{
  "SchemaVersion": 2,
  "Trivy": {
    "Version": "0.69.3"
  },
  "ReportID": "019d57b3-51a4-74e6-9de4-3cb42dbea425",
  "CreatedAt": "2026-04-04T08:54:22.884322387Z",
  "ArtifactName": "sboms/ai-containers-qdrant-v1.16.2-unprivileged-cyclonedx.json",
  "ArtifactType": "cyclonedx",
  "Metadata": {
    "OS": {
      "Family": "debian",
      "Name": "13.2"
    },
    "ImageID": "sha256:cc456ab1c1c3943190df17be7f6ed3a24022d0828b95b6cf87758b981d0fddb1",
    "DiffIDs": [
      "sha256:0faf6f9ff6fbf7c01eb47d00b9c4eb121322abd6661d34b3956a0ffdf3ce5afd",
      "sha256:2dddac8794deec15ae0071293bd952ff2a823e930c4275388cd839cf09b7303f",
      "sha256:494e844c07e0245453d0b17b767ae81eabf7d1c7205d13b94987b35f22e43e69",
      "sha256:5f70bf18a086007016e948b04aed3b82103a36bea41755b6cddfaf10ace3c6ef",
      "sha256:5f70bf18a086007016e948b04aed3b82103a36bea41755b6cddfaf10ace3c6ef",
      "sha256:5f70bf18a086007016e948b04aed3b82103a36bea41755b6cddfaf10ace3c6ef",
      "sha256:5f70bf18a086007016e948b04aed3b82103a36bea41755b6cddfaf10ace3c6ef",
      "sha256:5f70bf18a086007016e948b04aed3b82103a36bea41755b6cddfaf10ace3c6ef",
      "sha256:5f70bf18a086007016e948b04aed3b82103a36bea41755b6cddfaf10ace3c6ef",
      "sha256:684e1a4916f28ca8be5cb345b358afb5671bbbf301a9d468d86e4417742853d6",
      "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb",
      "sha256:a5a1a1908765c9429eba57a002dc20b58d6db054987b8b03b42f370aafb49ae0",
      "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36",
      "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
    ],
    "RepoDigests": [
      "registry.suse.com/ai/containers/qdrant@sha256:2da3dc65c11eddc24757f333ed10a893e9947da1b17fe602c245fac8f920abcd"
    ],
    "Reference": "registry.suse.com/ai/containers/qdrant@sha256:2da3dc65c11eddc24757f333ed10a893e9947da1b17fe602c245fac8f920abcd"
  },
  "Results": [
    {
      "Target": "sboms/ai-containers-qdrant-v1.16.2-unprivileged-cyclonedx.json (debian 13.2)",
      "Class": "os-pkgs",
      "Type": "debian",
      "Packages": [
        {
          "ID": "apt@3.0.3",
          "Name": "apt",
          "Identifier": {
            "PURL": "pkg:deb/debian/apt@3.0.3?arch=amd64\u0026distro=debian-13.2",
            "UID": "9e3e57061f898705",
            "BOMRef": "pkg:deb/debian/apt@3.0.3?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "3.0.3",
          "Arch": "amd64",
          "SrcName": "apt",
          "SrcVersion": "3.0.3",
          "Licenses": [
            "GPL-2.0-or-later",
            "curl",
            "BSD-3-Clause",
            "MIT",
            "GPL-2.0-only"
          ],
          "DependsOn": [
            "base-passwd@3.6.7",
            "debian-archive-keyring@2025.1",
            "libapt-pkg7.0@3.0.3",
            "libc6@2.41-12",
            "libgcc-s1@14.2.0-19",
            "libseccomp2@2.6.0-2",
            "libssl3t64@3.5.4-1~deb13u1",
            "libstdc++6@14.2.0-19",
            "libsystemd0@257.9-1~deb13u1",
            "sqv@1.3.0-3"
          ],
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          }
        },
        {
          "ID": "base-files@13.8+deb13u2",
          "Name": "base-files",
          "Identifier": {
            "PURL": "pkg:deb/debian/base-files@13.8%2Bdeb13u2?arch=amd64\u0026distro=debian-13.2",
            "UID": "7ad795036b0abb19",
            "BOMRef": "pkg:deb/debian/base-files@13.8%2Bdeb13u2?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "13.8+deb13u2",
          "Arch": "amd64",
          "SrcName": "base-files",
          "SrcVersion": "13.8+deb13u2",
          "Licenses": [
            "GPL-2.0-or-later",
            "verbatim"
          ],
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          }
        },
        {
          "ID": "base-passwd@3.6.7",
          "Name": "base-passwd",
          "Identifier": {
            "PURL": "pkg:deb/debian/base-passwd@3.6.7?arch=amd64\u0026distro=debian-13.2",
            "UID": "dd5f0e40d0aaab78",
            "BOMRef": "pkg:deb/debian/base-passwd@3.6.7?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "3.6.7",
          "Arch": "amd64",
          "SrcName": "base-passwd",
          "SrcVersion": "3.6.7",
          "Licenses": [
            "GPL-2.0-only",
            "public-domain"
          ],
          "DependsOn": [
            "libc6@2.41-12",
            "libdebconfclient0@0.280",
            "libselinux1@3.8.1-1"
          ],
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          }
        },
        {
          "ID": "bash@5.2.37-2+b5",
          "Name": "bash",
          "Identifier": {
            "PURL": "pkg:deb/debian/bash@5.2.37-2%2Bb5?arch=amd64\u0026distro=debian-13.2",
            "UID": "115c4840dc7bd97d",
            "BOMRef": "pkg:deb/debian/bash@5.2.37-2%2Bb5?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "5.2.37-2+b5",
          "Arch": "amd64",
          "SrcName": "bash",
          "SrcVersion": "5.2.37",
          "SrcRelease": "2",
          "Licenses": [
            "GPL-3.0-or-later",
            "GPL-3.0-only",
            "GPL-3.0-or-later WITH Bison-exception",
            "GPL-2.0-or-later",
            "GPL-2.0-only",
            "GFDL-1.3-no-invariants-only",
            "GFDL-1.3-only",
            "Latex2e",
            "BSD-4-Clause-UC",
            "MIT",
            "permissive"
          ],
          "DependsOn": [
            "base-files@13.8+deb13u2",
            "debianutils@5.23.2"
          ],
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          }
        },
        {
          "ID": "bsdutils@1:2.41-5",
          "Name": "bsdutils",
          "Identifier": {
            "PURL": "pkg:deb/debian/bsdutils@2.41-5?arch=amd64\u0026distro=debian-13.2\u0026epoch=1",
            "UID": "5511240f910cf9e",
            "BOMRef": "pkg:deb/debian/bsdutils@2.41-5?arch=amd64\u0026distro=debian-13.2\u0026epoch=1"
          },
          "Version": "2.41-5",
          "Epoch": 1,
          "Arch": "amd64",
          "SrcName": "util-linux",
          "SrcVersion": "2.41",
          "SrcRelease": "5",
          "Licenses": [
            "GPL-2.0-or-later",
            "GPL-2.0-only",
            "GPL-3.0-or-later",
            "LGPL-2.1-or-later",
            "public-domain",
            "BSD-4-Clause",
            "MIT",
            "ISC",
            "BSD-3-Clause",
            "BSLA",
            "LGPL-2.0-or-later",
            "BSD-2-Clause",
            "LGPL-3.0-or-later",
            "GPL-3.0-only",
            "LGPL-2.0-only",
            "LGPL-2.1-only",
            "LGPL-3.0-only"
          ],
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          }
        },
        {
          "ID": "ca-certificates@20250419",
          "Name": "ca-certificates",
          "Identifier": {
            "PURL": "pkg:deb/debian/ca-certificates@20250419?arch=all\u0026distro=debian-13.2",
            "UID": "849bf594328eb402",
            "BOMRef": "pkg:deb/debian/ca-certificates@20250419?arch=all\u0026distro=debian-13.2"
          },
          "Version": "20250419",
          "Arch": "all",
          "SrcName": "ca-certificates",
          "SrcVersion": "20250419",
          "Licenses": [
            "GPL-2.0-or-later",
            "GPL-2.0-only",
            "MPL-2.0"
          ],
          "DependsOn": [
            "debconf@1.5.91",
            "openssl@3.5.4-1~deb13u1"
          ],
          "Layer": {
            "Digest": "sha256:eaae8a97b41ced6ea3400030c5ee05505145583005cc540e6292fb553662d08e",
            "DiffID": "sha256:684e1a4916f28ca8be5cb345b358afb5671bbbf301a9d468d86e4417742853d6"
          }
        },
        {
          "ID": "coreutils@9.7-3",
          "Name": "coreutils",
          "Identifier": {
            "PURL": "pkg:deb/debian/coreutils@9.7-3?arch=amd64\u0026distro=debian-13.2",
            "UID": "9c73459c11b8afaf",
            "BOMRef": "pkg:deb/debian/coreutils@9.7-3?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "9.7-3",
          "Arch": "amd64",
          "SrcName": "coreutils",
          "SrcVersion": "9.7",
          "SrcRelease": "3",
          "Licenses": [
            "GPL-3.0-or-later",
            "BSD-4-Clause-UC",
            "GPL-3.0-only",
            "ISC",
            "FSFULLR",
            "GFDL-1.3-no-invariants-only",
            "GFDL-1.3-only"
          ],
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          }
        },
        {
          "ID": "dash@0.5.12-12",
          "Name": "dash",
          "Identifier": {
            "PURL": "pkg:deb/debian/dash@0.5.12-12?arch=amd64\u0026distro=debian-13.2",
            "UID": "c81970e97dd0d524",
            "BOMRef": "pkg:deb/debian/dash@0.5.12-12?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "0.5.12-12",
          "Arch": "amd64",
          "SrcName": "dash",
          "SrcVersion": "0.5.12",
          "SrcRelease": "12",
          "Licenses": [
            "BSD-3-Clause",
            "public-domain",
            "GPL-2.0-or-later",
            "GPL-2.0-only"
          ],
          "DependsOn": [
            "debianutils@5.23.2"
          ],
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          }
        },
        {
          "ID": "debconf@1.5.91",
          "Name": "debconf",
          "Identifier": {
            "PURL": "pkg:deb/debian/debconf@1.5.91?arch=all\u0026distro=debian-13.2",
            "UID": "521d6c41e8c24549",
            "BOMRef": "pkg:deb/debian/debconf@1.5.91?arch=all\u0026distro=debian-13.2"
          },
          "Version": "1.5.91",
          "Arch": "all",
          "SrcName": "debconf",
          "SrcVersion": "1.5.91",
          "Licenses": [
            "BSD-2-Clause"
          ],
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          }
        },
        {
          "ID": "debian-archive-keyring@2025.1",
          "Name": "debian-archive-keyring",
          "Identifier": {
            "PURL": "pkg:deb/debian/debian-archive-keyring@2025.1?arch=all\u0026distro=debian-13.2",
            "UID": "ac84b91d47a1f3da",
            "BOMRef": "pkg:deb/debian/debian-archive-keyring@2025.1?arch=all\u0026distro=debian-13.2"
          },
          "Version": "2025.1",
          "Arch": "all",
          "SrcName": "debian-archive-keyring",
          "SrcVersion": "2025.1",
          "Licenses": [
            "GPL-2.0-or-later"
          ],
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          }
        },
        {
          "ID": "debianutils@5.23.2",
          "Name": "debianutils",
          "Identifier": {
            "PURL": "pkg:deb/debian/debianutils@5.23.2?arch=amd64\u0026distro=debian-13.2",
            "UID": "9ea657518780797e",
            "BOMRef": "pkg:deb/debian/debianutils@5.23.2?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "5.23.2",
          "Arch": "amd64",
          "SrcName": "debianutils",
          "SrcVersion": "5.23.2",
          "Licenses": [
            "GPL-2.0-or-later",
            "GPL-2.0-only",
            "public-domain",
            "SMAIL-GPL"
          ],
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          }
        },
        {
          "ID": "diffutils@1:3.10-4",
          "Name": "diffutils",
          "Identifier": {
            "PURL": "pkg:deb/debian/diffutils@3.10-4?arch=amd64\u0026distro=debian-13.2\u0026epoch=1",
            "UID": "de2d6e4445d75c87",
            "BOMRef": "pkg:deb/debian/diffutils@3.10-4?arch=amd64\u0026distro=debian-13.2\u0026epoch=1"
          },
          "Version": "3.10-4",
          "Epoch": 1,
          "Arch": "amd64",
          "SrcName": "diffutils",
          "SrcVersion": "3.10",
          "SrcRelease": "4",
          "SrcEpoch": 1,
          "Licenses": [
            "GPL-3.0-or-later",
            "FSFULLR",
            "LGPL-2.1-or-later",
            "GPL-3.0-only WITH autoconf-exception+",
            "GPL-3.0-only",
            "GPL-3.0-or-later WITH texinfo-exception",
            "LGPL-2.0-or-later",
            "GPL-2.0-or-later",
            "X11",
            "FSFAP",
            "GFDL-1.3-no-invariants-only",
            "LGPL-3.0-or-later",
            "LGPL-3.0-only",
            "public-domain",
            "LGPL-2.0-only",
            "LGPL-2.1-only",
            "GPL-2.0-only",
            "GFDL-1.3-only"
          ],
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          }
        },
        {
          "ID": "dpkg@1.22.21",
          "Name": "dpkg",
          "Identifier": {
            "PURL": "pkg:deb/debian/dpkg@1.22.21?arch=amd64\u0026distro=debian-13.2",
            "UID": "580f7fe802cc3d8a",
            "BOMRef": "pkg:deb/debian/dpkg@1.22.21?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "1.22.21",
          "Arch": "amd64",
          "SrcName": "dpkg",
          "SrcVersion": "1.22.21",
          "Licenses": [
            "GPL-2.0-or-later",
            "public-domain-s-s-d",
            "GPL-2.0-only"
          ],
          "DependsOn": [
            "tar@1.35+dfsg-3.1"
          ],
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          }
        },
        {
          "ID": "findutils@4.10.0-3",
          "Name": "findutils",
          "Identifier": {
            "PURL": "pkg:deb/debian/findutils@4.10.0-3?arch=amd64\u0026distro=debian-13.2",
            "UID": "d4b9ca4bfa825fca",
            "BOMRef": "pkg:deb/debian/findutils@4.10.0-3?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "4.10.0-3",
          "Arch": "amd64",
          "SrcName": "findutils",
          "SrcVersion": "4.10.0",
          "SrcRelease": "3",
          "Licenses": [
            "GFDL-1.3-no-invariants-or-later",
            "GPL-3.0-or-later",
            "FSFAP",
            "GPL-2.0-or-later WITH Autoconf-data-exception",
            "GPL-3.0-or-later WITH Autoconf-data-exception",
            "FSFULLR",
            "GPL-2.0-or-later",
            "X11",
            "public-domain",
            "LGPL-2.1-or-later",
            "GPL-2.0-or-later WITH automake-exception",
            "LGPL-2.0-or-later",
            "LGPL-3.0-or-later",
            "BSD-3-Clause",
            "GPL-3.0-or-later WITH Bison-2.2-exception",
            "LGPL-3.0-only",
            "ISC",
            "GFDL-1.3-only",
            "GPL-2.0-only",
            "GPL-3.0-only",
            "LGPL-2.0-only",
            "LGPL-2.1-only"
          ],
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          }
        },
        {
          "ID": "gcc-14-base@14.2.0-19",
          "Name": "gcc-14-base",
          "Identifier": {
            "PURL": "pkg:deb/debian/gcc-14-base@14.2.0-19?arch=amd64\u0026distro=debian-13.2",
            "UID": "dd8b3ec2fe13b6",
            "BOMRef": "pkg:deb/debian/gcc-14-base@14.2.0-19?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "14.2.0-19",
          "Arch": "amd64",
          "SrcName": "gcc-14",
          "SrcVersion": "14.2.0",
          "SrcRelease": "19",
          "Licenses": [
            "GPL-2.0-or-later",
            "GPL-3.0-only",
            "GFDL-1.2-only",
            "Artistic-2.0",
            "LGPL-2.0-or-later"
          ],
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          }
        },
        {
          "ID": "grep@3.11-4",
          "Name": "grep",
          "Identifier": {
            "PURL": "pkg:deb/debian/grep@3.11-4?arch=amd64\u0026distro=debian-13.2",
            "UID": "388536453a59a347",
            "BOMRef": "pkg:deb/debian/grep@3.11-4?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "3.11-4",
          "Arch": "amd64",
          "SrcName": "grep",
          "SrcVersion": "3.11",
          "SrcRelease": "4",
          "Licenses": [
            "GPL-3.0-or-later",
            "GPL-3.0-only"
          ],
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          }
        },
        {
          "ID": "gzip@1.13-1",
          "Name": "gzip",
          "Identifier": {
            "PURL": "pkg:deb/debian/gzip@1.13-1?arch=amd64\u0026distro=debian-13.2",
            "UID": "a86fcca8dff96ae4",
            "BOMRef": "pkg:deb/debian/gzip@1.13-1?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "1.13-1",
          "Arch": "amd64",
          "SrcName": "gzip",
          "SrcVersion": "1.13",
          "SrcRelease": "1",
          "Licenses": [
            "GPL-3.0-or-later",
            "GFDL-1.3--no-invariant",
            "FSF-manpages",
            "GPL-3.0-only",
            "GFDL-3"
          ],
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          }
        },
        {
          "ID": "hostname@3.25",
          "Name": "hostname",
          "Identifier": {
            "PURL": "pkg:deb/debian/hostname@3.25?arch=amd64\u0026distro=debian-13.2",
            "UID": "f63763b61c211b61",
            "BOMRef": "pkg:deb/debian/hostname@3.25?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "3.25",
          "Arch": "amd64",
          "SrcName": "hostname",
          "SrcVersion": "3.25",
          "Licenses": [
            "GPL-2.0-only"
          ],
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          }
        },
        {
          "ID": "init-system-helpers@1.69~deb13u1",
          "Name": "init-system-helpers",
          "Identifier": {
            "PURL": "pkg:deb/debian/init-system-helpers@1.69~deb13u1?arch=all\u0026distro=debian-13.2",
            "UID": "b24f6a672b8988f0",
            "BOMRef": "pkg:deb/debian/init-system-helpers@1.69~deb13u1?arch=all\u0026distro=debian-13.2"
          },
          "Version": "1.69~deb13u1",
          "Arch": "all",
          "SrcName": "init-system-helpers",
          "SrcVersion": "1.69~deb13u1",
          "Licenses": [
            "BSD-3-Clause",
            "GPL-2.0-or-later",
            "GPL-2.0-only"
          ],
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          }
        },
        {
          "ID": "libacl1@2.3.2-2+b1",
          "Name": "libacl1",
          "Identifier": {
            "PURL": "pkg:deb/debian/libacl1@2.3.2-2%2Bb1?arch=amd64\u0026distro=debian-13.2",
            "UID": "7684a4e6fd8559d1",
            "BOMRef": "pkg:deb/debian/libacl1@2.3.2-2%2Bb1?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "2.3.2-2+b1",
          "Arch": "amd64",
          "SrcName": "acl",
          "SrcVersion": "2.3.2",
          "SrcRelease": "2",
          "Licenses": [
            "GPL-2.0-or-later",
            "GPL-2.0-only",
            "LGPL-2.0-or-later",
            "LGPL-2.1-only"
          ],
          "DependsOn": [
            "libc6@2.41-12"
          ],
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          }
        },
        {
          "ID": "libapt-pkg7.0@3.0.3",
          "Name": "libapt-pkg7.0",
          "Identifier": {
            "PURL": "pkg:deb/debian/libapt-pkg7.0@3.0.3?arch=amd64\u0026distro=debian-13.2",
            "UID": "97ebd5ed5a92bcf9",
            "BOMRef": "pkg:deb/debian/libapt-pkg7.0@3.0.3?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "3.0.3",
          "Arch": "amd64",
          "SrcName": "apt",
          "SrcVersion": "3.0.3",
          "Licenses": [
            "GPL-2.0-or-later",
            "curl",
            "BSD-3-Clause",
            "MIT",
            "GPL-2.0-only"
          ],
          "DependsOn": [
            "libbz2-1.0@1.0.8-6",
            "libc6@2.41-12",
            "libgcc-s1@14.2.0-19",
            "liblz4-1@1.10.0-4",
            "liblzma5@5.8.1-1",
            "libssl3t64@3.5.4-1~deb13u1",
            "libstdc++6@14.2.0-19",
            "libsystemd0@257.9-1~deb13u1",
            "libudev1@257.9-1~deb13u1",
            "libxxhash0@0.8.3-2",
            "libzstd1@1.5.7+dfsg-1",
            "zlib1g@1:1.3.dfsg+really1.3.1-1+b1"
          ],
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          }
        },
        {
          "ID": "libattr1@1:2.5.2-3",
          "Name": "libattr1",
          "Identifier": {
            "PURL": "pkg:deb/debian/libattr1@2.5.2-3?arch=amd64\u0026distro=debian-13.2\u0026epoch=1",
            "UID": "38df6b755074a67d",
            "BOMRef": "pkg:deb/debian/libattr1@2.5.2-3?arch=amd64\u0026distro=debian-13.2\u0026epoch=1"
          },
          "Version": "2.5.2-3",
          "Epoch": 1,
          "Arch": "amd64",
          "SrcName": "attr",
          "SrcVersion": "2.5.2",
          "SrcRelease": "3",
          "SrcEpoch": 1,
          "Licenses": [
            "GPL-2.0-or-later",
            "GPL-2.0-only",
            "LGPL-2.0-or-later",
            "LGPL-2.1-only"
          ],
          "DependsOn": [
            "libc6@2.41-12"
          ],
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          }
        },
        {
          "ID": "libaudit-common@1:4.0.2-2",
          "Name": "libaudit-common",
          "Identifier": {
            "PURL": "pkg:deb/debian/libaudit-common@4.0.2-2?arch=all\u0026distro=debian-13.2\u0026epoch=1",
            "UID": "b87867060f51a6f9",
            "BOMRef": "pkg:deb/debian/libaudit-common@4.0.2-2?arch=all\u0026distro=debian-13.2\u0026epoch=1"
          },
          "Version": "4.0.2-2",
          "Epoch": 1,
          "Arch": "all",
          "SrcName": "audit",
          "SrcVersion": "4.0.2",
          "SrcRelease": "2",
          "SrcEpoch": 1,
          "Licenses": [
            "GPL-2.0-only",
            "LGPL-2.1-only",
            "GPL-1.0-only"
          ],
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          }
        },
        {
          "ID": "libaudit1@1:4.0.2-2+b2",
          "Name": "libaudit1",
          "Identifier": {
            "PURL": "pkg:deb/debian/libaudit1@4.0.2-2%2Bb2?arch=amd64\u0026distro=debian-13.2\u0026epoch=1",
            "UID": "8e7d93ef8ea0624e",
            "BOMRef": "pkg:deb/debian/libaudit1@4.0.2-2%2Bb2?arch=amd64\u0026distro=debian-13.2\u0026epoch=1"
          },
          "Version": "4.0.2-2+b2",
          "Epoch": 1,
          "Arch": "amd64",
          "SrcName": "audit",
          "SrcVersion": "4.0.2",
          "SrcRelease": "2",
          "SrcEpoch": 1,
          "Licenses": [
            "GPL-2.0-only",
            "LGPL-2.1-only",
            "GPL-1.0-only"
          ],
          "DependsOn": [
            "libaudit-common@1:4.0.2-2",
            "libc6@2.41-12",
            "libcap-ng0@0.8.5-4+b1"
          ],
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          }
        },
        {
          "ID": "libblkid1@2.41-5",
          "Name": "libblkid1",
          "Identifier": {
            "PURL": "pkg:deb/debian/libblkid1@2.41-5?arch=amd64\u0026distro=debian-13.2",
            "UID": "c859e3dbfda1be6d",
            "BOMRef": "pkg:deb/debian/libblkid1@2.41-5?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "2.41-5",
          "Arch": "amd64",
          "SrcName": "util-linux",
          "SrcVersion": "2.41",
          "SrcRelease": "5",
          "Licenses": [
            "GPL-2.0-or-later",
            "GPL-2.0-only",
            "GPL-3.0-or-later",
            "LGPL-2.1-or-later",
            "public-domain",
            "BSD-4-Clause",
            "MIT",
            "ISC",
            "BSD-3-Clause",
            "BSLA",
            "LGPL-2.0-or-later",
            "BSD-2-Clause",
            "LGPL-3.0-or-later",
            "GPL-3.0-only",
            "LGPL-2.0-only",
            "LGPL-2.1-only",
            "LGPL-3.0-only"
          ],
          "DependsOn": [
            "libc6@2.41-12"
          ],
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          }
        },
        {
          "ID": "libbsd0@0.12.2-2",
          "Name": "libbsd0",
          "Identifier": {
            "PURL": "pkg:deb/debian/libbsd0@0.12.2-2?arch=amd64\u0026distro=debian-13.2",
            "UID": "4da092ba6c14f791",
            "BOMRef": "pkg:deb/debian/libbsd0@0.12.2-2?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "0.12.2-2",
          "Arch": "amd64",
          "SrcName": "libbsd",
          "SrcVersion": "0.12.2",
          "SrcRelease": "2",
          "Licenses": [
            "BSD-3-Clause",
            "BSD-3-clause-Regents",
            "BSD-2-Clause-NetBSD",
            "BSD-3-clause-author",
            "BSD-3-clause-John-Birrell",
            "BSD-5-clause-Peter-Wemm",
            "BSD-2-Clause",
            "BSD-2-clause-verbatim",
            "BSD-2-clause-author",
            "ISC",
            "ISC-Original",
            "MIT",
            "public-domain",
            "Beerware"
          ],
          "DependsOn": [
            "libc6@2.41-12",
            "libmd0@1.1.0-2+b1"
          ],
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          }
        },
        {
          "ID": "libbz2-1.0@1.0.8-6",
          "Name": "libbz2-1.0",
          "Identifier": {
            "PURL": "pkg:deb/debian/libbz2-1.0@1.0.8-6?arch=amd64\u0026distro=debian-13.2",
            "UID": "14febc401c5c0267",
            "BOMRef": "pkg:deb/debian/libbz2-1.0@1.0.8-6?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "1.0.8-6",
          "Arch": "amd64",
          "SrcName": "bzip2",
          "SrcVersion": "1.0.8",
          "SrcRelease": "6",
          "Licenses": [
            "BSD-3-Clause",
            "GPL-2.0-only"
          ],
          "DependsOn": [
            "libc6@2.41-12"
          ],
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          }
        },
        {
          "ID": "libc-bin@2.41-12",
          "Name": "libc-bin",
          "Identifier": {
            "PURL": "pkg:deb/debian/libc-bin@2.41-12?arch=amd64\u0026distro=debian-13.2",
            "UID": "e0b558ac4d5460a2",
            "BOMRef": "pkg:deb/debian/libc-bin@2.41-12?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "2.41-12",
          "Arch": "amd64",
          "SrcName": "glibc",
          "SrcVersion": "2.41",
          "SrcRelease": "12",
          "Licenses": [
            "LGPL-2.1-or-later",
            "LGPL-2.0-or-later",
            "LGPL-2.1-or-later WITH link-exception",
            "LGPL-3.0-or-later",
            "GPL-2.0-or-later",
            "GPL-2.0-or-later WITH link-exception",
            "GPL-2.0-only",
            "GPL-3.0-or-later",
            "FSFAP",
            "Carnegie",
            "Inner-Net",
            "MIT-like-Lord",
            "BSD-like-Spencer",
            "PCRE",
            "BSD-3-clause-Carnegie",
            "Unicode-DFS-2016",
            "BSL-1.0",
            "SunPro",
            "CORE-MATH",
            "BSD-3-clause-Berkeley",
            "BSD-3-clause-WIDE",
            "BSD-2-Clause",
            "BSD-3-clause-Oracle",
            "DEC",
            "IBM",
            "ISC",
            "Univ-Coimbra",
            "public-domain",
            "GPL-3.0-only",
            "LGPL-2.0-only",
            "LGPL-2.1-only",
            "LGPL-3.0-only"
          ],
          "DependsOn": [
            "libc6@2.41-12"
          ],
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          }
        },
        {
          "ID": "libc6@2.41-12",
          "Name": "libc6",
          "Identifier": {
            "PURL": "pkg:deb/debian/libc6@2.41-12?arch=amd64\u0026distro=debian-13.2",
            "UID": "50b30537de3a2779",
            "BOMRef": "pkg:deb/debian/libc6@2.41-12?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "2.41-12",
          "Arch": "amd64",
          "SrcName": "glibc",
          "SrcVersion": "2.41",
          "SrcRelease": "12",
          "Licenses": [
            "LGPL-2.1-or-later",
            "LGPL-2.0-or-later",
            "LGPL-2.1-or-later WITH link-exception",
            "LGPL-3.0-or-later",
            "GPL-2.0-or-later",
            "GPL-2.0-or-later WITH link-exception",
            "GPL-2.0-only",
            "GPL-3.0-or-later",
            "FSFAP",
            "Carnegie",
            "Inner-Net",
            "MIT-like-Lord",
            "BSD-like-Spencer",
            "PCRE",
            "BSD-3-clause-Carnegie",
            "Unicode-DFS-2016",
            "BSL-1.0",
            "SunPro",
            "CORE-MATH",
            "BSD-3-clause-Berkeley",
            "BSD-3-clause-WIDE",
            "BSD-2-Clause",
            "BSD-3-clause-Oracle",
            "DEC",
            "IBM",
            "ISC",
            "Univ-Coimbra",
            "public-domain",
            "GPL-3.0-only",
            "LGPL-2.0-only",
            "LGPL-2.1-only",
            "LGPL-3.0-only"
          ],
          "DependsOn": [
            "libgcc-s1@14.2.0-19"
          ],
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          }
        },
        {
          "ID": "libcap-ng0@0.8.5-4+b1",
          "Name": "libcap-ng0",
          "Identifier": {
            "PURL": "pkg:deb/debian/libcap-ng0@0.8.5-4%2Bb1?arch=amd64\u0026distro=debian-13.2",
            "UID": "f016ee3cafa68ace",
            "BOMRef": "pkg:deb/debian/libcap-ng0@0.8.5-4%2Bb1?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "0.8.5-4+b1",
          "Arch": "amd64",
          "SrcName": "libcap-ng",
          "SrcVersion": "0.8.5",
          "SrcRelease": "4",
          "Licenses": [
            "LGPL-2.1-or-later",
            "GPL-2.0-or-later",
            "GPL-3.0-only",
            "LGPL-2.1-only",
            "GPL-2.0-only"
          ],
          "DependsOn": [
            "libc6@2.41-12"
          ],
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          }
        },
        {
          "ID": "libcap2@1:2.75-10+b1",
          "Name": "libcap2",
          "Identifier": {
            "PURL": "pkg:deb/debian/libcap2@2.75-10%2Bb1?arch=amd64\u0026distro=debian-13.2\u0026epoch=1",
            "UID": "bc6d2a5f06b2175d",
            "BOMRef": "pkg:deb/debian/libcap2@2.75-10%2Bb1?arch=amd64\u0026distro=debian-13.2\u0026epoch=1"
          },
          "Version": "2.75-10+b1",
          "Epoch": 1,
          "Arch": "amd64",
          "SrcName": "libcap2",
          "SrcVersion": "2.75",
          "SrcRelease": "10",
          "SrcEpoch": 1,
          "Licenses": [
            "BSD-3-Clause",
            "GPL-2.0-only",
            "GPL-2.0-or-later"
          ],
          "DependsOn": [
            "libc6@2.41-12"
          ],
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          }
        },
        {
          "ID": "libcrypt1@1:4.4.38-1",
          "Name": "libcrypt1",
          "Identifier": {
            "PURL": "pkg:deb/debian/libcrypt1@4.4.38-1?arch=amd64\u0026distro=debian-13.2\u0026epoch=1",
            "UID": "7e601e25cbe788b4",
            "BOMRef": "pkg:deb/debian/libcrypt1@4.4.38-1?arch=amd64\u0026distro=debian-13.2\u0026epoch=1"
          },
          "Version": "4.4.38-1",
          "Epoch": 1,
          "Arch": "amd64",
          "SrcName": "libxcrypt",
          "SrcVersion": "4.4.38",
          "SrcRelease": "1",
          "SrcEpoch": 1,
          "DependsOn": [
            "libc6@2.41-12"
          ],
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          }
        },
        {
          "ID": "libdb5.3t64@5.3.28+dfsg2-9",
          "Name": "libdb5.3t64",
          "Identifier": {
            "PURL": "pkg:deb/debian/libdb5.3t64@5.3.28%2Bdfsg2-9?arch=amd64\u0026distro=debian-13.2",
            "UID": "a6fd19bb5342db6d",
            "BOMRef": "pkg:deb/debian/libdb5.3t64@5.3.28%2Bdfsg2-9?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "5.3.28+dfsg2-9",
          "Arch": "amd64",
          "SrcName": "db5.3",
          "SrcVersion": "5.3.28+dfsg2",
          "SrcRelease": "9",
          "Licenses": [
            "Sleepycat",
            "BSD-3-Clause",
            "MS-PL",
            "GPL-2.0-or-later",
            "Artistic-2.0",
            "X11",
            "MIT-old",
            "TCL-like",
            "BSD-3-clause-fjord",
            "GPL-3.0-only",
            "Zlib"
          ],
          "DependsOn": [
            "libc6@2.41-12"
          ],
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          }
        },
        {
          "ID": "libdebconfclient0@0.280",
          "Name": "libdebconfclient0",
          "Identifier": {
            "PURL": "pkg:deb/debian/libdebconfclient0@0.280?arch=amd64\u0026distro=debian-13.2",
            "UID": "e4f840311ab7491d",
            "BOMRef": "pkg:deb/debian/libdebconfclient0@0.280?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "0.280",
          "Arch": "amd64",
          "SrcName": "cdebconf",
          "SrcVersion": "0.280",
          "Licenses": [
            "BSD-2-Clause",
            "GPL-2.0-or-later",
            "GPL-2.0-only"
          ],
          "DependsOn": [
            "libc6@2.41-12"
          ],
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          }
        },
        {
          "ID": "libgcc-s1@14.2.0-19",
          "Name": "libgcc-s1",
          "Identifier": {
            "PURL": "pkg:deb/debian/libgcc-s1@14.2.0-19?arch=amd64\u0026distro=debian-13.2",
            "UID": "e5387c0ed900c592",
            "BOMRef": "pkg:deb/debian/libgcc-s1@14.2.0-19?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "14.2.0-19",
          "Arch": "amd64",
          "SrcName": "gcc-14",
          "SrcVersion": "14.2.0",
          "SrcRelease": "19",
          "DependsOn": [
            "gcc-14-base@14.2.0-19",
            "libc6@2.41-12"
          ],
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          }
        },
        {
          "ID": "libgmp10@2:6.3.0+dfsg-3",
          "Name": "libgmp10",
          "Identifier": {
            "PURL": "pkg:deb/debian/libgmp10@6.3.0%2Bdfsg-3?arch=amd64\u0026distro=debian-13.2\u0026epoch=2",
            "UID": "532f0aecff5d8e0d",
            "BOMRef": "pkg:deb/debian/libgmp10@6.3.0%2Bdfsg-3?arch=amd64\u0026distro=debian-13.2\u0026epoch=2"
          },
          "Version": "6.3.0+dfsg-3",
          "Epoch": 2,
          "Arch": "amd64",
          "SrcName": "gmp",
          "SrcVersion": "6.3.0+dfsg",
          "SrcRelease": "3",
          "SrcEpoch": 2,
          "Licenses": [
            "GPL-2.0-or-later",
            "LGPL-3.0-or-later",
            "GPL-3.0-or-later",
            "GPL-3.0-or-later WITH Bison-exception",
            "GPL-2.0-only",
            "GPL-3.0-only",
            "LGPL-3.0-only"
          ],
          "DependsOn": [
            "libc6@2.41-12"
          ],
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          }
        },
        {
          "ID": "libhogweed6t64@3.10.1-1",
          "Name": "libhogweed6t64",
          "Identifier": {
            "PURL": "pkg:deb/debian/libhogweed6t64@3.10.1-1?arch=amd64\u0026distro=debian-13.2",
            "UID": "925c83416bc7c915",
            "BOMRef": "pkg:deb/debian/libhogweed6t64@3.10.1-1?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "3.10.1-1",
          "Arch": "amd64",
          "SrcName": "nettle",
          "SrcVersion": "3.10.1",
          "SrcRelease": "1",
          "Licenses": [
            "LGPL-3.0-or-later",
            "GPL-2.0-or-later",
            "LGPL-2.0-or-later",
            "LGPL-2.0-only",
            "MIT",
            "GPL-3.0-only WITH autoconf-exception+",
            "public-domain",
            "GPL-2.0-only",
            "GAP"
          ],
          "DependsOn": [
            "libc6@2.41-12",
            "libgmp10@2:6.3.0+dfsg-3",
            "libnettle8t64@3.10.1-1"
          ],
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          }
        },
        {
          "ID": "liblastlog2-2@2.41-5",
          "Name": "liblastlog2-2",
          "Identifier": {
            "PURL": "pkg:deb/debian/liblastlog2-2@2.41-5?arch=amd64\u0026distro=debian-13.2",
            "UID": "be208d50d959d331",
            "BOMRef": "pkg:deb/debian/liblastlog2-2@2.41-5?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "2.41-5",
          "Arch": "amd64",
          "SrcName": "util-linux",
          "SrcVersion": "2.41",
          "SrcRelease": "5",
          "Licenses": [
            "GPL-2.0-or-later",
            "GPL-2.0-only",
            "GPL-3.0-or-later",
            "LGPL-2.1-or-later",
            "public-domain",
            "BSD-4-Clause",
            "MIT",
            "ISC",
            "BSD-3-Clause",
            "BSLA",
            "LGPL-2.0-or-later",
            "BSD-2-Clause",
            "LGPL-3.0-or-later",
            "GPL-3.0-only",
            "LGPL-2.0-only",
            "LGPL-2.1-only",
            "LGPL-3.0-only"
          ],
          "DependsOn": [
            "libc6@2.41-12",
            "libsqlite3-0@3.46.1-7"
          ],
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          }
        },
        {
          "ID": "liblz4-1@1.10.0-4",
          "Name": "liblz4-1",
          "Identifier": {
            "PURL": "pkg:deb/debian/liblz4-1@1.10.0-4?arch=amd64\u0026distro=debian-13.2",
            "UID": "cf1281639bec1cec",
            "BOMRef": "pkg:deb/debian/liblz4-1@1.10.0-4?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "1.10.0-4",
          "Arch": "amd64",
          "SrcName": "lz4",
          "SrcVersion": "1.10.0",
          "SrcRelease": "4",
          "Licenses": [
            "GPL-2.0-or-later",
            "BSD-2-Clause",
            "GPL-2.0-only"
          ],
          "DependsOn": [
            "libc6@2.41-12",
            "libxxhash0@0.8.3-2"
          ],
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          }
        },
        {
          "ID": "liblzma5@5.8.1-1",
          "Name": "liblzma5",
          "Identifier": {
            "PURL": "pkg:deb/debian/liblzma5@5.8.1-1?arch=amd64\u0026distro=debian-13.2",
            "UID": "f052fbd7bc792d7b",
            "BOMRef": "pkg:deb/debian/liblzma5@5.8.1-1?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "5.8.1-1",
          "Arch": "amd64",
          "SrcName": "xz-utils",
          "SrcVersion": "5.8.1",
          "SrcRelease": "1",
          "Licenses": [
            "0BSD",
            "GPL-2.0-or-later",
            "LGPL-2.1-or-later",
            "FSFULLR",
            "GPL-3.0-or-later WITH Autoconf-exception-macro",
            "none",
            "PD",
            "permissive-nowarranty",
            "FSFUL",
            "noderivs",
            "PD-debian",
            "LGPL-2.1-only",
            "GPL-2.0-only",
            "GPL-3.0-only"
          ],
          "DependsOn": [
            "libc6@2.41-12"
          ],
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          }
        },
        {
          "ID": "libmd0@1.1.0-2+b1",
          "Name": "libmd0",
          "Identifier": {
            "PURL": "pkg:deb/debian/libmd0@1.1.0-2%2Bb1?arch=amd64\u0026distro=debian-13.2",
            "UID": "ad5bca29d322eab0",
            "BOMRef": "pkg:deb/debian/libmd0@1.1.0-2%2Bb1?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "1.1.0-2+b1",
          "Arch": "amd64",
          "SrcName": "libmd",
          "SrcVersion": "1.1.0",
          "SrcRelease": "2",
          "Licenses": [
            "BSD-3-Clause",
            "BSD-3-clause-Aaron-D-Gifford",
            "BSD-2-Clause",
            "BSD-2-Clause-NetBSD",
            "ISC",
            "Beerware",
            "public-domain-md4",
            "public-domain-md5",
            "public-domain-sha1"
          ],
          "DependsOn": [
            "libc6@2.41-12"
          ],
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          }
        },
        {
          "ID": "libmount1@2.41-5",
          "Name": "libmount1",
          "Identifier": {
            "PURL": "pkg:deb/debian/libmount1@2.41-5?arch=amd64\u0026distro=debian-13.2",
            "UID": "f327b371eee8bbed",
            "BOMRef": "pkg:deb/debian/libmount1@2.41-5?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "2.41-5",
          "Arch": "amd64",
          "SrcName": "util-linux",
          "SrcVersion": "2.41",
          "SrcRelease": "5",
          "Licenses": [
            "GPL-2.0-or-later",
            "GPL-2.0-only",
            "GPL-3.0-or-later",
            "LGPL-2.1-or-later",
            "public-domain",
            "BSD-4-Clause",
            "MIT",
            "ISC",
            "BSD-3-Clause",
            "BSLA",
            "LGPL-2.0-or-later",
            "BSD-2-Clause",
            "LGPL-3.0-or-later",
            "GPL-3.0-only",
            "LGPL-2.0-only",
            "LGPL-2.1-only",
            "LGPL-3.0-only"
          ],
          "DependsOn": [
            "libblkid1@2.41-5",
            "libc6@2.41-12",
            "libselinux1@3.8.1-1"
          ],
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          }
        },
        {
          "ID": "libnettle8t64@3.10.1-1",
          "Name": "libnettle8t64",
          "Identifier": {
            "PURL": "pkg:deb/debian/libnettle8t64@3.10.1-1?arch=amd64\u0026distro=debian-13.2",
            "UID": "1caeaa5f169aa626",
            "BOMRef": "pkg:deb/debian/libnettle8t64@3.10.1-1?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "3.10.1-1",
          "Arch": "amd64",
          "SrcName": "nettle",
          "SrcVersion": "3.10.1",
          "SrcRelease": "1",
          "Licenses": [
            "LGPL-3.0-or-later",
            "GPL-2.0-or-later",
            "LGPL-2.0-or-later",
            "LGPL-2.0-only",
            "MIT",
            "GPL-3.0-only WITH autoconf-exception+",
            "public-domain",
            "GPL-2.0-only",
            "GAP"
          ],
          "DependsOn": [
            "libc6@2.41-12"
          ],
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          }
        },
        {
          "ID": "libpam-modules@1.7.0-5",
          "Name": "libpam-modules",
          "Identifier": {
            "PURL": "pkg:deb/debian/libpam-modules@1.7.0-5?arch=amd64\u0026distro=debian-13.2",
            "UID": "2c840f9000ea95a4",
            "BOMRef": "pkg:deb/debian/libpam-modules@1.7.0-5?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "1.7.0-5",
          "Arch": "amd64",
          "SrcName": "pam",
          "SrcVersion": "1.7.0",
          "SrcRelease": "5",
          "Licenses": [
            "BSD-3-Clause",
            "GPL-2.0-or-later",
            "GPL-1.0-only",
            "GPL-2.0-only",
            "GPL-3.0-only",
            "GPL-3.0-or-later WITH Bison-exception",
            "BSD-tcp-wrappers",
            "LGPL-2.0-or-later",
            "LGPL-2.0-only",
            "public-domain",
            "Beerware"
          ],
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          }
        },
        {
          "ID": "libpam-modules-bin@1.7.0-5",
          "Name": "libpam-modules-bin",
          "Identifier": {
            "PURL": "pkg:deb/debian/libpam-modules-bin@1.7.0-5?arch=amd64\u0026distro=debian-13.2",
            "UID": "1d65cea34114c5ac",
            "BOMRef": "pkg:deb/debian/libpam-modules-bin@1.7.0-5?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "1.7.0-5",
          "Arch": "amd64",
          "SrcName": "pam",
          "SrcVersion": "1.7.0",
          "SrcRelease": "5",
          "Licenses": [
            "BSD-3-Clause",
            "GPL-2.0-or-later",
            "GPL-1.0-only",
            "GPL-2.0-only",
            "GPL-3.0-only",
            "GPL-3.0-or-later WITH Bison-exception",
            "BSD-tcp-wrappers",
            "LGPL-2.0-or-later",
            "LGPL-2.0-only",
            "public-domain",
            "Beerware"
          ],
          "DependsOn": [
            "libaudit1@1:4.0.2-2+b2",
            "libc6@2.41-12",
            "libcrypt1@1:4.4.38-1",
            "libpam0g@1.7.0-5",
            "libselinux1@3.8.1-1",
            "libsystemd0@257.9-1~deb13u1"
          ],
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          }
        },
        {
          "ID": "libpam-runtime@1.7.0-5",
          "Name": "libpam-runtime",
          "Identifier": {
            "PURL": "pkg:deb/debian/libpam-runtime@1.7.0-5?arch=all\u0026distro=debian-13.2",
            "UID": "1e49768069ea114c",
            "BOMRef": "pkg:deb/debian/libpam-runtime@1.7.0-5?arch=all\u0026distro=debian-13.2"
          },
          "Version": "1.7.0-5",
          "Arch": "all",
          "SrcName": "pam",
          "SrcVersion": "1.7.0",
          "SrcRelease": "5",
          "Licenses": [
            "BSD-3-Clause",
            "GPL-2.0-or-later",
            "GPL-1.0-only",
            "GPL-2.0-only",
            "GPL-3.0-only",
            "GPL-3.0-or-later WITH Bison-exception",
            "BSD-tcp-wrappers",
            "LGPL-2.0-or-later",
            "LGPL-2.0-only",
            "public-domain",
            "Beerware"
          ],
          "DependsOn": [
            "debconf@1.5.91",
            "libpam-modules@1.7.0-5"
          ],
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          }
        },
        {
          "ID": "libpam0g@1.7.0-5",
          "Name": "libpam0g",
          "Identifier": {
            "PURL": "pkg:deb/debian/libpam0g@1.7.0-5?arch=amd64\u0026distro=debian-13.2",
            "UID": "f175e3322c6d0689",
            "BOMRef": "pkg:deb/debian/libpam0g@1.7.0-5?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "1.7.0-5",
          "Arch": "amd64",
          "SrcName": "pam",
          "SrcVersion": "1.7.0",
          "SrcRelease": "5",
          "Licenses": [
            "BSD-3-Clause",
            "GPL-2.0-or-later",
            "GPL-1.0-only",
            "GPL-2.0-only",
            "GPL-3.0-only",
            "GPL-3.0-or-later WITH Bison-exception",
            "BSD-tcp-wrappers",
            "LGPL-2.0-or-later",
            "LGPL-2.0-only",
            "public-domain",
            "Beerware"
          ],
          "DependsOn": [
            "debconf@1.5.91",
            "libaudit1@1:4.0.2-2+b2",
            "libc6@2.41-12"
          ],
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          }
        },
        {
          "ID": "libpcre2-8-0@10.46-1~deb13u1",
          "Name": "libpcre2-8-0",
          "Identifier": {
            "PURL": "pkg:deb/debian/libpcre2-8-0@10.46-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "1eb141cbccbda740",
            "BOMRef": "pkg:deb/debian/libpcre2-8-0@10.46-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "10.46-1~deb13u1",
          "Arch": "amd64",
          "SrcName": "pcre2",
          "SrcVersion": "10.46",
          "SrcRelease": "1~deb13u1",
          "Licenses": [
            "BSD-3-clause-Cambridge WITH BINARY-LIBRARY-LIKE-PACKAGES-exception",
            "BSD-3-Clause",
            "X11",
            "BSD-2-Clause",
            "public-domain"
          ],
          "DependsOn": [
            "libc6@2.41-12"
          ],
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          }
        },
        {
          "ID": "libseccomp2@2.6.0-2",
          "Name": "libseccomp2",
          "Identifier": {
            "PURL": "pkg:deb/debian/libseccomp2@2.6.0-2?arch=amd64\u0026distro=debian-13.2",
            "UID": "4949b9a2cc1fcc60",
            "BOMRef": "pkg:deb/debian/libseccomp2@2.6.0-2?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "2.6.0-2",
          "Arch": "amd64",
          "SrcName": "libseccomp",
          "SrcVersion": "2.6.0",
          "SrcRelease": "2",
          "Licenses": [
            "LGPL-2.1-only"
          ],
          "DependsOn": [
            "libc6@2.41-12"
          ],
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          }
        },
        {
          "ID": "libselinux1@3.8.1-1",
          "Name": "libselinux1",
          "Identifier": {
            "PURL": "pkg:deb/debian/libselinux1@3.8.1-1?arch=amd64\u0026distro=debian-13.2",
            "UID": "6fca8861cda8613b",
            "BOMRef": "pkg:deb/debian/libselinux1@3.8.1-1?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "3.8.1-1",
          "Arch": "amd64",
          "SrcName": "libselinux",
          "SrcVersion": "3.8.1",
          "SrcRelease": "1",
          "Licenses": [
            "public-domain",
            "GPL-2.0-only"
          ],
          "DependsOn": [
            "libc6@2.41-12",
            "libpcre2-8-0@10.46-1~deb13u1"
          ],
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          }
        },
        {
          "ID": "libsemanage-common@3.8.1-1",
          "Name": "libsemanage-common",
          "Identifier": {
            "PURL": "pkg:deb/debian/libsemanage-common@3.8.1-1?arch=all\u0026distro=debian-13.2",
            "UID": "f77cf632c48b3abd",
            "BOMRef": "pkg:deb/debian/libsemanage-common@3.8.1-1?arch=all\u0026distro=debian-13.2"
          },
          "Version": "3.8.1-1",
          "Arch": "all",
          "SrcName": "libsemanage",
          "SrcVersion": "3.8.1",
          "SrcRelease": "1",
          "Licenses": [
            "LGPL-2.1-or-later",
            "LGPL-2.1-only",
            "GPL-2.0-only"
          ],
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          }
        },
        {
          "ID": "libsemanage2@3.8.1-1",
          "Name": "libsemanage2",
          "Identifier": {
            "PURL": "pkg:deb/debian/libsemanage2@3.8.1-1?arch=amd64\u0026distro=debian-13.2",
            "UID": "9d1d407a007f2f2a",
            "BOMRef": "pkg:deb/debian/libsemanage2@3.8.1-1?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "3.8.1-1",
          "Arch": "amd64",
          "SrcName": "libsemanage",
          "SrcVersion": "3.8.1",
          "SrcRelease": "1",
          "Licenses": [
            "LGPL-2.1-or-later",
            "LGPL-2.1-only",
            "GPL-2.0-only"
          ],
          "DependsOn": [
            "libaudit1@1:4.0.2-2+b2",
            "libbz2-1.0@1.0.8-6",
            "libc6@2.41-12",
            "libselinux1@3.8.1-1",
            "libsemanage-common@3.8.1-1",
            "libsepol2@3.8.1-1"
          ],
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          }
        },
        {
          "ID": "libsepol2@3.8.1-1",
          "Name": "libsepol2",
          "Identifier": {
            "PURL": "pkg:deb/debian/libsepol2@3.8.1-1?arch=amd64\u0026distro=debian-13.2",
            "UID": "b2c81d06b3967da8",
            "BOMRef": "pkg:deb/debian/libsepol2@3.8.1-1?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "3.8.1-1",
          "Arch": "amd64",
          "SrcName": "libsepol",
          "SrcVersion": "3.8.1",
          "SrcRelease": "1",
          "Licenses": [
            "LGPL-2.1-or-later",
            "LGPL-2.1-only",
            "Zlib",
            "GPL-2.0-only",
            "GPL-2.0-or-later"
          ],
          "DependsOn": [
            "libc6@2.41-12"
          ],
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          }
        },
        {
          "ID": "libsmartcols1@2.41-5",
          "Name": "libsmartcols1",
          "Identifier": {
            "PURL": "pkg:deb/debian/libsmartcols1@2.41-5?arch=amd64\u0026distro=debian-13.2",
            "UID": "7e25608c202b3108",
            "BOMRef": "pkg:deb/debian/libsmartcols1@2.41-5?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "2.41-5",
          "Arch": "amd64",
          "SrcName": "util-linux",
          "SrcVersion": "2.41",
          "SrcRelease": "5",
          "Licenses": [
            "GPL-2.0-or-later",
            "GPL-2.0-only",
            "GPL-3.0-or-later",
            "LGPL-2.1-or-later",
            "public-domain",
            "BSD-4-Clause",
            "MIT",
            "ISC",
            "BSD-3-Clause",
            "BSLA",
            "LGPL-2.0-or-later",
            "BSD-2-Clause",
            "LGPL-3.0-or-later",
            "GPL-3.0-only",
            "LGPL-2.0-only",
            "LGPL-2.1-only",
            "LGPL-3.0-only"
          ],
          "DependsOn": [
            "libc6@2.41-12"
          ],
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          }
        },
        {
          "ID": "libsqlite3-0@3.46.1-7",
          "Name": "libsqlite3-0",
          "Identifier": {
            "PURL": "pkg:deb/debian/libsqlite3-0@3.46.1-7?arch=amd64\u0026distro=debian-13.2",
            "UID": "e26dcea38497a113",
            "BOMRef": "pkg:deb/debian/libsqlite3-0@3.46.1-7?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "3.46.1-7",
          "Arch": "amd64",
          "SrcName": "sqlite3",
          "SrcVersion": "3.46.1",
          "SrcRelease": "7",
          "Licenses": [
            "public-domain",
            "GPL-2.0-or-later",
            "GPL-2.0-only"
          ],
          "DependsOn": [
            "libc6@2.41-12"
          ],
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          }
        },
        {
          "ID": "libssl3t64@3.5.4-1~deb13u1",
          "Name": "libssl3t64",
          "Identifier": {
            "PURL": "pkg:deb/debian/libssl3t64@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "4f2dd2c406757961",
            "BOMRef": "pkg:deb/debian/libssl3t64@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "3.5.4-1~deb13u1",
          "Arch": "amd64",
          "SrcName": "openssl",
          "SrcVersion": "3.5.4",
          "SrcRelease": "1~deb13u1",
          "Licenses": [
            "Apache-2.0",
            "Artistic-2.0",
            "GPL-1.0-or-later",
            "GPL-1.0-only"
          ],
          "DependsOn": [
            "libc6@2.41-12",
            "libzstd1@1.5.7+dfsg-1",
            "openssl-provider-legacy@3.5.4-1~deb13u1",
            "zlib1g@1:1.3.dfsg+really1.3.1-1+b1"
          ],
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          }
        },
        {
          "ID": "libstdc++6@14.2.0-19",
          "Name": "libstdc++6",
          "Identifier": {
            "PURL": "pkg:deb/debian/libstdc%2B%2B6@14.2.0-19?arch=amd64\u0026distro=debian-13.2",
            "UID": "c66502ba31bf7dd9",
            "BOMRef": "pkg:deb/debian/libstdc%2B%2B6@14.2.0-19?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "14.2.0-19",
          "Arch": "amd64",
          "SrcName": "gcc-14",
          "SrcVersion": "14.2.0",
          "SrcRelease": "19",
          "DependsOn": [
            "gcc-14-base@14.2.0-19",
            "libc6@2.41-12",
            "libgcc-s1@14.2.0-19"
          ],
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          }
        },
        {
          "ID": "libsystemd0@257.9-1~deb13u1",
          "Name": "libsystemd0",
          "Identifier": {
            "PURL": "pkg:deb/debian/libsystemd0@257.9-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "eeade743b01fad94",
            "BOMRef": "pkg:deb/debian/libsystemd0@257.9-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "257.9-1~deb13u1",
          "Arch": "amd64",
          "SrcName": "systemd",
          "SrcVersion": "257.9",
          "SrcRelease": "1~deb13u1",
          "Licenses": [
            "LGPL-2.1-or-later",
            "CC0-1.0",
            "GPL-2.0-only WITH Linux-syscall-note-exception",
            "MIT",
            "public-domain",
            "GPL-2.0-or-later",
            "GPL-2.0-only",
            "LGPL-2.1-only"
          ],
          "DependsOn": [
            "libc6@2.41-12",
            "libcap2@1:2.75-10+b1"
          ],
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          }
        },
        {
          "ID": "libtinfo6@6.5+20250216-2",
          "Name": "libtinfo6",
          "Identifier": {
            "PURL": "pkg:deb/debian/libtinfo6@6.5%2B20250216-2?arch=amd64\u0026distro=debian-13.2",
            "UID": "f2ffc2a00dd8a557",
            "BOMRef": "pkg:deb/debian/libtinfo6@6.5%2B20250216-2?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "6.5+20250216-2",
          "Arch": "amd64",
          "SrcName": "ncurses",
          "SrcVersion": "6.5+20250216",
          "SrcRelease": "2",
          "Licenses": [
            "MIT-X11",
            "X11",
            "BSD-3-Clause"
          ],
          "DependsOn": [
            "libc6@2.41-12"
          ],
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          }
        },
        {
          "ID": "libudev1@257.9-1~deb13u1",
          "Name": "libudev1",
          "Identifier": {
            "PURL": "pkg:deb/debian/libudev1@257.9-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "9681c2a9df484988",
            "BOMRef": "pkg:deb/debian/libudev1@257.9-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "257.9-1~deb13u1",
          "Arch": "amd64",
          "SrcName": "systemd",
          "SrcVersion": "257.9",
          "SrcRelease": "1~deb13u1",
          "Licenses": [
            "LGPL-2.1-or-later",
            "CC0-1.0",
            "GPL-2.0-only WITH Linux-syscall-note-exception",
            "MIT",
            "public-domain",
            "GPL-2.0-or-later",
            "GPL-2.0-only",
            "LGPL-2.1-only"
          ],
          "DependsOn": [
            "libc6@2.41-12",
            "libcap2@1:2.75-10+b1"
          ],
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          }
        },
        {
          "ID": "libunwind8@1.8.1-0.1",
          "Name": "libunwind8",
          "Identifier": {
            "PURL": "pkg:deb/debian/libunwind8@1.8.1-0.1?arch=amd64\u0026distro=debian-13.2",
            "UID": "f299e5886e2121c8",
            "BOMRef": "pkg:deb/debian/libunwind8@1.8.1-0.1?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "1.8.1-0.1",
          "Arch": "amd64",
          "SrcName": "libunwind",
          "SrcVersion": "1.8.1",
          "SrcRelease": "0.1",
          "Licenses": [
            "MIT",
            "GPL-2.0-or-later",
            "GPL-2.0-only"
          ],
          "DependsOn": [
            "libc6@2.41-12",
            "liblzma5@5.8.1-1"
          ],
          "Layer": {
            "Digest": "sha256:eaae8a97b41ced6ea3400030c5ee05505145583005cc540e6292fb553662d08e",
            "DiffID": "sha256:684e1a4916f28ca8be5cb345b358afb5671bbbf301a9d468d86e4417742853d6"
          }
        },
        {
          "ID": "libuuid1@2.41-5",
          "Name": "libuuid1",
          "Identifier": {
            "PURL": "pkg:deb/debian/libuuid1@2.41-5?arch=amd64\u0026distro=debian-13.2",
            "UID": "1941b5abe3030b2b",
            "BOMRef": "pkg:deb/debian/libuuid1@2.41-5?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "2.41-5",
          "Arch": "amd64",
          "SrcName": "util-linux",
          "SrcVersion": "2.41",
          "SrcRelease": "5",
          "Licenses": [
            "GPL-2.0-or-later",
            "GPL-2.0-only",
            "GPL-3.0-or-later",
            "LGPL-2.1-or-later",
            "public-domain",
            "BSD-4-Clause",
            "MIT",
            "ISC",
            "BSD-3-Clause",
            "BSLA",
            "LGPL-2.0-or-later",
            "BSD-2-Clause",
            "LGPL-3.0-or-later",
            "GPL-3.0-only",
            "LGPL-2.0-only",
            "LGPL-2.1-only",
            "LGPL-3.0-only"
          ],
          "DependsOn": [
            "libc6@2.41-12"
          ],
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          }
        },
        {
          "ID": "libxxhash0@0.8.3-2",
          "Name": "libxxhash0",
          "Identifier": {
            "PURL": "pkg:deb/debian/libxxhash0@0.8.3-2?arch=amd64\u0026distro=debian-13.2",
            "UID": "f6a22b152422221f",
            "BOMRef": "pkg:deb/debian/libxxhash0@0.8.3-2?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "0.8.3-2",
          "Arch": "amd64",
          "SrcName": "xxhash",
          "SrcVersion": "0.8.3",
          "SrcRelease": "2",
          "Licenses": [
            "BSD-2-Clause",
            "GPL-2.0-or-later",
            "GPL-2.0-only"
          ],
          "DependsOn": [
            "libc6@2.41-12"
          ],
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          }
        },
        {
          "ID": "libzstd1@1.5.7+dfsg-1",
          "Name": "libzstd1",
          "Identifier": {
            "PURL": "pkg:deb/debian/libzstd1@1.5.7%2Bdfsg-1?arch=amd64\u0026distro=debian-13.2",
            "UID": "1c628fe5152b86ba",
            "BOMRef": "pkg:deb/debian/libzstd1@1.5.7%2Bdfsg-1?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "1.5.7+dfsg-1",
          "Arch": "amd64",
          "SrcName": "libzstd",
          "SrcVersion": "1.5.7+dfsg",
          "SrcRelease": "1",
          "Licenses": [
            "BSD-3-Clause",
            "GPL-2.0-only",
            "Zlib",
            "MIT"
          ],
          "DependsOn": [
            "libc6@2.41-12"
          ],
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          }
        },
        {
          "ID": "login@1:4.16.0-2+really2.41-5",
          "Name": "login",
          "Identifier": {
            "PURL": "pkg:deb/debian/login@4.16.0-2%2Breally2.41-5?arch=amd64\u0026distro=debian-13.2\u0026epoch=1",
            "UID": "c0ac1768816bc3b2",
            "BOMRef": "pkg:deb/debian/login@4.16.0-2%2Breally2.41-5?arch=amd64\u0026distro=debian-13.2\u0026epoch=1"
          },
          "Version": "4.16.0-2+really2.41-5",
          "Epoch": 1,
          "Arch": "amd64",
          "SrcName": "util-linux",
          "SrcVersion": "2.41",
          "SrcRelease": "5",
          "Licenses": [
            "GPL-2.0-or-later",
            "GPL-2.0-only",
            "GPL-3.0-or-later",
            "LGPL-2.1-or-later",
            "public-domain",
            "BSD-4-Clause",
            "MIT",
            "ISC",
            "BSD-3-Clause",
            "BSLA",
            "LGPL-2.0-or-later",
            "BSD-2-Clause",
            "LGPL-3.0-or-later",
            "GPL-3.0-only",
            "LGPL-2.0-only",
            "LGPL-2.1-only",
            "LGPL-3.0-only"
          ],
          "DependsOn": [
            "libaudit1@1:4.0.2-2+b2",
            "libc6@2.41-12",
            "libcrypt1@1:4.4.38-1",
            "libpam-modules@1.7.0-5",
            "libpam-runtime@1.7.0-5",
            "libpam0g@1.7.0-5"
          ],
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          }
        },
        {
          "ID": "login.defs@1:4.17.4-2",
          "Name": "login.defs",
          "Identifier": {
            "PURL": "pkg:deb/debian/login.defs@4.17.4-2?arch=all\u0026distro=debian-13.2\u0026epoch=1",
            "UID": "c14bb7c9d56f57d2",
            "BOMRef": "pkg:deb/debian/login.defs@4.17.4-2?arch=all\u0026distro=debian-13.2\u0026epoch=1"
          },
          "Version": "4.17.4-2",
          "Epoch": 1,
          "Arch": "all",
          "SrcName": "shadow",
          "SrcVersion": "4.17.4",
          "SrcRelease": "2",
          "SrcEpoch": 1,
          "Licenses": [
            "BSD-3-Clause",
            "GPL-1.0-only",
            "GPL-2.0-or-later",
            "GPL-2.0-only"
          ],
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          }
        },
        {
          "ID": "mawk@1.3.4.20250131-1",
          "Name": "mawk",
          "Identifier": {
            "PURL": "pkg:deb/debian/mawk@1.3.4.20250131-1?arch=amd64\u0026distro=debian-13.2",
            "UID": "1b5896aad7e68510",
            "BOMRef": "pkg:deb/debian/mawk@1.3.4.20250131-1?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "1.3.4.20250131-1",
          "Arch": "amd64",
          "SrcName": "mawk",
          "SrcVersion": "1.3.4.20250131",
          "SrcRelease": "1",
          "Licenses": [
            "GPL-2.0-only",
            "X11",
            "CC-BY-3.0"
          ],
          "DependsOn": [
            "libc6@2.41-12"
          ],
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          }
        },
        {
          "ID": "mount@2.41-5",
          "Name": "mount",
          "Identifier": {
            "PURL": "pkg:deb/debian/mount@2.41-5?arch=amd64\u0026distro=debian-13.2",
            "UID": "4eb030eb5430054f",
            "BOMRef": "pkg:deb/debian/mount@2.41-5?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "2.41-5",
          "Arch": "amd64",
          "SrcName": "util-linux",
          "SrcVersion": "2.41",
          "SrcRelease": "5",
          "Licenses": [
            "GPL-2.0-or-later",
            "GPL-2.0-only",
            "GPL-3.0-or-later",
            "LGPL-2.1-or-later",
            "public-domain",
            "BSD-4-Clause",
            "MIT",
            "ISC",
            "BSD-3-Clause",
            "BSLA",
            "LGPL-2.0-or-later",
            "BSD-2-Clause",
            "LGPL-3.0-or-later",
            "GPL-3.0-only",
            "LGPL-2.0-only",
            "LGPL-2.1-only",
            "LGPL-3.0-only"
          ],
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          }
        },
        {
          "ID": "ncurses-base@6.5+20250216-2",
          "Name": "ncurses-base",
          "Identifier": {
            "PURL": "pkg:deb/debian/ncurses-base@6.5%2B20250216-2?arch=all\u0026distro=debian-13.2",
            "UID": "890975964989b0c0",
            "BOMRef": "pkg:deb/debian/ncurses-base@6.5%2B20250216-2?arch=all\u0026distro=debian-13.2"
          },
          "Version": "6.5+20250216-2",
          "Arch": "all",
          "SrcName": "ncurses",
          "SrcVersion": "6.5+20250216",
          "SrcRelease": "2",
          "Licenses": [
            "MIT-X11",
            "X11",
            "BSD-3-Clause"
          ],
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          }
        },
        {
          "ID": "ncurses-bin@6.5+20250216-2",
          "Name": "ncurses-bin",
          "Identifier": {
            "PURL": "pkg:deb/debian/ncurses-bin@6.5%2B20250216-2?arch=amd64\u0026distro=debian-13.2",
            "UID": "a6b021b221e78b99",
            "BOMRef": "pkg:deb/debian/ncurses-bin@6.5%2B20250216-2?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "6.5+20250216-2",
          "Arch": "amd64",
          "SrcName": "ncurses",
          "SrcVersion": "6.5+20250216",
          "SrcRelease": "2",
          "Licenses": [
            "MIT-X11",
            "X11",
            "BSD-3-Clause"
          ],
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          }
        },
        {
          "ID": "openssl@3.5.4-1~deb13u1",
          "Name": "openssl",
          "Identifier": {
            "PURL": "pkg:deb/debian/openssl@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "793482608c8c294c",
            "BOMRef": "pkg:deb/debian/openssl@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "3.5.4-1~deb13u1",
          "Arch": "amd64",
          "SrcName": "openssl",
          "SrcVersion": "3.5.4",
          "SrcRelease": "1~deb13u1",
          "Licenses": [
            "Apache-2.0",
            "Artistic-2.0",
            "GPL-1.0-or-later",
            "GPL-1.0-only"
          ],
          "DependsOn": [
            "libc6@2.41-12",
            "libssl3t64@3.5.4-1~deb13u1"
          ],
          "Layer": {
            "Digest": "sha256:eaae8a97b41ced6ea3400030c5ee05505145583005cc540e6292fb553662d08e",
            "DiffID": "sha256:684e1a4916f28ca8be5cb345b358afb5671bbbf301a9d468d86e4417742853d6"
          }
        },
        {
          "ID": "openssl-provider-legacy@3.5.4-1~deb13u1",
          "Name": "openssl-provider-legacy",
          "Identifier": {
            "PURL": "pkg:deb/debian/openssl-provider-legacy@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "60b4501dc322c5b1",
            "BOMRef": "pkg:deb/debian/openssl-provider-legacy@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "3.5.4-1~deb13u1",
          "Arch": "amd64",
          "SrcName": "openssl",
          "SrcVersion": "3.5.4",
          "SrcRelease": "1~deb13u1",
          "Licenses": [
            "Apache-2.0",
            "Artistic-2.0",
            "GPL-1.0-or-later",
            "GPL-1.0-only"
          ],
          "DependsOn": [
            "libc6@2.41-12",
            "libssl3t64@3.5.4-1~deb13u1"
          ],
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          }
        },
        {
          "ID": "passwd@1:4.17.4-2",
          "Name": "passwd",
          "Identifier": {
            "PURL": "pkg:deb/debian/passwd@4.17.4-2?arch=amd64\u0026distro=debian-13.2\u0026epoch=1",
            "UID": "7cc33769494c93f9",
            "BOMRef": "pkg:deb/debian/passwd@4.17.4-2?arch=amd64\u0026distro=debian-13.2\u0026epoch=1"
          },
          "Version": "4.17.4-2",
          "Epoch": 1,
          "Arch": "amd64",
          "SrcName": "shadow",
          "SrcVersion": "4.17.4",
          "SrcRelease": "2",
          "SrcEpoch": 1,
          "Licenses": [
            "BSD-3-Clause",
            "GPL-1.0-only",
            "GPL-2.0-or-later",
            "GPL-2.0-only"
          ],
          "DependsOn": [
            "base-passwd@3.6.7",
            "libacl1@2.3.2-2+b1",
            "libattr1@1:2.5.2-3",
            "libaudit1@1:4.0.2-2+b2",
            "libbsd0@0.12.2-2",
            "libc6@2.41-12",
            "libcrypt1@1:4.4.38-1",
            "libpam-modules@1.7.0-5",
            "libpam0g@1.7.0-5",
            "libselinux1@3.8.1-1",
            "libsemanage2@3.8.1-1",
            "login.defs@1:4.17.4-2"
          ],
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          }
        },
        {
          "ID": "perl-base@5.40.1-6",
          "Name": "perl-base",
          "Identifier": {
            "PURL": "pkg:deb/debian/perl-base@5.40.1-6?arch=amd64\u0026distro=debian-13.2",
            "UID": "2936e697fb5eff9",
            "BOMRef": "pkg:deb/debian/perl-base@5.40.1-6?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "5.40.1-6",
          "Arch": "amd64",
          "SrcName": "perl",
          "SrcVersion": "5.40.1",
          "SrcRelease": "6",
          "Licenses": [
            "GPL-1.0-or-later",
            "Artistic-2.0",
            "MIT",
            "REGCOMP",
            "GPL-2.0-only WITH bison-exception+",
            "Unicode",
            "BZIP",
            "Zlib",
            "GPL-2.0-or-later",
            "FSFAP",
            "BSD-3-Clause WITH weird-numbering",
            "CC0-1.0",
            "TEXT-TABS",
            "BSD-4-clause-POWERDOG",
            "BSD-3-clause-GENERIC",
            "BSD-3-Clause",
            "SDBM-PUBLIC-DOMAIN",
            "DONT-CHANGE-THE-GPL",
            "Artistic-dist",
            "LGPL-2.1-only",
            "GPL-1.0-only",
            "GPL-2.0-only",
            "Artistic-2"
          ],
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          }
        },
        {
          "ID": "sed@4.9-2",
          "Name": "sed",
          "Identifier": {
            "PURL": "pkg:deb/debian/sed@4.9-2?arch=amd64\u0026distro=debian-13.2",
            "UID": "9c62e1b6d041572b",
            "BOMRef": "pkg:deb/debian/sed@4.9-2?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "4.9-2",
          "Arch": "amd64",
          "SrcName": "sed",
          "SrcVersion": "4.9",
          "SrcRelease": "2",
          "Licenses": [
            "GPL-3.0-or-later",
            "GPL-3.0-only",
            "X11",
            "GFDL-1.3-no-invariants-or-later",
            "GFDL-1.3-only",
            "ISC",
            "BSD-4-Clause-UC",
            "BSL-1",
            "pcre"
          ],
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          }
        },
        {
          "ID": "sqv@1.3.0-3",
          "Name": "sqv",
          "Identifier": {
            "PURL": "pkg:deb/debian/sqv@1.3.0-3?arch=amd64\u0026distro=debian-13.2",
            "UID": "53c05f8a2afeb5e4",
            "BOMRef": "pkg:deb/debian/sqv@1.3.0-3?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "1.3.0-3",
          "Arch": "amd64",
          "SrcName": "rust-sequoia-sqv",
          "SrcVersion": "1.3.0",
          "SrcRelease": "3",
          "Licenses": [
            "LGPL-2.0-or-later",
            "LGPL-2.0-only"
          ],
          "DependsOn": [
            "libc6@2.41-12",
            "libgcc-s1@14.2.0-19",
            "libgmp10@2:6.3.0+dfsg-3",
            "libhogweed6t64@3.10.1-1",
            "libnettle8t64@3.10.1-1"
          ],
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          }
        },
        {
          "ID": "sysvinit-utils@3.14-4",
          "Name": "sysvinit-utils",
          "Identifier": {
            "PURL": "pkg:deb/debian/sysvinit-utils@3.14-4?arch=amd64\u0026distro=debian-13.2",
            "UID": "b4073bf3e1d528f5",
            "BOMRef": "pkg:deb/debian/sysvinit-utils@3.14-4?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "3.14-4",
          "Arch": "amd64",
          "SrcName": "sysvinit",
          "SrcVersion": "3.14",
          "SrcRelease": "4",
          "Licenses": [
            "GPL-2.0-or-later",
            "LGPL-2.1-or-later",
            "GPL-3.0-only",
            "GPL-2.0-only",
            "LGPL-2.1-only"
          ],
          "DependsOn": [
            "libc6@2.41-12"
          ],
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          }
        },
        {
          "ID": "tar@1.35+dfsg-3.1",
          "Name": "tar",
          "Identifier": {
            "PURL": "pkg:deb/debian/tar@1.35%2Bdfsg-3.1?arch=amd64\u0026distro=debian-13.2",
            "UID": "c0ff1d9a82de0555",
            "BOMRef": "pkg:deb/debian/tar@1.35%2Bdfsg-3.1?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "1.35+dfsg-3.1",
          "Arch": "amd64",
          "SrcName": "tar",
          "SrcVersion": "1.35+dfsg",
          "SrcRelease": "3.1",
          "Licenses": [
            "GPL-3.0-or-later",
            "GPL-3.0-only",
            "GPL-3.0-or-later WITH Bison-exception",
            "LGPL-2.1-or-later",
            "LGPL-2.1-only",
            "LGPL-3.0-or-later",
            "LGPL-3.0-only",
            "GPL-2.0-or-later",
            "GPL-2.0-only"
          ],
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          }
        },
        {
          "ID": "tzdata@2025b-4+deb13u1",
          "Name": "tzdata",
          "Identifier": {
            "PURL": "pkg:deb/debian/tzdata@2025b-4%2Bdeb13u1?arch=all\u0026distro=debian-13.2",
            "UID": "fe2e1a8332ff3d4f",
            "BOMRef": "pkg:deb/debian/tzdata@2025b-4%2Bdeb13u1?arch=all\u0026distro=debian-13.2"
          },
          "Version": "2025b-4+deb13u1",
          "Arch": "all",
          "SrcName": "tzdata",
          "SrcVersion": "2025b",
          "SrcRelease": "4+deb13u1",
          "Licenses": [
            "public-domain"
          ],
          "DependsOn": [
            "debconf@1.5.91"
          ],
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          }
        },
        {
          "ID": "util-linux@2.41-5",
          "Name": "util-linux",
          "Identifier": {
            "PURL": "pkg:deb/debian/util-linux@2.41-5?arch=amd64\u0026distro=debian-13.2",
            "UID": "c54e1200b7bd97fd",
            "BOMRef": "pkg:deb/debian/util-linux@2.41-5?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "2.41-5",
          "Arch": "amd64",
          "SrcName": "util-linux",
          "SrcVersion": "2.41",
          "SrcRelease": "5",
          "Licenses": [
            "GPL-2.0-or-later",
            "GPL-2.0-only",
            "GPL-3.0-or-later",
            "LGPL-2.1-or-later",
            "public-domain",
            "BSD-4-Clause",
            "MIT",
            "ISC",
            "BSD-3-Clause",
            "BSLA",
            "LGPL-2.0-or-later",
            "BSD-2-Clause",
            "LGPL-3.0-or-later",
            "GPL-3.0-only",
            "LGPL-2.0-only",
            "LGPL-2.1-only",
            "LGPL-3.0-only"
          ],
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          }
        },
        {
          "ID": "zlib1g@1:1.3.dfsg+really1.3.1-1+b1",
          "Name": "zlib1g",
          "Identifier": {
            "PURL": "pkg:deb/debian/zlib1g@1.3.dfsg%2Breally1.3.1-1%2Bb1?arch=amd64\u0026distro=debian-13.2\u0026epoch=1",
            "UID": "8d4391bb59ce716",
            "BOMRef": "pkg:deb/debian/zlib1g@1.3.dfsg%2Breally1.3.1-1%2Bb1?arch=amd64\u0026distro=debian-13.2\u0026epoch=1"
          },
          "Version": "1.3.dfsg+really1.3.1-1+b1",
          "Epoch": 1,
          "Arch": "amd64",
          "SrcName": "zlib",
          "SrcVersion": "1.3.dfsg+really1.3.1",
          "SrcRelease": "1",
          "SrcEpoch": 1,
          "Licenses": [
            "Zlib"
          ],
          "DependsOn": [
            "libc6@2.41-12"
          ],
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          }
        }
      ],
      "Vulnerabilities": [
        {
          "VulnerabilityID": "CVE-2011-3374",
          "PkgID": "apt@3.0.3",
          "PkgName": "apt",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/apt@3.0.3?arch=amd64\u0026distro=debian-13.2",
            "UID": "9e3e57061f898705",
            "BOMRef": "pkg:deb/debian/apt@3.0.3?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.0.3",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2011-3374",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:1acf2f2d3b9212a0396176c009acc09c2834adba0a7e80c9654199af13ede88c",
          "Title": "It was found that apt-key in apt, all versions, do not correctly valid ...",
          "Description": "It was found that apt-key in apt, all versions, do not correctly validate gpg keys with the master keyring, leading to a potential man-in-the-middle attack.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-347"
          ],
          "VendorSeverity": {
            "debian": 1,
            "nvd": 1
          },
          "CVSS": {
            "nvd": {
              "V2Vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
              "V2Score": 4.3,
              "V3Score": 3.7
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/cve-2011-3374",
            "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480",
            "https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html",
            "https://seclists.org/fulldisclosure/2011/Sep/221",
            "https://security-tracker.debian.org/tracker/CVE-2011-3374",
            "https://snyk.io/vuln/SNYK-LINUX-APT-116518",
            "https://ubuntu.com/security/CVE-2011-3374"
          ],
          "PublishedDate": "2019-11-26T00:15:11.03Z",
          "LastModifiedDate": "2024-11-21T01:30:22.61Z"
        },
        {
          "VulnerabilityID": "TEMP-0841856-B18BAF",
          "PkgID": "bash@5.2.37-2+b5",
          "PkgName": "bash",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/bash@5.2.37-2%2Bb5?arch=amd64\u0026distro=debian-13.2",
            "UID": "115c4840dc7bd97d",
            "BOMRef": "pkg:deb/debian/bash@5.2.37-2%2Bb5?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "5.2.37-2+b5",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://security-tracker.debian.org/tracker/TEMP-0841856-B18BAF",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:77707e74ab088c5de93726213282018cd42f258150353e9c41aa2f04dbad64ea",
          "Title": "[Privilege escalation possible to other user than root]",
          "Severity": "LOW",
          "VendorSeverity": {
            "debian": 1
          }
        },
        {
          "VulnerabilityID": "CVE-2022-0563",
          "PkgID": "bsdutils@1:2.41-5",
          "PkgName": "bsdutils",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/bsdutils@2.41-5?arch=amd64\u0026distro=debian-13.2\u0026epoch=1",
            "UID": "5511240f910cf9e",
            "BOMRef": "pkg:deb/debian/bsdutils@2.41-5?arch=amd64\u0026distro=debian-13.2\u0026epoch=1"
          },
          "InstalledVersion": "1:2.41-5",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-0563",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:d8611556d7caa29765410c0ad50dd2082e9cefc884d8c9dd5bc8a007a6298c02",
          "Title": "util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline",
          "Description": "A flaw was found in the util-linux chfn and chsh utilities when compiled with Readline support. The Readline library uses an \"INPUTRC\" environment variable to get a path to the library config file. When the library cannot parse the specified file, it prints an error message containing data from the file. This flaw allows an unprivileged user to read root-owned files, potentially leading to privilege escalation. This flaw affects util-linux versions prior to 2.37.4.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-209"
          ],
          "VendorSeverity": {
            "amazon": 2,
            "cbl-mariner": 2,
            "debian": 1,
            "nvd": 2,
            "photon": 2,
            "redhat": 2
          },
          "CVSS": {
            "nvd": {
              "V2Vector": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
              "V2Score": 1.9,
              "V3Score": 5.5
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
              "V3Score": 5.5
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2022-0563",
            "https://blog.trailofbits.com/2023/02/16/suid-logic-bug-linux-readline/",
            "https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w%40ws.net.home/T/#u",
            "https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u",
            "https://nvd.nist.gov/vuln/detail/CVE-2022-0563",
            "https://security.gentoo.org/glsa/202401-08",
            "https://security.netapp.com/advisory/ntap-20220331-0002/",
            "https://www.cve.org/CVERecord?id=CVE-2022-0563"
          ],
          "PublishedDate": "2022-02-21T19:15:08.393Z",
          "LastModifiedDate": "2025-06-09T16:15:33.237Z"
        },
        {
          "VulnerabilityID": "CVE-2025-14104",
          "PkgID": "bsdutils@1:2.41-5",
          "PkgName": "bsdutils",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/bsdutils@2.41-5?arch=amd64\u0026distro=debian-13.2\u0026epoch=1",
            "UID": "5511240f910cf9e",
            "BOMRef": "pkg:deb/debian/bsdutils@2.41-5?arch=amd64\u0026distro=debian-13.2\u0026epoch=1"
          },
          "InstalledVersion": "1:2.41-5",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-14104",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:3e69c4fa3a4219a832d3f89ad0e09578d87ca23467af308c12d0e73a9b0fbf8e",
          "Title": "util-linux: util-linux: Heap buffer overread in setpwnam() when processing 256-byte usernames",
          "Description": "A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-125"
          ],
          "VendorSeverity": {
            "alma": 2,
            "azure": 2,
            "cbl-mariner": 2,
            "debian": 1,
            "oracle-oval": 2,
            "photon": 2,
            "redhat": 2,
            "rocky": 2
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
              "V3Score": 6.1
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:1696",
            "https://access.redhat.com/errata/RHSA-2026:1852",
            "https://access.redhat.com/errata/RHSA-2026:1913",
            "https://access.redhat.com/errata/RHSA-2026:2485",
            "https://access.redhat.com/errata/RHSA-2026:2563",
            "https://access.redhat.com/errata/RHSA-2026:2737",
            "https://access.redhat.com/errata/RHSA-2026:2800",
            "https://access.redhat.com/errata/RHSA-2026:3406",
            "https://access.redhat.com/errata/RHSA-2026:4943",
            "https://access.redhat.com/security/cve/CVE-2025-14104",
            "https://bugzilla.redhat.com/2419369",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2419369",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14104",
            "https://errata.almalinux.org/9/ALSA-2026-1913.html",
            "https://errata.rockylinux.org/RLSA-2026:1913",
            "https://linux.oracle.com/cve/CVE-2025-14104.html",
            "https://linux.oracle.com/errata/ELSA-2026-1913.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-14104",
            "https://www.cve.org/CVERecord?id=CVE-2025-14104"
          ],
          "PublishedDate": "2025-12-05T17:16:03.117Z",
          "LastModifiedDate": "2026-03-18T17:16:03.817Z"
        },
        {
          "VulnerabilityID": "CVE-2026-3184",
          "PkgID": "bsdutils@1:2.41-5",
          "PkgName": "bsdutils",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/bsdutils@2.41-5?arch=amd64\u0026distro=debian-13.2\u0026epoch=1",
            "UID": "5511240f910cf9e",
            "BOMRef": "pkg:deb/debian/bsdutils@2.41-5?arch=amd64\u0026distro=debian-13.2\u0026epoch=1"
          },
          "InstalledVersion": "1:2.41-5",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-3184",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:6233dfafd21a92a8738e763eef6f9063a4ecca00d1884b39496ab4ddaa2f22ab",
          "Title": "util-linux: util-linux: Access control bypass due to improper hostname canonicalization",
          "Description": "A flaw was found in util-linux. Improper hostname canonicalization in the `login(1)` utility, when invoked with the `-h` option, can modify the supplied remote hostname before setting `PAM_RHOST`. A remote attacker could exploit this by providing a specially crafted hostname, potentially bypassing host-based Pluggable Authentication Modules (PAM) access control rules that rely on fully qualified domain names. This could lead to unauthorized access.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-289"
          ],
          "VendorSeverity": {
            "redhat": 1,
            "ubuntu": 2
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
              "V3Score": 3.7
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-3184",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2442570",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-3184",
            "https://www.cve.org/CVERecord?id=CVE-2026-3184"
          ],
          "PublishedDate": "2026-04-03T19:17:23.377Z",
          "LastModifiedDate": "2026-04-03T19:17:23.377Z"
        },
        {
          "VulnerabilityID": "CVE-2026-27456",
          "PkgID": "bsdutils@1:2.41-5",
          "PkgName": "bsdutils",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/bsdutils@2.41-5?arch=amd64\u0026distro=debian-13.2\u0026epoch=1",
            "UID": "5511240f910cf9e",
            "BOMRef": "pkg:deb/debian/bsdutils@2.41-5?arch=amd64\u0026distro=debian-13.2\u0026epoch=1"
          },
          "InstalledVersion": "1:2.41-5",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-27456",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:75b67e054ebd3cfdb20ce7d446c28ffb72a48fd94854a6dd750c6832fd4c4e53",
          "Title": "[util-linux: mount(8) TOCTOU symlink attack via loop device]",
          "Description": "util-linux is a random collection of Linux utilities. Prior to version 2.41.4, a TOCTOU (Time-of-Check-Time-of-Use) vulnerability has been identified in the SUID binary /usr/bin/mount from util-linux. The mount binary, when setting up loop devices, validates the source file path with user privileges via fork() + setuid() + realpath(), but subsequently re-canonicalizes and opens it with root privileges (euid=0) without verifying that the path has not been replaced between both operations. Neither O_NOFOLLOW, nor inode comparison, nor post-open fstat() are employed. This allows a local unprivileged user to replace the source file with a symlink pointing to any root-owned file or device during the race window, causing the SUID binary to open and mount it as root. Exploitation requires an /etc/fstab entry with user,loop options whose path points to a directory where the attacker has write permission, and that /usr/bin/mount has the SUID bit set (the default configuration on virtually all Linux distributions). The impact is unauthorized read access to root-protected files and block devices, including backup images, disk volumes, and any file containing a valid filesystem. This issue has been patched in version 2.41.4.",
          "Severity": "UNKNOWN",
          "CweIDs": [
            "CWE-59",
            "CWE-269",
            "CWE-367"
          ],
          "References": [
            "https://github.com/util-linux/util-linux/commit/5e390467b26a3cf3fecc04e1a0d482dff3162fc4",
            "https://github.com/util-linux/util-linux/releases/tag/v2.41.4",
            "https://github.com/util-linux/util-linux/security/advisories/GHSA-qq4x-vfq4-9h9g"
          ],
          "PublishedDate": "2026-04-03T22:16:25.4Z",
          "LastModifiedDate": "2026-04-03T22:16:25.4Z"
        },
        {
          "VulnerabilityID": "CVE-2017-18018",
          "PkgID": "coreutils@9.7-3",
          "PkgName": "coreutils",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/coreutils@9.7-3?arch=amd64\u0026distro=debian-13.2",
            "UID": "9c73459c11b8afaf",
            "BOMRef": "pkg:deb/debian/coreutils@9.7-3?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "9.7-3",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2017-18018",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:b865805cb34adfb7a5719621d16d4b14939fb46682a69d12076994607f49cd81",
          "Title": "coreutils: race condition vulnerability in chown and chgrp",
          "Description": "In GNU Coreutils through 8.29, chown-core.c in chown and chgrp does not prevent replacement of a plain file with a symlink during use of the POSIX \"-R -L\" options, which allows local users to modify the ownership of arbitrary files by leveraging a race condition.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-362"
          ],
          "VendorSeverity": {
            "debian": 1,
            "nvd": 2,
            "redhat": 2
          },
          "CVSS": {
            "nvd": {
              "V2Vector": "AV:L/AC:M/Au:N/C:N/I:P/A:N",
              "V3Vector": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N",
              "V2Score": 1.9,
              "V3Score": 4.7
            },
            "redhat": {
              "V3Vector": "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L",
              "V3Score": 4.2
            }
          },
          "References": [
            "http://lists.gnu.org/archive/html/coreutils/2017-12/msg00045.html",
            "https://access.redhat.com/security/cve/CVE-2017-18018",
            "https://nvd.nist.gov/vuln/detail/CVE-2017-18018",
            "https://www.cve.org/CVERecord?id=CVE-2017-18018"
          ],
          "PublishedDate": "2018-01-04T04:29:00.19Z",
          "LastModifiedDate": "2025-06-09T16:15:27.25Z"
        },
        {
          "VulnerabilityID": "CVE-2025-5278",
          "PkgID": "coreutils@9.7-3",
          "PkgName": "coreutils",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/coreutils@9.7-3?arch=amd64\u0026distro=debian-13.2",
            "UID": "9c73459c11b8afaf",
            "BOMRef": "pkg:deb/debian/coreutils@9.7-3?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "9.7-3",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-5278",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:8a76ac958e4819d52b5e20b705beb6c8710871cb10413017ef4a548b2b92075a",
          "Title": "coreutils: Heap Buffer Under-Read in GNU Coreutils sort via Key Specification",
          "Description": "A flaw was found in GNU Coreutils. The sort utility's begfield() function is vulnerable to a heap buffer under-read. The program may access memory outside the allocated buffer if a user runs a crafted command using the traditional key format. A malicious input could lead to a crash or leak sensitive data.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-121"
          ],
          "VendorSeverity": {
            "amazon": 2,
            "debian": 1,
            "photon": 2,
            "redhat": 2
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L",
              "V3Score": 4.4
            }
          },
          "References": [
            "http://www.openwall.com/lists/oss-security/2025/05/27/2",
            "http://www.openwall.com/lists/oss-security/2025/05/29/1",
            "http://www.openwall.com/lists/oss-security/2025/05/29/2",
            "https://access.redhat.com/security/cve/CVE-2025-5278",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2368764",
            "https://cgit.git.savannah.gnu.org/cgit/coreutils.git/commit/?id=8c9602e3a145e9596dc1a63c6ed67865814b6633",
            "https://cgit.git.savannah.gnu.org/cgit/coreutils.git/tree/NEWS?id=8c9602e3a145e9596dc1a63c6ed67865814b6633#n14",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-5278",
            "https://security-tracker.debian.org/tracker/CVE-2025-5278",
            "https://www.cve.org/CVERecord?id=CVE-2025-5278"
          ],
          "PublishedDate": "2025-05-27T21:15:23.197Z",
          "LastModifiedDate": "2025-10-22T20:15:37.32Z"
        },
        {
          "VulnerabilityID": "CVE-2026-2219",
          "PkgID": "dpkg@1.22.21",
          "PkgName": "dpkg",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/dpkg@1.22.21?arch=amd64\u0026distro=debian-13.2",
            "UID": "580f7fe802cc3d8a",
            "BOMRef": "pkg:deb/debian/dpkg@1.22.21?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "1.22.21",
          "FixedVersion": "1.22.22",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-2219",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:9d92b5689e8775de34096a77d55fd7c3d1ccd06184f710d1d10b5a74b8912e2f",
          "Title": "It was discovered that dpkg-deb (a component of dpkg, the Debian packa ...",
          "Description": "It was discovered that dpkg-deb (a component of dpkg, the Debian package management system) does not properly validate the end of the data stream when uncompressing a zstd-compressed .deb archive, which may result in denial of service (infinite loop spinning the CPU).",
          "Severity": "UNKNOWN",
          "CweIDs": [
            "CWE-835"
          ],
          "References": [
            "https://bugs.debian.org/1129722",
            "https://git.dpkg.org/cgit/dpkg/dpkg.git/commit/?id=6610297a62c0780dd0e80b0e302ef64fdcc9d313"
          ],
          "PublishedDate": "2026-03-07T09:16:07.823Z",
          "LastModifiedDate": "2026-03-09T15:15:57.87Z"
        },
        {
          "VulnerabilityID": "CVE-2011-3374",
          "PkgID": "libapt-pkg7.0@3.0.3",
          "PkgName": "libapt-pkg7.0",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libapt-pkg7.0@3.0.3?arch=amd64\u0026distro=debian-13.2",
            "UID": "97ebd5ed5a92bcf9",
            "BOMRef": "pkg:deb/debian/libapt-pkg7.0@3.0.3?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.0.3",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2011-3374",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:e3086ea156f699de26094e5251a3542198400aceb0e99c0c90c88487c94d9974",
          "Title": "It was found that apt-key in apt, all versions, do not correctly valid ...",
          "Description": "It was found that apt-key in apt, all versions, do not correctly validate gpg keys with the master keyring, leading to a potential man-in-the-middle attack.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-347"
          ],
          "VendorSeverity": {
            "debian": 1,
            "nvd": 1
          },
          "CVSS": {
            "nvd": {
              "V2Vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
              "V2Score": 4.3,
              "V3Score": 3.7
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/cve-2011-3374",
            "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480",
            "https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html",
            "https://seclists.org/fulldisclosure/2011/Sep/221",
            "https://security-tracker.debian.org/tracker/CVE-2011-3374",
            "https://snyk.io/vuln/SNYK-LINUX-APT-116518",
            "https://ubuntu.com/security/CVE-2011-3374"
          ],
          "PublishedDate": "2019-11-26T00:15:11.03Z",
          "LastModifiedDate": "2024-11-21T01:30:22.61Z"
        },
        {
          "VulnerabilityID": "CVE-2022-0563",
          "PkgID": "libblkid1@2.41-5",
          "PkgName": "libblkid1",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libblkid1@2.41-5?arch=amd64\u0026distro=debian-13.2",
            "UID": "c859e3dbfda1be6d",
            "BOMRef": "pkg:deb/debian/libblkid1@2.41-5?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-5",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-0563",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:05f33e4ee31c48e3a28e70b608d360abf9beb9b19a5eb06bb07a65feb115c3b4",
          "Title": "util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline",
          "Description": "A flaw was found in the util-linux chfn and chsh utilities when compiled with Readline support. The Readline library uses an \"INPUTRC\" environment variable to get a path to the library config file. When the library cannot parse the specified file, it prints an error message containing data from the file. This flaw allows an unprivileged user to read root-owned files, potentially leading to privilege escalation. This flaw affects util-linux versions prior to 2.37.4.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-209"
          ],
          "VendorSeverity": {
            "amazon": 2,
            "cbl-mariner": 2,
            "debian": 1,
            "nvd": 2,
            "photon": 2,
            "redhat": 2
          },
          "CVSS": {
            "nvd": {
              "V2Vector": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
              "V2Score": 1.9,
              "V3Score": 5.5
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
              "V3Score": 5.5
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2022-0563",
            "https://blog.trailofbits.com/2023/02/16/suid-logic-bug-linux-readline/",
            "https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w%40ws.net.home/T/#u",
            "https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u",
            "https://nvd.nist.gov/vuln/detail/CVE-2022-0563",
            "https://security.gentoo.org/glsa/202401-08",
            "https://security.netapp.com/advisory/ntap-20220331-0002/",
            "https://www.cve.org/CVERecord?id=CVE-2022-0563"
          ],
          "PublishedDate": "2022-02-21T19:15:08.393Z",
          "LastModifiedDate": "2025-06-09T16:15:33.237Z"
        },
        {
          "VulnerabilityID": "CVE-2025-14104",
          "PkgID": "libblkid1@2.41-5",
          "PkgName": "libblkid1",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libblkid1@2.41-5?arch=amd64\u0026distro=debian-13.2",
            "UID": "c859e3dbfda1be6d",
            "BOMRef": "pkg:deb/debian/libblkid1@2.41-5?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-5",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-14104",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:47f22fa076106fc293e90d24055d607f826308735c47d7b2ec4a376218742d52",
          "Title": "util-linux: util-linux: Heap buffer overread in setpwnam() when processing 256-byte usernames",
          "Description": "A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-125"
          ],
          "VendorSeverity": {
            "alma": 2,
            "azure": 2,
            "cbl-mariner": 2,
            "debian": 1,
            "oracle-oval": 2,
            "photon": 2,
            "redhat": 2,
            "rocky": 2
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
              "V3Score": 6.1
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:1696",
            "https://access.redhat.com/errata/RHSA-2026:1852",
            "https://access.redhat.com/errata/RHSA-2026:1913",
            "https://access.redhat.com/errata/RHSA-2026:2485",
            "https://access.redhat.com/errata/RHSA-2026:2563",
            "https://access.redhat.com/errata/RHSA-2026:2737",
            "https://access.redhat.com/errata/RHSA-2026:2800",
            "https://access.redhat.com/errata/RHSA-2026:3406",
            "https://access.redhat.com/errata/RHSA-2026:4943",
            "https://access.redhat.com/security/cve/CVE-2025-14104",
            "https://bugzilla.redhat.com/2419369",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2419369",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14104",
            "https://errata.almalinux.org/9/ALSA-2026-1913.html",
            "https://errata.rockylinux.org/RLSA-2026:1913",
            "https://linux.oracle.com/cve/CVE-2025-14104.html",
            "https://linux.oracle.com/errata/ELSA-2026-1913.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-14104",
            "https://www.cve.org/CVERecord?id=CVE-2025-14104"
          ],
          "PublishedDate": "2025-12-05T17:16:03.117Z",
          "LastModifiedDate": "2026-03-18T17:16:03.817Z"
        },
        {
          "VulnerabilityID": "CVE-2026-3184",
          "PkgID": "libblkid1@2.41-5",
          "PkgName": "libblkid1",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libblkid1@2.41-5?arch=amd64\u0026distro=debian-13.2",
            "UID": "c859e3dbfda1be6d",
            "BOMRef": "pkg:deb/debian/libblkid1@2.41-5?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-5",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-3184",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:02494a464e70bccc95e671de737632db79a0d67d4c28795ae999bd4cdb5936d5",
          "Title": "util-linux: util-linux: Access control bypass due to improper hostname canonicalization",
          "Description": "A flaw was found in util-linux. Improper hostname canonicalization in the `login(1)` utility, when invoked with the `-h` option, can modify the supplied remote hostname before setting `PAM_RHOST`. A remote attacker could exploit this by providing a specially crafted hostname, potentially bypassing host-based Pluggable Authentication Modules (PAM) access control rules that rely on fully qualified domain names. This could lead to unauthorized access.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-289"
          ],
          "VendorSeverity": {
            "redhat": 1,
            "ubuntu": 2
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
              "V3Score": 3.7
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-3184",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2442570",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-3184",
            "https://www.cve.org/CVERecord?id=CVE-2026-3184"
          ],
          "PublishedDate": "2026-04-03T19:17:23.377Z",
          "LastModifiedDate": "2026-04-03T19:17:23.377Z"
        },
        {
          "VulnerabilityID": "CVE-2026-27456",
          "PkgID": "libblkid1@2.41-5",
          "PkgName": "libblkid1",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libblkid1@2.41-5?arch=amd64\u0026distro=debian-13.2",
            "UID": "c859e3dbfda1be6d",
            "BOMRef": "pkg:deb/debian/libblkid1@2.41-5?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-5",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-27456",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:a573c66196d9b3f69adf1220a3ad91584bd47811f888b2d95c544c2192b9cb8b",
          "Title": "[util-linux: mount(8) TOCTOU symlink attack via loop device]",
          "Description": "util-linux is a random collection of Linux utilities. Prior to version 2.41.4, a TOCTOU (Time-of-Check-Time-of-Use) vulnerability has been identified in the SUID binary /usr/bin/mount from util-linux. The mount binary, when setting up loop devices, validates the source file path with user privileges via fork() + setuid() + realpath(), but subsequently re-canonicalizes and opens it with root privileges (euid=0) without verifying that the path has not been replaced between both operations. Neither O_NOFOLLOW, nor inode comparison, nor post-open fstat() are employed. This allows a local unprivileged user to replace the source file with a symlink pointing to any root-owned file or device during the race window, causing the SUID binary to open and mount it as root. Exploitation requires an /etc/fstab entry with user,loop options whose path points to a directory where the attacker has write permission, and that /usr/bin/mount has the SUID bit set (the default configuration on virtually all Linux distributions). The impact is unauthorized read access to root-protected files and block devices, including backup images, disk volumes, and any file containing a valid filesystem. This issue has been patched in version 2.41.4.",
          "Severity": "UNKNOWN",
          "CweIDs": [
            "CWE-59",
            "CWE-269",
            "CWE-367"
          ],
          "References": [
            "https://github.com/util-linux/util-linux/commit/5e390467b26a3cf3fecc04e1a0d482dff3162fc4",
            "https://github.com/util-linux/util-linux/releases/tag/v2.41.4",
            "https://github.com/util-linux/util-linux/security/advisories/GHSA-qq4x-vfq4-9h9g"
          ],
          "PublishedDate": "2026-04-03T22:16:25.4Z",
          "LastModifiedDate": "2026-04-03T22:16:25.4Z"
        },
        {
          "VulnerabilityID": "CVE-2026-0861",
          "PkgID": "libc-bin@2.41-12",
          "PkgName": "libc-bin",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libc-bin@2.41-12?arch=amd64\u0026distro=debian-13.2",
            "UID": "e0b558ac4d5460a2",
            "BOMRef": "pkg:deb/debian/libc-bin@2.41-12?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-12",
          "FixedVersion": "2.41-12+deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-0861",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:d1edfb33e7139f8f3bfaecfb8cba521dcdc644f34e22b6bae86928d20f73632d",
          "Title": "glibc: Integer overflow in memalign leads to heap corruption",
          "Description": "Passing too large an alignment to the memalign suite of functions (memalign, posix_memalign, aligned_alloc) in the GNU C Library version 2.30 to 2.42 may result in an integer overflow, which could consequently result in a heap corruption.\n\nNote that the attacker must have control over both, the size as well as the alignment arguments of the memalign function to be able to exploit this.  The size parameter must be close enough to PTRDIFF_MAX so as to overflow size_t along with the large alignment argument.  This limits the malicious inputs for the alignment for memalign to the range [1\u003c\u003c62+ 1, 1\u003c\u003c63] and exactly 1\u003c\u003c63 for posix_memalign and aligned_alloc.\n\nTypically the alignment argument passed to such functions is a known constrained quantity (e.g. page size, block size, struct sizes) and is not attacker controlled, because of which this may not be easily exploitable in practice.  An application bug could potentially result in the input alignment being too large, e.g. due to a different buffer overflow or integer overflow in the application or its dependent libraries, but that is again an uncommon usage pattern given typical sources of alignments.",
          "Severity": "HIGH",
          "CweIDs": [
            "CWE-190"
          ],
          "VendorSeverity": {
            "alma": 2,
            "azure": 2,
            "cbl-mariner": 2,
            "oracle-oval": 2,
            "photon": 3,
            "redhat": 1,
            "rocky": 2,
            "ubuntu": 2
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
              "V3Score": 8.1
            }
          },
          "References": [
            "http://www.openwall.com/lists/oss-security/2026/01/16/5",
            "https://access.redhat.com/errata/RHSA-2026:2786",
            "https://access.redhat.com/security/cve/CVE-2026-0861",
            "https://bugzilla.redhat.com/2429771",
            "https://bugzilla.redhat.com/2430201",
            "https://bugzilla.redhat.com/2431196",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2429771",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430201",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2431196",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15281",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0861",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0915",
            "https://errata.almalinux.org/9/ALSA-2026-2786.html",
            "https://errata.rockylinux.org/RLSA-2026:2786",
            "https://linux.oracle.com/cve/CVE-2026-0861.html",
            "https://linux.oracle.com/errata/ELSA-2026-50120.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-0861",
            "https://sourceware.org/bugzilla/show_bug.cgi?id=33796",
            "https://sourceware.org/git/?p=glibc.git;a=blob_plain;f=advisories/GLIBC-SA-2026-0001",
            "https://ubuntu.com/security/notices/USN-8005-1",
            "https://www.cve.org/CVERecord?id=CVE-2026-0861"
          ],
          "PublishedDate": "2026-01-14T21:15:52.617Z",
          "LastModifiedDate": "2026-02-03T18:26:25.39Z"
        },
        {
          "VulnerabilityID": "CVE-2025-15281",
          "PkgID": "libc-bin@2.41-12",
          "PkgName": "libc-bin",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libc-bin@2.41-12?arch=amd64\u0026distro=debian-13.2",
            "UID": "e0b558ac4d5460a2",
            "BOMRef": "pkg:deb/debian/libc-bin@2.41-12?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-12",
          "FixedVersion": "2.41-12+deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-15281",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:db990083de9b0a24f5786627b64d9caa237b3f4f64586585bac7e0120ec01510",
          "Title": "glibc: wordexp with WRDE_REUSE and WRDE_APPEND may return uninitialized memory",
          "Description": "Calling wordexp with WRDE_REUSE in conjunction with WRDE_APPEND in the GNU C Library version 2.0 to version 2.42 may cause the interface to return uninitialized memory in the we_wordv member, which on subsequent calls to wordfree may abort the process.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-908"
          ],
          "VendorSeverity": {
            "alma": 2,
            "azure": 2,
            "cbl-mariner": 2,
            "oracle-oval": 2,
            "photon": 3,
            "redhat": 1,
            "rocky": 2,
            "ubuntu": 2
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 5.9
            }
          },
          "References": [
            "http://www.openwall.com/lists/oss-security/2026/01/20/3",
            "https://access.redhat.com/errata/RHSA-2026:2786",
            "https://access.redhat.com/security/cve/CVE-2025-15281",
            "https://bugzilla.redhat.com/2429771",
            "https://bugzilla.redhat.com/2430201",
            "https://bugzilla.redhat.com/2431196",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2429771",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430201",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2431196",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15281",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0861",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0915",
            "https://errata.almalinux.org/9/ALSA-2026-2786.html",
            "https://errata.rockylinux.org/RLSA-2026:2786",
            "https://linux.oracle.com/cve/CVE-2025-15281.html",
            "https://linux.oracle.com/errata/ELSA-2026-50174.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-15281",
            "https://sourceware.org/bugzilla/show_bug.cgi?id=33814",
            "https://ubuntu.com/security/notices/USN-8005-1",
            "https://www.cve.org/CVERecord?id=CVE-2025-15281",
            "https://www.openwall.com/lists/oss-security/2026/01/20/3"
          ],
          "PublishedDate": "2026-01-20T14:16:07.843Z",
          "LastModifiedDate": "2026-02-05T17:43:18.63Z"
        },
        {
          "VulnerabilityID": "CVE-2026-0915",
          "PkgID": "libc-bin@2.41-12",
          "PkgName": "libc-bin",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libc-bin@2.41-12?arch=amd64\u0026distro=debian-13.2",
            "UID": "e0b558ac4d5460a2",
            "BOMRef": "pkg:deb/debian/libc-bin@2.41-12?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-12",
          "FixedVersion": "2.41-12+deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-0915",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:33a70992a52ee74ef2f2f35dd038b9ebb1d00b34e91a60234e8a9c9f1a33af21",
          "Title": "glibc: glibc: Information disclosure via zero-valued network query",
          "Description": "Calling getnetbyaddr or getnetbyaddr_r with a configured nsswitch.conf that specifies the library's DNS backend for networks and queries for a zero-valued network in the GNU C Library version 2.0 to version 2.42 can leak stack contents to the configured DNS resolver.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-908"
          ],
          "VendorSeverity": {
            "alma": 2,
            "azure": 1,
            "cbl-mariner": 2,
            "oracle-oval": 2,
            "photon": 3,
            "redhat": 2,
            "rocky": 2,
            "ubuntu": 2
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
              "V3Score": 5.3
            }
          },
          "References": [
            "http://www.openwall.com/lists/oss-security/2026/01/16/6",
            "https://access.redhat.com/errata/RHSA-2026:2786",
            "https://access.redhat.com/security/cve/CVE-2026-0915",
            "https://bugzilla.redhat.com/2429771",
            "https://bugzilla.redhat.com/2430201",
            "https://bugzilla.redhat.com/2431196",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2429771",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430201",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2431196",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15281",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0861",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0915",
            "https://errata.almalinux.org/9/ALSA-2026-2786.html",
            "https://errata.rockylinux.org/RLSA-2026:2786",
            "https://linux.oracle.com/cve/CVE-2026-0915.html",
            "https://linux.oracle.com/errata/ELSA-2026-50174.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-0915",
            "https://sourceware.org/bugzilla/show_bug.cgi?id=33802",
            "https://ubuntu.com/security/notices/USN-8005-1",
            "https://www.cve.org/CVERecord?id=CVE-2026-0915",
            "https://www.openwall.com/lists/oss-security/2026/01/16/6"
          ],
          "PublishedDate": "2026-01-15T22:16:12.457Z",
          "LastModifiedDate": "2026-01-23T19:36:50.73Z"
        },
        {
          "VulnerabilityID": "CVE-2026-4046",
          "PkgID": "libc-bin@2.41-12",
          "PkgName": "libc-bin",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libc-bin@2.41-12?arch=amd64\u0026distro=debian-13.2",
            "UID": "e0b558ac4d5460a2",
            "BOMRef": "pkg:deb/debian/libc-bin@2.41-12?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-12",
          "Status": "fix_deferred",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-4046",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:7f172207e51e372b0db4559825f481843be5db1294206d2087bb5a1ccb3e30a7",
          "Title": "glibc: glibc: Denial of Service via iconv() function with specific character sets",
          "Description": "The iconv() function in the GNU C Library versions 2.43 and earlier may crash due to an assertion failure when converting inputs from the IBM1390 or IBM1399 character sets, which may be used to remotely crash an application.\n\n\n\nThis vulnerability can be trivially mitigated by removing the IBM1390 and IBM1399 character sets from systems that do not need them.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-617"
          ],
          "VendorSeverity": {
            "redhat": 2
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
              "V3Score": 5.3
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-4046",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-4046",
            "https://packages.fedoraproject.org/pkgs/glibc/glibc-gconv-extra/",
            "https://sourceware.org/bugzilla/show_bug.cgi?id=33980",
            "https://sourceware.org/git/?p=glibc.git;a=blob_plain;f=advisories/GLIBC-SA-2026-0007;hb=HEAD",
            "https://www.cve.org/CVERecord?id=CVE-2026-4046"
          ],
          "PublishedDate": "2026-03-30T18:16:19.573Z",
          "LastModifiedDate": "2026-04-01T14:24:21.833Z"
        },
        {
          "VulnerabilityID": "CVE-2026-4437",
          "PkgID": "libc-bin@2.41-12",
          "PkgName": "libc-bin",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libc-bin@2.41-12?arch=amd64\u0026distro=debian-13.2",
            "UID": "e0b558ac4d5460a2",
            "BOMRef": "pkg:deb/debian/libc-bin@2.41-12?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-12",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-4437",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:68a937e7ee09d8a714f79c9fffdf5c4302b5da653c99bb5ebcb33b260e24e5b6",
          "Title": "glibc: glibc: Incorrect DNS response parsing via crafted DNS server response",
          "Description": "Calling gethostbyaddr or gethostbyaddr_r with a configured nsswitch.conf that specifies the library's DNS backend in the GNU C Library version 2.34 to version 2.43 could, with a crafted response from the configured DNS server, result in a violation of the DNS specification that causes the application to treat a non-answer section of the DNS response as a valid answer.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-125"
          ],
          "VendorSeverity": {
            "redhat": 2
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
              "V3Score": 6.5
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-4437",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-4437",
            "https://sourceware.org/bugzilla/show_bug.cgi?id=34014",
            "https://www.cve.org/CVERecord?id=CVE-2026-4437"
          ],
          "PublishedDate": "2026-03-20T20:16:49.477Z",
          "LastModifiedDate": "2026-03-23T16:16:51.537Z"
        },
        {
          "VulnerabilityID": "CVE-2026-4438",
          "PkgID": "libc-bin@2.41-12",
          "PkgName": "libc-bin",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libc-bin@2.41-12?arch=amd64\u0026distro=debian-13.2",
            "UID": "e0b558ac4d5460a2",
            "BOMRef": "pkg:deb/debian/libc-bin@2.41-12?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-12",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-4438",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:7cfbb5144e66b980d1dbf38a9e369aeb3f86ae3da83c15f6cf714147c439f1b3",
          "Title": "glibc: glibc: Invalid DNS hostname returned via gethostbyaddr functions",
          "Description": "Calling gethostbyaddr or gethostbyaddr_r with a configured nsswitch.conf that specifies the library's DNS backend in the GNU C library version 2.34 to version 2.43 could result in an invalid DNS hostname being returned to the caller in violation of the DNS specification.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-20",
            "CWE-88"
          ],
          "VendorSeverity": {
            "redhat": 1
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
              "V3Score": 4
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-4438",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-4438",
            "https://sourceware.org/bugzilla/show_bug.cgi?id=34015",
            "https://www.cve.org/CVERecord?id=CVE-2026-4438"
          ],
          "PublishedDate": "2026-03-20T20:16:49.623Z",
          "LastModifiedDate": "2026-03-23T15:16:35.68Z"
        },
        {
          "VulnerabilityID": "CVE-2010-4756",
          "PkgID": "libc-bin@2.41-12",
          "PkgName": "libc-bin",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libc-bin@2.41-12?arch=amd64\u0026distro=debian-13.2",
            "UID": "e0b558ac4d5460a2",
            "BOMRef": "pkg:deb/debian/libc-bin@2.41-12?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-12",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2010-4756",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:7246b4fbf663b8c1f8011bc9847550adc466f104246c5b8fd89962182fb0bdf0",
          "Title": "glibc: glob implementation can cause excessive CPU and memory consumption due to crafted glob expressions",
          "Description": "The glob implementation in the GNU C Library (aka glibc or libc6) allows remote authenticated users to cause a denial of service (CPU and memory consumption) via crafted glob expressions that do not match any pathnames, as demonstrated by glob expressions in STAT commands to an FTP daemon, a different vulnerability than CVE-2010-2632.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-399"
          ],
          "VendorSeverity": {
            "debian": 1,
            "nvd": 2,
            "redhat": 1
          },
          "CVSS": {
            "nvd": {
              "V2Vector": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
              "V2Score": 4
            },
            "redhat": {
              "V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
              "V2Score": 5
            }
          },
          "References": [
            "http://cxib.net/stuff/glob-0day.c",
            "http://securityreason.com/achievement_securityalert/89",
            "http://securityreason.com/exploitalert/9223",
            "https://access.redhat.com/security/cve/CVE-2010-4756",
            "https://bugzilla.redhat.com/show_bug.cgi?id=681681",
            "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756",
            "https://nvd.nist.gov/vuln/detail/CVE-2010-4756",
            "https://security.netapp.com/advisory/ntap-20241108-0002/",
            "https://www.cve.org/CVERecord?id=CVE-2010-4756"
          ],
          "PublishedDate": "2011-03-02T20:00:01.037Z",
          "LastModifiedDate": "2025-11-03T22:15:41.51Z"
        },
        {
          "VulnerabilityID": "CVE-2018-20796",
          "PkgID": "libc-bin@2.41-12",
          "PkgName": "libc-bin",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libc-bin@2.41-12?arch=amd64\u0026distro=debian-13.2",
            "UID": "e0b558ac4d5460a2",
            "BOMRef": "pkg:deb/debian/libc-bin@2.41-12?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-12",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2018-20796",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:748798fbd8f77f40e7be785189631b1acc5582d10d2b08bf1df54df68137d019",
          "Title": "glibc: uncontrolled recursion in function check_dst_limits_calc_pos_1 in posix/regexec.c",
          "Description": "In the GNU C Library (aka glibc or libc6) through 2.29, check_dst_limits_calc_pos_1 in posix/regexec.c has Uncontrolled Recursion, as demonstrated by '(\\227|)(\\\\1\\\\1|t1|\\\\\\2537)+' in grep.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-674"
          ],
          "VendorSeverity": {
            "cbl-mariner": 3,
            "debian": 1,
            "nvd": 3,
            "redhat": 2
          },
          "CVSS": {
            "nvd": {
              "V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
              "V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V2Score": 5,
              "V3Score": 7.5
            },
            "redhat": {
              "V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
              "V3Score": 5.3
            }
          },
          "References": [
            "http://www.securityfocus.com/bid/107160",
            "https://access.redhat.com/security/cve/CVE-2018-20796",
            "https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141",
            "https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2018-20796",
            "https://security.netapp.com/advisory/ntap-20190315-0002/",
            "https://support.f5.com/csp/article/K26346590?utm_source=f5support\u0026amp%3Butm_medium=RSS",
            "https://www.cve.org/CVERecord?id=CVE-2018-20796"
          ],
          "PublishedDate": "2019-02-26T02:29:00.45Z",
          "LastModifiedDate": "2024-11-21T04:02:11.827Z"
        },
        {
          "VulnerabilityID": "CVE-2019-1010022",
          "PkgID": "libc-bin@2.41-12",
          "PkgName": "libc-bin",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libc-bin@2.41-12?arch=amd64\u0026distro=debian-13.2",
            "UID": "e0b558ac4d5460a2",
            "BOMRef": "pkg:deb/debian/libc-bin@2.41-12?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-12",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2019-1010022",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:3e31b5906e91a04034f20852dd3e9ab9b784840c741bd09ebad3910776ad76d3",
          "Title": "glibc: stack guard protection bypass",
          "Description": "GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may bypass stack guard protection. The component is: nptl. The attack vector is: Exploit stack buffer overflow vulnerability and use this bypass vulnerability to bypass stack guard. NOTE: Upstream comments indicate \"this is being treated as a non-security bug and no real threat.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-119"
          ],
          "VendorSeverity": {
            "debian": 1,
            "nvd": 4
          },
          "CVSS": {
            "nvd": {
              "V2Vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
              "V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
              "V2Score": 7.5,
              "V3Score": 9.8
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2019-1010022",
            "https://nvd.nist.gov/vuln/detail/CVE-2019-1010022",
            "https://security-tracker.debian.org/tracker/CVE-2019-1010022",
            "https://sourceware.org/bugzilla/show_bug.cgi?id=22850",
            "https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3",
            "https://ubuntu.com/security/CVE-2019-1010022",
            "https://www.cve.org/CVERecord?id=CVE-2019-1010022"
          ],
          "PublishedDate": "2019-07-15T04:15:13.317Z",
          "LastModifiedDate": "2024-11-21T04:17:55.5Z"
        },
        {
          "VulnerabilityID": "CVE-2019-1010023",
          "PkgID": "libc-bin@2.41-12",
          "PkgName": "libc-bin",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libc-bin@2.41-12?arch=amd64\u0026distro=debian-13.2",
            "UID": "e0b558ac4d5460a2",
            "BOMRef": "pkg:deb/debian/libc-bin@2.41-12?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-12",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2019-1010023",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:d89f24f358fbc815124b6426511756cec3ce6a400e151613244e32e9f14818ea",
          "Title": "glibc: running ldd on malicious ELF leads to code execution because of wrong size computation",
          "Description": "GNU Libc current is affected by: Re-mapping current loaded library with malicious ELF file. The impact is: In worst case attacker may evaluate privileges. The component is: libld. The attack vector is: Attacker sends 2 ELF files to victim and asks to run ldd on it. ldd execute code. NOTE: Upstream comments indicate \"this is being treated as a non-security bug and no real threat.",
          "Severity": "LOW",
          "VendorSeverity": {
            "debian": 1,
            "nvd": 3,
            "redhat": 1
          },
          "CVSS": {
            "nvd": {
              "V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
              "V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
              "V2Score": 6.8,
              "V3Score": 8.8
            },
            "redhat": {
              "V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
              "V3Score": 7.8
            }
          },
          "References": [
            "http://www.securityfocus.com/bid/109167",
            "https://access.redhat.com/security/cve/CVE-2019-1010023",
            "https://nvd.nist.gov/vuln/detail/CVE-2019-1010023",
            "https://security-tracker.debian.org/tracker/CVE-2019-1010023",
            "https://sourceware.org/bugzilla/show_bug.cgi?id=22851",
            "https://support.f5.com/csp/article/K11932200?utm_source=f5support\u0026amp%3Butm_medium=RSS",
            "https://ubuntu.com/security/CVE-2019-1010023",
            "https://www.cve.org/CVERecord?id=CVE-2019-1010023"
          ],
          "PublishedDate": "2019-07-15T04:15:13.397Z",
          "LastModifiedDate": "2024-11-21T04:17:55.643Z"
        },
        {
          "VulnerabilityID": "CVE-2019-1010024",
          "PkgID": "libc-bin@2.41-12",
          "PkgName": "libc-bin",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libc-bin@2.41-12?arch=amd64\u0026distro=debian-13.2",
            "UID": "e0b558ac4d5460a2",
            "BOMRef": "pkg:deb/debian/libc-bin@2.41-12?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-12",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2019-1010024",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:068137673f865c31eaeab3ddb8430e39112feb60651cdd41bfdf92a8ed5304ad",
          "Title": "glibc: ASLR bypass using cache of thread stack and heap",
          "Description": "GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may bypass ASLR using cache of thread stack and heap. The component is: glibc. NOTE: Upstream comments indicate \"this is being treated as a non-security bug and no real threat.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-200"
          ],
          "VendorSeverity": {
            "debian": 1,
            "nvd": 2,
            "redhat": 2
          },
          "CVSS": {
            "nvd": {
              "V2Vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
              "V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
              "V2Score": 5,
              "V3Score": 5.3
            },
            "redhat": {
              "V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
              "V3Score": 5.3
            }
          },
          "References": [
            "http://www.securityfocus.com/bid/109162",
            "https://access.redhat.com/security/cve/CVE-2019-1010024",
            "https://nvd.nist.gov/vuln/detail/CVE-2019-1010024",
            "https://security-tracker.debian.org/tracker/CVE-2019-1010024",
            "https://sourceware.org/bugzilla/show_bug.cgi?id=22852",
            "https://support.f5.com/csp/article/K06046097",
            "https://support.f5.com/csp/article/K06046097?utm_source=f5support\u0026amp%3Butm_medium=RSS",
            "https://ubuntu.com/security/CVE-2019-1010024",
            "https://www.cve.org/CVERecord?id=CVE-2019-1010024"
          ],
          "PublishedDate": "2019-07-15T04:15:13.473Z",
          "LastModifiedDate": "2024-11-21T04:17:55.843Z"
        },
        {
          "VulnerabilityID": "CVE-2019-1010025",
          "PkgID": "libc-bin@2.41-12",
          "PkgName": "libc-bin",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libc-bin@2.41-12?arch=amd64\u0026distro=debian-13.2",
            "UID": "e0b558ac4d5460a2",
            "BOMRef": "pkg:deb/debian/libc-bin@2.41-12?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-12",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2019-1010025",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:126d9449133e4bee2ebdbda36fe9ff38e8971726e91b4f522c2a9ff61025c995",
          "Title": "glibc: information disclosure of heap addresses of pthread_created thread",
          "Description": "GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may guess the heap addresses of pthread_created thread. The component is: glibc. NOTE: the vendor's position is \"ASLR bypass itself is not a vulnerability.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-330"
          ],
          "VendorSeverity": {
            "debian": 1,
            "nvd": 2,
            "redhat": 1
          },
          "CVSS": {
            "nvd": {
              "V2Vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
              "V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
              "V2Score": 5,
              "V3Score": 5.3
            },
            "redhat": {
              "V3Vector": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
              "V3Score": 2.9
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2019-1010025",
            "https://nvd.nist.gov/vuln/detail/CVE-2019-1010025",
            "https://security-tracker.debian.org/tracker/CVE-2019-1010025",
            "https://sourceware.org/bugzilla/show_bug.cgi?id=22853",
            "https://support.f5.com/csp/article/K06046097",
            "https://support.f5.com/csp/article/K06046097?utm_source=f5support\u0026amp%3Butm_medium=RSS",
            "https://ubuntu.com/security/CVE-2019-1010025",
            "https://www.cve.org/CVERecord?id=CVE-2019-1010025"
          ],
          "PublishedDate": "2019-07-15T04:15:13.537Z",
          "LastModifiedDate": "2024-11-21T04:17:55.96Z"
        },
        {
          "VulnerabilityID": "CVE-2019-9192",
          "PkgID": "libc-bin@2.41-12",
          "PkgName": "libc-bin",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libc-bin@2.41-12?arch=amd64\u0026distro=debian-13.2",
            "UID": "e0b558ac4d5460a2",
            "BOMRef": "pkg:deb/debian/libc-bin@2.41-12?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-12",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2019-9192",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:ab012c87c38b7076b57d420339b03349cc6f518b809f827c2c1ecb2372531f8a",
          "Title": "glibc: uncontrolled recursion in function check_dst_limits_calc_pos_1 in posix/regexec.c",
          "Description": "In the GNU C Library (aka glibc or libc6) through 2.29, check_dst_limits_calc_pos_1 in posix/regexec.c has Uncontrolled Recursion, as demonstrated by '(|)(\\\\1\\\\1)*' in grep, a different issue than CVE-2018-20796. NOTE: the software maintainer disputes that this is a vulnerability because the behavior occurs only with a crafted pattern",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-674"
          ],
          "VendorSeverity": {
            "cbl-mariner": 3,
            "debian": 1,
            "nvd": 3,
            "redhat": 1
          },
          "CVSS": {
            "nvd": {
              "V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
              "V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V2Score": 5,
              "V3Score": 7.5
            },
            "redhat": {
              "V3Vector": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L",
              "V3Score": 2.8
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2019-9192",
            "https://nvd.nist.gov/vuln/detail/CVE-2019-9192",
            "https://sourceware.org/bugzilla/show_bug.cgi?id=24269",
            "https://support.f5.com/csp/article/K26346590?utm_source=f5support\u0026amp%3Butm_medium=RSS",
            "https://www.cve.org/CVERecord?id=CVE-2019-9192"
          ],
          "PublishedDate": "2019-02-26T18:29:00.34Z",
          "LastModifiedDate": "2024-11-21T04:51:10.53Z"
        },
        {
          "VulnerabilityID": "CVE-2026-0861",
          "PkgID": "libc6@2.41-12",
          "PkgName": "libc6",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libc6@2.41-12?arch=amd64\u0026distro=debian-13.2",
            "UID": "50b30537de3a2779",
            "BOMRef": "pkg:deb/debian/libc6@2.41-12?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-12",
          "FixedVersion": "2.41-12+deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-0861",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:f26cd9156be3dc33d4bda777cc4a452b00ad23bfb3ecd6eab775ee674431f535",
          "Title": "glibc: Integer overflow in memalign leads to heap corruption",
          "Description": "Passing too large an alignment to the memalign suite of functions (memalign, posix_memalign, aligned_alloc) in the GNU C Library version 2.30 to 2.42 may result in an integer overflow, which could consequently result in a heap corruption.\n\nNote that the attacker must have control over both, the size as well as the alignment arguments of the memalign function to be able to exploit this.  The size parameter must be close enough to PTRDIFF_MAX so as to overflow size_t along with the large alignment argument.  This limits the malicious inputs for the alignment for memalign to the range [1\u003c\u003c62+ 1, 1\u003c\u003c63] and exactly 1\u003c\u003c63 for posix_memalign and aligned_alloc.\n\nTypically the alignment argument passed to such functions is a known constrained quantity (e.g. page size, block size, struct sizes) and is not attacker controlled, because of which this may not be easily exploitable in practice.  An application bug could potentially result in the input alignment being too large, e.g. due to a different buffer overflow or integer overflow in the application or its dependent libraries, but that is again an uncommon usage pattern given typical sources of alignments.",
          "Severity": "HIGH",
          "CweIDs": [
            "CWE-190"
          ],
          "VendorSeverity": {
            "alma": 2,
            "azure": 2,
            "cbl-mariner": 2,
            "oracle-oval": 2,
            "photon": 3,
            "redhat": 1,
            "rocky": 2,
            "ubuntu": 2
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
              "V3Score": 8.1
            }
          },
          "References": [
            "http://www.openwall.com/lists/oss-security/2026/01/16/5",
            "https://access.redhat.com/errata/RHSA-2026:2786",
            "https://access.redhat.com/security/cve/CVE-2026-0861",
            "https://bugzilla.redhat.com/2429771",
            "https://bugzilla.redhat.com/2430201",
            "https://bugzilla.redhat.com/2431196",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2429771",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430201",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2431196",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15281",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0861",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0915",
            "https://errata.almalinux.org/9/ALSA-2026-2786.html",
            "https://errata.rockylinux.org/RLSA-2026:2786",
            "https://linux.oracle.com/cve/CVE-2026-0861.html",
            "https://linux.oracle.com/errata/ELSA-2026-50120.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-0861",
            "https://sourceware.org/bugzilla/show_bug.cgi?id=33796",
            "https://sourceware.org/git/?p=glibc.git;a=blob_plain;f=advisories/GLIBC-SA-2026-0001",
            "https://ubuntu.com/security/notices/USN-8005-1",
            "https://www.cve.org/CVERecord?id=CVE-2026-0861"
          ],
          "PublishedDate": "2026-01-14T21:15:52.617Z",
          "LastModifiedDate": "2026-02-03T18:26:25.39Z"
        },
        {
          "VulnerabilityID": "CVE-2025-15281",
          "PkgID": "libc6@2.41-12",
          "PkgName": "libc6",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libc6@2.41-12?arch=amd64\u0026distro=debian-13.2",
            "UID": "50b30537de3a2779",
            "BOMRef": "pkg:deb/debian/libc6@2.41-12?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-12",
          "FixedVersion": "2.41-12+deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-15281",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:a784959e9cdf3898bfc907c190a848d9f1eb3726fb0f99e6455aa6af906d5a71",
          "Title": "glibc: wordexp with WRDE_REUSE and WRDE_APPEND may return uninitialized memory",
          "Description": "Calling wordexp with WRDE_REUSE in conjunction with WRDE_APPEND in the GNU C Library version 2.0 to version 2.42 may cause the interface to return uninitialized memory in the we_wordv member, which on subsequent calls to wordfree may abort the process.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-908"
          ],
          "VendorSeverity": {
            "alma": 2,
            "azure": 2,
            "cbl-mariner": 2,
            "oracle-oval": 2,
            "photon": 3,
            "redhat": 1,
            "rocky": 2,
            "ubuntu": 2
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 5.9
            }
          },
          "References": [
            "http://www.openwall.com/lists/oss-security/2026/01/20/3",
            "https://access.redhat.com/errata/RHSA-2026:2786",
            "https://access.redhat.com/security/cve/CVE-2025-15281",
            "https://bugzilla.redhat.com/2429771",
            "https://bugzilla.redhat.com/2430201",
            "https://bugzilla.redhat.com/2431196",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2429771",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430201",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2431196",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15281",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0861",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0915",
            "https://errata.almalinux.org/9/ALSA-2026-2786.html",
            "https://errata.rockylinux.org/RLSA-2026:2786",
            "https://linux.oracle.com/cve/CVE-2025-15281.html",
            "https://linux.oracle.com/errata/ELSA-2026-50174.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-15281",
            "https://sourceware.org/bugzilla/show_bug.cgi?id=33814",
            "https://ubuntu.com/security/notices/USN-8005-1",
            "https://www.cve.org/CVERecord?id=CVE-2025-15281",
            "https://www.openwall.com/lists/oss-security/2026/01/20/3"
          ],
          "PublishedDate": "2026-01-20T14:16:07.843Z",
          "LastModifiedDate": "2026-02-05T17:43:18.63Z"
        },
        {
          "VulnerabilityID": "CVE-2026-0915",
          "PkgID": "libc6@2.41-12",
          "PkgName": "libc6",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libc6@2.41-12?arch=amd64\u0026distro=debian-13.2",
            "UID": "50b30537de3a2779",
            "BOMRef": "pkg:deb/debian/libc6@2.41-12?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-12",
          "FixedVersion": "2.41-12+deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-0915",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:3db5b310c47480f538f11bf57263b7ebab2b2c9a256da9e62542b2be9a0d7bfa",
          "Title": "glibc: glibc: Information disclosure via zero-valued network query",
          "Description": "Calling getnetbyaddr or getnetbyaddr_r with a configured nsswitch.conf that specifies the library's DNS backend for networks and queries for a zero-valued network in the GNU C Library version 2.0 to version 2.42 can leak stack contents to the configured DNS resolver.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-908"
          ],
          "VendorSeverity": {
            "alma": 2,
            "azure": 1,
            "cbl-mariner": 2,
            "oracle-oval": 2,
            "photon": 3,
            "redhat": 2,
            "rocky": 2,
            "ubuntu": 2
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
              "V3Score": 5.3
            }
          },
          "References": [
            "http://www.openwall.com/lists/oss-security/2026/01/16/6",
            "https://access.redhat.com/errata/RHSA-2026:2786",
            "https://access.redhat.com/security/cve/CVE-2026-0915",
            "https://bugzilla.redhat.com/2429771",
            "https://bugzilla.redhat.com/2430201",
            "https://bugzilla.redhat.com/2431196",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2429771",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430201",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2431196",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15281",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0861",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0915",
            "https://errata.almalinux.org/9/ALSA-2026-2786.html",
            "https://errata.rockylinux.org/RLSA-2026:2786",
            "https://linux.oracle.com/cve/CVE-2026-0915.html",
            "https://linux.oracle.com/errata/ELSA-2026-50174.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-0915",
            "https://sourceware.org/bugzilla/show_bug.cgi?id=33802",
            "https://ubuntu.com/security/notices/USN-8005-1",
            "https://www.cve.org/CVERecord?id=CVE-2026-0915",
            "https://www.openwall.com/lists/oss-security/2026/01/16/6"
          ],
          "PublishedDate": "2026-01-15T22:16:12.457Z",
          "LastModifiedDate": "2026-01-23T19:36:50.73Z"
        },
        {
          "VulnerabilityID": "CVE-2026-4046",
          "PkgID": "libc6@2.41-12",
          "PkgName": "libc6",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libc6@2.41-12?arch=amd64\u0026distro=debian-13.2",
            "UID": "50b30537de3a2779",
            "BOMRef": "pkg:deb/debian/libc6@2.41-12?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-12",
