../ figure-1-2-packages-used.png 06-Nov-2015 17:00 13488 figure-3-1-toplevel.png 06-Nov-2015 17:00 43719 figure-3-2-vulnerability.png 06-Nov-2015 17:00 73046 figure-3-3-potentialcoas.png 06-Nov-2015 17:00 37739 figure-3-4-related-exploit-targets.png 06-Nov-2015 17:00 36738