.html
- Package : bind9
- bind9
- Opening url: https://lists.debian.org/debian-lts-announce/2016/11/msg00005.html
- Package : bsdiff
- bsdiff
- Opening url: https://lists.debian.org/debian-lts-announce/2016/11/msg00006.html
- Package : qemu
- qemu
- Opening url: https://lists.debian.org/debian-lts-announce/2016/11/msg00007.html
- Package : xen
- xen
- Opening url: https://lists.debian.org/debian-lts-announce/2016/11/msg00008.html
- Package : libxslt
- libxslt
- Opening url: https://lists.debian.org/debian-lts-announce/2016/11/msg00009.html
- Package : memcached
- memcached
- Opening url: https://lists.debian.org/debian-lts-announce/2016/11/msg00010.html
- Package : tzdata
- tzdata
- Opening url: https://lists.debian.org/debian-lts-announce/2016/11/msg00011.html
- Package : libdatetime-timezone-perl
- libdatetime-timezone-perl
- Opening url: https://lists.debian.org/debian-lts-announce/2016/11/msg00012.html
- Package : openjdk-7
- openjdk-7
- Opening url: https://lists.debian.org/debian-lts-announce/2016/11/msg00013.html
- Package : python-imaging
- python-imaging
- Opening url: https://lists.debian.org/debian-lts-announce/2016/11/msg00014.html
- Package : sudo
- sudo
- Opening url: https://lists.debian.org/debian-lts-announce/2016/11/msg00015.html
- Package : mysql-5.5
- mysql-transitional
- Opening url: https://lists.debian.org/debian-lts-announce/2016/11/msg00016.html
- Package : postgresql-9.1
- postgresql-9.6
- Opening url: https://lists.debian.org/debian-lts-announce/2016/11/msg00017.html
- Package : akonadi
- akonadi
- Opening url: https://lists.debian.org/debian-lts-announce/2016/11/msg00018.html
- Package : curl
- curl
- Opening url: https://lists.debian.org/debian-lts-announce/2016/11/msg00019.html
- Package : gst-plugins-bad0.10
- gst-plugins-bad0.10
- Opening url: https://lists.debian.org/debian-lts-announce/2016/11/msg00020.html
- Package : sniffit
- sniffit
- Opening url: https://lists.debian.org/debian-lts-announce/2016/11/msg00021.html
- Package : wireshark
- wireshark
- Opening url: https://lists.debian.org/debian-lts-announce/2016/11/msg00022.html
- Package : drupal7
- drupal7
- Opening url: https://lists.debian.org/debian-lts-announce/2016/11/msg00023.html
- Package : tiff
- tiff
- Opening url: https://lists.debian.org/debian-lts-announce/2016/11/msg00024.html
- Package : moin
- moin
- Opening url: https://lists.debian.org/debian-lts-announce/2016/11/msg00025.html
- Package : vim
- vim
- Opening url: https://lists.debian.org/debian-lts-announce/2016/11/msg00026.html
- Package : xen
- xen
- Opening url: https://lists.debian.org/debian-lts-announce/2016/11/msg00027.html
- Package : libgc
- libgc
- Opening url: https://lists.debian.org/debian-lts-announce/2016/11/msg00028.html
- Package : irssi
- irssi
- Opening url: https://lists.debian.org/debian-lts-announce/2016/11/msg00029.html
- Package : libsoap-lite-perl
- libsoap-lite-perl
- Opening url: https://lists.debian.org/debian-lts-announce/2016/11/msg00030.html
- Package : mcabber
- mcabber
- Opening url: https://lists.debian.org/debian-lts-announce/2016/11/msg00031.html
- Package : tzdata
- tzdata
- Opening url: https://lists.debian.org/debian-lts-announce/2016/11/msg00032.html
- Package : libdatetime-timezone-perl
- libdatetime-timezone-perl
- Opening url: https://lists.debian.org/debian-lts-announce/2016/11/msg00033.html
- Package : gst-plugins-good0.10
- gst-plugins-good0.10
- Opening url: https://lists.debian.org/debian-lts-announce/2016/11/msg00034.html
- ['CVE-2016-5318', 'CVE-2015-7554', 'CVE-2016-3619', 'CVE-2016-5102', 'CVE-2014-8128', 'CVE-2015-7554', 'CVE-2016-3620', 'CVE-2016-3631', 'CVE-2016-3633', 'CVE-2016-5318', 'CVE-2016-6223', 'CVE-2016-3634', 'CVE-2016-5652', 'CVE-2016-3624', 'CVE-2016-3186', 'CVE-2016-3623', 'CVE-2016-5319', 'CVE-2015-8668', 'CVE-2016-8331', 'CVE-2016-3621', 'CVE-2016-3632', 'CVE-2016-9011', 'CVE-2016-7982', 'CVE-2016-7998', 'CVE-2016-7980', 'CVE-2016-7981', 'CVE-2016-7999', 'CVE-2016-8864', 'CVE-2014-9862', 'CVE-2016-9103', 'CVE-2016-8910', 'CVE-2016-7909', 'CVE-2016-9101', 'CVE-2016-9102', 'CVE-2016-9105', 'CVE-2016-9104', 'CVE-2016-8909', 'CVE-2016-9106', 'CVE-2016-7777', 'CVE-2016-4738', 'CVE-2016-8706', 'CVE-2016-8704', 'CVE-2016-8705', 'CVE-2013-7291', 'CVE-2016-5554', 'CVE-2016-5582', 'CVE-2016-5573', 'CVE-2016-5597', 'CVE-2016-5542', 'CVE-2016-9189', 'CVE-2016-9190', 'CVE-2016-7076', 'CVE-2016-7032', 'CVE-2016-5584', 'CVE-2016-7440', 'CVE-2016-8616', 'CVE-2016-8621', 'CVE-2016-8622', 'CVE-2016-8617', 'CVE-2016-8618', 'CVE-2016-8615', 'CVE-2016-8623', 'CVE-2016-8624', 'CVE-2016-8619', 'CVE-2016-9445', 'CVE-2016-9447', 'CVE-2016-9446', 'CVE-2014-5439', 'CVE-2016-9376', 'CVE-2016-9374', 'CVE-2016-9375', 'CVE-2016-9373', 'CVE-2016-9449', 'CVE-2016-9451', 'CVE-2016-9297', 'CVE-2016-9532', 'CVE-2016-9273', 'CVE-2016-7146', 'CVE-2016-9119', 'CVE-2016-1248', 'CVE-2016-9381', 'CVE-2016-9383', 'CVE-2016-9386', 'CVE-2016-9382', 'CVE-2016-9379', 'CVE-2016-9380', 'CVE-2016-9427', 'CVE-2016-7553', 'CVE-2015-8978', 'CVE-2016-9636', 'CVE-2016-9635', 'CVE-2016-9634']
- Opening url: https://lists.debian.org/debian-lts-announce/2016/12/msg00000.html
- Package : firefox-esr
- firefox-esr
- Opening url: https://lists.debian.org/debian-lts-announce/2016/12/msg00001.html
- Package : tomcat6
- tomcat8
- Opening url: https://lists.debian.org/debian-lts-announce/2016/12/msg00002.html
- Package : tomcat7
- tomcat8
- Opening url: https://lists.debian.org/debian-lts-announce/2016/12/msg00003.html
- Package : imagemagick
- imagemagick
- Opening url: https://lists.debian.org/debian-lts-announce/2016/12/msg00004.html
- Package : monit
- monit
- Opening url: https://lists.debian.org/debian-lts-announce/2016/12/msg00005.html
- Package : openafs
- openafs
- Opening url: https://lists.debian.org/debian-lts-announce/2016/12/msg00006.html
- Package : monit
- monit
- Opening url: https://lists.debian.org/debian-lts-announce/2016/12/msg00007.html
- Package : mapserver
- mapserver
- Opening url: https://lists.debian.org/debian-lts-announce/2016/12/msg00008.html
- Package : gst-plugins-base0.10
- gst-plugins-base0.10
- Opening url: https://lists.debian.org/debian-lts-announce/2016/12/msg00009.html
- Package : gst-plugins-bad0.10
- gst-plugins-bad0.10
- Opening url: https://lists.debian.org/debian-lts-announce/2016/12/msg00010.html
- Package : roundcube
- roundcube
- Opening url: https://lists.debian.org/debian-lts-announce/2016/12/msg00011.html
- Package : spip
- spip
- Opening url: https://lists.debian.org/debian-lts-announce/2016/12/msg00012.html
- Package : jasper
- jasper
- Opening url: https://lists.debian.org/debian-lts-announce/2016/12/msg00013.html
- Package : imagemagick
- imagemagick
- Opening url: https://lists.debian.org/debian-lts-announce/2016/12/msg00014.html
- Package : libgsf
- libgsf
- Opening url: https://lists.debian.org/debian-lts-announce/2016/12/msg00015.html
- Package : monit
- monit
- Opening url: https://lists.debian.org/debian-lts-announce/2016/12/msg00016.html
- Package : unzip
- unzip
- Opening url: https://lists.debian.org/debian-lts-announce/2016/12/msg00017.html
- Package : chrony
- chrony
- Opening url: https://lists.debian.org/debian-lts-announce/2016/12/msg00018.html
- Package : firefox-esr
- firefox-esr
- Opening url: https://lists.debian.org/debian-lts-announce/2016/12/msg00019.html
- Package : icu
- icu
- Opening url: https://lists.debian.org/debian-lts-announce/2016/12/msg00020.html
- Package : most
- most
- Opening url: https://lists.debian.org/debian-lts-announce/2016/12/msg00021.html
- Package : tomcat6
- tomcat8
- Opening url: https://lists.debian.org/debian-lts-announce/2016/12/msg00022.html
- Package : libupnp
- libupnp
- Opening url: https://lists.debian.org/debian-lts-announce/2016/12/msg00023.html
- Package : libupnp4
- libupnp
- Opening url: https://lists.debian.org/debian-lts-announce/2016/12/msg00024.html
- Package : php5
- php5
- Opening url: https://lists.debian.org/debian-lts-announce/2016/12/msg00025.html
- Package : game-music-emu
- game-music-emu
- Opening url: https://lists.debian.org/debian-lts-announce/2016/12/msg00026.html
- Package : nagios3
- nagios
- Opening url: https://lists.debian.org/debian-lts-announce/2016/12/msg00027.html
- Package : icedove
- icedove
- Opening url: https://lists.debian.org/debian-lts-announce/2016/12/msg00028.html
- Package : tomcat6
- tomcat8
- Opening url: https://lists.debian.org/debian-lts-announce/2016/12/msg00029.html
- Package : tomcat7
- tomcat8
- Opening url: https://lists.debian.org/debian-lts-announce/2016/12/msg00030.html
- Package : tor
- tor
- Opening url: https://lists.debian.org/debian-lts-announce/2016/12/msg00031.html
- Package : dcmtk
- dcmtk
- Opening url: https://lists.debian.org/debian-lts-announce/2016/12/msg00032.html
- Package : imagemagick
- imagemagick
- Opening url: https://lists.debian.org/debian-lts-announce/2016/12/msg00033.html
- Package : libgd2
- libgd2
- Opening url: https://lists.debian.org/debian-lts-announce/2016/12/msg00034.html
- Package : nss
- nss
- Opening url: https://lists.debian.org/debian-lts-announce/2016/12/msg00035.html
- Package : python-bottle
- python-bottle
- Opening url: https://lists.debian.org/debian-lts-announce/2016/12/msg00036.html
- Package : phpmyadmin
- phpmyadmin
- Opening url: https://lists.debian.org/debian-lts-announce/2016/12/msg00037.html
- Package : spip
- spip
- Opening url: https://lists.debian.org/debian-lts-announce/2016/12/msg00038.html
- Package : exim4
- exim4
- Opening url: https://lists.debian.org/debian-lts-announce/2016/12/msg00039.html
- Package : squid3
- squid3
- Opening url: https://lists.debian.org/debian-lts-announce/2016/12/msg00040.html
- Package : qemu
- qemu
- Opening url: https://lists.debian.org/debian-lts-announce/2016/12/msg00041.html
- Package : qemu-kvm
- qemu
- Opening url: https://lists.debian.org/debian-lts-announce/2016/12/msg00042.html
- Package : libcrypto++
- libcrypto++
- Opening url: https://lists.debian.org/debian-lts-announce/2016/12/msg00043.html
- Package : libxi
- libxi
- Opening url: https://lists.debian.org/debian-lts-announce/2016/12/msg00044.html
- Package : curl
- curl
- Opening url: https://lists.debian.org/debian-lts-announce/2016/12/msg00045.html
- Package : pgpdump
- pgpdump
- Opening url: https://lists.debian.org/debian-lts-announce/2016/12/msg00046.html
- Package : shutter
- shutter
- Opening url: https://lists.debian.org/debian-lts-announce/2016/12/msg00047.html
- Package : libphp-phpmailer
- libphp-phpmailer
- Opening url: https://lists.debian.org/debian-lts-announce/2016/12/msg00048.html
- Package : hdf5
- hdf5
- Opening url: https://lists.debian.org/debian-lts-announce/2016/12/msg00049.html
- ['CVE-2016-5296', 'CVE-2016-9066', 'CVE-2016-5290', 'CVE-2016-5297', 'CVE-2016-9064', 'CVE-2016-5291', 'CVE-2016-6816', 'CVE-2016-5018', 'CVE-2016-0762', 'CVE-2016-6796', 'CVE-2016-8735', 'CVE-2016-6797', 'CVE-2016-6794', 'CVE-2016-6816', 'CVE-2016-5018', 'CVE-2016-0762', 'CVE-2016-6796', 'CVE-2016-8735', 'CVE-2016-6797', 'CVE-2016-6794', 'CVE-2014-9816', 'CVE-2014-9810', 'CVE-2014-9806', 'CVE-2014-9843', 'CVE-2014-9847', 'CVE-2014-9845', 'CVE-2016-7535', 'CVE-2016-4562', 'CVE-2014-9907', 'CVE-2016-7533', 'CVE-2016-5010', 'CVE-2016-7516', 'CVE-2014-9817', 'CVE-2014-9835', 'CVE-2016-4564', 'CVE-2016-7537', 'CVE-2014-9828', 'CVE-2014-9833', 'CVE-2014-9851', 'CVE-2016-5691', 'CVE-2014-9818', 'CVE-2016-5687', 'CVE-2016-7531', 'CVE-2014-9846', 'CVE-2016-7515', 'CVE-2014-9829', 'CVE-2016-7539', 'CVE-2016-7530', 'CVE-2015-8959', 'CVE-2014-9812', 'CVE-2014-9808', 'CVE-2016-7528', 'CVE-2016-7522', 'CVE-2014-9824', 'CVE-2014-9853', 'CVE-2016-7514', 'CVE-2016-7532', 'CVE-2016-5689', 'CVE-2016-7518', 'CVE-2016-6823', 'CVE-2016-7524', 'CVE-2016-7519', 'CVE-2014-9821', 'CVE-2014-9838', 'CVE-2014-9837', 'CVE-2014-9854', 'CVE-2016-7538', 'CVE-2016-5841', 'CVE-2014-9809', 'CVE-2016-5688', 'CVE-2014-9823', 'CVE-2016-7526', 'CVE-2016-6491', 'CVE-2016-5842', 'CVE-2014-9839', 'CVE-2014-9832', 'CVE-2014-9811', 'CVE-2014-9813', 'CVE-2014-9844', 'CVE-2014-9814', 'CVE-2014-9840', 'CVE-2014-9831', 'CVE-2014-9834', 'CVE-2014-9807', 'CVE-2016-7101', 'CVE-2016-7536', 'CVE-2016-7517', 'CVE-2016-7529', 'CVE-2015-8957', 'CVE-2014-9805', 'CVE-2014-9819', 'CVE-2014-9849', 'CVE-2015-8958', 'CVE-2016-5690', 'CVE-2016-7523', 'CVE-2016-7527', 'CVE-2014-9830', 'CVE-2014-9848', 'CVE-2014-9826', 'CVE-2014-9822', 'CVE-2016-7520', 'CVE-2016-7521', 'CVE-2016-7534', 'CVE-2014-9836', 'CVE-2014-9815', 'CVE-2016-7067', 'CVE-2016-9772', 'CVE-2016-7067', 'CVE-2016-9839', 'CVE-2016-9811', 'CVE-2016-9809', 'CVE-2016-9152', 'CVE-2016-8692', 'CVE-2016-9560', 'CVE-2016-8654', 'CVE-2016-8882', 'CVE-2016-8887', 'CVE-2016-8693', 'CVE-2016-8883', 'CVE-2016-8691', 'CVE-2016-9888', 'CVE-2016-9844', 'CVE-2014-9913', 'CVE-2016-1567', 'CVE-2016-9900', 'CVE-2016-9893', 'CVE-2016-9895', 'CVE-2016-9899', 'CVE-2016-9898', 'CVE-2016-9902', 'CVE-2016-9897', 'CVE-2016-9901', 'CVE-2016-9904', 'CVE-2016-9905', 'CVE-2014-9911', 'CVE-2016-7415', 'CVE-2016-1253', 'CVE-2016-9774', 'CVE-2016-6797', 'CVE-2016-5018', 'CVE-2016-8863', 'CVE-2016-8863', 'CVE-2016-7128', 'CVE-2016-7413', 'CVE-2016-7132', 'CVE-2016-7130', 'CVE-2016-7412', 'CVE-2016-7418', 'CVE-2016-7124', 'CVE-2016-5385', 'CVE-2016-7129', 'CVE-2016-7417', 'CVE-2016-7414', 'CVE-2016-7411', 'CVE-2016-7416', 'CVE-2016-7131', 'CVE-2016-9961', 'CVE-2016-9960', 'CVE-2016-9957', 'CVE-2016-9958', 'CVE-2016-9959', 'CVE-2016-9565', 'CVE-2016-9566', 'CVE-2016-5296', 'CVE-2016-9066', 'CVE-2016-5290', 'CVE-2016-5297', 'CVE-2016-9079', 'CVE-2016-9074', 'CVE-2016-5291', 'CVE-2016-6797', 'CVE-2016-9774', 'CVE-2016-5018', 'CVE-2016-6797', 'CVE-2015-5345', 'CVE-2016-1254', 'CVE-2015-8979', 'CVE-2016-9556', 'CVE-2016-8866', 'CVE-2016-7799', 'CVE-2016-8707', 'CVE-2016-8862', 'CVE-2016-9933', 'CVE-2016-9074', 'CVE-2016-9964', 'CVE-2016-9850', 'CVE-2016-9849', 'CVE-2016-9865', 'CVE-2016-4412', 'CVE-2016-9864', 'CVE-2016-9861', 'CVE-2016-6626', 'CVE-2016-9998', 'CVE-2016-9997', 'CVE-2016-9963', 'CVE-2016-10002', 'CVE-2016-9921', 'CVE-2016-9911', 'CVE-2016-9922', 'CVE-2016-9921', 'CVE-2016-9911', 'CVE-2016-9922', 'CVE-2016-9939', 'CVE-2016-9586', 'CVE-2016-4021', 'CVE-2015-0854', 'CVE-2016-10045', 'CVE-2016-10033', 'CVE-2016-4330', 'CVE-2016-4333', 'CVE-2016-4331', 'CVE-2016-4332']
- Opening url: https://lists.debian.org/debian-lts-announce/2017/01/msg00000.html
- Package : python-crypto
- python-crypto
- Opening url: https://lists.debian.org/debian-lts-announce/2017/01/msg00001.html
- Package : linux
- linux
- Opening url: https://lists.debian.org/debian-lts-announce/2017/01/msg00002.html
- Package : postgresql-common
- postgresql-9.6
- Opening url: https://lists.debian.org/debian-lts-announce/2017/01/msg00003.html
- Package : hplip
- hplip
- Opening url: https://lists.debian.org/debian-lts-announce/2017/01/msg00004.html
- Package : samba
- samba
- Opening url: https://lists.debian.org/debian-lts-announce/2017/01/msg00005.html
- Package : libvncserver
- libvncserver
- Opening url: https://lists.debian.org/debian-lts-announce/2017/01/msg00006.html
- Package : libphp-phpmailer
- libphp-phpmailer
- Opening url: https://lists.debian.org/debian-lts-announce/2017/01/msg00007.html
- Package : python-crypto
- python-crypto
- Opening url: https://lists.debian.org/debian-lts-announce/2017/01/msg00008.html
- Package : python-crypto
- python-crypto
- Opening url: https://lists.debian.org/debian-lts-announce/2017/01/msg00009.html
- Package : pcsc-lite
- pcsc-lite
- Opening url: https://lists.debian.org/debian-lts-announce/2017/01/msg00010.html
- Package : python-crypto
- python-crypto
- Opening url: https://lists.debian.org/debian-lts-announce/2017/01/msg00011.html
- Package : tomcat7
- tomcat8
- Opening url: https://lists.debian.org/debian-lts-announce/2017/01/msg00012.html
- Package : libav
- libav
- Opening url: https://lists.debian.org/debian-lts-announce/2017/01/msg00013.html
- Package : asterisk
- asterisk
- Opening url: https://lists.debian.org/debian-lts-announce/2017/01/msg00014.html
- Package : xen
- xen
- Opening url: https://lists.debian.org/debian-lts-announce/2017/01/msg00015.html
- Package : icedove
- icedove
- Opening url: https://lists.debian.org/debian-lts-announce/2017/01/msg00016.html
- Package : libx11
- libx11
- Opening url: https://lists.debian.org/debian-lts-announce/2017/01/msg00017.html
- Package : gcc-mozilla
- gcc
- Opening url: https://lists.debian.org/debian-lts-announce/2017/01/msg00018.html
- Package : python-bottle
- python-bottle
- Opening url: https://lists.debian.org/debian-lts-announce/2017/01/msg00019.html
- Package : wireless-regdb
- wireless-regdb
- Opening url: https://lists.debian.org/debian-lts-announce/2017/01/msg00020.html
- Package : botan1.10
- botan1.10
- Opening url: https://lists.debian.org/debian-lts-announce/2017/01/msg00021.html
- Package : otrs2
- otrs2
- Opening url: https://lists.debian.org/debian-lts-announce/2017/01/msg00022.html
- Package : otrs2
- otrs2
- Opening url: https://lists.debian.org/debian-lts-announce/2017/01/msg00023.html
- Package : pdns-recursor
- pdns-recursor
- Opening url: https://lists.debian.org/debian-lts-announce/2017/01/msg00024.html
- Package : icoutils
- icoutils
- Opening url: https://lists.debian.org/debian-lts-announce/2017/01/msg00025.html
- Package : libav
- libav
- Opening url: https://lists.debian.org/debian-lts-announce/2017/01/msg00026.html
- Package : mapserver
- mapserver
- Opening url: https://lists.debian.org/debian-lts-announce/2017/01/msg00027.html
- Package : libphp-swiftmailer
- libphp-swiftmailer
- Opening url: https://lists.debian.org/debian-lts-announce/2017/01/msg00028.html
- Package : opus
- opus
- Opening url: https://lists.debian.org/debian-lts-announce/2017/01/msg00029.html
- Package : groovy
- groovy
- Opening url: https://lists.debian.org/debian-lts-announce/2017/01/msg00030.html
- Package : hesiod
- hesiod
- Opening url: https://lists.debian.org/debian-lts-announce/2017/01/msg00031.html
- Package : tiff
- tiff
- Opening url: https://lists.debian.org/debian-lts-announce/2017/01/msg00032.html
- Package : mysql-5.5
- mysql-transitional
- Opening url: https://lists.debian.org/debian-lts-announce/2017/01/msg00033.html
- Package : pdns
- pdns
- Opening url: https://lists.debian.org/debian-lts-announce/2017/01/msg00034.html
- Package : ming
- ming
- Opening url: https://lists.debian.org/debian-lts-announce/2017/01/msg00035.html
- Package : firefox-esr
- firefox-esr
- Opening url: https://lists.debian.org/debian-lts-announce/2017/01/msg00036.html
- Package : libxpm
- libxpm
- Opening url: https://lists.debian.org/debian-lts-announce/2017/01/msg00037.html
- Package : openjdk-7
- openjdk-7
- Opening url: https://lists.debian.org/debian-lts-announce/2017/01/msg00038.html
- Package : lcms2
- lcms2
- Opening url: https://lists.debian.org/debian-lts-announce/2017/01/msg00039.html
- Package : asterisk
- asterisk
- Opening url: https://lists.debian.org/debian-lts-announce/2017/01/msg00040.html
- Package : libgd2
- libgd2
- Opening url: https://lists.debian.org/debian-lts-announce/2017/01/msg00041.html
- Package : bind9
- bind9
- Opening url: https://lists.debian.org/debian-lts-announce/2017/01/msg00042.html
- Package : zoneminder
- zoneminder
- Opening url: https://lists.debian.org/debian-lts-announce/2017/01/msg00043.html
- Package : imagemagick
- imagemagick
- Opening url: https://lists.debian.org/debian-lts-announce/2017/01/msg00044.html
- Package : tiff3
- tiff3
- Opening url: https://lists.debian.org/debian-lts-announce/2017/01/msg00045.html
- Package : ruby-archive-tar-minitar
- ruby2.3
- Opening url: https://lists.debian.org/debian-lts-announce/2017/01/msg00046.html
- Package : tcpdump
- tcpdump
- Opening url: https://lists.debian.org/debian-lts-announce/2017/01/msg00047.html
- Package : libarchive
- libarchive
- Opening url: https://lists.debian.org/debian-lts-announce/2017/01/msg00048.html
- Package : libplist
- libplist
- Opening url: https://lists.debian.org/debian-lts-announce/2017/01/msg00049.html
- Package : ikiwiki
- ikiwiki
- Opening url: https://lists.debian.org/debian-lts-announce/2017/01/msg00050.html
- ['CVE-2013-7459', 'CVE-2016-9794', 'CVE-2016-8655', 'CVE-2016-9555', 'CVE-2016-9793', 'CVE-2015-1350', 'CVE-2015-8964', 'CVE-2016-7910', 'CVE-2016-9178', 'CVE-2016-9576', 'CVE-2015-8962', 'CVE-2015-8963', 'CVE-2012-6704', 'CVE-2016-7097', 'CVE-2016-7911', 'CVE-2016-8399', 'CVE-2016-8645', 'CVE-2016-9756', 'CVE-2016-8633', 'CVE-2016-7915', 'CVE-2016-10088', 'CVE-2016-1255', 'CVE-2015-0839', 'CVE-2016-2125', 'CVE-2016-9942', 'CVE-2016-9941', 'CVE-2016-10045', 'CVE-2016-10033', 'CVE-2013-7459', 'CVE-2013-7459', 'CVE-2016-10109', 'CVE-2016-8745', 'CVE-2016-6816', 'CVE-2016-7424', 'CVE-2016-7551', 'CVE-2014-2287', 'CVE-2016-10013', 'CVE-2016-10024', 'CVE-2016-9900', 'CVE-2016-9893', 'CVE-2016-9895', 'CVE-2016-9899', 'CVE-2016-9898', 'CVE-2016-9897', 'CVE-2016-9904', 'CVE-2016-9905', 'CVE-2016-9132', 'CVE-2016-9139', 'CVE-2016-9139', 'CVE-2016-9139', 'CVE-2017-5208', 'CVE-2017-5333', 'CVE-2017-5331', 'CVE-2017-5332', 'CVE-2016-9822', 'CVE-2016-9821', 'CVE-2016-9819', 'CVE-2016-9820', 'CVE-2017-5522', 'CVE-2016-10074', 'CVE-2017-0381', 'CVE-2016-6814', 'CVE-2016-10151', 'CVE-2016-10152', 'CVE-2016-3624', 'CVE-2016-3990', 'CVE-2016-9534', 'CVE-2016-3945', 'CVE-2016-3623', 'CVE-2016-3622', 'CVE-2016-9536', 'CVE-2016-9537', 'CVE-2016-9533', 'CVE-2016-10093', 'CVE-2016-9538', 'CVE-2017-5225', 'CVE-2016-9535', 'CVE-2016-10092', 'CVE-2016-9540', 'CVE-2017-3313', 'CVE-2017-3265', 'CVE-2017-3244', 'CVE-2017-3243', 'CVE-2017-3258', 'CVE-2017-3312', 'CVE-2017-3238', 'CVE-2017-3318', 'CVE-2017-3291', 'CVE-2017-3317', 'CVE-2016-7068', 'CVE-2016-7072', 'CVE-2016-2120', 'CVE-2016-7074', 'CVE-2016-7073', 'CVE-2016-9827', 'CVE-2016-9831', 'CVE-2016-9264', 'CVE-2016-9829', 'CVE-2016-9828', 'CVE-2016-9266', 'CVE-2016-9265', 'CVE-2017-5373', 'CVE-2017-5383', 'CVE-2017-5375', 'CVE-2017-5378', 'CVE-2017-5386', 'CVE-2017-5376', 'CVE-2017-5396', 'CVE-2017-5380', 'CVE-2017-5390', 'CVE-2016-10164', 'CVE-2016-10165', 'CVE-2014-2287', 'CVE-2016-10167', 'CVE-2016-9317', 'CVE-2016-10168', 'CVE-2016-9147', 'CVE-2016-9131', 'CVE-2016-9444', 'CVE-2016-10140', 'CVE-2016-10146', 'CVE-2017-5511', 'CVE-2017-5507', 'CVE-2017-5510', 'CVE-2016-10145', 'CVE-2017-5508', 'CVE-2016-8677', 'CVE-2016-10144', 'CVE-2017-5506', 'CVE-2016-10173', 'CVE-2016-8574', 'CVE-2016-7936', 'CVE-2016-7973', 'CVE-2016-7923', 'CVE-2016-7974', 'CVE-2016-7933', 'CVE-2017-5482', 'CVE-2016-7985', 'CVE-2016-7986', 'CVE-2016-7925', 'CVE-2016-7927', 'CVE-2016-7939', 'CVE-2016-7983', 'CVE-2017-5341', 'CVE-2017-5483', 'CVE-2017-5486', 'CVE-2016-7931', 'CVE-2017-5205', 'CVE-2016-7924', 'CVE-2016-7940', 'CVE-2016-7930', 'CVE-2016-7984', 'CVE-2016-7937', 'CVE-2016-7935', 'CVE-2017-5484', 'CVE-2016-7928', 'CVE-2016-7975', 'CVE-2016-7938', 'CVE-2017-5342', 'CVE-2016-7992', 'CVE-2016-7926', 'CVE-2016-7993', 'CVE-2016-7929', 'CVE-2016-7932', 'CVE-2016-8575', 'CVE-2017-5202', 'CVE-2016-7922', 'CVE-2017-5203', 'CVE-2017-5204', 'CVE-2017-5485', 'CVE-2016-7934', 'CVE-2017-5601', 'CVE-2017-5209', 'CVE-2017-5545', 'CVE-2016-9646', 'CVE-2016-10026', 'CVE-2017-0356']
- Opening url: https://lists.debian.org/debian-lts-announce/2017/02/msg00000.html
- Package : wordpress
- wordpress
- Opening url: https://lists.debian.org/debian-lts-announce/2017/02/msg00001.html
- Package : openssl
- openssl
- Opening url: https://lists.debian.org/debian-lts-announce/2017/02/msg00002.html
- Package : ntfs-3g
- ntfs-3g
- Opening url: https://lists.debian.org/debian-lts-announce/2017/02/msg00003.html
- Package : svgsalamander
- svgsalamander
- Opening url: https://lists.debian.org/debian-lts-announce/2017/02/msg00004.html
- Package : libphp-phpmailer
- libphp-phpmailer
- Opening url: https://lists.debian.org/debian-lts-announce/2017/02/msg00005.html
- Package : tiff
- tiff
- Opening url: https://lists.debian.org/debian-lts-announce/2017/02/msg00006.html
- Package : php5
- php5
- Opening url: https://lists.debian.org/debian-lts-announce/2017/02/msg00007.html
- Package : mysql-5.5
- mysql-transitional
- Opening url: https://lists.debian.org/debian-lts-announce/2017/02/msg00008.html
- Package : viewvc
- viewvc
- Opening url: https://lists.debian.org/debian-lts-announce/2017/02/msg00009.html
- Package : mysql-5.5
- mysql-transitional
- Opening url: https://lists.debian.org/debian-lts-announce/2017/02/msg00010.html
- Package : openjdk-7
- openjdk-7
- Opening url: https://lists.debian.org/debian-lts-announce/2017/02/msg00011.html
- Package : vim
- vim
- Opening url: https://lists.debian.org/debian-lts-announce/2017/02/msg00012.html
- Package : tomcat7
- tomcat8
- Opening url: https://lists.debian.org/debian-lts-announce/2017/02/msg00013.html
- Package : libevent
- libevent
- Opening url: https://lists.debian.org/debian-lts-announce/2017/02/msg00014.html
- Package : spice
- spice
- Opening url: https://lists.debian.org/debian-lts-announce/2017/02/msg00015.html
- Package : wireshark
- wireshark
- Opening url: https://lists.debian.org/debian-lts-announce/2017/02/msg00016.html
- Package : gst-plugins-base0.10
- gst-plugins-base0.10
- Opening url: https://lists.debian.org/debian-lts-announce/2017/02/msg00017.html
- Package : gst-plugins-good0.10
- gst-plugins-good0.10
- Opening url: https://lists.debian.org/debian-lts-announce/2017/02/msg00018.html
- Package : gst-plugins-ugly0.10
- gst-plugins-ugly0.10
- Opening url: https://lists.debian.org/debian-lts-announce/2017/02/msg00019.html
- Package : gst-plugins-bad0.10
- gst-plugins-bad0.10
- Opening url: https://lists.debian.org/debian-lts-announce/2017/02/msg00020.html
- Package : gtk-vnc
- gtk-vnc
- Opening url: https://lists.debian.org/debian-lts-announce/2017/02/msg00021.html
- Package : linux
- linux
- Opening url: https://lists.debian.org/debian-lts-announce/2017/02/msg00022.html
- Package : tomcat7
- tomcat8
- Opening url: https://lists.debian.org/debian-lts-announce/2017/02/msg00023.html
- Package : bitlbee
- bitlbee
- Opening url: https://lists.debian.org/debian-lts-announce/2017/02/msg00024.html
- Package : phpmyadmin
- phpmyadmin
- Opening url: https://lists.debian.org/debian-lts-announce/2017/02/msg00025.html
- Package : cakephp
- cakephp
- Opening url: https://lists.debian.org/debian-lts-announce/2017/02/msg00026.html
- Package : munin
- munin
- Opening url: https://lists.debian.org/debian-lts-announce/2017/02/msg00027.html
- Package : radare2
- radare2
- Opening url: https://lists.debian.org/debian-lts-announce/2017/02/msg00028.html
- Package : shadow
- shadow
- Opening url: https://lists.debian.org/debian-lts-announce/2017/02/msg00029.html
- Package : tnef
- tnef
- Opening url: https://lists.debian.org/debian-lts-announce/2017/02/msg00030.html
- Package : libplist
- libplist
- Opening url: https://lists.debian.org/debian-lts-announce/2017/02/msg00031.html
- Package : apache2
- apache2
- Opening url: https://lists.debian.org/debian-lts-announce/2017/02/msg00032.html
- Package : bind9
- bind9
- Opening url: https://lists.debian.org/debian-lts-announce/2017/02/msg00033.html
- Package : qemu-kvm
- qemu
- Opening url: https://lists.debian.org/debian-lts-announce/2017/02/msg00034.html
- ['CVE-2017-5610', 'CVE-2017-5492', 'CVE-2017-5491', 'CVE-2017-5611', 'CVE-2017-5489', 'CVE-2017-5490', 'CVE-2017-5488', 'CVE-2017-5612', 'CVE-2017-5493', 'CVE-2016-8610', 'CVE-2016-7056', 'CVE-2017-3731', 'CVE-2017-0358', 'CVE-2017-5617', 'CVE-2017-5223', 'CVE-2016-9935', 'CVE-2016-10158', 'CVE-2016-2554', 'CVE-2016-10159', 'CVE-2016-10160', 'CVE-2016-3142', 'CVE-2016-10161', 'CVE-2016-4342', 'CVE-2016-3141', 'CVE-2016-9934', 'CVE-2017-5938', 'CVE-2017-3289', 'CVE-2016-5552', 'CVE-2017-3231', 'CVE-2017-3252', 'CVE-2017-3253', 'CVE-2017-3241', 'CVE-2017-3261', 'CVE-2016-5546', 'CVE-2017-3272', 'CVE-2017-3260', 'CVE-2016-5548', 'CVE-2016-5547', 'CVE-2017-5953', 'CVE-2016-10197', 'CVE-2016-10196', 'CVE-2016-10195', 'CVE-2016-9577', 'CVE-2016-9578', 'CVE-2017-6014', 'CVE-2017-5837', 'CVE-2017-5844', 'CVE-2016-10198', 'CVE-2017-5840', 'CVE-2017-5847', 'CVE-2017-5846', 'CVE-2017-5848', 'CVE-2017-5843', 'CVE-2017-5885', 'CVE-2017-5884', 'CVE-2017-6001', 'CVE-2017-5549', 'CVE-2016-8405', 'CVE-2014-9888', 'CVE-2017-6074', 'CVE-2016-6787', 'CVE-2016-6786', 'CVE-2014-9895', 'CVE-2017-6056', 'CVE-2016-10188', 'CVE-2016-10189', 'CVE-2017-5668', 'CVE-2016-6621', 'CVE-2016-4793', 'CVE-2017-6188', 'CVE-2017-6197', 'CVE-2017-2616', 'CVE-2017-6308', 'CVE-2017-6310', 'CVE-2017-6307', 'CVE-2017-6309', 'CVE-2017-5835', 'CVE-2017-5834', 'CVE-2016-8743', 'CVE-2017-3135', 'CVE-2017-5898', 'CVE-2017-2620', 'CVE-2016-9921', 'CVE-2017-2615', 'CVE-2017-5973']
- Opening url: https://lists.debian.org/debian-lts-announce/2017/03/msg00000.html
- Package : libquicktime
- libquicktime
- Opening url: https://lists.debian.org/debian-lts-announce/2017/03/msg00001.html
- Package : qemu
- qemu
- Opening url: https://lists.debian.org/debian-lts-announce/2017/03/msg00002.html
- Package : munin
- munin
- Opening url: https://lists.debian.org/debian-lts-announce/2017/03/msg00003.html
- Package : libzip-ruby
- libzip-ruby
- Opening url: https://lists.debian.org/debian-lts-announce/2017/03/msg00004.html
- Package : freetype
- freetype
- Opening url: https://lists.debian.org/debian-lts-announce/2017/03/msg00005.html
- Package : texlive-base
- texlive-base
- Opening url: https://lists.debian.org/debian-lts-announce/2017/03/msg00006.html
- Package : wget
- wget
- Opening url: https://lists.debian.org/debian-lts-announce/2017/03/msg00007.html
- Package : linux
- linux
- Opening url: https://lists.debian.org/debian-lts-announce/2017/03/msg00008.html
- Package : vim
- vim
- Opening url: https://lists.debian.org/debian-lts-announce/2017/03/msg00009.html
- Package : firefox-esr
- firefox-esr
- Opening url: https://lists.debian.org/debian-lts-announce/2017/03/msg00010.html
- Package : pidgin
- pidgin
- Opening url: https://lists.debian.org/debian-lts-announce/2017/03/msg00011.html
- Package : icoutils
- icoutils
- Opening url: https://lists.debian.org/debian-lts-announce/2017/03/msg00012.html
- Package : roundcube
- roundcube
- Opening url: https://lists.debian.org/debian-lts-announce/2017/03/msg00013.html
- Package : tzdata
- tzdata
- Opening url: https://lists.debian.org/debian-lts-announce/2017/03/msg00014.html
- Package : libdatetime-timezone-perl
- libdatetime-timezone-perl
- Opening url: https://lists.debian.org/debian-lts-announce/2017/03/msg00015.html
- Package : wireshark
- wireshark
- Opening url: https://lists.debian.org/debian-lts-announce/2017/03/msg00016.html
- Package : calibre
- calibre
- Opening url: https://lists.debian.org/debian-lts-announce/2017/03/msg00017.html
- Package : wordpress
- wordpress
- Opening url: https://lists.debian.org/debian-lts-announce/2017/03/msg00018.html
- Package : r-base
- r-base
- Opening url: https://lists.debian.org/debian-lts-announce/2017/03/msg00019.html
- Package : sitesummary
- sitesummary
- Opening url: https://lists.debian.org/debian-lts-announce/2017/03/msg00020.html
- Package : deluge
- deluge
- Opening url: https://lists.debian.org/debian-lts-announce/2017/03/msg00021.html
- Package : jhead
- jhead
- Opening url: https://lists.debian.org/debian-lts-announce/2017/03/msg00022.html
- Package : suricata
- suricata
- Opening url: https://lists.debian.org/debian-lts-announce/2017/03/msg00023.html
- Package : libxslt
- libxslt
- Opening url: https://lists.debian.org/debian-lts-announce/2017/03/msg00024.html
- Package : audiofile
- audiofile
- Opening url: https://lists.debian.org/debian-lts-announce/2017/03/msg00025.html
- Package : imagemagick
- imagemagick
- Opening url: https://lists.debian.org/debian-lts-announce/2017/03/msg00026.html
- Package : cgiemail
- cgiemail
- Opening url: https://lists.debian.org/debian-lts-announce/2017/03/msg00027.html
- Package : tnef
- tnef
- Opening url: https://lists.debian.org/debian-lts-announce/2017/03/msg00028.html
- Package : libplist
- libplist
- Opening url: https://lists.debian.org/debian-lts-announce/2017/03/msg00029.html
- Package : python3.2
- python3.5
- Opening url: https://lists.debian.org/debian-lts-announce/2017/03/msg00030.html
- Package : xrdp
- xrdp
- Opening url: https://lists.debian.org/debian-lts-announce/2017/03/msg00031.html
- Package : apt-cacher
- apt-cacher
- Opening url: https://lists.debian.org/debian-lts-announce/2017/03/msg00032.html
- Package : jbig2dec
- jbig2dec
- Opening url: https://lists.debian.org/debian-lts-announce/2017/03/msg00033.html
- Package : php5
- php5
- Opening url: https://lists.debian.org/debian-lts-announce/2017/03/msg00034.html
- Package : eject
- eject
- Opening url: https://lists.debian.org/debian-lts-announce/2017/03/msg00035.html
- Package : tiff
- tiff
- Opening url: https://lists.debian.org/debian-lts-announce/2017/03/msg00036.html
- Package : libytnef
- libytnef
- Opening url: https://lists.debian.org/debian-lts-announce/2017/03/msg00037.html
- Package : graphicsmagick
- graphicsmagick
- Opening url: https://lists.debian.org/debian-lts-announce/2017/03/msg00038.html
- Package : firebird2.5
- firebird3.0
- Opening url: https://lists.debian.org/debian-lts-announce/2017/03/msg00039.html
- Package : tiff3
- tiff3
- Opening url: https://lists.debian.org/debian-lts-announce/2017/03/msg00040.html
- ['CVE-2016-2399', 'CVE-2017-5898', 'CVE-2017-2620', 'CVE-2016-9921', 'CVE-2017-2615', 'CVE-2017-5973', 'CVE-2017-5946', 'CVE-2016-10244', 'CVE-2016-10243', 'CVE-2017-6508', 'CVE-2017-6345', 'CVE-2017-5986', 'CVE-2017-6214', 'CVE-2017-6346', 'CVE-2016-9588', 'CVE-2017-6348', 'CVE-2017-5669', 'CVE-2017-6353', 'CVE-2017-2636', 'CVE-2017-6350', 'CVE-2017-6349', 'CVE-2017-5400', 'CVE-2017-5401', 'CVE-2017-5405', 'CVE-2017-5410', 'CVE-2017-5398', 'CVE-2017-5408', 'CVE-2017-5402', 'CVE-2017-5407', 'CVE-2017-5404', 'CVE-2017-2640', 'CVE-2017-6010', 'CVE-2017-6009', 'CVE-2017-6011', 'CVE-2017-6820', 'CVE-2017-6472', 'CVE-2017-5596', 'CVE-2017-6469', 'CVE-2017-6468', 'CVE-2017-6467', 'CVE-2017-6473', 'CVE-2017-6474', 'CVE-2017-6470', 'CVE-2017-5597', 'CVE-2017-6471', 'CVE-2016-10187', 'CVE-2017-6816', 'CVE-2017-6814', 'CVE-2017-6815', 'CVE-2016-8714', 'CVE-2016-8743', 'CVE-2017-7178', 'CVE-2016-3822', 'CVE-2017-7177', 'CVE-2017-5029', 'CVE-2017-6831', 'CVE-2017-6833', 'CVE-2017-6837', 'CVE-2017-6838', 'CVE-2017-6829', 'CVE-2017-6834', 'CVE-2017-6830', 'CVE-2017-6832', 'CVE-2017-6839', 'CVE-2017-6835', 'CVE-2017-6836', 'CVE-2017-6500', 'CVE-2016-10062', 'CVE-2017-6498', 'CVE-2017-5613', 'CVE-2017-5614', 'CVE-2017-5616', 'CVE-2017-5615', 'CVE-2017-6308', 'CVE-2017-6310', 'CVE-2017-6307', 'CVE-2017-6309', 'CVE-2017-6436', 'CVE-2017-6439', 'CVE-2017-6435', 'CVE-2016-0772', 'CVE-2017-6967', 'CVE-2016-9601', 'CVE-2017-7272', 'CVE-2016-7478', 'CVE-2016-7479', 'CVE-2015-8876', 'CVE-2017-6964', 'CVE-2016-10268', 'CVE-2016-10269', 'CVE-2016-10267', 'CVE-2016-10266', 'CVE-2017-6298', 'CVE-2017-6300', 'CVE-2017-6303', 'CVE-2017-6304', 'CVE-2017-6299', 'CVE-2017-6305', 'CVE-2017-6302', 'CVE-2017-6301', 'CVE-2017-6801', 'CVE-2017-6802', 'CVE-2016-5240', 'CVE-2017-6369', 'CVE-2015-8783', 'CVE-2015-8784', 'CVE-2016-9534', 'CVE-2015-8781', 'CVE-2016-9533', 'CVE-2015-8782', 'CVE-2016-9535']
- Opening url: https://lists.debian.org/debian-lts-announce/2017/04/msg00000.html
- Package : ejabberd
- ejabberd
- Opening url: https://lists.debian.org/debian-lts-announce/2017/04/msg00001.html
- Package : tryton-server
- tryton-server
- Opening url: https://lists.debian.org/debian-lts-announce/2017/04/msg00002.html
- Package : curl
- curl
- Opening url: https://lists.debian.org/debian-lts-announce/2017/04/msg00003.html
- Package : collectd
- collectd
- Opening url: https://lists.debian.org/debian-lts-announce/2017/04/msg00004.html
- Package : python-django
- python-django
- Opening url: https://lists.debian.org/debian-lts-announce/2017/04/msg00005.html
- Package : tzdata
- tzdata
- Opening url: https://lists.debian.org/debian-lts-announce/2017/04/msg00006.html
- Package : libdatetime-timezone-perl
- libdatetime-timezone-perl
- Opening url: https://lists.debian.org/debian-lts-announce/2017/04/msg00007.html
- Package : logback
- logback
- Opening url: https://lists.debian.org/debian-lts-announce/2017/04/msg00008.html
- Package : potrace
- potrace
- Opening url: https://lists.debian.org/debian-lts-announce/2017/04/msg00009.html
- Package : ming
- ming
- Opening url: https://lists.debian.org/debian-lts-announce/2017/04/msg00010.html
- Package : libnl3
- libnl3
- Opening url: https://lists.debian.org/debian-lts-announce/2017/04/msg00011.html
- Package : libnl
- libnl
- Opening url: https://lists.debian.org/debian-lts-announce/2017/04/msg00012.html
- Package : bouncycastle
- bouncycastle
- Opening url: https://lists.debian.org/debian-lts-announce/2017/04/msg00013.html
- Package : samba
- samba
- Opening url: https://lists.debian.org/debian-lts-announce/2017/04/msg00014.html
- Package : openoffice.org-dictionaries
- libreoffice
- Opening url: https://lists.debian.org/debian-lts-announce/2017/04/msg00015.html
- Package : qbittorrent
- qbittorrent
- Opening url: https://lists.debian.org/debian-lts-announce/2017/04/msg00016.html
- Package : libosip2
- libosip2
- Opening url: https://lists.debian.org/debian-lts-announce/2017/04/msg00017.html
- Package : feh
- feh
- Opening url: https://lists.debian.org/debian-lts-announce/2017/04/msg00018.html
- Package : freetype
- freetype
- Opening url: https://lists.debian.org/debian-lts-announce/2017/04/msg00019.html
- Package : radare2
- radare2
- Opening url: https://lists.debian.org/debian-lts-announce/2017/04/msg00020.html
- Package : imagemagick
- imagemagick
- Opening url: https://lists.debian.org/debian-lts-announce/2017/04/msg00021.html
- Package : icedove
- icedove
- Opening url: https://lists.debian.org/debian-lts-announce/2017/04/msg00022.html
- Package : hunspell-en-us
- hunspell-en-us
- Opening url: https://lists.debian.org/debian-lts-announce/2017/04/msg00023.html
- Package : uzbek-wordlist
- uzbek-wordlist
- Opening url: https://lists.debian.org/debian-lts-announce/2017/04/msg00024.html
- Package : ghostscript
- ghostscript
- Opening url: https://lists.debian.org/debian-lts-announce/2017/04/msg00025.html
- Package : firefox-esr
- firefox-esr
- Opening url: https://lists.debian.org/debian-lts-announce/2017/04/msg00026.html
- Package : xen
- xen
- Opening url: https://lists.debian.org/debian-lts-announce/2017/04/msg00027.html
- Package : chicken
- chicken
- Opening url: https://lists.debian.org/debian-lts-announce/2017/04/msg00028.html
- Package : libcroco
- libcroco
- Opening url: https://lists.debian.org/debian-lts-announce/2017/04/msg00029.html
- Package : libreoffice
- libreoffice
- Opening url: https://lists.debian.org/debian-lts-announce/2017/04/msg00030.html
- Package : tiff
- tiff
- Opening url: https://lists.debian.org/debian-lts-announce/2017/04/msg00031.html
- Package : tiff3
- tiff3
- Opening url: https://lists.debian.org/debian-lts-announce/2017/04/msg00032.html
- Package : minicom
- minicom
- Opening url: https://lists.debian.org/debian-lts-announce/2017/04/msg00033.html
- Package : activemq
- activemq
- Opening url: https://lists.debian.org/debian-lts-announce/2017/04/msg00034.html
- Package : botan1.10
- botan1.10
- Opening url: https://lists.debian.org/debian-lts-announce/2017/04/msg00035.html
- Package : mysql-5.5
- mysql-transitional
- Opening url: https://lists.debian.org/debian-lts-announce/2017/04/msg00036.html
- Package : rtmpdump
- rtmpdump
- Opening url: https://lists.debian.org/debian-lts-announce/2017/04/msg00037.html
- Package : freetype
- freetype
- Opening url: https://lists.debian.org/debian-lts-announce/2017/04/msg00038.html
- Package : weechat
- weechat
- Opening url: https://lists.debian.org/debian-lts-announce/2017/04/msg00039.html
- Package : jasper
- jasper
- Opening url: https://lists.debian.org/debian-lts-announce/2017/04/msg00040.html
- Package : slurm-llnl
- slurm-llnl
- Opening url: https://lists.debian.org/debian-lts-announce/2017/04/msg00041.html
- Package : linux
- linux
- Opening url: https://lists.debian.org/debian-lts-announce/2017/04/msg00042.html
- Package : partclone
- partclone
- Opening url: https://lists.debian.org/debian-lts-announce/2017/04/msg00043.html
- Package : tomcat7
- tomcat8
- Opening url: https://lists.debian.org/debian-lts-announce/2017/04/msg00044.html
- Package : batik
- batik
- Opening url: https://lists.debian.org/debian-lts-announce/2017/04/msg00045.html
- Package : kedpm
- kedpm
- Opening url: https://lists.debian.org/debian-lts-announce/2017/04/msg00046.html
- Package : fop
- fop
- Opening url: https://lists.debian.org/debian-lts-announce/2017/04/msg00047.html
- Package : libsndfile
- libsndfile
- Opening url: https://lists.debian.org/debian-lts-announce/2017/04/msg00048.html
- Package : libpodofo
- libpodofo
- Opening url: https://lists.debian.org/debian-lts-announce/2017/04/msg00049.html
- ['CVE-2014-8760', 'CVE-2017-0360', 'CVE-2017-7407', 'CVE-2017-7401', 'CVE-2017-7233', 'CVE-2017-7234', 'CVE-2017-5929', 'CVE-2016-8685', 'CVE-2017-7578', 'CVE-2017-0553', 'CVE-2017-0553', 'CVE-2015-6644', 'CVE-2017-2619', 'CVE-2017-6503', 'CVE-2017-6504', 'CVE-2016-10325', 'CVE-2017-7853', 'CVE-2016-10326', 'CVE-2016-10324', 'CVE-2017-7875', 'CVE-2016-10328', 'CVE-2017-6448', 'CVE-2017-7619', 'CVE-2017-7606', 'CVE-2017-5400', 'CVE-2017-5401', 'CVE-2017-5405', 'CVE-2017-5410', 'CVE-2017-5373', 'CVE-2017-5383', 'CVE-2017-5398', 'CVE-2017-5408', 'CVE-2017-5402', 'CVE-2017-5375', 'CVE-2017-5378', 'CVE-2017-5407', 'CVE-2017-5404', 'CVE-2017-5376', 'CVE-2017-5396', 'CVE-2017-5380', 'CVE-2017-5390', 'CVE-2016-10219', 'CVE-2017-5951', 'CVE-2016-10220', 'CVE-2017-5429', 'CVE-2017-5462', 'CVE-2017-5465', 'CVE-2017-5460', 'CVE-2017-5445', 'CVE-2017-5440', 'CVE-2017-5438', 'CVE-2017-5443', 'CVE-2017-5464', 'CVE-2017-5435', 'CVE-2017-5442', 'CVE-2017-5432', 'CVE-2017-5441', 'CVE-2017-5448', 'CVE-2017-5434', 'CVE-2017-5469', 'CVE-2017-5444', 'CVE-2017-5447', 'CVE-2017-5439', 'CVE-2017-5459', 'CVE-2017-5461', 'CVE-2017-5446', 'CVE-2017-5433', 'CVE-2017-5436', 'CVE-2017-7228', 'CVE-2017-6949', 'CVE-2017-7960', 'CVE-2017-7961', 'CVE-2017-3157', 'CVE-2017-7870', 'CVE-2017-7602', 'CVE-2017-7598', 'CVE-2017-7595', 'CVE-2017-7597', 'CVE-2017-7600', 'CVE-2017-7596', 'CVE-2017-7592', 'CVE-2017-7601', 'CVE-2017-7593', 'CVE-2017-7594', 'CVE-2017-7599', 'CVE-2017-7595', 'CVE-2017-7597', 'CVE-2017-7600', 'CVE-2017-7596', 'CVE-2017-7601', 'CVE-2017-7593', 'CVE-2017-7594', 'CVE-2017-7599', 'CVE-2017-7467', 'CVE-2015-7559', 'CVE-2017-2801', 'CVE-2016-5483', 'CVE-2017-3463', 'CVE-2017-3453', 'CVE-2017-3461', 'CVE-2017-3302', 'CVE-2017-3600', 'CVE-2017-3309', 'CVE-2017-3305', 'CVE-2017-3462', 'CVE-2017-3308', 'CVE-2017-3456', 'CVE-2017-3329', 'CVE-2017-3464', 'CVE-2015-8270', 'CVE-2015-8272', 'CVE-2015-8271', 'CVE-2016-10328', 'CVE-2017-8105', 'CVE-2017-8073', 'CVE-2016-9591', 'CVE-2016-10251', 'CVE-2016-10030', 'CVE-2017-2647', 'CVE-2017-7472', 'CVE-2017-7616', 'CVE-2017-2671', 'CVE-2016-9604', 'CVE-2017-6951', 'CVE-2016-2188', 'CVE-2017-7273', 'CVE-2017-7294', 'CVE-2017-7618', 'CVE-2017-5967', 'CVE-2016-10200', 'CVE-2017-7308', 'CVE-2017-7261', 'CVE-2017-5970', 'CVE-2017-7184', 'CVE-2017-6596', 'CVE-2017-5647', 'CVE-2017-5648', 'CVE-2017-5662', 'CVE-2017-8296', 'CVE-2017-5661', 'CVE-2017-7585', 'CVE-2017-7586', 'CVE-2017-7742', 'CVE-2017-7741', 'CVE-2014-9496', 'CVE-2014-9756', 'CVE-2015-7805', 'CVE-2017-6844', 'CVE-2017-5853', 'CVE-2017-7379', 'CVE-2017-5886', 'CVE-2017-5854', 'CVE-2015-8981', 'CVE-2017-5852']