          "Status": "fix_deferred",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-4046",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:5e469f4a4137103f9eb4117237b5ce4fc5a69e6cf32c3ecd06a74e8dc93b02d6",
          "Title": "glibc: glibc: Denial of Service via iconv() function with specific character sets",
          "Description": "The iconv() function in the GNU C Library versions 2.43 and earlier may crash due to an assertion failure when converting inputs from the IBM1390 or IBM1399 character sets, which may be used to remotely crash an application.\n\n\n\nThis vulnerability can be trivially mitigated by removing the IBM1390 and IBM1399 character sets from systems that do not need them.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-617"
          ],
          "VendorSeverity": {
            "redhat": 2
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
              "V3Score": 5.3
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-4046",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-4046",
            "https://packages.fedoraproject.org/pkgs/glibc/glibc-gconv-extra/",
            "https://sourceware.org/bugzilla/show_bug.cgi?id=33980",
            "https://sourceware.org/git/?p=glibc.git;a=blob_plain;f=advisories/GLIBC-SA-2026-0007;hb=HEAD",
            "https://www.cve.org/CVERecord?id=CVE-2026-4046"
          ],
          "PublishedDate": "2026-03-30T18:16:19.573Z",
          "LastModifiedDate": "2026-04-01T14:24:21.833Z"
        },
        {
          "VulnerabilityID": "CVE-2026-4437",
          "PkgID": "libc6@2.41-12",
          "PkgName": "libc6",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libc6@2.41-12?arch=amd64\u0026distro=debian-13.2",
            "UID": "50b30537de3a2779",
            "BOMRef": "pkg:deb/debian/libc6@2.41-12?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-12",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-4437",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:99fd4e95b01db06863b662a0e893ee528dde2de32e748acdfab18589ae5b9e6a",
          "Title": "glibc: glibc: Incorrect DNS response parsing via crafted DNS server response",
          "Description": "Calling gethostbyaddr or gethostbyaddr_r with a configured nsswitch.conf that specifies the library's DNS backend in the GNU C Library version 2.34 to version 2.43 could, with a crafted response from the configured DNS server, result in a violation of the DNS specification that causes the application to treat a non-answer section of the DNS response as a valid answer.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-125"
          ],
          "VendorSeverity": {
            "redhat": 2
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
              "V3Score": 6.5
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-4437",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-4437",
            "https://sourceware.org/bugzilla/show_bug.cgi?id=34014",
            "https://www.cve.org/CVERecord?id=CVE-2026-4437"
          ],
          "PublishedDate": "2026-03-20T20:16:49.477Z",
          "LastModifiedDate": "2026-03-23T16:16:51.537Z"
        },
        {
          "VulnerabilityID": "CVE-2026-4438",
          "PkgID": "libc6@2.41-12",
          "PkgName": "libc6",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libc6@2.41-12?arch=amd64\u0026distro=debian-13.2",
            "UID": "50b30537de3a2779",
            "BOMRef": "pkg:deb/debian/libc6@2.41-12?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-12",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-4438",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:9c2012c82551dc4377e439e647c3405128ef5e4b17564a8a46de217e8a964531",
          "Title": "glibc: glibc: Invalid DNS hostname returned via gethostbyaddr functions",
          "Description": "Calling gethostbyaddr or gethostbyaddr_r with a configured nsswitch.conf that specifies the library's DNS backend in the GNU C library version 2.34 to version 2.43 could result in an invalid DNS hostname being returned to the caller in violation of the DNS specification.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-20",
            "CWE-88"
          ],
          "VendorSeverity": {
            "redhat": 1
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
              "V3Score": 4
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-4438",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-4438",
            "https://sourceware.org/bugzilla/show_bug.cgi?id=34015",
            "https://www.cve.org/CVERecord?id=CVE-2026-4438"
          ],
          "PublishedDate": "2026-03-20T20:16:49.623Z",
          "LastModifiedDate": "2026-03-23T15:16:35.68Z"
        },
        {
          "VulnerabilityID": "CVE-2010-4756",
          "PkgID": "libc6@2.41-12",
          "PkgName": "libc6",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libc6@2.41-12?arch=amd64\u0026distro=debian-13.2",
            "UID": "50b30537de3a2779",
            "BOMRef": "pkg:deb/debian/libc6@2.41-12?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-12",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2010-4756",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:91156bb0fea7a309a682ecf5c8c0d7ad29cee3d7abbef2a2636ba504bfb2fc61",
          "Title": "glibc: glob implementation can cause excessive CPU and memory consumption due to crafted glob expressions",
          "Description": "The glob implementation in the GNU C Library (aka glibc or libc6) allows remote authenticated users to cause a denial of service (CPU and memory consumption) via crafted glob expressions that do not match any pathnames, as demonstrated by glob expressions in STAT commands to an FTP daemon, a different vulnerability than CVE-2010-2632.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-399"
          ],
          "VendorSeverity": {
            "debian": 1,
            "nvd": 2,
            "redhat": 1
          },
          "CVSS": {
            "nvd": {
              "V2Vector": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
              "V2Score": 4
            },
            "redhat": {
              "V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
              "V2Score": 5
            }
          },
          "References": [
            "http://cxib.net/stuff/glob-0day.c",
            "http://securityreason.com/achievement_securityalert/89",
            "http://securityreason.com/exploitalert/9223",
            "https://access.redhat.com/security/cve/CVE-2010-4756",
            "https://bugzilla.redhat.com/show_bug.cgi?id=681681",
            "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756",
            "https://nvd.nist.gov/vuln/detail/CVE-2010-4756",
            "https://security.netapp.com/advisory/ntap-20241108-0002/",
            "https://www.cve.org/CVERecord?id=CVE-2010-4756"
          ],
          "PublishedDate": "2011-03-02T20:00:01.037Z",
          "LastModifiedDate": "2025-11-03T22:15:41.51Z"
        },
        {
          "VulnerabilityID": "CVE-2018-20796",
          "PkgID": "libc6@2.41-12",
          "PkgName": "libc6",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libc6@2.41-12?arch=amd64\u0026distro=debian-13.2",
            "UID": "50b30537de3a2779",
            "BOMRef": "pkg:deb/debian/libc6@2.41-12?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-12",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2018-20796",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:8f490235ee88b18d0c5599e0530c114e4e7c006357d370af16ce7ff5281d7315",
          "Title": "glibc: uncontrolled recursion in function check_dst_limits_calc_pos_1 in posix/regexec.c",
          "Description": "In the GNU C Library (aka glibc or libc6) through 2.29, check_dst_limits_calc_pos_1 in posix/regexec.c has Uncontrolled Recursion, as demonstrated by '(\\227|)(\\\\1\\\\1|t1|\\\\\\2537)+' in grep.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-674"
          ],
          "VendorSeverity": {
            "cbl-mariner": 3,
            "debian": 1,
            "nvd": 3,
            "redhat": 2
          },
          "CVSS": {
            "nvd": {
              "V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
              "V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V2Score": 5,
              "V3Score": 7.5
            },
            "redhat": {
              "V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
              "V3Score": 5.3
            }
          },
          "References": [
            "http://www.securityfocus.com/bid/107160",
            "https://access.redhat.com/security/cve/CVE-2018-20796",
            "https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141",
            "https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2018-20796",
            "https://security.netapp.com/advisory/ntap-20190315-0002/",
            "https://support.f5.com/csp/article/K26346590?utm_source=f5support\u0026amp%3Butm_medium=RSS",
            "https://www.cve.org/CVERecord?id=CVE-2018-20796"
          ],
          "PublishedDate": "2019-02-26T02:29:00.45Z",
          "LastModifiedDate": "2024-11-21T04:02:11.827Z"
        },
        {
          "VulnerabilityID": "CVE-2019-1010022",
          "PkgID": "libc6@2.41-12",
          "PkgName": "libc6",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libc6@2.41-12?arch=amd64\u0026distro=debian-13.2",
            "UID": "50b30537de3a2779",
            "BOMRef": "pkg:deb/debian/libc6@2.41-12?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-12",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2019-1010022",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:9c7c011afae4c2c026e244ba6287b74227ec684423cab80943f6386e41843ed7",
          "Title": "glibc: stack guard protection bypass",
          "Description": "GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may bypass stack guard protection. The component is: nptl. The attack vector is: Exploit stack buffer overflow vulnerability and use this bypass vulnerability to bypass stack guard. NOTE: Upstream comments indicate \"this is being treated as a non-security bug and no real threat.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-119"
          ],
          "VendorSeverity": {
            "debian": 1,
            "nvd": 4
          },
          "CVSS": {
            "nvd": {
              "V2Vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
              "V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
              "V2Score": 7.5,
              "V3Score": 9.8
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2019-1010022",
            "https://nvd.nist.gov/vuln/detail/CVE-2019-1010022",
            "https://security-tracker.debian.org/tracker/CVE-2019-1010022",
            "https://sourceware.org/bugzilla/show_bug.cgi?id=22850",
            "https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3",
            "https://ubuntu.com/security/CVE-2019-1010022",
            "https://www.cve.org/CVERecord?id=CVE-2019-1010022"
          ],
          "PublishedDate": "2019-07-15T04:15:13.317Z",
          "LastModifiedDate": "2024-11-21T04:17:55.5Z"
        },
        {
          "VulnerabilityID": "CVE-2019-1010023",
          "PkgID": "libc6@2.41-12",
          "PkgName": "libc6",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libc6@2.41-12?arch=amd64\u0026distro=debian-13.2",
            "UID": "50b30537de3a2779",
            "BOMRef": "pkg:deb/debian/libc6@2.41-12?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-12",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2019-1010023",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:1cfaf61de28658b3f945389b53c4b7774dba42df0ee5a587074067144e261f71",
          "Title": "glibc: running ldd on malicious ELF leads to code execution because of wrong size computation",
          "Description": "GNU Libc current is affected by: Re-mapping current loaded library with malicious ELF file. The impact is: In worst case attacker may evaluate privileges. The component is: libld. The attack vector is: Attacker sends 2 ELF files to victim and asks to run ldd on it. ldd execute code. NOTE: Upstream comments indicate \"this is being treated as a non-security bug and no real threat.",
          "Severity": "LOW",
          "VendorSeverity": {
            "debian": 1,
            "nvd": 3,
            "redhat": 1
          },
          "CVSS": {
            "nvd": {
              "V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
              "V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
              "V2Score": 6.8,
              "V3Score": 8.8
            },
            "redhat": {
              "V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
              "V3Score": 7.8
            }
          },
          "References": [
            "http://www.securityfocus.com/bid/109167",
            "https://access.redhat.com/security/cve/CVE-2019-1010023",
            "https://nvd.nist.gov/vuln/detail/CVE-2019-1010023",
            "https://security-tracker.debian.org/tracker/CVE-2019-1010023",
            "https://sourceware.org/bugzilla/show_bug.cgi?id=22851",
            "https://support.f5.com/csp/article/K11932200?utm_source=f5support\u0026amp%3Butm_medium=RSS",
            "https://ubuntu.com/security/CVE-2019-1010023",
            "https://www.cve.org/CVERecord?id=CVE-2019-1010023"
          ],
          "PublishedDate": "2019-07-15T04:15:13.397Z",
          "LastModifiedDate": "2024-11-21T04:17:55.643Z"
        },
        {
          "VulnerabilityID": "CVE-2019-1010024",
          "PkgID": "libc6@2.41-12",
          "PkgName": "libc6",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libc6@2.41-12?arch=amd64\u0026distro=debian-13.2",
            "UID": "50b30537de3a2779",
            "BOMRef": "pkg:deb/debian/libc6@2.41-12?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-12",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2019-1010024",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:4d365cc962e82f8ceb8965f25d0d4835357ee9f6430ae991c1419e38efd20fa0",
          "Title": "glibc: ASLR bypass using cache of thread stack and heap",
          "Description": "GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may bypass ASLR using cache of thread stack and heap. The component is: glibc. NOTE: Upstream comments indicate \"this is being treated as a non-security bug and no real threat.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-200"
          ],
          "VendorSeverity": {
            "debian": 1,
            "nvd": 2,
            "redhat": 2
          },
          "CVSS": {
            "nvd": {
              "V2Vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
              "V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
              "V2Score": 5,
              "V3Score": 5.3
            },
            "redhat": {
              "V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
              "V3Score": 5.3
            }
          },
          "References": [
            "http://www.securityfocus.com/bid/109162",
            "https://access.redhat.com/security/cve/CVE-2019-1010024",
            "https://nvd.nist.gov/vuln/detail/CVE-2019-1010024",
            "https://security-tracker.debian.org/tracker/CVE-2019-1010024",
            "https://sourceware.org/bugzilla/show_bug.cgi?id=22852",
            "https://support.f5.com/csp/article/K06046097",
            "https://support.f5.com/csp/article/K06046097?utm_source=f5support\u0026amp%3Butm_medium=RSS",
            "https://ubuntu.com/security/CVE-2019-1010024",
            "https://www.cve.org/CVERecord?id=CVE-2019-1010024"
          ],
          "PublishedDate": "2019-07-15T04:15:13.473Z",
          "LastModifiedDate": "2024-11-21T04:17:55.843Z"
        },
        {
          "VulnerabilityID": "CVE-2019-1010025",
          "PkgID": "libc6@2.41-12",
          "PkgName": "libc6",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libc6@2.41-12?arch=amd64\u0026distro=debian-13.2",
            "UID": "50b30537de3a2779",
            "BOMRef": "pkg:deb/debian/libc6@2.41-12?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-12",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2019-1010025",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:af1d2b95b1c7b4cc36392910ed6b61ebbe467bbc10052be5898215a15f12d921",
          "Title": "glibc: information disclosure of heap addresses of pthread_created thread",
          "Description": "GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may guess the heap addresses of pthread_created thread. The component is: glibc. NOTE: the vendor's position is \"ASLR bypass itself is not a vulnerability.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-330"
          ],
          "VendorSeverity": {
            "debian": 1,
            "nvd": 2,
            "redhat": 1
          },
          "CVSS": {
            "nvd": {
              "V2Vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
              "V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
              "V2Score": 5,
              "V3Score": 5.3
            },
            "redhat": {
              "V3Vector": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
              "V3Score": 2.9
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2019-1010025",
            "https://nvd.nist.gov/vuln/detail/CVE-2019-1010025",
            "https://security-tracker.debian.org/tracker/CVE-2019-1010025",
            "https://sourceware.org/bugzilla/show_bug.cgi?id=22853",
            "https://support.f5.com/csp/article/K06046097",
            "https://support.f5.com/csp/article/K06046097?utm_source=f5support\u0026amp%3Butm_medium=RSS",
            "https://ubuntu.com/security/CVE-2019-1010025",
            "https://www.cve.org/CVERecord?id=CVE-2019-1010025"
          ],
          "PublishedDate": "2019-07-15T04:15:13.537Z",
          "LastModifiedDate": "2024-11-21T04:17:55.96Z"
        },
        {
          "VulnerabilityID": "CVE-2019-9192",
          "PkgID": "libc6@2.41-12",
          "PkgName": "libc6",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libc6@2.41-12?arch=amd64\u0026distro=debian-13.2",
            "UID": "50b30537de3a2779",
            "BOMRef": "pkg:deb/debian/libc6@2.41-12?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-12",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2019-9192",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:236e0bd5303cffe27ca78980f0cdb99aab969a19e53a499a51e85e71607bcbab",
          "Title": "glibc: uncontrolled recursion in function check_dst_limits_calc_pos_1 in posix/regexec.c",
          "Description": "In the GNU C Library (aka glibc or libc6) through 2.29, check_dst_limits_calc_pos_1 in posix/regexec.c has Uncontrolled Recursion, as demonstrated by '(|)(\\\\1\\\\1)*' in grep, a different issue than CVE-2018-20796. NOTE: the software maintainer disputes that this is a vulnerability because the behavior occurs only with a crafted pattern",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-674"
          ],
          "VendorSeverity": {
            "cbl-mariner": 3,
            "debian": 1,
            "nvd": 3,
            "redhat": 1
          },
          "CVSS": {
            "nvd": {
              "V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
              "V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V2Score": 5,
              "V3Score": 7.5
            },
            "redhat": {
              "V3Vector": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L",
              "V3Score": 2.8
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2019-9192",
            "https://nvd.nist.gov/vuln/detail/CVE-2019-9192",
            "https://sourceware.org/bugzilla/show_bug.cgi?id=24269",
            "https://support.f5.com/csp/article/K26346590?utm_source=f5support\u0026amp%3Butm_medium=RSS",
            "https://www.cve.org/CVERecord?id=CVE-2019-9192"
          ],
          "PublishedDate": "2019-02-26T18:29:00.34Z",
          "LastModifiedDate": "2024-11-21T04:51:10.53Z"
        },
        {
          "VulnerabilityID": "CVE-2022-0563",
          "PkgID": "liblastlog2-2@2.41-5",
          "PkgName": "liblastlog2-2",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/liblastlog2-2@2.41-5?arch=amd64\u0026distro=debian-13.2",
            "UID": "be208d50d959d331",
            "BOMRef": "pkg:deb/debian/liblastlog2-2@2.41-5?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-5",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-0563",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:9214c44eaba43406c1e58463040512897a7c04e093497eee67fba8c281d52d47",
          "Title": "util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline",
          "Description": "A flaw was found in the util-linux chfn and chsh utilities when compiled with Readline support. The Readline library uses an \"INPUTRC\" environment variable to get a path to the library config file. When the library cannot parse the specified file, it prints an error message containing data from the file. This flaw allows an unprivileged user to read root-owned files, potentially leading to privilege escalation. This flaw affects util-linux versions prior to 2.37.4.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-209"
          ],
          "VendorSeverity": {
            "amazon": 2,
            "cbl-mariner": 2,
            "debian": 1,
            "nvd": 2,
            "photon": 2,
            "redhat": 2
          },
          "CVSS": {
            "nvd": {
              "V2Vector": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
              "V2Score": 1.9,
              "V3Score": 5.5
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
              "V3Score": 5.5
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2022-0563",
            "https://blog.trailofbits.com/2023/02/16/suid-logic-bug-linux-readline/",
            "https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w%40ws.net.home/T/#u",
            "https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u",
            "https://nvd.nist.gov/vuln/detail/CVE-2022-0563",
            "https://security.gentoo.org/glsa/202401-08",
            "https://security.netapp.com/advisory/ntap-20220331-0002/",
            "https://www.cve.org/CVERecord?id=CVE-2022-0563"
          ],
          "PublishedDate": "2022-02-21T19:15:08.393Z",
          "LastModifiedDate": "2025-06-09T16:15:33.237Z"
        },
        {
          "VulnerabilityID": "CVE-2025-14104",
          "PkgID": "liblastlog2-2@2.41-5",
          "PkgName": "liblastlog2-2",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/liblastlog2-2@2.41-5?arch=amd64\u0026distro=debian-13.2",
            "UID": "be208d50d959d331",
            "BOMRef": "pkg:deb/debian/liblastlog2-2@2.41-5?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-5",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-14104",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:8c0acf1cfe76c2be132af4279d9ea97faac54198fa738e86a81a22fa99f8338f",
          "Title": "util-linux: util-linux: Heap buffer overread in setpwnam() when processing 256-byte usernames",
          "Description": "A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-125"
          ],
          "VendorSeverity": {
            "alma": 2,
            "azure": 2,
            "cbl-mariner": 2,
            "debian": 1,
            "oracle-oval": 2,
            "photon": 2,
            "redhat": 2,
            "rocky": 2
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
              "V3Score": 6.1
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:1696",
            "https://access.redhat.com/errata/RHSA-2026:1852",
            "https://access.redhat.com/errata/RHSA-2026:1913",
            "https://access.redhat.com/errata/RHSA-2026:2485",
            "https://access.redhat.com/errata/RHSA-2026:2563",
            "https://access.redhat.com/errata/RHSA-2026:2737",
            "https://access.redhat.com/errata/RHSA-2026:2800",
            "https://access.redhat.com/errata/RHSA-2026:3406",
            "https://access.redhat.com/errata/RHSA-2026:4943",
            "https://access.redhat.com/security/cve/CVE-2025-14104",
            "https://bugzilla.redhat.com/2419369",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2419369",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14104",
            "https://errata.almalinux.org/9/ALSA-2026-1913.html",
            "https://errata.rockylinux.org/RLSA-2026:1913",
            "https://linux.oracle.com/cve/CVE-2025-14104.html",
            "https://linux.oracle.com/errata/ELSA-2026-1913.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-14104",
            "https://www.cve.org/CVERecord?id=CVE-2025-14104"
          ],
          "PublishedDate": "2025-12-05T17:16:03.117Z",
          "LastModifiedDate": "2026-03-18T17:16:03.817Z"
        },
        {
          "VulnerabilityID": "CVE-2026-3184",
          "PkgID": "liblastlog2-2@2.41-5",
          "PkgName": "liblastlog2-2",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/liblastlog2-2@2.41-5?arch=amd64\u0026distro=debian-13.2",
            "UID": "be208d50d959d331",
            "BOMRef": "pkg:deb/debian/liblastlog2-2@2.41-5?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-5",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-3184",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:d2ee779e779df12afebc4211e48afd3a3b7cfb65cca86972030be3ae168d2847",
          "Title": "util-linux: util-linux: Access control bypass due to improper hostname canonicalization",
          "Description": "A flaw was found in util-linux. Improper hostname canonicalization in the `login(1)` utility, when invoked with the `-h` option, can modify the supplied remote hostname before setting `PAM_RHOST`. A remote attacker could exploit this by providing a specially crafted hostname, potentially bypassing host-based Pluggable Authentication Modules (PAM) access control rules that rely on fully qualified domain names. This could lead to unauthorized access.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-289"
          ],
          "VendorSeverity": {
            "redhat": 1,
            "ubuntu": 2
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
              "V3Score": 3.7
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-3184",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2442570",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-3184",
            "https://www.cve.org/CVERecord?id=CVE-2026-3184"
          ],
          "PublishedDate": "2026-04-03T19:17:23.377Z",
          "LastModifiedDate": "2026-04-03T19:17:23.377Z"
        },
        {
          "VulnerabilityID": "CVE-2026-27456",
          "PkgID": "liblastlog2-2@2.41-5",
          "PkgName": "liblastlog2-2",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/liblastlog2-2@2.41-5?arch=amd64\u0026distro=debian-13.2",
            "UID": "be208d50d959d331",
            "BOMRef": "pkg:deb/debian/liblastlog2-2@2.41-5?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-5",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-27456",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:d35453211dab2d831c81eee65c94e0b1b13c0e07aace44895f994b5646790239",
          "Title": "[util-linux: mount(8) TOCTOU symlink attack via loop device]",
          "Description": "util-linux is a random collection of Linux utilities. Prior to version 2.41.4, a TOCTOU (Time-of-Check-Time-of-Use) vulnerability has been identified in the SUID binary /usr/bin/mount from util-linux. The mount binary, when setting up loop devices, validates the source file path with user privileges via fork() + setuid() + realpath(), but subsequently re-canonicalizes and opens it with root privileges (euid=0) without verifying that the path has not been replaced between both operations. Neither O_NOFOLLOW, nor inode comparison, nor post-open fstat() are employed. This allows a local unprivileged user to replace the source file with a symlink pointing to any root-owned file or device during the race window, causing the SUID binary to open and mount it as root. Exploitation requires an /etc/fstab entry with user,loop options whose path points to a directory where the attacker has write permission, and that /usr/bin/mount has the SUID bit set (the default configuration on virtually all Linux distributions). The impact is unauthorized read access to root-protected files and block devices, including backup images, disk volumes, and any file containing a valid filesystem. This issue has been patched in version 2.41.4.",
          "Severity": "UNKNOWN",
          "CweIDs": [
            "CWE-59",
            "CWE-269",
            "CWE-367"
          ],
          "References": [
            "https://github.com/util-linux/util-linux/commit/5e390467b26a3cf3fecc04e1a0d482dff3162fc4",
            "https://github.com/util-linux/util-linux/releases/tag/v2.41.4",
            "https://github.com/util-linux/util-linux/security/advisories/GHSA-qq4x-vfq4-9h9g"
          ],
          "PublishedDate": "2026-04-03T22:16:25.4Z",
          "LastModifiedDate": "2026-04-03T22:16:25.4Z"
        },
        {
          "VulnerabilityID": "CVE-2026-34743",
          "PkgID": "liblzma5@5.8.1-1",
          "PkgName": "liblzma5",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/liblzma5@5.8.1-1?arch=amd64\u0026distro=debian-13.2",
            "UID": "f052fbd7bc792d7b",
            "BOMRef": "pkg:deb/debian/liblzma5@5.8.1-1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "5.8.1-1",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-34743",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:34a007913c79bd8c082b8ec2251c61305ff5efcb60177fab6232ef43951a28ef",
          "Title": "xz: XZ Utils: Denial of Service via buffer overflow in index decoding",
          "Description": "XZ Utils provide a general-purpose data-compression library plus command-line tools. Prior to version 5.8.3, if lzma_index_decoder() was used to decode an Index that contained no Records, the resulting lzma_index was left in a state where where a subsequent lzma_index_append() would allocate too little memory, and a buffer overflow would occur. This issue has been patched in version 5.8.3.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-122"
          ],
          "VendorSeverity": {
            "redhat": 2
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
              "V3Score": 5.3
            }
          },
          "References": [
            "http://www.openwall.com/lists/oss-security/2026/03/31/13",
            "https://access.redhat.com/security/cve/CVE-2026-34743",
            "https://github.com/tukaani-project/xz/commit/c8c22869e780ff57c96b46939c3d79ff99395f87",
            "https://github.com/tukaani-project/xz/releases/tag/v5.8.3",
            "https://github.com/tukaani-project/xz/security/advisories/GHSA-x872-m794-cxhv",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-34743",
            "https://www.cve.org/CVERecord?id=CVE-2026-34743"
          ],
          "PublishedDate": "2026-04-02T19:21:33.187Z",
          "LastModifiedDate": "2026-04-03T16:10:23.73Z"
        },
        {
          "VulnerabilityID": "CVE-2022-0563",
          "PkgID": "libmount1@2.41-5",
          "PkgName": "libmount1",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libmount1@2.41-5?arch=amd64\u0026distro=debian-13.2",
            "UID": "f327b371eee8bbed",
            "BOMRef": "pkg:deb/debian/libmount1@2.41-5?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-5",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-0563",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:157f52802fa56c35f016686127eaade7a23af75adfb74cfa4d39e5a8acafc4bb",
          "Title": "util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline",
          "Description": "A flaw was found in the util-linux chfn and chsh utilities when compiled with Readline support. The Readline library uses an \"INPUTRC\" environment variable to get a path to the library config file. When the library cannot parse the specified file, it prints an error message containing data from the file. This flaw allows an unprivileged user to read root-owned files, potentially leading to privilege escalation. This flaw affects util-linux versions prior to 2.37.4.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-209"
          ],
          "VendorSeverity": {
            "amazon": 2,
            "cbl-mariner": 2,
            "debian": 1,
            "nvd": 2,
            "photon": 2,
            "redhat": 2
          },
          "CVSS": {
            "nvd": {
              "V2Vector": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
              "V2Score": 1.9,
              "V3Score": 5.5
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
              "V3Score": 5.5
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2022-0563",
            "https://blog.trailofbits.com/2023/02/16/suid-logic-bug-linux-readline/",
            "https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w%40ws.net.home/T/#u",
            "https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u",
            "https://nvd.nist.gov/vuln/detail/CVE-2022-0563",
            "https://security.gentoo.org/glsa/202401-08",
            "https://security.netapp.com/advisory/ntap-20220331-0002/",
            "https://www.cve.org/CVERecord?id=CVE-2022-0563"
          ],
          "PublishedDate": "2022-02-21T19:15:08.393Z",
          "LastModifiedDate": "2025-06-09T16:15:33.237Z"
        },
        {
          "VulnerabilityID": "CVE-2025-14104",
          "PkgID": "libmount1@2.41-5",
          "PkgName": "libmount1",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libmount1@2.41-5?arch=amd64\u0026distro=debian-13.2",
            "UID": "f327b371eee8bbed",
            "BOMRef": "pkg:deb/debian/libmount1@2.41-5?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-5",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-14104",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:1df0fb85173922b2355d30a844bd944aa075fc70848bd74596911691738a70ed",
          "Title": "util-linux: util-linux: Heap buffer overread in setpwnam() when processing 256-byte usernames",
          "Description": "A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-125"
          ],
          "VendorSeverity": {
            "alma": 2,
            "azure": 2,
            "cbl-mariner": 2,
            "debian": 1,
            "oracle-oval": 2,
            "photon": 2,
            "redhat": 2,
            "rocky": 2
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
              "V3Score": 6.1
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:1696",
            "https://access.redhat.com/errata/RHSA-2026:1852",
            "https://access.redhat.com/errata/RHSA-2026:1913",
            "https://access.redhat.com/errata/RHSA-2026:2485",
            "https://access.redhat.com/errata/RHSA-2026:2563",
            "https://access.redhat.com/errata/RHSA-2026:2737",
            "https://access.redhat.com/errata/RHSA-2026:2800",
            "https://access.redhat.com/errata/RHSA-2026:3406",
            "https://access.redhat.com/errata/RHSA-2026:4943",
            "https://access.redhat.com/security/cve/CVE-2025-14104",
            "https://bugzilla.redhat.com/2419369",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2419369",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14104",
            "https://errata.almalinux.org/9/ALSA-2026-1913.html",
            "https://errata.rockylinux.org/RLSA-2026:1913",
            "https://linux.oracle.com/cve/CVE-2025-14104.html",
            "https://linux.oracle.com/errata/ELSA-2026-1913.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-14104",
            "https://www.cve.org/CVERecord?id=CVE-2025-14104"
          ],
          "PublishedDate": "2025-12-05T17:16:03.117Z",
          "LastModifiedDate": "2026-03-18T17:16:03.817Z"
        },
        {
          "VulnerabilityID": "CVE-2026-3184",
          "PkgID": "libmount1@2.41-5",
          "PkgName": "libmount1",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libmount1@2.41-5?arch=amd64\u0026distro=debian-13.2",
            "UID": "f327b371eee8bbed",
            "BOMRef": "pkg:deb/debian/libmount1@2.41-5?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-5",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-3184",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:941948badabe767b8e81912092534c6b51767c8c5eb0277c7b2977ed7b81039d",
          "Title": "util-linux: util-linux: Access control bypass due to improper hostname canonicalization",
          "Description": "A flaw was found in util-linux. Improper hostname canonicalization in the `login(1)` utility, when invoked with the `-h` option, can modify the supplied remote hostname before setting `PAM_RHOST`. A remote attacker could exploit this by providing a specially crafted hostname, potentially bypassing host-based Pluggable Authentication Modules (PAM) access control rules that rely on fully qualified domain names. This could lead to unauthorized access.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-289"
          ],
          "VendorSeverity": {
            "redhat": 1,
            "ubuntu": 2
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
              "V3Score": 3.7
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-3184",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2442570",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-3184",
            "https://www.cve.org/CVERecord?id=CVE-2026-3184"
          ],
          "PublishedDate": "2026-04-03T19:17:23.377Z",
          "LastModifiedDate": "2026-04-03T19:17:23.377Z"
        },
        {
          "VulnerabilityID": "CVE-2026-27456",
          "PkgID": "libmount1@2.41-5",
          "PkgName": "libmount1",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libmount1@2.41-5?arch=amd64\u0026distro=debian-13.2",
            "UID": "f327b371eee8bbed",
            "BOMRef": "pkg:deb/debian/libmount1@2.41-5?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-5",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-27456",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:bfb3e1cf06b718975d83f86da8a429ac565457783c6666fd4d76e9b2cb1322d3",
          "Title": "[util-linux: mount(8) TOCTOU symlink attack via loop device]",
          "Description": "util-linux is a random collection of Linux utilities. Prior to version 2.41.4, a TOCTOU (Time-of-Check-Time-of-Use) vulnerability has been identified in the SUID binary /usr/bin/mount from util-linux. The mount binary, when setting up loop devices, validates the source file path with user privileges via fork() + setuid() + realpath(), but subsequently re-canonicalizes and opens it with root privileges (euid=0) without verifying that the path has not been replaced between both operations. Neither O_NOFOLLOW, nor inode comparison, nor post-open fstat() are employed. This allows a local unprivileged user to replace the source file with a symlink pointing to any root-owned file or device during the race window, causing the SUID binary to open and mount it as root. Exploitation requires an /etc/fstab entry with user,loop options whose path points to a directory where the attacker has write permission, and that /usr/bin/mount has the SUID bit set (the default configuration on virtually all Linux distributions). The impact is unauthorized read access to root-protected files and block devices, including backup images, disk volumes, and any file containing a valid filesystem. This issue has been patched in version 2.41.4.",
          "Severity": "UNKNOWN",
          "CweIDs": [
            "CWE-59",
            "CWE-269",
            "CWE-367"
          ],
          "References": [
            "https://github.com/util-linux/util-linux/commit/5e390467b26a3cf3fecc04e1a0d482dff3162fc4",
            "https://github.com/util-linux/util-linux/releases/tag/v2.41.4",
            "https://github.com/util-linux/util-linux/security/advisories/GHSA-qq4x-vfq4-9h9g"
          ],
          "PublishedDate": "2026-04-03T22:16:25.4Z",
          "LastModifiedDate": "2026-04-03T22:16:25.4Z"
        },
        {
          "VulnerabilityID": "CVE-2022-0563",
          "PkgID": "libsmartcols1@2.41-5",
          "PkgName": "libsmartcols1",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libsmartcols1@2.41-5?arch=amd64\u0026distro=debian-13.2",
            "UID": "7e25608c202b3108",
            "BOMRef": "pkg:deb/debian/libsmartcols1@2.41-5?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-5",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-0563",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:4803c4a55aaa55580430e0beb6b6eb96bbd88d91ad63ee82f74ae0df2b9b2ec1",
          "Title": "util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline",
          "Description": "A flaw was found in the util-linux chfn and chsh utilities when compiled with Readline support. The Readline library uses an \"INPUTRC\" environment variable to get a path to the library config file. When the library cannot parse the specified file, it prints an error message containing data from the file. This flaw allows an unprivileged user to read root-owned files, potentially leading to privilege escalation. This flaw affects util-linux versions prior to 2.37.4.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-209"
          ],
          "VendorSeverity": {
            "amazon": 2,
            "cbl-mariner": 2,
            "debian": 1,
            "nvd": 2,
            "photon": 2,
            "redhat": 2
          },
          "CVSS": {
            "nvd": {
              "V2Vector": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
              "V2Score": 1.9,
              "V3Score": 5.5
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
              "V3Score": 5.5
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2022-0563",
            "https://blog.trailofbits.com/2023/02/16/suid-logic-bug-linux-readline/",
            "https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w%40ws.net.home/T/#u",
            "https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u",
            "https://nvd.nist.gov/vuln/detail/CVE-2022-0563",
            "https://security.gentoo.org/glsa/202401-08",
            "https://security.netapp.com/advisory/ntap-20220331-0002/",
            "https://www.cve.org/CVERecord?id=CVE-2022-0563"
          ],
          "PublishedDate": "2022-02-21T19:15:08.393Z",
          "LastModifiedDate": "2025-06-09T16:15:33.237Z"
        },
        {
          "VulnerabilityID": "CVE-2025-14104",
          "PkgID": "libsmartcols1@2.41-5",
          "PkgName": "libsmartcols1",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libsmartcols1@2.41-5?arch=amd64\u0026distro=debian-13.2",
            "UID": "7e25608c202b3108",
            "BOMRef": "pkg:deb/debian/libsmartcols1@2.41-5?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-5",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-14104",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:e2ee05159d8d615e578d0acb976c7a8dfb2ee9e457bfeccd8f908f6d56e62fb8",
          "Title": "util-linux: util-linux: Heap buffer overread in setpwnam() when processing 256-byte usernames",
          "Description": "A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-125"
          ],
          "VendorSeverity": {
            "alma": 2,
            "azure": 2,
            "cbl-mariner": 2,
            "debian": 1,
            "oracle-oval": 2,
            "photon": 2,
            "redhat": 2,
            "rocky": 2
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
              "V3Score": 6.1
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:1696",
            "https://access.redhat.com/errata/RHSA-2026:1852",
            "https://access.redhat.com/errata/RHSA-2026:1913",
            "https://access.redhat.com/errata/RHSA-2026:2485",
            "https://access.redhat.com/errata/RHSA-2026:2563",
            "https://access.redhat.com/errata/RHSA-2026:2737",
            "https://access.redhat.com/errata/RHSA-2026:2800",
            "https://access.redhat.com/errata/RHSA-2026:3406",
            "https://access.redhat.com/errata/RHSA-2026:4943",
            "https://access.redhat.com/security/cve/CVE-2025-14104",
            "https://bugzilla.redhat.com/2419369",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2419369",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14104",
            "https://errata.almalinux.org/9/ALSA-2026-1913.html",
            "https://errata.rockylinux.org/RLSA-2026:1913",
            "https://linux.oracle.com/cve/CVE-2025-14104.html",
            "https://linux.oracle.com/errata/ELSA-2026-1913.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-14104",
            "https://www.cve.org/CVERecord?id=CVE-2025-14104"
          ],
          "PublishedDate": "2025-12-05T17:16:03.117Z",
          "LastModifiedDate": "2026-03-18T17:16:03.817Z"
        },
        {
          "VulnerabilityID": "CVE-2026-3184",
          "PkgID": "libsmartcols1@2.41-5",
          "PkgName": "libsmartcols1",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libsmartcols1@2.41-5?arch=amd64\u0026distro=debian-13.2",
            "UID": "7e25608c202b3108",
            "BOMRef": "pkg:deb/debian/libsmartcols1@2.41-5?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-5",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-3184",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:4ac35bcc14339d17e401adda70e3dd5005b61db7f6d396d71f3ba93ce1e02f2c",
          "Title": "util-linux: util-linux: Access control bypass due to improper hostname canonicalization",
          "Description": "A flaw was found in util-linux. Improper hostname canonicalization in the `login(1)` utility, when invoked with the `-h` option, can modify the supplied remote hostname before setting `PAM_RHOST`. A remote attacker could exploit this by providing a specially crafted hostname, potentially bypassing host-based Pluggable Authentication Modules (PAM) access control rules that rely on fully qualified domain names. This could lead to unauthorized access.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-289"
          ],
          "VendorSeverity": {
            "redhat": 1,
            "ubuntu": 2
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
              "V3Score": 3.7
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-3184",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2442570",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-3184",
            "https://www.cve.org/CVERecord?id=CVE-2026-3184"
          ],
          "PublishedDate": "2026-04-03T19:17:23.377Z",
          "LastModifiedDate": "2026-04-03T19:17:23.377Z"
        },
        {
          "VulnerabilityID": "CVE-2026-27456",
          "PkgID": "libsmartcols1@2.41-5",
          "PkgName": "libsmartcols1",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libsmartcols1@2.41-5?arch=amd64\u0026distro=debian-13.2",
            "UID": "7e25608c202b3108",
            "BOMRef": "pkg:deb/debian/libsmartcols1@2.41-5?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-5",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-27456",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:e6f5d1fb429d2cae65c930bd61acedbb23d4c1f9841d8840313056de0f95f89c",
          "Title": "[util-linux: mount(8) TOCTOU symlink attack via loop device]",
          "Description": "util-linux is a random collection of Linux utilities. Prior to version 2.41.4, a TOCTOU (Time-of-Check-Time-of-Use) vulnerability has been identified in the SUID binary /usr/bin/mount from util-linux. The mount binary, when setting up loop devices, validates the source file path with user privileges via fork() + setuid() + realpath(), but subsequently re-canonicalizes and opens it with root privileges (euid=0) without verifying that the path has not been replaced between both operations. Neither O_NOFOLLOW, nor inode comparison, nor post-open fstat() are employed. This allows a local unprivileged user to replace the source file with a symlink pointing to any root-owned file or device during the race window, causing the SUID binary to open and mount it as root. Exploitation requires an /etc/fstab entry with user,loop options whose path points to a directory where the attacker has write permission, and that /usr/bin/mount has the SUID bit set (the default configuration on virtually all Linux distributions). The impact is unauthorized read access to root-protected files and block devices, including backup images, disk volumes, and any file containing a valid filesystem. This issue has been patched in version 2.41.4.",
          "Severity": "UNKNOWN",
          "CweIDs": [
            "CWE-59",
            "CWE-269",
            "CWE-367"
          ],
          "References": [
            "https://github.com/util-linux/util-linux/commit/5e390467b26a3cf3fecc04e1a0d482dff3162fc4",
            "https://github.com/util-linux/util-linux/releases/tag/v2.41.4",
            "https://github.com/util-linux/util-linux/security/advisories/GHSA-qq4x-vfq4-9h9g"
          ],
          "PublishedDate": "2026-04-03T22:16:25.4Z",
          "LastModifiedDate": "2026-04-03T22:16:25.4Z"
        },
        {
          "VulnerabilityID": "CVE-2025-7709",
          "PkgID": "libsqlite3-0@3.46.1-7",
          "PkgName": "libsqlite3-0",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libsqlite3-0@3.46.1-7?arch=amd64\u0026distro=debian-13.2",
            "UID": "e26dcea38497a113",
            "BOMRef": "pkg:deb/debian/libsqlite3-0@3.46.1-7?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.46.1-7",
          "FixedVersion": "3.46.1-7+deb13u1",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-7709",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:e4a6a193390db7c884b70f256a33bc69d89cf187f536e8f2209cc3302dfcb696",
          "Title": "An integer overflow exists in the  FTS5 https://sqlite.org/fts5.html e ...",
          "Description": "An integer overflow exists in the  FTS5 https://sqlite.org/fts5.html  extension. It occurs when the size of an array of tombstone pointers is calculated and truncated into a 32-bit integer. A pointer to partially controlled data can then be written out of bounds.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-190"
          ],
          "VendorSeverity": {
            "photon": 3,
            "ubuntu": 2
          },
          "References": [
            "http://www.openwall.com/lists/oss-security/2025/09/06/2",
            "http://www.openwall.com/lists/oss-security/2025/11/18/10",
            "https://github.com/google/security-research/security/advisories/GHSA-v2c8-vqqp-hv3g",
            "https://ubuntu.com/security/notices/USN-7751-1",
            "https://www.cve.org/CVERecord?id=CVE-2025-7709"
          ],
          "PublishedDate": "2025-09-08T15:15:38.18Z",
          "LastModifiedDate": "2025-11-18T23:15:58.5Z"
        },
        {
          "VulnerabilityID": "CVE-2021-45346",
          "PkgID": "libsqlite3-0@3.46.1-7",
          "PkgName": "libsqlite3-0",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libsqlite3-0@3.46.1-7?arch=amd64\u0026distro=debian-13.2",
            "UID": "e26dcea38497a113",
            "BOMRef": "pkg:deb/debian/libsqlite3-0@3.46.1-7?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.46.1-7",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-45346",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:42a2677f2833de7877aa05a0d46ee0e16ec8d9ce8292ca443ceb106ce4409169",
          "Title": "sqlite: crafted SQL query allows a malicious user to obtain sensitive information",
          "Description": "A Memory Leak vulnerability exists in SQLite Project SQLite3 3.35.1 and 3.37.0 via maliciously crafted SQL Queries (made via editing the Database File), it is possible to query a record, and leak subsequent bytes of memory that extend beyond the record, which could let a malicious user obtain sensitive information. NOTE: The developer disputes this as a vulnerability stating that If you give SQLite a corrupted database file and submit a query against the database, it might read parts of the database that you did not intend or expect.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-401"
          ],
          "VendorSeverity": {
            "bitnami": 2,
            "debian": 1,
            "nvd": 2,
            "redhat": 1
          },
          "CVSS": {
            "bitnami": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
              "V3Score": 4.3
            },
            "nvd": {
              "V2Vector": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
              "V2Score": 4,
              "V3Score": 4.3
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
              "V3Score": 4.3
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2021-45346",
            "https://github.com/guyinatuxedo/sqlite3_record_leaking",
            "https://nvd.nist.gov/vuln/detail/CVE-2021-45346",
            "https://security.netapp.com/advisory/ntap-20220303-0001/",
            "https://sqlite.org/forum/forumpost/056d557c2f8c452ed5",
            "https://sqlite.org/forum/forumpost/53de8864ba114bf6",
            "https://www.cve.org/CVERecord?id=CVE-2021-45346",
            "https://www.sqlite.org/cves.html#status_of_recent_sqlite_cves"
          ],
          "PublishedDate": "2022-02-14T19:15:07.793Z",
          "LastModifiedDate": "2024-11-21T06:32:07.577Z"
        },
        {
          "VulnerabilityID": "CVE-2025-70873",
          "PkgID": "libsqlite3-0@3.46.1-7",
          "PkgName": "libsqlite3-0",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libsqlite3-0@3.46.1-7?arch=amd64\u0026distro=debian-13.2",
            "UID": "e26dcea38497a113",
            "BOMRef": "pkg:deb/debian/libsqlite3-0@3.46.1-7?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.46.1-7",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-70873",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:27624ba364587a88a0e8d3571f47cc882daaf76e2a7a60f224df5edc39607752",
          "Title": "sqlite: SQLite: Information Disclosure via Crafted ZIP File",
          "Description": "An information disclosure issue in the zipfileInflate function in the zipfile extension in SQLite v3.51.1 and earlier allows attackers to obtain heap memory via supplying a crafted ZIP file.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-244"
          ],
          "VendorSeverity": {
            "debian": 1,
            "photon": 3,
            "redhat": 1
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
              "V3Score": 3.3
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2025-70873",
            "https://gist.github.com/cnwangjihe/f496393f30f5ecec5b18c8f5ab072054",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-70873",
            "https://sqlite.org/forum/forumpost/761eac3c82",
            "https://sqlite.org/src/info/3d459f1fb1bd1b5e",
            "https://www.cve.org/CVERecord?id=CVE-2025-70873"
          ],
          "PublishedDate": "2026-03-12T19:16:15.933Z",
          "LastModifiedDate": "2026-03-16T14:18:02.437Z"
        },
        {
          "VulnerabilityID": "CVE-2025-15467",
          "VendorIDs": [
            "DSA-6113-1"
          ],
          "PkgID": "libssl3t64@3.5.4-1~deb13u1",
          "PkgName": "libssl3t64",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libssl3t64@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "4f2dd2c406757961",
            "BOMRef": "pkg:deb/debian/libssl3t64@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.5.4-1~deb13u1",
          "FixedVersion": "3.5.4-1~deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-15467",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:9bd3ee2e9894106e9a8d3393dbdc4783e3f031fb258df2ce554e572fd7f32785",
          "Title": "openssl: OpenSSL: Remote code execution or Denial of Service via oversized Initialization Vector in CMS parsing",
          "Description": "Issue summary: Parsing CMS AuthEnvelopedData or EnvelopedData message with\nmaliciously crafted AEAD parameters can trigger a stack buffer overflow.\n\nImpact summary: A stack buffer overflow may lead to a crash, causing Denial\nof Service, or potentially remote code execution.\n\nWhen parsing CMS (Auth)EnvelopedData structures that use AEAD ciphers such as\nAES-GCM, the IV (Initialization Vector) encoded in the ASN.1 parameters is\ncopied into a fixed-size stack buffer without verifying that its length fits\nthe destination. An attacker can supply a crafted CMS message with an\noversized IV, causing a stack-based out-of-bounds write before any\nauthentication or tag verification occurs.\n\nApplications and services that parse untrusted CMS or PKCS#7 content using\nAEAD ciphers (e.g., S/MIME (Auth)EnvelopedData with AES-GCM) are vulnerable.\nBecause the overflow occurs prior to authentication, no valid key material\nis required to trigger it. While exploitability to remote code execution\ndepends on platform and toolchain mitigations, the stack-based write\nprimitive represents a severe risk.\n\nThe FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this\nissue, as the CMS implementation is outside the OpenSSL FIPS module\nboundary.\n\nOpenSSL 3.6, 3.5, 3.4, 3.3 and 3.0 are vulnerable to this issue.\n\nOpenSSL 1.1.1 and 1.0.2 are not affected by this issue.",
          "Severity": "CRITICAL",
          "CweIDs": [
            "CWE-787"
          ],
          "VendorSeverity": {
            "alma": 3,
            "amazon": 3,
            "azure": 4,
            "oracle-oval": 3,
            "photon": 3,
            "redhat": 3,
            "rocky": 3,
            "ubuntu": 2
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
              "V3Score": 9.8
            }
          },
          "References": [
            "http://www.openwall.com/lists/oss-security/2026/01/27/10",
            "http://www.openwall.com/lists/oss-security/2026/02/25/6",
            "https://access.redhat.com/errata/RHSA-2026:1473",
            "https://access.redhat.com/security/cve/CVE-2025-15467",
            "https://bugzilla.redhat.com/2430375",
            "https://bugzilla.redhat.com/2430376",
            "https://bugzilla.redhat.com/2430377",
            "https://bugzilla.redhat.com/2430378",
            "https://bugzilla.redhat.com/2430379",
            "https://bugzilla.redhat.com/2430380",
            "https://bugzilla.redhat.com/2430381",
            "https://bugzilla.redhat.com/2430386",
            "https://bugzilla.redhat.com/2430387",
            "https://bugzilla.redhat.com/2430388",
            "https://bugzilla.redhat.com/2430389",
            "https://bugzilla.redhat.com/2430390",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430375",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430376",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430377",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430378",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430379",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430380",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430381",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430386",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430387",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430388",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430389",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430390",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11187",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15467",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15468",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15469",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66199",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68160",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69418",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69420",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69421",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22795",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22796",
            "https://errata.almalinux.org/9/ALSA-2026-1473.html",
            "https://errata.rockylinux.org/RLSA-2026:1473",
            "https://github.com/guiimoraes/CVE-2025-15467",
            "https://github.com/openssl/openssl/commit/2c8f0e5fa9b6ee5508a0349e4572ddb74db5a703",
            "https://github.com/openssl/openssl/commit/5f26d4202f5b89664c5c3f3c62086276026ba9a9",
            "https://github.com/openssl/openssl/commit/6ced0fe6b10faa560e410e3ee8d6c82f06c65ea3",
            "https://github.com/openssl/openssl/commit/ce39170276daec87f55c39dad1f629b56344429e",
            "https://github.com/openssl/openssl/commit/d0071a0799f20cc8101730145349ed4487c268dc",
            "https://linux.oracle.com/cve/CVE-2025-15467.html",
            "https://linux.oracle.com/errata/ELSA-2026-50081.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-15467",
            "https://openssl-library.org/news/secadv/20260127.txt",
            "https://ubuntu.com/security/notices/USN-7980-1",
            "https://www.cve.org/CVERecord?id=CVE-2025-15467"
          ],
          "PublishedDate": "2026-01-27T16:16:14.257Z",
          "LastModifiedDate": "2026-03-19T19:16:19.23Z"
        },
        {
          "VulnerabilityID": "CVE-2025-69419",
          "VendorIDs": [
            "DSA-6113-1"
          ],
          "PkgID": "libssl3t64@3.5.4-1~deb13u1",
          "PkgName": "libssl3t64",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libssl3t64@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "4f2dd2c406757961",
            "BOMRef": "pkg:deb/debian/libssl3t64@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.5.4-1~deb13u1",
          "FixedVersion": "3.5.4-1~deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-69419",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:15b763bc6438b3ef178d1db26ed284e035f84c4b6107a5ffbb9f3ac85d99fffa",
          "Title": "openssl: OpenSSL: Arbitrary code execution due to out-of-bounds write in PKCS#12 processing",
          "Description": "Issue summary: Calling PKCS12_get_friendlyname() function on a maliciously\ncrafted PKCS#12 file with a BMPString (UTF-16BE) friendly name containing\nnon-ASCII BMP code point can trigger a one byte write before the allocated\nbuffer.\n\nImpact summary: The out-of-bounds write can cause a memory corruption\nwhich can have various consequences including a Denial of Service.\n\nThe OPENSSL_uni2utf8() function performs a two-pass conversion of a PKCS#12\nBMPString (UTF-16BE) to UTF-8. In the second pass, when emitting UTF-8 bytes,\nthe helper function bmp_to_utf8() incorrectly forwards the remaining UTF-16\nsource byte count as the destination buffer capacity to UTF8_putc(). For BMP\ncode points above U+07FF, UTF-8 requires three bytes, but the forwarded\ncapacity can be just two bytes. UTF8_putc() then returns -1, and this negative\nvalue is added to the output length without validation, causing the\nlength to become negative. The subsequent trailing NUL byte is then written\nat a negative offset, causing write outside of heap allocated buffer.\n\nThe vulnerability is reachable via the public PKCS12_get_friendlyname() API\nwhen parsing attacker-controlled PKCS#12 files. While PKCS12_parse() uses a\ndifferent code path that avoids this issue, PKCS12_get_friendlyname() directly\ninvokes the vulnerable function. Exploitation requires an attacker to provide\na malicious PKCS#12 file to be parsed by the application and the attacker\ncan just trigger a one zero byte write before the allocated buffer.\nFor that reason the issue was assessed as Low severity according to our\nSecurity Policy.\n\nThe FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue,\nas the PKCS#12 implementation is outside the OpenSSL FIPS module boundary.\n\nOpenSSL 3.6, 3.5, 3.4, 3.3, 3.0 and 1.1.1 are vulnerable to this issue.\n\nOpenSSL 1.0.2 is not affected by this issue.",
          "Severity": "HIGH",
          "CweIDs": [
            "CWE-787"
          ],
          "VendorSeverity": {
            "alma": 2,
            "amazon": 3,
            "azure": 3,
            "cbl-mariner": 3,
            "oracle-oval": 2,
            "photon": 3,
            "redhat": 2,
            "rocky": 3,
            "ubuntu": 1
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
              "V3Score": 7.4
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:4472",
            "https://access.redhat.com/security/cve/CVE-2025-69419",
            "https://bugzilla.redhat.com/2430386",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430375",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430376",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430377",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430378",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430379",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430380",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430381",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430386",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430387",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430388",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430389",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430390",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11187",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15467",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15468",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15469",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66199",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68160",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69418",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69420",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69421",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22795",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22796",
            "https://errata.almalinux.org/9/ALSA-2026-4472.html",
            "https://errata.rockylinux.org/RLSA-2026:1473",
            "https://github.com/openssl/openssl/commit/41be0f216404f14457bbf3b9cc488dba60b49296",
            "https://github.com/openssl/openssl/commit/7e9cac9832e4705b91987c2474ed06a37a93cecb",
            "https://github.com/openssl/openssl/commit/a26a90d38edec3748566129d824e664b54bee2e2",
            "https://github.com/openssl/openssl/commit/cda12de3bc0e333ea8d2c6fd15001dbdaf280015",
            "https://github.com/openssl/openssl/commit/ff628933755075446bca8307e8417c14d164b535",
            "https://linux.oracle.com/cve/CVE-2025-69419.html",
            "https://linux.oracle.com/errata/ELSA-2026-50131.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-69419",
            "https://openssl-library.org/news/secadv/20260127.txt",
            "https://ubuntu.com/security/notices/USN-7980-1",
            "https://ubuntu.com/security/notices/USN-7980-2",
            "https://www.cve.org/CVERecord?id=CVE-2025-69419"
          ],
          "PublishedDate": "2026-01-27T16:16:34.113Z",
          "LastModifiedDate": "2026-02-02T18:35:02.177Z"
        },
        {
          "VulnerabilityID": "CVE-2025-69421",
          "VendorIDs": [
            "DSA-6113-1"
          ],
          "PkgID": "libssl3t64@3.5.4-1~deb13u1",
          "PkgName": "libssl3t64",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libssl3t64@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "4f2dd2c406757961",
            "BOMRef": "pkg:deb/debian/libssl3t64@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.5.4-1~deb13u1",
          "FixedVersion": "3.5.4-1~deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "SeveritySource": "nvd",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-69421",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:733869390562c49e0afdc19132ae6c6c7bfcc9af59add739b00e30ec285ccc47",
          "Title": "openssl: OpenSSL: Denial of Service via malformed PKCS#12 file processing",
          "Description": "Issue summary: Processing a malformed PKCS#12 file can trigger a NULL pointer\ndereference in the PKCS12_item_decrypt_d2i_ex() function.\n\nImpact summary: A NULL pointer dereference can trigger a crash which leads to\nDenial of Service for an application processing PKCS#12 files.\n\nThe PKCS12_item_decrypt_d2i_ex() function does not check whether the oct\nparameter is NULL before dereferencing it. When called from\nPKCS12_unpack_p7encdata() with a malformed PKCS#12 file, this parameter can\nbe NULL, causing a crash. The vulnerability is limited to Denial of Service\nand cannot be escalated to achieve code execution or memory disclosure.\n\nExploiting this issue requires an attacker to provide a malformed PKCS#12 file\nto an application that processes it. For that reason the issue was assessed as\nLow severity according to our Security Policy.\n\nThe FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue,\nas the PKCS#12 implementation is outside the OpenSSL FIPS module boundary.\n\nOpenSSL 3.6, 3.5, 3.4, 3.3, 3.0, 1.1.1 and 1.0.2 are vulnerable to this issue.",
          "Severity": "HIGH",
          "CweIDs": [
            "CWE-476"
          ],
          "VendorSeverity": {
            "alma": 3,
            "amazon": 3,
            "azure": 2,
            "cbl-mariner": 2,
            "nvd": 3,
            "oracle-oval": 3,
            "photon": 3,
            "redhat": 1,
            "rocky": 3,
            "ubuntu": 1
          },
          "CVSS": {
            "nvd": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 7.5
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
              "V3Score": 6.5
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:1473",
            "https://access.redhat.com/security/cve/CVE-2025-69421",
            "https://bugzilla.redhat.com/2430375",
            "https://bugzilla.redhat.com/2430376",
            "https://bugzilla.redhat.com/2430377",
            "https://bugzilla.redhat.com/2430378",
            "https://bugzilla.redhat.com/2430379",
            "https://bugzilla.redhat.com/2430380",
            "https://bugzilla.redhat.com/2430381",
            "https://bugzilla.redhat.com/2430386",
            "https://bugzilla.redhat.com/2430387",
            "https://bugzilla.redhat.com/2430388",
            "https://bugzilla.redhat.com/2430389",
            "https://bugzilla.redhat.com/2430390",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430375",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430376",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430377",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430378",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430379",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430380",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430381",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430386",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430387",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430388",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430389",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430390",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11187",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15467",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15468",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15469",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66199",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68160",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69418",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69420",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69421",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22795",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22796",
            "https://errata.almalinux.org/9/ALSA-2026-1473.html",
            "https://errata.rockylinux.org/RLSA-2026:1473",
            "https://github.com/openssl/openssl/commit/3524a29271f8191b8fd8a5257eb05173982a097b",
            "https://github.com/openssl/openssl/commit/36ecb4960872a4ce04bf6f1e1f4e78d75ec0c0c7",
            "https://github.com/openssl/openssl/commit/4bbc8d41a72c842ce4077a8a3eccd1109aaf74bd",
            "https://github.com/openssl/openssl/commit/643986985cd1c21221f941129d76fe0c2785aeb3",
            "https://github.com/openssl/openssl/commit/a2dbc539f0f9cc63832709fa5aa33ad9495eb19c",
            "https://linux.oracle.com/cve/CVE-2025-69421.html",
            "https://linux.oracle.com/errata/ELSA-2026-50081.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-69421",
            "https://openssl-library.org/news/secadv/20260127.txt",
            "https://ubuntu.com/security/notices/USN-7980-1",
            "https://ubuntu.com/security/notices/USN-7980-2",
            "https://www.cve.org/CVERecord?id=CVE-2025-69421"
          ],
          "PublishedDate": "2026-01-27T16:16:34.437Z",
          "LastModifiedDate": "2026-02-28T04:16:17.457Z"
        },
        {
          "VulnerabilityID": "CVE-2025-11187",
          "PkgID": "libssl3t64@3.5.4-1~deb13u1",
          "PkgName": "libssl3t64",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libssl3t64@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "4f2dd2c406757961",
            "BOMRef": "pkg:deb/debian/libssl3t64@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.5.4-1~deb13u1",
          "FixedVersion": "3.5.4-1~deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-11187",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:f461001a3bc5c474316aa293f7ca2be0a61c6f856fb828dae770d8897477f063",
          "Title": "openssl: OpenSSL: Arbitrary code execution or denial of service through crafted PKCS#12 file",
          "Description": "Issue summary: PBMAC1 parameters in PKCS#12 files are missing validation\nwhich can trigger a stack-based buffer overflow, invalid pointer or NULL\npointer dereference during MAC verification.\n\nImpact summary: The stack buffer overflow or NULL pointer dereference may\ncause a crash leading to Denial of Service for an application that parses\nuntrusted PKCS#12 files. The buffer overflow may also potentially enable\ncode execution depending on platform mitigations.\n\nWhen verifying a PKCS#12 file that uses PBMAC1 for the MAC, the PBKDF2\nsalt and keylength parameters from the file are used without validation.\nIf the value of keylength exceeds the size of the fixed stack buffer used\nfor the derived key (64 bytes), the key derivation will overflow the buffer.\nThe overflow length is attacker-controlled. Also, if the salt parameter is\nnot an OCTET STRING type this can lead to invalid or NULL pointer\ndereference.\n\nExploiting this issue requires a user or application to process\na maliciously crafted PKCS#12 file. It is uncommon to accept untrusted\nPKCS#12 files in applications as they are usually used to store private\nkeys which are trusted by definition. For this reason the issue was assessed\nas Moderate severity.\n\nThe FIPS modules in 3.6, 3.5 and 3.4 are not affected by this issue, as\nPKCS#12 processing is outside the OpenSSL FIPS module boundary.\n\nOpenSSL 3.6, 3.5 and 3.4 are vulnerable to this issue.\n\nOpenSSL 3.3, 3.0, 1.1.1 and 1.0.2 are not affected by this issue as they do\nnot support PBMAC1 in PKCS#12.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-476",
            "CWE-787"
          ],
          "VendorSeverity": {
            "alma": 3,
            "oracle-oval": 3,
            "redhat": 2,
            "rocky": 3,
            "ubuntu": 2
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H",
              "V3Score": 6.1
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:1473",
            "https://access.redhat.com/security/cve/CVE-2025-11187",
            "https://bugzilla.redhat.com/2430375",
            "https://bugzilla.redhat.com/2430376",
            "https://bugzilla.redhat.com/2430377",
            "https://bugzilla.redhat.com/2430378",
            "https://bugzilla.redhat.com/2430379",
            "https://bugzilla.redhat.com/2430380",
            "https://bugzilla.redhat.com/2430381",
            "https://bugzilla.redhat.com/2430386",
            "https://bugzilla.redhat.com/2430387",
            "https://bugzilla.redhat.com/2430388",
            "https://bugzilla.redhat.com/2430389",
            "https://bugzilla.redhat.com/2430390",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430375",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430376",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430377",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430378",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430379",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430380",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430381",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430386",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430387",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430388",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430389",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430390",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11187",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15467",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15468",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15469",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66199",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68160",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69418",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69420",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69421",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22795",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22796",
            "https://errata.almalinux.org/9/ALSA-2026-1473.html",
            "https://errata.rockylinux.org/RLSA-2026:1473",
            "https://github.com/metadust/CVE-2025-11187",
            "https://github.com/openssl/openssl/commit/205e3a55e16e4bd08c12fdbd3416ab829c0f6206",
            "https://github.com/openssl/openssl/commit/8caf359d6e46fb413e8f5f0df765d2e8a51df4e8",
            "https://github.com/openssl/openssl/commit/e1079bc17ed93ff16f6b86f33a2fe3336e78817e",
            "https://linux.oracle.com/cve/CVE-2025-11187.html",
            "https://linux.oracle.com/errata/ELSA-2026-50081.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-11187",
            "https://openssl-library.org/news/secadv/20260127.txt",
            "https://ubuntu.com/security/notices/USN-7980-1",
            "https://www.cve.org/CVERecord?id=CVE-2025-11187"
          ],
          "PublishedDate": "2026-01-27T16:16:14.093Z",
          "LastModifiedDate": "2026-03-20T14:16:13.89Z"
        },
        {
          "VulnerabilityID": "CVE-2025-15468",
          "PkgID": "libssl3t64@3.5.4-1~deb13u1",
          "PkgName": "libssl3t64",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libssl3t64@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "4f2dd2c406757961",
            "BOMRef": "pkg:deb/debian/libssl3t64@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.5.4-1~deb13u1",
          "FixedVersion": "3.5.4-1~deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-15468",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:403723a7f0349f0b7c4275135e865346b077ff22813c21cacf774c3011f540b6",
          "Title": "openssl: OpenSSL: Denial of Service via NULL pointer dereference in QUIC protocol handling",
          "Description": "Issue summary: If an application using the SSL_CIPHER_find() function in\na QUIC protocol client or server receives an unknown cipher suite from\nthe peer, a NULL dereference occurs.\n\nImpact summary: A NULL pointer dereference leads to abnormal termination of\nthe running process causing Denial of Service.\n\nSome applications call SSL_CIPHER_find() from the client_hello_cb callback\non the cipher ID received from the peer. If this is done with an SSL object\nimplementing the QUIC protocol, NULL pointer dereference will happen if\nthe examined cipher ID is unknown or unsupported.\n\nAs it is not very common to call this function in applications using the QUIC \nprotocol and the worst outcome is Denial of Service, the issue was assessed\nas Low severity.\n\nThe vulnerable code was introduced in the 3.2 version with the addition\nof the QUIC protocol support.\n\nThe FIPS modules in 3.6, 3.5, 3.4 and 3.3 are not affected by this issue,\nas the QUIC implementation is outside the OpenSSL FIPS module boundary.\n\nOpenSSL 3.6, 3.5, 3.4 and 3.3 are vulnerable to this issue.\n\nOpenSSL 3.0, 1.1.1 and 1.0.2 are not affected by this issue.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-476"
          ],
          "VendorSeverity": {
            "alma": 3,
            "amazon": 3,
            "azure": 2,
            "oracle-oval": 3,
            "photon": 2,
            "redhat": 1,
            "rocky": 3,
            "ubuntu": 1
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 5.9
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:1473",
            "https://access.redhat.com/security/cve/CVE-2025-15468",
            "https://bugzilla.redhat.com/2430375",
            "https://bugzilla.redhat.com/2430376",
            "https://bugzilla.redhat.com/2430377",
            "https://bugzilla.redhat.com/2430378",
            "https://bugzilla.redhat.com/2430379",
            "https://bugzilla.redhat.com/2430380",
            "https://bugzilla.redhat.com/2430381",
            "https://bugzilla.redhat.com/2430386",
            "https://bugzilla.redhat.com/2430387",
            "https://bugzilla.redhat.com/2430388",
            "https://bugzilla.redhat.com/2430389",
            "https://bugzilla.redhat.com/2430390",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430375",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430376",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430377",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430378",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430379",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430380",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430381",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430386",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430387",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430388",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430389",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430390",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11187",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15467",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15468",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15469",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66199",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68160",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69418",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69420",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69421",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22795",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22796",
            "https://errata.almalinux.org/9/ALSA-2026-1473.html",
            "https://errata.rockylinux.org/RLSA-2026:1473",
            "https://github.com/openssl/openssl/commit/1f08e54bad32843044fe8a675948d65e3b4ece65",
            "https://github.com/openssl/openssl/commit/7c88376731c589ee5b36116c5a6e32d5ae5f7ae2",
            "https://github.com/openssl/openssl/commit/b2539639400288a4580fe2d76247541b976bade4",
            "https://github.com/openssl/openssl/commit/d75b309879631d45b972396ce4e5102559c64ac7",
            "https://linux.oracle.com/cve/CVE-2025-15468.html",
            "https://linux.oracle.com/errata/ELSA-2026-50081.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-15468",
            "https://openssl-library.org/news/secadv/20260127.txt",
            "https://ubuntu.com/security/notices/USN-7980-1",
            "https://www.cve.org/CVERecord?id=CVE-2025-15468"
          ],
          "PublishedDate": "2026-01-27T16:16:14.4Z",
          "LastModifiedDate": "2026-02-02T18:38:00.947Z"
        },
        {
          "VulnerabilityID": "CVE-2025-15469",
          "PkgID": "libssl3t64@3.5.4-1~deb13u1",
          "PkgName": "libssl3t64",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libssl3t64@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "4f2dd2c406757961",
            "BOMRef": "pkg:deb/debian/libssl3t64@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.5.4-1~deb13u1",
          "FixedVersion": "3.5.4-1~deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-15469",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:17112abc548ffd9de2e744c75e78099b31ae8c4a23360054bbfb82c0eeacd4e4",
          "Title": "openssl: OpenSSL: Data integrity bypass in `openssl dgst` command due to silent truncation",
          "Description": "Issue summary: The 'openssl dgst' command-line tool silently truncates input\ndata to 16MB when using one-shot signing algorithms and reports success instead\nof an error.\n\nImpact summary: A user signing or verifying files larger than 16MB with\none-shot algorithms (such as Ed25519, Ed448, or ML-DSA) may believe the entire\nfile is authenticated while trailing data beyond 16MB remains unauthenticated.\n\nWhen the 'openssl dgst' command is used with algorithms that only support\none-shot signing (Ed25519, Ed448, ML-DSA-44, ML-DSA-65, ML-DSA-87), the input\nis buffered with a 16MB limit. If the input exceeds this limit, the tool\nsilently truncates to the first 16MB and continues without signaling an error,\ncontrary to what the documentation states. This creates an integrity gap where\ntrailing bytes can be modified without detection if both signing and\nverification are performed using the same affected codepath.\n\nThe issue affects only the command-line tool behavior. Verifiers that process\nthe full message using library APIs will reject the signature, so the risk\nprimarily affects workflows that both sign and verify with the affected\n'openssl dgst' command. Streaming digest algorithms for 'openssl dgst' and\nlibrary users are unaffected.\n\nThe FIPS modules in 3.5 and 3.6 are not affected by this issue, as the\ncommand-line tools are outside the OpenSSL FIPS module boundary.\n\nOpenSSL 3.5 and 3.6 are vulnerable to this issue.\n\nOpenSSL 3.4, 3.3, 3.0, 1.1.1 and 1.0.2 are not affected by this issue.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-347"
          ],
          "VendorSeverity": {
            "alma": 3,
            "oracle-oval": 3,
            "photon": 2,
            "redhat": 1,
            "rocky": 3,
            "ubuntu": 1
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
              "V3Score": 5.5
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:1473",
            "https://access.redhat.com/security/cve/CVE-2025-15469",
            "https://bugzilla.redhat.com/2430375",
            "https://bugzilla.redhat.com/2430376",
            "https://bugzilla.redhat.com/2430377",
            "https://bugzilla.redhat.com/2430378",
            "https://bugzilla.redhat.com/2430379",
            "https://bugzilla.redhat.com/2430380",
            "https://bugzilla.redhat.com/2430381",
            "https://bugzilla.redhat.com/2430386",
            "https://bugzilla.redhat.com/2430387",
            "https://bugzilla.redhat.com/2430388",
            "https://bugzilla.redhat.com/2430389",
            "https://bugzilla.redhat.com/2430390",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430375",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430376",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430377",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430378",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430379",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430380",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430381",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430386",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430387",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430388",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430389",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430390",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11187",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15467",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15468",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15469",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66199",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68160",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69418",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69420",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69421",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22795",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22796",
            "https://errata.almalinux.org/9/ALSA-2026-1473.html",
            "https://errata.rockylinux.org/RLSA-2026:1473",
            "https://github.com/openssl/openssl/commit/310f305eb92ea8040d6b3cb75a5feeba8e6acf2f",
            "https://github.com/openssl/openssl/commit/a7936fa4bd23c906e1955a16a0a0ab39a4953a61",
            "https://linux.oracle.com/cve/CVE-2025-15469.html",
            "https://linux.oracle.com/errata/ELSA-2026-50081.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-15469",
            "https://openssl-library.org/news/secadv/20260127.txt",
            "https://ubuntu.com/security/notices/USN-7980-1",
            "https://www.cve.org/CVERecord?id=CVE-2025-15469"
          ],
          "PublishedDate": "2026-01-27T16:16:14.523Z",
          "LastModifiedDate": "2026-02-02T18:37:39.313Z"
        },
        {
          "VulnerabilityID": "CVE-2025-66199",
          "PkgID": "libssl3t64@3.5.4-1~deb13u1",
          "PkgName": "libssl3t64",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libssl3t64@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "4f2dd2c406757961",
            "BOMRef": "pkg:deb/debian/libssl3t64@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.5.4-1~deb13u1",
          "FixedVersion": "3.5.4-1~deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-66199",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:17f5a5a9f3c1df62e6912e75b28d8bebf4d9a78c37b91119483544731409c66b",
          "Title": "openssl: OpenSSL: Denial of Service due to excessive memory allocation in TLS 1.3 certificate compression",
          "Description": "Issue summary: A TLS 1.3 connection using certificate compression can be\nforced to allocate a large buffer before decompression without checking\nagainst the configured certificate size limit.\n\nImpact summary: An attacker can cause per-connection memory allocations of\nup to approximately 22 MiB and extra CPU work, potentially leading to\nservice degradation or resource exhaustion (Denial of Service).\n\nIn affected configurations, the peer-supplied uncompressed certificate\nlength from a CompressedCertificate message is used to grow a heap buffer\nprior to decompression. This length is not bounded by the max_cert_list\nsetting, which otherwise constrains certificate message sizes. An attacker\ncan exploit this to cause large per-connection allocations followed by\nhandshake failure. No memory corruption or information disclosure occurs.\n\nThis issue only affects builds where TLS 1.3 certificate compression is\ncompiled in (i.e., not OPENSSL_NO_COMP_ALG) and at least one compression\nalgorithm (brotli, zlib, or zstd) is available, and where the compression\nextension is negotiated. Both clients receiving a server CompressedCertificate\nand servers in mutual TLS scenarios receiving a client CompressedCertificate\nare affected. Servers that do not request client certificates are not\nvulnerable to client-initiated attacks.\n\nUsers can mitigate this issue by setting SSL_OP_NO_RX_CERTIFICATE_COMPRESSION\nto disable receiving compressed certificates.\n\nThe FIPS modules in 3.6, 3.5, 3.4 and 3.3 are not affected by this issue,\nas the TLS implementation is outside the OpenSSL FIPS module boundary.\n\nOpenSSL 3.6, 3.5, 3.4 and 3.3 are vulnerable to this issue.\n\nOpenSSL 3.0, 1.1.1 and 1.0.2 are not affected by this issue.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-789"
          ],
          "VendorSeverity": {
            "alma": 3,
            "amazon": 3,
            "azure": 2,
            "oracle-oval": 3,
            "photon": 2,
            "redhat": 1,
            "rocky": 3,
            "ubuntu": 1
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 5.9
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:1473",
            "https://access.redhat.com/security/cve/CVE-2025-66199",
            "https://bugzilla.redhat.com/2430375",
            "https://bugzilla.redhat.com/2430376",
            "https://bugzilla.redhat.com/2430377",
            "https://bugzilla.redhat.com/2430378",
            "https://bugzilla.redhat.com/2430379",
            "https://bugzilla.redhat.com/2430380",
            "https://bugzilla.redhat.com/2430381",
            "https://bugzilla.redhat.com/2430386",
            "https://bugzilla.redhat.com/2430387",
            "https://bugzilla.redhat.com/2430388",
            "https://bugzilla.redhat.com/2430389",
            "https://bugzilla.redhat.com/2430390",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430375",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430376",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430377",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430378",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430379",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430380",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430381",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430386",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430387",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430388",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430389",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430390",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11187",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15467",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15468",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15469",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66199",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68160",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69418",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69420",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69421",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22795",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22796",
            "https://errata.almalinux.org/9/ALSA-2026-1473.html",
            "https://errata.rockylinux.org/RLSA-2026:1473",
            "https://github.com/openssl/openssl/commit/3ed1f75249932b155eef993a8e66a99cb98bfef4",
            "https://github.com/openssl/openssl/commit/6184a4fb08ee6d7bca570d931a4e8bef40b64451",
            "https://github.com/openssl/openssl/commit/895150b5e021d16b52fb32b97e1dd12f20448be5",
            "https://github.com/openssl/openssl/commit/966a2478046c311ed7dae50c457d0db4cafbf7e4",
            "https://linux.oracle.com/cve/CVE-2025-66199.html",
            "https://linux.oracle.com/errata/ELSA-2026-50081.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-66199",
            "https://openssl-library.org/news/secadv/20260127.txt",
            "https://ubuntu.com/security/notices/USN-7980-1",
            "https://www.cve.org/CVERecord?id=CVE-2025-66199"
          ],
          "PublishedDate": "2026-01-27T16:16:15.777Z",
          "LastModifiedDate": "2026-02-02T18:37:19.613Z"
        },
        {
          "VulnerabilityID": "CVE-2025-68160",
          "VendorIDs": [
            "DSA-6113-1"
          ],
          "PkgID": "libssl3t64@3.5.4-1~deb13u1",
          "PkgName": "libssl3t64",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libssl3t64@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "4f2dd2c406757961",
            "BOMRef": "pkg:deb/debian/libssl3t64@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.5.4-1~deb13u1",
          "FixedVersion": "3.5.4-1~deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-68160",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:abcd50d7686df3dec1d430a869eeacde09bfaaf5e464b342af82da9df3b568cd",
          "Title": "openssl: OpenSSL: Denial of Service due to out-of-bounds write in BIO filter",
          "Description": "Issue summary: Writing large, newline-free data into a BIO chain using the\nline-buffering filter where the next BIO performs short writes can trigger\na heap-based out-of-bounds write.\n\nImpact summary: This out-of-bounds write can cause memory corruption which\ntypically results in a crash, leading to Denial of Service for an application.\n\nThe line-buffering BIO filter (BIO_f_linebuffer) is not used by default in\nTLS/SSL data paths. In OpenSSL command-line applications, it is typically\nonly pushed onto stdout/stderr on VMS systems. Third-party applications that\nexplicitly use this filter with a BIO chain that can short-write and that\nwrite large, newline-free data influenced by an attacker would be affected.\nHowever, the circumstances where this could happen are unlikely to be under\nattacker control, and BIO_f_linebuffer is unlikely to be handling non-curated\ndata controlled by an attacker. For that reason the issue was assessed as\nLow severity.\n\nThe FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue,\nas the BIO implementation is outside the OpenSSL FIPS module boundary.\n\nOpenSSL 3.6, 3.5, 3.4, 3.3, 3.0, 1.1.1 and 1.0.2 are vulnerable to this issue.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-787"
          ],
          "VendorSeverity": {
            "alma": 3,
            "amazon": 3,
            "azure": 2,
            "cbl-mariner": 2,
            "oracle-oval": 3,
            "photon": 2,
            "redhat": 1,
            "rocky": 3,
            "ubuntu": 1
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 4.7
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:1473",
            "https://access.redhat.com/security/cve/CVE-2025-68160",
            "https://bugzilla.redhat.com/2430375",
            "https://bugzilla.redhat.com/2430376",
            "https://bugzilla.redhat.com/2430377",
            "https://bugzilla.redhat.com/2430378",
            "https://bugzilla.redhat.com/2430379",
            "https://bugzilla.redhat.com/2430380",
            "https://bugzilla.redhat.com/2430381",
            "https://bugzilla.redhat.com/2430386",
            "https://bugzilla.redhat.com/2430387",
            "https://bugzilla.redhat.com/2430388",
            "https://bugzilla.redhat.com/2430389",
            "https://bugzilla.redhat.com/2430390",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430375",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430376",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430377",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430378",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430379",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430380",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430381",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430386",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430387",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430388",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430389",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430390",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11187",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15467",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15468",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15469",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66199",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68160",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69418",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69420",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69421",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22795",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22796",
            "https://errata.almalinux.org/9/ALSA-2026-1473.html",
            "https://errata.rockylinux.org/RLSA-2026:1473",
            "https://github.com/openssl/openssl/commit/384011202af92605d926fafe4a0bcd6b65d162ad",
            "https://github.com/openssl/openssl/commit/475c466ef2fbd8fc1df6fae1c3eed9c813fc8ff6",
            "https://github.com/openssl/openssl/commit/4c96fbba618e1940f038012506ee9e21d32ee12c",
            "https://github.com/openssl/openssl/commit/6845c3b6460a98b1ec4e463baa2ea1a63a32d7c0",
            "https://github.com/openssl/openssl/commit/68a7cd2e2816c3a02f4d45a2ce43fc04fac97096",
            "https://linux.oracle.com/cve/CVE-2025-68160.html",
            "https://linux.oracle.com/errata/ELSA-2026-50081.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-68160",
            "https://openssl-library.org/news/secadv/20260127.txt",
            "https://ubuntu.com/security/notices/USN-7980-1",
            "https://ubuntu.com/security/notices/USN-7980-2",
            "https://www.cve.org/CVERecord?id=CVE-2025-68160"
          ],
          "PublishedDate": "2026-01-27T16:16:15.9Z",
          "LastModifiedDate": "2026-02-02T18:36:57.727Z"
        },
        {
          "VulnerabilityID": "CVE-2025-69418",
          "VendorIDs": [
            "DSA-6113-1"
          ],
          "PkgID": "libssl3t64@3.5.4-1~deb13u1",
          "PkgName": "libssl3t64",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libssl3t64@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "4f2dd2c406757961",
            "BOMRef": "pkg:deb/debian/libssl3t64@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.5.4-1~deb13u1",
          "FixedVersion": "3.5.4-1~deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-69418",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:d93bda412120d1477c8ca9913cf3b4ac39883a49e6a494e1b29ae2f74b3fcf33",
          "Title": "openssl: OpenSSL: Information disclosure and data tampering via specific low-level OCB encryption/decryption calls",
          "Description": "Issue summary: When using the low-level OCB API directly with AES-NI or\u003cbr\u003eother hardware-accelerated code paths, inputs whose length is not a multiple\u003cbr\u003eof 16 bytes can leave the final partial block unencrypted and unauthenticated.\u003cbr\u003e\u003cbr\u003eImpact summary: The trailing 1-15 bytes of a message may be exposed in\u003cbr\u003ecleartext on encryption and are not covered by the authentication tag,\u003cbr\u003eallowing an attacker to read or tamper with those bytes without detection.\u003cbr\u003e\u003cbr\u003eThe low-level OCB encrypt and decrypt routines in the hardware-accelerated\u003cbr\u003estream path process full 16-byte blocks but do not advance the input/output\u003cbr\u003epointers. The subsequent tail-handling code then operates on the original\u003cbr\u003ebase pointers, effectively reprocessing the beginning of the buffer while\u003cbr\u003eleaving the actual trailing bytes unprocessed. The authentication checksum\u003cbr\u003ealso excludes the true tail bytes.\u003cbr\u003e\u003cbr\u003eHowever, typical OpenSSL consumers using EVP are not affected because the\u003cbr\u003ehigher-level EVP and provider OCB implementations split inputs so that full\u003cbr\u003eblocks and trailing partial blocks are processed in separate calls, avoiding\u003cbr\u003ethe problematic code path. Additionally, TLS does not use OCB ciphersuites.\u003cbr\u003eThe vulnerability only affects applications that call the low-level\u003cbr\u003eCRYPTO_ocb128_encrypt() or CRYPTO_ocb128_decrypt() functions directly with\u003cbr\u003enon-block-aligned lengths in a single call on hardware-accelerated builds.\u003cbr\u003eFor these reasons the issue was assessed as Low severity.\u003cbr\u003e\u003cbr\u003eThe FIPS modules in 3.6, 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected\u003cbr\u003eby this issue, as OCB mode is not a FIPS-approved algorithm.\u003cbr\u003e\u003cbr\u003eOpenSSL 3.6, 3.5, 3.4, 3.3, 3.0 and 1.1.1 are vulnerable to this issue.\u003cbr\u003e\u003cbr\u003eOpenSSL 1.0.2 is not affected by this issue.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-325"
          ],
          "VendorSeverity": {
            "alma": 3,
            "amazon": 3,
            "azure": 2,
            "cbl-mariner": 2,
            "oracle-oval": 3,
            "photon": 2,
            "redhat": 1,
            "rocky": 3,
            "ubuntu": 1
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
              "V3Score": 4
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:1473",
            "https://access.redhat.com/security/cve/CVE-2025-69418",
            "https://bugzilla.redhat.com/2430375",
            "https://bugzilla.redhat.com/2430376",
            "https://bugzilla.redhat.com/2430377",
            "https://bugzilla.redhat.com/2430378",
            "https://bugzilla.redhat.com/2430379",
            "https://bugzilla.redhat.com/2430380",
            "https://bugzilla.redhat.com/2430381",
            "https://bugzilla.redhat.com/2430386",
            "https://bugzilla.redhat.com/2430387",
            "https://bugzilla.redhat.com/2430388",
            "https://bugzilla.redhat.com/2430389",
            "https://bugzilla.redhat.com/2430390",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430375",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430376",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430377",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430378",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430379",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430380",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430381",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430386",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430387",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430388",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430389",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430390",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11187",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15467",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15468",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15469",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66199",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68160",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69418",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69420",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69421",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22795",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22796",
            "https://errata.almalinux.org/9/ALSA-2026-1473.html",
            "https://errata.rockylinux.org/RLSA-2026:1473",
            "https://github.com/openssl/openssl/commit/372fc5c77529695b05b4f5b5187691a57ef5dffc",
            "https://github.com/openssl/openssl/commit/4016975d4469cd6b94927c607f7c511385f928d8",
            "https://github.com/openssl/openssl/commit/52d23c86a54adab5ee9f80e48b242b52c4cc2347",
            "https://github.com/openssl/openssl/commit/a7589230356d908c0eca4b969ec4f62106f4f5ae",
            "https://github.com/openssl/openssl/commit/ed40856d7d4ba6cb42779b6770666a65f19cb977",
            "https://linux.oracle.com/cve/CVE-2025-69418.html",
            "https://linux.oracle.com/errata/ELSA-2026-50081.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-69418",
            "https://openssl-library.org/news/secadv/20260127.txt",
            "https://ubuntu.com/security/notices/USN-7980-1",
            "https://ubuntu.com/security/notices/USN-7980-2",
            "https://www.cve.org/CVERecord?id=CVE-2025-69418"
          ],
          "PublishedDate": "2026-01-27T16:16:33.253Z",
          "LastModifiedDate": "2026-02-02T18:36:03.557Z"
        },
        {
          "VulnerabilityID": "CVE-2025-69420",
          "VendorIDs": [
            "DSA-6113-1"
          ],
          "PkgID": "libssl3t64@3.5.4-1~deb13u1",
          "PkgName": "libssl3t64",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libssl3t64@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "4f2dd2c406757961",
            "BOMRef": "pkg:deb/debian/libssl3t64@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.5.4-1~deb13u1",
          "FixedVersion": "3.5.4-1~deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-69420",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:20139781b8c6d0105a020583c517e84934606f1a831eb464c3f8a738b236e20f",
          "Title": "openssl: OpenSSL: Denial of Service via malformed TimeStamp Response",
          "Description": "Issue summary: A type confusion vulnerability exists in the TimeStamp Response\nverification code where an ASN1_TYPE union member is accessed without first\nvalidating the type, causing an invalid or NULL pointer dereference when\nprocessing a malformed TimeStamp Response file.\n\nImpact summary: An application calling TS_RESP_verify_response() with a\nmalformed TimeStamp Response can be caused to dereference an invalid or\nNULL pointer when reading, resulting in a Denial of Service.\n\nThe functions ossl_ess_get_signing_cert() and ossl_ess_get_signing_cert_v2()\naccess the signing cert attribute value without validating its type.\nWhen the type is not V_ASN1_SEQUENCE, this results in accessing invalid memory\nthrough the ASN1_TYPE union, causing a crash.\n\nExploiting this vulnerability requires an attacker to provide a malformed\nTimeStamp Response to an application that verifies timestamp responses. The\nTimeStamp protocol (RFC 3161) is not widely used and the impact of the\nexploit is just a Denial of Service. For these reasons the issue was\nassessed as Low severity.\n\nThe FIPS modules in 3.5, 3.4, 3.3 and 3.0 are not affected by this issue,\nas the TimeStamp Response implementation is outside the OpenSSL FIPS module\nboundary.\n\nOpenSSL 3.6, 3.5, 3.4, 3.3, 3.0 and 1.1.1 are vulnerable to this issue.\n\nOpenSSL 1.0.2 is not affected by this issue.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-754"
          ],
          "VendorSeverity": {
            "alma": 3,
            "amazon": 3,
            "azure": 3,
            "cbl-mariner": 3,
            "oracle-oval": 3,
            "photon": 3,
            "redhat": 1,
            "rocky": 3,
            "ubuntu": 1
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 5.9
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:1473",
            "https://access.redhat.com/security/cve/CVE-2025-69420",
            "https://bugzilla.redhat.com/2430375",
            "https://bugzilla.redhat.com/2430376",
            "https://bugzilla.redhat.com/2430377",
            "https://bugzilla.redhat.com/2430378",
            "https://bugzilla.redhat.com/2430379",
            "https://bugzilla.redhat.com/2430380",
            "https://bugzilla.redhat.com/2430381",
            "https://bugzilla.redhat.com/2430386",
            "https://bugzilla.redhat.com/2430387",
            "https://bugzilla.redhat.com/2430388",
            "https://bugzilla.redhat.com/2430389",
            "https://bugzilla.redhat.com/2430390",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430375",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430376",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430377",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430378",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430379",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430380",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430381",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430386",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430387",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430388",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430389",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430390",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11187",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15467",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15468",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15469",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66199",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68160",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69418",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69420",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69421",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22795",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22796",
            "https://errata.almalinux.org/9/ALSA-2026-1473.html",
            "https://errata.rockylinux.org/RLSA-2026:1473",
            "https://github.com/openssl/openssl/commit/27c7012c91cc986a598d7540f3079dfde2416eb9",
            "https://github.com/openssl/openssl/commit/4e254b48ad93cc092be3dd62d97015f33f73133a",
            "https://github.com/openssl/openssl/commit/564fd9c73787f25693bf9e75faf7bf6bb1305d4e",
            "https://github.com/openssl/openssl/commit/5eb0770ffcf11b785cf374ff3c19196245e54f1b",
            "https://github.com/openssl/openssl/commit/a99349ebfc519999edc50620abe24d599b9eb085",
            "https://linux.oracle.com/cve/CVE-2025-69420.html",
            "https://linux.oracle.com/errata/ELSA-2026-50081.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-69420",
            "https://openssl-library.org/news/secadv/20260127.txt",
            "https://ubuntu.com/security/notices/USN-7980-1",
            "https://ubuntu.com/security/notices/USN-7980-2",
            "https://www.cve.org/CVERecord?id=CVE-2025-69420"
          ],
          "PublishedDate": "2026-01-27T16:16:34.317Z",
          "LastModifiedDate": "2026-02-02T18:33:30.557Z"
        },
        {
          "VulnerabilityID": "CVE-2026-22795",
          "VendorIDs": [
            "DSA-6113-1"
          ],
          "PkgID": "libssl3t64@3.5.4-1~deb13u1",
          "PkgName": "libssl3t64",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libssl3t64@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "4f2dd2c406757961",
            "BOMRef": "pkg:deb/debian/libssl3t64@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.5.4-1~deb13u1",
          "FixedVersion": "3.5.4-1~deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-22795",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:0fae5baa4d079f82963bfde1b9b6a67590c1b6a6f402ef0184b0bf00e07dbee1",
          "Title": "openssl: OpenSSL: Denial of Service due to type confusion in PKCS#12 file processing",
          "Description": "Issue summary: An invalid or NULL pointer dereference can happen in\nan application processing a malformed PKCS#12 file.\n\nImpact summary: An application processing a malformed PKCS#12 file can be\ncaused to dereference an invalid or NULL pointer on memory read, resulting\nin a Denial of Service.\n\nA type confusion vulnerability exists in PKCS#12 parsing code where\nan ASN1_TYPE union member is accessed without first validating the type,\ncausing an invalid pointer read.\n\nThe location is constrained to a 1-byte address space, meaning any\nattempted pointer manipulation can only target addresses between 0x00 and 0xFF.\nThis range corresponds to the zero page, which is unmapped on most modern\noperating systems and will reliably result in a crash, leading only to a\nDenial of Service. Exploiting this issue also requires a user or application\nto process a maliciously crafted PKCS#12 file. It is uncommon to accept\nuntrusted PKCS#12 files in applications as they are usually used to store\nprivate keys which are trusted by definition. For these reasons, the issue\nwas assessed as Low severity.\n\nThe FIPS modules in 3.5, 3.4, 3.3 and 3.0 are not affected by this issue,\nas the PKCS12 implementation is outside the OpenSSL FIPS module boundary.\n\nOpenSSL 3.6, 3.5, 3.4, 3.3, 3.0 and 1.1.1 are vulnerable to this issue.\n\nOpenSSL 1.0.2 is not affected by this issue.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-754"
          ],
          "VendorSeverity": {
            "alma": 3,
            "amazon": 3,
            "azure": 2,
            "cbl-mariner": 2,
            "oracle-oval": 3,
            "photon": 2,
            "redhat": 1,
            "rocky": 3,
            "ubuntu": 1
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
              "V3Score": 5.5
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:1473",
            "https://access.redhat.com/security/cve/CVE-2026-22795",
            "https://bugzilla.redhat.com/2430375",
            "https://bugzilla.redhat.com/2430376",
            "https://bugzilla.redhat.com/2430377",
            "https://bugzilla.redhat.com/2430378",
            "https://bugzilla.redhat.com/2430379",
            "https://bugzilla.redhat.com/2430380",
            "https://bugzilla.redhat.com/2430381",
            "https://bugzilla.redhat.com/2430386",
            "https://bugzilla.redhat.com/2430387",
            "https://bugzilla.redhat.com/2430388",
            "https://bugzilla.redhat.com/2430389",
            "https://bugzilla.redhat.com/2430390",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430375",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430376",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430377",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430378",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430379",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430380",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430381",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430386",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430387",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430388",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430389",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430390",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11187",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15467",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15468",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15469",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66199",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68160",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69418",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69420",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69421",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22795",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22796",
            "https://errata.almalinux.org/9/ALSA-2026-1473.html",
            "https://errata.rockylinux.org/RLSA-2026:1473",
            "https://github.com/openssl/openssl/commit/2502e7b7d4c0cf4f972a881641fe09edc67aeec4",
            "https://github.com/openssl/openssl/commit/572844beca95068394c916626a6d3a490f831a49",
            "https://github.com/openssl/openssl/commit/7bbca05be55b129651d9df4bdb92becc45002c12",
            "https://github.com/openssl/openssl/commit/eeee3cbd4d682095ed431052f00403004596373e",
            "https://github.com/openssl/openssl/commit/ef2fb66ec571564d64d1c74a12e388a2a54d05d2",
            "https://linux.oracle.com/cve/CVE-2026-22795.html",
            "https://linux.oracle.com/errata/ELSA-2026-50081.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-22795",
            "https://openssl-library.org/news/secadv/20260127.txt",
            "https://ubuntu.com/security/notices/USN-7980-1",
            "https://ubuntu.com/security/notices/USN-7980-2",
            "https://www.cve.org/CVERecord?id=CVE-2026-22795"
          ],
          "PublishedDate": "2026-01-27T16:16:35.43Z",
          "LastModifiedDate": "2026-02-02T18:41:14.917Z"
        },
        {
          "VulnerabilityID": "CVE-2026-22796",
          "VendorIDs": [
            "DSA-6113-1"
          ],
          "PkgID": "libssl3t64@3.5.4-1~deb13u1",
          "PkgName": "libssl3t64",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libssl3t64@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "4f2dd2c406757961",
            "BOMRef": "pkg:deb/debian/libssl3t64@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.5.4-1~deb13u1",
          "FixedVersion": "3.5.4-1~deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-22796",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:e104edfe3282bb4b89c84caf3e603b5a5796884c903d8a81db54c9a9c31d773e",
          "Title": "openssl: OpenSSL: Denial of Service via type confusion in PKCS#7 signature verification",
          "Description": "Issue summary: A type confusion vulnerability exists in the signature\nverification of signed PKCS#7 data where an ASN1_TYPE union member is\naccessed without first validating the type, causing an invalid or NULL\npointer dereference when processing malformed PKCS#7 data.\n\nImpact summary: An application performing signature verification of PKCS#7\ndata or calling directly the PKCS7_digest_from_attributes() function can be\ncaused to dereference an invalid or NULL pointer when reading, resulting in\na Denial of Service.\n\nThe function PKCS7_digest_from_attributes() accesses the message digest attribute\nvalue without validating its type. When the type is not V_ASN1_OCTET_STRING,\nthis results in accessing invalid memory through the ASN1_TYPE union, causing\na crash.\n\nExploiting this vulnerability requires an attacker to provide a malformed\nsigned PKCS#7 to an application that verifies it. The impact of the\nexploit is just a Denial of Service, the PKCS7 API is legacy and applications\nshould be using the CMS API instead. For these reasons the issue was\nassessed as Low severity.\n\nThe FIPS modules in 3.5, 3.4, 3.3 and 3.0 are not affected by this issue,\nas the PKCS#7 parsing implementation is outside the OpenSSL FIPS module\nboundary.\n\nOpenSSL 3.6, 3.5, 3.4, 3.3, 3.0, 1.1.1 and 1.0.2 are vulnerable to this issue.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-754"
          ],
          "VendorSeverity": {
            "alma": 3,
            "amazon": 3,
            "azure": 2,
            "cbl-mariner": 2,
            "oracle-oval": 3,
            "photon": 2,
            "redhat": 1,
            "rocky": 3,
            "ubuntu": 1
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 5.9
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:1473",
            "https://access.redhat.com/security/cve/CVE-2026-22796",
            "https://bugzilla.redhat.com/2430375",
            "https://bugzilla.redhat.com/2430376",
            "https://bugzilla.redhat.com/2430377",
            "https://bugzilla.redhat.com/2430378",
            "https://bugzilla.redhat.com/2430379",
            "https://bugzilla.redhat.com/2430380",
            "https://bugzilla.redhat.com/2430381",
            "https://bugzilla.redhat.com/2430386",
            "https://bugzilla.redhat.com/2430387",
            "https://bugzilla.redhat.com/2430388",
            "https://bugzilla.redhat.com/2430389",
            "https://bugzilla.redhat.com/2430390",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430375",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430376",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430377",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430378",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430379",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430380",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430381",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430386",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430387",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430388",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430389",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430390",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11187",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15467",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15468",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15469",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66199",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68160",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69418",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69420",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69421",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22795",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22796",
            "https://errata.almalinux.org/9/ALSA-2026-1473.html",
            "https://errata.rockylinux.org/RLSA-2026:1473",
            "https://github.com/openssl/openssl/commit/2502e7b7d4c0cf4f972a881641fe09edc67aeec4",
            "https://github.com/openssl/openssl/commit/572844beca95068394c916626a6d3a490f831a49",
            "https://github.com/openssl/openssl/commit/7bbca05be55b129651d9df4bdb92becc45002c12",
            "https://github.com/openssl/openssl/commit/eeee3cbd4d682095ed431052f00403004596373e",
            "https://github.com/openssl/openssl/commit/ef2fb66ec571564d64d1c74a12e388a2a54d05d2",
            "https://linux.oracle.com/cve/CVE-2026-22796.html",
            "https://linux.oracle.com/errata/ELSA-2026-50081.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-22796",
            "https://openssl-library.org/news/secadv/20260127.txt",
            "https://ubuntu.com/security/notices/USN-7980-1",
            "https://ubuntu.com/security/notices/USN-7980-2",
            "https://www.cve.org/CVERecord?id=CVE-2026-22796"
          ],
          "PublishedDate": "2026-01-27T16:16:35.543Z",
          "LastModifiedDate": "2026-02-02T18:40:27.467Z"
        },
        {
          "VulnerabilityID": "CVE-2026-2673",
          "PkgID": "libssl3t64@3.5.4-1~deb13u1",
          "PkgName": "libssl3t64",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libssl3t64@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "4f2dd2c406757961",
            "BOMRef": "pkg:deb/debian/libssl3t64@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.5.4-1~deb13u1",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-2673",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:1666fa6ff4dfd8a0334b3f1a37f945d7cddc7dd00f3838f2c2f7e3297701c9e3",
          "Title": "openssl: OpenSSL TLS 1.3 server may choose unexpected key agreement group",
          "Description": "Issue summary: An OpenSSL TLS 1.3 server may fail to negotiate the expected\npreferred key exchange group when its key exchange group configuration includes\nthe default by using the 'DEFAULT' keyword.\n\nImpact summary: A less preferred key exchange may be used even when a more\npreferred group is supported by both client and server, if the group\nwas not included among the client's initial predicated keyshares.\nThis will sometimes be the case with the new hybrid post-quantum groups,\nif the client chooses to defer their use until specifically requested by\nthe server.\n\nIf an OpenSSL TLS 1.3 server's configuration uses the 'DEFAULT' keyword to\ninterpolate the built-in default group list into its own configuration, perhaps\nadding or removing specific elements, then an implementation defect causes the\n'DEFAULT' list to lose its 'tuple' structure, and all server-supported groups\nwere treated as a single sufficiently secure 'tuple', with the server not\nsending a Hello Retry Request (HRR) even when a group in a more preferred tuple\nwas mutually supported.\n\nAs a result, the client and server might fail to negotiate a mutually supported\npost-quantum key agreement group, such as 'X25519MLKEM768', if the client's\nconfiguration results in only 'classical' groups (such as 'X25519' being the\nonly ones in the client's initial keyshare prediction).\n\nOpenSSL 3.5 and later support a new syntax for selecting the most preferred TLS\n1.3 key agreement group on TLS servers.  The old syntax had a single 'flat'\nlist of groups, and treated all the supported groups as sufficiently secure.\nIf any of the keyshares predicted by the client were supported by the server\nthe most preferred among these was selected, even if other groups supported by\nthe client, but not included in the list of predicted keyshares would have been\nmore preferred, if included.\n\nThe new syntax partitions the groups into distinct 'tuples' of roughly\nequivalent security.  Within each tuple the most preferred group included among\nthe client's predicted keyshares is chosen, but if the client supports a group\nfrom a more preferred tuple, but did not predict any corresponding keyshares,\nthe server will ask the client to retry the ClientHello (by issuing a Hello\nRetry Request or HRR) with the most preferred mutually supported group.\n\nThe above works as expected when the server's configuration uses the built-in\ndefault group list, or explicitly defines its own list by directly defining the\nvarious desired groups and group 'tuples'.\n\nNo OpenSSL FIPS modules are affected by this issue, the code in question lies\noutside the FIPS boundary.\n\nOpenSSL 3.6 and 3.5 are vulnerable to this issue.\n\nOpenSSL 3.6 users should upgrade to OpenSSL 3.6.2 once it is released.\nOpenSSL 3.5 users should upgrade to OpenSSL 3.5.6 once it is released.\n\nOpenSSL 3.4, 3.3, 3.0, 1.0.2 and 1.1.1 are not affected by this issue.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-757"
          ],
          "VendorSeverity": {
            "amazon": 1,
            "redhat": 1,
            "ubuntu": 1
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N",
              "V3Score": 3.1
            }
          },
          "References": [
            "http://www.openwall.com/lists/oss-security/2026/03/13/3",
            "https://access.redhat.com/security/cve/CVE-2026-2673",
            "https://github.com/openssl/openssl/commit/2157c9d81f7b0bd7dfa25b960e928ec28e8dd63f",
            "https://github.com/openssl/openssl/commit/85977e013f32ceb96aa034c0e741adddc1a05e34",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-2673",
            "https://openssl-library.org/news/secadv/20260313.txt",
            "https://www.cve.org/CVERecord?id=CVE-2026-2673"
          ],
          "PublishedDate": "2026-03-13T19:54:34.033Z",
          "LastModifiedDate": "2026-03-17T18:16:15.6Z"
        },
        {
          "VulnerabilityID": "CVE-2026-29111",
          "PkgID": "libsystemd0@257.9-1~deb13u1",
          "PkgName": "libsystemd0",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libsystemd0@257.9-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "eeade743b01fad94",
            "BOMRef": "pkg:deb/debian/libsystemd0@257.9-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "257.9-1~deb13u1",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-29111",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:b0469c939b51284063499ca22e9cca211122e339fc3b9e9b71fe06f18b35dd05",
          "Title": "systemd: systemd: Arbitrary code execution or Denial of Service via spurious IPC API call data",
          "Description": "systemd, a system and service manager, (as PID 1) hits an assert and freezes execution when an unprivileged IPC API call is made with spurious data. On version v249 and older the effect is not an assert, but stack overwriting, with the attacker controlled content. From version v250 and newer this is not possible as the safety check causes an assert instead. This IPC call was added in v239, so versions older than that are not affected. Versions 260-rc1, 259.2, 258.5, and 257.11 contain patches. No known workarounds are available.",
          "Severity": "HIGH",
          "CweIDs": [
            "CWE-269"
          ],
          "VendorSeverity": {
            "redhat": 2,
            "ubuntu": 2
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
              "V3Score": 7.8
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-29111",
            "https://github.com/systemd/systemd/commit/1d22f706bd04f45f8422e17fbde3f56ece17758a",
            "https://github.com/systemd/systemd/commit/20021e7686426052e3a7505425d7e12085feb2a6",
            "https://github.com/systemd/systemd/commit/21167006574d6b83813c7596759b474f56562412",
            "https://github.com/systemd/systemd/commit/3cee294fe8cf4fa0eff933ab21416d099942cabd",
            "https://github.com/systemd/systemd/commit/42aee39107fbdd7db1ccd402a2151822b2805e9f",
            "https://github.com/systemd/systemd/commit/54588d2dedff54bfb6036670820650e4ea74628f",
            "https://github.com/systemd/systemd/commit/7ac3220213690e8a8d6d2a6e81e43bd1dce01d69",
            "https://github.com/systemd/systemd/commit/80acea4ef80a4bb78560ed970c34952299b890d6",
            "https://github.com/systemd/systemd/commit/b5fd14693057e5f2c9b4a49603be64ec3608ff6c",
            "https://github.com/systemd/systemd/commit/efa6ba2ab625aaa160ac435a09e6482fc63bdbe8",
            "https://github.com/systemd/systemd/security/advisories/GHSA-gx6q-6f99-m764",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-29111",
            "https://ubuntu.com/security/notices/USN-8119-1",
            "https://ubuntu.com/security/notices/USN-8119-2",
            "https://www.cve.org/CVERecord?id=CVE-2026-29111"
          ],
          "PublishedDate": "2026-03-23T22:16:26.267Z",
          "LastModifiedDate": "2026-03-24T15:53:48.067Z"
        },
        {
          "VulnerabilityID": "CVE-2026-4105",
          "PkgID": "libsystemd0@257.9-1~deb13u1",
          "PkgName": "libsystemd0",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libsystemd0@257.9-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "eeade743b01fad94",
            "BOMRef": "pkg:deb/debian/libsystemd0@257.9-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "257.9-1~deb13u1",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-4105",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:36b5f31297138580ad6187f23565113111d38861416f47d7f21b8701787aaf26",
          "Title": "systemd: systemd: Privilege escalation via improper access control in RegisterMachine D-Bus method",
          "Description": "A flaw was found in systemd. The systemd-machined service contains an Improper Access Control vulnerability due to insufficient validation of the class parameter in the RegisterMachine D-Bus (Desktop Bus) method. A local unprivileged user can exploit this by attempting to register a machine with a specific class value, which may leave behind a usable, attacker-controlled machine object. This allows the attacker to invoke methods on the privileged object, leading to the execution of arbitrary commands with root privileges on the host system.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-284"
          ],
          "VendorSeverity": {
            "redhat": 2
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
              "V3Score": 6.7
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-4105",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2447262",
            "https://github.com/systemd/systemd/security/advisories/GHSA-4h6x-r8vx-3862",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-4105",
            "https://www.cve.org/CVERecord?id=CVE-2026-4105"
          ],
          "PublishedDate": "2026-03-13T19:55:13.673Z",
          "LastModifiedDate": "2026-03-16T14:53:46.157Z"
        },
        {
          "VulnerabilityID": "CVE-2013-4392",
          "PkgID": "libsystemd0@257.9-1~deb13u1",
          "PkgName": "libsystemd0",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libsystemd0@257.9-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "eeade743b01fad94",
            "BOMRef": "pkg:deb/debian/libsystemd0@257.9-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "257.9-1~deb13u1",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2013-4392",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:86dcf3b8548f496a90fa1f5387163c4e4d687574d88c99fc939b3bf72bf22e92",
          "Title": "systemd: TOCTOU race condition when updating file permissions and SELinux security contexts",
          "Description": "systemd, when updating file permissions, allows local users to change the permissions and SELinux security contexts for arbitrary files via a symlink attack on unspecified files.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-59"
          ],
          "VendorSeverity": {
            "debian": 1,
            "nvd": 1,
            "redhat": 2
          },
          "CVSS": {
            "nvd": {
              "V2Vector": "AV:L/AC:M/Au:N/C:P/I:P/A:N",
              "V2Score": 3.3
            },
            "redhat": {
              "V2Vector": "AV:L/AC:M/Au:N/C:P/I:P/A:N",
              "V2Score": 3.3
            }
          },
          "References": [
            "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357",
            "http://www.openwall.com/lists/oss-security/2013/10/01/9",
            "https://access.redhat.com/security/cve/CVE-2013-4392",
            "https://bugzilla.redhat.com/show_bug.cgi?id=859060",
            "https://nvd.nist.gov/vuln/detail/CVE-2013-4392",
            "https://www.cve.org/CVERecord?id=CVE-2013-4392"
          ],
          "PublishedDate": "2013-10-28T22:55:03.773Z",
          "LastModifiedDate": "2025-06-09T16:15:23.763Z"
        },
        {
          "VulnerabilityID": "CVE-2023-31437",
          "PkgID": "libsystemd0@257.9-1~deb13u1",
          "PkgName": "libsystemd0",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libsystemd0@257.9-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "eeade743b01fad94",
            "BOMRef": "pkg:deb/debian/libsystemd0@257.9-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "257.9-1~deb13u1",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2023-31437",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:6d49f61c55434055fbef8bfcd536fc0899a541ce3c248fbadfa83529d370f073",
          "Title": "An issue was discovered in systemd 253. An attacker can modify a seale ...",
          "Description": "An issue was discovered in systemd 253. An attacker can modify a sealed log file such that, in some views, not all existing and sealed log messages are displayed. NOTE: the vendor reportedly sent \"a reply denying that any of the finding was a security vulnerability.\"",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-354"
          ],
          "VendorSeverity": {
            "debian": 1,
            "nvd": 2
          },
          "CVSS": {
            "nvd": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
              "V3Score": 5.3
            }
          },
          "References": [
            "https://github.com/kastel-security/Journald",
            "https://github.com/kastel-security/Journald/blob/main/journald-publication.pdf",
            "https://github.com/systemd/systemd/releases"
          ],
          "PublishedDate": "2023-06-13T17:15:14.657Z",
          "LastModifiedDate": "2025-01-03T20:15:26.457Z"
        },
        {
          "VulnerabilityID": "CVE-2023-31438",
          "PkgID": "libsystemd0@257.9-1~deb13u1",
          "PkgName": "libsystemd0",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libsystemd0@257.9-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "eeade743b01fad94",
            "BOMRef": "pkg:deb/debian/libsystemd0@257.9-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "257.9-1~deb13u1",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2023-31438",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:80cfe849459c13a16d96def3cbf335a9bf3a933cd7f099a884a49e70969a136b",
          "Title": "An issue was discovered in systemd 253. An attacker can truncate a sea ...",
          "Description": "An issue was discovered in systemd 253. An attacker can truncate a sealed log file and then resume log sealing such that checking the integrity shows no error, despite modifications. NOTE: the vendor reportedly sent \"a reply denying that any of the finding was a security vulnerability.\"",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-354"
          ],
          "VendorSeverity": {
            "debian": 1,
            "nvd": 2
          },
          "CVSS": {
            "nvd": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
              "V3Score": 5.3
            }
          },
          "References": [
            "https://github.com/kastel-security/Journald",
            "https://github.com/kastel-security/Journald/blob/main/journald-publication.pdf",
            "https://github.com/systemd/systemd/pull/28886",
            "https://github.com/systemd/systemd/releases"
          ],
          "PublishedDate": "2023-06-13T17:15:14.707Z",
          "LastModifiedDate": "2024-11-21T08:01:51.953Z"
        },
        {
          "VulnerabilityID": "CVE-2023-31439",
          "PkgID": "libsystemd0@257.9-1~deb13u1",
          "PkgName": "libsystemd0",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libsystemd0@257.9-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "eeade743b01fad94",
            "BOMRef": "pkg:deb/debian/libsystemd0@257.9-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "257.9-1~deb13u1",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2023-31439",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:fdd2d1d3d4979f2319d046151f8065940226b0cccf8cd32730443de022b95d8b",
          "Title": "An issue was discovered in systemd 253. An attacker can modify the con ...",
          "Description": "An issue was discovered in systemd 253. An attacker can modify the contents of past events in a sealed log file and then adjust the file such that checking the integrity shows no error, despite modifications. NOTE: the vendor reportedly sent \"a reply denying that any of the finding was a security vulnerability.\"",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-354"
          ],
          "VendorSeverity": {
            "amazon": 1,
            "debian": 1,
            "nvd": 2
          },
          "CVSS": {
            "nvd": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
              "V3Score": 5.3
            }
          },
          "References": [
            "https://github.com/kastel-security/Journald",
            "https://github.com/kastel-security/Journald/blob/main/journald-publication.pdf",
            "https://github.com/systemd/systemd/pull/28885",
            "https://github.com/systemd/systemd/releases"
          ],
          "PublishedDate": "2023-06-13T17:15:14.753Z",
          "LastModifiedDate": "2024-11-21T08:01:52.097Z"
        },
        {
          "VulnerabilityID": "CVE-2025-69720",
          "PkgID": "libtinfo6@6.5+20250216-2",
          "PkgName": "libtinfo6",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libtinfo6@6.5%2B20250216-2?arch=amd64\u0026distro=debian-13.2",
            "UID": "f2ffc2a00dd8a557",
            "BOMRef": "pkg:deb/debian/libtinfo6@6.5%2B20250216-2?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "6.5+20250216-2",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "SeveritySource": "nvd",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-69720",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:9925a9533f498e258c81ad6f2fd71b31aaac4a3640aa5f56ac0d7a40d06b3230",
          "Title": "ncurses: ncurses: Buffer overflow vulnerability may lead to arbitrary code execution.",
          "Description": "The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.",
          "Severity": "HIGH",
          "CweIDs": [
            "CWE-121",
            "CWE-120"
          ],
          "VendorSeverity": {
            "alma": 2,
            "cbl-mariner": 4,
            "nvd": 3,
            "oracle-oval": 2,
            "redhat": 2
          },
          "CVSS": {
            "nvd": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
              "V3Score": 7.8
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H",
