| Collapse![Collapse](/ldd/fixlist.nsf/g_collapse.gif?OpenImageResource) | ![](/ldd/fixlist.nsf/10x10.gif?OpenImageResource) | | |
|
![Show details for Editor](/icons/expand.gif) | Editor |
| |
|
| ![](/icons/ecblank.gif) |
|
![Show details for MIME](/icons/expand.gif) | MIME |
| |
|
| ![](/icons/ecblank.gif) |
|
![Hide details for Web Server](/icons/collapse.gif) | Web Server |
| |
![](/icons/ecblank.gif) | ![](/icons/ecblank.gif) | ![](/icons/ecblank.gif) | PPET98CPBN | Security enhancement to scrub query strings causing search to fail; work around is to add the following notes.ini: HTTP_QUERY_STRING_SCRUB=0. This... | ![](/icons/ecblank.gif) |
![Show details for 8.5.3 FP5](/icons/expand.gif) | 8.5.3 FP5 |
| |
| ![](/icons/ecblank.gif) |
![Show details for 8.5.3 FP3](/icons/expand.gif) | 8.5.3 FP3 |
| |
| ![](/icons/ecblank.gif) |
![Show details for 8.5.3 FP1](/icons/expand.gif) | 8.5.3 FP1 |
| |
| ![](/icons/ecblank.gif) |
![Show details for 8.5.2 FP4](/icons/expand.gif) | 8.5.2 FP4 |
| |
| ![](/icons/ecblank.gif) |
![Show details for 8.5.2 FP2](/icons/expand.gif) | 8.5.2 FP2 |
| |
| ![](/icons/ecblank.gif) |
![Show details for 8.5.2](/icons/expand.gif) | 8.5.2 |
| |
| ![](/icons/ecblank.gif) |
![Show details for 8.5.1 FP4](/icons/expand.gif) | 8.5.1 FP4 |
| |
| ![](/icons/ecblank.gif) |
![Show details for 8.5.1 FP2](/icons/expand.gif) | 8.5.1 FP2 |
| |
| ![](/icons/ecblank.gif) |
![Show details for 8.5.1](/icons/expand.gif) | 8.5.1 |
| |
| ![](/icons/ecblank.gif) |
![Show details for 8.0.3](/icons/expand.gif) | 8.0.3 |
| |
| ![](/icons/ecblank.gif) |
![Show details for 8.0.2 FP5](/icons/expand.gif) | 8.0.2 FP5 |
| |
| ![](/icons/ecblank.gif) |
![Show details for 8.0.2 FP3](/icons/expand.gif) | 8.0.2 FP3 |
| |
| ![](/icons/ecblank.gif) |
| Collapse![Collapse](/ldd/fixlist.nsf/g_collapse.gif?OpenImageResource) | ![](/ldd/fixlist.nsf/10x10.gif?OpenImageResource) | | |
![](/ldd/fixlist.nsf/10x10.gif?OpenImageResource) | ![](/icons/ecblank.gif) |
|