- Opening url: https://lists.debian.org/debian-lts-announce/2017/05/msg00000.html
- Package : libxstream-java
- libxstream-java
- Opening url: https://lists.debian.org/debian-lts-announce/2017/05/msg00001.html
- Package : freetype
- freetype
- Opening url: https://lists.debian.org/debian-lts-announce/2017/05/msg00002.html
- Package : ghostscript
- ghostscript
- Opening url: https://lists.debian.org/debian-lts-announce/2017/05/msg00003.html
- Package : roundcube
- roundcube
- Opening url: https://lists.debian.org/debian-lts-announce/2017/05/msg00004.html
- Package : radicale
- radicale
- Opening url: https://lists.debian.org/debian-lts-announce/2017/05/msg00005.html
- Package : lxterminal
- lxterminal
- Opening url: https://lists.debian.org/debian-lts-announce/2017/05/msg00006.html
- Package : libtirpc
- libtirpc
- Opening url: https://lists.debian.org/debian-lts-announce/2017/05/msg00007.html
- Package : rpcbind
- rpcbind
- Opening url: https://lists.debian.org/debian-lts-announce/2017/05/msg00008.html
- Package : git
- git
- Opening url: https://lists.debian.org/debian-lts-announce/2017/05/msg00009.html
- Package : tomcat7
- tomcat8
- Opening url: https://lists.debian.org/debian-lts-announce/2017/05/msg00010.html
- Package : qemu-kvm
- qemu
- Opening url: https://lists.debian.org/debian-lts-announce/2017/05/msg00011.html
- Package : sane-backends
- sane-backends
- Opening url: https://lists.debian.org/debian-lts-announce/2017/05/msg00012.html
- Package : squirrelmail
- squirrelmail
- Opening url: https://lists.debian.org/debian-lts-announce/2017/05/msg00013.html
- Package : jbig2dec
- jbig2dec
- Opening url: https://lists.debian.org/debian-lts-announce/2017/05/msg00014.html
- Package : deluge
- deluge
- Opening url: https://lists.debian.org/debian-lts-announce/2017/05/msg00015.html
- Package : openvpn
- openvpn
- Opening url: https://lists.debian.org/debian-lts-announce/2017/05/msg00016.html
- Package : mysql-connector-java
- mysql-transitional
- Opening url: https://lists.debian.org/debian-lts-announce/2017/05/msg00017.html
- Package : nss
- nss
- Opening url: https://lists.debian.org/debian-lts-announce/2017/05/msg00018.html
- Package : icu
- icu
- Opening url: https://lists.debian.org/debian-lts-announce/2017/05/msg00019.html
- Package : dropbear
- dropbear
- Opening url: https://lists.debian.org/debian-lts-announce/2017/05/msg00020.html
- Package : miniupnpc
- miniupnpc
- Opening url: https://lists.debian.org/debian-lts-announce/2017/05/msg00021.html
- Package : libtasn1-3
- libtasn1-3
- Opening url: https://lists.debian.org/debian-lts-announce/2017/05/msg00022.html
- Package : samba
- samba
- Opening url: https://lists.debian.org/debian-lts-announce/2017/05/msg00023.html
- Package : kde4libs
- kdelibs
- Opening url: https://lists.debian.org/debian-lts-announce/2017/05/msg00024.html
- Package : graphicsmagick
- graphicsmagick
- Opening url: https://lists.debian.org/debian-lts-announce/2017/05/msg00025.html
- Package : openjdk-7
- openjdk-7
- Opening url: https://lists.debian.org/debian-lts-announce/2017/05/msg00026.html
- Package : rzip
- rzip
- Opening url: https://lists.debian.org/debian-lts-announce/2017/05/msg00027.html
- Package : libsndfile
- libsndfile
- Opening url: https://lists.debian.org/debian-lts-announce/2017/05/msg00028.html
- Package : bind9
- bind9
- Opening url: https://lists.debian.org/debian-lts-announce/2017/05/msg00029.html
- Package : libonig
- libonig
- Opening url: https://lists.debian.org/debian-lts-announce/2017/05/msg00030.html
- Package : libical
- libical
- Opening url: https://lists.debian.org/debian-lts-announce/2017/05/msg00031.html
- Package : imagemagick
- imagemagick
- Opening url: https://lists.debian.org/debian-lts-announce/2017/05/msg00032.html
- Package : tnef
- tnef
- Opening url: https://lists.debian.org/debian-lts-announce/2017/05/msg00033.html
- Package : exiv2
- exiv2
- Opening url: https://lists.debian.org/debian-lts-announce/2017/05/msg00034.html
- Package : mosquitto
- mosquitto
- Opening url: https://lists.debian.org/debian-lts-announce/2017/05/msg00035.html
- Package : pngquant
- pngquant
- Opening url: https://lists.debian.org/debian-lts-announce/2017/05/msg00036.html
- Package : gajim
- gajim
- Opening url: https://lists.debian.org/debian-lts-announce/2017/05/msg00037.html
- Package : libpodofo
- libpodofo
- Opening url: https://lists.debian.org/debian-lts-announce/2017/05/msg00038.html
- Package : tiff
- tiff
- Opening url: https://lists.debian.org/debian-lts-announce/2017/05/msg00039.html
- Package : sudo
- sudo
- Opening url: https://lists.debian.org/debian-lts-announce/2017/05/msg00040.html
- Package : qemu-kvm
- qemu
- Opening url: https://lists.debian.org/debian-lts-announce/2017/05/msg00041.html
- Package : nss
- nss
- Opening url: https://lists.debian.org/debian-lts-announce/2017/05/msg00042.html
- ['CVE-2017-7957', 'CVE-2017-8287', 'CVE-2017-8291', 'CVE-2017-8114', 'CVE-2017-8342', 'CVE-2016-10369', 'CVE-2017-8779', 'CVE-2017-8779', 'CVE-2017-8386', 'CVE-2017-5647', 'CVE-2017-7718', 'CVE-2017-7980', 'CVE-2016-9603', 'CVE-2017-6318', 'CVE-2017-7692', 'CVE-2017-7885', 'CVE-2017-7975', 'CVE-2017-7976', 'CVE-2017-7479', 'CVE-2017-3586', 'CVE-2017-3523', 'CVE-2017-3589', 'CVE-2017-5461', 'CVE-2017-5462', 'CVE-2017-7867', 'CVE-2017-7868', 'CVE-2017-9079', 'CVE-2017-8798', 'CVE-2017-6891', 'CVE-2017-7494', 'CVE-2017-6410', 'CVE-2013-2074', 'CVE-2017-8422', 'CVE-2017-9098', 'CVE-2017-3544', 'CVE-2017-3526', 'CVE-2017-3509', 'CVE-2017-3539', 'CVE-2017-3511', 'CVE-2017-3533', 'CVE-2017-8364', 'CVE-2017-8362', 'CVE-2017-8361', 'CVE-2017-8365', 'CVE-2017-8363', 'CVE-2017-3136', 'CVE-2017-3137', 'CVE-2017-3138', 'CVE-2017-9227', 'CVE-2017-9229', 'CVE-2017-9228', 'CVE-2017-9226', 'CVE-2017-9224', 'CVE-2016-9584', 'CVE-2016-5824', 'CVE-2014-8355', 'CVE-2017-9144', 'CVE-2017-8348', 'CVE-2014-8562', 'CVE-2015-8901', 'CVE-2017-8352', 'CVE-2017-8347', 'CVE-2017-7941', 'CVE-2017-8353', 'CVE-2017-8354', 'CVE-2017-9098', 'CVE-2017-8355', 'CVE-2017-7943', 'CVE-2015-8900', 'CVE-2015-8903', 'CVE-2014-8354', 'CVE-2017-8357', 'CVE-2017-8350', 'CVE-2017-9143', 'CVE-2017-8349', 'CVE-2014-8716', 'CVE-2017-9142', 'CVE-2017-8351', 'CVE-2017-8345', 'CVE-2017-8346', 'CVE-2017-8344', 'CVE-2017-8356', 'CVE-2015-8902', 'CVE-2014-9841', 'CVE-2017-9141', 'CVE-2017-8343', 'CVE-2017-8765', 'CVE-2017-8830', 'CVE-2017-8911', 'CVE-2017-9239', 'CVE-2017-7650', 'CVE-2016-5735', 'CVE-2016-10376', 'CVE-2017-6848', 'CVE-2017-7382', 'CVE-2017-6843', 'CVE-2017-7380', 'CVE-2017-7383', 'CVE-2017-6842', 'CVE-2017-7378', 'CVE-2017-6840', 'CVE-2017-6847', 'CVE-2017-7381', 'CVE-2016-3658', 'CVE-2016-10371', 'CVE-2017-1000367', 'CVE-2016-9602', 'CVE-2017-8086', 'CVE-2017-7377', 'CVE-2017-7471', 'CVE-2017-7493', 'CVE-2017-7502']
- Opening url: https://lists.debian.org/debian-lts-announce/2017/06/msg00000.html
- Package : xen
- xen
- Opening url: https://lists.debian.org/debian-lts-announce/2017/06/msg00001.html
- Package : strongswan
- strongswan
- Opening url: https://lists.debian.org/debian-lts-announce/2017/06/msg00002.html
- Package : picocom
- picocom
- Opening url: https://lists.debian.org/debian-lts-announce/2017/06/msg00003.html
- Package : openldap
- openldap
- Opening url: https://lists.debian.org/debian-lts-announce/2017/06/msg00004.html
- Package : wordpress
- wordpress
- Opening url: https://lists.debian.org/debian-lts-announce/2017/06/msg00005.html
- Package : freeradius
- freeradius
- Opening url: https://lists.debian.org/debian-lts-announce/2017/06/msg00006.html
- Package : yodl
- yodl
- Opening url: https://lists.debian.org/debian-lts-announce/2017/06/msg00007.html
- Package : perl
- perl
- Opening url: https://lists.debian.org/debian-lts-announce/2017/06/msg00008.html
- Package : ming
- ming
- Opening url: https://lists.debian.org/debian-lts-announce/2017/06/msg00009.html
- Package : apng2gif
- apng2gif
- Opening url: https://lists.debian.org/debian-lts-announce/2017/06/msg00010.html
- Package : debian-security-support
- debian-security-support
- Opening url: https://lists.debian.org/debian-lts-announce/2017/06/msg00011.html
- Package : tor
- tor
- Opening url: https://lists.debian.org/debian-lts-announce/2017/06/msg00012.html
- Package : tiff3
- tiff3
- Opening url: https://lists.debian.org/debian-lts-announce/2017/06/msg00013.html
- Package : tiff
- tiff
- Opening url: https://lists.debian.org/debian-lts-announce/2017/06/msg00014.html
- Package : libsndfile
- libsndfile
- Opening url: https://lists.debian.org/debian-lts-announce/2017/06/msg00015.html
- Package : zookeeper
- zookeeper
- Opening url: https://lists.debian.org/debian-lts-announce/2017/06/msg00016.html
- Package : request-tracker4
- request-tracker4
- Opening url: https://lists.debian.org/debian-lts-announce/2017/06/msg00017.html
- Package : rt-authen-externalauth
- rt-authen-externalauth
- Opening url: https://lists.debian.org/debian-lts-announce/2017/06/msg00018.html
- Package : expat
- expat
- Opening url: https://lists.debian.org/debian-lts-announce/2017/06/msg00019.html
- Package : firefox-esr
- firefox-esr
- Opening url: https://lists.debian.org/debian-lts-announce/2017/06/msg00020.html
- Package : jython
- jython
- Opening url: https://lists.debian.org/debian-lts-announce/2017/06/msg00021.html
- Package : eglibc
- glibc
- Opening url: https://lists.debian.org/debian-lts-announce/2017/06/msg00022.html
- Package : linux
- linux
- Opening url: https://lists.debian.org/debian-lts-announce/2017/06/msg00023.html
- Package : zziplib
- zziplib
- Opening url: https://lists.debian.org/debian-lts-announce/2017/06/msg00024.html
- Package : swftools
- swftools
- Opening url: https://lists.debian.org/debian-lts-announce/2017/06/msg00025.html
- Package : tomcat7
- tomcat8
- Opening url: https://lists.debian.org/debian-lts-announce/2017/06/msg00026.html
- Package : libffi
- libffi
- Opening url: https://lists.debian.org/debian-lts-announce/2017/06/msg00027.html
- Package : c-ares
- c-ares
- Opening url: https://lists.debian.org/debian-lts-announce/2017/06/msg00028.html
- Package : openvpn
- openvpn
- Opening url: https://lists.debian.org/debian-lts-announce/2017/06/msg00029.html
- Package : imagemagick
- imagemagick
- Opening url: https://lists.debian.org/debian-lts-announce/2017/06/msg00030.html
- Package : exim4
- exim4
- Opening url: https://lists.debian.org/debian-lts-announce/2017/06/msg00031.html
- Package : smb4k
- smb4k
- Opening url: https://lists.debian.org/debian-lts-announce/2017/06/msg00032.html
- Package : unrar-nonfree
- unrar-nonfree
- Opening url: https://lists.debian.org/debian-lts-announce/2017/06/msg00033.html
- Package : linux
- linux
- Opening url: https://lists.debian.org/debian-lts-announce/2017/06/msg00034.html
- Package : drupal7
- drupal7
- Opening url: https://lists.debian.org/debian-lts-announce/2017/06/msg00035.html
- Package : mercurial
- mercurial
- Opening url: https://lists.debian.org/debian-lts-announce/2017/06/msg00036.html
- Package : libarchive
- libarchive
- Opening url: https://lists.debian.org/debian-lts-announce/2017/06/msg00037.html
- Package : libxml2
- libxml2
- Opening url: https://lists.debian.org/debian-lts-announce/2017/06/msg00038.html
- ['CVE-2017-7995', 'CVE-2017-8903', 'CVE-2017-8905', 'CVE-2016-9932', 'CVE-2017-8904', 'CVE-2017-9023', 'CVE-2017-9022', 'CVE-2015-9059', 'CVE-2017-9287', 'CVE-2017-9065', 'CVE-2017-9064', 'CVE-2017-9061', 'CVE-2017-9062', 'CVE-2017-9063', 'CVE-2017-8295', 'CVE-2017-9148', 'CVE-2014-2015', 'CVE-2015-4680', 'CVE-2016-10375', 'CVE-2017-6512', 'CVE-2017-8782', 'CVE-2017-6960', 'CVE-2017-0376', 'CVE-2017-9404', 'CVE-2017-9403', 'CVE-2017-9147', 'CVE-2016-10095', 'CVE-2017-9404', 'CVE-2017-9403', 'CVE-2017-9147', 'CVE-2016-10095', 'CVE-2017-6892', 'CVE-2017-5637', 'CVE-2015-7686', 'CVE-2017-5361', 'CVE-2016-6127', 'CVE-2017-5944', 'CVE-2017-5943', 'CVE-2017-5361', 'CVE-2017-9233', 'CVE-2017-7771', 'CVE-2017-7773', 'CVE-2017-5472', 'CVE-2017-7775', 'CVE-2017-7754', 'CVE-2017-7749', 'CVE-2017-7772', 'CVE-2017-7777', 'CVE-2017-5470', 'CVE-2017-7752', 'CVE-2017-7757', 'CVE-2017-7751', 'CVE-2017-7774', 'CVE-2017-7750', 'CVE-2017-7756', 'CVE-2017-7776', 'CVE-2017-7778', 'CVE-2017-7764', 'CVE-2017-7758', 'CVE-2016-4000', 'CVE-2017-1000366', 'CVE-2017-7487', 'CVE-2017-8890', 'CVE-2017-9077', 'CVE-2017-9242', 'CVE-2017-9076', 'CVE-2017-8924', 'CVE-2017-8925', 'CVE-2017-9074', 'CVE-2017-7895', 'CVE-2017-0605', 'CVE-2017-9075', 'CVE-2017-1000364', 'CVE-2017-7645', 'CVE-2017-5975', 'CVE-2017-5980', 'CVE-2017-5976', 'CVE-2017-5979', 'CVE-2017-5978', 'CVE-2017-5974', 'CVE-2017-5981', 'CVE-2017-8400', 'CVE-2017-8401', 'CVE-2017-5664', 'CVE-2017-1000376', 'CVE-2017-1000381', 'CVE-2017-7520', 'CVE-2017-9500', 'CVE-2017-9262', 'CVE-2017-9409', 'CVE-2017-9407', 'CVE-2017-9405', 'CVE-2017-9439', 'CVE-2017-9501', 'CVE-2017-9261', 'CVE-2017-1000369', 'CVE-2017-8849', 'CVE-2012-6706', 'CVE-2017-1000364', 'CVE-2017-6922', 'CVE-2017-9462', 'CVE-2016-10350', 'CVE-2016-10349', 'CVE-2016-10209', 'CVE-2017-9048', 'CVE-2017-9050', 'CVE-2017-7375', 'CVE-2017-9049', 'CVE-2017-9047']
- Opening url: https://lists.debian.org/debian-lts-announce/2017/07/msg00000.html
- Package : apache2
- apache2
- Opening url: https://lists.debian.org/debian-lts-announce/2017/07/msg00001.html
- Package : icedove
- icedove
- Opening url: https://lists.debian.org/debian-lts-announce/2017/07/msg00002.html
- Package : vorbis-tools
- vorbis-tools
- Opening url: https://lists.debian.org/debian-lts-announce/2017/07/msg00003.html
- Package : puppet
- puppet
- Opening url: https://lists.debian.org/debian-lts-announce/2017/07/msg00004.html
- Package : sudo
- sudo
- Opening url: https://lists.debian.org/debian-lts-announce/2017/07/msg00005.html
- Package : graphite2
- graphite2
- Opening url: https://lists.debian.org/debian-lts-announce/2017/07/msg00006.html
- Package : libclamunrar
- libclamunrar
- Opening url: https://lists.debian.org/debian-lts-announce/2017/07/msg00007.html
- Package : libgcrypt11
- libgcrypt11
- Opening url: https://lists.debian.org/debian-lts-announce/2017/07/msg00008.html
- Package : radare2
- radare2
- Opening url: https://lists.debian.org/debian-lts-announce/2017/07/msg00009.html
- Package : mpg123
- mpg123
- Opening url: https://lists.debian.org/debian-lts-announce/2017/07/msg00010.html
- Package : sqlite3
- sqlite3
- Opening url: https://lists.debian.org/debian-lts-announce/2017/07/msg00011.html
- Package : phpldapadmin
- phpldapadmin
- Opening url: https://lists.debian.org/debian-lts-announce/2017/07/msg00012.html
- Package : jetty
- jetty
- Opening url: https://lists.debian.org/debian-lts-announce/2017/07/msg00013.html
- Package : jetty8
- jetty8
- Opening url: https://lists.debian.org/debian-lts-announce/2017/07/msg00014.html
- Package : tiff
- tiff
- Opening url: https://lists.debian.org/debian-lts-announce/2017/07/msg00015.html
- Package : tiff3
- tiff3
- Opening url: https://lists.debian.org/debian-lts-announce/2017/07/msg00016.html
- Package : nginx
- nginx
- Opening url: https://lists.debian.org/debian-lts-announce/2017/07/msg00017.html
- Package : bind9
- bind9
- Opening url: https://lists.debian.org/debian-lts-announce/2017/07/msg00018.html
- Package : xorg-server
- xorg-server
- Opening url: https://lists.debian.org/debian-lts-announce/2017/07/msg00019.html
- Package : heimdal
- heimdal
- Opening url: https://lists.debian.org/debian-lts-announce/2017/07/msg00020.html
- Package : apache2
- apache2
- Opening url: https://lists.debian.org/debian-lts-announce/2017/07/msg00021.html
- Package : libmtp
- libmtp
- Opening url: https://lists.debian.org/debian-lts-announce/2017/07/msg00022.html
- Package : evince
- evince
- Opening url: https://lists.debian.org/debian-lts-announce/2017/07/msg00023.html
- Package : vim
- vim
- Opening url: https://lists.debian.org/debian-lts-announce/2017/07/msg00024.html
- Package : unattended-upgrades
- unattended-upgrades
- Opening url: https://lists.debian.org/debian-lts-announce/2017/07/msg00025.html
- Package : memcached
- memcached
- Opening url: https://lists.debian.org/debian-lts-announce/2017/07/msg00026.html
- Package : php5
- php5
- Opening url: https://lists.debian.org/debian-lts-announce/2017/07/msg00027.html
- Package : qemu
- qemu
- Opening url: https://lists.debian.org/debian-lts-announce/2017/07/msg00028.html
- Package : gsoap
- gsoap
- Opening url: https://lists.debian.org/debian-lts-announce/2017/07/msg00029.html
- Package : libtasn1-3
- libtasn1-3
- Opening url: https://lists.debian.org/debian-lts-announce/2017/07/msg00030.html
- Package : catdoc
- catdoc
- Opening url: https://lists.debian.org/debian-lts-announce/2017/07/msg00031.html
- Package : bind9
- bind9
- Opening url: https://lists.debian.org/debian-lts-announce/2017/07/msg00032.html
- Package : rkhunter
- rkhunter
- Opening url: https://lists.debian.org/debian-lts-announce/2017/07/msg00033.html
- Package : resiprocate
- resiprocate
- Opening url: https://lists.debian.org/debian-lts-announce/2017/07/msg00034.html
- Package : roundcube
- roundcube
- Opening url: https://lists.debian.org/debian-lts-announce/2017/07/msg00035.html
- Package : nasm
- nasm
- Opening url: https://lists.debian.org/debian-lts-announce/2017/07/msg00036.html
- Package : libquicktime
- libquicktime
- Opening url: https://lists.debian.org/debian-lts-announce/2017/07/msg00037.html
- Package : mysql-5.5
- mysql-transitional
- Opening url: https://lists.debian.org/debian-lts-announce/2017/07/msg00038.html
- Package : apache2
- apache2
- Opening url: https://lists.debian.org/debian-lts-announce/2017/07/msg00039.html
- Package : ipsec-tools
- ipsec-tools
- Opening url: https://lists.debian.org/debian-lts-announce/2017/07/msg00040.html
- Package : lucene-solr
- lucene-solr
- Opening url: https://lists.debian.org/debian-lts-announce/2017/07/msg00041.html
- Package : graphicsmagick
- graphicsmagick
- Opening url: https://lists.debian.org/debian-lts-announce/2017/07/msg00042.html
- Package : supervisor
- supervisor
- Opening url: https://lists.debian.org/debian-lts-announce/2017/07/msg00043.html
- ['CVE-2017-3167', 'CVE-2017-7668', 'CVE-2017-3169', 'CVE-2017-7679', 'CVE-2017-7771', 'CVE-2017-7773', 'CVE-2017-5472', 'CVE-2017-7775', 'CVE-2017-7754', 'CVE-2017-7749', 'CVE-2017-7772', 'CVE-2017-7777', 'CVE-2017-5470', 'CVE-2017-7752', 'CVE-2017-7757', 'CVE-2017-7751', 'CVE-2017-7774', 'CVE-2017-7750', 'CVE-2017-7756', 'CVE-2017-7776', 'CVE-2017-7778', 'CVE-2017-7764', 'CVE-2017-7758', 'CVE-2015-6749', 'CVE-2014-9639', 'CVE-2014-9638', 'CVE-2014-9640', 'CVE-2017-2295', 'CVE-2017-1000368', 'CVE-2017-1000367', 'CVE-2017-7771', 'CVE-2017-7773', 'CVE-2017-7775', 'CVE-2017-7772', 'CVE-2017-7774', 'CVE-2017-7776', 'CVE-2017-7778', 'CVE-2017-7777', 'CVE-2017-7520', 'CVE-2017-7526', 'CVE-2017-10929', 'CVE-2017-10683', 'CVE-2017-10989', 'CVE-2017-11107', 'CVE-2017-9735', 'CVE-2017-9735', 'CVE-2017-9936', 'CVE-2017-10688', 'CVE-2017-9936', 'CVE-2017-7529', 'CVE-2017-3143', 'CVE-2017-3142', 'CVE-2017-10972', 'CVE-2017-10971', 'CVE-2017-11103', 'CVE-2017-9788', 'CVE-2017-9832', 'CVE-2017-9831', 'CVE-2017-1000083', 'CVE-2017-11109', 'CVE-2017-9951', 'CVE-2016-8705', 'CVE-2017-11147', 'CVE-2016-10397', 'CVE-2017-11144', 'CVE-2017-11145', 'CVE-2017-11143', 'CVE-2017-7980', 'CVE-2016-9602', 'CVE-2017-7718', 'CVE-2017-8086', 'CVE-2016-9603', 'CVE-2017-7377', 'CVE-2017-7471', 'CVE-2017-7493', 'CVE-2017-9765', 'CVE-2017-10790', 'CVE-2017-11110', 'CVE-2017-3142', 'CVE-2017-7480', 'CVE-2017-11521', 'CVE-2017-10686', 'CVE-2017-11111', 'CVE-2017-9122', 'CVE-2017-9124', 'CVE-2017-9128', 'CVE-2017-9123', 'CVE-2017-9126', 'CVE-2017-9125', 'CVE-2017-9127', 'CVE-2017-3636', 'CVE-2017-3653', 'CVE-2017-3635', 'CVE-2017-3651', 'CVE-2017-3648', 'CVE-2017-3652', 'CVE-2017-3641', 'CVE-2015-0253', 'CVE-2016-8743', 'CVE-2016-10396', 'CVE-2017-3163', 'CVE-2017-11636', 'CVE-2017-11102', 'CVE-2017-11140', 'CVE-2017-11642', 'CVE-2017-11643', 'CVE-2017-11641', 'CVE-2017-11637', 'CVE-2017-11403', 'CVE-2017-10799', 'CVE-2017-11638', 'CVE-2017-11610']
- Opening url: https://lists.debian.org/debian-lts-announce/2017/08/msg00000.html
- Package : ghostscript
- ghostscript
- Opening url: https://lists.debian.org/debian-lts-announce/2017/08/msg00001.html
- Package : libsndfile
- libsndfile
- Opening url: https://lists.debian.org/debian-lts-announce/2017/08/msg00002.html
- Package : xchat
- xchat
- Opening url: https://lists.debian.org/debian-lts-announce/2017/08/msg00003.html
- Package : postgresql-9.1
- postgresql-9.6
- Opening url: https://lists.debian.org/debian-lts-announce/2017/08/msg00004.html
- Package : subversion
- subversion
- Opening url: https://lists.debian.org/debian-lts-announce/2017/08/msg00005.html
- Package : firefox-esr
- firefox-esr
- Opening url: https://lists.debian.org/debian-lts-announce/2017/08/msg00006.html
- Package : libgxps
- libgxps
- Opening url: https://lists.debian.org/debian-lts-announce/2017/08/msg00007.html
- Package : libgd2
- libgd2
- Opening url: https://lists.debian.org/debian-lts-announce/2017/08/msg00008.html
- Package : cvs
- cvs
- Opening url: https://lists.debian.org/debian-lts-announce/2017/08/msg00009.html
- Package : libraw
- libraw
- Opening url: https://lists.debian.org/debian-lts-announce/2017/08/msg00010.html
- Package : krb5
- krb5
- Opening url: https://lists.debian.org/debian-lts-announce/2017/08/msg00011.html
- Package : strongswan
- strongswan
- Opening url: https://lists.debian.org/debian-lts-announce/2017/08/msg00012.html
- Package : libxml2
- libxml2
- Opening url: https://lists.debian.org/debian-lts-announce/2017/08/msg00013.html
- Package : newsbeuter
- newsbeuter
- Opening url: https://lists.debian.org/debian-lts-announce/2017/08/msg00014.html
- Package : curl
- curl
- Opening url: https://lists.debian.org/debian-lts-announce/2017/08/msg00015.html
- Package : extplorer
- extplorer
- Opening url: https://lists.debian.org/debian-lts-announce/2017/08/msg00016.html
- Package : freeradius
- freeradius
- Opening url: https://lists.debian.org/debian-lts-announce/2017/08/msg00017.html
- Package : fontforge
- fontforge
- Opening url: https://lists.debian.org/debian-lts-announce/2017/08/msg00018.html
- Package : php5
- php5
- Opening url: https://lists.debian.org/debian-lts-announce/2017/08/msg00019.html
- Package : augeas
- augeas
- Opening url: https://lists.debian.org/debian-lts-announce/2017/08/msg00020.html
- Package : git
- git
- Opening url: https://lists.debian.org/debian-lts-announce/2017/08/msg00021.html
- Package : tenshi
- tenshi
- Opening url: https://lists.debian.org/debian-lts-announce/2017/08/msg00022.html
- Package : qemu-kvm
- qemu
- Opening url: https://lists.debian.org/debian-lts-announce/2017/08/msg00023.html
- Package : qemu
- qemu
- Opening url: https://lists.debian.org/debian-lts-announce/2017/08/msg00024.html
- Package : openjdk-7
- openjdk-7
- Opening url: https://lists.debian.org/debian-lts-announce/2017/08/msg00025.html
- Package : poppler
- poppler
- Opening url: https://lists.debian.org/debian-lts-announce/2017/08/msg00026.html
- Package : wordpress
- wordpress
- Opening url: https://lists.debian.org/debian-lts-announce/2017/08/msg00027.html
- Package : php5
- php5
- Opening url: https://lists.debian.org/debian-lts-announce/2017/08/msg00028.html
- Package : connman
- connman
- Opening url: https://lists.debian.org/debian-lts-announce/2017/08/msg00029.html
- Package : faad2
- faad2
- Opening url: https://lists.debian.org/debian-lts-announce/2017/08/msg00030.html
- Package : gnupg
- gnupg2
- Opening url: https://lists.debian.org/debian-lts-announce/2017/08/msg00031.html
- Package : imagemagick
- imagemagick
- Opening url: https://lists.debian.org/debian-lts-announce/2017/08/msg00032.html
- Package : mercurial
- mercurial
- Opening url: https://lists.debian.org/debian-lts-announce/2017/08/msg00033.html
- Package : libdbd-mysql-perl
- libdbd-mysql-perl
- Opening url: https://lists.debian.org/debian-lts-announce/2017/08/msg00034.html
- Package : graphicsmagick
- graphicsmagick
- Opening url: https://lists.debian.org/debian-lts-announce/2017/08/msg00035.html
- Package : openexr
- openexr
- Opening url: https://lists.debian.org/debian-lts-announce/2017/08/msg00036.html
- ['CVE-2017-9739', 'CVE-2017-9612', 'CVE-2017-7207', 'CVE-2017-9611', 'CVE-2017-9727', 'CVE-2017-9835', 'CVE-2017-11714', 'CVE-2017-9726', 'CVE-2017-12562', 'CVE-2016-2087', 'CVE-2017-7546', 'CVE-2017-7486', 'CVE-2017-7547', 'CVE-2017-9800', 'CVE-2017-7807', 'CVE-2017-7786', 'CVE-2017-7801', 'CVE-2017-7792', 'CVE-2017-7802', 'CVE-2017-7791', 'CVE-2017-7784', 'CVE-2017-7800', 'CVE-2017-7753', 'CVE-2017-7809', 'CVE-2017-7785', 'CVE-2017-7803', 'CVE-2017-7787', 'CVE-2017-7798', 'CVE-2017-7779', 'CVE-2017-11590', 'CVE-2017-7890', 'CVE-2017-12836', 'CVE-2017-6886', 'CVE-2017-6887', 'CVE-2017-11368', 'CVE-2017-11185', 'CVE-2017-0663', 'CVE-2017-7376', 'CVE-2017-12904', 'CVE-2017-1000100', 'CVE-2017-12756', 'CVE-2017-10979', 'CVE-2017-10978', 'CVE-2017-10983', 'CVE-2017-10981', 'CVE-2017-10980', 'CVE-2017-10982', 'CVE-2017-11574', 'CVE-2017-11577', 'CVE-2017-11568', 'CVE-2017-11571', 'CVE-2017-11575', 'CVE-2017-11576', 'CVE-2017-11572', 'CVE-2017-11569', 'CVE-2017-11628', 'CVE-2017-7555', 'CVE-2017-1000117', 'CVE-2017-11746', 'CVE-2017-11434', 'CVE-2017-6505', 'CVE-2017-10664', 'CVE-2017-8309', 'CVE-2017-11434', 'CVE-2017-6505', 'CVE-2017-10664', 'CVE-2017-8309', 'CVE-2017-10087', 'CVE-2017-10107', 'CVE-2017-10135', 'CVE-2017-10074', 'CVE-2017-10053', 'CVE-2017-10193', 'CVE-2017-10096', 'CVE-2017-10115', 'CVE-2017-10067', 'CVE-2017-10102', 'CVE-2017-10109', 'CVE-2017-10090', 'CVE-2017-10116', 'CVE-2017-10198', 'CVE-2017-10081', 'CVE-2017-10176', 'CVE-2017-10118', 'CVE-2017-10089', 'CVE-2017-10108', 'CVE-2017-10101', 'CVE-2017-10243', 'CVE-2017-10110', 'CVE-2017-9776', 'CVE-2017-9865', 'CVE-2017-9775', 'CVE-2013-4474', 'CVE-2013-4473', 'CVE-2017-9066', 'CVE-2017-12933', 'CVE-2017-12865', 'CVE-2017-9222', 'CVE-2017-9223', 'CVE-2017-9257', 'CVE-2017-9221', 'CVE-2017-9253', 'CVE-2017-9219', 'CVE-2017-9256', 'CVE-2017-9255', 'CVE-2017-9254', 'CVE-2017-9218', 'CVE-2017-9220', 'CVE-2017-7526', 'CVE-2017-12641', 'CVE-2017-9144', 'CVE-2017-11644', 'CVE-2017-11534', 'CVE-2017-11535', 'CVE-2017-13142', 'CVE-2017-8352', 'CVE-2017-11529', 'CVE-2017-11533', 'CVE-2017-11537', 'CVE-2017-12877', 'CVE-2017-12674', 'CVE-2017-12664', 'CVE-2017-11724', 'CVE-2017-13146', 'CVE-2017-12565', 'CVE-2017-12429', 'CVE-2017-13133', 'CVE-2017-12676', 'CVE-2017-12983', 'CVE-2017-11352', 'CVE-2017-11539', 'CVE-2017-11478', 'CVE-2017-11528', 'CVE-2017-11523', 'CVE-2017-9501', 'CVE-2017-11448', 'CVE-2017-12432', 'CVE-2017-11752', 'CVE-2017-10995', 'CVE-2017-12654', 'CVE-2017-12640', 'CVE-2017-11525', 'CVE-2017-11751', 'CVE-2017-12587', 'CVE-2017-12668', 'CVE-2017-12670', 'CVE-2017-12431', 'CVE-2017-11450', 'CVE-2017-11532', 'CVE-2017-12642', 'CVE-2017-12675', 'CVE-2017-12435', 'CVE-2017-13143', 'CVE-2017-11530', 'CVE-2017-12564', 'CVE-2017-11639', 'CVE-2017-12430', 'CVE-2017-13144', 'CVE-2017-11640', 'CVE-2017-12566', 'CVE-2017-12643', 'CVE-2017-11526', 'CVE-2017-13134', 'CVE-2017-12427', 'CVE-2017-10928', 'CVE-2017-11505', 'CVE-2017-11446', 'CVE-2017-11141', 'CVE-2017-12433', 'CVE-2017-12563', 'CVE-2017-13658', 'CVE-2017-12665', 'CVE-2017-11527', 'CVE-2017-11188', 'CVE-2017-13139', 'CVE-2017-11170', 'CVE-2017-11360', 'CVE-2017-11524', 'CVE-2017-12418', 'CVE-2017-11449', 'CVE-2017-12428', 'CVE-2017-11531', 'CVE-2017-12140', 'CVE-2017-9800', 'CVE-2017-1000115', 'CVE-2017-1000117', 'CVE-2017-1000116', 'CVE-2017-10788', 'CVE-2017-10789', 'CVE-2015-3152', 'CVE-2017-12935', 'CVE-2017-13777', 'CVE-2017-12937', 'CVE-2017-12936', 'CVE-2017-13776', 'CVE-2017-13063', 'CVE-2017-13064', 'CVE-2017-13065', 'CVE-2017-9116', 'CVE-2017-9110', 'CVE-2017-9112']
- Opening url: https://lists.debian.org/debian-lts-announce/2017/09/msg00000.html
- Package : libidn
- libidn
- Opening url: https://lists.debian.org/debian-lts-announce/2017/09/msg00001.html
- Package : libidn2-0
- libidn2-0
- Opening url: https://lists.debian.org/debian-lts-announce/2017/09/msg00002.html
- Package : enigmail
- enigmail
- Opening url: https://lists.debian.org/debian-lts-announce/2017/09/msg00003.html
- Package : irssi
- irssi
- Opening url: https://lists.debian.org/debian-lts-announce/2017/09/msg00004.html
- Package : irssi
- irssi
- Opening url: https://lists.debian.org/debian-lts-announce/2017/09/msg00005.html
- Package : icedove
- icedove
- Opening url: https://lists.debian.org/debian-lts-announce/2017/09/msg00006.html
- Package : tcpdump
- tcpdump
- Opening url: https://lists.debian.org/debian-lts-announce/2017/09/msg00007.html
- Package : unrar-free
- unrar-free
- Opening url: https://lists.debian.org/debian-lts-announce/2017/09/msg00008.html
- Package : icedove
- icedove
- Opening url: https://lists.debian.org/debian-lts-announce/2017/09/msg00009.html
- Package : libarchive
- libarchive
- Opening url: https://lists.debian.org/debian-lts-announce/2017/09/msg00010.html
- Package : tiff
- tiff
- Opening url: https://lists.debian.org/debian-lts-announce/2017/09/msg00011.html
- Package : tiff3
- tiff3
- Opening url: https://lists.debian.org/debian-lts-announce/2017/09/msg00012.html
- Package : freerdp
- freerdp
- Opening url: https://lists.debian.org/debian-lts-announce/2017/09/msg00013.html
- Package : wordpress-shibboleth
- wordpress-shibboleth
- Opening url: https://lists.debian.org/debian-lts-announce/2017/09/msg00014.html
- Package : tcpdump
- tcpdump
- Opening url: https://lists.debian.org/debian-lts-announce/2017/09/msg00015.html
- Package : freexl
- freexl
- Opening url: https://lists.debian.org/debian-lts-announce/2017/09/msg00016.html
- Package : gdk-pixbuf
- gdk-pixbuf
- Opening url: https://lists.debian.org/debian-lts-announce/2017/09/msg00017.html
- Package : linux
- linux
- Opening url: https://lists.debian.org/debian-lts-announce/2017/09/msg00018.html
- Package : emacs23
- emacs2
- Opening url: https://lists.debian.org/debian-lts-announce/2017/09/msg00019.html
- Package : apache2
- apache2
- Opening url: https://lists.debian.org/debian-lts-announce/2017/09/msg00020.html
- Package : bluez
- bluez
- Opening url: https://lists.debian.org/debian-lts-announce/2017/09/msg00021.html
- Package : newsbeuter
- newsbeuter
- Opening url: https://lists.debian.org/debian-lts-announce/2017/09/msg00022.html
- Package : libgd2
- libgd2
- Opening url: https://lists.debian.org/debian-lts-announce/2017/09/msg00023.html
- Package : clamav
- clamav
- Opening url: https://lists.debian.org/debian-lts-announce/2017/09/msg00024.html
- Package : bzr
- bzr
- Opening url: https://lists.debian.org/debian-lts-announce/2017/09/msg00025.html
- Package : tomcat7
- tomcat8
- Opening url: https://lists.debian.org/debian-lts-announce/2017/09/msg00026.html
- Package : libraw
- libraw
- Opening url: https://lists.debian.org/debian-lts-announce/2017/09/msg00027.html
- Package : samba
- samba
- Opening url: https://lists.debian.org/debian-lts-announce/2017/09/msg00028.html
- Package : weechat
- weechat
- Opening url: https://lists.debian.org/debian-lts-announce/2017/09/msg00029.html
- Package : ruby1.9.1
- ruby2.3
- Opening url: https://lists.debian.org/debian-lts-announce/2017/09/msg00030.html
- Package : ruby1.8
- ruby2.3
- Opening url: https://lists.debian.org/debian-lts-announce/2017/09/msg00031.html
- Package : rubygems
- ruby2.3
- Opening url: https://lists.debian.org/debian-lts-announce/2017/09/msg00032.html
- Package : debsecan
- debsecan
- Opening url: https://lists.debian.org/debian-lts-announce/2017/09/msg00033.html
- Package : poppler
- poppler
- Opening url: https://lists.debian.org/debian-lts-announce/2017/09/msg00034.html
- Package : opencv
- opencv
- Opening url: https://lists.debian.org/debian-lts-announce/2017/09/msg00035.html
- Package : firefox-esr
- firefox-esr
- Opening url: https://lists.debian.org/debian-lts-announce/2017/09/msg00036.html
- Package : otrs2
- otrs2
- Opening url: https://lists.debian.org/debian-lts-announce/2017/09/msg00037.html
- ['CVE-2017-14062', 'CVE-2017-14062', 'CVE-2017-9469', 'CVE-2017-9468', 'CVE-2017-10966', 'CVE-2017-10965', 'CVE-2017-7807', 'CVE-2017-7786', 'CVE-2017-7801', 'CVE-2017-7792', 'CVE-2017-7802', 'CVE-2017-7791', 'CVE-2017-7784', 'CVE-2017-7800', 'CVE-2017-7753', 'CVE-2017-7809', 'CVE-2017-7785', 'CVE-2017-7803', 'CVE-2017-7787', 'CVE-2017-7804', 'CVE-2017-7779', 'CVE-2017-11541', 'CVE-2017-11543', 'CVE-2017-11542', 'CVE-2017-11108', 'CVE-2017-14120', 'CVE-2017-14166', 'CVE-2017-11335', 'CVE-2017-13727', 'CVE-2017-12944', 'CVE-2017-13726', 'CVE-2017-11335', 'CVE-2017-2835', 'CVE-2017-2836', 'CVE-2017-2839', 'CVE-2017-2837', 'CVE-2017-2838', 'CVE-2017-14313', 'CVE-2017-13007', 'CVE-2017-13055', 'CVE-2017-13003', 'CVE-2017-12893', 'CVE-2017-13006', 'CVE-2017-13010', 'CVE-2017-13020', 'CVE-2017-13021', 'CVE-2017-13048', 'CVE-2017-12894', 'CVE-2017-12991', 'CVE-2017-13026', 'CVE-2017-13032', 'CVE-2017-13031', 'CVE-2017-13011', 'CVE-2017-12997', 'CVE-2017-12992', 'CVE-2017-13024', 'CVE-2017-13042', 'CVE-2017-13690', 'CVE-2017-12993', 'CVE-2017-12901', 'CVE-2017-13036', 'CVE-2017-13049', 'CVE-2017-13025', 'CVE-2017-13053', 'CVE-2017-13054', 'CVE-2017-12900', 'CVE-2017-13001', 'CVE-2017-13037', 'CVE-2017-13008', 'CVE-2017-13044', 'CVE-2017-13014', 'CVE-2017-13016', 'CVE-2017-13041', 'CVE-2017-13052', 'CVE-2017-12895', 'CVE-2017-12989', 'CVE-2017-13047', 'CVE-2017-13689', 'CVE-2017-13045', 'CVE-2017-12902', 'CVE-2017-12985', 'CVE-2017-12899', 'CVE-2017-13725', 'CVE-2017-13030', 'CVE-2017-13005', 'CVE-2017-12897', 'CVE-2017-13002', 'CVE-2017-12987', 'CVE-2017-12995', 'CVE-2017-12898', 'CVE-2017-13051', 'CVE-2017-13009', 'CVE-2017-13013', 'CVE-2017-13038', 'CVE-2017-13015', 'CVE-2017-12986', 'CVE-2017-13023', 'CVE-2017-13688', 'CVE-2017-13035', 'CVE-2017-13017', 'CVE-2017-12996', 'CVE-2017-13033', 'CVE-2017-13027', 'CVE-2017-13050', 'CVE-2017-13029', 'CVE-2017-12994', 'CVE-2017-13000', 'CVE-2017-13018', 'CVE-2017-12990', 'CVE-2017-13687', 'CVE-2017-12896', 'CVE-2017-12999', 'CVE-2017-13022', 'CVE-2017-13039', 'CVE-2017-13004', 'CVE-2017-13046', 'CVE-2017-12988', 'CVE-2017-13012', 'CVE-2017-12998', 'CVE-2017-13028', 'CVE-2017-13019', 'CVE-2017-13043', 'CVE-2017-13040', 'CVE-2017-13034', 'CVE-2017-2923', 'CVE-2017-2924', 'CVE-2017-2862', 'CVE-2017-1000251', 'CVE-2017-12154', 'CVE-2017-10661', 'CVE-2017-11176', 'CVE-2017-1000365', 'CVE-2017-11600', 'CVE-2017-7542', 'CVE-2017-14156', 'CVE-2017-1000363', 'CVE-2017-1000380', 'CVE-2017-12134', 'CVE-2017-12153', 'CVE-2017-1000111', 'CVE-2017-14340', 'CVE-2017-7482', 'CVE-2017-14106', 'CVE-2017-7889', 'CVE-2017-14140', 'CVE-2017-14489', 'CVE-2017-10911', 'CVE-2017-14482', 'CVE-2017-9798', 'CVE-2017-1000250', 'CVE-2017-14500', 'CVE-2017-6362', 'CVE-2017-6420', 'CVE-2017-6418', 'CVE-2017-14176', 'CVE-2013-2099', 'CVE-2017-12616', 'CVE-2017-14608', 'CVE-2017-12163', 'CVE-2017-12150', 'CVE-2017-14727', 'CVE-2017-0901', 'CVE-2017-0899', 'CVE-2017-0898', 'CVE-2017-14064', 'CVE-2017-0900', 'CVE-2017-14033', 'CVE-2017-10784', 'CVE-2017-0898', 'CVE-2017-10784', 'CVE-2017-0901', 'CVE-2017-0900', 'CVE-2017-14617', 'CVE-2017-14517', 'CVE-2017-14519', 'CVE-2016-1516', 'CVE-2017-12603', 'CVE-2017-12598', 'CVE-2017-14136', 'CVE-2017-12862', 'CVE-2017-12601', 'CVE-2017-12605', 'CVE-2017-12599', 'CVE-2017-12606', 'CVE-2017-12863', 'CVE-2017-12864', 'CVE-2017-12597', 'CVE-2017-12604', 'CVE-2017-7793', 'CVE-2017-7810', 'CVE-2017-7819', 'CVE-2017-7814', 'CVE-2017-7818', 'CVE-2017-7823', 'CVE-2017-7824', 'CVE-2017-7805', 'CVE-2014-2553', 'CVE-2017-14635', 'CVE-2014-1695', 'CVE-2014-2554']
- Opening url: https://lists.debian.org/debian-lts-announce/2017/10/msg00000.html
- Package : git
- git
- Opening url: https://lists.debian.org/debian-lts-announce/2017/10/msg00001.html
- Package : curl
- curl
- Opening url: https://lists.debian.org/debian-lts-announce/2017/10/msg00002.html
- Package : asterisk
- asterisk
- Opening url: https://lists.debian.org/debian-lts-announce/2017/10/msg00003.html
- Package : golang
- golang
- Opening url: https://lists.debian.org/debian-lts-announce/2017/10/msg00004.html
- Package : dnsmasq
- dnsmasq
- Opening url: https://lists.debian.org/debian-lts-announce/2017/10/msg00005.html
- Package : botan1.10
- botan1.10
- Opening url: https://lists.debian.org/debian-lts-announce/2017/10/msg00006.html
- Package : libxfont
- libxfont
- Opening url: https://lists.debian.org/debian-lts-announce/2017/10/msg00007.html
- Package : sam2p
- sam2p
- Opening url: https://lists.debian.org/debian-lts-announce/2017/10/msg00008.html
- Package : qemu-kvm
- qemu
- Opening url: https://lists.debian.org/debian-lts-announce/2017/10/msg00009.html
- Package : qemu
- qemu
- Opening url: https://lists.debian.org/debian-lts-announce/2017/10/msg00010.html
- Package : imagemagick
- imagemagick
- Opening url: https://lists.debian.org/debian-lts-announce/2017/10/msg00011.html
- Package : xen
- xen
- Opening url: https://lists.debian.org/debian-lts-announce/2017/10/msg00012.html
- Package : sdl-image1.2
- sdl-image1.2
- Opening url: https://lists.debian.org/debian-lts-announce/2017/10/msg00013.html
- Package : db
- db
- Opening url: https://lists.debian.org/debian-lts-announce/2017/10/msg00014.html
- Package : db4.8
- db4.8
- Opening url: https://lists.debian.org/debian-lts-announce/2017/10/msg00015.html
- Package : db4.7
- db4.8
- Opening url: https://lists.debian.org/debian-lts-announce/2017/10/msg00016.html
- Package : graphicsmagick
- graphicsmagick
- Opening url: https://lists.debian.org/debian-lts-announce/2017/10/msg00017.html
- Package : nss
- nss
- Opening url: https://lists.debian.org/debian-lts-announce/2017/10/msg00018.html
- Package : imagemagick
- imagemagick
- Opening url: https://lists.debian.org/debian-lts-announce/2017/10/msg00019.html
- Package : mysql-5.5
- mysql-transitional
- Opening url: https://lists.debian.org/debian-lts-announce/2017/10/msg00020.html
- Package : ming
- ming
- Opening url: https://lists.debian.org/debian-lts-announce/2017/10/msg00021.html
- Package : libav
- libav
- Opening url: https://lists.debian.org/debian-lts-announce/2017/10/msg00022.html
- Package : curl
- curl
- Opening url: https://lists.debian.org/debian-lts-announce/2017/10/msg00023.html
- Package : mosquitto
- mosquitto
- Opening url: https://lists.debian.org/debian-lts-announce/2017/10/msg00024.html
- Package : zoneminder
- zoneminder
- Opening url: https://lists.debian.org/debian-lts-announce/2017/10/msg00025.html
- Package : exiv2
- exiv2
- Opening url: https://lists.debian.org/debian-lts-announce/2017/10/msg00026.html
- Package : git-annex
- git-annex
- Opening url: https://lists.debian.org/debian-lts-announce/2017/10/msg00027.html
- Package : golang
- golang
- Opening url: https://lists.debian.org/debian-lts-announce/2017/10/msg00028.html
- Package : wget
- wget
- Opening url: https://lists.debian.org/debian-lts-announce/2017/10/msg00029.html
- Package : wpa
- wpa
- Opening url: https://lists.debian.org/debian-lts-announce/2017/10/msg00030.html
- Package : quagga
- quagga
- Opening url: https://lists.debian.org/debian-lts-announce/2017/10/msg00031.html
- Package : wordpress
- wordpress
- Opening url: https://lists.debian.org/debian-lts-announce/2017/10/msg00032.html
- Package : graphicsmagick
- graphicsmagick
- Opening url: https://lists.debian.org/debian-lts-announce/2017/10/msg00033.html
- Package : tzdata
- tzdata
- Opening url: https://lists.debian.org/debian-lts-announce/2017/10/msg00034.html
- Package : libdatetime-timezone-perl
- libdatetime-timezone-perl
- Opening url: https://lists.debian.org/debian-lts-announce/2017/10/msg00035.html
- ['CVE-2017-14867', 'CVE-2017-1000254', 'CVE-2017-14100', 'CVE-2017-1000098', 'CVE-2017-14492', 'CVE-2017-14491', 'CVE-2017-14494', 'CVE-2017-14737', 'CVE-2017-13720', 'CVE-2017-13722', 'CVE-2017-14631', 'CVE-2017-14630', 'CVE-2017-14628', 'CVE-2017-14637', 'CVE-2017-14636', 'CVE-2017-14629', 'CVE-2017-15038', 'CVE-2017-14167', 'CVE-2017-15038', 'CVE-2017-14167', 'CVE-2017-12693', 'CVE-2017-14607', 'CVE-2017-14741', 'CVE-2017-13768', 'CVE-2017-14172', 'CVE-2017-12875', 'CVE-2017-14173', 'CVE-2017-13758', 'CVE-2017-14341', 'CVE-2017-14989', 'CVE-2017-14682', 'CVE-2017-14249', 'CVE-2017-14505', 'CVE-2017-15017', 'CVE-2017-13769', 'CVE-2017-14174', 'CVE-2017-14224', 'CVE-2017-12692', 'CVE-2017-14400', 'CVE-2017-12691', 'CVE-2017-14175', 'CVE-2017-14739', 'CVE-2017-15016', 'CVE-2017-14060', 'CVE-2017-10915', 'CVE-2017-10918', 'CVE-2017-12855', 'CVE-2017-10920', 'CVE-2017-10922', 'CVE-2017-14319', 'CVE-2017-14316', 'CVE-2017-10913', 'CVE-2017-10912', 'CVE-2017-12135', 'CVE-2017-14318', 'CVE-2017-12137', 'CVE-2017-10921', 'CVE-2017-14317', 'CVE-2017-10914', 'CVE-2017-2887', 'CVE-2017-10140', 'CVE-2017-10140', 'CVE-2017-10140', 'CVE-2017-13737', 'CVE-2017-15277', 'CVE-2017-7805', 'CVE-2017-15277', 'CVE-2017-15281', 'CVE-2017-10379', 'CVE-2017-10268', 'CVE-2017-10378', 'CVE-2017-10384', 'CVE-2017-11729', 'CVE-2017-11730', 'CVE-2017-11731', 'CVE-2017-11734', 'CVE-2017-11704', 'CVE-2017-11728', 'CVE-2017-7208', 'CVE-2015-8365', 'CVE-2017-9992', 'CVE-2017-7862', 'CVE-2017-1000257', 'CVE-2017-9868', 'CVE-2017-5595', 'CVE-2017-11683', 'CVE-2017-14859', 'CVE-2017-11591', 'CVE-2017-14862', 'CVE-2017-14864', 'CVE-2017-1000117', 'CVE-2017-12836', 'CVE-2017-9800', 'CVE-2017-1000116', 'CVE-2017-12976', 'CVE-2017-15041', 'CVE-2017-13089', 'CVE-2017-13090', 'CVE-2017-13088', 'CVE-2017-13087', 'CVE-2017-13078', 'CVE-2017-13086', 'CVE-2017-13081', 'CVE-2017-13077', 'CVE-2017-13079', 'CVE-2017-13084', 'CVE-2017-13082', 'CVE-2017-13080', 'CVE-2017-16227', 'CVE-2017-14719', 'CVE-2017-14718', 'CVE-2017-14725', 'CVE-2017-14721', 'CVE-2017-14720', 'CVE-2017-14723', 'CVE-2017-14990', 'CVE-2016-9263', 'CVE-2017-14722', 'CVE-2017-14103', 'CVE-2017-14997', 'CVE-2017-14733', 'CVE-2017-15930', 'CVE-2017-11403', 'CVE-2017-14994', 'CVE-2017-14314', 'CVE-2017-14504']
- Opening url: https://lists.debian.org/debian-lts-announce/2017/11/msg00000.html
- Package : thunderbird
- icedove
- Opening url: https://lists.debian.org/debian-lts-announce/2017/11/msg00001.html
- Package : bchunk
- bchunk
- Opening url: https://lists.debian.org/debian-lts-announce/2017/11/msg00002.html
- Package : graphicsmagick
- graphicsmagick
- Opening url: https://lists.debian.org/debian-lts-announce/2017/11/msg00003.html
- Package : wordpress
- wordpress
- Opening url: https://lists.debian.org/debian-lts-announce/2017/11/msg00004.html
- Package : redis
- redis
- Opening url: https://lists.debian.org/debian-lts-announce/2017/11/msg00005.html
- Package : apr
- apr
- Opening url: https://lists.debian.org/debian-lts-announce/2017/11/msg00006.html
- Package : apr-util
- apr-util
- Opening url: https://lists.debian.org/debian-lts-announce/2017/11/msg00007.html