              "V3Score": 7.3
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:5913",
            "https://access.redhat.com/security/cve/CVE-2025-69720",
            "https://bugzilla.redhat.com/2449037",
            "https://errata.almalinux.org/10/ALSA-2026-5913.html",
            "https://github.com/Cao-Wuhui/CVE-2025-69720",
            "https://invisible-island.net/archives/ncurses/6.5/",
            "https://invisible-island.net/ncurses/",
            "https://linux.oracle.com/cve/CVE-2025-69720.html",
            "https://linux.oracle.com/errata/ELSA-2026-5913.html",
            "https://marc.info/?l=ncurses-bug\u0026m=176539968328570\u0026w=2",
            "https://marc.info/?l=ncurses-bug\u0026m=176540731801330\u0026w=2",
            "https://marc.info/?l=ncurses-bug\u0026m=176545557728083\u0026w=2",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-69720",
            "https://www.cve.org/CVERecord?id=CVE-2025-69720"
          ],
          "PublishedDate": "2026-03-19T15:16:21.293Z",
          "LastModifiedDate": "2026-03-26T19:35:10.547Z"
        },
        {
          "VulnerabilityID": "CVE-2025-6141",
          "PkgID": "libtinfo6@6.5+20250216-2",
          "PkgName": "libtinfo6",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libtinfo6@6.5%2B20250216-2?arch=amd64\u0026distro=debian-13.2",
            "UID": "f2ffc2a00dd8a557",
            "BOMRef": "pkg:deb/debian/libtinfo6@6.5%2B20250216-2?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "6.5+20250216-2",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-6141",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:fc9f866d9474ab473de95683562b8dbf9965ff7c9f2655c3c61f70b8137e6722",
          "Title": "gnu-ncurses: ncurses Stack Buffer Overflow",
          "Description": "A vulnerability has been found in GNU ncurses up to 6.5-20250322 and classified as problematic. This vulnerability affects the function postprocess_termcap of the file tinfo/parse_entry.c. The manipulation leads to stack-based buffer overflow. The attack needs to be approached locally. Upgrading to version 6.5-20250329 is able to address this issue. It is recommended to upgrade the affected component.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-119",
            "CWE-121"
          ],
          "VendorSeverity": {
            "photon": 1,
            "redhat": 1
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
              "V3Score": 3.3
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2025-6141",
            "https://invisible-island.net/ncurses/NEWS.html#index-t20250329",
            "https://lists.gnu.org/archive/html/bug-ncurses/2025-03/msg00107.html",
            "https://lists.gnu.org/archive/html/bug-ncurses/2025-03/msg00109.html",
            "https://lists.gnu.org/archive/html/bug-ncurses/2025-03/msg00114.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-6141",
            "https://vuldb.com/?ctiid.312610",
            "https://vuldb.com/?id.312610",
            "https://vuldb.com/?submit.593000",
            "https://www.cve.org/CVERecord?id=CVE-2025-6141",
            "https://www.gnu.org/"
          ],
          "PublishedDate": "2025-06-16T22:16:41.527Z",
          "LastModifiedDate": "2025-06-17T20:50:23.507Z"
        },
        {
          "VulnerabilityID": "CVE-2026-29111",
          "PkgID": "libudev1@257.9-1~deb13u1",
          "PkgName": "libudev1",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libudev1@257.9-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "9681c2a9df484988",
            "BOMRef": "pkg:deb/debian/libudev1@257.9-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "257.9-1~deb13u1",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-29111",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:6431bcc5f8f77400823f27529308c0236c289941e8792099763b894cc491a3fe",
          "Title": "systemd: systemd: Arbitrary code execution or Denial of Service via spurious IPC API call data",
          "Description": "systemd, a system and service manager, (as PID 1) hits an assert and freezes execution when an unprivileged IPC API call is made with spurious data. On version v249 and older the effect is not an assert, but stack overwriting, with the attacker controlled content. From version v250 and newer this is not possible as the safety check causes an assert instead. This IPC call was added in v239, so versions older than that are not affected. Versions 260-rc1, 259.2, 258.5, and 257.11 contain patches. No known workarounds are available.",
          "Severity": "HIGH",
          "CweIDs": [
            "CWE-269"
          ],
          "VendorSeverity": {
            "redhat": 2,
            "ubuntu": 2
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
              "V3Score": 7.8
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-29111",
            "https://github.com/systemd/systemd/commit/1d22f706bd04f45f8422e17fbde3f56ece17758a",
            "https://github.com/systemd/systemd/commit/20021e7686426052e3a7505425d7e12085feb2a6",
            "https://github.com/systemd/systemd/commit/21167006574d6b83813c7596759b474f56562412",
            "https://github.com/systemd/systemd/commit/3cee294fe8cf4fa0eff933ab21416d099942cabd",
            "https://github.com/systemd/systemd/commit/42aee39107fbdd7db1ccd402a2151822b2805e9f",
            "https://github.com/systemd/systemd/commit/54588d2dedff54bfb6036670820650e4ea74628f",
            "https://github.com/systemd/systemd/commit/7ac3220213690e8a8d6d2a6e81e43bd1dce01d69",
            "https://github.com/systemd/systemd/commit/80acea4ef80a4bb78560ed970c34952299b890d6",
            "https://github.com/systemd/systemd/commit/b5fd14693057e5f2c9b4a49603be64ec3608ff6c",
            "https://github.com/systemd/systemd/commit/efa6ba2ab625aaa160ac435a09e6482fc63bdbe8",
            "https://github.com/systemd/systemd/security/advisories/GHSA-gx6q-6f99-m764",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-29111",
            "https://ubuntu.com/security/notices/USN-8119-1",
            "https://ubuntu.com/security/notices/USN-8119-2",
            "https://www.cve.org/CVERecord?id=CVE-2026-29111"
          ],
          "PublishedDate": "2026-03-23T22:16:26.267Z",
          "LastModifiedDate": "2026-03-24T15:53:48.067Z"
        },
        {
          "VulnerabilityID": "CVE-2026-4105",
          "PkgID": "libudev1@257.9-1~deb13u1",
          "PkgName": "libudev1",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libudev1@257.9-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "9681c2a9df484988",
            "BOMRef": "pkg:deb/debian/libudev1@257.9-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "257.9-1~deb13u1",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-4105",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:aeb4dd054b383fd59bb4604eb09518a2c0a1afdaa78c24f83f5c24a01bc0eb3f",
          "Title": "systemd: systemd: Privilege escalation via improper access control in RegisterMachine D-Bus method",
          "Description": "A flaw was found in systemd. The systemd-machined service contains an Improper Access Control vulnerability due to insufficient validation of the class parameter in the RegisterMachine D-Bus (Desktop Bus) method. A local unprivileged user can exploit this by attempting to register a machine with a specific class value, which may leave behind a usable, attacker-controlled machine object. This allows the attacker to invoke methods on the privileged object, leading to the execution of arbitrary commands with root privileges on the host system.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-284"
          ],
          "VendorSeverity": {
            "redhat": 2
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
              "V3Score": 6.7
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-4105",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2447262",
            "https://github.com/systemd/systemd/security/advisories/GHSA-4h6x-r8vx-3862",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-4105",
            "https://www.cve.org/CVERecord?id=CVE-2026-4105"
          ],
          "PublishedDate": "2026-03-13T19:55:13.673Z",
          "LastModifiedDate": "2026-03-16T14:53:46.157Z"
        },
        {
          "VulnerabilityID": "CVE-2013-4392",
          "PkgID": "libudev1@257.9-1~deb13u1",
          "PkgName": "libudev1",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libudev1@257.9-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "9681c2a9df484988",
            "BOMRef": "pkg:deb/debian/libudev1@257.9-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "257.9-1~deb13u1",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2013-4392",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:524691d4c2e8a23986c4823e15032ffea40673823c339389c0013a93ac064b2a",
          "Title": "systemd: TOCTOU race condition when updating file permissions and SELinux security contexts",
          "Description": "systemd, when updating file permissions, allows local users to change the permissions and SELinux security contexts for arbitrary files via a symlink attack on unspecified files.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-59"
          ],
          "VendorSeverity": {
            "debian": 1,
            "nvd": 1,
            "redhat": 2
          },
          "CVSS": {
            "nvd": {
              "V2Vector": "AV:L/AC:M/Au:N/C:P/I:P/A:N",
              "V2Score": 3.3
            },
            "redhat": {
              "V2Vector": "AV:L/AC:M/Au:N/C:P/I:P/A:N",
              "V2Score": 3.3
            }
          },
          "References": [
            "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357",
            "http://www.openwall.com/lists/oss-security/2013/10/01/9",
            "https://access.redhat.com/security/cve/CVE-2013-4392",
            "https://bugzilla.redhat.com/show_bug.cgi?id=859060",
            "https://nvd.nist.gov/vuln/detail/CVE-2013-4392",
            "https://www.cve.org/CVERecord?id=CVE-2013-4392"
          ],
          "PublishedDate": "2013-10-28T22:55:03.773Z",
          "LastModifiedDate": "2025-06-09T16:15:23.763Z"
        },
        {
          "VulnerabilityID": "CVE-2023-31437",
          "PkgID": "libudev1@257.9-1~deb13u1",
          "PkgName": "libudev1",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libudev1@257.9-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "9681c2a9df484988",
            "BOMRef": "pkg:deb/debian/libudev1@257.9-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "257.9-1~deb13u1",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2023-31437",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:013977fb4eb683d24191a43bd7bba92e674331de72a323405f293722a91e50c1",
          "Title": "An issue was discovered in systemd 253. An attacker can modify a seale ...",
          "Description": "An issue was discovered in systemd 253. An attacker can modify a sealed log file such that, in some views, not all existing and sealed log messages are displayed. NOTE: the vendor reportedly sent \"a reply denying that any of the finding was a security vulnerability.\"",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-354"
          ],
          "VendorSeverity": {
            "debian": 1,
            "nvd": 2
          },
          "CVSS": {
            "nvd": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
              "V3Score": 5.3
            }
          },
          "References": [
            "https://github.com/kastel-security/Journald",
            "https://github.com/kastel-security/Journald/blob/main/journald-publication.pdf",
            "https://github.com/systemd/systemd/releases"
          ],
          "PublishedDate": "2023-06-13T17:15:14.657Z",
          "LastModifiedDate": "2025-01-03T20:15:26.457Z"
        },
        {
          "VulnerabilityID": "CVE-2023-31438",
          "PkgID": "libudev1@257.9-1~deb13u1",
          "PkgName": "libudev1",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libudev1@257.9-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "9681c2a9df484988",
            "BOMRef": "pkg:deb/debian/libudev1@257.9-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "257.9-1~deb13u1",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2023-31438",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:9faae0df272a8a07f9a77826ad3516c6c061a0942c49b03764dae6fecf00bb34",
          "Title": "An issue was discovered in systemd 253. An attacker can truncate a sea ...",
          "Description": "An issue was discovered in systemd 253. An attacker can truncate a sealed log file and then resume log sealing such that checking the integrity shows no error, despite modifications. NOTE: the vendor reportedly sent \"a reply denying that any of the finding was a security vulnerability.\"",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-354"
          ],
          "VendorSeverity": {
            "debian": 1,
            "nvd": 2
          },
          "CVSS": {
            "nvd": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
              "V3Score": 5.3
            }
          },
          "References": [
            "https://github.com/kastel-security/Journald",
            "https://github.com/kastel-security/Journald/blob/main/journald-publication.pdf",
            "https://github.com/systemd/systemd/pull/28886",
            "https://github.com/systemd/systemd/releases"
          ],
          "PublishedDate": "2023-06-13T17:15:14.707Z",
          "LastModifiedDate": "2024-11-21T08:01:51.953Z"
        },
        {
          "VulnerabilityID": "CVE-2023-31439",
          "PkgID": "libudev1@257.9-1~deb13u1",
          "PkgName": "libudev1",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libudev1@257.9-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "9681c2a9df484988",
            "BOMRef": "pkg:deb/debian/libudev1@257.9-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "257.9-1~deb13u1",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2023-31439",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:81d8bb3144c005046d4a9afcb6f1fb518c8f3f767c06d76c4b7f34ed6299c523",
          "Title": "An issue was discovered in systemd 253. An attacker can modify the con ...",
          "Description": "An issue was discovered in systemd 253. An attacker can modify the contents of past events in a sealed log file and then adjust the file such that checking the integrity shows no error, despite modifications. NOTE: the vendor reportedly sent \"a reply denying that any of the finding was a security vulnerability.\"",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-354"
          ],
          "VendorSeverity": {
            "amazon": 1,
            "debian": 1,
            "nvd": 2
          },
          "CVSS": {
            "nvd": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
              "V3Score": 5.3
            }
          },
          "References": [
            "https://github.com/kastel-security/Journald",
            "https://github.com/kastel-security/Journald/blob/main/journald-publication.pdf",
            "https://github.com/systemd/systemd/pull/28885",
            "https://github.com/systemd/systemd/releases"
          ],
          "PublishedDate": "2023-06-13T17:15:14.753Z",
          "LastModifiedDate": "2024-11-21T08:01:52.097Z"
        },
        {
          "VulnerabilityID": "CVE-2022-0563",
          "PkgID": "libuuid1@2.41-5",
          "PkgName": "libuuid1",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libuuid1@2.41-5?arch=amd64\u0026distro=debian-13.2",
            "UID": "1941b5abe3030b2b",
            "BOMRef": "pkg:deb/debian/libuuid1@2.41-5?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-5",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-0563",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:cbde298f8ad47f20a83890741301f86337808e16f3b3929b0dc98233c837a57f",
          "Title": "util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline",
          "Description": "A flaw was found in the util-linux chfn and chsh utilities when compiled with Readline support. The Readline library uses an \"INPUTRC\" environment variable to get a path to the library config file. When the library cannot parse the specified file, it prints an error message containing data from the file. This flaw allows an unprivileged user to read root-owned files, potentially leading to privilege escalation. This flaw affects util-linux versions prior to 2.37.4.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-209"
          ],
          "VendorSeverity": {
            "amazon": 2,
            "cbl-mariner": 2,
            "debian": 1,
            "nvd": 2,
            "photon": 2,
            "redhat": 2
          },
          "CVSS": {
            "nvd": {
              "V2Vector": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
              "V2Score": 1.9,
              "V3Score": 5.5
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
              "V3Score": 5.5
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2022-0563",
            "https://blog.trailofbits.com/2023/02/16/suid-logic-bug-linux-readline/",
            "https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w%40ws.net.home/T/#u",
            "https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u",
            "https://nvd.nist.gov/vuln/detail/CVE-2022-0563",
            "https://security.gentoo.org/glsa/202401-08",
            "https://security.netapp.com/advisory/ntap-20220331-0002/",
            "https://www.cve.org/CVERecord?id=CVE-2022-0563"
          ],
          "PublishedDate": "2022-02-21T19:15:08.393Z",
          "LastModifiedDate": "2025-06-09T16:15:33.237Z"
        },
        {
          "VulnerabilityID": "CVE-2025-14104",
          "PkgID": "libuuid1@2.41-5",
          "PkgName": "libuuid1",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libuuid1@2.41-5?arch=amd64\u0026distro=debian-13.2",
            "UID": "1941b5abe3030b2b",
            "BOMRef": "pkg:deb/debian/libuuid1@2.41-5?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-5",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-14104",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:e910de27c6b59ddc90fc429d56d92bf460441d56d335469efa9aae26b845771a",
          "Title": "util-linux: util-linux: Heap buffer overread in setpwnam() when processing 256-byte usernames",
          "Description": "A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-125"
          ],
          "VendorSeverity": {
            "alma": 2,
            "azure": 2,
            "cbl-mariner": 2,
            "debian": 1,
            "oracle-oval": 2,
            "photon": 2,
            "redhat": 2,
            "rocky": 2
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
              "V3Score": 6.1
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:1696",
            "https://access.redhat.com/errata/RHSA-2026:1852",
            "https://access.redhat.com/errata/RHSA-2026:1913",
            "https://access.redhat.com/errata/RHSA-2026:2485",
            "https://access.redhat.com/errata/RHSA-2026:2563",
            "https://access.redhat.com/errata/RHSA-2026:2737",
            "https://access.redhat.com/errata/RHSA-2026:2800",
            "https://access.redhat.com/errata/RHSA-2026:3406",
            "https://access.redhat.com/errata/RHSA-2026:4943",
            "https://access.redhat.com/security/cve/CVE-2025-14104",
            "https://bugzilla.redhat.com/2419369",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2419369",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14104",
            "https://errata.almalinux.org/9/ALSA-2026-1913.html",
            "https://errata.rockylinux.org/RLSA-2026:1913",
            "https://linux.oracle.com/cve/CVE-2025-14104.html",
            "https://linux.oracle.com/errata/ELSA-2026-1913.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-14104",
            "https://www.cve.org/CVERecord?id=CVE-2025-14104"
          ],
          "PublishedDate": "2025-12-05T17:16:03.117Z",
          "LastModifiedDate": "2026-03-18T17:16:03.817Z"
        },
        {
          "VulnerabilityID": "CVE-2026-3184",
          "PkgID": "libuuid1@2.41-5",
          "PkgName": "libuuid1",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libuuid1@2.41-5?arch=amd64\u0026distro=debian-13.2",
            "UID": "1941b5abe3030b2b",
            "BOMRef": "pkg:deb/debian/libuuid1@2.41-5?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-5",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-3184",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:fbe74375246477f929e3ff7c1975eeeafc86237220c8f05a990c69f5b8971cfc",
          "Title": "util-linux: util-linux: Access control bypass due to improper hostname canonicalization",
          "Description": "A flaw was found in util-linux. Improper hostname canonicalization in the `login(1)` utility, when invoked with the `-h` option, can modify the supplied remote hostname before setting `PAM_RHOST`. A remote attacker could exploit this by providing a specially crafted hostname, potentially bypassing host-based Pluggable Authentication Modules (PAM) access control rules that rely on fully qualified domain names. This could lead to unauthorized access.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-289"
          ],
          "VendorSeverity": {
            "redhat": 1,
            "ubuntu": 2
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
              "V3Score": 3.7
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-3184",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2442570",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-3184",
            "https://www.cve.org/CVERecord?id=CVE-2026-3184"
          ],
          "PublishedDate": "2026-04-03T19:17:23.377Z",
          "LastModifiedDate": "2026-04-03T19:17:23.377Z"
        },
        {
          "VulnerabilityID": "CVE-2026-27456",
          "PkgID": "libuuid1@2.41-5",
          "PkgName": "libuuid1",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libuuid1@2.41-5?arch=amd64\u0026distro=debian-13.2",
            "UID": "1941b5abe3030b2b",
            "BOMRef": "pkg:deb/debian/libuuid1@2.41-5?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-5",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-27456",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:19cfcf237cce63ae38e9e54b866e1fbad1b9e67e16c0cc6ef16dac7ca34f0e2a",
          "Title": "[util-linux: mount(8) TOCTOU symlink attack via loop device]",
          "Description": "util-linux is a random collection of Linux utilities. Prior to version 2.41.4, a TOCTOU (Time-of-Check-Time-of-Use) vulnerability has been identified in the SUID binary /usr/bin/mount from util-linux. The mount binary, when setting up loop devices, validates the source file path with user privileges via fork() + setuid() + realpath(), but subsequently re-canonicalizes and opens it with root privileges (euid=0) without verifying that the path has not been replaced between both operations. Neither O_NOFOLLOW, nor inode comparison, nor post-open fstat() are employed. This allows a local unprivileged user to replace the source file with a symlink pointing to any root-owned file or device during the race window, causing the SUID binary to open and mount it as root. Exploitation requires an /etc/fstab entry with user,loop options whose path points to a directory where the attacker has write permission, and that /usr/bin/mount has the SUID bit set (the default configuration on virtually all Linux distributions). The impact is unauthorized read access to root-protected files and block devices, including backup images, disk volumes, and any file containing a valid filesystem. This issue has been patched in version 2.41.4.",
          "Severity": "UNKNOWN",
          "CweIDs": [
            "CWE-59",
            "CWE-269",
            "CWE-367"
          ],
          "References": [
            "https://github.com/util-linux/util-linux/commit/5e390467b26a3cf3fecc04e1a0d482dff3162fc4",
            "https://github.com/util-linux/util-linux/releases/tag/v2.41.4",
            "https://github.com/util-linux/util-linux/security/advisories/GHSA-qq4x-vfq4-9h9g"
          ],
          "PublishedDate": "2026-04-03T22:16:25.4Z",
          "LastModifiedDate": "2026-04-03T22:16:25.4Z"
        },
        {
          "VulnerabilityID": "CVE-2022-0563",
          "PkgID": "login@1:4.16.0-2+really2.41-5",
          "PkgName": "login",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/login@4.16.0-2%2Breally2.41-5?arch=amd64\u0026distro=debian-13.2\u0026epoch=1",
            "UID": "c0ac1768816bc3b2",
            "BOMRef": "pkg:deb/debian/login@4.16.0-2%2Breally2.41-5?arch=amd64\u0026distro=debian-13.2\u0026epoch=1"
          },
          "InstalledVersion": "1:4.16.0-2+really2.41-5",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-0563",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:e510bb4c8d78156cf9203bee1a4aa6118b4336e2a57533f2e6861170fe769291",
          "Title": "util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline",
          "Description": "A flaw was found in the util-linux chfn and chsh utilities when compiled with Readline support. The Readline library uses an \"INPUTRC\" environment variable to get a path to the library config file. When the library cannot parse the specified file, it prints an error message containing data from the file. This flaw allows an unprivileged user to read root-owned files, potentially leading to privilege escalation. This flaw affects util-linux versions prior to 2.37.4.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-209"
          ],
          "VendorSeverity": {
            "amazon": 2,
            "cbl-mariner": 2,
            "debian": 1,
            "nvd": 2,
            "photon": 2,
            "redhat": 2
          },
          "CVSS": {
            "nvd": {
              "V2Vector": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
              "V2Score": 1.9,
              "V3Score": 5.5
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
              "V3Score": 5.5
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2022-0563",
            "https://blog.trailofbits.com/2023/02/16/suid-logic-bug-linux-readline/",
            "https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w%40ws.net.home/T/#u",
            "https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u",
            "https://nvd.nist.gov/vuln/detail/CVE-2022-0563",
            "https://security.gentoo.org/glsa/202401-08",
            "https://security.netapp.com/advisory/ntap-20220331-0002/",
            "https://www.cve.org/CVERecord?id=CVE-2022-0563"
          ],
          "PublishedDate": "2022-02-21T19:15:08.393Z",
          "LastModifiedDate": "2025-06-09T16:15:33.237Z"
        },
        {
          "VulnerabilityID": "CVE-2025-14104",
          "PkgID": "login@1:4.16.0-2+really2.41-5",
          "PkgName": "login",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/login@4.16.0-2%2Breally2.41-5?arch=amd64\u0026distro=debian-13.2\u0026epoch=1",
            "UID": "c0ac1768816bc3b2",
            "BOMRef": "pkg:deb/debian/login@4.16.0-2%2Breally2.41-5?arch=amd64\u0026distro=debian-13.2\u0026epoch=1"
          },
          "InstalledVersion": "1:4.16.0-2+really2.41-5",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-14104",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:36691fcdb7c8d0e563f89730499276a9168448b6aab46628986db85881711415",
          "Title": "util-linux: util-linux: Heap buffer overread in setpwnam() when processing 256-byte usernames",
          "Description": "A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-125"
          ],
          "VendorSeverity": {
            "alma": 2,
            "azure": 2,
            "cbl-mariner": 2,
            "debian": 1,
            "oracle-oval": 2,
            "photon": 2,
            "redhat": 2,
            "rocky": 2
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
              "V3Score": 6.1
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:1696",
            "https://access.redhat.com/errata/RHSA-2026:1852",
            "https://access.redhat.com/errata/RHSA-2026:1913",
            "https://access.redhat.com/errata/RHSA-2026:2485",
            "https://access.redhat.com/errata/RHSA-2026:2563",
            "https://access.redhat.com/errata/RHSA-2026:2737",
            "https://access.redhat.com/errata/RHSA-2026:2800",
            "https://access.redhat.com/errata/RHSA-2026:3406",
            "https://access.redhat.com/errata/RHSA-2026:4943",
            "https://access.redhat.com/security/cve/CVE-2025-14104",
            "https://bugzilla.redhat.com/2419369",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2419369",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14104",
            "https://errata.almalinux.org/9/ALSA-2026-1913.html",
            "https://errata.rockylinux.org/RLSA-2026:1913",
            "https://linux.oracle.com/cve/CVE-2025-14104.html",
            "https://linux.oracle.com/errata/ELSA-2026-1913.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-14104",
            "https://www.cve.org/CVERecord?id=CVE-2025-14104"
          ],
          "PublishedDate": "2025-12-05T17:16:03.117Z",
          "LastModifiedDate": "2026-03-18T17:16:03.817Z"
        },
        {
          "VulnerabilityID": "CVE-2026-3184",
          "PkgID": "login@1:4.16.0-2+really2.41-5",
          "PkgName": "login",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/login@4.16.0-2%2Breally2.41-5?arch=amd64\u0026distro=debian-13.2\u0026epoch=1",
            "UID": "c0ac1768816bc3b2",
            "BOMRef": "pkg:deb/debian/login@4.16.0-2%2Breally2.41-5?arch=amd64\u0026distro=debian-13.2\u0026epoch=1"
          },
          "InstalledVersion": "1:4.16.0-2+really2.41-5",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-3184",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:2b1c568967b3e71c992d4c7999300bb949840e66eb794671ff89ebaff2068e22",
          "Title": "util-linux: util-linux: Access control bypass due to improper hostname canonicalization",
          "Description": "A flaw was found in util-linux. Improper hostname canonicalization in the `login(1)` utility, when invoked with the `-h` option, can modify the supplied remote hostname before setting `PAM_RHOST`. A remote attacker could exploit this by providing a specially crafted hostname, potentially bypassing host-based Pluggable Authentication Modules (PAM) access control rules that rely on fully qualified domain names. This could lead to unauthorized access.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-289"
          ],
          "VendorSeverity": {
            "redhat": 1,
            "ubuntu": 2
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
              "V3Score": 3.7
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-3184",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2442570",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-3184",
            "https://www.cve.org/CVERecord?id=CVE-2026-3184"
          ],
          "PublishedDate": "2026-04-03T19:17:23.377Z",
          "LastModifiedDate": "2026-04-03T19:17:23.377Z"
        },
        {
          "VulnerabilityID": "CVE-2026-27456",
          "PkgID": "login@1:4.16.0-2+really2.41-5",
          "PkgName": "login",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/login@4.16.0-2%2Breally2.41-5?arch=amd64\u0026distro=debian-13.2\u0026epoch=1",
            "UID": "c0ac1768816bc3b2",
            "BOMRef": "pkg:deb/debian/login@4.16.0-2%2Breally2.41-5?arch=amd64\u0026distro=debian-13.2\u0026epoch=1"
          },
          "InstalledVersion": "1:4.16.0-2+really2.41-5",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-27456",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:eff3cccc405178c1e712b46a94a4bb77da7941e2dc1d8445249268fa8b7fc30a",
          "Title": "[util-linux: mount(8) TOCTOU symlink attack via loop device]",
          "Description": "util-linux is a random collection of Linux utilities. Prior to version 2.41.4, a TOCTOU (Time-of-Check-Time-of-Use) vulnerability has been identified in the SUID binary /usr/bin/mount from util-linux. The mount binary, when setting up loop devices, validates the source file path with user privileges via fork() + setuid() + realpath(), but subsequently re-canonicalizes and opens it with root privileges (euid=0) without verifying that the path has not been replaced between both operations. Neither O_NOFOLLOW, nor inode comparison, nor post-open fstat() are employed. This allows a local unprivileged user to replace the source file with a symlink pointing to any root-owned file or device during the race window, causing the SUID binary to open and mount it as root. Exploitation requires an /etc/fstab entry with user,loop options whose path points to a directory where the attacker has write permission, and that /usr/bin/mount has the SUID bit set (the default configuration on virtually all Linux distributions). The impact is unauthorized read access to root-protected files and block devices, including backup images, disk volumes, and any file containing a valid filesystem. This issue has been patched in version 2.41.4.",
          "Severity": "UNKNOWN",
          "CweIDs": [
            "CWE-59",
            "CWE-269",
            "CWE-367"
          ],
          "References": [
            "https://github.com/util-linux/util-linux/commit/5e390467b26a3cf3fecc04e1a0d482dff3162fc4",
            "https://github.com/util-linux/util-linux/releases/tag/v2.41.4",
            "https://github.com/util-linux/util-linux/security/advisories/GHSA-qq4x-vfq4-9h9g"
          ],
          "PublishedDate": "2026-04-03T22:16:25.4Z",
          "LastModifiedDate": "2026-04-03T22:16:25.4Z"
        },
        {
          "VulnerabilityID": "CVE-2007-5686",
          "PkgID": "login.defs@1:4.17.4-2",
          "PkgName": "login.defs",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/login.defs@4.17.4-2?arch=all\u0026distro=debian-13.2\u0026epoch=1",
            "UID": "c14bb7c9d56f57d2",
            "BOMRef": "pkg:deb/debian/login.defs@4.17.4-2?arch=all\u0026distro=debian-13.2\u0026epoch=1"
          },
          "InstalledVersion": "1:4.17.4-2",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2007-5686",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:e85b6e6872870a50a77b442f088bff971102a31b4f7e1badba7603df510f28fc",
          "Title": "initscripts in rPath Linux 1 sets insecure permissions for the /var/lo ...",
          "Description": "initscripts in rPath Linux 1 sets insecure permissions for the /var/log/btmp file, which allows local users to obtain sensitive information regarding authentication attempts.  NOTE: because sshd detects the insecure permissions and does not log certain events, this also prevents sshd from logging failed authentication attempts by remote attackers.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-264"
          ],
          "VendorSeverity": {
            "debian": 1,
            "nvd": 2
          },
          "CVSS": {
            "nvd": {
              "V2Vector": "AV:L/AC:L/Au:N/C:C/I:N/A:N",
              "V2Score": 4.9
            }
          },
          "References": [
            "http://secunia.com/advisories/27215",
            "http://www.securityfocus.com/archive/1/482129/100/100/threaded",
            "http://www.securityfocus.com/archive/1/482857/100/0/threaded",
            "http://www.securityfocus.com/bid/26048",
            "http://www.vupen.com/english/advisories/2007/3474",
            "https://issues.rpath.com/browse/RPL-1825"
          ],
          "PublishedDate": "2007-10-28T17:08:00Z",
          "LastModifiedDate": "2025-04-09T00:30:58.49Z"
        },
        {
          "VulnerabilityID": "CVE-2024-56433",
          "PkgID": "login.defs@1:4.17.4-2",
          "PkgName": "login.defs",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/login.defs@4.17.4-2?arch=all\u0026distro=debian-13.2\u0026epoch=1",
            "UID": "c14bb7c9d56f57d2",
            "BOMRef": "pkg:deb/debian/login.defs@4.17.4-2?arch=all\u0026distro=debian-13.2\u0026epoch=1"
          },
          "InstalledVersion": "1:4.17.4-2",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2024-56433",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:da528dab974a1c5330e273a2e0b20985dcbc80ee6f0ea30b1b3119930e1c7fba",
          "Title": "shadow-utils: Default subordinate ID configuration in /etc/login.defs could lead to compromise",
          "Description": "shadow-utils (aka shadow) 4.4 through 4.17.0 establishes a default /etc/subuid behavior (e.g., uid 100000 through 165535 for the first user account) that can realistically conflict with the uids of users defined on locally administered networks, potentially leading to account takeover, e.g., by leveraging newuidmap for access to an NFS home directory (or same-host resources in the case of remote logins by these local network users). NOTE: it may also be argued that system administrators should not have assigned uids, within local networks, that are within the range that can occur in /etc/subuid.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-1188"
          ],
          "VendorSeverity": {
            "alma": 1,
            "azure": 1,
            "oracle-oval": 1,
            "redhat": 1,
            "rocky": 1,
            "ubuntu": 1
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N",
              "V3Score": 3.6
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2025:20559",
            "https://access.redhat.com/security/cve/CVE-2024-56433",
            "https://bugzilla.redhat.com/2334165",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2334165",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56433",
            "https://errata.almalinux.org/9/ALSA-2025-20559.html",
            "https://errata.rockylinux.org/RLSA-2025:20559",
            "https://github.com/shadow-maint/shadow/blob/e2512d5741d4a44bdd81a8c2d0029b6222728cf0/etc/login.defs#L238-L241",
            "https://github.com/shadow-maint/shadow/issues/1157",
            "https://github.com/shadow-maint/shadow/releases/tag/4.4",
            "https://linux.oracle.com/cve/CVE-2024-56433.html",
            "https://linux.oracle.com/errata/ELSA-2025-20559-0.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2024-56433",
            "https://www.cve.org/CVERecord?id=CVE-2024-56433"
          ],
          "PublishedDate": "2024-12-26T09:15:07.267Z",
          "LastModifiedDate": "2024-12-26T09:15:07.267Z"
        },
        {
          "VulnerabilityID": "TEMP-0628843-DBAD28",
          "PkgID": "login.defs@1:4.17.4-2",
          "PkgName": "login.defs",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/login.defs@4.17.4-2?arch=all\u0026distro=debian-13.2\u0026epoch=1",
            "UID": "c14bb7c9d56f57d2",
            "BOMRef": "pkg:deb/debian/login.defs@4.17.4-2?arch=all\u0026distro=debian-13.2\u0026epoch=1"
          },
          "InstalledVersion": "1:4.17.4-2",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://security-tracker.debian.org/tracker/TEMP-0628843-DBAD28",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:72cfd9c7f4ec5f451281bf8fa649e370f6f4f27f4d4d51ed86afa723f0349e8f",
          "Title": "[more related to CVE-2005-4890]",
          "Severity": "LOW",
          "VendorSeverity": {
            "debian": 1
          }
        },
        {
          "VulnerabilityID": "CVE-2022-0563",
          "PkgID": "mount@2.41-5",
          "PkgName": "mount",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/mount@2.41-5?arch=amd64\u0026distro=debian-13.2",
            "UID": "4eb030eb5430054f",
            "BOMRef": "pkg:deb/debian/mount@2.41-5?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-5",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-0563",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:6350c83ea4a01c9b70e9ccfa6765004bbe0374404f9acb84667628e079d66717",
          "Title": "util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline",
          "Description": "A flaw was found in the util-linux chfn and chsh utilities when compiled with Readline support. The Readline library uses an \"INPUTRC\" environment variable to get a path to the library config file. When the library cannot parse the specified file, it prints an error message containing data from the file. This flaw allows an unprivileged user to read root-owned files, potentially leading to privilege escalation. This flaw affects util-linux versions prior to 2.37.4.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-209"
          ],
          "VendorSeverity": {
            "amazon": 2,
            "cbl-mariner": 2,
            "debian": 1,
            "nvd": 2,
            "photon": 2,
            "redhat": 2
          },
          "CVSS": {
            "nvd": {
              "V2Vector": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
              "V2Score": 1.9,
              "V3Score": 5.5
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
              "V3Score": 5.5
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2022-0563",
            "https://blog.trailofbits.com/2023/02/16/suid-logic-bug-linux-readline/",
            "https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w%40ws.net.home/T/#u",
            "https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u",
            "https://nvd.nist.gov/vuln/detail/CVE-2022-0563",
            "https://security.gentoo.org/glsa/202401-08",
            "https://security.netapp.com/advisory/ntap-20220331-0002/",
            "https://www.cve.org/CVERecord?id=CVE-2022-0563"
          ],
          "PublishedDate": "2022-02-21T19:15:08.393Z",
          "LastModifiedDate": "2025-06-09T16:15:33.237Z"
        },
        {
          "VulnerabilityID": "CVE-2025-14104",
          "PkgID": "mount@2.41-5",
          "PkgName": "mount",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/mount@2.41-5?arch=amd64\u0026distro=debian-13.2",
            "UID": "4eb030eb5430054f",
            "BOMRef": "pkg:deb/debian/mount@2.41-5?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-5",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-14104",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:f445c322dd641d75c6afb5dae05a1f7e540553edd10f474b613094cb6bd79ab1",
          "Title": "util-linux: util-linux: Heap buffer overread in setpwnam() when processing 256-byte usernames",
          "Description": "A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-125"
          ],
          "VendorSeverity": {
            "alma": 2,
            "azure": 2,
            "cbl-mariner": 2,
            "debian": 1,
            "oracle-oval": 2,
            "photon": 2,
            "redhat": 2,
            "rocky": 2
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
              "V3Score": 6.1
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:1696",
            "https://access.redhat.com/errata/RHSA-2026:1852",
            "https://access.redhat.com/errata/RHSA-2026:1913",
            "https://access.redhat.com/errata/RHSA-2026:2485",
            "https://access.redhat.com/errata/RHSA-2026:2563",
            "https://access.redhat.com/errata/RHSA-2026:2737",
            "https://access.redhat.com/errata/RHSA-2026:2800",
            "https://access.redhat.com/errata/RHSA-2026:3406",
            "https://access.redhat.com/errata/RHSA-2026:4943",
            "https://access.redhat.com/security/cve/CVE-2025-14104",
            "https://bugzilla.redhat.com/2419369",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2419369",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14104",
            "https://errata.almalinux.org/9/ALSA-2026-1913.html",
            "https://errata.rockylinux.org/RLSA-2026:1913",
            "https://linux.oracle.com/cve/CVE-2025-14104.html",
            "https://linux.oracle.com/errata/ELSA-2026-1913.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-14104",
            "https://www.cve.org/CVERecord?id=CVE-2025-14104"
          ],
          "PublishedDate": "2025-12-05T17:16:03.117Z",
          "LastModifiedDate": "2026-03-18T17:16:03.817Z"
        },
        {
          "VulnerabilityID": "CVE-2026-3184",
          "PkgID": "mount@2.41-5",
          "PkgName": "mount",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/mount@2.41-5?arch=amd64\u0026distro=debian-13.2",
            "UID": "4eb030eb5430054f",
            "BOMRef": "pkg:deb/debian/mount@2.41-5?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-5",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-3184",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:31b72d57c37aedb9675cb6ab583939952c6a1c1e07cbdd65913aa14576a7dacf",
          "Title": "util-linux: util-linux: Access control bypass due to improper hostname canonicalization",
          "Description": "A flaw was found in util-linux. Improper hostname canonicalization in the `login(1)` utility, when invoked with the `-h` option, can modify the supplied remote hostname before setting `PAM_RHOST`. A remote attacker could exploit this by providing a specially crafted hostname, potentially bypassing host-based Pluggable Authentication Modules (PAM) access control rules that rely on fully qualified domain names. This could lead to unauthorized access.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-289"
          ],
          "VendorSeverity": {
            "redhat": 1,
            "ubuntu": 2
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
              "V3Score": 3.7
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-3184",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2442570",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-3184",
            "https://www.cve.org/CVERecord?id=CVE-2026-3184"
          ],
          "PublishedDate": "2026-04-03T19:17:23.377Z",
          "LastModifiedDate": "2026-04-03T19:17:23.377Z"
        },
        {
          "VulnerabilityID": "CVE-2026-27456",
          "PkgID": "mount@2.41-5",
          "PkgName": "mount",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/mount@2.41-5?arch=amd64\u0026distro=debian-13.2",
            "UID": "4eb030eb5430054f",
            "BOMRef": "pkg:deb/debian/mount@2.41-5?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-5",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-27456",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:6d40abf0db34f236a09bb8cc5c2c32993e7adc4301981a9749693a3aad15af0e",
          "Title": "[util-linux: mount(8) TOCTOU symlink attack via loop device]",
          "Description": "util-linux is a random collection of Linux utilities. Prior to version 2.41.4, a TOCTOU (Time-of-Check-Time-of-Use) vulnerability has been identified in the SUID binary /usr/bin/mount from util-linux. The mount binary, when setting up loop devices, validates the source file path with user privileges via fork() + setuid() + realpath(), but subsequently re-canonicalizes and opens it with root privileges (euid=0) without verifying that the path has not been replaced between both operations. Neither O_NOFOLLOW, nor inode comparison, nor post-open fstat() are employed. This allows a local unprivileged user to replace the source file with a symlink pointing to any root-owned file or device during the race window, causing the SUID binary to open and mount it as root. Exploitation requires an /etc/fstab entry with user,loop options whose path points to a directory where the attacker has write permission, and that /usr/bin/mount has the SUID bit set (the default configuration on virtually all Linux distributions). The impact is unauthorized read access to root-protected files and block devices, including backup images, disk volumes, and any file containing a valid filesystem. This issue has been patched in version 2.41.4.",
          "Severity": "UNKNOWN",
          "CweIDs": [
            "CWE-59",
            "CWE-269",
            "CWE-367"
          ],
          "References": [
            "https://github.com/util-linux/util-linux/commit/5e390467b26a3cf3fecc04e1a0d482dff3162fc4",
            "https://github.com/util-linux/util-linux/releases/tag/v2.41.4",
            "https://github.com/util-linux/util-linux/security/advisories/GHSA-qq4x-vfq4-9h9g"
          ],
          "PublishedDate": "2026-04-03T22:16:25.4Z",
          "LastModifiedDate": "2026-04-03T22:16:25.4Z"
        },
        {
          "VulnerabilityID": "CVE-2025-69720",
          "PkgID": "ncurses-base@6.5+20250216-2",
          "PkgName": "ncurses-base",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/ncurses-base@6.5%2B20250216-2?arch=all\u0026distro=debian-13.2",
            "UID": "890975964989b0c0",
            "BOMRef": "pkg:deb/debian/ncurses-base@6.5%2B20250216-2?arch=all\u0026distro=debian-13.2"
          },
          "InstalledVersion": "6.5+20250216-2",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "SeveritySource": "nvd",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-69720",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:4cc6a35ee105114f4bae43319e31db9e29e83fa6ba3ce1260051f59591241824",
          "Title": "ncurses: ncurses: Buffer overflow vulnerability may lead to arbitrary code execution.",
          "Description": "The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.",
          "Severity": "HIGH",
          "CweIDs": [
            "CWE-121",
            "CWE-120"
          ],
          "VendorSeverity": {
            "alma": 2,
            "cbl-mariner": 4,
            "nvd": 3,
            "oracle-oval": 2,
            "redhat": 2
          },
          "CVSS": {
            "nvd": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
              "V3Score": 7.8
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H",
              "V3Score": 7.3
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:5913",
            "https://access.redhat.com/security/cve/CVE-2025-69720",
            "https://bugzilla.redhat.com/2449037",
            "https://errata.almalinux.org/10/ALSA-2026-5913.html",
            "https://github.com/Cao-Wuhui/CVE-2025-69720",
            "https://invisible-island.net/archives/ncurses/6.5/",
            "https://invisible-island.net/ncurses/",
            "https://linux.oracle.com/cve/CVE-2025-69720.html",
            "https://linux.oracle.com/errata/ELSA-2026-5913.html",
            "https://marc.info/?l=ncurses-bug\u0026m=176539968328570\u0026w=2",
            "https://marc.info/?l=ncurses-bug\u0026m=176540731801330\u0026w=2",
            "https://marc.info/?l=ncurses-bug\u0026m=176545557728083\u0026w=2",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-69720",
            "https://www.cve.org/CVERecord?id=CVE-2025-69720"
          ],
          "PublishedDate": "2026-03-19T15:16:21.293Z",
          "LastModifiedDate": "2026-03-26T19:35:10.547Z"
        },
        {
          "VulnerabilityID": "CVE-2025-6141",
          "PkgID": "ncurses-base@6.5+20250216-2",
          "PkgName": "ncurses-base",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/ncurses-base@6.5%2B20250216-2?arch=all\u0026distro=debian-13.2",
            "UID": "890975964989b0c0",
            "BOMRef": "pkg:deb/debian/ncurses-base@6.5%2B20250216-2?arch=all\u0026distro=debian-13.2"
          },
          "InstalledVersion": "6.5+20250216-2",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-6141",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:555891b2d819f0aba909680885b7385dfa861685bad4a56cf9f4014a54e64b60",
          "Title": "gnu-ncurses: ncurses Stack Buffer Overflow",
          "Description": "A vulnerability has been found in GNU ncurses up to 6.5-20250322 and classified as problematic. This vulnerability affects the function postprocess_termcap of the file tinfo/parse_entry.c. The manipulation leads to stack-based buffer overflow. The attack needs to be approached locally. Upgrading to version 6.5-20250329 is able to address this issue. It is recommended to upgrade the affected component.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-119",
            "CWE-121"
          ],
          "VendorSeverity": {
            "photon": 1,
            "redhat": 1
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
              "V3Score": 3.3
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2025-6141",
            "https://invisible-island.net/ncurses/NEWS.html#index-t20250329",
            "https://lists.gnu.org/archive/html/bug-ncurses/2025-03/msg00107.html",
            "https://lists.gnu.org/archive/html/bug-ncurses/2025-03/msg00109.html",
            "https://lists.gnu.org/archive/html/bug-ncurses/2025-03/msg00114.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-6141",
            "https://vuldb.com/?ctiid.312610",
            "https://vuldb.com/?id.312610",
            "https://vuldb.com/?submit.593000",
            "https://www.cve.org/CVERecord?id=CVE-2025-6141",
            "https://www.gnu.org/"
          ],
          "PublishedDate": "2025-06-16T22:16:41.527Z",
          "LastModifiedDate": "2025-06-17T20:50:23.507Z"
        },
        {
          "VulnerabilityID": "CVE-2025-69720",
          "PkgID": "ncurses-bin@6.5+20250216-2",
          "PkgName": "ncurses-bin",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/ncurses-bin@6.5%2B20250216-2?arch=amd64\u0026distro=debian-13.2",
            "UID": "a6b021b221e78b99",
            "BOMRef": "pkg:deb/debian/ncurses-bin@6.5%2B20250216-2?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "6.5+20250216-2",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "SeveritySource": "nvd",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-69720",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:19207b15961f89798e41f4a756f6dd03864555fad85a5d92fc5a21db4762598b",
          "Title": "ncurses: ncurses: Buffer overflow vulnerability may lead to arbitrary code execution.",
          "Description": "The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.",
          "Severity": "HIGH",
          "CweIDs": [
            "CWE-121",
            "CWE-120"
          ],
          "VendorSeverity": {
            "alma": 2,
            "cbl-mariner": 4,
            "nvd": 3,
            "oracle-oval": 2,
            "redhat": 2
          },
          "CVSS": {
            "nvd": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
              "V3Score": 7.8
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H",
              "V3Score": 7.3
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:5913",
            "https://access.redhat.com/security/cve/CVE-2025-69720",
            "https://bugzilla.redhat.com/2449037",
            "https://errata.almalinux.org/10/ALSA-2026-5913.html",
            "https://github.com/Cao-Wuhui/CVE-2025-69720",
            "https://invisible-island.net/archives/ncurses/6.5/",
            "https://invisible-island.net/ncurses/",
            "https://linux.oracle.com/cve/CVE-2025-69720.html",
            "https://linux.oracle.com/errata/ELSA-2026-5913.html",
            "https://marc.info/?l=ncurses-bug\u0026m=176539968328570\u0026w=2",
            "https://marc.info/?l=ncurses-bug\u0026m=176540731801330\u0026w=2",
            "https://marc.info/?l=ncurses-bug\u0026m=176545557728083\u0026w=2",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-69720",
            "https://www.cve.org/CVERecord?id=CVE-2025-69720"
          ],
          "PublishedDate": "2026-03-19T15:16:21.293Z",
          "LastModifiedDate": "2026-03-26T19:35:10.547Z"
        },
        {
          "VulnerabilityID": "CVE-2025-6141",
          "PkgID": "ncurses-bin@6.5+20250216-2",
          "PkgName": "ncurses-bin",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/ncurses-bin@6.5%2B20250216-2?arch=amd64\u0026distro=debian-13.2",
            "UID": "a6b021b221e78b99",
            "BOMRef": "pkg:deb/debian/ncurses-bin@6.5%2B20250216-2?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "6.5+20250216-2",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-6141",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:5385d1166724394c09ad4a767e2dff51c1f5adce0b7186f7600bafa41d9de65d",
          "Title": "gnu-ncurses: ncurses Stack Buffer Overflow",
          "Description": "A vulnerability has been found in GNU ncurses up to 6.5-20250322 and classified as problematic. This vulnerability affects the function postprocess_termcap of the file tinfo/parse_entry.c. The manipulation leads to stack-based buffer overflow. The attack needs to be approached locally. Upgrading to version 6.5-20250329 is able to address this issue. It is recommended to upgrade the affected component.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-119",
            "CWE-121"
          ],
          "VendorSeverity": {
            "photon": 1,
            "redhat": 1
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
              "V3Score": 3.3
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2025-6141",
            "https://invisible-island.net/ncurses/NEWS.html#index-t20250329",
            "https://lists.gnu.org/archive/html/bug-ncurses/2025-03/msg00107.html",
            "https://lists.gnu.org/archive/html/bug-ncurses/2025-03/msg00109.html",
            "https://lists.gnu.org/archive/html/bug-ncurses/2025-03/msg00114.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-6141",
            "https://vuldb.com/?ctiid.312610",
            "https://vuldb.com/?id.312610",
            "https://vuldb.com/?submit.593000",
            "https://www.cve.org/CVERecord?id=CVE-2025-6141",
            "https://www.gnu.org/"
          ],
          "PublishedDate": "2025-06-16T22:16:41.527Z",
          "LastModifiedDate": "2025-06-17T20:50:23.507Z"
        },
        {
          "VulnerabilityID": "CVE-2025-15467",
          "VendorIDs": [
            "DSA-6113-1"
          ],
          "PkgID": "openssl@3.5.4-1~deb13u1",
          "PkgName": "openssl",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/openssl@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "793482608c8c294c",
            "BOMRef": "pkg:deb/debian/openssl@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.5.4-1~deb13u1",
          "FixedVersion": "3.5.4-1~deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:eaae8a97b41ced6ea3400030c5ee05505145583005cc540e6292fb553662d08e",
            "DiffID": "sha256:684e1a4916f28ca8be5cb345b358afb5671bbbf301a9d468d86e4417742853d6"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-15467",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:d8f4c423be1ee01fc3b01747e04ef1064ea227cb4189d6f6516ac1b07f09d478",
          "Title": "openssl: OpenSSL: Remote code execution or Denial of Service via oversized Initialization Vector in CMS parsing",
          "Description": "Issue summary: Parsing CMS AuthEnvelopedData or EnvelopedData message with\nmaliciously crafted AEAD parameters can trigger a stack buffer overflow.\n\nImpact summary: A stack buffer overflow may lead to a crash, causing Denial\nof Service, or potentially remote code execution.\n\nWhen parsing CMS (Auth)EnvelopedData structures that use AEAD ciphers such as\nAES-GCM, the IV (Initialization Vector) encoded in the ASN.1 parameters is\ncopied into a fixed-size stack buffer without verifying that its length fits\nthe destination. An attacker can supply a crafted CMS message with an\noversized IV, causing a stack-based out-of-bounds write before any\nauthentication or tag verification occurs.\n\nApplications and services that parse untrusted CMS or PKCS#7 content using\nAEAD ciphers (e.g., S/MIME (Auth)EnvelopedData with AES-GCM) are vulnerable.\nBecause the overflow occurs prior to authentication, no valid key material\nis required to trigger it. While exploitability to remote code execution\ndepends on platform and toolchain mitigations, the stack-based write\nprimitive represents a severe risk.\n\nThe FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this\nissue, as the CMS implementation is outside the OpenSSL FIPS module\nboundary.\n\nOpenSSL 3.6, 3.5, 3.4, 3.3 and 3.0 are vulnerable to this issue.\n\nOpenSSL 1.1.1 and 1.0.2 are not affected by this issue.",
          "Severity": "CRITICAL",
          "CweIDs": [
            "CWE-787"
          ],
          "VendorSeverity": {
            "alma": 3,
            "amazon": 3,
            "azure": 4,
            "oracle-oval": 3,
            "photon": 3,
            "redhat": 3,
            "rocky": 3,
            "ubuntu": 2
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
              "V3Score": 9.8
            }
          },
          "References": [
            "http://www.openwall.com/lists/oss-security/2026/01/27/10",
            "http://www.openwall.com/lists/oss-security/2026/02/25/6",
            "https://access.redhat.com/errata/RHSA-2026:1473",
            "https://access.redhat.com/security/cve/CVE-2025-15467",
            "https://bugzilla.redhat.com/2430375",
            "https://bugzilla.redhat.com/2430376",
            "https://bugzilla.redhat.com/2430377",
            "https://bugzilla.redhat.com/2430378",
            "https://bugzilla.redhat.com/2430379",
            "https://bugzilla.redhat.com/2430380",
            "https://bugzilla.redhat.com/2430381",
            "https://bugzilla.redhat.com/2430386",
            "https://bugzilla.redhat.com/2430387",
            "https://bugzilla.redhat.com/2430388",
            "https://bugzilla.redhat.com/2430389",
            "https://bugzilla.redhat.com/2430390",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430375",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430376",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430377",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430378",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430379",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430380",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430381",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430386",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430387",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430388",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430389",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430390",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11187",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15467",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15468",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15469",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66199",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68160",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69418",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69420",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69421",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22795",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22796",
            "https://errata.almalinux.org/9/ALSA-2026-1473.html",
            "https://errata.rockylinux.org/RLSA-2026:1473",
            "https://github.com/guiimoraes/CVE-2025-15467",
            "https://github.com/openssl/openssl/commit/2c8f0e5fa9b6ee5508a0349e4572ddb74db5a703",
            "https://github.com/openssl/openssl/commit/5f26d4202f5b89664c5c3f3c62086276026ba9a9",
            "https://github.com/openssl/openssl/commit/6ced0fe6b10faa560e410e3ee8d6c82f06c65ea3",
            "https://github.com/openssl/openssl/commit/ce39170276daec87f55c39dad1f629b56344429e",
            "https://github.com/openssl/openssl/commit/d0071a0799f20cc8101730145349ed4487c268dc",
            "https://linux.oracle.com/cve/CVE-2025-15467.html",
            "https://linux.oracle.com/errata/ELSA-2026-50081.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-15467",
            "https://openssl-library.org/news/secadv/20260127.txt",
            "https://ubuntu.com/security/notices/USN-7980-1",
            "https://www.cve.org/CVERecord?id=CVE-2025-15467"
          ],
          "PublishedDate": "2026-01-27T16:16:14.257Z",
          "LastModifiedDate": "2026-03-19T19:16:19.23Z"
        },
        {
          "VulnerabilityID": "CVE-2025-69419",
          "VendorIDs": [
            "DSA-6113-1"
          ],
          "PkgID": "openssl@3.5.4-1~deb13u1",
          "PkgName": "openssl",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/openssl@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "793482608c8c294c",
            "BOMRef": "pkg:deb/debian/openssl@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.5.4-1~deb13u1",
          "FixedVersion": "3.5.4-1~deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:eaae8a97b41ced6ea3400030c5ee05505145583005cc540e6292fb553662d08e",
            "DiffID": "sha256:684e1a4916f28ca8be5cb345b358afb5671bbbf301a9d468d86e4417742853d6"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-69419",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:06c70a1b3e5f1893eaa312c0c4aed8d7d341e5b4d2a8b3a53a617de09a93a625",
          "Title": "openssl: OpenSSL: Arbitrary code execution due to out-of-bounds write in PKCS#12 processing",
          "Description": "Issue summary: Calling PKCS12_get_friendlyname() function on a maliciously\ncrafted PKCS#12 file with a BMPString (UTF-16BE) friendly name containing\nnon-ASCII BMP code point can trigger a one byte write before the allocated\nbuffer.\n\nImpact summary: The out-of-bounds write can cause a memory corruption\nwhich can have various consequences including a Denial of Service.\n\nThe OPENSSL_uni2utf8() function performs a two-pass conversion of a PKCS#12\nBMPString (UTF-16BE) to UTF-8. In the second pass, when emitting UTF-8 bytes,\nthe helper function bmp_to_utf8() incorrectly forwards the remaining UTF-16\nsource byte count as the destination buffer capacity to UTF8_putc(). For BMP\ncode points above U+07FF, UTF-8 requires three bytes, but the forwarded\ncapacity can be just two bytes. UTF8_putc() then returns -1, and this negative\nvalue is added to the output length without validation, causing the\nlength to become negative. The subsequent trailing NUL byte is then written\nat a negative offset, causing write outside of heap allocated buffer.\n\nThe vulnerability is reachable via the public PKCS12_get_friendlyname() API\nwhen parsing attacker-controlled PKCS#12 files. While PKCS12_parse() uses a\ndifferent code path that avoids this issue, PKCS12_get_friendlyname() directly\ninvokes the vulnerable function. Exploitation requires an attacker to provide\na malicious PKCS#12 file to be parsed by the application and the attacker\ncan just trigger a one zero byte write before the allocated buffer.\nFor that reason the issue was assessed as Low severity according to our\nSecurity Policy.\n\nThe FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue,\nas the PKCS#12 implementation is outside the OpenSSL FIPS module boundary.\n\nOpenSSL 3.6, 3.5, 3.4, 3.3, 3.0 and 1.1.1 are vulnerable to this issue.\n\nOpenSSL 1.0.2 is not affected by this issue.",
          "Severity": "HIGH",
          "CweIDs": [
            "CWE-787"
          ],
          "VendorSeverity": {
            "alma": 2,
            "amazon": 3,
            "azure": 3,
            "cbl-mariner": 3,
            "oracle-oval": 2,
            "photon": 3,
            "redhat": 2,
            "rocky": 3,
            "ubuntu": 1
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
              "V3Score": 7.4
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:4472",
            "https://access.redhat.com/security/cve/CVE-2025-69419",
            "https://bugzilla.redhat.com/2430386",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430375",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430376",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430377",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430378",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430379",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430380",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430381",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430386",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430387",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430388",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430389",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430390",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11187",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15467",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15468",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15469",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66199",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68160",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69418",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69420",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69421",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22795",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22796",
            "https://errata.almalinux.org/9/ALSA-2026-4472.html",
            "https://errata.rockylinux.org/RLSA-2026:1473",
            "https://github.com/openssl/openssl/commit/41be0f216404f14457bbf3b9cc488dba60b49296",
            "https://github.com/openssl/openssl/commit/7e9cac9832e4705b91987c2474ed06a37a93cecb",
            "https://github.com/openssl/openssl/commit/a26a90d38edec3748566129d824e664b54bee2e2",
            "https://github.com/openssl/openssl/commit/cda12de3bc0e333ea8d2c6fd15001dbdaf280015",
            "https://github.com/openssl/openssl/commit/ff628933755075446bca8307e8417c14d164b535",
            "https://linux.oracle.com/cve/CVE-2025-69419.html",
            "https://linux.oracle.com/errata/ELSA-2026-50131.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-69419",
            "https://openssl-library.org/news/secadv/20260127.txt",
            "https://ubuntu.com/security/notices/USN-7980-1",
            "https://ubuntu.com/security/notices/USN-7980-2",
            "https://www.cve.org/CVERecord?id=CVE-2025-69419"
          ],
          "PublishedDate": "2026-01-27T16:16:34.113Z",
          "LastModifiedDate": "2026-02-02T18:35:02.177Z"
        },
        {
          "VulnerabilityID": "CVE-2025-69421",
          "VendorIDs": [
            "DSA-6113-1"
          ],
          "PkgID": "openssl@3.5.4-1~deb13u1",
          "PkgName": "openssl",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/openssl@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "793482608c8c294c",
            "BOMRef": "pkg:deb/debian/openssl@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.5.4-1~deb13u1",
          "FixedVersion": "3.5.4-1~deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:eaae8a97b41ced6ea3400030c5ee05505145583005cc540e6292fb553662d08e",
            "DiffID": "sha256:684e1a4916f28ca8be5cb345b358afb5671bbbf301a9d468d86e4417742853d6"
          },
          "SeveritySource": "nvd",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-69421",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:5b3c1b07e03384b26417aad9fb93c19c61a07daa0fa8961bf1cf186547b2d1df",
          "Title": "openssl: OpenSSL: Denial of Service via malformed PKCS#12 file processing",
          "Description": "Issue summary: Processing a malformed PKCS#12 file can trigger a NULL pointer\ndereference in the PKCS12_item_decrypt_d2i_ex() function.\n\nImpact summary: A NULL pointer dereference can trigger a crash which leads to\nDenial of Service for an application processing PKCS#12 files.\n\nThe PKCS12_item_decrypt_d2i_ex() function does not check whether the oct\nparameter is NULL before dereferencing it. When called from\nPKCS12_unpack_p7encdata() with a malformed PKCS#12 file, this parameter can\nbe NULL, causing a crash. The vulnerability is limited to Denial of Service\nand cannot be escalated to achieve code execution or memory disclosure.\n\nExploiting this issue requires an attacker to provide a malformed PKCS#12 file\nto an application that processes it. For that reason the issue was assessed as\nLow severity according to our Security Policy.\n\nThe FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue,\nas the PKCS#12 implementation is outside the OpenSSL FIPS module boundary.\n\nOpenSSL 3.6, 3.5, 3.4, 3.3, 3.0, 1.1.1 and 1.0.2 are vulnerable to this issue.",
          "Severity": "HIGH",
          "CweIDs": [
            "CWE-476"
          ],
          "VendorSeverity": {
            "alma": 3,
            "amazon": 3,
            "azure": 2,
            "cbl-mariner": 2,
            "nvd": 3,
            "oracle-oval": 3,
            "photon": 3,
            "redhat": 1,
            "rocky": 3,
            "ubuntu": 1
          },
          "CVSS": {
            "nvd": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 7.5
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
              "V3Score": 6.5
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:1473",
            "https://access.redhat.com/security/cve/CVE-2025-69421",
            "https://bugzilla.redhat.com/2430375",
            "https://bugzilla.redhat.com/2430376",
            "https://bugzilla.redhat.com/2430377",
            "https://bugzilla.redhat.com/2430378",
            "https://bugzilla.redhat.com/2430379",
            "https://bugzilla.redhat.com/2430380",
            "https://bugzilla.redhat.com/2430381",
            "https://bugzilla.redhat.com/2430386",
            "https://bugzilla.redhat.com/2430387",
            "https://bugzilla.redhat.com/2430388",
            "https://bugzilla.redhat.com/2430389",
            "https://bugzilla.redhat.com/2430390",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430375",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430376",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430377",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430378",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430379",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430380",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430381",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430386",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430387",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430388",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430389",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430390",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11187",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15467",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15468",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15469",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66199",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68160",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69418",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69420",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69421",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22795",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22796",
            "https://errata.almalinux.org/9/ALSA-2026-1473.html",
            "https://errata.rockylinux.org/RLSA-2026:1473",
            "https://github.com/openssl/openssl/commit/3524a29271f8191b8fd8a5257eb05173982a097b",
            "https://github.com/openssl/openssl/commit/36ecb4960872a4ce04bf6f1e1f4e78d75ec0c0c7",
            "https://github.com/openssl/openssl/commit/4bbc8d41a72c842ce4077a8a3eccd1109aaf74bd",
            "https://github.com/openssl/openssl/commit/643986985cd1c21221f941129d76fe0c2785aeb3",
            "https://github.com/openssl/openssl/commit/a2dbc539f0f9cc63832709fa5aa33ad9495eb19c",
            "https://linux.oracle.com/cve/CVE-2025-69421.html",
            "https://linux.oracle.com/errata/ELSA-2026-50081.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-69421",
            "https://openssl-library.org/news/secadv/20260127.txt",
            "https://ubuntu.com/security/notices/USN-7980-1",
            "https://ubuntu.com/security/notices/USN-7980-2",
            "https://www.cve.org/CVERecord?id=CVE-2025-69421"
          ],
          "PublishedDate": "2026-01-27T16:16:34.437Z",
          "LastModifiedDate": "2026-02-28T04:16:17.457Z"
        },
        {
          "VulnerabilityID": "CVE-2025-11187",
          "PkgID": "openssl@3.5.4-1~deb13u1",
          "PkgName": "openssl",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/openssl@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "793482608c8c294c",
            "BOMRef": "pkg:deb/debian/openssl@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.5.4-1~deb13u1",
          "FixedVersion": "3.5.4-1~deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:eaae8a97b41ced6ea3400030c5ee05505145583005cc540e6292fb553662d08e",
            "DiffID": "sha256:684e1a4916f28ca8be5cb345b358afb5671bbbf301a9d468d86e4417742853d6"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-11187",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:7701a633204ad90e56c9d83f59802b1be429eb90d9d990492912721dd12e4376",
          "Title": "openssl: OpenSSL: Arbitrary code execution or denial of service through crafted PKCS#12 file",
          "Description": "Issue summary: PBMAC1 parameters in PKCS#12 files are missing validation\nwhich can trigger a stack-based buffer overflow, invalid pointer or NULL\npointer dereference during MAC verification.\n\nImpact summary: The stack buffer overflow or NULL pointer dereference may\ncause a crash leading to Denial of Service for an application that parses\nuntrusted PKCS#12 files. The buffer overflow may also potentially enable\ncode execution depending on platform mitigations.\n\nWhen verifying a PKCS#12 file that uses PBMAC1 for the MAC, the PBKDF2\nsalt and keylength parameters from the file are used without validation.\nIf the value of keylength exceeds the size of the fixed stack buffer used\nfor the derived key (64 bytes), the key derivation will overflow the buffer.\nThe overflow length is attacker-controlled. Also, if the salt parameter is\nnot an OCTET STRING type this can lead to invalid or NULL pointer\ndereference.\n\nExploiting this issue requires a user or application to process\na maliciously crafted PKCS#12 file. It is uncommon to accept untrusted\nPKCS#12 files in applications as they are usually used to store private\nkeys which are trusted by definition. For this reason the issue was assessed\nas Moderate severity.\n\nThe FIPS modules in 3.6, 3.5 and 3.4 are not affected by this issue, as\nPKCS#12 processing is outside the OpenSSL FIPS module boundary.\n\nOpenSSL 3.6, 3.5 and 3.4 are vulnerable to this issue.\n\nOpenSSL 3.3, 3.0, 1.1.1 and 1.0.2 are not affected by this issue as they do\nnot support PBMAC1 in PKCS#12.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-476",
            "CWE-787"
          ],
          "VendorSeverity": {
            "alma": 3,
            "oracle-oval": 3,
            "redhat": 2,
            "rocky": 3,
            "ubuntu": 2
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H",
              "V3Score": 6.1
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:1473",
            "https://access.redhat.com/security/cve/CVE-2025-11187",
            "https://bugzilla.redhat.com/2430375",
            "https://bugzilla.redhat.com/2430376",
            "https://bugzilla.redhat.com/2430377",
            "https://bugzilla.redhat.com/2430378",
            "https://bugzilla.redhat.com/2430379",
            "https://bugzilla.redhat.com/2430380",
            "https://bugzilla.redhat.com/2430381",
            "https://bugzilla.redhat.com/2430386",
            "https://bugzilla.redhat.com/2430387",
            "https://bugzilla.redhat.com/2430388",
            "https://bugzilla.redhat.com/2430389",
            "https://bugzilla.redhat.com/2430390",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430375",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430376",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430377",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430378",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430379",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430380",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430381",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430386",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430387",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430388",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430389",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430390",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11187",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15467",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15468",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15469",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66199",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68160",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69418",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69420",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69421",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22795",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22796",
            "https://errata.almalinux.org/9/ALSA-2026-1473.html",
            "https://errata.rockylinux.org/RLSA-2026:1473",
            "https://github.com/metadust/CVE-2025-11187",
            "https://github.com/openssl/openssl/commit/205e3a55e16e4bd08c12fdbd3416ab829c0f6206",
            "https://github.com/openssl/openssl/commit/8caf359d6e46fb413e8f5f0df765d2e8a51df4e8",
            "https://github.com/openssl/openssl/commit/e1079bc17ed93ff16f6b86f33a2fe3336e78817e",
            "https://linux.oracle.com/cve/CVE-2025-11187.html",
            "https://linux.oracle.com/errata/ELSA-2026-50081.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-11187",
            "https://openssl-library.org/news/secadv/20260127.txt",
            "https://ubuntu.com/security/notices/USN-7980-1",
            "https://www.cve.org/CVERecord?id=CVE-2025-11187"
          ],
          "PublishedDate": "2026-01-27T16:16:14.093Z",
          "LastModifiedDate": "2026-03-20T14:16:13.89Z"
        },
        {
          "VulnerabilityID": "CVE-2025-15468",
          "PkgID": "openssl@3.5.4-1~deb13u1",
          "PkgName": "openssl",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/openssl@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "793482608c8c294c",
            "BOMRef": "pkg:deb/debian/openssl@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.5.4-1~deb13u1",
          "FixedVersion": "3.5.4-1~deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:eaae8a97b41ced6ea3400030c5ee05505145583005cc540e6292fb553662d08e",
            "DiffID": "sha256:684e1a4916f28ca8be5cb345b358afb5671bbbf301a9d468d86e4417742853d6"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-15468",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:2ecc770b318f84d4922f8c4b2b9a760d88f9f3189ff406b5b18755a3f1e4b418",
          "Title": "openssl: OpenSSL: Denial of Service via NULL pointer dereference in QUIC protocol handling",
          "Description": "Issue summary: If an application using the SSL_CIPHER_find() function in\na QUIC protocol client or server receives an unknown cipher suite from\nthe peer, a NULL dereference occurs.\n\nImpact summary: A NULL pointer dereference leads to abnormal termination of\nthe running process causing Denial of Service.\n\nSome applications call SSL_CIPHER_find() from the client_hello_cb callback\non the cipher ID received from the peer. If this is done with an SSL object\nimplementing the QUIC protocol, NULL pointer dereference will happen if\nthe examined cipher ID is unknown or unsupported.\n\nAs it is not very common to call this function in applications using the QUIC \nprotocol and the worst outcome is Denial of Service, the issue was assessed\nas Low severity.\n\nThe vulnerable code was introduced in the 3.2 version with the addition\nof the QUIC protocol support.\n\nThe FIPS modules in 3.6, 3.5, 3.4 and 3.3 are not affected by this issue,\nas the QUIC implementation is outside the OpenSSL FIPS module boundary.\n\nOpenSSL 3.6, 3.5, 3.4 and 3.3 are vulnerable to this issue.\n\nOpenSSL 3.0, 1.1.1 and 1.0.2 are not affected by this issue.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-476"
          ],
          "VendorSeverity": {
            "alma": 3,
            "amazon": 3,
            "azure": 2,
            "oracle-oval": 3,
            "photon": 2,
            "redhat": 1,
            "rocky": 3,
            "ubuntu": 1
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 5.9
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:1473",
            "https://access.redhat.com/security/cve/CVE-2025-15468",
            "https://bugzilla.redhat.com/2430375",
            "https://bugzilla.redhat.com/2430376",
            "https://bugzilla.redhat.com/2430377",
            "https://bugzilla.redhat.com/2430378",
            "https://bugzilla.redhat.com/2430379",
            "https://bugzilla.redhat.com/2430380",
            "https://bugzilla.redhat.com/2430381",
            "https://bugzilla.redhat.com/2430386",
            "https://bugzilla.redhat.com/2430387",
            "https://bugzilla.redhat.com/2430388",
            "https://bugzilla.redhat.com/2430389",
            "https://bugzilla.redhat.com/2430390",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430375",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430376",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430377",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430378",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430379",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430380",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430381",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430386",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430387",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430388",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430389",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430390",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11187",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15467",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15468",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15469",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66199",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68160",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69418",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69420",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69421",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22795",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22796",
            "https://errata.almalinux.org/9/ALSA-2026-1473.html",
            "https://errata.rockylinux.org/RLSA-2026:1473",
            "https://github.com/openssl/openssl/commit/1f08e54bad32843044fe8a675948d65e3b4ece65",
            "https://github.com/openssl/openssl/commit/7c88376731c589ee5b36116c5a6e32d5ae5f7ae2",
            "https://github.com/openssl/openssl/commit/b2539639400288a4580fe2d76247541b976bade4",
            "https://github.com/openssl/openssl/commit/d75b309879631d45b972396ce4e5102559c64ac7",
            "https://linux.oracle.com/cve/CVE-2025-15468.html",
            "https://linux.oracle.com/errata/ELSA-2026-50081.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-15468",
            "https://openssl-library.org/news/secadv/20260127.txt",
            "https://ubuntu.com/security/notices/USN-7980-1",
            "https://www.cve.org/CVERecord?id=CVE-2025-15468"
          ],
          "PublishedDate": "2026-01-27T16:16:14.4Z",
          "LastModifiedDate": "2026-02-02T18:38:00.947Z"
        },
        {
          "VulnerabilityID": "CVE-2025-15469",
          "PkgID": "openssl@3.5.4-1~deb13u1",
          "PkgName": "openssl",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/openssl@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "793482608c8c294c",
            "BOMRef": "pkg:deb/debian/openssl@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.5.4-1~deb13u1",
          "FixedVersion": "3.5.4-1~deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:eaae8a97b41ced6ea3400030c5ee05505145583005cc540e6292fb553662d08e",
            "DiffID": "sha256:684e1a4916f28ca8be5cb345b358afb5671bbbf301a9d468d86e4417742853d6"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-15469",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:570cdf6021b4e2d898c5532641fad57c8076a5641ae7221f3c3c74fce998ffcb",
          "Title": "openssl: OpenSSL: Data integrity bypass in `openssl dgst` command due to silent truncation",
          "Description": "Issue summary: The 'openssl dgst' command-line tool silently truncates input\ndata to 16MB when using one-shot signing algorithms and reports success instead\nof an error.\n\nImpact summary: A user signing or verifying files larger than 16MB with\none-shot algorithms (such as Ed25519, Ed448, or ML-DSA) may believe the entire\nfile is authenticated while trailing data beyond 16MB remains unauthenticated.\n\nWhen the 'openssl dgst' command is used with algorithms that only support\none-shot signing (Ed25519, Ed448, ML-DSA-44, ML-DSA-65, ML-DSA-87), the input\nis buffered with a 16MB limit. If the input exceeds this limit, the tool\nsilently truncates to the first 16MB and continues without signaling an error,\ncontrary to what the documentation states. This creates an integrity gap where\ntrailing bytes can be modified without detection if both signing and\nverification are performed using the same affected codepath.\n\nThe issue affects only the command-line tool behavior. Verifiers that process\nthe full message using library APIs will reject the signature, so the risk\nprimarily affects workflows that both sign and verify with the affected\n'openssl dgst' command. Streaming digest algorithms for 'openssl dgst' and\nlibrary users are unaffected.\n\nThe FIPS modules in 3.5 and 3.6 are not affected by this issue, as the\ncommand-line tools are outside the OpenSSL FIPS module boundary.\n\nOpenSSL 3.5 and 3.6 are vulnerable to this issue.\n\nOpenSSL 3.4, 3.3, 3.0, 1.1.1 and 1.0.2 are not affected by this issue.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-347"
          ],
          "VendorSeverity": {
            "alma": 3,
            "oracle-oval": 3,
            "photon": 2,
            "redhat": 1,
            "rocky": 3,
            "ubuntu": 1
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
              "V3Score": 5.5
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:1473",
            "https://access.redhat.com/security/cve/CVE-2025-15469",
            "https://bugzilla.redhat.com/2430375",
            "https://bugzilla.redhat.com/2430376",
            "https://bugzilla.redhat.com/2430377",
            "https://bugzilla.redhat.com/2430378",
            "https://bugzilla.redhat.com/2430379",
            "https://bugzilla.redhat.com/2430380",
            "https://bugzilla.redhat.com/2430381",
            "https://bugzilla.redhat.com/2430386",
            "https://bugzilla.redhat.com/2430387",
            "https://bugzilla.redhat.com/2430388",
            "https://bugzilla.redhat.com/2430389",
            "https://bugzilla.redhat.com/2430390",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430375",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430376",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430377",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430378",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430379",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430380",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430381",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430386",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430387",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430388",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430389",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430390",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11187",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15467",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15468",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15469",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66199",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68160",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69418",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69420",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69421",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22795",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22796",
            "https://errata.almalinux.org/9/ALSA-2026-1473.html",
            "https://errata.rockylinux.org/RLSA-2026:1473",
            "https://github.com/openssl/openssl/commit/310f305eb92ea8040d6b3cb75a5feeba8e6acf2f",
            "https://github.com/openssl/openssl/commit/a7936fa4bd23c906e1955a16a0a0ab39a4953a61",
            "https://linux.oracle.com/cve/CVE-2025-15469.html",
            "https://linux.oracle.com/errata/ELSA-2026-50081.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-15469",
            "https://openssl-library.org/news/secadv/20260127.txt",
            "https://ubuntu.com/security/notices/USN-7980-1",
            "https://www.cve.org/CVERecord?id=CVE-2025-15469"
          ],
          "PublishedDate": "2026-01-27T16:16:14.523Z",
          "LastModifiedDate": "2026-02-02T18:37:39.313Z"
        },
        {
          "VulnerabilityID": "CVE-2025-66199",
          "PkgID": "openssl@3.5.4-1~deb13u1",
          "PkgName": "openssl",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/openssl@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "793482608c8c294c",
            "BOMRef": "pkg:deb/debian/openssl@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.5.4-1~deb13u1",
          "FixedVersion": "3.5.4-1~deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:eaae8a97b41ced6ea3400030c5ee05505145583005cc540e6292fb553662d08e",
            "DiffID": "sha256:684e1a4916f28ca8be5cb345b358afb5671bbbf301a9d468d86e4417742853d6"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-66199",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:2e68fb200cf02146967305d73f96433d369844b57bdb22b9936db42708d1c314",
          "Title": "openssl: OpenSSL: Denial of Service due to excessive memory allocation in TLS 1.3 certificate compression",
          "Description": "Issue summary: A TLS 1.3 connection using certificate compression can be\nforced to allocate a large buffer before decompression without checking\nagainst the configured certificate size limit.\n\nImpact summary: An attacker can cause per-connection memory allocations of\nup to approximately 22 MiB and extra CPU work, potentially leading to\nservice degradation or resource exhaustion (Denial of Service).\n\nIn affected configurations, the peer-supplied uncompressed certificate\nlength from a CompressedCertificate message is used to grow a heap buffer\nprior to decompression. This length is not bounded by the max_cert_list\nsetting, which otherwise constrains certificate message sizes. An attacker\ncan exploit this to cause large per-connection allocations followed by\nhandshake failure. No memory corruption or information disclosure occurs.\n\nThis issue only affects builds where TLS 1.3 certificate compression is\ncompiled in (i.e., not OPENSSL_NO_COMP_ALG) and at least one compression\nalgorithm (brotli, zlib, or zstd) is available, and where the compression\nextension is negotiated. Both clients receiving a server CompressedCertificate\nand servers in mutual TLS scenarios receiving a client CompressedCertificate\nare affected. Servers that do not request client certificates are not\nvulnerable to client-initiated attacks.\n\nUsers can mitigate this issue by setting SSL_OP_NO_RX_CERTIFICATE_COMPRESSION\nto disable receiving compressed certificates.\n\nThe FIPS modules in 3.6, 3.5, 3.4 and 3.3 are not affected by this issue,\nas the TLS implementation is outside the OpenSSL FIPS module boundary.\n\nOpenSSL 3.6, 3.5, 3.4 and 3.3 are vulnerable to this issue.\n\nOpenSSL 3.0, 1.1.1 and 1.0.2 are not affected by this issue.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-789"
          ],
          "VendorSeverity": {
            "alma": 3,
            "amazon": 3,
            "azure": 2,
            "oracle-oval": 3,
            "photon": 2,
            "redhat": 1,
            "rocky": 3,
            "ubuntu": 1
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 5.9
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:1473",
            "https://access.redhat.com/security/cve/CVE-2025-66199",
            "https://bugzilla.redhat.com/2430375",
            "https://bugzilla.redhat.com/2430376",
            "https://bugzilla.redhat.com/2430377",
            "https://bugzilla.redhat.com/2430378",
            "https://bugzilla.redhat.com/2430379",
            "https://bugzilla.redhat.com/2430380",
            "https://bugzilla.redhat.com/2430381",
            "https://bugzilla.redhat.com/2430386",
            "https://bugzilla.redhat.com/2430387",
            "https://bugzilla.redhat.com/2430388",
            "https://bugzilla.redhat.com/2430389",
            "https://bugzilla.redhat.com/2430390",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430375",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430376",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430377",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430378",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430379",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430380",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430381",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430386",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430387",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430388",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430389",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430390",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11187",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15467",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15468",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15469",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66199",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68160",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69418",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69420",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69421",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22795",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22796",
            "https://errata.almalinux.org/9/ALSA-2026-1473.html",
            "https://errata.rockylinux.org/RLSA-2026:1473",
            "https://github.com/openssl/openssl/commit/3ed1f75249932b155eef993a8e66a99cb98bfef4",
            "https://github.com/openssl/openssl/commit/6184a4fb08ee6d7bca570d931a4e8bef40b64451",
            "https://github.com/openssl/openssl/commit/895150b5e021d16b52fb32b97e1dd12f20448be5",
            "https://github.com/openssl/openssl/commit/966a2478046c311ed7dae50c457d0db4cafbf7e4",
            "https://linux.oracle.com/cve/CVE-2025-66199.html",
            "https://linux.oracle.com/errata/ELSA-2026-50081.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-66199",
            "https://openssl-library.org/news/secadv/20260127.txt",
            "https://ubuntu.com/security/notices/USN-7980-1",
            "https://www.cve.org/CVERecord?id=CVE-2025-66199"
          ],
          "PublishedDate": "2026-01-27T16:16:15.777Z",
          "LastModifiedDate": "2026-02-02T18:37:19.613Z"
        },
        {
          "VulnerabilityID": "CVE-2025-68160",
          "VendorIDs": [
            "DSA-6113-1"
          ],
          "PkgID": "openssl@3.5.4-1~deb13u1",
          "PkgName": "openssl",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/openssl@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "793482608c8c294c",
            "BOMRef": "pkg:deb/debian/openssl@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.5.4-1~deb13u1",
          "FixedVersion": "3.5.4-1~deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:eaae8a97b41ced6ea3400030c5ee05505145583005cc540e6292fb553662d08e",
            "DiffID": "sha256:684e1a4916f28ca8be5cb345b358afb5671bbbf301a9d468d86e4417742853d6"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-68160",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:3d90ac3a4cf38b92ed622826e373ac202b3f46c87be895ada6b46b739ebd4ea5",
          "Title": "openssl: OpenSSL: Denial of Service due to out-of-bounds write in BIO filter",
          "Description": "Issue summary: Writing large, newline-free data into a BIO chain using the\nline-buffering filter where the next BIO performs short writes can trigger\na heap-based out-of-bounds write.\n\nImpact summary: This out-of-bounds write can cause memory corruption which\ntypically results in a crash, leading to Denial of Service for an application.\n\nThe line-buffering BIO filter (BIO_f_linebuffer) is not used by default in\nTLS/SSL data paths. In OpenSSL command-line applications, it is typically\nonly pushed onto stdout/stderr on VMS systems. Third-party applications that\nexplicitly use this filter with a BIO chain that can short-write and that\nwrite large, newline-free data influenced by an attacker would be affected.\nHowever, the circumstances where this could happen are unlikely to be under\nattacker control, and BIO_f_linebuffer is unlikely to be handling non-curated\ndata controlled by an attacker. For that reason the issue was assessed as\nLow severity.\n\nThe FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue,\nas the BIO implementation is outside the OpenSSL FIPS module boundary.\n\nOpenSSL 3.6, 3.5, 3.4, 3.3, 3.0, 1.1.1 and 1.0.2 are vulnerable to this issue.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-787"
          ],
          "VendorSeverity": {
            "alma": 3,
            "amazon": 3,
            "azure": 2,
            "cbl-mariner": 2,
            "oracle-oval": 3,
            "photon": 2,
            "redhat": 1,
            "rocky": 3,
            "ubuntu": 1
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 4.7
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:1473",
            "https://access.redhat.com/security/cve/CVE-2025-68160",
            "https://bugzilla.redhat.com/2430375",
            "https://bugzilla.redhat.com/2430376",
            "https://bugzilla.redhat.com/2430377",
            "https://bugzilla.redhat.com/2430378",
            "https://bugzilla.redhat.com/2430379",
            "https://bugzilla.redhat.com/2430380",
            "https://bugzilla.redhat.com/2430381",
            "https://bugzilla.redhat.com/2430386",
            "https://bugzilla.redhat.com/2430387",
            "https://bugzilla.redhat.com/2430388",
            "https://bugzilla.redhat.com/2430389",
            "https://bugzilla.redhat.com/2430390",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430375",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430376",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430377",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430378",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430379",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430380",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430381",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430386",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430387",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430388",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430389",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430390",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11187",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15467",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15468",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15469",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66199",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68160",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69418",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69420",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69421",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22795",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22796",
            "https://errata.almalinux.org/9/ALSA-2026-1473.html",
            "https://errata.rockylinux.org/RLSA-2026:1473",
            "https://github.com/openssl/openssl/commit/384011202af92605d926fafe4a0bcd6b65d162ad",
            "https://github.com/openssl/openssl/commit/475c466ef2fbd8fc1df6fae1c3eed9c813fc8ff6",
            "https://github.com/openssl/openssl/commit/4c96fbba618e1940f038012506ee9e21d32ee12c",
            "https://github.com/openssl/openssl/commit/6845c3b6460a98b1ec4e463baa2ea1a63a32d7c0",
            "https://github.com/openssl/openssl/commit/68a7cd2e2816c3a02f4d45a2ce43fc04fac97096",
            "https://linux.oracle.com/cve/CVE-2025-68160.html",
            "https://linux.oracle.com/errata/ELSA-2026-50081.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-68160",
            "https://openssl-library.org/news/secadv/20260127.txt",
            "https://ubuntu.com/security/notices/USN-7980-1",
            "https://ubuntu.com/security/notices/USN-7980-2",
            "https://www.cve.org/CVERecord?id=CVE-2025-68160"
          ],
          "PublishedDate": "2026-01-27T16:16:15.9Z",
          "LastModifiedDate": "2026-02-02T18:36:57.727Z"
        },
        {
          "VulnerabilityID": "CVE-2025-69418",
          "VendorIDs": [
            "DSA-6113-1"
          ],
          "PkgID": "openssl@3.5.4-1~deb13u1",
          "PkgName": "openssl",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/openssl@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "793482608c8c294c",
            "BOMRef": "pkg:deb/debian/openssl@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.5.4-1~deb13u1",
          "FixedVersion": "3.5.4-1~deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:eaae8a97b41ced6ea3400030c5ee05505145583005cc540e6292fb553662d08e",
            "DiffID": "sha256:684e1a4916f28ca8be5cb345b358afb5671bbbf301a9d468d86e4417742853d6"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-69418",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:bbfc5a7455ec64f70c9b832783dfb29eb039cee5ea4116ac9246bd5d9c5ced61",
          "Title": "openssl: OpenSSL: Information disclosure and data tampering via specific low-level OCB encryption/decryption calls",
          "Description": "Issue summary: When using the low-level OCB API directly with AES-NI or\u003cbr\u003eother hardware-accelerated code paths, inputs whose length is not a multiple\u003cbr\u003eof 16 bytes can leave the final partial block unencrypted and unauthenticated.\u003cbr\u003e\u003cbr\u003eImpact summary: The trailing 1-15 bytes of a message may be exposed in\u003cbr\u003ecleartext on encryption and are not covered by the authentication tag,\u003cbr\u003eallowing an attacker to read or tamper with those bytes without detection.\u003cbr\u003e\u003cbr\u003eThe low-level OCB encrypt and decrypt routines in the hardware-accelerated\u003cbr\u003estream path process full 16-byte blocks but do not advance the input/output\u003cbr\u003epointers. The subsequent tail-handling code then operates on the original\u003cbr\u003ebase pointers, effectively reprocessing the beginning of the buffer while\u003cbr\u003eleaving the actual trailing bytes unprocessed. The authentication checksum\u003cbr\u003ealso excludes the true tail bytes.\u003cbr\u003e\u003cbr\u003eHowever, typical OpenSSL consumers using EVP are not affected because the\u003cbr\u003ehigher-level EVP and provider OCB implementations split inputs so that full\u003cbr\u003eblocks and trailing partial blocks are processed in separate calls, avoiding\u003cbr\u003ethe problematic code path. Additionally, TLS does not use OCB ciphersuites.\u003cbr\u003eThe vulnerability only affects applications that call the low-level\u003cbr\u003eCRYPTO_ocb128_encrypt() or CRYPTO_ocb128_decrypt() functions directly with\u003cbr\u003enon-block-aligned lengths in a single call on hardware-accelerated builds.\u003cbr\u003eFor these reasons the issue was assessed as Low severity.\u003cbr\u003e\u003cbr\u003eThe FIPS modules in 3.6, 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected\u003cbr\u003eby this issue, as OCB mode is not a FIPS-approved algorithm.\u003cbr\u003e\u003cbr\u003eOpenSSL 3.6, 3.5, 3.4, 3.3, 3.0 and 1.1.1 are vulnerable to this issue.\u003cbr\u003e\u003cbr\u003eOpenSSL 1.0.2 is not affected by this issue.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-325"
          ],
          "VendorSeverity": {
            "alma": 3,
            "amazon": 3,
            "azure": 2,
            "cbl-mariner": 2,
            "oracle-oval": 3,
            "photon": 2,
            "redhat": 1,
            "rocky": 3,
            "ubuntu": 1
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
              "V3Score": 4
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:1473",
            "https://access.redhat.com/security/cve/CVE-2025-69418",
            "https://bugzilla.redhat.com/2430375",
            "https://bugzilla.redhat.com/2430376",
            "https://bugzilla.redhat.com/2430377",
            "https://bugzilla.redhat.com/2430378",
            "https://bugzilla.redhat.com/2430379",
            "https://bugzilla.redhat.com/2430380",
            "https://bugzilla.redhat.com/2430381",
            "https://bugzilla.redhat.com/2430386",
            "https://bugzilla.redhat.com/2430387",
            "https://bugzilla.redhat.com/2430388",
            "https://bugzilla.redhat.com/2430389",
            "https://bugzilla.redhat.com/2430390",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430375",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430376",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430377",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430378",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430379",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430380",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430381",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430386",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430387",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430388",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430389",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430390",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11187",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15467",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15468",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15469",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66199",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68160",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69418",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69420",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69421",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22795",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22796",
            "https://errata.almalinux.org/9/ALSA-2026-1473.html",
            "https://errata.rockylinux.org/RLSA-2026:1473",
            "https://github.com/openssl/openssl/commit/372fc5c77529695b05b4f5b5187691a57ef5dffc",
            "https://github.com/openssl/openssl/commit/4016975d4469cd6b94927c607f7c511385f928d8",
            "https://github.com/openssl/openssl/commit/52d23c86a54adab5ee9f80e48b242b52c4cc2347",
            "https://github.com/openssl/openssl/commit/a7589230356d908c0eca4b969ec4f62106f4f5ae",
            "https://github.com/openssl/openssl/commit/ed40856d7d4ba6cb42779b6770666a65f19cb977",
            "https://linux.oracle.com/cve/CVE-2025-69418.html",
            "https://linux.oracle.com/errata/ELSA-2026-50081.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-69418",
            "https://openssl-library.org/news/secadv/20260127.txt",
            "https://ubuntu.com/security/notices/USN-7980-1",
            "https://ubuntu.com/security/notices/USN-7980-2",
            "https://www.cve.org/CVERecord?id=CVE-2025-69418"
          ],
          "PublishedDate": "2026-01-27T16:16:33.253Z",
          "LastModifiedDate": "2026-02-02T18:36:03.557Z"
        },
        {
          "VulnerabilityID": "CVE-2025-69420",
          "VendorIDs": [
            "DSA-6113-1"
          ],
          "PkgID": "openssl@3.5.4-1~deb13u1",
          "PkgName": "openssl",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/openssl@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "793482608c8c294c",
            "BOMRef": "pkg:deb/debian/openssl@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.5.4-1~deb13u1",
          "FixedVersion": "3.5.4-1~deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:eaae8a97b41ced6ea3400030c5ee05505145583005cc540e6292fb553662d08e",
            "DiffID": "sha256:684e1a4916f28ca8be5cb345b358afb5671bbbf301a9d468d86e4417742853d6"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-69420",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:9bc6cca35c6d948de7919ef67baff74e7bc2865d4b643c4ac73999621557108b",
          "Title": "openssl: OpenSSL: Denial of Service via malformed TimeStamp Response",
          "Description": "Issue summary: A type confusion vulnerability exists in the TimeStamp Response\nverification code where an ASN1_TYPE union member is accessed without first\nvalidating the type, causing an invalid or NULL pointer dereference when\nprocessing a malformed TimeStamp Response file.\n\nImpact summary: An application calling TS_RESP_verify_response() with a\nmalformed TimeStamp Response can be caused to dereference an invalid or\nNULL pointer when reading, resulting in a Denial of Service.\n\nThe functions ossl_ess_get_signing_cert() and ossl_ess_get_signing_cert_v2()\naccess the signing cert attribute value without validating its type.\nWhen the type is not V_ASN1_SEQUENCE, this results in accessing invalid memory\nthrough the ASN1_TYPE union, causing a crash.\n\nExploiting this vulnerability requires an attacker to provide a malformed\nTimeStamp Response to an application that verifies timestamp responses. The\nTimeStamp protocol (RFC 3161) is not widely used and the impact of the\nexploit is just a Denial of Service. For these reasons the issue was\nassessed as Low severity.\n\nThe FIPS modules in 3.5, 3.4, 3.3 and 3.0 are not affected by this issue,\nas the TimeStamp Response implementation is outside the OpenSSL FIPS module\nboundary.\n\nOpenSSL 3.6, 3.5, 3.4, 3.3, 3.0 and 1.1.1 are vulnerable to this issue.\n\nOpenSSL 1.0.2 is not affected by this issue.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-754"
          ],
          "VendorSeverity": {
            "alma": 3,
            "amazon": 3,
            "azure": 3,
            "cbl-mariner": 3,
            "oracle-oval": 3,
            "photon": 3,
            "redhat": 1,
            "rocky": 3,
            "ubuntu": 1
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 5.9
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:1473",
            "https://access.redhat.com/security/cve/CVE-2025-69420",
            "https://bugzilla.redhat.com/2430375",
            "https://bugzilla.redhat.com/2430376",
            "https://bugzilla.redhat.com/2430377",
            "https://bugzilla.redhat.com/2430378",
            "https://bugzilla.redhat.com/2430379",
            "https://bugzilla.redhat.com/2430380",
            "https://bugzilla.redhat.com/2430381",
            "https://bugzilla.redhat.com/2430386",
            "https://bugzilla.redhat.com/2430387",
            "https://bugzilla.redhat.com/2430388",
            "https://bugzilla.redhat.com/2430389",
            "https://bugzilla.redhat.com/2430390",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430375",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430376",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430377",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430378",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430379",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430380",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430381",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430386",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430387",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430388",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430389",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430390",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11187",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15467",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15468",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15469",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66199",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68160",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69418",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69420",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69421",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22795",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22796",
            "https://errata.almalinux.org/9/ALSA-2026-1473.html",
            "https://errata.rockylinux.org/RLSA-2026:1473",
            "https://github.com/openssl/openssl/commit/27c7012c91cc986a598d7540f3079dfde2416eb9",
            "https://github.com/openssl/openssl/commit/4e254b48ad93cc092be3dd62d97015f33f73133a",
            "https://github.com/openssl/openssl/commit/564fd9c73787f25693bf9e75faf7bf6bb1305d4e",
            "https://github.com/openssl/openssl/commit/5eb0770ffcf11b785cf374ff3c19196245e54f1b",
            "https://github.com/openssl/openssl/commit/a99349ebfc519999edc50620abe24d599b9eb085",
            "https://linux.oracle.com/cve/CVE-2025-69420.html",
            "https://linux.oracle.com/errata/ELSA-2026-50081.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-69420",
            "https://openssl-library.org/news/secadv/20260127.txt",
            "https://ubuntu.com/security/notices/USN-7980-1",
            "https://ubuntu.com/security/notices/USN-7980-2",
            "https://www.cve.org/CVERecord?id=CVE-2025-69420"
          ],
          "PublishedDate": "2026-01-27T16:16:34.317Z",
          "LastModifiedDate": "2026-02-02T18:33:30.557Z"
        },
        {
          "VulnerabilityID": "CVE-2026-22795",
          "VendorIDs": [
            "DSA-6113-1"
          ],
          "PkgID": "openssl@3.5.4-1~deb13u1",
          "PkgName": "openssl",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/openssl@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "793482608c8c294c",
            "BOMRef": "pkg:deb/debian/openssl@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.5.4-1~deb13u1",
          "FixedVersion": "3.5.4-1~deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:eaae8a97b41ced6ea3400030c5ee05505145583005cc540e6292fb553662d08e",
            "DiffID": "sha256:684e1a4916f28ca8be5cb345b358afb5671bbbf301a9d468d86e4417742853d6"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-22795",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:536094d074a40816b390fc966e18e6da43679ceaec5f10b5bb0947d99f968dfd",
          "Title": "openssl: OpenSSL: Denial of Service due to type confusion in PKCS#12 file processing",
          "Description": "Issue summary: An invalid or NULL pointer dereference can happen in\nan application processing a malformed PKCS#12 file.\n\nImpact summary: An application processing a malformed PKCS#12 file can be\ncaused to dereference an invalid or NULL pointer on memory read, resulting\nin a Denial of Service.\n\nA type confusion vulnerability exists in PKCS#12 parsing code where\nan ASN1_TYPE union member is accessed without first validating the type,\ncausing an invalid pointer read.\n\nThe location is constrained to a 1-byte address space, meaning any\nattempted pointer manipulation can only target addresses between 0x00 and 0xFF.\nThis range corresponds to the zero page, which is unmapped on most modern\noperating systems and will reliably result in a crash, leading only to a\nDenial of Service. Exploiting this issue also requires a user or application\nto process a maliciously crafted PKCS#12 file. It is uncommon to accept\nuntrusted PKCS#12 files in applications as they are usually used to store\nprivate keys which are trusted by definition. For these reasons, the issue\nwas assessed as Low severity.\n\nThe FIPS modules in 3.5, 3.4, 3.3 and 3.0 are not affected by this issue,\nas the PKCS12 implementation is outside the OpenSSL FIPS module boundary.\n\nOpenSSL 3.6, 3.5, 3.4, 3.3, 3.0 and 1.1.1 are vulnerable to this issue.\n\nOpenSSL 1.0.2 is not affected by this issue.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-754"
          ],
          "VendorSeverity": {
            "alma": 3,
            "amazon": 3,
            "azure": 2,
            "cbl-mariner": 2,
            "oracle-oval": 3,
            "photon": 2,
            "redhat": 1,
            "rocky": 3,
            "ubuntu": 1
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
              "V3Score": 5.5
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:1473",
            "https://access.redhat.com/security/cve/CVE-2026-22795",
            "https://bugzilla.redhat.com/2430375",
            "https://bugzilla.redhat.com/2430376",
            "https://bugzilla.redhat.com/2430377",
            "https://bugzilla.redhat.com/2430378",
            "https://bugzilla.redhat.com/2430379",
            "https://bugzilla.redhat.com/2430380",
            "https://bugzilla.redhat.com/2430381",
            "https://bugzilla.redhat.com/2430386",
            "https://bugzilla.redhat.com/2430387",
            "https://bugzilla.redhat.com/2430388",
            "https://bugzilla.redhat.com/2430389",
            "https://bugzilla.redhat.com/2430390",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430375",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430376",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430377",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430378",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430379",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430380",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430381",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430386",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430387",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430388",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430389",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430390",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11187",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15467",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15468",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15469",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66199",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68160",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69418",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69420",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69421",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22795",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22796",
            "https://errata.almalinux.org/9/ALSA-2026-1473.html",
            "https://errata.rockylinux.org/RLSA-2026:1473",
            "https://github.com/openssl/openssl/commit/2502e7b7d4c0cf4f972a881641fe09edc67aeec4",
            "https://github.com/openssl/openssl/commit/572844beca95068394c916626a6d3a490f831a49",
            "https://github.com/openssl/openssl/commit/7bbca05be55b129651d9df4bdb92becc45002c12",
            "https://github.com/openssl/openssl/commit/eeee3cbd4d682095ed431052f00403004596373e",
            "https://github.com/openssl/openssl/commit/ef2fb66ec571564d64d1c74a12e388a2a54d05d2",
            "https://linux.oracle.com/cve/CVE-2026-22795.html",
            "https://linux.oracle.com/errata/ELSA-2026-50081.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-22795",
            "https://openssl-library.org/news/secadv/20260127.txt",
            "https://ubuntu.com/security/notices/USN-7980-1",
            "https://ubuntu.com/security/notices/USN-7980-2",
            "https://www.cve.org/CVERecord?id=CVE-2026-22795"
          ],
          "PublishedDate": "2026-01-27T16:16:35.43Z",
          "LastModifiedDate": "2026-02-02T18:41:14.917Z"
        },
        {
          "VulnerabilityID": "CVE-2026-22796",
          "VendorIDs": [
            "DSA-6113-1"
          ],
          "PkgID": "openssl@3.5.4-1~deb13u1",
          "PkgName": "openssl",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/openssl@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "793482608c8c294c",
            "BOMRef": "pkg:deb/debian/openssl@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.5.4-1~deb13u1",
          "FixedVersion": "3.5.4-1~deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:eaae8a97b41ced6ea3400030c5ee05505145583005cc540e6292fb553662d08e",
            "DiffID": "sha256:684e1a4916f28ca8be5cb345b358afb5671bbbf301a9d468d86e4417742853d6"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-22796",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:eef597765b1c5af7f9af514b68b572858beb7ac2fee2c425460e1cc1956daa7f",
          "Title": "openssl: OpenSSL: Denial of Service via type confusion in PKCS#7 signature verification",
          "Description": "Issue summary: A type confusion vulnerability exists in the signature\nverification of signed PKCS#7 data where an ASN1_TYPE union member is\naccessed without first validating the type, causing an invalid or NULL\npointer dereference when processing malformed PKCS#7 data.\n\nImpact summary: An application performing signature verification of PKCS#7\ndata or calling directly the PKCS7_digest_from_attributes() function can be\ncaused to dereference an invalid or NULL pointer when reading, resulting in\na Denial of Service.\n\nThe function PKCS7_digest_from_attributes() accesses the message digest attribute\nvalue without validating its type. When the type is not V_ASN1_OCTET_STRING,\nthis results in accessing invalid memory through the ASN1_TYPE union, causing\na crash.\n\nExploiting this vulnerability requires an attacker to provide a malformed\nsigned PKCS#7 to an application that verifies it. The impact of the\nexploit is just a Denial of Service, the PKCS7 API is legacy and applications\nshould be using the CMS API instead. For these reasons the issue was\nassessed as Low severity.\n\nThe FIPS modules in 3.5, 3.4, 3.3 and 3.0 are not affected by this issue,\nas the PKCS#7 parsing implementation is outside the OpenSSL FIPS module\nboundary.\n\nOpenSSL 3.6, 3.5, 3.4, 3.3, 3.0, 1.1.1 and 1.0.2 are vulnerable to this issue.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-754"
          ],
          "VendorSeverity": {
            "alma": 3,
            "amazon": 3,
            "azure": 2,
            "cbl-mariner": 2,
            "oracle-oval": 3,
            "photon": 2,
            "redhat": 1,
            "rocky": 3,
            "ubuntu": 1
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 5.9
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:1473",
            "https://access.redhat.com/security/cve/CVE-2026-22796",
            "https://bugzilla.redhat.com/2430375",
            "https://bugzilla.redhat.com/2430376",
            "https://bugzilla.redhat.com/2430377",
            "https://bugzilla.redhat.com/2430378",
            "https://bugzilla.redhat.com/2430379",
            "https://bugzilla.redhat.com/2430380",
            "https://bugzilla.redhat.com/2430381",
            "https://bugzilla.redhat.com/2430386",
            "https://bugzilla.redhat.com/2430387",
            "https://bugzilla.redhat.com/2430388",
            "https://bugzilla.redhat.com/2430389",
            "https://bugzilla.redhat.com/2430390",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430375",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430376",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430377",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430378",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430379",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430380",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430381",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430386",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430387",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430388",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430389",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430390",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11187",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15467",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15468",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15469",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66199",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68160",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69418",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69420",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69421",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22795",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22796",
            "https://errata.almalinux.org/9/ALSA-2026-1473.html",
            "https://errata.rockylinux.org/RLSA-2026:1473",
            "https://github.com/openssl/openssl/commit/2502e7b7d4c0cf4f972a881641fe09edc67aeec4",
            "https://github.com/openssl/openssl/commit/572844beca95068394c916626a6d3a490f831a49",
            "https://github.com/openssl/openssl/commit/7bbca05be55b129651d9df4bdb92becc45002c12",
            "https://github.com/openssl/openssl/commit/eeee3cbd4d682095ed431052f00403004596373e",
            "https://github.com/openssl/openssl/commit/ef2fb66ec571564d64d1c74a12e388a2a54d05d2",
            "https://linux.oracle.com/cve/CVE-2026-22796.html",
            "https://linux.oracle.com/errata/ELSA-2026-50081.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-22796",
            "https://openssl-library.org/news/secadv/20260127.txt",
            "https://ubuntu.com/security/notices/USN-7980-1",
            "https://ubuntu.com/security/notices/USN-7980-2",
            "https://www.cve.org/CVERecord?id=CVE-2026-22796"
          ],
          "PublishedDate": "2026-01-27T16:16:35.543Z",
          "LastModifiedDate": "2026-02-02T18:40:27.467Z"
        },
        {
          "VulnerabilityID": "CVE-2026-2673",
          "PkgID": "openssl@3.5.4-1~deb13u1",
          "PkgName": "openssl",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/openssl@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "793482608c8c294c",
            "BOMRef": "pkg:deb/debian/openssl@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.5.4-1~deb13u1",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:eaae8a97b41ced6ea3400030c5ee05505145583005cc540e6292fb553662d08e",
            "DiffID": "sha256:684e1a4916f28ca8be5cb345b358afb5671bbbf301a9d468d86e4417742853d6"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-2673",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:958ba523e8678c855aa924caff05fd5a53f3a5314c128a98fba8f41d4d5d76da",
          "Title": "openssl: OpenSSL TLS 1.3 server may choose unexpected key agreement group",
          "Description": "Issue summary: An OpenSSL TLS 1.3 server may fail to negotiate the expected\npreferred key exchange group when its key exchange group configuration includes\nthe default by using the 'DEFAULT' keyword.\n\nImpact summary: A less preferred key exchange may be used even when a more\npreferred group is supported by both client and server, if the group\nwas not included among the client's initial predicated keyshares.\nThis will sometimes be the case with the new hybrid post-quantum groups,\nif the client chooses to defer their use until specifically requested by\nthe server.\n\nIf an OpenSSL TLS 1.3 server's configuration uses the 'DEFAULT' keyword to\ninterpolate the built-in default group list into its own configuration, perhaps\nadding or removing specific elements, then an implementation defect causes the\n'DEFAULT' list to lose its 'tuple' structure, and all server-supported groups\nwere treated as a single sufficiently secure 'tuple', with the server not\nsending a Hello Retry Request (HRR) even when a group in a more preferred tuple\nwas mutually supported.\n\nAs a result, the client and server might fail to negotiate a mutually supported\npost-quantum key agreement group, such as 'X25519MLKEM768', if the client's\nconfiguration results in only 'classical' groups (such as 'X25519' being the\nonly ones in the client's initial keyshare prediction).\n\nOpenSSL 3.5 and later support a new syntax for selecting the most preferred TLS\n1.3 key agreement group on TLS servers.  The old syntax had a single 'flat'\nlist of groups, and treated all the supported groups as sufficiently secure.\nIf any of the keyshares predicted by the client were supported by the server\nthe most preferred among these was selected, even if other groups supported by\nthe client, but not included in the list of predicted keyshares would have been\nmore preferred, if included.\n\nThe new syntax partitions the groups into distinct 'tuples' of roughly\nequivalent security.  Within each tuple the most preferred group included among\nthe client's predicted keyshares is chosen, but if the client supports a group\nfrom a more preferred tuple, but did not predict any corresponding keyshares,\nthe server will ask the client to retry the ClientHello (by issuing a Hello\nRetry Request or HRR) with the most preferred mutually supported group.\n\nThe above works as expected when the server's configuration uses the built-in\ndefault group list, or explicitly defines its own list by directly defining the\nvarious desired groups and group 'tuples'.\n\nNo OpenSSL FIPS modules are affected by this issue, the code in question lies\noutside the FIPS boundary.\n\nOpenSSL 3.6 and 3.5 are vulnerable to this issue.\n\nOpenSSL 3.6 users should upgrade to OpenSSL 3.6.2 once it is released.\nOpenSSL 3.5 users should upgrade to OpenSSL 3.5.6 once it is released.\n\nOpenSSL 3.4, 3.3, 3.0, 1.0.2 and 1.1.1 are not affected by this issue.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-757"
          ],
          "VendorSeverity": {
            "amazon": 1,
            "redhat": 1,
            "ubuntu": 1
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N",
              "V3Score": 3.1
            }
          },
          "References": [
            "http://www.openwall.com/lists/oss-security/2026/03/13/3",
            "https://access.redhat.com/security/cve/CVE-2026-2673",
            "https://github.com/openssl/openssl/commit/2157c9d81f7b0bd7dfa25b960e928ec28e8dd63f",
            "https://github.com/openssl/openssl/commit/85977e013f32ceb96aa034c0e741adddc1a05e34",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-2673",
            "https://openssl-library.org/news/secadv/20260313.txt",
            "https://www.cve.org/CVERecord?id=CVE-2026-2673"
          ],
          "PublishedDate": "2026-03-13T19:54:34.033Z",
          "LastModifiedDate": "2026-03-17T18:16:15.6Z"
        },
        {
          "VulnerabilityID": "CVE-2025-15467",
          "VendorIDs": [
            "DSA-6113-1"
          ],
          "PkgID": "openssl-provider-legacy@3.5.4-1~deb13u1",
          "PkgName": "openssl-provider-legacy",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/openssl-provider-legacy@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "60b4501dc322c5b1",
            "BOMRef": "pkg:deb/debian/openssl-provider-legacy@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.5.4-1~deb13u1",
          "FixedVersion": "3.5.4-1~deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-15467",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:65fd418aea43bbdc0cb175340a83c3a6a3bd6a15ff18dbd602e753fac7c4cf0e",
          "Title": "openssl: OpenSSL: Remote code execution or Denial of Service via oversized Initialization Vector in CMS parsing",
          "Description": "Issue summary: Parsing CMS AuthEnvelopedData or EnvelopedData message with\nmaliciously crafted AEAD parameters can trigger a stack buffer overflow.\n\nImpact summary: A stack buffer overflow may lead to a crash, causing Denial\nof Service, or potentially remote code execution.\n\nWhen parsing CMS (Auth)EnvelopedData structures that use AEAD ciphers such as\nAES-GCM, the IV (Initialization Vector) encoded in the ASN.1 parameters is\ncopied into a fixed-size stack buffer without verifying that its length fits\nthe destination. An attacker can supply a crafted CMS message with an\noversized IV, causing a stack-based out-of-bounds write before any\nauthentication or tag verification occurs.\n\nApplications and services that parse untrusted CMS or PKCS#7 content using\nAEAD ciphers (e.g., S/MIME (Auth)EnvelopedData with AES-GCM) are vulnerable.\nBecause the overflow occurs prior to authentication, no valid key material\nis required to trigger it. While exploitability to remote code execution\ndepends on platform and toolchain mitigations, the stack-based write\nprimitive represents a severe risk.\n\nThe FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this\nissue, as the CMS implementation is outside the OpenSSL FIPS module\nboundary.\n\nOpenSSL 3.6, 3.5, 3.4, 3.3 and 3.0 are vulnerable to this issue.\n\nOpenSSL 1.1.1 and 1.0.2 are not affected by this issue.",
          "Severity": "CRITICAL",
          "CweIDs": [
            "CWE-787"
          ],
          "VendorSeverity": {
            "alma": 3,
            "amazon": 3,
            "azure": 4,
            "oracle-oval": 3,
            "photon": 3,
            "redhat": 3,
            "rocky": 3,
            "ubuntu": 2
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
              "V3Score": 9.8
            }
          },
          "References": [
            "http://www.openwall.com/lists/oss-security/2026/01/27/10",
            "http://www.openwall.com/lists/oss-security/2026/02/25/6",
            "https://access.redhat.com/errata/RHSA-2026:1473",
            "https://access.redhat.com/security/cve/CVE-2025-15467",
            "https://bugzilla.redhat.com/2430375",
            "https://bugzilla.redhat.com/2430376",
            "https://bugzilla.redhat.com/2430377",
            "https://bugzilla.redhat.com/2430378",
            "https://bugzilla.redhat.com/2430379",
            "https://bugzilla.redhat.com/2430380",
            "https://bugzilla.redhat.com/2430381",
            "https://bugzilla.redhat.com/2430386",
            "https://bugzilla.redhat.com/2430387",
            "https://bugzilla.redhat.com/2430388",
            "https://bugzilla.redhat.com/2430389",
            "https://bugzilla.redhat.com/2430390",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430375",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430376",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430377",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430378",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430379",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430380",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430381",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430386",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430387",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430388",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430389",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430390",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11187",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15467",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15468",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15469",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66199",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68160",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69418",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69420",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69421",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22795",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22796",
            "https://errata.almalinux.org/9/ALSA-2026-1473.html",
            "https://errata.rockylinux.org/RLSA-2026:1473",
            "https://github.com/guiimoraes/CVE-2025-15467",
            "https://github.com/openssl/openssl/commit/2c8f0e5fa9b6ee5508a0349e4572ddb74db5a703",
            "https://github.com/openssl/openssl/commit/5f26d4202f5b89664c5c3f3c62086276026ba9a9",
            "https://github.com/openssl/openssl/commit/6ced0fe6b10faa560e410e3ee8d6c82f06c65ea3",
            "https://github.com/openssl/openssl/commit/ce39170276daec87f55c39dad1f629b56344429e",
            "https://github.com/openssl/openssl/commit/d0071a0799f20cc8101730145349ed4487c268dc",
            "https://linux.oracle.com/cve/CVE-2025-15467.html",
            "https://linux.oracle.com/errata/ELSA-2026-50081.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-15467",
            "https://openssl-library.org/news/secadv/20260127.txt",
            "https://ubuntu.com/security/notices/USN-7980-1",
            "https://www.cve.org/CVERecord?id=CVE-2025-15467"
          ],
          "PublishedDate": "2026-01-27T16:16:14.257Z",
          "LastModifiedDate": "2026-03-19T19:16:19.23Z"
        },
        {
          "VulnerabilityID": "CVE-2025-69419",
          "VendorIDs": [
            "DSA-6113-1"
          ],
          "PkgID": "openssl-provider-legacy@3.5.4-1~deb13u1",
          "PkgName": "openssl-provider-legacy",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/openssl-provider-legacy@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "60b4501dc322c5b1",
            "BOMRef": "pkg:deb/debian/openssl-provider-legacy@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.5.4-1~deb13u1",
          "FixedVersion": "3.5.4-1~deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-69419",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:78450ccf236e269de420f94d1afe408ad978c54a1d94a273bffc3fa3392c90fd",
          "Title": "openssl: OpenSSL: Arbitrary code execution due to out-of-bounds write in PKCS#12 processing",
          "Description": "Issue summary: Calling PKCS12_get_friendlyname() function on a maliciously\ncrafted PKCS#12 file with a BMPString (UTF-16BE) friendly name containing\nnon-ASCII BMP code point can trigger a one byte write before the allocated\nbuffer.\n\nImpact summary: The out-of-bounds write can cause a memory corruption\nwhich can have various consequences including a Denial of Service.\n\nThe OPENSSL_uni2utf8() function performs a two-pass conversion of a PKCS#12\nBMPString (UTF-16BE) to UTF-8. In the second pass, when emitting UTF-8 bytes,\nthe helper function bmp_to_utf8() incorrectly forwards the remaining UTF-16\nsource byte count as the destination buffer capacity to UTF8_putc(). For BMP\ncode points above U+07FF, UTF-8 requires three bytes, but the forwarded\ncapacity can be just two bytes. UTF8_putc() then returns -1, and this negative\nvalue is added to the output length without validation, causing the\nlength to become negative. The subsequent trailing NUL byte is then written\nat a negative offset, causing write outside of heap allocated buffer.\n\nThe vulnerability is reachable via the public PKCS12_get_friendlyname() API\nwhen parsing attacker-controlled PKCS#12 files. While PKCS12_parse() uses a\ndifferent code path that avoids this issue, PKCS12_get_friendlyname() directly\ninvokes the vulnerable function. Exploitation requires an attacker to provide\na malicious PKCS#12 file to be parsed by the application and the attacker\ncan just trigger a one zero byte write before the allocated buffer.\nFor that reason the issue was assessed as Low severity according to our\nSecurity Policy.\n\nThe FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue,\nas the PKCS#12 implementation is outside the OpenSSL FIPS module boundary.\n\nOpenSSL 3.6, 3.5, 3.4, 3.3, 3.0 and 1.1.1 are vulnerable to this issue.\n\nOpenSSL 1.0.2 is not affected by this issue.",
