../ figure-1-2-packages-used.png 05-May-2016 16:00 13488 figure-3-1-toplevel.png 05-May-2016 16:00 43719 figure-3-2-vulnerability.png 05-May-2016 16:00 73046 figure-3-3-potentialcoas.png 05-May-2016 16:00 37739 figure-3-4-related-exploit-targets.png 05-May-2016 16:00 36738