- Package : mupdf
- mupdf
- Opening url: https://lists.debian.org/debian-lts-announce/2017/11/msg00008.html
- Package : libpam4j
- libpam4j
- Opening url: https://lists.debian.org/debian-lts-announce/2017/11/msg00009.html
- Package : tomcat7
- tomcat8
- Opening url: https://lists.debian.org/debian-lts-announce/2017/11/msg00010.html
- Package : ruby-yajl
- ruby2.3
- Opening url: https://lists.debian.org/debian-lts-announce/2017/11/msg00011.html
- Package : openssl
- openssl
- Opening url: https://lists.debian.org/debian-lts-announce/2017/11/msg00012.html
- Package : tomcat7
- tomcat8
- Opening url: https://lists.debian.org/debian-lts-announce/2017/11/msg00013.html
- Package : graphicsmagick
- graphicsmagick
- Opening url: https://lists.debian.org/debian-lts-announce/2017/11/msg00014.html
- Package : postgresql-common
- postgresql-9.6
- Opening url: https://lists.debian.org/debian-lts-announce/2017/11/msg00015.html
- Package : wordpress
- wordpress
- Opening url: https://lists.debian.org/debian-lts-announce/2017/11/msg00016.html
- Package : graphicsmagick
- graphicsmagick
- Opening url: https://lists.debian.org/debian-lts-announce/2017/11/msg00017.html
- Package : libxml-libxml-perl
- libxml-libxml-perl
- Opening url: https://lists.debian.org/debian-lts-announce/2017/11/msg00018.html
- Package : firefox-esr
- firefox-esr
- Opening url: https://lists.debian.org/debian-lts-announce/2017/11/msg00019.html
- Package : procmail
- procmail
- Opening url: https://lists.debian.org/debian-lts-announce/2017/11/msg00020.html
- Package : konversation
- konversation
- Opening url: https://lists.debian.org/debian-lts-announce/2017/11/msg00021.html
- Package : lynx-cur
- lynx-cur
- Opening url: https://lists.debian.org/debian-lts-announce/2017/11/msg00022.html
- Package : ming
- ming
- Opening url: https://lists.debian.org/debian-lts-announce/2017/11/msg00023.html
- Package : poppler
- poppler
- Opening url: https://lists.debian.org/debian-lts-announce/2017/11/msg00024.html
- Package : opensaml2
- opensaml2
- Opening url: https://lists.debian.org/debian-lts-announce/2017/11/msg00025.html
- Package : shibboleth-sp2
- shibboleth-sp2
- Opening url: https://lists.debian.org/debian-lts-announce/2017/11/msg00026.html
- Package : libspring-ldap-java
- libspring-ldap-java
- Opening url: https://lists.debian.org/debian-lts-announce/2017/11/msg00027.html
- Package : xen
- xen
- Opening url: https://lists.debian.org/debian-lts-announce/2017/11/msg00028.html
- Package : ldns
- ldns
- Opening url: https://lists.debian.org/debian-lts-announce/2017/11/msg00029.html
- Package : samba
- samba
- Opening url: https://lists.debian.org/debian-lts-announce/2017/11/msg00030.html
- Package : optipng
- optipng
- Opening url: https://lists.debian.org/debian-lts-announce/2017/11/msg00031.html
- Package : sam2p
- sam2p
- Opening url: https://lists.debian.org/debian-lts-announce/2017/11/msg00032.html
- Package : xorg-server
- xorg-server
- Opening url: https://lists.debian.org/debian-lts-announce/2017/11/msg00033.html
- Package : openjdk-7
- openjdk-7
- Opening url: https://lists.debian.org/debian-lts-announce/2017/11/msg00034.html
- Package : libxml2
- libxml2
- Opening url: https://lists.debian.org/debian-lts-announce/2017/11/msg00035.html
- Package : python2.7
- python3.5
- Opening url: https://lists.debian.org/debian-lts-announce/2017/11/msg00036.html
- Package : python2.6
- python3.5
- Opening url: https://lists.debian.org/debian-lts-announce/2017/11/msg00037.html
- Package : python-werkzeug
- python-werkzeug
- Opening url: https://lists.debian.org/debian-lts-announce/2017/11/msg00038.html
- Package : libofx
- libofx
- Opening url: https://lists.debian.org/debian-lts-announce/2017/11/msg00039.html
- Package : roundcube
- roundcube
- Opening url: https://lists.debian.org/debian-lts-announce/2017/11/msg00040.html
- Package : curl
- curl
- Opening url: https://lists.debian.org/debian-lts-announce/2017/11/msg00041.html
- Package : libxml2
- libxml2
- Opening url: https://lists.debian.org/debian-lts-announce/2017/11/msg00042.html
- Package : optipng
- optipng
- Opening url: https://lists.debian.org/debian-lts-announce/2017/11/msg00043.html
- Package : sox
- sox
- Opening url: https://lists.debian.org/debian-lts-announce/2017/11/msg00044.html
- ['CVE-2017-7793', 'CVE-2017-7810', 'CVE-2017-7819', 'CVE-2017-7814', 'CVE-2017-7825', 'CVE-2017-7818', 'CVE-2017-7823', 'CVE-2017-7824', 'CVE-2017-7805', 'CVE-2017-15953', 'CVE-2017-15954', 'CVE-2017-15955', 'CVE-2017-16352', 'CVE-2017-16353', 'CVE-2017-16510', 'CVE-2017-14723', 'CVE-2016-1051', 'CVE-2017-12613', 'CVE-2017-12618', 'CVE-2017-14687', 'CVE-2017-15587', 'CVE-2017-12197', 'CVE-2017-12617', 'CVE-2017-16516', 'CVE-2017-3735', 'CVE-2017-16669', 'CVE-2017-8806', 'CVE-2017-14990', 'CVE-2017-13134', 'CVE-2017-16547', 'CVE-2017-10672', 'CVE-2017-7828', 'CVE-2017-7830', 'CVE-2017-7826', 'CVE-2017-16844', 'CVE-2017-15923', 'CVE-2017-1000211', 'CVE-2017-9988', 'CVE-2017-9989', 'CVE-2017-11733', 'CVE-2017-14975', 'CVE-2017-14977', 'CVE-2017-14976', 'CVE-2017-15565', 'CVE-2017-16853', 'CVE-2017-16852', 'CVE-2017-8028', 'CVE-2017-15595', 'CVE-2017-15593', 'CVE-2017-15589', 'CVE-2017-15588', 'CVE-2017-15592', 'CVE-2017-1000231', 'CVE-2017-15275', 'CVE-2017-1000229', 'CVE-2017-16663', 'CVE-2017-13723', 'CVE-2017-12177', 'CVE-2017-12187', 'CVE-2017-12180', 'CVE-2017-12176', 'CVE-2017-12184', 'CVE-2017-12185', 'CVE-2017-12182', 'CVE-2017-12183', 'CVE-2017-12178', 'CVE-2017-2624', 'CVE-2017-10295', 'CVE-2017-10348', 'CVE-2017-10345', 'CVE-2017-10274', 'CVE-2017-10356', 'CVE-2017-10285', 'CVE-2017-10346', 'CVE-2017-10349', 'CVE-2017-10350', 'CVE-2017-10355', 'CVE-2017-10357', 'CVE-2017-10388', 'CVE-2017-10281', 'CVE-2017-10347', 'CVE-2017-5130', 'CVE-2017-1000158', 'CVE-2017-1000158', 'CVE-2016-10516', 'CVE-2017-14731', 'CVE-2017-2816', 'CVE-2017-16651', 'CVE-2017-8817', 'CVE-2017-16932', 'CVE-2017-16931', 'CVE-2017-16938', 'CVE-2017-11332', 'CVE-2017-15372', 'CVE-2017-15370', 'CVE-2017-11358', 'CVE-2017-11359', 'CVE-2017-15371', 'CVE-2017-15642']
- Opening url: https://lists.debian.org/debian-lts-announce/2017/12/msg00000.html
- Package : libextractor
- libextractor
- Opening url: https://lists.debian.org/debian-lts-announce/2017/12/msg00001.html
- Package : thunderbird
- icedove
- Opening url: https://lists.debian.org/debian-lts-announce/2017/12/msg00002.html
- Package : libxcursor
- libxcursor
- Opening url: https://lists.debian.org/debian-lts-announce/2017/12/msg00003.html
- Package : firefox-esr
- firefox-esr
- Opening url: https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html
- Package : linux
- linux
- Opening url: https://lists.debian.org/debian-lts-announce/2017/12/msg00005.html
- Package : xrdp
- xrdp
- Opening url: https://lists.debian.org/debian-lts-announce/2017/12/msg00006.html
- Package : evince
- evince
- Opening url: https://lists.debian.org/debian-lts-announce/2017/12/msg00007.html
- Package : simplesamlphp
- simplesamlphp
- Opening url: https://lists.debian.org/debian-lts-announce/2017/12/msg00008.html
- Package : tiff
- tiff
- Opening url: https://lists.debian.org/debian-lts-announce/2017/12/msg00009.html
- Package : xrdp
- xrdp
- Opening url: https://lists.debian.org/debian-lts-announce/2017/12/msg00010.html
- Package : erlang
- erlang
- Opening url: https://lists.debian.org/debian-lts-announce/2017/12/msg00011.html
- Package : reportbug
- reportbug
- Opening url: https://lists.debian.org/debian-lts-announce/2017/12/msg00012.html
- Package : sensible-utils
- sensible-utils
- Opening url: https://lists.debian.org/debian-lts-announce/2017/12/msg00013.html
- Package : kildclient
- kildclient
- Opening url: https://lists.debian.org/debian-lts-announce/2017/12/msg00014.html
- Package : libxml2
- libxml2
- Opening url: https://lists.debian.org/debian-lts-announce/2017/12/msg00015.html
- Package : otrs2
- otrs2
- Opening url: https://lists.debian.org/debian-lts-announce/2017/12/msg00016.html
- Package : openafs
- openafs
- Opening url: https://lists.debian.org/debian-lts-announce/2017/12/msg00017.html
- Package : libreoffice
- libreoffice
- Opening url: https://lists.debian.org/debian-lts-announce/2017/12/msg00018.html
- Package : otrs2
- otrs2
- Opening url: https://lists.debian.org/debian-lts-announce/2017/12/msg00019.html
- Package : wordpress
- wordpress
- Opening url: https://lists.debian.org/debian-lts-announce/2017/12/msg00020.html
- Package : rsync
- rsync
- Opening url: https://lists.debian.org/debian-lts-announce/2017/12/msg00021.html
- Package : enigmail
- enigmail
- Opening url: https://lists.debian.org/debian-lts-announce/2017/12/msg00022.html
- Package : irssi
- irssi
- Opening url: https://lists.debian.org/debian-lts-announce/2017/12/msg00023.html
- Package : gimp
- gimp
- Opening url: https://lists.debian.org/debian-lts-announce/2017/12/msg00024.html
- Package : ruby1.8
- ruby2.3
- Opening url: https://lists.debian.org/debian-lts-announce/2017/12/msg00025.html
- Package : ruby1.9.1
- ruby2.3
- Opening url: https://lists.debian.org/debian-lts-announce/2017/12/msg00026.html
- Package : thunderbird
- icedove
- Opening url: https://lists.debian.org/debian-lts-announce/2017/12/msg00027.html
- Package : mercurial
- mercurial
- Opening url: https://lists.debian.org/debian-lts-announce/2017/12/msg00028.html
- Package : asterisk
- asterisk
- Opening url: https://lists.debian.org/debian-lts-announce/2017/12/msg00029.html
- Package : wireshark
- wireshark
- Opening url: https://lists.debian.org/debian-lts-announce/2017/12/msg00030.html
- ['CVE-2017-15602', 'CVE-2017-15601', 'CVE-2017-15266', 'CVE-2017-15267', 'CVE-2017-15922', 'CVE-2017-15600', 'CVE-2017-7828', 'CVE-2017-7830', 'CVE-2017-7826', 'CVE-2017-16612', 'CVE-2017-7843', 'CVE-2017-16531', 'CVE-2017-16525', 'CVE-2017-15649', 'CVE-2017-16527', 'CVE-2017-8824', 'CVE-2017-16643', 'CVE-2017-16537', 'CVE-2017-15115', 'CVE-2017-16533', 'CVE-2017-16529', 'CVE-2017-16535', 'CVE-2017-1000364', 'CVE-2017-14051', 'CVE-2017-16536', 'CVE-2017-15265', 'CVE-2016-10208', 'CVE-2017-8831', 'CVE-2017-13080', 'CVE-2017-16649', 'CVE-2017-15868', 'CVE-2017-16939', 'CVE-2017-1000407', 'CVE-2017-16532', 'CVE-2017-12190', 'CVE-2017-15299', 'CVE-2017-16927', 'CVE-2017-1000159', 'CVE-2017-12869', 'CVE-2017-12867', 'CVE-2017-12872', 'CVE-2017-12868', 'CVE-2017-12874', 'CVE-2017-12873', 'CVE-2017-9935', 'CVE-2017-16927', 'CVE-2017-1000385', 'CVE-2017-17512', 'CVE-2017-17511', 'CVE-2017-15412', 'CVE-2017-16921', 'CVE-2017-15864', 'CVE-2017-16854', 'CVE-2017-16664', 'CVE-2017-17432', 'CVE-2017-12608', 'CVE-2017-12607', 'CVE-2017-17476', 'CVE-2017-17094', 'CVE-2017-17091', 'CVE-2017-17092', 'CVE-2017-17093', 'CVE-2017-17434', 'CVE-2017-17433', 'CVE-2017-16548', 'CVE-2017-17845', 'CVE-2017-17848', 'CVE-2017-17843', 'CVE-2017-17846', 'CVE-2017-17844', 'CVE-2017-17847', 'CVE-2017-5356', 'CVE-2017-15228', 'CVE-2017-5193', 'CVE-2017-15722', 'CVE-2017-15227', 'CVE-2017-15721', 'CVE-2017-5194', 'CVE-2017-17787', 'CVE-2017-17786', 'CVE-2017-17785', 'CVE-2017-17788', 'CVE-2017-17784', 'CVE-2017-17789', 'CVE-2017-17790', 'CVE-2017-17405', 'CVE-2017-17790', 'CVE-2017-17405', 'CVE-2017-7848', 'CVE-2017-7829', 'CVE-2017-7847', 'CVE-2017-7846', 'CVE-2017-17458', 'CVE-2017-17090', 'CVE-2017-17084', 'CVE-2017-17083', 'CVE-2017-11408', 'CVE-2017-17085']
- Opening url: https://lists.debian.org/debian-lts-announce/2018/01/msg00000.html
- Package : imagemagick
- imagemagick
- Opening url: https://lists.debian.org/debian-lts-announce/2018/01/msg00001.html
- Package : poppler
- poppler
- Opening url: https://lists.debian.org/debian-lts-announce/2018/01/msg00002.html
- Package : imagemagick
- imagemagick
- Opening url: https://lists.debian.org/debian-lts-announce/2018/01/msg00003.html
- Package : xen
- xen
- Opening url: https://lists.debian.org/debian-lts-announce/2018/01/msg00004.html
- Package : linux
- linux
- Opening url: https://lists.debian.org/debian-lts-announce/2018/01/msg00005.html
- Package : graphicsmagick
- graphicsmagick
- Opening url: https://lists.debian.org/debian-lts-announce/2018/01/msg00006.html
- Package : gifsicle
- gifsicle
- Opening url: https://lists.debian.org/debian-lts-announce/2018/01/msg00007.html
- Package : gdk-pixbuf
- gdk-pixbuf
- Opening url: https://lists.debian.org/debian-lts-announce/2018/01/msg00008.html
- Package : opencv
- opencv
- Opening url: https://lists.debian.org/debian-lts-announce/2018/01/msg00009.html
- Package : gdk-pixbuf
- gdk-pixbuf
- Opening url: https://lists.debian.org/debian-lts-announce/2018/01/msg00010.html
- Package : plexus-utils
- plexus-utils
- Opening url: https://lists.debian.org/debian-lts-announce/2018/01/msg00011.html
- Package : plexus-utils2
- plexus-utils2
- Opening url: https://lists.debian.org/debian-lts-announce/2018/01/msg00012.html
- Package : awstats
- awstats
- Opening url: https://lists.debian.org/debian-lts-announce/2018/01/msg00013.html
- Package : poco
- poco
- Opening url: https://lists.debian.org/debian-lts-announce/2018/01/msg00014.html
- Package : ming
- ming
- Opening url: https://lists.debian.org/debian-lts-announce/2018/01/msg00015.html
- Package : libkohana2-php
- libkohana2-php
- Opening url: https://lists.debian.org/debian-lts-announce/2018/01/msg00016.html
- Package : xmltooling
- xmltooling
- Opening url: https://lists.debian.org/debian-lts-announce/2018/01/msg00017.html
- Package : ca-certificates
- ca-certificates
- Opening url: https://lists.debian.org/debian-lts-announce/2018/01/msg00018.html
- Package : graphicsmagick
- graphicsmagick
- Opening url: https://lists.debian.org/debian-lts-announce/2018/01/msg00019.html
- Package : xbmc
- xbmc
- Opening url: https://lists.debian.org/debian-lts-announce/2018/01/msg00020.html
- Package : transmission
- transmission
- Opening url: https://lists.debian.org/debian-lts-announce/2018/01/msg00021.html
- Package : rsync
- rsync
- Opening url: https://lists.debian.org/debian-lts-announce/2018/01/msg00022.html
- Package : libgd2
- libgd2
- Opening url: https://lists.debian.org/debian-lts-announce/2018/01/msg00023.html
- Package : smarty3
- smarty3
- Opening url: https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html
- Package : mysql-5.5
- mysql-transitional
- Opening url: https://lists.debian.org/debian-lts-announce/2018/01/msg00025.html
- Package : php5
- php5
- Opening url: https://lists.debian.org/debian-lts-announce/2018/01/msg00026.html
- Package : couchdb
- couchdb
- Opening url: https://lists.debian.org/debian-lts-announce/2018/01/msg00027.html
- Package : openocd
- openocd
- Opening url: https://lists.debian.org/debian-lts-announce/2018/01/msg00028.html
- Package : lucene-solr
- lucene-solr
- Opening url: https://lists.debian.org/debian-lts-announce/2018/01/msg00029.html
- Package : bind9
- bind9
- Opening url: https://lists.debian.org/debian-lts-announce/2018/01/msg00030.html
- Package : firefox-esr
- firefox-esr
- Opening url: https://lists.debian.org/debian-lts-announce/2018/01/msg00031.html
- Package : openssh
- openssl
- Opening url: https://lists.debian.org/debian-lts-announce/2018/01/msg00032.html
- Package : wireshark
- wireshark
- Opening url: https://lists.debian.org/debian-lts-announce/2018/01/msg00033.html
- Package : tiff
- tiff
- Opening url: https://lists.debian.org/debian-lts-announce/2018/01/msg00034.html
- Package : tiff3
- tiff3
- Opening url: https://lists.debian.org/debian-lts-announce/2018/01/msg00035.html
- Package : clamav
- clamav
- Opening url: https://lists.debian.org/debian-lts-announce/2018/01/msg00036.html
- Package : thunderbird
- icedove
- Opening url: https://lists.debian.org/debian-lts-announce/2018/01/msg00037.html
- Package : debian-security-support
- debian-security-support
- Opening url: https://lists.debian.org/debian-lts-announce/2018/01/msg00038.html
- Package : curl
- curl
- Opening url: https://lists.debian.org/debian-lts-announce/2018/01/msg00039.html
- Package : unbound
- unbound
- Opening url: https://lists.debian.org/debian-lts-announce/2018/01/msg00040.html
- Package : krb5
- krb5
- Opening url: https://lists.debian.org/debian-lts-announce/2018/01/msg00041.html
- ['CVE-2017-17682', 'CVE-2017-17879', 'CVE-2017-17504', 'CVE-2017-17914', 'CVE-2017-1000456', 'CVE-2017-1000476', 'CVE-2017-1000445', 'CVE-2017-17044', 'CVE-2017-17566', 'CVE-2017-17564', 'CVE-2017-17565', 'CVE-2017-17563', 'CVE-2017-17045', 'CVE-2017-5754', 'CVE-2017-17806', 'CVE-2017-17741', 'CVE-2017-17807', 'CVE-2017-17805', 'CVE-2017-17558', 'CVE-2017-17912', 'CVE-2017-17503', 'CVE-2017-17500', 'CVE-2017-17915', 'CVE-2017-17782', 'CVE-2017-17498', 'CVE-2017-17501', 'CVE-2017-17502', 'CVE-2017-1000421', 'CVE-2017-1000422', 'CVE-2017-1000450', 'CVE-2017-17760', 'CVE-2017-1000487', 'CVE-2017-1000487', 'CVE-2017-1000501', 'CVE-2017-1000472', 'CVE-2017-16898', 'CVE-2017-16883', 'CVE-2017-11732', 'CVE-2016-10510', 'CVE-2018-0486', 'CVE-2018-5685', 'CVE-2017-8314', 'CVE-2018-5702', 'CVE-2018-5764', 'CVE-2018-5711', 'CVE-2017-1000480', 'CVE-2018-2562', 'CVE-2018-2640', 'CVE-2018-2665', 'CVE-2018-2622', 'CVE-2018-2668', 'CVE-2018-5712', 'CVE-2017-12635', 'CVE-2017-12636', 'CVE-2018-5704', 'CVE-2017-12629', 'CVE-2017-3145', 'CVE-2018-5091', 'CVE-2018-5089', 'CVE-2018-5097', 'CVE-2018-5117', 'CVE-2018-5096', 'CVE-2018-5103', 'CVE-2018-5104', 'CVE-2018-5095', 'CVE-2018-5098', 'CVE-2018-5102', 'CVE-2018-5099', 'CVE-2016-10708', 'CVE-2018-5334', 'CVE-2018-5336', 'CVE-2018-5335', 'CVE-2017-18013', 'CVE-2017-18013', 'CVE-2017-12380', 'CVE-2017-12376', 'CVE-2017-12375', 'CVE-2017-12379', 'CVE-2017-12377', 'CVE-2017-12374', 'CVE-2017-12378', 'CVE-2018-5089', 'CVE-2018-5097', 'CVE-2018-5117', 'CVE-2018-5096', 'CVE-2018-5103', 'CVE-2018-5104', 'CVE-2018-5095', 'CVE-2018-5098', 'CVE-2018-5102', 'CVE-2018-5099', 'CVE-2018-1000007', 'CVE-2017-15105', 'CVE-2014-5351', 'CVE-2014-5355', 'CVE-2016-3120', 'CVE-2016-3119', 'CVE-2013-1418', 'CVE-2014-5353']
- Opening url: https://lists.debian.org/debian-lts-announce/2018/02/msg00000.html
- Package : smarty3
- smarty3
- Opening url: https://lists.debian.org/debian-lts-announce/2018/02/msg00001.html
- Package : squid3
- squid3
- Opening url: https://lists.debian.org/debian-lts-announce/2018/02/msg00002.html
- Package : squid
- squid3
- Opening url: https://lists.debian.org/debian-lts-announce/2018/02/msg00003.html
- Package : p7zip
- p7zip
- Opening url: https://lists.debian.org/debian-lts-announce/2018/02/msg00004.html
- Package : dokuwiki
- dokuwiki
- Opening url: https://lists.debian.org/debian-lts-announce/2018/02/msg00005.html
- Package : xen
- xen
- Opening url: https://lists.debian.org/debian-lts-announce/2018/02/msg00006.html
- Package : postgresql-9.1
- postgresql-9.6
- Opening url: https://lists.debian.org/debian-lts-announce/2018/02/msg00007.html
- Package : mailman
- mailman
- Opening url: https://lists.debian.org/debian-lts-announce/2018/02/msg00008.html
- Package : simplesamlphp
- simplesamlphp
- Opening url: https://lists.debian.org/debian-lts-announce/2018/02/msg00009.html
- Package : exim4
- exim4
- Opening url: https://lists.debian.org/debian-lts-announce/2018/02/msg00010.html
- Package : uwsgi
- uwsgi
- Opening url: https://lists.debian.org/debian-lts-announce/2018/02/msg00011.html
- Package : tomcat-native
- tomcat-native
- Opening url: https://lists.debian.org/debian-lts-announce/2018/02/msg00012.html
- Package : audacity
- audacity
- Opening url: https://lists.debian.org/debian-lts-announce/2018/02/msg00013.html
- Package : librsvg
- librsvg
- Opening url: https://lists.debian.org/debian-lts-announce/2018/02/msg00014.html
- Package : clamav
- clamav
- Opening url: https://lists.debian.org/debian-lts-announce/2018/02/msg00015.html
- Package : pound
- pound
- Opening url: https://lists.debian.org/debian-lts-announce/2018/02/msg00016.html
- Package : advancecomp
- advancecomp
- Opening url: https://lists.debian.org/debian-lts-announce/2018/02/msg00017.html
- Package : graphicsmagick
- graphicsmagick
- Opening url: https://lists.debian.org/debian-lts-announce/2018/02/msg00018.html
- Package : python-crypto
- python-crypto
- Opening url: https://lists.debian.org/debian-lts-announce/2018/02/msg00019.html
- Package : leptonlib
- leptonlib
- Opening url: https://lists.debian.org/debian-lts-announce/2018/02/msg00020.html
- Package : bind9
- bind9
- Opening url: https://lists.debian.org/debian-lts-announce/2018/02/msg00021.html
- Package : quagga
- quagga
- Opening url: https://lists.debian.org/debian-lts-announce/2018/02/msg00022.html
- Package : zziplib
- zziplib
- Opening url: https://lists.debian.org/debian-lts-announce/2018/02/msg00023.html
- Package : cups
- cups
- Opening url: https://lists.debian.org/debian-lts-announce/2018/02/msg00024.html
- Package : irssi
- irssi
- Opening url: https://lists.debian.org/debian-lts-announce/2018/02/msg00025.html
- Package : libvpx
- libvpx
- Opening url: https://lists.debian.org/debian-lts-announce/2018/02/msg00026.html
- Package : tzdata
- tzdata
- Opening url: https://lists.debian.org/debian-lts-announce/2018/02/msg00027.html
- Package : libdatetime-timezone-perl
- libdatetime-timezone-perl
- Opening url: https://lists.debian.org/debian-lts-announce/2018/02/msg00028.html
- Package : imagemagick
- imagemagick
- Opening url: https://lists.debian.org/debian-lts-announce/2018/02/msg00029.html
- Package : golang
- golang
- Opening url: https://lists.debian.org/debian-lts-announce/2018/02/msg00030.html
- Package : drupal7
- drupal7
- Opening url: https://lists.debian.org/debian-lts-announce/2018/02/msg00031.html
- Package : xmltooling
- xmltooling
- Opening url: https://lists.debian.org/debian-lts-announce/2018/02/msg00032.html
- ['CVE-2017-1000480', 'CVE-2018-1000024', 'CVE-2018-1000027', 'CVE-2018-1000027', 'CVE-2017-17969', 'CVE-2017-18123', 'CVE-2017-2620', 'CVE-2017-15590', 'CVE-2016-9637', 'CVE-2016-9603', 'CVE-2018-1053', 'CVE-2018-5950', 'CVE-2018-6521', 'CVE-2017-18121', 'CVE-2017-18122', 'CVE-2018-6789', 'CVE-2018-6758', 'CVE-2017-15698', 'CVE-2016-2540', 'CVE-2018-1000041', 'CVE-2017-6419', 'CVE-2017-11423', 'CVE-2016-10711', 'CVE-2018-1056', 'CVE-2018-6799', 'CVE-2018-6594', 'CVE-2018-3836', 'CVE-2017-3139', 'CVE-2018-5735', 'CVE-2018-5379', 'CVE-2018-5378', 'CVE-2018-5381', 'CVE-2018-5380', 'CVE-2018-6869', 'CVE-2017-18190', 'CVE-2018-7051', 'CVE-2018-7050', 'CVE-2018-7052', 'CVE-2017-13194', 'CVE-2018-7443', 'CVE-2018-7187', 'CVE-2017-6927', 'CVE-2017-6932', 'CVE-2017-6929', 'CVE-2017-6928', 'CVE-2018-0489']
- Opening url: https://lists.debian.org/debian-lts-announce/2018/03/msg00000.html
- Package : freexl
- freexl
- Opening url: https://lists.debian.org/debian-lts-announce/2018/03/msg00001.html
- Package : simplesamlphp
- simplesamlphp
- Opening url: https://lists.debian.org/debian-lts-announce/2018/03/msg00002.html
- Package : libjgraphx-java
- libjgraphx-java
- Opening url: https://lists.debian.org/debian-lts-announce/2018/03/msg00003.html
- Package : xen
- xen
- Opening url: https://lists.debian.org/debian-lts-announce/2018/03/msg00004.html
- Package : tomcat7
- tomcat8
- Opening url: https://lists.debian.org/debian-lts-announce/2018/03/msg00005.html
- Package : leptonlib
- leptonlib
- Opening url: https://lists.debian.org/debian-lts-announce/2018/03/msg00006.html
- Package : python-django
- python-django
- Opening url: https://lists.debian.org/debian-lts-announce/2018/03/msg00007.html
- Package : zsh
- zsh
- Opening url: https://lists.debian.org/debian-lts-announce/2018/03/msg00008.html
- Package : ming
- ming
- Opening url: https://lists.debian.org/debian-lts-announce/2018/03/msg00009.html
- Package : vips
- vips
- Opening url: https://lists.debian.org/debian-lts-announce/2018/03/msg00010.html
- Package : firefox-esr
- firefox-esr
- Opening url: https://lists.debian.org/debian-lts-announce/2018/03/msg00011.html
- Package : clamav
- clamav
- Opening url: https://lists.debian.org/debian-lts-announce/2018/03/msg00012.html
- Package : curl
- curl
- Opening url: https://lists.debian.org/debian-lts-announce/2018/03/msg00013.html
- Package : exempi
- exempi
- Opening url: https://lists.debian.org/debian-lts-announce/2018/03/msg00014.html
- Package : adminer
- adminer
- Opening url: https://lists.debian.org/debian-lts-announce/2018/03/msg00015.html
- Package : isc-dhcp
- isc-dhcp
- Opening url: https://lists.debian.org/debian-lts-announce/2018/03/msg00016.html
- Package : libvorbisidec
- libvorbisidec
- Opening url: https://lists.debian.org/debian-lts-announce/2018/03/msg00017.html
- Package : simplesamlphp
- simplesamlphp
- Opening url: https://lists.debian.org/debian-lts-announce/2018/03/msg00018.html
- Package : libvirt
- libvirt
- Opening url: https://lists.debian.org/debian-lts-announce/2018/03/msg00019.html
- Package : freeplane
- freeplane
- Opening url: https://lists.debian.org/debian-lts-announce/2018/03/msg00020.html
- Package : net-snmp
- net-snmp
- Opening url: https://lists.debian.org/debian-lts-announce/2018/03/msg00021.html
- Package : irssi
- irssi
- Opening url: https://lists.debian.org/debian-lts-announce/2018/03/msg00022.html
- Package : firefox-esr
- firefox-esr
- Opening url: https://lists.debian.org/debian-lts-announce/2018/03/msg00023.html
- Package : firefox-esr
- firefox-esr
- Opening url: https://lists.debian.org/debian-lts-announce/2018/03/msg00024.html
- Package : samba
- samba
- Opening url: https://lists.debian.org/debian-lts-announce/2018/03/msg00025.html
- Package : graphicsmagick
- graphicsmagick
- Opening url: https://lists.debian.org/debian-lts-announce/2018/03/msg00026.html
- Package : tzdata
- tzdata
- Opening url: https://lists.debian.org/debian-lts-announce/2018/03/msg00027.html
- Package : libdatetime-timezone-perl
- libdatetime-timezone-perl
- Opening url: https://lists.debian.org/debian-lts-announce/2018/03/msg00028.html
- Package : drupal7
- drupal7
- Opening url: https://lists.debian.org/debian-lts-announce/2018/03/msg00029.html
- Package : thunderbird
- icedove
- Opening url: https://lists.debian.org/debian-lts-announce/2018/03/msg00030.html
- Package : php5
- php5
- Opening url: https://lists.debian.org/debian-lts-announce/2018/03/msg00031.html
- Package : memcached
- memcached
- Opening url: https://lists.debian.org/debian-lts-announce/2018/03/msg00032.html
- Package : xerces-c
- xerces-c
- Opening url: https://lists.debian.org/debian-lts-announce/2018/03/msg00033.html
- Package : openssl
- openssl
- Opening url: https://lists.debian.org/debian-lts-announce/2018/03/msg00034.html
- Package : mercurial
- mercurial
- Opening url: https://lists.debian.org/debian-lts-announce/2018/03/msg00035.html
- Package : libvncserver
- libvncserver
- Opening url: https://lists.debian.org/debian-lts-announce/2018/03/msg00036.html
- Package : dovecot
- dovecot
- Opening url: https://lists.debian.org/debian-lts-announce/2018/03/msg00037.html
- Package : mosquitto
- mosquitto
- Opening url: https://lists.debian.org/debian-lts-announce/2018/03/msg00038.html
- Package : zsh
- zsh
- Opening url: https://lists.debian.org/debian-lts-announce/2018/03/msg00039.html
- ['CVE-2018-7439', 'CVE-2018-7438', 'CVE-2018-7436', 'CVE-2018-7437', 'CVE-2018-7435', 'CVE-2016-9955', 'CVE-2016-9814', 'CVE-2017-18197', 'CVE-2018-7540', 'CVE-2018-7541', 'CVE-2018-1305', 'CVE-2018-1304', 'CVE-2018-7186', 'CVE-2018-3836', 'CVE-2018-7440', 'CVE-2018-7537', 'CVE-2018-7536', 'CVE-2014-10072', 'CVE-2014-10070', 'CVE-2016-10714', 'CVE-2014-10071', 'CVE-2017-18206', 'CVE-2018-6315', 'CVE-2018-6359', 'CVE-2018-5251', 'CVE-2018-5294', 'CVE-2018-7998', 'CVE-2018-5131', 'CVE-2018-5144', 'CVE-2018-5145', 'CVE-2018-5125', 'CVE-2018-5129', 'CVE-2018-5127', 'CVE-2018-5130', 'CVE-2018-1000085', 'CVE-2018-0202', 'CVE-2018-1000120', 'CVE-2018-1000121', 'CVE-2018-1000122', 'CVE-2017-18238', 'CVE-2018-7730', 'CVE-2017-18234', 'CVE-2018-7728', 'CVE-2017-18236', 'CVE-2017-18233', 'CVE-2018-7667', 'CVE-2018-5732', 'CVE-2018-5733', 'CVE-2018-5147', 'CVE-2018-7711', 'CVE-2018-7644', 'CVE-2018-5748', 'CVE-2018-1064', 'CVE-2018-1000069', 'CVE-2018-1000116', 'CVE-2018-7051', 'CVE-2018-5146', 'CVE-2018-5147', 'CVE-2018-5148', 'CVE-2018-1050', 'CVE-2017-18220', 'CVE-2017-18229', 'CVE-2017-18230', 'CVE-2018-9018', 'CVE-2017-11403', 'CVE-2017-18219', 'CVE-2017-18231', 'CVE-2018-7600', 'CVE-2018-5144', 'CVE-2018-5145', 'CVE-2018-5125', 'CVE-2018-5146', 'CVE-2018-5129', 'CVE-2018-5127', 'CVE-2018-7584', 'CVE-2018-1000127', 'CVE-2017-12627', 'CVE-2018-0739', 'CVE-2018-1000132', 'CVE-2018-7225', 'CVE-2017-14461', 'CVE-2017-15130', 'CVE-2017-15132', 'CVE-2017-7652', 'CVE-2017-7651', 'CVE-2018-1083', 'CVE-2018-1071']
- Opening url: https://lists.debian.org/debian-lts-announce/2018/04/msg00000.html
- Package : rubygems
- ruby2.3
- Opening url: https://lists.debian.org/debian-lts-announce/2018/04/msg00001.html
- Package : jruby
- jruby
- Opening url: https://lists.debian.org/debian-lts-announce/2018/04/msg00002.html
- Package : beep
- beep
- Opening url: https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html
- Package : openjdk-7
- openjdk-7
- Opening url: https://lists.debian.org/debian-lts-announce/2018/04/msg00004.html
- Package : sam2p
- sam2p
- Opening url: https://lists.debian.org/debian-lts-announce/2018/04/msg00005.html
- Package : sdl-image1.2
- sdl-image1.2
- Opening url: https://lists.debian.org/debian-lts-announce/2018/04/msg00006.html
- Package : python-crypto
- python-crypto
- Opening url: https://lists.debian.org/debian-lts-announce/2018/04/msg00007.html
- Package : ldap-account-manager
- ldap-account-manager
- Opening url: https://lists.debian.org/debian-lts-announce/2018/04/msg00008.html
- Package : ming
- ming
- Opening url: https://lists.debian.org/debian-lts-announce/2018/04/msg00009.html
- Package : perl
- perl
- Opening url: https://lists.debian.org/debian-lts-announce/2018/04/msg00010.html
- Package : tiff
- tiff
- Opening url: https://lists.debian.org/debian-lts-announce/2018/04/msg00011.html
- Package : tiff3
- tiff3
- Opening url: https://lists.debian.org/debian-lts-announce/2018/04/msg00012.html
- Package : squirrelmail
- squirrelmail
- Opening url: https://lists.debian.org/debian-lts-announce/2018/04/msg00013.html
- Package : patch
- patch
- Opening url: https://lists.debian.org/debian-lts-announce/2018/04/msg00014.html
- Package : linux-tools
- linux
- Opening url: https://lists.debian.org/debian-lts-announce/2018/04/msg00015.html
- Package : qemu-kvm
- qemu
- Opening url: https://lists.debian.org/debian-lts-announce/2018/04/msg00016.html
- Package : qemu
- qemu
- Opening url: https://lists.debian.org/debian-lts-announce/2018/04/msg00017.html
- Package : jruby
- jruby
- Opening url: https://lists.debian.org/debian-lts-announce/2018/04/msg00018.html
- Package : wireshark
- wireshark
- Opening url: https://lists.debian.org/debian-lts-announce/2018/04/msg00019.html
- Package : opencv
- opencv
- Opening url: https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html
- Package : mysql-5.5
- mysql-transitional
- Opening url: https://lists.debian.org/debian-lts-announce/2018/04/msg00021.html
- Package : libreoffice
- libreoffice
- Opening url: https://lists.debian.org/debian-lts-announce/2018/04/msg00022.html
- Package : gunicorn
- gunicorn
- Opening url: https://lists.debian.org/debian-lts-announce/2018/04/msg00023.html
- Package : ruby1.9.1
- ruby2.3
- Opening url: https://lists.debian.org/debian-lts-announce/2018/04/msg00024.html
- Package : ruby1.8
- ruby2.3
- Opening url: https://lists.debian.org/debian-lts-announce/2018/04/msg00025.html
- Package : lucene-solr
- lucene-solr
- Opening url: https://lists.debian.org/debian-lts-announce/2018/04/msg00026.html
- Package : psensor
- psensor
- Opening url: https://lists.debian.org/debian-lts-announce/2018/04/msg00027.html
- Package : gcc-4.9-backport
- gcc
- Opening url: https://lists.debian.org/debian-lts-announce/2018/04/msg00028.html
- Package : ghostscript
- ghostscript
- Opening url: https://lists.debian.org/debian-lts-announce/2018/04/msg00029.html
- Package : openslp-dfsg
- openslp-dfsg
- Opening url: https://lists.debian.org/debian-lts-announce/2018/04/msg00030.html
- Package : drupal7
- drupal7
- Opening url: https://lists.debian.org/debian-lts-announce/2018/04/msg00031.html
- Package : wordpress
- wordpress
- Opening url: https://lists.debian.org/debian-lts-announce/2018/04/msg00032.html
- Package : slurm-llnl
- slurm-llnl
- Opening url: https://lists.debian.org/debian-lts-announce/2018/04/msg00033.html
- Package : libvorbis
- libvorbis
- Opening url: https://lists.debian.org/debian-lts-announce/2018/04/msg00034.html
- ['CVE-2018-1000078', 'CVE-2018-1000076', 'CVE-2018-1000077', 'CVE-2018-1000075', 'CVE-2018-1000078', 'CVE-2018-1000076', 'CVE-2018-1000077', 'CVE-2018-1000075', 'CVE-2018-0492', 'CVE-2018-2603', 'CVE-2018-2629', 'CVE-2018-2637', 'CVE-2018-2602', 'CVE-2018-2641', 'CVE-2018-2678', 'CVE-2018-2663', 'CVE-2018-2634', 'CVE-2018-2677', 'CVE-2018-2618', 'CVE-2018-2588', 'CVE-2018-2579', 'CVE-2018-2599', 'CVE-2018-2633', 'CVE-2018-7487', 'CVE-2018-7551', 'CVE-2018-7552', 'CVE-2018-7553', 'CVE-2018-7554', 'CVE-2017-14441', 'CVE-2017-14440', 'CVE-2017-12122', 'CVE-2017-14450', 'CVE-2017-14442', 'CVE-2017-14448', 'CVE-2018-6594', 'CVE-2018-8763', 'CVE-2018-7868', 'CVE-2018-7867', 'CVE-2018-7872', 'CVE-2018-7875', 'CVE-2018-9165', 'CVE-2018-6358', 'CVE-2018-7870', 'CVE-2018-7871', 'CVE-2018-6913', 'CVE-2018-7456', 'CVE-2018-7456', 'CVE-2018-8741', 'CVE-2018-1000156', 'CVE-2017-5715', 'CVE-2018-7550', 'CVE-2018-7550', 'CVE-2018-1000074', 'CVE-2018-7420', 'CVE-2018-7324', 'CVE-2018-7419', 'CVE-2018-7417', 'CVE-2018-7336', 'CVE-2018-7418', 'CVE-2018-7323', 'CVE-2018-7332', 'CVE-2018-7337', 'CVE-2018-7334', 'CVE-2018-7322', 'CVE-2018-7335', 'CVE-2018-5269', 'CVE-2018-5268', 'CVE-2018-2781', 'CVE-2018-2773', 'CVE-2018-2813', 'CVE-2018-2761', 'CVE-2018-2817', 'CVE-2018-2818', 'CVE-2018-2819', 'CVE-2018-2771', 'CVE-2018-2755', 'CVE-2018-10120', 'CVE-2018-10119', 'CVE-2018-1000164', 'CVE-2018-8778', 'CVE-2018-6914', 'CVE-2018-8779', 'CVE-2017-17742', 'CVE-2018-8780', 'CVE-2018-1000078', 'CVE-2018-1000075', 'CVE-2018-8777', 'CVE-2018-1000076', 'CVE-2018-1000077', 'CVE-2018-8778', 'CVE-2018-6914', 'CVE-2018-8779', 'CVE-2017-17742', 'CVE-2018-8780', 'CVE-2018-8777', 'CVE-2018-1308', 'CVE-2014-10073', 'CVE-2017-5715', 'CVE-2018-10194', 'CVE-2017-17833', 'CVE-2018-7602', 'CVE-2018-10102', 'CVE-2018-10100', 'CVE-2018-7033', 'CVE-2017-11333', 'CVE-2017-14632', 'CVE-2017-14633', 'CVE-2018-5146']
- Opening url: https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html
- Package : linux
- linux
- Opening url: https://lists.debian.org/debian-lts-announce/2018/05/msg00001.html
- Package : quassel
- quassel
- Opening url: https://lists.debian.org/debian-lts-announce/2018/05/msg00002.html
- Package : tzdata
- tzdata
- Opening url: https://lists.debian.org/debian-lts-announce/2018/05/msg00003.html
- Package : libdatetime-timezone-perl
- libdatetime-timezone-perl
- Opening url: https://lists.debian.org/debian-lts-announce/2018/05/msg00004.html
- Package : php5
- php5
- Opening url: https://lists.debian.org/debian-lts-announce/2018/05/msg00005.html
- Package : firebird2.5
- firebird3.0
- Opening url: https://lists.debian.org/debian-lts-announce/2018/05/msg00006.html
- Package : wget
- wget
- Opening url: https://lists.debian.org/debian-lts-announce/2018/05/msg00007.html
- Package : firefox-esr
- firefox-esr
- Opening url: https://lists.debian.org/debian-lts-announce/2018/05/msg00008.html
- Package : tiff
- tiff
- Opening url: https://lists.debian.org/debian-lts-announce/2018/05/msg00009.html
- Package : tiff3
- tiff3
- Opening url: https://lists.debian.org/debian-lts-announce/2018/05/msg00010.html
- Package : curl
- curl
- Opening url: https://lists.debian.org/debian-lts-announce/2018/05/msg00011.html
- Package : libmad
- libmad
- Opening url: https://lists.debian.org/debian-lts-announce/2018/05/msg00012.html
- Package : imagemagick
- imagemagick
- Opening url: https://lists.debian.org/debian-lts-announce/2018/05/msg00013.html
- Package : thunderbird
- icedove
- Opening url: https://lists.debian.org/debian-lts-announce/2018/05/msg00014.html
- Package : xdg-utils
- xdg-utils
- Opening url: https://lists.debian.org/debian-lts-announce/2018/05/msg00015.html
- Package : xen
- xen
- Opening url: https://lists.debian.org/debian-lts-announce/2018/05/msg00016.html
- Package : batik
- batik
- Opening url: https://lists.debian.org/debian-lts-announce/2018/05/msg00017.html
- Package : ming
- ming
- Opening url: https://lists.debian.org/debian-lts-announce/2018/05/msg00018.html
- Package : cups
- cups
- Opening url: https://lists.debian.org/debian-lts-announce/2018/05/msg00019.html
- Package : wireshark
- wireshark
- Opening url: https://lists.debian.org/debian-lts-announce/2018/05/msg00020.html
- Package : apache2
- apache2
- Opening url: https://lists.debian.org/debian-lts-announce/2018/05/msg00021.html
- Package : procps
- procps
- Opening url: https://lists.debian.org/debian-lts-announce/2018/05/msg00022.html
- Package : tiff
- tiff
- Opening url: https://lists.debian.org/debian-lts-announce/2018/05/msg00023.html
- ['CVE-2018-7492', 'CVE-2017-18017', 'CVE-2017-16914', 'CVE-2018-6927', 'CVE-2018-7757', 'CVE-2018-5803', 'CVE-2018-5332', 'CVE-2018-7995', 'CVE-2018-8822', 'CVE-2018-1000199', 'CVE-2017-13166', 'CVE-2017-16913', 'CVE-2018-5333', 'CVE-2017-5753', 'CVE-2017-5715', 'CVE-2018-5750', 'CVE-2018-7740', 'CVE-2017-0861', 'CVE-2017-16911', 'CVE-2018-1068', 'CVE-2018-1000004', 'CVE-2018-7566', 'CVE-2018-1092', 'CVE-2017-18216', 'CVE-2017-16526', 'CVE-2017-16912', 'CVE-2018-8781', 'CVE-2017-18203', 'CVE-2018-1000178', 'CVE-2018-10547', 'CVE-2018-5712', 'CVE-2018-10545', 'CVE-2018-10548', 'CVE-2017-11509', 'CVE-2018-0494', 'CVE-2018-5157', 'CVE-2018-5155', 'CVE-2018-5150', 'CVE-2018-5154', 'CVE-2018-5183', 'CVE-2018-5178', 'CVE-2018-5168', 'CVE-2018-5159', 'CVE-2018-5158', 'CVE-2018-8905', 'CVE-2018-8905', 'CVE-2018-1000301', 'CVE-2017-8373', 'CVE-2017-8372', 'CVE-2017-8374', 'CVE-2018-11251', 'CVE-2017-18271', 'CVE-2017-18273', 'CVE-2018-5185', 'CVE-2018-5155', 'CVE-2018-5150', 'CVE-2018-5184', 'CVE-2018-5154', 'CVE-2018-5170', 'CVE-2018-5161', 'CVE-2018-5183', 'CVE-2018-5162', 'CVE-2018-5159', 'CVE-2018-5168', 'CVE-2018-5178', 'CVE-2017-18266', 'CVE-2018-10982', 'CVE-2018-10981', 'CVE-2018-8897', 'CVE-2018-8013', 'CVE-2018-9132', 'CVE-2018-9009', 'CVE-2018-7873', 'CVE-2018-7866', 'CVE-2018-7876', 'CVE-2017-18248', 'CVE-2018-9270', 'CVE-2018-9261', 'CVE-2018-9269', 'CVE-2018-9260', 'CVE-2018-9258', 'CVE-2018-11358', 'CVE-2018-9263', 'CVE-2018-9268', 'CVE-2018-11362', 'CVE-2018-1301', 'CVE-2018-1312', 'CVE-2017-15710', 'CVE-2018-1125', 'CVE-2018-1126', 'CVE-2018-1122', 'CVE-2018-1124', 'CVE-2018-1123', 'CVE-2018-5784', 'CVE-2017-11613']
- Opening url: https://lists.debian.org/debian-lts-announce/2018/06/msg00000.html
- Package : linux
- linux
- Opening url: https://lists.debian.org/debian-lts-announce/2018/06/msg00001.html
- <!-- MHonArc v2.6.19 -->
- <!--X-Subject: [SECURITY] [DLA 1393-1] Debian 7 Long Term Support reaching end-of-life -->
- <!--X-From-R13: [nexhf Ybfpunal <ncbNqrovna.bet> -->
- <!--X-Date: Fri, 1 Jun 2018 12:23:47 +0000 (UTC) -->
- <!--X-Message-Id: 1ab1517b-2631-e17f-2fee-b8dae336be87@debian.org -->
- <!--X-Content-Type: text/plain -->
- <!--X-Head-End-->
- <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"
- "http://www.w3.org/TR/html4/loose.dtd">
- <html>
- <head>
- <title>[SECURITY] [DLA 1393-1] Debian 7 Long Term Support reaching end-of-life</title>
- <link rev="made" href="mailto:apo@debian.org">
- <link rel="index" href="maillist.html">
- <link rel="top" href="threads.html">
- <link rel="up" href="msg00001.html">
- <link rel="prev" href="msg00000.html">
- <link rel="next" href="msg00002.html">
- <meta name="viewport" content="width=device-width, initial-scale=1">
- <style>
- pre {
- white-space: pre-wrap;
- }
- </style>
- </head>
- <body>
- <!--X-Body-Begin-->
- <!--X-User-Header-->
- <!--X-User-Header-End-->
- <!--X-TopPNI-->
- <hr>
- <form method="POST" action="/cgi-bin/spam-report.pl">
- <input type="hidden" name="listname" value="debian-lts-announce" />
- <input type="hidden" name="msg" value="msg00001.html" />
- <input type="hidden" name="date" value="2018/06" />
- <input type="submit" value="Report as spam" style="float: right" />
- [<a href="msg00000.html">Date Prev</a>][<a href="msg00002.html">Date Next</a>]
- [<a href="msg00000.html">Thread Prev</a>][<a href="msg00002.html">Thread Next</a>]
- [<a href="maillist.html#00001">Date Index</a>]
- [<a href="threads.html#00001">Thread Index</a>]
- </form>
- <!--X-TopPNI-End-->
- <!--X-MsgBody-->
- <!--X-Subject-Header-Begin-->
- <h1>[SECURITY] [DLA 1393-1] Debian 7 Long Term Support reaching end-of-life</h1>
- <hr>
- <!--X-Subject-Header-End-->
- <!--X-Head-of-Message-->
- <ul>
- <li><em>To</em>: <a href="mailto:debian-lts-announce%40lists.debian.org">debian-lts-announce@lists.debian.org</a></li>
- <li><em>Subject</em>: [SECURITY] [DLA 1393-1] Debian 7 Long Term Support reaching end-of-life</li>
- <li><em>From</em>: Markus Koschany <<a href="mailto:apo%40debian.org">apo@debian.org</a>></li>
- <li><em>Date</em>: Fri, 1 Jun 2018 14:23:28 +0200</li>
- <li><em>Message-id</em>: <<A HREF="/msgid-search/1ab1517b-2631-e17f-2fee-b8dae336be87@debian.org">[🔎]</a> <a href="msg00001.html">1ab1517b-2631-e17f-2fee-b8dae336be87@debian.org</A>></li>
- <li><em>Mail-followup-to</em>: <a href="mailto:debian-lts%40lists.debian.org">debian-lts@lists.debian.org</a></li>
- <li><em>Reply-to</em>: <a href="mailto:debian-lts%40lists.debian.org">debian-lts@lists.debian.org</a></li>
- </ul>
- <!--X-Head-of-Message-End-->
- <!--X-Head-Body-Sep-Begin-->
- <hr>
- <!--X-Head-Body-Sep-End-->
- <!--X-Body-of-Message-->
- <pre>-----BEGIN PGP SIGNED MESSAGE-----
- Hash: SHA512
- The Debian Long Term Support (LTS) Team hereby announces that Debian 7
- "Wheezy" support has reached its end-of-life on May 31, 2018,
- five years after its initial release on May 4, 2013.
- Debian will not provide further security updates for Debian 7. A
- subset of Wheezy packages will be supported by external parties.
- Detailed information can be found at [Extended LTS].
- The LTS Team will prepare the transition to Debian 8 "Jessie", which
- is the current oldstable release. The LTS team will take over support
- from the Security Team on June 17, 2018.
- Debian 8 will also receive Long Term Support for five years after its
- initial release with support ending on June 30, 2020. The supported
- architectures include amd64, i386, armel and armhf.
- For further information about using Jessie LTS and upgrading from Wheezy
- LTS, please refer to [LTS/Using].
- Debian and its LTS Team would like to thank all contributing users,
- developers and sponsors who are making it possible to extend the life
- of previous stable releases, and who have made this LTS a success.
- If you rely on Debian LTS, please consider [joining the team],
- providing patches, testing or [funding the efforts].
- More information about Debian Long Term Support can be found at
- <a rel="nofollow" href="https://wiki.debian.org/LTS/">https://wiki.debian.org/LTS/</a>.