          "Severity": "HIGH",
          "CweIDs": [
            "CWE-787"
          ],
          "VendorSeverity": {
            "alma": 2,
            "amazon": 3,
            "azure": 3,
            "cbl-mariner": 3,
            "oracle-oval": 2,
            "photon": 3,
            "redhat": 2,
            "rocky": 3,
            "ubuntu": 1
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
              "V3Score": 7.4
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:4472",
            "https://access.redhat.com/security/cve/CVE-2025-69419",
            "https://bugzilla.redhat.com/2430386",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430375",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430376",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430377",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430378",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430379",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430380",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430381",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430386",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430387",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430388",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430389",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430390",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11187",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15467",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15468",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15469",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66199",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68160",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69418",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69420",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69421",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22795",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22796",
            "https://errata.almalinux.org/9/ALSA-2026-4472.html",
            "https://errata.rockylinux.org/RLSA-2026:1473",
            "https://github.com/openssl/openssl/commit/41be0f216404f14457bbf3b9cc488dba60b49296",
            "https://github.com/openssl/openssl/commit/7e9cac9832e4705b91987c2474ed06a37a93cecb",
            "https://github.com/openssl/openssl/commit/a26a90d38edec3748566129d824e664b54bee2e2",
            "https://github.com/openssl/openssl/commit/cda12de3bc0e333ea8d2c6fd15001dbdaf280015",
            "https://github.com/openssl/openssl/commit/ff628933755075446bca8307e8417c14d164b535",
            "https://linux.oracle.com/cve/CVE-2025-69419.html",
            "https://linux.oracle.com/errata/ELSA-2026-50131.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-69419",
            "https://openssl-library.org/news/secadv/20260127.txt",
            "https://ubuntu.com/security/notices/USN-7980-1",
            "https://ubuntu.com/security/notices/USN-7980-2",
            "https://www.cve.org/CVERecord?id=CVE-2025-69419"
          ],
          "PublishedDate": "2026-01-27T16:16:34.113Z",
          "LastModifiedDate": "2026-02-02T18:35:02.177Z"
        },
        {
          "VulnerabilityID": "CVE-2025-69421",
          "VendorIDs": [
            "DSA-6113-1"
          ],
          "PkgID": "openssl-provider-legacy@3.5.4-1~deb13u1",
          "PkgName": "openssl-provider-legacy",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/openssl-provider-legacy@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "60b4501dc322c5b1",
            "BOMRef": "pkg:deb/debian/openssl-provider-legacy@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.5.4-1~deb13u1",
          "FixedVersion": "3.5.4-1~deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "SeveritySource": "nvd",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-69421",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:1bc0a2239f416401efa33836cacb06cf23e912b9bc4ddb2ab35b17e1bdf9c2c6",
          "Title": "openssl: OpenSSL: Denial of Service via malformed PKCS#12 file processing",
          "Description": "Issue summary: Processing a malformed PKCS#12 file can trigger a NULL pointer\ndereference in the PKCS12_item_decrypt_d2i_ex() function.\n\nImpact summary: A NULL pointer dereference can trigger a crash which leads to\nDenial of Service for an application processing PKCS#12 files.\n\nThe PKCS12_item_decrypt_d2i_ex() function does not check whether the oct\nparameter is NULL before dereferencing it. When called from\nPKCS12_unpack_p7encdata() with a malformed PKCS#12 file, this parameter can\nbe NULL, causing a crash. The vulnerability is limited to Denial of Service\nand cannot be escalated to achieve code execution or memory disclosure.\n\nExploiting this issue requires an attacker to provide a malformed PKCS#12 file\nto an application that processes it. For that reason the issue was assessed as\nLow severity according to our Security Policy.\n\nThe FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue,\nas the PKCS#12 implementation is outside the OpenSSL FIPS module boundary.\n\nOpenSSL 3.6, 3.5, 3.4, 3.3, 3.0, 1.1.1 and 1.0.2 are vulnerable to this issue.",
          "Severity": "HIGH",
          "CweIDs": [
            "CWE-476"
          ],
          "VendorSeverity": {
            "alma": 3,
            "amazon": 3,
            "azure": 2,
            "cbl-mariner": 2,
            "nvd": 3,
            "oracle-oval": 3,
            "photon": 3,
            "redhat": 1,
            "rocky": 3,
            "ubuntu": 1
          },
          "CVSS": {
            "nvd": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 7.5
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
              "V3Score": 6.5
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:1473",
            "https://access.redhat.com/security/cve/CVE-2025-69421",
            "https://bugzilla.redhat.com/2430375",
            "https://bugzilla.redhat.com/2430376",
            "https://bugzilla.redhat.com/2430377",
            "https://bugzilla.redhat.com/2430378",
            "https://bugzilla.redhat.com/2430379",
            "https://bugzilla.redhat.com/2430380",
            "https://bugzilla.redhat.com/2430381",
            "https://bugzilla.redhat.com/2430386",
            "https://bugzilla.redhat.com/2430387",
            "https://bugzilla.redhat.com/2430388",
            "https://bugzilla.redhat.com/2430389",
            "https://bugzilla.redhat.com/2430390",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430375",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430376",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430377",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430378",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430379",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430380",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430381",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430386",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430387",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430388",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430389",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430390",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11187",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15467",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15468",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15469",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66199",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68160",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69418",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69420",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69421",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22795",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22796",
            "https://errata.almalinux.org/9/ALSA-2026-1473.html",
            "https://errata.rockylinux.org/RLSA-2026:1473",
            "https://github.com/openssl/openssl/commit/3524a29271f8191b8fd8a5257eb05173982a097b",
            "https://github.com/openssl/openssl/commit/36ecb4960872a4ce04bf6f1e1f4e78d75ec0c0c7",
            "https://github.com/openssl/openssl/commit/4bbc8d41a72c842ce4077a8a3eccd1109aaf74bd",
            "https://github.com/openssl/openssl/commit/643986985cd1c21221f941129d76fe0c2785aeb3",
            "https://github.com/openssl/openssl/commit/a2dbc539f0f9cc63832709fa5aa33ad9495eb19c",
            "https://linux.oracle.com/cve/CVE-2025-69421.html",
            "https://linux.oracle.com/errata/ELSA-2026-50081.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-69421",
            "https://openssl-library.org/news/secadv/20260127.txt",
            "https://ubuntu.com/security/notices/USN-7980-1",
            "https://ubuntu.com/security/notices/USN-7980-2",
            "https://www.cve.org/CVERecord?id=CVE-2025-69421"
          ],
          "PublishedDate": "2026-01-27T16:16:34.437Z",
          "LastModifiedDate": "2026-02-28T04:16:17.457Z"
        },
        {
          "VulnerabilityID": "CVE-2025-11187",
          "PkgID": "openssl-provider-legacy@3.5.4-1~deb13u1",
          "PkgName": "openssl-provider-legacy",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/openssl-provider-legacy@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "60b4501dc322c5b1",
            "BOMRef": "pkg:deb/debian/openssl-provider-legacy@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.5.4-1~deb13u1",
          "FixedVersion": "3.5.4-1~deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-11187",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:09c1a9fc572182aa614d28c394b9a4ea439b19659b1043dab9e391a5ee5ca66e",
          "Title": "openssl: OpenSSL: Arbitrary code execution or denial of service through crafted PKCS#12 file",
          "Description": "Issue summary: PBMAC1 parameters in PKCS#12 files are missing validation\nwhich can trigger a stack-based buffer overflow, invalid pointer or NULL\npointer dereference during MAC verification.\n\nImpact summary: The stack buffer overflow or NULL pointer dereference may\ncause a crash leading to Denial of Service for an application that parses\nuntrusted PKCS#12 files. The buffer overflow may also potentially enable\ncode execution depending on platform mitigations.\n\nWhen verifying a PKCS#12 file that uses PBMAC1 for the MAC, the PBKDF2\nsalt and keylength parameters from the file are used without validation.\nIf the value of keylength exceeds the size of the fixed stack buffer used\nfor the derived key (64 bytes), the key derivation will overflow the buffer.\nThe overflow length is attacker-controlled. Also, if the salt parameter is\nnot an OCTET STRING type this can lead to invalid or NULL pointer\ndereference.\n\nExploiting this issue requires a user or application to process\na maliciously crafted PKCS#12 file. It is uncommon to accept untrusted\nPKCS#12 files in applications as they are usually used to store private\nkeys which are trusted by definition. For this reason the issue was assessed\nas Moderate severity.\n\nThe FIPS modules in 3.6, 3.5 and 3.4 are not affected by this issue, as\nPKCS#12 processing is outside the OpenSSL FIPS module boundary.\n\nOpenSSL 3.6, 3.5 and 3.4 are vulnerable to this issue.\n\nOpenSSL 3.3, 3.0, 1.1.1 and 1.0.2 are not affected by this issue as they do\nnot support PBMAC1 in PKCS#12.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-476",
            "CWE-787"
          ],
          "VendorSeverity": {
            "alma": 3,
            "oracle-oval": 3,
            "redhat": 2,
            "rocky": 3,
            "ubuntu": 2
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H",
              "V3Score": 6.1
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:1473",
            "https://access.redhat.com/security/cve/CVE-2025-11187",
            "https://bugzilla.redhat.com/2430375",
            "https://bugzilla.redhat.com/2430376",
            "https://bugzilla.redhat.com/2430377",
            "https://bugzilla.redhat.com/2430378",
            "https://bugzilla.redhat.com/2430379",
            "https://bugzilla.redhat.com/2430380",
            "https://bugzilla.redhat.com/2430381",
            "https://bugzilla.redhat.com/2430386",
            "https://bugzilla.redhat.com/2430387",
            "https://bugzilla.redhat.com/2430388",
            "https://bugzilla.redhat.com/2430389",
            "https://bugzilla.redhat.com/2430390",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430375",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430376",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430377",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430378",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430379",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430380",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430381",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430386",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430387",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430388",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430389",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430390",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11187",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15467",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15468",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15469",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66199",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68160",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69418",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69420",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69421",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22795",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22796",
            "https://errata.almalinux.org/9/ALSA-2026-1473.html",
            "https://errata.rockylinux.org/RLSA-2026:1473",
            "https://github.com/metadust/CVE-2025-11187",
            "https://github.com/openssl/openssl/commit/205e3a55e16e4bd08c12fdbd3416ab829c0f6206",
            "https://github.com/openssl/openssl/commit/8caf359d6e46fb413e8f5f0df765d2e8a51df4e8",
            "https://github.com/openssl/openssl/commit/e1079bc17ed93ff16f6b86f33a2fe3336e78817e",
            "https://linux.oracle.com/cve/CVE-2025-11187.html",
            "https://linux.oracle.com/errata/ELSA-2026-50081.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-11187",
            "https://openssl-library.org/news/secadv/20260127.txt",
            "https://ubuntu.com/security/notices/USN-7980-1",
            "https://www.cve.org/CVERecord?id=CVE-2025-11187"
          ],
          "PublishedDate": "2026-01-27T16:16:14.093Z",
          "LastModifiedDate": "2026-03-20T14:16:13.89Z"
        },
        {
          "VulnerabilityID": "CVE-2025-15468",
          "PkgID": "openssl-provider-legacy@3.5.4-1~deb13u1",
          "PkgName": "openssl-provider-legacy",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/openssl-provider-legacy@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "60b4501dc322c5b1",
            "BOMRef": "pkg:deb/debian/openssl-provider-legacy@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.5.4-1~deb13u1",
          "FixedVersion": "3.5.4-1~deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-15468",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:1486f86be47e2ab81fe44a42f3fa556239004b3c132fe26e1bad9ab0d0696abe",
          "Title": "openssl: OpenSSL: Denial of Service via NULL pointer dereference in QUIC protocol handling",
          "Description": "Issue summary: If an application using the SSL_CIPHER_find() function in\na QUIC protocol client or server receives an unknown cipher suite from\nthe peer, a NULL dereference occurs.\n\nImpact summary: A NULL pointer dereference leads to abnormal termination of\nthe running process causing Denial of Service.\n\nSome applications call SSL_CIPHER_find() from the client_hello_cb callback\non the cipher ID received from the peer. If this is done with an SSL object\nimplementing the QUIC protocol, NULL pointer dereference will happen if\nthe examined cipher ID is unknown or unsupported.\n\nAs it is not very common to call this function in applications using the QUIC \nprotocol and the worst outcome is Denial of Service, the issue was assessed\nas Low severity.\n\nThe vulnerable code was introduced in the 3.2 version with the addition\nof the QUIC protocol support.\n\nThe FIPS modules in 3.6, 3.5, 3.4 and 3.3 are not affected by this issue,\nas the QUIC implementation is outside the OpenSSL FIPS module boundary.\n\nOpenSSL 3.6, 3.5, 3.4 and 3.3 are vulnerable to this issue.\n\nOpenSSL 3.0, 1.1.1 and 1.0.2 are not affected by this issue.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-476"
          ],
          "VendorSeverity": {
            "alma": 3,
            "amazon": 3,
            "azure": 2,
            "oracle-oval": 3,
            "photon": 2,
            "redhat": 1,
            "rocky": 3,
            "ubuntu": 1
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 5.9
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:1473",
            "https://access.redhat.com/security/cve/CVE-2025-15468",
            "https://bugzilla.redhat.com/2430375",
            "https://bugzilla.redhat.com/2430376",
            "https://bugzilla.redhat.com/2430377",
            "https://bugzilla.redhat.com/2430378",
            "https://bugzilla.redhat.com/2430379",
            "https://bugzilla.redhat.com/2430380",
            "https://bugzilla.redhat.com/2430381",
            "https://bugzilla.redhat.com/2430386",
            "https://bugzilla.redhat.com/2430387",
            "https://bugzilla.redhat.com/2430388",
            "https://bugzilla.redhat.com/2430389",
            "https://bugzilla.redhat.com/2430390",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430375",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430376",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430377",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430378",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430379",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430380",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430381",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430386",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430387",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430388",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430389",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430390",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11187",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15467",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15468",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15469",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66199",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68160",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69418",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69420",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69421",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22795",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22796",
            "https://errata.almalinux.org/9/ALSA-2026-1473.html",
            "https://errata.rockylinux.org/RLSA-2026:1473",
            "https://github.com/openssl/openssl/commit/1f08e54bad32843044fe8a675948d65e3b4ece65",
            "https://github.com/openssl/openssl/commit/7c88376731c589ee5b36116c5a6e32d5ae5f7ae2",
            "https://github.com/openssl/openssl/commit/b2539639400288a4580fe2d76247541b976bade4",
            "https://github.com/openssl/openssl/commit/d75b309879631d45b972396ce4e5102559c64ac7",
            "https://linux.oracle.com/cve/CVE-2025-15468.html",
            "https://linux.oracle.com/errata/ELSA-2026-50081.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-15468",
            "https://openssl-library.org/news/secadv/20260127.txt",
            "https://ubuntu.com/security/notices/USN-7980-1",
            "https://www.cve.org/CVERecord?id=CVE-2025-15468"
          ],
          "PublishedDate": "2026-01-27T16:16:14.4Z",
          "LastModifiedDate": "2026-02-02T18:38:00.947Z"
        },
        {
          "VulnerabilityID": "CVE-2025-15469",
          "PkgID": "openssl-provider-legacy@3.5.4-1~deb13u1",
          "PkgName": "openssl-provider-legacy",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/openssl-provider-legacy@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "60b4501dc322c5b1",
            "BOMRef": "pkg:deb/debian/openssl-provider-legacy@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.5.4-1~deb13u1",
          "FixedVersion": "3.5.4-1~deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-15469",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:1ed6a9db594dcaeb679303e895644ef04230da00dc53d8189b142cbed9488dbc",
          "Title": "openssl: OpenSSL: Data integrity bypass in `openssl dgst` command due to silent truncation",
          "Description": "Issue summary: The 'openssl dgst' command-line tool silently truncates input\ndata to 16MB when using one-shot signing algorithms and reports success instead\nof an error.\n\nImpact summary: A user signing or verifying files larger than 16MB with\none-shot algorithms (such as Ed25519, Ed448, or ML-DSA) may believe the entire\nfile is authenticated while trailing data beyond 16MB remains unauthenticated.\n\nWhen the 'openssl dgst' command is used with algorithms that only support\none-shot signing (Ed25519, Ed448, ML-DSA-44, ML-DSA-65, ML-DSA-87), the input\nis buffered with a 16MB limit. If the input exceeds this limit, the tool\nsilently truncates to the first 16MB and continues without signaling an error,\ncontrary to what the documentation states. This creates an integrity gap where\ntrailing bytes can be modified without detection if both signing and\nverification are performed using the same affected codepath.\n\nThe issue affects only the command-line tool behavior. Verifiers that process\nthe full message using library APIs will reject the signature, so the risk\nprimarily affects workflows that both sign and verify with the affected\n'openssl dgst' command. Streaming digest algorithms for 'openssl dgst' and\nlibrary users are unaffected.\n\nThe FIPS modules in 3.5 and 3.6 are not affected by this issue, as the\ncommand-line tools are outside the OpenSSL FIPS module boundary.\n\nOpenSSL 3.5 and 3.6 are vulnerable to this issue.\n\nOpenSSL 3.4, 3.3, 3.0, 1.1.1 and 1.0.2 are not affected by this issue.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-347"
          ],
          "VendorSeverity": {
            "alma": 3,
            "oracle-oval": 3,
            "photon": 2,
            "redhat": 1,
            "rocky": 3,
            "ubuntu": 1
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
              "V3Score": 5.5
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:1473",
            "https://access.redhat.com/security/cve/CVE-2025-15469",
            "https://bugzilla.redhat.com/2430375",
            "https://bugzilla.redhat.com/2430376",
            "https://bugzilla.redhat.com/2430377",
            "https://bugzilla.redhat.com/2430378",
            "https://bugzilla.redhat.com/2430379",
            "https://bugzilla.redhat.com/2430380",
            "https://bugzilla.redhat.com/2430381",
            "https://bugzilla.redhat.com/2430386",
            "https://bugzilla.redhat.com/2430387",
            "https://bugzilla.redhat.com/2430388",
            "https://bugzilla.redhat.com/2430389",
            "https://bugzilla.redhat.com/2430390",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430375",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430376",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430377",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430378",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430379",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430380",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430381",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430386",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430387",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430388",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430389",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430390",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11187",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15467",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15468",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15469",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66199",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68160",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69418",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69420",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69421",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22795",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22796",
            "https://errata.almalinux.org/9/ALSA-2026-1473.html",
            "https://errata.rockylinux.org/RLSA-2026:1473",
            "https://github.com/openssl/openssl/commit/310f305eb92ea8040d6b3cb75a5feeba8e6acf2f",
            "https://github.com/openssl/openssl/commit/a7936fa4bd23c906e1955a16a0a0ab39a4953a61",
            "https://linux.oracle.com/cve/CVE-2025-15469.html",
            "https://linux.oracle.com/errata/ELSA-2026-50081.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-15469",
            "https://openssl-library.org/news/secadv/20260127.txt",
            "https://ubuntu.com/security/notices/USN-7980-1",
            "https://www.cve.org/CVERecord?id=CVE-2025-15469"
          ],
          "PublishedDate": "2026-01-27T16:16:14.523Z",
          "LastModifiedDate": "2026-02-02T18:37:39.313Z"
        },
        {
          "VulnerabilityID": "CVE-2025-66199",
          "PkgID": "openssl-provider-legacy@3.5.4-1~deb13u1",
          "PkgName": "openssl-provider-legacy",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/openssl-provider-legacy@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "60b4501dc322c5b1",
            "BOMRef": "pkg:deb/debian/openssl-provider-legacy@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.5.4-1~deb13u1",
          "FixedVersion": "3.5.4-1~deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-66199",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:ff46f8f13232922fbcea52646f02a92486a382585d28b33d8625adf3f734787d",
          "Title": "openssl: OpenSSL: Denial of Service due to excessive memory allocation in TLS 1.3 certificate compression",
          "Description": "Issue summary: A TLS 1.3 connection using certificate compression can be\nforced to allocate a large buffer before decompression without checking\nagainst the configured certificate size limit.\n\nImpact summary: An attacker can cause per-connection memory allocations of\nup to approximately 22 MiB and extra CPU work, potentially leading to\nservice degradation or resource exhaustion (Denial of Service).\n\nIn affected configurations, the peer-supplied uncompressed certificate\nlength from a CompressedCertificate message is used to grow a heap buffer\nprior to decompression. This length is not bounded by the max_cert_list\nsetting, which otherwise constrains certificate message sizes. An attacker\ncan exploit this to cause large per-connection allocations followed by\nhandshake failure. No memory corruption or information disclosure occurs.\n\nThis issue only affects builds where TLS 1.3 certificate compression is\ncompiled in (i.e., not OPENSSL_NO_COMP_ALG) and at least one compression\nalgorithm (brotli, zlib, or zstd) is available, and where the compression\nextension is negotiated. Both clients receiving a server CompressedCertificate\nand servers in mutual TLS scenarios receiving a client CompressedCertificate\nare affected. Servers that do not request client certificates are not\nvulnerable to client-initiated attacks.\n\nUsers can mitigate this issue by setting SSL_OP_NO_RX_CERTIFICATE_COMPRESSION\nto disable receiving compressed certificates.\n\nThe FIPS modules in 3.6, 3.5, 3.4 and 3.3 are not affected by this issue,\nas the TLS implementation is outside the OpenSSL FIPS module boundary.\n\nOpenSSL 3.6, 3.5, 3.4 and 3.3 are vulnerable to this issue.\n\nOpenSSL 3.0, 1.1.1 and 1.0.2 are not affected by this issue.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-789"
          ],
          "VendorSeverity": {
            "alma": 3,
            "amazon": 3,
            "azure": 2,
            "oracle-oval": 3,
            "photon": 2,
            "redhat": 1,
            "rocky": 3,
            "ubuntu": 1
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 5.9
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:1473",
            "https://access.redhat.com/security/cve/CVE-2025-66199",
            "https://bugzilla.redhat.com/2430375",
            "https://bugzilla.redhat.com/2430376",
            "https://bugzilla.redhat.com/2430377",
            "https://bugzilla.redhat.com/2430378",
            "https://bugzilla.redhat.com/2430379",
            "https://bugzilla.redhat.com/2430380",
            "https://bugzilla.redhat.com/2430381",
            "https://bugzilla.redhat.com/2430386",
            "https://bugzilla.redhat.com/2430387",
            "https://bugzilla.redhat.com/2430388",
            "https://bugzilla.redhat.com/2430389",
            "https://bugzilla.redhat.com/2430390",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430375",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430376",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430377",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430378",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430379",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430380",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430381",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430386",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430387",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430388",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430389",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430390",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11187",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15467",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15468",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15469",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66199",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68160",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69418",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69420",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69421",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22795",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22796",
            "https://errata.almalinux.org/9/ALSA-2026-1473.html",
            "https://errata.rockylinux.org/RLSA-2026:1473",
            "https://github.com/openssl/openssl/commit/3ed1f75249932b155eef993a8e66a99cb98bfef4",
            "https://github.com/openssl/openssl/commit/6184a4fb08ee6d7bca570d931a4e8bef40b64451",
            "https://github.com/openssl/openssl/commit/895150b5e021d16b52fb32b97e1dd12f20448be5",
            "https://github.com/openssl/openssl/commit/966a2478046c311ed7dae50c457d0db4cafbf7e4",
            "https://linux.oracle.com/cve/CVE-2025-66199.html",
            "https://linux.oracle.com/errata/ELSA-2026-50081.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-66199",
            "https://openssl-library.org/news/secadv/20260127.txt",
            "https://ubuntu.com/security/notices/USN-7980-1",
            "https://www.cve.org/CVERecord?id=CVE-2025-66199"
          ],
          "PublishedDate": "2026-01-27T16:16:15.777Z",
          "LastModifiedDate": "2026-02-02T18:37:19.613Z"
        },
        {
          "VulnerabilityID": "CVE-2025-68160",
          "VendorIDs": [
            "DSA-6113-1"
          ],
          "PkgID": "openssl-provider-legacy@3.5.4-1~deb13u1",
          "PkgName": "openssl-provider-legacy",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/openssl-provider-legacy@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "60b4501dc322c5b1",
            "BOMRef": "pkg:deb/debian/openssl-provider-legacy@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.5.4-1~deb13u1",
          "FixedVersion": "3.5.4-1~deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-68160",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:d978f6b1c98ffb9e5d7c334fabedfeda02499be74b2d27668693b7a2e40cfe43",
          "Title": "openssl: OpenSSL: Denial of Service due to out-of-bounds write in BIO filter",
          "Description": "Issue summary: Writing large, newline-free data into a BIO chain using the\nline-buffering filter where the next BIO performs short writes can trigger\na heap-based out-of-bounds write.\n\nImpact summary: This out-of-bounds write can cause memory corruption which\ntypically results in a crash, leading to Denial of Service for an application.\n\nThe line-buffering BIO filter (BIO_f_linebuffer) is not used by default in\nTLS/SSL data paths. In OpenSSL command-line applications, it is typically\nonly pushed onto stdout/stderr on VMS systems. Third-party applications that\nexplicitly use this filter with a BIO chain that can short-write and that\nwrite large, newline-free data influenced by an attacker would be affected.\nHowever, the circumstances where this could happen are unlikely to be under\nattacker control, and BIO_f_linebuffer is unlikely to be handling non-curated\ndata controlled by an attacker. For that reason the issue was assessed as\nLow severity.\n\nThe FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue,\nas the BIO implementation is outside the OpenSSL FIPS module boundary.\n\nOpenSSL 3.6, 3.5, 3.4, 3.3, 3.0, 1.1.1 and 1.0.2 are vulnerable to this issue.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-787"
          ],
          "VendorSeverity": {
            "alma": 3,
            "amazon": 3,
            "azure": 2,
            "cbl-mariner": 2,
            "oracle-oval": 3,
            "photon": 2,
            "redhat": 1,
            "rocky": 3,
            "ubuntu": 1
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 4.7
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:1473",
            "https://access.redhat.com/security/cve/CVE-2025-68160",
            "https://bugzilla.redhat.com/2430375",
            "https://bugzilla.redhat.com/2430376",
            "https://bugzilla.redhat.com/2430377",
            "https://bugzilla.redhat.com/2430378",
            "https://bugzilla.redhat.com/2430379",
            "https://bugzilla.redhat.com/2430380",
            "https://bugzilla.redhat.com/2430381",
            "https://bugzilla.redhat.com/2430386",
            "https://bugzilla.redhat.com/2430387",
            "https://bugzilla.redhat.com/2430388",
            "https://bugzilla.redhat.com/2430389",
            "https://bugzilla.redhat.com/2430390",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430375",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430376",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430377",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430378",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430379",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430380",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430381",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430386",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430387",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430388",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430389",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430390",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11187",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15467",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15468",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15469",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66199",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68160",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69418",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69420",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69421",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22795",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22796",
            "https://errata.almalinux.org/9/ALSA-2026-1473.html",
            "https://errata.rockylinux.org/RLSA-2026:1473",
            "https://github.com/openssl/openssl/commit/384011202af92605d926fafe4a0bcd6b65d162ad",
            "https://github.com/openssl/openssl/commit/475c466ef2fbd8fc1df6fae1c3eed9c813fc8ff6",
            "https://github.com/openssl/openssl/commit/4c96fbba618e1940f038012506ee9e21d32ee12c",
            "https://github.com/openssl/openssl/commit/6845c3b6460a98b1ec4e463baa2ea1a63a32d7c0",
            "https://github.com/openssl/openssl/commit/68a7cd2e2816c3a02f4d45a2ce43fc04fac97096",
            "https://linux.oracle.com/cve/CVE-2025-68160.html",
            "https://linux.oracle.com/errata/ELSA-2026-50081.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-68160",
            "https://openssl-library.org/news/secadv/20260127.txt",
            "https://ubuntu.com/security/notices/USN-7980-1",
            "https://ubuntu.com/security/notices/USN-7980-2",
            "https://www.cve.org/CVERecord?id=CVE-2025-68160"
          ],
          "PublishedDate": "2026-01-27T16:16:15.9Z",
          "LastModifiedDate": "2026-02-02T18:36:57.727Z"
        },
        {
          "VulnerabilityID": "CVE-2025-69418",
          "VendorIDs": [
            "DSA-6113-1"
          ],
          "PkgID": "openssl-provider-legacy@3.5.4-1~deb13u1",
          "PkgName": "openssl-provider-legacy",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/openssl-provider-legacy@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "60b4501dc322c5b1",
            "BOMRef": "pkg:deb/debian/openssl-provider-legacy@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.5.4-1~deb13u1",
          "FixedVersion": "3.5.4-1~deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-69418",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:6c2f91dea69728a48a53dc072321f875fa562b3210c7ebc29ea036dd5cc3d099",
          "Title": "openssl: OpenSSL: Information disclosure and data tampering via specific low-level OCB encryption/decryption calls",
          "Description": "Issue summary: When using the low-level OCB API directly with AES-NI or\u003cbr\u003eother hardware-accelerated code paths, inputs whose length is not a multiple\u003cbr\u003eof 16 bytes can leave the final partial block unencrypted and unauthenticated.\u003cbr\u003e\u003cbr\u003eImpact summary: The trailing 1-15 bytes of a message may be exposed in\u003cbr\u003ecleartext on encryption and are not covered by the authentication tag,\u003cbr\u003eallowing an attacker to read or tamper with those bytes without detection.\u003cbr\u003e\u003cbr\u003eThe low-level OCB encrypt and decrypt routines in the hardware-accelerated\u003cbr\u003estream path process full 16-byte blocks but do not advance the input/output\u003cbr\u003epointers. The subsequent tail-handling code then operates on the original\u003cbr\u003ebase pointers, effectively reprocessing the beginning of the buffer while\u003cbr\u003eleaving the actual trailing bytes unprocessed. The authentication checksum\u003cbr\u003ealso excludes the true tail bytes.\u003cbr\u003e\u003cbr\u003eHowever, typical OpenSSL consumers using EVP are not affected because the\u003cbr\u003ehigher-level EVP and provider OCB implementations split inputs so that full\u003cbr\u003eblocks and trailing partial blocks are processed in separate calls, avoiding\u003cbr\u003ethe problematic code path. Additionally, TLS does not use OCB ciphersuites.\u003cbr\u003eThe vulnerability only affects applications that call the low-level\u003cbr\u003eCRYPTO_ocb128_encrypt() or CRYPTO_ocb128_decrypt() functions directly with\u003cbr\u003enon-block-aligned lengths in a single call on hardware-accelerated builds.\u003cbr\u003eFor these reasons the issue was assessed as Low severity.\u003cbr\u003e\u003cbr\u003eThe FIPS modules in 3.6, 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected\u003cbr\u003eby this issue, as OCB mode is not a FIPS-approved algorithm.\u003cbr\u003e\u003cbr\u003eOpenSSL 3.6, 3.5, 3.4, 3.3, 3.0 and 1.1.1 are vulnerable to this issue.\u003cbr\u003e\u003cbr\u003eOpenSSL 1.0.2 is not affected by this issue.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-325"
          ],
          "VendorSeverity": {
            "alma": 3,
            "amazon": 3,
            "azure": 2,
            "cbl-mariner": 2,
            "oracle-oval": 3,
            "photon": 2,
            "redhat": 1,
            "rocky": 3,
            "ubuntu": 1
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
              "V3Score": 4
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:1473",
            "https://access.redhat.com/security/cve/CVE-2025-69418",
            "https://bugzilla.redhat.com/2430375",
            "https://bugzilla.redhat.com/2430376",
            "https://bugzilla.redhat.com/2430377",
            "https://bugzilla.redhat.com/2430378",
            "https://bugzilla.redhat.com/2430379",
            "https://bugzilla.redhat.com/2430380",
            "https://bugzilla.redhat.com/2430381",
            "https://bugzilla.redhat.com/2430386",
            "https://bugzilla.redhat.com/2430387",
            "https://bugzilla.redhat.com/2430388",
            "https://bugzilla.redhat.com/2430389",
            "https://bugzilla.redhat.com/2430390",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430375",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430376",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430377",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430378",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430379",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430380",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430381",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430386",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430387",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430388",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430389",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430390",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11187",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15467",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15468",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15469",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66199",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68160",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69418",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69420",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69421",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22795",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22796",
            "https://errata.almalinux.org/9/ALSA-2026-1473.html",
            "https://errata.rockylinux.org/RLSA-2026:1473",
            "https://github.com/openssl/openssl/commit/372fc5c77529695b05b4f5b5187691a57ef5dffc",
            "https://github.com/openssl/openssl/commit/4016975d4469cd6b94927c607f7c511385f928d8",
            "https://github.com/openssl/openssl/commit/52d23c86a54adab5ee9f80e48b242b52c4cc2347",
            "https://github.com/openssl/openssl/commit/a7589230356d908c0eca4b969ec4f62106f4f5ae",
            "https://github.com/openssl/openssl/commit/ed40856d7d4ba6cb42779b6770666a65f19cb977",
            "https://linux.oracle.com/cve/CVE-2025-69418.html",
            "https://linux.oracle.com/errata/ELSA-2026-50081.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-69418",
            "https://openssl-library.org/news/secadv/20260127.txt",
            "https://ubuntu.com/security/notices/USN-7980-1",
            "https://ubuntu.com/security/notices/USN-7980-2",
            "https://www.cve.org/CVERecord?id=CVE-2025-69418"
          ],
          "PublishedDate": "2026-01-27T16:16:33.253Z",
          "LastModifiedDate": "2026-02-02T18:36:03.557Z"
        },
        {
          "VulnerabilityID": "CVE-2025-69420",
          "VendorIDs": [
            "DSA-6113-1"
          ],
          "PkgID": "openssl-provider-legacy@3.5.4-1~deb13u1",
          "PkgName": "openssl-provider-legacy",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/openssl-provider-legacy@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "60b4501dc322c5b1",
            "BOMRef": "pkg:deb/debian/openssl-provider-legacy@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.5.4-1~deb13u1",
          "FixedVersion": "3.5.4-1~deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-69420",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:ce3a821d754bd36bb347f3d481620658821433d2b8ebab0926153538512cb84b",
          "Title": "openssl: OpenSSL: Denial of Service via malformed TimeStamp Response",
          "Description": "Issue summary: A type confusion vulnerability exists in the TimeStamp Response\nverification code where an ASN1_TYPE union member is accessed without first\nvalidating the type, causing an invalid or NULL pointer dereference when\nprocessing a malformed TimeStamp Response file.\n\nImpact summary: An application calling TS_RESP_verify_response() with a\nmalformed TimeStamp Response can be caused to dereference an invalid or\nNULL pointer when reading, resulting in a Denial of Service.\n\nThe functions ossl_ess_get_signing_cert() and ossl_ess_get_signing_cert_v2()\naccess the signing cert attribute value without validating its type.\nWhen the type is not V_ASN1_SEQUENCE, this results in accessing invalid memory\nthrough the ASN1_TYPE union, causing a crash.\n\nExploiting this vulnerability requires an attacker to provide a malformed\nTimeStamp Response to an application that verifies timestamp responses. The\nTimeStamp protocol (RFC 3161) is not widely used and the impact of the\nexploit is just a Denial of Service. For these reasons the issue was\nassessed as Low severity.\n\nThe FIPS modules in 3.5, 3.4, 3.3 and 3.0 are not affected by this issue,\nas the TimeStamp Response implementation is outside the OpenSSL FIPS module\nboundary.\n\nOpenSSL 3.6, 3.5, 3.4, 3.3, 3.0 and 1.1.1 are vulnerable to this issue.\n\nOpenSSL 1.0.2 is not affected by this issue.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-754"
          ],
          "VendorSeverity": {
            "alma": 3,
            "amazon": 3,
            "azure": 3,
            "cbl-mariner": 3,
            "oracle-oval": 3,
            "photon": 3,
            "redhat": 1,
            "rocky": 3,
            "ubuntu": 1
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 5.9
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:1473",
            "https://access.redhat.com/security/cve/CVE-2025-69420",
            "https://bugzilla.redhat.com/2430375",
            "https://bugzilla.redhat.com/2430376",
            "https://bugzilla.redhat.com/2430377",
            "https://bugzilla.redhat.com/2430378",
            "https://bugzilla.redhat.com/2430379",
            "https://bugzilla.redhat.com/2430380",
            "https://bugzilla.redhat.com/2430381",
            "https://bugzilla.redhat.com/2430386",
            "https://bugzilla.redhat.com/2430387",
            "https://bugzilla.redhat.com/2430388",
            "https://bugzilla.redhat.com/2430389",
            "https://bugzilla.redhat.com/2430390",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430375",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430376",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430377",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430378",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430379",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430380",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430381",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430386",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430387",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430388",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430389",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430390",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11187",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15467",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15468",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15469",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66199",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68160",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69418",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69420",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69421",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22795",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22796",
            "https://errata.almalinux.org/9/ALSA-2026-1473.html",
            "https://errata.rockylinux.org/RLSA-2026:1473",
            "https://github.com/openssl/openssl/commit/27c7012c91cc986a598d7540f3079dfde2416eb9",
            "https://github.com/openssl/openssl/commit/4e254b48ad93cc092be3dd62d97015f33f73133a",
            "https://github.com/openssl/openssl/commit/564fd9c73787f25693bf9e75faf7bf6bb1305d4e",
            "https://github.com/openssl/openssl/commit/5eb0770ffcf11b785cf374ff3c19196245e54f1b",
            "https://github.com/openssl/openssl/commit/a99349ebfc519999edc50620abe24d599b9eb085",
            "https://linux.oracle.com/cve/CVE-2025-69420.html",
            "https://linux.oracle.com/errata/ELSA-2026-50081.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-69420",
            "https://openssl-library.org/news/secadv/20260127.txt",
            "https://ubuntu.com/security/notices/USN-7980-1",
            "https://ubuntu.com/security/notices/USN-7980-2",
            "https://www.cve.org/CVERecord?id=CVE-2025-69420"
          ],
          "PublishedDate": "2026-01-27T16:16:34.317Z",
          "LastModifiedDate": "2026-02-02T18:33:30.557Z"
        },
        {
          "VulnerabilityID": "CVE-2026-22795",
          "VendorIDs": [
            "DSA-6113-1"
          ],
          "PkgID": "openssl-provider-legacy@3.5.4-1~deb13u1",
          "PkgName": "openssl-provider-legacy",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/openssl-provider-legacy@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "60b4501dc322c5b1",
            "BOMRef": "pkg:deb/debian/openssl-provider-legacy@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.5.4-1~deb13u1",
          "FixedVersion": "3.5.4-1~deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-22795",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:d792e477957880e799d03fbcbebdd85403f4f14505d2494db462afe012e4c774",
          "Title": "openssl: OpenSSL: Denial of Service due to type confusion in PKCS#12 file processing",
          "Description": "Issue summary: An invalid or NULL pointer dereference can happen in\nan application processing a malformed PKCS#12 file.\n\nImpact summary: An application processing a malformed PKCS#12 file can be\ncaused to dereference an invalid or NULL pointer on memory read, resulting\nin a Denial of Service.\n\nA type confusion vulnerability exists in PKCS#12 parsing code where\nan ASN1_TYPE union member is accessed without first validating the type,\ncausing an invalid pointer read.\n\nThe location is constrained to a 1-byte address space, meaning any\nattempted pointer manipulation can only target addresses between 0x00 and 0xFF.\nThis range corresponds to the zero page, which is unmapped on most modern\noperating systems and will reliably result in a crash, leading only to a\nDenial of Service. Exploiting this issue also requires a user or application\nto process a maliciously crafted PKCS#12 file. It is uncommon to accept\nuntrusted PKCS#12 files in applications as they are usually used to store\nprivate keys which are trusted by definition. For these reasons, the issue\nwas assessed as Low severity.\n\nThe FIPS modules in 3.5, 3.4, 3.3 and 3.0 are not affected by this issue,\nas the PKCS12 implementation is outside the OpenSSL FIPS module boundary.\n\nOpenSSL 3.6, 3.5, 3.4, 3.3, 3.0 and 1.1.1 are vulnerable to this issue.\n\nOpenSSL 1.0.2 is not affected by this issue.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-754"
          ],
          "VendorSeverity": {
            "alma": 3,
            "amazon": 3,
            "azure": 2,
            "cbl-mariner": 2,
            "oracle-oval": 3,
            "photon": 2,
            "redhat": 1,
            "rocky": 3,
            "ubuntu": 1
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
              "V3Score": 5.5
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:1473",
            "https://access.redhat.com/security/cve/CVE-2026-22795",
            "https://bugzilla.redhat.com/2430375",
            "https://bugzilla.redhat.com/2430376",
            "https://bugzilla.redhat.com/2430377",
            "https://bugzilla.redhat.com/2430378",
            "https://bugzilla.redhat.com/2430379",
            "https://bugzilla.redhat.com/2430380",
            "https://bugzilla.redhat.com/2430381",
            "https://bugzilla.redhat.com/2430386",
            "https://bugzilla.redhat.com/2430387",
            "https://bugzilla.redhat.com/2430388",
            "https://bugzilla.redhat.com/2430389",
            "https://bugzilla.redhat.com/2430390",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430375",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430376",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430377",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430378",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430379",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430380",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430381",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430386",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430387",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430388",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430389",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430390",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11187",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15467",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15468",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15469",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66199",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68160",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69418",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69420",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69421",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22795",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22796",
            "https://errata.almalinux.org/9/ALSA-2026-1473.html",
            "https://errata.rockylinux.org/RLSA-2026:1473",
            "https://github.com/openssl/openssl/commit/2502e7b7d4c0cf4f972a881641fe09edc67aeec4",
            "https://github.com/openssl/openssl/commit/572844beca95068394c916626a6d3a490f831a49",
            "https://github.com/openssl/openssl/commit/7bbca05be55b129651d9df4bdb92becc45002c12",
            "https://github.com/openssl/openssl/commit/eeee3cbd4d682095ed431052f00403004596373e",
            "https://github.com/openssl/openssl/commit/ef2fb66ec571564d64d1c74a12e388a2a54d05d2",
            "https://linux.oracle.com/cve/CVE-2026-22795.html",
            "https://linux.oracle.com/errata/ELSA-2026-50081.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-22795",
            "https://openssl-library.org/news/secadv/20260127.txt",
            "https://ubuntu.com/security/notices/USN-7980-1",
            "https://ubuntu.com/security/notices/USN-7980-2",
            "https://www.cve.org/CVERecord?id=CVE-2026-22795"
          ],
          "PublishedDate": "2026-01-27T16:16:35.43Z",
          "LastModifiedDate": "2026-02-02T18:41:14.917Z"
        },
        {
          "VulnerabilityID": "CVE-2026-22796",
          "VendorIDs": [
            "DSA-6113-1"
          ],
          "PkgID": "openssl-provider-legacy@3.5.4-1~deb13u1",
          "PkgName": "openssl-provider-legacy",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/openssl-provider-legacy@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "60b4501dc322c5b1",
            "BOMRef": "pkg:deb/debian/openssl-provider-legacy@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.5.4-1~deb13u1",
          "FixedVersion": "3.5.4-1~deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-22796",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:442fe5fc0ee1c8ee07421ce59770c60c9f8af2b63c085deb04539d240e46f45f",
          "Title": "openssl: OpenSSL: Denial of Service via type confusion in PKCS#7 signature verification",
          "Description": "Issue summary: A type confusion vulnerability exists in the signature\nverification of signed PKCS#7 data where an ASN1_TYPE union member is\naccessed without first validating the type, causing an invalid or NULL\npointer dereference when processing malformed PKCS#7 data.\n\nImpact summary: An application performing signature verification of PKCS#7\ndata or calling directly the PKCS7_digest_from_attributes() function can be\ncaused to dereference an invalid or NULL pointer when reading, resulting in\na Denial of Service.\n\nThe function PKCS7_digest_from_attributes() accesses the message digest attribute\nvalue without validating its type. When the type is not V_ASN1_OCTET_STRING,\nthis results in accessing invalid memory through the ASN1_TYPE union, causing\na crash.\n\nExploiting this vulnerability requires an attacker to provide a malformed\nsigned PKCS#7 to an application that verifies it. The impact of the\nexploit is just a Denial of Service, the PKCS7 API is legacy and applications\nshould be using the CMS API instead. For these reasons the issue was\nassessed as Low severity.\n\nThe FIPS modules in 3.5, 3.4, 3.3 and 3.0 are not affected by this issue,\nas the PKCS#7 parsing implementation is outside the OpenSSL FIPS module\nboundary.\n\nOpenSSL 3.6, 3.5, 3.4, 3.3, 3.0, 1.1.1 and 1.0.2 are vulnerable to this issue.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-754"
          ],
          "VendorSeverity": {
            "alma": 3,
            "amazon": 3,
            "azure": 2,
            "cbl-mariner": 2,
            "oracle-oval": 3,
            "photon": 2,
            "redhat": 1,
            "rocky": 3,
            "ubuntu": 1
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 5.9
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:1473",
            "https://access.redhat.com/security/cve/CVE-2026-22796",
            "https://bugzilla.redhat.com/2430375",
            "https://bugzilla.redhat.com/2430376",
            "https://bugzilla.redhat.com/2430377",
            "https://bugzilla.redhat.com/2430378",
            "https://bugzilla.redhat.com/2430379",
            "https://bugzilla.redhat.com/2430380",
            "https://bugzilla.redhat.com/2430381",
            "https://bugzilla.redhat.com/2430386",
            "https://bugzilla.redhat.com/2430387",
            "https://bugzilla.redhat.com/2430388",
            "https://bugzilla.redhat.com/2430389",
            "https://bugzilla.redhat.com/2430390",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430375",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430376",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430377",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430378",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430379",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430380",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430381",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430386",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430387",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430388",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430389",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430390",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11187",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15467",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15468",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15469",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66199",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68160",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69418",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69420",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69421",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22795",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22796",
            "https://errata.almalinux.org/9/ALSA-2026-1473.html",
            "https://errata.rockylinux.org/RLSA-2026:1473",
            "https://github.com/openssl/openssl/commit/2502e7b7d4c0cf4f972a881641fe09edc67aeec4",
            "https://github.com/openssl/openssl/commit/572844beca95068394c916626a6d3a490f831a49",
            "https://github.com/openssl/openssl/commit/7bbca05be55b129651d9df4bdb92becc45002c12",
            "https://github.com/openssl/openssl/commit/eeee3cbd4d682095ed431052f00403004596373e",
            "https://github.com/openssl/openssl/commit/ef2fb66ec571564d64d1c74a12e388a2a54d05d2",
            "https://linux.oracle.com/cve/CVE-2026-22796.html",
            "https://linux.oracle.com/errata/ELSA-2026-50081.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-22796",
            "https://openssl-library.org/news/secadv/20260127.txt",
            "https://ubuntu.com/security/notices/USN-7980-1",
            "https://ubuntu.com/security/notices/USN-7980-2",
            "https://www.cve.org/CVERecord?id=CVE-2026-22796"
          ],
          "PublishedDate": "2026-01-27T16:16:35.543Z",
          "LastModifiedDate": "2026-02-02T18:40:27.467Z"
        },
        {
          "VulnerabilityID": "CVE-2026-2673",
          "PkgID": "openssl-provider-legacy@3.5.4-1~deb13u1",
          "PkgName": "openssl-provider-legacy",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/openssl-provider-legacy@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "60b4501dc322c5b1",
            "BOMRef": "pkg:deb/debian/openssl-provider-legacy@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.5.4-1~deb13u1",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-2673",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:13e81af02daf97c6f609f95f57f2bdb307c3ac25ed7a06b42c24e92a7e229060",
          "Title": "openssl: OpenSSL TLS 1.3 server may choose unexpected key agreement group",
          "Description": "Issue summary: An OpenSSL TLS 1.3 server may fail to negotiate the expected\npreferred key exchange group when its key exchange group configuration includes\nthe default by using the 'DEFAULT' keyword.\n\nImpact summary: A less preferred key exchange may be used even when a more\npreferred group is supported by both client and server, if the group\nwas not included among the client's initial predicated keyshares.\nThis will sometimes be the case with the new hybrid post-quantum groups,\nif the client chooses to defer their use until specifically requested by\nthe server.\n\nIf an OpenSSL TLS 1.3 server's configuration uses the 'DEFAULT' keyword to\ninterpolate the built-in default group list into its own configuration, perhaps\nadding or removing specific elements, then an implementation defect causes the\n'DEFAULT' list to lose its 'tuple' structure, and all server-supported groups\nwere treated as a single sufficiently secure 'tuple', with the server not\nsending a Hello Retry Request (HRR) even when a group in a more preferred tuple\nwas mutually supported.\n\nAs a result, the client and server might fail to negotiate a mutually supported\npost-quantum key agreement group, such as 'X25519MLKEM768', if the client's\nconfiguration results in only 'classical' groups (such as 'X25519' being the\nonly ones in the client's initial keyshare prediction).\n\nOpenSSL 3.5 and later support a new syntax for selecting the most preferred TLS\n1.3 key agreement group on TLS servers.  The old syntax had a single 'flat'\nlist of groups, and treated all the supported groups as sufficiently secure.\nIf any of the keyshares predicted by the client were supported by the server\nthe most preferred among these was selected, even if other groups supported by\nthe client, but not included in the list of predicted keyshares would have been\nmore preferred, if included.\n\nThe new syntax partitions the groups into distinct 'tuples' of roughly\nequivalent security.  Within each tuple the most preferred group included among\nthe client's predicted keyshares is chosen, but if the client supports a group\nfrom a more preferred tuple, but did not predict any corresponding keyshares,\nthe server will ask the client to retry the ClientHello (by issuing a Hello\nRetry Request or HRR) with the most preferred mutually supported group.\n\nThe above works as expected when the server's configuration uses the built-in\ndefault group list, or explicitly defines its own list by directly defining the\nvarious desired groups and group 'tuples'.\n\nNo OpenSSL FIPS modules are affected by this issue, the code in question lies\noutside the FIPS boundary.\n\nOpenSSL 3.6 and 3.5 are vulnerable to this issue.\n\nOpenSSL 3.6 users should upgrade to OpenSSL 3.6.2 once it is released.\nOpenSSL 3.5 users should upgrade to OpenSSL 3.5.6 once it is released.\n\nOpenSSL 3.4, 3.3, 3.0, 1.0.2 and 1.1.1 are not affected by this issue.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-757"
          ],
          "VendorSeverity": {
            "amazon": 1,
            "redhat": 1,
            "ubuntu": 1
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N",
              "V3Score": 3.1
            }
          },
          "References": [
            "http://www.openwall.com/lists/oss-security/2026/03/13/3",
            "https://access.redhat.com/security/cve/CVE-2026-2673",
            "https://github.com/openssl/openssl/commit/2157c9d81f7b0bd7dfa25b960e928ec28e8dd63f",
            "https://github.com/openssl/openssl/commit/85977e013f32ceb96aa034c0e741adddc1a05e34",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-2673",
            "https://openssl-library.org/news/secadv/20260313.txt",
            "https://www.cve.org/CVERecord?id=CVE-2026-2673"
          ],
          "PublishedDate": "2026-03-13T19:54:34.033Z",
          "LastModifiedDate": "2026-03-17T18:16:15.6Z"
        },
        {
          "VulnerabilityID": "CVE-2007-5686",
          "PkgID": "passwd@1:4.17.4-2",
          "PkgName": "passwd",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/passwd@4.17.4-2?arch=amd64\u0026distro=debian-13.2\u0026epoch=1",
            "UID": "7cc33769494c93f9",
            "BOMRef": "pkg:deb/debian/passwd@4.17.4-2?arch=amd64\u0026distro=debian-13.2\u0026epoch=1"
          },
          "InstalledVersion": "1:4.17.4-2",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2007-5686",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:1291d598699de55aff2eb98c6cf5458d9fa641d85ab58cbd084f58ef60ccab61",
          "Title": "initscripts in rPath Linux 1 sets insecure permissions for the /var/lo ...",
          "Description": "initscripts in rPath Linux 1 sets insecure permissions for the /var/log/btmp file, which allows local users to obtain sensitive information regarding authentication attempts.  NOTE: because sshd detects the insecure permissions and does not log certain events, this also prevents sshd from logging failed authentication attempts by remote attackers.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-264"
          ],
          "VendorSeverity": {
            "debian": 1,
            "nvd": 2
          },
          "CVSS": {
            "nvd": {
              "V2Vector": "AV:L/AC:L/Au:N/C:C/I:N/A:N",
              "V2Score": 4.9
            }
          },
          "References": [
            "http://secunia.com/advisories/27215",
            "http://www.securityfocus.com/archive/1/482129/100/100/threaded",
            "http://www.securityfocus.com/archive/1/482857/100/0/threaded",
            "http://www.securityfocus.com/bid/26048",
            "http://www.vupen.com/english/advisories/2007/3474",
            "https://issues.rpath.com/browse/RPL-1825"
          ],
          "PublishedDate": "2007-10-28T17:08:00Z",
          "LastModifiedDate": "2025-04-09T00:30:58.49Z"
        },
        {
          "VulnerabilityID": "CVE-2024-56433",
          "PkgID": "passwd@1:4.17.4-2",
          "PkgName": "passwd",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/passwd@4.17.4-2?arch=amd64\u0026distro=debian-13.2\u0026epoch=1",
            "UID": "7cc33769494c93f9",
            "BOMRef": "pkg:deb/debian/passwd@4.17.4-2?arch=amd64\u0026distro=debian-13.2\u0026epoch=1"
          },
          "InstalledVersion": "1:4.17.4-2",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2024-56433",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:7def4c394f21319f63f61e7622ad4e971776889e42eedbfac8bff3de126b4dc4",
          "Title": "shadow-utils: Default subordinate ID configuration in /etc/login.defs could lead to compromise",
          "Description": "shadow-utils (aka shadow) 4.4 through 4.17.0 establishes a default /etc/subuid behavior (e.g., uid 100000 through 165535 for the first user account) that can realistically conflict with the uids of users defined on locally administered networks, potentially leading to account takeover, e.g., by leveraging newuidmap for access to an NFS home directory (or same-host resources in the case of remote logins by these local network users). NOTE: it may also be argued that system administrators should not have assigned uids, within local networks, that are within the range that can occur in /etc/subuid.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-1188"
          ],
          "VendorSeverity": {
            "alma": 1,
            "azure": 1,
            "oracle-oval": 1,
            "redhat": 1,
            "rocky": 1,
            "ubuntu": 1
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N",
              "V3Score": 3.6
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2025:20559",
            "https://access.redhat.com/security/cve/CVE-2024-56433",
            "https://bugzilla.redhat.com/2334165",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2334165",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56433",
            "https://errata.almalinux.org/9/ALSA-2025-20559.html",
            "https://errata.rockylinux.org/RLSA-2025:20559",
            "https://github.com/shadow-maint/shadow/blob/e2512d5741d4a44bdd81a8c2d0029b6222728cf0/etc/login.defs#L238-L241",
            "https://github.com/shadow-maint/shadow/issues/1157",
            "https://github.com/shadow-maint/shadow/releases/tag/4.4",
            "https://linux.oracle.com/cve/CVE-2024-56433.html",
            "https://linux.oracle.com/errata/ELSA-2025-20559-0.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2024-56433",
            "https://www.cve.org/CVERecord?id=CVE-2024-56433"
          ],
          "PublishedDate": "2024-12-26T09:15:07.267Z",
          "LastModifiedDate": "2024-12-26T09:15:07.267Z"
        },
        {
          "VulnerabilityID": "TEMP-0628843-DBAD28",
          "PkgID": "passwd@1:4.17.4-2",
          "PkgName": "passwd",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/passwd@4.17.4-2?arch=amd64\u0026distro=debian-13.2\u0026epoch=1",
            "UID": "7cc33769494c93f9",
            "BOMRef": "pkg:deb/debian/passwd@4.17.4-2?arch=amd64\u0026distro=debian-13.2\u0026epoch=1"
          },
          "InstalledVersion": "1:4.17.4-2",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://security-tracker.debian.org/tracker/TEMP-0628843-DBAD28",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:11adfa3200765cbfc244981692cb98c145b7c8b7b6a878fff7ab3d666ea3bcfd",
          "Title": "[more related to CVE-2005-4890]",
          "Severity": "LOW",
          "VendorSeverity": {
            "debian": 1
          }
        },
        {
          "VulnerabilityID": "CVE-2011-4116",
          "PkgID": "perl-base@5.40.1-6",
          "PkgName": "perl-base",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/perl-base@5.40.1-6?arch=amd64\u0026distro=debian-13.2",
            "UID": "2936e697fb5eff9",
            "BOMRef": "pkg:deb/debian/perl-base@5.40.1-6?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "5.40.1-6",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2011-4116",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:1e190bfff91d732a7f32d8674802f466f1bacd164cc1526b0fd234b7b9bdfe94",
          "Title": "perl: File:: Temp insecure temporary file handling",
          "Description": "_is_safe in the File::Temp module for Perl does not properly handle symlinks.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-59"
          ],
          "VendorSeverity": {
            "debian": 1,
            "nvd": 1,
            "redhat": 1
          },
          "CVSS": {
            "nvd": {
              "V2Vector": "AV:L/AC:M/Au:S/C:N/I:P/A:N",
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
              "V2Score": 1.5,
              "V3Score": 3.3
            },
            "redhat": {
              "V2Vector": "AV:L/AC:M/Au:N/C:N/I:P/A:N",
              "V2Score": 1.9
            }
          },
          "References": [
            "http://www.openwall.com/lists/oss-security/2011/11/04/2",
            "http://www.openwall.com/lists/oss-security/2011/11/04/4",
            "https://access.redhat.com/security/cve/CVE-2011-4116",
            "https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14",
            "https://nvd.nist.gov/vuln/detail/CVE-2011-4116",
            "https://rt.cpan.org/Public/Bug/Display.html?id=69106",
            "https://seclists.org/oss-sec/2011/q4/238",
            "https://www.cve.org/CVERecord?id=CVE-2011-4116"
          ],
          "PublishedDate": "2020-01-31T18:15:11.343Z",
          "LastModifiedDate": "2025-08-04T19:04:38.29Z"
        },
        {
          "VulnerabilityID": "TEMP-0517018-A83CE6",
          "PkgID": "sysvinit-utils@3.14-4",
          "PkgName": "sysvinit-utils",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/sysvinit-utils@3.14-4?arch=amd64\u0026distro=debian-13.2",
            "UID": "b4073bf3e1d528f5",
            "BOMRef": "pkg:deb/debian/sysvinit-utils@3.14-4?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.14-4",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://security-tracker.debian.org/tracker/TEMP-0517018-A83CE6",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:59b897eb0de5a9fa77dd0c7121bcdc43f897f96840ce7ebf6fee30b8eb9ffec0",
          "Title": "[sysvinit: no-root option in expert installer exposes locally exploitable security flaw]",
          "Severity": "LOW",
          "VendorSeverity": {
            "debian": 1
          }
        },
        {
          "VulnerabilityID": "CVE-2005-2541",
          "PkgID": "tar@1.35+dfsg-3.1",
          "PkgName": "tar",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/tar@1.35%2Bdfsg-3.1?arch=amd64\u0026distro=debian-13.2",
            "UID": "c0ff1d9a82de0555",
            "BOMRef": "pkg:deb/debian/tar@1.35%2Bdfsg-3.1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "1.35+dfsg-3.1",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2005-2541",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:f3d559299b90bb62e3f65ec1f0c90c75d6ac7bf210d25c35ccd9427380fd2f93",
          "Title": "tar: does not properly warn the user when extracting setuid or setgid files",
          "Description": "Tar 1.15.1 does not properly warn the user when extracting setuid or setgid files, which may allow local users or remote attackers to gain privileges.",
          "Severity": "LOW",
          "VendorSeverity": {
            "debian": 1,
            "nvd": 3,
            "redhat": 2
          },
          "CVSS": {
            "nvd": {
              "V2Vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
              "V2Score": 10
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
              "V3Score": 7
            }
          },
          "References": [
            "http://marc.info/?l=bugtraq\u0026m=112327628230258\u0026w=2",
            "https://access.redhat.com/security/cve/CVE-2005-2541",
            "https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c%40%3Cissues.guacamole.apache.org%3E",
            "https://nvd.nist.gov/vuln/detail/CVE-2005-2541",
            "https://www.cve.org/CVERecord?id=CVE-2005-2541"
          ],
          "PublishedDate": "2005-08-10T04:00:00Z",
          "LastModifiedDate": "2025-04-03T01:03:51.193Z"
        },
        {
          "VulnerabilityID": "TEMP-0290435-0B57B5",
          "PkgID": "tar@1.35+dfsg-3.1",
          "PkgName": "tar",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/tar@1.35%2Bdfsg-3.1?arch=amd64\u0026distro=debian-13.2",
            "UID": "c0ff1d9a82de0555",
            "BOMRef": "pkg:deb/debian/tar@1.35%2Bdfsg-3.1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "1.35+dfsg-3.1",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://security-tracker.debian.org/tracker/TEMP-0290435-0B57B5",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:ef4507662e5db98028e5bfd5a8213dcc9bd115ab4e7dc94fcc602b39587b7e6e",
          "Title": "[tar's rmt command may have undesired side effects]",
          "Severity": "LOW",
          "VendorSeverity": {
            "debian": 1
          }
        },
        {
          "VulnerabilityID": "CVE-2022-0563",
          "PkgID": "util-linux@2.41-5",
          "PkgName": "util-linux",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/util-linux@2.41-5?arch=amd64\u0026distro=debian-13.2",
            "UID": "c54e1200b7bd97fd",
            "BOMRef": "pkg:deb/debian/util-linux@2.41-5?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-5",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-0563",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:6400674cd5ef2fdbfa0cd01a14b90d3aae2569ffe05eb5fccb4c4f0e6b8fcd3b",
          "Title": "util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline",
          "Description": "A flaw was found in the util-linux chfn and chsh utilities when compiled with Readline support. The Readline library uses an \"INPUTRC\" environment variable to get a path to the library config file. When the library cannot parse the specified file, it prints an error message containing data from the file. This flaw allows an unprivileged user to read root-owned files, potentially leading to privilege escalation. This flaw affects util-linux versions prior to 2.37.4.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-209"
          ],
          "VendorSeverity": {
            "amazon": 2,
            "cbl-mariner": 2,
            "debian": 1,
            "nvd": 2,
            "photon": 2,
            "redhat": 2
          },
          "CVSS": {
            "nvd": {
              "V2Vector": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
              "V2Score": 1.9,
              "V3Score": 5.5
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
              "V3Score": 5.5
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2022-0563",
            "https://blog.trailofbits.com/2023/02/16/suid-logic-bug-linux-readline/",
            "https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w%40ws.net.home/T/#u",
            "https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u",
            "https://nvd.nist.gov/vuln/detail/CVE-2022-0563",
            "https://security.gentoo.org/glsa/202401-08",
            "https://security.netapp.com/advisory/ntap-20220331-0002/",
            "https://www.cve.org/CVERecord?id=CVE-2022-0563"
          ],
          "PublishedDate": "2022-02-21T19:15:08.393Z",
          "LastModifiedDate": "2025-06-09T16:15:33.237Z"
        },
        {
          "VulnerabilityID": "CVE-2025-14104",
          "PkgID": "util-linux@2.41-5",
          "PkgName": "util-linux",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/util-linux@2.41-5?arch=amd64\u0026distro=debian-13.2",
            "UID": "c54e1200b7bd97fd",
            "BOMRef": "pkg:deb/debian/util-linux@2.41-5?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-5",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-14104",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:8c652fbb33df358a67a7554bf562a2a7780c39aad13975e2836c7c2baf5058a7",
          "Title": "util-linux: util-linux: Heap buffer overread in setpwnam() when processing 256-byte usernames",
          "Description": "A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-125"
          ],
          "VendorSeverity": {
            "alma": 2,
            "azure": 2,
            "cbl-mariner": 2,
            "debian": 1,
            "oracle-oval": 2,
            "photon": 2,
            "redhat": 2,
            "rocky": 2
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
              "V3Score": 6.1
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:1696",
            "https://access.redhat.com/errata/RHSA-2026:1852",
            "https://access.redhat.com/errata/RHSA-2026:1913",
            "https://access.redhat.com/errata/RHSA-2026:2485",
            "https://access.redhat.com/errata/RHSA-2026:2563",
            "https://access.redhat.com/errata/RHSA-2026:2737",
            "https://access.redhat.com/errata/RHSA-2026:2800",
            "https://access.redhat.com/errata/RHSA-2026:3406",
            "https://access.redhat.com/errata/RHSA-2026:4943",
            "https://access.redhat.com/security/cve/CVE-2025-14104",
            "https://bugzilla.redhat.com/2419369",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2419369",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14104",
            "https://errata.almalinux.org/9/ALSA-2026-1913.html",
            "https://errata.rockylinux.org/RLSA-2026:1913",
            "https://linux.oracle.com/cve/CVE-2025-14104.html",
            "https://linux.oracle.com/errata/ELSA-2026-1913.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-14104",
            "https://www.cve.org/CVERecord?id=CVE-2025-14104"
          ],
          "PublishedDate": "2025-12-05T17:16:03.117Z",
          "LastModifiedDate": "2026-03-18T17:16:03.817Z"
        },
        {
          "VulnerabilityID": "CVE-2026-3184",
          "PkgID": "util-linux@2.41-5",
          "PkgName": "util-linux",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/util-linux@2.41-5?arch=amd64\u0026distro=debian-13.2",
            "UID": "c54e1200b7bd97fd",
            "BOMRef": "pkg:deb/debian/util-linux@2.41-5?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-5",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-3184",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:94e1c200932ca487d258fc522425d02a27d34d6755de86a238f1df7d3974246f",
          "Title": "util-linux: util-linux: Access control bypass due to improper hostname canonicalization",
          "Description": "A flaw was found in util-linux. Improper hostname canonicalization in the `login(1)` utility, when invoked with the `-h` option, can modify the supplied remote hostname before setting `PAM_RHOST`. A remote attacker could exploit this by providing a specially crafted hostname, potentially bypassing host-based Pluggable Authentication Modules (PAM) access control rules that rely on fully qualified domain names. This could lead to unauthorized access.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-289"
          ],
          "VendorSeverity": {
            "redhat": 1,
            "ubuntu": 2
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
              "V3Score": 3.7
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-3184",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2442570",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-3184",
            "https://www.cve.org/CVERecord?id=CVE-2026-3184"
          ],
          "PublishedDate": "2026-04-03T19:17:23.377Z",
          "LastModifiedDate": "2026-04-03T19:17:23.377Z"
        },
        {
          "VulnerabilityID": "CVE-2026-27456",
          "PkgID": "util-linux@2.41-5",
          "PkgName": "util-linux",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/util-linux@2.41-5?arch=amd64\u0026distro=debian-13.2",
            "UID": "c54e1200b7bd97fd",
            "BOMRef": "pkg:deb/debian/util-linux@2.41-5?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-5",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-27456",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:c6090e815c26fa91a0a2ceb94e98a970e9f8ab23e8e2854372a04e1ad03155f8",
          "Title": "[util-linux: mount(8) TOCTOU symlink attack via loop device]",
          "Description": "util-linux is a random collection of Linux utilities. Prior to version 2.41.4, a TOCTOU (Time-of-Check-Time-of-Use) vulnerability has been identified in the SUID binary /usr/bin/mount from util-linux. The mount binary, when setting up loop devices, validates the source file path with user privileges via fork() + setuid() + realpath(), but subsequently re-canonicalizes and opens it with root privileges (euid=0) without verifying that the path has not been replaced between both operations. Neither O_NOFOLLOW, nor inode comparison, nor post-open fstat() are employed. This allows a local unprivileged user to replace the source file with a symlink pointing to any root-owned file or device during the race window, causing the SUID binary to open and mount it as root. Exploitation requires an /etc/fstab entry with user,loop options whose path points to a directory where the attacker has write permission, and that /usr/bin/mount has the SUID bit set (the default configuration on virtually all Linux distributions). The impact is unauthorized read access to root-protected files and block devices, including backup images, disk volumes, and any file containing a valid filesystem. This issue has been patched in version 2.41.4.",
          "Severity": "UNKNOWN",
          "CweIDs": [
            "CWE-59",
            "CWE-269",
            "CWE-367"
          ],
          "References": [
            "https://github.com/util-linux/util-linux/commit/5e390467b26a3cf3fecc04e1a0d482dff3162fc4",
            "https://github.com/util-linux/util-linux/releases/tag/v2.41.4",
            "https://github.com/util-linux/util-linux/security/advisories/GHSA-qq4x-vfq4-9h9g"
          ],
          "PublishedDate": "2026-04-03T22:16:25.4Z",
          "LastModifiedDate": "2026-04-03T22:16:25.4Z"
        },
        {
          "VulnerabilityID": "CVE-2026-27171",
          "PkgID": "zlib1g@1:1.3.dfsg+really1.3.1-1+b1",
          "PkgName": "zlib1g",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/zlib1g@1.3.dfsg%2Breally1.3.1-1%2Bb1?arch=amd64\u0026distro=debian-13.2\u0026epoch=1",
            "UID": "8d4391bb59ce716",
            "BOMRef": "pkg:deb/debian/zlib1g@1.3.dfsg%2Breally1.3.1-1%2Bb1?arch=amd64\u0026distro=debian-13.2\u0026epoch=1"
          },
          "InstalledVersion": "1:1.3.dfsg+really1.3.1-1+b1",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:0e4bc2bd6656e6e004e3c749af70e5650bac2258243eb0949dea51cb8b7863db",
            "DiffID": "sha256:70a290c5e58b68f39496ab93a62f21b8b2ca0502e97905131838de1b39a37cbb"
          },
          "SeveritySource": "nvd",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-27171",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:7ac96b0300d91d8fdac762292ae2e2329a7a59dfdad1eeefbf39ac79ad4a220b",
          "Title": "zlib: zlib: Denial of Service via infinite loop in CRC32 combine functions",
          "Description": "zlib before 1.3.2 allows CPU consumption via crc32_combine64 and crc32_combine_gen64 because x2nmodp can do right shifts within a loop that has no termination condition.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-1284"
          ],
          "VendorSeverity": {
            "azure": 1,
            "nvd": 2,
            "redhat": 1,
            "ubuntu": 1
          },
          "CVSS": {
            "nvd": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 5.5
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
              "V3Score": 3.3
            }
          },
          "References": [
            "https://7asecurity.com/blog/2026/02/zlib-7asecurity-audit/",
            "https://7asecurity.com/reports/pentest-report-zlib-RC1.1.pdf",
            "https://access.redhat.com/security/cve/CVE-2026-27171",
            "https://github.com/madler/zlib/issues/904",
            "https://github.com/madler/zlib/releases/tag/v1.3.2",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-27171",
            "https://ostif.org/zlib-audit-complete/",
            "https://www.cve.org/CVERecord?id=CVE-2026-27171"
          ],
          "PublishedDate": "2026-02-18T04:16:01.263Z",
          "LastModifiedDate": "2026-03-25T21:27:04.603Z"
        }
      ]
    },
    {
      "Target": "Node.js",
      "Class": "lang-pkgs",
      "Type": "node-pkg",
      "Packages": [
        {
          "ID": "@adobe/css-tools@4.4.3",
          "Name": "@adobe/css-tools",
          "Identifier": {
            "PURL": "pkg:npm/%40adobe/css-tools@4.4.3",
            "UID": "111fe4430c91bbd7",
            "BOMRef": "pkg:npm/%40adobe/css-tools@4.4.3"
          },
          "Version": "4.4.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@testing-library/jest-dom@5.17.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@ampproject/remapping@2.3.0",
          "Name": "@ampproject/remapping",
          "Identifier": {
            "PURL": "pkg:npm/%40ampproject/remapping@2.3.0",
            "UID": "53852e420f0accc6",
            "BOMRef": "pkg:npm/%40ampproject/remapping@2.3.0"
          },
          "Version": "2.3.0",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "@babel/core@7.28.0",
            "@tailwindcss/node@4.1.11"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@babel/code-frame@7.27.1",
          "Name": "@babel/code-frame",
          "Identifier": {
            "PURL": "pkg:npm/%40babel/code-frame@7.27.1",
            "UID": "dc6d6c11a4ab71ec",
            "BOMRef": "pkg:npm/%40babel/code-frame@7.27.1"
          },
          "Version": "7.27.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@babel/core@7.28.0",
            "@babel/template@7.27.2",
            "@babel/traverse@7.28.0",
            "@testing-library/dom@10.4.0",
            "@testing-library/dom@8.20.1",
            "jest-message-util@30.0.2",
            "parse-json@5.2.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@babel/compat-data@7.28.0",
          "Name": "@babel/compat-data",
          "Identifier": {
            "PURL": "pkg:npm/%40babel/compat-data@7.28.0",
            "UID": "e93354c74fbf7750",
            "BOMRef": "pkg:npm/%40babel/compat-data@7.28.0"
          },
          "Version": "7.28.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@babel/helper-compilation-targets@7.27.2"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@babel/core@7.28.0",
          "Name": "@babel/core",
          "Identifier": {
            "PURL": "pkg:npm/%40babel/core@7.28.0",
            "UID": "cb7d0e7ec4e2cfa",
            "BOMRef": "pkg:npm/%40babel/core@7.28.0"
          },
          "Version": "7.28.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@babel/helper-module-transforms@7.27.3",
            "@babel/plugin-transform-react-jsx-self@7.27.1",
            "@babel/plugin-transform-react-jsx-source@7.27.1",
            "@svgr/babel-plugin-add-jsx-attribute@8.0.0",
            "@svgr/babel-plugin-remove-jsx-attribute@8.0.0",
            "@svgr/babel-plugin-remove-jsx-empty-expression@8.0.0",
            "@svgr/babel-plugin-replace-jsx-attribute-value@8.0.0",
            "@svgr/babel-plugin-svg-dynamic-title@8.0.0",
            "@svgr/babel-plugin-svg-em-dimensions@8.0.0",
            "@svgr/babel-plugin-transform-react-native-svg@8.1.0",
            "@svgr/babel-plugin-transform-svg-component@8.0.0",
            "@svgr/babel-preset@8.1.0",
            "@svgr/core@8.1.0",
            "@svgr/plugin-jsx@8.1.0",
            "@vitejs/plugin-react@4.6.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@babel/generator@7.28.0",
          "Name": "@babel/generator",
          "Identifier": {
            "PURL": "pkg:npm/%40babel/generator@7.28.0",
            "UID": "d6c47fb72be2bc9d",
            "BOMRef": "pkg:npm/%40babel/generator@7.28.0"
          },
          "Version": "7.28.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@babel/core@7.28.0",
            "@babel/traverse@7.28.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@babel/helper-compilation-targets@7.27.2",
          "Name": "@babel/helper-compilation-targets",
          "Identifier": {
            "PURL": "pkg:npm/%40babel/helper-compilation-targets@7.27.2",
            "UID": "3eb404fafb07bd9c",
            "BOMRef": "pkg:npm/%40babel/helper-compilation-targets@7.27.2"
          },
          "Version": "7.27.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@babel/core@7.28.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@babel/helper-globals@7.28.0",
          "Name": "@babel/helper-globals",
          "Identifier": {
            "PURL": "pkg:npm/%40babel/helper-globals@7.28.0",
            "UID": "3d9ef856c95390e2",
            "BOMRef": "pkg:npm/%40babel/helper-globals@7.28.0"
          },
          "Version": "7.28.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@babel/traverse@7.28.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@babel/helper-module-imports@7.27.1",
          "Name": "@babel/helper-module-imports",
          "Identifier": {
            "PURL": "pkg:npm/%40babel/helper-module-imports@7.27.1",
            "UID": "ff40b4a11ffa720c",
            "BOMRef": "pkg:npm/%40babel/helper-module-imports@7.27.1"
          },
          "Version": "7.27.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@babel/helper-module-transforms@7.27.3",
            "@emotion/babel-plugin@11.13.5"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@babel/helper-module-transforms@7.27.3",
          "Name": "@babel/helper-module-transforms",
          "Identifier": {
            "PURL": "pkg:npm/%40babel/helper-module-transforms@7.27.3",
            "UID": "a86b5ae1dd357f35",
            "BOMRef": "pkg:npm/%40babel/helper-module-transforms@7.27.3"
          },
          "Version": "7.27.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@babel/core@7.28.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@babel/helper-plugin-utils@7.27.1",
          "Name": "@babel/helper-plugin-utils",
          "Identifier": {
            "PURL": "pkg:npm/%40babel/helper-plugin-utils@7.27.1",
            "UID": "3f006a1745cbb10c",
            "BOMRef": "pkg:npm/%40babel/helper-plugin-utils@7.27.1"
          },
          "Version": "7.27.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@babel/plugin-transform-react-jsx-self@7.27.1",
            "@babel/plugin-transform-react-jsx-source@7.27.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@babel/helper-string-parser@7.27.1",
          "Name": "@babel/helper-string-parser",
          "Identifier": {
            "PURL": "pkg:npm/%40babel/helper-string-parser@7.27.1",
            "UID": "4f040ebea60a6d1a",
            "BOMRef": "pkg:npm/%40babel/helper-string-parser@7.27.1"
          },
          "Version": "7.27.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@babel/types@7.28.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@babel/helper-validator-identifier@7.27.1",
          "Name": "@babel/helper-validator-identifier",
          "Identifier": {
            "PURL": "pkg:npm/%40babel/helper-validator-identifier@7.27.1",
            "UID": "686845d3fd4241d9",
            "BOMRef": "pkg:npm/%40babel/helper-validator-identifier@7.27.1"
          },
          "Version": "7.27.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@babel/code-frame@7.27.1",
            "@babel/helper-module-transforms@7.27.3",
            "@babel/types@7.28.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@babel/helper-validator-option@7.27.1",
          "Name": "@babel/helper-validator-option",
          "Identifier": {
            "PURL": "pkg:npm/%40babel/helper-validator-option@7.27.1",
            "UID": "77d645edd1472d76",
            "BOMRef": "pkg:npm/%40babel/helper-validator-option@7.27.1"
          },
          "Version": "7.27.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@babel/helper-compilation-targets@7.27.2"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@babel/helpers@7.27.6",
          "Name": "@babel/helpers",
          "Identifier": {
            "PURL": "pkg:npm/%40babel/helpers@7.27.6",
            "UID": "af838c8db6e9619f",
            "BOMRef": "pkg:npm/%40babel/helpers@7.27.6"
          },
          "Version": "7.27.6",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@babel/core@7.28.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@babel/parser@7.28.0",
          "Name": "@babel/parser",
          "Identifier": {
            "PURL": "pkg:npm/%40babel/parser@7.28.0",
            "UID": "3d9086c9b1da4dca",
            "BOMRef": "pkg:npm/%40babel/parser@7.28.0"
          },
          "Version": "7.28.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@babel/core@7.28.0",
            "@babel/generator@7.28.0",
            "@babel/template@7.27.2",
            "@babel/traverse@7.28.0",
            "@types/babel__core@7.20.5",
            "@types/babel__template@7.4.4"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@babel/plugin-transform-react-jsx-self@7.27.1",
          "Name": "@babel/plugin-transform-react-jsx-self",
          "Identifier": {
            "PURL": "pkg:npm/%40babel/plugin-transform-react-jsx-self@7.27.1",
            "UID": "c8022488b109e102",
            "BOMRef": "pkg:npm/%40babel/plugin-transform-react-jsx-self@7.27.1"
          },
          "Version": "7.27.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@vitejs/plugin-react@4.6.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@babel/plugin-transform-react-jsx-source@7.27.1",
          "Name": "@babel/plugin-transform-react-jsx-source",
          "Identifier": {
            "PURL": "pkg:npm/%40babel/plugin-transform-react-jsx-source@7.27.1",
            "UID": "d26da4c76e5b247b",
            "BOMRef": "pkg:npm/%40babel/plugin-transform-react-jsx-source@7.27.1"
          },
          "Version": "7.27.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@vitejs/plugin-react@4.6.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@babel/runtime@7.27.6",
          "Name": "@babel/runtime",
          "Identifier": {
            "PURL": "pkg:npm/%40babel/runtime@7.27.6",
            "UID": "575db141fb2719aa",
            "BOMRef": "pkg:npm/%40babel/runtime@7.27.6"
          },
          "Version": "7.27.6",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@emotion/babel-plugin@11.13.5",
            "@emotion/react@11.14.0",
            "@emotion/styled@11.14.1",
            "@mui/icons-material@7.2.0",
            "@mui/material@5.17.1",
            "@mui/material@7.2.0",
            "@mui/private-theming@5.17.1",
            "@mui/private-theming@7.2.0",
            "@mui/styled-engine@5.16.14",
            "@mui/styled-engine@7.2.0",
            "@mui/system@5.17.1",
            "@mui/system@7.2.0",
            "@mui/types@7.4.4",
            "@mui/utils@5.17.1",
            "@mui/utils@7.2.0",
            "@mui/x-data-grid@7.29.8",
            "@mui/x-internals@7.29.0",
            "@testing-library/dom@10.4.0",
            "@testing-library/dom@8.20.1",
            "@testing-library/jest-dom@5.17.0",
            "@testing-library/react@13.4.0",
            "@testing-library/user-event@13.5.0",
            "babel-plugin-macros@3.1.0",
            "dom-helpers@5.2.1",
            "react-transition-group@4.4.5"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@babel/template@7.27.2",
          "Name": "@babel/template",
          "Identifier": {
            "PURL": "pkg:npm/%40babel/template@7.27.2",
            "UID": "24e2c659f0dcb869",
            "BOMRef": "pkg:npm/%40babel/template@7.27.2"
          },
          "Version": "7.27.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@babel/core@7.28.0",
            "@babel/helpers@7.27.6",
            "@babel/traverse@7.28.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@babel/traverse@7.28.0",
          "Name": "@babel/traverse",
          "Identifier": {
            "PURL": "pkg:npm/%40babel/traverse@7.28.0",
            "UID": "a8f72176d900d945",
            "BOMRef": "pkg:npm/%40babel/traverse@7.28.0"
          },
          "Version": "7.28.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@babel/core@7.28.0",
            "@babel/helper-module-imports@7.27.1",
            "@babel/helper-module-transforms@7.27.3"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@babel/types@7.28.0",
          "Name": "@babel/types",
          "Identifier": {
            "PURL": "pkg:npm/%40babel/types@7.28.0",
            "UID": "e3c9911fdab0575c",
            "BOMRef": "pkg:npm/%40babel/types@7.28.0"
          },
          "Version": "7.28.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@babel/core@7.28.0",
            "@babel/generator@7.28.0",
            "@babel/helper-module-imports@7.27.1",
            "@babel/helpers@7.27.6",
            "@babel/parser@7.28.0",
            "@babel/template@7.27.2",
            "@babel/traverse@7.28.0",
            "@svgr/hast-util-to-babel-ast@8.0.0",
            "@types/babel__core@7.20.5",
            "@types/babel__generator@7.27.0",
            "@types/babel__template@7.4.4",
            "@types/babel__traverse@7.20.7"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@emotion/babel-plugin@11.13.5",
          "Name": "@emotion/babel-plugin",
          "Identifier": {
            "PURL": "pkg:npm/%40emotion/babel-plugin@11.13.5",
            "UID": "f15043d7e8ea3fd4",
            "BOMRef": "pkg:npm/%40emotion/babel-plugin@11.13.5"
          },
          "Version": "11.13.5",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@emotion/css@11.13.5",
            "@emotion/react@11.14.0",
            "@emotion/styled@11.14.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@emotion/cache@11.14.0",
          "Name": "@emotion/cache",
          "Identifier": {
            "PURL": "pkg:npm/%40emotion/cache@11.14.0",
            "UID": "7492707cd2d41619",
            "BOMRef": "pkg:npm/%40emotion/cache@11.14.0"
          },
          "Version": "11.14.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@emotion/css@11.13.5",
            "@emotion/react@11.14.0",
            "@mui/styled-engine@5.16.14",
            "@mui/styled-engine@7.2.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@emotion/css@11.13.5",
          "Name": "@emotion/css",
          "Identifier": {
            "PURL": "pkg:npm/%40emotion/css@11.13.5",
            "UID": "d5de7ab59751d1ba",
            "BOMRef": "pkg:npm/%40emotion/css@11.13.5"
          },
          "Version": "11.13.5",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "react-diff-viewer-continued@3.4.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@emotion/hash@0.9.2",
          "Name": "@emotion/hash",
          "Identifier": {
            "PURL": "pkg:npm/%40emotion/hash@0.9.2",
            "UID": "7d3f29dad6776cb0",
            "BOMRef": "pkg:npm/%40emotion/hash@0.9.2"
          },
          "Version": "0.9.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@emotion/babel-plugin@11.13.5",
            "@emotion/serialize@1.3.3"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@emotion/is-prop-valid@1.3.1",
          "Name": "@emotion/is-prop-valid",
          "Identifier": {
            "PURL": "pkg:npm/%40emotion/is-prop-valid@1.3.1",
            "UID": "101c4ba9dcb8c34",
            "BOMRef": "pkg:npm/%40emotion/is-prop-valid@1.3.1"
          },
          "Version": "1.3.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@emotion/styled@11.14.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@emotion/memoize@0.9.0",
          "Name": "@emotion/memoize",
          "Identifier": {
            "PURL": "pkg:npm/%40emotion/memoize@0.9.0",
            "UID": "85cbb430c2564a8c",
            "BOMRef": "pkg:npm/%40emotion/memoize@0.9.0"
          },
          "Version": "0.9.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@emotion/babel-plugin@11.13.5",
            "@emotion/cache@11.14.0",
            "@emotion/is-prop-valid@1.3.1",
            "@emotion/serialize@1.3.3"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@emotion/react@11.14.0",
          "Name": "@emotion/react",
          "Identifier": {
            "PURL": "pkg:npm/%40emotion/react@11.14.0",
            "UID": "4da1f1e74cde0485",
            "BOMRef": "pkg:npm/%40emotion/react@11.14.0"
          },
          "Version": "11.14.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@emotion/styled@11.14.1",
            "@mui/material@5.17.1",
            "@mui/material@7.2.0",
            "@mui/styled-engine@5.16.14",
            "@mui/styled-engine@7.2.0",
            "@mui/system@5.17.1",
            "@mui/system@7.2.0",
            "@mui/x-data-grid@7.29.8",
            "@textea/json-viewer@2.17.2",
            "create-collection-form@0.0.0",
            "mui-chips-input@7.0.1",
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@emotion/serialize@1.3.3",
          "Name": "@emotion/serialize",
          "Identifier": {
            "PURL": "pkg:npm/%40emotion/serialize@1.3.3",
            "UID": "52e99d2b7dd72802",
            "BOMRef": "pkg:npm/%40emotion/serialize@1.3.3"
          },
          "Version": "1.3.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@emotion/babel-plugin@11.13.5",
            "@emotion/css@11.13.5",
            "@emotion/react@11.14.0",
            "@emotion/styled@11.14.1",
            "@mui/styled-engine@7.2.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@emotion/sheet@1.4.0",
          "Name": "@emotion/sheet",
          "Identifier": {
            "PURL": "pkg:npm/%40emotion/sheet@1.4.0",
            "UID": "ed7370a42d95b2a0",
            "BOMRef": "pkg:npm/%40emotion/sheet@1.4.0"
          },
          "Version": "1.4.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@emotion/cache@11.14.0",
            "@emotion/css@11.13.5",
            "@mui/styled-engine@7.2.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@emotion/styled@11.14.1",
          "Name": "@emotion/styled",
          "Identifier": {
            "PURL": "pkg:npm/%40emotion/styled@11.14.1",
            "UID": "f0a2b3081452eba1",
            "BOMRef": "pkg:npm/%40emotion/styled@11.14.1"
          },
          "Version": "11.14.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mui/material@5.17.1",
            "@mui/material@7.2.0",
            "@mui/styled-engine@5.16.14",
            "@mui/styled-engine@7.2.0",
            "@mui/system@5.17.1",
            "@mui/system@7.2.0",
            "@mui/x-data-grid@7.29.8",
            "@textea/json-viewer@2.17.2",
            "create-collection-form@0.0.0",
            "mui-chips-input@7.0.1",
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@emotion/unitless@0.10.0",
          "Name": "@emotion/unitless",
          "Identifier": {
            "PURL": "pkg:npm/%40emotion/unitless@0.10.0",
            "UID": "7df605333dce426e",
            "BOMRef": "pkg:npm/%40emotion/unitless@0.10.0"
          },
          "Version": "0.10.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@emotion/serialize@1.3.3"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@emotion/use-insertion-effect-with-fallbacks@1.2.0",
          "Name": "@emotion/use-insertion-effect-with-fallbacks",
          "Identifier": {
            "PURL": "pkg:npm/%40emotion/use-insertion-effect-with-fallbacks@1.2.0",
            "UID": "3623441b41df507d",
            "BOMRef": "pkg:npm/%40emotion/use-insertion-effect-with-fallbacks@1.2.0"
          },
          "Version": "1.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@emotion/react@11.14.0",
            "@emotion/styled@11.14.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@emotion/utils@1.4.2",
          "Name": "@emotion/utils",
          "Identifier": {
            "PURL": "pkg:npm/%40emotion/utils@1.4.2",
            "UID": "a1fae53eb336db26",
            "BOMRef": "pkg:npm/%40emotion/utils@1.4.2"
          },
          "Version": "1.4.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@emotion/cache@11.14.0",
            "@emotion/css@11.13.5",
            "@emotion/react@11.14.0",
            "@emotion/serialize@1.3.3",
            "@emotion/styled@11.14.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@emotion/weak-memoize@0.4.0",
          "Name": "@emotion/weak-memoize",
          "Identifier": {
            "PURL": "pkg:npm/%40emotion/weak-memoize@0.4.0",
            "UID": "d4c0c50255bc9f7f",
            "BOMRef": "pkg:npm/%40emotion/weak-memoize@0.4.0"
          },
          "Version": "0.4.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@emotion/cache@11.14.0",
            "@emotion/react@11.14.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@eslint-community/eslint-utils@4.7.0",
          "Name": "@eslint-community/eslint-utils",
          "Identifier": {
            "PURL": "pkg:npm/%40eslint-community/eslint-utils@4.7.0",
            "UID": "f8f0077630446d71",
            "BOMRef": "pkg:npm/%40eslint-community/eslint-utils@4.7.0"
          },
          "Version": "4.7.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "eslint@8.57.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@eslint-community/regexpp@4.12.1",
          "Name": "@eslint-community/regexpp",
          "Identifier": {
            "PURL": "pkg:npm/%40eslint-community/regexpp@4.12.1",
            "UID": "afbb2b9ab40546fd",
            "BOMRef": "pkg:npm/%40eslint-community/regexpp@4.12.1"
          },
          "Version": "4.12.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "eslint@8.57.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@eslint/eslintrc@2.1.4",
          "Name": "@eslint/eslintrc",
          "Identifier": {
            "PURL": "pkg:npm/%40eslint/eslintrc@2.1.4",
            "UID": "587724c68f033ebe",
            "BOMRef": "pkg:npm/%40eslint/eslintrc@2.1.4"
          },
          "Version": "2.1.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "eslint@8.57.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@eslint/js@8.57.1",
          "Name": "@eslint/js",
          "Identifier": {
            "PURL": "pkg:npm/%40eslint/js@8.57.1",
            "UID": "43258b31445d5bca",
            "BOMRef": "pkg:npm/%40eslint/js@8.57.1"
          },
          "Version": "8.57.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "eslint@8.57.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@humanwhocodes/config-array@0.13.0",
          "Name": "@humanwhocodes/config-array",
          "Identifier": {
            "PURL": "pkg:npm/%40humanwhocodes/config-array@0.13.0",
            "UID": "1700d1bdbadc867",
            "BOMRef": "pkg:npm/%40humanwhocodes/config-array@0.13.0"
          },
          "Version": "0.13.0",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "eslint@8.57.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@humanwhocodes/module-importer@1.0.1",
          "Name": "@humanwhocodes/module-importer",
          "Identifier": {
            "PURL": "pkg:npm/%40humanwhocodes/module-importer@1.0.1",
            "UID": "a8683b1aad2f50f",
            "BOMRef": "pkg:npm/%40humanwhocodes/module-importer@1.0.1"
          },
          "Version": "1.0.1",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "eslint@8.57.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@humanwhocodes/object-schema@2.0.3",
          "Name": "@humanwhocodes/object-schema",
          "Identifier": {
            "PURL": "pkg:npm/%40humanwhocodes/object-schema@2.0.3",
            "UID": "6536bc2e0e0813b8",
            "BOMRef": "pkg:npm/%40humanwhocodes/object-schema@2.0.3"
          },
          "Version": "2.0.3",
          "Licenses": [
            "BSD-3-Clause"
          ],
          "DependsOn": [
            "@humanwhocodes/config-array@0.13.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@isaacs/fs-minipass@4.0.1",
          "Name": "@isaacs/fs-minipass",
          "Identifier": {
            "PURL": "pkg:npm/%40isaacs/fs-minipass@4.0.1",
            "UID": "5ca4972f8ae10090",
            "BOMRef": "pkg:npm/%40isaacs/fs-minipass@4.0.1"
          },
          "Version": "4.0.1",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "tar@7.4.3"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@jest/diff-sequences@30.0.1",
          "Name": "@jest/diff-sequences",
          "Identifier": {
            "PURL": "pkg:npm/%40jest/diff-sequences@30.0.1",
            "UID": "771b62b4d45be907",
            "BOMRef": "pkg:npm/%40jest/diff-sequences@30.0.1"
          },
          "Version": "30.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "jest-diff@30.0.4"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@jest/expect-utils@30.0.4",
          "Name": "@jest/expect-utils",
          "Identifier": {
            "PURL": "pkg:npm/%40jest/expect-utils@30.0.4",
            "UID": "17bec29336780854",
            "BOMRef": "pkg:npm/%40jest/expect-utils@30.0.4"
          },
          "Version": "30.0.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "expect@30.0.4"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@jest/get-type@30.0.1",
          "Name": "@jest/get-type",
          "Identifier": {
            "PURL": "pkg:npm/%40jest/get-type@30.0.1",
            "UID": "a47d8a3a3bd83cba",
            "BOMRef": "pkg:npm/%40jest/get-type@30.0.1"
          },
          "Version": "30.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@jest/expect-utils@30.0.4",
            "expect@30.0.4",
            "jest-diff@30.0.4",
            "jest-matcher-utils@30.0.4"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@jest/pattern@30.0.1",
          "Name": "@jest/pattern",
          "Identifier": {
            "PURL": "pkg:npm/%40jest/pattern@30.0.1",
            "UID": "8ed64c4044435b6a",
            "BOMRef": "pkg:npm/%40jest/pattern@30.0.1"
          },
          "Version": "30.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@jest/types@30.0.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@jest/schemas@30.0.1",
          "Name": "@jest/schemas",
          "Identifier": {
            "PURL": "pkg:npm/%40jest/schemas@30.0.1",
            "UID": "dca15405873208d",
            "BOMRef": "pkg:npm/%40jest/schemas@30.0.1"
          },
          "Version": "30.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "pretty-format@30.0.2",
            "pretty-format@30.0.2",
            "pretty-format@30.0.2",
            "pretty-format@30.0.2",
            "@jest/types@30.0.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@jest/types@30.0.1",
          "Name": "@jest/types",
          "Identifier": {
            "PURL": "pkg:npm/%40jest/types@30.0.1",
            "UID": "22cbaa9d6081687",
            "BOMRef": "pkg:npm/%40jest/types@30.0.1"
          },
          "Version": "30.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "jest-message-util@30.0.2",
            "jest-mock@30.0.2",
            "jest-util@30.0.2"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@jridgewell/gen-mapping@0.3.12",
          "Name": "@jridgewell/gen-mapping",
          "Identifier": {
            "PURL": "pkg:npm/%40jridgewell/gen-mapping@0.3.12",
            "UID": "3e888b0340f14387",
            "BOMRef": "pkg:npm/%40jridgewell/gen-mapping@0.3.12"
          },
          "Version": "0.3.12",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@ampproject/remapping@2.3.0",
            "@babel/generator@7.28.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@jridgewell/resolve-uri@3.1.2",
          "Name": "@jridgewell/resolve-uri",
          "Identifier": {
            "PURL": "pkg:npm/%40jridgewell/resolve-uri@3.1.2",
            "UID": "47ff78e297f32279",
            "BOMRef": "pkg:npm/%40jridgewell/resolve-uri@3.1.2"
          },
          "Version": "3.1.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@jridgewell/trace-mapping@0.3.29"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@jridgewell/sourcemap-codec@1.5.4",
          "Name": "@jridgewell/sourcemap-codec",
          "Identifier": {
            "PURL": "pkg:npm/%40jridgewell/sourcemap-codec@1.5.4",
            "UID": "1c191d8cce0e8d62",
            "BOMRef": "pkg:npm/%40jridgewell/sourcemap-codec@1.5.4"
          },
          "Version": "1.5.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@jridgewell/gen-mapping@0.3.12",
            "@jridgewell/trace-mapping@0.3.29",
            "magic-string@0.30.17"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@jridgewell/trace-mapping@0.3.29",
          "Name": "@jridgewell/trace-mapping",
          "Identifier": {
            "PURL": "pkg:npm/%40jridgewell/trace-mapping@0.3.29",
            "UID": "111acc890d76781a",
            "BOMRef": "pkg:npm/%40jridgewell/trace-mapping@0.3.29"
          },
          "Version": "0.3.29",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@ampproject/remapping@2.3.0",
            "@babel/generator@7.28.0",
            "@jridgewell/gen-mapping@0.3.12"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@kurkle/color@0.3.4",
          "Name": "@kurkle/color",
          "Identifier": {
            "PURL": "pkg:npm/%40kurkle/color@0.3.4",
            "UID": "fdc384f841c16e0b",
            "BOMRef": "pkg:npm/%40kurkle/color@0.3.4"
          },
          "Version": "0.3.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "chart.js@4.5.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@mdx-js/mdx@2.3.0",
          "Name": "@mdx-js/mdx",
          "Identifier": {
            "PURL": "pkg:npm/%40mdx-js/mdx@2.3.0",
            "UID": "78e9be1636efeda9",
            "BOMRef": "pkg:npm/%40mdx-js/mdx@2.3.0"
          },
          "Version": "2.3.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mdx-js/rollup@2.3.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@mdx-js/react@2.3.0",
          "Name": "@mdx-js/react",
          "Identifier": {
            "PURL": "pkg:npm/%40mdx-js/react@2.3.0",
            "UID": "e97136e10c54dadc",
            "BOMRef": "pkg:npm/%40mdx-js/react@2.3.0"
          },
          "Version": "2.3.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@mdx-js/rollup@2.3.0",
          "Name": "@mdx-js/rollup",
          "Identifier": {
            "PURL": "pkg:npm/%40mdx-js/rollup@2.3.0",
            "UID": "c53f497dd1af997e",
            "BOMRef": "pkg:npm/%40mdx-js/rollup@2.3.0"
          },
          "Version": "2.3.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@monaco-editor/loader@1.5.0",
          "Name": "@monaco-editor/loader",
          "Identifier": {
            "PURL": "pkg:npm/%40monaco-editor/loader@1.5.0",
            "UID": "f46617b847e2c416",
            "BOMRef": "pkg:npm/%40monaco-editor/loader@1.5.0"
          },
          "Version": "1.5.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@monaco-editor/react@4.7.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@monaco-editor/react@4.7.0",
          "Name": "@monaco-editor/react",
          "Identifier": {
            "PURL": "pkg:npm/%40monaco-editor/react@4.7.0",
            "UID": "4c6c8b3657bb9316",
            "BOMRef": "pkg:npm/%40monaco-editor/react@4.7.0"
          },
          "Version": "4.7.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@mui/core-downloads-tracker@5.17.1",
          "Name": "@mui/core-downloads-tracker",
          "Identifier": {
            "PURL": "pkg:npm/%40mui/core-downloads-tracker@5.17.1",
            "UID": "68e0c70d91c0c85a",
            "BOMRef": "pkg:npm/%40mui/core-downloads-tracker@5.17.1"
          },
          "Version": "5.17.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mui/material@5.17.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@mui/core-downloads-tracker@7.2.0",
          "Name": "@mui/core-downloads-tracker",
          "Identifier": {
            "PURL": "pkg:npm/%40mui/core-downloads-tracker@7.2.0",
            "UID": "a7d969660f252e21",
            "BOMRef": "pkg:npm/%40mui/core-downloads-tracker@7.2.0"
          },
          "Version": "7.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mui/material@7.2.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@mui/icons-material@7.2.0",
          "Name": "@mui/icons-material",
          "Identifier": {
            "PURL": "pkg:npm/%40mui/icons-material@7.2.0",
            "UID": "c4222bec6733c9ba",
            "BOMRef": "pkg:npm/%40mui/icons-material@7.2.0"
          },
          "Version": "7.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "create-collection-form@0.0.0",
            "mui-chips-input@7.0.1",
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@mui/material@5.17.1",
          "Name": "@mui/material",
          "Identifier": {
            "PURL": "pkg:npm/%40mui/material@5.17.1",
            "UID": "34ba909a9b32d88f",
            "BOMRef": "pkg:npm/%40mui/material@5.17.1"
          },
          "Version": "5.17.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@textea/json-viewer@2.17.2"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@mui/material@7.2.0",
          "Name": "@mui/material",
          "Identifier": {
            "PURL": "pkg:npm/%40mui/material@7.2.0",
            "UID": "c8154eed64d20303",
            "BOMRef": "pkg:npm/%40mui/material@7.2.0"
          },
          "Version": "7.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mui/icons-material@7.2.0",
            "@mui/x-data-grid@7.29.8",
            "create-collection-form@0.0.0",
            "mui-chips-input@7.0.1",
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@mui/private-theming@5.17.1",
          "Name": "@mui/private-theming",
          "Identifier": {
            "PURL": "pkg:npm/%40mui/private-theming@5.17.1",
            "UID": "7708f786fbf318fe",
            "BOMRef": "pkg:npm/%40mui/private-theming@5.17.1"
          },
          "Version": "5.17.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mui/system@5.17.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@mui/private-theming@7.2.0",
          "Name": "@mui/private-theming",
          "Identifier": {
            "PURL": "pkg:npm/%40mui/private-theming@7.2.0",
            "UID": "ce62605047cb9b64",
            "BOMRef": "pkg:npm/%40mui/private-theming@7.2.0"
          },
          "Version": "7.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mui/system@7.2.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@mui/styled-engine@5.16.14",
          "Name": "@mui/styled-engine",
          "Identifier": {
            "PURL": "pkg:npm/%40mui/styled-engine@5.16.14",
            "UID": "4fcd7d0e0fb56da1",
            "BOMRef": "pkg:npm/%40mui/styled-engine@5.16.14"
          },
          "Version": "5.16.14",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mui/system@5.17.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@mui/styled-engine@7.2.0",
          "Name": "@mui/styled-engine",
          "Identifier": {
            "PURL": "pkg:npm/%40mui/styled-engine@7.2.0",
            "UID": "af608116b7f34dc8",
            "BOMRef": "pkg:npm/%40mui/styled-engine@7.2.0"
          },
          "Version": "7.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mui/system@7.2.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@mui/system@5.17.1",
          "Name": "@mui/system",
          "Identifier": {
            "PURL": "pkg:npm/%40mui/system@5.17.1",
            "UID": "7d52734d9b7666ab",
            "BOMRef": "pkg:npm/%40mui/system@5.17.1"
          },
          "Version": "5.17.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mui/material@5.17.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@mui/system@7.2.0",
          "Name": "@mui/system",
          "Identifier": {
            "PURL": "pkg:npm/%40mui/system@7.2.0",
            "UID": "7dd11eddc195109b",
            "BOMRef": "pkg:npm/%40mui/system@7.2.0"
          },
          "Version": "7.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mui/material@7.2.0",
            "@mui/x-data-grid@7.29.8"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@mui/types@7.2.24",
          "Name": "@mui/types",
          "Identifier": {
            "PURL": "pkg:npm/%40mui/types@7.2.24",
            "UID": "70d1979567c2ac58",
            "BOMRef": "pkg:npm/%40mui/types@7.2.24"
          },
          "Version": "7.2.24",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mui/material@5.17.1",
            "@mui/system@5.17.1",
            "@mui/utils@5.17.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@mui/types@7.4.4",
          "Name": "@mui/types",
          "Identifier": {
            "PURL": "pkg:npm/%40mui/types@7.4.4",
            "UID": "22b11dbc76d305d0",
            "BOMRef": "pkg:npm/%40mui/types@7.4.4"
          },
          "Version": "7.4.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mui/material@7.2.0",
            "@mui/system@7.2.0",
            "@mui/utils@7.2.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@mui/utils@5.17.1",
          "Name": "@mui/utils",
          "Identifier": {
            "PURL": "pkg:npm/%40mui/utils@5.17.1",
            "UID": "dd9d193b29587c21",
            "BOMRef": "pkg:npm/%40mui/utils@5.17.1"
          },
          "Version": "5.17.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mui/material@5.17.1",
            "@mui/private-theming@5.17.1",
            "@mui/system@5.17.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@mui/utils@7.2.0",
          "Name": "@mui/utils",
          "Identifier": {
            "PURL": "pkg:npm/%40mui/utils@7.2.0",
            "UID": "7053f860406f3a32",
            "BOMRef": "pkg:npm/%40mui/utils@7.2.0"
          },
          "Version": "7.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mui/material@7.2.0",
            "@mui/private-theming@7.2.0",
            "@mui/system@7.2.0",
            "@mui/x-data-grid@7.29.8",
            "@mui/x-internals@7.29.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@mui/x-data-grid@7.29.8",
          "Name": "@mui/x-data-grid",
          "Identifier": {
            "PURL": "pkg:npm/%40mui/x-data-grid@7.29.8",
            "UID": "81cda818b14ae197",
            "BOMRef": "pkg:npm/%40mui/x-data-grid@7.29.8"
          },
          "Version": "7.29.8",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@mui/x-internals@7.29.0",
          "Name": "@mui/x-internals",
          "Identifier": {
            "PURL": "pkg:npm/%40mui/x-internals@7.29.0",
            "UID": "a041c321f5cd86b7",
            "BOMRef": "pkg:npm/%40mui/x-internals@7.29.0"
          },
          "Version": "7.29.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mui/x-data-grid@7.29.8"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@nodelib/fs.scandir@2.1.5",
          "Name": "@nodelib/fs.scandir",
          "Identifier": {
            "PURL": "pkg:npm/%40nodelib/fs.scandir@2.1.5",
            "UID": "f408ac1ca2c1d096",
            "BOMRef": "pkg:npm/%40nodelib/fs.scandir@2.1.5"
          },
          "Version": "2.1.5",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@nodelib/fs.walk@1.2.8"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@nodelib/fs.stat@2.0.5",
          "Name": "@nodelib/fs.stat",
          "Identifier": {
            "PURL": "pkg:npm/%40nodelib/fs.stat@2.0.5",
            "UID": "2f34915926e0a3c0",
            "BOMRef": "pkg:npm/%40nodelib/fs.stat@2.0.5"
          },
          "Version": "2.0.5",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@nodelib/fs.scandir@2.1.5"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@nodelib/fs.walk@1.2.8",
          "Name": "@nodelib/fs.walk",
          "Identifier": {
            "PURL": "pkg:npm/%40nodelib/fs.walk@1.2.8",
            "UID": "af35c6ea64e282db",
            "BOMRef": "pkg:npm/%40nodelib/fs.walk@1.2.8"
          },
          "Version": "1.2.8",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "eslint@8.57.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@parcel/watcher@2.5.1",
          "Name": "@parcel/watcher",
          "Identifier": {
            "PURL": "pkg:npm/%40parcel/watcher@2.5.1",
            "UID": "60cf0a9a631c5b2c",
            "BOMRef": "pkg:npm/%40parcel/watcher@2.5.1"
          },
          "Version": "2.5.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@tailwindcss/cli@4.1.11"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@popperjs/core@2.11.8",
          "Name": "@popperjs/core",
          "Identifier": {
            "PURL": "pkg:npm/%40popperjs/core@2.11.8",
            "UID": "2be9ce652d62a642",
            "BOMRef": "pkg:npm/%40popperjs/core@2.11.8"
          },
          "Version": "2.11.8",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mui/material@5.17.1",
            "@mui/material@7.2.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@qdrant/js-client-rest@1.15.1",
          "Name": "@qdrant/js-client-rest",
          "Identifier": {
            "PURL": "pkg:npm/%40qdrant/js-client-rest@1.15.1",
            "UID": "f4bb4c81d1552c8c",
            "BOMRef": "pkg:npm/%40qdrant/js-client-rest@1.15.1"
          },
          "Version": "1.15.1",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@qdrant/openapi-typescript-fetch@1.2.6",
          "Name": "@qdrant/openapi-typescript-fetch",
          "Identifier": {
            "PURL": "pkg:npm/%40qdrant/openapi-typescript-fetch@1.2.6",
            "UID": "e03dab7ae511b0d8",
            "BOMRef": "pkg:npm/%40qdrant/openapi-typescript-fetch@1.2.6"
          },
          "Version": "1.2.6",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@qdrant/js-client-rest@1.15.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@remix-run/router@1.23.0",
          "Name": "@remix-run/router",
          "Identifier": {
            "PURL": "pkg:npm/%40remix-run/router@1.23.0",
            "UID": "80b9490bce837fc0",
            "BOMRef": "pkg:npm/%40remix-run/router@1.23.0"
          },
          "Version": "1.23.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "react-router-dom@6.30.1",
            "react-router@6.30.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@rolldown/pluginutils@1.0.0-beta.19",
          "Name": "@rolldown/pluginutils",
          "Identifier": {
            "PURL": "pkg:npm/%40rolldown/pluginutils@1.0.0-beta.19",
            "UID": "99dbcea8358956de",
            "BOMRef": "pkg:npm/%40rolldown/pluginutils@1.0.0-beta.19"
          },
          "Version": "1.0.0-beta.19",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@vitejs/plugin-react@4.6.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@rollup/pluginutils@4.2.1",
          "Name": "@rollup/pluginutils",
          "Identifier": {
            "PURL": "pkg:npm/%40rollup/pluginutils@4.2.1",
            "UID": "1b0218abefedaac",
            "BOMRef": "pkg:npm/%40rollup/pluginutils@4.2.1"
          },
          "Version": "4.2.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "vite-plugin-eslint@1.8.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@rollup/pluginutils@5.2.0",
          "Name": "@rollup/pluginutils",
          "Identifier": {
            "PURL": "pkg:npm/%40rollup/pluginutils@5.2.0",
            "UID": "9e3a35dfbf0e642b",
            "BOMRef": "pkg:npm/%40rollup/pluginutils@5.2.0"
          },
          "Version": "5.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mdx-js/rollup@2.3.0",
            "vite-plugin-svgr@4.3.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@rollup/rollup-linux-x64-gnu@4.44.2",
          "Name": "@rollup/rollup-linux-x64-gnu",
          "Identifier": {
            "PURL": "pkg:npm/%40rollup/rollup-linux-x64-gnu@4.44.2",
            "UID": "97b63488fadbf238",
            "BOMRef": "pkg:npm/%40rollup/rollup-linux-x64-gnu@4.44.2"
          },
          "Version": "4.44.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "rollup@4.44.2"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@rollup/rollup-linux-x64-gnu@4.52.4",
          "Name": "@rollup/rollup-linux-x64-gnu",
          "Identifier": {
            "PURL": "pkg:npm/%40rollup/rollup-linux-x64-gnu@4.52.4",
            "UID": "adb8502459d809ed",
            "BOMRef": "pkg:npm/%40rollup/rollup-linux-x64-gnu@4.52.4"
          },
          "Version": "4.52.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@rollup/rollup-linux-x64-musl@4.44.2",
          "Name": "@rollup/rollup-linux-x64-musl",
          "Identifier": {
            "PURL": "pkg:npm/%40rollup/rollup-linux-x64-musl@4.44.2",
            "UID": "a43f83ca5508b487",
            "BOMRef": "pkg:npm/%40rollup/rollup-linux-x64-musl@4.44.2"
          },
          "Version": "4.44.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "rollup@4.44.2"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@saehrimnir/druidjs@0.6.3",
          "Name": "@saehrimnir/druidjs",
          "Identifier": {
            "PURL": "pkg:npm/%40saehrimnir/druidjs@0.6.3",
            "UID": "5144f309c34873b8",
            "BOMRef": "pkg:npm/%40saehrimnir/druidjs@0.6.3"
          },
          "Version": "0.6.3",
          "Licenses": [
            "BSD-3-Clause"
          ],
          "DependsOn": [
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@sevinf/maybe@0.5.0",
          "Name": "@sevinf/maybe",
          "Identifier": {
            "PURL": "pkg:npm/%40sevinf/maybe@0.5.0",
            "UID": "4cbf43a5b5dba0",
            "BOMRef": "pkg:npm/%40sevinf/maybe@0.5.0"
          },
          "Version": "0.5.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@qdrant/js-client-rest@1.15.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@sinclair/typebox@0.34.37",
          "Name": "@sinclair/typebox",
          "Identifier": {
            "PURL": "pkg:npm/%40sinclair/typebox@0.34.37",
            "UID": "c7c70febaf449a8c",
            "BOMRef": "pkg:npm/%40sinclair/typebox@0.34.37"
          },
          "Version": "0.34.37",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@jest/schemas@30.0.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@svgr/babel-plugin-add-jsx-attribute@8.0.0",
          "Name": "@svgr/babel-plugin-add-jsx-attribute",
          "Identifier": {
            "PURL": "pkg:npm/%40svgr/babel-plugin-add-jsx-attribute@8.0.0",
            "UID": "4787412b8157c631",
            "BOMRef": "pkg:npm/%40svgr/babel-plugin-add-jsx-attribute@8.0.0"
          },
          "Version": "8.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@svgr/babel-preset@8.1.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@svgr/babel-plugin-remove-jsx-attribute@8.0.0",
          "Name": "@svgr/babel-plugin-remove-jsx-attribute",
          "Identifier": {
            "PURL": "pkg:npm/%40svgr/babel-plugin-remove-jsx-attribute@8.0.0",
            "UID": "1fe630216119d987",
            "BOMRef": "pkg:npm/%40svgr/babel-plugin-remove-jsx-attribute@8.0.0"
          },
          "Version": "8.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@svgr/babel-preset@8.1.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@svgr/babel-plugin-remove-jsx-empty-expression@8.0.0",
          "Name": "@svgr/babel-plugin-remove-jsx-empty-expression",
          "Identifier": {
            "PURL": "pkg:npm/%40svgr/babel-plugin-remove-jsx-empty-expression@8.0.0",
            "UID": "d8eba4ff7f54ba50",
            "BOMRef": "pkg:npm/%40svgr/babel-plugin-remove-jsx-empty-expression@8.0.0"
          },
          "Version": "8.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@svgr/babel-preset@8.1.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@svgr/babel-plugin-replace-jsx-attribute-value@8.0.0",
          "Name": "@svgr/babel-plugin-replace-jsx-attribute-value",
          "Identifier": {
            "PURL": "pkg:npm/%40svgr/babel-plugin-replace-jsx-attribute-value@8.0.0",
            "UID": "4a9c934d1e323d9a",
            "BOMRef": "pkg:npm/%40svgr/babel-plugin-replace-jsx-attribute-value@8.0.0"
          },
          "Version": "8.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@svgr/babel-preset@8.1.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@svgr/babel-plugin-svg-dynamic-title@8.0.0",
          "Name": "@svgr/babel-plugin-svg-dynamic-title",
          "Identifier": {
            "PURL": "pkg:npm/%40svgr/babel-plugin-svg-dynamic-title@8.0.0",
            "UID": "dc7a9d206d4e9d6",
            "BOMRef": "pkg:npm/%40svgr/babel-plugin-svg-dynamic-title@8.0.0"
          },
          "Version": "8.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@svgr/babel-preset@8.1.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@svgr/babel-plugin-svg-em-dimensions@8.0.0",
          "Name": "@svgr/babel-plugin-svg-em-dimensions",
          "Identifier": {
            "PURL": "pkg:npm/%40svgr/babel-plugin-svg-em-dimensions@8.0.0",
            "UID": "4256f6c32de47f87",
            "BOMRef": "pkg:npm/%40svgr/babel-plugin-svg-em-dimensions@8.0.0"
          },
          "Version": "8.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@svgr/babel-preset@8.1.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@svgr/babel-plugin-transform-react-native-svg@8.1.0",
          "Name": "@svgr/babel-plugin-transform-react-native-svg",
          "Identifier": {
            "PURL": "pkg:npm/%40svgr/babel-plugin-transform-react-native-svg@8.1.0",
            "UID": "14284320273e8f46",
            "BOMRef": "pkg:npm/%40svgr/babel-plugin-transform-react-native-svg@8.1.0"
          },
          "Version": "8.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@svgr/babel-preset@8.1.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@svgr/babel-plugin-transform-svg-component@8.0.0",
          "Name": "@svgr/babel-plugin-transform-svg-component",
          "Identifier": {
            "PURL": "pkg:npm/%40svgr/babel-plugin-transform-svg-component@8.0.0",
            "UID": "888688680008b8e1",
            "BOMRef": "pkg:npm/%40svgr/babel-plugin-transform-svg-component@8.0.0"
          },
          "Version": "8.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@svgr/babel-preset@8.1.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@svgr/babel-preset@8.1.0",
          "Name": "@svgr/babel-preset",
          "Identifier": {
            "PURL": "pkg:npm/%40svgr/babel-preset@8.1.0",
            "UID": "b0f288a7dabca65e",
            "BOMRef": "pkg:npm/%40svgr/babel-preset@8.1.0"
          },
          "Version": "8.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@svgr/core@8.1.0",
            "@svgr/plugin-jsx@8.1.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@svgr/core@8.1.0",
          "Name": "@svgr/core",
          "Identifier": {
            "PURL": "pkg:npm/%40svgr/core@8.1.0",
            "UID": "f3b21b20a34a551",
            "BOMRef": "pkg:npm/%40svgr/core@8.1.0"
          },
          "Version": "8.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@svgr/plugin-jsx@8.1.0",
            "vite-plugin-svgr@4.3.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@svgr/hast-util-to-babel-ast@8.0.0",
          "Name": "@svgr/hast-util-to-babel-ast",
          "Identifier": {
            "PURL": "pkg:npm/%40svgr/hast-util-to-babel-ast@8.0.0",
            "UID": "c25eaac353ff9db6",
            "BOMRef": "pkg:npm/%40svgr/hast-util-to-babel-ast@8.0.0"
          },
          "Version": "8.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@svgr/plugin-jsx@8.1.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@svgr/plugin-jsx@8.1.0",
          "Name": "@svgr/plugin-jsx",
          "Identifier": {
            "PURL": "pkg:npm/%40svgr/plugin-jsx@8.1.0",
            "UID": "9b9731572938ccf2",
            "BOMRef": "pkg:npm/%40svgr/plugin-jsx@8.1.0"
          },
          "Version": "8.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "vite-plugin-svgr@4.3.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@tailwindcss/cli@4.1.11",
          "Name": "@tailwindcss/cli",
          "Identifier": {
            "PURL": "pkg:npm/%40tailwindcss/cli@4.1.11",
            "UID": "99b5f38fa6bc209a",
            "BOMRef": "pkg:npm/%40tailwindcss/cli@4.1.11"
          },
          "Version": "4.1.11",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@uppy/components@0.2.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@tailwindcss/node@4.1.11",
          "Name": "@tailwindcss/node",
          "Identifier": {
            "PURL": "pkg:npm/%40tailwindcss/node@4.1.11",
            "UID": "53a49005ea2ac6f",
            "BOMRef": "pkg:npm/%40tailwindcss/node@4.1.11"
          },
          "Version": "4.1.11",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@tailwindcss/cli@4.1.11"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@tailwindcss/oxide@4.1.11",
          "Name": "@tailwindcss/oxide",
          "Identifier": {
            "PURL": "pkg:npm/%40tailwindcss/oxide@4.1.11",
            "UID": "59f136c701d12412",
            "BOMRef": "pkg:npm/%40tailwindcss/oxide@4.1.11"
          },
          "Version": "4.1.11",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@tailwindcss/cli@4.1.11"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@tailwindcss/oxide-linux-x64-gnu@4.1.11",
          "Name": "@tailwindcss/oxide-linux-x64-gnu",
          "Identifier": {
            "PURL": "pkg:npm/%40tailwindcss/oxide-linux-x64-gnu@4.1.11",
            "UID": "e8fda1663049d856",
            "BOMRef": "pkg:npm/%40tailwindcss/oxide-linux-x64-gnu@4.1.11"
          },
          "Version": "4.1.11",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@tailwindcss/oxide@4.1.11"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@testing-library/dom@10.4.0",
          "Name": "@testing-library/dom",
          "Identifier": {
            "PURL": "pkg:npm/%40testing-library/dom@10.4.0",
            "UID": "ba7946d71837d32",
            "BOMRef": "pkg:npm/%40testing-library/dom@10.4.0"
          },
          "Version": "10.4.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@testing-library/user-event@13.5.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@testing-library/dom@8.20.1",
          "Name": "@testing-library/dom",
          "Identifier": {
            "PURL": "pkg:npm/%40testing-library/dom@8.20.1",
            "UID": "f5e8717195536689",
            "BOMRef": "pkg:npm/%40testing-library/dom@8.20.1"
          },
          "Version": "8.20.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@testing-library/react@13.4.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@testing-library/jest-dom@5.17.0",
          "Name": "@testing-library/jest-dom",
          "Identifier": {
            "PURL": "pkg:npm/%40testing-library/jest-dom@5.17.0",
            "UID": "ee014139822b7b6a",
            "BOMRef": "pkg:npm/%40testing-library/jest-dom@5.17.0"