- [Extended LTS] <a rel="nofollow" href="https://wiki.debian.org/LTS/Extended">https://wiki.debian.org/LTS/Extended</a>
- [LTS/Using] <a rel="nofollow" href="https://wiki.debian.org/LTS/Using">https://wiki.debian.org/LTS/Using</a>
- [joining the team] <a rel="nofollow" href="https://wiki.debian.org/LTS/Development">https://wiki.debian.org/LTS/Development</a>
- [funding the efforts] <a rel="nofollow" href="https://wiki.debian.org/LTS/Funding">https://wiki.debian.org/LTS/Funding</a>
- -----BEGIN PGP SIGNATURE-----
- iQKTBAEBCgB9FiEErPPQiO8y7e9qGoNf2a0UuVE7UeQFAlsROsBfFIAAAAAALgAo
- aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEFD
- RjNEMDg4RUYzMkVERUY2QTFBODM1RkQ5QUQxNEI5NTEzQjUxRTQACgkQ2a0UuVE7
- UeR9dA//XrZnrZjAEdp/7zFQ+bXn6D5M5SVuCFKrhUaztv7ScSomPw3Hzvr78zfv
- WL6HnFlg+z+GBhDjmd9QjhQPAbtzdktd+7T5pyj1Q2ZPblqYklxR3Vyd9lUStcFH
- WNI8bgfSzTcICeQ7GUrTuZ1dfBBm6DrkcjU/QFjr4g1wTZ7INPThVLh3bHgtkVXk
- Aa7S9+6+k28HpxvLYqh2uIMl50l7tHs/Fxr082BvMOD4rb7nq+9ad9+Jt8S7s/FT
- Qk1Exx6mUgnguTiUvkDZh+x78N/bxEkpCtcLU/pNdwjNJl+apsZE8/imZaKlyrNv
- TksEgw7yJaxnug3YeceoJx829MCqpUOmoRbnVybUekBmLINyp+9DofezeU+WZ07e
- K49jrpqcKWk+/bM/siAoCM/oanCaJqxnfDP0HstzIPzC6l2Jprdf5IQOgUD6zc7f
- YQSQlYQDTMOh0pmsvBQvgbPLj559NeYAtmu/eZrVaGPHt5qDlgKnuQ4772vCmgT3
- y/lFurDtHy+O7wMSpD7/Zq64huZfXQhmE8jFJkESIGjhU6+17C51NS/9jH7QZ3H/
- qfl2DKEwriFNViIWi/7FoShcW3hVPKrvlWYQOuP/sdZGP9haBSo3tbJDlV+9tJbS
- yzp7MaTS6yQeXjjXVOH3I17OXah9b3RpZ5RBTNiQgS571fp9LCQ=
- =dziI
- -----END PGP SIGNATURE-----
- </pre>
- <!--X-Body-of-Message-End-->
- <!--X-MsgBody-End-->
- <!--X-Follow-Ups-->
- <hr />
- <strong>Reply to:</strong>
- <ul>
- <li><a href="mailto:debian-lts-announce@lists.debian.org?in-reply-to=<1ab1517b-2631-e17f-2fee-b8dae336be87@debian.org>&subject=Re:%20[SECURITY] [DLA 1393-1] Debian 7 Long Term Support reaching end-of-life">debian-lts-announce@lists.debian.org</a></li>
- <li><a href="mailto:apo@debian.org?in-reply-to=<1ab1517b-2631-e17f-2fee-b8dae336be87@debian.org>&subject=Re:%20[SECURITY] [DLA 1393-1] Debian 7 Long Term Support reaching end-of-life&cc=debian-lts-announce@lists.debian.org">Markus Koschany (on-list)</a></li>
- <li><a href="mailto:apo@debian.org?in-reply-to=<1ab1517b-2631-e17f-2fee-b8dae336be87@debian.org>&subject=Re:%20[SECURITY] [DLA 1393-1] Debian 7 Long Term Support reaching end-of-life">Markus Koschany (off-list)</a></li>
- </ul>
- <hr />
- <!--X-Follow-Ups-End-->
- <!--X-References-->
- <!--X-References-End-->
- <!--X-BotPNI-->
- <ul>
- <li>Prev by Date:
- <strong><a href="msg00000.html">[SECURITY] [DLA 1392-1] linux security update</a></strong>
- </li>
- <li>Next by Date:
- <strong><a href="msg00002.html">[SECURITY] [DLA 1395-1] php-horde-image security update</a></strong>
- </li>
- <li>Previous by thread:
- <strong><a href="msg00000.html">[SECURITY] [DLA 1392-1] linux security update</a></strong>
- </li>
- <li>Next by thread:
- <strong><a href="msg00002.html">[SECURITY] [DLA 1395-1] php-horde-image security update</a></strong>
- </li>
- <li>Index(es):
- <ul>
- <li><a href="maillist.html#00001"><strong>Date</strong></a></li>
- <li><a href="threads.html#00001"><strong>Thread</strong></a></li>
- </ul>
- </li>
- </ul>
- <!--X-BotPNI-End-->
- <!--X-User-Footer-->
- <!--X-User-Footer-End-->
- </body>
- </html>
- Problem with
- None
- ################################################################################
- Opening url: https://lists.debian.org/debian-lts-announce/2018/06/msg00002.html
- Package : php-horde-image
- php-horde-image
- Opening url: https://lists.debian.org/debian-lts-announce/2018/06/msg00003.html
- Package : redis
- redis
- Opening url: https://lists.debian.org/debian-lts-announce/2018/06/msg00004.html
- Package : imagemagick
- imagemagick
- Opening url: https://lists.debian.org/debian-lts-announce/2018/06/msg00005.html
- Package : php5
- php5
- Opening url: https://lists.debian.org/debian-lts-announce/2018/06/msg00006.html
- Package : php-horde-crypt
- php-horde-crypt
- Opening url: https://lists.debian.org/debian-lts-announce/2018/06/msg00007.html
- Package : ruby-passenger
- ruby2.3
- Opening url: https://lists.debian.org/debian-lts-announce/2018/06/msg00008.html
- Package : tomcat7
- tomcat8
- Opening url: https://lists.debian.org/debian-lts-announce/2018/06/msg00009.html
- Package : graphicsmagick
- graphicsmagick
- Opening url: https://lists.debian.org/debian-lts-announce/2018/06/msg00010.html
- Package : exiv2
- exiv2
- Opening url: https://lists.debian.org/debian-lts-announce/2018/06/msg00011.html
- Package : lava-server
- lava-server
- Opening url: https://lists.debian.org/debian-lts-announce/2018/06/msg00012.html
- Package : zendframework
- zendframework
- Opening url: https://lists.debian.org/debian-lts-announce/2018/06/msg00013.html
- Package : libgcrypt20
- libgcrypt20
- Opening url: https://lists.debian.org/debian-lts-announce/2018/06/msg00014.html
- Package : firefox-esr
- firefox-esr
- Opening url: https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
- Package : mariadb-10.0
- mariadb-10.1
- Opening url: https://lists.debian.org/debian-lts-announce/2018/06/msg00016.html
- Package : mosquitto
- mosquitto
- Opening url: https://lists.debian.org/debian-lts-announce/2018/06/msg00017.html
- Package : simplesamlphp
- simplesamlphp
- Opening url: https://lists.debian.org/debian-lts-announce/2018/06/msg00018.html
- ['CVE-2018-10940', 'CVE-2018-1130', 'CVE-2018-8897', 'CVE-2018-1093', 'CVE-2017-14650', 'CVE-2017-9774', 'CVE-2018-12326', 'CVE-2018-11218', 'CVE-2018-11219', 'CVE-2018-12599', 'CVE-2018-12600', 'CVE-2018-11251', 'CVE-2018-10545', 'CVE-2018-10546', 'CVE-2018-10549', 'CVE-2018-5712', 'CVE-2018-10547', 'CVE-2018-7584', 'CVE-2018-10548', 'CVE-2017-7413', 'CVE-2017-7414', 'CVE-2015-7519', 'CVE-2018-12029', 'CVE-2017-12616', 'CVE-2018-8014', 'CVE-2018-1304', 'CVE-2018-1305', 'CVE-2017-7674', 'CVE-2017-17498', 'CVE-2016-7448', 'CVE-2017-17502', 'CVE-2016-7446', 'CVE-2017-16353', 'CVE-2017-13064', 'CVE-2016-7447', 'CVE-2017-11636', 'CVE-2017-17912', 'CVE-2017-16669', 'CVE-2017-14733', 'CVE-2016-3716', 'CVE-2017-11643', 'CVE-2017-17915', 'CVE-2016-3717', 'CVE-2017-14314', 'CVE-2017-13134', 'CVE-2016-7449', 'CVE-2016-3718', 'CVE-2017-12937', 'CVE-2016-5241', 'CVE-2017-17503', 'CVE-2017-13063', 'CVE-2017-17500', 'CVE-2017-17782', 'CVE-2017-17501', 'CVE-2017-13065', 'CVE-2018-10998', 'CVE-2018-10958', 'CVE-2018-12264', 'CVE-2018-12265', 'CVE-2018-11531', 'CVE-2018-10999', 'CVE-2018-12564', 'CVE-2016-4861', 'CVE-2018-0495', 'CVE-2018-12360', 'CVE-2018-5188', 'CVE-2018-12362', 'CVE-2018-12359', 'CVE-2018-12366', 'CVE-2018-12365', 'CVE-2018-5156', 'CVE-2018-12363', 'CVE-2018-12364', 'CVE-2018-2612', 'CVE-2018-2781', 'CVE-2017-10268', 'CVE-2017-10378', 'CVE-2018-2562', 'CVE-2018-2640', 'CVE-2018-2761', 'CVE-2018-2813', 'CVE-2018-2817', 'CVE-2018-2819', 'CVE-2018-2784', 'CVE-2018-2782', 'CVE-2018-2665', 'CVE-2018-2622', 'CVE-2018-2771', 'CVE-2018-2766', 'CVE-2018-2787', 'CVE-2018-2755', 'CVE-2018-2668', 'CVE-2017-7652', 'CVE-2017-7651', 'CVE-2017-12872', 'CVE-2017-12868']
- Opening url: https://lists.debian.org/debian-lts-announce/2018/07/msg00000.html
- Package : python-pysaml2
- python-pysaml2
- Opening url: https://lists.debian.org/debian-lts-announce/2018/07/msg00001.html
- Package : tomcat7
- tomcat8
- Opening url: https://lists.debian.org/debian-lts-announce/2018/07/msg00002.html
- Package : tiff
- tiff
- Opening url: https://lists.debian.org/debian-lts-announce/2018/07/msg00003.html
- Package : cups
- cups
- Opening url: https://lists.debian.org/debian-lts-announce/2018/07/msg00004.html
- Package : dokuwiki
- dokuwiki
- Opening url: https://lists.debian.org/debian-lts-announce/2018/07/msg00005.html
- Package : mercurial
- mercurial
- Opening url: https://lists.debian.org/debian-lts-announce/2018/07/msg00006.html
- Package : phpmyadmin
- phpmyadmin
- Opening url: https://lists.debian.org/debian-lts-announce/2018/07/msg00007.html
- Package : libsoup2.4
- libsoup2.4
- Opening url: https://lists.debian.org/debian-lts-announce/2018/07/msg00008.html
- Package : ca-certificates
- ca-certificates
- Opening url: https://lists.debian.org/debian-lts-announce/2018/07/msg00009.html
- Package : bouncycastle
- bouncycastle
- Opening url: https://lists.debian.org/debian-lts-announce/2018/07/msg00010.html
- Package : ruby-sprockets
- ruby2.3
- Opening url: https://lists.debian.org/debian-lts-announce/2018/07/msg00011.html
- Package : cinnamon
- cinnamon
- Opening url: https://lists.debian.org/debian-lts-announce/2018/07/msg00012.html
- Package : ruby2.1
- ruby2.3
- Opening url: https://lists.debian.org/debian-lts-announce/2018/07/msg00013.html
- Package : thunderbird
- icedove
- Opening url: https://lists.debian.org/debian-lts-announce/2018/07/msg00014.html
- Package : cups
- cups
- Opening url: https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html
- Package : linux
- linux
- Opening url: https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html
- Package : linux
- linux
- Opening url: https://lists.debian.org/debian-lts-announce/2018/07/msg00017.html
- Package : znc
- znc
- Opening url: https://lists.debian.org/debian-lts-announce/2018/07/msg00018.html
- Package : 389-ds-base
- 389-ds-base
- Opening url: https://lists.debian.org/debian-lts-announce/2018/07/msg00019.html
- Package : sssd
- sssd
- Opening url: https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html
- Package : linux-4.9
- linux
- Opening url: https://lists.debian.org/debian-lts-announce/2018/07/msg00021.html
- Package : linux-latest-4.9
- linux
- Opening url: https://lists.debian.org/debian-lts-announce/2018/07/msg00022.html
- Package : taglib
- taglib
- Opening url: https://lists.debian.org/debian-lts-announce/2018/07/msg00023.html
- Package : ant
- ant
- Opening url: https://lists.debian.org/debian-lts-announce/2018/07/msg00024.html
- Package : gpac
- gpac
- Opening url: https://lists.debian.org/debian-lts-announce/2018/07/msg00025.html
- Package : openjpeg2
- openjpeg2
- Opening url: https://lists.debian.org/debian-lts-announce/2018/07/msg00026.html
- Package : linux-base
- linux
- Opening url: https://lists.debian.org/debian-lts-announce/2018/07/msg00027.html
- Package : dnsmasq
- dnsmasq
- Opening url: https://lists.debian.org/debian-lts-announce/2018/07/msg00028.html
- Package : gosa
- gosa
- Opening url: https://lists.debian.org/debian-lts-announce/2018/07/msg00029.html
- Package : slurm-llnl
- slurm-llnl
- Opening url: https://lists.debian.org/debian-lts-announce/2018/07/msg00030.html
- Package : opencv
- opencv
- Opening url: https://lists.debian.org/debian-lts-announce/2018/07/msg00031.html
- Package : resiprocate
- resiprocate
- Opening url: https://lists.debian.org/debian-lts-announce/2018/07/msg00032.html
- Package : libarchive-zip-perl
- libarchive-zip-perl
- Opening url: https://lists.debian.org/debian-lts-announce/2018/07/msg00033.html
- Package : sympa
- sympa
- Opening url: https://lists.debian.org/debian-lts-announce/2018/07/msg00034.html
- Package : mailman
- mailman
- Opening url: https://lists.debian.org/debian-lts-announce/2018/07/msg00035.html
- Package : evolution-data-server
- evolution-data-server
- Opening url: https://lists.debian.org/debian-lts-announce/2018/07/msg00036.html
- Package : vim-syntastic
- vim-syntastic
- Opening url: https://lists.debian.org/debian-lts-announce/2018/07/msg00037.html
- Package : busybox
- busybox
- Opening url: https://lists.debian.org/debian-lts-announce/2018/07/msg00038.html
- Package : intel-microcode
- intel-microcode
- Opening url: https://lists.debian.org/debian-lts-announce/2018/07/msg00039.html
- Package : mailman
- mailman
- Opening url: https://lists.debian.org/debian-lts-announce/2018/07/msg00040.html
- Package : libidn
- libidn
- Opening url: https://lists.debian.org/debian-lts-announce/2018/07/msg00041.html
- Package : mercurial
- mercurial
- Opening url: https://lists.debian.org/debian-lts-announce/2018/07/msg00042.html
- Package : policykit-1
- policykit-1
- Opening url: https://lists.debian.org/debian-lts-announce/2018/07/msg00043.html
- Package : openssl
- openssl
- Opening url: https://lists.debian.org/debian-lts-announce/2018/07/msg00044.html
- Package : tomcat8
- tomcat8
- Opening url: https://lists.debian.org/debian-lts-announce/2018/07/msg00045.html
- Package : wireshark
- wireshark
- Opening url: https://lists.debian.org/debian-lts-announce/2018/07/msg00046.html
- Package : wordpress
- wordpress
- Opening url: https://lists.debian.org/debian-lts-announce/2018/07/msg00047.html
- Package : tomcat7
- tomcat8
- Opening url: https://lists.debian.org/debian-lts-announce/2018/07/msg00048.html
- Package : network-manager-vpnc
- network-manager-vpnc
- Opening url: https://lists.debian.org/debian-lts-announce/2018/07/msg00049.html
- ['CVE-2017-1000433', 'CVE-2018-5784', 'CVE-2018-7456', 'CVE-2018-10963', 'CVE-2018-8905', 'CVE-2017-13726', 'CVE-2017-18013', 'CVE-2017-11613', 'CVE-2017-18248', 'CVE-2017-18190', 'CVE-2017-18123', 'CVE-2017-17458', 'CVE-2017-9462', 'CVE-2018-1000132', 'CVE-2016-6622', 'CVE-2016-6609', 'CVE-2016-6616', 'CVE-2016-6618', 'CVE-2016-6615', 'CVE-2016-6621', 'CVE-2016-9865', 'CVE-2016-6614', 'CVE-2016-6620', 'CVE-2017-18264', 'CVE-2016-6619', 'CVE-2018-12910', 'CVE-2016-1000338', 'CVE-2016-1000339', 'CVE-2016-1000342', 'CVE-2016-1000345', 'CVE-2016-1000346', 'CVE-2016-1000341', 'CVE-2016-1000343', 'CVE-2018-3760', 'CVE-2018-13054', 'CVE-2018-6914', 'CVE-2017-0901', 'CVE-2017-0898', 'CVE-2017-0900', 'CVE-2017-0902', 'CVE-2015-9096', 'CVE-2018-8777', 'CVE-2016-2339', 'CVE-2018-8779', 'CVE-2018-1000078', 'CVE-2018-1000079', 'CVE-2017-14033', 'CVE-2018-1000075', 'CVE-2016-7798', 'CVE-2018-1000076', 'CVE-2017-0903', 'CVE-2017-17790', 'CVE-2018-8780', 'CVE-2017-17405', 'CVE-2018-1000077', 'CVE-2018-8778', 'CVE-2017-14064', 'CVE-2017-0899', 'CVE-2017-17742', 'CVE-2017-10784', 'CVE-2018-12374', 'CVE-2018-12372', 'CVE-2018-12360', 'CVE-2018-5188', 'CVE-2018-12362', 'CVE-2018-12359', 'CVE-2018-12366', 'CVE-2018-12365', 'CVE-2018-12363', 'CVE-2018-12364', 'CVE-2018-12373', 'CVE-2018-4181', 'CVE-2018-6553', 'CVE-2018-4180', 'CVE-2018-10940', 'CVE-2018-9422', 'CVE-2018-12233', 'CVE-2018-1000204', 'CVE-2018-5814', 'CVE-2018-1093', 'CVE-2018-1066', 'CVE-2018-10853', 'CVE-2017-5753', 'CVE-2018-3665', 'CVE-2017-5715', 'CVE-2018-1130', 'CVE-2018-11506', 'CVE-2018-10940', 'CVE-2018-9422', 'CVE-2018-12233', 'CVE-2018-1000204', 'CVE-2018-5814', 'CVE-2018-1093', 'CVE-2018-1066', 'CVE-2018-10853', 'CVE-2017-5753', 'CVE-2018-3665', 'CVE-2017-5715', 'CVE-2018-1130', 'CVE-2018-11506', 'CVE-2018-14056', 'CVE-2018-14055', 'CVE-2018-1054', 'CVE-2017-15134', 'CVE-2018-1089', 'CVE-2015-1854', 'CVE-2018-10850', 'CVE-2018-10852', 'CVE-2018-1120', 'CVE-2018-10124', 'CVE-2018-10087', 'CVE-2018-10883', 'CVE-2018-10880', 'CVE-2017-5753', 'CVE-2018-10877', 'CVE-2018-11506', 'CVE-2018-10878', 'CVE-2018-10940', 'CVE-2018-12233', 'CVE-2018-1118', 'CVE-2018-1000204', 'CVE-2017-18255', 'CVE-2018-10882', 'CVE-2018-3639', 'CVE-2018-1130', 'CVE-2018-10881', 'CVE-2018-5814', 'CVE-2018-10853', 'CVE-2018-10876', 'CVE-2018-10021', 'CVE-2018-10879', 'CVE-2018-11439', 'CVE-2018-10886', 'CVE-2018-13005', 'CVE-2018-13006', 'CVE-2015-1239', 'CVE-2016-5139', 'CVE-2018-1000528', 'CVE-2018-7033', 'CVE-2018-10995', 'CVE-2016-1516', 'CVE-2017-12603', 'CVE-2017-12598', 'CVE-2017-14136', 'CVE-2017-12862', 'CVE-2017-12601', 'CVE-2017-1000450', 'CVE-2018-5269', 'CVE-2017-12605', 'CVE-2017-12599', 'CVE-2017-12606', 'CVE-2017-12863', 'CVE-2017-12864', 'CVE-2017-12597', 'CVE-2017-12604', 'CVE-2017-17760', 'CVE-2018-5268', 'CVE-2018-12584', 'CVE-2017-11521', 'CVE-2018-10860', 'CVE-2018-1000550', 'CVE-2018-0618', 'CVE-2018-13796', 'CVE-2016-10727', 'CVE-2018-11319', 'CVE-2015-9261', 'CVE-2011-5325', 'CVE-2016-2147', 'CVE-2017-15873', 'CVE-2016-2148', 'CVE-2017-16544', 'CVE-2014-4607', 'CVE-2015-9621', 'CVE-2013-1813', 'CVE-2018-1000517', 'CVE-2014-9645', 'CVE-2018-3640', 'CVE-2018-3639', 'CVE-2018-13796', 'CVE-2017-14062', 'CVE-2017-17458', 'CVE-2018-1116', 'CVE-2018-0737', 'CVE-2018-0732', 'CVE-2018-1305', 'CVE-2018-1304', 'CVE-2018-14343', 'CVE-2018-14342', 'CVE-2018-14341', 'CVE-2018-14368', 'CVE-2018-14340', 'CVE-2018-14339', 'CVE-2018-14369', 'CVE-2016-5836', 'CVE-2018-12895', 'CVE-2018-8034', 'CVE-2018-10900']
- Opening url: https://lists.debian.org/debian-lts-announce/2018/08/msg00000.html
- Package : busybox
- busybox
- Opening url: https://lists.debian.org/debian-lts-announce/2018/08/msg00001.html
- Package : mutt
- mutt
- Opening url: https://lists.debian.org/debian-lts-announce/2018/08/msg00002.html
- Package : graphicsmagick
- graphicsmagick
- Opening url: https://lists.debian.org/debian-lts-announce/2018/08/msg00003.html
- Package : busybox
- busybox
- Opening url: https://lists.debian.org/debian-lts-announce/2018/08/msg00004.html
- Package : ant
- ant
- Opening url: https://lists.debian.org/debian-lts-announce/2018/08/msg00005.html
- Package : cgit
- cgit
- Opening url: https://lists.debian.org/debian-lts-announce/2018/08/msg00006.html
- Package : xml-security-c
- xml-security-c
- Opening url: https://lists.debian.org/debian-lts-announce/2018/08/msg00007.html
- Package : libmspack
- libmspack
- Opening url: https://lists.debian.org/debian-lts-announce/2018/08/msg00008.html
- Package : slurm-llnl
- slurm-llnl
- Opening url: https://lists.debian.org/debian-lts-announce/2018/08/msg00009.html
- Package : wpa
- wpa
- Opening url: https://lists.debian.org/debian-lts-announce/2018/08/msg00010.html
- Package : sam2p
- sam2p
- Opening url: https://lists.debian.org/debian-lts-announce/2018/08/msg00011.html
- Package : blender
- blender
- Opening url: https://lists.debian.org/debian-lts-announce/2018/08/msg00012.html
- Package : postgresql-9.4
- postgresql-9.6
- Opening url: https://lists.debian.org/debian-lts-announce/2018/08/msg00013.html
- Package : ruby-zip
- ruby2.3
- Opening url: https://lists.debian.org/debian-lts-announce/2018/08/msg00014.html
- Package : linux-4.9
- linux
- Opening url: https://lists.debian.org/debian-lts-announce/2018/08/msg00015.html
- Package : fuse
- fuse
- Opening url: https://lists.debian.org/debian-lts-announce/2018/08/msg00016.html
- Package : libxcursor
- libxcursor
- Opening url: https://lists.debian.org/debian-lts-announce/2018/08/msg00017.html
- Package : confuse
- confuse
- Opening url: https://lists.debian.org/debian-lts-announce/2018/08/msg00018.html
- Package : kamailio
- kamailio
- Opening url: https://lists.debian.org/debian-lts-announce/2018/08/msg00019.html
- Package : libcgroup
- libcgroup
- Opening url: https://lists.debian.org/debian-lts-announce/2018/08/msg00020.html
- Package : clamav
- clamav
- Opening url: https://lists.debian.org/debian-lts-announce/2018/08/msg00021.html
- Package : otrs2
- otrs2
- Opening url: https://lists.debian.org/debian-lts-announce/2018/08/msg00022.html
- Package : openssh
- openssl
- Opening url: https://lists.debian.org/debian-lts-announce/2018/08/msg00023.html
- Package : tomcat-native
- tomcat-native
- Opening url: https://lists.debian.org/debian-lts-announce/2018/08/msg00024.html
- Package : libgit2
- libgit2
- Opening url: https://lists.debian.org/debian-lts-announce/2018/08/msg00025.html
- Package : libextractor
- libextractor
- Opening url: https://lists.debian.org/debian-lts-announce/2018/08/msg00026.html
- Package : dropbear
- dropbear
- Opening url: https://lists.debian.org/debian-lts-announce/2018/08/msg00027.html
- Package : twitter-bootstrap3
- twitter-bootstrap3
- Opening url: https://lists.debian.org/debian-lts-announce/2018/08/msg00028.html
- Package : ruby2.1
- ruby2.3
- Opening url: https://lists.debian.org/debian-lts-announce/2018/08/msg00029.html
- Package : linux-4.9
- linux
- Opening url: https://lists.debian.org/debian-lts-announce/2018/08/msg00030.html
- Package : libx11
- libx11
- Opening url: https://lists.debian.org/debian-lts-announce/2018/08/msg00031.html
- Package : squirrelmail
- squirrelmail
- Opening url: https://lists.debian.org/debian-lts-announce/2018/08/msg00032.html
- Package : 389-ds-base
- 389-ds-base
- Opening url: https://lists.debian.org/debian-lts-announce/2018/08/msg00033.html
- Package : bind9
- bind9
- Opening url: https://lists.debian.org/debian-lts-announce/2018/08/msg00034.html
- Package : libtirpc
- libtirpc
- Opening url: https://lists.debian.org/debian-lts-announce/2018/08/msg00035.html
- Package : spice
- spice
- Opening url: https://lists.debian.org/debian-lts-announce/2018/08/msg00036.html
- Package : mariadb-10.0
- mariadb-10.1
- Opening url: https://lists.debian.org/debian-lts-announce/2018/08/msg00037.html
- Package : spice
- spice
- Opening url: https://lists.debian.org/debian-lts-announce/2018/08/msg00038.html
- Package : spice-gtk
- spice-gtk
- Opening url: https://lists.debian.org/debian-lts-announce/2018/08/msg00039.html
- ['CVE-2015-9261', 'CVE-2018-14350', 'CVE-2018-14360', 'CVE-2018-14349', 'CVE-2018-14354', 'CVE-2018-14358', 'CVE-2018-14356', 'CVE-2018-14357', 'CVE-2018-14351', 'CVE-2018-14362', 'CVE-2018-14361', 'CVE-2018-14352', 'CVE-2018-14363', 'CVE-2018-14353', 'CVE-2018-14359', 'CVE-2018-14355', 'CVE-2017-13777', 'CVE-2017-14997', 'CVE-2017-12936', 'CVE-2017-11140', 'CVE-2017-11642', 'CVE-2017-15930', 'CVE-2017-18219', 'CVE-2017-16545', 'CVE-2017-9098', 'CVE-2017-12935', 'CVE-2017-11102', 'CVE-2017-13775', 'CVE-2017-18220', 'CVE-2017-18230', 'CVE-2018-9018', 'CVE-2017-11641', 'CVE-2017-11403', 'CVE-2017-14504', 'CVE-2017-16547', 'CVE-2017-13737', 'CVE-2018-6799', 'CVE-2016-5239', 'CVE-2017-15277', 'CVE-2017-18231', 'CVE-2018-5685', 'CVE-2017-11638', 'CVE-2017-13776', 'CVE-2017-6335', 'CVE-2017-18229', 'CVE-2017-16352', 'CVE-2017-11637', 'CVE-2017-14994', 'CVE-2011-5325', 'CVE-2018-10886', 'CVE-2018-14912', 'CVE-2018-14681', 'CVE-2018-14680', 'CVE-2018-14682', 'CVE-2018-14679', 'CVE-2018-10995', 'CVE-2018-14526', 'CVE-2018-12601', 'CVE-2018-12578', 'CVE-2017-2900', 'CVE-2017-12102', 'CVE-2017-12086', 'CVE-2017-2907', 'CVE-2017-2903', 'CVE-2017-2902', 'CVE-2017-12104', 'CVE-2017-2901', 'CVE-2017-2908', 'CVE-2017-12081', 'CVE-2017-2906', 'CVE-2017-2899', 'CVE-2017-2904', 'CVE-2017-12103', 'CVE-2017-2905', 'CVE-2017-2918', 'CVE-2017-12100', 'CVE-2017-12082', 'CVE-2017-12105', 'CVE-2017-12099', 'CVE-2017-12101', 'CVE-2018-10915', 'CVE-2018-1000544', 'CVE-2018-5391', 'CVE-2018-13405', 'CVE-2018-5390', 'CVE-2018-10906', 'CVE-2015-9262', 'CVE-2018-14447', 'CVE-2018-14767', 'CVE-2018-14348', 'CVE-2018-0360', 'CVE-2018-0361', 'CVE-2018-14593', 'CVE-2018-15473', 'CVE-2018-8020', 'CVE-2018-8019', 'CVE-2018-10887', 'CVE-2018-10888', 'CVE-2018-15501', 'CVE-2018-14347', 'CVE-2018-14346', 'CVE-2018-15473', 'CVE-2018-15599', 'CVE-2018-14040', 'CVE-2018-1000073', 'CVE-2018-1000074', 'CVE-2016-2337', 'CVE-2018-3620', 'CVE-2018-3646', 'CVE-2018-14598', 'CVE-2018-14599', 'CVE-2018-14600', 'CVE-2018-14951', 'CVE-2018-14955', 'CVE-2018-14950', 'CVE-2018-14952', 'CVE-2018-14954', 'CVE-2018-14953', 'CVE-2018-10935', 'CVE-2018-10871', 'CVE-2018-5740', 'CVE-2018-14622', 'CVE-2018-10873', 'CVE-2018-3063', 'CVE-2018-3064', 'CVE-2018-3066', 'CVE-2018-3058', 'CVE-2018-10873', 'CVE-2018-10873']
- Opening url: https://lists.debian.org/debian-lts-announce/2018/09/msg00000.html
- Package : php5
- php5
- Opening url: https://lists.debian.org/debian-lts-announce/2018/09/msg00001.html
- Package : tomcat8
- tomcat8
- Opening url: https://lists.debian.org/debian-lts-announce/2018/09/msg00002.html
- Package : dojo
- dojo
- Opening url: https://lists.debian.org/debian-lts-announce/2018/09/msg00003.html
- Package : gdm3
- gdm3
- Opening url: https://lists.debian.org/debian-lts-announce/2018/09/msg00004.html
- Package : git-annex
- git-annex
- Opening url: https://lists.debian.org/debian-lts-announce/2018/09/msg00005.html
- Package : lcms2
- lcms2
- Opening url: https://lists.debian.org/debian-lts-announce/2018/09/msg00006.html
- Package : xen
- xen
- Opening url: https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html
- Package : qemu
- qemu
- Opening url: https://lists.debian.org/debian-lts-announce/2018/09/msg00008.html
- Package : curl
- curl
- Opening url: https://lists.debian.org/debian-lts-announce/2018/09/msg00009.html
- Package : discount
- discount
- Opening url: https://lists.debian.org/debian-lts-announce/2018/09/msg00010.html
- Package : openssh
- openssl
- Opening url: https://lists.debian.org/debian-lts-announce/2018/09/msg00011.html
- Package : libextractor
- libextractor
- Opening url: https://lists.debian.org/debian-lts-announce/2018/09/msg00012.html
- Package : mgetty
- mgetty
- Opening url: https://lists.debian.org/debian-lts-announce/2018/09/msg00013.html
- Package : kamailio
- kamailio
- Opening url: https://lists.debian.org/debian-lts-announce/2018/09/msg00014.html
- Package : openssh
- openssl
- Opening url: https://lists.debian.org/debian-lts-announce/2018/09/msg00015.html
- Package : ghostscript
- ghostscript
- Opening url: https://lists.debian.org/debian-lts-announce/2018/09/msg00016.html
- Package : zutils
- zutils
- Opening url: https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html
- Package : intel-microcode
- intel-microcode
- Opening url: https://lists.debian.org/debian-lts-announce/2018/09/msg00018.html
- Package : libapache2-mod-perl2
- libapache2-mod-perl2
- Opening url: https://lists.debian.org/debian-lts-announce/2018/09/msg00019.html
- Package : suricata
- suricata
- Opening url: https://lists.debian.org/debian-lts-announce/2018/09/msg00020.html
- Package : php5
- php5
- Opening url: https://lists.debian.org/debian-lts-announce/2018/09/msg00021.html
- Package : glusterfs
- glusterfs
- Opening url: https://lists.debian.org/debian-lts-announce/2018/09/msg00022.html
- Package : reportbug
- reportbug
- Opening url: https://lists.debian.org/debian-lts-announce/2018/09/msg00023.html
- Package : sympa
- sympa
- Opening url: https://lists.debian.org/debian-lts-announce/2018/09/msg00024.html
- Package : openafs
- openafs
- Opening url: https://lists.debian.org/debian-lts-announce/2018/09/msg00025.html
- Package : texlive-bin
- texlive-bin
- Opening url: https://lists.debian.org/debian-lts-announce/2018/09/msg00026.html
- Package : hylafax
- hylafax
- Opening url: https://lists.debian.org/debian-lts-announce/2018/09/msg00027.html
- Package : okular
- okular
- Opening url: https://lists.debian.org/debian-lts-announce/2018/09/msg00028.html
- Package : dom4j
- dom4j
- Opening url: https://lists.debian.org/debian-lts-announce/2018/09/msg00029.html
- Package : polarssl
- polarssl
- Opening url: https://lists.debian.org/debian-lts-announce/2018/09/msg00030.html
- Package : python2.7
- python3.5
- Opening url: https://lists.debian.org/debian-lts-announce/2018/09/msg00031.html
- Package : python3.4
- python3.5
- Opening url: https://lists.debian.org/debian-lts-announce/2018/09/msg00032.html
- Package : strongswan
- strongswan
- Opening url: https://lists.debian.org/debian-lts-announce/2018/09/msg00033.html
- Package : otrs2
- otrs2
- Opening url: https://lists.debian.org/debian-lts-announce/2018/09/msg00034.html
- Package : asterisk
- asterisk
- Opening url: https://lists.debian.org/debian-lts-announce/2018/09/msg00035.html
- Package : libxml2
- libxml2
- Opening url: https://lists.debian.org/debian-lts-announce/2018/09/msg00036.html
- Package : mosquitto
- mosquitto
- Opening url: https://lists.debian.org/debian-lts-announce/2018/09/msg00037.html
- Package : 389-ds-base
- 389-ds-base
- Opening url: https://lists.debian.org/debian-lts-announce/2018/09/msg00038.html
- Package : ghostscript
- ghostscript
- Opening url: https://lists.debian.org/debian-lts-announce/2018/09/msg00039.html
- ['CVE-2018-14851', 'CVE-2017-7272', 'CVE-2018-14883', 'CVE-2018-1336', 'CVE-2018-8034', 'CVE-2018-15494', 'CVE-2018-14424', 'CVE-2017-1000117', 'CVE-2017-12836', 'CVE-2018-10859', 'CVE-2017-9800', 'CVE-2017-1000116', 'CVE-2017-12976', 'CVE-2018-10857', 'CVE-2018-16435', 'CVE-2016-4963', 'CVE-2017-14431', 'CVE-2017-9330', 'CVE-2016-9914', 'CVE-2017-5525', 'CVE-2017-5667', 'CVE-2017-8309', 'CVE-2016-10155', 'CVE-2016-9922', 'CVE-2017-7718', 'CVE-2017-5856', 'CVE-2017-11434', 'CVE-2017-14167', 'CVE-2017-15289', 'CVE-2017-16845', 'CVE-2016-2198', 'CVE-2016-8669', 'CVE-2017-6505', 'CVE-2017-8086', 'CVE-2016-8576', 'CVE-2017-9373', 'CVE-2016-9915', 'CVE-2016-9916', 'CVE-2017-9374', 'CVE-2016-9921', 'CVE-2017-5715', 'CVE-2017-5973', 'CVE-2017-5987', 'CVE-2017-7377', 'CVE-2017-15038', 'CVE-2017-5579', 'CVE-2017-7493', 'CVE-2017-8379', 'CVE-2016-6833', 'CVE-2016-9602', 'CVE-2018-7550', 'CVE-2015-8666', 'CVE-2016-9907', 'CVE-2017-5526', 'CVE-2017-18030', 'CVE-2016-9911', 'CVE-2017-10911', 'CVE-2017-2620', 'CVE-2017-10806', 'CVE-2017-7980', 'CVE-2017-18043', 'CVE-2017-8112', 'CVE-2016-9776', 'CVE-2017-9503', 'CVE-2016-8667', 'CVE-2016-6835', 'CVE-2018-5683', 'CVE-2016-9603', 'CVE-2017-2615', 'CVE-2018-14618', 'CVE-2018-12495', 'CVE-2018-11503', 'CVE-2018-11468', 'CVE-2018-11504', 'CVE-2017-15906', 'CVE-2016-6515', 'CVE-2016-10009', 'CVE-2015-6564', 'CVE-2015-6563', 'CVE-2015-5352', 'CVE-2016-1908', 'CVE-2016-10012', 'CVE-2016-3115', 'CVE-2016-10708', 'CVE-2016-10011', 'CVE-2015-5600', 'CVE-2018-16430', 'CVE-2018-16741', 'CVE-2018-16657', 'CVE-2016-1908', 'CVE-2018-16585', 'CVE-2018-16542', 'CVE-2018-16511', 'CVE-2018-15909', 'CVE-2018-16541', 'CVE-2018-15911', 'CVE-2018-16509', 'CVE-2018-16539', 'CVE-2018-16802', 'CVE-2018-15908', 'CVE-2018-11645', 'CVE-2018-16540', 'CVE-2018-15910', 'CVE-2018-16513', 'CVE-2018-1000637', 'CVE-2018-3646', 'CVE-2018-3615', 'CVE-2018-3620', 'CVE-2018-3640', 'CVE-2018-3639', 'CVE-2017-5715', 'CVE-2011-2767', 'CVE-2016-10728', 'CVE-2018-17082', 'CVE-2018-10926', 'CVE-2018-10930', 'CVE-2018-10928', 'CVE-2018-10904', 'CVE-2018-10914', 'CVE-2018-10929', 'CVE-2018-10907', 'CVE-2018-10927', 'CVE-2018-10911', 'CVE-2018-10923', 'CVE-2018-10913', 'CVE-2018-1000671', 'CVE-2018-16948', 'CVE-2018-16949', 'CVE-2018-16947', 'CVE-2018-17141', 'CVE-2018-1000801', 'CVE-2018-1000632', 'CVE-2018-0497', 'CVE-2018-9988', 'CVE-2013-0169', 'CVE-2018-0498', 'CVE-2018-9989', 'CVE-2018-1000802', 'CVE-2018-1060', 'CVE-2017-1000158', 'CVE-2018-1061', 'CVE-2018-1000802', 'CVE-2018-1060', 'CVE-2017-1000158', 'CVE-2018-1061', 'CVE-2018-16152', 'CVE-2018-16151', 'CVE-2018-16587', 'CVE-2018-16586', 'CVE-2018-17281', 'CVE-2018-14404', 'CVE-2018-9251', 'CVE-2018-14567', 'CVE-2017-18258', 'CVE-2017-9868', 'CVE-2017-7654', 'CVE-2017-7653', 'CVE-2018-14624', 'CVE-2018-17183', 'CVE-2018-16543']
- Opening url: https://lists.debian.org/debian-lts-announce/2018/10/msg00000.html
- Package : ghostscript
- ghostscript
- Opening url: https://lists.debian.org/debian-lts-announce/2018/10/msg00001.html
- Package : strongswan
- strongswan
- Opening url: https://lists.debian.org/debian-lts-announce/2018/10/msg00002.html
- Package : imagemagick
- imagemagick
- Opening url: https://lists.debian.org/debian-lts-announce/2018/10/msg00003.html
- Package : linux-4.9
- linux
- Opening url: https://lists.debian.org/debian-lts-announce/2018/10/msg00004.html
- Package : dnsruby
- dnsruby
- Opening url: https://lists.debian.org/debian-lts-announce/2018/10/msg00005.html
- Package : tomcat7
- tomcat8
- Opening url: https://lists.debian.org/debian-lts-announce/2018/10/msg00006.html
- Package : tomcat8
- tomcat8
- Opening url: https://lists.debian.org/debian-lts-announce/2018/10/msg00007.html
- Package : moin
- moin
- Opening url: https://lists.debian.org/debian-lts-announce/2018/10/msg00008.html
- Package : libpdfbox-java
- libpdfbox-java
- Opening url: https://lists.debian.org/debian-lts-announce/2018/10/msg00009.html
- Package : xen
- xen
- Opening url: https://lists.debian.org/debian-lts-announce/2018/10/msg00010.html
- Package : libssh
- libssh
- Opening url: https://lists.debian.org/debian-lts-announce/2018/10/msg00011.html
- Package : drupal7
- drupal7
- Opening url: https://lists.debian.org/debian-lts-announce/2018/10/msg00012.html
- Package : exiv2
- exiv2
- Opening url: https://lists.debian.org/debian-lts-announce/2018/10/msg00013.html
- Package : ghostscript
- ghostscript
- Opening url: https://lists.debian.org/debian-lts-announce/2018/10/msg00014.html
- Package : clamav
- clamav
- Opening url: https://lists.debian.org/debian-lts-announce/2018/10/msg00015.html
- Package : 389-ds-base
- 389-ds-base
- Opening url: https://lists.debian.org/debian-lts-announce/2018/10/msg00016.html
- Package : 389-ds-base
- 389-ds-base
- Opening url: https://lists.debian.org/debian-lts-announce/2018/10/msg00017.html
- Package : libmspack
- libmspack
- Opening url: https://lists.debian.org/debian-lts-announce/2018/10/msg00018.html
- Package : paramiko
- paramiko
- Opening url: https://lists.debian.org/debian-lts-announce/2018/10/msg00019.html
- Package : tiff
- tiff
- Opening url: https://lists.debian.org/debian-lts-announce/2018/10/msg00020.html
- Package : ruby2.1
- ruby2.3
- Opening url: https://lists.debian.org/debian-lts-announce/2018/10/msg00021.html
- Package : xen
- xen
- Opening url: https://lists.debian.org/debian-lts-announce/2018/10/msg00022.html
- Package : gnutls28
- gnutls28
- Opening url: https://lists.debian.org/debian-lts-announce/2018/10/msg00023.html
- Package : phpldapadmin
- phpldapadmin
- Opening url: https://lists.debian.org/debian-lts-announce/2018/10/msg00024.html
- Package : poppler
- poppler
- Opening url: https://lists.debian.org/debian-lts-announce/2018/10/msg00025.html
- ['CVE-2018-16543', 'CVE-2018-17540', 'CVE-2018-16413', 'CVE-2018-16645', 'CVE-2018-16642', 'CVE-2018-16412', 'CVE-2018-16749', 'CVE-2018-16643', 'CVE-2018-16644', 'CVE-2018-7755', 'CVE-2018-13099', 'CVE-2018-16658', 'CVE-2018-10902', 'CVE-2018-9363', 'CVE-2018-14633', 'CVE-2018-16276', 'CVE-2018-6555', 'CVE-2018-14734', 'CVE-2018-14609', 'CVE-2018-9516', 'CVE-2018-15572', 'CVE-2018-15594', 'CVE-2018-14678', 'CVE-2018-6554', 'CVE-2018-10938', 'CVE-2018-17182', 'CVE-2018-14617', 'CVE-2018-11784', 'CVE-2018-11784', 'CVE-2017-5934', 'CVE-2018-11797', 'CVE-2018-10982', 'CVE-2017-15590', 'CVE-2017-17566', 'CVE-2017-15597', 'CVE-2017-17046', 'CVE-2017-17564', 'CVE-2017-15589', 'CVE-2017-15588', 'CVE-2017-14319', 'CVE-2017-14316', 'CVE-2017-17565', 'CVE-2018-10471', 'CVE-2017-17563', 'CVE-2017-14317', 'CVE-2018-10933', 'CVE-2018-10958', 'CVE-2018-16336', 'CVE-2018-10999', 'CVE-2018-18073', 'CVE-2018-18284', 'CVE-2018-17961', 'CVE-2018-15378', 'CVE-2018-14648', 'CVE-2018-14648', 'CVE-2018-18585', 'CVE-2018-18584', 'CVE-2018-7750', 'CVE-2018-1000805', 'CVE-2018-17100', 'CVE-2018-18557', 'CVE-2018-17101', 'CVE-2018-16395', 'CVE-2018-16396', 'CVE-2017-17044', 'CVE-2017-15595', 'CVE-2017-15593', 'CVE-2017-15592', 'CVE-2017-15594', 'CVE-2018-10981', 'CVE-2017-17045', 'CVE-2018-10472', 'CVE-2018-10845', 'CVE-2018-10844', 'CVE-2018-10846', 'CVE-2016-11107', 'CVE-2017-11107', 'CVE-2018-16646', 'CVE-2017-18267', 'CVE-2018-13988', 'CVE-2018-10768']
- Opening url: https://lists.debian.org/debian-lts-announce/2018/11/msg00000.html
- Package : tzdata
- tzdata
- Opening url: https://lists.debian.org/debian-lts-announce/2018/11/msg00001.html
- Package : mono
- mono
- Opening url: https://lists.debian.org/debian-lts-announce/2018/11/msg00002.html
- Package : gthumb
- gthumb
- Opening url: https://lists.debian.org/debian-lts-announce/2018/11/msg00003.html
- Package : glusterfs
- glusterfs
- Opening url: https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html
- Package : mysql-5.5
- mysql-transitional
- Opening url: https://lists.debian.org/debian-lts-announce/2018/11/msg00005.html
- Package : curl
- curl
- Opening url: https://lists.debian.org/debian-lts-announce/2018/11/msg00006.html
- Package : libdatetime-timezone-perl
- libdatetime-timezone-perl
- Opening url: https://lists.debian.org/debian-lts-announce/2018/11/msg00007.html
- Package : mariadb-10.0
- mariadb-10.1
- Opening url: https://lists.debian.org/debian-lts-announce/2018/11/msg00008.html
- Package : firefox-esr
- firefox-esr
- Opening url: https://lists.debian.org/debian-lts-announce/2018/11/msg00009.html
- Package : libdatetime-timezone-perl
- libdatetime-timezone-perl
- Opening url: https://lists.debian.org/debian-lts-announce/2018/11/msg00010.html
- Package : nginx
- nginx
- Opening url: https://lists.debian.org/debian-lts-announce/2018/11/msg00011.html
- Package : thunderbird
- icedove
- Opening url: https://lists.debian.org/debian-lts-announce/2018/11/msg00012.html
- Package : ansible
- ansible
- Opening url: https://lists.debian.org/debian-lts-announce/2018/11/msg00013.html
- Package : xen
- xen
- Opening url: https://lists.debian.org/debian-lts-announce/2018/11/msg00014.html
- ['CVE-2009-0689', 'CVE-2018-1002208', 'CVE-2018-18718', 'CVE-2018-14651', 'CVE-2018-10926', 'CVE-2018-10930', 'CVE-2018-10928', 'CVE-2018-14653', 'CVE-2018-14661', 'CVE-2018-14652', 'CVE-2018-10929', 'CVE-2018-10927', 'CVE-2018-14659', 'CVE-2018-3133', 'CVE-2018-3070', 'CVE-2018-3282', 'CVE-2018-3058', 'CVE-2018-3081', 'CVE-2018-2767', 'CVE-2018-3063', 'CVE-2018-3066', 'CVE-2018-3174', 'CVE-2016-7141', 'CVE-2016-7167', 'CVE-2016-5420', 'CVE-2018-16839', 'CVE-2018-16842', 'CVE-2016-9586', 'CVE-2018-3282', 'CVE-2018-3143', 'CVE-2018-3251', 'CVE-2018-3156', 'CVE-2018-3174', 'CVE-2018-12390', 'CVE-2018-12389', 'CVE-2018-12393', 'CVE-2018-12396', 'CVE-2018-12397', 'CVE-2018-12395', 'CVE-2018-12392', 'CVE-2018-16845', 'CVE-2018-5187', 'CVE-2018-12389', 'CVE-2017-16541', 'CVE-2018-12377', 'CVE-2018-12392', 'CVE-2018-12379', 'CVE-2018-12371', 'CVE-2018-12361', 'CVE-2018-12383', 'CVE-2018-12393', 'CVE-2018-12385', 'CVE-2018-12367', 'CVE-2018-12376', 'CVE-2018-12378', 'CVE-2018-5156', 'CVE-2018-12390', 'CVE-2018-16837', 'CVE-2018-12893', 'CVE-2018-7540', 'CVE-2018-15469', 'CVE-2018-7541', 'CVE-2018-15470', 'CVE-2018-8897', 'CVE-2018-12891']
- Opening url: https://lists.debian.org/debian-lts-announce/2018/12/msg00000.html
- Opening url: https://lists.debian.org/debian-lts-announce/2018/12/msg00001.html
- Opening url: https://lists.debian.org/debian-lts-announce/2018/12/msg00002.html
- []
- {'2014,1': [], '2014,2': [], '2014,3': [], '2014,4': [], '2014,5': [], '2014,6': ['CVE-2014-3146', 'CVE-2014-0221', 'CVE-2014-3466', 'CVE-2014-4049', 'CVE-2014-0476', 'CVE-2014-3430', 'CVE-2014-1438', 'CVE-2014-3153', 'CVE-2014-4617', 'CVE-2014-0076', 'CVE-2014-0224', 'CVE-2014-0478', 'CVE-2014-0195', 'CVE-2012-4929', 'CVE-2014-4150', 'CVE-2014-0477', 'CVE-2011-3634', 'CVE-2014-3470'], '2014,7': ['CVE-2013-4470', 'CVE-2014-3479', 'CVE-2014-3478', 'CVE-2014-5030', 'CVE-2014-3515', 'CVE-2014-3144', 'CVE-2014-0207', 'CVE-2014-2708', 'CVE-2014-4652', 'CVE-2014-3917', 'CVE-2011-4944', 'CVE-2015-3145', 'CVE-2014-2328', 'CVE-2013-7176', 'CVE-2014-0238', 'CVE-2014-0067', 'CVE-2014-3480', 'CVE-2013-7177', 'CVE-2014-5031', 'CVE-2013-5003', 'CVE-2012-0845', 'CVE-2014-1491', 'CVE-2014-3122', 'CVE-2014-3145', 'CVE-2014-4699', 'CVE-2011-4940', 'CVE-2012-1150', 'CVE-2014-2326', 'CVE-2011-1521', 'CVE-2013-5606', 'CVE-2010-5110', 'CVE-2014-0237', 'CVE-2014-0191', 'CVE-2014-2709', 'CVE-2014-0203', 'CVE-2013-4238', 'CVE-2014-1492', 'CVE-2013-4243', 'CVE-2013-4251', 'CVE-2014-4656', 'CVE-2014-4721', 'CVE-2013-4995', 'CVE-2014-1912', 'CVE-2013-1741', 'CVE-2014-4002', 'CVE-2014-3487', 'CVE-2014-3537', 'CVE-2013-4996', 'CVE-2014-5029', 'CVE-2014-4667', 'CVE-2011-1015', 'CVE-2013-3239', 'CVE-2014-2678', 'CVE-2013-4387', 'CVE-2014-2327'], '2014,8': ['CVE-2014-0479', 'CVE-2014-4342', 'CVE-2014-3505', 'CVE-2014-4911', 'CVE-2014-1419', 'CVE-2014-5026', 'CVE-2014-3508', 'CVE-2013-6048', 'CVE-2014-1545', 'CVE-2014-3589', 'CVE-2014-3507', 'CVE-2013-6412', 'CVE-2014-4345', 'CVE-2014-3506', 'CVE-2013-6359', 'CVE-2014-4343', 'CVE-2014-3564', 'CVE-2014-5261', 'CVE-2014-4607', 'CVE-2014-3510', 'CVE-2014-5025', 'CVE-2014-4002', 'CVE-2014-4341', 'CVE-2012-0786', 'CVE-2012-6120', 'CVE-2012-0787', 'CVE-2014-4344', 'CVE-2012-3512', 'CVE-2014-5262', 'CVE-2013-5705'], '2014,9': ['CVE-2014-5240', 'CVE-2014-5205', 'CVE-2014-5204', 'CVE-2014-7169', 'CVE-2014-0484', 'CVE-2014-3875', 'CVE-2014-5461', 'CVE-2014-6273', 'CVE-2014-0483', 'CVE-2014-4617', 'CVE-2012-2149', 'CVE-2014-5270', 'CVE-2014-0487', 'CVE-2014-0480', 'CVE-2014-4670', 'CVE-2014-3609', 'CVE-2014-5265', 'CVE-2014-3877', 'CVE-2013-7108', 'CVE-2014-0231', 'CVE-2014-0226', 'CVE-2014-3616', 'CVE-2014-3613', 'CVE-2014-3876', 'CVE-2014-1878', 'CVE-2014-4049', 'CVE-2014-0482', 'CVE-2014-0114', 'CVE-2014-5269', 'CVE-2014-0489', 'CVE-2014-0481', 'CVE-2014-6271', 'CVE-2014-1568', 'CVE-2014-5119', 'CVE-2014-3587', 'CVE-2014-3538', 'CVE-2014-0591', 'CVE-2014-3618', 'CVE-2014-3597', 'CVE-2014-2053', 'CVE-2014-5266', 'CVE-2013-6438', 'CVE-2013-7345', 'CVE-2014-0488', 'CVE-2014-0475', 'CVE-2014-0118'], '2014,10': ['CVE-2014-6633', 'CVE-2013-2162', 'CVE-2014-4274', 'CVE-2013-5704', 'CVE-2014-3634', 'CVE-2014-0001', 'CVE-2014-3581', 'CVE-2014-8764', 'CVE-2014-3660', 'CVE-2014-7204', 'CVE-2014-5033', 'CVE-2014-3467', 'CVE-2014-0191', 'CVE-2014-3468', 'CVE-2014-6273', 'CVE-2014-3684', 'CVE-2014-3469', 'CVE-2014-3683', 'CVE-2014-8763', 'CVE-2014-3158'], '2014,11': ['CVE-2014-1544', 'CVE-2013-4286', 'CVE-2014-6502', 'CVE-2012-3439', 'CVE-2014-3670', 'CVE-2014-3568', 'CVE-2014-3477', 'CVE-2014-3669', 'CVE-2014-8090', 'CVE-2014-4877', 'CVE-2014-6511', 'CVE-2014-4262', 'CVE-2011-4815', 'CVE-2014-5270', 'CVE-2014-6506', 'CVE-2014-6504', 'CVE-2014-3569', 'CVE-2013-2172', 'CVE-2013-1571', 'CVE-2014-4263', 'CVE-2014-4268', 'CVE-2014-6040', 'CVE-2014-6512', 'CVE-2014-6457', 'CVE-2014-6531', 'CVE-2014-8080', 'CVE-2014-3668', 'CVE-2011-0188', 'CVE-2014-4216', 'CVE-2014-7817', 'CVE-2014-4209', 'CVE-2014-4218', 'CVE-2014-3638', 'CVE-2014-8716', 'CVE-2011-2686', 'CVE-2014-3707', 'CVE-2014-6519', 'CVE-2014-0033', 'CVE-2013-4590', 'CVE-2014-4244', 'CVE-2012-6656', 'CVE-2014-6517', 'CVE-2014-3639', 'CVE-2014-4219', 'CVE-2014-3566', 'CVE-2014-4266', 'CVE-2003-0900', 'CVE-2014-6558', 'CVE-2014-4252', 'CVE-2014-3567', 'CVE-2014-2490', 'CVE-2011-2705', 'CVE-2013-4322', 'CVE-2014-3710'], '2014,12': ['CVE-2014-6410', 'CVE-2014-8767', 'CVE-2014-3580', 'CVE-2014-8095', 'CVE-2014-7274', 'CVE-2014-8098', 'CVE-2014-8099', 'CVE-2014-8104', 'CVE-2014-8101', 'CVE-2014-8100', 'CVE-2014-8884', 'CVE-2014-8138', 'CVE-2014-4655', 'CVE-2004-2771', 'CVE-2014-9090', 'CVE-2013-7266', 'CVE-2014-8137', 'CVE-2014-8091', 'CVE-2014-4653', 'CVE-2014-7275', 'CVE-2014-9295', 'CVE-2011-3193', 'CVE-2014-3687', 'CVE-2014-7841', 'CVE-2014-9157', 'CVE-2014-8102', 'CVE-2014-90902', 'CVE-2012-6657', 'CVE-2014-9294', 'CVE-2014-9402', 'CVE-2014-8769', 'CVE-2014-8709', 'CVE-2011-3194', 'CVE-2014-3688', 'CVE-2014-8140', 'CVE-2014-7844', 'CVE-2014-0467', 'CVE-2013-6497', 'CVE-2014-9140', 'CVE-2014-3185', 'CVE-2014-8094', 'CVE-2013-0228', 'CVE-2014-4508', 'CVE-2014-9293', 'CVE-2014-4654', 'CVE-2014-9028', 'CVE-2014-7273', 'CVE-2014-9050', 'CVE-2014-9323', 'CVE-2014-8096', 'CVE-2014-8097', 'CVE-2014-5472', 'CVE-2014-5471', 'CVE-2014-9029', 'CVE-2014-9130', 'CVE-2014-5077', 'CVE-2014-9112', 'CVE-2014-8962', 'CVE-2014-8093', 'CVE-2014-9380', 'CVE-2014-8139', 'CVE-2014-4157', 'CVE-2014-8601', 'CVE-2014-8500', 'CVE-2014-8092', 'CVE-2014-7209', 'CVE-2014-9381', 'CVE-2014-4943', 'CVE-2012-3541', 'CVE-2014-9296', 'CVE-2014-8141', 'CVE-2014-8602'], '2015,1': ['CVE-2013-6892', 'CVE-2015-1031', 'CVE-2014-9087', 'CVE-2012-0061', 'CVE-2014-8150', 'CVE-2014-3478', 'CVE-2015-1382', 'CVE-2015-1182', 'CVE-2014-8158', 'CVE-2014-3570', 'CVE-2014-8116', 'CVE-2015-0220', 'CVE-2014-0238', 'CVE-2014-8117', 'CVE-2014-8628', 'CVE-2013-6435', 'CVE-2015-0221', 'CVE-2014-9274', 'CVE-2014-2270', 'CVE-2014-3571', 'CVE-2012-0815', 'CVE-2015-0222', 'CVE-2014-0237', 'CVE-2014-9323', 'CVE-2015-1381', 'CVE-2015-0219', 'CVE-2015-0204', 'CVE-2014-6272', 'CVE-2014-8118', 'CVE-2014-3572', 'CVE-2014-8145', 'CVE-2014-8157', 'CVE-2015-', 'CVE-2014-9275', 'CVE-2014-9130', 'CVE-2014-8275', 'CVE-2015-0235', 'CVE-2012-0060'], '2015,2': ['CVE-2015-0240', 'CVE-2015-0410', 'CVE-2014-8161', 'CVE-2015-0407', 'CVE-2014-9298', 'CVE-2015-1165', 'CVE-2014-5352', 'CVE-2014-9679', 'CVE-2015-0241', 'CVE-2014-3660', 'CVE-2014-3686', 'CVE-2015-1421', 'CVE-2014-7822', 'CVE-2014-9636', 'CVE-2014-9585', 'CVE-2015-1572', 'CVE-2014-6601', 'CVE-2015-0412', 'CVE-2015-1306', 'CVE-2014-0106', 'CVE-2014-9423', 'CVE-2015-0408', 'CVE-2014-6587', 'CVE-2014-9422', 'CVE-2011-3389', 'CVE-2014-9421', 'CVE-2014-0191', 'CVE-2014-8160', 'CVE-2014-9472', 'CVE-2014-6593', 'CVE-2014-9297', 'CVE-2015-1464', 'CVE-2015-0383', 'CVE-2014-9584', 'CVE-2015-1593', 'CVE-2015-0243', 'CVE-2014-8133', 'CVE-2015-0244', 'CVE-2014-8139', 'CVE-2015-0395', 'CVE-2014-1569', 'CVE-2014-9420', 'CVE-2014-3566', 'CVE-2014-6585', 'CVE-2014-8134', 'CVE-2014-9419', 'CVE-2014-6591', 'CVE-2014-9680', 'CVE-2013-6885', 'CVE-2015-0247'], '2015,3': ['CVE-2014-9671', 'CVE-2012-4424', 'CVE-2015-1802', 'CVE-2015-2091', 'CVE-2014-9673', 'CVE-2013-4788', 'CVE-2013-7423', 'CVE-2015-0286', 'CVE-2013-1914', 'CVE-2014-9658', 'CVE-2014-9657', 'CVE-2015-0288', 'CVE-2015-0209', 'CVE-2012-6684', 'CVE-2012-3480', 'CVE-2014-9660', 'CVE-2013-0156', 'CVE-2014-3596', 'CVE-2015-1472', 'CVE-2015-2320', 'CVE-2015-1803', 'CVE-2014-9656', 'CVE-2014-9674', 'CVE-2015-0293', 'CVE-2014-8483', 'CVE-2014-8738', 'CVE-2012-5784', 'CVE-2014-9672', 'CVE-2012-3405', 'CVE-2014-9667', 'CVE-2014-8503', 'CVE-2015-2063', 'CVE-2015-0261', 'CVE-2012-3406', 'CVE-2014-9666', 'CVE-2015-1473', 'CVE-2014-9670', 'CVE-2015-2155', 'CVE-2014-9675', 'CVE-2015-2154', 'CVE-2013-0242', 'CVE-2013-4357', 'CVE-2014-4043', 'CVE-2015-0289', 'CVE-2014-8155', 'CVE-2015-0292', 'CVE-2015-2318', 'CVE-2014-9664', 'CVE-2014-9665', 'CVE-2015-0252', 'CVE-2015-1782', 'CVE-2014-9663', 'CVE-2014-8502', 'CVE-2013-4332', 'CVE-2014-8484', 'CVE-2014-9661', 'CVE-2015-1804', 'CVE-2015-2319', 'CVE-2013-4237', 'CVE-2014-3591', 'CVE-2014-8501', 'CVE-2015-1606', 'CVE-2013-7424', 'CVE-2015-0294', 'CVE-2012-4412', 'CVE-2015-0282', 'CVE-2014-8737', 'CVE-2014-8504', 'CVE-2015-0287', 'CVE-2015-0250', 'CVE-2015-1349', 'CVE-2013-4458', 'CVE-2015-0837', 'CVE-2015-2157', 'CVE-2014-8485', 'CVE-2014-9669'], '2015,4': ['CVE-2015-1860', 'CVE-2014-6428', 'CVE-2015-0564', 'CVE-2015-2188', 'CVE-2015-0470', 'CVE-2015-3310', 'CVE-2015-0248', 'CVE-2014-3609', 'CVE-2014-8712', 'CVE-2015-2191', 'CVE-2011-4838', 'CVE-2015-0488', 'CVE-2014-6429', 'CVE-2014-9705', 'CVE-2013-1845', 'CVE-2014-6051', 'CVE-2013-1847', 'CVE-2015-1822', 'CVE-2015-3329', 'CVE-2015-', 'CVE-2014-0032', 'CVE-2014-9709', 'CVE-2015-0295', 'CVE-2015-0477', 'CVE-2015-1853', 'CVE-2014-6055', 'CVE-2015-0557', 'CVE-2015-0231', 'CVE-2014-8710', 'CVE-2014-9713', 'CVE-2012-1164', 'CVE-2015-0562', 'CVE-2015-2787', 'CVE-2014-6423', 'CVE-2015-2775', 'CVE-2014-6431', 'CVE-2015-3451', 'CVE-2015-2806', 'CVE-2014-4975', 'CVE-2014-6053', 'CVE-2015-0460', 'CVE-2015-0251', 'CVE-2015-2782', 'CVE-2015-1545', 'CVE-2014-2497', 'CVE-2015-3143', 'CVE-2015-2783', 'CVE-2015-0478', 'CVE-2015-1799', 'CVE-2015-0232', 'CVE-2015-1798', 'CVE-2014-6052', 'CVE-2014-3591', 'CVE-2013-0254', 'CVE-2013-4449', 'CVE-2014-8713', 'CVE-2015-0837', 'CVE-2015-0480', 'CVE-2014-6054', 'CVE-2015-1821', 'CVE-2012-5370', 'CVE-2014-8711', 'CVE-2015-1858', 'CVE-2015-3330', 'CVE-2015-0556', 'CVE-2014-8090', 'CVE-2015-3148', 'CVE-2013-0269', 'CVE-2013-1846', 'CVE-2013-1849', 'CVE-2015-0885', 'CVE-2015-2928', 'CVE-2015-1859', 'CVE-2014-8080', 'CVE-2015-2831', 'CVE-2015-2331', 'CVE-2013-7439', 'CVE-2015-0844', 'CVE-2015-0469', 'CVE-2014-8714', 'CVE-2015-0846', 'CVE-2014-6432', 'CVE-2015-2929', 'CVE-2014-6422', 'CVE-2015-2301', 'CVE-2014-9653', 'CVE-2014-6430'], '2015,5': ['CVE-2014-8128', 'CVE-2012-4522', 'CVE-2013-2383', 'CVE-2015-1462', 'CVE-2014-7923', 'CVE-2015-1781', 'CVE-2014-9654', 'CVE-2014-8129', 'CVE-2014-0230', 'CVE-2015-1461', 'CVE-2015-3165', 'CVE-2013-1569', 'CVE-2015-0840', 'CVE-2015-3294', 'CVE-2015-3167', 'CVE-2015-3885', 'CVE-2015-2668', 'CVE-2015-4047', 'CVE-2014-9655', 'CVE-2015-3202', 'CVE-2014-3577', 'CVE-2014-9328', 'CVE-2012-6685', 'CVE-2011-0188', 'CVE-2015-2170', 'CVE-2015-3418', 'CVE-2015-1855', 'CVE-2015-0838', 'CVE-2015-0847', 'CVE-2014-9330', 'CVE-2015-2222', 'CVE-2015-3166', 'CVE-2012-6153', 'CVE-2014-7940', 'CVE-2014-7926', 'CVE-2012-5783', 'CVE-2015-2221', 'CVE-2014-8092', 'CVE-2014-6585', 'CVE-2015-0255', 'CVE-2014-7810', 'CVE-2013-2384', 'CVE-2015-1463', 'CVE-2014-6591', 'CVE-2013-0256', 'CVE-2014-0227', 'CVE-2013-2065', 'CVE-2011-2705', 'CVE-2014-9556', 'CVE-2013-2419'], '2015,6': ['CVE-2014-8355', 'CVE-2014-2685', 'CVE-2015-2684', 'CVE-2014-8111', 'CVE-2014-9037', 'CVE-2014-8562', 'CVE-2015-2922', 'CVE-2015-3438', 'CVE-2015-4167', 'CVE-2015-3154', 'CVE-2015-2665', 'CVE-2015-3811', 'CVE-2014-9729', 'CVE-2012-6531', 'CVE-2015-2042', 'CVE-2014-9730', 'CVE-2014-2682', 'CVE-2015-4171', 'CVE-2014-8159', 'CVE-2015-1805', 'CVE-2014-2683', 'CVE-2014-9031', 'CVE-2014-8088', 'CVE-2015-3905', 'CVE-2015-4695', 'CVE-2015-3885', 'CVE-2014-9390', 'CVE-2014-8176', 'CVE-2015-3440', 'CVE-2015-4588', 'CVE-2015-4454', 'CVE-2015-4342', 'CVE-2012-3437', 'CVE-2015-1159', 'CVE-2015-3202', 'CVE-2014-8354', 'CVE-2015-1792', 'CVE-2015-3339', 'CVE-2015-1789', 'CVE-2014-9033', 'CVE-2014-9728', 'CVE-2015-1158', 'CVE-2015-1790', 'CVE-2011-5321', 'CVE-2014-9036', 'CVE-2015-1791', 'CVE-2015-2141', 'CVE-2014-9034', 'CVE-2014-3184', 'CVE-2014-4914', 'CVE-2015-2830', 'CVE-2015-2041', 'CVE-2015-4000', 'CVE-2014-2684', 'CVE-2015-1323', 'CVE-2015-0848', 'CVE-2015-1038', 'CVE-2014-8089', 'CVE-2014-9462', 'CVE-2014-9039', 'CVE-2014-9731', 'CVE-2014-9683', 'CVE-2015-3456', 'CVE-2015-4142', 'CVE-2015-3225', 'CVE-2012-5657', 'CVE-2015-3439', 'CVE-2014-9035', 'CVE-2012-6689', 'CVE-2014-9038', 'CVE-2015-4696', 'CVE-2010-5312', 'CVE-2014-2681', 'CVE-2012-6532'], '2015,7': ['CVE-2015-4634', 'CVE-2015-2059', 'CVE-2015-1819', 'CVE-2014-9720', 'CVE-2015-5523', 'CVE-2015-5400', 'CVE-2013-0269', 'CVE-2015-5143', 'CVE-2015-2716', 'CVE-2011-4815', 'CVE-2015-3409', 'CVE-2015-1330', 'CVE-2015-3239', 'CVE-2015-4760', 'CVE-2015-3253', 'CVE-2015-5477', 'CVE-2015-4620', 'CVE-2012-5371', 'CVE-2015-2317', 'CVE-2015-0377', 'CVE-2015-3228', 'CVE-2015-1323', 'CVE-2015-1283', 'CVE-2015-3456', 'CVE-2015-5522', 'CVE-2015-3408', 'CVE-2015-3407', 'CVE-2012-1836', 'CVE-2014-3566', 'CVE-2015-3406', 'CVE-2015-3183', 'CVE-2014-6438', 'CVE-2015-0418', 'CVE-2015-5144', 'CVE-2015-3206'], '2015,8': ['CVE-2015-2059', 'CVE-2015-5734', 'CVE-2009-5147', 'CVE-2015-5957', 'CVE-2015-3187', 'CVE-2015-5964', 'CVE-2015-4749', 'CVE-2015-5161', 'CVE-2015-2808', 'CVE-2015-5731', 'CVE-2015-4733', 'CVE-2012-6132', 'CVE-2015-4760', 'CVE-2015-2590', 'CVE-2015-2625', 'CVE-2015-5069', 'CVE-2015-5070', 'CVE-2015-5600', 'CVE-2015-4732', 'CVE-2015-2213', 'CVE-2015-4748', 'CVE-2015-5963', 'CVE-2015-2628', 'CVE-2012-6133', 'CVE-2015-6496', 'CVE-2012-6131', 'CVE-2015-5732', 'CVE-2015-4000', 'CVE-2015-2621', 'CVE-2015-2601', 'CVE-2015-2632', 'CVE-2014-0899', 'CVE-2012-6130', 'CVE-2015-4731', 'CVE-2015-0851', 'CVE-2015-5352', 'CVE-2015-0896', 'CVE-2015-5622', 'CVE-2015-3206'], '2015,9': ['CVE-2015-5715', 'CVE-2015-4026', 'CVE-2014-9639', 'CVE-2014-2486', 'CVE-2015-3412', 'CVE-2015-5199', 'CVE-2015-4148', 'CVE-2015-0272', 'CVE-2015-5707', 'CVE-2015-4025', 'CVE-2006-7243', 'CVE-2015-5200', 'CVE-2015-4598', 'CVE-2014-9640', 'CVE-2015-7236', 'CVE-2015-5366', 'CVE-2015-5156', 'CVE-2015-4147', 'CVE-2014-2488', 'CVE-2014-2489', 'CVE-2015-5714', 'CVE-2014-8121', 'CVE-2010-3609', 'CVE-2015-4602', 'CVE-2015-4601', 'CVE-2013-3792', 'CVE-2014-9746', 'CVE-2015-4643', 'CVE-2015-5697', 'CVE-2015-4644', 'CVE-2015-3258', 'CVE-2015-5600', 'CVE-2012-4428', 'CVE-2015-6908', 'CVE-2015-3279', 'CVE-2015-2730', 'CVE-2015-5590', 'CVE-2015-6806', 'CVE-2015-3411', 'CVE-2015-6749', 'CVE-2015-4605', 'CVE-2014-9638', 'CVE-2015-5364', 'CVE-2014-9745', 'CVE-2015-5198', 'CVE-2015-4604', 'CVE-2015-5722', 'CVE-2014-9747', 'CVE-2015-5589', 'CVE-2015-', 'CVE-2015-4021', 'CVE-2015-4600', 'CVE-2015-3307', 'CVE-2015-2594', 'CVE-2015-6937', 'CVE-2015-4022', 'CVE-2015-5177', 'CVE-2015-4599', 'CVE-2015-2721', 'CVE-2015-5685'], '2015,10': ['CVE-2015-7691', 'CVE-2015-7851', 'CVE-2015-7855', 'CVE-2015-8025', 'CVE-2014-9218', 'CVE-2015-5257', 'CVE-2015-5262', 'CVE-2015-7702', 'CVE-2015-7696', 'CVE-2015-5195', 'CVE-2015-5146', 'CVE-2015-3902', 'CVE-2015-7852', 'CVE-2015-0852', 'CVE-2015-7801', 'CVE-2014-8958', 'CVE-2015-5194', 'CVE-2015-2206', 'CVE-2015-7704', 'CVE-2015-7850', 'CVE-2015-7703', 'CVE-2015-7871', 'CVE-2015-7942', 'CVE-2014-9750', 'CVE-2015-5300', 'CVE-2015-7613', 'CVE-2015-7695', 'CVE-2015-5288', 'CVE-2015-2925', 'CVE-2015-7701', 'CVE-2015-7697', 'CVE-2015-7692', 'CVE-2012-3509', 'CVE-2015-5291', 'CVE-2015-5219'], '2015,11': ['CVE-2015-4843', 'CVE-2015-7803', 'CVE-2012-4424', 'CVE-2015-4911', 'CVE-2015-6831', 'CVE-2015-3285', 'CVE-2015-6832', 'CVE-2015-5309', 'CVE-2015-6838', 'CVE-2015-3282', 'CVE-2015-4860', 'CVE-2015-7762', 'CVE-2015-8023', 'CVE-2015-4835', 'CVE-2015-6834', 'CVE-2015-8317', 'CVE-2015-4805', 'CVE-2015-7805', 'CVE-2015-4842', 'CVE-2015-4903', 'CVE-2015-7181', 'CVE-2015-4872', 'CVE-2012-3425', 'CVE-2015-4806', 'CVE-2015-4881', 'CVE-2015-6836', 'CVE-2015-7763', 'CVE-2015-6833', 'CVE-2015-4893', 'CVE-2015-7804', 'CVE-2015-7183', 'CVE-2015-2695', 'CVE-2014-9496', 'CVE-2015-4844', 'CVE-2015-4882', 'CVE-2015-8126', 'CVE-2015-7942', 'CVE-2015-4734', 'CVE-2008-7313', 'CVE-2015-5667', 'CVE-2015-7981', 'CVE-2015-7182', 'CVE-2015-8241', 'CVE-2012-4412', 'CVE-2014-5008', 'CVE-2015-6837', 'CVE-2015-3283', 'CVE-2015-4883', 'CVE-2015-8213', 'CVE-2015-2697', 'CVE-2015-4803', 'CVE-2015-8346', 'CVE-2014-9756', 'CVE-2013-4168', 'CVE-2015-6587'], '2015,12': ['CVE-2012-6700', 'CVE-2015-8324', 'CVE-2009-0689', 'CVE-2015-8560', 'CVE-2015-8557', 'CVE-2015-7799', 'CVE-2015-8327', 'CVE-2013-7446', 'CVE-2015-7833', 'CVE-2012-3425', 'CVE-2015-8472', 'CVE-2015-7990', 'CVE-2015-7543', 'CVE-2015-8369', 'CVE-2015-8126', 'CVE-2012-6699', 'CVE-2015-8313', 'CVE-2012-6698', 'CVE-2015-7940', 'CVE-2015-5312', 'CVE-2015-8377', 'CVE-2015-7500', 'CVE-2015-7498', 'CVE-2015-7499', 'CVE-2015-3195', 'CVE-2015-8476', 'CVE-2015-8000', 'CVE-2015-6937', 'CVE-2015-7497', 'CVE-2015-8540', 'CVE-2015-8370'], '2016,1': ['CVE-2015-5296', 'CVE-2015-8784', 'CVE-2015-8543', 'CVE-2014-9762', 'CVE-2016-0777', 'CVE-2015-5252', 'CVE-2015-7550', 'CVE-2015-8782', 'CVE-2014-9764', 'CVE-2015-7555', 'CVE-2016-0756', 'CVE-2015-7519', 'CVE-2015-8783', 'CVE-2015-8605', 'CVE-2015-8771', 'CVE-2016-0742', 'CVE-2015-5602', 'CVE-2009-3555', 'CVE-2014-9763', 'CVE-2012-4929', 'CVE-2016-2041', 'CVE-2015-8604', 'CVE-2015-8702', 'CVE-2016-0778', 'CVE-2015-8708', 'CVE-2015-8770', 'CVE-2015-8575', 'CVE-2015-6360', 'CVE-2015-8704', 'CVE-2015-8748', 'CVE-2011-3389', 'CVE-2015-8750', 'CVE-2015-8369', 'CVE-2015-8781', 'CVE-2016-1232', 'CVE-2016-1572', 'CVE-2015-2632', 'CVE-2016-2039', 'CVE-2015-8614', 'CVE-2015-7557', 'CVE-2015-8665', 'CVE-2016-1982', 'CVE-2015-8747', 'CVE-2016-1983', 'CVE-2014-3566', 'CVE-2015-8683', 'CVE-2015-5299'], '2016,2': ['CVE-2013-6441', 'CVE-2015-8629', 'CVE-2016-0763', 'CVE-2016-0774', 'CVE-2016-2222', 'CVE-2016-0729', 'CVE-2016-0402', 'CVE-2016-0714', 'CVE-2016-2037', 'CVE-2012-6687', 'CVE-2016-0546', 'CVE-2016-0608', 'CVE-2016-0609', 'CVE-2015-7673', 'CVE-2015-5345', 'CVE-2006-7243', 'CVE-2015-3197', 'CVE-2016-0787', 'CVE-2015-7674', 'CVE-2015-1805', 'CVE-2015-5351', 'CVE-2016-0598', 'CVE-2016-2511', 'CVE-2015-5174', 'CVE-2014-9761', 'CVE-2015-8472', 'CVE-2016-0596', 'CVE-2016-1567', 'CVE-2015-8767', 'CVE-2015-8776', 'CVE-2013-7448', 'CVE-2016-2569', 'CVE-2016-2510', 'CVE-2016-0606', 'CVE-2015-8812', 'CVE-2014-9765', 'CVE-2015-7575', 'CVE-2013-7447', 'CVE-2016-0775', 'CVE-2016-2571', 'CVE-2016-0494', 'CVE-2016-0773', 'CVE-2015-8779', 'CVE-2016-0706', 'CVE-2015-8126', 'CVE-2016-0616', 'CVE-2014-9766', 'CVE-2015-8790', 'CVE-2016-2221', 'CVE-2015-1335', 'CVE-2016-0600', 'CVE-2015-2305', 'CVE-2016-2384', 'CVE-2016-0505', 'CVE-2016-0448', 'CVE-2016-0739', 'CVE-2015-2348', 'CVE-2016-2069', 'CVE-2016-', 'CVE-2016-0723', 'CVE-2015-8688', 'CVE-2015-8631', 'CVE-2016-0483', 'CVE-2015-8778', 'CVE-2015-7547', 'CVE-2016-0597', 'CVE-2015-7566', 'CVE-2016-1938', 'CVE-2015-8791', 'CVE-2015-8785', 'CVE-2015-4491', 'CVE-2016-0466'], '2016,3': ['CVE-2016-2569'], '2016,4': ['CVE-2016-0666', 'CVE-2016-0641', 'CVE-2016-0649', 'CVE-2016-0642', 'CVE-2015-7827', 'CVE-2016-0643', 'CVE-2016-2194', 'CVE-2015-7674', 'CVE-2016-0640', 'CVE-2016-0644', 'CVE-2015-5726', 'CVE-2016-2047', 'CVE-2016-2849', 'CVE-2015-7552', 'CVE-2016-0647', 'CVE-2016-0650', 'CVE-2016-0648', 'CVE-2015-5727', 'CVE-2014-9742', 'CVE-2016-2195', 'CVE-2016-0646', 'CVE-2015-8868'], '2016,5': ['CVE-2016-2105', 'CVE-2012-6058', 'CVE-2012-6057', 'CVE-2012-6061', 'CVE-2016-4081', 'CVE-2016-0636', 'CVE-2015-7542', 'CVE-2016-4008', 'CVE-2013-2487', 'CVE-2014-9676', 'CVE-2015-7558', 'CVE-2014-7210', 'CVE-2013-2485', 'CVE-2015-6246', 'CVE-2016-3715', 'CVE-2015-7577', 'CVE-2013-1580', 'CVE-2016-4536', 'CVE-2015-7181', 'CVE-2013-1577', 'CVE-2016-0686', 'CVE-2013-1576', 'CVE-2013-1574', 'CVE-2016-4579', 'CVE-2016-4343', 'CVE-2016-4051', 'CVE-2016-0753', 'CVE-2016-4070', 'CVE-2013-1578', 'CVE-2016-4539', 'CVE-2016-3178', 'CVE-2016-4541', 'CVE-2016-3425', 'CVE-2015-7969', 'CVE-2016-2038', 'CVE-2015-8878', 'CVE-2012-6053', 'CVE-2016-1571', 'CVE-2015-8339', 'CVE-2016-2317', 'CVE-2015-8615', 'CVE-2016-3714', 'CVE-2013-4080', 'CVE-2016-4071', 'CVE-2016-2807', 'CVE-2015-2059', 'CVE-2016-4477', 'CVE-2014-9720', 'CVE-2016-2270', 'CVE-2016-2167', 'CVE-2016-2107', 'CVE-2016-4006', 'CVE-2013-4929', 'CVE-2016-2168', 'CVE-2016-4561', 'CVE-2016-4347', 'CVE-2014-6610', 'CVE-2016-0718', 'CVE-2016-4556', 'CVE-2016-1234', 'CVE-2015-3246', 'CVE-2016-1236', 'CVE-2016-4052', 'CVE-2016-1979', 'CVE-2015-8104', 'CVE-2016-3179', 'CVE-2016-4804', 'CVE-2015-8865', 'CVE-2012-6059', 'CVE-2016-3716', 'CVE-2015-7970', 'CVE-2014-5015', 'CVE-2016-2039', 'CVE-2015-8874', 'CVE-2016-3718', 'CVE-2015-7971', 'CVE-2013-5719', 'CVE-2013-4079', 'CVE-2015-8879', 'CVE-2016-4072', 'CVE-2013-1573', 'CVE-2016-1570', 'CVE-2015-6248', 'CVE-2016-4054', 'CVE-2015-0896', 'CVE-2013-4458', 'CVE-2015-8555', 'CVE-2013-6339', 'CVE-2016-4540', 'CVE-2016-4348', 'CVE-2016-4542', 'CVE-2015-8866', 'CVE-2016-3427', 'CVE-2016-1978', 'CVE-2013-1579', 'CVE-2016-4079', 'CVE-2015-5161', 'CVE-2016-2058', 'CVE-2016-4544', 'CVE-2016-2045', 'CVE-2016-1927', 'CVE-2016-2106', 'CVE-2012-6052', 'CVE-2013-2482', 'CVE-2013-1575', 'CVE-2015-3008', 'CVE-2016-4543', 'CVE-2015-8550', 'CVE-2012-6054', 'CVE-2015-8212', 'CVE-2016-2108', 'CVE-2015-5660', 'CVE-2012-6055', 'CVE-2016-4352', 'CVE-2016-2860', 'CVE-2015-8340', 'CVE-2016-4073', 'CVE-2012-6062', 'CVE-2013-2479', 'CVE-2016-4537', 'CVE-2016-2271', 'CVE-2016-2054', 'CVE-2016-4080', 'CVE-2014-8418', 'CVE-2016-4554', 'CVE-2013-2476', 'CVE-2016-2099', 'CVE-2016-2055', 'CVE-2013-7112', 'CVE-2016-1950', 'CVE-2013-1572', 'CVE-2015-6243', 'CVE-2016-4476', 'CVE-2012-6056', 'CVE-2016-2560', 'CVE-2015-8808', 'CVE-2015-7972', 'CVE-2014-8350', 'CVE-2014-2286', 'CVE-2016-2040', 'CVE-2016-4425', 'CVE-2016-2041', 'CVE-2014-1878', 'CVE-2014-8412', 'CVE-2016-4053', 'CVE-2016-2318', 'CVE-2016-0695', 'CVE-2016-3706', 'CVE-2016-2176', 'CVE-2015-8869', 'CVE-2016-2805', 'CVE-2016-3717', 'CVE-2013-2486', 'CVE-2016-4082', 'CVE-2013-5721', 'CVE-2012-6060', 'CVE-2016-2056', 'CVE-2015-8312', 'CVE-2016-3426', 'CVE-2015-5165', 'CVE-2015-8554', 'CVE-2016-3075', 'CVE-2016-4085', 'CVE-2015-5307', 'CVE-2016-0687', 'CVE-2015-7182', 'CVE-2015-3245', 'CVE-2013-1581', 'CVE-2016-2109', 'CVE-2015-8872', 'CVE-2015-2752', 'CVE-2014-4046', 'CVE-2016-1938', 'CVE-2016-3105', 'CVE-2013-4927', 'CVE-2016-4555', 'CVE-2013-4931', 'CVE-2015-2756'], '2016,6': ['CVE-2016-4463', 'CVE-2016-4068', 'CVE-2016-5118', 'CVE-2016-5355', 'CVE-2016-1837', 'CVE-2016-2186', 'CVE-2016-4562', 'CVE-2016-0772', 'CVE-2016-5094', 'CVE-2016-5243', 'CVE-2016-4563', 'CVE-2016-4564', 'CVE-2016-5357', 'CVE-2016-3136', 'CVE-2016-3627', 'CVE-2016-1684', 'CVE-2016-5356', 'CVE-2016-3138', 'CVE-2015-8806', 'CVE-2016-5364', 'CVE-2016-5096', 'CVE-2015-8864', 'CVE-2016-2150', 'CVE-2016-5351', 'CVE-2016-2822', 'CVE-2016-2834', 'CVE-2015-7995', 'CVE-2016-1839', 'CVE-2016-1762', 'CVE-2016-2175', 'CVE-2016-4447', 'CVE-2016-2818', 'CVE-2016-3092', 'CVE-2016-2184', 'CVE-2016-1834', 'CVE-2016-4578', 'CVE-2012-6702', 'CVE-2016-5300', 'CVE-2016-1583', 'CVE-2016-5354', 'CVE-2016-4913', 'CVE-2015-2575', 'CVE-2016-1951', 'CVE-2015-7552', 'CVE-2016-5766', 'CVE-2016-3137', 'CVE-2016-0821', 'CVE-2016-5353', 'CVE-2012-0876', 'CVE-2016-4569', 'CVE-2016-2073', 'CVE-2015-8936', 'CVE-2016-4428', 'CVE-2016-5244', 'CVE-2016-3140', 'CVE-2016-2187', 'CVE-2016-1833', 'CVE-2016-2828', 'CVE-2016-2831', 'CVE-2016-2335', 'CVE-2016-4580', 'CVE-2016-2185', 'CVE-2014-7912', 'CVE-2016-1835', 'CVE-2015-4000', 'CVE-2016-5301', 'CVE-2016-2115', 'CVE-2016-3951', 'CVE-2016-4449', 'CVE-2014-7913', 'CVE-2016-5350', 'CVE-2016-5742', 'CVE-2016-4486', 'CVE-2016-3955', 'CVE-2016-4482', 'CVE-2016-4994', 'CVE-2016-5093', 'CVE-2016-2821', 'CVE-2016-3672', 'CVE-2016-1840', 'CVE-2016-1838', 'CVE-2016-3134', 'CVE-2016-4483', 'CVE-2016-2806', 'CVE-2016-4565', 'CVE-2016-4485', 'CVE-2016-3062', 'CVE-2016-3157', 'CVE-2016-5359', 'CVE-2016-3705', 'CVE-2016-3674', 'CVE-2016-5095', 'CVE-2016-2819', 'CVE-2016-4971', 'CVE-2016-5699', 'CVE-2016-5636', 'CVE-2016-1683', 'CVE-2016-3961'], '2016,7': ['CVE-2015-7978', 'CVE-2016-3159', 'CVE-2016-5387', 'CVE-2016-4489', 'CVE-2016-6211', 'CVE-2016-5739', 'CVE-2013-7458', 'CVE-2016-4488', 'CVE-2016-3659', 'CVE-2016-6210', 'CVE-2016-3960', 'CVE-2016-5844', 'CVE-2016-5403', 'CVE-2016-3158', 'CVE-2015-8932', 'CVE-2016-4051', 'CVE-2016-5008', 'CVE-2016-4020', 'CVE-2016-6254', 'CVE-2016-5838', 'CVE-2016-5839', 'CVE-2016-5241', 'CVE-2016-4323', 'CVE-2016-6232', 'CVE-2016-2225', 'CVE-2016-6296', 'CVE-2016-6161', 'CVE-2016-6258', 'CVE-2016-1548', 'CVE-2016-2371', 'CVE-2016-2818', 'CVE-2016-2366', 'CVE-2015-8931', 'CVE-2016-6186', 'CVE-2015-7974', 'CVE-2016-3710', 'CVE-2016-2857', 'CVE-2016-2373', 'CVE-2016-1550', 'CVE-2015-4844', 'CVE-2016-5832', 'CVE-2015-2632', 'CVE-2016-1547', 'CVE-2016-2374', 'CVE-2016-2369', 'CVE-2016-6351', 'CVE-2016-2372', 'CVE-2016-3712', 'CVE-2015-8917', 'CVE-2015-8922', 'CVE-2015-7943', 'CVE-2016-6185', 'CVE-2016-2376', 'CVE-2015-8934', 'CVE-2016-6160', 'CVE-2016-4493', 'CVE-2014-9906', 'CVE-2016-4487', 'CVE-2015-8921', 'CVE-2016-4490', 'CVE-2016-5240', 'CVE-2015-8925', 'CVE-2015-8949', 'CVE-2015-8138', 'CVE-2016-5733', 'CVE-2016-2518', 'CVE-2016-2367', 'CVE-2015-5239', 'CVE-2016-2226', 'CVE-2014-3672', 'CVE-2015-8920', 'CVE-2016-6131', 'CVE-2016-2370', 'CVE-2016-4554', 'CVE-2015-8923', 'CVE-2016-2516', 'CVE-2016-2377', 'CVE-2015-7979', 'CVE-2015-7977', 'CVE-2016-2378', 'CVE-2016-6153', 'CVE-2016-4492', 'CVE-2015-8771', 'CVE-2016-2313', 'CVE-2016-2375', 'CVE-2015-8158', 'CVE-2016-4439', 'CVE-2015-8926', 'CVE-2016-4302', 'CVE-2016-2365', 'CVE-2015-8933', 'CVE-2016-2224', 'CVE-2016-5835', 'CVE-2016-0494', 'CVE-2016-5834', 'CVE-2015-8930', 'CVE-2016-2380', 'CVE-2015-8924', 'CVE-2015-0857', 'CVE-2016-4480', 'CVE-2016-4809', 'CVE-2016-3172', 'CVE-2016-5731', 'CVE-2016-2368', 'CVE-2016-4300', 'CVE-2016-1238', 'CVE-2015-8919', 'CVE-2015-0858', 'CVE-2016-6264'], '2016,8': ['CVE-2016-6313', 'CVE-2016-5424', 'CVE-2016-5265', 'CVE-2016-6511', 'CVE-2016-6494', 'CVE-2016-6318', 'CVE-2016-4036', 'CVE-2015-3227', 'CVE-2016-6509', 'CVE-2016-5254', 'CVE-2016-3477', 'CVE-2016-5259', 'CVE-2016-2830', 'CVE-2016-6506', 'CVE-2016-6489', 'CVE-2016-1000212', 'CVE-2016-3615', 'CVE-2016-4049', 'CVE-2016-6855', 'CVE-2016-5384', 'CVE-2016-5321', 'CVE-2016-5323', 'CVE-2015-8948', 'CVE-2016-3500', 'CVE-2016-5252', 'CVE-2016-2098', 'CVE-2016-5419', 'CVE-2016-3458', 'CVE-2016-6504', 'CVE-2016-2836', 'CVE-2016-6316', 'CVE-2016-5258', 'CVE-2016-0751', 'CVE-2016-4324', 'CVE-2016-2838', 'CVE-2016-5316', 'CVE-2016-5314', 'CVE-2016-6866', 'CVE-2016-5320', 'CVE-2016-3606', 'CVE-2016-5875', 'CVE-2016-1513', 'CVE-2016-6515', 'CVE-2015-7576', 'CVE-2016-5423', 'CVE-2016-5315', 'CVE-2016-5420', 'CVE-2016-3521', 'CVE-2016-5262', 'CVE-2016-2097', 'CVE-2016-3508', 'CVE-2016-6525', 'CVE-2016-5264', 'CVE-2016-5440', 'CVE-2016-6263', 'CVE-2016-4313', 'CVE-2016-3991', 'CVE-2016-5322', 'CVE-2016-2837', 'CVE-2016-6255', 'CVE-2016-3550', 'CVE-2016-6505', 'CVE-2016-5317', 'CVE-2016-6507', 'CVE-2016-0752', 'CVE-2016-6510', 'CVE-2016-6261', 'CVE-2016-1238', 'CVE-2016-5263', 'CVE-2016-6508'], '2016,9': ['CVE-2016-6606', 'CVE-2015-8834', 'CVE-2016-7167', 'CVE-2016-6624', 'CVE-2016-5399', 'CVE-2016-5772', 'CVE-2016-5274', 'CVE-2016-6297', 'CVE-2016-5250', 'CVE-2016-5277', 'CVE-2016-7180', 'CVE-2014-8129', 'CVE-2016-5323', 'CVE-2016-3186', 'CVE-2016-7177', 'CVE-2016-2836', 'CVE-2016-7179', 'CVE-2016-6306', 'CVE-2016-5836', 'CVE-2016-3945', 'CVE-2016-6893', 'CVE-2016-6302', 'CVE-2016-0753', 'CVE-2016-5281', 'CVE-2016-7510', 'CVE-2016-5322', 'CVE-2016-3990', 'CVE-2016-6480', 'CVE-2016-5096', 'CVE-2016-5769', 'CVE-2010-2596', 'CVE-2014-8128', 'CVE-2016-6801', 'CVE-2016-7176', 'CVE-2016-5725', 'CVE-2016-7545', 'CVE-2016-6296', 'CVE-2016-5114', 'CVE-2016-4538', 'CVE-2015-1547', 'CVE-2016-6295', 'CVE-2016-5278', 'CVE-2016-5261', 'CVE-2016-6172', 'CVE-2016-2183', 'CVE-2016-2178', 'CVE-2016-7392', 'CVE-2016-6614', 'CVE-2016-6136', 'CVE-2016-5320', 'CVE-2016-2177', 'CVE-2016-6622', 'CVE-2016-6293', 'CVE-2016-6291', 'CVE-2016-6831', 'CVE-2016-4069', 'CVE-2016-5284', 'CVE-2016-6631', 'CVE-2015-8665', 'CVE-2016-6609', 'CVE-2016-1240', 'CVE-2016-6129', 'CVE-2016-6612', 'CVE-2016-7115', 'CVE-2016-6635', 'CVE-2016-5321', 'CVE-2016-6294', 'CVE-2016-6623', 'CVE-2016-2181', 'CVE-2015-1433', 'CVE-2016-4029', 'CVE-2014-9587', 'CVE-2014-9655', 'CVE-2016-6611', 'CVE-2016-5770', 'CVE-2016-5314', 'CVE-2016-7118', 'CVE-2016-7116', 'CVE-2016-5771', 'CVE-2016-5829', 'CVE-2016-6223', 'CVE-2016-7141', 'CVE-2016-5317', 'CVE-2016-5270', 'CVE-2016-4537', 'CVE-2016-6634', 'CVE-2016-6304', 'CVE-2016-3857', 'CVE-2016-2182', 'CVE-2016-4470', 'CVE-2016-7094', 'CVE-2016-7178', 'CVE-2016-7092', 'CVE-2016-5280', 'CVE-2016-6828', 'CVE-2016-5257', 'CVE-2016-5696', 'CVE-2016-5773', 'CVE-2016-7166', 'CVE-2016-6292', 'CVE-2016-7169', 'CVE-2016-2179', 'CVE-2016-5017', 'CVE-2016-7407', 'CVE-2016-6290', 'CVE-2016-7406', 'CVE-2016-2313', 'CVE-2015-3440', 'CVE-2016-6607', 'CVE-2016-6830', 'CVE-2016-5316', 'CVE-2016-1243', 'CVE-2016-6303', 'CVE-2016-7168', 'CVE-2016-5875', 'CVE-2016-6613', 'CVE-2016-5315', 'CVE-2016-6662', 'CVE-2016-5272', 'CVE-2016-5426', 'CVE-2016-6620', 'CVE-2016-6630', 'CVE-2016-1244', 'CVE-2016-4473', 'CVE-2016-7511', 'CVE-2015-8915', 'CVE-2015-8683', 'CVE-2016-3623', 'CVE-2013-1961', 'CVE-2016-5427', 'CVE-2016-5276', 'CVE-2016-5768', 'CVE-2016-6289', 'CVE-2016-3991', 'CVE-2016-2180'], '2016,10': ['CVE-2016-8694', 'CVE-2016-5407', 'CVE-2016-8696', 'CVE-2016-5250', 'CVE-2016-5277', 'CVE-2016-8578', 'CVE-2016-8687', 'CVE-2016-8700', 'CVE-2016-5038', 'CVE-2016-8576', 'CVE-2016-1245', 'CVE-2016-8605', 'CVE-2016-7393', 'CVE-2016-6321', 'CVE-2016-8689', 'CVE-2016-8703', 'CVE-2016-7979', 'CVE-2016-5281', 'CVE-2016-7945', 'CVE-2016-7425', 'CVE-2016-7543', 'CVE-2016-8701', 'CVE-2016-8577', 'CVE-2016-7997', 'CVE-2016-5042', 'CVE-2016-7909', 'CVE-2016-7946', 'CVE-2013-5653', 'CVE-2016-7969', 'CVE-2016-5131', 'CVE-2016-5278', 'CVE-2016-5261', 'CVE-2016-7949', 'CVE-2016-5034', 'CVE-2013-7437', 'CVE-2016-7944', 'CVE-2016-4658', 'CVE-2016-7042', 'CVE-2016-5039', 'CVE-2016-7401', 'CVE-2016-5195', 'CVE-2015-8538', 'CVE-2016-8910', 'CVE-2016-8702', 'CVE-2016-5284', 'CVE-2016-7449', 'CVE-2016-5036', 'CVE-2016-2050', 'CVE-2016-7942', 'CVE-2016-8697', 'CVE-2016-5418', 'CVE-2016-8695', 'CVE-2016-2776', 'CVE-2016-7800', 'CVE-2016-2848', 'CVE-2016-8699', 'CVE-2016-8683', 'CVE-2016-8670', 'CVE-2016-7952', 'CVE-2016-7947', 'CVE-2016-8606', 'CVE-2016-8698', 'CVE-2016-7951', 'CVE-2016-7448', 'CVE-2016-8669', 'CVE-2016-8859', 'CVE-2016-7977', 'CVE-2016-8688', 'CVE-2016-8602', 'CVE-2015-8956', 'CVE-2016-5180', 'CVE-2016-9082', 'CVE-2016-7978', 'CVE-2016-7943', 'CVE-2016-5684', 'CVE-2016-5270', 'CVE-2016-2091', 'CVE-2016-7170', 'CVE-2016-4861', 'CVE-2014-9497', 'CVE-2015-5479', 'CVE-2016-7966', 'CVE-2016-5280', 'CVE-2016-7953', 'CVE-2016-5257', 'CVE-2016-8682', 'CVE-2016-2775', 'CVE-2016-7446', 'CVE-2016-6911', 'CVE-2016-8684', 'CVE-2016-1246', 'CVE-2016-7948', 'CVE-2016-7161', 'CVE-2016-7908', 'CVE-2016-8909', 'CVE-2016-7447', 'CVE-2016-7950', 'CVE-2016-7972', 'CVE-2016-7996', 'CVE-2015-1872', 'CVE-2015-8750', 'CVE-2016-5272', 'CVE-2016-7976', 'CVE-2016-1000247', 'CVE-2016-5276'], '2016,11': ['CVE-2016-9376', 'CVE-2016-8616', 'CVE-2016-7553', 'CVE-2016-7982', 'CVE-2015-8668', 'CVE-2016-5102', 'CVE-2016-7032', 'CVE-2016-9011', 'CVE-2016-3186', 'CVE-2016-9375', 'CVE-2016-9635', 'CVE-2016-7999', 'CVE-2016-7909', 'CVE-2016-9379', 'CVE-2016-3619', 'CVE-2014-8128', 'CVE-2016-3633', 'CVE-2016-9636', 'CVE-2016-3620', 'CVE-2015-7554', 'CVE-2016-5582', 'CVE-2016-8618', 'CVE-2016-8705', 'CVE-2016-3634', 'CVE-2016-8624', 'CVE-2016-9451', 'CVE-2016-9380', 'CVE-2016-8617', 'CVE-2016-8910', 'CVE-2016-5318', 'CVE-2016-3624', 'CVE-2016-3632', 'CVE-2016-5652', 'CVE-2014-5439', 'CVE-2016-9189', 'CVE-2016-9449', 'CVE-2016-9427', 'CVE-2016-1248', 'CVE-2016-8864', 'CVE-2016-8623', 'CVE-2016-3621', 'CVE-2016-8619', 'CVE-2016-9103', 'CVE-2016-9445', 'CVE-2016-7440', 'CVE-2016-5573', 'CVE-2016-5597', 'CVE-2016-5584', 'CVE-2016-9382', 'CVE-2016-9106', 'CVE-2016-6223', 'CVE-2016-3631', 'CVE-2013-7291', 'CVE-2015-8978', 'CVE-2016-9383', 'CVE-2016-9634', 'CVE-2016-9447', 'CVE-2016-9105', 'CVE-2016-5542', 'CVE-2016-5554', 'CVE-2016-9386', 'CVE-2016-8615', 'CVE-2016-9297', 'CVE-2016-8331', 'CVE-2016-9119', 'CVE-2016-8622', 'CVE-2016-4738', 'CVE-2016-5319', 'CVE-2016-8706', 'CVE-2016-7777', 'CVE-2014-9862', 'CVE-2016-8909', 'CVE-2016-9190', 'CVE-2016-7998', 'CVE-2016-7076', 'CVE-2016-9102', 'CVE-2016-7980', 'CVE-2016-9374', 'CVE-2016-9532', 'CVE-2016-9446', 'CVE-2016-9273', 'CVE-2016-9381', 'CVE-2016-8621', 'CVE-2016-3623', 'CVE-2016-8704', 'CVE-2016-7146', 'CVE-2016-9373', 'CVE-2016-9101', 'CVE-2016-7981', 'CVE-2016-9104'], '2016,12': ['CVE-2014-9816', 'CVE-2016-7128', 'CVE-2014-9810', 'CVE-2014-9806', 'CVE-2014-9843', 'CVE-2016-6797', 'CVE-2016-10045', 'CVE-2014-9847', 'CVE-2016-9901', 'CVE-2016-7535', 'CVE-2014-9845', 'CVE-2016-8691', 'CVE-2016-7415', 'CVE-2016-4562', 'CVE-2016-9899', 'CVE-2016-10002', 'CVE-2016-7132', 'CVE-2016-7418', 'CVE-2016-9850', 'CVE-2014-9907', 'CVE-2016-7533', 'CVE-2016-5010', 'CVE-2016-7516', 'CVE-2016-8882', 'CVE-2014-9817', 'CVE-2016-1567', 'CVE-2016-7414', 'CVE-2016-1254', 'CVE-2016-8707', 'CVE-2016-9839', 'CVE-2014-9835', 'CVE-2016-8883', 'CVE-2016-9774', 'CVE-2016-8863', 'CVE-2016-4564', 'CVE-2016-7537', 'CVE-2014-9828', 'CVE-2014-9833', 'CVE-2014-9851', 'CVE-2016-5691', 'CVE-2014-9818', 'CVE-2016-5687', 'CVE-2016-7124', 'CVE-2016-7531', 'CVE-2014-9846', 'CVE-2016-4333', 'CVE-2016-7515', 'CVE-2016-9895', 'CVE-2014-9829', 'CVE-2016-7539', 'CVE-2016-9998', 'CVE-2016-9902', 'CVE-2016-9844', 'CVE-2016-7530', 'CVE-2015-8959', 'CVE-2014-9812', 'CVE-2014-9808', 'CVE-2016-9900', 'CVE-2015-8979', 'CVE-2016-7129', 'CVE-2016-9939', 'CVE-2016-7528', 'CVE-2016-7522', 'CVE-2016-9074', 'CVE-2016-9864', 'CVE-2016-7412', 'CVE-2016-4330', 'CVE-2014-9824', 'CVE-2014-9853', 'CVE-2016-9064', 'CVE-2016-7514', 'CVE-2016-7417', 'CVE-2016-9811', 'CVE-2016-9921', 'CVE-2016-7532', 'CVE-2016-5689', 'CVE-2016-9861', 'CVE-2016-4332', 'CVE-2016-7518', 'CVE-2016-6823', 'CVE-2016-7524', 'CVE-2014-9911', 'CVE-2016-9961', 'CVE-2016-7519', 'CVE-2016-9897', 'CVE-2016-9911', 'CVE-2014-9821', 'CVE-2014-9838', 'CVE-2016-8862', 'CVE-2014-9837', 'CVE-2016-7413', 'CVE-2014-9854', 'CVE-2016-9566', 'CVE-2016-7538', 'CVE-2016-8693', 'CVE-2016-9904', 'CVE-2016-6794', 'CVE-2016-5841', 'CVE-2016-9066', 'CVE-2016-6816', 'CVE-2014-9809', 'CVE-2016-5688', 'CVE-2016-9898', 'CVE-2016-9922', 'CVE-2016-9997', 'CVE-2014-9823', 'CVE-2015-5345', 'CVE-2016-7526', 'CVE-2016-6491', 'CVE-2016-9809', 'CVE-2016-9565', 'CVE-2016-5842', 'CVE-2014-9839', 'CVE-2016-10033', 'CVE-2016-9933', 'CVE-2016-9865', 'CVE-2014-9832', 'CVE-2016-9079', 'CVE-2016-7411', 'CVE-2014-9811', 'CVE-2016-1253', 'CVE-2014-9813', 'CVE-2016-0762', 'CVE-2016-9849', 'CVE-2014-9844', 'CVE-2016-8735', 'CVE-2014-9814', 'CVE-2014-9840', 'CVE-2016-9960', 'CVE-2016-7067', 'CVE-2014-9831', 'CVE-2016-5291', 'CVE-2014-9834', 'CVE-2016-5290', 'CVE-2016-8887', 'CVE-2016-9959', 'CVE-2016-4021', 'CVE-2016-4331', 'CVE-2015-0854', 'CVE-2016-9905', 'CVE-2014-9807', 'CVE-2016-7101', 'CVE-2016-7536', 'CVE-2016-7517', 'CVE-2016-7529', 'CVE-2015-8957', 'CVE-2014-9805', 'CVE-2014-9819', 'CVE-2016-9560', 'CVE-2016-9958', 'CVE-2016-9772', 'CVE-2014-9849', 'CVE-2016-5296', 'CVE-2016-9888', 'CVE-2016-8692', 'CVE-2014-9913', 'CVE-2015-8958', 'CVE-2016-5690', 'CVE-2016-7523', 'CVE-2016-9957', 'CVE-2016-7799', 'CVE-2016-7527', 'CVE-2014-9830', 'CVE-2014-9848', 'CVE-2016-6626', 'CVE-2016-9556', 'CVE-2016-7130', 'CVE-2014-9826', 'CVE-2016-6796', 'CVE-2016-5385', 'CVE-2016-9964', 'CVE-2016-4412', 'CVE-2014-9822', 'CVE-2016-7520', 'CVE-2016-9586', 'CVE-2016-7416', 'CVE-2016-7521', 'CVE-2016-7534', 'CVE-2016-9893', 'CVE-2016-9963', 'CVE-2016-5018', 'CVE-2016-8866', 'CVE-2014-9836', 'CVE-2014-9815', 'CVE-2016-8654', 'CVE-2016-5297', 'CVE-2016-9152', 'CVE-2016-7131'], '2017,1': ['CVE-2016-9131', 'CVE-2016-7923', 'CVE-2017-0381', 'CVE-2016-7933', 'CVE-2016-3622', 'CVE-2016-10045', 'CVE-2016-8399', 'CVE-2016-9827', 'CVE-2016-10146', 'CVE-2016-9899', 'CVE-2017-0356', 'CVE-2017-3312', 'CVE-2016-9317', 'CVE-2016-7930', 'CVE-2017-5208', 'CVE-2016-8677', 'CVE-2016-8745', 'CVE-2016-10013', 'CVE-2016-7928', 'CVE-2016-2125', 'CVE-2016-10109', 'CVE-2016-9794', 'CVE-2016-7072', 'CVE-2016-3945', 'CVE-2017-5332', 'CVE-2016-10168', 'CVE-2017-3317', 'CVE-2016-7938', 'CVE-2017-5342', 'CVE-2016-7073', 'CVE-2016-7992', 'CVE-2016-9895', 'CVE-2016-10024', 'CVE-2016-3990', 'CVE-2017-3258', 'CVE-2017-3318', 'CVE-2016-7929', 'CVE-2016-9147', 'CVE-2016-8575', 'CVE-2016-8645', 'CVE-2016-7922', 'CVE-2017-5209', 'CVE-2016-9555', 'CVE-2016-9576', 'CVE-2017-5486', 'CVE-2016-9540', 'CVE-2016-9900', 'CVE-2016-6814', 'CVE-2016-7974', 'CVE-2017-5482', 'CVE-2016-9829', 'CVE-2015-8963', 'CVE-2016-7986', 'CVE-2016-9828', 'CVE-2016-10151', 'CVE-2016-9266', 'CVE-2017-5333', 'CVE-2017-5396', 'CVE-2016-9820', 'CVE-2016-7939', 'CVE-2017-5507', 'CVE-2017-3265', 'CVE-2017-3244', 'CVE-2016-7931', 'CVE-2016-10074', 'CVE-2015-8964', 'CVE-2016-9178', 'CVE-2016-9139', 'CVE-2016-7940', 'CVE-2016-9264', 'CVE-2016-9533', 'CVE-2013-7459', 'CVE-2016-9831', 'CVE-2016-7975', 'CVE-2015-8962', 'CVE-2016-7097', 'CVE-2016-9897', 'CVE-2017-5511', 'CVE-2016-3624', 'CVE-2017-3243', 'CVE-2016-10145', 'CVE-2017-3238', 'CVE-2017-5601', 'CVE-2016-10088', 'CVE-2016-9819', 'CVE-2016-9941', 'CVE-2016-9535', 'CVE-2016-9904', 'CVE-2017-5485', 'CVE-2017-3313', 'CVE-2016-6816', 'CVE-2016-7973', 'CVE-2016-9898', 'CVE-2016-1255', 'CVE-2016-9536', 'CVE-2016-7985', 'CVE-2016-9444', 'CVE-2016-9538', 'CVE-2016-10092', 'CVE-2016-8633', 'CVE-2016-7925', 'CVE-2016-7927', 'CVE-2016-7983', 'CVE-2017-5341', 'CVE-2016-10033', 'CVE-2017-5331', 'CVE-2016-10152', 'CVE-2016-10093', 'CVE-2017-5375', 'CVE-2016-7984', 'CVE-2017-5484', 'CVE-2016-10167', 'CVE-2016-10173', 'CVE-2016-10140', 'CVE-2017-3291', 'CVE-2016-9646', 'CVE-2016-9821', 'CVE-2016-7926', 'CVE-2017-5510', 'CVE-2014-2287', 'CVE-2017-5383', 'CVE-2016-10165', 'CVE-2016-7910', 'CVE-2016-2120', 'CVE-2016-7074', 'CVE-2016-9537', 'CVE-2017-5202', 'CVE-2017-5225', 'CVE-2017-5204', 'CVE-2017-5376', 'CVE-2016-9905', 'CVE-2016-8574', 'CVE-2016-7936', 'CVE-2017-5378', 'CVE-2012-6704', 'CVE-2017-5386', 'CVE-2016-10164', 'CVE-2016-7424', 'CVE-2017-5380', 'CVE-2016-9942', 'CVE-2017-5483', 'CVE-2016-8655', 'CVE-2016-9793', 'CVE-2015-0839', 'CVE-2017-5508', 'CVE-2015-1350', 'CVE-2017-5205', 'CVE-2016-7551', 'CVE-2016-7924', 'CVE-2016-7937', 'CVE-2016-7935', 'CVE-2016-7915', 'CVE-2017-5506', 'CVE-2017-5522', 'CVE-2017-5545', 'CVE-2016-7068', 'CVE-2017-5373', 'CVE-2016-9132', 'CVE-2016-9822', 'CVE-2017-5390', 'CVE-2016-9265', 'CVE-2016-9893', 'CVE-2016-7993', 'CVE-2016-9534', 'CVE-2016-3623', 'CVE-2016-10144', 'CVE-2016-7932', 'CVE-2016-10026', 'CVE-2016-7911', 'CVE-2016-9756', 'CVE-2017-5203', 'CVE-2016-7934'], '2017,2': ['CVE-2016-7056', 'CVE-2017-5549', 'CVE-2016-9935', 'CVE-2017-6307', 'CVE-2016-5546', 'CVE-2016-10197', 'CVE-2017-5490', 'CVE-2017-5953', 'CVE-2016-5548', 'CVE-2017-5493', 'CVE-2017-5668', 'CVE-2017-5610', 'CVE-2017-6001', 'CVE-2017-3253', 'CVE-2016-10158', 'CVE-2016-3142', 'CVE-2017-5848', 'CVE-2016-3141', 'CVE-2014-9888', 'CVE-2017-2616', 'CVE-2016-8743', 'CVE-2017-5491', 'CVE-2017-5611', 'CVE-2016-2554', 'CVE-2017-5835', 'CVE-2017-3135', 'CVE-2017-5489', 'CVE-2017-5843', 'CVE-2016-10198', 'CVE-2017-5840', 'CVE-2017-5837', 'CVE-2016-9921', 'CVE-2017-6014', 'CVE-2014-9895', 'CVE-2016-5547', 'CVE-2017-3289', 'CVE-2017-3241', 'CVE-2017-3731', 'CVE-2017-5898', 'CVE-2017-3231', 'CVE-2017-3252', 'CVE-2017-5492', 'CVE-2016-10159', 'CVE-2016-8610', 'CVE-2017-6310', 'CVE-2016-9578', 'CVE-2017-5617', 'CVE-2017-5844', 'CVE-2017-6056', 'CVE-2017-5973', 'CVE-2016-9934', 'CVE-2016-10188', 'CVE-2016-10196', 'CVE-2016-6621', 'CVE-2017-3261', 'CVE-2016-6787', 'CVE-2017-5834', 'CVE-2017-6197', 'CVE-2017-2620', 'CVE-2017-6074', 'CVE-2017-5885', 'CVE-2017-5847', 'CVE-2017-5884', 'CVE-2017-6188', 'CVE-2017-3272', 'CVE-2017-3260', 'CVE-2016-10195', 'CVE-2017-5488', 'CVE-2017-5846', 'CVE-2017-5938', 'CVE-2016-5552', 'CVE-2016-10161', 'CVE-2017-6308', 'CVE-2016-4342', 'CVE-2016-6786', 'CVE-2016-9577', 'CVE-2016-10189', 'CVE-2017-5612', 'CVE-2016-4793', 'CVE-2017-0358', 'CVE-2016-8405', 'CVE-2016-10160', 'CVE-2017-5223', 'CVE-2017-2615', 'CVE-2017-6309'], '2017,3': ['CVE-2016-2399', 'CVE-2017-6307', 'CVE-2017-6010', 'CVE-2017-5616', 'CVE-2017-5407', 'CVE-2015-8876', 'CVE-2016-0772', 'CVE-2017-6820', 'CVE-2017-6500', 'CVE-2017-6369', 'CVE-2017-2636', 'CVE-2017-6436', 'CVE-2017-6435', 'CVE-2017-6300', 'CVE-2017-6348', 'CVE-2017-6839', 'CVE-2017-5946', 'CVE-2017-6302', 'CVE-2017-6814', 'CVE-2016-8743', 'CVE-2017-6836', 'CVE-2017-6298', 'CVE-2016-10266', 'CVE-2016-10062', 'CVE-2015-8784', 'CVE-2017-5402', 'CVE-2017-6350', 'CVE-2017-5404', 'CVE-2017-5597', 'CVE-2017-6304', 'CVE-2017-6301', 'CVE-2016-9533', 'CVE-2016-9921', 'CVE-2017-2640', 'CVE-2016-3822', 'CVE-2017-7178', 'CVE-2016-10267', 'CVE-2017-5401', 'CVE-2017-6469', 'CVE-2017-5398', 'CVE-2017-6467', 'CVE-2017-6838', 'CVE-2017-6346', 'CVE-2016-10244', 'CVE-2017-5615', 'CVE-2017-5898', 'CVE-2017-5596', 'CVE-2017-6964', 'CVE-2017-6829', 'CVE-2017-6310', 'CVE-2016-7478', 'CVE-2017-6815', 'CVE-2016-9601', 'CVE-2016-9535', 