          },
          "Version": "5.17.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@testing-library/react@13.4.0",
          "Name": "@testing-library/react",
          "Identifier": {
            "PURL": "pkg:npm/%40testing-library/react@13.4.0",
            "UID": "f5053d3e2bbc9f0d",
            "BOMRef": "pkg:npm/%40testing-library/react@13.4.0"
          },
          "Version": "13.4.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@testing-library/user-event@13.5.0",
          "Name": "@testing-library/user-event",
          "Identifier": {
            "PURL": "pkg:npm/%40testing-library/user-event@13.5.0",
            "UID": "be68ce3e12be3e4c",
            "BOMRef": "pkg:npm/%40testing-library/user-event@13.5.0"
          },
          "Version": "13.5.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@textea/json-viewer@2.17.2",
          "Name": "@textea/json-viewer",
          "Identifier": {
            "PURL": "pkg:npm/%40textea/json-viewer@2.17.2",
            "UID": "68941df3d10119d2",
            "BOMRef": "pkg:npm/%40textea/json-viewer@2.17.2"
          },
          "Version": "2.17.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@tootallnate/once@2.0.0",
          "Name": "@tootallnate/once",
          "Identifier": {
            "PURL": "pkg:npm/%40tootallnate/once@2.0.0",
            "UID": "5e84319018d8010b",
            "BOMRef": "pkg:npm/%40tootallnate/once@2.0.0"
          },
          "Version": "2.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "http-proxy-agent@5.0.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@transloadit/prettier-bytes@0.3.5",
          "Name": "@transloadit/prettier-bytes",
          "Identifier": {
            "PURL": "pkg:npm/%40transloadit/prettier-bytes@0.3.5",
            "UID": "aec606109e8b9ea8",
            "BOMRef": "pkg:npm/%40transloadit/prettier-bytes@0.3.5"
          },
          "Version": "0.3.5",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@uppy/core@4.4.7",
            "@uppy/dashboard@4.3.4",
            "@uppy/status-bar@4.1.3"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@tweenjs/tween.js@25.0.0",
          "Name": "@tweenjs/tween.js",
          "Identifier": {
            "PURL": "pkg:npm/%40tweenjs/tween.js@25.0.0",
            "UID": "1fb1091ed8bc00d0",
            "BOMRef": "pkg:npm/%40tweenjs/tween.js@25.0.0"
          },
          "Version": "25.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "force-graph@1.50.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@types/acorn@4.0.6",
          "Name": "@types/acorn",
          "Identifier": {
            "PURL": "pkg:npm/%40types/acorn@4.0.6",
            "UID": "a25377a9658c6501",
            "BOMRef": "pkg:npm/%40types/acorn@4.0.6"
          },
          "Version": "4.0.6",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "micromark-extension-mdx-jsx@1.0.5",
            "micromark-util-events-to-acorn@1.2.3"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@types/aria-query@5.0.4",
          "Name": "@types/aria-query",
          "Identifier": {
            "PURL": "pkg:npm/%40types/aria-query@5.0.4",
            "UID": "bc6b69b9e54da97b",
            "BOMRef": "pkg:npm/%40types/aria-query@5.0.4"
          },
          "Version": "5.0.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@testing-library/dom@10.4.0",
            "@testing-library/dom@8.20.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@types/babel__core@7.20.5",
          "Name": "@types/babel__core",
          "Identifier": {
            "PURL": "pkg:npm/%40types/babel__core@7.20.5",
            "UID": "2447269036be37a1",
            "BOMRef": "pkg:npm/%40types/babel__core@7.20.5"
          },
          "Version": "7.20.5",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@vitejs/plugin-react@4.6.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@types/babel__generator@7.27.0",
          "Name": "@types/babel__generator",
          "Identifier": {
            "PURL": "pkg:npm/%40types/babel__generator@7.27.0",
            "UID": "223c678e9ca7fca3",
            "BOMRef": "pkg:npm/%40types/babel__generator@7.27.0"
          },
          "Version": "7.27.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@types/babel__core@7.20.5"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@types/babel__template@7.4.4",
          "Name": "@types/babel__template",
          "Identifier": {
            "PURL": "pkg:npm/%40types/babel__template@7.4.4",
            "UID": "d86725aeb49bbaff",
            "BOMRef": "pkg:npm/%40types/babel__template@7.4.4"
          },
          "Version": "7.4.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@types/babel__core@7.20.5"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@types/babel__traverse@7.20.7",
          "Name": "@types/babel__traverse",
          "Identifier": {
            "PURL": "pkg:npm/%40types/babel__traverse@7.20.7",
            "UID": "ea26e29a009b1711",
            "BOMRef": "pkg:npm/%40types/babel__traverse@7.20.7"
          },
          "Version": "7.20.7",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@types/babel__core@7.20.5"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@types/chai@5.2.2",
          "Name": "@types/chai",
          "Identifier": {
            "PURL": "pkg:npm/%40types/chai@5.2.2",
            "UID": "d86d1ed2d6f78aec",
            "BOMRef": "pkg:npm/%40types/chai@5.2.2"
          },
          "Version": "5.2.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@vitest/expect@3.2.4",
            "vitest@3.2.4"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@types/debug@4.1.12",
          "Name": "@types/debug",
          "Identifier": {
            "PURL": "pkg:npm/%40types/debug@4.1.12",
            "UID": "36120cf42fe1136e",
            "BOMRef": "pkg:npm/%40types/debug@4.1.12"
          },
          "Version": "4.1.12",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "micromark@3.2.0",
            "vitest@3.2.4"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@types/deep-eql@4.0.2",
          "Name": "@types/deep-eql",
          "Identifier": {
            "PURL": "pkg:npm/%40types/deep-eql@4.0.2",
            "UID": "98cf817a0eccda5c",
            "BOMRef": "pkg:npm/%40types/deep-eql@4.0.2"
          },
          "Version": "4.0.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@types/chai@5.2.2"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@types/eslint@8.56.12",
          "Name": "@types/eslint",
          "Identifier": {
            "PURL": "pkg:npm/%40types/eslint@8.56.12",
            "UID": "edbcacc0ae033e2b",
            "BOMRef": "pkg:npm/%40types/eslint@8.56.12"
          },
          "Version": "8.56.12",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "vite-plugin-eslint@1.8.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@types/estree@1.0.8",
          "Name": "@types/estree",
          "Identifier": {
            "PURL": "pkg:npm/%40types/estree@1.0.8",
            "UID": "1d7158602528edfa",
            "BOMRef": "pkg:npm/%40types/estree@1.0.8"
          },
          "Version": "1.0.8",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@rollup/pluginutils@5.2.0",
            "@types/acorn@4.0.6",
            "@types/eslint@8.56.12",
            "@types/estree-jsx@1.0.5",
            "estree-util-attach-comments@2.1.1",
            "estree-walker@3.0.3",
            "hast-util-to-estree@2.3.3",
            "is-reference@3.0.3",
            "micromark-extension-mdx-expression@1.0.8",
            "micromark-extension-mdx-jsx@1.0.5",
            "micromark-extension-mdxjs-esm@1.0.5",
            "micromark-factory-mdx-expression@1.0.9",
            "micromark-util-events-to-acorn@1.2.3",
            "periscopic@3.1.0",
            "rollup@4.44.2"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@types/estree-jsx@1.0.5",
          "Name": "@types/estree-jsx",
          "Identifier": {
            "PURL": "pkg:npm/%40types/estree-jsx@1.0.5",
            "UID": "64de211b404b69c9",
            "BOMRef": "pkg:npm/%40types/estree-jsx@1.0.5"
          },
          "Version": "1.0.5",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mdx-js/mdx@2.3.0",
            "estree-util-build-jsx@2.2.2",
            "estree-util-to-js@1.2.0",
            "estree-util-visit@1.2.1",
            "hast-util-to-estree@2.3.3",
            "mdast-util-mdx-expression@1.3.2",
            "mdast-util-mdx-jsx@2.1.4",
            "mdast-util-mdxjs-esm@1.3.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@types/hast@2.3.10",
          "Name": "@types/hast",
          "Identifier": {
            "PURL": "pkg:npm/%40types/hast@2.3.10",
            "UID": "d0985db7f0b41e62",
            "BOMRef": "pkg:npm/%40types/hast@2.3.10"
          },
          "Version": "2.3.10",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "hast-util-to-estree@2.3.3",
            "mdast-util-mdx-expression@1.3.2",
            "mdast-util-mdx-jsx@2.1.4",
            "mdast-util-mdxjs-esm@1.3.1",
            "mdast-util-to-hast@12.3.0",
            "remark-rehype@10.1.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@types/istanbul-lib-coverage@2.0.6",
          "Name": "@types/istanbul-lib-coverage",
          "Identifier": {
            "PURL": "pkg:npm/%40types/istanbul-lib-coverage@2.0.6",
            "UID": "9a078186abb3d949",
            "BOMRef": "pkg:npm/%40types/istanbul-lib-coverage@2.0.6"
          },
          "Version": "2.0.6",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@jest/types@30.0.1",
            "@types/istanbul-lib-report@3.0.3"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@types/istanbul-lib-report@3.0.3",
          "Name": "@types/istanbul-lib-report",
          "Identifier": {
            "PURL": "pkg:npm/%40types/istanbul-lib-report@3.0.3",
            "UID": "9a97edf7df4fd1c4",
            "BOMRef": "pkg:npm/%40types/istanbul-lib-report@3.0.3"
          },
          "Version": "3.0.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@types/istanbul-reports@3.0.4"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@types/istanbul-reports@3.0.4",
          "Name": "@types/istanbul-reports",
          "Identifier": {
            "PURL": "pkg:npm/%40types/istanbul-reports@3.0.4",
            "UID": "2f66826748c6092d",
            "BOMRef": "pkg:npm/%40types/istanbul-reports@3.0.4"
          },
          "Version": "3.0.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@jest/types@30.0.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@types/jest@30.0.0",
          "Name": "@types/jest",
          "Identifier": {
            "PURL": "pkg:npm/%40types/jest@30.0.0",
            "UID": "712ed7b44ac1b7ad",
            "BOMRef": "pkg:npm/%40types/jest@30.0.0"
          },
          "Version": "30.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@types/testing-library__jest-dom@5.14.9"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@types/json-schema@7.0.15",
          "Name": "@types/json-schema",
          "Identifier": {
            "PURL": "pkg:npm/%40types/json-schema@7.0.15",
            "UID": "8b30ae02bd074f5d",
            "BOMRef": "pkg:npm/%40types/json-schema@7.0.15"
          },
          "Version": "7.0.15",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@types/eslint@8.56.12"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@types/mdast@3.0.15",
          "Name": "@types/mdast",
          "Identifier": {
            "PURL": "pkg:npm/%40types/mdast@3.0.15",
            "UID": "2ed71d2befed52d0",
            "BOMRef": "pkg:npm/%40types/mdast@3.0.15"
          },
          "Version": "3.0.15",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "mdast-util-definitions@5.1.2",
            "mdast-util-from-markdown@1.3.1",
            "mdast-util-mdx-expression@1.3.2",
            "mdast-util-mdx-jsx@2.1.4",
            "mdast-util-mdxjs-esm@1.3.1",
            "mdast-util-phrasing@3.0.1",
            "mdast-util-to-hast@12.3.0",
            "mdast-util-to-markdown@1.5.0",
            "mdast-util-to-string@3.2.0",
            "remark-parse@10.0.2",
            "remark-rehype@10.1.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@types/mdx@2.0.13",
          "Name": "@types/mdx",
          "Identifier": {
            "PURL": "pkg:npm/%40types/mdx@2.0.13",
            "UID": "3488e0fac0fe678c",
            "BOMRef": "pkg:npm/%40types/mdx@2.0.13"
          },
          "Version": "2.0.13",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mdx-js/mdx@2.3.0",
            "@mdx-js/react@2.3.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@types/ms@2.1.0",
          "Name": "@types/ms",
          "Identifier": {
            "PURL": "pkg:npm/%40types/ms@2.1.0",
            "UID": "5b48a2842b11e046",
            "BOMRef": "pkg:npm/%40types/ms@2.1.0"
          },
          "Version": "2.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@types/debug@4.1.12"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@types/node@24.0.10",
          "Name": "@types/node",
          "Identifier": {
            "PURL": "pkg:npm/%40types/node@24.0.10",
            "UID": "ee29106fbf09eae",
            "BOMRef": "pkg:npm/%40types/node@24.0.10"
          },
          "Version": "24.0.10",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@jest/pattern@30.0.1",
            "@jest/types@30.0.1",
            "jest-mock@30.0.2",
            "jest-util@30.0.2",
            "vite@6.4.1",
            "vitest@3.2.4"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@types/parse-json@4.0.2",
          "Name": "@types/parse-json",
          "Identifier": {
            "PURL": "pkg:npm/%40types/parse-json@4.0.2",
            "UID": "39b526d1f9eda5ac",
            "BOMRef": "pkg:npm/%40types/parse-json@4.0.2"
          },
          "Version": "4.0.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "cosmiconfig@7.1.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@types/prismjs@1.26.5",
          "Name": "@types/prismjs",
          "Identifier": {
            "PURL": "pkg:npm/%40types/prismjs@1.26.5",
            "UID": "529b0640469c6417",
            "BOMRef": "pkg:npm/%40types/prismjs@1.26.5"
          },
          "Version": "1.26.5",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "prism-react-renderer@2.4.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@types/prop-types@15.7.15",
          "Name": "@types/prop-types",
          "Identifier": {
            "PURL": "pkg:npm/%40types/prop-types@15.7.15",
            "UID": "4a3d0ca79849631a",
            "BOMRef": "pkg:npm/%40types/prop-types@15.7.15"
          },
          "Version": "15.7.15",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mui/utils@5.17.1",
            "@mui/utils@7.2.0",
            "@types/react@18.3.23"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@types/react@18.3.23",
          "Name": "@types/react",
          "Identifier": {
            "PURL": "pkg:npm/%40types/react@18.3.23",
            "UID": "8f3f336515fdfed8",
            "BOMRef": "pkg:npm/%40types/react@18.3.23"
          },
          "Version": "18.3.23",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mdx-js/react@2.3.0",
            "@mui/icons-material@7.2.0",
            "@mui/material@5.17.1",
            "@mui/material@7.2.0",
            "@mui/private-theming@5.17.1",
            "@mui/private-theming@7.2.0",
            "@mui/system@5.17.1",
            "@mui/system@7.2.0",
            "@mui/types@7.2.24",
            "@mui/types@7.4.4",
            "@mui/utils@5.17.1",
            "@mui/utils@7.2.0",
            "@types/react-dom@18.3.7",
            "@types/react-transition-group@4.4.12",
            "mui-chips-input@7.0.1",
            "react-archer@4.4.0",
            "zustand@4.5.7"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@types/react-dom@18.3.7",
          "Name": "@types/react-dom",
          "Identifier": {
            "PURL": "pkg:npm/%40types/react-dom@18.3.7",
            "UID": "f2131227c9bdb778",
            "BOMRef": "pkg:npm/%40types/react-dom@18.3.7"
          },
          "Version": "18.3.7",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@testing-library/react@13.4.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@types/react-transition-group@4.4.12",
          "Name": "@types/react-transition-group",
          "Identifier": {
            "PURL": "pkg:npm/%40types/react-transition-group@4.4.12",
            "UID": "dd60096e65fbcdd2",
            "BOMRef": "pkg:npm/%40types/react-transition-group@4.4.12"
          },
          "Version": "4.4.12",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mui/material@5.17.1",
            "@mui/material@7.2.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@types/retry@0.12.2",
          "Name": "@types/retry",
          "Identifier": {
            "PURL": "pkg:npm/%40types/retry@0.12.2",
            "UID": "6e152644cba92f20",
            "BOMRef": "pkg:npm/%40types/retry@0.12.2"
          },
          "Version": "0.12.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "p-retry@6.2.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@types/stack-utils@2.0.3",
          "Name": "@types/stack-utils",
          "Identifier": {
            "PURL": "pkg:npm/%40types/stack-utils@2.0.3",
            "UID": "8e681daec53f2fcb",
            "BOMRef": "pkg:npm/%40types/stack-utils@2.0.3"
          },
          "Version": "2.0.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "jest-message-util@30.0.2"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@types/testing-library__jest-dom@5.14.9",
          "Name": "@types/testing-library__jest-dom",
          "Identifier": {
            "PURL": "pkg:npm/%40types/testing-library__jest-dom@5.14.9",
            "UID": "40e5bf68d862c54e",
            "BOMRef": "pkg:npm/%40types/testing-library__jest-dom@5.14.9"
          },
          "Version": "5.14.9",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@testing-library/jest-dom@5.17.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@types/unist@2.0.11",
          "Name": "@types/unist",
          "Identifier": {
            "PURL": "pkg:npm/%40types/unist@2.0.11",
            "UID": "4577ab47efbea9d",
            "BOMRef": "pkg:npm/%40types/unist@2.0.11"
          },
          "Version": "2.0.11",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "unist-util-visit-parents@5.1.3",
            "unist-util-visit-parents@5.1.3",
            "unist-util-visit-parents@5.1.3",
            "unist-util-visit-parents@5.1.3",
            "unist-util-visit-parents@5.1.3",
            "unist-util-visit@4.1.2",
            "unist-util-visit@4.1.2",
            "unist-util-visit@4.1.2",
            "unist-util-visit@4.1.2",
            "unist-util-visit@4.1.2",
            "@types/hast@2.3.10",
            "@types/mdast@3.0.15",
            "estree-util-visit@1.2.1",
            "hast-util-to-estree@2.3.3",
            "mdast-util-definitions@5.1.2",
            "mdast-util-from-markdown@1.3.1",
            "mdast-util-mdx-jsx@2.1.4",
            "mdast-util-to-markdown@1.5.0",
            "micromark-util-events-to-acorn@1.2.3",
            "parse-entities@4.0.2",
            "unified@10.1.2",
            "unist-util-is@5.2.1",
            "unist-util-position-from-estree@1.1.2",
            "unist-util-position@4.0.4",
            "unist-util-remove-position@4.0.2",
            "unist-util-stringify-position@3.0.3",
            "vfile-message@3.1.4",
            "vfile@5.3.7"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@types/unist@3.0.3",
          "Name": "@types/unist",
          "Identifier": {
            "PURL": "pkg:npm/%40types/unist@3.0.3",
            "UID": "98ebcebc38e6120c",
            "BOMRef": "730221f9-8893-428d-97e2-6dadac245372"
          },
          "Version": "3.0.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "unist-util-is@6.0.0",
            "unist-util-is@6.0.0",
            "unist-util-visit-parents@6.0.1",
            "unist-util-visit@5.0.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@types/unist@3.0.3",
          "Name": "@types/unist",
          "Identifier": {
            "PURL": "pkg:npm/%40types/unist@3.0.3",
            "UID": "64b8366c291d7e97",
            "BOMRef": "391e0b3c-a67c-41a5-b250-4c246a9d69d2"
          },
          "Version": "3.0.3",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@types/yargs@17.0.33",
          "Name": "@types/yargs",
          "Identifier": {
            "PURL": "pkg:npm/%40types/yargs@17.0.33",
            "UID": "f0e376834d70e669",
            "BOMRef": "pkg:npm/%40types/yargs@17.0.33"
          },
          "Version": "17.0.33",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@jest/types@30.0.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@types/yargs-parser@21.0.3",
          "Name": "@types/yargs-parser",
          "Identifier": {
            "PURL": "pkg:npm/%40types/yargs-parser@21.0.3",
            "UID": "a59e07d881e6e685",
            "BOMRef": "pkg:npm/%40types/yargs-parser@21.0.3"
          },
          "Version": "21.0.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@types/yargs@17.0.33"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@ungap/structured-clone@1.3.0",
          "Name": "@ungap/structured-clone",
          "Identifier": {
            "PURL": "pkg:npm/%40ungap/structured-clone@1.3.0",
            "UID": "6c8d795b377745bb",
            "BOMRef": "pkg:npm/%40ungap/structured-clone@1.3.0"
          },
          "Version": "1.3.0",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "eslint@8.57.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@uppy/companion-client@4.4.2",
          "Name": "@uppy/companion-client",
          "Identifier": {
            "PURL": "pkg:npm/%40uppy/companion-client@4.4.2",
            "UID": "8ccca7c2b1cfc7e8",
            "BOMRef": "pkg:npm/%40uppy/companion-client@4.4.2"
          },
          "Version": "4.4.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@uppy/xhr-upload@4.3.3"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@uppy/components@0.2.0",
          "Name": "@uppy/components",
          "Identifier": {
            "PURL": "pkg:npm/%40uppy/components@0.2.0",
            "UID": "efd783c2a6fc0f51",
            "BOMRef": "pkg:npm/%40uppy/components@0.2.0"
          },
          "Version": "0.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@uppy/react@4.4.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@uppy/core@4.4.7",
          "Name": "@uppy/core",
          "Identifier": {
            "PURL": "pkg:npm/%40uppy/core@4.4.7",
            "UID": "491c6bb9c88c6dbc",
            "BOMRef": "pkg:npm/%40uppy/core@4.4.7"
          },
          "Version": "4.4.7",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@uppy/companion-client@4.4.2",
            "@uppy/components@0.2.0",
            "@uppy/dashboard@4.3.4",
            "@uppy/drag-drop@4.1.3",
            "@uppy/informer@4.2.1",
            "@uppy/progress-bar@4.2.1",
            "@uppy/provider-views@4.4.5",
            "@uppy/react@4.4.0",
            "@uppy/status-bar@4.1.3",
            "@uppy/thumbnail-generator@4.1.1",
            "@uppy/xhr-upload@4.3.3",
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@uppy/dashboard@4.3.4",
          "Name": "@uppy/dashboard",
          "Identifier": {
            "PURL": "pkg:npm/%40uppy/dashboard@4.3.4",
            "UID": "adaa045f99192887",
            "BOMRef": "pkg:npm/%40uppy/dashboard@4.3.4"
          },
          "Version": "4.3.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@uppy/react@4.4.0",
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@uppy/drag-drop@4.1.3",
          "Name": "@uppy/drag-drop",
          "Identifier": {
            "PURL": "pkg:npm/%40uppy/drag-drop@4.1.3",
            "UID": "a1554fd76aeadc20",
            "BOMRef": "pkg:npm/%40uppy/drag-drop@4.1.3"
          },
          "Version": "4.1.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@uppy/react@4.4.0",
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@uppy/informer@4.2.1",
          "Name": "@uppy/informer",
          "Identifier": {
            "PURL": "pkg:npm/%40uppy/informer@4.2.1",
            "UID": "5225a9120a3452a8",
            "BOMRef": "pkg:npm/%40uppy/informer@4.2.1"
          },
          "Version": "4.2.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@uppy/dashboard@4.3.4"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@uppy/progress-bar@4.2.1",
          "Name": "@uppy/progress-bar",
          "Identifier": {
            "PURL": "pkg:npm/%40uppy/progress-bar@4.2.1",
            "UID": "f63b9bf0adb5ccfc",
            "BOMRef": "pkg:npm/%40uppy/progress-bar@4.2.1"
          },
          "Version": "4.2.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@uppy/react@4.4.0",
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@uppy/provider-views@4.4.5",
          "Name": "@uppy/provider-views",
          "Identifier": {
            "PURL": "pkg:npm/%40uppy/provider-views@4.4.5",
            "UID": "9d40075e02368b01",
            "BOMRef": "pkg:npm/%40uppy/provider-views@4.4.5"
          },
          "Version": "4.4.5",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@uppy/dashboard@4.3.4"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@uppy/react@4.4.0",
          "Name": "@uppy/react",
          "Identifier": {
            "PURL": "pkg:npm/%40uppy/react@4.4.0",
            "UID": "6d073cf9c98455d7",
            "BOMRef": "pkg:npm/%40uppy/react@4.4.0"
          },
          "Version": "4.4.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@uppy/status-bar@4.1.3",
          "Name": "@uppy/status-bar",
          "Identifier": {
            "PURL": "pkg:npm/%40uppy/status-bar@4.1.3",
            "UID": "eaeb2a3f772e014",
            "BOMRef": "pkg:npm/%40uppy/status-bar@4.1.3"
          },
          "Version": "4.1.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@uppy/dashboard@4.3.4",
            "@uppy/react@4.4.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@uppy/store-default@4.2.0",
          "Name": "@uppy/store-default",
          "Identifier": {
            "PURL": "pkg:npm/%40uppy/store-default@4.2.0",
            "UID": "7aed8957601115de",
            "BOMRef": "pkg:npm/%40uppy/store-default@4.2.0"
          },
          "Version": "4.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@uppy/core@4.4.7"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@uppy/thumbnail-generator@4.1.1",
          "Name": "@uppy/thumbnail-generator",
          "Identifier": {
            "PURL": "pkg:npm/%40uppy/thumbnail-generator@4.1.1",
            "UID": "75c6e5c4decee11",
            "BOMRef": "pkg:npm/%40uppy/thumbnail-generator@4.1.1"
          },
          "Version": "4.1.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@uppy/dashboard@4.3.4"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@uppy/utils@6.1.5",
          "Name": "@uppy/utils",
          "Identifier": {
            "PURL": "pkg:npm/%40uppy/utils@6.1.5",
            "UID": "9a92a20bb6934157",
            "BOMRef": "pkg:npm/%40uppy/utils@6.1.5"
          },
          "Version": "6.1.5",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@uppy/companion-client@4.4.2",
            "@uppy/core@4.4.7",
            "@uppy/dashboard@4.3.4",
            "@uppy/drag-drop@4.1.3",
            "@uppy/informer@4.2.1",
            "@uppy/progress-bar@4.2.1",
            "@uppy/provider-views@4.4.5",
            "@uppy/react@4.4.0",
            "@uppy/status-bar@4.1.3",
            "@uppy/thumbnail-generator@4.1.1",
            "@uppy/xhr-upload@4.3.3"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@uppy/xhr-upload@4.3.3",
          "Name": "@uppy/xhr-upload",
          "Identifier": {
            "PURL": "pkg:npm/%40uppy/xhr-upload@4.3.3",
            "UID": "4c7ff8eb9a35a47f",
            "BOMRef": "pkg:npm/%40uppy/xhr-upload@4.3.3"
          },
          "Version": "4.3.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@vitejs/plugin-react@4.6.0",
          "Name": "@vitejs/plugin-react",
          "Identifier": {
            "PURL": "pkg:npm/%40vitejs/plugin-react@4.6.0",
            "UID": "1fcb2c23b903d30e",
            "BOMRef": "pkg:npm/%40vitejs/plugin-react@4.6.0"
          },
          "Version": "4.6.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@vitest/expect@3.2.4",
          "Name": "@vitest/expect",
          "Identifier": {
            "PURL": "pkg:npm/%40vitest/expect@3.2.4",
            "UID": "bd6e5658cc004150",
            "BOMRef": "pkg:npm/%40vitest/expect@3.2.4"
          },
          "Version": "3.2.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "vitest@3.2.4"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@vitest/mocker@3.2.4",
          "Name": "@vitest/mocker",
          "Identifier": {
            "PURL": "pkg:npm/%40vitest/mocker@3.2.4",
            "UID": "cdc5fb3ceb225c28",
            "BOMRef": "pkg:npm/%40vitest/mocker@3.2.4"
          },
          "Version": "3.2.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "vitest@3.2.4"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@vitest/pretty-format@3.2.4",
          "Name": "@vitest/pretty-format",
          "Identifier": {
            "PURL": "pkg:npm/%40vitest/pretty-format@3.2.4",
            "UID": "3bdd73fd02b2487b",
            "BOMRef": "pkg:npm/%40vitest/pretty-format@3.2.4"
          },
          "Version": "3.2.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@vitest/snapshot@3.2.4",
            "@vitest/utils@3.2.4",
            "vitest@3.2.4"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@vitest/runner@3.2.4",
          "Name": "@vitest/runner",
          "Identifier": {
            "PURL": "pkg:npm/%40vitest/runner@3.2.4",
            "UID": "a3359dee6d1baf48",
            "BOMRef": "pkg:npm/%40vitest/runner@3.2.4"
          },
          "Version": "3.2.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "vitest@3.2.4"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@vitest/snapshot@3.2.4",
          "Name": "@vitest/snapshot",
          "Identifier": {
            "PURL": "pkg:npm/%40vitest/snapshot@3.2.4",
            "UID": "a120c08691ed063c",
            "BOMRef": "pkg:npm/%40vitest/snapshot@3.2.4"
          },
          "Version": "3.2.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "vitest@3.2.4"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@vitest/spy@3.2.4",
          "Name": "@vitest/spy",
          "Identifier": {
            "PURL": "pkg:npm/%40vitest/spy@3.2.4",
            "UID": "2d8d5031c2aef559",
            "BOMRef": "pkg:npm/%40vitest/spy@3.2.4"
          },
          "Version": "3.2.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@vitest/expect@3.2.4",
            "@vitest/mocker@3.2.4",
            "vitest@3.2.4"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@vitest/utils@3.2.4",
          "Name": "@vitest/utils",
          "Identifier": {
            "PURL": "pkg:npm/%40vitest/utils@3.2.4",
            "UID": "ec784b6178b90d5f",
            "BOMRef": "pkg:npm/%40vitest/utils@3.2.4"
          },
          "Version": "3.2.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@vitest/expect@3.2.4",
            "@vitest/runner@3.2.4",
            "vitest@3.2.4"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "@webcam/core@1.0.1",
          "Name": "@webcam/core",
          "Identifier": {
            "PURL": "pkg:npm/%40webcam/core@1.0.1",
            "UID": "dd84adb921f7d0b3",
            "BOMRef": "pkg:npm/%40webcam/core@1.0.1"
          },
          "Version": "1.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@uppy/components@0.2.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "abab@2.0.6",
          "Name": "abab",
          "Identifier": {
            "PURL": "pkg:npm/abab@2.0.6",
            "UID": "a7ee21421b34b960",
            "BOMRef": "pkg:npm/abab@2.0.6"
          },
          "Version": "2.0.6",
          "Licenses": [
            "BSD-3-Clause"
          ],
          "DependsOn": [
            "data-urls@4.0.0",
            "jsdom@22.1.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "accessor-fn@1.5.3",
          "Name": "accessor-fn",
          "Identifier": {
            "PURL": "pkg:npm/accessor-fn@1.5.3",
            "UID": "912774a3e7fca923",
            "BOMRef": "pkg:npm/accessor-fn@1.5.3"
          },
          "Version": "1.5.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "force-graph@1.50.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "acorn@8.15.0",
          "Name": "acorn",
          "Identifier": {
            "PURL": "pkg:npm/acorn@8.15.0",
            "UID": "59c092b81d43515b",
            "BOMRef": "pkg:npm/acorn@8.15.0"
          },
          "Version": "8.15.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "acorn-jsx@5.3.2",
            "espree@9.6.1",
            "micromark-extension-mdxjs@1.0.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "acorn-jsx@5.3.2",
          "Name": "acorn-jsx",
          "Identifier": {
            "PURL": "pkg:npm/acorn-jsx@5.3.2",
            "UID": "c7646e07840ac61e",
            "BOMRef": "pkg:npm/acorn-jsx@5.3.2"
          },
          "Version": "5.3.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "espree@9.6.1",
            "micromark-extension-mdxjs@1.0.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "agent-base@6.0.2",
          "Name": "agent-base",
          "Identifier": {
            "PURL": "pkg:npm/agent-base@6.0.2",
            "UID": "3e484d4bea258297",
            "BOMRef": "pkg:npm/agent-base@6.0.2"
          },
          "Version": "6.0.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "http-proxy-agent@5.0.0",
            "https-proxy-agent@5.0.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "ajv@6.12.6",
          "Name": "ajv",
          "Identifier": {
            "PURL": "pkg:npm/ajv@6.12.6",
            "UID": "27fdece1644204cc",
            "BOMRef": "pkg:npm/ajv@6.12.6"
          },
          "Version": "6.12.6",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@eslint/eslintrc@2.1.4",
            "eslint@8.57.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "ansi-regex@5.0.1",
          "Name": "ansi-regex",
          "Identifier": {
            "PURL": "pkg:npm/ansi-regex@5.0.1",
            "UID": "a220a4aafed6ada5",
            "BOMRef": "pkg:npm/ansi-regex@5.0.1"
          },
          "Version": "5.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "pretty-format@27.5.1",
            "strip-ansi@6.0.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "ansi-styles@4.3.0",
          "Name": "ansi-styles",
          "Identifier": {
            "PURL": "pkg:npm/ansi-styles@4.3.0",
            "UID": "3c61d57d0b9e9712",
            "BOMRef": "pkg:npm/ansi-styles@4.3.0"
          },
          "Version": "4.3.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "chalk@3.0.0",
            "chalk@4.1.2"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "ansi-styles@5.2.0",
          "Name": "ansi-styles",
          "Identifier": {
            "PURL": "pkg:npm/ansi-styles@5.2.0",
            "UID": "435babb2674ad294",
            "BOMRef": "18315750-fd78-4d04-83bb-cfe3178d7469"
          },
          "Version": "5.2.0",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "ansi-styles@5.2.0",
          "Name": "ansi-styles",
          "Identifier": {
            "PURL": "pkg:npm/ansi-styles@5.2.0",
            "UID": "5fc7891745fe66fb",
            "BOMRef": "e2e86c71-e668-4f89-8bef-7ef9172a14b0"
          },
          "Version": "5.2.0",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "ansi-styles@5.2.0",
          "Name": "ansi-styles",
          "Identifier": {
            "PURL": "pkg:npm/ansi-styles@5.2.0",
            "UID": "a117e4d3683e35d6",
            "BOMRef": "7ce2b331-abde-4cad-a73c-b77d4dfe04bb"
          },
          "Version": "5.2.0",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "ansi-styles@5.2.0",
          "Name": "ansi-styles",
          "Identifier": {
            "PURL": "pkg:npm/ansi-styles@5.2.0",
            "UID": "9cccfed07f3d8e28",
            "BOMRef": "9b041a65-311b-4706-8439-66081fd86828"
          },
          "Version": "5.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "pretty-format@30.0.2",
            "pretty-format@30.0.2",
            "pretty-format@30.0.2",
            "pretty-format@30.0.2",
            "pretty-format@27.5.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "ansi-styles@5.2.0",
          "Name": "ansi-styles",
          "Identifier": {
            "PURL": "pkg:npm/ansi-styles@5.2.0",
            "UID": "e9b37ab1d3bf9ed8",
            "BOMRef": "5e942bb0-e939-4b4a-8105-a9b2a2ea6154"
          },
          "Version": "5.2.0",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "argparse@2.0.1",
          "Name": "argparse",
          "Identifier": {
            "PURL": "pkg:npm/argparse@2.0.1",
            "UID": "9d2585d24172460",
            "BOMRef": "pkg:npm/argparse@2.0.1"
          },
          "Version": "2.0.1",
          "Licenses": [
            "Python-2.0"
          ],
          "DependsOn": [
            "js-yaml@4.1.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "aria-query@5.1.3",
          "Name": "aria-query",
          "Identifier": {
            "PURL": "pkg:npm/aria-query@5.1.3",
            "UID": "3aa132f6916c9942",
            "BOMRef": "pkg:npm/aria-query@5.1.3"
          },
          "Version": "5.1.3",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "@testing-library/dom@8.20.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "aria-query@5.3.0",
          "Name": "aria-query",
          "Identifier": {
            "PURL": "pkg:npm/aria-query@5.3.0",
            "UID": "78c9f2e87fdc575f",
            "BOMRef": "pkg:npm/aria-query@5.3.0"
          },
          "Version": "5.3.0",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "@testing-library/dom@10.4.0",
            "@testing-library/jest-dom@5.17.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "array-buffer-byte-length@1.0.2",
          "Name": "array-buffer-byte-length",
          "Identifier": {
            "PURL": "pkg:npm/array-buffer-byte-length@1.0.2",
            "UID": "ea56c8bcd61cb4ad",
            "BOMRef": "pkg:npm/array-buffer-byte-length@1.0.2"
          },
          "Version": "1.0.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "arraybuffer.prototype.slice@1.0.4",
            "deep-equal@2.2.3",
            "es-abstract@1.24.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "array-includes@3.1.9",
          "Name": "array-includes",
          "Identifier": {
            "PURL": "pkg:npm/array-includes@3.1.9",
            "UID": "42355cfae2e92df0",
            "BOMRef": "pkg:npm/array-includes@3.1.9"
          },
          "Version": "3.1.9",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "eslint-plugin-react@7.37.5",
            "jsx-ast-utils@3.3.5"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "array.prototype.findlast@1.2.5",
          "Name": "array.prototype.findlast",
          "Identifier": {
            "PURL": "pkg:npm/array.prototype.findlast@1.2.5",
            "UID": "12041610c7cc1827",
            "BOMRef": "pkg:npm/array.prototype.findlast@1.2.5"
          },
          "Version": "1.2.5",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "eslint-plugin-react@7.37.5"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "array.prototype.flat@1.3.3",
          "Name": "array.prototype.flat",
          "Identifier": {
            "PURL": "pkg:npm/array.prototype.flat@1.3.3",
            "UID": "6807cf28faeb4267",
            "BOMRef": "pkg:npm/array.prototype.flat@1.3.3"
          },
          "Version": "1.3.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "jsx-ast-utils@3.3.5"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "array.prototype.flatmap@1.3.3",
          "Name": "array.prototype.flatmap",
          "Identifier": {
            "PURL": "pkg:npm/array.prototype.flatmap@1.3.3",
            "UID": "fa3dfeeeb1c5acc6",
            "BOMRef": "pkg:npm/array.prototype.flatmap@1.3.3"
          },
          "Version": "1.3.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "eslint-plugin-react@7.37.5"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "array.prototype.tosorted@1.1.4",
          "Name": "array.prototype.tosorted",
          "Identifier": {
            "PURL": "pkg:npm/array.prototype.tosorted@1.1.4",
            "UID": "fda15d606e192805",
            "BOMRef": "pkg:npm/array.prototype.tosorted@1.1.4"
          },
          "Version": "1.1.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "eslint-plugin-react@7.37.5"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "arraybuffer.prototype.slice@1.0.4",
          "Name": "arraybuffer.prototype.slice",
          "Identifier": {
            "PURL": "pkg:npm/arraybuffer.prototype.slice@1.0.4",
            "UID": "94959f965e9a8dfe",
            "BOMRef": "pkg:npm/arraybuffer.prototype.slice@1.0.4"
          },
          "Version": "1.0.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "es-abstract@1.24.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "assertion-error@2.0.1",
          "Name": "assertion-error",
          "Identifier": {
            "PURL": "pkg:npm/assertion-error@2.0.1",
            "UID": "c4df5281bab3d166",
            "BOMRef": "pkg:npm/assertion-error@2.0.1"
          },
          "Version": "2.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "chai@5.2.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "astring@1.9.0",
          "Name": "astring",
          "Identifier": {
            "PURL": "pkg:npm/astring@1.9.0",
            "UID": "52da8707b67f1126",
            "BOMRef": "pkg:npm/astring@1.9.0"
          },
          "Version": "1.9.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "estree-util-to-js@1.2.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "async-function@1.0.0",
          "Name": "async-function",
          "Identifier": {
            "PURL": "pkg:npm/async-function@1.0.0",
            "UID": "b99feecc42a5d3f1",
            "BOMRef": "pkg:npm/async-function@1.0.0"
          },
          "Version": "1.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "is-async-function@2.1.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "asynckit@0.4.0",
          "Name": "asynckit",
          "Identifier": {
            "PURL": "pkg:npm/asynckit@0.4.0",
            "UID": "7d99e3f1a5382933",
            "BOMRef": "pkg:npm/asynckit@0.4.0"
          },
          "Version": "0.4.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "form-data@4.0.4"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "autocomplete-openapi@0.1.6",
          "Name": "autocomplete-openapi",
          "Identifier": {
            "PURL": "pkg:npm/autocomplete-openapi@0.1.6",
            "UID": "a2b32a23581cec13",
            "BOMRef": "pkg:npm/autocomplete-openapi@0.1.6"
          },
          "Version": "0.1.6",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "available-typed-arrays@1.0.7",
          "Name": "available-typed-arrays",
          "Identifier": {
            "PURL": "pkg:npm/available-typed-arrays@1.0.7",
            "UID": "41841d1cf48adc93",
            "BOMRef": "pkg:npm/available-typed-arrays@1.0.7"
          },
          "Version": "1.0.7",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "es-abstract@1.24.0",
            "typed-array-byte-offset@1.0.4",
            "which-typed-array@1.1.19"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "axios@1.12.2",
          "Name": "axios",
          "Identifier": {
            "PURL": "pkg:npm/axios@1.12.2",
            "UID": "30bfb376cd531fb5",
            "BOMRef": "pkg:npm/axios@1.12.2"
          },
          "Version": "1.12.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "openapi-client-axios@7.6.0",
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "babel-plugin-macros@3.1.0",
          "Name": "babel-plugin-macros",
          "Identifier": {
            "PURL": "pkg:npm/babel-plugin-macros@3.1.0",
            "UID": "e397b958d518eb0a",
            "BOMRef": "pkg:npm/babel-plugin-macros@3.1.0"
          },
          "Version": "3.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@emotion/babel-plugin@11.13.5"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "bail@2.0.2",
          "Name": "bail",
          "Identifier": {
            "PURL": "pkg:npm/bail@2.0.2",
            "UID": "194fdb16d2575fed",
            "BOMRef": "pkg:npm/bail@2.0.2"
          },
          "Version": "2.0.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "unified@10.1.2"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "balanced-match@1.0.2",
          "Name": "balanced-match",
          "Identifier": {
            "PURL": "pkg:npm/balanced-match@1.0.2",
            "UID": "ec4270626f5633dc",
            "BOMRef": "pkg:npm/balanced-match@1.0.2"
          },
          "Version": "1.0.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "brace-expansion@1.1.12"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "bath-es5@3.0.3",
          "Name": "bath-es5",
          "Identifier": {
            "PURL": "pkg:npm/bath-es5@3.0.3",
            "UID": "ebdd1c991a1dbb96",
            "BOMRef": "pkg:npm/bath-es5@3.0.3"
          },
          "Version": "3.0.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "openapi-client-axios@7.6.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "bezier-js@6.1.4",
          "Name": "bezier-js",
          "Identifier": {
            "PURL": "pkg:npm/bezier-js@6.1.4",
            "UID": "bf1b3676e80bb3f5",
            "BOMRef": "pkg:npm/bezier-js@6.1.4"
          },
          "Version": "6.1.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "force-graph@1.50.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "brace-expansion@1.1.12",
          "Name": "brace-expansion",
          "Identifier": {
            "PURL": "pkg:npm/brace-expansion@1.1.12",
            "UID": "5393bada3cbc98c5",
            "BOMRef": "pkg:npm/brace-expansion@1.1.12"
          },
          "Version": "1.1.12",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "minimatch@3.1.2"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "braces@3.0.3",
          "Name": "braces",
          "Identifier": {
            "PURL": "pkg:npm/braces@3.0.3",
            "UID": "184beabc3a13202c",
            "BOMRef": "pkg:npm/braces@3.0.3"
          },
          "Version": "3.0.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "micromatch@4.0.8"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "browserslist@4.25.1",
          "Name": "browserslist",
          "Identifier": {
            "PURL": "pkg:npm/browserslist@4.25.1",
            "UID": "79e3bd55263f353f",
            "BOMRef": "pkg:npm/browserslist@4.25.1"
          },
          "Version": "4.25.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@babel/helper-compilation-targets@7.27.2",
            "update-browserslist-db@1.1.3"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "cac@6.7.14",
          "Name": "cac",
          "Identifier": {
            "PURL": "pkg:npm/cac@6.7.14",
            "UID": "6198480820d03523",
            "BOMRef": "pkg:npm/cac@6.7.14"
          },
          "Version": "6.7.14",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "vite-node@3.2.4"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "call-bind@1.0.8",
          "Name": "call-bind",
          "Identifier": {
            "PURL": "pkg:npm/call-bind@1.0.8",
            "UID": "9466394757c7d63e",
            "BOMRef": "pkg:npm/call-bind@1.0.8"
          },
          "Version": "1.0.8",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "array-includes@3.1.9",
            "array.prototype.findlast@1.2.5",
            "array.prototype.flat@1.3.3",
            "array.prototype.flatmap@1.3.3",
            "array.prototype.tosorted@1.1.4",
            "arraybuffer.prototype.slice@1.0.4",
            "deep-equal@2.2.3",
            "es-abstract@1.24.0",
            "es-get-iterator@1.1.3",
            "es-iterator-helpers@1.2.1",
            "function.prototype.name@1.1.8",
            "is-array-buffer@3.0.5",
            "object-is@1.1.6",
            "object.assign@4.1.7",
            "object.entries@1.1.9",
            "object.fromentries@2.0.8",
            "object.values@1.2.1",
            "reflect.getprototypeof@1.0.10",
            "regexp.prototype.flags@1.5.4",
            "safe-array-concat@1.1.3",
            "string.prototype.matchall@4.0.12",
            "string.prototype.trim@1.2.10",
            "string.prototype.trimend@1.0.9",
            "string.prototype.trimstart@1.0.8",
            "typed-array-byte-length@1.0.3",
            "typed-array-byte-offset@1.0.4",
            "typed-array-length@1.0.7",
            "which-typed-array@1.1.19"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "call-bind-apply-helpers@1.0.2",
          "Name": "call-bind-apply-helpers",
          "Identifier": {
            "PURL": "pkg:npm/call-bind-apply-helpers@1.0.2",
            "UID": "4b0f91c1b0005641",
            "BOMRef": "pkg:npm/call-bind-apply-helpers@1.0.2"
          },
          "Version": "1.0.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "call-bind@1.0.8",
            "call-bound@1.0.4",
            "dunder-proto@1.0.1",
            "get-intrinsic@1.3.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "call-bound@1.0.4",
          "Name": "call-bound",
          "Identifier": {
            "PURL": "pkg:npm/call-bound@1.0.4",
            "UID": "d82c78cf253481a0",
            "BOMRef": "pkg:npm/call-bound@1.0.4"
          },
          "Version": "1.0.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "array-buffer-byte-length@1.0.2",
            "array-includes@3.1.9",
            "data-view-buffer@1.0.2",
            "data-view-byte-length@1.0.2",
            "data-view-byte-offset@1.0.1",
            "es-abstract@1.24.0",
            "es-iterator-helpers@1.2.1",
            "function.prototype.name@1.1.8",
            "get-symbol-description@1.1.0",
            "is-arguments@1.2.0",
            "is-array-buffer@3.0.5",
            "is-async-function@2.1.1",
            "is-boolean-object@1.2.2",
            "is-data-view@1.0.2",
            "is-date-object@1.1.0",
            "is-finalizationregistry@1.1.1",
            "is-generator-function@1.1.0",
            "is-number-object@1.1.1",
            "is-regex@1.2.1",
            "is-shared-array-buffer@1.0.4",
            "is-string@1.1.1",
            "is-symbol@1.1.1",
            "is-weakref@1.1.1",
            "is-weakset@2.0.4",
            "object.assign@4.1.7",
            "object.entries@1.1.9",
            "object.values@1.2.1",
            "safe-array-concat@1.1.3",
            "safe-regex-test@1.1.0",
            "side-channel-map@1.0.1",
            "side-channel-weakmap@1.0.2",
            "string.prototype.matchall@4.0.12",
            "string.prototype.trim@1.2.10",
            "string.prototype.trimend@1.0.9",
            "typed-array-buffer@1.0.3",
            "unbox-primitive@1.1.0",
            "which-builtin-type@1.2.1",
            "which-typed-array@1.1.19"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "callsites@3.1.0",
          "Name": "callsites",
          "Identifier": {
            "PURL": "pkg:npm/callsites@3.1.0",
            "UID": "10c895de51fd0aea",
            "BOMRef": "pkg:npm/callsites@3.1.0"
          },
          "Version": "3.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "parent-module@1.0.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "camelcase@6.3.0",
          "Name": "camelcase",
          "Identifier": {
            "PURL": "pkg:npm/camelcase@6.3.0",
            "UID": "153ef7531f0e7645",
            "BOMRef": "pkg:npm/camelcase@6.3.0"
          },
          "Version": "6.3.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@svgr/core@8.1.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "caniuse-lite@1.0.30001726",
          "Name": "caniuse-lite",
          "Identifier": {
            "PURL": "pkg:npm/caniuse-lite@1.0.30001726",
            "UID": "ccc750fd99a6e11f",
            "BOMRef": "pkg:npm/caniuse-lite@1.0.30001726"
          },
          "Version": "1.0.30001726",
          "Licenses": [
            "CC-BY-4.0"
          ],
          "DependsOn": [
            "browserslist@4.25.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "canvas-color-tracker@1.3.2",
          "Name": "canvas-color-tracker",
          "Identifier": {
            "PURL": "pkg:npm/canvas-color-tracker@1.3.2",
            "UID": "98ff36000f97366a",
            "BOMRef": "pkg:npm/canvas-color-tracker@1.3.2"
          },
          "Version": "1.3.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "force-graph@1.50.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "ccount@2.0.1",
          "Name": "ccount",
          "Identifier": {
            "PURL": "pkg:npm/ccount@2.0.1",
            "UID": "7d1f46ed052363ff",
            "BOMRef": "pkg:npm/ccount@2.0.1"
          },
          "Version": "2.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "mdast-util-mdx-jsx@2.1.4"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "chai@5.2.0",
          "Name": "chai",
          "Identifier": {
            "PURL": "pkg:npm/chai@5.2.0",
            "UID": "f10635e58e7e157",
            "BOMRef": "pkg:npm/chai@5.2.0"
          },
          "Version": "5.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@vitest/expect@3.2.4",
            "vitest@3.2.4"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "chalk@3.0.0",
          "Name": "chalk",
          "Identifier": {
            "PURL": "pkg:npm/chalk@3.0.0",
            "UID": "e856036bdf3c1ce0",
            "BOMRef": "pkg:npm/chalk@3.0.0"
          },
          "Version": "3.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@testing-library/jest-dom@5.17.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "chalk@4.1.2",
          "Name": "chalk",
          "Identifier": {
            "PURL": "pkg:npm/chalk@4.1.2",
            "UID": "f717db16da11f20c",
            "BOMRef": "pkg:npm/chalk@4.1.2"
          },
          "Version": "4.1.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@jest/types@30.0.1",
            "@testing-library/dom@10.4.0",
            "@testing-library/dom@8.20.1",
            "eslint@8.57.1",
            "jest-diff@30.0.4",
            "jest-matcher-utils@30.0.4",
            "jest-message-util@30.0.2",
            "jest-util@30.0.2"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "character-entities@2.0.2",
          "Name": "character-entities",
          "Identifier": {
            "PURL": "pkg:npm/character-entities@2.0.2",
            "UID": "ccb6deb326ec382e",
            "BOMRef": "pkg:npm/character-entities@2.0.2"
          },
          "Version": "2.0.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "decode-named-character-reference@1.2.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "character-entities-html4@2.1.0",
          "Name": "character-entities-html4",
          "Identifier": {
            "PURL": "pkg:npm/character-entities-html4@2.1.0",
            "UID": "f5b4332204449f1e",
            "BOMRef": "pkg:npm/character-entities-html4@2.1.0"
          },
          "Version": "2.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "stringify-entities@4.0.4"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "character-entities-legacy@3.0.0",
          "Name": "character-entities-legacy",
          "Identifier": {
            "PURL": "pkg:npm/character-entities-legacy@3.0.0",
            "UID": "c07ba1f624e02702",
            "BOMRef": "pkg:npm/character-entities-legacy@3.0.0"
          },
          "Version": "3.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "parse-entities@4.0.2",
            "stringify-entities@4.0.4"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "character-reference-invalid@2.0.1",
          "Name": "character-reference-invalid",
          "Identifier": {
            "PURL": "pkg:npm/character-reference-invalid@2.0.1",
            "UID": "866a0bfb9cf773f7",
            "BOMRef": "pkg:npm/character-reference-invalid@2.0.1"
          },
          "Version": "2.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "parse-entities@4.0.2"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "chart.js@4.5.0",
          "Name": "chart.js",
          "Identifier": {
            "PURL": "pkg:npm/chart.js@4.5.0",
            "UID": "22d6613ed90d4030",
            "BOMRef": "pkg:npm/chart.js@4.5.0"
          },
          "Version": "4.5.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "check-error@2.1.1",
          "Name": "check-error",
          "Identifier": {
            "PURL": "pkg:npm/check-error@2.1.1",
            "UID": "c5080ab38153851",
            "BOMRef": "pkg:npm/check-error@2.1.1"
          },
          "Version": "2.1.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "chai@5.2.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "chownr@3.0.0",
          "Name": "chownr",
          "Identifier": {
            "PURL": "pkg:npm/chownr@3.0.0",
            "UID": "e8083dfa9d169880",
            "BOMRef": "pkg:npm/chownr@3.0.0"
          },
          "Version": "3.0.0",
          "Licenses": [
            "BlueOak-1.0.0"
          ],
          "DependsOn": [
            "tar@7.4.3"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "chroma-js@2.6.0",
          "Name": "chroma-js",
          "Identifier": {
            "PURL": "pkg:npm/chroma-js@2.6.0",
            "UID": "2fcb6b568e738c88",
            "BOMRef": "pkg:npm/chroma-js@2.6.0"
          },
          "Version": "2.6.0",
          "Licenses": [
            "BSD-3-Clause AND Apache-2.0"
          ],
          "DependsOn": [
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "ci-info@4.2.0",
          "Name": "ci-info",
          "Identifier": {
            "PURL": "pkg:npm/ci-info@4.2.0",
            "UID": "9c3cdcd1b64e9581",
            "BOMRef": "pkg:npm/ci-info@4.2.0"
          },
          "Version": "4.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "jest-util@30.0.2"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "classnames@2.5.1",
          "Name": "classnames",
          "Identifier": {
            "PURL": "pkg:npm/classnames@2.5.1",
            "UID": "23cc65854af5c593",
            "BOMRef": "pkg:npm/classnames@2.5.1"
          },
          "Version": "2.5.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@uppy/dashboard@4.3.4",
            "@uppy/provider-views@4.4.5",
            "@uppy/status-bar@4.1.3",
            "react-diff-viewer-continued@3.4.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "clsx@1.2.1",
          "Name": "clsx",
          "Identifier": {
            "PURL": "pkg:npm/clsx@1.2.1",
            "UID": "a39e32dbc2393901",
            "BOMRef": "6e9acee4-0dec-4a96-8ffa-d1182f583fcf"
          },
          "Version": "1.2.1",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "clsx@1.2.1",
          "Name": "clsx",
          "Identifier": {
            "PURL": "pkg:npm/clsx@1.2.1",
            "UID": "7821b83c4dd36e85",
            "BOMRef": "62954b49-28e5-409a-bfea-dc620e490738"
          },
          "Version": "1.2.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@textea/json-viewer@2.17.2",
            "notistack@3.0.2"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "clsx@2.1.1",
          "Name": "clsx",
          "Identifier": {
            "PURL": "pkg:npm/clsx@2.1.1",
            "UID": "922055f40fe119dc",
            "BOMRef": "86ad6b7f-e90d-4d72-90cc-06f13a82dd25"
          },
          "Version": "2.1.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mui/material@5.17.1",
            "@mui/material@7.2.0",
            "@mui/system@5.17.1",
            "@mui/system@7.2.0",
            "@mui/utils@5.17.1",
            "@mui/utils@7.2.0",
            "@mui/x-data-grid@7.29.8",
            "@uppy/components@0.2.0",
            "prism-react-renderer@2.4.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "clsx@2.1.1",
          "Name": "clsx",
          "Identifier": {
            "PURL": "pkg:npm/clsx@2.1.1",
            "UID": "852b04a022dc9102",
            "BOMRef": "ea28825d-98d8-4d43-86fe-3fb68a0764b1"
          },
          "Version": "2.1.1",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "clsx@2.1.1",
          "Name": "clsx",
          "Identifier": {
            "PURL": "pkg:npm/clsx@2.1.1",
            "UID": "64f6cba2729aee3b",
            "BOMRef": "4d7daf3f-69cb-4a79-ab27-2a01ba95f790"
          },
          "Version": "2.1.1",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "clsx@2.1.1",
          "Name": "clsx",
          "Identifier": {
            "PURL": "pkg:npm/clsx@2.1.1",
            "UID": "3103e082780914cd",
            "BOMRef": "b31c58ea-9fb4-455b-98a5-28d533903032"
          },
          "Version": "2.1.1",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "color-convert@2.0.1",
          "Name": "color-convert",
          "Identifier": {
            "PURL": "pkg:npm/color-convert@2.0.1",
            "UID": "a8dd33efcbb24cbe",
            "BOMRef": "pkg:npm/color-convert@2.0.1"
          },
          "Version": "2.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "ansi-styles@4.3.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "color-name@1.1.4",
          "Name": "color-name",
          "Identifier": {
            "PURL": "pkg:npm/color-name@1.1.4",
            "UID": "1b82e779ab8b8dab",
            "BOMRef": "pkg:npm/color-name@1.1.4"
          },
          "Version": "1.1.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "color-convert@2.0.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "combined-stream@1.0.8",
          "Name": "combined-stream",
          "Identifier": {
            "PURL": "pkg:npm/combined-stream@1.0.8",
            "UID": "247fc405f9856d06",
            "BOMRef": "pkg:npm/combined-stream@1.0.8"
          },
          "Version": "1.0.8",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "form-data@4.0.4"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "comma-separated-tokens@2.0.3",
          "Name": "comma-separated-tokens",
          "Identifier": {
            "PURL": "pkg:npm/comma-separated-tokens@2.0.3",
            "UID": "ff3dc4d3c5a25447",
            "BOMRef": "pkg:npm/comma-separated-tokens@2.0.3"
          },
          "Version": "2.0.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "hast-util-to-estree@2.3.3"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "concat-map@0.0.1",
          "Name": "concat-map",
          "Identifier": {
            "PURL": "pkg:npm/concat-map@0.0.1",
            "UID": "96b555f205585871",
            "BOMRef": "pkg:npm/concat-map@0.0.1"
          },
          "Version": "0.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "brace-expansion@1.1.12"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "convert-source-map@1.9.0",
          "Name": "convert-source-map",
          "Identifier": {
            "PURL": "pkg:npm/convert-source-map@1.9.0",
            "UID": "e8e4b51ca05e2988",
            "BOMRef": "pkg:npm/convert-source-map@1.9.0"
          },
          "Version": "1.9.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@emotion/babel-plugin@11.13.5"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "convert-source-map@2.0.0",
          "Name": "convert-source-map",
          "Identifier": {
            "PURL": "pkg:npm/convert-source-map@2.0.0",
            "UID": "ae2be9d72d8ddfa1",
            "BOMRef": "pkg:npm/convert-source-map@2.0.0"
          },
          "Version": "2.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@babel/core@7.28.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "copy-to-clipboard@3.3.3",
          "Name": "copy-to-clipboard",
          "Identifier": {
            "PURL": "pkg:npm/copy-to-clipboard@3.3.3",
            "UID": "d462d3e8b12859a7",
            "BOMRef": "pkg:npm/copy-to-clipboard@3.3.3"
          },
          "Version": "3.3.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@textea/json-viewer@2.17.2"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "cosmiconfig@7.1.0",
          "Name": "cosmiconfig",
          "Identifier": {
            "PURL": "pkg:npm/cosmiconfig@7.1.0",
            "UID": "48aa9ba0a5f43b1c",
            "BOMRef": "pkg:npm/cosmiconfig@7.1.0"
          },
          "Version": "7.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "babel-plugin-macros@3.1.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "cosmiconfig@8.3.6",
          "Name": "cosmiconfig",
          "Identifier": {
            "PURL": "pkg:npm/cosmiconfig@8.3.6",
            "UID": "b917694e1d3416f6",
            "BOMRef": "pkg:npm/cosmiconfig@8.3.6"
          },
          "Version": "8.3.6",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@svgr/core@8.1.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "create-collection-form@0.0.0",
          "Name": "create-collection-form",
          "Identifier": {
            "PURL": "pkg:npm/create-collection-form@0.0.0?vcs_url=git+ssh%3A%2F%2Fgit%40github.com%2Fqdrant%2Fcreate-collection-form.git#a3f1e13059f334bf0c9eb2514fcd26bd01cfc59b",
            "UID": "ce733f14185e1afa",
            "BOMRef": "pkg:npm/create-collection-form@0.0.0?vcs_url=git+ssh%3A%2F%2Fgit%40github.com%2Fqdrant%2Fcreate-collection-form.git#a3f1e13059f334bf0c9eb2514fcd26bd01cfc59b"
          },
          "Version": "0.0.0",
          "Licenses": [
            "NOASSERTION"
          ],
          "DependsOn": [
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "cross-spawn@7.0.6",
          "Name": "cross-spawn",
          "Identifier": {
            "PURL": "pkg:npm/cross-spawn@7.0.6",
            "UID": "c7bb8fba4e39c374",
            "BOMRef": "pkg:npm/cross-spawn@7.0.6"
          },
          "Version": "7.0.6",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "eslint@8.57.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "css.escape@1.5.1",
          "Name": "css.escape",
          "Identifier": {
            "PURL": "pkg:npm/css.escape@1.5.1",
            "UID": "e2f9b96034748984",
            "BOMRef": "pkg:npm/css.escape@1.5.1"
          },
          "Version": "1.5.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@testing-library/jest-dom@5.17.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "cssstyle@3.0.0",
          "Name": "cssstyle",
          "Identifier": {
            "PURL": "pkg:npm/cssstyle@3.0.0",
            "UID": "76aa8ce49be96e45",
            "BOMRef": "pkg:npm/cssstyle@3.0.0"
          },
          "Version": "3.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "jsdom@22.1.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "csstype@3.1.3",
          "Name": "csstype",
          "Identifier": {
            "PURL": "pkg:npm/csstype@3.1.3",
            "UID": "fec38e461f8fb529",
            "BOMRef": "pkg:npm/csstype@3.1.3"
          },
          "Version": "3.1.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@emotion/serialize@1.3.3",
            "@mui/material@5.17.1",
            "@mui/material@7.2.0",
            "@mui/styled-engine@5.16.14",
            "@mui/styled-engine@7.2.0",
            "@mui/system@5.17.1",
            "@mui/system@7.2.0",
            "@types/react@18.3.23",
            "dom-helpers@5.2.1",
            "goober@2.1.16"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "d3-array@3.2.4",
          "Name": "d3-array",
          "Identifier": {
            "PURL": "pkg:npm/d3-array@3.2.4",
            "UID": "c0fde3029b0bd491",
            "BOMRef": "pkg:npm/d3-array@3.2.4"
          },
          "Version": "3.2.4",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "d3-scale@4.0.2",
            "d3-time@3.1.0",
            "force-graph@1.50.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "d3-binarytree@1.0.2",
          "Name": "d3-binarytree",
          "Identifier": {
            "PURL": "pkg:npm/d3-binarytree@1.0.2",
            "UID": "f4ba623404728c43",
            "BOMRef": "pkg:npm/d3-binarytree@1.0.2"
          },
          "Version": "1.0.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "d3-force-3d@3.0.6"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "d3-color@3.1.0",
          "Name": "d3-color",
          "Identifier": {
            "PURL": "pkg:npm/d3-color@3.1.0",
            "UID": "1b6c8b164f557049",
            "BOMRef": "pkg:npm/d3-color@3.1.0"
          },
          "Version": "3.1.0",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "d3-interpolate@3.0.1",
            "d3-scale-chromatic@3.1.0",
            "d3-transition@3.0.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "d3-dispatch@3.0.1",
          "Name": "d3-dispatch",
          "Identifier": {
            "PURL": "pkg:npm/d3-dispatch@3.0.1",
            "UID": "3f82ca22e3037bdb",
            "BOMRef": "pkg:npm/d3-dispatch@3.0.1"
          },
          "Version": "3.0.1",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "d3-drag@3.0.0",
            "d3-force-3d@3.0.6",
            "d3-transition@3.0.1",
            "d3-zoom@3.0.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "d3-drag@3.0.0",
          "Name": "d3-drag",
          "Identifier": {
            "PURL": "pkg:npm/d3-drag@3.0.0",
            "UID": "dfb63002abcdd083",
            "BOMRef": "pkg:npm/d3-drag@3.0.0"
          },
          "Version": "3.0.0",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "d3-zoom@3.0.0",
            "force-graph@1.50.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "d3-ease@3.0.1",
          "Name": "d3-ease",
          "Identifier": {
            "PURL": "pkg:npm/d3-ease@3.0.1",
            "UID": "d8df264386dd1672",
            "BOMRef": "pkg:npm/d3-ease@3.0.1"
          },
          "Version": "3.0.1",
          "Licenses": [
            "BSD-3-Clause"
          ],
          "DependsOn": [
            "d3-transition@3.0.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "d3-force-3d@3.0.6",
          "Name": "d3-force-3d",
          "Identifier": {
            "PURL": "pkg:npm/d3-force-3d@3.0.6",
            "UID": "de0a4a13459546f9",
            "BOMRef": "pkg:npm/d3-force-3d@3.0.6"
          },
          "Version": "3.0.6",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "force-graph@1.50.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "d3-format@3.1.0",
          "Name": "d3-format",
          "Identifier": {
            "PURL": "pkg:npm/d3-format@3.1.0",
            "UID": "e44611331e38e697",
            "BOMRef": "pkg:npm/d3-format@3.1.0"
          },
          "Version": "3.1.0",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "d3-scale@4.0.2"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "d3-interpolate@3.0.1",
          "Name": "d3-interpolate",
          "Identifier": {
            "PURL": "pkg:npm/d3-interpolate@3.0.1",
            "UID": "dac0305cef4f2eaf",
            "BOMRef": "pkg:npm/d3-interpolate@3.0.1"
          },
          "Version": "3.0.1",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "d3-scale-chromatic@3.1.0",
            "d3-scale@4.0.2",
            "d3-transition@3.0.1",
            "d3-zoom@3.0.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "d3-octree@1.1.0",
          "Name": "d3-octree",
          "Identifier": {
            "PURL": "pkg:npm/d3-octree@1.1.0",
            "UID": "7301b1059e28ba23",
            "BOMRef": "pkg:npm/d3-octree@1.1.0"
          },
          "Version": "1.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "d3-force-3d@3.0.6"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "d3-quadtree@3.0.1",
          "Name": "d3-quadtree",
          "Identifier": {
            "PURL": "pkg:npm/d3-quadtree@3.0.1",
            "UID": "b77494ea243997e6",
            "BOMRef": "pkg:npm/d3-quadtree@3.0.1"
          },
          "Version": "3.0.1",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "d3-force-3d@3.0.6"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "d3-scale@4.0.2",
          "Name": "d3-scale",
          "Identifier": {
            "PURL": "pkg:npm/d3-scale@4.0.2",
            "UID": "2767a628a252348a",
            "BOMRef": "pkg:npm/d3-scale@4.0.2"
          },
          "Version": "4.0.2",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "force-graph@1.50.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "d3-scale-chromatic@3.1.0",
          "Name": "d3-scale-chromatic",
          "Identifier": {
            "PURL": "pkg:npm/d3-scale-chromatic@3.1.0",
            "UID": "e786fe9546e0139f",
            "BOMRef": "pkg:npm/d3-scale-chromatic@3.1.0"
          },
          "Version": "3.1.0",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "force-graph@1.50.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "d3-selection@3.0.0",
          "Name": "d3-selection",
          "Identifier": {
            "PURL": "pkg:npm/d3-selection@3.0.0",
            "UID": "fd805a235110bf79",
            "BOMRef": "pkg:npm/d3-selection@3.0.0"
          },
          "Version": "3.0.0",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "d3-drag@3.0.0",
            "d3-transition@3.0.1",
            "d3-zoom@3.0.0",
            "float-tooltip@1.7.5",
            "force-graph@1.50.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "d3-time@3.1.0",
          "Name": "d3-time",
          "Identifier": {
            "PURL": "pkg:npm/d3-time@3.1.0",
            "UID": "89c3efde758dc060",
            "BOMRef": "pkg:npm/d3-time@3.1.0"
          },
          "Version": "3.1.0",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "d3-scale@4.0.2",
            "d3-time-format@4.1.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "d3-time-format@4.1.0",
          "Name": "d3-time-format",
          "Identifier": {
            "PURL": "pkg:npm/d3-time-format@4.1.0",
            "UID": "eea10072688d4358",
            "BOMRef": "pkg:npm/d3-time-format@4.1.0"
          },
          "Version": "4.1.0",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "d3-scale@4.0.2"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "d3-timer@3.0.1",
          "Name": "d3-timer",
          "Identifier": {
            "PURL": "pkg:npm/d3-timer@3.0.1",
            "UID": "c78f5aafafe9358c",
            "BOMRef": "pkg:npm/d3-timer@3.0.1"
          },
          "Version": "3.0.1",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "d3-force-3d@3.0.6",
            "d3-transition@3.0.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "d3-transition@3.0.1",
          "Name": "d3-transition",
          "Identifier": {
            "PURL": "pkg:npm/d3-transition@3.0.1",
            "UID": "b12b09a1a89df0cc",
            "BOMRef": "pkg:npm/d3-transition@3.0.1"
          },
          "Version": "3.0.1",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "d3-zoom@3.0.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "d3-zoom@3.0.0",
          "Name": "d3-zoom",
          "Identifier": {
            "PURL": "pkg:npm/d3-zoom@3.0.0",
            "UID": "574e0f8ba0517f72",
            "BOMRef": "pkg:npm/d3-zoom@3.0.0"
          },
          "Version": "3.0.0",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "force-graph@1.50.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "data-urls@4.0.0",
          "Name": "data-urls",
          "Identifier": {
            "PURL": "pkg:npm/data-urls@4.0.0",
            "UID": "ab5394b6da11fef1",
            "BOMRef": "pkg:npm/data-urls@4.0.0"
          },
          "Version": "4.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "jsdom@22.1.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "data-view-buffer@1.0.2",
          "Name": "data-view-buffer",
          "Identifier": {
            "PURL": "pkg:npm/data-view-buffer@1.0.2",
            "UID": "3b038784e0d36086",
            "BOMRef": "pkg:npm/data-view-buffer@1.0.2"
          },
          "Version": "1.0.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "es-abstract@1.24.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "data-view-byte-length@1.0.2",
          "Name": "data-view-byte-length",
          "Identifier": {
            "PURL": "pkg:npm/data-view-byte-length@1.0.2",
            "UID": "f6b09d08cb2f5fb3",
            "BOMRef": "pkg:npm/data-view-byte-length@1.0.2"
          },
          "Version": "1.0.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "es-abstract@1.24.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "data-view-byte-offset@1.0.1",
          "Name": "data-view-byte-offset",
          "Identifier": {
            "PURL": "pkg:npm/data-view-byte-offset@1.0.1",
            "UID": "19063048bb20fad4",
            "BOMRef": "pkg:npm/data-view-byte-offset@1.0.1"
          },
          "Version": "1.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "es-abstract@1.24.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "debug@4.4.1",
          "Name": "debug",
          "Identifier": {
            "PURL": "pkg:npm/debug@4.4.1",
            "UID": "c3ee815229b7cc9",
            "BOMRef": "pkg:npm/debug@4.4.1"
          },
          "Version": "4.4.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@babel/core@7.28.0",
            "@babel/traverse@7.28.0",
            "@eslint/eslintrc@2.1.4",
            "@humanwhocodes/config-array@0.13.0",
            "agent-base@6.0.2",
            "eslint@8.57.1",
            "http-proxy-agent@5.0.0",
            "https-proxy-agent@5.0.1",
            "micromark@3.2.0",
            "vite-node@3.2.4",
            "vitest@3.2.4"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "decimal.js@10.5.0",
          "Name": "decimal.js",
          "Identifier": {
            "PURL": "pkg:npm/decimal.js@10.5.0",
            "UID": "5bbab24f30ceb426",
            "BOMRef": "pkg:npm/decimal.js@10.5.0"
          },
          "Version": "10.5.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "jsdom@22.1.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "decode-named-character-reference@1.2.0",
          "Name": "decode-named-character-reference",
          "Identifier": {
            "PURL": "pkg:npm/decode-named-character-reference@1.2.0",
            "UID": "860a6e65e8bb90bf",
            "BOMRef": "pkg:npm/decode-named-character-reference@1.2.0"
          },
          "Version": "1.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "mdast-util-from-markdown@1.3.1",
            "micromark-core-commonmark@1.1.0",
            "micromark-util-decode-string@1.1.0",
            "micromark@3.2.0",
            "parse-entities@4.0.2"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "deep-eql@5.0.2",
          "Name": "deep-eql",
          "Identifier": {
            "PURL": "pkg:npm/deep-eql@5.0.2",
            "UID": "aafc76b59b3e77a3",
            "BOMRef": "pkg:npm/deep-eql@5.0.2"
          },
          "Version": "5.0.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "chai@5.2.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "deep-equal@2.2.3",
          "Name": "deep-equal",
          "Identifier": {
            "PURL": "pkg:npm/deep-equal@2.2.3",
            "UID": "4a76b2c9fb99362d",
            "BOMRef": "pkg:npm/deep-equal@2.2.3"
          },
          "Version": "2.2.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "aria-query@5.1.3"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "deep-is@0.1.4",
          "Name": "deep-is",
          "Identifier": {
            "PURL": "pkg:npm/deep-is@0.1.4",
            "UID": "f83a6c39b8fbba37",
            "BOMRef": "pkg:npm/deep-is@0.1.4"
          },
          "Version": "0.1.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "optionator@0.9.4"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "define-data-property@1.1.4",
          "Name": "define-data-property",
          "Identifier": {
            "PURL": "pkg:npm/define-data-property@1.1.4",
            "UID": "e30b13e3f01b5e41",
            "BOMRef": "pkg:npm/define-data-property@1.1.4"
          },
          "Version": "1.1.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "define-properties@1.2.1",
            "iterator.prototype@1.1.5",
            "set-function-length@1.2.2",
            "set-function-name@2.0.2",
            "string.prototype.trim@1.2.10"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "define-properties@1.2.1",
          "Name": "define-properties",
          "Identifier": {
            "PURL": "pkg:npm/define-properties@1.2.1",
            "UID": "211e1a57a35c63d5",
            "BOMRef": "pkg:npm/define-properties@1.2.1"
          },
          "Version": "1.2.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "array-includes@3.1.9",
            "array.prototype.findlast@1.2.5",
            "array.prototype.flat@1.3.3",
            "array.prototype.flatmap@1.3.3",
            "array.prototype.tosorted@1.1.4",
            "arraybuffer.prototype.slice@1.0.4",
            "es-iterator-helpers@1.2.1",
            "function.prototype.name@1.1.8",
            "globalthis@1.0.4",
            "object-is@1.1.6",
            "object.assign@4.1.7",
            "object.entries@1.1.9",
            "object.fromentries@2.0.8",
            "object.values@1.2.1",
            "reflect.getprototypeof@1.0.10",
            "regexp.prototype.flags@1.5.4",
            "string.prototype.matchall@4.0.12",
            "string.prototype.repeat@1.0.0",
            "string.prototype.trim@1.2.10",
            "string.prototype.trimend@1.0.9",
            "string.prototype.trimstart@1.0.8"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "delayed-stream@1.0.0",
          "Name": "delayed-stream",
          "Identifier": {
            "PURL": "pkg:npm/delayed-stream@1.0.0",
            "UID": "cda64f7e1bcb5fda",
            "BOMRef": "pkg:npm/delayed-stream@1.0.0"
          },
          "Version": "1.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "combined-stream@1.0.8"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "dequal@2.0.3",
          "Name": "dequal",
          "Identifier": {
            "PURL": "pkg:npm/dequal@2.0.3",
            "UID": "2fe8a5f6d41c394b",
            "BOMRef": "pkg:npm/dequal@2.0.3"
          },
          "Version": "2.0.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@uppy/components@0.2.0",
            "aria-query@5.3.0",
            "uvu@0.5.6"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "dereference-json-schema@0.2.1",
          "Name": "dereference-json-schema",
          "Identifier": {
            "PURL": "pkg:npm/dereference-json-schema@0.2.1",
            "UID": "27f8c211c82b23e3",
            "BOMRef": "pkg:npm/dereference-json-schema@0.2.1"
          },
          "Version": "0.2.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "openapi-client-axios@7.6.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "detect-libc@1.0.3",
          "Name": "detect-libc",
          "Identifier": {
            "PURL": "pkg:npm/detect-libc@1.0.3",
            "UID": "ce117f52b0d3f723",
            "BOMRef": "pkg:npm/detect-libc@1.0.3"
          },
          "Version": "1.0.3",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "@parcel/watcher@2.5.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "detect-libc@2.0.4",
          "Name": "detect-libc",
          "Identifier": {
            "PURL": "pkg:npm/detect-libc@2.0.4",
            "UID": "8619c02fd09bdd00",
            "BOMRef": "1799a5f6-6542-49b1-9a09-f32199d14c5d"
          },
          "Version": "2.0.4",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "@tailwindcss/oxide@4.1.11",
            "lightningcss@1.30.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "detect-libc@2.0.4",
          "Name": "detect-libc",
          "Identifier": {
            "PURL": "pkg:npm/detect-libc@2.0.4",
            "UID": "95639aaba972af97",
            "BOMRef": "25329fbd-285d-48d3-bd17-b6bac8223716"
          },
          "Version": "2.0.4",
          "Licenses": [
            "Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "diff@5.2.0",
          "Name": "diff",
          "Identifier": {
            "PURL": "pkg:npm/diff@5.2.0",
            "UID": "51a3f574f7f8086a",
            "BOMRef": "pkg:npm/diff@5.2.0"
          },
          "Version": "5.2.0",
          "Licenses": [
            "BSD-3-Clause"
          ],
          "DependsOn": [
            "react-diff-viewer-continued@3.4.0",
            "uvu@0.5.6"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "doctrine@2.1.0",
          "Name": "doctrine",
          "Identifier": {
            "PURL": "pkg:npm/doctrine@2.1.0",
            "UID": "eeb6b5f0dec0e1a8",
            "BOMRef": "pkg:npm/doctrine@2.1.0"
          },
          "Version": "2.1.0",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "eslint-plugin-react@7.37.5"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "doctrine@3.0.0",
          "Name": "doctrine",
          "Identifier": {
            "PURL": "pkg:npm/doctrine@3.0.0",
            "UID": "af4e62ee22707b37",
            "BOMRef": "pkg:npm/doctrine@3.0.0"
          },
          "Version": "3.0.0",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "eslint@8.57.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "dom-accessibility-api@0.5.16",
          "Name": "dom-accessibility-api",
          "Identifier": {
            "PURL": "pkg:npm/dom-accessibility-api@0.5.16",
            "UID": "658488f0390c3000",
            "BOMRef": "pkg:npm/dom-accessibility-api@0.5.16"
          },
          "Version": "0.5.16",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@testing-library/dom@10.4.0",
            "@testing-library/dom@8.20.1",
            "@testing-library/jest-dom@5.17.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "dom-helpers@5.2.1",
          "Name": "dom-helpers",
          "Identifier": {
            "PURL": "pkg:npm/dom-helpers@5.2.1",
            "UID": "940d7d377c14da46",
            "BOMRef": "pkg:npm/dom-helpers@5.2.1"
          },
          "Version": "5.2.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "react-transition-group@4.4.5"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "domexception@4.0.0",
          "Name": "domexception",
          "Identifier": {
            "PURL": "pkg:npm/domexception@4.0.0",
            "UID": "6a85ce618ef513f",
            "BOMRef": "pkg:npm/domexception@4.0.0"
          },
          "Version": "4.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "jsdom@22.1.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "dot-case@3.0.4",
          "Name": "dot-case",
          "Identifier": {
            "PURL": "pkg:npm/dot-case@3.0.4",
            "UID": "839d8e821d77df6",
            "BOMRef": "pkg:npm/dot-case@3.0.4"
          },
          "Version": "3.0.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "snake-case@3.0.4"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "dunder-proto@1.0.1",
          "Name": "dunder-proto",
          "Identifier": {
            "PURL": "pkg:npm/dunder-proto@1.0.1",
            "UID": "4d4e5980ef088749",
            "BOMRef": "pkg:npm/dunder-proto@1.0.1"
          },
          "Version": "1.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "get-proto@1.0.1",
            "has-proto@1.2.0",
            "set-proto@1.0.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "electron-to-chromium@1.5.179",
          "Name": "electron-to-chromium",
          "Identifier": {
            "PURL": "pkg:npm/electron-to-chromium@1.5.179",
            "UID": "1cf4d22871834d5a",
            "BOMRef": "pkg:npm/electron-to-chromium@1.5.179"
          },
          "Version": "1.5.179",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "browserslist@4.25.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "enhanced-resolve@5.18.2",
          "Name": "enhanced-resolve",
          "Identifier": {
            "PURL": "pkg:npm/enhanced-resolve@5.18.2",
            "UID": "ea671607990f240d",
            "BOMRef": "pkg:npm/enhanced-resolve@5.18.2"
          },
          "Version": "5.18.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@tailwindcss/cli@4.1.11",
            "@tailwindcss/node@4.1.11"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "entities@4.5.0",
          "Name": "entities",
          "Identifier": {
            "PURL": "pkg:npm/entities@4.5.0",
            "UID": "c8bf8750aae50c00",
            "BOMRef": "pkg:npm/entities@4.5.0"
          },
          "Version": "4.5.0",
          "Licenses": [
            "BSD-2-Clause"
          ],
          "DependsOn": [
            "@svgr/hast-util-to-babel-ast@8.0.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "entities@6.0.1",
          "Name": "entities",
          "Identifier": {
            "PURL": "pkg:npm/entities@6.0.1",
            "UID": "c946321fa02ca48c",
            "BOMRef": "pkg:npm/entities@6.0.1"
          },
          "Version": "6.0.1",
          "Licenses": [
            "BSD-2-Clause"
          ],
          "DependsOn": [
            "parse5@7.3.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "error-ex@1.3.2",
          "Name": "error-ex",
          "Identifier": {
            "PURL": "pkg:npm/error-ex@1.3.2",
            "UID": "6e23b61027a311dc",
            "BOMRef": "pkg:npm/error-ex@1.3.2"
          },
          "Version": "1.3.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "parse-json@5.2.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "es-abstract@1.24.0",
          "Name": "es-abstract",
          "Identifier": {
            "PURL": "pkg:npm/es-abstract@1.24.0",
            "UID": "c64bf60a2d27c9f4",
            "BOMRef": "pkg:npm/es-abstract@1.24.0"
          },
          "Version": "1.24.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "array-includes@3.1.9",
            "array.prototype.findlast@1.2.5",
            "array.prototype.flat@1.3.3",
            "array.prototype.flatmap@1.3.3",
            "array.prototype.tosorted@1.1.4",
            "arraybuffer.prototype.slice@1.0.4",
            "es-iterator-helpers@1.2.1",
            "object.fromentries@2.0.8",
            "reflect.getprototypeof@1.0.10",
            "string.prototype.matchall@4.0.12",
            "string.prototype.repeat@1.0.0",
            "string.prototype.trim@1.2.10"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "es-define-property@1.0.1",
          "Name": "es-define-property",
          "Identifier": {
            "PURL": "pkg:npm/es-define-property@1.0.1",
            "UID": "31d05e04db01a613",
            "BOMRef": "pkg:npm/es-define-property@1.0.1"
          },
          "Version": "1.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "call-bind@1.0.8",
            "define-data-property@1.1.4",
            "es-abstract@1.24.0",
            "get-intrinsic@1.3.0",
            "has-property-descriptors@1.0.2"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "es-errors@1.3.0",
          "Name": "es-errors",
          "Identifier": {
            "PURL": "pkg:npm/es-errors@1.3.0",
            "UID": "be3ae4a8f8f9576e",
            "BOMRef": "pkg:npm/es-errors@1.3.0"
          },
          "Version": "1.3.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "array.prototype.findlast@1.2.5",
            "array.prototype.tosorted@1.1.4",
            "arraybuffer.prototype.slice@1.0.4",
            "call-bind-apply-helpers@1.0.2",
            "data-view-buffer@1.0.2",
            "data-view-byte-length@1.0.2",
            "data-view-byte-offset@1.0.1",
            "define-data-property@1.1.4",
            "dunder-proto@1.0.1",
            "es-abstract@1.24.0",
            "es-iterator-helpers@1.2.1",
            "es-object-atoms@1.1.1",
            "es-set-tostringtag@2.1.0",
            "get-intrinsic@1.3.0",
            "get-symbol-description@1.1.0",
            "internal-slot@1.1.0",
            "reflect.getprototypeof@1.0.10",
            "regexp.prototype.flags@1.5.4",
            "safe-push-apply@1.0.0",
            "safe-regex-test@1.1.0",
            "set-function-length@1.2.2",
            "set-function-name@2.0.2",
            "set-proto@1.0.0",
            "side-channel-list@1.0.0",
            "side-channel-map@1.0.1",
            "side-channel-weakmap@1.0.2",
            "side-channel@1.1.0",
            "stop-iteration-iterator@1.1.0",
            "string.prototype.matchall@4.0.12",
            "typed-array-buffer@1.0.3"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "es-get-iterator@1.1.3",
          "Name": "es-get-iterator",
          "Identifier": {
            "PURL": "pkg:npm/es-get-iterator@1.1.3",
            "UID": "89153ea9ce63b240",
            "BOMRef": "pkg:npm/es-get-iterator@1.1.3"
          },
          "Version": "1.1.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "deep-equal@2.2.3"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "es-iterator-helpers@1.2.1",
          "Name": "es-iterator-helpers",
          "Identifier": {
            "PURL": "pkg:npm/es-iterator-helpers@1.2.1",
            "UID": "4a0d5e0287538a03",
            "BOMRef": "pkg:npm/es-iterator-helpers@1.2.1"
          },
          "Version": "1.2.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "eslint-plugin-react@7.37.5"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "es-module-lexer@1.7.0",
          "Name": "es-module-lexer",
          "Identifier": {
            "PURL": "pkg:npm/es-module-lexer@1.7.0",
            "UID": "f9f93897812369af",
            "BOMRef": "pkg:npm/es-module-lexer@1.7.0"
          },
          "Version": "1.7.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "vite-node@3.2.4"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "es-object-atoms@1.1.1",
          "Name": "es-object-atoms",
          "Identifier": {
            "PURL": "pkg:npm/es-object-atoms@1.1.1",
            "UID": "1b23eaad75d77177",
            "BOMRef": "pkg:npm/es-object-atoms@1.1.1"
          },
          "Version": "1.1.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "array-includes@3.1.9",
            "array.prototype.findlast@1.2.5",
            "es-abstract@1.24.0",
            "get-intrinsic@1.3.0",
            "get-proto@1.0.1",
            "iterator.prototype@1.1.5",
            "object.assign@4.1.7",
            "object.entries@1.1.9",
            "object.fromentries@2.0.8",
            "object.values@1.2.1",
            "reflect.getprototypeof@1.0.10",
            "set-proto@1.0.0",
            "string.prototype.matchall@4.0.12",
            "string.prototype.trim@1.2.10",
            "string.prototype.trimend@1.0.9",
            "string.prototype.trimstart@1.0.8"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "es-set-tostringtag@2.1.0",
          "Name": "es-set-tostringtag",
          "Identifier": {
            "PURL": "pkg:npm/es-set-tostringtag@2.1.0",
            "UID": "bd3975510bf1ed4c",
            "BOMRef": "pkg:npm/es-set-tostringtag@2.1.0"
          },
          "Version": "2.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "es-abstract@1.24.0",
            "es-iterator-helpers@1.2.1",
            "form-data@4.0.4"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "es-shim-unscopables@1.1.0",
          "Name": "es-shim-unscopables",
          "Identifier": {
            "PURL": "pkg:npm/es-shim-unscopables@1.1.0",
            "UID": "368617e9c519b2a2",
            "BOMRef": "pkg:npm/es-shim-unscopables@1.1.0"
          },
          "Version": "1.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "array.prototype.findlast@1.2.5",
            "array.prototype.flat@1.3.3",
            "array.prototype.flatmap@1.3.3",
            "array.prototype.tosorted@1.1.4"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "es-to-primitive@1.3.0",
          "Name": "es-to-primitive",
          "Identifier": {
            "PURL": "pkg:npm/es-to-primitive@1.3.0",
            "UID": "725f9db1f948bcc0",
            "BOMRef": "pkg:npm/es-to-primitive@1.3.0"
          },
          "Version": "1.3.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "es-abstract@1.24.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "esbuild@0.25.5",
          "Name": "esbuild",
          "Identifier": {
            "PURL": "pkg:npm/esbuild@0.25.5",
            "UID": "ab97f9e5e18cd9ca",
            "BOMRef": "pkg:npm/esbuild@0.25.5"
          },
          "Version": "0.25.5",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "vite@6.4.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "escalade@3.2.0",
          "Name": "escalade",
          "Identifier": {
            "PURL": "pkg:npm/escalade@3.2.0",
            "UID": "8de471d075db99e4",
            "BOMRef": "pkg:npm/escalade@3.2.0"
          },
          "Version": "3.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "update-browserslist-db@1.1.3"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "escape-string-regexp@2.0.0",
          "Name": "escape-string-regexp",
          "Identifier": {
            "PURL": "pkg:npm/escape-string-regexp@2.0.0",
            "UID": "4d04b5dffbe28af5",
            "BOMRef": "pkg:npm/escape-string-regexp@2.0.0"
          },
          "Version": "2.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "stack-utils@2.0.6"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "escape-string-regexp@4.0.0",
          "Name": "escape-string-regexp",
          "Identifier": {
            "PURL": "pkg:npm/escape-string-regexp@4.0.0",
            "UID": "93c591b50dfd5446",
            "BOMRef": "pkg:npm/escape-string-regexp@4.0.0"
          },
          "Version": "4.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@emotion/babel-plugin@11.13.5",
            "eslint@8.57.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "eslint@8.57.1",
          "Name": "eslint",
          "Identifier": {
            "PURL": "pkg:npm/eslint@8.57.1",
            "UID": "3c0b521199afdb0e",
            "BOMRef": "pkg:npm/eslint@8.57.1"
          },
          "Version": "8.57.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@eslint-community/eslint-utils@4.7.0",
            "eslint-config-google@0.14.0",
            "eslint-config-prettier@8.10.0",
            "eslint-plugin-react@7.37.5",
            "qdrant-web-ui@0.2.5",
            "vite-plugin-eslint@1.8.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "eslint-config-google@0.14.0",
          "Name": "eslint-config-google",
          "Identifier": {
            "PURL": "pkg:npm/eslint-config-google@0.14.0",
            "UID": "8c41385a11184848",
            "BOMRef": "pkg:npm/eslint-config-google@0.14.0"
          },
          "Version": "0.14.0",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "eslint-config-prettier@8.10.0",
          "Name": "eslint-config-prettier",
          "Identifier": {
            "PURL": "pkg:npm/eslint-config-prettier@8.10.0",
            "UID": "579f4ba697d238d9",
            "BOMRef": "pkg:npm/eslint-config-prettier@8.10.0"
          },
          "Version": "8.10.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "eslint-plugin-react@7.37.5",
          "Name": "eslint-plugin-react",
          "Identifier": {
            "PURL": "pkg:npm/eslint-plugin-react@7.37.5",
            "UID": "e2dd207257ee582d",
            "BOMRef": "pkg:npm/eslint-plugin-react@7.37.5"
          },
          "Version": "7.37.5",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "eslint-scope@7.2.2",
          "Name": "eslint-scope",
          "Identifier": {
            "PURL": "pkg:npm/eslint-scope@7.2.2",
            "UID": "8d1fb77d99082927",
            "BOMRef": "pkg:npm/eslint-scope@7.2.2"
          },
          "Version": "7.2.2",
          "Licenses": [
            "BSD-2-Clause"
          ],
          "DependsOn": [
            "eslint@8.57.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "eslint-visitor-keys@3.4.3",
          "Name": "eslint-visitor-keys",
          "Identifier": {
            "PURL": "pkg:npm/eslint-visitor-keys@3.4.3",
            "UID": "7b21d4633292225c",
            "BOMRef": "pkg:npm/eslint-visitor-keys@3.4.3"
          },
          "Version": "3.4.3",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "@eslint-community/eslint-utils@4.7.0",
            "eslint@8.57.1",
            "espree@9.6.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "espree@9.6.1",
          "Name": "espree",
          "Identifier": {
            "PURL": "pkg:npm/espree@9.6.1",
            "UID": "5803699dc74f8e2f",
            "BOMRef": "pkg:npm/espree@9.6.1"
          },
          "Version": "9.6.1",
          "Licenses": [
            "BSD-2-Clause"
          ],
          "DependsOn": [
            "@eslint/eslintrc@2.1.4",
            "eslint@8.57.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "esquery@1.6.0",
          "Name": "esquery",
          "Identifier": {
            "PURL": "pkg:npm/esquery@1.6.0",
            "UID": "ee857833e99bcaac",
            "BOMRef": "pkg:npm/esquery@1.6.0"
          },
          "Version": "1.6.0",
          "Licenses": [
            "BSD-3-Clause"
          ],
          "DependsOn": [
            "eslint@8.57.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "esrecurse@4.3.0",
          "Name": "esrecurse",
          "Identifier": {
            "PURL": "pkg:npm/esrecurse@4.3.0",
            "UID": "4a9a51f96e28f7bc",
            "BOMRef": "pkg:npm/esrecurse@4.3.0"
          },
          "Version": "4.3.0",
          "Licenses": [
            "BSD-2-Clause"
          ],
          "DependsOn": [
            "eslint-scope@7.2.2"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "estraverse@5.3.0",
          "Name": "estraverse",
          "Identifier": {
            "PURL": "pkg:npm/estraverse@5.3.0",
            "UID": "a7a74afec95451da",
            "BOMRef": "pkg:npm/estraverse@5.3.0"
          },
          "Version": "5.3.0",
          "Licenses": [
            "BSD-2-Clause"
          ],
          "DependsOn": [
            "eslint-plugin-react@7.37.5",
            "eslint-scope@7.2.2",
            "esquery@1.6.0",
            "esrecurse@4.3.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "estree-util-attach-comments@2.1.1",
          "Name": "estree-util-attach-comments",
          "Identifier": {
            "PURL": "pkg:npm/estree-util-attach-comments@2.1.1",
            "UID": "adddbd8f63350832",
            "BOMRef": "pkg:npm/estree-util-attach-comments@2.1.1"
          },
          "Version": "2.1.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "hast-util-to-estree@2.3.3"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "estree-util-build-jsx@2.2.2",
          "Name": "estree-util-build-jsx",
          "Identifier": {
            "PURL": "pkg:npm/estree-util-build-jsx@2.2.2",
            "UID": "6dbdceb053c35be7",
            "BOMRef": "pkg:npm/estree-util-build-jsx@2.2.2"
          },
          "Version": "2.2.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mdx-js/mdx@2.3.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "estree-util-is-identifier-name@2.1.0",
          "Name": "estree-util-is-identifier-name",
          "Identifier": {
            "PURL": "pkg:npm/estree-util-is-identifier-name@2.1.0",
            "UID": "2a2962895d7da3f9",
            "BOMRef": "pkg:npm/estree-util-is-identifier-name@2.1.0"
          },
          "Version": "2.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mdx-js/mdx@2.3.0",
            "estree-util-build-jsx@2.2.2",
            "hast-util-to-estree@2.3.3",
            "micromark-extension-mdx-jsx@1.0.5"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "estree-util-to-js@1.2.0",
          "Name": "estree-util-to-js",
          "Identifier": {
            "PURL": "pkg:npm/estree-util-to-js@1.2.0",
            "UID": "ec663a68ef856627",
            "BOMRef": "pkg:npm/estree-util-to-js@1.2.0"
          },
          "Version": "1.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mdx-js/mdx@2.3.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "estree-util-visit@1.2.1",
          "Name": "estree-util-visit",
          "Identifier": {
            "PURL": "pkg:npm/estree-util-visit@1.2.1",
            "UID": "8848f7f435b34d2b",
            "BOMRef": "pkg:npm/estree-util-visit@1.2.1"
          },
          "Version": "1.2.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "micromark-util-events-to-acorn@1.2.3"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "estree-walker@2.0.2",
          "Name": "estree-walker",
          "Identifier": {
            "PURL": "pkg:npm/estree-walker@2.0.2",
            "UID": "9751bdfc30596131",
            "BOMRef": "e9564664-c76f-44ce-85ee-c7d50783f945"
          },
          "Version": "2.0.2",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "estree-walker@2.0.2",
          "Name": "estree-walker",
          "Identifier": {
            "PURL": "pkg:npm/estree-walker@2.0.2",
            "UID": "5ff191a092e7ae2a",
            "BOMRef": "c4c40232-6971-4c21-a507-0f2f0f82eb7e"
          },
          "Version": "2.0.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@rollup/pluginutils@4.2.1",
            "@rollup/pluginutils@5.2.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "estree-walker@3.0.3",
          "Name": "estree-walker",
          "Identifier": {
            "PURL": "pkg:npm/estree-walker@3.0.3",
            "UID": "f702d6ca05532223",
            "BOMRef": "pkg:npm/estree-walker@3.0.3"
          },
          "Version": "3.0.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mdx-js/mdx@2.3.0",
            "@vitest/mocker@3.2.4",
            "estree-util-build-jsx@2.2.2",
            "periscopic@3.1.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "esutils@2.0.3",
          "Name": "esutils",
          "Identifier": {
            "PURL": "pkg:npm/esutils@2.0.3",
            "UID": "fe808d70e0608187",
            "BOMRef": "pkg:npm/esutils@2.0.3"
          },
          "Version": "2.0.3",
          "Licenses": [
            "BSD-2-Clause"
          ],
          "DependsOn": [
            "doctrine@2.1.0",
            "doctrine@3.0.0",
            "eslint@8.57.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "eventemitter3@5.0.1",
          "Name": "eventemitter3",
          "Identifier": {
            "PURL": "pkg:npm/eventemitter3@5.0.1",
            "UID": "8933f1b595b8636b",
            "BOMRef": "pkg:npm/eventemitter3@5.0.1"
          },
          "Version": "5.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "p-queue@8.1.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "exifr@7.1.3",
          "Name": "exifr",
          "Identifier": {
            "PURL": "pkg:npm/exifr@7.1.3",
            "UID": "15f127c9773d126c",
            "BOMRef": "pkg:npm/exifr@7.1.3"
          },
          "Version": "7.1.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@uppy/thumbnail-generator@4.1.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "expect@30.0.4",
          "Name": "expect",
          "Identifier": {
            "PURL": "pkg:npm/expect@30.0.4",
            "UID": "dee78679f2b2a5a8",
            "BOMRef": "pkg:npm/expect@30.0.4"
          },
          "Version": "30.0.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@types/jest@30.0.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "expect-type@1.2.1",
          "Name": "expect-type",
          "Identifier": {
            "PURL": "pkg:npm/expect-type@1.2.1",
            "UID": "1faeeba85e12cbd7",
            "BOMRef": "pkg:npm/expect-type@1.2.1"
          },
          "Version": "1.2.1",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "vitest@3.2.4"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "extend@3.0.2",
          "Name": "extend",
          "Identifier": {
            "PURL": "pkg:npm/extend@3.0.2",
            "UID": "da1637f639163571",
            "BOMRef": "pkg:npm/extend@3.0.2"
          },
          "Version": "3.0.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "unified@10.1.2"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "fast-deep-equal@3.1.3",
          "Name": "fast-deep-equal",
          "Identifier": {
            "PURL": "pkg:npm/fast-deep-equal@3.1.3",
            "UID": "a7387e46547bc45b",
            "BOMRef": "pkg:npm/fast-deep-equal@3.1.3"
          },
          "Version": "3.1.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "ajv@6.12.6",
            "eslint@8.57.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "fast-json-stable-stringify@2.1.0",
          "Name": "fast-json-stable-stringify",
          "Identifier": {
            "PURL": "pkg:npm/fast-json-stable-stringify@2.1.0",
            "UID": "706e7f935eedb512",
            "BOMRef": "pkg:npm/fast-json-stable-stringify@2.1.0"
          },
          "Version": "2.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "ajv@6.12.6"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "fast-levenshtein@2.0.6",
          "Name": "fast-levenshtein",
          "Identifier": {
            "PURL": "pkg:npm/fast-levenshtein@2.0.6",
            "UID": "d034a2622a6332b9",
            "BOMRef": "pkg:npm/fast-levenshtein@2.0.6"
          },
          "Version": "2.0.6",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "optionator@0.9.4"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "fastq@1.19.1",
          "Name": "fastq",
          "Identifier": {
            "PURL": "pkg:npm/fastq@1.19.1",
            "UID": "5bb93079c3315ebb",
            "BOMRef": "pkg:npm/fastq@1.19.1"
          },
          "Version": "1.19.1",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "@nodelib/fs.walk@1.2.8"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "fdir@6.4.6",
          "Name": "fdir",
          "Identifier": {
            "PURL": "pkg:npm/fdir@6.4.6",
            "UID": "f7c8bac84377b3b8",
            "BOMRef": "pkg:npm/fdir@6.4.6"
          },
          "Version": "6.4.6",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "tinyglobby@0.2.14",
            "vite@6.4.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "file-entry-cache@6.0.1",
          "Name": "file-entry-cache",
          "Identifier": {
            "PURL": "pkg:npm/file-entry-cache@6.0.1",
            "UID": "212b5c28067d3fb9",
            "BOMRef": "pkg:npm/file-entry-cache@6.0.1"
          },
          "Version": "6.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "eslint@8.57.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "fill-range@7.1.1",
          "Name": "fill-range",
          "Identifier": {
            "PURL": "pkg:npm/fill-range@7.1.1",
            "UID": "23da3dc7139cfb10",
            "BOMRef": "pkg:npm/fill-range@7.1.1"
          },
          "Version": "7.1.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "braces@3.0.3"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "find-root@1.1.0",
          "Name": "find-root",
          "Identifier": {
            "PURL": "pkg:npm/find-root@1.1.0",
            "UID": "bd67b1f21a83bf8c",
            "BOMRef": "pkg:npm/find-root@1.1.0"
          },
          "Version": "1.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@emotion/babel-plugin@11.13.5"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "find-up@5.0.0",
          "Name": "find-up",
          "Identifier": {
            "PURL": "pkg:npm/find-up@5.0.0",
            "UID": "8a4a81c31df4d272",
            "BOMRef": "pkg:npm/find-up@5.0.0"
          },
          "Version": "5.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "eslint@8.57.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "flat-cache@3.2.0",
          "Name": "flat-cache",
          "Identifier": {
            "PURL": "pkg:npm/flat-cache@3.2.0",
            "UID": "e7860be43b11715d",
            "BOMRef": "pkg:npm/flat-cache@3.2.0"
          },
          "Version": "3.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "file-entry-cache@6.0.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "flatted@3.3.3",
          "Name": "flatted",
          "Identifier": {
            "PURL": "pkg:npm/flatted@3.3.3",
            "UID": "d50eacf492693fa4",
            "BOMRef": "pkg:npm/flatted@3.3.3"
          },
          "Version": "3.3.3",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "flat-cache@3.2.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "float-tooltip@1.7.5",
          "Name": "float-tooltip",
          "Identifier": {
            "PURL": "pkg:npm/float-tooltip@1.7.5",
            "UID": "2eae38d0245e6e05",
            "BOMRef": "pkg:npm/float-tooltip@1.7.5"
          },
          "Version": "1.7.5",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "force-graph@1.50.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "follow-redirects@1.15.9",
          "Name": "follow-redirects",
          "Identifier": {
            "PURL": "pkg:npm/follow-redirects@1.15.9",
            "UID": "c92a5123863802a8",
            "BOMRef": "pkg:npm/follow-redirects@1.15.9"
          },
          "Version": "1.15.9",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "axios@1.12.2"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "for-each@0.3.5",
          "Name": "for-each",
          "Identifier": {
            "PURL": "pkg:npm/for-each@0.3.5",
            "UID": "fda7c762ab7a9c9e",
            "BOMRef": "pkg:npm/for-each@0.3.5"
          },
          "Version": "0.3.5",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "typed-array-byte-length@1.0.3",
            "typed-array-byte-offset@1.0.4",
            "typed-array-length@1.0.7",
            "which-typed-array@1.1.19"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "force-graph@1.50.1",
          "Name": "force-graph",
          "Identifier": {
            "PURL": "pkg:npm/force-graph@1.50.1",
            "UID": "a97f541099a7df38",
            "BOMRef": "pkg:npm/force-graph@1.50.1"
          },
          "Version": "1.50.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "form-data@4.0.4",
          "Name": "form-data",
          "Identifier": {
            "PURL": "pkg:npm/form-data@4.0.4",
            "UID": "48f375ab91551725",
            "BOMRef": "pkg:npm/form-data@4.0.4"
          },
          "Version": "4.0.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "axios@1.12.2",
            "jsdom@22.1.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "fs.realpath@1.0.0",
          "Name": "fs.realpath",
          "Identifier": {
            "PURL": "pkg:npm/fs.realpath@1.0.0",
            "UID": "94bbcbf499715cf1",
            "BOMRef": "pkg:npm/fs.realpath@1.0.0"
          },
          "Version": "1.0.0",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "glob@7.2.3"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "function-bind@1.1.2",
          "Name": "function-bind",
          "Identifier": {
            "PURL": "pkg:npm/function-bind@1.1.2",
            "UID": "de67acb44142b74d",
            "BOMRef": "pkg:npm/function-bind@1.1.2"
          },
          "Version": "1.1.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "call-bind-apply-helpers@1.0.2",
            "es-iterator-helpers@1.2.1",
            "get-intrinsic@1.3.0",
            "hasown@2.0.2",
            "set-function-length@1.2.2"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "function.prototype.name@1.1.8",
          "Name": "function.prototype.name",
          "Identifier": {
            "PURL": "pkg:npm/function.prototype.name@1.1.8",
            "UID": "61fdaa30ef643c15",
            "BOMRef": "pkg:npm/function.prototype.name@1.1.8"
          },
          "Version": "1.1.8",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "es-abstract@1.24.0",
            "which-builtin-type@1.2.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "functions-have-names@1.2.3",
          "Name": "functions-have-names",
          "Identifier": {
            "PURL": "pkg:npm/functions-have-names@1.2.3",
            "UID": "dd887fff57912c87",
            "BOMRef": "pkg:npm/functions-have-names@1.2.3"
          },
          "Version": "1.2.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "function.prototype.name@1.1.8",
            "set-function-name@2.0.2"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "gensync@1.0.0-beta.2",
          "Name": "gensync",
          "Identifier": {
            "PURL": "pkg:npm/gensync@1.0.0-beta.2",
            "UID": "51d49d0807cbd29b",
            "BOMRef": "pkg:npm/gensync@1.0.0-beta.2"
          },
          "Version": "1.0.0-beta.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@babel/core@7.28.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "get-intrinsic@1.3.0",
          "Name": "get-intrinsic",
          "Identifier": {
            "PURL": "pkg:npm/get-intrinsic@1.3.0",
            "UID": "4d971f68689ef2ca",
            "BOMRef": "pkg:npm/get-intrinsic@1.3.0"
          },
          "Version": "1.3.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "array-includes@3.1.9",
            "arraybuffer.prototype.slice@1.0.4",
            "call-bind@1.0.8",
            "call-bound@1.0.4",
            "deep-equal@2.2.3",
            "es-abstract@1.24.0",
            "es-get-iterator@1.1.3",
            "es-iterator-helpers@1.2.1",
            "es-set-tostringtag@2.1.0",
            "get-symbol-description@1.1.0",
            "is-array-buffer@3.0.5",
            "is-data-view@1.0.2",
            "is-weakset@2.0.4",
            "iterator.prototype@1.1.5",
            "own-keys@1.0.1",
            "reflect.getprototypeof@1.0.10",
            "safe-array-concat@1.1.3",
            "set-function-length@1.2.2",
            "side-channel-map@1.0.1",
            "side-channel-weakmap@1.0.2",
            "string.prototype.matchall@4.0.12"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "get-proto@1.0.1",
          "Name": "get-proto",
          "Identifier": {
            "PURL": "pkg:npm/get-proto@1.0.1",
            "UID": "d59473f4d19be5f0",
            "BOMRef": "pkg:npm/get-proto@1.0.1"
          },
          "Version": "1.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "es-abstract@1.24.0",
            "get-intrinsic@1.3.0",
            "is-async-function@2.1.1",
            "is-generator-function@1.1.0",
            "iterator.prototype@1.1.5",
            "reflect.getprototypeof@1.0.10",
            "regexp.prototype.flags@1.5.4",
            "which-typed-array@1.1.19"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "get-symbol-description@1.1.0",
          "Name": "get-symbol-description",
          "Identifier": {
            "PURL": "pkg:npm/get-symbol-description@1.1.0",
            "UID": "d387608a6722ba75",
            "BOMRef": "pkg:npm/get-symbol-description@1.1.0"
          },
          "Version": "1.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "es-abstract@1.24.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "glob@7.2.3",
          "Name": "glob",
          "Identifier": {
            "PURL": "pkg:npm/glob@7.2.3",
            "UID": "68b18b17d0bb6143",
            "BOMRef": "pkg:npm/glob@7.2.3"
          },
          "Version": "7.2.3",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "rimraf@3.0.2"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "glob-parent@6.0.2",
          "Name": "glob-parent",
          "Identifier": {
            "PURL": "pkg:npm/glob-parent@6.0.2",
            "UID": "1a55bb177326389a",
            "BOMRef": "pkg:npm/glob-parent@6.0.2"
          },
          "Version": "6.0.2",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "eslint@8.57.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "globals@13.24.0",
          "Name": "globals",
          "Identifier": {
            "PURL": "pkg:npm/globals@13.24.0",
            "UID": "2b4d140884073f5c",
            "BOMRef": "pkg:npm/globals@13.24.0"
          },
          "Version": "13.24.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@eslint/eslintrc@2.1.4",
            "eslint@8.57.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "globalthis@1.0.4",
          "Name": "globalthis",
          "Identifier": {
            "PURL": "pkg:npm/globalthis@1.0.4",
            "UID": "b5432fb6ec3a4d89",
            "BOMRef": "pkg:npm/globalthis@1.0.4"
          },
          "Version": "1.0.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "es-abstract@1.24.0",
            "es-iterator-helpers@1.2.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "goober@2.1.16",
          "Name": "goober",
          "Identifier": {
            "PURL": "pkg:npm/goober@2.1.16",
            "UID": "ccd22ead540fa0da",
            "BOMRef": "pkg:npm/goober@2.1.16"
          },
          "Version": "2.1.16",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "notistack@3.0.2"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "gopd@1.2.0",
          "Name": "gopd",
          "Identifier": {
            "PURL": "pkg:npm/gopd@1.2.0",
            "UID": "18a5b08cd12b4e5e",
            "BOMRef": "pkg:npm/gopd@1.2.0"
          },
          "Version": "1.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "define-data-property@1.1.4",
            "dunder-proto@1.0.1",
            "es-abstract@1.24.0",
            "es-iterator-helpers@1.2.1",
            "get-intrinsic@1.3.0",
            "globalthis@1.0.4",
            "is-regex@1.2.1",
            "regexp.prototype.flags@1.5.4",
            "set-function-length@1.2.2",
            "string.prototype.matchall@4.0.12",
            "typed-array-byte-length@1.0.3",
            "typed-array-byte-offset@1.0.4",
            "typed-array-length@1.0.7",
            "which-typed-array@1.1.19"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "graceful-fs@4.2.11",
          "Name": "graceful-fs",
          "Identifier": {
            "PURL": "pkg:npm/graceful-fs@4.2.11",
            "UID": "5e80727644c9de40",
            "BOMRef": "pkg:npm/graceful-fs@4.2.11"
          },
          "Version": "4.2.11",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "enhanced-resolve@5.18.2",
            "jest-message-util@30.0.2",
            "jest-util@30.0.2"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "graphemer@1.4.0",
          "Name": "graphemer",
          "Identifier": {
            "PURL": "pkg:npm/graphemer@1.4.0",
            "UID": "38572114cc5637d3",
            "BOMRef": "pkg:npm/graphemer@1.4.0"
          },
          "Version": "1.4.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "eslint@8.57.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "has-bigints@1.1.0",
          "Name": "has-bigints",
          "Identifier": {
            "PURL": "pkg:npm/has-bigints@1.1.0",
            "UID": "d3057dd4bbfa112f",
            "BOMRef": "pkg:npm/has-bigints@1.1.0"
          },
          "Version": "1.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "is-bigint@1.1.0",
            "unbox-primitive@1.1.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "has-flag@4.0.0",
          "Name": "has-flag",
          "Identifier": {
            "PURL": "pkg:npm/has-flag@4.0.0",
            "UID": "70e27d9f6e922118",
            "BOMRef": "pkg:npm/has-flag@4.0.0"
          },
          "Version": "4.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "supports-color@7.2.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "has-property-descriptors@1.0.2",
          "Name": "has-property-descriptors",
          "Identifier": {
            "PURL": "pkg:npm/has-property-descriptors@1.0.2",
            "UID": "eee624849d5684b6",
            "BOMRef": "pkg:npm/has-property-descriptors@1.0.2"
          },
          "Version": "1.0.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "define-properties@1.2.1",
            "es-abstract@1.24.0",
            "es-iterator-helpers@1.2.1",
            "set-function-length@1.2.2",
            "set-function-name@2.0.2",
            "string.prototype.trim@1.2.10"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "has-proto@1.2.0",
          "Name": "has-proto",
          "Identifier": {
            "PURL": "pkg:npm/has-proto@1.2.0",
            "UID": "962afb248c63d61a",
            "BOMRef": "pkg:npm/has-proto@1.2.0"
          },
          "Version": "1.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "es-abstract@1.24.0",
            "es-iterator-helpers@1.2.1",
            "typed-array-byte-length@1.0.3",
            "typed-array-byte-offset@1.0.4"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "has-symbols@1.1.0",
          "Name": "has-symbols",
          "Identifier": {
            "PURL": "pkg:npm/has-symbols@1.1.0",
            "UID": "e02158d24999ff04",
            "BOMRef": "pkg:npm/has-symbols@1.1.0"
          },
          "Version": "1.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "es-abstract@1.24.0",
            "es-get-iterator@1.1.3",
            "es-iterator-helpers@1.2.1",
            "get-intrinsic@1.3.0",
            "has-tostringtag@1.0.2",
            "is-symbol@1.1.1",
            "iterator.prototype@1.1.5",
            "object.assign@4.1.7",
            "safe-array-concat@1.1.3",
            "string.prototype.matchall@4.0.12",
            "unbox-primitive@1.1.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "has-tostringtag@1.0.2",
          "Name": "has-tostringtag",
          "Identifier": {
            "PURL": "pkg:npm/has-tostringtag@1.0.2",
            "UID": "cf4e0aeebb1748de",
            "BOMRef": "pkg:npm/has-tostringtag@1.0.2"
          },
          "Version": "1.0.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "es-set-tostringtag@2.1.0",
            "is-arguments@1.2.0",
            "is-async-function@2.1.1",
            "is-boolean-object@1.2.2",
            "is-date-object@1.1.0",
            "is-generator-function@1.1.0",
            "is-number-object@1.1.1",
            "is-regex@1.2.1",
            "is-string@1.1.1",
            "which-builtin-type@1.2.1",
            "which-typed-array@1.1.19"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "hasown@2.0.2",
          "Name": "hasown",
          "Identifier": {
            "PURL": "pkg:npm/hasown@2.0.2",
            "UID": "8f4b5cb4fc048bce",
            "BOMRef": "pkg:npm/hasown@2.0.2"
          },
          "Version": "2.0.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "es-abstract@1.24.0",
            "es-set-tostringtag@2.1.0",
            "es-shim-unscopables@1.1.0",
            "eslint-plugin-react@7.37.5",
            "form-data@4.0.4",
            "function.prototype.name@1.1.8",
            "get-intrinsic@1.3.0",
            "internal-slot@1.1.0",
            "is-core-module@2.16.1",
            "is-regex@1.2.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "hast-util-to-estree@2.3.3",
          "Name": "hast-util-to-estree",
          "Identifier": {
            "PURL": "pkg:npm/hast-util-to-estree@2.3.3",
            "UID": "76962b65529dee44",
            "BOMRef": "pkg:npm/hast-util-to-estree@2.3.3"
          },
          "Version": "2.3.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mdx-js/mdx@2.3.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "hast-util-whitespace@2.0.1",
          "Name": "hast-util-whitespace",
          "Identifier": {
            "PURL": "pkg:npm/hast-util-whitespace@2.0.1",
            "UID": "2182368f12bc92ee",
            "BOMRef": "pkg:npm/hast-util-whitespace@2.0.1"
          },
          "Version": "2.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "hast-util-to-estree@2.3.3"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "hoist-non-react-statics@3.3.2",
          "Name": "hoist-non-react-statics",
          "Identifier": {
            "PURL": "pkg:npm/hoist-non-react-statics@3.3.2",
            "UID": "f19b7f0298914b5b",
            "BOMRef": "pkg:npm/hoist-non-react-statics@3.3.2"
          },
          "Version": "3.3.2",
          "Licenses": [
            "BSD-3-Clause"
          ],
          "DependsOn": [
            "@emotion/react@11.14.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "html-encoding-sniffer@3.0.0",
          "Name": "html-encoding-sniffer",
          "Identifier": {
            "PURL": "pkg:npm/html-encoding-sniffer@3.0.0",
            "UID": "f8386bba0b1b088d",
            "BOMRef": "pkg:npm/html-encoding-sniffer@3.0.0"
          },
          "Version": "3.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "jsdom@22.1.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "http-proxy-agent@5.0.0",
          "Name": "http-proxy-agent",
          "Identifier": {
            "PURL": "pkg:npm/http-proxy-agent@5.0.0",
            "UID": "f5c4238ef88ebd23",
            "BOMRef": "pkg:npm/http-proxy-agent@5.0.0"
          },
          "Version": "5.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "jsdom@22.1.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "https-proxy-agent@5.0.1",
          "Name": "https-proxy-agent",
          "Identifier": {
            "PURL": "pkg:npm/https-proxy-agent@5.0.1",
            "UID": "3bd6504332cdeb8",
            "BOMRef": "pkg:npm/https-proxy-agent@5.0.1"
          },
          "Version": "5.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "jsdom@22.1.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "iconv-lite@0.6.3",
          "Name": "iconv-lite",
          "Identifier": {
            "PURL": "pkg:npm/iconv-lite@0.6.3",
            "UID": "68d32a42ac5494a",
            "BOMRef": "pkg:npm/iconv-lite@0.6.3"
          },
          "Version": "0.6.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "whatwg-encoding@2.0.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "ignore@5.3.2",
          "Name": "ignore",
          "Identifier": {
            "PURL": "pkg:npm/ignore@5.3.2",
            "UID": "8ba69aa13dd680fd",
            "BOMRef": "pkg:npm/ignore@5.3.2"
          },
          "Version": "5.3.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@eslint/eslintrc@2.1.4",
            "eslint@8.57.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "import-fresh@3.3.1",
          "Name": "import-fresh",
          "Identifier": {
            "PURL": "pkg:npm/import-fresh@3.3.1",
            "UID": "a7fca2df3c10ef90",
            "BOMRef": "pkg:npm/import-fresh@3.3.1"
          },
          "Version": "3.3.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@eslint/eslintrc@2.1.4",
            "cosmiconfig@7.1.0",
            "cosmiconfig@8.3.6"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "imurmurhash@0.1.4",
          "Name": "imurmurhash",
          "Identifier": {
            "PURL": "pkg:npm/imurmurhash@0.1.4",
            "UID": "9b4c144ef2bfee92",
            "BOMRef": "pkg:npm/imurmurhash@0.1.4"
          },
          "Version": "0.1.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "eslint@8.57.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "indent-string@4.0.0",
          "Name": "indent-string",
          "Identifier": {
            "PURL": "pkg:npm/indent-string@4.0.0",
            "UID": "4d461e1890b7fdf3",
            "BOMRef": "pkg:npm/indent-string@4.0.0"
          },
          "Version": "4.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "redent@3.0.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "index-array-by@1.4.2",
          "Name": "index-array-by",
          "Identifier": {
            "PURL": "pkg:npm/index-array-by@1.4.2",
            "UID": "a5a2d9a99496d387",
            "BOMRef": "pkg:npm/index-array-by@1.4.2"
          },
          "Version": "1.4.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "force-graph@1.50.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "inflight@1.0.6",
          "Name": "inflight",
          "Identifier": {
            "PURL": "pkg:npm/inflight@1.0.6",
            "UID": "e7499e1968ef5e",
            "BOMRef": "pkg:npm/inflight@1.0.6"
          },
          "Version": "1.0.6",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "glob@7.2.3"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "inherits@2.0.4",
          "Name": "inherits",
          "Identifier": {
            "PURL": "pkg:npm/inherits@2.0.4",
            "UID": "62a828aa1c51bdd0",
            "BOMRef": "pkg:npm/inherits@2.0.4"
          },
          "Version": "2.0.4",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "glob@7.2.3"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "inline-style-parser@0.1.1",
          "Name": "inline-style-parser",
          "Identifier": {
            "PURL": "pkg:npm/inline-style-parser@0.1.1",
            "UID": "797ac9974ee3be2",
            "BOMRef": "pkg:npm/inline-style-parser@0.1.1"
          },
          "Version": "0.1.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "style-to-object@0.4.4"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "internal-slot@1.1.0",
          "Name": "internal-slot",
          "Identifier": {
            "PURL": "pkg:npm/internal-slot@1.1.0",
            "UID": "85e3b4e29562fa62",
            "BOMRef": "pkg:npm/internal-slot@1.1.0"
          },
          "Version": "1.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "es-abstract@1.24.0",
            "es-iterator-helpers@1.2.1",
            "stop-iteration-iterator@1.1.0",
            "string.prototype.matchall@4.0.12"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "internmap@2.0.3",
          "Name": "internmap",
          "Identifier": {
            "PURL": "pkg:npm/internmap@2.0.3",
            "UID": "2cd7014ae77a2458",
            "BOMRef": "pkg:npm/internmap@2.0.3"
          },
          "Version": "2.0.3",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "d3-array@3.2.4"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "is-alphabetical@2.0.1",
          "Name": "is-alphabetical",
          "Identifier": {
            "PURL": "pkg:npm/is-alphabetical@2.0.1",
            "UID": "f2ac21c611e825f",
            "BOMRef": "pkg:npm/is-alphabetical@2.0.1"
          },
          "Version": "2.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "is-alphanumerical@2.0.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "is-alphanumerical@2.0.1",
          "Name": "is-alphanumerical",
          "Identifier": {
            "PURL": "pkg:npm/is-alphanumerical@2.0.1",
            "UID": "3255e4fb5277d65c",
            "BOMRef": "pkg:npm/is-alphanumerical@2.0.1"
          },
          "Version": "2.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "parse-entities@4.0.2"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "is-arguments@1.2.0",
          "Name": "is-arguments",
          "Identifier": {
            "PURL": "pkg:npm/is-arguments@1.2.0",
            "UID": "af8de5a6340dce71",
            "BOMRef": "pkg:npm/is-arguments@1.2.0"
          },
          "Version": "1.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "deep-equal@2.2.3",
            "es-get-iterator@1.1.3"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "is-array-buffer@3.0.5",
          "Name": "is-array-buffer",
          "Identifier": {
            "PURL": "pkg:npm/is-array-buffer@3.0.5",
            "UID": "58a6524e025ee92a",
            "BOMRef": "pkg:npm/is-array-buffer@3.0.5"
          },
          "Version": "3.0.5",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "array-buffer-byte-length@1.0.2",
            "arraybuffer.prototype.slice@1.0.4",
            "deep-equal@2.2.3",
            "es-abstract@1.24.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "is-arrayish@0.2.1",
          "Name": "is-arrayish",
          "Identifier": {
            "PURL": "pkg:npm/is-arrayish@0.2.1",
            "UID": "60a67e0ca812278d",
            "BOMRef": "pkg:npm/is-arrayish@0.2.1"
          },
          "Version": "0.2.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "error-ex@1.3.2"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "is-async-function@2.1.1",
          "Name": "is-async-function",
          "Identifier": {
            "PURL": "pkg:npm/is-async-function@2.1.1",
            "UID": "c610c88bb2ad67e1",
            "BOMRef": "pkg:npm/is-async-function@2.1.1"
          },
          "Version": "2.1.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "which-builtin-type@1.2.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "is-bigint@1.1.0",
          "Name": "is-bigint",
          "Identifier": {
            "PURL": "pkg:npm/is-bigint@1.1.0",
            "UID": "bc5907cea36d8380",
            "BOMRef": "pkg:npm/is-bigint@1.1.0"
          },
          "Version": "1.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "which-boxed-primitive@1.1.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "is-boolean-object@1.2.2",
          "Name": "is-boolean-object",
          "Identifier": {
            "PURL": "pkg:npm/is-boolean-object@1.2.2",
            "UID": "d215d98acdfa5493",
            "BOMRef": "pkg:npm/is-boolean-object@1.2.2"
          },
          "Version": "1.2.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "which-boxed-primitive@1.1.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "is-buffer@2.0.5",
          "Name": "is-buffer",
          "Identifier": {
            "PURL": "pkg:npm/is-buffer@2.0.5",
            "UID": "fcf383e40f7683b3",
            "BOMRef": "pkg:npm/is-buffer@2.0.5"
          },
          "Version": "2.0.5",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "unified@10.1.2",
            "vfile@5.3.7"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "is-callable@1.2.7",
          "Name": "is-callable",
          "Identifier": {
            "PURL": "pkg:npm/is-callable@1.2.7",
            "UID": "f0df2776e37cee43",
            "BOMRef": "pkg:npm/is-callable@1.2.7"
          },
          "Version": "1.2.7",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "es-abstract@1.24.0",
            "es-to-primitive@1.3.0",
            "for-each@0.3.5",
            "function.prototype.name@1.1.8"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "is-core-module@2.16.1",
          "Name": "is-core-module",
          "Identifier": {
            "PURL": "pkg:npm/is-core-module@2.16.1",
            "UID": "4ffe2c0fb0d37766",
            "BOMRef": "pkg:npm/is-core-module@2.16.1"
          },
          "Version": "2.16.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "resolve@1.22.10",
            "resolve@2.0.0-next.5"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "is-data-view@1.0.2",
          "Name": "is-data-view",
          "Identifier": {
            "PURL": "pkg:npm/is-data-view@1.0.2",
            "UID": "a975535e7c404ace",
            "BOMRef": "pkg:npm/is-data-view@1.0.2"
          },
          "Version": "1.0.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "data-view-buffer@1.0.2",
            "data-view-byte-length@1.0.2",
            "data-view-byte-offset@1.0.1",
            "es-abstract@1.24.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "is-date-object@1.1.0",
          "Name": "is-date-object",
          "Identifier": {
            "PURL": "pkg:npm/is-date-object@1.1.0",
            "UID": "dd247e95d1ed0e36",
            "BOMRef": "pkg:npm/is-date-object@1.1.0"
          },
          "Version": "1.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "deep-equal@2.2.3",
            "es-to-primitive@1.3.0",
            "which-builtin-type@1.2.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "is-decimal@2.0.1",
          "Name": "is-decimal",
          "Identifier": {
            "PURL": "pkg:npm/is-decimal@2.0.1",
            "UID": "d75acce1634f4720",
            "BOMRef": "pkg:npm/is-decimal@2.0.1"
          },
          "Version": "2.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "is-alphanumerical@2.0.1",
            "parse-entities@4.0.2"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "is-extglob@2.1.1",
          "Name": "is-extglob",
          "Identifier": {
            "PURL": "pkg:npm/is-extglob@2.1.1",
            "UID": "1749e9d8b9fd8c32",
            "BOMRef": "pkg:npm/is-extglob@2.1.1"
          },
          "Version": "2.1.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "is-glob@4.0.3"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "is-finalizationregistry@1.1.1",
          "Name": "is-finalizationregistry",
          "Identifier": {
            "PURL": "pkg:npm/is-finalizationregistry@1.1.1",
            "UID": "4657676e45f2d53a",
            "BOMRef": "pkg:npm/is-finalizationregistry@1.1.1"
          },
          "Version": "1.1.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "which-builtin-type@1.2.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "is-generator-function@1.1.0",
          "Name": "is-generator-function",
          "Identifier": {
            "PURL": "pkg:npm/is-generator-function@1.1.0",
            "UID": "a87749ec689c4613",
            "BOMRef": "pkg:npm/is-generator-function@1.1.0"
          },
          "Version": "1.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "which-builtin-type@1.2.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "is-glob@4.0.3",
          "Name": "is-glob",
          "Identifier": {
            "PURL": "pkg:npm/is-glob@4.0.3",
            "UID": "7ce4f815bc047ae8",
            "BOMRef": "pkg:npm/is-glob@4.0.3"
          },
          "Version": "4.0.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@parcel/watcher@2.5.1",
            "eslint@8.57.1",
            "glob-parent@6.0.2"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "is-hexadecimal@2.0.1",
          "Name": "is-hexadecimal",
          "Identifier": {
            "PURL": "pkg:npm/is-hexadecimal@2.0.1",
            "UID": "845ec219a33966fc",
            "BOMRef": "pkg:npm/is-hexadecimal@2.0.1"
          },
          "Version": "2.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "parse-entities@4.0.2"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "is-map@2.0.3",
          "Name": "is-map",
          "Identifier": {
            "PURL": "pkg:npm/is-map@2.0.3",
            "UID": "c60c5d0c86f39ea0",
            "BOMRef": "pkg:npm/is-map@2.0.3"
          },
          "Version": "2.0.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "es-get-iterator@1.1.3",
            "which-collection@1.0.2"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "is-negative-zero@2.0.3",
          "Name": "is-negative-zero",
          "Identifier": {
            "PURL": "pkg:npm/is-negative-zero@2.0.3",
            "UID": "6913e5f3ab257398",
            "BOMRef": "pkg:npm/is-negative-zero@2.0.3"
          },
          "Version": "2.0.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "es-abstract@1.24.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "is-network-error@1.1.0",
          "Name": "is-network-error",
          "Identifier": {
            "PURL": "pkg:npm/is-network-error@1.1.0",
            "UID": "e53cd2be6d9b7bdb",
            "BOMRef": "pkg:npm/is-network-error@1.1.0"
          },
          "Version": "1.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "p-retry@6.2.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "is-number@7.0.0",
          "Name": "is-number",
          "Identifier": {
            "PURL": "pkg:npm/is-number@7.0.0",
            "UID": "1d4d494bb0156b19",
            "BOMRef": "pkg:npm/is-number@7.0.0"
          },
          "Version": "7.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "to-regex-range@5.0.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "is-number-object@1.1.1",
          "Name": "is-number-object",
          "Identifier": {
            "PURL": "pkg:npm/is-number-object@1.1.1",
            "UID": "5888d195e056cd",
            "BOMRef": "pkg:npm/is-number-object@1.1.1"
          },
          "Version": "1.1.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "which-boxed-primitive@1.1.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "is-path-inside@3.0.3",
          "Name": "is-path-inside",
          "Identifier": {
            "PURL": "pkg:npm/is-path-inside@3.0.3",
            "UID": "9989a626a5435350",
            "BOMRef": "pkg:npm/is-path-inside@3.0.3"
          },
          "Version": "3.0.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "eslint@8.57.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "is-plain-obj@4.1.0",
          "Name": "is-plain-obj",
          "Identifier": {
            "PURL": "pkg:npm/is-plain-obj@4.1.0",
            "UID": "cf1d045bd1320de",
            "BOMRef": "pkg:npm/is-plain-obj@4.1.0"
          },
          "Version": "4.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "unified@10.1.2"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "is-potential-custom-element-name@1.0.1",
          "Name": "is-potential-custom-element-name",
          "Identifier": {
            "PURL": "pkg:npm/is-potential-custom-element-name@1.0.1",
            "UID": "814598594c1e4fb4",
            "BOMRef": "pkg:npm/is-potential-custom-element-name@1.0.1"
          },
          "Version": "1.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "jsdom@22.1.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "is-reference@3.0.3",
          "Name": "is-reference",
          "Identifier": {
            "PURL": "pkg:npm/is-reference@3.0.3",
            "UID": "f50fe6582663f94b",
            "BOMRef": "pkg:npm/is-reference@3.0.3"
          },
          "Version": "3.0.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "periscopic@3.1.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "is-regex@1.2.1",
          "Name": "is-regex",
          "Identifier": {
            "PURL": "pkg:npm/is-regex@1.2.1",
            "UID": "7483bdfd6ffa45f9",
            "BOMRef": "pkg:npm/is-regex@1.2.1"
          },
          "Version": "1.2.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "deep-equal@2.2.3",
            "es-abstract@1.24.0",
            "safe-regex-test@1.1.0",
            "which-builtin-type@1.2.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "is-set@2.0.3",
          "Name": "is-set",
          "Identifier": {
            "PURL": "pkg:npm/is-set@2.0.3",
            "UID": "1c5b5ff15018ba6e",
            "BOMRef": "pkg:npm/is-set@2.0.3"
          },
          "Version": "2.0.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "es-abstract@1.24.0",
            "es-get-iterator@1.1.3",
            "which-collection@1.0.2"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "is-shared-array-buffer@1.0.4",
          "Name": "is-shared-array-buffer",
          "Identifier": {
            "PURL": "pkg:npm/is-shared-array-buffer@1.0.4",
            "UID": "112914acbc9d0ee8",
            "BOMRef": "pkg:npm/is-shared-array-buffer@1.0.4"
          },
          "Version": "1.0.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "deep-equal@2.2.3",
            "es-abstract@1.24.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "is-string@1.1.1",
          "Name": "is-string",
          "Identifier": {
            "PURL": "pkg:npm/is-string@1.1.1",
            "UID": "e804b353510a5fd3",
            "BOMRef": "pkg:npm/is-string@1.1.1"
          },
          "Version": "1.1.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "array-includes@3.1.9",
            "es-abstract@1.24.0",
            "es-get-iterator@1.1.3",
            "which-boxed-primitive@1.1.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "is-symbol@1.1.1",
          "Name": "is-symbol",
          "Identifier": {
            "PURL": "pkg:npm/is-symbol@1.1.1",
            "UID": "36d7ff12eeaafb69",
            "BOMRef": "pkg:npm/is-symbol@1.1.1"
          },
          "Version": "1.1.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "es-to-primitive@1.3.0",
            "which-boxed-primitive@1.1.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "is-typed-array@1.1.15",
          "Name": "is-typed-array",
          "Identifier": {
            "PURL": "pkg:npm/is-typed-array@1.1.15",
            "UID": "df22618d2ae529b9",
            "BOMRef": "pkg:npm/is-typed-array@1.1.15"
          },
          "Version": "1.1.15",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "es-abstract@1.24.0",
            "is-data-view@1.0.2",
            "typed-array-buffer@1.0.3",
            "typed-array-byte-length@1.0.3",
            "typed-array-byte-offset@1.0.4",
            "typed-array-length@1.0.7"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "is-weakmap@2.0.2",
          "Name": "is-weakmap",
          "Identifier": {
            "PURL": "pkg:npm/is-weakmap@2.0.2",
            "UID": "b679abb7e9ea615f",
            "BOMRef": "pkg:npm/is-weakmap@2.0.2"
          },
          "Version": "2.0.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "which-collection@1.0.2"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "is-weakref@1.1.1",
          "Name": "is-weakref",
          "Identifier": {
            "PURL": "pkg:npm/is-weakref@1.1.1",
            "UID": "4c559565b6e13f47",
            "BOMRef": "pkg:npm/is-weakref@1.1.1"
          },
          "Version": "1.1.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "es-abstract@1.24.0",
            "which-builtin-type@1.2.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "is-weakset@2.0.4",
          "Name": "is-weakset",
          "Identifier": {
            "PURL": "pkg:npm/is-weakset@2.0.4",
            "UID": "6c3913e2dd583a81",
            "BOMRef": "pkg:npm/is-weakset@2.0.4"
          },
          "Version": "2.0.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "which-collection@1.0.2"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "isarray@2.0.5",
          "Name": "isarray",
          "Identifier": {
            "PURL": "pkg:npm/isarray@2.0.5",
            "UID": "74a057d033672bc1",
            "BOMRef": "pkg:npm/isarray@2.0.5"
          },
          "Version": "2.0.5",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "deep-equal@2.2.3",
            "es-get-iterator@1.1.3",
            "safe-array-concat@1.1.3",
            "safe-push-apply@1.0.0",
            "which-builtin-type@1.2.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "isexe@2.0.0",
          "Name": "isexe",
          "Identifier": {
            "PURL": "pkg:npm/isexe@2.0.0",
            "UID": "65a922848496aea5",
            "BOMRef": "pkg:npm/isexe@2.0.0"
          },
          "Version": "2.0.0",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "which@2.0.2"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "iterator.prototype@1.1.5",
          "Name": "iterator.prototype",
          "Identifier": {
            "PURL": "pkg:npm/iterator.prototype@1.1.5",
            "UID": "410461abd3685388",
            "BOMRef": "pkg:npm/iterator.prototype@1.1.5"
          },
          "Version": "1.1.5",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "es-iterator-helpers@1.2.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "jest-diff@30.0.4",
          "Name": "jest-diff",
          "Identifier": {
            "PURL": "pkg:npm/jest-diff@30.0.4",
            "UID": "b7e12fa7226f2ab1",
            "BOMRef": "pkg:npm/jest-diff@30.0.4"
          },
          "Version": "30.0.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "jest-matcher-utils@30.0.4"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "jest-matcher-utils@30.0.4",
          "Name": "jest-matcher-utils",
          "Identifier": {
            "PURL": "pkg:npm/jest-matcher-utils@30.0.4",
            "UID": "6fb0c27bf509192c",
            "BOMRef": "pkg:npm/jest-matcher-utils@30.0.4"
          },
          "Version": "30.0.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "expect@30.0.4"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "jest-message-util@30.0.2",
          "Name": "jest-message-util",
          "Identifier": {
            "PURL": "pkg:npm/jest-message-util@30.0.2",
            "UID": "63dd2b34ddeb057a",
            "BOMRef": "pkg:npm/jest-message-util@30.0.2"
          },
          "Version": "30.0.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "expect@30.0.4"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "jest-mock@30.0.2",
          "Name": "jest-mock",
          "Identifier": {
            "PURL": "pkg:npm/jest-mock@30.0.2",
            "UID": "d454a3cb2ad31f72",
            "BOMRef": "pkg:npm/jest-mock@30.0.2"
          },
          "Version": "30.0.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "expect@30.0.4"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "jest-regex-util@30.0.1",
          "Name": "jest-regex-util",
          "Identifier": {
            "PURL": "pkg:npm/jest-regex-util@30.0.1",
            "UID": "57dbb05717edca0a",
            "BOMRef": "pkg:npm/jest-regex-util@30.0.1"
          },
          "Version": "30.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@jest/pattern@30.0.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "jest-util@30.0.2",
          "Name": "jest-util",
          "Identifier": {
            "PURL": "pkg:npm/jest-util@30.0.2",
            "UID": "15a4b1c8d88d5885",
            "BOMRef": "pkg:npm/jest-util@30.0.2"
          },
          "Version": "30.0.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "expect@30.0.4",
            "jest-mock@30.0.2"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "jiti@2.4.2",
          "Name": "jiti",
          "Identifier": {
            "PURL": "pkg:npm/jiti@2.4.2",
            "UID": "9bad9d57613f4c09",
            "BOMRef": "pkg:npm/jiti@2.4.2"
          },
          "Version": "2.4.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@tailwindcss/node@4.1.11",
            "vite@6.4.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "jose@5.10.0",
          "Name": "jose",
          "Identifier": {
            "PURL": "pkg:npm/jose@5.10.0",
            "UID": "19fccdb08ba359d1",
            "BOMRef": "pkg:npm/jose@5.10.0"
          },
          "Version": "5.10.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "js-tokens@4.0.0",
          "Name": "js-tokens",
          "Identifier": {
            "PURL": "pkg:npm/js-tokens@4.0.0",
            "UID": "87f60b9a0eda8ba7",
            "BOMRef": "pkg:npm/js-tokens@4.0.0"
          },
          "Version": "4.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@babel/code-frame@7.27.1",
            "loose-envify@1.4.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "js-tokens@9.0.1",
          "Name": "js-tokens",
          "Identifier": {
            "PURL": "pkg:npm/js-tokens@9.0.1",
            "UID": "88d2b5e43503cc14",
            "BOMRef": "pkg:npm/js-tokens@9.0.1"
          },
          "Version": "9.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "strip-literal@3.0.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "js-yaml@4.1.1",
          "Name": "js-yaml",
          "Identifier": {
            "PURL": "pkg:npm/js-yaml@4.1.1",
            "UID": "dbdd75a837c8d7bd",
            "BOMRef": "pkg:npm/js-yaml@4.1.1"
          },
          "Version": "4.1.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@eslint/eslintrc@2.1.4",
            "cosmiconfig@8.3.6",
            "eslint@8.57.1",
            "openapi-client-axios@7.6.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "jsdom@22.1.0",
          "Name": "jsdom",
          "Identifier": {
            "PURL": "pkg:npm/jsdom@22.1.0",
            "UID": "5f7c73d0dceadd78",
            "BOMRef": "pkg:npm/jsdom@22.1.0"
          },
          "Version": "22.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "qdrant-web-ui@0.2.5",
            "vitest@3.2.4"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "jsesc@3.1.0",
          "Name": "jsesc",
          "Identifier": {
            "PURL": "pkg:npm/jsesc@3.1.0",
            "UID": "58b9604a124b5f43",
            "BOMRef": "pkg:npm/jsesc@3.1.0"
          },
          "Version": "3.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@babel/generator@7.28.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "json-buffer@3.0.1",
          "Name": "json-buffer",
          "Identifier": {
            "PURL": "pkg:npm/json-buffer@3.0.1",
            "UID": "d554bda63c57c670",
            "BOMRef": "pkg:npm/json-buffer@3.0.1"
          },
          "Version": "3.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "keyv@4.5.4"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "json-parse-even-better-errors@2.3.1",
          "Name": "json-parse-even-better-errors",
          "Identifier": {
            "PURL": "pkg:npm/json-parse-even-better-errors@2.3.1",
            "UID": "415b12e0764ad79d",
            "BOMRef": "pkg:npm/json-parse-even-better-errors@2.3.1"
          },
          "Version": "2.3.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "parse-json@5.2.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "json-schema-traverse@0.4.1",
          "Name": "json-schema-traverse",
          "Identifier": {
            "PURL": "pkg:npm/json-schema-traverse@0.4.1",
            "UID": "5d51fd6a8cc7c16b",
            "BOMRef": "pkg:npm/json-schema-traverse@0.4.1"
          },
          "Version": "0.4.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "ajv@6.12.6"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "json-stable-stringify-without-jsonify@1.0.1",
          "Name": "json-stable-stringify-without-jsonify",
          "Identifier": {
            "PURL": "pkg:npm/json-stable-stringify-without-jsonify@1.0.1",
            "UID": "58b820901a928d6",
            "BOMRef": "pkg:npm/json-stable-stringify-without-jsonify@1.0.1"
          },
          "Version": "1.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "eslint@8.57.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "json5@2.2.3",
          "Name": "json5",
          "Identifier": {
            "PURL": "pkg:npm/json5@2.2.3",
            "UID": "ffe4382abd09533c",
            "BOMRef": "pkg:npm/json5@2.2.3"
          },
          "Version": "2.2.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@babel/core@7.28.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "jsonc-parser@3.3.1",
          "Name": "jsonc-parser",
          "Identifier": {
            "PURL": "pkg:npm/jsonc-parser@3.3.1",
            "UID": "e91fe412b4dd7b61",
            "BOMRef": "pkg:npm/jsonc-parser@3.3.1"
          },
          "Version": "3.3.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "jsx-ast-utils@3.3.5",
          "Name": "jsx-ast-utils",
          "Identifier": {
            "PURL": "pkg:npm/jsx-ast-utils@3.3.5",
            "UID": "961f6eed19f2b810",
            "BOMRef": "pkg:npm/jsx-ast-utils@3.3.5"
          },
          "Version": "3.3.5",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "eslint-plugin-react@7.37.5"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "jtd@0.1.1",
          "Name": "jtd",
          "Identifier": {
            "PURL": "pkg:npm/jtd@0.1.1",
            "UID": "2600444e68fc2bfc",
            "BOMRef": "pkg:npm/jtd@0.1.1"
          },
          "Version": "0.1.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "create-collection-form@0.0.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "kapsule@1.16.3",
          "Name": "kapsule",
          "Identifier": {
            "PURL": "pkg:npm/kapsule@1.16.3",
            "UID": "4d5064b41348743a",
            "BOMRef": "pkg:npm/kapsule@1.16.3"
          },
          "Version": "1.16.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "float-tooltip@1.7.5",
            "force-graph@1.50.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "keyv@4.5.4",
          "Name": "keyv",
          "Identifier": {
            "PURL": "pkg:npm/keyv@4.5.4",
            "UID": "606242a575160d9b",
            "BOMRef": "pkg:npm/keyv@4.5.4"
          },
          "Version": "4.5.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "flat-cache@3.2.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "kleur@4.1.5",
          "Name": "kleur",
          "Identifier": {
            "PURL": "pkg:npm/kleur@4.1.5",
            "UID": "67a359b3aeaa3462",
            "BOMRef": "pkg:npm/kleur@4.1.5"
          },
          "Version": "4.1.5",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "uvu@0.5.6"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "levn@0.4.1",
          "Name": "levn",
          "Identifier": {
            "PURL": "pkg:npm/levn@0.4.1",
            "UID": "27002bf90552a046",
            "BOMRef": "pkg:npm/levn@0.4.1"
          },
          "Version": "0.4.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "eslint@8.57.1",
            "optionator@0.9.4"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "lightningcss@1.30.1",
          "Name": "lightningcss",
          "Identifier": {
            "PURL": "pkg:npm/lightningcss@1.30.1",
            "UID": "cffad3abf3a746e8",
            "BOMRef": "pkg:npm/lightningcss@1.30.1"
          },
          "Version": "1.30.1",
          "Licenses": [
            "MPL-2.0"
          ],
          "DependsOn": [
            "@tailwindcss/node@4.1.11",
            "vite@6.4.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "lines-and-columns@1.2.4",
          "Name": "lines-and-columns",
          "Identifier": {
            "PURL": "pkg:npm/lines-and-columns@1.2.4",
            "UID": "933371e3dc42aa46",
            "BOMRef": "pkg:npm/lines-and-columns@1.2.4"
          },
          "Version": "1.2.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "parse-json@5.2.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "locate-path@6.0.0",
          "Name": "locate-path",
          "Identifier": {
            "PURL": "pkg:npm/locate-path@6.0.0",
            "UID": "1f16232424d58004",
            "BOMRef": "pkg:npm/locate-path@6.0.0"
          },
          "Version": "6.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "find-up@5.0.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "lodash@4.17.21",
          "Name": "lodash",
          "Identifier": {
            "PURL": "pkg:npm/lodash@4.17.21",
            "UID": "9e4ac386c9024f40",
            "BOMRef": "pkg:npm/lodash@4.17.21"
          },
          "Version": "4.17.21",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@testing-library/jest-dom@5.17.0",
            "@uppy/core@4.4.7",
            "@uppy/dashboard@4.3.4",
            "@uppy/utils@6.1.5",
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "lodash-es@4.17.21",
          "Name": "lodash-es",
          "Identifier": {
            "PURL": "pkg:npm/lodash-es@4.17.21",
            "UID": "6805d13322959770",
            "BOMRef": "pkg:npm/lodash-es@4.17.21"
          },
          "Version": "4.17.21",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "force-graph@1.50.1",
            "kapsule@1.16.3"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "lodash.merge@4.6.2",
          "Name": "lodash.merge",
          "Identifier": {
            "PURL": "pkg:npm/lodash.merge@4.6.2",
            "UID": "19c89c9d928c796e",
            "BOMRef": "pkg:npm/lodash.merge@4.6.2"
          },
          "Version": "4.6.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "eslint@8.57.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "longest-streak@3.1.0",
          "Name": "longest-streak",
          "Identifier": {
            "PURL": "pkg:npm/longest-streak@3.1.0",
            "UID": "9df36003ffd82eb5",
            "BOMRef": "pkg:npm/longest-streak@3.1.0"
          },
          "Version": "3.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "mdast-util-to-markdown@1.5.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "loose-envify@1.4.0",
          "Name": "loose-envify",
          "Identifier": {
            "PURL": "pkg:npm/loose-envify@1.4.0",
            "UID": "43f75e3b75a93028",
            "BOMRef": "pkg:npm/loose-envify@1.4.0"
          },
          "Version": "1.4.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "prop-types@15.8.1",
            "react-dom@18.3.1",
            "react-transition-group@4.4.5",
            "react@18.3.1",
            "scheduler@0.23.2"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "loupe@3.1.4",
          "Name": "loupe",
          "Identifier": {
            "PURL": "pkg:npm/loupe@3.1.4",
            "UID": "2245235c0e371752",
            "BOMRef": "pkg:npm/loupe@3.1.4"
          },
          "Version": "3.1.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@vitest/utils@3.2.4",
            "chai@5.2.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "lower-case@2.0.2",
          "Name": "lower-case",
          "Identifier": {
            "PURL": "pkg:npm/lower-case@2.0.2",
            "UID": "a06f8b63390579ba",
            "BOMRef": "pkg:npm/lower-case@2.0.2"
          },
          "Version": "2.0.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "no-case@3.0.4"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "lru-cache@5.1.1",
          "Name": "lru-cache",
          "Identifier": {
            "PURL": "pkg:npm/lru-cache@5.1.1",
            "UID": "fa7e8e97810ecd16",
            "BOMRef": "pkg:npm/lru-cache@5.1.1"
          },
          "Version": "5.1.1",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "@babel/helper-compilation-targets@7.27.2"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "lucide-react@0.545.0",
          "Name": "lucide-react",
          "Identifier": {
            "PURL": "pkg:npm/lucide-react@0.545.0",
            "UID": "2989305698d54cf3",
            "BOMRef": "pkg:npm/lucide-react@0.545.0"
          },
          "Version": "0.545.0",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "create-collection-form@0.0.0",
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "lz-string@1.5.0",
          "Name": "lz-string",
          "Identifier": {
            "PURL": "pkg:npm/lz-string@1.5.0",
            "UID": "546a2f7b7cec87dc",
            "BOMRef": "pkg:npm/lz-string@1.5.0"
          },
          "Version": "1.5.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@testing-library/dom@10.4.0",
            "@testing-library/dom@8.20.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "magic-string@0.30.17",
          "Name": "magic-string",
          "Identifier": {
            "PURL": "pkg:npm/magic-string@0.30.17",
            "UID": "64f4166d33b6456",
            "BOMRef": "pkg:npm/magic-string@0.30.17"
          },
          "Version": "0.30.17",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@tailwindcss/node@4.1.11",
            "@vitest/mocker@3.2.4",
            "@vitest/snapshot@3.2.4",
            "vitest@3.2.4"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "markdown-extensions@1.1.1",
          "Name": "markdown-extensions",
          "Identifier": {
            "PURL": "pkg:npm/markdown-extensions@1.1.1",
            "UID": "bce20864d139b83b",
            "BOMRef": "pkg:npm/markdown-extensions@1.1.1"
          },
          "Version": "1.1.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mdx-js/mdx@2.3.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "math-intrinsics@1.1.0",
          "Name": "math-intrinsics",
          "Identifier": {
            "PURL": "pkg:npm/math-intrinsics@1.1.0",
            "UID": "546b972ff3e55778",
            "BOMRef": "pkg:npm/math-intrinsics@1.1.0"
          },
          "Version": "1.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "array-includes@3.1.9",
            "es-abstract@1.24.0",
            "get-intrinsic@1.3.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "mdast-util-definitions@5.1.2",
          "Name": "mdast-util-definitions",
          "Identifier": {
            "PURL": "pkg:npm/mdast-util-definitions@5.1.2",
            "UID": "75e7ed0799eab43a",
            "BOMRef": "pkg:npm/mdast-util-definitions@5.1.2"
          },
          "Version": "5.1.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "mdast-util-to-hast@12.3.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "mdast-util-from-markdown@1.3.1",
          "Name": "mdast-util-from-markdown",
          "Identifier": {
            "PURL": "pkg:npm/mdast-util-from-markdown@1.3.1",
            "UID": "69241fdae97b22ef",
            "BOMRef": "pkg:npm/mdast-util-from-markdown@1.3.1"
          },
          "Version": "1.3.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "mdast-util-mdx-expression@1.3.2",
            "mdast-util-mdx-jsx@2.1.4",
            "mdast-util-mdx@2.0.1",
            "mdast-util-mdxjs-esm@1.3.1",
            "remark-parse@10.0.2"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "mdast-util-mdx@2.0.1",
          "Name": "mdast-util-mdx",
          "Identifier": {
            "PURL": "pkg:npm/mdast-util-mdx@2.0.1",
            "UID": "84a7a4343787fe6a",
            "BOMRef": "pkg:npm/mdast-util-mdx@2.0.1"
          },
          "Version": "2.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "remark-mdx@2.3.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "mdast-util-mdx-expression@1.3.2",
          "Name": "mdast-util-mdx-expression",
          "Identifier": {
            "PURL": "pkg:npm/mdast-util-mdx-expression@1.3.2",
            "UID": "75b79fed6710f285",
            "BOMRef": "pkg:npm/mdast-util-mdx-expression@1.3.2"
          },
          "Version": "1.3.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "hast-util-to-estree@2.3.3",
            "mdast-util-mdx@2.0.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "mdast-util-mdx-jsx@2.1.4",
          "Name": "mdast-util-mdx-jsx",
          "Identifier": {
            "PURL": "pkg:npm/mdast-util-mdx-jsx@2.1.4",
            "UID": "30356099e12360cc",
            "BOMRef": "pkg:npm/mdast-util-mdx-jsx@2.1.4"
          },
          "Version": "2.1.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "mdast-util-mdx@2.0.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "mdast-util-mdxjs-esm@1.3.1",
          "Name": "mdast-util-mdxjs-esm",
          "Identifier": {
            "PURL": "pkg:npm/mdast-util-mdxjs-esm@1.3.1",
            "UID": "5f96ffe4305d2c3b",
            "BOMRef": "pkg:npm/mdast-util-mdxjs-esm@1.3.1"
          },
          "Version": "1.3.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "hast-util-to-estree@2.3.3",
            "mdast-util-mdx@2.0.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "mdast-util-phrasing@3.0.1",
          "Name": "mdast-util-phrasing",
          "Identifier": {
            "PURL": "pkg:npm/mdast-util-phrasing@3.0.1",
            "UID": "8f73b281fd827dd5",
            "BOMRef": "pkg:npm/mdast-util-phrasing@3.0.1"
          },
          "Version": "3.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "mdast-util-to-markdown@1.5.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "mdast-util-to-hast@12.3.0",
          "Name": "mdast-util-to-hast",
          "Identifier": {
            "PURL": "pkg:npm/mdast-util-to-hast@12.3.0",
            "UID": "3d3bcccbfe950f98",
            "BOMRef": "pkg:npm/mdast-util-to-hast@12.3.0"
          },
          "Version": "12.3.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "remark-rehype@10.1.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "mdast-util-to-markdown@1.5.0",
          "Name": "mdast-util-to-markdown",
          "Identifier": {
            "PURL": "pkg:npm/mdast-util-to-markdown@1.5.0",
            "UID": "817bd3d362832611",
            "BOMRef": "pkg:npm/mdast-util-to-markdown@1.5.0"
          },
          "Version": "1.5.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "mdast-util-mdx-expression@1.3.2",
            "mdast-util-mdx-jsx@2.1.4",
            "mdast-util-mdx@2.0.1",
            "mdast-util-mdxjs-esm@1.3.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "mdast-util-to-string@3.2.0",
          "Name": "mdast-util-to-string",
          "Identifier": {
            "PURL": "pkg:npm/mdast-util-to-string@3.2.0",
            "UID": "8a2d0461cebf5875",
            "BOMRef": "pkg:npm/mdast-util-to-string@3.2.0"
          },
          "Version": "3.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "mdast-util-from-markdown@1.3.1",
            "mdast-util-to-markdown@1.5.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "memoize-one@6.0.0",
          "Name": "memoize-one",
          "Identifier": {
            "PURL": "pkg:npm/memoize-one@6.0.0",
            "UID": "8d21594382d51d59",
            "BOMRef": "pkg:npm/memoize-one@6.0.0"
          },
          "Version": "6.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@uppy/dashboard@4.3.4",
            "react-diff-viewer-continued@3.4.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "micromark@3.2.0",
          "Name": "micromark",
          "Identifier": {
            "PURL": "pkg:npm/micromark@3.2.0",
            "UID": "92e747be23af26d",
            "BOMRef": "pkg:npm/micromark@3.2.0"
          },
          "Version": "3.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "mdast-util-from-markdown@1.3.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "micromark-core-commonmark@1.1.0",
          "Name": "micromark-core-commonmark",
          "Identifier": {
            "PURL": "pkg:npm/micromark-core-commonmark@1.1.0",
            "UID": "77f6cf2852813e73",
            "BOMRef": "pkg:npm/micromark-core-commonmark@1.1.0"
          },
          "Version": "1.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "micromark-extension-mdxjs-esm@1.0.5",
            "micromark@3.2.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "micromark-extension-mdx-expression@1.0.8",
          "Name": "micromark-extension-mdx-expression",
          "Identifier": {
            "PURL": "pkg:npm/micromark-extension-mdx-expression@1.0.8",
            "UID": "31a5e3345adec74c",
            "BOMRef": "pkg:npm/micromark-extension-mdx-expression@1.0.8"
          },
          "Version": "1.0.8",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "micromark-extension-mdxjs@1.0.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "micromark-extension-mdx-jsx@1.0.5",
          "Name": "micromark-extension-mdx-jsx",
          "Identifier": {
            "PURL": "pkg:npm/micromark-extension-mdx-jsx@1.0.5",
            "UID": "6cdf046930cdf125",
            "BOMRef": "pkg:npm/micromark-extension-mdx-jsx@1.0.5"
          },
          "Version": "1.0.5",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "micromark-extension-mdxjs@1.0.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "micromark-extension-mdx-md@1.0.1",
          "Name": "micromark-extension-mdx-md",
          "Identifier": {
            "PURL": "pkg:npm/micromark-extension-mdx-md@1.0.1",
            "UID": "dddfcaa2d4ce6946",
            "BOMRef": "pkg:npm/micromark-extension-mdx-md@1.0.1"
          },
          "Version": "1.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "micromark-extension-mdxjs@1.0.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "micromark-extension-mdxjs@1.0.1",
          "Name": "micromark-extension-mdxjs",
          "Identifier": {
            "PURL": "pkg:npm/micromark-extension-mdxjs@1.0.1",
            "UID": "40fa7d95b24c28ff",
            "BOMRef": "pkg:npm/micromark-extension-mdxjs@1.0.1"
          },
          "Version": "1.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "remark-mdx@2.3.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "micromark-extension-mdxjs-esm@1.0.5",
          "Name": "micromark-extension-mdxjs-esm",
          "Identifier": {
            "PURL": "pkg:npm/micromark-extension-mdxjs-esm@1.0.5",
            "UID": "77edac393118f23",
            "BOMRef": "pkg:npm/micromark-extension-mdxjs-esm@1.0.5"
          },
          "Version": "1.0.5",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "micromark-extension-mdxjs@1.0.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "micromark-factory-destination@1.1.0",
          "Name": "micromark-factory-destination",
          "Identifier": {
            "PURL": "pkg:npm/micromark-factory-destination@1.1.0",
            "UID": "b57c0d702752ab0e",
            "BOMRef": "pkg:npm/micromark-factory-destination@1.1.0"
          },
          "Version": "1.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "micromark-core-commonmark@1.1.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "micromark-factory-label@1.1.0",
          "Name": "micromark-factory-label",
          "Identifier": {
            "PURL": "pkg:npm/micromark-factory-label@1.1.0",
            "UID": "cab9911584379f55",
            "BOMRef": "pkg:npm/micromark-factory-label@1.1.0"
          },
          "Version": "1.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "micromark-core-commonmark@1.1.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "micromark-factory-mdx-expression@1.0.9",
          "Name": "micromark-factory-mdx-expression",
          "Identifier": {
            "PURL": "pkg:npm/micromark-factory-mdx-expression@1.0.9",
            "UID": "90170cbe482a95c3",
            "BOMRef": "pkg:npm/micromark-factory-mdx-expression@1.0.9"
          },
          "Version": "1.0.9",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "micromark-extension-mdx-expression@1.0.8",
            "micromark-extension-mdx-jsx@1.0.5"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "micromark-factory-space@1.1.0",
          "Name": "micromark-factory-space",
          "Identifier": {
            "PURL": "pkg:npm/micromark-factory-space@1.1.0",
            "UID": "df5eb9b4e152e1e2",
            "BOMRef": "pkg:npm/micromark-factory-space@1.1.0"
          },
          "Version": "1.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "micromark-core-commonmark@1.1.0",
            "micromark-extension-mdx-expression@1.0.8",
            "micromark-extension-mdx-jsx@1.0.5",
            "micromark-factory-title@1.1.0",
            "micromark-factory-whitespace@1.1.0",
            "micromark@3.2.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "micromark-factory-title@1.1.0",
          "Name": "micromark-factory-title",
          "Identifier": {
            "PURL": "pkg:npm/micromark-factory-title@1.1.0",
            "UID": "3b986d0e137be118",
            "BOMRef": "pkg:npm/micromark-factory-title@1.1.0"
          },
          "Version": "1.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "micromark-core-commonmark@1.1.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "micromark-factory-whitespace@1.1.0",
          "Name": "micromark-factory-whitespace",
          "Identifier": {
            "PURL": "pkg:npm/micromark-factory-whitespace@1.1.0",
            "UID": "b14f81de48a97c61",
            "BOMRef": "pkg:npm/micromark-factory-whitespace@1.1.0"
          },
          "Version": "1.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "micromark-core-commonmark@1.1.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "micromark-util-character@1.2.0",
          "Name": "micromark-util-character",
          "Identifier": {
            "PURL": "pkg:npm/micromark-util-character@1.2.0",
            "UID": "6ef081db896781a",
            "BOMRef": "pkg:npm/micromark-util-character@1.2.0"
          },
          "Version": "1.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "micromark-core-commonmark@1.1.0",
            "micromark-extension-mdx-expression@1.0.8",
            "micromark-extension-mdx-jsx@1.0.5",
            "micromark-extension-mdxjs-esm@1.0.5",
            "micromark-factory-destination@1.1.0",
            "micromark-factory-label@1.1.0",
            "micromark-factory-mdx-expression@1.0.9",
            "micromark-factory-space@1.1.0",
            "micromark-factory-title@1.1.0",
            "micromark-factory-whitespace@1.1.0",
            "micromark-util-classify-character@1.1.0",
            "micromark-util-decode-string@1.1.0",
            "micromark-util-sanitize-uri@1.2.0",
            "micromark@3.2.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "micromark-util-chunked@1.1.0",
          "Name": "micromark-util-chunked",
          "Identifier": {
            "PURL": "pkg:npm/micromark-util-chunked@1.1.0",
            "UID": "7044dca2260cfefd",
            "BOMRef": "pkg:npm/micromark-util-chunked@1.1.0"
          },
          "Version": "1.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "micromark-core-commonmark@1.1.0",
            "micromark-util-combine-extensions@1.1.0",
            "micromark-util-subtokenize@1.1.0",
            "micromark@3.2.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "micromark-util-classify-character@1.1.0",
          "Name": "micromark-util-classify-character",
          "Identifier": {
            "PURL": "pkg:npm/micromark-util-classify-character@1.1.0",
            "UID": "5b308b5dd77f0ab1",
            "BOMRef": "pkg:npm/micromark-util-classify-character@1.1.0"
          },
          "Version": "1.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "micromark-core-commonmark@1.1.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "micromark-util-combine-extensions@1.1.0",
          "Name": "micromark-util-combine-extensions",
          "Identifier": {
            "PURL": "pkg:npm/micromark-util-combine-extensions@1.1.0",
            "UID": "a30ecd274f1bc818",
            "BOMRef": "pkg:npm/micromark-util-combine-extensions@1.1.0"
          },
          "Version": "1.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "micromark-extension-mdxjs@1.0.1",
            "micromark@3.2.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "micromark-util-decode-numeric-character-reference@1.1.0",
          "Name": "micromark-util-decode-numeric-character-reference",
          "Identifier": {
            "PURL": "pkg:npm/micromark-util-decode-numeric-character-reference@1.1.0",
            "UID": "97efb002aff2d83e",
            "BOMRef": "pkg:npm/micromark-util-decode-numeric-character-reference@1.1.0"
          },
          "Version": "1.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "mdast-util-from-markdown@1.3.1",
            "micromark-util-decode-string@1.1.0",
            "micromark@3.2.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "micromark-util-decode-string@1.1.0",
          "Name": "micromark-util-decode-string",
          "Identifier": {
            "PURL": "pkg:npm/micromark-util-decode-string@1.1.0",
            "UID": "6ff9bd644545227b",
            "BOMRef": "pkg:npm/micromark-util-decode-string@1.1.0"
          },
          "Version": "1.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "mdast-util-from-markdown@1.3.1",
            "mdast-util-to-markdown@1.5.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "micromark-util-encode@1.1.0",
          "Name": "micromark-util-encode",
          "Identifier": {
            "PURL": "pkg:npm/micromark-util-encode@1.1.0",
            "UID": "72454f3aa72ad99e",
            "BOMRef": "pkg:npm/micromark-util-encode@1.1.0"
          },
          "Version": "1.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "micromark-util-sanitize-uri@1.2.0",
            "micromark@3.2.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "micromark-util-events-to-acorn@1.2.3",
          "Name": "micromark-util-events-to-acorn",
          "Identifier": {
            "PURL": "pkg:npm/micromark-util-events-to-acorn@1.2.3",
            "UID": "3ec30da3ebe3165a",
            "BOMRef": "pkg:npm/micromark-util-events-to-acorn@1.2.3"
          },
          "Version": "1.2.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "micromark-extension-mdx-expression@1.0.8",
            "micromark-extension-mdxjs-esm@1.0.5",
            "micromark-factory-mdx-expression@1.0.9"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "micromark-util-html-tag-name@1.2.0",
          "Name": "micromark-util-html-tag-name",
          "Identifier": {
            "PURL": "pkg:npm/micromark-util-html-tag-name@1.2.0",
            "UID": "a162fd186559f0ac",
            "BOMRef": "pkg:npm/micromark-util-html-tag-name@1.2.0"
          },
          "Version": "1.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "micromark-core-commonmark@1.1.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "micromark-util-normalize-identifier@1.1.0",
          "Name": "micromark-util-normalize-identifier",
          "Identifier": {
            "PURL": "pkg:npm/micromark-util-normalize-identifier@1.1.0",
            "UID": "a5732cf0a94a3176",
            "BOMRef": "pkg:npm/micromark-util-normalize-identifier@1.1.0"
          },
          "Version": "1.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "mdast-util-from-markdown@1.3.1",
            "micromark-core-commonmark@1.1.0",
            "micromark@3.2.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "micromark-util-resolve-all@1.1.0",
          "Name": "micromark-util-resolve-all",
          "Identifier": {
            "PURL": "pkg:npm/micromark-util-resolve-all@1.1.0",
            "UID": "4a9ac658570f75d2",
            "BOMRef": "pkg:npm/micromark-util-resolve-all@1.1.0"
          },
          "Version": "1.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "micromark-core-commonmark@1.1.0",
            "micromark@3.2.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "micromark-util-sanitize-uri@1.2.0",
          "Name": "micromark-util-sanitize-uri",
          "Identifier": {
            "PURL": "pkg:npm/micromark-util-sanitize-uri@1.2.0",
            "UID": "bdff8fe160ee4304",
            "BOMRef": "pkg:npm/micromark-util-sanitize-uri@1.2.0"
          },
          "Version": "1.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "mdast-util-to-hast@12.3.0",
            "micromark@3.2.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "micromark-util-subtokenize@1.1.0",
          "Name": "micromark-util-subtokenize",
          "Identifier": {
            "PURL": "pkg:npm/micromark-util-subtokenize@1.1.0",
            "UID": "b76904fc8b821a21",
            "BOMRef": "pkg:npm/micromark-util-subtokenize@1.1.0"
          },
          "Version": "1.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "micromark-core-commonmark@1.1.0",
            "micromark@3.2.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "micromark-util-symbol@1.1.0",
          "Name": "micromark-util-symbol",
          "Identifier": {
            "PURL": "pkg:npm/micromark-util-symbol@1.1.0",
            "UID": "63b2b99c60529a73",
            "BOMRef": "pkg:npm/micromark-util-symbol@1.1.0"
          },
          "Version": "1.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "mdast-util-from-markdown@1.3.1",
            "micromark-core-commonmark@1.1.0",
            "micromark-extension-mdx-expression@1.0.8",
            "micromark-extension-mdx-jsx@1.0.5",
            "micromark-extension-mdxjs-esm@1.0.5",
            "micromark-factory-destination@1.1.0",
            "micromark-factory-label@1.1.0",
            "micromark-factory-mdx-expression@1.0.9",
            "micromark-factory-title@1.1.0",
            "micromark-factory-whitespace@1.1.0",
            "micromark-util-character@1.2.0",
            "micromark-util-chunked@1.1.0",
            "micromark-util-classify-character@1.1.0",
            "micromark-util-decode-numeric-character-reference@1.1.0",
            "micromark-util-decode-string@1.1.0",
            "micromark-util-events-to-acorn@1.2.3",
            "micromark-util-normalize-identifier@1.1.0",
            "micromark-util-sanitize-uri@1.2.0",
            "micromark-util-subtokenize@1.1.0",
            "micromark@3.2.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "micromark-util-types@1.1.0",
          "Name": "micromark-util-types",
          "Identifier": {
            "PURL": "pkg:npm/micromark-util-types@1.1.0",
            "UID": "178bcf9e4ccd639f",
            "BOMRef": "pkg:npm/micromark-util-types@1.1.0"
          },
          "Version": "1.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "mdast-util-from-markdown@1.3.1",
            "micromark-core-commonmark@1.1.0",
            "micromark-extension-mdx-expression@1.0.8",
            "micromark-extension-mdx-jsx@1.0.5",
            "micromark-extension-mdx-md@1.0.1",
            "micromark-extension-mdxjs-esm@1.0.5",
            "micromark-extension-mdxjs@1.0.1",
            "micromark-factory-destination@1.1.0",
            "micromark-factory-label@1.1.0",
            "micromark-factory-mdx-expression@1.0.9",
            "micromark-factory-space@1.1.0",
            "micromark-factory-title@1.1.0",
            "micromark-factory-whitespace@1.1.0",
            "micromark-util-character@1.2.0",
            "micromark-util-classify-character@1.1.0",
            "micromark-util-combine-extensions@1.1.0",
            "micromark-util-events-to-acorn@1.2.3",
            "micromark-util-resolve-all@1.1.0",
            "micromark-util-subtokenize@1.1.0",
            "micromark@3.2.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "micromatch@4.0.8",
          "Name": "micromatch",
          "Identifier": {
            "PURL": "pkg:npm/micromatch@4.0.8",
            "UID": "4d14b11df4a7e66d",
            "BOMRef": "pkg:npm/micromatch@4.0.8"
          },
          "Version": "4.0.8",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@parcel/watcher@2.5.1",
            "jest-message-util@30.0.2"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "mime-db@1.52.0",
          "Name": "mime-db",
          "Identifier": {
            "PURL": "pkg:npm/mime-db@1.52.0",
            "UID": "88a482583639916",
            "BOMRef": "pkg:npm/mime-db@1.52.0"
          },
          "Version": "1.52.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "mime-types@2.1.35"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "mime-match@1.0.2",
          "Name": "mime-match",
          "Identifier": {
            "PURL": "pkg:npm/mime-match@1.0.2",
            "UID": "a08b64df7381a934",
            "BOMRef": "pkg:npm/mime-match@1.0.2"
          },
          "Version": "1.0.2",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "@uppy/core@4.4.7"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "mime-types@2.1.35",
          "Name": "mime-types",
          "Identifier": {
            "PURL": "pkg:npm/mime-types@2.1.35",
            "UID": "a3d400e97fa03e05",
            "BOMRef": "pkg:npm/mime-types@2.1.35"
          },
          "Version": "2.1.35",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "form-data@4.0.4"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "min-indent@1.0.1",
          "Name": "min-indent",
          "Identifier": {
            "PURL": "pkg:npm/min-indent@1.0.1",
            "UID": "3337885f729f9d20",
            "BOMRef": "pkg:npm/min-indent@1.0.1"
          },
          "Version": "1.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "strip-indent@3.0.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "minimatch@3.1.2",
          "Name": "minimatch",
          "Identifier": {
            "PURL": "pkg:npm/minimatch@3.1.2",
            "UID": "ef0346a328d7e8a1",
            "BOMRef": "pkg:npm/minimatch@3.1.2"
          },
          "Version": "3.1.2",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "@eslint/eslintrc@2.1.4",
            "@humanwhocodes/config-array@0.13.0",
            "eslint-plugin-react@7.37.5",
            "eslint@8.57.1",
            "glob@7.2.3"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "minipass@7.1.2",
          "Name": "minipass",
          "Identifier": {
            "PURL": "pkg:npm/minipass@7.1.2",
            "UID": "acf29cc69de8defa",
            "BOMRef": "pkg:npm/minipass@7.1.2"
          },
          "Version": "7.1.2",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "@isaacs/fs-minipass@4.0.1",
            "minizlib@3.0.2",
            "tar@7.4.3"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "minizlib@3.0.2",
          "Name": "minizlib",
          "Identifier": {
            "PURL": "pkg:npm/minizlib@3.0.2",
            "UID": "4433b75a132ef84e",
            "BOMRef": "pkg:npm/minizlib@3.0.2"
          },
          "Version": "3.0.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "tar@7.4.3"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "mkdirp@3.0.1",
          "Name": "mkdirp",
          "Identifier": {
            "PURL": "pkg:npm/mkdirp@3.0.1",
            "UID": "4c6ccf324336532f",
            "BOMRef": "pkg:npm/mkdirp@3.0.1"
          },
          "Version": "3.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "tar@7.4.3"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "monaco-editor@0.44.0",
          "Name": "monaco-editor",
          "Identifier": {
            "PURL": "pkg:npm/monaco-editor@0.44.0",
            "UID": "4ea65da0b2baf394",
            "BOMRef": "pkg:npm/monaco-editor@0.44.0"
          },
          "Version": "0.44.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@monaco-editor/react@4.7.0",
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "mri@1.2.0",
          "Name": "mri",
          "Identifier": {
            "PURL": "pkg:npm/mri@1.2.0",
            "UID": "38758b6db5094b5c",
            "BOMRef": "pkg:npm/mri@1.2.0"
          },
          "Version": "1.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@tailwindcss/cli@4.1.11",
            "sade@1.8.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "ms@2.1.3",
          "Name": "ms",
          "Identifier": {
            "PURL": "pkg:npm/ms@2.1.3",
            "UID": "28d6190bd21e5b5a",
            "BOMRef": "pkg:npm/ms@2.1.3"
          },
          "Version": "2.1.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "debug@4.4.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "mui-chips-input@7.0.1",
          "Name": "mui-chips-input",
          "Identifier": {
            "PURL": "pkg:npm/mui-chips-input@7.0.1",
            "UID": "2258ca5ec26ea5",
            "BOMRef": "pkg:npm/mui-chips-input@7.0.1"
          },
          "Version": "7.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "namespace-emitter@2.0.1",
          "Name": "namespace-emitter",
          "Identifier": {
            "PURL": "pkg:npm/namespace-emitter@2.0.1",
            "UID": "4c2a51f082256f23",
            "BOMRef": "pkg:npm/namespace-emitter@2.0.1"
          },
          "Version": "2.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@uppy/companion-client@4.4.2",
            "@uppy/core@4.4.7"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "nanoid@3.3.11",
          "Name": "nanoid",
          "Identifier": {
            "PURL": "pkg:npm/nanoid@3.3.11",
            "UID": "9fba6020c2bcbb5a",
            "BOMRef": "pkg:npm/nanoid@3.3.11"
          },
          "Version": "3.3.11",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "postcss@8.5.6"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "nanoid@5.1.5",
          "Name": "nanoid",
          "Identifier": {
            "PURL": "pkg:npm/nanoid@5.1.5",
            "UID": "33cc864b59c324c",
            "BOMRef": "pkg:npm/nanoid@5.1.5"
          },
          "Version": "5.1.5",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@uppy/core@4.4.7",
            "@uppy/dashboard@4.3.4",
            "@uppy/provider-views@4.4.5"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "natural-compare@1.4.0",
          "Name": "natural-compare",
          "Identifier": {
            "PURL": "pkg:npm/natural-compare@1.4.0",
            "UID": "d458236e451df6fb",
            "BOMRef": "pkg:npm/natural-compare@1.4.0"
          },
          "Version": "1.4.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "eslint@8.57.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "no-case@3.0.4",
          "Name": "no-case",
          "Identifier": {
            "PURL": "pkg:npm/no-case@3.0.4",
            "UID": "430a7c53f61a91af",
            "BOMRef": "pkg:npm/no-case@3.0.4"
          },
          "Version": "3.0.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "dot-case@3.0.4"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "node-addon-api@7.1.1",
          "Name": "node-addon-api",
          "Identifier": {
            "PURL": "pkg:npm/node-addon-api@7.1.1",
            "UID": "c0c636ad9bcefa26",
            "BOMRef": "pkg:npm/node-addon-api@7.1.1"
          },
          "Version": "7.1.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@parcel/watcher@2.5.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "node-releases@2.0.19",
          "Name": "node-releases",
          "Identifier": {
            "PURL": "pkg:npm/node-releases@2.0.19",
            "UID": "22714c4f4fee244e",
            "BOMRef": "pkg:npm/node-releases@2.0.19"
          },
          "Version": "2.0.19",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "browserslist@4.25.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "notistack@3.0.2",
          "Name": "notistack",
          "Identifier": {
            "PURL": "pkg:npm/notistack@3.0.2",
            "UID": "d1598c270bc97a90",
            "BOMRef": "pkg:npm/notistack@3.0.2"
          },
          "Version": "3.0.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "nwsapi@2.2.20",
          "Name": "nwsapi",
          "Identifier": {
            "PURL": "pkg:npm/nwsapi@2.2.20",
            "UID": "3a0473c626dcc1b2",
            "BOMRef": "pkg:npm/nwsapi@2.2.20"
          },
          "Version": "2.2.20",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "jsdom@22.1.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "object-assign@4.1.1",
          "Name": "object-assign",
          "Identifier": {
            "PURL": "pkg:npm/object-assign@4.1.1",
            "UID": "beb9a2732c2d9716",
            "BOMRef": "pkg:npm/object-assign@4.1.1"
          },
          "Version": "4.1.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "prop-types@15.8.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "object-inspect@1.13.4",
          "Name": "object-inspect",
          "Identifier": {
            "PURL": "pkg:npm/object-inspect@1.13.4",
            "UID": "7a50eea62306c4ae",
            "BOMRef": "pkg:npm/object-inspect@1.13.4"
          },
          "Version": "1.13.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "es-abstract@1.24.0",
            "side-channel-list@1.0.0",
            "side-channel-map@1.0.1",
            "side-channel-weakmap@1.0.2",
            "side-channel@1.1.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "object-is@1.1.6",
          "Name": "object-is",
          "Identifier": {
            "PURL": "pkg:npm/object-is@1.1.6",
            "UID": "f1b7926be3eb75cc",
            "BOMRef": "pkg:npm/object-is@1.1.6"
          },
          "Version": "1.1.6",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "deep-equal@2.2.3"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "object-keys@1.1.1",
          "Name": "object-keys",
          "Identifier": {
            "PURL": "pkg:npm/object-keys@1.1.1",
            "UID": "3a58fef031b56ef4",
            "BOMRef": "pkg:npm/object-keys@1.1.1"
          },
          "Version": "1.1.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "deep-equal@2.2.3",
            "define-properties@1.2.1",
            "es-abstract@1.24.0",
            "object.assign@4.1.7",
            "own-keys@1.0.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "object.assign@4.1.7",
          "Name": "object.assign",
          "Identifier": {
            "PURL": "pkg:npm/object.assign@4.1.7",
            "UID": "c498e649e71d213f",
            "BOMRef": "pkg:npm/object.assign@4.1.7"
          },
          "Version": "4.1.7",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "deep-equal@2.2.3",
            "es-abstract@1.24.0",
            "jsx-ast-utils@3.3.5"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "object.entries@1.1.9",
          "Name": "object.entries",
          "Identifier": {
            "PURL": "pkg:npm/object.entries@1.1.9",
            "UID": "37bb79c1b396fc28",
            "BOMRef": "pkg:npm/object.entries@1.1.9"
          },
          "Version": "1.1.9",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "eslint-plugin-react@7.37.5"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "object.fromentries@2.0.8",
          "Name": "object.fromentries",
          "Identifier": {
            "PURL": "pkg:npm/object.fromentries@2.0.8",
            "UID": "f2902c5bb08eecbd",
            "BOMRef": "pkg:npm/object.fromentries@2.0.8"
          },
          "Version": "2.0.8",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "eslint-plugin-react@7.37.5"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "object.values@1.2.1",
          "Name": "object.values",
          "Identifier": {
            "PURL": "pkg:npm/object.values@1.2.1",
            "UID": "bfd2f159e1b9ff08",
            "BOMRef": "pkg:npm/object.values@1.2.1"
          },
          "Version": "1.2.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "eslint-plugin-react@7.37.5",
            "jsx-ast-utils@3.3.5"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "once@1.4.0",
          "Name": "once",
          "Identifier": {
            "PURL": "pkg:npm/once@1.4.0",
            "UID": "78d1c0c4d2f9870d",
            "BOMRef": "pkg:npm/once@1.4.0"
          },
          "Version": "1.4.0",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "glob@7.2.3",
            "inflight@1.0.6"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "openapi-client-axios@7.6.0",
          "Name": "openapi-client-axios",
          "Identifier": {
            "PURL": "pkg:npm/openapi-client-axios@7.6.0",
            "UID": "7418227f4d5a65ea",
            "BOMRef": "pkg:npm/openapi-client-axios@7.6.0"
          },
          "Version": "7.6.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "openapi-types@12.1.3",
          "Name": "openapi-types",
          "Identifier": {
            "PURL": "pkg:npm/openapi-types@12.1.3",
            "UID": "92a2c3bd4f969dcc",
            "BOMRef": "pkg:npm/openapi-types@12.1.3"
          },
          "Version": "12.1.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "openapi-client-axios@7.6.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "optionator@0.9.4",
          "Name": "optionator",
          "Identifier": {
            "PURL": "pkg:npm/optionator@0.9.4",
            "UID": "63945cd1ad4838fb",
            "BOMRef": "pkg:npm/optionator@0.9.4"
          },
          "Version": "0.9.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "eslint@8.57.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "own-keys@1.0.1",
          "Name": "own-keys",
          "Identifier": {
            "PURL": "pkg:npm/own-keys@1.0.1",
            "UID": "9a42fd33dd99e8d2",
            "BOMRef": "pkg:npm/own-keys@1.0.1"
          },
          "Version": "1.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "es-abstract@1.24.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "p-limit@3.1.0",
          "Name": "p-limit",
          "Identifier": {
            "PURL": "pkg:npm/p-limit@3.1.0",
            "UID": "ea1ca4eb7bab4cef",
            "BOMRef": "pkg:npm/p-limit@3.1.0"
          },
          "Version": "3.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "p-locate@5.0.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "p-locate@5.0.0",
          "Name": "p-locate",
          "Identifier": {
            "PURL": "pkg:npm/p-locate@5.0.0",
            "UID": "8e7075201bd20f78",
            "BOMRef": "pkg:npm/p-locate@5.0.0"
          },
          "Version": "5.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "locate-path@6.0.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "p-queue@8.1.0",
          "Name": "p-queue",
          "Identifier": {
            "PURL": "pkg:npm/p-queue@8.1.0",
            "UID": "56fd1d8ed4d7d5e4",
            "BOMRef": "pkg:npm/p-queue@8.1.0"
          },
          "Version": "8.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@uppy/provider-views@4.4.5"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "p-retry@6.2.1",
          "Name": "p-retry",
          "Identifier": {
            "PURL": "pkg:npm/p-retry@6.2.1",
            "UID": "e4bb59768683e287",
            "BOMRef": "pkg:npm/p-retry@6.2.1"
          },
          "Version": "6.2.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@uppy/companion-client@4.4.2"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "p-timeout@6.1.4",
          "Name": "p-timeout",
          "Identifier": {
            "PURL": "pkg:npm/p-timeout@6.1.4",
            "UID": "7491b02281ed0a7b",
            "BOMRef": "pkg:npm/p-timeout@6.1.4"
          },
          "Version": "6.1.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "p-queue@8.1.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "parent-module@1.0.1",
          "Name": "parent-module",
          "Identifier": {
            "PURL": "pkg:npm/parent-module@1.0.1",
            "UID": "9993e675cb9bdafa",
            "BOMRef": "pkg:npm/parent-module@1.0.1"
          },
          "Version": "1.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "import-fresh@3.3.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "parse-entities@4.0.2",
          "Name": "parse-entities",
          "Identifier": {
            "PURL": "pkg:npm/parse-entities@4.0.2",
            "UID": "a005555466bdf86",
            "BOMRef": "pkg:npm/parse-entities@4.0.2"
          },
          "Version": "4.0.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "mdast-util-mdx-jsx@2.1.4"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "parse-json@5.2.0",
          "Name": "parse-json",
          "Identifier": {
            "PURL": "pkg:npm/parse-json@5.2.0",
            "UID": "dbbafd592f89582e",
            "BOMRef": "pkg:npm/parse-json@5.2.0"
          },
          "Version": "5.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "cosmiconfig@7.1.0",
            "cosmiconfig@8.3.6"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "parse5@7.3.0",
          "Name": "parse5",
          "Identifier": {
            "PURL": "pkg:npm/parse5@7.3.0",
            "UID": "62bade2c7ea971a0",
            "BOMRef": "pkg:npm/parse5@7.3.0"
          },
          "Version": "7.3.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "jsdom@22.1.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "path-exists@4.0.0",
          "Name": "path-exists",
          "Identifier": {
            "PURL": "pkg:npm/path-exists@4.0.0",
            "UID": "7bcb1ffe08d25905",
            "BOMRef": "pkg:npm/path-exists@4.0.0"
          },
          "Version": "4.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "find-up@5.0.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "path-is-absolute@1.0.1",
          "Name": "path-is-absolute",
          "Identifier": {
            "PURL": "pkg:npm/path-is-absolute@1.0.1",
            "UID": "47c1d6b891fbdb70",
            "BOMRef": "pkg:npm/path-is-absolute@1.0.1"
          },
          "Version": "1.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "glob@7.2.3"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "path-key@3.1.1",
          "Name": "path-key",
          "Identifier": {
            "PURL": "pkg:npm/path-key@3.1.1",
            "UID": "4a81160e87a7ffb5",
            "BOMRef": "pkg:npm/path-key@3.1.1"
          },
          "Version": "3.1.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "cross-spawn@7.0.6"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "path-parse@1.0.7",
          "Name": "path-parse",
          "Identifier": {
            "PURL": "pkg:npm/path-parse@1.0.7",
            "UID": "9db0f65f1f8964ac",
            "BOMRef": "pkg:npm/path-parse@1.0.7"
          },
          "Version": "1.0.7",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "resolve@1.22.10",
            "resolve@2.0.0-next.5"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "path-type@4.0.0",
          "Name": "path-type",
          "Identifier": {
            "PURL": "pkg:npm/path-type@4.0.0",
            "UID": "3ca80bd82fb8c19",
            "BOMRef": "pkg:npm/path-type@4.0.0"
          },
          "Version": "4.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "cosmiconfig@7.1.0",
            "cosmiconfig@8.3.6"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "pathe@2.0.3",
          "Name": "pathe",
          "Identifier": {
            "PURL": "pkg:npm/pathe@2.0.3",
            "UID": "550996d7c6230ccd",
            "BOMRef": "pkg:npm/pathe@2.0.3"
          },
          "Version": "2.0.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@vitest/runner@3.2.4",
            "@vitest/snapshot@3.2.4",
            "vite-node@3.2.4",
            "vitest@3.2.4"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "pathval@2.0.1",
          "Name": "pathval",
          "Identifier": {
            "PURL": "pkg:npm/pathval@2.0.1",
            "UID": "481a437b3c57088a",
            "BOMRef": "pkg:npm/pathval@2.0.1"
          },
          "Version": "2.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "chai@5.2.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "periscopic@3.1.0",
          "Name": "periscopic",
          "Identifier": {
            "PURL": "pkg:npm/periscopic@3.1.0",
            "UID": "47ceae45168878c9",
            "BOMRef": "pkg:npm/periscopic@3.1.0"
          },
          "Version": "3.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mdx-js/mdx@2.3.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "picocolors@1.1.1",
          "Name": "picocolors",
          "Identifier": {
            "PURL": "pkg:npm/picocolors@1.1.1",
            "UID": "8252b036b3a4eb87",
            "BOMRef": "pkg:npm/picocolors@1.1.1"
          },
          "Version": "1.1.1",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "@babel/code-frame@7.27.1",
            "@tailwindcss/cli@4.1.11",
            "postcss@8.5.6",
            "update-browserslist-db@1.1.3"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "picomatch@2.3.1",
          "Name": "picomatch",
          "Identifier": {
            "PURL": "pkg:npm/picomatch@2.3.1",
            "UID": "bc937bfb45761554",
            "BOMRef": "fcb9d2e5-9fd4-4b6c-a7cc-66cb81f0c596"
          },
          "Version": "2.3.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@rollup/pluginutils@4.2.1",
            "micromatch@4.0.8"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "picomatch@2.3.1",
          "Name": "picomatch",
          "Identifier": {
            "PURL": "pkg:npm/picomatch@2.3.1",
            "UID": "c937eb3ca42184b7",
            "BOMRef": "56802e6a-4bd3-44cd-939b-a49255fd3897"
          },
          "Version": "2.3.1",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "picomatch@4.0.2",
          "Name": "picomatch",
          "Identifier": {
            "PURL": "pkg:npm/picomatch@4.0.2",
            "UID": "c4aed859ace25c8d",
            "BOMRef": "pkg:npm/picomatch@4.0.2"
          },
          "Version": "4.0.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@rollup/pluginutils@5.2.0",
            "fdir@6.4.6",
            "jest-util@30.0.2",
            "tinyglobby@0.2.14",
            "vite@6.4.1",
            "vitest@3.2.4"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "possible-typed-array-names@1.1.0",
          "Name": "possible-typed-array-names",
          "Identifier": {
            "PURL": "pkg:npm/possible-typed-array-names@1.1.0",
            "UID": "fde3bc3ed8c15435",
            "BOMRef": "pkg:npm/possible-typed-array-names@1.1.0"
          },
          "Version": "1.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "available-typed-arrays@1.0.7",
            "typed-array-length@1.0.7"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "postcss@8.5.6",
          "Name": "postcss",
          "Identifier": {
            "PURL": "pkg:npm/postcss@8.5.6",
            "UID": "7d60ad68bf676273",
            "BOMRef": "pkg:npm/postcss@8.5.6"
          },
          "Version": "8.5.6",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "vite@6.4.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "preact@10.26.9",
          "Name": "preact",
          "Identifier": {
            "PURL": "pkg:npm/preact@10.26.9",
            "UID": "41618b99a8aacb",
            "BOMRef": "pkg:npm/preact@10.26.9"
          },
          "Version": "10.26.9",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@uppy/components@0.2.0",
            "@uppy/core@4.4.7",
            "@uppy/dashboard@4.3.4",
            "@uppy/drag-drop@4.1.3",
            "@uppy/informer@4.2.1",
            "@uppy/progress-bar@4.2.1",
            "@uppy/provider-views@4.4.5",
            "@uppy/react@4.4.0",
            "@uppy/status-bar@4.1.3",
            "@uppy/utils@6.1.5",
            "float-tooltip@1.7.5"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "prelude-ls@1.2.1",
          "Name": "prelude-ls",
          "Identifier": {
            "PURL": "pkg:npm/prelude-ls@1.2.1",
            "UID": "a97d3572b4d0f0e5",
            "BOMRef": "pkg:npm/prelude-ls@1.2.1"
          },
          "Version": "1.2.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "levn@0.4.1",
            "optionator@0.9.4",
            "type-check@0.4.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "prettier@2.8.7",
          "Name": "prettier",
          "Identifier": {
            "PURL": "pkg:npm/prettier@2.8.7",
            "UID": "12ffd9125bc8c847",
            "BOMRef": "pkg:npm/prettier@2.8.7"
          },
          "Version": "2.8.7",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "pretty-bytes@6.1.1",
          "Name": "pretty-bytes",
          "Identifier": {
            "PURL": "pkg:npm/pretty-bytes@6.1.1",
            "UID": "f6bd099ae76815af",
            "BOMRef": "pkg:npm/pretty-bytes@6.1.1"
          },
          "Version": "6.1.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@uppy/components@0.2.0",
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "pretty-format@27.5.1",
          "Name": "pretty-format",
          "Identifier": {
            "PURL": "pkg:npm/pretty-format@27.5.1",
            "UID": "1740623aeeb8a13c",
            "BOMRef": "pkg:npm/pretty-format@27.5.1"
          },
          "Version": "27.5.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@testing-library/dom@10.4.0",
            "@testing-library/dom@8.20.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "pretty-format@30.0.2",
          "Name": "pretty-format",
          "Identifier": {
            "PURL": "pkg:npm/pretty-format@30.0.2",
            "UID": "526ec7e6af28ce6a",
            "BOMRef": "98483fad-374e-44f3-af60-cf3d815b99a6"
          },
          "Version": "30.0.2",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "pretty-format@30.0.2",
          "Name": "pretty-format",
          "Identifier": {
            "PURL": "pkg:npm/pretty-format@30.0.2",
            "UID": "629a9fe0377acbe8",
            "BOMRef": "1018d9e2-c824-43e6-bdfb-f75eaa594395"
          },
          "Version": "30.0.2",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "pretty-format@30.0.2",
          "Name": "pretty-format",
          "Identifier": {
            "PURL": "pkg:npm/pretty-format@30.0.2",
            "UID": "5cac155058b36666",
            "BOMRef": "06b8040a-5d80-44ae-bf87-cb152730b492"
          },
          "Version": "30.0.2",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "pretty-format@30.0.2",
          "Name": "pretty-format",
          "Identifier": {
            "PURL": "pkg:npm/pretty-format@30.0.2",
            "UID": "d8cfee22063a88a1",
            "BOMRef": "a40f0f97-01d5-4c69-a139-22dcf76b5c5c"
          },
          "Version": "30.0.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@types/jest@30.0.0",
            "jest-diff@30.0.4",
            "jest-matcher-utils@30.0.4",
            "jest-message-util@30.0.2"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "prism-react-renderer@2.4.1",
          "Name": "prism-react-renderer",
          "Identifier": {
            "PURL": "pkg:npm/prism-react-renderer@2.4.1",
            "UID": "3121cf9b057b4c73",
            "BOMRef": "pkg:npm/prism-react-renderer@2.4.1"
          },
          "Version": "2.4.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "prismjs@1.30.0",
          "Name": "prismjs",
          "Identifier": {
            "PURL": "pkg:npm/prismjs@1.30.0",
            "UID": "df703a7d276c8fbb",
            "BOMRef": "pkg:npm/prismjs@1.30.0"
          },
          "Version": "1.30.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "prop-types@15.8.1",
          "Name": "prop-types",
          "Identifier": {
            "PURL": "pkg:npm/prop-types@15.8.1",
            "UID": "5e9e5a04bfac7b73",
            "BOMRef": "pkg:npm/prop-types@15.8.1"
          },
          "Version": "15.8.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mui/material@5.17.1",
            "@mui/material@7.2.0",
            "@mui/private-theming@5.17.1",
            "@mui/private-theming@7.2.0",
            "@mui/styled-engine@5.16.14",
            "@mui/styled-engine@7.2.0",
            "@mui/system@5.17.1",
            "@mui/system@7.2.0",
            "@mui/utils@5.17.1",
            "@mui/utils@7.2.0",
            "@mui/x-data-grid@7.29.8",
            "create-collection-form@0.0.0",
            "eslint-plugin-react@7.37.5",
            "qdrant-web-ui@0.2.5",
            "react-archer@4.4.0",
            "react-diff-viewer-continued@3.4.0",
            "react-transition-group@4.4.5"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "property-information@6.5.0",
          "Name": "property-information",
          "Identifier": {
            "PURL": "pkg:npm/property-information@6.5.0",
            "UID": "b80305527af3d4e5",
            "BOMRef": "pkg:npm/property-information@6.5.0"
          },
          "Version": "6.5.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "hast-util-to-estree@2.3.3"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "proxy-from-env@1.1.0",
          "Name": "proxy-from-env",
          "Identifier": {
            "PURL": "pkg:npm/proxy-from-env@1.1.0",
            "UID": "3b04f1dae1b6bf07",
            "BOMRef": "pkg:npm/proxy-from-env@1.1.0"
          },
          "Version": "1.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "axios@1.12.2"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "psl@1.15.0",
          "Name": "psl",
          "Identifier": {
            "PURL": "pkg:npm/psl@1.15.0",
            "UID": "cb9c1fbf38711127",
            "BOMRef": "pkg:npm/psl@1.15.0"
          },
          "Version": "1.15.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "tough-cookie@4.1.4"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "punycode@2.3.1",
          "Name": "punycode",
          "Identifier": {
            "PURL": "pkg:npm/punycode@2.3.1",
            "UID": "b36af7f3b8e42860",
            "BOMRef": "pkg:npm/punycode@2.3.1"
          },
          "Version": "2.3.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "psl@1.15.0",
            "tough-cookie@4.1.4",
            "tr46@4.1.1",
            "uri-js@4.4.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "qdrant-web-ui@0.2.5",
          "Name": "qdrant-web-ui",
          "Identifier": {
            "PURL": "pkg:npm/qdrant-web-ui@0.2.5",
            "UID": "ce9c2cf07c7d9dbe",
            "BOMRef": "pkg:npm/qdrant-web-ui@0.2.5"
          },
          "Version": "0.2.5",
          "Licenses": [
            "Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "querystringify@2.2.0",
          "Name": "querystringify",
          "Identifier": {
            "PURL": "pkg:npm/querystringify@2.2.0",
            "UID": "c1d277f6703d41d9",
            "BOMRef": "pkg:npm/querystringify@2.2.0"
          },
          "Version": "2.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "url-parse@1.5.10"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "queue-microtask@1.2.3",
          "Name": "queue-microtask",
          "Identifier": {
            "PURL": "pkg:npm/queue-microtask@1.2.3",
            "UID": "42ecd1417d9d42e",
            "BOMRef": "pkg:npm/queue-microtask@1.2.3"
          },
          "Version": "1.2.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "run-parallel@1.2.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "react@18.3.1",
          "Name": "react",
          "Identifier": {
            "PURL": "pkg:npm/react@18.3.1",
            "UID": "1e61eb6b806ffe50",
            "BOMRef": "pkg:npm/react@18.3.1"
          },
          "Version": "18.3.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@emotion/react@11.14.0",
            "@emotion/styled@11.14.1",
            "@emotion/use-insertion-effect-with-fallbacks@1.2.0",
            "@mdx-js/react@2.3.0",
            "@monaco-editor/react@4.7.0",
            "@mui/icons-material@7.2.0",
            "@mui/material@5.17.1",
            "@mui/material@7.2.0",
            "@mui/private-theming@5.17.1",
            "@mui/private-theming@7.2.0",
            "@mui/styled-engine@5.16.14",
            "@mui/styled-engine@7.2.0",
            "@mui/system@5.17.1",
            "@mui/system@7.2.0",
            "@mui/utils@5.17.1",
            "@mui/utils@7.2.0",
            "@mui/x-data-grid@7.29.8",
            "@mui/x-internals@7.29.0",
            "@testing-library/react@13.4.0",
            "@textea/json-viewer@2.17.2",
            "@uppy/react@4.4.0",
            "lucide-react@0.545.0",
            "mui-chips-input@7.0.1",
            "notistack@3.0.2",
            "prism-react-renderer@2.4.1",
            "qdrant-web-ui@0.2.5",
            "react-archer@4.4.0",
            "react-diff-viewer-continued@3.4.0",
            "react-dom@18.3.1",
            "react-resizable-panels@0.0.51",
            "react-router-dom@6.30.1",
            "react-router@6.30.1",
            "react-simple-code-editor@0.13.1",
            "react-transition-group@4.4.5",
            "use-sync-external-store@1.5.0",
            "zustand@4.5.7"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "react-archer@4.4.0",
          "Name": "react-archer",
          "Identifier": {
            "PURL": "pkg:npm/react-archer@4.4.0",
            "UID": "cf9e34ae951a9861",
            "BOMRef": "pkg:npm/react-archer@4.4.0"
          },
          "Version": "4.4.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "react-diff-viewer-continued@3.4.0",
          "Name": "react-diff-viewer-continued",
          "Identifier": {
            "PURL": "pkg:npm/react-diff-viewer-continued@3.4.0",
            "UID": "1ca664cf4b6b7567",
            "BOMRef": "pkg:npm/react-diff-viewer-continued@3.4.0"
          },
          "Version": "3.4.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "react-dom@18.3.1",
          "Name": "react-dom",
          "Identifier": {
            "PURL": "pkg:npm/react-dom@18.3.1",
            "UID": "766c655eb900451",
            "BOMRef": "pkg:npm/react-dom@18.3.1"
          },
          "Version": "18.3.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@monaco-editor/react@4.7.0",
            "@mui/material@5.17.1",
            "@mui/material@7.2.0",
            "@mui/x-data-grid@7.29.8",
            "@testing-library/react@13.4.0",
            "@textea/json-viewer@2.17.2",
            "@uppy/react@4.4.0",
            "mui-chips-input@7.0.1",
            "notistack@3.0.2",
            "qdrant-web-ui@0.2.5",
            "react-diff-viewer-continued@3.4.0",
            "react-resizable-panels@0.0.51",
            "react-router-dom@6.30.1",
            "react-simple-code-editor@0.13.1",
            "react-transition-group@4.4.5"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "react-fast-compare@2.0.4",
          "Name": "react-fast-compare",
          "Identifier": {
            "PURL": "pkg:npm/react-fast-compare@2.0.4",
            "UID": "a13ae0b32d0c90a9",
            "BOMRef": "pkg:npm/react-fast-compare@2.0.4"
          },
          "Version": "2.0.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "react-archer@4.4.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "react-is@16.13.1",
          "Name": "react-is",
          "Identifier": {
            "PURL": "pkg:npm/react-is@16.13.1",
            "UID": "6bced94513db48e9",
            "BOMRef": "14711e1b-7f45-4274-9419-58c947032d6b"
          },
          "Version": "16.13.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "hoist-non-react-statics@3.3.2",
            "prop-types@15.8.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "react-is@16.13.1",
          "Name": "react-is",
          "Identifier": {
            "PURL": "pkg:npm/react-is@16.13.1",
            "UID": "15d7baa87a38d4e4",
            "BOMRef": "39367915-aab6-4940-9d09-4615e84455af"
          },
          "Version": "16.13.1",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "react-is@17.0.2",
          "Name": "react-is",
          "Identifier": {
            "PURL": "pkg:npm/react-is@17.0.2",
            "UID": "8b0d4949e6283ec1",
            "BOMRef": "pkg:npm/react-is@17.0.2"
          },
          "Version": "17.0.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "pretty-format@27.5.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "react-is@18.3.1",
          "Name": "react-is",
          "Identifier": {
            "PURL": "pkg:npm/react-is@18.3.1",
            "UID": "717d95775cb08dbb",
            "BOMRef": "05c7311f-5d4d-40f4-a660-a4a6d1e7a902"
          },
          "Version": "18.3.1",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "react-is@18.3.1",
          "Name": "react-is",
          "Identifier": {
            "PURL": "pkg:npm/react-is@18.3.1",
            "UID": "1a9c790eaa2bfebd",
            "BOMRef": "f7290659-e03b-4922-9c04-12d6bab17338"
          },
          "Version": "18.3.1",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "react-is@18.3.1",
          "Name": "react-is",
          "Identifier": {
            "PURL": "pkg:npm/react-is@18.3.1",
            "UID": "dd7ae29be95b028e",
            "BOMRef": "3d8bdca1-619c-48c4-a3db-fddae6d19155"
          },
          "Version": "18.3.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "pretty-format@30.0.2",
            "pretty-format@30.0.2",
            "pretty-format@30.0.2",
            "pretty-format@30.0.2"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "react-is@18.3.1",
          "Name": "react-is",
          "Identifier": {
            "PURL": "pkg:npm/react-is@18.3.1",
            "UID": "54bf4b3da70a277a",
            "BOMRef": "20da5c2d-e671-426a-a67e-30a245165e11"
          },
          "Version": "18.3.1",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "react-is@19.1.0",
          "Name": "react-is",
          "Identifier": {
            "PURL": "pkg:npm/react-is@19.1.0",
            "UID": "53abbc8872c370b6",
            "BOMRef": "pkg:npm/react-is@19.1.0"
          },
          "Version": "19.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mui/material@5.17.1",
            "@mui/material@7.2.0",
            "@mui/utils@5.17.1",
            "@mui/utils@7.2.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "react-refresh@0.17.0",
          "Name": "react-refresh",
          "Identifier": {
            "PURL": "pkg:npm/react-refresh@0.17.0",
            "UID": "7810b3d5427125ad",
            "BOMRef": "pkg:npm/react-refresh@0.17.0"
          },
          "Version": "0.17.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@vitejs/plugin-react@4.6.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "react-resizable-panels@0.0.51",
          "Name": "react-resizable-panels",
          "Identifier": {
            "PURL": "pkg:npm/react-resizable-panels@0.0.51",
            "UID": "161ef9d19cf3cb69",
            "BOMRef": "pkg:npm/react-resizable-panels@0.0.51"
          },
          "Version": "0.0.51",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "react-router@6.30.1",
          "Name": "react-router",
          "Identifier": {
            "PURL": "pkg:npm/react-router@6.30.1",
            "UID": "631f70d1fde12473",
            "BOMRef": "pkg:npm/react-router@6.30.1"
          },
          "Version": "6.30.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "react-router-dom@6.30.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "react-router-dom@6.30.1",
          "Name": "react-router-dom",
          "Identifier": {
            "PURL": "pkg:npm/react-router-dom@6.30.1",
            "UID": "57ec5fac4ebb088a",
            "BOMRef": "pkg:npm/react-router-dom@6.30.1"
          },
          "Version": "6.30.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "react-simple-code-editor@0.13.1",
          "Name": "react-simple-code-editor",
          "Identifier": {
            "PURL": "pkg:npm/react-simple-code-editor@0.13.1",
            "UID": "2b04cdbc9146bc1f",
            "BOMRef": "pkg:npm/react-simple-code-editor@0.13.1"
          },
          "Version": "0.13.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "react-transition-group@4.4.5",
          "Name": "react-transition-group",
          "Identifier": {
            "PURL": "pkg:npm/react-transition-group@4.4.5",
            "UID": "124155a199d1fa2",
            "BOMRef": "pkg:npm/react-transition-group@4.4.5"
          },
          "Version": "4.4.5",
          "Licenses": [
            "BSD-3-Clause"
          ],
          "DependsOn": [
            "@mui/material@5.17.1",
            "@mui/material@7.2.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "redent@3.0.0",
          "Name": "redent",
          "Identifier": {
            "PURL": "pkg:npm/redent@3.0.0",
            "UID": "b5d2a6c56462afba",
            "BOMRef": "pkg:npm/redent@3.0.0"
          },
          "Version": "3.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@testing-library/jest-dom@5.17.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "reflect.getprototypeof@1.0.10",
          "Name": "reflect.getprototypeof",
          "Identifier": {
            "PURL": "pkg:npm/reflect.getprototypeof@1.0.10",
            "UID": "a582128382893109",
            "BOMRef": "pkg:npm/reflect.getprototypeof@1.0.10"
          },
          "Version": "1.0.10",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "typed-array-byte-offset@1.0.4",
            "typed-array-length@1.0.7"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "regexp.prototype.flags@1.5.4",
          "Name": "regexp.prototype.flags",
          "Identifier": {
            "PURL": "pkg:npm/regexp.prototype.flags@1.5.4",
            "UID": "99d0b5cdd2ddfe5e",
            "BOMRef": "pkg:npm/regexp.prototype.flags@1.5.4"
          },
          "Version": "1.5.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "deep-equal@2.2.3",
            "es-abstract@1.24.0",
            "string.prototype.matchall@4.0.12"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "remark-mdx@2.3.0",
          "Name": "remark-mdx",
          "Identifier": {
            "PURL": "pkg:npm/remark-mdx@2.3.0",
            "UID": "145aa8c881b72dbd",
            "BOMRef": "pkg:npm/remark-mdx@2.3.0"
          },
          "Version": "2.3.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mdx-js/mdx@2.3.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "remark-parse@10.0.2",
          "Name": "remark-parse",
          "Identifier": {
            "PURL": "pkg:npm/remark-parse@10.0.2",
            "UID": "ab13dae282631797",
            "BOMRef": "pkg:npm/remark-parse@10.0.2"
          },
          "Version": "10.0.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mdx-js/mdx@2.3.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "remark-rehype@10.1.0",
          "Name": "remark-rehype",
          "Identifier": {
            "PURL": "pkg:npm/remark-rehype@10.1.0",
            "UID": "a22efbdddea2e743",
            "BOMRef": "pkg:npm/remark-rehype@10.1.0"
          },
          "Version": "10.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mdx-js/mdx@2.3.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "requires-port@1.0.0",
          "Name": "requires-port",
          "Identifier": {
            "PURL": "pkg:npm/requires-port@1.0.0",
            "UID": "f741907eec9512b4",
            "BOMRef": "pkg:npm/requires-port@1.0.0"
          },
          "Version": "1.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "url-parse@1.5.10"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "reselect@5.1.1",
          "Name": "reselect",
          "Identifier": {
            "PURL": "pkg:npm/reselect@5.1.1",
            "UID": "121c7ca7f8c8041c",
            "BOMRef": "pkg:npm/reselect@5.1.1"
          },
          "Version": "5.1.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mui/x-data-grid@7.29.8"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "resize-observer-polyfill@1.5.0",
          "Name": "resize-observer-polyfill",
          "Identifier": {
            "PURL": "pkg:npm/resize-observer-polyfill@1.5.0",
            "UID": "6f63de827637b86a",
            "BOMRef": "pkg:npm/resize-observer-polyfill@1.5.0"
          },
          "Version": "1.5.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "react-archer@4.4.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "resolve@1.22.10",
          "Name": "resolve",
          "Identifier": {
            "PURL": "pkg:npm/resolve@1.22.10",
            "UID": "1b398b29da12ac17",
            "BOMRef": "pkg:npm/resolve@1.22.10"
          },
          "Version": "1.22.10",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "babel-plugin-macros@3.1.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "resolve@2.0.0-next.5",
          "Name": "resolve",
          "Identifier": {
            "PURL": "pkg:npm/resolve@2.0.0-next.5",
            "UID": "af457a51cc42420d",
            "BOMRef": "pkg:npm/resolve@2.0.0-next.5"
          },
          "Version": "2.0.0-next.5",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "eslint-plugin-react@7.37.5"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "resolve-from@4.0.0",
          "Name": "resolve-from",
          "Identifier": {
            "PURL": "pkg:npm/resolve-from@4.0.0",
            "UID": "29dfbf85f6ad9cd8",
            "BOMRef": "pkg:npm/resolve-from@4.0.0"
          },
          "Version": "4.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "import-fresh@3.3.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "retry@0.13.1",
          "Name": "retry",
          "Identifier": {
            "PURL": "pkg:npm/retry@0.13.1",
            "UID": "cc4b1364c0d6e81d",
            "BOMRef": "pkg:npm/retry@0.13.1"
          },
          "Version": "0.13.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "p-retry@6.2.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "reusify@1.1.0",
          "Name": "reusify",
          "Identifier": {
            "PURL": "pkg:npm/reusify@1.1.0",
            "UID": "d03a0396f0cb77a1",
            "BOMRef": "pkg:npm/reusify@1.1.0"
          },
          "Version": "1.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "fastq@1.19.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "rimraf@3.0.2",
          "Name": "rimraf",
          "Identifier": {
            "PURL": "pkg:npm/rimraf@3.0.2",
            "UID": "2533123b38beca2c",
            "BOMRef": "pkg:npm/rimraf@3.0.2"
          },
          "Version": "3.0.2",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "flat-cache@3.2.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "rollup@2.79.2",
          "Name": "rollup",
          "Identifier": {
            "PURL": "pkg:npm/rollup@2.79.2",
            "UID": "ad53f40093feba83",
            "BOMRef": "pkg:npm/rollup@2.79.2"
          },
          "Version": "2.79.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "vite-plugin-eslint@1.8.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "rollup@4.44.2",
          "Name": "rollup",
          "Identifier": {
            "PURL": "pkg:npm/rollup@4.44.2",
            "UID": "f84368097bd7f093",
            "BOMRef": "pkg:npm/rollup@4.44.2"
          },
          "Version": "4.44.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mdx-js/rollup@2.3.0",
            "@rollup/pluginutils@5.2.0",
            "vite@6.4.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "rrweb-cssom@0.6.0",
          "Name": "rrweb-cssom",
          "Identifier": {
            "PURL": "pkg:npm/rrweb-cssom@0.6.0",
            "UID": "dc7d72d9e808fa38",
            "BOMRef": "pkg:npm/rrweb-cssom@0.6.0"
          },
          "Version": "0.6.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "cssstyle@3.0.0",
            "jsdom@22.1.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "run-parallel@1.2.0",
          "Name": "run-parallel",
          "Identifier": {
            "PURL": "pkg:npm/run-parallel@1.2.0",
            "UID": "2a16fe5e920dcc1a",
            "BOMRef": "pkg:npm/run-parallel@1.2.0"
          },
          "Version": "1.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@nodelib/fs.scandir@2.1.5"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "sade@1.8.1",
          "Name": "sade",
          "Identifier": {
            "PURL": "pkg:npm/sade@1.8.1",
            "UID": "1d6b9ea395cf71cb",
            "BOMRef": "pkg:npm/sade@1.8.1"
          },
          "Version": "1.8.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "uvu@0.5.6"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "safe-array-concat@1.1.3",
          "Name": "safe-array-concat",
          "Identifier": {
            "PURL": "pkg:npm/safe-array-concat@1.1.3",
            "UID": "4068536b85a9a1ac",
            "BOMRef": "pkg:npm/safe-array-concat@1.1.3"
          },
          "Version": "1.1.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "es-abstract@1.24.0",
            "es-iterator-helpers@1.2.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "safe-push-apply@1.0.0",
          "Name": "safe-push-apply",
          "Identifier": {
            "PURL": "pkg:npm/safe-push-apply@1.0.0",
            "UID": "b58088e38a598032",
            "BOMRef": "pkg:npm/safe-push-apply@1.0.0"
          },
          "Version": "1.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "es-abstract@1.24.0",
            "own-keys@1.0.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "safe-regex-test@1.1.0",
          "Name": "safe-regex-test",
          "Identifier": {
            "PURL": "pkg:npm/safe-regex-test@1.1.0",
            "UID": "c5061a56ae2479a8",
            "BOMRef": "pkg:npm/safe-regex-test@1.1.0"
          },
          "Version": "1.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "es-abstract@1.24.0",
            "is-async-function@2.1.1",
            "is-generator-function@1.1.0",
            "is-symbol@1.1.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "safer-buffer@2.1.2",
          "Name": "safer-buffer",
          "Identifier": {
            "PURL": "pkg:npm/safer-buffer@2.1.2",
            "UID": "ac00771d627c120b",
            "BOMRef": "pkg:npm/safer-buffer@2.1.2"
          },
          "Version": "2.1.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "iconv-lite@0.6.3"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "saxes@6.0.0",
          "Name": "saxes",
          "Identifier": {
            "PURL": "pkg:npm/saxes@6.0.0",
            "UID": "3ab6b65db47c53e7",
            "BOMRef": "pkg:npm/saxes@6.0.0"
          },
          "Version": "6.0.0",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "jsdom@22.1.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "scheduler@0.23.2",
          "Name": "scheduler",
          "Identifier": {
            "PURL": "pkg:npm/scheduler@0.23.2",
            "UID": "b9043d8f8ba01148",
            "BOMRef": "pkg:npm/scheduler@0.23.2"
          },
          "Version": "0.23.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "react-dom@18.3.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "semver@6.3.1",
          "Name": "semver",
          "Identifier": {
            "PURL": "pkg:npm/semver@6.3.1",
            "UID": "9799746676bae6e1",
            "BOMRef": "pkg:npm/semver@6.3.1"
          },
          "Version": "6.3.1",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "@babel/core@7.28.0",
            "@babel/helper-compilation-targets@7.27.2",
            "eslint-plugin-react@7.37.5"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "set-function-length@1.2.2",
          "Name": "set-function-length",
          "Identifier": {
            "PURL": "pkg:npm/set-function-length@1.2.2",
            "UID": "12814d5a2735a9d1",
            "BOMRef": "pkg:npm/set-function-length@1.2.2"
          },
          "Version": "1.2.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "call-bind@1.0.8"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "set-function-name@2.0.2",
          "Name": "set-function-name",
          "Identifier": {
            "PURL": "pkg:npm/set-function-name@2.0.2",
            "UID": "53a2b3995164d91f",
            "BOMRef": "pkg:npm/set-function-name@2.0.2"
          },
          "Version": "2.0.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "iterator.prototype@1.1.5",
            "regexp.prototype.flags@1.5.4",
            "string.prototype.matchall@4.0.12"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "set-proto@1.0.0",
          "Name": "set-proto",
          "Identifier": {
            "PURL": "pkg:npm/set-proto@1.0.0",
            "UID": "662da83a3542047a",
            "BOMRef": "pkg:npm/set-proto@1.0.0"
          },
          "Version": "1.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "es-abstract@1.24.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "shallow-equal@3.1.0",
          "Name": "shallow-equal",
          "Identifier": {
            "PURL": "pkg:npm/shallow-equal@3.1.0",
            "UID": "458cc9d68f92eeac",
            "BOMRef": "pkg:npm/shallow-equal@3.1.0"
          },
          "Version": "3.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@uppy/dashboard@4.3.4"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "shebang-command@2.0.0",
          "Name": "shebang-command",
          "Identifier": {
            "PURL": "pkg:npm/shebang-command@2.0.0",
            "UID": "85b2efabc8b6e9f0",
            "BOMRef": "pkg:npm/shebang-command@2.0.0"
          },
          "Version": "2.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "cross-spawn@7.0.6"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "shebang-regex@3.0.0",
          "Name": "shebang-regex",
          "Identifier": {
            "PURL": "pkg:npm/shebang-regex@3.0.0",
            "UID": "83a3bf04436581f8",
            "BOMRef": "pkg:npm/shebang-regex@3.0.0"
          },
          "Version": "3.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "shebang-command@2.0.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "side-channel@1.1.0",
          "Name": "side-channel",
          "Identifier": {
            "PURL": "pkg:npm/side-channel@1.1.0",
            "UID": "9d86b0ef69043bb4",
            "BOMRef": "pkg:npm/side-channel@1.1.0"
          },
          "Version": "1.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "deep-equal@2.2.3",
            "internal-slot@1.1.0",
            "string.prototype.matchall@4.0.12"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "side-channel-list@1.0.0",
          "Name": "side-channel-list",
          "Identifier": {
            "PURL": "pkg:npm/side-channel-list@1.0.0",
            "UID": "36b9b7b36cdf6f94",
            "BOMRef": "pkg:npm/side-channel-list@1.0.0"
          },
          "Version": "1.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "side-channel@1.1.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "side-channel-map@1.0.1",
          "Name": "side-channel-map",
          "Identifier": {
            "PURL": "pkg:npm/side-channel-map@1.0.1",
            "UID": "c666a1d2c21d86e7",
            "BOMRef": "pkg:npm/side-channel-map@1.0.1"
          },
          "Version": "1.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "side-channel-weakmap@1.0.2",
            "side-channel@1.1.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "side-channel-weakmap@1.0.2",
          "Name": "side-channel-weakmap",
          "Identifier": {
            "PURL": "pkg:npm/side-channel-weakmap@1.0.2",
            "UID": "5b2478a351c38348",
            "BOMRef": "pkg:npm/side-channel-weakmap@1.0.2"
          },
          "Version": "1.0.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "side-channel@1.1.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "siginfo@2.0.0",
          "Name": "siginfo",
          "Identifier": {
            "PURL": "pkg:npm/siginfo@2.0.0",
            "UID": "6cbc2f492cf0db5b",
            "BOMRef": "pkg:npm/siginfo@2.0.0"
          },
          "Version": "2.0.0",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "why-is-node-running@2.3.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "slash@3.0.0",
          "Name": "slash",
          "Identifier": {
            "PURL": "pkg:npm/slash@3.0.0",
            "UID": "ae691326d5ccfed0",
            "BOMRef": "pkg:npm/slash@3.0.0"
          },
          "Version": "3.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "jest-message-util@30.0.2"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "snake-case@3.0.4",
          "Name": "snake-case",
          "Identifier": {
            "PURL": "pkg:npm/snake-case@3.0.4",
            "UID": "2d3e53e39eaabe71",
            "BOMRef": "pkg:npm/snake-case@3.0.4"
          },
          "Version": "3.0.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@svgr/core@8.1.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "source-map@0.5.7",
          "Name": "source-map",
          "Identifier": {
            "PURL": "pkg:npm/source-map@0.5.7",
            "UID": "29f9513d53e99339",
            "BOMRef": "pkg:npm/source-map@0.5.7"
          },
          "Version": "0.5.7",
          "Licenses": [
            "BSD-3-Clause"
          ],
          "DependsOn": [
            "@emotion/babel-plugin@11.13.5"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "source-map@0.7.4",
          "Name": "source-map",
          "Identifier": {
            "PURL": "pkg:npm/source-map@0.7.4",
            "UID": "25780b6d7684d105",
            "BOMRef": "c334b7a2-de4b-496b-8d6e-8389a01f8d12"
          },
          "Version": "0.7.4",
          "Licenses": [
            "BSD-3-Clause"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "source-map@0.7.4",
          "Name": "source-map",
          "Identifier": {
            "PURL": "pkg:npm/source-map@0.7.4",
            "UID": "cb3cb22e2f5b5124",
            "BOMRef": "9d0453d4-2b59-4ecf-856d-bf5ceb403a0a"
          },
          "Version": "0.7.4",
          "Licenses": [
            "BSD-3-Clause"
          ],
          "DependsOn": [
            "@mdx-js/rollup@2.3.0",
            "estree-util-to-js@1.2.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "source-map-js@1.2.1",
          "Name": "source-map-js",
          "Identifier": {
            "PURL": "pkg:npm/source-map-js@1.2.1",
            "UID": "953ae32af671770b",
            "BOMRef": "pkg:npm/source-map-js@1.2.1"
          },
          "Version": "1.2.1",
          "Licenses": [
            "BSD-3-Clause"
          ],
          "DependsOn": [
            "@tailwindcss/node@4.1.11",
            "postcss@8.5.6"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "space-separated-tokens@2.0.2",
          "Name": "space-separated-tokens",
          "Identifier": {
            "PURL": "pkg:npm/space-separated-tokens@2.0.2",
            "UID": "e722cdc3fe6d5132",
            "BOMRef": "pkg:npm/space-separated-tokens@2.0.2"
          },
          "Version": "2.0.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "hast-util-to-estree@2.3.3"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "stack-utils@2.0.6",
          "Name": "stack-utils",
          "Identifier": {
            "PURL": "pkg:npm/stack-utils@2.0.6",
            "UID": "29ec825d761e8dad",
            "BOMRef": "pkg:npm/stack-utils@2.0.6"
          },
          "Version": "2.0.6",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "jest-message-util@30.0.2"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "stackback@0.0.2",
          "Name": "stackback",
          "Identifier": {
            "PURL": "pkg:npm/stackback@0.0.2",
            "UID": "af47784d603c61f7",
            "BOMRef": "pkg:npm/stackback@0.0.2"
          },
          "Version": "0.0.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "why-is-node-running@2.3.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "state-local@1.0.7",
          "Name": "state-local",
          "Identifier": {
            "PURL": "pkg:npm/state-local@1.0.7",
            "UID": "de8ab799eacadf61",
            "BOMRef": "pkg:npm/state-local@1.0.7"
          },
          "Version": "1.0.7",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@monaco-editor/loader@1.5.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "std-env@3.9.0",
          "Name": "std-env",
          "Identifier": {
            "PURL": "pkg:npm/std-env@3.9.0",
            "UID": "e09b7ae7fced8e66",
            "BOMRef": "pkg:npm/std-env@3.9.0"
          },
          "Version": "3.9.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "vitest@3.2.4"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "stop-iteration-iterator@1.1.0",
          "Name": "stop-iteration-iterator",
          "Identifier": {
            "PURL": "pkg:npm/stop-iteration-iterator@1.1.0",
            "UID": "3378efaa800ae807",
            "BOMRef": "pkg:npm/stop-iteration-iterator@1.1.0"
          },
          "Version": "1.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "es-abstract@1.24.0",
            "es-get-iterator@1.1.3"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "string.prototype.matchall@4.0.12",
          "Name": "string.prototype.matchall",
          "Identifier": {
            "PURL": "pkg:npm/string.prototype.matchall@4.0.12",
            "UID": "d7cc2eb22cd725ac",
            "BOMRef": "pkg:npm/string.prototype.matchall@4.0.12"
          },
          "Version": "4.0.12",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "eslint-plugin-react@7.37.5"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "string.prototype.repeat@1.0.0",
          "Name": "string.prototype.repeat",
          "Identifier": {
            "PURL": "pkg:npm/string.prototype.repeat@1.0.0",
            "UID": "82cbc910f90aea71",
            "BOMRef": "pkg:npm/string.prototype.repeat@1.0.0"
          },
          "Version": "1.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "eslint-plugin-react@7.37.5"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "string.prototype.trim@1.2.10",
          "Name": "string.prototype.trim",
          "Identifier": {
            "PURL": "pkg:npm/string.prototype.trim@1.2.10",
            "UID": "b8c8c45c04c13298",
            "BOMRef": "pkg:npm/string.prototype.trim@1.2.10"
          },
          "Version": "1.2.10",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "es-abstract@1.24.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "string.prototype.trimend@1.0.9",
          "Name": "string.prototype.trimend",
          "Identifier": {
            "PURL": "pkg:npm/string.prototype.trimend@1.0.9",
            "UID": "cf0471e29c1309b4",
            "BOMRef": "pkg:npm/string.prototype.trimend@1.0.9"
          },
          "Version": "1.0.9",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "es-abstract@1.24.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "string.prototype.trimstart@1.0.8",
          "Name": "string.prototype.trimstart",
          "Identifier": {
            "PURL": "pkg:npm/string.prototype.trimstart@1.0.8",
            "UID": "820abb7c38126eea",
            "BOMRef": "pkg:npm/string.prototype.trimstart@1.0.8"
          },
          "Version": "1.0.8",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "es-abstract@1.24.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "stringify-entities@4.0.4",
          "Name": "stringify-entities",
          "Identifier": {
            "PURL": "pkg:npm/stringify-entities@4.0.4",
            "UID": "789432a2dfa54b8a",
            "BOMRef": "pkg:npm/stringify-entities@4.0.4"
          },
          "Version": "4.0.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "mdast-util-mdx-jsx@2.1.4"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "strip-ansi@6.0.1",
          "Name": "strip-ansi",
          "Identifier": {
            "PURL": "pkg:npm/strip-ansi@6.0.1",
            "UID": "185814224735b748",
            "BOMRef": "pkg:npm/strip-ansi@6.0.1"
          },
          "Version": "6.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "eslint@8.57.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "strip-indent@3.0.0",
          "Name": "strip-indent",
          "Identifier": {
            "PURL": "pkg:npm/strip-indent@3.0.0",
            "UID": "e24d64eea66d2094",
            "BOMRef": "pkg:npm/strip-indent@3.0.0"
          },
          "Version": "3.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "redent@3.0.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "strip-json-comments@3.1.1",
          "Name": "strip-json-comments",
          "Identifier": {
            "PURL": "pkg:npm/strip-json-comments@3.1.1",
            "UID": "d7f3092bffa5392c",
            "BOMRef": "pkg:npm/strip-json-comments@3.1.1"
          },
          "Version": "3.1.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@eslint/eslintrc@2.1.4"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "strip-literal@3.0.0",
          "Name": "strip-literal",
          "Identifier": {
            "PURL": "pkg:npm/strip-literal@3.0.0",
            "UID": "25f054feea8d3232",
            "BOMRef": "pkg:npm/strip-literal@3.0.0"
          },
          "Version": "3.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@vitest/runner@3.2.4"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "style-to-object@0.4.4",
          "Name": "style-to-object",
          "Identifier": {
            "PURL": "pkg:npm/style-to-object@0.4.4",
            "UID": "a5bbb11610e17328",
            "BOMRef": "pkg:npm/style-to-object@0.4.4"
          },
          "Version": "0.4.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "hast-util-to-estree@2.3.3"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "stylis@4.2.0",
          "Name": "stylis",
          "Identifier": {
            "PURL": "pkg:npm/stylis@4.2.0",
            "UID": "73d61615958c8085",
            "BOMRef": "pkg:npm/stylis@4.2.0"
          },
          "Version": "4.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@emotion/babel-plugin@11.13.5",
            "@emotion/cache@11.14.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "supports-color@7.2.0",
          "Name": "supports-color",
          "Identifier": {
            "PURL": "pkg:npm/supports-color@7.2.0",
            "UID": "c63f9e3263a9766b",
            "BOMRef": "pkg:npm/supports-color@7.2.0"
          },
          "Version": "7.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "chalk@3.0.0",
            "chalk@4.1.2"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "supports-preserve-symlinks-flag@1.0.0",
          "Name": "supports-preserve-symlinks-flag",
          "Identifier": {
            "PURL": "pkg:npm/supports-preserve-symlinks-flag@1.0.0",
            "UID": "61c7a8fbb105ffd9",
            "BOMRef": "pkg:npm/supports-preserve-symlinks-flag@1.0.0"
          },
          "Version": "1.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "resolve@1.22.10",
            "resolve@2.0.0-next.5"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "svg-parser@2.0.4",
          "Name": "svg-parser",
          "Identifier": {
            "PURL": "pkg:npm/svg-parser@2.0.4",
            "UID": "735010ccd5e31185",
            "BOMRef": "pkg:npm/svg-parser@2.0.4"
          },
          "Version": "2.0.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@svgr/plugin-jsx@8.1.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "symbol-tree@3.2.4",
          "Name": "symbol-tree",
          "Identifier": {
            "PURL": "pkg:npm/symbol-tree@3.2.4",
            "UID": "e6b6c21169ac2998",
            "BOMRef": "pkg:npm/symbol-tree@3.2.4"
          },
          "Version": "3.2.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "jsdom@22.1.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "tailwindcss@4.1.11",
          "Name": "tailwindcss",
          "Identifier": {
            "PURL": "pkg:npm/tailwindcss@4.1.11",
            "UID": "8fa329b67709d070",
            "BOMRef": "pkg:npm/tailwindcss@4.1.11"
          },
          "Version": "4.1.11",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@tailwindcss/cli@4.1.11",
            "@tailwindcss/node@4.1.11",
            "@uppy/components@0.2.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "tapable@2.2.2",
          "Name": "tapable",
          "Identifier": {
            "PURL": "pkg:npm/tapable@2.2.2",
            "UID": "6e7f90bfa8b297ca",
            "BOMRef": "pkg:npm/tapable@2.2.2"
          },
          "Version": "2.2.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "enhanced-resolve@5.18.2"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "tar@7.4.3",
          "Name": "tar",
          "Identifier": {
            "PURL": "pkg:npm/tar@7.4.3",
            "UID": "8308849cbec38b1a",
            "BOMRef": "pkg:npm/tar@7.4.3"
          },
          "Version": "7.4.3",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "@tailwindcss/oxide@4.1.11"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "text-table@0.2.0",
          "Name": "text-table",
          "Identifier": {
            "PURL": "pkg:npm/text-table@0.2.0",
            "UID": "81a2538926c02761",
            "BOMRef": "pkg:npm/text-table@0.2.0"
          },
          "Version": "0.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "eslint@8.57.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "tinybench@2.9.0",
          "Name": "tinybench",
          "Identifier": {
            "PURL": "pkg:npm/tinybench@2.9.0",
            "UID": "3966e37a05c1eb0e",
            "BOMRef": "pkg:npm/tinybench@2.9.0"
          },
          "Version": "2.9.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "vitest@3.2.4"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "tinycolor2@1.6.0",
          "Name": "tinycolor2",
          "Identifier": {
            "PURL": "pkg:npm/tinycolor2@1.6.0",
            "UID": "3698ec2a310b01f3",
            "BOMRef": "pkg:npm/tinycolor2@1.6.0"
          },
          "Version": "1.6.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "canvas-color-tracker@1.3.2"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "tinyexec@0.3.2",
          "Name": "tinyexec",
          "Identifier": {
            "PURL": "pkg:npm/tinyexec@0.3.2",
            "UID": "329cd6bdb9063c40",
            "BOMRef": "pkg:npm/tinyexec@0.3.2"
          },
          "Version": "0.3.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "vitest@3.2.4"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "tinyglobby@0.2.14",
          "Name": "tinyglobby",
          "Identifier": {
            "PURL": "pkg:npm/tinyglobby@0.2.14",
            "UID": "6f5b31513b2a7c6e",
            "BOMRef": "pkg:npm/tinyglobby@0.2.14"
          },
          "Version": "0.2.14",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "vite@6.4.1",
            "vitest@3.2.4"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "tinypool@1.1.1",
          "Name": "tinypool",
          "Identifier": {
            "PURL": "pkg:npm/tinypool@1.1.1",
            "UID": "9b62e76e59bc402f",
            "BOMRef": "pkg:npm/tinypool@1.1.1"
          },
          "Version": "1.1.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "vitest@3.2.4"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "tinyrainbow@2.0.0",
          "Name": "tinyrainbow",
          "Identifier": {
            "PURL": "pkg:npm/tinyrainbow@2.0.0",
            "UID": "4d6463a1366d024e",
            "BOMRef": "pkg:npm/tinyrainbow@2.0.0"
          },
          "Version": "2.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@vitest/expect@3.2.4",
            "@vitest/pretty-format@3.2.4",
            "@vitest/utils@3.2.4",
            "vitest@3.2.4"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "tinyspy@4.0.3",
          "Name": "tinyspy",
          "Identifier": {
            "PURL": "pkg:npm/tinyspy@4.0.3",
            "UID": "36e709e801a3970f",
            "BOMRef": "pkg:npm/tinyspy@4.0.3"
          },
          "Version": "4.0.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@vitest/spy@3.2.4"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "to-regex-range@5.0.1",
          "Name": "to-regex-range",
          "Identifier": {
            "PURL": "pkg:npm/to-regex-range@5.0.1",
            "UID": "2673ccfa27e920d0",
            "BOMRef": "pkg:npm/to-regex-range@5.0.1"
          },
          "Version": "5.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "fill-range@7.1.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "toggle-selection@1.0.6",
          "Name": "toggle-selection",
          "Identifier": {
            "PURL": "pkg:npm/toggle-selection@1.0.6",
            "UID": "f2252f87537add79",
            "BOMRef": "pkg:npm/toggle-selection@1.0.6"
          },
          "Version": "1.0.6",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "copy-to-clipboard@3.3.3"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "tough-cookie@4.1.4",
          "Name": "tough-cookie",
          "Identifier": {
            "PURL": "pkg:npm/tough-cookie@4.1.4",
            "UID": "64eaf535dda6eb71",
            "BOMRef": "pkg:npm/tough-cookie@4.1.4"
          },
          "Version": "4.1.4",
          "Licenses": [
            "BSD-3-Clause"
          ],
          "DependsOn": [
            "jsdom@22.1.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "tr46@4.1.1",
          "Name": "tr46",
          "Identifier": {
            "PURL": "pkg:npm/tr46@4.1.1",
            "UID": "ffe99d9cc19f5182",
            "BOMRef": "pkg:npm/tr46@4.1.1"
          },
          "Version": "4.1.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "whatwg-url@12.0.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "trim-lines@3.0.1",
          "Name": "trim-lines",
          "Identifier": {
            "PURL": "pkg:npm/trim-lines@3.0.1",
            "UID": "95e3cddf17d6f861",
            "BOMRef": "pkg:npm/trim-lines@3.0.1"
          },
          "Version": "3.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "mdast-util-to-hast@12.3.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "trough@2.2.0",
          "Name": "trough",
          "Identifier": {
            "PURL": "pkg:npm/trough@2.2.0",
            "UID": "9ffa6be04a841558",
            "BOMRef": "pkg:npm/trough@2.2.0"
          },
          "Version": "2.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "unified@10.1.2"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "tslib@2.8.1",
          "Name": "tslib",
          "Identifier": {
            "PURL": "pkg:npm/tslib@2.8.1",
            "UID": "4eba9abd8739d5cf",
            "BOMRef": "pkg:npm/tslib@2.8.1"
          },
          "Version": "2.8.1",
          "Licenses": [
            "0BSD"
          ],
          "DependsOn": [
            "dot-case@3.0.4",
            "lower-case@2.0.2",
            "no-case@3.0.4",
            "snake-case@3.0.4"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "type-check@0.4.0",
          "Name": "type-check",
          "Identifier": {
            "PURL": "pkg:npm/type-check@0.4.0",
            "UID": "e688c5e0d95a76a2",
            "BOMRef": "pkg:npm/type-check@0.4.0"
          },
          "Version": "0.4.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "levn@0.4.1",
            "optionator@0.9.4"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "type-fest@0.20.2",
          "Name": "type-fest",
          "Identifier": {
            "PURL": "pkg:npm/type-fest@0.20.2",
            "UID": "90fb3dadcdda1afa",
            "BOMRef": "pkg:npm/type-fest@0.20.2"
          },
          "Version": "0.20.2",
          "Licenses": [
            "MIT OR CC0-1.0"
          ],
          "DependsOn": [
            "globals@13.24.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "typed-array-buffer@1.0.3",
          "Name": "typed-array-buffer",
          "Identifier": {
            "PURL": "pkg:npm/typed-array-buffer@1.0.3",
            "UID": "b0c5e35b715365fe",
            "BOMRef": "pkg:npm/typed-array-buffer@1.0.3"
          },
          "Version": "1.0.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "es-abstract@1.24.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "typed-array-byte-length@1.0.3",
          "Name": "typed-array-byte-length",
          "Identifier": {
            "PURL": "pkg:npm/typed-array-byte-length@1.0.3",
            "UID": "1cace8b8c070ba94",
            "BOMRef": "pkg:npm/typed-array-byte-length@1.0.3"
          },
          "Version": "1.0.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "es-abstract@1.24.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "typed-array-byte-offset@1.0.4",
          "Name": "typed-array-byte-offset",
          "Identifier": {
            "PURL": "pkg:npm/typed-array-byte-offset@1.0.4",
            "UID": "ef8f658a02eb7902",
            "BOMRef": "pkg:npm/typed-array-byte-offset@1.0.4"
          },
          "Version": "1.0.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "es-abstract@1.24.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "typed-array-length@1.0.7",
          "Name": "typed-array-length",
          "Identifier": {
            "PURL": "pkg:npm/typed-array-length@1.0.7",
            "UID": "6ef395d4595ba567",
            "BOMRef": "pkg:npm/typed-array-length@1.0.7"
          },
          "Version": "1.0.7",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "es-abstract@1.24.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "typescript@5.8.3",
          "Name": "typescript",
          "Identifier": {
            "PURL": "pkg:npm/typescript@5.8.3",
            "UID": "7370ab583f6322fb",
            "BOMRef": "pkg:npm/typescript@5.8.3"
          },
          "Version": "5.8.3",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "@qdrant/js-client-rest@1.15.1",
            "cosmiconfig@8.3.6"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "unbox-primitive@1.1.0",
          "Name": "unbox-primitive",
          "Identifier": {
            "PURL": "pkg:npm/unbox-primitive@1.1.0",
            "UID": "54c592851696436",
            "BOMRef": "pkg:npm/unbox-primitive@1.1.0"
          },
          "Version": "1.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "es-abstract@1.24.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "undici@6.21.3",
          "Name": "undici",
          "Identifier": {
            "PURL": "pkg:npm/undici@6.21.3",
            "UID": "9c0caa220688f547",
            "BOMRef": "pkg:npm/undici@6.21.3"
          },
          "Version": "6.21.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@qdrant/js-client-rest@1.15.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "undici-types@7.8.0",
          "Name": "undici-types",
          "Identifier": {
            "PURL": "pkg:npm/undici-types@7.8.0",
            "UID": "8e202473b43a8af",
            "BOMRef": "pkg:npm/undici-types@7.8.0"
          },
          "Version": "7.8.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@types/node@24.0.10"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "unified@10.1.2",
          "Name": "unified",
          "Identifier": {
            "PURL": "pkg:npm/unified@10.1.2",
            "UID": "87dd49ad78aa2bd5",
            "BOMRef": "pkg:npm/unified@10.1.2"
          },
          "Version": "10.1.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mdx-js/mdx@2.3.0",
            "remark-parse@10.0.2",
            "remark-rehype@10.1.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "unist-util-generated@2.0.1",
          "Name": "unist-util-generated",
          "Identifier": {
            "PURL": "pkg:npm/unist-util-generated@2.0.1",
            "UID": "19a1636590c49e0f",
            "BOMRef": "pkg:npm/unist-util-generated@2.0.1"
          },
          "Version": "2.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "mdast-util-to-hast@12.3.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "unist-util-is@5.2.1",
          "Name": "unist-util-is",
          "Identifier": {
            "PURL": "pkg:npm/unist-util-is@5.2.1",
            "UID": "c87f3ee2b31628b6",
            "BOMRef": "pkg:npm/unist-util-is@5.2.1"
          },
          "Version": "5.2.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "unist-util-visit-parents@5.1.3",
            "unist-util-visit-parents@5.1.3",
            "unist-util-visit-parents@5.1.3",
            "unist-util-visit-parents@5.1.3",
            "unist-util-visit-parents@5.1.3",
            "unist-util-visit@4.1.2",
            "unist-util-visit@4.1.2",
            "unist-util-visit@4.1.2",
            "unist-util-visit@4.1.2",
            "unist-util-visit@4.1.2",
            "mdast-util-phrasing@3.0.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "unist-util-is@6.0.0",
          "Name": "unist-util-is",
          "Identifier": {
            "PURL": "pkg:npm/unist-util-is@6.0.0",
            "UID": "f9b5d3e99bf1f81d",
            "BOMRef": "646c7019-923b-4d87-86fc-17fa8d96236b"
          },
          "Version": "6.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "unist-util-visit-parents@6.0.1",
            "unist-util-visit@5.0.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "unist-util-is@6.0.0",
          "Name": "unist-util-is",
          "Identifier": {
            "PURL": "pkg:npm/unist-util-is@6.0.0",
            "UID": "85ca3e9d80007c0b",
            "BOMRef": "fdf589d4-bed3-4881-b8cd-6fa930b04eed"
          },
          "Version": "6.0.0",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "unist-util-position@4.0.4",
          "Name": "unist-util-position",
          "Identifier": {
            "PURL": "pkg:npm/unist-util-position@4.0.4",
            "UID": "4b567e486519d0b8",
            "BOMRef": "pkg:npm/unist-util-position@4.0.4"
          },
          "Version": "4.0.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "hast-util-to-estree@2.3.3",
            "mdast-util-to-hast@12.3.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "unist-util-position-from-estree@1.1.2",
          "Name": "unist-util-position-from-estree",
          "Identifier": {
            "PURL": "pkg:npm/unist-util-position-from-estree@1.1.2",
            "UID": "8b366b404cc0b125",
            "BOMRef": "pkg:npm/unist-util-position-from-estree@1.1.2"
          },
          "Version": "1.1.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mdx-js/mdx@2.3.0",
            "micromark-extension-mdxjs-esm@1.0.5",
            "micromark-factory-mdx-expression@1.0.9"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "unist-util-remove-position@4.0.2",
          "Name": "unist-util-remove-position",
          "Identifier": {
            "PURL": "pkg:npm/unist-util-remove-position@4.0.2",
            "UID": "d7de2654ed9eb88c",
            "BOMRef": "pkg:npm/unist-util-remove-position@4.0.2"
          },
          "Version": "4.0.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "mdast-util-mdx-jsx@2.1.4"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "unist-util-stringify-position@3.0.3",
          "Name": "unist-util-stringify-position",
          "Identifier": {
            "PURL": "pkg:npm/unist-util-stringify-position@3.0.3",
            "UID": "730cc547bb06c20d",
            "BOMRef": "pkg:npm/unist-util-stringify-position@3.0.3"
          },
          "Version": "3.0.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mdx-js/mdx@2.3.0",
            "mdast-util-from-markdown@1.3.1",
            "mdast-util-mdx-jsx@2.1.4",
            "vfile-message@3.1.4",
            "vfile@5.3.7"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "unist-util-visit@4.1.2",
          "Name": "unist-util-visit",
          "Identifier": {
            "PURL": "pkg:npm/unist-util-visit@4.1.2",
            "UID": "b2ebb556bec0d80b",
            "BOMRef": "1767a44f-ea60-4313-8b66-065338e02f8e"
          },
          "Version": "4.1.2",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "unist-util-visit@4.1.2",
          "Name": "unist-util-visit",
          "Identifier": {
            "PURL": "pkg:npm/unist-util-visit@4.1.2",
            "UID": "5863836e3ab8346",
            "BOMRef": "e2d6b8e2-dba6-408a-b545-4885553ed618"
          },
          "Version": "4.1.2",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "unist-util-visit@4.1.2",
          "Name": "unist-util-visit",
          "Identifier": {
            "PURL": "pkg:npm/unist-util-visit@4.1.2",
            "UID": "117cf868d5693565",
            "BOMRef": "1e0c9786-1f67-475e-a059-b6800d9b62c3"
          },
          "Version": "4.1.2",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "unist-util-visit@4.1.2",
          "Name": "unist-util-visit",
          "Identifier": {
            "PURL": "pkg:npm/unist-util-visit@4.1.2",
            "UID": "1aa97ea43842e55b",
            "BOMRef": "3f07e20a-93a7-43e1-8bf6-1abb8220845a"
          },
          "Version": "4.1.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mdx-js/mdx@2.3.0",
            "mdast-util-definitions@5.1.2",
            "mdast-util-to-hast@12.3.0",
            "mdast-util-to-markdown@1.5.0",
            "unist-util-remove-position@4.0.2"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "unist-util-visit@4.1.2",
          "Name": "unist-util-visit",
          "Identifier": {
            "PURL": "pkg:npm/unist-util-visit@4.1.2",
            "UID": "3b10f0b8cf9a0ec3",
            "BOMRef": "c1f3f920-cc0f-4d8b-8925-4bfd4e913ef5"
          },
          "Version": "4.1.2",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "unist-util-visit@5.0.0",
          "Name": "unist-util-visit",
          "Identifier": {
            "PURL": "pkg:npm/unist-util-visit@5.0.0",
            "UID": "3e3f0cb272191192",
            "BOMRef": "pkg:npm/unist-util-visit@5.0.0"
          },
          "Version": "5.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "unist-util-visit-parents@5.1.3",
          "Name": "unist-util-visit-parents",
          "Identifier": {
            "PURL": "pkg:npm/unist-util-visit-parents@5.1.3",
            "UID": "1730b2bb709b861f",
            "BOMRef": "d6ff8dc3-767d-4b3f-a41b-2766d00ff0f3"
          },
          "Version": "5.1.3",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "unist-util-visit-parents@5.1.3",
          "Name": "unist-util-visit-parents",
          "Identifier": {
            "PURL": "pkg:npm/unist-util-visit-parents@5.1.3",
            "UID": "27a616fd27fe69bf",
            "BOMRef": "36200bbc-0b37-4a30-89a7-8f859812e583"
          },
          "Version": "5.1.3",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "unist-util-visit-parents@5.1.3",
          "Name": "unist-util-visit-parents",
          "Identifier": {
            "PURL": "pkg:npm/unist-util-visit-parents@5.1.3",
            "UID": "de11d85a5b0a0e7e",
            "BOMRef": "46bc6108-1cb7-4047-8845-4744bff078a1"
          },
          "Version": "5.1.3",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "unist-util-visit-parents@5.1.3",
          "Name": "unist-util-visit-parents",
          "Identifier": {
            "PURL": "pkg:npm/unist-util-visit-parents@5.1.3",
            "UID": "b95808fd4f1f5437",
            "BOMRef": "818f5ec6-c949-4875-810d-a7046db0b35d"
          },
          "Version": "5.1.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "unist-util-visit@4.1.2",
            "unist-util-visit@4.1.2",
            "unist-util-visit@4.1.2",
            "unist-util-visit@4.1.2",
            "unist-util-visit@4.1.2"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "unist-util-visit-parents@5.1.3",
          "Name": "unist-util-visit-parents",
          "Identifier": {
            "PURL": "pkg:npm/unist-util-visit-parents@5.1.3",
            "UID": "49ac9dc7ba277c5c",
            "BOMRef": "54e18cfd-71e8-45b8-b741-c47067c6237e"
          },
          "Version": "5.1.3",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "unist-util-visit-parents@6.0.1",
          "Name": "unist-util-visit-parents",
          "Identifier": {
            "PURL": "pkg:npm/unist-util-visit-parents@6.0.1",
            "UID": "da3ee98d7c7e0b79",
            "BOMRef": "pkg:npm/unist-util-visit-parents@6.0.1"
          },
          "Version": "6.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "unist-util-visit@5.0.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "universalify@0.2.0",
          "Name": "universalify",
          "Identifier": {
            "PURL": "pkg:npm/universalify@0.2.0",
            "UID": "164930a9093a8e11",
            "BOMRef": "pkg:npm/universalify@0.2.0"
          },
          "Version": "0.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "tough-cookie@4.1.4"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "update-browserslist-db@1.1.3",
          "Name": "update-browserslist-db",
          "Identifier": {
            "PURL": "pkg:npm/update-browserslist-db@1.1.3",
            "UID": "dd3de17ac655d84f",
            "BOMRef": "pkg:npm/update-browserslist-db@1.1.3"
          },
          "Version": "1.1.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "browserslist@4.25.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "uri-js@4.4.1",
          "Name": "uri-js",
          "Identifier": {
            "PURL": "pkg:npm/uri-js@4.4.1",
            "UID": "7a6423e6ac9860d4",
            "BOMRef": "pkg:npm/uri-js@4.4.1"
          },
          "Version": "4.4.1",
          "Licenses": [
            "BSD-2-Clause"
          ],
          "DependsOn": [
            "ajv@6.12.6"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "url-parse@1.5.10",
          "Name": "url-parse",
          "Identifier": {
            "PURL": "pkg:npm/url-parse@1.5.10",
            "UID": "8b91c151617d826e",
            "BOMRef": "pkg:npm/url-parse@1.5.10"
          },
          "Version": "1.5.10",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "tough-cookie@4.1.4"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "use-sync-external-store@1.5.0",
          "Name": "use-sync-external-store",
          "Identifier": {
            "PURL": "pkg:npm/use-sync-external-store@1.5.0",
            "UID": "19455a00a522e77a",
            "BOMRef": "pkg:npm/use-sync-external-store@1.5.0"
          },
          "Version": "1.5.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mui/x-data-grid@7.29.8",
            "@uppy/react@4.4.0",
            "zustand@4.5.7"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "uvu@0.5.6",
          "Name": "uvu",
          "Identifier": {
            "PURL": "pkg:npm/uvu@0.5.6",
            "UID": "372cd0e435b09c2d",
            "BOMRef": "pkg:npm/uvu@0.5.6"
          },
          "Version": "0.5.6",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "mdast-util-from-markdown@1.3.1",
            "micromark-core-commonmark@1.1.0",
            "micromark-extension-mdx-expression@1.0.8",
            "micromark-extension-mdx-jsx@1.0.5",
            "micromark-extension-mdxjs-esm@1.0.5",
            "micromark-factory-label@1.1.0",
            "micromark-factory-mdx-expression@1.0.9",
            "micromark-util-events-to-acorn@1.2.3",
            "micromark-util-subtokenize@1.1.0",
            "micromark@3.2.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "vfile@5.3.7",
          "Name": "vfile",
          "Identifier": {
            "PURL": "pkg:npm/vfile@5.3.7",
            "UID": "8f72ba08bc7d3d9f",
            "BOMRef": "pkg:npm/vfile@5.3.7"
          },
          "Version": "5.3.7",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mdx-js/mdx@2.3.0",
            "@mdx-js/rollup@2.3.0",
            "unified@10.1.2"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "vfile-message@3.1.4",
          "Name": "vfile-message",
          "Identifier": {
            "PURL": "pkg:npm/vfile-message@3.1.4",
            "UID": "47fa820a8041daa3",
            "BOMRef": "pkg:npm/vfile-message@3.1.4"
          },
          "Version": "3.1.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "mdast-util-mdx-jsx@2.1.4",
            "micromark-extension-mdx-jsx@1.0.5",
            "micromark-extension-mdxjs-esm@1.0.5",
            "micromark-factory-mdx-expression@1.0.9",
            "micromark-util-events-to-acorn@1.2.3",
            "vfile@5.3.7"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "vite@6.4.1",
          "Name": "vite",
          "Identifier": {
            "PURL": "pkg:npm/vite@6.4.1",
            "UID": "7cafa983c414918d",
            "BOMRef": "pkg:npm/vite@6.4.1"
          },
          "Version": "6.4.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@vitejs/plugin-react@4.6.0",
            "@vitest/mocker@3.2.4",
            "qdrant-web-ui@0.2.5",
            "vite-node@3.2.4",
            "vite-plugin-eslint@1.8.1",
            "vite-plugin-svgr@4.3.0",
            "vitest@3.2.4"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "vite-node@3.2.4",
          "Name": "vite-node",
          "Identifier": {
            "PURL": "pkg:npm/vite-node@3.2.4",
            "UID": "3a0d75cc0a2d8309",
            "BOMRef": "pkg:npm/vite-node@3.2.4"
          },
          "Version": "3.2.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "vitest@3.2.4"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "vite-plugin-eslint@1.8.1",
          "Name": "vite-plugin-eslint",
          "Identifier": {
            "PURL": "pkg:npm/vite-plugin-eslint@1.8.1",
            "UID": "96d6e93f811d41d7",
            "BOMRef": "pkg:npm/vite-plugin-eslint@1.8.1"
          },
          "Version": "1.8.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "vite-plugin-svgr@4.3.0",
          "Name": "vite-plugin-svgr",
          "Identifier": {
            "PURL": "pkg:npm/vite-plugin-svgr@4.3.0",
            "UID": "942b2d10613b51c5",
            "BOMRef": "pkg:npm/vite-plugin-svgr@4.3.0"
          },
          "Version": "4.3.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "vitest@3.2.4",
          "Name": "vitest",
          "Identifier": {
            "PURL": "pkg:npm/vitest@3.2.4",
            "UID": "b8378b098c32cf4b",
            "BOMRef": "pkg:npm/vitest@3.2.4"
          },
          "Version": "3.2.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "w3c-xmlserializer@4.0.0",
          "Name": "w3c-xmlserializer",
          "Identifier": {
            "PURL": "pkg:npm/w3c-xmlserializer@4.0.0",
            "UID": "d6d423f24d5e2f38",
            "BOMRef": "pkg:npm/w3c-xmlserializer@4.0.0"
          },
          "Version": "4.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "jsdom@22.1.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "web-vitals@2.1.4",
          "Name": "web-vitals",
          "Identifier": {
            "PURL": "pkg:npm/web-vitals@2.1.4",
            "UID": "1a197489405a7a20",
            "BOMRef": "pkg:npm/web-vitals@2.1.4"
          },
          "Version": "2.1.4",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "webidl-conversions@7.0.0",
          "Name": "webidl-conversions",
          "Identifier": {
            "PURL": "pkg:npm/webidl-conversions@7.0.0",
            "UID": "33680295902b2344",
            "BOMRef": "pkg:npm/webidl-conversions@7.0.0"
          },
          "Version": "7.0.0",
          "Licenses": [
            "BSD-2-Clause"
          ],
          "DependsOn": [
            "domexception@4.0.0",
            "jsdom@22.1.0",
            "whatwg-url@12.0.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "whatwg-encoding@2.0.0",
          "Name": "whatwg-encoding",
          "Identifier": {
            "PURL": "pkg:npm/whatwg-encoding@2.0.0",
            "UID": "b1cdc2a27de2de33",
            "BOMRef": "pkg:npm/whatwg-encoding@2.0.0"
          },
          "Version": "2.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "html-encoding-sniffer@3.0.0",
            "jsdom@22.1.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "whatwg-mimetype@3.0.0",
          "Name": "whatwg-mimetype",
          "Identifier": {
            "PURL": "pkg:npm/whatwg-mimetype@3.0.0",
            "UID": "2cd1c5a27b6b3d80",
            "BOMRef": "pkg:npm/whatwg-mimetype@3.0.0"
          },
          "Version": "3.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "data-urls@4.0.0",
            "jsdom@22.1.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "whatwg-url@12.0.1",
          "Name": "whatwg-url",
          "Identifier": {
            "PURL": "pkg:npm/whatwg-url@12.0.1",
            "UID": "5df5501a5fc9008f",
            "BOMRef": "pkg:npm/whatwg-url@12.0.1"
          },
          "Version": "12.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "data-urls@4.0.0",
            "jsdom@22.1.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "which@2.0.2",
          "Name": "which",
          "Identifier": {
            "PURL": "pkg:npm/which@2.0.2",
            "UID": "48d2ff62c6cf9b7d",
            "BOMRef": "pkg:npm/which@2.0.2"
          },
          "Version": "2.0.2",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "cross-spawn@7.0.6"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "which-boxed-primitive@1.1.1",
          "Name": "which-boxed-primitive",
          "Identifier": {
            "PURL": "pkg:npm/which-boxed-primitive@1.1.1",
            "UID": "b534c0832ef9905e",
            "BOMRef": "pkg:npm/which-boxed-primitive@1.1.1"
          },
          "Version": "1.1.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "deep-equal@2.2.3",
            "unbox-primitive@1.1.0",
            "which-builtin-type@1.2.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "which-builtin-type@1.2.1",
          "Name": "which-builtin-type",
          "Identifier": {
            "PURL": "pkg:npm/which-builtin-type@1.2.1",
            "UID": "d78cb4007828402f",
            "BOMRef": "pkg:npm/which-builtin-type@1.2.1"
          },
          "Version": "1.2.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "reflect.getprototypeof@1.0.10"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "which-collection@1.0.2",
          "Name": "which-collection",
          "Identifier": {
            "PURL": "pkg:npm/which-collection@1.0.2",
            "UID": "424e10047b8e884f",
            "BOMRef": "pkg:npm/which-collection@1.0.2"
          },
          "Version": "1.0.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "deep-equal@2.2.3",
            "which-builtin-type@1.2.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "which-typed-array@1.1.19",
          "Name": "which-typed-array",
          "Identifier": {
            "PURL": "pkg:npm/which-typed-array@1.1.19",
            "UID": "adf3a2e494efe741",
            "BOMRef": "pkg:npm/which-typed-array@1.1.19"
          },
          "Version": "1.1.19",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "deep-equal@2.2.3",
            "es-abstract@1.24.0",
            "is-typed-array@1.1.15",
            "which-builtin-type@1.2.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "why-is-node-running@2.3.0",
          "Name": "why-is-node-running",
          "Identifier": {
            "PURL": "pkg:npm/why-is-node-running@2.3.0",
            "UID": "e192c96d84d1a93",
            "BOMRef": "pkg:npm/why-is-node-running@2.3.0"
          },
          "Version": "2.3.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "vitest@3.2.4"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "wildcard@1.1.2",
          "Name": "wildcard",
          "Identifier": {
            "PURL": "pkg:npm/wildcard@1.1.2",
            "UID": "799c073f29a45e16",
            "BOMRef": "pkg:npm/wildcard@1.1.2"
          },
          "Version": "1.1.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "mime-match@1.0.2"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "word-wrap@1.2.5",
          "Name": "word-wrap",
          "Identifier": {
            "PURL": "pkg:npm/word-wrap@1.2.5",
            "UID": "a36e7ce5fb3c548",
            "BOMRef": "pkg:npm/word-wrap@1.2.5"
          },
          "Version": "1.2.5",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "optionator@0.9.4"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "wrappy@1.0.2",
          "Name": "wrappy",
          "Identifier": {
            "PURL": "pkg:npm/wrappy@1.0.2",
            "UID": "3eb8ec470b2ccee5",
            "BOMRef": "pkg:npm/wrappy@1.0.2"
          },
          "Version": "1.0.2",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "inflight@1.0.6",
            "once@1.4.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "ws@8.18.3",