'CVE-2017-6009', 'CVE-2017-6472', 'CVE-2016-10269', 'CVE-2017-6470', 'CVE-2017-5613', 'CVE-2017-6353', 'CVE-2017-6802', 'CVE-2017-5405', 'CVE-2017-6834', 'CVE-2016-8714', 'CVE-2017-6305', 'CVE-2017-5973', 'CVE-2016-5240', 'CVE-2017-5986', 'CVE-2017-5408', 'CVE-2017-6473', 'CVE-2017-2620', 'CVE-2017-6831', 'CVE-2017-6214', 'CVE-2017-6832', 'CVE-2017-6474', 'CVE-2016-7479', 'CVE-2017-6345', 'CVE-2015-8782', 'CVE-2017-7177', 'CVE-2015-8783', 'CVE-2017-6508', 'CVE-2017-5410', 'CVE-2017-6468', 'CVE-2017-6837', 'CVE-2016-9588', 'CVE-2017-6349', 'CVE-2017-6830', 'CVE-2017-6299', 'CVE-2017-5669', 'CVE-2017-6801', 'CVE-2016-10268', 'CVE-2017-5614', 'CVE-2017-6439', 'CVE-2017-6967', 'CVE-2017-6308', 'CVE-2017-6011', 'CVE-2015-8781', 'CVE-2016-10187', 'CVE-2017-5029', 'CVE-2017-6835', 'CVE-2016-10243', 'CVE-2017-5400', 'CVE-2017-6833', 'CVE-2016-9534', 'CVE-2017-6498', 'CVE-2017-6303', 'CVE-2017-7272', 'CVE-2017-2615', 'CVE-2017-6816', 'CVE-2017-6471', 'CVE-2017-6309'], '2017,4': ['CVE-2017-7606', 'CVE-2015-6644', 'CVE-2017-7742', 'CVE-2017-7875', 'CVE-2017-5460', 'CVE-2017-7853', 'CVE-2017-5464', 'CVE-2017-5407', 'CVE-2017-7407', 'CVE-2017-7960', 'CVE-2017-7595', 'CVE-2016-8685', 'CVE-2017-7585', 'CVE-2017-7616', 'CVE-2017-3309', 'CVE-2017-5432', 'CVE-2017-5441', 'CVE-2017-5448', 'CVE-2017-7308', 'CVE-2017-7586', 'CVE-2017-2671', 'CVE-2017-7294', 'CVE-2017-7741', 'CVE-2017-5447', 'CVE-2014-9496', 'CVE-2017-7618', 'CVE-2017-8073', 'CVE-2017-5433', 'CVE-2017-7961', 'CVE-2016-9604', 'CVE-2016-10324', 'CVE-2014-9756', 'CVE-2017-6949', 'CVE-2017-7184', 'CVE-2017-5462', 'CVE-2017-5445', 'CVE-2017-3305', 'CVE-2017-5402', 'CVE-2017-6503', 'CVE-2015-8981', 'CVE-2015-8272', 'CVE-2017-5929', 'CVE-2017-5404', 'CVE-2017-7596', 'CVE-2017-5396', 'CVE-2017-5647', 'CVE-2017-8105', 'CVE-2017-8296', 'CVE-2017-5469', 'CVE-2017-0553', 'CVE-2017-7593', 'CVE-2016-10328', 'CVE-2016-9591', 'CVE-2017-5662', 'CVE-2017-5401', 'CVE-2014-8760', 'CVE-2017-7234', 'CVE-2017-5398', 'CVE-2017-5444', 'CVE-2017-6951', 'CVE-2017-7578', 'CVE-2017-7599', 'CVE-2017-5951', 'CVE-2016-10251', 'CVE-2017-3600', 'CVE-2017-5436', 'CVE-2016-2188', 'CVE-2017-5886', 'CVE-2017-7228', 'CVE-2017-7601', 'CVE-2017-3329', 'CVE-2017-2619', 'CVE-2017-7602', 'CVE-2017-5465', 'CVE-2017-5440', 'CVE-2017-5852', 'CVE-2017-5435', 'CVE-2015-7805', 'CVE-2017-5442', 'CVE-2017-3157', 'CVE-2017-7467', 'CVE-2017-7600', 'CVE-2017-7472', 'CVE-2017-5405', 'CVE-2015-8271', 'CVE-2016-10220', 'CVE-2017-5375', 'CVE-2017-5434', 'CVE-2017-5854', 'CVE-2017-6504', 'CVE-2017-3308', 'CVE-2017-7594', 'CVE-2017-0360', 'CVE-2017-5408', 'CVE-2017-5439', 'CVE-2016-10200', 'CVE-2017-7619', 'CVE-2017-5461', 'CVE-2017-7261', 'CVE-2017-5446', 'CVE-2017-7598', 'CVE-2017-5970', 'CVE-2017-5661', 'CVE-2017-3461', 'CVE-2016-10326', 'CVE-2017-2801', 'CVE-2017-5853', 'CVE-2017-5383', 'CVE-2017-7273', 'CVE-2017-5376', 'CVE-2017-3464', 'CVE-2017-3463', 'CVE-2017-5429', 'CVE-2017-6844', 'CVE-2017-2647', 'CVE-2017-6596', 'CVE-2016-10219', 'CVE-2017-5438', 'CVE-2017-5378', 'CVE-2017-5443', 'CVE-2017-3456', 'CVE-2015-8270', 'CVE-2017-5380', 'CVE-2017-7401', 'CVE-2017-5410', 'CVE-2017-5967', 'CVE-2017-5648', 'CVE-2016-5483', 'CVE-2017-7233', 'CVE-2016-10325', 'CVE-2017-5373', 'CVE-2015-7559', 'CVE-2017-3462', 'CVE-2017-5459', 'CVE-2016-10030', 'CVE-2017-5390', 'CVE-2017-5400', 'CVE-2017-7597', 'CVE-2017-3453', 'CVE-2017-7592', 'CVE-2017-3302', 'CVE-2017-7379', 'CVE-2017-7870', 'CVE-2017-6448'], '2017,5': ['CVE-2017-3523', 'CVE-2017-9144', 'CVE-2016-10371', 'CVE-2017-7867', 'CVE-2017-7885', 'CVE-2017-8347', 'CVE-2017-3509', 'CVE-2017-3586', 'CVE-2017-6410', 'CVE-2017-8779', 'CVE-2017-8355', 'CVE-2015-8903', 'CVE-2017-8350', 'CVE-2017-7377', 'CVE-2017-9143', 'CVE-2017-3511', 'CVE-2017-3533', 'CVE-2017-8422', 'CVE-2017-7493', 'CVE-2017-6891', 'CVE-2017-9227', 'CVE-2017-1000367', 'CVE-2017-8346', 'CVE-2017-8344', 'CVE-2017-3526', 'CVE-2017-8364', 'CVE-2017-8362', 'CVE-2017-7692', 'CVE-2017-8114', 'CVE-2017-7980', 'CVE-2017-7494', 'CVE-2015-8902', 'CVE-2017-9141', 'CVE-2014-8355', 'CVE-2017-7975', 'CVE-2017-5462', 'CVE-2017-8361', 'CVE-2017-8086', 'CVE-2017-7650', 'CVE-2017-8354', 'CVE-2017-5647', 'CVE-2017-9239', 'CVE-2017-6848', 'CVE-2017-7382', 'CVE-2017-8291', 'CVE-2015-8900', 'CVE-2017-8357', 'CVE-2017-7502', 'CVE-2017-7868', 'CVE-2016-5824', 'CVE-2017-7471', 'CVE-2017-3138', 'CVE-2017-8798', 'CVE-2017-3539', 'CVE-2017-9226', 'CVE-2017-8363', 'CVE-2017-6840', 'CVE-2017-3589', 'CVE-2017-9228', 'CVE-2017-7718', 'CVE-2017-8353', 'CVE-2017-7383', 'CVE-2017-3544', 'CVE-2017-8287', 'CVE-2017-3136', 'CVE-2017-3137', 'CVE-2014-8354', 'CVE-2017-8365', 'CVE-2017-8349', 'CVE-2016-9602', 'CVE-2014-8716', 'CVE-2017-9142', 'CVE-2017-8351', 'CVE-2017-8345', 'CVE-2017-6318', 'CVE-2017-5461', 'CVE-2017-8356', 'CVE-2016-5735', 'CVE-2017-9229', 'CVE-2017-8386', 'CVE-2017-8911', 'CVE-2017-7957', 'CVE-2017-6842', 'CVE-2017-8342', 'CVE-2017-7381', 'CVE-2013-2074', 'CVE-2017-8348', 'CVE-2014-8562', 'CVE-2015-8901', 'CVE-2017-8352', 'CVE-2016-10376', 'CVE-2017-7941', 'CVE-2017-9098', 'CVE-2017-7943', 'CVE-2017-6843', 'CVE-2017-7479', 'CVE-2017-6847', 'CVE-2017-9079', 'CVE-2016-9584', 'CVE-2017-7380', 'CVE-2017-7976', 'CVE-2016-3658', 'CVE-2014-9841', 'CVE-2016-10369', 'CVE-2017-8343', 'CVE-2016-9603', 'CVE-2017-7378', 'CVE-2017-8765', 'CVE-2017-9224', 'CVE-2017-8830'], '2017,6': ['CVE-2016-4000', 'CVE-2017-8849', 'CVE-2017-9065', 'CVE-2017-5664', 'CVE-2017-9147', 'CVE-2017-5470', 'CVE-2017-5637', 'CVE-2017-7487', 'CVE-2017-1000376', 'CVE-2017-1000381', 'CVE-2017-8924', 'CVE-2017-7772', 'CVE-2017-7757', 'CVE-2017-9063', 'CVE-2016-10095', 'CVE-2017-7751', 'CVE-2017-5944', 'CVE-2017-8295', 'CVE-2017-7520', 'CVE-2017-7995', 'CVE-2017-7375', 'CVE-2017-9023', 'CVE-2017-5980', 'CVE-2017-6922', 'CVE-2017-5979', 'CVE-2017-5974', 'CVE-2017-7774', 'CVE-2016-6127', 'CVE-2017-1000369', 'CVE-2016-10350', 'CVE-2017-9404', 'CVE-2015-7686', 'CVE-2016-10349', 'CVE-2017-9233', 'CVE-2017-9261', 'CVE-2016-10209', 'CVE-2017-7752', 'CVE-2017-7776', 'CVE-2017-0376', 'CVE-2017-9047', 'CVE-2017-7764', 'CVE-2017-6960', 'CVE-2017-7754', 'CVE-2017-7895', 'CVE-2017-8400', 'CVE-2017-6512', 'CVE-2017-9500', 'CVE-2017-9262', 'CVE-2017-8401', 'CVE-2017-9407', 'CVE-2017-1000364', 'CVE-2017-5981', 'CVE-2017-9148', 'CVE-2017-9287', 'CVE-2017-7777', 'CVE-2017-5975', 'CVE-2017-9074', 'CVE-2017-0605', 'CVE-2017-7645', 'CVE-2017-9409', 'CVE-2017-9405', 'CVE-2017-9076', 'CVE-2017-5978', 'CVE-2017-9062', 'CVE-2017-8925', 'CVE-2017-8904', 'CVE-2017-9050', 'CVE-2017-7775', 'CVE-2017-9462', 'CVE-2015-4680', 'CVE-2017-9075', 'CVE-2017-7773', 'CVE-2017-9048', 'CVE-2016-10375', 'CVE-2017-9501', 'CVE-2017-8890', 'CVE-2017-5472', 'CVE-2017-8903', 'CVE-2017-8905', 'CVE-2017-9049', 'CVE-2017-7750', 'CVE-2017-9064', 'CVE-2017-1000366', 'CVE-2017-8782', 'CVE-2017-7756', 'CVE-2017-9403', 'CVE-2015-9059', 'CVE-2017-9242', 'CVE-2017-9022', 'CVE-2017-6892', 'CVE-2017-5976', 'CVE-2017-9439', 'CVE-2017-7778', 'CVE-2017-7771', 'CVE-2017-7749', 'CVE-2016-9932', 'CVE-2012-6706', 'CVE-2017-7758', 'CVE-2017-9077', 'CVE-2014-2015', 'CVE-2017-5361', 'CVE-2017-9061', 'CVE-2017-5943'], '2017,7': ['CVE-2017-7480', 'CVE-2017-2295', 'CVE-2017-11642', 'CVE-2017-5470', 'CVE-2017-10799', 'CVE-2014-9640', 'CVE-2017-7772', 'CVE-2017-3163', 'CVE-2017-11403', 'CVE-2017-7757', 'CVE-2017-7751', 'CVE-2017-3143', 'CVE-2017-7377', 'CVE-2017-3641', 'CVE-2017-7493', 'CVE-2017-11521', 'CVE-2017-7520', 'CVE-2017-11643', 'CVE-2016-10397', 'CVE-2017-1000367', 'CVE-2017-7774', 'CVE-2014-9638', 'CVE-2017-9125', 'CVE-2016-8743', 'CVE-2017-7980', 'CVE-2017-3142', 'CVE-2017-7752', 'CVE-2017-7776', 'CVE-2017-10971', 'CVE-2017-7764', 'CVE-2014-9639', 'CVE-2017-9951', 'CVE-2017-7754', 'CVE-2017-11140', 'CVE-2017-11144', 'CVE-2017-9126', 'CVE-2017-8086', 'CVE-2017-10989', 'CVE-2016-8705', 'CVE-2017-7679', 'CVE-2017-3169', 'CVE-2017-3648', 'CVE-2017-3652', 'CVE-2017-7777', 'CVE-2017-9122', 'CVE-2017-11147', 'CVE-2017-1000083', 'CVE-2017-7471', 'CVE-2017-9124', 'CVE-2017-11107', 'CVE-2017-11111', 'CVE-2017-11637', 'CVE-2017-9127', 'CVE-2017-9832', 'CVE-2017-7775', 'CVE-2017-9936', 'CVE-2017-7718', 'CVE-2017-10688', 'CVE-2017-7668', 'CVE-2017-9831', 'CVE-2017-7773', 'CVE-2017-1000368', 'CVE-2017-11641', 'CVE-2017-9765', 'CVE-2017-11110', 'CVE-2017-10683', 'CVE-2017-10929', 'CVE-2017-7529', 'CVE-2017-11610', 'CVE-2017-10686', 'CVE-2017-11636', 'CVE-2017-5472', 'CVE-2016-9602', 'CVE-2017-3636', 'CVE-2017-10790', 'CVE-2017-9123', 'CVE-2015-6749', 'CVE-2017-7750', 'CVE-2017-3635', 'CVE-2017-11638', 'CVE-2017-9788', 'CVE-2017-9128', 'CVE-2017-3653', 'CVE-2017-11145', 'CVE-2017-3167', 'CVE-2017-7756', 'CVE-2017-11143', 'CVE-2016-10396', 'CVE-2017-11109', 'CVE-2017-11103', 'CVE-2017-3651', 'CVE-2017-7778', 'CVE-2015-0253', 'CVE-2017-7526', 'CVE-2017-7771', 'CVE-2017-11102', 'CVE-2017-7749', 'CVE-2017-7758', 'CVE-2017-9735', 'CVE-2016-9603', 'CVE-2017-10972'], '2017,8': ['CVE-2017-11746', 'CVE-2017-9257', 'CVE-2017-9144', 'CVE-2017-11534', 'CVE-2017-11590', 'CVE-2017-0663', 'CVE-2017-10107', 'CVE-2017-11529', 'CVE-2017-9219', 'CVE-2017-10135', 'CVE-2017-9835', 'CVE-2017-12664', 'CVE-2017-11724', 'CVE-2017-13133', 'CVE-2017-12676', 'CVE-2017-10115', 'CVE-2017-12432', 'CVE-2017-12654', 'CVE-2017-10102', 'CVE-2017-11751', 'CVE-2017-7779', 'CVE-2017-12836', 'CVE-2017-10983', 'CVE-2017-11574', 'CVE-2017-7791', 'CVE-2017-11628', 'CVE-2017-11532', 'CVE-2017-12435', 'CVE-2017-12933', 'CVE-2017-11530', 'CVE-2017-12430', 'CVE-2017-11576', 'CVE-2017-13134', 'CVE-2017-12643', 'CVE-2017-12427', 'CVE-2017-11505', 'CVE-2017-12756', 'CVE-2017-11141', 'CVE-2017-9865', 'CVE-2017-11188', 'CVE-2017-9256', 'CVE-2017-13139', 'CVE-2017-9775', 'CVE-2017-9110', 'CVE-2017-11524', 'CVE-2017-11575', 'CVE-2017-12418', 'CVE-2017-7798', 'CVE-2017-10110', 'CVE-2017-11569', 'CVE-2017-7786', 'CVE-2017-11644', 'CVE-2017-11535', 'CVE-2017-12936', 'CVE-2017-7800', 'CVE-2017-11568', 'CVE-2017-11537', 'CVE-2017-12877', 'CVE-2017-7546', 'CVE-2017-9220', 'CVE-2017-10979', 'CVE-2017-11352', 'CVE-2017-10096', 'CVE-2017-11528', 'CVE-2016-2087', 'CVE-2017-10995', 'CVE-2017-12640', 'CVE-2017-12668', 'CVE-2017-12865', 'CVE-2017-10090', 'CVE-2017-7807', 'CVE-2017-12431', 'CVE-2017-11450', 'CVE-2017-10978', 'CVE-2017-9221', 'CVE-2017-9253', 'CVE-2017-11577', 'CVE-2017-10081', 'CVE-2017-12564', 'CVE-2017-9727', 'CVE-2017-7803', 'CVE-2017-9222', 'CVE-2017-10928', 'CVE-2017-11446', 'CVE-2017-9612', 'CVE-2017-12433', 'CVE-2017-7207', 'CVE-2017-11527', 'CVE-2017-7753', 'CVE-2017-11571', 'CVE-2017-10981', 'CVE-2017-11449', 'CVE-2017-10982', 'CVE-2017-12587', 'CVE-2017-9066', 'CVE-2017-12140', 'CVE-2017-12641', 'CVE-2017-13777', 'CVE-2017-13065', 'CVE-2017-7801', 'CVE-2017-9776', 'CVE-2017-11434', 'CVE-2017-7486', 'CVE-2017-12562', 'CVE-2017-11714', 'CVE-2017-12565', 'CVE-2017-12935', 'CVE-2017-11539', 'CVE-2017-11478', 'CVE-2017-1000100', 'CVE-2017-11523', 'CVE-2017-9112', 'CVE-2017-9501', 'CVE-2017-7809', 'CVE-2017-9255', 'CVE-2017-11752', 'CVE-2017-12904', 'CVE-2017-10067', 'CVE-2017-7890', 'CVE-2017-10109', 'CVE-2017-1000115', 'CVE-2017-9223', 'CVE-2017-10198', 'CVE-2017-12642', 'CVE-2017-12675', 'CVE-2017-13143', 'CVE-2017-10789', 'CVE-2017-11639', 'CVE-2017-11368', 'CVE-2017-10176', 'CVE-2017-13144', 'CVE-2017-11640', 'CVE-2017-12566', 'CVE-2017-10089', 'CVE-2017-10108', 'CVE-2017-10101', 'CVE-2017-9254', 'CVE-2017-11170', 'CVE-2017-10664', 'CVE-2017-11360', 'CVE-2017-1000116', 'CVE-2017-7376', 'CVE-2013-4473', 'CVE-2017-10087', 'CVE-2017-13142', 'CVE-2017-6887', 'CVE-2017-11185', 'CVE-2017-8352', 'CVE-2017-7784', 'CVE-2017-7555', 'CVE-2017-8309', 'CVE-2017-11533', 'CVE-2017-12674', 'CVE-2017-6505', 'CVE-2017-7787', 'CVE-2017-9218', 'CVE-2017-13146', 'CVE-2017-7526', 'CVE-2017-10074', 'CVE-2017-12429', 'CVE-2017-12983', 'CVE-2017-10053', 'CVE-2017-9116', 'CVE-2017-10193', 'CVE-2015-3152', 'CVE-2017-11448', 'CVE-2013-4474', 'CVE-2017-13064', 'CVE-2017-7785', 'CVE-2017-11525', 'CVE-2017-7547', 'CVE-2017-9726', 'CVE-2017-12670', 'CVE-2017-10116', 'CVE-2017-6886', 'CVE-2017-7802', 'CVE-2017-9800', 'CVE-2017-10788', 'CVE-2017-11572', 'CVE-2017-7792', 'CVE-2017-10118', 'CVE-2017-11526', 'CVE-2017-13776', 'CVE-2017-12563', 'CVE-2017-12937', 'CVE-2017-9739', 'CVE-2017-1000117', 'CVE-2017-13658', 'CVE-2017-9611', 'CVE-2017-12665', 'CVE-2017-13063', 'CVE-2017-10243', 'CVE-2017-10980', 'CVE-2017-12428', 'CVE-2017-11531'], '2017,9': ['CVE-2017-14608', 'CVE-2017-6420', 'CVE-2017-2839', 'CVE-2017-12601', 'CVE-2017-1000250', 'CVE-2017-7810', 'CVE-2017-7814', 'CVE-2017-13007', 'CVE-2017-13055', 'CVE-2017-9798', 'CVE-2017-12597', 'CVE-2017-13003', 'CVE-2017-14176', 'CVE-2017-12893', 'CVE-2017-1000365', 'CVE-2017-13006', 'CVE-2017-11335', 'CVE-2017-13010', 'CVE-2017-13020', 'CVE-2017-2862', 'CVE-2017-13021', 'CVE-2017-7779', 'CVE-2017-9469', 'CVE-2016-1516', 'CVE-2017-13048', 'CVE-2017-12894', 'CVE-2017-7791', 'CVE-2017-12991', 'CVE-2017-6362', 'CVE-2017-12944', 'CVE-2017-12606', 'CVE-2017-13026', 'CVE-2017-13032', 'CVE-2017-13031', 'CVE-2017-13011', 'CVE-2017-12997', 'CVE-2017-2835', 'CVE-2017-11176', 'CVE-2017-12992', 'CVE-2017-12599', 'CVE-2017-13024', 'CVE-2017-12863', 'CVE-2017-6418', 'CVE-2017-13042', 'CVE-2017-13690', 'CVE-2017-1000363', 'CVE-2017-12993', 'CVE-2017-12901', 'CVE-2017-7786', 'CVE-2017-13036', 'CVE-2017-13049', 'CVE-2017-13025', 'CVE-2017-13053', 'CVE-2017-7819', 'CVE-2017-7800', 'CVE-2017-13054', 'CVE-2017-12900', 'CVE-2017-0900', 'CVE-2017-14340', 'CVE-2017-14617', 'CVE-2017-14517', 'CVE-2017-12864', 'CVE-2017-13726', 'CVE-2017-13001', 'CVE-2014-1695', 'CVE-2017-13037', 'CVE-2017-13008', 'CVE-2017-13044', 'CVE-2017-13014', 'CVE-2017-13016', 'CVE-2017-13041', 'CVE-2017-10966', 'CVE-2017-14519', 'CVE-2017-13052', 'CVE-2017-12895', 'CVE-2017-14140', 'CVE-2017-12989', 'CVE-2017-1000251', 'CVE-2017-7807', 'CVE-2017-13047', 'CVE-2017-13689', 'CVE-2017-7803', 'CVE-2017-13045', 'CVE-2017-12902', 'CVE-2017-12985', 'CVE-2017-10661', 'CVE-2017-12899', 'CVE-2017-7753', 'CVE-2017-13725', 'CVE-2017-13727', 'CVE-2017-10784', 'CVE-2017-13030', 'CVE-2017-12150', 'CVE-2017-9468', 'CVE-2013-2099', 'CVE-2017-12603', 'CVE-2017-7805', 'CVE-2017-7801', 'CVE-2017-0898', 'CVE-2017-13005', 'CVE-2017-12897', 'CVE-2017-12153', 'CVE-2017-13002', 'CVE-2017-1000111', 'CVE-2017-12987', 'CVE-2017-12995', 'CVE-2017-7823', 'CVE-2017-12898', 'CVE-2017-13051', 'CVE-2017-14062', 'CVE-2017-7542', 'CVE-2017-14156', 'CVE-2017-13009', 'CVE-2017-2923', 'CVE-2017-12134', 'CVE-2017-7809', 'CVE-2017-2838', 'CVE-2017-11542', 'CVE-2017-13013', 'CVE-2017-13038', 'CVE-2017-14033', 'CVE-2017-13015', 'CVE-2017-12986', 'CVE-2017-14136', 'CVE-2017-14166', 'CVE-2017-2837', 'CVE-2017-13023', 'CVE-2017-13688', 'CVE-2017-7818', 'CVE-2017-12604', 'CVE-2017-1000380', 'CVE-2017-11543', 'CVE-2017-12598', 'CVE-2017-12616', 'CVE-2017-14064', 'CVE-2017-0899', 'CVE-2017-14120', 'CVE-2017-13035', 'CVE-2017-12163', 'CVE-2017-13017', 'CVE-2017-12996', 'CVE-2017-13033', 'CVE-2017-14482', 'CVE-2014-2553', 'CVE-2017-14727', 'CVE-2017-14489', 'CVE-2017-12154', 'CVE-2017-10965', 'CVE-2017-12862', 'CVE-2017-14500', 'CVE-2017-0901', 'CVE-2017-7793', 'CVE-2017-13027', 'CVE-2017-14313', 'CVE-2017-7784', 'CVE-2017-13050', 'CVE-2017-13029', 'CVE-2017-12994', 'CVE-2017-13000', 'CVE-2017-11541', 'CVE-2017-7787', 'CVE-2017-7804', 'CVE-2017-13018', 'CVE-2017-11108', 'CVE-2017-12990', 'CVE-2017-13687', 'CVE-2017-12896', 'CVE-2017-2924', 'CVE-2017-12999', 'CVE-2017-12605', 'CVE-2017-7482', 'CVE-2017-14635', 'CVE-2017-13022', 'CVE-2017-13039', 'CVE-2017-7785', 'CVE-2017-7889', 'CVE-2017-7824', 'CVE-2017-2836', 'CVE-2017-7802', 'CVE-2014-2554', 'CVE-2017-13004', 'CVE-2017-14106', 'CVE-2017-7792', 'CVE-2017-10911', 'CVE-2017-13046', 'CVE-2017-12988', 'CVE-2017-13012', 'CVE-2017-11600', 'CVE-2017-12998', 'CVE-2017-13028', 'CVE-2017-13019', 'CVE-2017-13043', 'CVE-2017-13040', 'CVE-2017-13034'], '2017,10': ['CVE-2017-14103', 'CVE-2017-15281', 'CVE-2017-1000257', 'CVE-2017-12693', 'CVE-2017-14607', 'CVE-2017-11730', 'CVE-2017-14723', 'CVE-2017-14167', 'CVE-2017-14172', 'CVE-2017-14867', 'CVE-2017-14173', 'CVE-2017-14341', 'CVE-2017-12855', 'CVE-2017-14725', 'CVE-2017-13090', 'CVE-2017-14316', 'CVE-2017-11403', 'CVE-2017-15038', 'CVE-2017-10921', 'CVE-2017-14989', 'CVE-2017-13088', 'CVE-2017-14630', 'CVE-2017-12836', 'CVE-2017-13081', 'CVE-2017-10913', 'CVE-2017-14990', 'CVE-2017-14224', 'CVE-2017-15277', 'CVE-2017-14719', 'CVE-2017-13089', 'CVE-2017-14720', 'CVE-2017-16227', 'CVE-2017-14318', 'CVE-2017-14739', 'CVE-2017-14060', 'CVE-2017-14997', 'CVE-2017-1000098', 'CVE-2017-7862', 'CVE-2017-5595', 'CVE-2017-10915', 'CVE-2017-13087', 'CVE-2017-11729', 'CVE-2017-11591', 'CVE-2017-12875', 'CVE-2017-1000254', 'CVE-2017-2887', 'CVE-2017-14100', 'CVE-2017-10912', 'CVE-2017-11704', 'CVE-2017-14249', 'CVE-2017-14718', 'CVE-2017-13737', 'CVE-2017-14505', 'CVE-2017-10922', 'CVE-2017-9868', 'CVE-2017-11683', 'CVE-2017-9992', 'CVE-2017-14859', 'CVE-2017-12135', 'CVE-2017-14174', 'CVE-2017-13079', 'CVE-2017-14494', 'CVE-2017-14317', 'CVE-2017-14631', 'CVE-2017-10378', 'CVE-2017-12691', 'CVE-2017-14319', 'CVE-2017-14175', 'CVE-2016-9263', 'CVE-2017-15016', 'CVE-2017-14864', 'CVE-2017-7805', 'CVE-2017-10920', 'CVE-2017-7208', 'CVE-2017-13758', 'CVE-2017-14737', 'CVE-2017-11734', 'CVE-2017-14682', 'CVE-2017-14491', 'CVE-2017-10140', 'CVE-2017-13078', 'CVE-2017-14492', 'CVE-2017-14733', 'CVE-2017-15017', 'CVE-2017-14721', 'CVE-2017-13769', 'CVE-2017-14314', 'CVE-2017-14400', 'CVE-2017-13720', 'CVE-2017-13077', 'CVE-2017-1000116', 'CVE-2017-14994', 'CVE-2015-8365', 'CVE-2017-13086', 'CVE-2017-10268', 'CVE-2017-15930', 'CVE-2017-14741', 'CVE-2017-13768', 'CVE-2017-13722', 'CVE-2017-11728', 'CVE-2017-10914', 'CVE-2017-14722', 'CVE-2017-10918', 'CVE-2017-15041', 'CVE-2017-13084', 'CVE-2017-14504', 'CVE-2017-14636', 'CVE-2017-12976', 'CVE-2017-10384', 'CVE-2017-14628', 'CVE-2017-9800', 'CVE-2017-14637', 'CVE-2017-12692', 'CVE-2017-13080', 'CVE-2017-10379', 'CVE-2017-1000117', 'CVE-2017-11731', 'CVE-2017-14862', 'CVE-2017-12137', 'CVE-2017-13082', 'CVE-2017-14629'], '2017,11': ['CVE-2017-15275', 'CVE-2017-2816', 'CVE-2017-15595', 'CVE-2017-7810', 'CVE-2017-7814', 'CVE-2017-14723', 'CVE-2017-12182', 'CVE-2017-16510', 'CVE-2017-13723', 'CVE-2017-16853', 'CVE-2017-1000229', 'CVE-2017-16516', 'CVE-2017-15565', 'CVE-2017-12613', 'CVE-2017-16669', 'CVE-2017-14990', 'CVE-2017-13134', 'CVE-2017-15954', 'CVE-2016-10516', 'CVE-2017-10345', 'CVE-2017-15372', 'CVE-2016-1051', 'CVE-2017-7819', 'CVE-2017-7825', 'CVE-2017-15589', 'CVE-2017-11358', 'CVE-2017-3735', 'CVE-2017-15370', 'CVE-2017-8028', 'CVE-2017-10388', 'CVE-2017-8806', 'CVE-2017-12197', 'CVE-2017-1000158', 'CVE-2017-10295', 'CVE-2017-7826', 'CVE-2017-2624', 'CVE-2017-16651', 'CVE-2017-9989', 'CVE-2017-16663', 'CVE-2017-10274', 'CVE-2017-14731', 'CVE-2017-15955', 'CVE-2017-14977', 'CVE-2017-15371', 'CVE-2017-7830', 'CVE-2017-7805', 'CVE-2017-12177', 'CVE-2017-16852', 'CVE-2017-7823', 'CVE-2017-16353', 'CVE-2017-12180', 'CVE-2017-10348', 'CVE-2017-5130', 'CVE-2017-14687', 'CVE-2017-10357', 'CVE-2017-8817', 'CVE-2017-12617', 'CVE-2017-15953', 'CVE-2017-14976', 'CVE-2017-12618', 'CVE-2017-12176', 'CVE-2017-16547', 'CVE-2017-10672', 'CVE-2017-9988', 'CVE-2017-15588', 'CVE-2017-10350', 'CVE-2017-11359', 'CVE-2017-7818', 'CVE-2017-16938', 'CVE-2017-15642', 'CVE-2017-1000231', 'CVE-2017-16352', 'CVE-2017-16844', 'CVE-2017-10285', 'CVE-2017-10349', 'CVE-2017-1000211', 'CVE-2017-12183', 'CVE-2017-15587', 'CVE-2017-7793', 'CVE-2017-10281', 'CVE-2017-12178', 'CVE-2017-16932', 'CVE-2017-12187', 'CVE-2017-11332', 'CVE-2017-10346', 'CVE-2017-15923', 'CVE-2017-7824', 'CVE-2017-10347', 'CVE-2017-10356', 'CVE-2017-16931', 'CVE-2017-15592', 'CVE-2017-14975', 'CVE-2017-12184', 'CVE-2017-7828', 'CVE-2017-15593', 'CVE-2017-10355', 'CVE-2017-12185', 'CVE-2017-11733'], '2017,12': ['CVE-2017-16531', 'CVE-2017-17083', 'CVE-2017-17848', 'CVE-2017-7848', 'CVE-2017-17433', 'CVE-2017-8824', 'CVE-2017-12872', 'CVE-2017-15721', 'CVE-2017-16535', 'CVE-2017-17846', 'CVE-2017-15864', 'CVE-2017-17085', 'CVE-2017-15267', 'CVE-2017-17084', 'CVE-2017-16548', 'CVE-2017-17847', 'CVE-2017-17512', 'CVE-2017-15722', 'CVE-2017-16939', 'CVE-2017-17458', 'CVE-2017-1000407', 'CVE-2017-12190', 'CVE-2017-16921', 'CVE-2017-15601', 'CVE-2017-7847', 'CVE-2017-15266', 'CVE-2017-12874', 'CVE-2017-12873', 'CVE-2017-15600', 'CVE-2017-16643', 'CVE-2017-17094', 'CVE-2017-15115', 'CVE-2017-16533', 'CVE-2017-17092', 'CVE-2017-17788', 'CVE-2017-17784', 'CVE-2017-1000364', 'CVE-2017-16536', 'CVE-2017-1000385', 'CVE-2016-10208', 'CVE-2017-7826', 'CVE-2017-15602', 'CVE-2017-15228', 'CVE-2017-16649', 'CVE-2017-17785', 'CVE-2017-5194', 'CVE-2017-12608', 'CVE-2017-16532', 'CVE-2017-17091', 'CVE-2017-17844', 'CVE-2017-7830', 'CVE-2017-17090', 'CVE-2017-16525', 'CVE-2017-5193', 'CVE-2017-11408', 'CVE-2017-17845', 'CVE-2017-16854', 'CVE-2017-16529', 'CVE-2017-17093', 'CVE-2017-15227', 'CVE-2017-17432', 'CVE-2017-7843', 'CVE-2017-5356', 'CVE-2017-15868', 'CVE-2017-17786', 'CVE-2017-12868', 'CVE-2017-15412', 'CVE-2017-15922', 'CVE-2017-12607', 'CVE-2017-15649', 'CVE-2017-16527', 'CVE-2017-17511', 'CVE-2017-7829', 'CVE-2017-16537', 'CVE-2017-16612', 'CVE-2017-1000159', 'CVE-2017-16664', 'CVE-2017-17787', 'CVE-2017-14051', 'CVE-2017-12869', 'CVE-2017-17790', 'CVE-2017-17476', 'CVE-2017-12867', 'CVE-2017-15265', 'CVE-2017-16927', 'CVE-2017-17405', 'CVE-2017-17434', 'CVE-2017-8831', 'CVE-2017-7846', 'CVE-2017-13080', 'CVE-2017-9935', 'CVE-2017-7828', 'CVE-2017-17843', 'CVE-2017-15299', 'CVE-2017-17789'], '2018,1': ['CVE-2017-1000450', 'CVE-2018-5704', 'CVE-2018-5096', 'CVE-2017-12377', 'CVE-2017-1000501', 'CVE-2018-5103', 'CVE-2018-5336', 'CVE-2018-5099', 'CVE-2017-17566', 'CVE-2018-5117', 'CVE-2014-5355', 'CVE-2017-1000422', 'CVE-2014-5353', 'CVE-2017-17504', 'CVE-2017-12379', 'CVE-2017-17915', 'CVE-2018-5685', 'CVE-2017-5754', 'CVE-2017-17782', 'CVE-2018-5098', 'CVE-2017-11732', 'CVE-2017-12636', 'CVE-2018-2562', 'CVE-2017-1000456', 'CVE-2016-10510', 'CVE-2018-5102', 'CVE-2017-17502', 'CVE-2017-17558', 'CVE-2018-0486', 'CVE-2017-12380', 'CVE-2017-1000421', 'CVE-2017-17741', 'CVE-2017-1000487', 'CVE-2014-5351', 'CVE-2018-5095', 'CVE-2017-1000472', 'CVE-2018-2622', 'CVE-2017-12375', 'CVE-2017-17914', 'CVE-2018-2665', 'CVE-2017-17501', 'CVE-2017-17682', 'CVE-2018-2668', 'CVE-2017-17760', 'CVE-2017-8314', 'CVE-2017-17806', 'CVE-2018-2640', 'CVE-2017-17879', 'CVE-2017-16883', 'CVE-2017-17498', 'CVE-2018-5764', 'CVE-2017-17563', 'CVE-2016-3119', 'CVE-2017-17805', 'CVE-2017-12376', 'CVE-2018-5334', 'CVE-2017-17500', 'CVE-2017-17807', 'CVE-2016-3120', 'CVE-2017-12374', 'CVE-2017-1000480', 'CVE-2017-17044', 'CVE-2018-5097', 'CVE-2017-15105', 'CVE-2017-12378', 'CVE-2017-17045', 'CVE-2018-5089', 'CVE-2017-16898', 'CVE-2017-12635', 'CVE-2017-1000445', 'CVE-2017-12629', 'CVE-2018-5091', 'CVE-2017-17912', 'CVE-2018-5335', 'CVE-2018-1000007', 'CVE-2018-5702', 'CVE-2018-5712', 'CVE-2017-1000476', 'CVE-2018-5711', 'CVE-2017-3145', 'CVE-2016-10708', 'CVE-2017-18013', 'CVE-2013-1418', 'CVE-2017-17564', 'CVE-2017-17503', 'CVE-2018-5104', 'CVE-2017-17565'], '2018,2': ['CVE-2018-7051', 'CVE-2018-5379', 'CVE-2017-18123', 'CVE-2017-15698', 'CVE-2017-11423', 'CVE-2017-6928', 'CVE-2018-7050', 'CVE-2017-3139', 'CVE-2017-6929', 'CVE-2018-1000024', 'CVE-2018-5735', 'CVE-2016-9637', 'CVE-2018-1056', 'CVE-2018-6869', 'CVE-2017-15590', 'CVE-2018-6594', 'CVE-2018-1000041', 'CVE-2018-5378', 'CVE-2018-5381', 'CVE-2016-10711', 'CVE-2018-5380', 'CVE-2017-6932', 'CVE-2018-6758', 'CVE-2017-18190', 'CVE-2018-7052', 'CVE-2018-7187', 'CVE-2018-5950', 'CVE-2018-6799', 'CVE-2018-1000027', 'CVE-2018-6789', 'CVE-2017-6927', 'CVE-2018-7443', 'CVE-2017-18122', 'CVE-2018-0489', 'CVE-2017-17969', 'CVE-2017-2620', 'CVE-2018-1053', 'CVE-2018-6521', 'CVE-2017-18121', 'CVE-2017-6419', 'CVE-2017-1000480', 'CVE-2016-9603', 'CVE-2018-3836', 'CVE-2017-13194', 'CVE-2016-2540'], '2018,3': ['CVE-2018-7730', 'CVE-2018-5131', 'CVE-2018-7440', 'CVE-2018-7051', 'CVE-2017-15132', 'CVE-2018-7541', 'CVE-2018-7711', 'CVE-2018-1000069', 'CVE-2017-12627', 'CVE-2018-5148', 'CVE-2018-1000120', 'CVE-2018-6359', 'CVE-2018-1000121', 'CVE-2018-7728', 'CVE-2018-5146', 'CVE-2018-7998', 'CVE-2018-5127', 'CVE-2018-7537', 'CVE-2018-1071', 'CVE-2014-10071', 'CVE-2018-5130', 'CVE-2017-18219', 'CVE-2018-6315', 'CVE-2018-5294', 'CVE-2018-5147', 'CVE-2018-1050', 'CVE-2017-18220', 'CVE-2017-18230', 'CVE-2018-9018', 'CVE-2018-1083', 'CVE-2018-1304', 'CVE-2017-11403', 'CVE-2018-7584', 'CVE-2018-7667', 'CVE-2016-10714', 'CVE-2017-18197', 'CVE-2018-1000116', 'CVE-2014-10072', 'CVE-2018-0739', 'CVE-2016-9814', 'CVE-2018-7540', 'CVE-2018-5251', 'CVE-2018-7536', 'CVE-2017-7652', 'CVE-2018-5125', 'CVE-2018-7438', 'CVE-2018-1000122', 'CVE-2014-10070', 'CVE-2018-5748', 'CVE-2018-7436', 'CVE-2016-9955', 'CVE-2018-1064', 'CVE-2018-1000127', 'CVE-2018-1000132', 'CVE-2017-18236', 'CVE-2018-7437', 'CVE-2018-1000085', 'CVE-2018-7435', 'CVE-2017-18231', 'CVE-2018-7600', 'CVE-2018-5732', 'CVE-2018-5733', 'CVE-2017-18233', 'CVE-2017-18238', 'CVE-2017-14461', 'CVE-2017-18234', 'CVE-2018-5144', 'CVE-2018-7439', 'CVE-2018-5145', 'CVE-2018-0202', 'CVE-2017-18229', 'CVE-2018-7225', 'CVE-2018-1305', 'CVE-2018-5129', 'CVE-2017-7651', 'CVE-2018-7186', 'CVE-2018-3836', 'CVE-2017-15130', 'CVE-2017-18206', 'CVE-2018-7644'], '2018,4': ['CVE-2017-11333', 'CVE-2018-10100', 'CVE-2018-7420', 'CVE-2018-7324', 'CVE-2018-2813', 'CVE-2018-1000078', 'CVE-2017-5715', 'CVE-2018-2755', 'CVE-2017-14450', 'CVE-2017-14442', 'CVE-2018-7335', 'CVE-2018-2629', 'CVE-2018-2637', 'CVE-2018-7487', 'CVE-2018-2678', 'CVE-2018-2761', 'CVE-2018-10120', 'CVE-2018-10102', 'CVE-2018-5268', 'CVE-2018-7419', 'CVE-2018-7602', 'CVE-2018-9165', 'CVE-2018-7870', 'CVE-2018-2817', 'CVE-2018-10119', 'CVE-2018-7323', 'CVE-2018-7551', 'CVE-2017-14441', 'CVE-2018-2634', 'CVE-2018-5146', 'CVE-2018-1000156', 'CVE-2018-8777', 'CVE-2018-7871', 'CVE-2018-7456', 'CVE-2018-7868', 'CVE-2018-7336', 'CVE-2018-2819', 'CVE-2014-10073', 'CVE-2018-7332', 'CVE-2018-1000075', 'CVE-2017-14440', 'CVE-2018-2603', 'CVE-2018-7550', 'CVE-2018-8780', 'CVE-2018-1000164', 'CVE-2018-7552', 'CVE-2018-5269', 'CVE-2018-8778', 'CVE-2018-7875', 'CVE-2018-6358', 'CVE-2018-6914', 'CVE-2017-14633', 'CVE-2018-2579', 'CVE-2017-12122', 'CVE-2018-10194', 'CVE-2018-2781', 'CVE-2018-8779', 'CVE-2018-6913', 'CVE-2017-17833', 'CVE-2018-2618', 'CVE-2018-7033', 'CVE-2018-7554', 'CVE-2018-0492', 'CVE-2018-2663', 'CVE-2017-17742', 'CVE-2018-2602', 'CVE-2017-14632', 'CVE-2018-7867', 'CVE-2018-7418', 'CVE-2018-2771', 'CVE-2018-7322', 'CVE-2018-7553', 'CVE-2017-14448', 'CVE-2018-2641', 'CVE-2018-7872', 'CVE-2018-7337', 'CVE-2018-7334', 'CVE-2018-2588', 'CVE-2018-6594', 'CVE-2018-8741', 'CVE-2018-7417', 'CVE-2018-2599', 'CVE-2018-1000076', 'CVE-2018-2633', 'CVE-2018-2818', 'CVE-2018-1000074', 'CVE-2018-1000077', 'CVE-2018-2677', 'CVE-2018-8763', 'CVE-2018-2773', 'CVE-2018-1308'], '2018,5': ['CVE-2018-5161', 'CVE-2018-1000301', 'CVE-2018-8905', 'CVE-2018-5803', 'CVE-2017-18271', 'CVE-2017-18273', 'CVE-2018-1301', 'CVE-2017-13166', 'CVE-2018-11358', 'CVE-2017-5715', 'CVE-2018-5750', 'CVE-2018-11251', 'CVE-2018-5155', 'CVE-2018-9270', 'CVE-2018-8013', 'CVE-2017-15710', 'CVE-2018-5162', 'CVE-2017-8372', 'CVE-2018-1000004', 'CVE-2017-11509', 'CVE-2017-18216', 'CVE-2017-16912', 'CVE-2018-1000199', 'CVE-2018-7492', 'CVE-2017-16914', 'CVE-2018-7995', 'CVE-2018-5332', 'CVE-2017-16913', 'CVE-2018-5333', 'CVE-2018-5183', 'CVE-2018-10548', 'CVE-2017-8374', 'CVE-2018-9263', 'CVE-2017-8373', 'CVE-2018-5178', 'CVE-2018-1312', 'CVE-2018-8897', 'CVE-2018-9132', 'CVE-2018-10547', 'CVE-2018-9268', 'CVE-2018-5157', 'CVE-2018-7566', 'CVE-2018-0494', 'CVE-2017-16526', 'CVE-2017-18203', 'CVE-2017-11613', 'CVE-2018-9260', 'CVE-2018-5168', 'CVE-2018-6927', 'CVE-2018-7757', 'CVE-2018-8822', 'CVE-2018-9258', 'CVE-2017-18266', 'CVE-2018-1125', 'CVE-2018-7740', 'CVE-2018-1000178', 'CVE-2017-0861', 'CVE-2018-1126', 'CVE-2018-1122', 'CVE-2018-1068', 'CVE-2018-11362', 'CVE-2018-5185', 'CVE-2018-9009', 'CVE-2018-5170', 'CVE-2018-10981', 'CVE-2018-5158', 'CVE-2018-10982', 'CVE-2017-18017', 'CVE-2018-1124', 'CVE-2018-7873', 'CVE-2018-7866', 'CVE-2017-18248', 'CVE-2018-5150', 'CVE-2018-9269', 'CVE-2017-5753', 'CVE-2018-5159', 'CVE-2018-7876', 'CVE-2018-5784', 'CVE-2018-5712', 'CVE-2018-5154', 'CVE-2017-16911', 'CVE-2018-10545', 'CVE-2018-5184', 'CVE-2018-9261', 'CVE-2018-1092', 'CVE-2018-1123', 'CVE-2018-8781'], '2018,6': ['CVE-2018-12599', 'CVE-2018-12029', 'CVE-2018-8014', 'CVE-2018-2813', 'CVE-2017-12872', 'CVE-2018-2766', 'CVE-2018-2755', 'CVE-2018-0495', 'CVE-2018-11251', 'CVE-2018-10940', 'CVE-2017-16669', 'CVE-2018-2761', 'CVE-2017-11643', 'CVE-2017-17915', 'CVE-2018-11218', 'CVE-2017-13134', 'CVE-2016-5241', 'CVE-2017-17782', 'CVE-2018-1305', 'CVE-2018-2817', 'CVE-2018-2562', 'CVE-2018-12326', 'CVE-2017-17502', 'CVE-2015-7519', 'CVE-2018-10546', 'CVE-2017-14650', 'CVE-2018-2819', 'CVE-2018-10548', 'CVE-2017-7413', 'CVE-2018-8897', 'CVE-2016-3716', 'CVE-2018-10547', 'CVE-2018-2622', 'CVE-2018-12364', 'CVE-2016-7449', 'CVE-2016-3718', 'CVE-2017-10378', 'CVE-2018-12264', 'CVE-2018-2665', 'CVE-2017-7651', 'CVE-2017-17501', 'CVE-2018-12363', 'CVE-2018-2668', 'CVE-2017-13065', 'CVE-2018-2640', 'CVE-2018-2784', 'CVE-2017-17498', 'CVE-2016-7448', 'CVE-2018-2787', 'CVE-2017-9774', 'CVE-2018-2781', 'CVE-2017-16353', 'CVE-2018-1093', 'CVE-2018-1304', 'CVE-2018-7584', 'CVE-2017-11636', 'CVE-2017-7652', 'CVE-2018-12600', 'CVE-2017-14733', 'CVE-2018-2782', 'CVE-2018-11219', 'CVE-2017-14314', 'CVE-2018-5156', 'CVE-2018-10998', 'CVE-2018-10549', 'CVE-2017-12616', 'CVE-2018-10958', 'CVE-2017-12868', 'CVE-2018-5188', 'CVE-2017-17500', 'CVE-2016-4861', 'CVE-2017-7674', 'CVE-2018-2771', 'CVE-2018-12564', 'CVE-2017-10268', 'CVE-2018-12360', 'CVE-2017-7414', 'CVE-2018-10999', 'CVE-2018-12365', 'CVE-2016-7446', 'CVE-2018-12366', 'CVE-2017-13064', 'CVE-2016-7447', 'CVE-2017-17912', 'CVE-2018-5712', 'CVE-2018-12359', 'CVE-2016-3717', 'CVE-2018-1130', 'CVE-2018-2612', 'CVE-2018-10545', 'CVE-2017-12937', 'CVE-2017-17503', 'CVE-2017-13063', 'CVE-2018-12265', 'CVE-2018-12362', 'CVE-2018-11531'], '2018,7': ['CVE-2017-1000450', 'CVE-2017-12601', 'CVE-2018-13006', 'CVE-2018-1120', 'CVE-2017-12597', 'CVE-2018-8905', 'CVE-2018-10900', 'CVE-2016-10727', 'CVE-2018-1000078', 'CVE-2018-4180', 'CVE-2018-10877', 'CVE-2018-14339', 'CVE-2017-5715', 'CVE-2018-11506', 'CVE-2017-11521', 'CVE-2018-10940', 'CVE-2016-1516', 'CVE-2016-5836', 'CVE-2016-6618', 'CVE-2018-1066', 'CVE-2017-12606', 'CVE-2018-1089', 'CVE-2018-1000132', 'CVE-2018-3639', 'CVE-2018-5268', 'CVE-2016-6616', 'CVE-2018-0732', 'CVE-2017-17458', 'CVE-2016-1000341', 'CVE-2017-12599', 'CVE-2017-12863', 'CVE-2018-1305', 'CVE-2017-0900', 'CVE-2015-9096', 'CVE-2017-12864', 'CVE-2017-13726', 'CVE-2018-10850', 'CVE-2018-8777', 'CVE-2018-12895', 'CVE-2018-12910', 'CVE-2018-12372', 'CVE-2018-7456', 'CVE-2018-1116', 'CVE-2018-14342', 'CVE-2018-14341', 'CVE-2017-15134', 'CVE-2018-10883', 'CVE-2018-10880', 'CVE-2018-3665', 'CVE-2016-2148', 'CVE-2016-6614', 'CVE-2018-1000075', 'CVE-2018-11319', 'CVE-2018-3640', 'CVE-2018-10852', 'CVE-2013-1813', 'CVE-2016-7798', 'CVE-2016-6622', 'CVE-2017-0903', 'CVE-2018-8780', 'CVE-2017-18255', 'CVE-2018-10860', 'CVE-2018-10882', 'CVE-2018-0737', 'CVE-2018-12364', 'CVE-2018-14369', 'CVE-2018-8778', 'CVE-2018-12374', 'CVE-2016-6609', 'CVE-2018-5269', 'CVE-2018-10876', 'CVE-2016-6615', 'CVE-2015-9261', 'CVE-2018-10021', 'CVE-2015-1239', 'CVE-2018-14056', 'CVE-2017-15873', 'CVE-2018-12363', 'CVE-2017-10784', 'CVE-2017-17760', 'CVE-2017-11613', 'CVE-2017-12603', 'CVE-2018-6914', 'CVE-2018-1054', 'CVE-2018-14343', 'CVE-2017-0898', 'CVE-2017-9462', 'CVE-2018-14368', 'CVE-2016-1000346', 'CVE-2017-16544', 'CVE-2017-14062', 'CVE-2018-9422', 'CVE-2018-8779', 'CVE-2018-1093', 'CVE-2018-10124', 'CVE-2016-1000345', 'CVE-2018-1304', 'CVE-2016-9865', 'CVE-2017-14033', 'CVE-2018-13005', 'CVE-2018-7033', 'CVE-2017-14136', 'CVE-2018-1000204', 'CVE-2018-10995', 'CVE-2017-18190', 'CVE-2018-10963', 'CVE-2016-6621', 'CVE-2014-4607', 'CVE-2017-12604', 'CVE-2016-1000343', 'CVE-2018-10881', 'CVE-2017-12598', 'CVE-2017-14064', 'CVE-2017-0899', 'CVE-2016-1000339', 'CVE-2017-17742', 'CVE-2018-5814', 'CVE-2018-10853', 'CVE-2018-5188', 'CVE-2018-1000528', 'CVE-2018-0618', 'CVE-2015-1854', 'CVE-2018-10879', 'CVE-2016-5139', 'CVE-2018-12373', 'CVE-2018-3760', 'CVE-2018-8034', 'CVE-2017-18123', 'CVE-2017-12862', 'CVE-2017-0901', 'CVE-2018-12360', 'CVE-2011-5325', 'CVE-2017-0902', 'CVE-2018-14340', 'CVE-2018-12365', 'CVE-2017-18248', 'CVE-2018-13796', 'CVE-2018-12584', 'CVE-2016-6619', 'CVE-2016-2339', 'CVE-2014-9645', 'CVE-2017-1000433', 'CVE-2016-1000338', 'CVE-2018-11439', 'CVE-2018-10886', 'CVE-2018-10087', 'CVE-2018-1000079', 'CVE-2018-12366', 'CVE-2017-12605', 'CVE-2017-5753', 'CVE-2018-13054', 'CVE-2018-1000076', 'CVE-2018-14055', 'CVE-2018-10878', 'CVE-2018-5784', 'CVE-2018-12233', 'CVE-2017-17790', 'CVE-2018-1118', 'CVE-2016-1000342', 'CVE-2017-17405', 'CVE-2018-12359', 'CVE-2016-2147', 'CVE-2018-1000550', 'CVE-2017-18013', 'CVE-2016-6620', 'CVE-2018-1130', 'CVE-2018-6553', 'CVE-2018-1000517', 'CVE-2017-18264', 'CVE-2018-1000077', 'CVE-2018-4181', 'CVE-2018-12362', 'CVE-2015-9621'], '2018,8': ['CVE-2018-3064', 'CVE-2018-1000544', 'CVE-2017-12086', 'CVE-2017-11642', 'CVE-2017-18219', 'CVE-2018-14679', 'CVE-2018-14348', 'CVE-2017-18220', 'CVE-2017-2901', 'CVE-2017-2906', 'CVE-2018-10871', 'CVE-2017-11403', 'CVE-2018-14682', 'CVE-2017-2899', 'CVE-2017-2904', 'CVE-2018-14355', 'CVE-2018-14598', 'CVE-2018-10906', 'CVE-2018-14912', 'CVE-2018-10888', 'CVE-2018-14361', 'CVE-2016-2337', 'CVE-2017-15277', 'CVE-2018-5685', 'CVE-2017-6335', 'CVE-2017-12082', 'CVE-2017-12105', 'CVE-2018-14952', 'CVE-2018-14681', 'CVE-2018-3063', 'CVE-2017-12101', 'CVE-2018-12578', 'CVE-2017-2900', 'CVE-2017-14997', 'CVE-2017-12102', 'CVE-2018-0360', 'CVE-2018-10887', 'CVE-2017-12936', 'CVE-2017-11140', 'CVE-2018-0361', 'CVE-2018-14352', 'CVE-2017-2902', 'CVE-2017-16545', 'CVE-2018-10873', 'CVE-2017-13775', 'CVE-2018-3058', 'CVE-2018-14950', 'CVE-2018-12601', 'CVE-2018-3620', 'CVE-2018-14347', 'CVE-2017-12103', 'CVE-2018-14360', 'CVE-2017-2905', 'CVE-2018-14354', 'CVE-2017-13737', 'CVE-2017-2918', 'CVE-2018-14447', 'CVE-2018-10935', 'CVE-2018-6799', 'CVE-2018-14593', 'CVE-2018-14040', 'CVE-2018-14767', 'CVE-2017-12100', 'CVE-2015-9261', 'CVE-2017-11637', 'CVE-2017-13777', 'CVE-2018-14349', 'CVE-2018-15599', 'CVE-2018-15501', 'CVE-2018-14680', 'CVE-2017-2907', 'CVE-2018-14359', 'CVE-2017-12935', 'CVE-2018-14951', 'CVE-2015-9262', 'CVE-2017-18230', 'CVE-2017-11641', 'CVE-2017-12081', 'CVE-2018-14350', 'CVE-2018-10995', 'CVE-2017-16547', 'CVE-2018-14622', 'CVE-2018-14357', 'CVE-2018-14362', 'CVE-2018-14954', 'CVE-2018-14953', 'CVE-2017-11638', 'CVE-2018-14599', 'CVE-2017-18229', 'CVE-2017-16352', 'CVE-2018-14346', 'CVE-2018-14358', 'CVE-2018-14351', 'CVE-2018-8020', 'CVE-2017-14994', 'CVE-2018-5390', 'CVE-2018-1000073', 'CVE-2018-13405', 'CVE-2018-14600', 'CVE-2017-15930', 'CVE-2011-5325', 'CVE-2018-14353', 'CVE-2017-2903', 'CVE-2018-10915', 'CVE-2017-9098', 'CVE-2017-11102', 'CVE-2017-12104', 'CVE-2018-9018', 'CVE-2018-10886', 'CVE-2017-2908', 'CVE-2018-14356', 'CVE-2018-5740', 'CVE-2018-5391', 'CVE-2018-15473', 'CVE-2017-14504', 'CVE-2016-5239', 'CVE-2018-1000074', 'CVE-2017-18231', 'CVE-2018-3066', 'CVE-2017-13776', 'CVE-2018-3646', 'CVE-2018-14955', 'CVE-2018-14526', 'CVE-2018-14363', 'CVE-2018-8019', 'CVE-2017-12099'], '2018,9': ['CVE-2017-9330', 'CVE-2018-16741', 'CVE-2016-9914', 'CVE-2017-5525', 'CVE-2018-15909', 'CVE-2018-16541', 'CVE-2018-9251', 'CVE-2018-10928', 'CVE-2018-16152', 'CVE-2017-5856', 'CVE-2017-14167', 'CVE-2018-11645', 'CVE-2011-2767', 'CVE-2018-17183', 'CVE-2018-11468', 'CVE-2018-14883', 'CVE-2015-6563', 'CVE-2018-15911', 'CVE-2016-8576', 'CVE-2017-9373', 'CVE-2018-14424', 'CVE-2016-3115', 'CVE-2018-15908', 'CVE-2018-0498', 'CVE-2017-5715', 'CVE-2017-7377', 'CVE-2017-5987', 'CVE-2017-15038', 'CVE-2018-15910', 'CVE-2018-16513', 'CVE-2017-7493', 'CVE-2018-10857', 'CVE-2018-16587', 'CVE-2018-16586', 'CVE-2018-1000802', 'CVE-2018-14624', 'CVE-2017-12836', 'CVE-2015-8666', 'CVE-2018-14618', 'CVE-2018-11504', 'CVE-2016-9907', 'CVE-2017-5526', 'CVE-2018-3639', 'CVE-2017-7654', 'CVE-2017-7980', 'CVE-2018-10930', 'CVE-2018-16509', 'CVE-2016-8667', 'CVE-2018-10923', 'CVE-2018-10913', 'CVE-2018-17141', 'CVE-2018-16542', 'CVE-2016-10009', 'CVE-2018-10907', 'CVE-2016-2198', 'CVE-2017-8086', 'CVE-2018-1000637', 'CVE-2016-9915', 'CVE-2018-3620', 'CVE-2016-9916', 'CVE-2018-3640', 'CVE-2017-9374', 'CVE-2016-9921', 'CVE-2017-1000158', 'CVE-2017-18258', 'CVE-2016-4963', 'CVE-2018-0497', 'CVE-2018-7550', 'CVE-2017-9868', 'CVE-2018-1060', 'CVE-2018-10914', 'CVE-2018-16949', 'CVE-2016-10012', 'CVE-2018-16947', 'CVE-2018-9988', 'CVE-2016-9911', 'CVE-2016-10011', 'CVE-2018-14567', 'CVE-2017-18043', 'CVE-2015-5352', 'CVE-2018-10929', 'CVE-2018-5683', 'CVE-2018-10859', 'CVE-2017-5667', 'CVE-2016-1908', 'CVE-2016-9922', 'CVE-2017-7718', 'CVE-2017-11434', 'CVE-2018-11503', 'CVE-2017-15289', 'CVE-2017-16845', 'CVE-2018-16540', 'CVE-2016-8669', 'CVE-2018-16435', 'CVE-2018-16585', 'CVE-2018-16948', 'CVE-2018-16539', 'CVE-2018-1000632', 'CVE-2017-14431', 'CVE-2018-16430', 'CVE-2017-5973', 'CVE-2018-15494', 'CVE-2018-12495', 'CVE-2016-6515', 'CVE-2018-1061', 'CVE-2016-6833', 'CVE-2016-9602', 'CVE-2015-6564', 'CVE-2018-16151', 'CVE-2017-18030', 'CVE-2018-10927', 'CVE-2018-14851', 'CVE-2018-10911', 'CVE-2017-2620', 'CVE-2017-10806', 'CVE-2018-14404', 'CVE-2016-9776', 'CVE-2017-9503', 'CVE-2016-6835', 'CVE-2017-1000116', 'CVE-2018-8034', 'CVE-2018-17082', 'CVE-2017-7653', 'CVE-2018-10926', 'CVE-2018-16511', 'CVE-2018-1000801', 'CVE-2018-3615', 'CVE-2017-8309', 'CVE-2018-17281', 'CVE-2016-10155', 'CVE-2018-16543', 'CVE-2017-6505', 'CVE-2018-9989', 'CVE-2017-12976', 'CVE-2015-5600', 'CVE-2017-5579', 'CVE-2017-8379', 'CVE-2018-16657', 'CVE-2017-9800', 'CVE-2016-10728', 'CVE-2013-0169', 'CVE-2016-10708', 'CVE-2018-1000671', 'CVE-2017-10911', 'CVE-2017-15906', 'CVE-2018-3646', 'CVE-2017-1000117', 'CVE-2017-8112', 'CVE-2018-1336', 'CVE-2017-7272', 'CVE-2018-16802', 'CVE-2016-9603', 'CVE-2017-2615', 'CVE-2018-10904'], '2018,10': ['CVE-2018-10982', 'CVE-2017-17044', 'CVE-2018-7755', 'CVE-2018-16645', 'CVE-2018-18584', 'CVE-2018-13099', 'CVE-2018-18073', 'CVE-2018-17100', 'CVE-2018-15378', 'CVE-2017-15589', 'CVE-2018-9363', 'CVE-2017-15595', 'CVE-2018-16543', 'CVE-2018-16642', 'CVE-2018-10999', 'CVE-2018-10846', 'CVE-2017-15594', 'CVE-2017-5934', 'CVE-2017-17045', 'CVE-2018-13988', 'CVE-2018-16749', 'CVE-2018-17101', 'CVE-2018-16413', 'CVE-2018-14648', 'CVE-2017-15590', 'CVE-2017-17566', 'CVE-2017-17046', 'CVE-2018-16395', 'CVE-2018-10472', 'CVE-2018-18585', 'CVE-2018-10845', 'CVE-2017-14316', 'CVE-2018-16396', 'CVE-2018-15572', 'CVE-2018-16336', 'CVE-2018-16412', 'CVE-2018-14609', 'CVE-2018-15594', 'CVE-2018-14678', 'CVE-2018-10981', 'CVE-2018-10933', 'CVE-2018-10768', 'CVE-2018-7750', 'CVE-2018-16644', 'CVE-2018-18557', 'CVE-2018-10844', 'CVE-2018-16658', 'CVE-2017-18267', 'CVE-2018-14633', 'CVE-2018-16276', 'CVE-2017-15588', 'CVE-2018-17540', 'CVE-2018-6555', 'CVE-2018-14734', 'CVE-2017-15592', 'CVE-2018-16646', 'CVE-2018-10471', 'CVE-2017-17563', 'CVE-2018-10938', 'CVE-2017-14317', 'CVE-2018-17961', 'CVE-2017-15597', 'CVE-2018-10958', 'CVE-2017-17564', 'CVE-2017-15593', 'CVE-2017-11107', 'CVE-2018-10902', 'CVE-2017-14319', 'CVE-2017-17565', 'CVE-2016-11107', 'CVE-2018-9516', 'CVE-2018-1000805', 'CVE-2018-18284', 'CVE-2018-11797', 'CVE-2018-6554', 'CVE-2018-16643', 'CVE-2018-11784', 'CVE-2018-17182', 'CVE-2018-14617'], '2018,11': ['CVE-2018-5187', 'CVE-2018-12389', 'CVE-2018-14651', 'CVE-2018-10926', 'CVE-2018-3070', 'CVE-2018-12377', 'CVE-2016-7167', 'CVE-2018-10928', 'CVE-2009-0689', 'CVE-2018-12371', 'CVE-2018-7541', 'CVE-2018-16837', 'CVE-2018-16842', 'CVE-2018-18718', 'CVE-2018-12376', 'CVE-2018-12385', 'CVE-2018-3251', 'CVE-2018-12395', 'CVE-2018-12891', 'CVE-2018-3156', 'CVE-2018-12390', 'CVE-2018-1002208', 'CVE-2018-12379', 'CVE-2018-12383', 'CVE-2018-3143', 'CVE-2018-14652', 'CVE-2018-3058', 'CVE-2018-3081', 'CVE-2018-12397', 'CVE-2018-12392', 'CVE-2018-7540', 'CVE-2017-16541', 'CVE-2018-8897', 'CVE-2018-12393', 'CVE-2018-14653', 'CVE-2018-14661', 'CVE-2016-5420', 'CVE-2018-16839', 'CVE-2018-12396', 'CVE-2018-12361', 'CVE-2018-10927', 'CVE-2018-3133', 'CVE-2018-14659', 'CVE-2016-9586', 'CVE-2018-5156', 'CVE-2018-3066', 'CVE-2018-3174', 'CVE-2018-16845', 'CVE-2018-12893', 'CVE-2018-15469', 'CVE-2016-7141', 'CVE-2018-3282', 'CVE-2018-15470', 'CVE-2018-10930', 'CVE-2018-10929', 'CVE-2018-12367', 'CVE-2018-2767', 'CVE-2018-3063', 'CVE-2018-12378'], '2018,12': []}