          "Name": "ws",
          "Identifier": {
            "PURL": "pkg:npm/ws@8.18.3",
            "UID": "7e4e099189688a2a",
            "BOMRef": "pkg:npm/ws@8.18.3"
          },
          "Version": "8.18.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "jsdom@22.1.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "xml-name-validator@4.0.0",
          "Name": "xml-name-validator",
          "Identifier": {
            "PURL": "pkg:npm/xml-name-validator@4.0.0",
            "UID": "f1952806a998b484",
            "BOMRef": "pkg:npm/xml-name-validator@4.0.0"
          },
          "Version": "4.0.0",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "jsdom@22.1.0",
            "w3c-xmlserializer@4.0.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "xmlchars@2.2.0",
          "Name": "xmlchars",
          "Identifier": {
            "PURL": "pkg:npm/xmlchars@2.2.0",
            "UID": "6edbe4b7899572b3",
            "BOMRef": "pkg:npm/xmlchars@2.2.0"
          },
          "Version": "2.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "saxes@6.0.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "yallist@3.1.1",
          "Name": "yallist",
          "Identifier": {
            "PURL": "pkg:npm/yallist@3.1.1",
            "UID": "dfbe431931df92b6",
            "BOMRef": "pkg:npm/yallist@3.1.1"
          },
          "Version": "3.1.1",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "lru-cache@5.1.1"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "yallist@5.0.0",
          "Name": "yallist",
          "Identifier": {
            "PURL": "pkg:npm/yallist@5.0.0",
            "UID": "52719f60487274f7",
            "BOMRef": "pkg:npm/yallist@5.0.0"
          },
          "Version": "5.0.0",
          "Licenses": [
            "BlueOak-1.0.0"
          ],
          "DependsOn": [
            "tar@7.4.3"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "yaml@1.10.2",
          "Name": "yaml",
          "Identifier": {
            "PURL": "pkg:npm/yaml@1.10.2",
            "UID": "b908ae1e4e39e8d",
            "BOMRef": "pkg:npm/yaml@1.10.2"
          },
          "Version": "1.10.2",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "cosmiconfig@7.1.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "yocto-queue@0.1.0",
          "Name": "yocto-queue",
          "Identifier": {
            "PURL": "pkg:npm/yocto-queue@0.1.0",
            "UID": "9fc155afd8eb689d",
            "BOMRef": "pkg:npm/yocto-queue@0.1.0"
          },
          "Version": "0.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "p-limit@3.1.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "zustand@4.5.7",
          "Name": "zustand",
          "Identifier": {
            "PURL": "pkg:npm/zustand@4.5.7",
            "UID": "ef4044c1a1460f99",
            "BOMRef": "pkg:npm/zustand@4.5.7"
          },
          "Version": "4.5.7",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@textea/json-viewer@2.17.2"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        },
        {
          "ID": "zwitch@2.0.4",
          "Name": "zwitch",
          "Identifier": {
            "PURL": "pkg:npm/zwitch@2.0.4",
            "UID": "1ee9e03984b7aa95",
            "BOMRef": "pkg:npm/zwitch@2.0.4"
          },
          "Version": "2.0.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "hast-util-to-estree@2.3.3",
            "mdast-util-to-markdown@1.5.0"
          ],
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          }
        }
      ],
      "Vulnerabilities": [
        {
          "VulnerabilityID": "CVE-2026-22029",
          "VendorIDs": [
            "GHSA-2w69-qvjg-hvjx"
          ],
          "PkgID": "@remix-run/router@1.23.0",
          "PkgName": "@remix-run/router",
          "PkgIdentifier": {
            "PURL": "pkg:npm/%40remix-run/router@1.23.0",
            "UID": "80b9490bce837fc0",
            "BOMRef": "pkg:npm/%40remix-run/router@1.23.0"
          },
          "InstalledVersion": "1.23.0",
          "FixedVersion": "1.23.2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-22029",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory npm",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Anpm"
          },
          "Fingerprint": "sha256:44a050cca15d427abe209d3516a947fd473f2e9fabfc9136b11cff0727cfc1cf",
          "Title": "@remix-run/router: react-router: React Router vulnerable to XSS via Open Redirects",
          "Description": "React Router is a router for React. In @remix-run/router version prior to 1.23.2. and react-router 7.0.0 through 7.11.0, React Router (and Remix v1/v2) SPA open navigation redirects originating from loaders or actions in Framework Mode, Data Mode, or the unstable RSC modes can result in unsafe URLs causing unintended javascript execution on the client. This is only an issue if you are creating redirect paths from untrusted content or via an open redirect. There is no impact if Declarative Mode (\u003cBrowserRouter\u003e) is being used. This issue has been patched in @remix-run/router version 1.23.2 and react-router version 7.12.0.",
          "Severity": "HIGH",
          "CweIDs": [
            "CWE-79"
          ],
          "VendorSeverity": {
            "ghsa": 3,
            "nvd": 2,
            "redhat": 3
          },
          "CVSS": {
            "ghsa": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N",
              "V3Score": 8
            },
            "nvd": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
              "V3Score": 6.1
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N",
              "V3Score": 8
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-22029",
            "https://github.com/remix-run/react-router",
            "https://github.com/remix-run/react-router/security/advisories/GHSA-2w69-qvjg-hvjx",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-22029",
            "https://www.cve.org/CVERecord?id=CVE-2026-22029"
          ],
          "PublishedDate": "2026-01-10T03:15:48.87Z",
          "LastModifiedDate": "2026-02-10T19:36:31.503Z"
        },
        {
          "VulnerabilityID": "CVE-2026-3449",
          "VendorIDs": [
            "GHSA-vpq2-c234-7xj6"
          ],
          "PkgID": "@tootallnate/once@2.0.0",
          "PkgName": "@tootallnate/once",
          "PkgIdentifier": {
            "PURL": "pkg:npm/%40tootallnate/once@2.0.0",
            "UID": "5e84319018d8010b",
            "BOMRef": "pkg:npm/%40tootallnate/once@2.0.0"
          },
          "InstalledVersion": "2.0.0",
          "FixedVersion": "3.0.1",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-3449",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory npm",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Anpm"
          },
          "Fingerprint": "sha256:acab8c27ffa57c57a47500de1dd2599d4df4b543f4271f9225e132d6d7366a13",
          "Title": "@tootallnate/once: @tootallnate/once: Denial of Service due to incorrect control flow scoping with AbortSignal",
          "Description": "Versions of the package @tootallnate/once before 3.0.1 are vulnerable to Incorrect Control Flow Scoping in promise resolving when AbortSignal option is used. The Promise remains in a permanently pending state after the signal is aborted, causing any await or .then() usage to hang indefinitely. This can cause a control-flow leak that can lead to stalled requests, blocked workers, or degraded application availability.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-705"
          ],
          "VendorSeverity": {
            "ghsa": 1,
            "redhat": 2
          },
          "CVSS": {
            "ghsa": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
              "V40Vector": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P",
              "V3Score": 3.3,
              "V40Score": 1.9
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
              "V3Score": 4
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-3449",
            "https://github.com/TooTallNate/once",
            "https://github.com/TooTallNate/once/commit/b9f43cc5259bee2952d91ad3cdbd201a82df448a",
            "https://github.com/TooTallNate/once/issues/8",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-3449",
            "https://security.snyk.io/vuln/SNYK-JS-TOOTALLNATEONCE-15250612",
            "https://www.cve.org/CVERecord?id=CVE-2026-3449"
          ],
          "PublishedDate": "2026-03-03T05:17:25.017Z",
          "LastModifiedDate": "2026-03-03T21:52:29.877Z"
        },
        {
          "VulnerabilityID": "CVE-2025-69873",
          "VendorIDs": [
            "GHSA-2g4f-4pwh-qvx6"
          ],
          "PkgID": "ajv@6.12.6",
          "PkgName": "ajv",
          "PkgIdentifier": {
            "PURL": "pkg:npm/ajv@6.12.6",
            "UID": "27fdece1644204cc",
            "BOMRef": "pkg:npm/ajv@6.12.6"
          },
          "InstalledVersion": "6.12.6",
          "FixedVersion": "8.18.0, 6.14.0",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-69873",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory npm",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Anpm"
          },
          "Fingerprint": "sha256:e60019248483252c8fa38c4e881c8fef790df69427334906b2a7ffcd67000d8c",
          "Title": "ajv: ReDoS via $data reference",
          "Description": "ajv (Another JSON Schema Validator) before 8.18.0 is vulnerable to Regular Expression Denial of Service (ReDoS) when the $data option is enabled. The pattern keyword accepts runtime data via JSON Pointer syntax ($data reference), which is passed directly to the JavaScript RegExp() constructor without validation. An attacker can inject a malicious regex pattern (e.g., \"^(a|a)*$\") combined with crafted input to cause catastrophic backtracking. A 31-character payload causes approximately 44 seconds of CPU blocking, with each additional character doubling execution time. This enables complete denial of service with a single HTTP request against any API using ajv with $data: true for dynamic schema validation. This issue is also fixed in version 6.14.0.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-1333",
            "CWE-400"
          ],
          "VendorSeverity": {
            "ghsa": 2,
            "redhat": 3
          },
          "CVSS": {
            "ghsa": {
              "V40Vector": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P",
              "V40Score": 5.5
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 7.5
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2025-69873",
            "https://github.com/EthanKim88/ethan-cve-disclosures/blob/main/CVE-2025-69873-ajv-ReDoS.md",
            "https://github.com/advisories/GHSA-2g4f-4pwh-qvx6",
            "https://github.com/ajv-validator/ajv",
            "https://github.com/ajv-validator/ajv/commit/720a23fa453ffae8340e92c9b0fe886c54cfe0d5",
            "https://github.com/ajv-validator/ajv/pull/2586",
            "https://github.com/ajv-validator/ajv/pull/2588",
            "https://github.com/ajv-validator/ajv/pull/2590",
            "https://github.com/ajv-validator/ajv/releases/tag/v6.14.0",
            "https://github.com/ajv-validator/ajv/releases/tag/v8.18.0",
            "https://github.com/github/advisory-database/pull/6991",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-69873",
            "https://www.cve.org/CVERecord?id=CVE-2025-69873"
          ],
          "PublishedDate": "2026-02-11T19:15:50.467Z",
          "LastModifiedDate": "2026-03-02T21:16:24.213Z"
        },
        {
          "VulnerabilityID": "CVE-2026-25639",
          "VendorIDs": [
            "GHSA-43fc-jf86-j433"
          ],
          "PkgID": "axios@1.12.2",
          "PkgName": "axios",
          "PkgIdentifier": {
            "PURL": "pkg:npm/axios@1.12.2",
            "UID": "30bfb376cd531fb5",
            "BOMRef": "pkg:npm/axios@1.12.2"
          },
          "InstalledVersion": "1.12.2",
          "FixedVersion": "1.13.5, 0.30.3",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-25639",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory npm",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Anpm"
          },
          "Fingerprint": "sha256:185e4eadca40af1c96a07633e1714bdfd539d15e22be656cee267d012e0b11e1",
          "Title": "axios: Axios affected by Denial of Service via __proto__ Key in mergeConfig",
          "Description": "Axios is a promise based HTTP client for the browser and Node.js. Prior to versions 0.30.3 and 1.13.5, the mergeConfig function in axios crashes with a TypeError when processing configuration objects containing __proto__ as an own property. An attacker can trigger this by providing a malicious configuration object created via JSON.parse(), causing complete denial of service. This vulnerability is fixed in versions 0.30.3 and 1.13.5.",
          "Severity": "HIGH",
          "CweIDs": [
            "CWE-754"
          ],
          "VendorSeverity": {
            "ghsa": 3,
            "redhat": 3
          },
          "CVSS": {
            "ghsa": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 7.5
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 7.5
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-25639",
            "https://github.com/axios/axios",
            "https://github.com/axios/axios/commit/28c721588c7a77e7503d0a434e016f852c597b57",
            "https://github.com/axios/axios/commit/d7ff1409c68168d3057fc3891f911b2b92616f9e",
            "https://github.com/axios/axios/pull/7369",
            "https://github.com/axios/axios/pull/7388",
            "https://github.com/axios/axios/releases/tag/v0.30.3",
            "https://github.com/axios/axios/releases/tag/v1.13.5",
            "https://github.com/axios/axios/security/advisories/GHSA-43fc-jf86-j433",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-25639",
            "https://www.cve.org/CVERecord?id=CVE-2026-25639"
          ],
          "PublishedDate": "2026-02-09T21:15:49.01Z",
          "LastModifiedDate": "2026-02-18T18:24:34.12Z"
        },
        {
          "VulnerabilityID": "CVE-2026-33750",
          "VendorIDs": [
            "GHSA-f886-m6hf-6m8v"
          ],
          "PkgID": "brace-expansion@1.1.12",
          "PkgName": "brace-expansion",
          "PkgIdentifier": {
            "PURL": "pkg:npm/brace-expansion@1.1.12",
            "UID": "5393bada3cbc98c5",
            "BOMRef": "pkg:npm/brace-expansion@1.1.12"
          },
          "InstalledVersion": "1.1.12",
          "FixedVersion": "5.0.5, 3.0.2, 2.0.3, 1.1.13",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-33750",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory npm",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Anpm"
          },
          "Fingerprint": "sha256:394a3896a15db60c16b500cd0496318a9d7e9483acbff1c2c70676117951d5e8",
          "Title": "brace-expansion: brace-expansion: Denial of Service via zero step value in brace pattern",
          "Description": "The brace-expansion library generates arbitrary strings containing a common prefix and suffix. Prior to versions 5.0.5, 3.0.2, 2.0.3, and 1.1.13, a brace pattern with a zero step value (e.g., `{1..2..0}`) causes the sequence generation loop to run indefinitely, making the process hang for seconds and allocate heaps of memory. Versions 5.0.5, 3.0.2, 2.0.3, and 1.1.13 fix the issue. As a workaround, sanitize strings passed to `expand()` to ensure a step value of `0` is not used.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-400"
          ],
          "VendorSeverity": {
            "ghsa": 2,
            "redhat": 2
          },
          "CVSS": {
            "ghsa": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
              "V3Score": 6.5
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
              "V3Score": 6.5
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-33750",
            "https://github.com/juliangruber/brace-expansion",
            "https://github.com/juliangruber/brace-expansion/blob/daa71bcb4a30a2df9bcb7f7b8daaf2ab30e5794a/src/index.ts#L107-L113",
            "https://github.com/juliangruber/brace-expansion/blob/daa71bcb4a30a2df9bcb7f7b8daaf2ab30e5794a/src/index.ts#L184",
            "https://github.com/juliangruber/brace-expansion/commit/311ac0d54994158c0a384e286a7d6cbb17ee8ed5",
            "https://github.com/juliangruber/brace-expansion/commit/7fd684f89fdde3549563d0a6522226a9189472a2",
            "https://github.com/juliangruber/brace-expansion/commit/b9cacd9e55e7a1fa588fe4b7bb1159d52f1d902a",
            "https://github.com/juliangruber/brace-expansion/issues/98",
            "https://github.com/juliangruber/brace-expansion/pull/95",
            "https://github.com/juliangruber/brace-expansion/pull/96",
            "https://github.com/juliangruber/brace-expansion/pull/97",
            "https://github.com/juliangruber/brace-expansion/security/advisories/GHSA-f886-m6hf-6m8v",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-33750",
            "https://www.cve.org/CVERecord?id=CVE-2026-33750"
          ],
          "PublishedDate": "2026-03-27T15:16:57.297Z",
          "LastModifiedDate": "2026-03-30T13:26:29.793Z"
        },
        {
          "VulnerabilityID": "CVE-2026-24001",
          "VendorIDs": [
            "GHSA-73rr-hh4g-fpgx"
          ],
          "PkgID": "diff@5.2.0",
          "PkgName": "diff",
          "PkgIdentifier": {
            "PURL": "pkg:npm/diff@5.2.0",
            "UID": "51a3f574f7f8086a",
            "BOMRef": "pkg:npm/diff@5.2.0"
          },
          "InstalledVersion": "5.2.0",
          "FixedVersion": "8.0.3, 5.2.2, 4.0.4, 3.5.1",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-24001",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory npm",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Anpm"
          },
          "Fingerprint": "sha256:0577606435d7fe1ef946c676fbe82c462ebb59d485a16daa96f31bb1a3b5f981",
          "Title": "jsdiff: denial of service vulnerability in parsePatch and applyPatch",
          "Description": "jsdiff is a JavaScript text differencing implementation. Prior to versions 8.0.3, 5.2.2, 4.0.4, and 3.5.1, attempting to parse a patch whose filename headers contain the line break characters `\\r`, `\\u2028`, or `\\u2029` can cause the `parsePatch` method to enter an infinite loop. It then consumes memory without limit until the process crashes due to running out of memory. Applications are therefore likely to be vulnerable to a denial-of-service attack if they call `parsePatch` with a user-provided patch as input. A large payload is not needed to trigger the vulnerability, so size limits on user input do not provide any protection. Furthermore, some applications may be vulnerable even when calling `parsePatch` on a patch generated by the application itself if the user is nonetheless able to control the filename headers (e.g. by directly providing the filenames of the files to be diffed). The `applyPatch` method is similarly affected if (and only if) called with a string representation of a patch as an argument, since under the hood it parses that string using `parsePatch`. Other methods of the library are unaffected. Finally, a second and lesser interdependent bug - a ReDOS - also exhibits when those same line break characters are present in a patch's *patch* header (also known as its \"leading garbage\"). A maliciously-crafted patch header of length *n* can take `parsePatch` O(*n*³) time to parse. Versions 8.0.3, 5.2.2, 4.0.4, and 3.5.1 contain a fix. As a workaround, do not attempt to parse patches that contain any of these characters: `\\r`, `\\u2028`, or `\\u2029`.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-400",
            "CWE-1333"
          ],
          "VendorSeverity": {
            "ghsa": 1,
            "nvd": 3,
            "redhat": 3
          },
          "CVSS": {
            "ghsa": {
              "V40Vector": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U",
              "V40Score": 2.7
            },
            "nvd": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 7.5
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 7.5
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-24001",
            "https://github.com/kpdecker/jsdiff",
            "https://github.com/kpdecker/jsdiff/commit/15a1585230748c8ae6f8274c202e0c87309142f5",
            "https://github.com/kpdecker/jsdiff/issues/653",
            "https://github.com/kpdecker/jsdiff/pull/649",
            "https://github.com/kpdecker/jsdiff/security/advisories/GHSA-73rr-hh4g-fpgx",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-24001",
            "https://www.cve.org/CVERecord?id=CVE-2026-24001"
          ],
          "PublishedDate": "2026-01-22T03:15:47.627Z",
          "LastModifiedDate": "2026-03-04T15:23:41.347Z"
        },
        {
          "VulnerabilityID": "CVE-2026-32141",
          "VendorIDs": [
            "GHSA-25h7-pfq9-p65f"
          ],
          "PkgID": "flatted@3.3.3",
          "PkgName": "flatted",
          "PkgIdentifier": {
            "PURL": "pkg:npm/flatted@3.3.3",
            "UID": "d50eacf492693fa4",
            "BOMRef": "pkg:npm/flatted@3.3.3"
          },
          "InstalledVersion": "3.3.3",
          "FixedVersion": "3.4.0",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-32141",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory npm",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Anpm"
          },
          "Fingerprint": "sha256:62c3e12dd8e11bbdbf17ba7b5a7d0ce88525de9dada4c0116ce2c4f8e730299d",
          "Title": "flatted: flatted: Unbounded recursion DoS in parse() revive phase",
          "Description": "flatted is a circular JSON parser. Prior to 3.4.0, flatted's parse() function uses a recursive revive() phase to resolve circular references in deserialized JSON. When given a crafted payload with deeply nested or self-referential $ indices, the recursion depth is unbounded, causing a stack overflow that crashes the Node.js process. This vulnerability is fixed in 3.4.0.",
          "Severity": "HIGH",
          "CweIDs": [
            "CWE-674"
          ],
          "VendorSeverity": {
            "ghsa": 3,
            "redhat": 3
          },
          "CVSS": {
            "ghsa": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 7.5
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 7.5
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-32141",
            "https://github.com/WebReflection/flatted",
            "https://github.com/WebReflection/flatted/commit/7eb65d857e1a40de11c47461cdbc8541449f0606",
            "https://github.com/WebReflection/flatted/pull/88",
            "https://github.com/WebReflection/flatted/security/advisories/GHSA-25h7-pfq9-p65f",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-32141",
            "https://www.cve.org/CVERecord?id=CVE-2026-32141"
          ],
          "PublishedDate": "2026-03-12T18:16:25.837Z",
          "LastModifiedDate": "2026-03-19T21:07:24.717Z"
        },
        {
          "VulnerabilityID": "CVE-2026-33228",
          "VendorIDs": [
            "GHSA-rf6f-7fwh-wjgh"
          ],
          "PkgID": "flatted@3.3.3",
          "PkgName": "flatted",
          "PkgIdentifier": {
            "PURL": "pkg:npm/flatted@3.3.3",
            "UID": "d50eacf492693fa4",
            "BOMRef": "pkg:npm/flatted@3.3.3"
          },
          "InstalledVersion": "3.3.3",
          "FixedVersion": "3.4.2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-33228",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory npm",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Anpm"
          },
          "Fingerprint": "sha256:823d0d140d8b884463cc30117479f55fe870b31b07835a9a91af8262c70816d4",
          "Title": "flatted: Flatted: Prototype pollution vulnerability allows arbitrary code execution via crafted JSON.",
          "Description": "flatted is a circular JSON parser. Prior to version 3.4.2, the parse() function in flatted can use attacker-controlled string values from the parsed JSON as direct array index keys, without validating that they are numeric. Since the internal input buffer is a JavaScript Array, accessing it with the key \"__proto__\" returns Array.prototype via the inherited getter. This object is then treated as a legitimate parsed value and assigned as a property of the output object, effectively leaking a live reference to Array.prototype to the consumer. Any code that subsequently writes to that property will pollute the global prototype. This issue has been patched in version 3.4.2.",
          "Severity": "HIGH",
          "CweIDs": [
            "CWE-1321"
          ],
          "VendorSeverity": {
            "ghsa": 3,
            "nvd": 4,
            "redhat": 4
          },
          "CVSS": {
            "ghsa": {
              "V40Vector": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P",
              "V40Score": 8.9
            },
            "nvd": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
              "V3Score": 9.8
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
              "V3Score": 9.8
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-33228",
            "https://github.com/WebReflection/flatted",
            "https://github.com/WebReflection/flatted/commit/885ddcc33cf9657caf38c57c7be45ae1c5272802",
            "https://github.com/WebReflection/flatted/releases/tag/v3.4.2",
            "https://github.com/WebReflection/flatted/security/advisories/GHSA-rf6f-7fwh-wjgh",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-33228",
            "https://www.cve.org/CVERecord?id=CVE-2026-33228"
          ],
          "PublishedDate": "2026-03-20T23:16:46.51Z",
          "LastModifiedDate": "2026-03-23T19:14:31.04Z"
        },
        {
          "VulnerabilityID": "CVE-2026-4800",
          "VendorIDs": [
            "GHSA-r5fr-rjxr-66jc"
          ],
          "PkgID": "lodash@4.17.21",
          "PkgName": "lodash",
          "PkgIdentifier": {
            "PURL": "pkg:npm/lodash@4.17.21",
            "UID": "9e4ac386c9024f40",
            "BOMRef": "pkg:npm/lodash@4.17.21"
          },
          "InstalledVersion": "4.17.21",
          "FixedVersion": "4.18.0",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-4800",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory npm",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Anpm"
          },
          "Fingerprint": "sha256:76703af5c40ea26eb6a807312fa41989bfbf01a94ac661b1d38af00b97203bff",
          "Title": "lodash: lodash: Arbitrary code execution via untrusted input in template imports",
          "Description": "Impact:\n\nThe fix for CVE-2021-23337 (https://github.com/advisories/GHSA-35jh-r3h4-6jhm) added validation for the variable option in _.template but did not apply the same validation to options.imports key names. Both paths flow into the same Function() constructor sink.\n\nWhen an application passes untrusted input as options.imports key names, an attacker can inject default-parameter expressions that execute arbitrary code at template compilation time.\n\nAdditionally, _.template uses assignInWith to merge imports, which enumerates inherited properties via for..in. If Object.prototype has been polluted by any other vector, the polluted keys are copied into the imports object and passed to Function().\n\nPatches:\n\nUsers should upgrade to version 4.18.0.\n\nWorkarounds:\n\nDo not pass untrusted input as key names in options.imports. Only use developer-controlled, static key names.",
          "Severity": "HIGH",
          "CweIDs": [
            "CWE-94"
          ],
          "VendorSeverity": {
            "ghsa": 3,
            "redhat": 3
          },
          "CVSS": {
            "ghsa": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
              "V3Score": 8.1
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
              "V3Score": 8.1
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-4800",
            "https://cna.openjsf.org/security-advisories.html",
            "https://github.com/advisories/GHSA-35jh-r3h4-6jhm",
            "https://github.com/lodash/lodash",
            "https://github.com/lodash/lodash/commit/3469357cff396a26c363f8c1b5a91dde28ba4b1c",
            "https://github.com/lodash/lodash/security/advisories/GHSA-r5fr-rjxr-66jc",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-4800",
            "https://www.cve.org/CVERecord?id=CVE-2026-4800"
          ],
          "PublishedDate": "2026-03-31T20:16:29.66Z",
          "LastModifiedDate": "2026-04-01T14:23:37.727Z"
        },
        {
          "VulnerabilityID": "CVE-2025-13465",
          "VendorIDs": [
            "GHSA-xxjr-mmjv-4gpg"
          ],
          "PkgID": "lodash@4.17.21",
          "PkgName": "lodash",
          "PkgIdentifier": {
            "PURL": "pkg:npm/lodash@4.17.21",
            "UID": "9e4ac386c9024f40",
            "BOMRef": "pkg:npm/lodash@4.17.21"
          },
          "InstalledVersion": "4.17.21",
          "FixedVersion": "4.17.23",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-13465",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory npm",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Anpm"
          },
          "Fingerprint": "sha256:ad15e270fc40b402e03c1888c2eb0a67e44dab4d4e014f6718c386cfb98744a8",
          "Title": "lodash: prototype pollution in _.unset and _.omit functions",
          "Description": "Lodash versions 4.0.0 through 4.17.22 are vulnerable to prototype pollution in the _.unset and _.omit functions. An attacker can pass crafted paths which cause Lodash to delete methods from global prototypes.\n\nThe issue permits deletion of properties but does not allow overwriting their original behavior.\n\nThis issue is patched on 4.17.23",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-1321"
          ],
          "VendorSeverity": {
            "alma": 3,
            "ghsa": 2,
            "nvd": 2,
            "oracle-oval": 3,
            "redhat": 3
          },
          "CVSS": {
            "ghsa": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
              "V40Vector": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:H/SI:H/SA:H/E:P",
              "V3Score": 6.5,
              "V40Score": 6.9
            },
            "nvd": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
              "V3Score": 5.3
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
              "V3Score": 8.2
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:2452",
            "https://access.redhat.com/security/cve/CVE-2025-13465",
            "https://bugzilla.redhat.com/2431740",
            "https://errata.almalinux.org/9/ALSA-2026-2452.html",
            "https://github.com/lodash/lodash",
            "https://github.com/lodash/lodash/commit/edadd452146f7e4bad4ea684e955708931d84d81",
            "https://github.com/lodash/lodash/security/advisories/GHSA-xxjr-mmjv-4gpg",
            "https://linux.oracle.com/cve/CVE-2025-13465.html",
            "https://linux.oracle.com/errata/ELSA-2026-2452.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-13465",
            "https://www.cve.org/CVERecord?id=CVE-2025-13465"
          ],
          "PublishedDate": "2026-01-21T20:16:05.25Z",
          "LastModifiedDate": "2026-02-17T17:10:07.52Z"
        },
        {
          "VulnerabilityID": "CVE-2026-2950",
          "VendorIDs": [
            "GHSA-f23m-r3pf-42rh"
          ],
          "PkgID": "lodash@4.17.21",
          "PkgName": "lodash",
          "PkgIdentifier": {
            "PURL": "pkg:npm/lodash@4.17.21",
            "UID": "9e4ac386c9024f40",
            "BOMRef": "pkg:npm/lodash@4.17.21"
          },
          "InstalledVersion": "4.17.21",
          "FixedVersion": "4.18.0",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-2950",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory npm",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Anpm"
          },
          "Fingerprint": "sha256:a5faf7fc43c1ae4c271c49693e56e6b40902104b09133773535b249fb8e9bad7",
          "Title": "Impact:  Lodash versions 4.17.23 and earlier are vulnerable to prototy ...",
          "Description": "Impact:\n\nLodash versions 4.17.23 and earlier are vulnerable to prototype pollution in the _.unset and _.omit functions. The fix for (CVE-2025-13465: https://github.com/lodash/lodash/security/advisories/GHSA-xxjr-mmjv-4gpg) only guards against string key members, so an attacker can bypass the check by passing array-wrapped path segments. This allows deletion of properties from built-in prototypes such as Object.prototype, Number.prototype, and String.prototype.\n\nThe issue permits deletion of prototype properties but does not allow overwriting their original behavior.\n\nPatches:\n\nThis issue is patched in 4.18.0.\n\nWorkarounds:\n\nNone. Upgrade to the patched version.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-1321"
          ],
          "VendorSeverity": {
            "ghsa": 2
          },
          "CVSS": {
            "ghsa": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
              "V3Score": 6.5
            }
          },
          "References": [
            "https://github.com/lodash/lodash",
            "https://github.com/lodash/lodash/security/advisories/GHSA-f23m-r3pf-42rh",
            "https://github.com/lodash/lodash/security/advisories/GHSA-xxjr-mmjv-4gpg",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-2950"
          ],
          "PublishedDate": "2026-03-31T20:16:26.207Z",
          "LastModifiedDate": "2026-04-01T14:23:37.727Z"
        },
        {
          "VulnerabilityID": "CVE-2026-4800",
          "VendorIDs": [
            "GHSA-r5fr-rjxr-66jc"
          ],
          "PkgID": "lodash-es@4.17.21",
          "PkgName": "lodash-es",
          "PkgIdentifier": {
            "PURL": "pkg:npm/lodash-es@4.17.21",
            "UID": "6805d13322959770",
            "BOMRef": "pkg:npm/lodash-es@4.17.21"
          },
          "InstalledVersion": "4.17.21",
          "FixedVersion": "4.18.0",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-4800",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory npm",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Anpm"
          },
          "Fingerprint": "sha256:623635b41681043e00bcfb4205f2eebc762ee4bdcfd67e9875bea8dd3ae82296",
          "Title": "lodash: lodash: Arbitrary code execution via untrusted input in template imports",
          "Description": "Impact:\n\nThe fix for CVE-2021-23337 (https://github.com/advisories/GHSA-35jh-r3h4-6jhm) added validation for the variable option in _.template but did not apply the same validation to options.imports key names. Both paths flow into the same Function() constructor sink.\n\nWhen an application passes untrusted input as options.imports key names, an attacker can inject default-parameter expressions that execute arbitrary code at template compilation time.\n\nAdditionally, _.template uses assignInWith to merge imports, which enumerates inherited properties via for..in. If Object.prototype has been polluted by any other vector, the polluted keys are copied into the imports object and passed to Function().\n\nPatches:\n\nUsers should upgrade to version 4.18.0.\n\nWorkarounds:\n\nDo not pass untrusted input as key names in options.imports. Only use developer-controlled, static key names.",
          "Severity": "HIGH",
          "CweIDs": [
            "CWE-94"
          ],
          "VendorSeverity": {
            "ghsa": 3,
            "redhat": 3
          },
          "CVSS": {
            "ghsa": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
              "V3Score": 8.1
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
              "V3Score": 8.1
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-4800",
            "https://cna.openjsf.org/security-advisories.html",
            "https://github.com/advisories/GHSA-35jh-r3h4-6jhm",
            "https://github.com/lodash/lodash",
            "https://github.com/lodash/lodash/commit/3469357cff396a26c363f8c1b5a91dde28ba4b1c",
            "https://github.com/lodash/lodash/security/advisories/GHSA-r5fr-rjxr-66jc",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-4800",
            "https://www.cve.org/CVERecord?id=CVE-2026-4800"
          ],
          "PublishedDate": "2026-03-31T20:16:29.66Z",
          "LastModifiedDate": "2026-04-01T14:23:37.727Z"
        },
        {
          "VulnerabilityID": "CVE-2025-13465",
          "VendorIDs": [
            "GHSA-xxjr-mmjv-4gpg"
          ],
          "PkgID": "lodash-es@4.17.21",
          "PkgName": "lodash-es",
          "PkgIdentifier": {
            "PURL": "pkg:npm/lodash-es@4.17.21",
            "UID": "6805d13322959770",
            "BOMRef": "pkg:npm/lodash-es@4.17.21"
          },
          "InstalledVersion": "4.17.21",
          "FixedVersion": "4.17.23",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-13465",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory npm",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Anpm"
          },
          "Fingerprint": "sha256:c346f338e703f2e58c3776398600f6fc207276fde19b4303cddd4b6498982a3d",
          "Title": "lodash: prototype pollution in _.unset and _.omit functions",
          "Description": "Lodash versions 4.0.0 through 4.17.22 are vulnerable to prototype pollution in the _.unset and _.omit functions. An attacker can pass crafted paths which cause Lodash to delete methods from global prototypes.\n\nThe issue permits deletion of properties but does not allow overwriting their original behavior.\n\nThis issue is patched on 4.17.23",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-1321"
          ],
          "VendorSeverity": {
            "alma": 3,
            "ghsa": 2,
            "nvd": 2,
            "oracle-oval": 3,
            "redhat": 3
          },
          "CVSS": {
            "ghsa": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
              "V40Vector": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:H/SI:H/SA:H/E:P",
              "V3Score": 6.5,
              "V40Score": 6.9
            },
            "nvd": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
              "V3Score": 5.3
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
              "V3Score": 8.2
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:2452",
            "https://access.redhat.com/security/cve/CVE-2025-13465",
            "https://bugzilla.redhat.com/2431740",
            "https://errata.almalinux.org/9/ALSA-2026-2452.html",
            "https://github.com/lodash/lodash",
            "https://github.com/lodash/lodash/commit/edadd452146f7e4bad4ea684e955708931d84d81",
            "https://github.com/lodash/lodash/security/advisories/GHSA-xxjr-mmjv-4gpg",
            "https://linux.oracle.com/cve/CVE-2025-13465.html",
            "https://linux.oracle.com/errata/ELSA-2026-2452.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-13465",
            "https://www.cve.org/CVERecord?id=CVE-2025-13465"
          ],
          "PublishedDate": "2026-01-21T20:16:05.25Z",
          "LastModifiedDate": "2026-02-17T17:10:07.52Z"
        },
        {
          "VulnerabilityID": "CVE-2026-2950",
          "VendorIDs": [
            "GHSA-f23m-r3pf-42rh"
          ],
          "PkgID": "lodash-es@4.17.21",
          "PkgName": "lodash-es",
          "PkgIdentifier": {
            "PURL": "pkg:npm/lodash-es@4.17.21",
            "UID": "6805d13322959770",
            "BOMRef": "pkg:npm/lodash-es@4.17.21"
          },
          "InstalledVersion": "4.17.21",
          "FixedVersion": "4.18.0",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-2950",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory npm",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Anpm"
          },
          "Fingerprint": "sha256:f4a9ec48ff3220094ce55ab67993f7215e46fde18298567b094eae37dd81b608",
          "Title": "Impact:  Lodash versions 4.17.23 and earlier are vulnerable to prototy ...",
          "Description": "Impact:\n\nLodash versions 4.17.23 and earlier are vulnerable to prototype pollution in the _.unset and _.omit functions. The fix for (CVE-2025-13465: https://github.com/lodash/lodash/security/advisories/GHSA-xxjr-mmjv-4gpg) only guards against string key members, so an attacker can bypass the check by passing array-wrapped path segments. This allows deletion of properties from built-in prototypes such as Object.prototype, Number.prototype, and String.prototype.\n\nThe issue permits deletion of prototype properties but does not allow overwriting their original behavior.\n\nPatches:\n\nThis issue is patched in 4.18.0.\n\nWorkarounds:\n\nNone. Upgrade to the patched version.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-1321"
          ],
          "VendorSeverity": {
            "ghsa": 2
          },
          "CVSS": {
            "ghsa": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
              "V3Score": 6.5
            }
          },
          "References": [
            "https://github.com/lodash/lodash",
            "https://github.com/lodash/lodash/security/advisories/GHSA-f23m-r3pf-42rh",
            "https://github.com/lodash/lodash/security/advisories/GHSA-xxjr-mmjv-4gpg",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-2950"
          ],
          "PublishedDate": "2026-03-31T20:16:26.207Z",
          "LastModifiedDate": "2026-04-01T14:23:37.727Z"
        },
        {
          "VulnerabilityID": "CVE-2026-26996",
          "VendorIDs": [
            "GHSA-3ppc-4f35-3m26"
          ],
          "PkgID": "minimatch@3.1.2",
          "PkgName": "minimatch",
          "PkgIdentifier": {
            "PURL": "pkg:npm/minimatch@3.1.2",
            "UID": "ef0346a328d7e8a1",
            "BOMRef": "pkg:npm/minimatch@3.1.2"
          },
          "InstalledVersion": "3.1.2",
          "FixedVersion": "10.2.1, 9.0.6, 8.0.5, 7.4.7, 6.2.1, 5.1.7, 4.2.4, 3.1.3",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-26996",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory npm",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Anpm"
          },
          "Fingerprint": "sha256:f6d0828911f78c6328a53b27b810bcbcbb78dadf0d4842cc827bcf1bdf1202af",
          "Title": "minimatch: minimatch: Denial of Service via specially crafted glob patterns",
          "Description": "minimatch is a minimal matching utility for converting glob expressions into JavaScript RegExp objects. Versions 10.2.0 and below are vulnerable to Regular Expression Denial of Service (ReDoS) when a glob pattern contains many consecutive * wildcards followed by a literal character that doesn't appear in the test string. Each * compiles to a separate [^/]*? regex group, and when the match fails, V8's regex engine backtracks exponentially across all possible splits. The time complexity is O(4^N) where N is the number of * characters. With N=15, a single minimatch() call takes ~2 seconds. With N=34, it hangs effectively forever. Any application that passes user-controlled strings to minimatch() as the pattern argument is vulnerable to DoS. This issue has been fixed in version 10.2.1.",
          "Severity": "HIGH",
          "CweIDs": [
            "CWE-1333"
          ],
          "VendorSeverity": {
            "ghsa": 3,
            "nvd": 3,
            "redhat": 2
          },
          "CVSS": {
            "ghsa": {
              "V40Vector": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
              "V40Score": 8.7
            },
            "nvd": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 7.5
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
              "V3Score": 6.5
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-26996",
            "https://github.com/isaacs/minimatch",
            "https://github.com/isaacs/minimatch/commit/2e111f3a79abc00fa73110195de2c0f2351904f5",
            "https://github.com/isaacs/minimatch/security/advisories/GHSA-3ppc-4f35-3m26",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-26996",
            "https://www.cve.org/CVERecord?id=CVE-2026-26996"
          ],
          "PublishedDate": "2026-02-20T03:16:01.62Z",
          "LastModifiedDate": "2026-03-06T21:32:10.65Z"
        },
        {
          "VulnerabilityID": "CVE-2026-27903",
          "VendorIDs": [
            "GHSA-7r86-cg39-jmmj"
          ],
          "PkgID": "minimatch@3.1.2",
          "PkgName": "minimatch",
          "PkgIdentifier": {
            "PURL": "pkg:npm/minimatch@3.1.2",
            "UID": "ef0346a328d7e8a1",
            "BOMRef": "pkg:npm/minimatch@3.1.2"
          },
          "InstalledVersion": "3.1.2",
          "FixedVersion": "10.2.3, 9.0.7, 8.0.6, 7.4.8, 6.2.2, 5.1.8, 4.2.5, 3.1.3",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-27903",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory npm",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Anpm"
          },
          "Fingerprint": "sha256:9cb4fe9ed317eb6e07b3184ecbc32e154ebc08a5a24460170fcfdf6627a7d9de",
          "Title": "minimatch: minimatch: Denial of Service due to unbounded recursive backtracking via crafted glob patterns",
          "Description": "minimatch is a minimal matching utility for converting glob expressions into JavaScript RegExp objects. Prior to version 10.2.3, 9.0.7, 8.0.6, 7.4.8, 6.2.2, 5.1.8, 4.2.5, and 3.1.3, `matchOne()` performs unbounded recursive backtracking when a glob pattern contains multiple non-adjacent `**` (GLOBSTAR) segments and the input path does not match. The time complexity is O(C(n, k)) -- binomial -- where `n` is the number of path segments and `k` is the number of globstars. With k=11 and n=30, a call to the default `minimatch()` API stalls for roughly 5 seconds. With k=13, it exceeds 15 seconds. No memoization or call budget exists to bound this behavior. Any application where an attacker can influence the glob pattern passed to `minimatch()` is vulnerable. The realistic attack surface includes build tools and task runners that accept user-supplied glob arguments (ESLint, Webpack, Rollup config), multi-tenant systems where one tenant configures glob-based rules that run in a shared process, admin or developer interfaces that accept ignore-rule or filter configuration as globs, and CI/CD pipelines that evaluate user-submitted config files containing glob patterns. An attacker who can place a crafted pattern into any of these paths can stall the Node.js event loop for tens of seconds per invocation. The pattern is 56 bytes for a 5-second stall and does not require authentication in contexts where pattern input is part of the feature. Versions 10.2.3, 9.0.7, 8.0.6, 7.4.8, 6.2.2, 5.1.8, 4.2.5, and 3.1.3 fix the issue.",
          "Severity": "HIGH",
          "CweIDs": [
            "CWE-407"
          ],
          "VendorSeverity": {
            "ghsa": 3,
            "redhat": 2
          },
          "CVSS": {
            "ghsa": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 7.5
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 5.9
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-27903",
            "https://github.com/isaacs/minimatch",
            "https://github.com/isaacs/minimatch/commit/0bf499aa45f5059b56809cc3b75ff3eafeb8d748",
            "https://github.com/isaacs/minimatch/security/advisories/GHSA-7r86-cg39-jmmj",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-27903",
            "https://www.cve.org/CVERecord?id=CVE-2026-27903"
          ],
          "PublishedDate": "2026-02-26T02:16:21.353Z",
          "LastModifiedDate": "2026-02-27T17:21:22.37Z"
        },
        {
          "VulnerabilityID": "CVE-2026-27904",
          "VendorIDs": [
            "GHSA-23c5-xmqv-rm74"
          ],
          "PkgID": "minimatch@3.1.2",
          "PkgName": "minimatch",
          "PkgIdentifier": {
            "PURL": "pkg:npm/minimatch@3.1.2",
            "UID": "ef0346a328d7e8a1",
            "BOMRef": "pkg:npm/minimatch@3.1.2"
          },
          "InstalledVersion": "3.1.2",
          "FixedVersion": "10.2.3, 9.0.7, 8.0.6, 7.4.8, 6.2.2, 5.1.8, 4.2.5, 3.1.4",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-27904",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory npm",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Anpm"
          },
          "Fingerprint": "sha256:414cb9f02fe18fb23936419fb2e181eb42da3da0f291f016a97056426d32538d",
          "Title": "minimatch: Minimatch: Denial of Service via catastrophic backtracking in glob expressions",
          "Description": "minimatch is a minimal matching utility for converting glob expressions into JavaScript RegExp objects. Prior to version 10.2.3, 9.0.7, 8.0.6, 7.4.8, 6.2.2, 5.1.8, 4.2.5, and 3.1.4, nested `*()` extglobs produce regexps with nested unbounded quantifiers (e.g. `(?:(?:a|b)*)*`), which exhibit catastrophic backtracking in V8. With a 12-byte pattern `*(*(*(a|b)))` and an 18-byte non-matching input, `minimatch()` stalls for over 7 seconds. Adding a single nesting level or a few input characters pushes this to minutes. This is the most severe finding: it is triggered by the default `minimatch()` API with no special options, and the minimum viable pattern is only 12 bytes. The same issue affects `+()` extglobs equally. Versions 10.2.3, 9.0.7, 8.0.6, 7.4.8, 6.2.2, 5.1.8, 4.2.5, and 3.1.4 fix the issue.",
          "Severity": "HIGH",
          "CweIDs": [
            "CWE-1333"
          ],
          "VendorSeverity": {
            "ghsa": 3,
            "redhat": 2
          },
          "CVSS": {
            "ghsa": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 7.5
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
              "V3Score": 6.5
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-27904",
            "https://github.com/isaacs/minimatch",
            "https://github.com/isaacs/minimatch/commit/11d0df6165d15a955462316b26d52e5efae06fce",
            "https://github.com/isaacs/minimatch/security/advisories/GHSA-23c5-xmqv-rm74",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-27904",
            "https://www.cve.org/CVERecord?id=CVE-2026-27904"
          ],
          "PublishedDate": "2026-02-26T02:16:21.76Z",
          "LastModifiedDate": "2026-02-27T17:16:23.773Z"
        },
        {
          "VulnerabilityID": "CVE-2026-33671",
          "VendorIDs": [
            "GHSA-c2c7-rcm5-vvqj"
          ],
          "PkgID": "picomatch@2.3.1",
          "PkgName": "picomatch",
          "PkgIdentifier": {
            "PURL": "pkg:npm/picomatch@2.3.1",
            "UID": "bc937bfb45761554",
            "BOMRef": "fcb9d2e5-9fd4-4b6c-a7cc-66cb81f0c596"
          },
          "InstalledVersion": "2.3.1",
          "FixedVersion": "4.0.4, 3.0.2, 2.3.2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-33671",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory npm",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Anpm"
          },
          "Fingerprint": "sha256:5f32ca997dc089571229582624a2b4c035b1e8bfe8267e0ed2e966def3ec67d9",
          "Title": "picomatch: Picomatch: Regular Expression Denial of Service via crafted extglob patterns",
          "Description": "Picomatch is a glob matcher written JavaScript. Versions prior to 4.0.4, 3.0.2, and 2.3.2 are vulnerable to Regular Expression Denial of Service (ReDoS) when processing crafted extglob patterns. Certain patterns using extglob quantifiers such as `+()` and `*()`, especially when combined with overlapping alternatives or nested extglobs, are compiled into regular expressions that can exhibit catastrophic backtracking on non-matching input. Applications are impacted when they allow untrusted users to supply glob patterns that are passed to `picomatch` for compilation or matching. In those cases, an attacker can cause excessive CPU consumption and block the Node.js event loop, resulting in a denial of service. Applications that only use trusted, developer-controlled glob patterns are much less likely to be exposed in a security-relevant way. This issue is fixed in picomatch 4.0.4, 3.0.2 and 2.3.2. Users should upgrade to one of these versions or later, depending on their supported release line. If upgrading is not immediately possible, avoid passing untrusted glob patterns to `picomatch`. Possible mitigations include disabling extglob support for untrusted patterns by using `noextglob: true`, rejecting or sanitizing patterns containing nested extglobs or extglob quantifiers such as `+()` and `*()`, enforcing strict allowlists for accepted pattern syntax, running matching in an isolated worker or separate process with time and resource limits, and applying application-level request throttling and input validation for any endpoint that accepts glob patterns.",
          "Severity": "HIGH",
          "CweIDs": [
            "CWE-1333"
          ],
          "VendorSeverity": {
            "ghsa": 3,
            "redhat": 2
          },
          "CVSS": {
            "ghsa": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 7.5
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 6.5
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-33671",
            "https://github.com/micromatch/picomatch",
            "https://github.com/micromatch/picomatch/commit/5eceecd27543b8e056b9307d69e105ea03618a7d",
            "https://github.com/micromatch/picomatch/security/advisories/GHSA-c2c7-rcm5-vvqj",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-33671",
            "https://www.cve.org/CVERecord?id=CVE-2026-33671"
          ],
          "PublishedDate": "2026-03-26T22:16:30.21Z",
          "LastModifiedDate": "2026-04-01T13:45:11.687Z"
        },
        {
          "VulnerabilityID": "CVE-2026-33672",
          "VendorIDs": [
            "GHSA-3v7f-55p6-f55p"
          ],
          "PkgID": "picomatch@2.3.1",
          "PkgName": "picomatch",
          "PkgIdentifier": {
            "PURL": "pkg:npm/picomatch@2.3.1",
            "UID": "bc937bfb45761554",
            "BOMRef": "fcb9d2e5-9fd4-4b6c-a7cc-66cb81f0c596"
          },
          "InstalledVersion": "2.3.1",
          "FixedVersion": "4.0.4, 3.0.2, 2.3.2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-33672",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory npm",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Anpm"
          },
          "Fingerprint": "sha256:7de110acdc840aea538fe6155c80f530db0a1c9eb1e178236e2f172606c310b8",
          "Title": "picomatch: Picomatch: Data integrity compromised via method injection with crafted POSIX bracket expressions",
          "Description": "Picomatch is a glob matcher written JavaScript. Versions prior to 4.0.4, 3.0.2, and 2.3.2 are vulnerable to a method injection vulnerability affecting the `POSIX_REGEX_SOURCE` object. Because the object inherits from `Object.prototype`, specially crafted POSIX bracket expressions (e.g., `[[:constructor:]]`) can reference inherited method names. These methods are implicitly converted to strings and injected into the generated regular expression. This leads to incorrect glob matching behavior (integrity impact), where patterns may match unintended filenames. The issue does not enable remote code execution, but it can cause security-relevant logic errors in applications that rely on glob matching for filtering, validation, or access control. All users of affected `picomatch` versions that process untrusted or user-controlled glob patterns are potentially impacted. This issue is fixed in picomatch 4.0.4, 3.0.2 and 2.3.2. Users should upgrade to one of these versions or later, depending on their supported release line. If upgrading is not immediately possible, avoid passing untrusted glob patterns to picomatch. Possible mitigations include sanitizing or rejecting untrusted glob patterns, especially those containing POSIX character classes like `[[:...:]]`; avoiding the use of POSIX bracket expressions if user input is involved; and manually patching the library by modifying `POSIX_REGEX_SOURCE` to use a null prototype.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-1321"
          ],
          "VendorSeverity": {
            "ghsa": 2,
            "redhat": 2
          },
          "CVSS": {
            "ghsa": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
              "V3Score": 5.3
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
              "V3Score": 5.3
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-33672",
            "https://github.com/micromatch/picomatch",
            "https://github.com/micromatch/picomatch/commit/4516eb521f13a46b2fe1a1d2c9ef6b20ddc0e903",
            "https://github.com/micromatch/picomatch/security/advisories/GHSA-3v7f-55p6-f55p",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-33672",
            "https://www.cve.org/CVERecord?id=CVE-2026-33672"
          ],
          "PublishedDate": "2026-03-26T22:16:30.387Z",
          "LastModifiedDate": "2026-04-01T13:44:53.397Z"
        },
        {
          "VulnerabilityID": "CVE-2026-33671",
          "VendorIDs": [
            "GHSA-c2c7-rcm5-vvqj"
          ],
          "PkgID": "picomatch@4.0.2",
          "PkgName": "picomatch",
          "PkgIdentifier": {
            "PURL": "pkg:npm/picomatch@4.0.2",
            "UID": "c4aed859ace25c8d",
            "BOMRef": "pkg:npm/picomatch@4.0.2"
          },
          "InstalledVersion": "4.0.2",
          "FixedVersion": "4.0.4, 3.0.2, 2.3.2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-33671",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory npm",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Anpm"
          },
          "Fingerprint": "sha256:8b083fb1a0c84cf4604a0fd0758a1cd4815e276677288cc520e6ca9a10845fbe",
          "Title": "picomatch: Picomatch: Regular Expression Denial of Service via crafted extglob patterns",
          "Description": "Picomatch is a glob matcher written JavaScript. Versions prior to 4.0.4, 3.0.2, and 2.3.2 are vulnerable to Regular Expression Denial of Service (ReDoS) when processing crafted extglob patterns. Certain patterns using extglob quantifiers such as `+()` and `*()`, especially when combined with overlapping alternatives or nested extglobs, are compiled into regular expressions that can exhibit catastrophic backtracking on non-matching input. Applications are impacted when they allow untrusted users to supply glob patterns that are passed to `picomatch` for compilation or matching. In those cases, an attacker can cause excessive CPU consumption and block the Node.js event loop, resulting in a denial of service. Applications that only use trusted, developer-controlled glob patterns are much less likely to be exposed in a security-relevant way. This issue is fixed in picomatch 4.0.4, 3.0.2 and 2.3.2. Users should upgrade to one of these versions or later, depending on their supported release line. If upgrading is not immediately possible, avoid passing untrusted glob patterns to `picomatch`. Possible mitigations include disabling extglob support for untrusted patterns by using `noextglob: true`, rejecting or sanitizing patterns containing nested extglobs or extglob quantifiers such as `+()` and `*()`, enforcing strict allowlists for accepted pattern syntax, running matching in an isolated worker or separate process with time and resource limits, and applying application-level request throttling and input validation for any endpoint that accepts glob patterns.",
          "Severity": "HIGH",
          "CweIDs": [
            "CWE-1333"
          ],
          "VendorSeverity": {
            "ghsa": 3,
            "redhat": 2
          },
          "CVSS": {
            "ghsa": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 7.5
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 6.5
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-33671",
            "https://github.com/micromatch/picomatch",
            "https://github.com/micromatch/picomatch/commit/5eceecd27543b8e056b9307d69e105ea03618a7d",
            "https://github.com/micromatch/picomatch/security/advisories/GHSA-c2c7-rcm5-vvqj",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-33671",
            "https://www.cve.org/CVERecord?id=CVE-2026-33671"
          ],
          "PublishedDate": "2026-03-26T22:16:30.21Z",
          "LastModifiedDate": "2026-04-01T13:45:11.687Z"
        },
        {
          "VulnerabilityID": "CVE-2026-33672",
          "VendorIDs": [
            "GHSA-3v7f-55p6-f55p"
          ],
          "PkgID": "picomatch@4.0.2",
          "PkgName": "picomatch",
          "PkgIdentifier": {
            "PURL": "pkg:npm/picomatch@4.0.2",
            "UID": "c4aed859ace25c8d",
            "BOMRef": "pkg:npm/picomatch@4.0.2"
          },
          "InstalledVersion": "4.0.2",
          "FixedVersion": "4.0.4, 3.0.2, 2.3.2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-33672",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory npm",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Anpm"
          },
          "Fingerprint": "sha256:bfc39bce56c7be2c53abfbd483662a91e9f597802bda36194204fe465306a8ea",
          "Title": "picomatch: Picomatch: Data integrity compromised via method injection with crafted POSIX bracket expressions",
          "Description": "Picomatch is a glob matcher written JavaScript. Versions prior to 4.0.4, 3.0.2, and 2.3.2 are vulnerable to a method injection vulnerability affecting the `POSIX_REGEX_SOURCE` object. Because the object inherits from `Object.prototype`, specially crafted POSIX bracket expressions (e.g., `[[:constructor:]]`) can reference inherited method names. These methods are implicitly converted to strings and injected into the generated regular expression. This leads to incorrect glob matching behavior (integrity impact), where patterns may match unintended filenames. The issue does not enable remote code execution, but it can cause security-relevant logic errors in applications that rely on glob matching for filtering, validation, or access control. All users of affected `picomatch` versions that process untrusted or user-controlled glob patterns are potentially impacted. This issue is fixed in picomatch 4.0.4, 3.0.2 and 2.3.2. Users should upgrade to one of these versions or later, depending on their supported release line. If upgrading is not immediately possible, avoid passing untrusted glob patterns to picomatch. Possible mitigations include sanitizing or rejecting untrusted glob patterns, especially those containing POSIX character classes like `[[:...:]]`; avoiding the use of POSIX bracket expressions if user input is involved; and manually patching the library by modifying `POSIX_REGEX_SOURCE` to use a null prototype.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-1321"
          ],
          "VendorSeverity": {
            "ghsa": 2,
            "redhat": 2
          },
          "CVSS": {
            "ghsa": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
              "V3Score": 5.3
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
              "V3Score": 5.3
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-33672",
            "https://github.com/micromatch/picomatch",
            "https://github.com/micromatch/picomatch/commit/4516eb521f13a46b2fe1a1d2c9ef6b20ddc0e903",
            "https://github.com/micromatch/picomatch/security/advisories/GHSA-3v7f-55p6-f55p",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-33672",
            "https://www.cve.org/CVERecord?id=CVE-2026-33672"
          ],
          "PublishedDate": "2026-03-26T22:16:30.387Z",
          "LastModifiedDate": "2026-04-01T13:44:53.397Z"
        },
        {
          "VulnerabilityID": "CVE-2026-22028",
          "VendorIDs": [
            "GHSA-36hm-qxxp-pg3m"
          ],
          "PkgID": "preact@10.26.9",
          "PkgName": "preact",
          "PkgIdentifier": {
            "PURL": "pkg:npm/preact@10.26.9",
            "UID": "41618b99a8aacb",
            "BOMRef": "pkg:npm/preact@10.26.9"
          },
          "InstalledVersion": "10.26.9",
          "FixedVersion": "10.26.10, 10.27.3, 10.28.2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-22028",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory npm",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Anpm"
          },
          "Fingerprint": "sha256:936e2087d6644b543349047139e5971dba652555b895489031083f255ee7cd44",
          "Title": "preact: Preact: Arbitrary script execution via JSON serialization protection bypass",
          "Description": "Preact, a lightweight web development framework, JSON serialization protection to prevent Virtual DOM elements from being constructed from arbitrary JSON. A regression introduced in Preact 10.26.5 caused this protection to be softened. In applications where values from JSON payloads are assumed to be strings and passed unmodified to Preact as children, a specially-crafted JSON payload could be constructed that would be incorrectly treated as a valid VNode. When this chain of failures occurs it can result in HTML injection, which can allow arbitrary script execution if not mitigated by CSP or other means. Applications using affected Preact versions are vulnerable if they meet all of the following conditions: first, pass unmodified, unsanitized values from user-modifiable data sources (APIs, databases, local storage, etc.) directly into the render tree; second assume these values are strings but the data source could return actual JavaScript objects instead of JSON strings; and third, the data source either fails to perform type sanitization AND blindly stores/returns raw objects interchangeably with strings, OR is compromised (e.g., poisoned local storage, filesystem, or database). Versions 10.26.10, 10.27.3, and 10.28.2 patch the issue. The patch versions restore the previous strict equality checks that prevent JSON-parsed objects from being treated as valid VNodes. Other mitigations are available for those who cannot immediately upgrade. Validate input types, cast or validate network data, sanitize external data, and use Content Security Policy (CSP).",
          "Severity": "HIGH",
          "CweIDs": [
            "CWE-843"
          ],
          "VendorSeverity": {
            "ghsa": 3,
            "nvd": 2,
            "redhat": 2
          },
          "CVSS": {
            "ghsa": {
              "V40Vector": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U",
              "V40Score": 7.2
            },
            "nvd": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
              "V3Score": 6.1
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
              "V3Score": 6.1
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-22028",
            "https://github.com/preactjs/preact",
            "https://github.com/preactjs/preact/security/advisories/GHSA-36hm-qxxp-pg3m",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-22028",
            "https://www.cve.org/CVERecord?id=CVE-2026-22028"
          ],
          "PublishedDate": "2026-01-08T15:15:44.853Z",
          "LastModifiedDate": "2026-01-12T18:58:38.207Z"
        },
        {
          "VulnerabilityID": "CVE-2025-68470",
          "VendorIDs": [
            "GHSA-9jcx-v3wj-wh4m"
          ],
          "PkgID": "react-router@6.30.1",
          "PkgName": "react-router",
          "PkgIdentifier": {
            "PURL": "pkg:npm/react-router@6.30.1",
            "UID": "631f70d1fde12473",
            "BOMRef": "pkg:npm/react-router@6.30.1"
          },
          "InstalledVersion": "6.30.1",
          "FixedVersion": "6.30.2, 7.9.6",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-68470",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory npm",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Anpm"
          },
          "Fingerprint": "sha256:1f584cae03602051f743ca5aa1e173f7cc510ce2be3dccb511cf85bbf21bf8cb",
          "Title": "react-router: React Router unexpected external redirect",
          "Description": "React Router is a router for React. In versions 6.0.0 through 6.30.1 and 7.0.0 through 7.9.5, an attacker-supplied path can be crafted so that when a React Router application navigates to it via navigate(), \u003cLink\u003e, or redirect(), the app performs a navigation/redirect to an external URL. This is only an issue if you are passing untrusted content into navigation paths in your application code. This issue has been patched in versions 6.30.2 and 7.9.6.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-601"
          ],
          "VendorSeverity": {
            "ghsa": 2,
            "redhat": 2
          },
          "CVSS": {
            "ghsa": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
              "V3Score": 6.5
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
              "V3Score": 6.5
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2025-68470",
            "https://github.com/remix-run/react-router",
            "https://github.com/remix-run/react-router/security/advisories/GHSA-9jcx-v3wj-wh4m",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-68470",
            "https://www.cve.org/CVERecord?id=CVE-2025-68470"
          ],
          "PublishedDate": "2026-01-10T03:15:48.477Z",
          "LastModifiedDate": "2026-01-30T18:20:54.873Z"
        },
        {
          "VulnerabilityID": "CVE-2026-27606",
          "VendorIDs": [
            "GHSA-mw96-cpmx-2vgc"
          ],
          "PkgID": "rollup@2.79.2",
          "PkgName": "rollup",
          "PkgIdentifier": {
            "PURL": "pkg:npm/rollup@2.79.2",
            "UID": "ad53f40093feba83",
            "BOMRef": "pkg:npm/rollup@2.79.2"
          },
          "InstalledVersion": "2.79.2",
          "FixedVersion": "2.80.0, 3.30.0, 4.59.0",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-27606",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory npm",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Anpm"
          },
          "Fingerprint": "sha256:37679548e4c37b01e70516290b86a15ffd6e14403cfe0bdb7078ca4e40d70556",
          "Title": "rollup: Rollup: Remote Code Execution via Path Traversal Vulnerability",
          "Description": "Rollup is a module bundler for JavaScript. Versions prior to 2.80.0, 3.30.0, and 4.59.0 of the Rollup module bundler (specifically v4.x and present in current source) is vulnerable to an Arbitrary File Write via Path Traversal. Insecure file name sanitization in the core engine allows an attacker to control output filenames (e.g., via CLI named inputs, manual chunk aliases, or malicious plugins) and use traversal sequences (`../`) to overwrite files anywhere on the host filesystem that the build process has permissions for. This can lead to persistent Remote Code Execution (RCE) by overwriting critical system or user configuration files. Versions 2.80.0, 3.30.0, and 4.59.0 contain a patch for the issue.",
          "Severity": "HIGH",
          "CweIDs": [
            "CWE-22"
          ],
          "VendorSeverity": {
            "ghsa": 3,
            "nvd": 4,
            "redhat": 3
          },
          "CVSS": {
            "ghsa": {
              "V40Vector": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:P",
              "V40Score": 8.8
            },
            "nvd": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
              "V3Score": 9.8
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
              "V3Score": 9.1
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-27606",
            "https://github.com/rollup/rollup",
            "https://github.com/rollup/rollup/commit/c60770d7aaf750e512c1b2774989ea4596e660b2",
            "https://github.com/rollup/rollup/commit/c8cf1f9c48c516285758c1e11f08a54f304fd44e",
            "https://github.com/rollup/rollup/commit/d6dee5e99bb82aac0bee1df4ab9efbde455452c3",
            "https://github.com/rollup/rollup/releases/tag/v2.80.0",
            "https://github.com/rollup/rollup/releases/tag/v3.30.0",
            "https://github.com/rollup/rollup/releases/tag/v4.59.0",
            "https://github.com/rollup/rollup/security/advisories/GHSA-mw96-cpmx-2vgc",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-27606",
            "https://www.cve.org/CVERecord?id=CVE-2026-27606"
          ],
          "PublishedDate": "2026-02-25T03:16:04.603Z",
          "LastModifiedDate": "2026-02-25T16:05:11.063Z"
        },
        {
          "VulnerabilityID": "CVE-2026-27606",
          "VendorIDs": [
            "GHSA-mw96-cpmx-2vgc"
          ],
          "PkgID": "rollup@4.44.2",
          "PkgName": "rollup",
          "PkgIdentifier": {
            "PURL": "pkg:npm/rollup@4.44.2",
            "UID": "f84368097bd7f093",
            "BOMRef": "pkg:npm/rollup@4.44.2"
          },
          "InstalledVersion": "4.44.2",
          "FixedVersion": "2.80.0, 3.30.0, 4.59.0",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-27606",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory npm",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Anpm"
          },
          "Fingerprint": "sha256:1826534c4058c9a037371f846f4d92ebe535a31bc461297a8d96f9142150e823",
          "Title": "rollup: Rollup: Remote Code Execution via Path Traversal Vulnerability",
          "Description": "Rollup is a module bundler for JavaScript. Versions prior to 2.80.0, 3.30.0, and 4.59.0 of the Rollup module bundler (specifically v4.x and present in current source) is vulnerable to an Arbitrary File Write via Path Traversal. Insecure file name sanitization in the core engine allows an attacker to control output filenames (e.g., via CLI named inputs, manual chunk aliases, or malicious plugins) and use traversal sequences (`../`) to overwrite files anywhere on the host filesystem that the build process has permissions for. This can lead to persistent Remote Code Execution (RCE) by overwriting critical system or user configuration files. Versions 2.80.0, 3.30.0, and 4.59.0 contain a patch for the issue.",
          "Severity": "HIGH",
          "CweIDs": [
            "CWE-22"
          ],
          "VendorSeverity": {
            "ghsa": 3,
            "nvd": 4,
            "redhat": 3
          },
          "CVSS": {
            "ghsa": {
              "V40Vector": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:P",
              "V40Score": 8.8
            },
            "nvd": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
              "V3Score": 9.8
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
              "V3Score": 9.1
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-27606",
            "https://github.com/rollup/rollup",
            "https://github.com/rollup/rollup/commit/c60770d7aaf750e512c1b2774989ea4596e660b2",
            "https://github.com/rollup/rollup/commit/c8cf1f9c48c516285758c1e11f08a54f304fd44e",
            "https://github.com/rollup/rollup/commit/d6dee5e99bb82aac0bee1df4ab9efbde455452c3",
            "https://github.com/rollup/rollup/releases/tag/v2.80.0",
            "https://github.com/rollup/rollup/releases/tag/v3.30.0",
            "https://github.com/rollup/rollup/releases/tag/v4.59.0",
            "https://github.com/rollup/rollup/security/advisories/GHSA-mw96-cpmx-2vgc",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-27606",
            "https://www.cve.org/CVERecord?id=CVE-2026-27606"
          ],
          "PublishedDate": "2026-02-25T03:16:04.603Z",
          "LastModifiedDate": "2026-02-25T16:05:11.063Z"
        },
        {
          "VulnerabilityID": "CVE-2026-23745",
          "VendorIDs": [
            "GHSA-8qq5-rm4j-mr97"
          ],
          "PkgID": "tar@7.4.3",
          "PkgName": "tar",
          "PkgIdentifier": {
            "PURL": "pkg:npm/tar@7.4.3",
            "UID": "8308849cbec38b1a",
            "BOMRef": "pkg:npm/tar@7.4.3"
          },
          "InstalledVersion": "7.4.3",
          "FixedVersion": "7.5.3",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-23745",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory npm",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Anpm"
          },
          "Fingerprint": "sha256:54e246eafd3a19461f8c7bff7d84dd18db3694ccc2b656243163e8a0a26bf55b",
          "Title": "node-tar: tar: node-tar: Arbitrary file overwrite and symlink poisoning via unsanitized linkpaths in archives",
          "Description": "node-tar is a Tar for Node.js. The node-tar library (\u003c= 7.5.2) fails to sanitize the linkpath of Link (hardlink) and SymbolicLink entries when preservePaths is false (the default secure behavior). This allows malicious archives to bypass the extraction root restriction, leading to Arbitrary File Overwrite via hardlinks and Symlink Poisoning via absolute symlink targets. This vulnerability is fixed in 7.5.3.",
          "Severity": "HIGH",
          "CweIDs": [
            "CWE-22"
          ],
          "VendorSeverity": {
            "amazon": 3,
            "ghsa": 3,
            "nvd": 2,
            "redhat": 3
          },
          "CVSS": {
            "ghsa": {
              "V40Vector": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:L/VA:N/SC:H/SI:L/SA:N",
              "V40Score": 8.2
            },
            "nvd": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N",
              "V3Score": 6.1
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
              "V3Score": 8.2
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-23745",
            "https://github.com/isaacs/node-tar",
            "https://github.com/isaacs/node-tar/commit/340eb285b6d986e91969a1170d7fe9b0face405e",
            "https://github.com/isaacs/node-tar/security/advisories/GHSA-8qq5-rm4j-mr97",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-23745",
            "https://www.cve.org/CVERecord?id=CVE-2026-23745"
          ],
          "PublishedDate": "2026-01-16T22:16:26.83Z",
          "LastModifiedDate": "2026-02-18T16:20:07.823Z"
        },
        {
          "VulnerabilityID": "CVE-2026-23950",
          "VendorIDs": [
            "GHSA-r6q2-hw4h-h46w"
          ],
          "PkgID": "tar@7.4.3",
          "PkgName": "tar",
          "PkgIdentifier": {
            "PURL": "pkg:npm/tar@7.4.3",
            "UID": "8308849cbec38b1a",
            "BOMRef": "pkg:npm/tar@7.4.3"
          },
          "InstalledVersion": "7.4.3",
          "FixedVersion": "7.5.4",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-23950",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory npm",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Anpm"
          },
          "Fingerprint": "sha256:b4abfc3829172450c256597b8c5ff5b1a420470b772ff307f623f0ebd2d17057",
          "Title": "node-tar: tar: node-tar: Arbitrary file overwrite via Unicode path collision race condition",
          "Description": "node-tar,a Tar for Node.js, has a race condition vulnerability in versions up to and including 7.5.3. This is due to an incomplete handling of Unicode path collisions in the `path-reservations` system. On case-insensitive or normalization-insensitive filesystems (such as macOS APFS, In which it has been tested), the library fails to lock colliding paths (e.g., `ß` and `ss`), allowing them to be processed in parallel. This bypasses the library's internal concurrency safeguards and permits Symlink Poisoning attacks via race conditions. The library uses a `PathReservations` system to ensure that metadata checks and file operations for the same path are serialized. This prevents race conditions where one entry might clobber another concurrently. This is a Race Condition which enables Arbitrary File Overwrite. This vulnerability affects users and systems using node-tar on macOS (APFS/HFS+). Because of using `NFD` Unicode normalization (in which `ß` and `ss` are different), conflicting paths do not have their order properly preserved under filesystems that ignore Unicode normalization (e.g., APFS (in which `ß` causes an inode collision with `ss`)). This enables an attacker to circumvent internal parallelization locks (`PathReservations`) using conflicting filenames within a malicious tar archive. The patch in version 7.5.4 updates `path-reservations.js` to use a normalization form that matches the target filesystem's behavior (e.g., `NFKD`), followed by first `toLocaleLowerCase('en')` and then `toLocaleUpperCase('en')`. As a workaround, users who cannot upgrade promptly, and who are programmatically using `node-tar` to extract arbitrary tarball data should filter out all `SymbolicLink` entries (as npm does) to defend against arbitrary file writes via this file system entry name collision issue.",
          "Severity": "HIGH",
          "CweIDs": [
            "CWE-176",
            "CWE-352",
            "CWE-367"
          ],
          "VendorSeverity": {
            "amazon": 3,
            "ghsa": 3,
            "nvd": 2,
            "redhat": 3
          },
          "CVSS": {
            "ghsa": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L",
              "V3Score": 8.8
            },
            "nvd": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
              "V3Score": 5.9
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L",
              "V3Score": 8.8
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-23950",
            "https://github.com/isaacs/node-tar",
            "https://github.com/isaacs/node-tar/commit/3b1abfae650056edfabcbe0a0df5954d390521e6",
            "https://github.com/isaacs/node-tar/security/advisories/GHSA-r6q2-hw4h-h46w",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-23950",
            "https://www.cve.org/CVERecord?id=CVE-2026-23950"
          ],
          "PublishedDate": "2026-01-20T01:15:57.87Z",
          "LastModifiedDate": "2026-02-18T15:50:29.91Z"
        },
        {
          "VulnerabilityID": "CVE-2026-24842",
          "VendorIDs": [
            "GHSA-34x7-hfp2-rc4v"
          ],
          "PkgID": "tar@7.4.3",
          "PkgName": "tar",
          "PkgIdentifier": {
            "PURL": "pkg:npm/tar@7.4.3",
            "UID": "8308849cbec38b1a",
            "BOMRef": "pkg:npm/tar@7.4.3"
          },
          "InstalledVersion": "7.4.3",
          "FixedVersion": "7.5.7",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-24842",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory npm",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Anpm"
          },
          "Fingerprint": "sha256:25f22c6eb657f3708958a40b6d41993023a9ef6e710b714256e5ca272632fbc7",
          "Title": "node-tar: tar: node-tar: Arbitrary file creation via path traversal bypass in hardlink security check",
          "Description": "node-tar,a Tar for Node.js, contains a vulnerability in versions prior to 7.5.7 where the security check for hardlink entries uses different path resolution semantics than the actual hardlink creation logic. This mismatch allows an attacker to craft a malicious TAR archive that bypasses path traversal protections and creates hardlinks to arbitrary files outside the extraction directory. Version 7.5.7 contains a fix for the issue.",
          "Severity": "HIGH",
          "CweIDs": [
            "CWE-22",
            "CWE-59"
          ],
          "VendorSeverity": {
            "amazon": 3,
            "ghsa": 3,
            "redhat": 3
          },
          "CVSS": {
            "ghsa": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N",
              "V3Score": 8.2
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N",
              "V3Score": 8.2
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-24842",
            "https://github.com/isaacs/node-tar",
            "https://github.com/isaacs/node-tar/commit/f4a7aa9bc3d717c987fdf1480ff7a64e87ffdb46",
            "https://github.com/isaacs/node-tar/security/advisories/GHSA-34x7-hfp2-rc4v",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-24842",
            "https://www.cve.org/CVERecord?id=CVE-2026-24842"
          ],
          "PublishedDate": "2026-01-28T01:16:14.947Z",
          "LastModifiedDate": "2026-02-02T14:30:10.89Z"
        },
        {
          "VulnerabilityID": "CVE-2026-26960",
          "VendorIDs": [
            "GHSA-83g3-92jg-28cx"
          ],
          "PkgID": "tar@7.4.3",
          "PkgName": "tar",
          "PkgIdentifier": {
            "PURL": "pkg:npm/tar@7.4.3",
            "UID": "8308849cbec38b1a",
            "BOMRef": "pkg:npm/tar@7.4.3"
          },
          "InstalledVersion": "7.4.3",
          "FixedVersion": "7.5.8",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-26960",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory npm",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Anpm"
          },
          "Fingerprint": "sha256:c319a059b780724d6f7019dff0df1ba6191903f27fea6a377249166cb813dd7e",
          "Title": "tar: node-tar: node-tar: Arbitrary file read/write via malicious archive hardlink creation",
          "Description": "node-tar is a full-featured Tar for Node.js. When using default options in versions 7.5.7 and below, an attacker-controlled archive can create a hardlink inside the extraction directory that points to a file outside the extraction root, enabling arbitrary file read and write as the extracting user. Severity is high because the primitive bypasses path protections and turns archive extraction into a direct filesystem access primitive. This issue has been fixed in version 7.5.8.",
          "Severity": "HIGH",
          "CweIDs": [
            "CWE-22"
          ],
          "VendorSeverity": {
            "amazon": 3,
            "ghsa": 3,
            "nvd": 3,
            "redhat": 2
          },
          "CVSS": {
            "ghsa": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
              "V3Score": 7.1
            },
            "nvd": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
              "V3Score": 7.1
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
              "V3Score": 7.1
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-26960",
            "https://github.com/isaacs/node-tar",
            "https://github.com/isaacs/node-tar/commit/2cb1120bcefe28d7ecc719b41441ade59c52e384",
            "https://github.com/isaacs/node-tar/commit/d18e4e1f846f4ddddc153b0f536a19c050e7499f",
            "https://github.com/isaacs/node-tar/security/advisories/GHSA-83g3-92jg-28cx",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-26960",
            "https://www.cve.org/CVERecord?id=CVE-2026-26960"
          ],
          "PublishedDate": "2026-02-20T02:16:53.883Z",
          "LastModifiedDate": "2026-02-20T19:24:16.537Z"
        },
        {
          "VulnerabilityID": "CVE-2026-29786",
          "VendorIDs": [
            "GHSA-qffp-2rhf-9h96"
          ],
          "PkgID": "tar@7.4.3",
          "PkgName": "tar",
          "PkgIdentifier": {
            "PURL": "pkg:npm/tar@7.4.3",
            "UID": "8308849cbec38b1a",
            "BOMRef": "pkg:npm/tar@7.4.3"
          },
          "InstalledVersion": "7.4.3",
          "FixedVersion": "7.5.10",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-29786",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory npm",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Anpm"
          },
          "Fingerprint": "sha256:0b2ce4e5b4b2c8e01e6262392e3c66ed1c149c21556d1d078d420fce857191d7",
          "Title": "node-tar: hardlink path traversal via drive-relative linkpath",
          "Description": "node-tar is a full-featured Tar for Node.js. Prior to version 7.5.10, tar can be tricked into creating a hardlink that points outside the extraction directory by using a drive-relative link target such as C:../target.txt, which enables file overwrite outside cwd during normal tar.x() extraction. This issue has been patched in version 7.5.10.",
          "Severity": "HIGH",
          "CweIDs": [
            "CWE-22",
            "CWE-59"
          ],
          "VendorSeverity": {
            "amazon": 3,
            "ghsa": 3,
            "nvd": 2,
            "redhat": 3
          },
          "CVSS": {
            "ghsa": {
              "V40Vector": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:H/VA:L/SC:N/SI:H/SA:L",
              "V40Score": 8.2
            },
            "nvd": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N",
              "V3Score": 6.3
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N",
              "V3Score": 8.6
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-29786",
            "https://github.com/isaacs/node-tar",
            "https://github.com/isaacs/node-tar/commit/7bc755dd85e623c0279e08eb3784909e6d7e4b9f",
            "https://github.com/isaacs/node-tar/security/advisories/GHSA-qffp-2rhf-9h96",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-29786",
            "https://www.cve.org/CVERecord?id=CVE-2026-29786"
          ],
          "PublishedDate": "2026-03-07T16:15:55.587Z",
          "LastModifiedDate": "2026-03-11T21:50:01.91Z"
        },
        {
          "VulnerabilityID": "CVE-2026-31802",
          "VendorIDs": [
            "GHSA-9ppj-qmqm-q256"
          ],
          "PkgID": "tar@7.4.3",
          "PkgName": "tar",
          "PkgIdentifier": {
            "PURL": "pkg:npm/tar@7.4.3",
            "UID": "8308849cbec38b1a",
            "BOMRef": "pkg:npm/tar@7.4.3"
          },
          "InstalledVersion": "7.4.3",
          "FixedVersion": "7.5.11",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-31802",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory npm",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Anpm"
          },
          "Fingerprint": "sha256:6e9eccfea9e7c52691eca667ec3de15ddbe4c5b0d3b34f96f327f9c8420425b9",
          "Title": "tar: tar: File overwrite via drive-relative symlink traversal",
          "Description": "node-tar is a full-featured Tar for Node.js. Prior to version 7.5.11, tar (npm) can be tricked into creating a symlink that points outside the extraction directory by using a drive-relative symlink target such as C:../../../target.txt, which enables file overwrite outside cwd during normal tar.x() extraction. This vulnerability is fixed in 7.5.11.",
          "Severity": "HIGH",
          "CweIDs": [
            "CWE-22"
          ],
          "VendorSeverity": {
            "ghsa": 3,
            "nvd": 2,
            "redhat": 2
          },
          "CVSS": {
            "ghsa": {
              "V40Vector": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:H/SA:N",
              "V40Score": 8.2
            },
            "nvd": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
              "V3Score": 5.5
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
              "V3Score": 6.2
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-31802",
            "https://github.com/isaacs/node-tar",
            "https://github.com/isaacs/node-tar/commit/f48b5fa3b7985ddab96dc0f2125a4ffc9911b6ad",
            "https://github.com/isaacs/node-tar/security/advisories/GHSA-9ppj-qmqm-q256",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-31802",
            "https://www.cve.org/CVERecord?id=CVE-2026-31802"
          ],
          "PublishedDate": "2026-03-10T07:44:58.02Z",
          "LastModifiedDate": "2026-03-18T18:13:34.703Z"
        },
        {
          "VulnerabilityID": "CVE-2026-1526",
          "VendorIDs": [
            "GHSA-vrm6-8vpv-qv8q"
          ],
          "PkgID": "undici@6.21.3",
          "PkgName": "undici",
          "PkgIdentifier": {
            "PURL": "pkg:npm/undici@6.21.3",
            "UID": "9c0caa220688f547",
            "BOMRef": "pkg:npm/undici@6.21.3"
          },
          "InstalledVersion": "6.21.3",
          "FixedVersion": "6.24.0, 7.24.0",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-1526",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory npm",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Anpm"
          },
          "Fingerprint": "sha256:c62df4f6607d812c4af608d5f24b067224530958d5ae904654953b8c02955a3a",
          "Title": "undici: undici: Denial of Service via unbounded memory consumption during WebSocket permessage-deflate decompression",
          "Description": "The undici WebSocket client is vulnerable to a denial-of-service attack via unbounded memory consumption during permessage-deflate decompression. When a WebSocket connection negotiates the permessage-deflate extension, the client decompresses incoming compressed frames without enforcing any limit on the decompressed data size. A malicious WebSocket server can send a small compressed frame (a \"decompression bomb\") that expands to an extremely large size in memory, causing the Node.js process to exhaust available memory and crash or become unresponsive.\n\nThe vulnerability exists in the PerMessageDeflate.decompress() method, which accumulates all decompressed chunks in memory and concatenates them into a single Buffer without checking whether the total size exceeds a safe threshold.",
          "Severity": "HIGH",
          "CweIDs": [
            "CWE-409"
          ],
          "VendorSeverity": {
            "amazon": 3,
            "ghsa": 3,
            "redhat": 3
          },
          "CVSS": {
            "ghsa": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 7.5
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 7.5
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-1526",
            "https://cna.openjsf.org/security-advisories.html",
            "https://datatracker.ietf.org/doc/html/rfc7692",
            "https://github.com/nodejs/undici",
            "https://github.com/nodejs/undici/security/advisories/GHSA-vrm6-8vpv-qv8q",
            "https://hackerone.com/reports/3481206",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-1526",
            "https://owasp.org/www-community/attacks/Denial_of_Service",
            "https://www.cve.org/CVERecord?id=CVE-2026-1526"
          ],
          "PublishedDate": "2026-03-12T21:16:23.933Z",
          "LastModifiedDate": "2026-03-20T15:56:47.337Z"
        },
        {
          "VulnerabilityID": "CVE-2026-1528",
          "VendorIDs": [
            "GHSA-f269-vfmq-vjvj"
          ],
          "PkgID": "undici@6.21.3",
          "PkgName": "undici",
          "PkgIdentifier": {
            "PURL": "pkg:npm/undici@6.21.3",
            "UID": "9c0caa220688f547",
            "BOMRef": "pkg:npm/undici@6.21.3"
          },
          "InstalledVersion": "6.21.3",
          "FixedVersion": "6.24.0, 7.24.0",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-1528",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory npm",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Anpm"
          },
          "Fingerprint": "sha256:df33ac7fd6c8caf2e8ae94dd5b72206744b0c78e1c3725155cf7bc21405ede2e",
          "Title": "undici: undici: Denial of Service via crafted WebSocket frame with large length",
          "Description": "ImpactA server can reply with a WebSocket frame using the 64-bit length form and an extremely large length. undici's ByteParser overflows internal math, ends up in an invalid state, and throws a fatal TypeError that terminates the process.\n\nPatches\n\nPatched in the undici version v7.24.0 and v6.24.0. Users should upgrade to this version or later.",
          "Severity": "HIGH",
          "CweIDs": [
            "CWE-248",
            "CWE-1284"
          ],
          "VendorSeverity": {
            "amazon": 3,
            "ghsa": 3,
            "redhat": 3
          },
          "CVSS": {
            "ghsa": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 7.5
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 7.5
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-1528",
            "https://cna.openjsf.org/security-advisories.html",
            "https://github.com/nodejs/undici",
            "https://github.com/nodejs/undici/security/advisories/GHSA-f269-vfmq-vjvj",
            "https://hackerone.com/reports/3537648",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-1528",
            "https://www.cve.org/CVERecord?id=CVE-2026-1528"
          ],
          "PublishedDate": "2026-03-12T21:16:25.33Z",
          "LastModifiedDate": "2026-03-20T15:41:40.11Z"
        },
        {
          "VulnerabilityID": "CVE-2026-2229",
          "VendorIDs": [
            "GHSA-v9p9-hfj2-hcw8"
          ],
          "PkgID": "undici@6.21.3",
          "PkgName": "undici",
          "PkgIdentifier": {
            "PURL": "pkg:npm/undici@6.21.3",
            "UID": "9c0caa220688f547",
            "BOMRef": "pkg:npm/undici@6.21.3"
          },
          "InstalledVersion": "6.21.3",
          "FixedVersion": "6.24.0, 7.24.0",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-2229",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory npm",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Anpm"
          },
          "Fingerprint": "sha256:640e6f9dd640196c89af0a02ac87ddc0ccdac54d5d5295a62bbaadca9c8e0691",
          "Title": "undici: Undici: Denial of Service via invalid WebSocket permessage-deflate extension parameter",
          "Description": "ImpactThe undici WebSocket client is vulnerable to a denial-of-service attack due to improper validation of the server_max_window_bits parameter in the permessage-deflate extension. When a WebSocket client connects to a server, it automatically advertises support for permessage-deflate compression. A malicious server can respond with an out-of-range server_max_window_bits value (outside zlib's valid range of 8-15). When the server subsequently sends a compressed frame, the client attempts to create a zlib InflateRaw instance with the invalid windowBits value, causing a synchronous RangeError exception that is not caught, resulting in immediate process termination.\n\nThe vulnerability exists because:\n\n  *  The isValidClientWindowBits() function only validates that the value contains ASCII digits, not that it falls within the valid range 8-15\n  *  The createInflateRaw() call is not wrapped in a try-catch block\n  *  The resulting exception propagates up through the call stack and crashes the Node.js process",
          "Severity": "HIGH",
          "CweIDs": [
            "CWE-248",
            "CWE-1284"
          ],
          "VendorSeverity": {
            "amazon": 3,
            "ghsa": 3,
            "redhat": 3
          },
          "CVSS": {
            "ghsa": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 7.5
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 7.5
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-2229",
            "https://cna.openjsf.org/security-advisories.html",
            "https://datatracker.ietf.org/doc/html/rfc7692",
            "https://github.com/nodejs/undici",
            "https://github.com/nodejs/undici/security/advisories/GHSA-v9p9-hfj2-hcw8",
            "https://hackerone.com/reports/3487486",
            "https://nodejs.org/api/zlib.html#class-zlibinflateraw",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-2229",
            "https://www.cve.org/CVERecord?id=CVE-2026-2229"
          ],
          "PublishedDate": "2026-03-12T21:16:25.573Z",
          "LastModifiedDate": "2026-03-20T15:39:12.24Z"
        },
        {
          "VulnerabilityID": "CVE-2026-1525",
          "VendorIDs": [
            "GHSA-2mjp-6q6p-2qxm"
          ],
          "PkgID": "undici@6.21.3",
          "PkgName": "undici",
          "PkgIdentifier": {
            "PURL": "pkg:npm/undici@6.21.3",
            "UID": "9c0caa220688f547",
            "BOMRef": "pkg:npm/undici@6.21.3"
          },
          "InstalledVersion": "6.21.3",
          "FixedVersion": "6.24.0, 7.24.0",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-1525",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory npm",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Anpm"
          },
          "Fingerprint": "sha256:86af27fe6cf2468a4ae3fe86eac1864fdd0c6546bf6859827e586ca41f3af5b7",
          "Title": "undici: Undici: HTTP Request Smuggling and Denial of Service due to duplicate Content-Length headers",
          "Description": "Undici allows duplicate HTTP Content-Length headers when they are provided in an array with case-variant names (e.g., Content-Length and content-length). This produces malformed HTTP/1.1 requests with multiple conflicting Content-Length values on the wire.\n\nWho is impacted:\n\n  *  Applications using undici.request(), undici.Client, or similar low-level APIs with headers passed as flat arrays\n  *  Applications that accept user-controlled header names without case-normalization\n\n\nPotential consequences:\n\n  *  Denial of Service: Strict HTTP parsers (proxies, servers) will reject requests with duplicate Content-Length headers (400 Bad Request)\n  *  HTTP Request Smuggling: In deployments where an intermediary and backend interpret duplicate headers inconsistently (e.g., one uses the first value, the other uses the last), this can enable request smuggling attacks leading to ACL bypass, cache poisoning, or credential hijacking",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-444"
          ],
          "VendorSeverity": {
            "amazon": 3,
            "ghsa": 2,
            "nvd": 4,
            "redhat": 2
          },
          "CVSS": {
            "ghsa": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
              "V3Score": 6.5
            },
            "nvd": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
              "V3Score": 9.8
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
              "V3Score": 7.3
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-1525",
            "https://cna.openjsf.org/security-advisories.html",
            "https://cwe.mitre.org/data/definitions/444.html",
            "https://github.com/nodejs/undici",
            "https://github.com/nodejs/undici/security/advisories/GHSA-2mjp-6q6p-2qxm",
            "https://hackerone.com/reports/3556037",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-1525",
            "https://www.cve.org/CVERecord?id=CVE-2026-1525",
            "https://www.rfc-editor.org/rfc/rfc9110.html#section-8.6"
          ],
          "PublishedDate": "2026-03-12T20:16:02.67Z",
          "LastModifiedDate": "2026-03-19T17:29:34.053Z"
        },
        {
          "VulnerabilityID": "CVE-2026-1527",
          "VendorIDs": [
            "GHSA-4992-7rv2-5pvq"
          ],
          "PkgID": "undici@6.21.3",
          "PkgName": "undici",
          "PkgIdentifier": {
            "PURL": "pkg:npm/undici@6.21.3",
            "UID": "9c0caa220688f547",
            "BOMRef": "pkg:npm/undici@6.21.3"
          },
          "InstalledVersion": "6.21.3",
          "FixedVersion": "6.24.0, 7.24.0",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-1527",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory npm",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Anpm"
          },
          "Fingerprint": "sha256:1419d070c27321c779730c7c3d4b0803e40f859d08764b3ecb5fb39a279ee634",
          "Title": "undici: Undici: HTTP header injection and request smuggling vulnerability",
          "Description": "ImpactWhen an application passes user-controlled input to the upgrade option of client.request(), an attacker can inject CRLF sequences (\\r\\n) to:\n\n  *  Inject arbitrary HTTP headers\n  *  Terminate the HTTP request prematurely and smuggle raw data to non-HTTP services (Redis, Memcached, Elasticsearch)\nThe vulnerability exists because undici writes the upgrade value directly to the socket without validating for invalid header characters:\n\n// lib/dispatcher/client-h1.js:1121\nif (upgrade) {\n  header += `connection: upgrade\\r\\nupgrade: ${upgrade}\\r\\n`\n}",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-93"
          ],
          "VendorSeverity": {
            "amazon": 3,
            "ghsa": 2,
            "redhat": 2
          },
          "CVSS": {
            "ghsa": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N",
              "V3Score": 4.6
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
              "V3Score": 6.5
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-1527",
            "https://cna.openjsf.org/security-advisories.html",
            "https://github.com/nodejs/undici",
            "https://github.com/nodejs/undici/security/advisories/GHSA-4992-7rv2-5pvq",
            "https://hackerone.com/reports/3487198",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-1527",
            "https://www.cve.org/CVERecord?id=CVE-2026-1527"
          ],
          "PublishedDate": "2026-03-12T21:16:25.137Z",
          "LastModifiedDate": "2026-03-20T15:49:31.37Z"
        },
        {
          "VulnerabilityID": "CVE-2026-22036",
          "VendorIDs": [
            "GHSA-g9mf-h72j-4rw9"
          ],
          "PkgID": "undici@6.21.3",
          "PkgName": "undici",
          "PkgIdentifier": {
            "PURL": "pkg:npm/undici@6.21.3",
            "UID": "9c0caa220688f547",
            "BOMRef": "pkg:npm/undici@6.21.3"
          },
          "InstalledVersion": "6.21.3",
          "FixedVersion": "7.18.2, 6.23.0",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-22036",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory npm",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Anpm"
          },
          "Fingerprint": "sha256:f9ba4bac4f1b37b9f6e17094d8da9b6d79677891efa3ee4a16ff73aa713651fa",
          "Title": "undici: Undici: Denial of Service via excessive decompression steps",
          "Description": "Undici is an HTTP/1.1 client for Node.js. Prior to 7.18.0 and 6.23.0, the number of links in the decompression chain is unbounded and the default maxHeaderSize allows a malicious server to insert thousands compression steps leading to high CPU usage and excessive memory allocation. This vulnerability is fixed in 7.18.0 and 6.23.0.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-770"
          ],
          "VendorSeverity": {
            "amazon": 3,
            "ghsa": 2,
            "nvd": 3,
            "redhat": 1
          },
          "CVSS": {
            "ghsa": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 5.9
            },
            "nvd": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 7.5
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
              "V3Score": 3.7
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-22036",
            "https://github.com/nodejs/undici",
            "https://github.com/nodejs/undici/commit/b04e3cbb569c1596f86c108e9b52c79d8475dcb3",
            "https://github.com/nodejs/undici/security/advisories/GHSA-g9mf-h72j-4rw9",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-22036",
            "https://www.cve.org/CVERecord?id=CVE-2026-22036"
          ],
          "PublishedDate": "2026-01-14T19:16:47.833Z",
          "LastModifiedDate": "2026-01-22T21:15:50.07Z"
        },
        {
          "VulnerabilityID": "CVE-2026-33532",
          "VendorIDs": [
            "GHSA-48c2-rrv3-qjmp"
          ],
          "PkgID": "yaml@1.10.2",
          "PkgName": "yaml",
          "PkgIdentifier": {
            "PURL": "pkg:npm/yaml@1.10.2",
            "UID": "b908ae1e4e39e8d",
            "BOMRef": "pkg:npm/yaml@1.10.2"
          },
          "InstalledVersion": "1.10.2",
          "FixedVersion": "2.8.3, 1.10.3",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:d270eb130827c2e8ec8cb1af5a83c867e2756cf27ffefacf41a7f6b052e817f1",
            "DiffID": "sha256:f7101419a9b34de5150d639a15033c9cc8df16cd9d9261da388262f071ffbf5f"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-33532",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory npm",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Anpm"
          },
          "Fingerprint": "sha256:ea5ff7f0bd377620ee8af63b26165c9bbcf783f2de087e53ee89a6ad56d3fcbd",
          "Title": "yaml: yaml: Denial of Service via deeply nested YAML document parsing",
          "Description": "`yaml` is a YAML parser and serialiser for JavaScript. Parsing a YAML document with a version of `yaml` on the 1.x branch prior to 1.10.3 or on the 2.x branch prior to 2.8.3 may throw a RangeError due to a stack overflow. The node resolution/composition phase uses recursive function calls without a depth bound. An attacker who can supply YAML for parsing can trigger a `RangeError: Maximum call stack size exceeded` with a small payload (~2–10 KB). The `RangeError` is not a `YAMLParseError`, so applications that only catch YAML-specific errors will encounter an unexpected exception type. Depending on the host application's exception handling, this can fail requests or terminate the Node.js process. Flow sequences allow deep nesting with minimal bytes (2 bytes per level: one `[` and one `]`). On the default Node.js stack, approximately 1,000–5,000 levels of nesting (2–10 KB input) exhaust the call stack. The exact threshold is environment-dependent (Node.js version, stack size, call stack depth at invocation). Note: the library's `Parser` (CST phase) uses a stack-based iterative approach and is not affected. Only the compose/resolve phase uses actual call-stack recursion. All three public parsing APIs are affected: `YAML.parse()`, `YAML.parseDocument()`, and `YAML.parseAllDocuments()`. Versions 1.10.3 and 2.8.3 contain a patch.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-674"
          ],
          "VendorSeverity": {
            "ghsa": 2,
            "redhat": 2
          },
          "CVSS": {
            "ghsa": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
              "V3Score": 4.3
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 6.5
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-33532",
            "https://github.com/eemeli/yaml",
            "https://github.com/eemeli/yaml/commit/1e84ebbea7ec35011a4c61bbb820a529ee4f359b",
            "https://github.com/eemeli/yaml/releases/tag/v1.10.3",
            "https://github.com/eemeli/yaml/releases/tag/v2.8.3",
            "https://github.com/eemeli/yaml/security/advisories/GHSA-48c2-rrv3-qjmp",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-33532",
            "https://www.cve.org/CVERecord?id=CVE-2026-33532"
          ],
          "PublishedDate": "2026-03-26T20:16:15.543Z",
          "LastModifiedDate": "2026-04-02T18:11:37.49Z"
        }
      ]
    },
    {
      "Target": "qdrant/qdrant.spdx.json",
      "Class": "lang-pkgs",
      "Type": "cargo",
      "Packages": [
        {
          "ID": "actix-codec@0.5.0",
          "Name": "actix-codec",
          "Identifier": {
            "PURL": "pkg:cargo/actix-codec@0.5.0",
            "UID": "30b9aa4d66ee01ea",
            "BOMRef": "pkg:cargo/actix-codec@0.5.0"
          },
          "Version": "0.5.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "bitflags@1.3.2",
            "bytes@1.10.1",
            "futures-core@0.3.31",
            "futures-sink@0.3.31",
            "log@0.4.28",
            "memchr@2.7.4",
            "pin-project-lite@0.2.12",
            "tokio-util@0.7.16",
            "tokio@1.48.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "actix-cors@0.7.1",
          "Name": "actix-cors",
          "Identifier": {
            "PURL": "pkg:cargo/actix-cors@0.7.1",
            "UID": "980bd09b2a0c3ea9",
            "BOMRef": "pkg:cargo/actix-cors@0.7.1"
          },
          "Version": "0.7.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "actix-utils@3.0.1",
            "actix-web@4.11.0",
            "derive_more@2.0.1",
            "futures-util@0.3.31",
            "log@0.4.28",
            "once_cell@1.21.3",
            "smallvec@1.15.1"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "actix-files@0.6.8",
          "Name": "actix-files",
          "Identifier": {
            "PURL": "pkg:cargo/actix-files@0.6.8",
            "UID": "88f8eb11ba924c2d",
            "BOMRef": "pkg:cargo/actix-files@0.6.8"
          },
          "Version": "0.6.8",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "actix-http@3.11.0",
            "actix-service@2.0.2",
            "actix-utils@3.0.1",
            "actix-web@4.11.0",
            "bitflags@2.9.1",
            "bytes@1.10.1",
            "derive_more@2.0.1",
            "futures-core@0.3.31",
            "http-range@0.1.5",
            "log@0.4.28",
            "mime@0.3.16",
            "mime_guess@2.0.4",
            "percent-encoding@2.3.2",
            "pin-project-lite@0.2.12",
            "v_htmlescape@0.15.8"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "actix-http@3.11.0",
          "Name": "actix-http",
          "Identifier": {
            "PURL": "pkg:cargo/actix-http@3.11.0",
            "UID": "d0d016ab863c25fd",
            "BOMRef": "pkg:cargo/actix-http@3.11.0"
          },
          "Version": "3.11.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "actix-codec@0.5.0",
            "actix-rt@2.10.0",
            "actix-service@2.0.2",
            "actix-tls@3.4.0",
            "actix-utils@3.0.1",
            "base64@0.22.0",
            "bitflags@2.9.1",
            "brotli@8.0.1",
            "bytes@1.10.1",
            "bytestring@1.2.0",
            "derive_more@2.0.1",
            "encoding_rs@0.8.33",
            "flate2@1.1.4",
            "foldhash@0.1.4",
            "futures-core@0.3.31",
            "h2@0.3.26",
            "http@0.2.12",
            "httparse@1.10.1",
            "httpdate@1.0.2",
            "itoa@1.0.5",
            "language-tags@0.3.2",
            "local-channel@0.1.3",
            "mime@0.3.16",
            "percent-encoding@2.3.2",
            "pin-project-lite@0.2.12",
            "rand@0.9.2",
            "sha1@0.10.5",
            "smallvec@1.15.1",
            "tokio-util@0.7.16",
            "tokio@1.48.0",
            "tracing@0.1.43",
            "zstd@0.13.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "actix-macros@0.2.3",
          "Name": "actix-macros",
          "Identifier": {
            "PURL": "pkg:cargo/actix-macros@0.2.3",
            "UID": "7244558033cc4a41",
            "BOMRef": "pkg:cargo/actix-macros@0.2.3"
          },
          "Version": "0.2.3",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "quote@1.0.42",
            "syn@1.0.107"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "actix-multipart@0.7.2",
          "Name": "actix-multipart",
          "Identifier": {
            "PURL": "pkg:cargo/actix-multipart@0.7.2",
            "UID": "18cee309211a7ffd",
            "BOMRef": "pkg:cargo/actix-multipart@0.7.2"
          },
          "Version": "0.7.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "actix-multipart-derive@0.7.0",
            "actix-utils@3.0.1",
            "actix-web@4.11.0",
            "derive_more@0.99.17",
            "futures-core@0.3.31",
            "futures-util@0.3.31",
            "httparse@1.10.1",
            "local-waker@0.1.3",
            "log@0.4.28",
            "memchr@2.7.4",
            "mime@0.3.16",
            "rand@0.8.5",
            "serde@1.0.226",
            "serde_json@1.0.145",
            "serde_plain@1.0.1",
            "tempfile@3.23.0",
            "tokio@1.48.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "actix-multipart-derive@0.7.0",
          "Name": "actix-multipart-derive",
          "Identifier": {
            "PURL": "pkg:cargo/actix-multipart-derive@0.7.0",
            "UID": "2f3f429930459dd2",
            "BOMRef": "pkg:cargo/actix-multipart-derive@0.7.0"
          },
          "Version": "0.7.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "darling@0.20.8",
            "parse-size@1.0.0",
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@2.0.111"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "actix-router@0.5.3",
          "Name": "actix-router",
          "Identifier": {
            "PURL": "pkg:cargo/actix-router@0.5.3",
            "UID": "3590febfc0c8f363",
            "BOMRef": "pkg:cargo/actix-router@0.5.3"
          },
          "Version": "0.5.3",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "bytestring@1.2.0",
            "cfg-if@1.0.0",
            "http@0.2.12",
            "regex-lite@0.1.5",
            "regex@1.11.0",
            "serde@1.0.226",
            "tracing@0.1.43"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "actix-rt@2.10.0",
          "Name": "actix-rt",
          "Identifier": {
            "PURL": "pkg:cargo/actix-rt@2.10.0",
            "UID": "39f2317f9e45a293",
            "BOMRef": "pkg:cargo/actix-rt@2.10.0"
          },
          "Version": "2.10.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "futures-core@0.3.31",
            "tokio@1.48.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "actix-server@2.6.0",
          "Name": "actix-server",
          "Identifier": {
            "PURL": "pkg:cargo/actix-server@2.6.0",
            "UID": "f1a37fd34d69a5ef",
            "BOMRef": "pkg:cargo/actix-server@2.6.0"
          },
          "Version": "2.6.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "actix-rt@2.10.0",
            "actix-service@2.0.2",
            "actix-utils@3.0.1",
            "futures-core@0.3.31",
            "futures-util@0.3.31",
            "mio@1.0.1",
            "socket2@0.5.10",
            "tokio@1.48.0",
            "tracing@0.1.43"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "actix-service@2.0.2",
          "Name": "actix-service",
          "Identifier": {
            "PURL": "pkg:cargo/actix-service@2.0.2",
            "UID": "ffd74adbfd270c37",
            "BOMRef": "pkg:cargo/actix-service@2.0.2"
          },
          "Version": "2.0.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "futures-core@0.3.31",
            "paste@1.0.11",
            "pin-project-lite@0.2.12"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "actix-tls@3.4.0",
          "Name": "actix-tls",
          "Identifier": {
            "PURL": "pkg:cargo/actix-tls@3.4.0",
            "UID": "5961f307771db9cf",
            "BOMRef": "pkg:cargo/actix-tls@3.4.0"
          },
          "Version": "3.4.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "actix-rt@2.10.0",
            "actix-service@2.0.2",
            "actix-utils@3.0.1",
            "futures-core@0.3.31",
            "impl-more@0.1.6",
            "pin-project-lite@0.2.12",
            "rustls-pki-types@1.12.0",
            "tokio-rustls@0.26.0",
            "tokio-util@0.7.16",
            "tokio@1.48.0",
            "tracing@0.1.43"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "actix-utils@3.0.1",
          "Name": "actix-utils",
          "Identifier": {
            "PURL": "pkg:cargo/actix-utils@3.0.1",
            "UID": "59b787463e88dd59",
            "BOMRef": "pkg:cargo/actix-utils@3.0.1"
          },
          "Version": "3.0.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "local-waker@0.1.3",
            "pin-project-lite@0.2.12"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "actix-web@4.11.0",
          "Name": "actix-web",
          "Identifier": {
            "PURL": "pkg:cargo/actix-web@4.11.0",
            "UID": "6a3b0a3e0a3c601f",
            "BOMRef": "pkg:cargo/actix-web@4.11.0"
          },
          "Version": "4.11.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "actix-codec@0.5.0",
            "actix-http@3.11.0",
            "actix-macros@0.2.3",
            "actix-router@0.5.3",
            "actix-rt@2.10.0",
            "actix-server@2.6.0",
            "actix-service@2.0.2",
            "actix-tls@3.4.0",
            "actix-utils@3.0.1",
            "actix-web-codegen@4.3.0",
            "bytes@1.10.1",
            "bytestring@1.2.0",
            "cfg-if@1.0.0",
            "cookie@0.16.2",
            "derive_more@2.0.1",
            "encoding_rs@0.8.33",
            "foldhash@0.1.4",
            "futures-core@0.3.31",
            "futures-util@0.3.31",
            "impl-more@0.1.6",
            "itoa@1.0.5",
            "language-tags@0.3.2",
            "log@0.4.28",
            "mime@0.3.16",
            "once_cell@1.21.3",
            "pin-project-lite@0.2.12",
            "regex-lite@0.1.5",
            "regex@1.11.0",
            "serde@1.0.226",
            "serde_json@1.0.145",
            "serde_urlencoded@0.7.1",
            "smallvec@1.15.1",
            "socket2@0.5.10",
            "time@0.3.17",
            "tracing@0.1.43",
            "url@2.5.7"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "actix-web-codegen@4.3.0",
          "Name": "actix-web-codegen",
          "Identifier": {
            "PURL": "pkg:cargo/actix-web-codegen@4.3.0",
            "UID": "e57eed0d87104c51",
            "BOMRef": "pkg:cargo/actix-web-codegen@4.3.0"
          },
          "Version": "4.3.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "actix-router@0.5.3",
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@2.0.111"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "actix-web-extras@0.1.0",
          "Name": "actix-web-extras",
          "Identifier": {
            "PURL": "pkg:cargo/actix-web-extras@0.1.0",
            "UID": "f5848923e7ca013f",
            "BOMRef": "pkg:cargo/actix-web-extras@0.1.0"
          },
          "Version": "0.1.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "actix-web@4.11.0",
            "futures-core@0.3.31",
            "futures-util@0.3.31",
            "pin-project-lite@0.2.12"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "actix-web-validator@7.0.0",
          "Name": "actix-web-validator",
          "Identifier": {
            "PURL": "pkg:cargo/actix-web-validator@7.0.0",
            "UID": "9316be28b3ccc037",
            "BOMRef": "pkg:cargo/actix-web-validator@7.0.0"
          },
          "Version": "7.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "actix-http@3.11.0",
            "actix-router@0.5.3",
            "actix-web@4.11.0",
            "bytes@1.10.1",
            "futures-util@0.3.31",
            "futures@0.3.31",
            "log@0.4.28",
            "mime@0.3.16",
            "serde@1.0.226",
            "serde_json@1.0.145",
            "serde_qs@0.13.0",
            "serde_urlencoded@0.7.1",
            "thiserror@2.0.17",
            "validator@0.20.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "addr2line@0.19.0",
          "Name": "addr2line",
          "Identifier": {
            "PURL": "pkg:cargo/addr2line@0.19.0",
            "UID": "aa86947d5884ad9b",
            "BOMRef": "pkg:cargo/addr2line@0.19.0"
          },
          "Version": "0.19.0",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "gimli@0.27.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "adler@1.0.2",
          "Name": "adler",
          "Identifier": {
            "PURL": "pkg:cargo/adler@1.0.2",
            "UID": "9c3534e618b6eda8",
            "BOMRef": "pkg:cargo/adler@1.0.2"
          },
          "Version": "1.0.2",
          "Licenses": [
            "0BSD OR MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "adler2@2.0.0",
          "Name": "adler2",
          "Identifier": {
            "PURL": "pkg:cargo/adler2@2.0.0",
            "UID": "25f69d9c15c0e5cc",
            "BOMRef": "pkg:cargo/adler2@2.0.0"
          },
          "Version": "2.0.0",
          "Licenses": [
            "0BSD OR MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "adler32@1.2.0",
          "Name": "adler32",
          "Identifier": {
            "PURL": "pkg:cargo/adler32@1.2.0",
            "UID": "96a6db7fd22a04c5",
            "BOMRef": "pkg:cargo/adler32@1.2.0"
          },
          "Version": "1.2.0",
          "Licenses": [
            "Zlib"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "ahash@0.8.11",
          "Name": "ahash",
          "Identifier": {
            "PURL": "pkg:cargo/ahash@0.8.11",
            "UID": "52618fd89dc4f643",
            "BOMRef": "pkg:cargo/ahash@0.8.11"
          },
          "Version": "0.8.11",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "cfg-if@1.0.0",
            "getrandom@0.2.11",
            "once_cell@1.21.3",
            "serde@1.0.226",
            "zerocopy@0.7.35"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "aho-corasick@1.1.3",
          "Name": "aho-corasick",
          "Identifier": {
            "PURL": "pkg:cargo/aho-corasick@1.1.3",
            "UID": "79daf9ebbdf680c8",
            "BOMRef": "pkg:cargo/aho-corasick@1.1.3"
          },
          "Version": "1.1.3",
          "Licenses": [
            "Unlicense OR MIT"
          ],
          "DependsOn": [
            "memchr@2.7.4"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "aligned-vec@0.6.1",
          "Name": "aligned-vec",
          "Identifier": {
            "PURL": "pkg:cargo/aligned-vec@0.6.1",
            "UID": "75f0992dc8c03a3f",
            "BOMRef": "pkg:cargo/aligned-vec@0.6.1"
          },
          "Version": "0.6.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "equator@0.2.2"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "alloc-no-stdlib@2.0.4",
          "Name": "alloc-no-stdlib",
          "Identifier": {
            "PURL": "pkg:cargo/alloc-no-stdlib@2.0.4",
            "UID": "b2966df3f0d4c2f6",
            "BOMRef": "pkg:cargo/alloc-no-stdlib@2.0.4"
          },
          "Version": "2.0.4",
          "Licenses": [
            "BSD-3-Clause"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "alloc-stdlib@0.2.2",
          "Name": "alloc-stdlib",
          "Identifier": {
            "PURL": "pkg:cargo/alloc-stdlib@0.2.2",
            "UID": "c67782d8be83a29e",
            "BOMRef": "pkg:cargo/alloc-stdlib@0.2.2"
          },
          "Version": "0.2.2",
          "Licenses": [
            "BSD-3-Clause"
          ],
          "DependsOn": [
            "alloc-no-stdlib@2.0.4"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "allocator-api2@0.2.16",
          "Name": "allocator-api2",
          "Identifier": {
            "PURL": "pkg:cargo/allocator-api2@0.2.16",
            "UID": "3f8ebde50ab0b4f0",
            "BOMRef": "pkg:cargo/allocator-api2@0.2.16"
          },
          "Version": "0.2.16",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "android_system_properties@0.1.5",
          "Name": "android_system_properties",
          "Identifier": {
            "PURL": "pkg:cargo/android_system_properties@0.1.5",
            "UID": "1d5590982ed33f99",
            "BOMRef": "pkg:cargo/android_system_properties@0.1.5"
          },
          "Version": "0.1.5",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "libc@0.2.174"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "anstream@0.6.11",
          "Name": "anstream",
          "Identifier": {
            "PURL": "pkg:cargo/anstream@0.6.11",
            "UID": "1b84399d3b548193",
            "BOMRef": "pkg:cargo/anstream@0.6.11"
          },
          "Version": "0.6.11",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "anstyle-parse@0.2.0",
            "anstyle-query@1.0.0",
            "anstyle-wincon@3.0.1",
            "anstyle@1.0.8",
            "colorchoice@1.0.0",
            "utf8parse@0.2.1"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "anstyle@1.0.8",
          "Name": "anstyle",
          "Identifier": {
            "PURL": "pkg:cargo/anstyle@1.0.8",
            "UID": "3e0d41dd788dffe2",
            "BOMRef": "pkg:cargo/anstyle@1.0.8"
          },
          "Version": "1.0.8",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "anstyle-parse@0.2.0",
          "Name": "anstyle-parse",
          "Identifier": {
            "PURL": "pkg:cargo/anstyle-parse@0.2.0",
            "UID": "8a92302915dbd544",
            "BOMRef": "pkg:cargo/anstyle-parse@0.2.0"
          },
          "Version": "0.2.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "utf8parse@0.2.1"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "anstyle-query@1.0.0",
          "Name": "anstyle-query",
          "Identifier": {
            "PURL": "pkg:cargo/anstyle-query@1.0.0",
            "UID": "39c27e56183f845c",
            "BOMRef": "pkg:cargo/anstyle-query@1.0.0"
          },
          "Version": "1.0.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "windows-sys@0.48.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "anstyle-wincon@3.0.1",
          "Name": "anstyle-wincon",
          "Identifier": {
            "PURL": "pkg:cargo/anstyle-wincon@3.0.1",
            "UID": "e568eff6fbe9c00",
            "BOMRef": "pkg:cargo/anstyle-wincon@3.0.1"
          },
          "Version": "3.0.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "anstyle@1.0.8",
            "windows-sys@0.48.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "antidote@1.0.0",
          "Name": "antidote",
          "Identifier": {
            "PURL": "pkg:cargo/antidote@1.0.0",
            "UID": "a071bbfee45efdae",
            "BOMRef": "pkg:cargo/antidote@1.0.0"
          },
          "Version": "1.0.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "anyhow@1.0.100",
          "Name": "anyhow",
          "Identifier": {
            "PURL": "pkg:cargo/anyhow@1.0.100",
            "UID": "ba88d3b3d913c834",
            "BOMRef": "pkg:cargo/anyhow@1.0.100"
          },
          "Version": "1.0.100",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "approx@0.5.1",
          "Name": "approx",
          "Identifier": {
            "PURL": "pkg:cargo/approx@0.5.1",
            "UID": "36995fc773753fb8",
            "BOMRef": "pkg:cargo/approx@0.5.1"
          },
          "Version": "0.5.1",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "num-traits@0.2.19"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "arc-swap@1.7.1",
          "Name": "arc-swap",
          "Identifier": {
            "PURL": "pkg:cargo/arc-swap@1.7.1",
            "UID": "6114b4e00acae206",
            "BOMRef": "pkg:cargo/arc-swap@1.7.1"
          },
          "Version": "1.7.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "arraydeque@0.5.1",
          "Name": "arraydeque",
          "Identifier": {
            "PURL": "pkg:cargo/arraydeque@0.5.1",
            "UID": "43935ae9b861593f",
            "BOMRef": "pkg:cargo/arraydeque@0.5.1"
          },
          "Version": "0.5.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "arrayvec@0.4.12",
          "Name": "arrayvec",
          "Identifier": {
            "PURL": "pkg:cargo/arrayvec@0.4.12",
            "UID": "9c07902db59e96d5",
            "BOMRef": "pkg:cargo/arrayvec@0.4.12"
          },
          "Version": "0.4.12",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "nodrop@0.1.14"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "arrayvec@0.7.6",
          "Name": "arrayvec",
          "Identifier": {
            "PURL": "pkg:cargo/arrayvec@0.7.6",
            "UID": "51bdb9e6662cedc3",
            "BOMRef": "pkg:cargo/arrayvec@0.7.6"
          },
          "Version": "0.7.6",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "ash@0.38.0+1.3.281",
          "Name": "ash",
          "Identifier": {
            "PURL": "pkg:cargo/ash@0.38.0%2B1.3.281",
            "UID": "8aeecb26ff38214b",
            "BOMRef": "pkg:cargo/ash@0.38.0%2B1.3.281"
          },
          "Version": "0.38.0+1.3.281",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "libloading@0.8.5"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "async-stream@0.3.3",
          "Name": "async-stream",
          "Identifier": {
            "PURL": "pkg:cargo/async-stream@0.3.3",
            "UID": "19b7d16fc69af776",
            "BOMRef": "pkg:cargo/async-stream@0.3.3"
          },
          "Version": "0.3.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "async-stream-impl@0.3.3",
            "futures-core@0.3.31"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "async-stream-impl@0.3.3",
          "Name": "async-stream-impl",
          "Identifier": {
            "PURL": "pkg:cargo/async-stream-impl@0.3.3",
            "UID": "f244621547071dcb",
            "BOMRef": "pkg:cargo/async-stream-impl@0.3.3"
          },
          "Version": "0.3.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@1.0.107"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "async-trait@0.1.89",
          "Name": "async-trait",
          "Identifier": {
            "PURL": "pkg:cargo/async-trait@0.1.89",
            "UID": "c2fa172d3fa3ed44",
            "BOMRef": "pkg:cargo/async-trait@0.1.89"
          },
          "Version": "0.1.89",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@2.0.111"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "atomic_refcell@0.1.13",
          "Name": "atomic_refcell",
          "Identifier": {
            "PURL": "pkg:cargo/atomic_refcell@0.1.13",
            "UID": "26d7afe3c72c6540",
            "BOMRef": "pkg:cargo/atomic_refcell@0.1.13"
          },
          "Version": "0.1.13",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "atomicwrites@0.4.4",
          "Name": "atomicwrites",
          "Identifier": {
            "PURL": "pkg:cargo/atomicwrites@0.4.4",
            "UID": "52b68387dfde322b",
            "BOMRef": "pkg:cargo/atomicwrites@0.4.4"
          },
          "Version": "0.4.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "rustix@0.38.40",
            "tempfile@3.23.0",
            "windows-sys@0.52.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "axum@0.6.12",
          "Name": "axum",
          "Identifier": {
            "PURL": "pkg:cargo/axum@0.6.12",
            "UID": "c061d3dbd8299af",
            "BOMRef": "pkg:cargo/axum@0.6.12"
          },
          "Version": "0.6.12",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "async-trait@0.1.89",
            "axum-core@0.3.3",
            "bitflags@1.3.2",
            "bytes@1.10.1",
            "futures-util@0.3.31",
            "http-body@0.4.5",
            "http@0.2.12",
            "hyper@0.14.26",
            "itoa@1.0.5",
            "matchit@0.7.0",
            "memchr@2.7.4",
            "mime@0.3.16",
            "percent-encoding@2.3.2",
            "pin-project-lite@0.2.12",
            "serde@1.0.226",
            "sync_wrapper@0.1.2",
            "tower-layer@0.3.3",
            "tower-service@0.3.3",
            "tower@0.4.13"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "axum@0.7.5",
          "Name": "axum",
          "Identifier": {
            "PURL": "pkg:cargo/axum@0.7.5",
            "UID": "40323cc0fda65fc0",
            "BOMRef": "pkg:cargo/axum@0.7.5"
          },
          "Version": "0.7.5",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "async-trait@0.1.89",
            "axum-core@0.4.3",
            "bytes@1.10.1",
            "futures-util@0.3.31",
            "http-body-util@0.1.2",
            "http-body@1.0.0",
            "http@1.3.1",
            "itoa@1.0.5",
            "matchit@0.7.0",
            "memchr@2.7.4",
            "mime@0.3.16",
            "percent-encoding@2.3.2",
            "pin-project-lite@0.2.12",
            "serde@1.0.226",
            "sync_wrapper@1.0.1",
            "tower-layer@0.3.3",
            "tower-service@0.3.3",
            "tower@0.4.13"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "axum-core@0.3.3",
          "Name": "axum-core",
          "Identifier": {
            "PURL": "pkg:cargo/axum-core@0.3.3",
            "UID": "10be19ef2fea80ad",
            "BOMRef": "pkg:cargo/axum-core@0.3.3"
          },
          "Version": "0.3.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "async-trait@0.1.89",
            "bytes@1.10.1",
            "futures-util@0.3.31",
            "http-body@0.4.5",
            "http@0.2.12",
            "mime@0.3.16",
            "tower-layer@0.3.3",
            "tower-service@0.3.3"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "axum-core@0.4.3",
          "Name": "axum-core",
          "Identifier": {
            "PURL": "pkg:cargo/axum-core@0.4.3",
            "UID": "695a710bef21b889",
            "BOMRef": "pkg:cargo/axum-core@0.4.3"
          },
          "Version": "0.4.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "async-trait@0.1.89",
            "bytes@1.10.1",
            "futures-util@0.3.31",
            "http-body-util@0.1.2",
            "http-body@1.0.0",
            "http@1.3.1",
            "mime@0.3.16",
            "pin-project-lite@0.2.12",
            "sync_wrapper@0.1.2",
            "tower-layer@0.3.3",
            "tower-service@0.3.3"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "backtrace@0.3.67",
          "Name": "backtrace",
          "Identifier": {
            "PURL": "pkg:cargo/backtrace@0.3.67",
            "UID": "1947e97f9977a0fd",
            "BOMRef": "pkg:cargo/backtrace@0.3.67"
          },
          "Version": "0.3.67",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "addr2line@0.19.0",
            "cfg-if@1.0.0",
            "libc@0.2.174",
            "miniz_oxide@0.6.2",
            "object@0.30.0",
            "rustc-demangle@0.1.21"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "base16ct@0.2.0",
          "Name": "base16ct",
          "Identifier": {
            "PURL": "pkg:cargo/base16ct@0.2.0",
            "UID": "c4a6111371292931",
            "BOMRef": "pkg:cargo/base16ct@0.2.0"
          },
          "Version": "0.2.0",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "base64@0.13.1",
          "Name": "base64",
          "Identifier": {
            "PURL": "pkg:cargo/base64@0.13.1",
            "UID": "859b7666d433551b",
            "BOMRef": "pkg:cargo/base64@0.13.1"
          },
          "Version": "0.13.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "base64@0.21.0",
          "Name": "base64",
          "Identifier": {
            "PURL": "pkg:cargo/base64@0.21.0",
            "UID": "6513202bfacaa851",
            "BOMRef": "pkg:cargo/base64@0.21.0"
          },
          "Version": "0.21.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "base64@0.22.0",
          "Name": "base64",
          "Identifier": {
            "PURL": "pkg:cargo/base64@0.22.0",
            "UID": "d5713373943f9a45",
            "BOMRef": "pkg:cargo/base64@0.22.0"
          },
          "Version": "0.22.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "base64ct@1.8.0",
          "Name": "base64ct",
          "Identifier": {
            "PURL": "pkg:cargo/base64ct@1.8.0",
            "UID": "4feede5325d16f7e",
            "BOMRef": "pkg:cargo/base64ct@1.8.0"
          },
          "Version": "1.8.0",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "bincode@1.3.3",
          "Name": "bincode",
          "Identifier": {
            "PURL": "pkg:cargo/bincode@1.3.3",
            "UID": "e119441bad75e6ed",
            "BOMRef": "pkg:cargo/bincode@1.3.3"
          },
          "Version": "1.3.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "serde@1.0.226"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "bincode@2.0.1",
          "Name": "bincode",
          "Identifier": {
            "PURL": "pkg:cargo/bincode@2.0.1",
            "UID": "4ff37f3b752753af",
            "BOMRef": "pkg:cargo/bincode@2.0.1"
          },
          "Version": "2.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "bincode_derive@2.0.1",
            "serde@1.0.226",
            "unty@0.0.4"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "bincode_derive@2.0.1",
          "Name": "bincode_derive",
          "Identifier": {
            "PURL": "pkg:cargo/bincode_derive@2.0.1",
            "UID": "e282b3581b99c563",
            "BOMRef": "pkg:cargo/bincode_derive@2.0.1"
          },
          "Version": "2.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "virtue@0.0.18"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "binout@0.2.1",
          "Name": "binout",
          "Identifier": {
            "PURL": "pkg:cargo/binout@0.2.1",
            "UID": "682850dc657814",
            "BOMRef": "pkg:cargo/binout@0.2.1"
          },
          "Version": "0.2.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "bitflags@1.3.2",
          "Name": "bitflags",
          "Identifier": {
            "PURL": "pkg:cargo/bitflags@1.3.2",
            "UID": "8085ec156619ea53",
            "BOMRef": "pkg:cargo/bitflags@1.3.2"
          },
          "Version": "1.3.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "bitflags@2.9.1",
          "Name": "bitflags",
          "Identifier": {
            "PURL": "pkg:cargo/bitflags@2.9.1",
            "UID": "90da11fa9fcf1955",
            "BOMRef": "pkg:cargo/bitflags@2.9.1"
          },
          "Version": "2.9.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "bitm@0.4.2",
          "Name": "bitm",
          "Identifier": {
            "PURL": "pkg:cargo/bitm@0.4.2",
            "UID": "130174a3368756eb",
            "BOMRef": "pkg:cargo/bitm@0.4.2"
          },
          "Version": "0.4.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "dyn_size_of@0.4.2"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "bitpacking@0.9.2",
          "Name": "bitpacking",
          "Identifier": {
            "PURL": "pkg:cargo/bitpacking@0.9.2",
            "UID": "1db441911723e23b",
            "BOMRef": "pkg:cargo/bitpacking@0.9.2"
          },
          "Version": "0.9.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "crunchy@0.2.2"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "bitvec@1.0.1",
          "Name": "bitvec",
          "Identifier": {
            "PURL": "pkg:cargo/bitvec@1.0.1",
            "UID": "a51107c5b8ce1d58",
            "BOMRef": "pkg:cargo/bitvec@1.0.1"
          },
          "Version": "1.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "funty@2.0.0",
            "radium@0.7.0",
            "tap@1.0.1",
            "wyz@0.5.1"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "blake2-rfc@0.2.18",
          "Name": "blake2-rfc",
          "Identifier": {
            "PURL": "pkg:cargo/blake2-rfc@0.2.18",
            "UID": "b44350a61914e252",
            "BOMRef": "pkg:cargo/blake2-rfc@0.2.18"
          },
          "Version": "0.2.18",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "arrayvec@0.4.12",
            "constant_time_eq@0.1.5"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "block-buffer@0.10.3",
          "Name": "block-buffer",
          "Identifier": {
            "PURL": "pkg:cargo/block-buffer@0.10.3",
            "UID": "1eaa75087ddc893e",
            "BOMRef": "pkg:cargo/block-buffer@0.10.3"
          },
          "Version": "0.10.3",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "generic-array@0.14.9"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "brotli@8.0.1",
          "Name": "brotli",
          "Identifier": {
            "PURL": "pkg:cargo/brotli@8.0.1",
            "UID": "952119b44734dba2",
            "BOMRef": "pkg:cargo/brotli@8.0.1"
          },
          "Version": "8.0.1",
          "Licenses": [
            "BSD-3-Clause AND MIT"
          ],
          "DependsOn": [
            "alloc-no-stdlib@2.0.4",
            "alloc-stdlib@0.2.2",
            "brotli-decompressor@5.0.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "brotli-decompressor@5.0.0",
          "Name": "brotli-decompressor",
          "Identifier": {
            "PURL": "pkg:cargo/brotli-decompressor@5.0.0",
            "UID": "ee71ec838bf925f2",
            "BOMRef": "pkg:cargo/brotli-decompressor@5.0.0"
          },
          "Version": "5.0.0",
          "Licenses": [
            "BSD-3-Clause OR MIT"
          ],
          "DependsOn": [
            "alloc-no-stdlib@2.0.4",
            "alloc-stdlib@0.2.2"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "bumpalo@3.11.1",
          "Name": "bumpalo",
          "Identifier": {
            "PURL": "pkg:cargo/bumpalo@3.11.1",
            "UID": "5eb1997d70aeda87",
            "BOMRef": "pkg:cargo/bumpalo@3.11.1"
          },
          "Version": "3.11.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "bytemuck@1.24.0",
          "Name": "bytemuck",
          "Identifier": {
            "PURL": "pkg:cargo/bytemuck@1.24.0",
            "UID": "fef6607e52b7bd85",
            "BOMRef": "pkg:cargo/bytemuck@1.24.0"
          },
          "Version": "1.24.0",