- [0, 0, 0, 0, 0, 18, 55, 30, 46, 20, 54, 72, 38, 50, 76, 87, 50, 74, 35, 39, 60, 35, 55, 31, 47, 72, 1, 22, 178, 98, 109, 70, 135, 105, 90, 188, 172, 85, 111, 144, 110, 103, 101, 195, 194, 121, 98, 95, 87, 45, 80, 91, 87, 96, 173, 126, 154, 79, 59, 0]
- CVECVE-2015-0294 not yet reported, getting default value -1
- Problem with cve: CVE-2015-0294
- Problem with cve: CVE-2015-0282
- Problem with cve: CVE-2014-8155
- CVECVE-2015-8313 not yet reported, getting default value -1
- Problem with cve: CVE-2015-8313
- Problem with cve: CVE-2018-10845
- Problem with cve: CVE-2018-10844
- Problem with cve: CVE-2018-10846
- Problem with cve: CVE-2014-0221
- Problem with cve: CVE-2014-0076
- Problem with cve: CVE-2014-0224
- Problem with cve: CVE-2014-3470
- Problem with cve: CVE-2012-4929
- Problem with cve: CVE-2014-3507
- CVE CVE-2014-3505 not parsed correctly
- Problem with cve: CVE-2014-3505
- Problem with cve: CVE-2014-3506
- CVE CVE-2014-3510 not parsed correctly
- Problem with cve: CVE-2014-3510
- Problem with cve: CVE-2014-3566
- CVE CVE-2014-3569 not parsed correctly
- Problem with cve: CVE-2014-3569
- Problem with cve: CVE-2014-3568
- Problem with cve: CVE-2014-3567
- CVE CVE-2014-3571 not parsed correctly
- Problem with cve: CVE-2014-3571
- Problem with cve: CVE-2014-3570
- Problem with cve: CVE-2015-0204
- Problem with cve: CVE-2014-8275
- Problem with cve: CVE-2014-3572
- CVE CVE-2015-0289 not parsed correctly
- Problem with cve: CVE-2015-0289
- Problem with cve: CVE-2015-0287
- Problem with cve: CVE-2015-0286
- CVE CVE-2015-0288 not parsed correctly
- Problem with cve: CVE-2015-0288
- CVE CVE-2015-0209 not parsed correctly
- Problem with cve: CVE-2015-0209
- CVE CVE-2015-1790 not parsed correctly
- Problem with cve: CVE-2015-1790
- Problem with cve: CVE-2015-4000
- Problem with cve: CVE-2015-1792
- Problem with cve: CVE-2015-5352
- Problem with cve: CVE-2015-5600
- Problem with cve: CVE-2016-2105
- Problem with cve: CVE-2016-2106
- Problem with cve: CVE-2016-2109
- Problem with cve: CVE-2016-2181
- Problem with cve: CVE-2016-6304
- Problem with cve: CVE-2016-2179
- Problem with cve: CVE-2016-8610
- CVE CVE-2016-7056 not parsed correctly
- Problem with cve: CVE-2016-7056
- Problem with cve: CVE-2018-0737
- Problem with cve: CVE-2018-0732
- Problem with cve: CVE-2017-15906
- Problem with cve: CVE-2015-6564
- Problem with cve: CVE-2016-1908
- CVE CVE-2016-3115 not parsed correctly
- Problem with cve: CVE-2016-3115
- Problem with cve: CVE-2016-10011
- Problem with cve: CVE-2017-15130
- Problem with cve: CVE-2017-15132
- CVE CVE-2014-0487 not parsed correctly
- Problem with cve: CVE-2014-0487
- Problem with cve: CVE-2014-3153
- Problem with cve: CVE-2014-1438
- Problem with cve: CVE-2013-4470
- Problem with cve: CVE-2014-3145
- Problem with cve: CVE-2014-3144
- CVE CVE-2014-2678 not parsed correctly
- Problem with cve: CVE-2014-2678
- Problem with cve: CVE-2014-3122
- Problem with cve: CVE-2014-4656
- CVE CVE-2014-4653 not parsed correctly
- Problem with cve: CVE-2014-4653
- Problem with cve: CVE-2014-4157
- Problem with cve: CVE-2013-0228
- Problem with cve: CVE-2014-4508
- CVE CVE-2014-4654 not parsed correctly
- Problem with cve: CVE-2014-4654
- Problem with cve: CVE-2014-4943
- CVECVE-2014-90902 not yet reported, getting default value -1
- Problem with cve: CVE-2014-90902
- Problem with cve: CVE-2012-6657
- Problem with cve: CVE-2014-4655
- Problem with cve: CVE-2014-9090
- Problem with cve: CVE-2014-5471
- CVE CVE-2014-5077 not parsed correctly
- Problem with cve: CVE-2014-5077
- Problem with cve: CVE-2014-6410
- Problem with cve: CVE-2014-3687
- Problem with cve: CVE-2014-7841
- Problem with cve: CVE-2014-3688
- Problem with cve: CVE-2015-1593
- Problem with cve: CVE-2014-7822
- Problem with cve: CVE-2014-9420
- CVE CVE-2015-1421 not parsed correctly
- Problem with cve: CVE-2015-1421
- Problem with cve: CVE-2014-8134
- Problem with cve: CVE-2014-8160
- Problem with cve: CVE-2014-9585
- Problem with cve: CVE-2013-6885
- Problem with cve: CVE-2014-8133
- Problem with cve: CVE-2014-8159
- Problem with cve: CVE-2015-1805
- Problem with cve: CVE-2015-2922
- CVE CVE-2011-5321 not parsed correctly
- Problem with cve: CVE-2011-5321
- Problem with cve: CVE-2015-4167
- CVE CVE-2014-9729 not parsed correctly
- Problem with cve: CVE-2014-9729
- Problem with cve: CVE-2015-2830
- Problem with cve: CVE-2015-2041
- Problem with cve: CVE-2015-2042
- CVE CVE-2014-9730 not parsed correctly
- Problem with cve: CVE-2014-9730
- Problem with cve: CVE-2014-9731
- Problem with cve: CVE-2014-9683
- Problem with cve: CVE-2015-5366
- Problem with cve: CVE-2015-5707
- Problem with cve: CVE-2015-6937
- Problem with cve: CVE-2015-5364
- Problem with cve: CVE-2015-2925
- CVE CVE-2015-5257 not parsed correctly
- Problem with cve: CVE-2015-5257
- CVE CVE-2015-8324 not parsed correctly
- Problem with cve: CVE-2015-8324
- CVE CVE-2013-7446 not parsed correctly
- Problem with cve: CVE-2013-7446
- Problem with cve: CVE-2015-7833
- CVE CVE-2015-7799 not parsed correctly
- Problem with cve: CVE-2015-7799
- CVE CVE-2015-8543 not parsed correctly
- Problem with cve: CVE-2015-8543
- CVE CVE-2015-7566 not parsed correctly
- Problem with cve: CVE-2015-7566
- Problem with cve: CVE-2015-8785
- CVE CVE-2016-2384 not parsed correctly
- Problem with cve: CVE-2016-2384
- CVE CVE-2015-8812 not parsed correctly
- Problem with cve: CVE-2015-8812
- CVE CVE-2016-3140 not parsed correctly
- Problem with cve: CVE-2016-3140
- CVE CVE-2016-2187 not parsed correctly
- Problem with cve: CVE-2016-2187
- CVE CVE-2016-2186 not parsed correctly
- Problem with cve: CVE-2016-2186
- Problem with cve: CVE-2016-3672
- CVE CVE-2016-2184 not parsed correctly
- Problem with cve: CVE-2016-2184
- CVE CVE-2016-2185 not parsed correctly
- Problem with cve: CVE-2016-2185
- Problem with cve: CVE-2016-4565
- CVE CVE-2016-3136 not parsed correctly
- Problem with cve: CVE-2016-3136
- Problem with cve: CVE-2016-3157
- CVE CVE-2016-3138 not parsed correctly
- Problem with cve: CVE-2016-3138
- CVE CVE-2016-3137 not parsed correctly
- Problem with cve: CVE-2016-3137
- CVE CVE-2016-3951 not parsed correctly
- Problem with cve: CVE-2016-3951
- Problem with cve: CVE-2016-0821
- Problem with cve: CVE-2016-3857
- CVE CVE-2016-4470 not parsed correctly
- Problem with cve: CVE-2016-4470
- Problem with cve: CVE-2015-1350
- Problem with cve: CVE-2014-9888
- Problem with cve: CVE-2016-6787
- Problem with cve: CVE-2016-6786
- Problem with cve: CVE-2017-6214
- Problem with cve: CVE-2016-9588
- Problem with cve: CVE-2017-6348
- Problem with cve: CVE-2017-5669
- Problem with cve: CVE-2017-7472
- Problem with cve: CVE-2017-7616
- CVE CVE-2016-2188 not parsed correctly
- Problem with cve: CVE-2016-2188
- CVE CVE-2017-7273 not parsed correctly
- Problem with cve: CVE-2017-7273
- CVE CVE-2017-7618 not parsed correctly
- Problem with cve: CVE-2017-7618
- Problem with cve: CVE-2016-10200
- Problem with cve: CVE-2017-7184
- Problem with cve: CVE-2017-9077
- Problem with cve: CVE-2017-9076
- Problem with cve: CVE-2017-8925
- Problem with cve: CVE-2017-7895
- CVE CVE-2017-0605 not parsed correctly
- Problem with cve: CVE-2017-0605
- Problem with cve: CVE-2017-9075
- Problem with cve: CVE-2017-1000365
- Problem with cve: CVE-2017-12134
- Problem with cve: CVE-2017-1000111
- Problem with cve: CVE-2017-13080
- Problem with cve: CVE-2017-15868
- Problem with cve: CVE-2017-16939
- Problem with cve: CVE-2018-7757
- Problem with cve: CVE-2018-1000199
- Problem with cve: CVE-2017-13166
- Problem with cve: CVE-2017-0861
- Problem with cve: CVE-2018-8897
- CVECVE-2018-9422 not yet reported, getting default value -1
- Problem with cve: CVE-2018-9422
- Problem with cve: CVE-2018-1000204
- CVE CVE-2018-10853 not parsed correctly
- Problem with cve: CVE-2018-10853
- Problem with cve: CVE-2018-10021
- Problem with cve: CVE-2018-5391
- Problem with cve: CVE-2018-13405
- Problem with cve: CVE-2018-16658
- CVECVE-2018-9363 not yet reported, getting default value -1
- Problem with cve: CVE-2018-9363
- CVE CVE-2018-14633 not parsed correctly
- Problem with cve: CVE-2018-14633
- CVE CVE-2018-16276 not parsed correctly
- Problem with cve: CVE-2018-16276
- CVE CVE-2018-6555 not parsed correctly
- Problem with cve: CVE-2018-6555
- CVECVE-2018-9516 not yet reported, getting default value -1
- Problem with cve: CVE-2018-9516
- Problem with cve: CVE-2018-15572
- CVE CVE-2018-15594 not parsed correctly
- Problem with cve: CVE-2018-15594
- Problem with cve: CVE-2018-14678
- CVE CVE-2018-6554 not parsed correctly
- Problem with cve: CVE-2018-6554
- CVE CVE-2018-10938 not parsed correctly
- Problem with cve: CVE-2018-10938
- CVE CVE-2018-17182 not parsed correctly
- Problem with cve: CVE-2018-17182
- CVE CVE-2014-3146 not parsed correctly
- Problem with cve: CVE-2014-3146
- CVE CVE-2014-3515 not parsed correctly
- Problem with cve: CVE-2014-3515
- CVE CVE-2014-4670 not parsed correctly
- Problem with cve: CVE-2014-4670
- Problem with cve: CVE-2013-7345
- Problem with cve: CVE-2014-3587
- Problem with cve: CVE-2014-3538
- Problem with cve: CVE-2014-3669
- Problem with cve: CVE-2014-8117
- CVECVE-2015- not yet reported, getting default value -1
- Problem with cve: CVE-2015-
- Problem with cve: CVE-2014-0237
- Problem with cve: CVE-2015-2331
- CVE CVE-2015-0232 not parsed correctly
- Problem with cve: CVE-2015-0232
- CVE CVE-2015-0231 not parsed correctly
- Problem with cve: CVE-2015-0231
- Problem with cve: CVE-2015-2787
- Problem with cve: CVE-2015-2301
- Problem with cve: CVE-2015-4026
- Problem with cve: CVE-2015-4025
- Problem with cve: CVE-2015-4147
- CVE CVE-2015-4602 not parsed correctly
- Problem with cve: CVE-2015-4602
- CVE CVE-2015-4601 not parsed correctly
- Problem with cve: CVE-2015-4601
- CVE CVE-2015-4644 not parsed correctly
- Problem with cve: CVE-2015-4644
- Problem with cve: CVE-2015-4021
- CVE CVE-2015-4600 not parsed correctly
- Problem with cve: CVE-2015-4600
- Problem with cve: CVE-2015-4022
- CVE CVE-2015-4599 not parsed correctly
- Problem with cve: CVE-2015-4599
- CVE CVE-2015-7803 not parsed correctly
- Problem with cve: CVE-2015-7803
- Problem with cve: CVE-2015-7804
- CVE CVE-2015-6831 not parsed correctly
- Problem with cve: CVE-2015-6831
- CVE CVE-2015-6832 not parsed correctly
- Problem with cve: CVE-2015-6832
- CVE CVE-2015-6837 not parsed correctly
- Problem with cve: CVE-2015-6837
- CVE CVE-2015-6838 not parsed correctly
- Problem with cve: CVE-2015-6838
- CVE CVE-2015-6836 not parsed correctly
- Problem with cve: CVE-2015-6836
- CVE CVE-2015-6834 not parsed correctly
- Problem with cve: CVE-2015-6834
- CVECVE-2016- not yet reported, getting default value -1
- Problem with cve: CVE-2016-
- Problem with cve: CVE-2015-2348
- Problem with cve: CVE-2015-2305
- Problem with cve: CVE-2016-4541
- CVE CVE-2016-4343 not parsed correctly
- Problem with cve: CVE-2016-4343
- CVE CVE-2015-8866 not parsed correctly
- Problem with cve: CVE-2015-8866
- CVE CVE-2015-5161 not parsed correctly
- Problem with cve: CVE-2015-5161
- Problem with cve: CVE-2016-4070
- Problem with cve: CVE-2016-4540
- Problem with cve: CVE-2016-10158
- CVE CVE-2016-7478 not parsed correctly
- Problem with cve: CVE-2016-7478
- CVE CVE-2015-8876 not parsed correctly
- Problem with cve: CVE-2015-8876
- CVE CVE-2018-17082 not parsed correctly
- Problem with cve: CVE-2018-17082
- CVE CVE-2014-0477 not parsed correctly
- Problem with cve: CVE-2014-0477
- CVECVE-2015-0837 not yet reported, getting default value -1
- Problem with cve: CVE-2015-0837
- CVECVE-2015-1606 not yet reported, getting default value -1
- Problem with cve: CVE-2015-1606
- CVECVE-2014-3591 not yet reported, getting default value -1
- Problem with cve: CVE-2014-3591
- Problem with cve: CVE-2017-7526
- Problem with cve: CVE-2014-9330
- CVECVE-2014-8128 not yet reported, getting default value -1
- Problem with cve: CVE-2014-8128
- CVE CVE-2016-5320 not parsed correctly
- Problem with cve: CVE-2016-5320
- CVE CVE-2016-5875 not parsed correctly
- Problem with cve: CVE-2016-5875
- Problem with cve: CVE-2015-7554
- Problem with cve: CVE-2016-6223
- CVE CVE-2016-8331 not parsed correctly
- Problem with cve: CVE-2016-8331
- Problem with cve: CVE-2017-12944
- Problem with cve: CVE-2018-5784
- CVE CVE-2018-18557 not parsed correctly
- Problem with cve: CVE-2018-18557
- Problem with cve: CVE-2014-9218
- Problem with cve: CVE-2016-2041
- Problem with cve: CVE-2016-1927
- Problem with cve: CVE-2016-6622
- Problem with cve: CVE-2016-6624
- Problem with cve: CVE-2016-9850
- Problem with cve: CVE-2016-9849
- Problem with cve: CVE-2016-9865
- Problem with cve: CVE-2016-4412
- Problem with cve: CVE-2016-9861
- Problem with cve: CVE-2016-6626
- CVE CVE-2016-6618 not parsed correctly
- Problem with cve: CVE-2016-6618
- Problem with cve: CVE-2017-18264
- Problem with cve: CVE-2014-2328
- CVE CVE-2014-2709 not parsed correctly
- Problem with cve: CVE-2014-2709
- Problem with cve: CVE-2016-2313
- CVE CVE-2014-0191 not parsed correctly
- Problem with cve: CVE-2014-0191
- CVE CVE-2014-3660 not parsed correctly
- Problem with cve: CVE-2014-3660
- Problem with cve: CVE-2015-1819
- Problem with cve: CVE-2015-5312
- CVE CVE-2017-15412 not parsed correctly
- Problem with cve: CVE-2017-15412
- Problem with cve: CVE-2017-18258
- Problem with cve: CVE-2014-0067
- CVECVE-2014-8161 not yet reported, getting default value -1
- Problem with cve: CVE-2014-8161
- CVECVE-2015-0244 not yet reported, getting default value -1
- Problem with cve: CVE-2015-0244
- CVECVE-2015-0241 not yet reported, getting default value -1
- Problem with cve: CVE-2015-0241
- CVECVE-2015-0243 not yet reported, getting default value -1
- Problem with cve: CVE-2015-0243
- CVECVE-2015-3166 not yet reported, getting default value -1
- Problem with cve: CVE-2015-3166
- CVECVE-2015-3167 not yet reported, getting default value -1
- Problem with cve: CVE-2015-3167
- CVE CVE-2015-3165 not parsed correctly
- Problem with cve: CVE-2015-3165
- Problem with cve: CVE-2018-1053
- Problem with cve: CVE-2014-5031
- Problem with cve: CVE-2015-1158
- Problem with cve: CVE-2015-3279
- Problem with cve: CVE-2017-18190
- CVECVE-2018-4181 not yet reported, getting default value -1
- Problem with cve: CVE-2018-4181
- Problem with cve: CVE-2018-6553
- CVECVE-2018-4180 not yet reported, getting default value -1
- Problem with cve: CVE-2018-4180
- CVECVE-2013-4251 not yet reported, getting default value -1
- Problem with cve: CVE-2013-4251
- Problem with cve: CVE-2013-1741
- Problem with cve: CVE-2014-1491
- Problem with cve: CVE-2013-5606
- Problem with cve: CVE-2014-1568
- CVE CVE-2014-1544 not parsed correctly
- Problem with cve: CVE-2014-1544
- CVE CVE-2014-1569 not parsed correctly
- Problem with cve: CVE-2014-1569
- Problem with cve: CVE-2015-2721
- Problem with cve: CVE-2015-2730
- Problem with cve: CVE-2016-1938
- CVE CVE-2016-1978 not parsed correctly
- Problem with cve: CVE-2016-1978
- CVE CVE-2016-1979 not parsed correctly
- Problem with cve: CVE-2016-1979
- Problem with cve: CVE-2015-4000
- Problem with cve: CVE-2016-2834
- Problem with cve: CVE-2017-5462
- Problem with cve: CVE-2017-18267
- Problem with cve: CVE-2014-3479
- Problem with cve: CVE-2014-0237
- Problem with cve: CVE-2014-3587
- Problem with cve: CVE-2014-3538
- Problem with cve: CVE-2014-8116
- Problem with cve: CVE-2014-8117
- Problem with cve: CVE-2012-1150
- Problem with cve: CVE-2011-1521
- Problem with cve: CVE-2012-0845
- Problem with cve: CVE-2011-4944
- CVE CVE-2018-1000802 not parsed correctly
- Problem with cve: CVE-2018-1000802
- Problem with cve: CVE-2018-1060
- Problem with cve: CVE-2018-1061
- CVECVE-2015-2928 not yet reported, getting default value -1
- Problem with cve: CVE-2015-2928
- CVECVE-2015-2929 not yet reported, getting default value -1
- Problem with cve: CVE-2015-2929
- Problem with cve: CVE-2012-6120
- Problem with cve: CVE-2013-6412
- CVE CVE-2012-0787 not parsed correctly
- Problem with cve: CVE-2012-0787
- Problem with cve: CVE-2014-0484
- Problem with cve: CVE-2012-3512
- CVE CVE-2014-1545 not parsed correctly
- Problem with cve: CVE-2014-1545
- Problem with cve: CVE-2015-7183
- Problem with cve: CVE-2013-5705
- CVECVE-2014-4607 not yet reported, getting default value -1
- Problem with cve: CVE-2014-4607
- Problem with cve: CVE-2014-4911
- Problem with cve: CVE-2014-8628
- Problem with cve: CVE-2015-1182
- Problem with cve: CVE-2018-0497
- Problem with cve: CVE-2013-0169
- Problem with cve: CVE-2018-0498
- Problem with cve: CVE-2014-4345
- CVE CVE-2014-5352 not parsed correctly
- Problem with cve: CVE-2014-5352
- CVE CVE-2014-9421 not parsed correctly
- Problem with cve: CVE-2014-9421
- Problem with cve: CVE-2015-2695
- Problem with cve: CVE-2014-5351
- CVE CVE-2014-5355 not parsed correctly
- Problem with cve: CVE-2014-5355
- Problem with cve: CVE-2016-3119
- CVE CVE-2013-1418 not parsed correctly
- Problem with cve: CVE-2013-1418
- CVE CVE-2014-5353 not parsed correctly
- Problem with cve: CVE-2014-5353
- Problem with cve: CVE-2014-5119
- Problem with cve: CVE-2014-9402
- Problem with cve: CVE-2013-4332
- Problem with cve: CVE-2012-3406
- Problem with cve: CVE-2012-3480
- Problem with cve: CVE-2013-7424
- Problem with cve: CVE-2012-4412
- CVECVE-2013-4357 not yet reported, getting default value -1
- Problem with cve: CVE-2013-4357
- Problem with cve: CVE-2013-7423
- Problem with cve: CVE-2012-3405
- Problem with cve: CVE-2014-8121
- Problem with cve: CVE-2015-8776
- Problem with cve: CVE-2012-2149
- Problem with cve: CVE-2015-5400
- CVE CVE-2016-4556 not parsed correctly
- Problem with cve: CVE-2016-4556
- Problem with cve: CVE-2018-1000024
- Problem with cve: CVE-2014-8500
- Problem with cve: CVE-2015-1349
- Problem with cve: CVE-2015-4620
- Problem with cve: CVE-2015-5477
- Problem with cve: CVE-2016-8864
- CVECVE-2017-3135 not yet reported, getting default value -1
- Problem with cve: CVE-2017-3135
- CVECVE-2017-3136 not yet reported, getting default value -1
- Problem with cve: CVE-2017-3136
- CVECVE-2017-3137 not yet reported, getting default value -1
- Problem with cve: CVE-2017-3137
- CVECVE-2017-3138 not yet reported, getting default value -1
- Problem with cve: CVE-2017-3138
- CVECVE-2017-3143 not yet reported, getting default value -1
- Problem with cve: CVE-2017-3143
- CVECVE-2017-3142 not yet reported, getting default value -1
- Problem with cve: CVE-2017-3142
- CVECVE-2017-3145 not yet reported, getting default value -1
- Problem with cve: CVE-2017-3145
- CVECVE-2017-3139 not yet reported, getting default value -1
- Problem with cve: CVE-2017-3139
- CVECVE-2018-5735 not yet reported, getting default value -1
- Problem with cve: CVE-2018-5735
- CVECVE-2018-5740 not yet reported, getting default value -1
- Problem with cve: CVE-2018-5740
- Problem with cve: CVE-2016-0742
- CVECVE-2018-16845 not yet reported, getting default value -1
- Problem with cve: CVE-2018-16845
- Problem with cve: CVE-2014-5265
- CVE CVE-2014-2053 not parsed correctly
- Problem with cve: CVE-2014-2053
- Problem with cve: CVE-2014-5266
- Problem with cve: CVE-2014-9037
- Problem with cve: CVE-2014-9034
- Problem with cve: CVE-2014-9039
- Problem with cve: CVE-2015-5715
- CVE CVE-2016-2222 not parsed correctly
- Problem with cve: CVE-2016-2222
- CVE CVE-2016-2221 not parsed correctly
- Problem with cve: CVE-2016-2221
- CVE CVE-2016-5839 not parsed correctly
- Problem with cve: CVE-2016-5839
- Problem with cve: CVE-2016-5838
- CVE CVE-2016-5832 not parsed correctly
- Problem with cve: CVE-2016-5832
- CVE CVE-2016-5836 not parsed correctly
- Problem with cve: CVE-2016-5836
- Problem with cve: CVE-2017-5491
- Problem with cve: CVE-2017-5493
- Problem with cve: CVE-2017-9062
- Problem with cve: CVE-2014-0899
- Problem with cve: CVE-2014-5269
- Problem with cve: CVE-2014-3613
- CVE CVE-2014-8150 not parsed correctly
- Problem with cve: CVE-2014-8150
- Problem with cve: CVE-2015-3143
- Problem with cve: CVE-2016-5419
- Problem with cve: CVE-2016-8616
- Problem with cve: CVE-2016-8615
- Problem with cve: CVE-2018-14618
- Problem with cve: CVE-2018-16839
- Problem with cve: CVE-2018-16842
- Problem with cve: CVE-2014-0483
- Problem with cve: CVE-2014-0481
- Problem with cve: CVE-2015-0221
- Problem with cve: CVE-2015-0222
- Problem with cve: CVE-2015-0219
- Problem with cve: CVE-2015-5143
- Problem with cve: CVE-2015-5964
- Problem with cve: CVE-2015-5963
- Problem with cve: CVE-2016-7401
- Problem with cve: CVE-2014-0118
- Problem with cve: CVE-2014-0231
- Problem with cve: CVE-2014-3581
- Problem with cve: CVE-2013-5704
- Problem with cve: CVE-2015-3183
- Problem with cve: CVE-2016-8743
- CVE CVE-2015-0253 not parsed correctly
- Problem with cve: CVE-2015-0253
- CVE CVE-2014-3877 not parsed correctly
- Problem with cve: CVE-2014-3877
- CVECVE-2014-3875 not yet reported, getting default value -1
- Problem with cve: CVE-2014-3875
- Problem with cve: CVE-2014-7204
- Problem with cve: CVE-2014-3683
- CVE CVE-2014-4274 not parsed correctly
- Problem with cve: CVE-2014-4274
- Problem with cve: CVE-2016-0606
- Problem with cve: CVE-2016-0505
- Problem with cve: CVE-2016-0598
- Problem with cve: CVE-2016-0596
- Problem with cve: CVE-2016-0597
- Problem with cve: CVE-2016-0616
- Problem with cve: CVE-2016-0546
- Problem with cve: CVE-2016-0608
- Problem with cve: CVE-2016-0609
- Problem with cve: CVE-2016-0600
- Problem with cve: CVE-2016-0640
- Problem with cve: CVE-2016-0648
- Problem with cve: CVE-2016-2047
- Problem with cve: CVE-2016-0666
- Problem with cve: CVE-2016-0641
- Problem with cve: CVE-2016-0649
- Problem with cve: CVE-2016-0642
- Problem with cve: CVE-2016-0646
- Problem with cve: CVE-2016-0650
- Problem with cve: CVE-2016-0643
- Problem with cve: CVE-2016-0644
- Problem with cve: CVE-2016-0647
- CVE CVE-2015-2575 not parsed correctly
- Problem with cve: CVE-2015-2575
- CVE CVE-2016-3477 not parsed correctly
- Problem with cve: CVE-2016-3477
- CVE CVE-2016-3615 not parsed correctly
- Problem with cve: CVE-2016-3615
- CVE CVE-2016-3521 not parsed correctly
- Problem with cve: CVE-2016-3521
- CVE CVE-2016-5440 not parsed correctly
- Problem with cve: CVE-2016-5440
- Problem with cve: CVE-2016-6662
- Problem with cve: CVE-2016-7440
- CVE CVE-2017-3244 not parsed correctly
- Problem with cve: CVE-2017-3244
- CVE CVE-2017-3243 not parsed correctly
- Problem with cve: CVE-2017-3243
- Problem with cve: CVE-2017-3312
- CVE CVE-2017-3238 not parsed correctly
- Problem with cve: CVE-2017-3238
- CVE CVE-2017-3291 not parsed correctly
- Problem with cve: CVE-2017-3291
- CVE CVE-2017-3317 not parsed correctly
- Problem with cve: CVE-2017-3317
- CVE CVE-2016-5483 not parsed correctly
- Problem with cve: CVE-2016-5483
- CVE CVE-2017-10378 not parsed correctly
- Problem with cve: CVE-2017-10378
- CVE CVE-2017-10384 not parsed correctly
- Problem with cve: CVE-2017-10384
- CVE CVE-2018-2640 not parsed correctly
- Problem with cve: CVE-2018-2640
- CVE CVE-2018-2665 not parsed correctly
- Problem with cve: CVE-2018-2665
- CVE CVE-2018-2622 not parsed correctly
- Problem with cve: CVE-2018-2622
- CVE CVE-2018-2668 not parsed correctly
- Problem with cve: CVE-2018-2668
- CVE CVE-2018-2781 not parsed correctly
- Problem with cve: CVE-2018-2781
- CVE CVE-2018-2761 not parsed correctly
- Problem with cve: CVE-2018-2761
- CVE CVE-2018-2817 not parsed correctly
- Problem with cve: CVE-2018-2817
- CVE CVE-2018-2818 not parsed correctly
- Problem with cve: CVE-2018-2818
- CVE CVE-2018-2819 not parsed correctly
- Problem with cve: CVE-2018-2819
- CVE CVE-2018-2771 not parsed correctly
- Problem with cve: CVE-2018-2771
- Problem with cve: CVE-2017-6410
- Problem with cve: CVE-2017-8422
- Problem with cve: CVE-2014-3468
- CVE CVE-2014-3467 not parsed correctly
- Problem with cve: CVE-2014-3467
- CVE CVE-2014-3469 not parsed correctly
- Problem with cve: CVE-2014-3469
- Problem with cve: CVE-2016-4008
- Problem with cve: CVE-2014-3684
- Problem with cve: CVE-2016-4971
- Problem with cve: CVE-2013-2172
- Problem with cve: CVE-2014-3638
- Problem with cve: CVE-2014-3639
- CVE CVE-2014-3477 not parsed correctly
- Problem with cve: CVE-2014-3477
- Problem with cve: CVE-2011-2686
- CVE CVE-2003-0900 not parsed correctly
- Problem with cve: CVE-2003-0900
- CVE CVE-2014-8090 not parsed correctly
- Problem with cve: CVE-2014-8090
- Problem with cve: CVE-2014-8080
- Problem with cve: CVE-2011-0188
- CVECVE-2015-1855 not yet reported, getting default value -1
- Problem with cve: CVE-2015-1855
- Problem with cve: CVE-2012-4522
- Problem with cve: CVE-2013-2065
- Problem with cve: CVE-2015-3225
- Problem with cve: CVE-2012-5371
- Problem with cve: CVE-2014-6438
- Problem with cve: CVE-2015-7576
- Problem with cve: CVE-2015-3227
- Problem with cve: CVE-2016-0751
- Problem with cve: CVE-2018-8777
- Problem with cve: CVE-2016-7798
- CVE CVE-2016-2337 not parsed correctly
- Problem with cve: CVE-2016-2337
- CVECVE-2018-16395 not yet reported, getting default value -1
- Problem with cve: CVE-2018-16395
- CVECVE-2018-16396 not yet reported, getting default value -1
- Problem with cve: CVE-2018-16396
- CVE CVE-2012-3437 not parsed correctly
- Problem with cve: CVE-2012-3437
- Problem with cve: CVE-2016-3716
- Problem with cve: CVE-2016-7539
- Problem with cve: CVE-2015-8959
- Problem with cve: CVE-2014-9853
- CVECVE-2016-7524 not yet reported, getting default value -1
- Problem with cve: CVE-2016-7524
- CVE CVE-2014-9838 not parsed correctly
- Problem with cve: CVE-2014-9838
- Problem with cve: CVE-2014-9854
- CVECVE-2016-7523 not yet reported, getting default value -1
- Problem with cve: CVE-2016-7523
- Problem with cve: CVE-2014-9848
- Problem with cve: CVE-2014-9826
- Problem with cve: CVE-2016-10146
- Problem with cve: CVE-2017-5507
- Problem with cve: CVE-2016-10145
- Problem with cve: CVE-2016-10062
- CVE CVE-2017-7619 not parsed correctly
- Problem with cve: CVE-2017-7619
- Problem with cve: CVE-2017-7941
- Problem with cve: CVE-2017-7943
- Problem with cve: CVE-2014-9841
- Problem with cve: CVE-2017-8765
- Problem with cve: CVE-2017-11537
- Problem with cve: CVE-2017-12674
- Problem with cve: CVE-2017-11724
- Problem with cve: CVE-2017-12429
- Problem with cve: CVE-2017-13133
- Problem with cve: CVE-2017-11478
- Problem with cve: CVE-2017-11523
- Problem with cve: CVE-2017-12432
- Problem with cve: CVE-2017-11525
- Problem with cve: CVE-2017-12435
- Problem with cve: CVE-2017-12430
- Problem with cve: CVE-2017-12643
- Problem with cve: CVE-2017-11505
- Problem with cve: CVE-2017-11446
- Problem with cve: CVE-2017-12563
- Problem with cve: CVE-2017-11188
- Problem with cve: CVE-2017-11170
- Problem with cve: CVE-2017-12140
- Problem with cve: CVE-2017-12693
- Problem with cve: CVE-2017-14172
- Problem with cve: CVE-2017-12875
- Problem with cve: CVE-2017-14174
- Problem with cve: CVE-2017-12692
- Problem with cve: CVE-2017-12691
- Problem with cve: CVE-2017-14175
- Problem with cve: CVE-2017-17914
- Problem with cve: CVE-2018-7443
- Problem with cve: CVE-2018-16413
- Problem with cve: CVE-2018-16645
- Problem with cve: CVE-2018-16642
- Problem with cve: CVE-2018-16412
- CVE CVE-2018-16749 not parsed correctly
- Problem with cve: CVE-2018-16749
- CVE CVE-2018-16643 not parsed correctly
- Problem with cve: CVE-2018-16643
- Problem with cve: CVE-2018-16644
- CVE CVE-2013-1571 not parsed correctly
- Problem with cve: CVE-2013-1571
- CVE CVE-2012-3439 not parsed correctly
- Problem with cve: CVE-2012-3439
- Problem with cve: CVE-2014-0230
- Problem with cve: CVE-2014-0227
- Problem with cve: CVE-2016-0763
- Problem with cve: CVE-2016-0714
- Problem with cve: CVE-2016-5018
- Problem with cve: CVE-2016-0762
- Problem with cve: CVE-2016-6796
- Problem with cve: CVE-2016-8745
- Problem with cve: CVE-2017-6056
- Problem with cve: CVE-2017-5664
- Problem with cve: CVE-2018-1304
- Problem with cve: CVE-2018-8014
- Problem with cve: CVE-2018-11784
- CVECVE-2015-0837 not yet reported, getting default value -1
- Problem with cve: CVE-2015-0837
- CVECVE-2014-3591 not yet reported, getting default value -1
- Problem with cve: CVE-2014-3591
- Problem with cve: CVE-2017-7526
- CVE CVE-2014-6502 not parsed correctly
- Problem with cve: CVE-2014-6502
- CVE CVE-2014-6511 not parsed correctly
- Problem with cve: CVE-2014-6511
- CVE CVE-2014-4262 not parsed correctly
- Problem with cve: CVE-2014-4262
- CVE CVE-2014-6506 not parsed correctly
- Problem with cve: CVE-2014-6506
- CVE CVE-2014-6504 not parsed correctly
- Problem with cve: CVE-2014-6504
- CVE CVE-2014-4263 not parsed correctly
- Problem with cve: CVE-2014-4263
- CVE CVE-2014-4268 not parsed correctly
- Problem with cve: CVE-2014-4268
- CVE CVE-2014-6512 not parsed correctly
- Problem with cve: CVE-2014-6512
- CVE CVE-2014-6457 not parsed correctly
- Problem with cve: CVE-2014-6457
- CVE CVE-2014-6531 not parsed correctly
- Problem with cve: CVE-2014-6531
- CVE CVE-2014-4216 not parsed correctly
- Problem with cve: CVE-2014-4216
- CVE CVE-2014-4209 not parsed correctly
- Problem with cve: CVE-2014-4209
- CVE CVE-2014-4218 not parsed correctly
- Problem with cve: CVE-2014-4218
- CVE CVE-2014-6519 not parsed correctly
- Problem with cve: CVE-2014-6519
- CVE CVE-2014-4244 not parsed correctly
- Problem with cve: CVE-2014-4244
- CVE CVE-2014-6517 not parsed correctly
- Problem with cve: CVE-2014-6517
- CVE CVE-2014-4219 not parsed correctly
- Problem with cve: CVE-2014-4219
- CVE CVE-2014-4266 not parsed correctly
- Problem with cve: CVE-2014-4266
- CVE CVE-2014-6558 not parsed correctly
- Problem with cve: CVE-2014-6558
- CVE CVE-2014-4252 not parsed correctly
- Problem with cve: CVE-2014-4252
- CVE CVE-2014-2490 not parsed correctly
- Problem with cve: CVE-2014-2490
- Problem with cve: CVE-2015-0412
- Problem with cve: CVE-2015-0410
- Problem with cve: CVE-2015-0395
- Problem with cve: CVE-2015-0408
- Problem with cve: CVE-2014-3566
- CVE CVE-2014-6587 not parsed correctly
- Problem with cve: CVE-2014-6587
- CVE CVE-2014-6585 not parsed correctly
- Problem with cve: CVE-2014-6585
- CVE CVE-2015-0407 not parsed correctly
- Problem with cve: CVE-2015-0407
- CVE CVE-2014-6591 not parsed correctly
- Problem with cve: CVE-2014-6591
- CVE CVE-2014-6593 not parsed correctly
- Problem with cve: CVE-2014-6593
- Problem with cve: CVE-2015-0383
- Problem with cve: CVE-2014-6601
- CVE CVE-2015-0478 not parsed correctly
- Problem with cve: CVE-2015-0478
- CVE CVE-2015-0488 not parsed correctly
- Problem with cve: CVE-2015-0488
- CVE CVE-2015-0470 not parsed correctly
- Problem with cve: CVE-2015-0470
- CVE CVE-2015-0460 not parsed correctly
- Problem with cve: CVE-2015-0460
- CVE CVE-2015-0469 not parsed correctly
- Problem with cve: CVE-2015-0469
- CVE CVE-2015-0477 not parsed correctly
- Problem with cve: CVE-2015-0477
- CVE CVE-2015-0480 not parsed correctly
- Problem with cve: CVE-2015-0480
- CVE CVE-2015-4732 not parsed correctly
- Problem with cve: CVE-2015-4732
- CVE CVE-2015-4731 not parsed correctly
- Problem with cve: CVE-2015-4731
- CVE CVE-2015-4733 not parsed correctly
- Problem with cve: CVE-2015-4733
- CVE CVE-2015-4748 not parsed correctly
- Problem with cve: CVE-2015-4748
- CVE CVE-2015-4760 not parsed correctly
- Problem with cve: CVE-2015-4760
- CVE CVE-2015-2590 not parsed correctly
- Problem with cve: CVE-2015-2590
- CVE CVE-2015-2628 not parsed correctly
- Problem with cve: CVE-2015-2628
- CVE CVE-2015-2625 not parsed correctly
- Problem with cve: CVE-2015-2625
- Problem with cve: CVE-2015-4000
- CVE CVE-2015-2621 not parsed correctly
- Problem with cve: CVE-2015-2621
- CVE CVE-2015-2601 not parsed correctly
- Problem with cve: CVE-2015-2601
- CVE CVE-2015-4749 not parsed correctly
- Problem with cve: CVE-2015-4749
- CVE CVE-2015-2632 not parsed correctly
- Problem with cve: CVE-2015-2632
- Problem with cve: CVE-2015-2808
- CVE CVE-2015-4843 not parsed correctly
- Problem with cve: CVE-2015-4843
- CVE CVE-2015-4893 not parsed correctly
- Problem with cve: CVE-2015-4893
- CVE CVE-2015-4911 not parsed correctly
- Problem with cve: CVE-2015-4911
- CVE CVE-2015-4842 not parsed correctly
- Problem with cve: CVE-2015-4842
- CVE CVE-2015-4903 not parsed correctly
- Problem with cve: CVE-2015-4903
- CVE CVE-2015-4872 not parsed correctly
- Problem with cve: CVE-2015-4872
- CVE CVE-2015-4806 not parsed correctly
- Problem with cve: CVE-2015-4806
- CVE CVE-2015-4883 not parsed correctly
- Problem with cve: CVE-2015-4883
- CVE CVE-2015-4860 not parsed correctly
- Problem with cve: CVE-2015-4860
- CVE CVE-2015-4882 not parsed correctly
- Problem with cve: CVE-2015-4882
- CVE CVE-2015-4844 not parsed correctly
- Problem with cve: CVE-2015-4844
- CVE CVE-2015-4803 not parsed correctly
- Problem with cve: CVE-2015-4803
- CVE CVE-2015-4881 not parsed correctly
- Problem with cve: CVE-2015-4881
- CVE CVE-2015-4835 not parsed correctly
- Problem with cve: CVE-2015-4835
- CVE CVE-2015-4734 not parsed correctly
- Problem with cve: CVE-2015-4734
- CVE CVE-2015-4805 not parsed correctly
- Problem with cve: CVE-2015-4805
- Problem with cve: CVE-2015-7575
- CVE CVE-2016-0448 not parsed correctly
- Problem with cve: CVE-2016-0448
- CVE CVE-2016-0483 not parsed correctly
- Problem with cve: CVE-2016-0483
- CVE CVE-2016-0494 not parsed correctly
- Problem with cve: CVE-2016-0494
- CVE CVE-2016-0402 not parsed correctly
- Problem with cve: CVE-2016-0402
- CVE CVE-2016-0466 not parsed correctly
- Problem with cve: CVE-2016-0466
- Problem with cve: CVE-2014-8104
- Problem with cve: CVE-2013-6497
- Problem with cve: CVE-2015-2221
- Problem with cve: CVE-2015-2222
- Problem with cve: CVE-2015-2668
- Problem with cve: CVE-2015-1463
- Problem with cve: CVE-2014-9556
- Problem with cve: CVE-2015-2170
- Problem with cve: CVE-2018-15378
- Problem with cve: CVE-2018-14356
- Problem with cve: CVE-2018-14363
- Problem with cve: CVE-2014-9029
- CVE CVE-2014-8137 not parsed correctly
- Problem with cve: CVE-2014-8137
- Problem with cve: CVE-2014-8157
- Problem with cve: CVE-2016-8883
- Problem with cve: CVE-2014-8767
- Problem with cve: CVE-2015-0261
- Problem with cve: CVE-2015-2155
- Problem with cve: CVE-2017-12997
- Problem with cve: CVE-2017-12989
- Problem with cve: CVE-2017-12995
- Problem with cve: CVE-2017-12990
- Problem with cve: CVE-2014-8601
- Problem with cve: CVE-2014-7273
- Problem with cve: CVE-2014-7274
- Problem with cve: CVE-2014-7275
- Problem with cve: CVE-2014-8602
- CVE CVE-2012-3541 not parsed correctly
- Problem with cve: CVE-2012-3541
- CVECVE-2014-7844 not yet reported, getting default value -1
- Problem with cve: CVE-2014-7844
- CVECVE-2014-7844 not yet reported, getting default value -1
- Problem with cve: CVE-2014-7844
- Problem with cve: CVE-2014-9296
- CVE CVE-2014-9293 not parsed correctly
- Problem with cve: CVE-2014-9293
- CVE CVE-2014-9294 not parsed correctly
- Problem with cve: CVE-2014-9294
- CVE CVE-2014-9298 not parsed correctly
- Problem with cve: CVE-2014-9298
- CVE CVE-2014-9297 not parsed correctly
- Problem with cve: CVE-2014-9297
- Problem with cve: CVE-2015-1798
- Problem with cve: CVE-2015-1799
- Problem with cve: CVE-2015-5300
- CVECVE-2015-7851 not yet reported, getting default value -1
- Problem with cve: CVE-2015-7851
- Problem with cve: CVE-2015-7701
- Problem with cve: CVE-2015-7974
- CVE CVE-2015-8158 not parsed correctly
- Problem with cve: CVE-2015-8158
- Problem with cve: CVE-2015-7979
- Problem with cve: CVE-2016-1548
- Problem with cve: CVE-2013-0254
- Problem with cve: CVE-2015-0295
- CVE CVE-2014-3580 not parsed correctly
- Problem with cve: CVE-2014-3580
- CVE CVE-2013-1849 not parsed correctly
- Problem with cve: CVE-2013-1849
- Problem with cve: CVE-2015-0248
- CVE CVE-2013-1847 not parsed correctly
- Problem with cve: CVE-2013-1847
- CVE CVE-2016-2168 not parsed correctly
- Problem with cve: CVE-2016-2168
- CVE CVE-2014-8091 not parsed correctly
- Problem with cve: CVE-2014-8091
- CVE CVE-2014-8092 not parsed correctly
- Problem with cve: CVE-2014-8092
- CVE CVE-2014-8093 not parsed correctly
- Problem with cve: CVE-2014-8093
- Problem with cve: CVE-2017-10972
- CVE CVE-2014-9323 not parsed correctly
- Problem with cve: CVE-2014-9323
- CVECVE-2014-8139 not yet reported, getting default value -1
- Problem with cve: CVE-2014-8139
- CVECVE-2014-8141 not yet reported, getting default value -1
- Problem with cve: CVE-2014-8141
- CVECVE-2014-8140 not yet reported, getting default value -1
- Problem with cve: CVE-2014-8140
- Problem with cve: CVE-2015-7697
- Problem with cve: CVE-2014-9381
- Problem with cve: CVE-2014-6272
- Problem with cve: CVE-2014-8118
- Problem with cve: CVE-2012-0815
- Problem with cve: CVE-2014-9087
- CVE CVE-2015-1031 not parsed correctly
- Problem with cve: CVE-2015-1031
- Problem with cve: CVE-2015-1381
- Problem with cve: CVE-2015-0240
- Problem with cve: CVE-2015-5252
- Problem with cve: CVE-2016-2115
- Problem with cve: CVE-2016-2125
- Problem with cve: CVE-2017-12150
- Problem with cve: CVE-2014-9472
- Problem with cve: CVE-2015-7686
- Problem with cve: CVE-2017-5361
- Problem with cve: CVE-2017-5944
- Problem with cve: CVE-2015-5602
- Problem with cve: CVE-2015-2063
- Problem with cve: CVE-2016-7166
- Problem with cve: CVE-2016-5418
- Problem with cve: CVE-2017-15923
- CVE CVE-2014-3596 not parsed correctly
- Problem with cve: CVE-2014-3596
- Problem with cve: CVE-2015-2091
- Problem with cve: CVE-2015-5309
- Problem with cve: CVE-2016-2099
- CVE CVE-2015-0250 not parsed correctly
- Problem with cve: CVE-2015-0250
- CVE CVE-2015-1803 not parsed correctly
- Problem with cve: CVE-2015-1803
- Problem with cve: CVE-2015-1804
- Problem with cve: CVE-2012-3509
- Problem with cve: CVE-2014-9666
- Problem with cve: CVE-2014-9670
- Problem with cve: CVE-2014-9661
- Problem with cve: CVE-2014-9671
- Problem with cve: CVE-2014-9675
- Problem with cve: CVE-2014-9674
- Problem with cve: CVE-2014-9745
- Problem with cve: CVE-2014-9747
- Problem with cve: CVE-2014-2497
- Problem with cve: CVE-2015-0885
- Problem with cve: CVE-2015-1822
- CVECVE-2015-1853 not yet reported, getting default value -1
- Problem with cve: CVE-2015-1853
- Problem with cve: CVE-2016-1567
- Problem with cve: CVE-2014-6051
- Problem with cve: CVE-2014-6053
- Problem with cve: CVE-2014-6054
- Problem with cve: CVE-2013-7439
- Problem with cve: CVE-2016-7942
- CVE CVE-2018-14598 not parsed correctly
- Problem with cve: CVE-2018-14598
- CVE CVE-2018-14599 not parsed correctly
- Problem with cve: CVE-2018-14599
- CVE CVE-2018-14600 not parsed correctly
- Problem with cve: CVE-2018-14600
- CVE CVE-2015-1545 not parsed correctly
- Problem with cve: CVE-2015-1545
- Problem with cve: CVE-2013-4449
- Problem with cve: CVE-2014-9713
- Problem with cve: CVE-2014-8711
- Problem with cve: CVE-2014-6432
- Problem with cve: CVE-2014-8712
- CVE CVE-2015-0562 not parsed correctly
- Problem with cve: CVE-2015-0562
- Problem with cve: CVE-2015-2191
- Problem with cve: CVE-2014-8714
- Problem with cve: CVE-2014-6423
- Problem with cve: CVE-2015-2188
- Problem with cve: CVE-2015-3811
- Problem with cve: CVE-2012-6058
- Problem with cve: CVE-2012-6057
- Problem with cve: CVE-2012-6061
- Problem with cve: CVE-2013-2487
- Problem with cve: CVE-2013-1579
- Problem with cve: CVE-2013-4929
- Problem with cve: CVE-2013-2485
- Problem with cve: CVE-2012-6056
- Problem with cve: CVE-2013-2482
- Problem with cve: CVE-2013-1576
- Problem with cve: CVE-2012-6054
- Problem with cve: CVE-2013-2486
- Problem with cve: CVE-2012-6060
- Problem with cve: CVE-2012-6055
- Problem with cve: CVE-2013-5719
- Problem with cve: CVE-2013-2479
- Problem with cve: CVE-2012-6053
- Problem with cve: CVE-2013-2476
- Problem with cve: CVE-2013-4927
- Problem with cve: CVE-2013-4931
- Problem with cve: CVE-2016-5350
- Problem with cve: CVE-2016-5359
- Problem with cve: CVE-2016-6511
- Problem with cve: CVE-2016-6507
- Problem with cve: CVE-2016-6510
- Problem with cve: CVE-2016-6506
- Problem with cve: CVE-2016-6508
- Problem with cve: CVE-2016-9376
- Problem with cve: CVE-2016-9374
- Problem with cve: CVE-2016-9375
- Problem with cve: CVE-2017-6014
- CVE CVE-2017-5596 not parsed correctly
- Problem with cve: CVE-2017-5596
- Problem with cve: CVE-2017-6474
- Problem with cve: CVE-2017-6470
- Problem with cve: CVE-2018-9270
- Problem with cve: CVE-2018-9269
- Problem with cve: CVE-2018-9263
- Problem with cve: CVE-2018-9268
- Problem with cve: CVE-2018-14368
- Problem with cve: CVE-2012-5370
- Problem with cve: CVE-2015-3451
- CVE CVE-2013-1569 not parsed correctly
- Problem with cve: CVE-2013-1569
- CVE CVE-2013-2383 not parsed correctly
- Problem with cve: CVE-2013-2383
- Problem with cve: CVE-2014-7923
- CVE CVE-2014-6585 not parsed correctly
- Problem with cve: CVE-2014-6585
- CVE CVE-2013-2384 not parsed correctly
- Problem with cve: CVE-2013-2384
- CVE CVE-2014-6591 not parsed correctly
- Problem with cve: CVE-2014-6591
- Problem with cve: CVE-2014-7940
- Problem with cve: CVE-2014-7926
- CVE CVE-2013-2419 not parsed correctly
- Problem with cve: CVE-2013-2419
- CVE CVE-2015-4760 not parsed correctly
- Problem with cve: CVE-2015-4760
- CVE CVE-2015-2632 not parsed correctly
- Problem with cve: CVE-2015-2632
- CVE CVE-2016-0494 not parsed correctly
- Problem with cve: CVE-2016-0494
- CVE CVE-2015-4844 not parsed correctly
- Problem with cve: CVE-2015-4844
- Problem with cve: CVE-2015-0847
- CVE CVE-2014-3577 not parsed correctly
- Problem with cve: CVE-2014-3577
- Problem with cve: CVE-2015-5262
- Problem with cve: CVE-2015-3294
- Problem with cve: CVE-2015-3202
- Problem with cve: CVE-2017-0358
- CVECVE-2012-6685 not yet reported, getting default value -1
- Problem with cve: CVE-2012-6685
- Problem with cve: CVE-2015-3885
- CVE CVE-2015-4047 not parsed correctly
- Problem with cve: CVE-2015-4047
- CVECVE-2014-9390 not yet reported, getting default value -1
- Problem with cve: CVE-2014-9390
- Problem with cve: CVE-2017-9462
- Problem with cve: CVE-2015-3202
- Problem with cve: CVE-2015-3885
- Problem with cve: CVE-2015-8023
- Problem with cve: CVE-2017-9023
- CVE CVE-2018-16152 not parsed correctly
- Problem with cve: CVE-2018-16152
- CVE CVE-2018-16151 not parsed correctly
- Problem with cve: CVE-2018-16151
- CVE CVE-2018-17540 not parsed correctly
- Problem with cve: CVE-2018-17540
- CVE CVE-2016-3712 not parsed correctly
- Problem with cve: CVE-2016-3712
- CVECVE-2015-5239 not yet reported, getting default value -1
- Problem with cve: CVE-2015-5239
- Problem with cve: CVE-2016-5403
- Problem with cve: CVE-2016-7908
- Problem with cve: CVE-2016-8576
- Problem with cve: CVE-2016-8577
- Problem with cve: CVE-2016-7909
- Problem with cve: CVE-2016-8909
- Problem with cve: CVE-2016-8910
- Problem with cve: CVE-2016-9101
- Problem with cve: CVE-2016-9102
- Problem with cve: CVE-2016-9105
- Problem with cve: CVE-2016-9106
- Problem with cve: CVE-2017-5973
- Problem with cve: CVE-2017-8086
- Problem with cve: CVE-2017-7377
- Problem with cve: CVE-2017-10664
- Problem with cve: CVE-2017-8309
- Problem with cve: CVE-2017-5525
- Problem with cve: CVE-2017-5667
- Problem with cve: CVE-2016-10155
- Problem with cve: CVE-2017-5856
- Problem with cve: CVE-2017-5987
- Problem with cve: CVE-2017-5579
- Problem with cve: CVE-2017-8379
- Problem with cve: CVE-2017-5526
- Problem with cve: CVE-2016-9776
- Problem with cve: CVE-2014-2683
- CVECVE-2015-3154 not yet reported, getting default value -1
- Problem with cve: CVE-2015-3154
- Problem with cve: CVE-2014-2684
- CVECVE-2014-8089 not yet reported, getting default value -1
- Problem with cve: CVE-2014-8089
- Problem with cve: CVE-2014-2682
- Problem with cve: CVE-2014-2681
- Problem with cve: CVE-2012-6532
- CVE CVE-2015-5161 not parsed correctly
- Problem with cve: CVE-2015-5161
- CVE CVE-2015-4696 not parsed correctly
- Problem with cve: CVE-2015-4696
- CVECVE-2015-3406 not yet reported, getting default value -1
- Problem with cve: CVE-2015-3406
- CVE CVE-2015-3409 not parsed correctly
- Problem with cve: CVE-2015-3409
- Problem with cve: CVE-2015-0377
- Problem with cve: CVE-2015-0418
- CVE CVE-2014-2486 not parsed correctly
- Problem with cve: CVE-2014-2486
- CVE CVE-2014-2488 not parsed correctly
- Problem with cve: CVE-2014-2488
- CVE CVE-2014-2489 not parsed correctly
- Problem with cve: CVE-2014-2489
- CVE CVE-2013-3792 not parsed correctly
- Problem with cve: CVE-2013-3792
- CVE CVE-2015-2594 not parsed correctly
- Problem with cve: CVE-2015-2594
- Problem with cve: CVE-2015-3239
- CVECVE-2014-9720 not yet reported, getting default value -1
- Problem with cve: CVE-2014-9720
- Problem with cve: CVE-2014-3566
- CVECVE-2016-1000212 not yet reported, getting default value -1
- Problem with cve: CVE-2016-1000212
- Problem with cve: CVE-2015-3228
- CVE CVE-2018-16585 not parsed correctly
- Problem with cve: CVE-2018-16585
- Problem with cve: CVE-2018-16542
- CVE CVE-2018-16541 not parsed correctly
- Problem with cve: CVE-2018-16541
- Problem with cve: CVE-2018-16509
- CVE CVE-2018-16539 not parsed correctly
- Problem with cve: CVE-2018-16539
- Problem with cve: CVE-2018-16802
- CVE CVE-2018-15908 not parsed correctly
- Problem with cve: CVE-2018-15908
- CVE CVE-2018-16540 not parsed correctly
- Problem with cve: CVE-2018-16540
- CVE CVE-2018-16513 not parsed correctly
- Problem with cve: CVE-2018-16513
- CVE CVE-2018-17183 not parsed correctly
- Problem with cve: CVE-2018-17183
- CVE CVE-2018-16543 not parsed correctly
- Problem with cve: CVE-2018-16543
- Problem with cve: CVE-2018-18073
- CVE CVE-2018-18284 not parsed correctly
- Problem with cve: CVE-2018-18284
- Problem with cve: CVE-2018-17961
- Problem with cve: CVE-2015-1283
- Problem with cve: CVE-2012-6702
- Problem with cve: CVE-2012-0876
- Problem with cve: CVE-2016-5300
- Problem with cve: CVE-2015-0851
- Problem with cve: CVE-2015-0851
- Problem with cve: CVE-2015-6496
- CVECVE-2012-6133 not yet reported, getting default value -1
- Problem with cve: CVE-2012-6133
- Problem with cve: CVE-2010-3609
- CVECVE-2012-4428 not yet reported, getting default value -1
- Problem with cve: CVE-2012-4428
- Problem with cve: CVE-2015-5198
- CVE CVE-2015-5200 not parsed correctly
- Problem with cve: CVE-2015-5200
- CVE CVE-2015-7236 not parsed correctly
- Problem with cve: CVE-2015-7236
- Problem with cve: CVE-2017-8779
- Problem with cve: CVE-2014-9639
- Problem with cve: CVE-2014-9638
- Problem with cve: CVE-2015-0852
- Problem with cve: CVE-2015-7801
- CVECVE-2014-4607 not yet reported, getting default value -1
- Problem with cve: CVE-2014-4607
- CVECVE-2015-9621 not yet reported, getting default value -1
- Problem with cve: CVE-2015-9621
- Problem with cve: CVE-2013-1813
- Problem with cve: CVE-2015-8025
- Problem with cve: CVE-2015-8540
- Problem with cve: CVE-2015-3283
- Problem with cve: CVE-2015-8312
- CVE CVE-2018-16948 not parsed correctly
- Problem with cve: CVE-2018-16948
- CVE CVE-2018-16949 not parsed correctly
- Problem with cve: CVE-2018-16949
- CVE CVE-2018-16947 not parsed correctly
- Problem with cve: CVE-2018-16947
- Problem with cve: CVE-2015-8346
- CVECVE-2013-4168 not yet reported, getting default value -1
- Problem with cve: CVE-2013-4168
- Problem with cve: CVE-2014-9756
- Problem with cve: CVE-2016-1000339
- Problem with cve: CVE-2016-1000345
- Problem with cve: CVE-2016-1000346
- Problem with cve: CVE-2016-1000341
- Problem with cve: CVE-2016-1000343
- Problem with cve: CVE-2015-8327
- Problem with cve: CVE-2015-8560
- Problem with cve: CVE-2015-8370
- CVECVE-2018-5732 not yet reported, getting default value -1
- Problem with cve: CVE-2018-5732
- CVECVE-2018-5733 not yet reported, getting default value -1
- Problem with cve: CVE-2018-5733
- Problem with cve: CVE-2016-5042
- CVE CVE-2016-1232 not parsed correctly
- Problem with cve: CVE-2016-1232
- Problem with cve: CVE-2017-8114
- CVE CVE-2016-4347 not parsed correctly
- Problem with cve: CVE-2016-4347
- Problem with cve: CVE-2018-1000041
- Problem with cve: CVE-2016-1572
- Problem with cve: CVE-2014-3566
- Problem with cve: CVE-2009-3555
- Problem with cve: CVE-2012-4929
- Problem with cve: CVE-2014-9763
- Problem with cve: CVE-2015-8748
- Problem with cve: CVE-2016-10376
- CVE CVE-2013-7447 not parsed correctly
- Problem with cve: CVE-2013-7447
- Problem with cve: CVE-2015-7674
- Problem with cve: CVE-2015-4491
- Problem with cve: CVE-2018-10933
- Problem with cve: CVE-2014-9766
- Problem with cve: CVE-2013-6441
- Problem with cve: CVE-2016-2510
- Problem with cve: CVE-2015-5727
- Problem with cve: CVE-2014-9742
- Problem with cve: CVE-2017-14737
- Problem with cve: CVE-2015-7674
- CVE CVE-2016-3425 not parsed correctly
- Problem with cve: CVE-2016-3425
- CVE CVE-2016-0695 not parsed correctly
- Problem with cve: CVE-2016-0695
- CVE CVE-2016-0687 not parsed correctly
- Problem with cve: CVE-2016-0687
- CVE CVE-2016-3427 not parsed correctly
- Problem with cve: CVE-2016-3427
- CVE CVE-2016-0636 not parsed correctly
- Problem with cve: CVE-2016-0636
- CVE CVE-2016-0686 not parsed correctly
- Problem with cve: CVE-2016-0686
- CVE CVE-2016-3426 not parsed correctly
- Problem with cve: CVE-2016-3426
- CVE CVE-2016-3500 not parsed correctly
- Problem with cve: CVE-2016-3500
- CVE CVE-2016-3550 not parsed correctly
- Problem with cve: CVE-2016-3550
- CVE CVE-2016-3458 not parsed correctly
- Problem with cve: CVE-2016-3458
- CVE CVE-2016-3508 not parsed correctly
- Problem with cve: CVE-2016-3508
- CVE CVE-2016-3606 not parsed correctly
- Problem with cve: CVE-2016-3606
- CVE CVE-2016-5554 not parsed correctly
- Problem with cve: CVE-2016-5554
- Problem with cve: CVE-2016-5573
- CVE CVE-2016-5542 not parsed correctly
- Problem with cve: CVE-2016-5542
- CVE CVE-2017-3289 not parsed correctly
- Problem with cve: CVE-2017-3289
- CVE CVE-2016-5552 not parsed correctly
- Problem with cve: CVE-2016-5552
- CVE CVE-2017-3252 not parsed correctly
- Problem with cve: CVE-2017-3252
- CVE CVE-2017-3253 not parsed correctly
- Problem with cve: CVE-2017-3253
- CVE CVE-2017-3261 not parsed correctly
- Problem with cve: CVE-2017-3261
- CVE CVE-2016-5546 not parsed correctly
- Problem with cve: CVE-2016-5546
- CVE CVE-2017-3272 not parsed correctly
- Problem with cve: CVE-2017-3272
- CVE CVE-2017-3260 not parsed correctly
- Problem with cve: CVE-2017-3260
- CVE CVE-2016-5548 not parsed correctly
- Problem with cve: CVE-2016-5548
- CVE CVE-2016-5547 not parsed correctly
- Problem with cve: CVE-2016-5547
- CVE CVE-2017-10348 not parsed correctly
- Problem with cve: CVE-2017-10348
- CVE CVE-2017-10345 not parsed correctly
- Problem with cve: CVE-2017-10345
- CVE CVE-2017-10349 not parsed correctly
- Problem with cve: CVE-2017-10349
- CVE CVE-2017-10350 not parsed correctly
- Problem with cve: CVE-2017-10350
- CVE CVE-2017-10355 not parsed correctly
- Problem with cve: CVE-2017-10355
- CVE CVE-2017-10357 not parsed correctly
- Problem with cve: CVE-2017-10357
- CVE CVE-2017-10281 not parsed correctly
- Problem with cve: CVE-2017-10281
- CVE CVE-2017-10347 not parsed correctly
- Problem with cve: CVE-2017-10347
- Problem with cve: CVE-2016-3179
- Problem with cve: CVE-2015-3008
- Problem with cve: CVE-2014-8412
- CVE CVE-2014-4046 not parsed correctly
- Problem with cve: CVE-2014-4046
- Problem with cve: CVE-2014-8418
- Problem with cve: CVE-2014-6610
- Problem with cve: CVE-2016-7551
- Problem with cve: CVE-2017-17090
- Problem with cve: CVE-2018-17281
- CVE CVE-2014-9676 not parsed correctly
- Problem with cve: CVE-2014-9676
- Problem with cve: CVE-2015-5479
- Problem with cve: CVE-2016-9819
- Problem with cve: CVE-2016-9820
- CVECVE-2015-7542 not yet reported, getting default value -1
- Problem with cve: CVE-2015-7542
- Problem with cve: CVE-2015-3246
- CVE CVE-2016-1979 not parsed correctly
- Problem with cve: CVE-2016-1979
- Problem with cve: CVE-2016-9900
- Problem with cve: CVE-2016-9895
- Problem with cve: CVE-2017-5401
- Problem with cve: CVE-2017-5405
- Problem with cve: CVE-2017-5390
- CVECVE-2017-7771 not yet reported, getting default value -1
- Problem with cve: CVE-2017-7771
- CVECVE-2017-7773 not yet reported, getting default value -1
- Problem with cve: CVE-2017-7773
- CVECVE-2017-7775 not yet reported, getting default value -1
- Problem with cve: CVE-2017-7775
- CVECVE-2017-7772 not yet reported, getting default value -1
- Problem with cve: CVE-2017-7772
- CVECVE-2017-7777 not yet reported, getting default value -1
- Problem with cve: CVE-2017-7777
- CVECVE-2017-7774 not yet reported, getting default value -1
- Problem with cve: CVE-2017-7774
- CVECVE-2017-7776 not yet reported, getting default value -1
- Problem with cve: CVE-2017-7776
- Problem with cve: CVE-2017-7807
- Problem with cve: CVE-2017-7803
- Problem with cve: CVE-2018-5117
- Problem with cve: CVE-2018-5168
- CVECVE-2018-12374 not yet reported, getting default value -1
- Problem with cve: CVE-2018-12374
- CVECVE-2018-12372 not yet reported, getting default value -1
- Problem with cve: CVE-2018-12372
- CVECVE-2018-12360 not yet reported, getting default value -1
- Problem with cve: CVE-2018-12360
- CVECVE-2018-5188 not yet reported, getting default value -1
- Problem with cve: CVE-2018-5188
- CVECVE-2018-12362 not yet reported, getting default value -1
- Problem with cve: CVE-2018-12362
- CVECVE-2018-12359 not yet reported, getting default value -1
- Problem with cve: CVE-2018-12359
- CVECVE-2018-12366 not yet reported, getting default value -1
- Problem with cve: CVE-2018-12366
- CVECVE-2018-12365 not yet reported, getting default value -1
- Problem with cve: CVE-2018-12365
- CVECVE-2018-12363 not yet reported, getting default value -1
- Problem with cve: CVE-2018-12363
- CVECVE-2018-12364 not yet reported, getting default value -1
- Problem with cve: CVE-2018-12364
- CVECVE-2018-12373 not yet reported, getting default value -1
- Problem with cve: CVE-2018-12373
- CVECVE-2018-5187 not yet reported, getting default value -1
- Problem with cve: CVE-2018-5187
- CVECVE-2018-12389 not yet reported, getting default value -1
- Problem with cve: CVE-2018-12389
- CVE CVE-2018-12377 not parsed correctly
- Problem with cve: CVE-2018-12377
- CVECVE-2018-12392 not yet reported, getting default value -1
- Problem with cve: CVE-2018-12392
- CVE CVE-2018-12379 not parsed correctly
- Problem with cve: CVE-2018-12379
- CVECVE-2018-12371 not yet reported, getting default value -1
- Problem with cve: CVE-2018-12371
- CVECVE-2018-12361 not yet reported, getting default value -1
- Problem with cve: CVE-2018-12361
- CVE CVE-2018-12383 not parsed correctly
- Problem with cve: CVE-2018-12383
- CVECVE-2018-12393 not yet reported, getting default value -1
- Problem with cve: CVE-2018-12393
- CVE CVE-2018-12385 not parsed correctly
- Problem with cve: CVE-2018-12385
- CVECVE-2018-12367 not yet reported, getting default value -1
- Problem with cve: CVE-2018-12367
- CVE CVE-2018-12376 not parsed correctly
- Problem with cve: CVE-2018-12376
- CVE CVE-2018-12378 not parsed correctly
- Problem with cve: CVE-2018-12378
- CVECVE-2018-5156 not yet reported, getting default value -1
- Problem with cve: CVE-2018-5156
- CVECVE-2018-12390 not yet reported, getting default value -1
- Problem with cve: CVE-2018-12390
- Problem with cve: CVE-2016-4477
- Problem with cve: CVE-2017-13088
- Problem with cve: CVE-2017-13087
- Problem with cve: CVE-2017-13078
- Problem with cve: CVE-2017-13086
- Problem with cve: CVE-2017-13081
- Problem with cve: CVE-2017-13077
- Problem with cve: CVE-2017-13079
- Problem with cve: CVE-2017-13084
- Problem with cve: CVE-2017-13082
- Problem with cve: CVE-2017-13080
- Problem with cve: CVE-2018-14526
- Problem with cve: CVE-2015-8872
- Problem with cve: CVE-2015-7971
- Problem with cve: CVE-2015-7969
- Problem with cve: CVE-2015-5307
- Problem with cve: CVE-2015-8340
- Problem with cve: CVE-2015-7972
- Problem with cve: CVE-2015-7970
- Problem with cve: CVE-2015-8615
- CVE CVE-2016-2271 not parsed correctly
- Problem with cve: CVE-2016-2271
- Problem with cve: CVE-2016-1571
- Problem with cve: CVE-2015-8339
- Problem with cve: CVE-2015-8104
- Problem with cve: CVE-2015-2756
- CVE CVE-2016-3712 not parsed correctly
- Problem with cve: CVE-2016-3712
- Problem with cve: CVE-2016-3960
- Problem with cve: CVE-2016-4480
- Problem with cve: CVE-2016-7092
- Problem with cve: CVE-2016-9381
- Problem with cve: CVE-2016-9386
- Problem with cve: CVE-2016-9382
- Problem with cve: CVE-2016-10013
- Problem with cve: CVE-2017-8903
- Problem with cve: CVE-2017-8905
- Problem with cve: CVE-2017-8904
- Problem with cve: CVE-2017-10920
- Problem with cve: CVE-2017-14319
- Problem with cve: CVE-2017-10913
- Problem with cve: CVE-2017-10912
- Problem with cve: CVE-2017-12135
- Problem with cve: CVE-2017-12137
- Problem with cve: CVE-2017-10921
- Problem with cve: CVE-2017-15592
- Problem with cve: CVE-2017-17044
- Problem with cve: CVE-2017-17566
- Problem with cve: CVE-2017-17564
- Problem with cve: CVE-2017-17045
- Problem with cve: CVE-2017-15590
- Problem with cve: CVE-2016-9637
- Problem with cve: CVE-2018-7541
- Problem with cve: CVE-2018-10982
- Problem with cve: CVE-2018-10981
- Problem with cve: CVE-2018-8897
- Problem with cve: CVE-2017-15597
- Problem with cve: CVE-2017-15594
- Problem with cve: CVE-2018-12893
- Problem with cve: CVE-2018-12891
- Problem with cve: CVE-2016-3716
- Problem with cve: CVE-2016-5241
- Problem with cve: CVE-2016-7448
- Problem with cve: CVE-2017-11140
- Problem with cve: CVE-2017-13777
- Problem with cve: CVE-2017-13776
- Problem with cve: CVE-2017-14314
- Problem with cve: CVE-2018-5685
- Problem with cve: CVE-2017-18229
- Problem with cve: CVE-2017-18219
- Problem with cve: CVE-2017-13775
- Problem with cve: CVE-2014-5015
- CVECVE-2014-7210 not yet reported, getting default value -1
- Problem with cve: CVE-2014-7210
- Problem with cve: CVE-2016-5426
- Problem with cve: CVE-2016-5427
- CVE CVE-2016-7068 not parsed correctly
- Problem with cve: CVE-2016-7068
- CVE CVE-2016-7072 not parsed correctly
- Problem with cve: CVE-2016-7072
- Problem with cve: CVE-2016-2120
- CVE CVE-2016-7074 not parsed correctly
- Problem with cve: CVE-2016-7074
- CVE CVE-2016-7073 not parsed correctly
- Problem with cve: CVE-2016-7073
- CVE CVE-2016-2175 not parsed correctly
- Problem with cve: CVE-2016-2175
- Problem with cve: CVE-2018-11797
- CVE CVE-2015-7995 not parsed correctly
- Problem with cve: CVE-2015-7995
- CVE CVE-2016-1684 not parsed correctly
- Problem with cve: CVE-2016-1684
- Problem with cve: CVE-2016-2821
- Problem with cve: CVE-2016-2828
- Problem with cve: CVE-2016-2831
- Problem with cve: CVE-2016-9900
- Problem with cve: CVE-2016-9895
- Problem with cve: CVE-2017-5386
- Problem with cve: CVE-2017-5390
- Problem with cve: CVE-2017-5401
- Problem with cve: CVE-2017-5405
- Problem with cve: CVE-2017-5462
- CVECVE-2017-7771 not yet reported, getting default value -1
- Problem with cve: CVE-2017-7771
- CVECVE-2017-7773 not yet reported, getting default value -1
- Problem with cve: CVE-2017-7773
- CVECVE-2017-7775 not yet reported, getting default value -1
- Problem with cve: CVE-2017-7775
- CVECVE-2017-7772 not yet reported, getting default value -1
- Problem with cve: CVE-2017-7772
- CVECVE-2017-7777 not yet reported, getting default value -1
- Problem with cve: CVE-2017-7777
- CVECVE-2017-7774 not yet reported, getting default value -1
- Problem with cve: CVE-2017-7774
- CVECVE-2017-7776 not yet reported, getting default value -1
- Problem with cve: CVE-2017-7776
- Problem with cve: CVE-2017-7807
- Problem with cve: CVE-2017-7803
- Problem with cve: CVE-2018-5117
- Problem with cve: CVE-2018-5168
- CVECVE-2018-12360 not yet reported, getting default value -1
- Problem with cve: CVE-2018-12360
- CVECVE-2018-5188 not yet reported, getting default value -1
- Problem with cve: CVE-2018-5188
- CVECVE-2018-12362 not yet reported, getting default value -1
- Problem with cve: CVE-2018-12362
- CVECVE-2018-12359 not yet reported, getting default value -1
- Problem with cve: CVE-2018-12359
- CVECVE-2018-12366 not yet reported, getting default value -1
- Problem with cve: CVE-2018-12366
- CVECVE-2018-12365 not yet reported, getting default value -1
- Problem with cve: CVE-2018-12365
- CVECVE-2018-5156 not yet reported, getting default value -1
- Problem with cve: CVE-2018-5156
- CVECVE-2018-12363 not yet reported, getting default value -1
- Problem with cve: CVE-2018-12363
- CVECVE-2018-12364 not yet reported, getting default value -1
- Problem with cve: CVE-2018-12364
- CVECVE-2018-12390 not yet reported, getting default value -1
- Problem with cve: CVE-2018-12390
- CVECVE-2018-12389 not yet reported, getting default value -1
- Problem with cve: CVE-2018-12389
- CVECVE-2018-12393 not yet reported, getting default value -1
- Problem with cve: CVE-2018-12393
- CVECVE-2018-12396 not yet reported, getting default value -1
- Problem with cve: CVE-2018-12396
- CVECVE-2018-12397 not yet reported, getting default value -1
- Problem with cve: CVE-2018-12397
- CVECVE-2018-12395 not yet reported, getting default value -1
- Problem with cve: CVE-2018-12395
- CVECVE-2018-12392 not yet reported, getting default value -1
- Problem with cve: CVE-2018-12392
- Problem with cve: CVE-2017-17843
- CVE CVE-2016-4994 not parsed correctly
- Problem with cve: CVE-2016-4994
- Problem with cve: CVE-2018-5748
- Problem with cve: CVE-2016-6160
- Problem with cve: CVE-2016-6211
- CVECVE-2017-6922 not yet reported, getting default value -1
- Problem with cve: CVE-2017-6922
- CVE CVE-2018-7602 not parsed correctly
- Problem with cve: CVE-2018-7602
- Problem with cve: CVE-2016-1238
- Problem with cve: CVE-2017-10789
- CVE CVE-2016-1051 not parsed correctly
- Problem with cve: CVE-2016-1051
- CVECVE-2017-7771 not yet reported, getting default value -1
- Problem with cve: CVE-2017-7771
- CVECVE-2017-7773 not yet reported, getting default value -1
- Problem with cve: CVE-2017-7773
- CVECVE-2017-7775 not yet reported, getting default value -1
- Problem with cve: CVE-2017-7775
- CVECVE-2017-7772 not yet reported, getting default value -1
- Problem with cve: CVE-2017-7772
- CVECVE-2017-7774 not yet reported, getting default value -1
- Problem with cve: CVE-2017-7774
- CVECVE-2017-7776 not yet reported, getting default value -1
- Problem with cve: CVE-2017-7776
- CVECVE-2017-7777 not yet reported, getting default value -1
- Problem with cve: CVE-2017-7777
- Problem with cve: CVE-2016-1238
- Problem with cve: CVE-2016-6489
- Problem with cve: CVE-2016-4036
- CVECVE-2014-8128 not yet reported, getting default value -1
- Problem with cve: CVE-2014-8128
- CVE CVE-2016-5320 not parsed correctly
- Problem with cve: CVE-2016-5320
- CVE CVE-2016-5875 not parsed correctly
- Problem with cve: CVE-2016-5875
- Problem with cve: CVE-2016-6223
- Problem with cve: CVE-2015-7554
- Problem with cve: CVE-2017-5637
- Problem with cve: CVE-2017-9079
- Problem with cve: CVE-2016-7944
- CVECVE-2016-1000247 not yet reported, getting default value -1
- Problem with cve: CVE-2016-1000247
- Problem with cve: CVE-2016-8605
- Problem with cve: CVE-2016-7972
- Problem with cve: CVE-2013-7437
- CVECVE-2014-5439 not yet reported, getting default value -1
- Problem with cve: CVE-2014-5439
- Problem with cve: CVE-2017-5934
- Problem with cve: CVE-2016-7553
- Problem with cve: CVE-2015-8978
- CVE CVE-2016-7067 not parsed correctly
- Problem with cve: CVE-2016-7067
- Problem with cve: CVE-2017-5837
- Problem with cve: CVE-2017-5844
- Problem with cve: CVE-2016-9961
- Problem with cve: CVE-2016-9963
- Problem with cve: CVE-2017-1000369
- Problem with cve: CVE-2016-4021
- Problem with cve: CVE-2015-0854
- Problem with cve: CVE-2015-0839
- Problem with cve: CVE-2017-14635
- Problem with cve: CVE-2017-15864
- Problem with cve: CVE-2017-17476
- Problem with cve: CVE-2018-14593
- Problem with cve: CVE-2018-16587
- Problem with cve: CVE-2018-16586
- CVECVE-2017-5333 not yet reported, getting default value -1
- Problem with cve: CVE-2017-5333
- CVECVE-2017-5331 not yet reported, getting default value -1
- Problem with cve: CVE-2017-5331
- CVECVE-2017-5332 not yet reported, getting default value -1
- Problem with cve: CVE-2017-5332
- Problem with cve: CVE-2016-10151
- Problem with cve: CVE-2016-10152
- Problem with cve: CVE-2016-9266
- Problem with cve: CVE-2018-5251
- Problem with cve: CVE-2018-7876
- CVE CVE-2018-16435 not parsed correctly
- Problem with cve: CVE-2018-16435
- Problem with cve: CVE-2017-5835
- Problem with cve: CVE-2017-6436
- Problem with cve: CVE-2017-9122
- Problem with cve: CVE-2016-10187
- Problem with cve: CVE-2016-8743
- Problem with cve: CVE-2017-6967
- Problem with cve: CVE-2017-6964
- CVE CVE-2017-6299 not parsed correctly
- Problem with cve: CVE-2017-6299
- Problem with cve: CVE-2014-8760
- Problem with cve: CVE-2017-0553
- Problem with cve: CVE-2017-0553
- CVECVE-2015-7559 not yet reported, getting default value -1
- Problem with cve: CVE-2015-7559
- Problem with cve: CVE-2018-10995
- Problem with cve: CVE-2017-8779
- CVE CVE-2018-14622 not parsed correctly
- Problem with cve: CVE-2018-14622
- Problem with cve: CVE-2017-8386
- Problem with cve: CVE-2017-11683
- Problem with cve: CVE-2017-11591
- Problem with cve: CVE-2018-10998
- CVE CVE-2018-16336 not parsed correctly
- Problem with cve: CVE-2018-16336
- Problem with cve: CVE-2017-7650
- Problem with cve: CVE-2017-7654
- Problem with cve: CVE-2017-5361
- Problem with cve: CVE-2018-6869
- CVECVE-2016-11107 not yet reported, getting default value -1
- Problem with cve: CVE-2016-11107
- Problem with cve: CVE-2017-7480
- Problem with cve: CVE-2017-9222
- Problem with cve: CVE-2017-9257
- Problem with cve: CVE-2017-9253
- Problem with cve: CVE-2017-9256
- Problem with cve: CVE-2017-9255
- Problem with cve: CVE-2017-9254
- Problem with cve: CVE-2017-9116
- Problem with cve: CVE-2017-9110
- Problem with cve: CVE-2017-9112
- Problem with cve: CVE-2013-2099
- Problem with cve: CVE-2017-10140
- Problem with cve: CVE-2017-10140
- Problem with cve: CVE-2017-8028
- Problem with cve: CVE-2018-14347
- CVE CVE-2018-16430 not parsed correctly
- Problem with cve: CVE-2018-16430
- Problem with cve: CVE-2016-9814
- Problem with cve: CVE-2017-1000385
- Problem with cve: CVE-2018-5764
- Problem with cve: CVE-2018-5702
- Problem with cve: CVE-2017-12635
- Problem with cve: CVE-2014-10070
- Problem with cve: CVE-2016-10714
- Problem with cve: CVE-2017-18238
- Problem with cve: CVE-2017-18236
- Problem with cve: CVE-2017-18233
- Problem with cve: CVE-2018-1122
- CVE CVE-2018-2781 not parsed correctly
- Problem with cve: CVE-2018-2781
- CVE CVE-2017-10378 not parsed correctly
- Problem with cve: CVE-2017-10378
- CVE CVE-2018-2640 not parsed correctly
- Problem with cve: CVE-2018-2640
- CVE CVE-2018-2761 not parsed correctly
- Problem with cve: CVE-2018-2761
- CVE CVE-2018-2817 not parsed correctly
- Problem with cve: CVE-2018-2817
- CVE CVE-2018-2819 not parsed correctly
- Problem with cve: CVE-2018-2819
- CVE CVE-2018-2784 not parsed correctly
- Problem with cve: CVE-2018-2784
- CVE CVE-2018-2782 not parsed correctly
- Problem with cve: CVE-2018-2782
- CVE CVE-2018-2665 not parsed correctly
- Problem with cve: CVE-2018-2665
- CVE CVE-2018-2622 not parsed correctly
- Problem with cve: CVE-2018-2622
- CVE CVE-2018-2771 not parsed correctly
- Problem with cve: CVE-2018-2771
- CVE CVE-2018-2766 not parsed correctly
- Problem with cve: CVE-2018-2766
- CVE CVE-2018-2668 not parsed correctly
- Problem with cve: CVE-2018-2668
- Problem with cve: CVE-2018-3143
- Problem with cve: CVE-2018-3251
- Problem with cve: CVE-2018-3156
- Problem with cve: CVE-2017-1000433
- CVE CVE-2018-10935 not parsed correctly
- Problem with cve: CVE-2018-10935
- CVE CVE-2018-14624 not parsed correctly
- Problem with cve: CVE-2018-14624
- Problem with cve: CVE-2018-14648
- CVE CVE-2018-10886 not parsed correctly
- Problem with cve: CVE-2018-10886
- Problem with cve: CVE-2018-11319
- CVE CVE-2018-18585 not parsed correctly
- Problem with cve: CVE-2018-18585
- CVE CVE-2018-18584 not parsed correctly
- Problem with cve: CVE-2018-18584
- CVE CVE-2018-16657 not parsed correctly
- Problem with cve: CVE-2018-16657
- CVE CVE-2018-14424 not parsed correctly
- Problem with cve: CVE-2018-14424
- Problem with cve: CVE-2011-2767
- CVE CVE-2018-10926 not parsed correctly
- Problem with cve: CVE-2018-10926
- CVE CVE-2018-10930 not parsed correctly
- Problem with cve: CVE-2018-10930
- CVE CVE-2018-10928 not parsed correctly
- Problem with cve: CVE-2018-10928
- CVE CVE-2018-10904 not parsed correctly
- Problem with cve: CVE-2018-10904
- CVE CVE-2018-10914 not parsed correctly
- Problem with cve: CVE-2018-10914
- CVE CVE-2018-10929 not parsed correctly
- Problem with cve: CVE-2018-10929
- CVE CVE-2018-10907 not parsed correctly
- Problem with cve: CVE-2018-10907
- CVE CVE-2018-10927 not parsed correctly
- Problem with cve: CVE-2018-10927
- Problem with cve: CVE-2018-10911
- CVE CVE-2018-10923 not parsed correctly
- Problem with cve: CVE-2018-10923
- CVE CVE-2018-10913 not parsed correctly
- Problem with cve: CVE-2018-10913
- Problem with cve: CVE-2018-14651
- Problem with cve: CVE-2018-14653
- Problem with cve: CVE-2018-14661
- Problem with cve: CVE-2018-14652
- Problem with cve: CVE-2018-14659
- CVE CVE-2018-17141 not parsed correctly
- Problem with cve: CVE-2018-17141
- Problem with cve: CVE-2018-1000805
- Problem with cve: CVE-2018-18718
- CVECVE-2018-16837 not yet reported, getting default value -1
- Problem with cve: CVE-2018-16837
- 20
- 20
- 20
- [157, 2375, 3, 1, 1682, 258, 1339, 4, 7, 788, 129, 6414]
- [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 2, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 3, 0, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 2, 0, 0, 0, 0, 0, 0, 0, 2, 0, 3, 0, 1, 1, 1, 0, 2, 1, 1, 0, 0, 2, 0, 0, 3, 5, 34, 3, 1, 3, 5, 2, 5, 3, 7, 2, 1, 3, 1, 2, 3, 6, 2, 13, 2, 2, 3, 15, 6, 22, 7, 8, 13, 8, 14, 7, 2, 5, 5, 9, 8, 14, 7, 5, 6, 9, 15, 10, 2, 8, 6, 12, 5, 2, 7, 2, 4, 2, 1, 4, 8, 10, 8, 5, 6, 5, 7, 18, 5, 23, 2, 10, 5, 7, 5, 6, 7, 9, 9, 13, 11, 9, 10, 10, 13, 10, 4, 2, 12, 6, 5, 12, 9, 10, 4, 23, 20, 14, 6, 19, 17, 13, 16, 7, 11, 20, 8, 5, 9, 8, 11, 15, 9, 13, 25, 5, 17, 8, 16, 19, 11, 18, 15, 17, 7, 27, 15, 16, 37, 64, 28, 21, 32, 41, 54, 49, 15, 28, 38, 84, 32, 40, 74, 24, 24, 82, 48, 137, 24, 51, 39, 36, 26, 33, 29, 25, 4, 12, 3, 0, 0, 0, 0]
- 2375
- Year 1 is the problem
- [[0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], [0.0, 0.02654867256637168, 0.0, 0.0, 0.0, 0.0, 0.0, 0.0, 0.0, 0.0, 0.0, 0.9734513274336283], [0.0, 0.02304147465437788, 0.0, 0.0, 0.0, 0.0, 0.009216589861751152, 0.0, 0.0, 0.0, 0.0, 0.967741935483871], [0.0, 0.00964630225080386, 0.0, 0.0, 0.012861736334405145, 0.0, 0.003215434083601286, 0.0, 0.0, 0.0, 0.003215434083601286, 0.9710610932475884], [0.0, 0.025078369905956112, 0.0, 0.0, 0.0, 0.0, 0.01567398119122257, 0.0, 0.0, 0.0, 0.0, 0.9592476489028213], [0.0, 0.06976744186046512, 0.0, 0.0, 0.02180232558139535, 0.00436046511627907, 0.010174418604651164, 0.0, 0.0, 0.011627906976744186, 0.0014534883720930232, 0.8808139534883721], [0.0, 0.06870229007633588, 0.0, 0.0, 0.02099236641221374, 0.01717557251908397, 0.02862595419847328, 0.0, 0.0, 0.04198473282442748, 0.0019083969465648854, 0.8206106870229007], [0.0, 0.1343042071197411, 0.0, 0.0, 0.08414239482200647, 0.019417475728155338, 0.059870550161812294, 0.0, 0.0, 0.06796116504854369, 0.0, 0.6343042071197411], [0.0013869625520110957, 0.13869625520110956, 0.0, 0.0, 0.17337031900138697, 0.030513176144244106, 0.10402219140083217, 0.0, 0.0, 0.12205270457697642, 0.0, 0.42995839112343964], [0.0, 0.11756756756756757, 0.0, 0.0, 0.13243243243243244, 0.05540540540540541, 0.1, 0.0, 0.0, 0.14594594594594595, 0.0, 0.4486486486486487], [0.0, 0.1288981288981289, 0.0, 0.0, 0.15384615384615385, 0.031185031185031187, 0.1101871101871102, 0.0, 0.0, 0.11850311850311851, 0.0, 0.4573804573804574], [0.0, 0.14661134163208853, 0.0, 0.0, 0.12171507607192254, 0.040110650069156296, 0.14661134163208853, 0.0, 0.0, 0.0995850622406639, 0.0, 0.44536652835408025], [0.0, 0.1664025356576862, 0.0, 0.0, 0.07131537242472266, 0.017432646592709985, 0.08557844690966719, 0.0, 0.0, 0.1045958795562599, 0.0, 0.554675118858954], [0.0, 0.20123456790123456, 0.0, 0.0, 0.10987654320987654, 0.024691358024691357, 0.1037037037037037, 0.0, 0.0, 0.06419753086419754, 0.0, 0.4962962962962963], [0.0031914893617021275, 0.15, 0.0, 0.0, 0.08829787234042553, 0.031914893617021274, 0.12340425531914893, 0.0, 0.0, 0.07446808510638298, 0.00425531914893617, 0.524468085106383], [0.0, 0.16826923076923078, 0.0009615384615384616, 0.0, 0.09230769230769231, 0.01730769230769231, 0.0875, 0.0, 0.0, 0.04423076923076923, 0.0028846153846153848, 0.5865384615384616], [0.030604982206405694, 0.301067615658363, 0.0007117437722419929, 0.0, 0.1800711743772242, 0.013523131672597865, 0.1423487544483986, 0.0, 0.0, 0.03772241992882562, 0.02206405693950178, 0.27188612099644127], [0.03090037293553543, 0.351092168353756, 0.0005327650506126798, 0.0005327650506126798, 0.2290889717634523, 0.011188066062866276, 0.16249334043686733, 0.0, 0.0037293553542887587, 0.03516249334043687, 0.031965903036760786, 0.14331379861481086], [0.05205205205205205, 0.16816816816816818, 0.0, 0.0, 0.21921921921921922, 0.008008008008008008, 0.11411411411411411, 0.004004004004004004, 0.0, 0.03803803803803804, 0.028028028028028028, 0.3683683683683684]]
- 0
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- {0: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 3, 0, 0, 0, 0, 2, 5, 23, 13, 27, 11, 7, 13, 13, 34, 5, 0], 1: [0, 0, 0, 0, 0, 1, 0, 2, 0, 0, 1, 4, 1, 0, 0, 2, 0, 2, 3, 3, 3, 1, 2, 42, 7, 12, 12, 5, 11, 17, 20, 35, 29, 23, 19, 29, 20, 27, 26, 14, 8, 13, 23, 18, 46, 17, 18, 25, 33, 33, 16, 23, 31, 47, 39, 46, 38, 22, 34, 47, 30, 46, 50, 49, 117, 81, 144, 81, 156, 122, 267, 114, 95, 58, 15, 0], 2: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 0], 3: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0], 4: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 4, 0, 0, 0, 0, 0, 0, 0, 1, 1, 2, 11, 4, 4, 3, 0, 2, 8, 10, 32, 47, 7, 38, 33, 24, 38, 16, 20, 22, 18, 14, 20, 16, 22, 37, 13, 15, 9, 13, 8, 23, 25, 18, 23, 19, 16, 22, 26, 22, 30, 22, 22, 56, 50, 89, 58, 77, 94, 170, 89, 112, 72, 28, 7], 5: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 0, 2, 5, 2, 0, 0, 4, 1, 7, 13, 2, 0, 7, 9, 21, 6, 5, 4, 5, 4, 2, 3, 4, 20, 2, 3, 2, 2, 4, 5, 3, 4, 8, 7, 4, 14, 5, 4, 3, 3, 8, 9, 1, 5, 4, 6, 3, 8, 4, 5, 2, 1, 0], 6: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 2, 0, 0, 0, 1, 0, 0, 0, 5, 0, 1, 3, 3, 2, 8, 3, 2, 1, 10, 7, 19, 14, 10, 29, 22, 26, 23, 15, 10, 10, 10, 17, 16, 31, 30, 20, 25, 17, 14, 13, 10, 13, 24, 20, 27, 36, 23, 24, 33, 19, 25, 20, 27, 60, 54, 50, 36, 52, 68, 127, 58, 61, 31, 15, 7], 7: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 4, 0, 0, 0], 8: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 3, 4, 0, 0, 0, 0], 9: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 5, 10, 7, 5, 0, 6, 8, 5, 23, 40, 7, 21, 20, 29, 33, 19, 27, 11, 20, 18, 8, 15, 11, 34, 12, 18, 22, 12, 14, 8, 9, 15, 20, 19, 9, 20, 22, 8, 18, 10, 10, 13, 7, 18, 15, 14, 8, 18, 26, 23, 7, 8, 0], 10: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 2, 2, 1, 0, 1, 1, 2, 1, 19, 9, 17, 13, 17, 13, 20, 5, 3, 0], 11: [0, 0, 0, 0, 40, 31, 16, 23, 39, 18, 65, 88, 99, 95, 80, 28, 77, 61, 74, 94, 113, 97, 191, 205, 93, 143, 115, 79, 83, 132, 117, 60, 88, 58, 97, 67, 68, 87, 95, 82, 63, 42, 66, 49, 99, 115, 66, 42, 100, 80, 97, 73, 56, 162, 82, 102, 101, 146, 102, 144, 146, 151, 152, 161, 163, 119, 58, 42, 74, 43, 80, 72, 57, 133, 123, 55]}
- {0: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 1, 0, 0, 0, 9, 20, 28, 29, 17, 18, 10, 14, 30, 8, 0], 1: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 3, 1, 0, 1, 5, 2, 5, 8, 5, 19, 37, 31, 29, 16, 22, 33, 70, 123, 175, 148, 163, 274, 89, 107, 55, 32, 0], 2: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0], 3: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0], 4: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 1, 0, 2, 0, 1, 3, 3, 15, 14, 11, 16, 13, 13, 25, 43, 89, 71, 68, 98, 121, 60, 95, 50, 50, 5], 5: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 0, 0, 0, 7, 3, 0, 2, 0, 4, 4, 1, 3, 7, 5, 4, 5, 6, 4, 5, 0, 0], 6: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 1, 0, 3, 2, 0, 2, 0, 4, 12, 0, 2, 6, 11, 10, 19, 16, 16, 10, 20, 16, 21, 50, 44, 50, 53, 76, 85, 37, 40, 20, 30, 5], 7: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 2, 0, 0, 0], 8: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 2, 4, 0, 0, 0, 0], 9: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 1, 1, 3, 0, 2, 6, 9, 12, 5, 9, 7, 7, 6, 16, 12, 18, 13, 9, 21, 20, 24, 7, 14, 0], 10: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 2, 0, 1, 0, 1, 0, 1, 2, 18, 20, 21, 20, 19, 19, 23, 5, 5, 0], 11: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 2, 1, 1, 0, 0, 2, 7, 15, 12, 8, 5, 12, 12, 25, 63, 86, 103, 69, 63, 66, 55, 82, 46, 66, 88, 69, 75, 47, 41, 56, 99, 53]}
- 20
- 20
- 20
- 20
- 20
- 20
- 20
- 20
- 20
- 20
- 20
- 20
- 20
- 20
- 20
- 20
|