          "Licenses": [
            "Zlib OR Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "bytemuck_derive@1.10.2"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "bytemuck_derive@1.10.2",
          "Name": "bytemuck_derive",
          "Identifier": {
            "PURL": "pkg:cargo/bytemuck_derive@1.10.2",
            "UID": "1508bbb2f9e0b29e",
            "BOMRef": "pkg:cargo/bytemuck_derive@1.10.2"
          },
          "Version": "1.10.2",
          "Licenses": [
            "Zlib OR Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@2.0.111"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "byteorder@1.5.0",
          "Name": "byteorder",
          "Identifier": {
            "PURL": "pkg:cargo/byteorder@1.5.0",
            "UID": "9e767d347395dfde",
            "BOMRef": "pkg:cargo/byteorder@1.5.0"
          },
          "Version": "1.5.0",
          "Licenses": [
            "Unlicense OR MIT"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "bytes@1.10.1",
          "Name": "bytes",
          "Identifier": {
            "PURL": "pkg:cargo/bytes@1.10.1",
            "UID": "be1a9cf70bd80ac1",
            "BOMRef": "pkg:cargo/bytes@1.10.1"
          },
          "Version": "1.10.1",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "bytestring@1.2.0",
          "Name": "bytestring",
          "Identifier": {
            "PURL": "pkg:cargo/bytestring@1.2.0",
            "UID": "12e485c3b93aa205",
            "BOMRef": "pkg:cargo/bytestring@1.2.0"
          },
          "Version": "1.2.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "bytes@1.10.1"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "bzip2-sys@0.1.11+1.0.8",
          "Name": "bzip2-sys",
          "Identifier": {
            "PURL": "pkg:cargo/bzip2-sys@0.1.11%2B1.0.8",
            "UID": "25898fe142c2e594",
            "BOMRef": "pkg:cargo/bzip2-sys@0.1.11%2B1.0.8"
          },
          "Version": "0.1.11+1.0.8",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "libc@0.2.174"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "cedarwood@0.4.6",
          "Name": "cedarwood",
          "Identifier": {
            "PURL": "pkg:cargo/cedarwood@0.4.6",
            "UID": "428a1818b9e4ba00",
            "BOMRef": "pkg:cargo/cedarwood@0.4.6"
          },
          "Version": "0.4.6",
          "Licenses": [
            "BSD-2-Clause"
          ],
          "DependsOn": [
            "smallvec@1.15.1"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "cfg-if@1.0.0",
          "Name": "cfg-if",
          "Identifier": {
            "PURL": "pkg:cargo/cfg-if@1.0.0",
            "UID": "8880bbf51e4bb373",
            "BOMRef": "pkg:cargo/cfg-if@1.0.0"
          },
          "Version": "1.0.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "cgroups-rs@0.3.4",
          "Name": "cgroups-rs",
          "Identifier": {
            "PURL": "pkg:cargo/cgroups-rs@0.3.4",
            "UID": "d25e39edc44149ee",
            "BOMRef": "pkg:cargo/cgroups-rs@0.3.4"
          },
          "Version": "0.3.4",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "libc@0.2.174",
            "log@0.4.28",
            "nix@0.25.1",
            "regex@1.11.0",
            "thiserror@1.0.69"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "charabia@0.9.7",
          "Name": "charabia",
          "Identifier": {
            "PURL": "pkg:cargo/charabia@0.9.7",
            "UID": "cf8350da81b3941c",
            "BOMRef": "pkg:cargo/charabia@0.9.7"
          },
          "Version": "0.9.7",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "aho-corasick@1.1.3",
            "csv@1.4.0",
            "either@1.13.0",
            "fst@0.4.7",
            "irg-kvariants@0.1.1",
            "jieba-rs@0.7.3",
            "once_cell@1.21.3",
            "serde@1.0.226",
            "slice-group-by@0.3.1",
            "unicode-normalization@0.1.24",
            "whatlang@0.16.4"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "chrono@0.4.42",
          "Name": "chrono",
          "Identifier": {
            "PURL": "pkg:cargo/chrono@0.4.42",
            "UID": "9aa368c46480c853",
            "BOMRef": "pkg:cargo/chrono@0.4.42"
          },
          "Version": "0.4.42",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "iana-time-zone@0.1.53",
            "js-sys@0.3.77",
            "num-traits@0.2.19",
            "serde@1.0.226",
            "wasm-bindgen@0.2.100",
            "windows-link@0.2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "clap@4.5.53",
          "Name": "clap",
          "Identifier": {
            "PURL": "pkg:cargo/clap@4.5.53",
            "UID": "3a5c5e79250b948d",
            "BOMRef": "pkg:cargo/clap@4.5.53"
          },
          "Version": "4.5.53",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "clap_builder@4.5.53",
            "clap_derive@4.5.49"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "clap_builder@4.5.53",
          "Name": "clap_builder",
          "Identifier": {
            "PURL": "pkg:cargo/clap_builder@4.5.53",
            "UID": "7e5e1f7d7ba6d2ca",
            "BOMRef": "pkg:cargo/clap_builder@4.5.53"
          },
          "Version": "4.5.53",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "anstream@0.6.11",
            "anstyle@1.0.8",
            "clap_lex@0.7.4",
            "strsim@0.11.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "clap_derive@4.5.49",
          "Name": "clap_derive",
          "Identifier": {
            "PURL": "pkg:cargo/clap_derive@4.5.49",
            "UID": "e794a8e70fc516ea",
            "BOMRef": "pkg:cargo/clap_derive@4.5.49"
          },
          "Version": "4.5.49",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "heck@0.5.0",
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@2.0.111"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "clap_lex@0.7.4",
          "Name": "clap_lex",
          "Identifier": {
            "PURL": "pkg:cargo/clap_lex@0.7.4",
            "UID": "449636443c03202",
            "BOMRef": "pkg:cargo/clap_lex@0.7.4"
          },
          "Version": "0.7.4",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "colorchoice@1.0.0",
          "Name": "colorchoice",
          "Identifier": {
            "PURL": "pkg:cargo/colorchoice@1.0.0",
            "UID": "9205997c83cc96ea",
            "BOMRef": "pkg:cargo/colorchoice@1.0.0"
          },
          "Version": "1.0.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "colored@3.0.0",
          "Name": "colored",
          "Identifier": {
            "PURL": "pkg:cargo/colored@3.0.0",
            "UID": "600573f37d12edda",
            "BOMRef": "pkg:cargo/colored@3.0.0"
          },
          "Version": "3.0.0",
          "Licenses": [
            "MPL-2.0"
          ],
          "DependsOn": [
            "windows-sys@0.59.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "config@0.15.18",
          "Name": "config",
          "Identifier": {
            "PURL": "pkg:cargo/config@0.15.18",
            "UID": "b3df6d16f710c79d",
            "BOMRef": "pkg:cargo/config@0.15.18"
          },
          "Version": "0.15.18",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "pathdiff@0.2.3",
            "serde_core@1.0.226",
            "winnow@0.7.13",
            "yaml-rust2@0.10.4"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "console@0.16.0",
          "Name": "console",
          "Identifier": {
            "PURL": "pkg:cargo/console@0.16.0",
            "UID": "31474ecb386f8112",
            "BOMRef": "pkg:cargo/console@0.16.0"
          },
          "Version": "0.16.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "encode_unicode@1.0.0",
            "libc@0.2.174",
            "once_cell@1.21.3",
            "unicode-width@0.2.0",
            "windows-sys@0.60.2"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "console-api@0.8.1",
          "Name": "console-api",
          "Identifier": {
            "PURL": "pkg:cargo/console-api@0.8.1",
            "UID": "f6924ec9b9d1efa5",
            "BOMRef": "pkg:cargo/console-api@0.8.1"
          },
          "Version": "0.8.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "futures-core@0.3.31",
            "prost-types@0.13.1",
            "prost@0.13.1",
            "tonic@0.12.3",
            "tracing-core@0.1.35"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "console-subscriber@0.4.1",
          "Name": "console-subscriber",
          "Identifier": {
            "PURL": "pkg:cargo/console-subscriber@0.4.1",
            "UID": "cd046af7bb9592e4",
            "BOMRef": "pkg:cargo/console-subscriber@0.4.1"
          },
          "Version": "0.4.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "console-api@0.8.1",
            "crossbeam-channel@0.5.15",
            "crossbeam-utils@0.8.20",
            "futures-task@0.3.31",
            "hdrhistogram@7.5.2",
            "humantime@2.3.0",
            "hyper-util@0.1.13",
            "parking_lot@0.12.5",
            "prost-types@0.13.1",
            "prost@0.13.1",
            "serde@1.0.226",
            "serde_json@1.0.145",
            "thread_local@1.1.7",
            "tokio-stream@0.1.17",
            "tokio@1.48.0",
            "tonic@0.12.3",
            "tracing-core@0.1.35",
            "tracing-subscriber@0.3.22",
            "tracing@0.1.43"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "const-oid@0.9.6",
          "Name": "const-oid",
          "Identifier": {
            "PURL": "pkg:cargo/const-oid@0.9.6",
            "UID": "cc90c27764083eb8",
            "BOMRef": "pkg:cargo/const-oid@0.9.6"
          },
          "Version": "0.9.6",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "constant_time_eq@0.1.5",
          "Name": "constant_time_eq",
          "Identifier": {
            "PURL": "pkg:cargo/constant_time_eq@0.1.5",
            "UID": "5a5643d419f614ad",
            "BOMRef": "pkg:cargo/constant_time_eq@0.1.5"
          },
          "Version": "0.1.5",
          "Licenses": [
            "CC0-1.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "constant_time_eq@0.4.2",
          "Name": "constant_time_eq",
          "Identifier": {
            "PURL": "pkg:cargo/constant_time_eq@0.4.2",
            "UID": "4df4a4c0677ae27e",
            "BOMRef": "pkg:cargo/constant_time_eq@0.4.2"
          },
          "Version": "0.4.2",
          "Licenses": [
            "CC0-1.0 OR MIT-0 OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "convert_case@0.4.0",
          "Name": "convert_case",
          "Identifier": {
            "PURL": "pkg:cargo/convert_case@0.4.0",
            "UID": "9d2293203696d2ae",
            "BOMRef": "pkg:cargo/convert_case@0.4.0"
          },
          "Version": "0.4.0",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "cookie@0.16.2",
          "Name": "cookie",
          "Identifier": {
            "PURL": "pkg:cargo/cookie@0.16.2",
            "UID": "77c84f6abd0c89da",
            "BOMRef": "pkg:cargo/cookie@0.16.2"
          },
          "Version": "0.16.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "percent-encoding@2.3.2",
            "time@0.3.17"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "core-foundation@0.9.4",
          "Name": "core-foundation",
          "Identifier": {
            "PURL": "pkg:cargo/core-foundation@0.9.4",
            "UID": "76199852a8c5c011",
            "BOMRef": "pkg:cargo/core-foundation@0.9.4"
          },
          "Version": "0.9.4",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "core-foundation-sys@0.8.7",
            "libc@0.2.174"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "core-foundation-sys@0.8.7",
          "Name": "core-foundation-sys",
          "Identifier": {
            "PURL": "pkg:cargo/core-foundation-sys@0.8.7",
            "UID": "cb6b591535d78362",
            "BOMRef": "pkg:cargo/core-foundation-sys@0.8.7"
          },
          "Version": "0.8.7",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "core2@0.4.0",
          "Name": "core2",
          "Identifier": {
            "PURL": "pkg:cargo/core2@0.4.0",
            "UID": "c2782e0bab2e6980",
            "BOMRef": "pkg:cargo/core2@0.4.0"
          },
          "Version": "0.4.0",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "memchr@2.7.4"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "count-min-sketch@0.1.8",
          "Name": "count-min-sketch",
          "Identifier": {
            "PURL": "pkg:cargo/count-min-sketch@0.1.8",
            "UID": "74d9d9406be66c96",
            "BOMRef": "pkg:cargo/count-min-sketch@0.1.8"
          },
          "Version": "0.1.8",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "rand@0.8.5",
            "siphasher@1.0.1"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "cpp_demangle@0.4.2",
          "Name": "cpp_demangle",
          "Identifier": {
            "PURL": "pkg:cargo/cpp_demangle@0.4.2",
            "UID": "5050679a1a635bba",
            "BOMRef": "pkg:cargo/cpp_demangle@0.4.2"
          },
          "Version": "0.4.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "cfg-if@1.0.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "cpufeatures@0.2.17",
          "Name": "cpufeatures",
          "Identifier": {
            "PURL": "pkg:cargo/cpufeatures@0.2.17",
            "UID": "31e58e9d0a065146",
            "BOMRef": "pkg:cargo/cpufeatures@0.2.17"
          },
          "Version": "0.2.17",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "libc@0.2.174"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "crc32c@0.6.8",
          "Name": "crc32c",
          "Identifier": {
            "PURL": "pkg:cargo/crc32c@0.6.8",
            "UID": "1ed4b01728b9dda8",
            "BOMRef": "pkg:cargo/crc32c@0.6.8"
          },
          "Version": "0.6.8",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "crc32fast@1.3.2",
          "Name": "crc32fast",
          "Identifier": {
            "PURL": "pkg:cargo/crc32fast@1.3.2",
            "UID": "dbabf46e9d050b20",
            "BOMRef": "pkg:cargo/crc32fast@1.3.2"
          },
          "Version": "1.3.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "cfg-if@1.0.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "crossbeam-channel@0.5.15",
          "Name": "crossbeam-channel",
          "Identifier": {
            "PURL": "pkg:cargo/crossbeam-channel@0.5.15",
            "UID": "5ac890013560679f",
            "BOMRef": "pkg:cargo/crossbeam-channel@0.5.15"
          },
          "Version": "0.5.15",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "crossbeam-utils@0.8.20"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "crossbeam-deque@0.8.2",
          "Name": "crossbeam-deque",
          "Identifier": {
            "PURL": "pkg:cargo/crossbeam-deque@0.8.2",
            "UID": "5432b757839bf41d",
            "BOMRef": "pkg:cargo/crossbeam-deque@0.8.2"
          },
          "Version": "0.8.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "cfg-if@1.0.0",
            "crossbeam-epoch@0.9.13",
            "crossbeam-utils@0.8.20"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "crossbeam-epoch@0.9.13",
          "Name": "crossbeam-epoch",
          "Identifier": {
            "PURL": "pkg:cargo/crossbeam-epoch@0.9.13",
            "UID": "eeff12dcc5bcebe",
            "BOMRef": "pkg:cargo/crossbeam-epoch@0.9.13"
          },
          "Version": "0.9.13",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "cfg-if@1.0.0",
            "crossbeam-utils@0.8.20",
            "memoffset@0.7.1",
            "scopeguard@1.1.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "crossbeam-utils@0.8.20",
          "Name": "crossbeam-utils",
          "Identifier": {
            "PURL": "pkg:cargo/crossbeam-utils@0.8.20",
            "UID": "4bc0fbd96eb7cb1",
            "BOMRef": "pkg:cargo/crossbeam-utils@0.8.20"
          },
          "Version": "0.8.20",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "crunchy@0.2.2",
          "Name": "crunchy",
          "Identifier": {
            "PURL": "pkg:cargo/crunchy@0.2.2",
            "UID": "438058631ed9e4ad",
            "BOMRef": "pkg:cargo/crunchy@0.2.2"
          },
          "Version": "0.2.2",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "crypto-bigint@0.5.5",
          "Name": "crypto-bigint",
          "Identifier": {
            "PURL": "pkg:cargo/crypto-bigint@0.5.5",
            "UID": "b45c71bff8b89f67",
            "BOMRef": "pkg:cargo/crypto-bigint@0.5.5"
          },
          "Version": "0.5.5",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "generic-array@0.14.9",
            "rand_core@0.6.4",
            "subtle@2.5.0",
            "zeroize@1.8.1"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "crypto-common@0.1.6",
          "Name": "crypto-common",
          "Identifier": {
            "PURL": "pkg:cargo/crypto-common@0.1.6",
            "UID": "40c439a692e6425b",
            "BOMRef": "pkg:cargo/crypto-common@0.1.6"
          },
          "Version": "0.1.6",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "generic-array@0.14.9",
            "typenum@1.16.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "csv@1.4.0",
          "Name": "csv",
          "Identifier": {
            "PURL": "pkg:cargo/csv@1.4.0",
            "UID": "2a3c2bc1d7fff799",
            "BOMRef": "pkg:cargo/csv@1.4.0"
          },
          "Version": "1.4.0",
          "Licenses": [
            "Unlicense OR MIT"
          ],
          "DependsOn": [
            "csv-core@0.1.11",
            "itoa@1.0.5",
            "ryu@1.0.12",
            "serde_core@1.0.226"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "csv-core@0.1.11",
          "Name": "csv-core",
          "Identifier": {
            "PURL": "pkg:cargo/csv-core@0.1.11",
            "UID": "a2a05af62e03fd18",
            "BOMRef": "pkg:cargo/csv-core@0.1.11"
          },
          "Version": "0.1.11",
          "Licenses": [
            "Unlicense OR MIT"
          ],
          "DependsOn": [
            "memchr@2.7.4"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "curve25519-dalek@4.1.3",
          "Name": "curve25519-dalek",
          "Identifier": {
            "PURL": "pkg:cargo/curve25519-dalek@4.1.3",
            "UID": "563d8daed708419f",
            "BOMRef": "pkg:cargo/curve25519-dalek@4.1.3"
          },
          "Version": "4.1.3",
          "Licenses": [
            "BSD-3-Clause"
          ],
          "DependsOn": [
            "cfg-if@1.0.0",
            "cpufeatures@0.2.17",
            "curve25519-dalek-derive@0.1.1",
            "digest@0.10.7",
            "fiat-crypto@0.2.9",
            "subtle@2.5.0",
            "zeroize@1.8.1"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "curve25519-dalek-derive@0.1.1",
          "Name": "curve25519-dalek-derive",
          "Identifier": {
            "PURL": "pkg:cargo/curve25519-dalek-derive@0.1.1",
            "UID": "320fce35ba421ad2",
            "BOMRef": "pkg:cargo/curve25519-dalek-derive@0.1.1"
          },
          "Version": "0.1.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@2.0.111"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "cxx@1.0.85",
          "Name": "cxx",
          "Identifier": {
            "PURL": "pkg:cargo/cxx@1.0.85",
            "UID": "5fe1a9fb27e1e5c8",
            "BOMRef": "pkg:cargo/cxx@1.0.85"
          },
          "Version": "1.0.85",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "cxxbridge-macro@1.0.85",
            "link-cplusplus@1.0.8"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "cxxbridge-macro@1.0.85",
          "Name": "cxxbridge-macro",
          "Identifier": {
            "PURL": "pkg:cargo/cxxbridge-macro@1.0.85",
            "UID": "344d93690cbf6c69",
            "BOMRef": "pkg:cargo/cxxbridge-macro@1.0.85"
          },
          "Version": "1.0.85",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@1.0.107"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "daachorse@1.0.0",
          "Name": "daachorse",
          "Identifier": {
            "PURL": "pkg:cargo/daachorse@1.0.0",
            "UID": "da715be0415f3c00",
            "BOMRef": "pkg:cargo/daachorse@1.0.0"
          },
          "Version": "1.0.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "darling@0.20.8",
          "Name": "darling",
          "Identifier": {
            "PURL": "pkg:cargo/darling@0.20.8",
            "UID": "abd385e7891d6588",
            "BOMRef": "pkg:cargo/darling@0.20.8"
          },
          "Version": "0.20.8",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "darling_core@0.20.8",
            "darling_macro@0.20.8"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "darling_core@0.20.8",
          "Name": "darling_core",
          "Identifier": {
            "PURL": "pkg:cargo/darling_core@0.20.8",
            "UID": "d1bc3a2fa265b549",
            "BOMRef": "pkg:cargo/darling_core@0.20.8"
          },
          "Version": "0.20.8",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "fnv@1.0.7",
            "ident_case@1.0.1",
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "strsim@0.10.0",
            "syn@2.0.111"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "darling_macro@0.20.8",
          "Name": "darling_macro",
          "Identifier": {
            "PURL": "pkg:cargo/darling_macro@0.20.8",
            "UID": "43fceb45cd7b86ef",
            "BOMRef": "pkg:cargo/darling_macro@0.20.8"
          },
          "Version": "0.20.8",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "darling_core@0.20.8",
            "quote@1.0.42",
            "syn@2.0.111"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "dary_heap@0.3.7",
          "Name": "dary_heap",
          "Identifier": {
            "PURL": "pkg:cargo/dary_heap@0.3.7",
            "UID": "199fb31c46f7102c",
            "BOMRef": "pkg:cargo/dary_heap@0.3.7"
          },
          "Version": "0.3.7",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "dashmap@6.1.0",
          "Name": "dashmap",
          "Identifier": {
            "PURL": "pkg:cargo/dashmap@6.1.0",
            "UID": "d2828ababcb2990e",
            "BOMRef": "pkg:cargo/dashmap@6.1.0"
          },
          "Version": "6.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "cfg-if@1.0.0",
            "crossbeam-utils@0.8.20",
            "hashbrown@0.14.2",
            "lock_api@0.4.14",
            "once_cell@1.21.3",
            "parking_lot_core@0.9.12"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "data-encoding@2.9.0",
          "Name": "data-encoding",
          "Identifier": {
            "PURL": "pkg:cargo/data-encoding@2.9.0",
            "UID": "e7a5e32832c31ae4",
            "BOMRef": "pkg:cargo/data-encoding@2.9.0"
          },
          "Version": "2.9.0",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "debugid@0.8.0",
          "Name": "debugid",
          "Identifier": {
            "PURL": "pkg:cargo/debugid@0.8.0",
            "UID": "81632278d3de18ce",
            "BOMRef": "pkg:cargo/debugid@0.8.0"
          },
          "Version": "0.8.0",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "uuid@1.18.1"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "delegate@0.13.4",
          "Name": "delegate",
          "Identifier": {
            "PURL": "pkg:cargo/delegate@0.13.4",
            "UID": "20e970a842262b26",
            "BOMRef": "pkg:cargo/delegate@0.13.4"
          },
          "Version": "0.13.4",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@2.0.111"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "der@0.7.10",
          "Name": "der",
          "Identifier": {
            "PURL": "pkg:cargo/der@0.7.10",
            "UID": "408b3fb8ab3e06fd",
            "BOMRef": "pkg:cargo/der@0.7.10"
          },
          "Version": "0.7.10",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "const-oid@0.9.6",
            "pem-rfc7468@0.7.0",
            "zeroize@1.8.1"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "derive_more@0.99.17",
          "Name": "derive_more",
          "Identifier": {
            "PURL": "pkg:cargo/derive_more@0.99.17",
            "UID": "2dcac9c566fc05b4",
            "BOMRef": "pkg:cargo/derive_more@0.99.17"
          },
          "Version": "0.99.17",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "convert_case@0.4.0",
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@1.0.107"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "derive_more@2.0.1",
          "Name": "derive_more",
          "Identifier": {
            "PURL": "pkg:cargo/derive_more@2.0.1",
            "UID": "229e92c7f119a93b",
            "BOMRef": "pkg:cargo/derive_more@2.0.1"
          },
          "Version": "2.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "derive_more-impl@2.0.1"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "derive_more-impl@2.0.1",
          "Name": "derive_more-impl",
          "Identifier": {
            "PURL": "pkg:cargo/derive_more-impl@2.0.1",
            "UID": "6e6e5c7aae0f1861",
            "BOMRef": "pkg:cargo/derive_more-impl@2.0.1"
          },
          "Version": "2.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@2.0.111",
            "unicode-xid@0.2.6"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "digest@0.10.7",
          "Name": "digest",
          "Identifier": {
            "PURL": "pkg:cargo/digest@0.10.7",
            "UID": "df4991fe99a9c6fd",
            "BOMRef": "pkg:cargo/digest@0.10.7"
          },
          "Version": "0.10.7",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "block-buffer@0.10.3",
            "const-oid@0.9.6",
            "crypto-common@0.1.6",
            "subtle@2.5.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "displaydoc@0.2.5",
          "Name": "displaydoc",
          "Identifier": {
            "PURL": "pkg:cargo/displaydoc@0.2.5",
            "UID": "e60d722569b76063",
            "BOMRef": "pkg:cargo/displaydoc@0.2.5"
          },
          "Version": "0.2.5",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@2.0.111"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "docopt@1.1.1",
          "Name": "docopt",
          "Identifier": {
            "PURL": "pkg:cargo/docopt@1.1.1",
            "UID": "be44110ea74ea283",
            "BOMRef": "pkg:cargo/docopt@1.1.1"
          },
          "Version": "1.1.1",
          "Licenses": [
            "Unlicense OR MIT"
          ],
          "DependsOn": [
            "lazy_static@1.5.0",
            "regex@1.11.0",
            "serde@1.0.226",
            "strsim@0.10.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "dyn-clone@1.0.10",
          "Name": "dyn-clone",
          "Identifier": {
            "PURL": "pkg:cargo/dyn-clone@1.0.10",
            "UID": "deba7a313528c4f8",
            "BOMRef": "pkg:cargo/dyn-clone@1.0.10"
          },
          "Version": "1.0.10",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "dyn_size_of@0.4.2",
          "Name": "dyn_size_of",
          "Identifier": {
            "PURL": "pkg:cargo/dyn_size_of@0.4.2",
            "UID": "c21cb09d3bf87779",
            "BOMRef": "pkg:cargo/dyn_size_of@0.4.2"
          },
          "Version": "0.4.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "earcutr@0.4.2",
          "Name": "earcutr",
          "Identifier": {
            "PURL": "pkg:cargo/earcutr@0.4.2",
            "UID": "fb5bd7ec34d917a5",
            "BOMRef": "pkg:cargo/earcutr@0.4.2"
          },
          "Version": "0.4.2",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "itertools@0.10.5",
            "num-traits@0.2.19"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "ecdsa@0.16.9",
          "Name": "ecdsa",
          "Identifier": {
            "PURL": "pkg:cargo/ecdsa@0.16.9",
            "UID": "9d75f8f51f0169a7",
            "BOMRef": "pkg:cargo/ecdsa@0.16.9"
          },
          "Version": "0.16.9",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "der@0.7.10",
            "digest@0.10.7",
            "elliptic-curve@0.13.8",
            "rfc6979@0.4.0",
            "signature@2.2.0",
            "spki@0.7.3"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "ecow@0.2.6",
          "Name": "ecow",
          "Identifier": {
            "PURL": "pkg:cargo/ecow@0.2.6",
            "UID": "2bc8e1c5cf33af14",
            "BOMRef": "pkg:cargo/ecow@0.2.6"
          },
          "Version": "0.2.6",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "serde@1.0.226"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "ed25519@2.2.3",
          "Name": "ed25519",
          "Identifier": {
            "PURL": "pkg:cargo/ed25519@2.2.3",
            "UID": "d1c4c183da597424",
            "BOMRef": "pkg:cargo/ed25519@2.2.3"
          },
          "Version": "2.2.3",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "pkcs8@0.10.2",
            "signature@2.2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "ed25519-dalek@2.2.0",
          "Name": "ed25519-dalek",
          "Identifier": {
            "PURL": "pkg:cargo/ed25519-dalek@2.2.0",
            "UID": "8d718719f77c1611",
            "BOMRef": "pkg:cargo/ed25519-dalek@2.2.0"
          },
          "Version": "2.2.0",
          "Licenses": [
            "BSD-3-Clause"
          ],
          "DependsOn": [
            "curve25519-dalek@4.1.3",
            "ed25519@2.2.3",
            "serde@1.0.226",
            "sha2@0.10.9",
            "subtle@2.5.0",
            "zeroize@1.8.1"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "either@1.13.0",
          "Name": "either",
          "Identifier": {
            "PURL": "pkg:cargo/either@1.13.0",
            "UID": "414bf81fd70cb56",
            "BOMRef": "pkg:cargo/either@1.13.0"
          },
          "Version": "1.13.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "elliptic-curve@0.13.8",
          "Name": "elliptic-curve",
          "Identifier": {
            "PURL": "pkg:cargo/elliptic-curve@0.13.8",
            "UID": "5207b575d1093d47",
            "BOMRef": "pkg:cargo/elliptic-curve@0.13.8"
          },
          "Version": "0.13.8",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "base16ct@0.2.0",
            "crypto-bigint@0.5.5",
            "digest@0.10.7",
            "ff@0.13.1",
            "generic-array@0.14.9",
            "group@0.13.0",
            "hkdf@0.12.4",
            "pem-rfc7468@0.7.0",
            "pkcs8@0.10.2",
            "rand_core@0.6.4",
            "sec1@0.7.3",
            "subtle@2.5.0",
            "zeroize@1.8.1"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "encode_unicode@1.0.0",
          "Name": "encode_unicode",
          "Identifier": {
            "PURL": "pkg:cargo/encode_unicode@1.0.0",
            "UID": "3550255a1277d54d",
            "BOMRef": "pkg:cargo/encode_unicode@1.0.0"
          },
          "Version": "1.0.0",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "encoding_rs@0.8.33",
          "Name": "encoding_rs",
          "Identifier": {
            "PURL": "pkg:cargo/encoding_rs@0.8.33",
            "UID": "f169aa4a4c0770d7",
            "BOMRef": "pkg:cargo/encoding_rs@0.8.33"
          },
          "Version": "0.8.33",
          "Licenses": [
            "(Apache-2.0 OR MIT) AND BSD-3-Clause"
          ],
          "DependsOn": [
            "cfg-if@1.0.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "env_filter@0.1.0",
          "Name": "env_filter",
          "Identifier": {
            "PURL": "pkg:cargo/env_filter@0.1.0",
            "UID": "d67ad9f130179e5e",
            "BOMRef": "pkg:cargo/env_filter@0.1.0"
          },
          "Version": "0.1.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "log@0.4.28",
            "regex@1.11.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "env_logger@0.11.8",
          "Name": "env_logger",
          "Identifier": {
            "PURL": "pkg:cargo/env_logger@0.11.8",
            "UID": "789b19161f729cb7",
            "BOMRef": "pkg:cargo/env_logger@0.11.8"
          },
          "Version": "0.11.8",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "anstream@0.6.11",
            "anstyle@1.0.8",
            "env_filter@0.1.0",
            "jiff@0.2.15",
            "log@0.4.28"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "equator@0.2.2",
          "Name": "equator",
          "Identifier": {
            "PURL": "pkg:cargo/equator@0.2.2",
            "UID": "608de1171d7e85e",
            "BOMRef": "pkg:cargo/equator@0.2.2"
          },
          "Version": "0.2.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "equator-macro@0.2.1"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "equator-macro@0.2.1",
          "Name": "equator-macro",
          "Identifier": {
            "PURL": "pkg:cargo/equator-macro@0.2.1",
            "UID": "bb54981a4e29f8b",
            "BOMRef": "pkg:cargo/equator-macro@0.2.1"
          },
          "Version": "0.2.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@2.0.111"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "equivalent@1.0.1",
          "Name": "equivalent",
          "Identifier": {
            "PURL": "pkg:cargo/equivalent@1.0.1",
            "UID": "cf45e7535ff9257e",
            "BOMRef": "pkg:cargo/equivalent@1.0.1"
          },
          "Version": "1.0.1",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "erased-serde@0.3.31",
          "Name": "erased-serde",
          "Identifier": {
            "PURL": "pkg:cargo/erased-serde@0.3.31",
            "UID": "3f418e01300e3931",
            "BOMRef": "pkg:cargo/erased-serde@0.3.31"
          },
          "Version": "0.3.31",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "serde@1.0.226"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "erased-serde@0.4.2",
          "Name": "erased-serde",
          "Identifier": {
            "PURL": "pkg:cargo/erased-serde@0.4.2",
            "UID": "83e6c38d28b13389",
            "BOMRef": "pkg:cargo/erased-serde@0.4.2"
          },
          "Version": "0.4.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "serde@1.0.226"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "errno@0.3.10",
          "Name": "errno",
          "Identifier": {
            "PURL": "pkg:cargo/errno@0.3.10",
            "UID": "61c23ab155e7cc52",
            "BOMRef": "pkg:cargo/errno@0.3.10"
          },
          "Version": "0.3.10",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "libc@0.2.174",
            "windows-sys@0.59.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "faccess@0.2.4",
          "Name": "faccess",
          "Identifier": {
            "PURL": "pkg:cargo/faccess@0.2.4",
            "UID": "12093d7ebea59f73",
            "BOMRef": "pkg:cargo/faccess@0.2.4"
          },
          "Version": "0.2.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "bitflags@1.3.2",
            "libc@0.2.174",
            "winapi@0.3.9"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "fastrand@2.2.0",
          "Name": "fastrand",
          "Identifier": {
            "PURL": "pkg:cargo/fastrand@2.2.0",
            "UID": "a99d2f7d9594a36",
            "BOMRef": "pkg:cargo/fastrand@2.2.0"
          },
          "Version": "2.2.0",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "ff@0.13.1",
          "Name": "ff",
          "Identifier": {
            "PURL": "pkg:cargo/ff@0.13.1",
            "UID": "3ba669df8f2bfb9a",
            "BOMRef": "pkg:cargo/ff@0.13.1"
          },
          "Version": "0.13.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "rand_core@0.6.4",
            "subtle@2.5.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "fiat-crypto@0.2.9",
          "Name": "fiat-crypto",
          "Identifier": {
            "PURL": "pkg:cargo/fiat-crypto@0.2.9",
            "UID": "7cc6b84b2532221d",
            "BOMRef": "pkg:cargo/fiat-crypto@0.2.9"
          },
          "Version": "0.2.9",
          "Licenses": [
            "MIT OR Apache-2.0 OR BSD-1-Clause"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "filetime@0.2.19",
          "Name": "filetime",
          "Identifier": {
            "PURL": "pkg:cargo/filetime@0.2.19",
            "UID": "c5532784a09c6b33",
            "BOMRef": "pkg:cargo/filetime@0.2.19"
          },
          "Version": "0.2.19",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "cfg-if@1.0.0",
            "libc@0.2.174",
            "redox_syscall@0.2.16",
            "windows-sys@0.42.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "findshlibs@0.10.2",
          "Name": "findshlibs",
          "Identifier": {
            "PURL": "pkg:cargo/findshlibs@0.10.2",
            "UID": "f4cd54b22fa29ec0",
            "BOMRef": "pkg:cargo/findshlibs@0.10.2"
          },
          "Version": "0.10.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "lazy_static@1.5.0",
            "libc@0.2.174",
            "winapi@0.3.9"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "fixedbitset@0.4.2",
          "Name": "fixedbitset",
          "Identifier": {
            "PURL": "pkg:cargo/fixedbitset@0.4.2",
            "UID": "858d5822b978fc83",
            "BOMRef": "pkg:cargo/fixedbitset@0.4.2"
          },
          "Version": "0.4.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "flate2@1.1.4",
          "Name": "flate2",
          "Identifier": {
            "PURL": "pkg:cargo/flate2@1.1.4",
            "UID": "d154199501c2d716",
            "BOMRef": "pkg:cargo/flate2@1.1.4"
          },
          "Version": "1.1.4",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "crc32fast@1.3.2",
            "miniz_oxide@0.8.5"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "float_next_after@1.0.0",
          "Name": "float_next_after",
          "Identifier": {
            "PURL": "pkg:cargo/float_next_after@1.0.0",
            "UID": "82ab3e3a64464ee1",
            "BOMRef": "pkg:cargo/float_next_after@1.0.0"
          },
          "Version": "1.0.0",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "fnv@1.0.7",
          "Name": "fnv",
          "Identifier": {
            "PURL": "pkg:cargo/fnv@1.0.7",
            "UID": "b4deb9cdc2aa583d",
            "BOMRef": "pkg:cargo/fnv@1.0.7"
          },
          "Version": "1.0.7",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "foldhash@0.1.4",
          "Name": "foldhash",
          "Identifier": {
            "PURL": "pkg:cargo/foldhash@0.1.4",
            "UID": "7a6e8881742561fc",
            "BOMRef": "pkg:cargo/foldhash@0.1.4"
          },
          "Version": "0.1.4",
          "Licenses": [
            "Zlib"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "foreign-types@0.5.0",
          "Name": "foreign-types",
          "Identifier": {
            "PURL": "pkg:cargo/foreign-types@0.5.0",
            "UID": "8428dfaf4e7b85af",
            "BOMRef": "pkg:cargo/foreign-types@0.5.0"
          },
          "Version": "0.5.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "foreign-types-macros@0.2.3",
            "foreign-types-shared@0.3.1"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "foreign-types-macros@0.2.3",
          "Name": "foreign-types-macros",
          "Identifier": {
            "PURL": "pkg:cargo/foreign-types-macros@0.2.3",
            "UID": "5acf1488c91bc445",
            "BOMRef": "pkg:cargo/foreign-types-macros@0.2.3"
          },
          "Version": "0.2.3",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@2.0.111"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "foreign-types-shared@0.3.1",
          "Name": "foreign-types-shared",
          "Identifier": {
            "PURL": "pkg:cargo/foreign-types-shared@0.3.1",
            "UID": "230afed014ac6eba",
            "BOMRef": "pkg:cargo/foreign-types-shared@0.3.1"
          },
          "Version": "0.3.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "form_urlencoded@1.2.2",
          "Name": "form_urlencoded",
          "Identifier": {
            "PURL": "pkg:cargo/form_urlencoded@1.2.2",
            "UID": "d7f23ef893574126",
            "BOMRef": "pkg:cargo/form_urlencoded@1.2.2"
          },
          "Version": "1.2.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "percent-encoding@2.3.2"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "fs-err@3.2.0",
          "Name": "fs-err",
          "Identifier": {
            "PURL": "pkg:cargo/fs-err@3.2.0",
            "UID": "ca9785ec1f44beee",
            "BOMRef": "pkg:cargo/fs-err@3.2.0"
          },
          "Version": "3.2.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "path_facts@0.2.1",
            "tokio@1.48.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "fs4@0.13.1",
          "Name": "fs4",
          "Identifier": {
            "PURL": "pkg:cargo/fs4@0.13.1",
            "UID": "df741dc6c63cf66",
            "BOMRef": "pkg:cargo/fs4@0.13.1"
          },
          "Version": "0.13.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "rustix@1.0.2",
            "windows-sys@0.59.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "fs_extra@1.3.0",
          "Name": "fs_extra",
          "Identifier": {
            "PURL": "pkg:cargo/fs_extra@1.3.0",
            "UID": "6c58218e32a6688c",
            "BOMRef": "pkg:cargo/fs_extra@1.3.0"
          },
          "Version": "1.3.0",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "fst@0.4.7",
          "Name": "fst",
          "Identifier": {
            "PURL": "pkg:cargo/fst@0.4.7",
            "UID": "4b6dcdd853b64db0",
            "BOMRef": "pkg:cargo/fst@0.4.7"
          },
          "Version": "0.4.7",
          "Licenses": [
            "Unlicense OR MIT"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "funty@2.0.0",
          "Name": "funty",
          "Identifier": {
            "PURL": "pkg:cargo/funty@2.0.0",
            "UID": "78eb9e3dac4a3f56",
            "BOMRef": "pkg:cargo/funty@2.0.0"
          },
          "Version": "2.0.0",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "futures@0.3.31",
          "Name": "futures",
          "Identifier": {
            "PURL": "pkg:cargo/futures@0.3.31",
            "UID": "605576f65758c4e1",
            "BOMRef": "pkg:cargo/futures@0.3.31"
          },
          "Version": "0.3.31",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "futures-channel@0.3.31",
            "futures-core@0.3.31",
            "futures-executor@0.3.31",
            "futures-io@0.3.31",
            "futures-sink@0.3.31",
            "futures-task@0.3.31",
            "futures-util@0.3.31"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "futures-channel@0.3.31",
          "Name": "futures-channel",
          "Identifier": {
            "PURL": "pkg:cargo/futures-channel@0.3.31",
            "UID": "991b397afedc281d",
            "BOMRef": "pkg:cargo/futures-channel@0.3.31"
          },
          "Version": "0.3.31",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "futures-core@0.3.31",
            "futures-sink@0.3.31"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "futures-core@0.3.31",
          "Name": "futures-core",
          "Identifier": {
            "PURL": "pkg:cargo/futures-core@0.3.31",
            "UID": "109eb3a57926c441",
            "BOMRef": "pkg:cargo/futures-core@0.3.31"
          },
          "Version": "0.3.31",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "futures-executor@0.3.31",
          "Name": "futures-executor",
          "Identifier": {
            "PURL": "pkg:cargo/futures-executor@0.3.31",
            "UID": "6961a0d4f5ee4b9a",
            "BOMRef": "pkg:cargo/futures-executor@0.3.31"
          },
          "Version": "0.3.31",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "futures-core@0.3.31",
            "futures-task@0.3.31",
            "futures-util@0.3.31"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "futures-io@0.3.31",
          "Name": "futures-io",
          "Identifier": {
            "PURL": "pkg:cargo/futures-io@0.3.31",
            "UID": "38a196de728abfc6",
            "BOMRef": "pkg:cargo/futures-io@0.3.31"
          },
          "Version": "0.3.31",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "futures-macro@0.3.31",
          "Name": "futures-macro",
          "Identifier": {
            "PURL": "pkg:cargo/futures-macro@0.3.31",
            "UID": "154d29dd17d11f43",
            "BOMRef": "pkg:cargo/futures-macro@0.3.31"
          },
          "Version": "0.3.31",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@2.0.111"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "futures-sink@0.3.31",
          "Name": "futures-sink",
          "Identifier": {
            "PURL": "pkg:cargo/futures-sink@0.3.31",
            "UID": "c982b4af7e113a1b",
            "BOMRef": "pkg:cargo/futures-sink@0.3.31"
          },
          "Version": "0.3.31",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "futures-task@0.3.31",
          "Name": "futures-task",
          "Identifier": {
            "PURL": "pkg:cargo/futures-task@0.3.31",
            "UID": "81083dc504fdd5da",
            "BOMRef": "pkg:cargo/futures-task@0.3.31"
          },
          "Version": "0.3.31",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "futures-util@0.3.31",
          "Name": "futures-util",
          "Identifier": {
            "PURL": "pkg:cargo/futures-util@0.3.31",
            "UID": "62c995d549558c30",
            "BOMRef": "pkg:cargo/futures-util@0.3.31"
          },
          "Version": "0.3.31",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "futures-channel@0.3.31",
            "futures-core@0.3.31",
            "futures-io@0.3.31",
            "futures-macro@0.3.31",
            "futures-sink@0.3.31",
            "futures-task@0.3.31",
            "memchr@2.7.4",
            "pin-project-lite@0.2.12",
            "pin-utils@0.1.0",
            "slab@0.4.11"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "fxhash@0.2.1",
          "Name": "fxhash",
          "Identifier": {
            "PURL": "pkg:cargo/fxhash@0.2.1",
            "UID": "974291abb9ecd099",
            "BOMRef": "pkg:cargo/fxhash@0.2.1"
          },
          "Version": "0.2.1",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "byteorder@1.5.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "generator@0.7.4",
          "Name": "generator",
          "Identifier": {
            "PURL": "pkg:cargo/generator@0.7.4",
            "UID": "f9d4cb33e9866017",
            "BOMRef": "pkg:cargo/generator@0.7.4"
          },
          "Version": "0.7.4",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "libc@0.2.174",
            "log@0.4.28",
            "windows@0.48.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "generic-array@0.14.9",
          "Name": "generic-array",
          "Identifier": {
            "PURL": "pkg:cargo/generic-array@0.14.9",
            "UID": "42a62b4cd8e88f04",
            "BOMRef": "pkg:cargo/generic-array@0.14.9"
          },
          "Version": "0.14.9",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "typenum@1.16.0",
            "zeroize@1.8.1"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "geo@0.31.0",
          "Name": "geo",
          "Identifier": {
            "PURL": "pkg:cargo/geo@0.31.0",
            "UID": "a6ad6aca0d0769d1",
            "BOMRef": "pkg:cargo/geo@0.31.0"
          },
          "Version": "0.31.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "earcutr@0.4.2",
            "float_next_after@1.0.0",
            "geo-types@0.7.17",
            "geographiclib-rs@0.2.3",
            "i_overlay@4.0.2",
            "log@0.4.28",
            "num-traits@0.2.19",
            "robust@1.1.0",
            "rstar@0.12.0",
            "spade@2.12.1"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "geo-types@0.7.17",
          "Name": "geo-types",
          "Identifier": {
            "PURL": "pkg:cargo/geo-types@0.7.17",
            "UID": "d11c2f1d9e3e71ba",
            "BOMRef": "pkg:cargo/geo-types@0.7.17"
          },
          "Version": "0.7.17",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "approx@0.5.1",
            "num-traits@0.2.19",
            "rayon@1.11.0",
            "rstar@0.12.0",
            "serde@1.0.226"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "geographiclib-rs@0.2.3",
          "Name": "geographiclib-rs",
          "Identifier": {
            "PURL": "pkg:cargo/geographiclib-rs@0.2.3",
            "UID": "acd67a6ea62b51a4",
            "BOMRef": "pkg:cargo/geographiclib-rs@0.2.3"
          },
          "Version": "0.2.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "lazy_static@1.5.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "geohash@0.13.1",
          "Name": "geohash",
          "Identifier": {
            "PURL": "pkg:cargo/geohash@0.13.1",
            "UID": "836565214441ed16",
            "BOMRef": "pkg:cargo/geohash@0.13.1"
          },
          "Version": "0.13.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "geo-types@0.7.17",
            "libm@0.2.6"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "getrandom@0.1.16",
          "Name": "getrandom",
          "Identifier": {
            "PURL": "pkg:cargo/getrandom@0.1.16",
            "UID": "38687d5e551bc4cb",
            "BOMRef": "pkg:cargo/getrandom@0.1.16"
          },
          "Version": "0.1.16",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "cfg-if@1.0.0",
            "libc@0.2.174",
            "wasi@0.9.0+wasi-snapshot-preview1"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "getrandom@0.2.11",
          "Name": "getrandom",
          "Identifier": {
            "PURL": "pkg:cargo/getrandom@0.2.11",
            "UID": "beecce3e7dc39829",
            "BOMRef": "pkg:cargo/getrandom@0.2.11"
          },
          "Version": "0.2.11",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "cfg-if@1.0.0",
            "libc@0.2.174",
            "wasi@0.11.0+wasi-snapshot-preview1"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "getrandom@0.3.0",
          "Name": "getrandom",
          "Identifier": {
            "PURL": "pkg:cargo/getrandom@0.3.0",
            "UID": "a7cbff6b65fd9e6",
            "BOMRef": "pkg:cargo/getrandom@0.3.0"
          },
          "Version": "0.3.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "cfg-if@1.0.0",
            "libc@0.2.174",
            "wasi@0.13.3+wasi-0.2.2",
            "windows-targets@0.52.6"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "getset@0.1.2",
          "Name": "getset",
          "Identifier": {
            "PURL": "pkg:cargo/getset@0.1.2",
            "UID": "7b6f7b8c04ad3eec",
            "BOMRef": "pkg:cargo/getset@0.1.2"
          },
          "Version": "0.1.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "proc-macro-error@1.0.4",
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@1.0.107"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "gimli@0.27.0",
          "Name": "gimli",
          "Identifier": {
            "PURL": "pkg:cargo/gimli@0.27.0",
            "UID": "e46dead1029541a2",
            "BOMRef": "pkg:cargo/gimli@0.27.0"
          },
          "Version": "0.27.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "gpu-allocator@0.27.0",
          "Name": "gpu-allocator",
          "Identifier": {
            "PURL": "pkg:cargo/gpu-allocator@0.27.0",
            "UID": "34d0397e2c0c68d2",
            "BOMRef": "pkg:cargo/gpu-allocator@0.27.0"
          },
          "Version": "0.27.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "ash@0.38.0+1.3.281",
            "log@0.4.28",
            "presser@0.3.1",
            "thiserror@1.0.69",
            "windows@0.57.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "group@0.13.0",
          "Name": "group",
          "Identifier": {
            "PURL": "pkg:cargo/group@0.13.0",
            "UID": "c3d7d36fb0dbeb25",
            "BOMRef": "pkg:cargo/group@0.13.0"
          },
          "Version": "0.13.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "ff@0.13.1",
            "rand_core@0.6.4",
            "subtle@2.5.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "h2@0.3.26",
          "Name": "h2",
          "Identifier": {
            "PURL": "pkg:cargo/h2@0.3.26",
            "UID": "66fbf257e247e264",
            "BOMRef": "pkg:cargo/h2@0.3.26"
          },
          "Version": "0.3.26",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "bytes@1.10.1",
            "fnv@1.0.7",
            "futures-core@0.3.31",
            "futures-sink@0.3.31",
            "futures-util@0.3.31",
            "http@0.2.12",
            "indexmap@2.11.4",
            "slab@0.4.11",
            "tokio-util@0.7.16",
            "tokio@1.48.0",
            "tracing@0.1.43"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "h2@0.4.4",
          "Name": "h2",
          "Identifier": {
            "PURL": "pkg:cargo/h2@0.4.4",
            "UID": "9b85b57e47a71d14",
            "BOMRef": "pkg:cargo/h2@0.4.4"
          },
          "Version": "0.4.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "bytes@1.10.1",
            "fnv@1.0.7",
            "futures-core@0.3.31",
            "futures-sink@0.3.31",
            "futures-util@0.3.31",
            "http@1.3.1",
            "indexmap@2.11.4",
            "slab@0.4.11",
            "tokio-util@0.7.16",
            "tokio@1.48.0",
            "tracing@0.1.43"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "half@1.8.2",
          "Name": "half",
          "Identifier": {
            "PURL": "pkg:cargo/half@1.8.2",
            "UID": "2dcbd8fea7a59526",
            "BOMRef": "pkg:cargo/half@1.8.2"
          },
          "Version": "1.8.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "half@2.7.0",
          "Name": "half",
          "Identifier": {
            "PURL": "pkg:cargo/half@2.7.0",
            "UID": "b11903d7e4f1df1e",
            "BOMRef": "pkg:cargo/half@2.7.0"
          },
          "Version": "2.7.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "cfg-if@1.0.0",
            "crunchy@0.2.2",
            "num-traits@0.2.19",
            "serde@1.0.226",
            "zerocopy@0.8.31"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "hash32@0.3.1",
          "Name": "hash32",
          "Identifier": {
            "PURL": "pkg:cargo/hash32@0.3.1",
            "UID": "27b9dfd4f89c291c",
            "BOMRef": "pkg:cargo/hash32@0.3.1"
          },
          "Version": "0.3.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "byteorder@1.5.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "hashbrown@0.12.3",
          "Name": "hashbrown",
          "Identifier": {
            "PURL": "pkg:cargo/hashbrown@0.12.3",
            "UID": "a1a905f183b64d3a",
            "BOMRef": "pkg:cargo/hashbrown@0.12.3"
          },
          "Version": "0.12.3",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "hashbrown@0.14.2",
          "Name": "hashbrown",
          "Identifier": {
            "PURL": "pkg:cargo/hashbrown@0.14.2",
            "UID": "db0de962207842ab",
            "BOMRef": "pkg:cargo/hashbrown@0.14.2"
          },
          "Version": "0.14.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "ahash@0.8.11",
            "allocator-api2@0.2.16"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "hashbrown@0.15.2",
          "Name": "hashbrown",
          "Identifier": {
            "PURL": "pkg:cargo/hashbrown@0.15.2",
            "UID": "9a977e6634abaef3",
            "BOMRef": "pkg:cargo/hashbrown@0.15.2"
          },
          "Version": "0.15.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "allocator-api2@0.2.16",
            "equivalent@1.0.1",
            "foldhash@0.1.4"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "hashlink@0.10.0",
          "Name": "hashlink",
          "Identifier": {
            "PURL": "pkg:cargo/hashlink@0.10.0",
            "UID": "8867be76d35b1c42",
            "BOMRef": "pkg:cargo/hashlink@0.10.0"
          },
          "Version": "0.10.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "hashbrown@0.15.2"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "hashring@0.3.6",
          "Name": "hashring",
          "Identifier": {
            "PURL": "pkg:cargo/hashring@0.3.6",
            "UID": "7268303897bff70",
            "BOMRef": "pkg:cargo/hashring@0.3.6"
          },
          "Version": "0.3.6",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "siphasher@0.3.10"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "hdrhistogram@7.5.2",
          "Name": "hdrhistogram",
          "Identifier": {
            "PURL": "pkg:cargo/hdrhistogram@7.5.2",
            "UID": "b18874f1b003e044",
            "BOMRef": "pkg:cargo/hdrhistogram@7.5.2"
          },
          "Version": "7.5.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "base64@0.13.1",
            "byteorder@1.5.0",
            "flate2@1.1.4",
            "nom@7.1.3",
            "num-traits@0.2.19"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "heapless@0.8.0",
          "Name": "heapless",
          "Identifier": {
            "PURL": "pkg:cargo/heapless@0.8.0",
            "UID": "1453d1da5888a741",
            "BOMRef": "pkg:cargo/heapless@0.8.0"
          },
          "Version": "0.8.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "hash32@0.3.1",
            "stable_deref_trait@1.2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "heck@0.5.0",
          "Name": "heck",
          "Identifier": {
            "PURL": "pkg:cargo/heck@0.5.0",
            "UID": "8577557e6f2c9d9a",
            "BOMRef": "pkg:cargo/heck@0.5.0"
          },
          "Version": "0.5.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "hermit-abi@0.3.9",
          "Name": "hermit-abi",
          "Identifier": {
            "PURL": "pkg:cargo/hermit-abi@0.3.9",
            "UID": "35216b539909d8bb",
            "BOMRef": "pkg:cargo/hermit-abi@0.3.9"
          },
          "Version": "0.3.9",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "hermit-abi@0.5.1",
          "Name": "hermit-abi",
          "Identifier": {
            "PURL": "pkg:cargo/hermit-abi@0.5.1",
            "UID": "568b1c693264716a",
            "BOMRef": "pkg:cargo/hermit-abi@0.5.1"
          },
          "Version": "0.5.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "hex@0.4.3",
          "Name": "hex",
          "Identifier": {
            "PURL": "pkg:cargo/hex@0.4.3",
            "UID": "9d0f182835f84fd9",
            "BOMRef": "pkg:cargo/hex@0.4.3"
          },
          "Version": "0.4.3",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "hkdf@0.12.4",
          "Name": "hkdf",
          "Identifier": {
            "PURL": "pkg:cargo/hkdf@0.12.4",
            "UID": "ddf94b308dc25a86",
            "BOMRef": "pkg:cargo/hkdf@0.12.4"
          },
          "Version": "0.12.4",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "hmac@0.12.1"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "hmac@0.12.1",
          "Name": "hmac",
          "Identifier": {
            "PURL": "pkg:cargo/hmac@0.12.1",
            "UID": "c888478151419eba",
            "BOMRef": "pkg:cargo/hmac@0.12.1"
          },
          "Version": "0.12.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "digest@0.10.7"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "http@0.2.12",
          "Name": "http",
          "Identifier": {
            "PURL": "pkg:cargo/http@0.2.12",
            "UID": "365aedacb184a72c",
            "BOMRef": "pkg:cargo/http@0.2.12"
          },
          "Version": "0.2.12",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "bytes@1.10.1",
            "fnv@1.0.7",
            "itoa@1.0.5"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "http@1.3.1",
          "Name": "http",
          "Identifier": {
            "PURL": "pkg:cargo/http@1.3.1",
            "UID": "858b367cc5381a75",
            "BOMRef": "pkg:cargo/http@1.3.1"
          },
          "Version": "1.3.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "bytes@1.10.1",
            "fnv@1.0.7",
            "itoa@1.0.5"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "http-body@0.4.5",
          "Name": "http-body",
          "Identifier": {
            "PURL": "pkg:cargo/http-body@0.4.5",
            "UID": "fc0dc61bb25fa1a0",
            "BOMRef": "pkg:cargo/http-body@0.4.5"
          },
          "Version": "0.4.5",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "bytes@1.10.1",
            "http@0.2.12",
            "pin-project-lite@0.2.12"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "http-body@1.0.0",
          "Name": "http-body",
          "Identifier": {
            "PURL": "pkg:cargo/http-body@1.0.0",
            "UID": "fb3d0984a80a51b6",
            "BOMRef": "pkg:cargo/http-body@1.0.0"
          },
          "Version": "1.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "bytes@1.10.1",
            "http@1.3.1"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "http-body-util@0.1.2",
          "Name": "http-body-util",
          "Identifier": {
            "PURL": "pkg:cargo/http-body-util@0.1.2",
            "UID": "bd4281e85497cc9c",
            "BOMRef": "pkg:cargo/http-body-util@0.1.2"
          },
          "Version": "0.1.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "bytes@1.10.1",
            "futures-util@0.3.31",
            "http-body@1.0.0",
            "http@1.3.1",
            "pin-project-lite@0.2.12"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "http-range@0.1.5",
          "Name": "http-range",
          "Identifier": {
            "PURL": "pkg:cargo/http-range@0.1.5",
            "UID": "2eeeda5c2053ed0",
            "BOMRef": "pkg:cargo/http-range@0.1.5"
          },
          "Version": "0.1.5",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "http-serde@2.1.1",
          "Name": "http-serde",
          "Identifier": {
            "PURL": "pkg:cargo/http-serde@2.1.1",
            "UID": "c4b703ec46976668",
            "BOMRef": "pkg:cargo/http-serde@2.1.1"
          },
          "Version": "2.1.1",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "http@1.3.1",
            "serde@1.0.226"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "httparse@1.10.1",
          "Name": "httparse",
          "Identifier": {
            "PURL": "pkg:cargo/httparse@1.10.1",
            "UID": "44162ff4ef04cfb3",
            "BOMRef": "pkg:cargo/httparse@1.10.1"
          },
          "Version": "1.10.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "httpdate@1.0.2",
          "Name": "httpdate",
          "Identifier": {
            "PURL": "pkg:cargo/httpdate@1.0.2",
            "UID": "cc36257658ca40c1",
            "BOMRef": "pkg:cargo/httpdate@1.0.2"
          },
          "Version": "1.0.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "humantime@2.3.0",
          "Name": "humantime",
          "Identifier": {
            "PURL": "pkg:cargo/humantime@2.3.0",
            "UID": "8d0ebfe92d556ed5",
            "BOMRef": "pkg:cargo/humantime@2.3.0"
          },
          "Version": "2.3.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "hyper@0.14.26",
          "Name": "hyper",
          "Identifier": {
            "PURL": "pkg:cargo/hyper@0.14.26",
            "UID": "696a8e20c1654513",
            "BOMRef": "pkg:cargo/hyper@0.14.26"
          },
          "Version": "0.14.26",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "bytes@1.10.1",
            "futures-channel@0.3.31",
            "futures-core@0.3.31",
            "futures-util@0.3.31",
            "h2@0.3.26",
            "http-body@0.4.5",
            "http@0.2.12",
            "httparse@1.10.1",
            "httpdate@1.0.2",
            "itoa@1.0.5",
            "pin-project-lite@0.2.12",
            "socket2@0.4.9",
            "tokio@1.48.0",
            "tower-service@0.3.3",
            "tracing@0.1.43",
            "want@0.3.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "hyper@1.6.0",
          "Name": "hyper",
          "Identifier": {
            "PURL": "pkg:cargo/hyper@1.6.0",
            "UID": "356077efcb2b568c",
            "BOMRef": "pkg:cargo/hyper@1.6.0"
          },
          "Version": "1.6.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "bytes@1.10.1",
            "futures-channel@0.3.31",
            "futures-util@0.3.31",
            "h2@0.4.4",
            "http-body@1.0.0",
            "http@1.3.1",
            "httparse@1.10.1",
            "httpdate@1.0.2",
            "itoa@1.0.5",
            "pin-project-lite@0.2.12",
            "smallvec@1.15.1",
            "tokio@1.48.0",
            "want@0.3.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "hyper-rustls@0.27.2",
          "Name": "hyper-rustls",
          "Identifier": {
            "PURL": "pkg:cargo/hyper-rustls@0.27.2",
            "UID": "71c7d74d66fa83ce",
            "BOMRef": "pkg:cargo/hyper-rustls@0.27.2"
          },
          "Version": "0.27.2",
          "Licenses": [
            "Apache-2.0 OR ISC OR MIT"
          ],
          "DependsOn": [
            "futures-util@0.3.31",
            "http@1.3.1",
            "hyper-util@0.1.13",
            "hyper@1.6.0",
            "rustls-native-certs@0.7.0",
            "rustls-pki-types@1.12.0",
            "rustls@0.23.35",
            "tokio-rustls@0.26.0",
            "tokio@1.48.0",
            "tower-service@0.3.3",
            "webpki-roots@0.26.1"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "hyper-timeout@0.4.1",
          "Name": "hyper-timeout",
          "Identifier": {
            "PURL": "pkg:cargo/hyper-timeout@0.4.1",
            "UID": "3c035d210b38426",
            "BOMRef": "pkg:cargo/hyper-timeout@0.4.1"
          },
          "Version": "0.4.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "hyper@0.14.26",
            "pin-project-lite@0.2.12",
            "tokio-io-timeout@1.2.0",
            "tokio@1.48.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "hyper-timeout@0.5.1",
          "Name": "hyper-timeout",
          "Identifier": {
            "PURL": "pkg:cargo/hyper-timeout@0.5.1",
            "UID": "5a0bb7d3ed38ed65",
            "BOMRef": "pkg:cargo/hyper-timeout@0.5.1"
          },
          "Version": "0.5.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "hyper-util@0.1.13",
            "hyper@1.6.0",
            "pin-project-lite@0.2.12",
            "tokio@1.48.0",
            "tower-service@0.3.3"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "hyper-util@0.1.13",
          "Name": "hyper-util",
          "Identifier": {
            "PURL": "pkg:cargo/hyper-util@0.1.13",
            "UID": "ec6ddda02066041",
            "BOMRef": "pkg:cargo/hyper-util@0.1.13"
          },
          "Version": "0.1.13",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "base64@0.22.0",
            "bytes@1.10.1",
            "futures-channel@0.3.31",
            "futures-core@0.3.31",
            "futures-util@0.3.31",
            "http-body@1.0.0",
            "http@1.3.1",
            "hyper@1.6.0",
            "ipnet@2.11.0",
            "libc@0.2.174",
            "percent-encoding@2.3.2",
            "pin-project-lite@0.2.12",
            "socket2@0.5.10",
            "tokio@1.48.0",
            "tower-service@0.3.3",
            "tracing@0.1.43"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "i_float@1.15.0",
          "Name": "i_float",
          "Identifier": {
            "PURL": "pkg:cargo/i_float@1.15.0",
            "UID": "bd2b434128139151",
            "BOMRef": "pkg:cargo/i_float@1.15.0"
          },
          "Version": "1.15.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "libm@0.2.6"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "i_key_sort@0.6.0",
          "Name": "i_key_sort",
          "Identifier": {
            "PURL": "pkg:cargo/i_key_sort@0.6.0",
            "UID": "836c52567608cd83",
            "BOMRef": "pkg:cargo/i_key_sort@0.6.0"
          },
          "Version": "0.6.0",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "i_overlay@4.0.2",
          "Name": "i_overlay",
          "Identifier": {
            "PURL": "pkg:cargo/i_overlay@4.0.2",
            "UID": "409642297bc725ce",
            "BOMRef": "pkg:cargo/i_overlay@4.0.2"
          },
          "Version": "4.0.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "i_float@1.15.0",
            "i_key_sort@0.6.0",
            "i_shape@1.14.0",
            "i_tree@0.16.0",
            "rayon@1.11.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "i_shape@1.14.0",
          "Name": "i_shape",
          "Identifier": {
            "PURL": "pkg:cargo/i_shape@1.14.0",
            "UID": "e25af910732a7ed4",
            "BOMRef": "pkg:cargo/i_shape@1.14.0"
          },
          "Version": "1.14.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "i_float@1.15.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "i_tree@0.16.0",
          "Name": "i_tree",
          "Identifier": {
            "PURL": "pkg:cargo/i_tree@0.16.0",
            "UID": "d22678702b3f8d13",
            "BOMRef": "pkg:cargo/i_tree@0.16.0"
          },
          "Version": "0.16.0",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "iana-time-zone@0.1.53",
          "Name": "iana-time-zone",
          "Identifier": {
            "PURL": "pkg:cargo/iana-time-zone@0.1.53",
            "UID": "bf10a4fcbadbdda4",
            "BOMRef": "pkg:cargo/iana-time-zone@0.1.53"
          },
          "Version": "0.1.53",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "android_system_properties@0.1.5",
            "core-foundation-sys@0.8.7",
            "iana-time-zone-haiku@0.1.1",
            "js-sys@0.3.77",
            "wasm-bindgen@0.2.100",
            "winapi@0.3.9"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "iana-time-zone-haiku@0.1.1",
          "Name": "iana-time-zone-haiku",
          "Identifier": {
            "PURL": "pkg:cargo/iana-time-zone-haiku@0.1.1",
            "UID": "dcdbffe6a04ac754",
            "BOMRef": "pkg:cargo/iana-time-zone-haiku@0.1.1"
          },
          "Version": "0.1.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "cxx@1.0.85"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "icu_collections@1.5.0",
          "Name": "icu_collections",
          "Identifier": {
            "PURL": "pkg:cargo/icu_collections@1.5.0",
            "UID": "ecf205ddced23776",
            "BOMRef": "pkg:cargo/icu_collections@1.5.0"
          },
          "Version": "1.5.0",
          "Licenses": [
            "Unicode-3.0"
          ],
          "DependsOn": [
            "displaydoc@0.2.5",
            "yoke@0.7.4",
            "zerofrom@0.1.4",
            "zerovec@0.10.4"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "icu_locid@1.5.0",
          "Name": "icu_locid",
          "Identifier": {
            "PURL": "pkg:cargo/icu_locid@1.5.0",
            "UID": "2b2fac51e62c827d",
            "BOMRef": "pkg:cargo/icu_locid@1.5.0"
          },
          "Version": "1.5.0",
          "Licenses": [
            "Unicode-3.0"
          ],
          "DependsOn": [
            "displaydoc@0.2.5",
            "litemap@0.7.3",
            "tinystr@0.7.6",
            "writeable@0.5.5",
            "zerovec@0.10.4"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "icu_locid_transform@1.5.0",
          "Name": "icu_locid_transform",
          "Identifier": {
            "PURL": "pkg:cargo/icu_locid_transform@1.5.0",
            "UID": "1845edab89105762",
            "BOMRef": "pkg:cargo/icu_locid_transform@1.5.0"
          },
          "Version": "1.5.0",
          "Licenses": [
            "Unicode-3.0"
          ],
          "DependsOn": [
            "displaydoc@0.2.5",
            "icu_locid@1.5.0",
            "icu_locid_transform_data@1.5.0",
            "icu_provider@1.5.0",
            "tinystr@0.7.6",
            "zerovec@0.10.4"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "icu_locid_transform_data@1.5.0",
          "Name": "icu_locid_transform_data",
          "Identifier": {
            "PURL": "pkg:cargo/icu_locid_transform_data@1.5.0",
            "UID": "8fddc81d6194a76e",
            "BOMRef": "pkg:cargo/icu_locid_transform_data@1.5.0"
          },
          "Version": "1.5.0",
          "Licenses": [
            "Unicode-3.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "icu_normalizer@1.5.0",
          "Name": "icu_normalizer",
          "Identifier": {
            "PURL": "pkg:cargo/icu_normalizer@1.5.0",
            "UID": "c48e9b09f9885027",
            "BOMRef": "pkg:cargo/icu_normalizer@1.5.0"
          },
          "Version": "1.5.0",
          "Licenses": [
            "Unicode-3.0"
          ],
          "DependsOn": [
            "displaydoc@0.2.5",
            "icu_collections@1.5.0",
            "icu_normalizer_data@1.5.0",
            "icu_properties@1.5.1",
            "icu_provider@1.5.0",
            "smallvec@1.15.1",
            "utf16_iter@1.0.5",
            "utf8_iter@1.0.4",
            "write16@1.0.0",
            "zerovec@0.10.4"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "icu_normalizer_data@1.5.0",
          "Name": "icu_normalizer_data",
          "Identifier": {
            "PURL": "pkg:cargo/icu_normalizer_data@1.5.0",
            "UID": "413b52d49e119d4",
            "BOMRef": "pkg:cargo/icu_normalizer_data@1.5.0"
          },
          "Version": "1.5.0",
          "Licenses": [
            "Unicode-3.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "icu_properties@1.5.1",
          "Name": "icu_properties",
          "Identifier": {
            "PURL": "pkg:cargo/icu_properties@1.5.1",
            "UID": "1db0957667838fa8",
            "BOMRef": "pkg:cargo/icu_properties@1.5.1"
          },
          "Version": "1.5.1",
          "Licenses": [
            "Unicode-3.0"
          ],
          "DependsOn": [
            "displaydoc@0.2.5",
            "icu_collections@1.5.0",
            "icu_locid_transform@1.5.0",
            "icu_properties_data@1.5.0",
            "icu_provider@1.5.0",
            "tinystr@0.7.6",
            "zerovec@0.10.4"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "icu_properties_data@1.5.0",
          "Name": "icu_properties_data",
          "Identifier": {
            "PURL": "pkg:cargo/icu_properties_data@1.5.0",
            "UID": "8cf48e98f6307a10",
            "BOMRef": "pkg:cargo/icu_properties_data@1.5.0"
          },
          "Version": "1.5.0",
          "Licenses": [
            "Unicode-3.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "icu_provider@1.5.0",
          "Name": "icu_provider",
          "Identifier": {
            "PURL": "pkg:cargo/icu_provider@1.5.0",
            "UID": "24c2bad0342151e3",
            "BOMRef": "pkg:cargo/icu_provider@1.5.0"
          },
          "Version": "1.5.0",
          "Licenses": [
            "Unicode-3.0"
          ],
          "DependsOn": [
            "displaydoc@0.2.5",
            "icu_locid@1.5.0",
            "icu_provider_macros@1.5.0",
            "stable_deref_trait@1.2.0",
            "tinystr@0.7.6",
            "writeable@0.5.5",
            "yoke@0.7.4",
            "zerofrom@0.1.4",
            "zerovec@0.10.4"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "icu_provider_macros@1.5.0",
          "Name": "icu_provider_macros",
          "Identifier": {
            "PURL": "pkg:cargo/icu_provider_macros@1.5.0",
            "UID": "731e83c23bd76a14",
            "BOMRef": "pkg:cargo/icu_provider_macros@1.5.0"
          },
          "Version": "1.5.0",
          "Licenses": [
            "Unicode-3.0"
          ],
          "DependsOn": [
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@2.0.111"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "ident_case@1.0.1",
          "Name": "ident_case",
          "Identifier": {
            "PURL": "pkg:cargo/ident_case@1.0.1",
            "UID": "ea4904ca4581a3ed",
            "BOMRef": "pkg:cargo/ident_case@1.0.1"
          },
          "Version": "1.0.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "idna@1.1.0",
          "Name": "idna",
          "Identifier": {
            "PURL": "pkg:cargo/idna@1.1.0",
            "UID": "3deb8ca6bdae293f",
            "BOMRef": "pkg:cargo/idna@1.1.0"
          },
          "Version": "1.1.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "idna_adapter@1.2.0",
            "smallvec@1.15.1",
            "utf8_iter@1.0.4"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "idna_adapter@1.2.0",
          "Name": "idna_adapter",
          "Identifier": {
            "PURL": "pkg:cargo/idna_adapter@1.2.0",
            "UID": "6384bd2e08c4d356",
            "BOMRef": "pkg:cargo/idna_adapter@1.2.0"
          },
          "Version": "1.2.0",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "icu_normalizer@1.5.0",
            "icu_properties@1.5.1"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "impl-more@0.1.6",
          "Name": "impl-more",
          "Identifier": {
            "PURL": "pkg:cargo/impl-more@0.1.6",
            "UID": "46e717247a402f5c",
            "BOMRef": "pkg:cargo/impl-more@0.1.6"
          },
          "Version": "0.1.6",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "include-flate@0.3.0",
          "Name": "include-flate",
          "Identifier": {
            "PURL": "pkg:cargo/include-flate@0.3.0",
            "UID": "a4705d3691cd5ec1",
            "BOMRef": "pkg:cargo/include-flate@0.3.0"
          },
          "Version": "0.3.0",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "include-flate-codegen@0.2.0",
            "lazy_static@1.5.0",
            "libflate@2.1.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "include-flate-codegen@0.2.0",
          "Name": "include-flate-codegen",
          "Identifier": {
            "PURL": "pkg:cargo/include-flate-codegen@0.2.0",
            "UID": "6443e7e43ddd8dcc",
            "BOMRef": "pkg:cargo/include-flate-codegen@0.2.0"
          },
          "Version": "0.2.0",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "libflate@2.1.0",
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@2.0.111"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "indexmap@1.9.2",
          "Name": "indexmap",
          "Identifier": {
            "PURL": "pkg:cargo/indexmap@1.9.2",
            "UID": "4f42bff790512d7f",
            "BOMRef": "pkg:cargo/indexmap@1.9.2"
          },
          "Version": "1.9.2",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "hashbrown@0.12.3",
            "serde@1.0.226"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "indexmap@2.11.4",
          "Name": "indexmap",
          "Identifier": {
            "PURL": "pkg:cargo/indexmap@2.11.4",
            "UID": "e2ce4025fe50186b",
            "BOMRef": "pkg:cargo/indexmap@2.11.4"
          },
          "Version": "2.11.4",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "equivalent@1.0.1",
            "hashbrown@0.15.2",
            "serde@1.0.226",
            "serde_core@1.0.226"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "indicatif@0.18.3",
          "Name": "indicatif",
          "Identifier": {
            "PURL": "pkg:cargo/indicatif@0.18.3",
            "UID": "6c310f9fe691ab01",
            "BOMRef": "pkg:cargo/indicatif@0.18.3"
          },
          "Version": "0.18.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "console@0.16.0",
            "portable-atomic@1.11.1",
            "rayon@1.11.0",
            "unicode-width@0.2.0",
            "unit-prefix@0.5.1",
            "web-time@1.1.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "indoc@2.0.6",
          "Name": "indoc",
          "Identifier": {
            "PURL": "pkg:cargo/indoc@2.0.6",
            "UID": "c79844c0f8265ccc",
            "BOMRef": "pkg:cargo/indoc@2.0.6"
          },
          "Version": "2.0.6",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "integer-encoding@4.1.0",
          "Name": "integer-encoding",
          "Identifier": {
            "PURL": "pkg:cargo/integer-encoding@4.1.0",
            "UID": "378c0032c20b54e8",
            "BOMRef": "pkg:cargo/integer-encoding@4.1.0"
          },
          "Version": "4.1.0",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "inventory@0.3.14",
          "Name": "inventory",
          "Identifier": {
            "PURL": "pkg:cargo/inventory@0.3.14",
            "UID": "b7e81c1e5c186963",
            "BOMRef": "pkg:cargo/inventory@0.3.14"
          },
          "Version": "0.3.14",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "io-uring@0.7.11",
          "Name": "io-uring",
          "Identifier": {
            "PURL": "pkg:cargo/io-uring@0.7.11",
            "UID": "c639498d136c8e73",
            "BOMRef": "pkg:cargo/io-uring@0.7.11"
          },
          "Version": "0.7.11",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "bitflags@2.9.1",
            "cfg-if@1.0.0",
            "libc@0.2.174"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "ipnet@2.11.0",
          "Name": "ipnet",
          "Identifier": {
            "PURL": "pkg:cargo/ipnet@2.11.0",
            "UID": "801af5f6b43892e4",
            "BOMRef": "pkg:cargo/ipnet@2.11.0"
          },
          "Version": "2.11.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "irg-kvariants@0.1.1",
          "Name": "irg-kvariants",
          "Identifier": {
            "PURL": "pkg:cargo/irg-kvariants@0.1.1",
            "UID": "2448c62bf066bd76",
            "BOMRef": "pkg:cargo/irg-kvariants@0.1.1"
          },
          "Version": "0.1.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "csv@1.4.0",
            "once_cell@1.21.3",
            "serde@1.0.226"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "iri-string@0.7.8",
          "Name": "iri-string",
          "Identifier": {
            "PURL": "pkg:cargo/iri-string@0.7.8",
            "UID": "8051df4d68d2f133",
            "BOMRef": "pkg:cargo/iri-string@0.7.8"
          },
          "Version": "0.7.8",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "memchr@2.7.4",
            "serde@1.0.226"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "is_sorted@0.1.1",
          "Name": "is_sorted",
          "Identifier": {
            "PURL": "pkg:cargo/is_sorted@0.1.1",
            "UID": "4a39c125422ebce9",
            "BOMRef": "pkg:cargo/is_sorted@0.1.1"
          },
          "Version": "0.1.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "itertools@0.10.5",
          "Name": "itertools",
          "Identifier": {
            "PURL": "pkg:cargo/itertools@0.10.5",
            "UID": "7c6308febe40ff3a",
            "BOMRef": "pkg:cargo/itertools@0.10.5"
          },
          "Version": "0.10.5",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "either@1.13.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "itertools@0.12.1",
          "Name": "itertools",
          "Identifier": {
            "PURL": "pkg:cargo/itertools@0.12.1",
            "UID": "3433d6a895cd657c",
            "BOMRef": "pkg:cargo/itertools@0.12.1"
          },
          "Version": "0.12.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "either@1.13.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "itertools@0.13.0",
          "Name": "itertools",
          "Identifier": {
            "PURL": "pkg:cargo/itertools@0.13.0",
            "UID": "2efdf61d143e163e",
            "BOMRef": "pkg:cargo/itertools@0.13.0"
          },
          "Version": "0.13.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "either@1.13.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "itertools@0.14.0",
          "Name": "itertools",
          "Identifier": {
            "PURL": "pkg:cargo/itertools@0.14.0",
            "UID": "88c07647d2d63f25",
            "BOMRef": "pkg:cargo/itertools@0.14.0"
          },
          "Version": "0.14.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "either@1.13.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "itoa@1.0.5",
          "Name": "itoa",
          "Identifier": {
            "PURL": "pkg:cargo/itoa@1.0.5",
            "UID": "2ecb3359454a64b5",
            "BOMRef": "pkg:cargo/itoa@1.0.5"
          },
          "Version": "1.0.5",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "jieba-macros@0.7.1",
          "Name": "jieba-macros",
          "Identifier": {
            "PURL": "pkg:cargo/jieba-macros@0.7.1",
            "UID": "97f30c94ec423d87",
            "BOMRef": "pkg:cargo/jieba-macros@0.7.1"
          },
          "Version": "0.7.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "phf_codegen@0.11.2"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "jieba-rs@0.7.3",
          "Name": "jieba-rs",
          "Identifier": {
            "PURL": "pkg:cargo/jieba-rs@0.7.3",
            "UID": "5df63d5526a993e4",
            "BOMRef": "pkg:cargo/jieba-rs@0.7.3"
          },
          "Version": "0.7.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "cedarwood@0.4.6",
            "fxhash@0.2.1",
            "include-flate@0.3.0",
            "jieba-macros@0.7.1",
            "lazy_static@1.5.0",
            "phf@0.11.2",
            "regex@1.11.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "jiff@0.2.15",
          "Name": "jiff",
          "Identifier": {
            "PURL": "pkg:cargo/jiff@0.2.15",
            "UID": "ce3be1e8eed3421c",
            "BOMRef": "pkg:cargo/jiff@0.2.15"
          },
          "Version": "0.2.15",
          "Licenses": [
            "Unlicense OR MIT"
          ],
          "DependsOn": [
            "jiff-static@0.2.15",
            "log@0.4.28",
            "portable-atomic-util@0.2.4",
            "portable-atomic@1.11.1",
            "serde@1.0.226"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "jiff-static@0.2.15",
          "Name": "jiff-static",
          "Identifier": {
            "PURL": "pkg:cargo/jiff-static@0.2.15",
            "UID": "f4fa606c2ea7c1db",
            "BOMRef": "pkg:cargo/jiff-static@0.2.15"
          },
          "Version": "0.2.15",
          "Licenses": [
            "Unlicense OR MIT"
          ],
          "DependsOn": [
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@2.0.111"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "js-sys@0.3.77",
          "Name": "js-sys",
          "Identifier": {
            "PURL": "pkg:cargo/js-sys@0.3.77",
            "UID": "9d406baa34d66008",
            "BOMRef": "pkg:cargo/js-sys@0.3.77"
          },
          "Version": "0.3.77",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "once_cell@1.21.3",
            "wasm-bindgen@0.2.100"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "jsonwebtoken@10.0.0",
          "Name": "jsonwebtoken",
          "Identifier": {
            "PURL": "pkg:cargo/jsonwebtoken@10.0.0",
            "UID": "252ad445a82df3e0",
            "BOMRef": "pkg:cargo/jsonwebtoken@10.0.0"
          },
          "Version": "10.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "base64@0.22.0",
            "ed25519-dalek@2.2.0",
            "getrandom@0.2.11",
            "hmac@0.12.1",
            "js-sys@0.3.77",
            "p256@0.13.2",
            "p384@0.13.1",
            "pem@3.0.3",
            "rand@0.8.5",
            "rsa@0.9.8",
            "serde@1.0.226",
            "serde_json@1.0.145",
            "sha2@0.10.9",
            "signature@2.2.0",
            "simple_asn1@0.6.2"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "language-tags@0.3.2",
          "Name": "language-tags",
          "Identifier": {
            "PURL": "pkg:cargo/language-tags@0.3.2",
            "UID": "f61b9a6ab1066994",
            "BOMRef": "pkg:cargo/language-tags@0.3.2"
          },
          "Version": "0.3.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "lazy_static@1.5.0",
          "Name": "lazy_static",
          "Identifier": {
            "PURL": "pkg:cargo/lazy_static@1.5.0",
            "UID": "7394216650ecdb5a",
            "BOMRef": "pkg:cargo/lazy_static@1.5.0"
          },
          "Version": "1.5.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "spin@0.9.8"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "libc@0.2.174",
          "Name": "libc",
          "Identifier": {
            "PURL": "pkg:cargo/libc@0.2.174",
            "UID": "f066785d85667e9",
            "BOMRef": "pkg:cargo/libc@0.2.174"
          },
          "Version": "0.2.174",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "libflate@1.4.0",
          "Name": "libflate",
          "Identifier": {
            "PURL": "pkg:cargo/libflate@1.4.0",
            "UID": "e2ae36f694631284",
            "BOMRef": "pkg:cargo/libflate@1.4.0"
          },
          "Version": "1.4.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "adler32@1.2.0",
            "crc32fast@1.3.2",
            "libflate_lz77@1.2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "libflate@2.1.0",
          "Name": "libflate",
          "Identifier": {
            "PURL": "pkg:cargo/libflate@2.1.0",
            "UID": "8fddbd22142883e0",
            "BOMRef": "pkg:cargo/libflate@2.1.0"
          },
          "Version": "2.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "adler32@1.2.0",
            "core2@0.4.0",
            "crc32fast@1.3.2",
            "dary_heap@0.3.7",
            "libflate_lz77@2.1.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "libflate_lz77@1.2.0",
          "Name": "libflate_lz77",
          "Identifier": {
            "PURL": "pkg:cargo/libflate_lz77@1.2.0",
            "UID": "1f1b08684272a535",
            "BOMRef": "pkg:cargo/libflate_lz77@1.2.0"
          },
          "Version": "1.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "rle-decode-fast@1.0.3"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "libflate_lz77@2.1.0",
          "Name": "libflate_lz77",
          "Identifier": {
            "PURL": "pkg:cargo/libflate_lz77@2.1.0",
            "UID": "e8dede070ef7956",
            "BOMRef": "pkg:cargo/libflate_lz77@2.1.0"
          },
          "Version": "2.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "core2@0.4.0",
            "hashbrown@0.14.2",
            "rle-decode-fast@1.0.3"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "libloading@0.8.5",
          "Name": "libloading",
          "Identifier": {
            "PURL": "pkg:cargo/libloading@0.8.5",
            "UID": "24f73f3947655e94",
            "BOMRef": "pkg:cargo/libloading@0.8.5"
          },
          "Version": "0.8.5",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "cfg-if@1.0.0",
            "windows-targets@0.52.6"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "libm@0.2.6",
          "Name": "libm",
          "Identifier": {
            "PURL": "pkg:cargo/libm@0.2.6",
            "UID": "e405253569b36ff3",
            "BOMRef": "pkg:cargo/libm@0.2.6"
          },
          "Version": "0.2.6",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "librocksdb-sys@0.17.3+10.4.2",
          "Name": "librocksdb-sys",
          "Identifier": {
            "PURL": "pkg:cargo/librocksdb-sys@0.17.3%2B10.4.2",
            "UID": "dcd8c38ee4d78424",
            "BOMRef": "pkg:cargo/librocksdb-sys@0.17.3%2B10.4.2"
          },
          "Version": "0.17.3+10.4.2",
          "Licenses": [
            "MIT OR Apache-2.0 OR BSD-3-Clause"
          ],
          "DependsOn": [
            "bzip2-sys@0.1.11+1.0.8",
            "libc@0.2.174",
            "libz-sys@1.1.8",
            "lz4-sys@1.11.1+lz4-1.10.0",
            "zstd-sys@2.0.9+zstd.1.5.5"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "libz-sys@1.1.8",
          "Name": "libz-sys",
          "Identifier": {
            "PURL": "pkg:cargo/libz-sys@1.1.8",
            "UID": "7a7d8d6338b4092",
            "BOMRef": "pkg:cargo/libz-sys@1.1.8"
          },
          "Version": "1.1.8",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "link-cplusplus@1.0.8",
          "Name": "link-cplusplus",
          "Identifier": {
            "PURL": "pkg:cargo/link-cplusplus@1.0.8",
            "UID": "2246d5c3d0ace846",
            "BOMRef": "pkg:cargo/link-cplusplus@1.0.8"
          },
          "Version": "1.0.8",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "linux-raw-sys@0.4.14",
          "Name": "linux-raw-sys",
          "Identifier": {
            "PURL": "pkg:cargo/linux-raw-sys@0.4.14",
            "UID": "b754212b777edfef",
            "BOMRef": "pkg:cargo/linux-raw-sys@0.4.14"
          },
          "Version": "0.4.14",
          "Licenses": [
            "Apache-2.0 OR Apache-2.0 OR MIT"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "linux-raw-sys@0.9.2",
          "Name": "linux-raw-sys",
          "Identifier": {
            "PURL": "pkg:cargo/linux-raw-sys@0.9.2",
            "UID": "33b4ae192fcd43f5",
            "BOMRef": "pkg:cargo/linux-raw-sys@0.9.2"
          },
          "Version": "0.9.2",
          "Licenses": [
            "Apache-2.0 OR Apache-2.0 OR MIT"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "litemap@0.7.3",
          "Name": "litemap",
          "Identifier": {
            "PURL": "pkg:cargo/litemap@0.7.3",
            "UID": "1596696196f71a40",
            "BOMRef": "pkg:cargo/litemap@0.7.3"
          },
          "Version": "0.7.3",
          "Licenses": [
            "Unicode-3.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "local-channel@0.1.3",
          "Name": "local-channel",
          "Identifier": {
            "PURL": "pkg:cargo/local-channel@0.1.3",
            "UID": "24ee693c78a22ea0",
            "BOMRef": "pkg:cargo/local-channel@0.1.3"
          },
          "Version": "0.1.3",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "futures-core@0.3.31",
            "futures-sink@0.3.31",
            "futures-util@0.3.31",
            "local-waker@0.1.3"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "local-waker@0.1.3",
          "Name": "local-waker",
          "Identifier": {
            "PURL": "pkg:cargo/local-waker@0.1.3",
            "UID": "ae18465c53d5e385",
            "BOMRef": "pkg:cargo/local-waker@0.1.3"
          },
          "Version": "0.1.3",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "lock_api@0.4.14",
          "Name": "lock_api",
          "Identifier": {
            "PURL": "pkg:cargo/lock_api@0.4.14",
            "UID": "4d7c9d8044b59b47",
            "BOMRef": "pkg:cargo/lock_api@0.4.14"
          },
          "Version": "0.4.14",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "scopeguard@1.1.0",
            "serde@1.0.226"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "log@0.4.28",
          "Name": "log",
          "Identifier": {
            "PURL": "pkg:cargo/log@0.4.28",
            "UID": "731e20fe0833daf3",
            "BOMRef": "pkg:cargo/log@0.4.28"
          },
          "Version": "0.4.28",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "loom@0.7.1",
          "Name": "loom",
          "Identifier": {
            "PURL": "pkg:cargo/loom@0.7.1",
            "UID": "e27fe20d2d94e431",
            "BOMRef": "pkg:cargo/loom@0.7.1"
          },
          "Version": "0.7.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "cfg-if@1.0.0",
            "generator@0.7.4",
            "scoped-tls@1.0.1",
            "tracing-subscriber@0.3.22",
            "tracing@0.1.43"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "lz4-sys@1.11.1+lz4-1.10.0",
          "Name": "lz4-sys",
          "Identifier": {
            "PURL": "pkg:cargo/lz4-sys@1.11.1%2Blz4-1.10.0",
            "UID": "ffab1049f9c6bc45",
            "BOMRef": "pkg:cargo/lz4-sys@1.11.1%2Blz4-1.10.0"
          },
          "Version": "1.11.1+lz4-1.10.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "libc@0.2.174"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "lz4_flex@0.12.0",
          "Name": "lz4_flex",
          "Identifier": {
            "PURL": "pkg:cargo/lz4_flex@0.12.0",
            "UID": "be3bb31e0c7c42a2",
            "BOMRef": "pkg:cargo/lz4_flex@0.12.0"
          },
          "Version": "0.12.0",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "macro_rules_attribute@0.2.2",
          "Name": "macro_rules_attribute",
          "Identifier": {
            "PURL": "pkg:cargo/macro_rules_attribute@0.2.2",
            "UID": "b41c96ec58a745bd",
            "BOMRef": "pkg:cargo/macro_rules_attribute@0.2.2"
          },
          "Version": "0.2.2",
          "Licenses": [
            "Apache-2.0 OR MIT OR Zlib"
          ],
          "DependsOn": [
            "macro_rules_attribute-proc_macro@0.2.2",
            "paste@1.0.11"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "macro_rules_attribute-proc_macro@0.2.2",
          "Name": "macro_rules_attribute-proc_macro",
          "Identifier": {
            "PURL": "pkg:cargo/macro_rules_attribute-proc_macro@0.2.2",
            "UID": "801ddef159beeef0",
            "BOMRef": "pkg:cargo/macro_rules_attribute-proc_macro@0.2.2"
          },
          "Version": "0.2.2",
          "Licenses": [
            "Apache-2.0 OR MIT OR Zlib"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "matchers@0.2.0",
          "Name": "matchers",
          "Identifier": {
            "PURL": "pkg:cargo/matchers@0.2.0",
            "UID": "41e41438a52fb688",
            "BOMRef": "pkg:cargo/matchers@0.2.0"
          },
          "Version": "0.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "regex-automata@0.4.8"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "matchit@0.7.0",
          "Name": "matchit",
          "Identifier": {
            "PURL": "pkg:cargo/matchit@0.7.0",
            "UID": "c5d6d676da1c2fc6",
            "BOMRef": "pkg:cargo/matchit@0.7.0"
          },
          "Version": "0.7.0",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "md-5@0.10.6",
          "Name": "md-5",
          "Identifier": {
            "PURL": "pkg:cargo/md-5@0.10.6",
            "UID": "433f56b55360b68",
            "BOMRef": "pkg:cargo/md-5@0.10.6"
          },
          "Version": "0.10.6",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "cfg-if@1.0.0",
            "digest@0.10.7"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "memchr@2.7.4",
          "Name": "memchr",
          "Identifier": {
            "PURL": "pkg:cargo/memchr@2.7.4",
            "UID": "e1118907298b260b",
            "BOMRef": "pkg:cargo/memchr@2.7.4"
          },
          "Version": "2.7.4",
          "Licenses": [
            "Unlicense OR MIT"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "memmap2@0.9.8",
          "Name": "memmap2",
          "Identifier": {
            "PURL": "pkg:cargo/memmap2@0.9.8",
            "UID": "fc765506bd407edb",
            "BOMRef": "pkg:cargo/memmap2@0.9.8"
          },
          "Version": "0.9.8",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "libc@0.2.174"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "memoffset@0.7.1",
          "Name": "memoffset",
          "Identifier": {
            "PURL": "pkg:cargo/memoffset@0.7.1",
            "UID": "ed30b7f57b7bfdab",
            "BOMRef": "pkg:cargo/memoffset@0.7.1"
          },
          "Version": "0.7.1",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "memoffset@0.9.1",
          "Name": "memoffset",
          "Identifier": {
            "PURL": "pkg:cargo/memoffset@0.9.1",
            "UID": "1c0092d2f4dd1f98",
            "BOMRef": "pkg:cargo/memoffset@0.9.1"
          },
          "Version": "0.9.1",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "mime@0.3.16",
          "Name": "mime",
          "Identifier": {
            "PURL": "pkg:cargo/mime@0.3.16",
            "UID": "173339e18c11c6e9",
            "BOMRef": "pkg:cargo/mime@0.3.16"
          },
          "Version": "0.3.16",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "mime_guess@2.0.4",
          "Name": "mime_guess",
          "Identifier": {
            "PURL": "pkg:cargo/mime_guess@2.0.4",
            "UID": "f007e7c9533131a6",
            "BOMRef": "pkg:cargo/mime_guess@2.0.4"
          },
          "Version": "2.0.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "mime@0.3.16",
            "unicase@2.6.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "minimal-lexical@0.2.1",
          "Name": "minimal-lexical",
          "Identifier": {
            "PURL": "pkg:cargo/minimal-lexical@0.2.1",
            "UID": "78aefe9bcf87f59f",
            "BOMRef": "pkg:cargo/minimal-lexical@0.2.1"
          },
          "Version": "0.2.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "miniz_oxide@0.6.2",
          "Name": "miniz_oxide",
          "Identifier": {
            "PURL": "pkg:cargo/miniz_oxide@0.6.2",
            "UID": "48b76e3ef00f1ea7",
            "BOMRef": "pkg:cargo/miniz_oxide@0.6.2"
          },
          "Version": "0.6.2",
          "Licenses": [
            "MIT OR Zlib OR Apache-2.0"
          ],
          "DependsOn": [
            "adler@1.0.2"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "miniz_oxide@0.8.5",
          "Name": "miniz_oxide",
          "Identifier": {
            "PURL": "pkg:cargo/miniz_oxide@0.8.5",
            "UID": "deb9fb99db8efec9",
            "BOMRef": "pkg:cargo/miniz_oxide@0.8.5"
          },
          "Version": "0.8.5",
          "Licenses": [
            "MIT OR Zlib OR Apache-2.0"
          ],
          "DependsOn": [
            "adler2@2.0.0",
            "simd-adler32@0.3.7"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "mio@1.0.1",
          "Name": "mio",
          "Identifier": {
            "PURL": "pkg:cargo/mio@1.0.1",
            "UID": "81d5fbabeeeb9991",
            "BOMRef": "pkg:cargo/mio@1.0.1"
          },
          "Version": "1.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "hermit-abi@0.3.9",
            "libc@0.2.174",
            "log@0.4.28",
            "wasi@0.11.0+wasi-snapshot-preview1",
            "windows-sys@0.52.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "names@0.14.0",
          "Name": "names",
          "Identifier": {
            "PURL": "pkg:cargo/names@0.14.0",
            "UID": "11f4dbf76a7dbe0c",
            "BOMRef": "pkg:cargo/names@0.14.0"
          },
          "Version": "0.14.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "rand@0.8.5"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "nix@0.25.1",
          "Name": "nix",
          "Identifier": {
            "PURL": "pkg:cargo/nix@0.25.1",
            "UID": "dffe834fbf51260f",
            "BOMRef": "pkg:cargo/nix@0.25.1"
          },
          "Version": "0.25.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "bitflags@1.3.2",
            "cfg-if@1.0.0",
            "libc@0.2.174"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "nix@0.27.1",
          "Name": "nix",
          "Identifier": {
            "PURL": "pkg:cargo/nix@0.27.1",
            "UID": "20a67793da8474b1",
            "BOMRef": "pkg:cargo/nix@0.27.1"
          },
          "Version": "0.27.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "bitflags@2.9.1",
            "cfg-if@1.0.0",
            "libc@0.2.174"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "nix@0.29.0",
          "Name": "nix",
          "Identifier": {
            "PURL": "pkg:cargo/nix@0.29.0",
            "UID": "786297349cc0774f",
            "BOMRef": "pkg:cargo/nix@0.29.0"
          },
          "Version": "0.29.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "bitflags@2.9.1",
            "cfg-if@1.0.0",
            "libc@0.2.174"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "nodrop@0.1.14",
          "Name": "nodrop",
          "Identifier": {
            "PURL": "pkg:cargo/nodrop@0.1.14",
            "UID": "94b9f04fbb3facda",
            "BOMRef": "pkg:cargo/nodrop@0.1.14"
          },
          "Version": "0.1.14",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "nom@7.1.3",
          "Name": "nom",
          "Identifier": {
            "PURL": "pkg:cargo/nom@7.1.3",
            "UID": "a0e72c8deb7f0a77",
            "BOMRef": "pkg:cargo/nom@7.1.3"
          },
          "Version": "7.1.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "memchr@2.7.4",
            "minimal-lexical@0.2.1"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "nom@8.0.0",
          "Name": "nom",
          "Identifier": {
            "PURL": "pkg:cargo/nom@8.0.0",
            "UID": "604c4bb4e1acfc10",
            "BOMRef": "pkg:cargo/nom@8.0.0"
          },
          "Version": "8.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "memchr@2.7.4"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "ntapi@0.4.1",
          "Name": "ntapi",
          "Identifier": {
            "PURL": "pkg:cargo/ntapi@0.4.1",
            "UID": "5e29993a0433f4c2",
            "BOMRef": "pkg:cargo/ntapi@0.4.1"
          },
          "Version": "0.4.1",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "winapi@0.3.9"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "nu-ansi-term@0.50.1",
          "Name": "nu-ansi-term",
          "Identifier": {
            "PURL": "pkg:cargo/nu-ansi-term@0.50.1",
            "UID": "8d1dc684561b9f3",
            "BOMRef": "pkg:cargo/nu-ansi-term@0.50.1"
          },
          "Version": "0.50.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "windows-sys@0.52.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "num-bigint@0.4.4",
          "Name": "num-bigint",
          "Identifier": {
            "PURL": "pkg:cargo/num-bigint@0.4.4",
            "UID": "fc3af5f5381094ec",
            "BOMRef": "pkg:cargo/num-bigint@0.4.4"
          },
          "Version": "0.4.4",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "num-integer@0.1.46",
            "num-traits@0.2.19"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "num-bigint-dig@0.8.4",
          "Name": "num-bigint-dig",
          "Identifier": {
            "PURL": "pkg:cargo/num-bigint-dig@0.8.4",
            "UID": "f7245f6911cc0bca",
            "BOMRef": "pkg:cargo/num-bigint-dig@0.8.4"
          },
          "Version": "0.8.4",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "byteorder@1.5.0",
            "lazy_static@1.5.0",
            "libm@0.2.6",
            "num-integer@0.1.46",
            "num-iter@0.1.45",
            "num-traits@0.2.19",
            "rand@0.8.5",
            "smallvec@1.15.1",
            "zeroize@1.8.1"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "num-cmp@0.1.0",
          "Name": "num-cmp",
          "Identifier": {
            "PURL": "pkg:cargo/num-cmp@0.1.0",
            "UID": "88b1b753dbcaf078",
            "BOMRef": "pkg:cargo/num-cmp@0.1.0"
          },
          "Version": "0.1.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "num-derive@0.4.2",
          "Name": "num-derive",
          "Identifier": {
            "PURL": "pkg:cargo/num-derive@0.4.2",
            "UID": "759f9899ecbe2f4a",
            "BOMRef": "pkg:cargo/num-derive@0.4.2"
          },
          "Version": "0.4.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@2.0.111"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "num-integer@0.1.46",
          "Name": "num-integer",
          "Identifier": {
            "PURL": "pkg:cargo/num-integer@0.1.46",
            "UID": "9d4299d24ca8d821",
            "BOMRef": "pkg:cargo/num-integer@0.1.46"
          },
          "Version": "0.1.46",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "num-traits@0.2.19"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "num-iter@0.1.45",
          "Name": "num-iter",
          "Identifier": {
            "PURL": "pkg:cargo/num-iter@0.1.45",
            "UID": "865e4a26f40cdf60",
            "BOMRef": "pkg:cargo/num-iter@0.1.45"
          },
          "Version": "0.1.45",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "num-integer@0.1.46",
            "num-traits@0.2.19"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "num-traits@0.2.19",
          "Name": "num-traits",
          "Identifier": {
            "PURL": "pkg:cargo/num-traits@0.2.19",
            "UID": "4ca0bc7f4a4b4b35",
            "BOMRef": "pkg:cargo/num-traits@0.2.19"
          },
          "Version": "0.2.19",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "libm@0.2.6"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "num_cpus@1.17.0",
          "Name": "num_cpus",
          "Identifier": {
            "PURL": "pkg:cargo/num_cpus@1.17.0",
            "UID": "887dfc5756b7004e",
            "BOMRef": "pkg:cargo/num_cpus@1.17.0"
          },
          "Version": "1.17.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "hermit-abi@0.5.1",
            "libc@0.2.174"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "objc2-core-foundation@0.3.1",
          "Name": "objc2-core-foundation",
          "Identifier": {
            "PURL": "pkg:cargo/objc2-core-foundation@0.3.1",
            "UID": "84594c584639557e",
            "BOMRef": "pkg:cargo/objc2-core-foundation@0.3.1"
          },
          "Version": "0.3.1",
          "Licenses": [
            "Zlib OR Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "bitflags@2.9.1"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "objc2-io-kit@0.3.1",
          "Name": "objc2-io-kit",
          "Identifier": {
            "PURL": "pkg:cargo/objc2-io-kit@0.3.1",
            "UID": "98b0306161b0a9e6",
            "BOMRef": "pkg:cargo/objc2-io-kit@0.3.1"
          },
          "Version": "0.3.1",
          "Licenses": [
            "Zlib OR Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "libc@0.2.174",
            "objc2-core-foundation@0.3.1"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "object@0.30.0",
          "Name": "object",
          "Identifier": {
            "PURL": "pkg:cargo/object@0.30.0",
            "UID": "d6b73c82ae9e6951",
            "BOMRef": "pkg:cargo/object@0.30.0"
          },
          "Version": "0.30.0",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "memchr@2.7.4"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "object_store@0.12.4",
          "Name": "object_store",
          "Identifier": {
            "PURL": "pkg:cargo/object_store@0.12.4",
            "UID": "2e78fa935e64ae98",
            "BOMRef": "pkg:cargo/object_store@0.12.4"
          },
          "Version": "0.12.4",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "async-trait@0.1.89",
            "base64@0.22.0",
            "bytes@1.10.1",
            "chrono@0.4.42",
            "form_urlencoded@1.2.2",
            "futures@0.3.31",
            "http-body-util@0.1.2",
            "http@1.3.1",
            "humantime@2.3.0",
            "hyper@1.6.0",
            "itertools@0.14.0",
            "md-5@0.10.6",
            "parking_lot@0.12.5",
            "percent-encoding@2.3.2",
            "quick-xml@0.38.0",
            "rand@0.9.2",
            "reqwest@0.12.24",
            "ring@0.17.13",
            "serde@1.0.226",
            "serde_json@1.0.145",
            "serde_urlencoded@0.7.1",
            "thiserror@2.0.17",
            "tokio@1.48.0",
            "tracing@0.1.43",
            "url@2.5.7",
            "walkdir@2.5.0",
            "wasm-bindgen-futures@0.4.42",
            "web-time@1.1.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "once_cell@1.21.3",
          "Name": "once_cell",
          "Identifier": {
            "PURL": "pkg:cargo/once_cell@1.21.3",
            "UID": "a0c85c95c85c86de",
            "BOMRef": "pkg:cargo/once_cell@1.21.3"
          },
          "Version": "1.21.3",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "openssl-probe@0.1.5",
          "Name": "openssl-probe",
          "Identifier": {
            "PURL": "pkg:cargo/openssl-probe@0.1.5",
            "UID": "28d04b4596b3914e",
            "BOMRef": "pkg:cargo/openssl-probe@0.1.5"
          },
          "Version": "0.1.5",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "ordered-float@2.10.1",
          "Name": "ordered-float",
          "Identifier": {
            "PURL": "pkg:cargo/ordered-float@2.10.1",
            "UID": "9544a4383dcbee7c",
            "BOMRef": "pkg:cargo/ordered-float@2.10.1"
          },
          "Version": "2.10.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "num-traits@0.2.19"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "ordered-float@5.1.0",
          "Name": "ordered-float",
          "Identifier": {
            "PURL": "pkg:cargo/ordered-float@5.1.0",
            "UID": "9556353e2e5b1ba4",
            "BOMRef": "pkg:cargo/ordered-float@5.1.0"
          },
          "Version": "5.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "num-traits@0.2.19",
            "rand@0.8.5",
            "schemars@0.8.22",
            "serde@1.0.226"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "p256@0.13.2",
          "Name": "p256",
          "Identifier": {
            "PURL": "pkg:cargo/p256@0.13.2",
            "UID": "7c0940981c014729",
            "BOMRef": "pkg:cargo/p256@0.13.2"
          },
          "Version": "0.13.2",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "ecdsa@0.16.9",
            "elliptic-curve@0.13.8",
            "primeorder@0.13.6",
            "sha2@0.10.9"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "p384@0.13.1",
          "Name": "p384",
          "Identifier": {
            "PURL": "pkg:cargo/p384@0.13.1",
            "UID": "caafe43807c2e950",
            "BOMRef": "pkg:cargo/p384@0.13.1"
          },
          "Version": "0.13.1",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "ecdsa@0.16.9",
            "elliptic-curve@0.13.8",
            "primeorder@0.13.6",
            "sha2@0.10.9"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "parking_lot@0.12.5",
          "Name": "parking_lot",
          "Identifier": {
            "PURL": "pkg:cargo/parking_lot@0.12.5",
            "UID": "c3e9ab4111f7d412",
            "BOMRef": "pkg:cargo/parking_lot@0.12.5"
          },
          "Version": "0.12.5",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "lock_api@0.4.14",
            "parking_lot_core@0.9.12"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "parking_lot_core@0.9.12",
          "Name": "parking_lot_core",
          "Identifier": {
            "PURL": "pkg:cargo/parking_lot_core@0.9.12",
            "UID": "a398935b513f6e18",
            "BOMRef": "pkg:cargo/parking_lot_core@0.9.12"
          },
          "Version": "0.9.12",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "backtrace@0.3.67",
            "cfg-if@1.0.0",
            "libc@0.2.174",
            "petgraph@0.6.2",
            "redox_syscall@0.5.12",
            "smallvec@1.15.1",
            "windows-link@0.2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "parse-size@1.0.0",
          "Name": "parse-size",
          "Identifier": {
            "PURL": "pkg:cargo/parse-size@1.0.0",
            "UID": "cc158fde58acba57",
            "BOMRef": "pkg:cargo/parse-size@1.0.0"
          },
          "Version": "1.0.0",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "paste@1.0.11",
          "Name": "paste",
          "Identifier": {
            "PURL": "pkg:cargo/paste@1.0.11",
            "UID": "254262d5cebd8fc2",
            "BOMRef": "pkg:cargo/paste@1.0.11"
          },
          "Version": "1.0.11",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "path_facts@0.2.1",
          "Name": "path_facts",
          "Identifier": {
            "PURL": "pkg:cargo/path_facts@0.2.1",
            "UID": "1743d2e46705a48f",
            "BOMRef": "pkg:cargo/path_facts@0.2.1"
          },
          "Version": "0.2.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "faccess@0.2.4"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "pathdiff@0.2.3",
          "Name": "pathdiff",
          "Identifier": {
            "PURL": "pkg:cargo/pathdiff@0.2.3",
            "UID": "763ff2f3f26d1378",
            "BOMRef": "pkg:cargo/pathdiff@0.2.3"
          },
          "Version": "0.2.3",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "pem@3.0.3",
          "Name": "pem",
          "Identifier": {
            "PURL": "pkg:cargo/pem@3.0.3",
            "UID": "8b8ba3e58b753798",
            "BOMRef": "pkg:cargo/pem@3.0.3"
          },
          "Version": "3.0.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "base64@0.21.0",
            "serde@1.0.226"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "pem-rfc7468@0.7.0",
          "Name": "pem-rfc7468",
          "Identifier": {
            "PURL": "pkg:cargo/pem-rfc7468@0.7.0",
            "UID": "b791752251767bc7",
            "BOMRef": "pkg:cargo/pem-rfc7468@0.7.0"
          },
          "Version": "0.7.0",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "base64ct@1.8.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "percent-encoding@2.3.2",
          "Name": "percent-encoding",
          "Identifier": {
            "PURL": "pkg:cargo/percent-encoding@2.3.2",
            "UID": "49553f61a85c292",
            "BOMRef": "pkg:cargo/percent-encoding@2.3.2"
          },
          "Version": "2.3.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "permutation_iterator@0.1.2",
          "Name": "permutation_iterator",
          "Identifier": {
            "PURL": "pkg:cargo/permutation_iterator@0.1.2",
            "UID": "1140600feefe9e27",
            "BOMRef": "pkg:cargo/permutation_iterator@0.1.2"
          },
          "Version": "0.1.2",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "blake2-rfc@0.2.18",
            "rand@0.7.3"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "petgraph@0.6.2",
          "Name": "petgraph",
          "Identifier": {
            "PURL": "pkg:cargo/petgraph@0.6.2",
            "UID": "2eb529603300757b",
            "BOMRef": "pkg:cargo/petgraph@0.6.2"
          },
          "Version": "0.6.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "fixedbitset@0.4.2",
            "indexmap@1.9.2"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "ph@0.8.5",
          "Name": "ph",
          "Identifier": {
            "PURL": "pkg:cargo/ph@0.8.5",
            "UID": "9ccea82eee95c5bc",
            "BOMRef": "pkg:cargo/ph@0.8.5"
          },
          "Version": "0.8.5",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "aligned-vec@0.6.1",
            "binout@0.2.1",
            "bitm@0.4.2",
            "dyn_size_of@0.4.2",
            "rayon@1.11.0",
            "seedable_hash@0.1.1"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "phf@0.11.2",
          "Name": "phf",
          "Identifier": {
            "PURL": "pkg:cargo/phf@0.11.2",
            "UID": "b344de7988e52dfc",
            "BOMRef": "pkg:cargo/phf@0.11.2"
          },
          "Version": "0.11.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "phf_shared@0.11.2"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "phf_codegen@0.11.2",
          "Name": "phf_codegen",
          "Identifier": {
            "PURL": "pkg:cargo/phf_codegen@0.11.2",
            "UID": "10fc03c81662e270",
            "BOMRef": "pkg:cargo/phf_codegen@0.11.2"
          },
          "Version": "0.11.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "phf_generator@0.11.2",
            "phf_shared@0.11.2"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "phf_generator@0.11.2",
          "Name": "phf_generator",
          "Identifier": {
            "PURL": "pkg:cargo/phf_generator@0.11.2",
            "UID": "91d4dbece3717d29",
            "BOMRef": "pkg:cargo/phf_generator@0.11.2"
          },
          "Version": "0.11.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "phf_shared@0.11.2",
            "rand@0.8.5"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "phf_shared@0.11.2",
          "Name": "phf_shared",
          "Identifier": {
            "PURL": "pkg:cargo/phf_shared@0.11.2",
            "UID": "31299dd0ed73864a",
            "BOMRef": "pkg:cargo/phf_shared@0.11.2"
          },
          "Version": "0.11.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "siphasher@0.3.10"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "pin-project@1.0.12",
          "Name": "pin-project",
          "Identifier": {
            "PURL": "pkg:cargo/pin-project@1.0.12",
            "UID": "723cbf72aa44145b",
            "BOMRef": "pkg:cargo/pin-project@1.0.12"
          },
          "Version": "1.0.12",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "pin-project-internal@1.0.12"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "pin-project-internal@1.0.12",
          "Name": "pin-project-internal",
          "Identifier": {
            "PURL": "pkg:cargo/pin-project-internal@1.0.12",
            "UID": "7c0a5ead955f566a",
            "BOMRef": "pkg:cargo/pin-project-internal@1.0.12"
          },
          "Version": "1.0.12",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@1.0.107"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "pin-project-lite@0.2.12",
          "Name": "pin-project-lite",
          "Identifier": {
            "PURL": "pkg:cargo/pin-project-lite@0.2.12",
            "UID": "89eace1a263e7fb2",
            "BOMRef": "pkg:cargo/pin-project-lite@0.2.12"
          },
          "Version": "0.2.12",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "pin-utils@0.1.0",
          "Name": "pin-utils",
          "Identifier": {
            "PURL": "pkg:cargo/pin-utils@0.1.0",
            "UID": "a322167193d1ef2",
            "BOMRef": "pkg:cargo/pin-utils@0.1.0"
          },
          "Version": "0.1.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "pkcs1@0.7.5",
          "Name": "pkcs1",
          "Identifier": {
            "PURL": "pkg:cargo/pkcs1@0.7.5",
            "UID": "ff5bc5da52182416",
            "BOMRef": "pkg:cargo/pkcs1@0.7.5"
          },
          "Version": "0.7.5",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "der@0.7.10",
            "pkcs8@0.10.2",
            "spki@0.7.3"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "pkcs8@0.10.2",
          "Name": "pkcs8",
          "Identifier": {
            "PURL": "pkg:cargo/pkcs8@0.10.2",
            "UID": "647bb2f7dce7963a",
            "BOMRef": "pkg:cargo/pkcs8@0.10.2"
          },
          "Version": "0.10.2",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "der@0.7.10",
            "spki@0.7.3"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "portable-atomic@1.11.1",
          "Name": "portable-atomic",
          "Identifier": {
            "PURL": "pkg:cargo/portable-atomic@1.11.1",
            "UID": "9941be83dd7c8405",
            "BOMRef": "pkg:cargo/portable-atomic@1.11.1"
          },
          "Version": "1.11.1",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "portable-atomic-util@0.2.4",
          "Name": "portable-atomic-util",
          "Identifier": {
            "PURL": "pkg:cargo/portable-atomic-util@0.2.4",
            "UID": "59c1ea08c14254ab",
            "BOMRef": "pkg:cargo/portable-atomic-util@0.2.4"
          },
          "Version": "0.2.4",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "portable-atomic@1.11.1"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "pprof2@0.13.1",
          "Name": "pprof2",
          "Identifier": {
            "PURL": "pkg:cargo/pprof2@0.13.1",
            "UID": "ee55ff407b95058",
            "BOMRef": "pkg:cargo/pprof2@0.13.1"
          },
          "Version": "0.13.1",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "backtrace@0.3.67",
            "cfg-if@1.0.0",
            "findshlibs@0.10.2",
            "libc@0.2.174",
            "log@0.4.28",
            "nix@0.27.1",
            "once_cell@1.21.3",
            "parking_lot@0.12.5",
            "smallvec@1.15.1",
            "symbolic-demangle@12.12.3",
            "tempfile@3.23.0",
            "thiserror@2.0.17"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "ppv-lite86@0.2.17",
          "Name": "ppv-lite86",
          "Identifier": {
            "PURL": "pkg:cargo/ppv-lite86@0.2.17",
            "UID": "979b4bec07d41f74",
            "BOMRef": "pkg:cargo/ppv-lite86@0.2.17"
          },
          "Version": "0.2.17",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "presser@0.3.1",
          "Name": "presser",
          "Identifier": {
            "PURL": "pkg:cargo/presser@0.3.1",
            "UID": "2d3d6d7eafd3e6fd",
            "BOMRef": "pkg:cargo/presser@0.3.1"
          },
          "Version": "0.3.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "primeorder@0.13.6",
          "Name": "primeorder",
          "Identifier": {
            "PURL": "pkg:cargo/primeorder@0.13.6",
            "UID": "f820139ed5b22fcd",
            "BOMRef": "pkg:cargo/primeorder@0.13.6"
          },
          "Version": "0.13.6",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "elliptic-curve@0.13.8"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "proc-macro-error@1.0.4",
          "Name": "proc-macro-error",
          "Identifier": {
            "PURL": "pkg:cargo/proc-macro-error@1.0.4",
            "UID": "260169f2ee28e8b5",
            "BOMRef": "pkg:cargo/proc-macro-error@1.0.4"
          },
          "Version": "1.0.4",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "proc-macro-error-attr@1.0.4",
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@1.0.107"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "proc-macro-error-attr@1.0.4",
          "Name": "proc-macro-error-attr",
          "Identifier": {
            "PURL": "pkg:cargo/proc-macro-error-attr@1.0.4",
            "UID": "495da40d752d7bd1",
            "BOMRef": "pkg:cargo/proc-macro-error-attr@1.0.4"
          },
          "Version": "1.0.4",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "proc-macro2@1.0.101",
            "quote@1.0.42"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "proc-macro-error-attr2@2.0.0",
          "Name": "proc-macro-error-attr2",
          "Identifier": {
            "PURL": "pkg:cargo/proc-macro-error-attr2@2.0.0",
            "UID": "9a517964e6dcb8d1",
            "BOMRef": "pkg:cargo/proc-macro-error-attr2@2.0.0"
          },
          "Version": "2.0.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "proc-macro2@1.0.101",
            "quote@1.0.42"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "proc-macro-error2@2.0.1",
          "Name": "proc-macro-error2",
          "Identifier": {
            "PURL": "pkg:cargo/proc-macro-error2@2.0.1",
            "UID": "69ae2a989ae704b3",
            "BOMRef": "pkg:cargo/proc-macro-error2@2.0.1"
          },
          "Version": "2.0.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "proc-macro-error-attr2@2.0.0",
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@2.0.111"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "proc-macro2@1.0.101",
          "Name": "proc-macro2",
          "Identifier": {
            "PURL": "pkg:cargo/proc-macro2@1.0.101",
            "UID": "4135d70eef3f7a7a",
            "BOMRef": "pkg:cargo/proc-macro2@1.0.101"
          },
          "Version": "1.0.101",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "unicode-ident@1.0.13"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "procfs@0.18.0",
          "Name": "procfs",
          "Identifier": {
            "PURL": "pkg:cargo/procfs@0.18.0",
            "UID": "9d46badfd6c5d51f",
            "BOMRef": "pkg:cargo/procfs@0.18.0"
          },
          "Version": "0.18.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "bitflags@2.9.1",
            "procfs-core@0.18.0",
            "rustix@1.0.2"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "procfs-core@0.18.0",
          "Name": "procfs-core",
          "Identifier": {
            "PURL": "pkg:cargo/procfs-core@0.18.0",
            "UID": "e212b87b0e5c894",
            "BOMRef": "pkg:cargo/procfs-core@0.18.0"
          },
          "Version": "0.18.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "bitflags@2.9.1",
            "hex@0.4.3"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "prometheus@0.14.0",
          "Name": "prometheus",
          "Identifier": {
            "PURL": "pkg:cargo/prometheus@0.14.0",
            "UID": "a372d14d70207ad2",
            "BOMRef": "pkg:cargo/prometheus@0.14.0"
          },
          "Version": "0.14.0",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "cfg-if@1.0.0",
            "fnv@1.0.7",
            "lazy_static@1.5.0",
            "memchr@2.7.4",
            "parking_lot@0.12.5",
            "thiserror@2.0.17"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "prost@0.11.9",
          "Name": "prost",
          "Identifier": {
            "PURL": "pkg:cargo/prost@0.11.9",
            "UID": "5057cf88270fb811",
            "BOMRef": "pkg:cargo/prost@0.11.9"
          },
          "Version": "0.11.9",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "bytes@1.10.1",
            "prost-derive@0.11.9"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "prost@0.12.6",
          "Name": "prost",
          "Identifier": {
            "PURL": "pkg:cargo/prost@0.12.6",
            "UID": "bd2f843ce3f96943",
            "BOMRef": "pkg:cargo/prost@0.12.6"
          },
          "Version": "0.12.6",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "bytes@1.10.1",
            "prost-derive@0.12.6"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "prost@0.13.1",
          "Name": "prost",
          "Identifier": {
            "PURL": "pkg:cargo/prost@0.13.1",
            "UID": "4439b67b7d0cd1b4",
            "BOMRef": "pkg:cargo/prost@0.13.1"
          },
          "Version": "0.13.1",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "bytes@1.10.1",
            "prost-derive@0.13.1"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "prost-derive@0.11.9",
          "Name": "prost-derive",
          "Identifier": {
            "PURL": "pkg:cargo/prost-derive@0.11.9",
            "UID": "16360cc69b341096",
            "BOMRef": "pkg:cargo/prost-derive@0.11.9"
          },
          "Version": "0.11.9",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "anyhow@1.0.100",
            "itertools@0.10.5",
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@1.0.107"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "prost-derive@0.12.6",
          "Name": "prost-derive",
          "Identifier": {
            "PURL": "pkg:cargo/prost-derive@0.12.6",
            "UID": "ee7403eed814e2ef",
            "BOMRef": "pkg:cargo/prost-derive@0.12.6"
          },
          "Version": "0.12.6",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "anyhow@1.0.100",
            "itertools@0.12.1",
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@2.0.111"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "prost-derive@0.13.1",
          "Name": "prost-derive",
          "Identifier": {
            "PURL": "pkg:cargo/prost-derive@0.13.1",
            "UID": "252e91aeecb9a9bd",
            "BOMRef": "pkg:cargo/prost-derive@0.13.1"
          },
          "Version": "0.13.1",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "anyhow@1.0.100",
            "itertools@0.13.0",
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@2.0.111"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "prost-types@0.12.6",
          "Name": "prost-types",
          "Identifier": {
            "PURL": "pkg:cargo/prost-types@0.12.6",
            "UID": "25019dbe19954167",
            "BOMRef": "pkg:cargo/prost-types@0.12.6"
          },
          "Version": "0.12.6",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "prost@0.12.6"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "prost-types@0.13.1",
          "Name": "prost-types",
          "Identifier": {
            "PURL": "pkg:cargo/prost-types@0.13.1",
            "UID": "868e82b32c216108",
            "BOMRef": "pkg:cargo/prost-types@0.13.1"
          },
          "Version": "0.13.1",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "prost@0.13.1"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "prost-wkt@0.5.1",
          "Name": "prost-wkt",
          "Identifier": {
            "PURL": "pkg:cargo/prost-wkt@0.5.1",
            "UID": "3001d4cb647d477a",
            "BOMRef": "pkg:cargo/prost-wkt@0.5.1"
          },
          "Version": "0.5.1",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "chrono@0.4.42",
            "inventory@0.3.14",
            "prost@0.12.6",
            "serde@1.0.226",
            "serde_derive@1.0.226",
            "serde_json@1.0.145",
            "typetag@0.2.15"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "prost-wkt-types@0.5.1",
          "Name": "prost-wkt-types",
          "Identifier": {
            "PURL": "pkg:cargo/prost-wkt-types@0.5.1",
            "UID": "fd7924839508ee60",
            "BOMRef": "pkg:cargo/prost-wkt-types@0.5.1"
          },
          "Version": "0.5.1",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "chrono@0.4.42",
            "prost-wkt@0.5.1",
            "prost@0.12.6",
            "serde@1.0.226",
            "serde_derive@1.0.226",
            "serde_json@1.0.145"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "protobuf@2.28.0",
          "Name": "protobuf",
          "Identifier": {
            "PURL": "pkg:cargo/protobuf@2.28.0",
            "UID": "fb1913fe9331cca1",
            "BOMRef": "pkg:cargo/protobuf@2.28.0"
          },
          "Version": "2.28.0",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "pyo3@0.27.1",
          "Name": "pyo3",
          "Identifier": {
            "PURL": "pkg:cargo/pyo3@0.27.1",
            "UID": "8dac68f392d17a16",
            "BOMRef": "pkg:cargo/pyo3@0.27.1"
          },
          "Version": "0.27.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "indoc@2.0.6",
            "libc@0.2.174",
            "memoffset@0.9.1",
            "once_cell@1.21.3",
            "portable-atomic@1.11.1",
            "pyo3-ffi@0.27.1",
            "pyo3-macros@0.27.1",
            "unindent@0.2.4",
            "uuid@1.18.1"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "pyo3-build-config@0.27.1",
          "Name": "pyo3-build-config",
          "Identifier": {
            "PURL": "pkg:cargo/pyo3-build-config@0.27.1",
            "UID": "dd929d2ac50b89d3",
            "BOMRef": "pkg:cargo/pyo3-build-config@0.27.1"
          },
          "Version": "0.27.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "target-lexicon@0.13.3"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "pyo3-ffi@0.27.1",
          "Name": "pyo3-ffi",
          "Identifier": {
            "PURL": "pkg:cargo/pyo3-ffi@0.27.1",
            "UID": "10677795a970dd72",
            "BOMRef": "pkg:cargo/pyo3-ffi@0.27.1"
          },
          "Version": "0.27.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "libc@0.2.174"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "pyo3-macros@0.27.1",
          "Name": "pyo3-macros",
          "Identifier": {
            "PURL": "pkg:cargo/pyo3-macros@0.27.1",
            "UID": "93f77cfbeb1da450",
            "BOMRef": "pkg:cargo/pyo3-macros@0.27.1"
          },
          "Version": "0.27.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "proc-macro2@1.0.101",
            "pyo3-macros-backend@0.27.1",
            "quote@1.0.42",
            "syn@2.0.111"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "pyo3-macros-backend@0.27.1",
          "Name": "pyo3-macros-backend",
          "Identifier": {
            "PURL": "pkg:cargo/pyo3-macros-backend@0.27.1",
            "UID": "35ac75dcfc115eaf",
            "BOMRef": "pkg:cargo/pyo3-macros-backend@0.27.1"
          },
          "Version": "0.27.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "heck@0.5.0",
            "proc-macro2@1.0.101",
            "pyo3-build-config@0.27.1",
            "quote@1.0.42",
            "syn@2.0.111"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "pyroscope@0.5.8",
          "Name": "pyroscope",
          "Identifier": {
            "PURL": "pkg:cargo/pyroscope@0.5.8",
            "UID": "bc63a7f02d73445a",
            "BOMRef": "pkg:cargo/pyroscope@0.5.8"
          },
          "Version": "0.5.8",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "libc@0.2.174",
            "libflate@1.4.0",
            "log@0.4.28",
            "names@0.14.0",
            "prost@0.11.9",
            "reqwest@0.12.24",
            "serde_json@1.0.145",
            "thiserror@1.0.69",
            "url@2.5.7",
            "winapi@0.3.9"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "pyroscope_pprofrs@0.2.10",
          "Name": "pyroscope_pprofrs",
          "Identifier": {
            "PURL": "pkg:cargo/pyroscope_pprofrs@0.2.10",
            "UID": "fe4cbd603e498849",
            "BOMRef": "pkg:cargo/pyroscope_pprofrs@0.2.10"
          },
          "Version": "0.2.10",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "log@0.4.28",
            "pprof2@0.13.1",
            "pyroscope@0.5.8"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "quick-xml@0.38.0",
          "Name": "quick-xml",
          "Identifier": {
            "PURL": "pkg:cargo/quick-xml@0.38.0",
            "UID": "a5b6cfbfc0445707",
            "BOMRef": "pkg:cargo/quick-xml@0.38.0"
          },
          "Version": "0.38.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "memchr@2.7.4",
            "serde@1.0.226"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "quinn@0.11.2",
          "Name": "quinn",
          "Identifier": {
            "PURL": "pkg:cargo/quinn@0.11.2",
            "UID": "38dfaa393cb0ec69",
            "BOMRef": "pkg:cargo/quinn@0.11.2"
          },
          "Version": "0.11.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "bytes@1.10.1",
            "pin-project-lite@0.2.12",
            "quinn-proto@0.11.8",
            "quinn-udp@0.5.2",
            "rustc-hash@1.1.0",
            "rustls@0.23.35",
            "thiserror@1.0.69",
            "tokio@1.48.0",
            "tracing@0.1.43"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "quinn-proto@0.11.8",
          "Name": "quinn-proto",
          "Identifier": {
            "PURL": "pkg:cargo/quinn-proto@0.11.8",
            "UID": "8bef8c2a3458ebd2",
            "BOMRef": "pkg:cargo/quinn-proto@0.11.8"
          },
          "Version": "0.11.8",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "bytes@1.10.1",
            "rand@0.8.5",
            "ring@0.17.13",
            "rustc-hash@2.1.1",
            "rustls@0.23.35",
            "slab@0.4.11",
            "thiserror@1.0.69",
            "tinyvec@1.10.0",
            "tracing@0.1.43"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "quinn-udp@0.5.2",
          "Name": "quinn-udp",
          "Identifier": {
            "PURL": "pkg:cargo/quinn-udp@0.5.2",
            "UID": "d18a876d94388f7b",
            "BOMRef": "pkg:cargo/quinn-udp@0.5.2"
          },
          "Version": "0.5.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "libc@0.2.174",
            "once_cell@1.21.3",
            "socket2@0.5.10",
            "tracing@0.1.43",
            "windows-sys@0.52.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "quote@1.0.42",
          "Name": "quote",
          "Identifier": {
            "PURL": "pkg:cargo/quote@1.0.42",
            "UID": "c8b7778f10b5be60",
            "BOMRef": "pkg:cargo/quote@1.0.42"
          },
          "Version": "1.0.42",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "proc-macro2@1.0.101"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "radium@0.7.0",
          "Name": "radium",
          "Identifier": {
            "PURL": "pkg:cargo/radium@0.7.0",
            "UID": "132e12d1a82d4a72",
            "BOMRef": "pkg:cargo/radium@0.7.0"
          },
          "Version": "0.7.0",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "raft@0.7.0",
          "Name": "raft",
          "Identifier": {
            "PURL": "pkg:cargo/raft@0.7.0",
            "UID": "62ec38e6826a9c4b",
            "BOMRef": "pkg:cargo/raft@0.7.0"
          },
          "Version": "0.7.0",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "fxhash@0.2.1",
            "getset@0.1.2",
            "protobuf@2.28.0",
            "raft-proto@0.7.0",
            "rand@0.8.5",
            "slog@2.8.2",
            "thiserror@1.0.69"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "raft-proto@0.7.0",
          "Name": "raft-proto",
          "Identifier": {
            "PURL": "pkg:cargo/raft-proto@0.7.0",
            "UID": "acf4b3acb3cc287d",
            "BOMRef": "pkg:cargo/raft-proto@0.7.0"
          },
          "Version": "0.7.0",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "lazy_static@1.5.0",
            "prost@0.11.9",
            "protobuf@2.28.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "rand@0.7.3",
          "Name": "rand",
          "Identifier": {
            "PURL": "pkg:cargo/rand@0.7.3",
            "UID": "f0a8ad56be53e739",
            "BOMRef": "pkg:cargo/rand@0.7.3"
          },
          "Version": "0.7.3",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "getrandom@0.1.16",
            "libc@0.2.174",
            "rand_chacha@0.2.2",
            "rand_core@0.5.1",
            "rand_hc@0.2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "rand@0.8.5",
          "Name": "rand",
          "Identifier": {
            "PURL": "pkg:cargo/rand@0.8.5",
            "UID": "400869ee12489d2",
            "BOMRef": "pkg:cargo/rand@0.8.5"
          },
          "Version": "0.8.5",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "libc@0.2.174",
            "rand_chacha@0.3.1",
            "rand_core@0.6.4",
            "serde@1.0.226"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "rand@0.9.2",
          "Name": "rand",
          "Identifier": {
            "PURL": "pkg:cargo/rand@0.9.2",
            "UID": "c847b35e1ca7d967",
            "BOMRef": "pkg:cargo/rand@0.9.2"
          },
          "Version": "0.9.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "rand_chacha@0.9.0",
            "rand_core@0.9.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "rand_chacha@0.2.2",
          "Name": "rand_chacha",
          "Identifier": {
            "PURL": "pkg:cargo/rand_chacha@0.2.2",
            "UID": "4b65ba71aa249efe",
            "BOMRef": "pkg:cargo/rand_chacha@0.2.2"
          },
          "Version": "0.2.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "ppv-lite86@0.2.17",
            "rand_core@0.5.1"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "rand_chacha@0.3.1",
          "Name": "rand_chacha",
          "Identifier": {
            "PURL": "pkg:cargo/rand_chacha@0.3.1",
            "UID": "4e5dafbe2a1277fa",
            "BOMRef": "pkg:cargo/rand_chacha@0.3.1"
          },
          "Version": "0.3.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "ppv-lite86@0.2.17",
            "rand_core@0.6.4"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "rand_chacha@0.9.0",
          "Name": "rand_chacha",
          "Identifier": {
            "PURL": "pkg:cargo/rand_chacha@0.9.0",
            "UID": "243a7aacc668ee57",
            "BOMRef": "pkg:cargo/rand_chacha@0.9.0"
          },
          "Version": "0.9.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "ppv-lite86@0.2.17",
            "rand_core@0.9.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "rand_core@0.5.1",
          "Name": "rand_core",
          "Identifier": {
            "PURL": "pkg:cargo/rand_core@0.5.1",
            "UID": "8179f2439c2612fa",
            "BOMRef": "pkg:cargo/rand_core@0.5.1"
          },
          "Version": "0.5.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "getrandom@0.1.16"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "rand_core@0.6.4",
          "Name": "rand_core",
          "Identifier": {
            "PURL": "pkg:cargo/rand_core@0.6.4",
            "UID": "f264b25084a0f474",
            "BOMRef": "pkg:cargo/rand_core@0.6.4"
          },
          "Version": "0.6.4",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "getrandom@0.2.11",
            "serde@1.0.226"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "rand_core@0.9.0",
          "Name": "rand_core",
          "Identifier": {
            "PURL": "pkg:cargo/rand_core@0.9.0",
            "UID": "79635669cdb96753",
            "BOMRef": "pkg:cargo/rand_core@0.9.0"
          },
          "Version": "0.9.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "getrandom@0.3.0",
            "zerocopy@0.8.31"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "rand_distr@0.5.1",
          "Name": "rand_distr",
          "Identifier": {
            "PURL": "pkg:cargo/rand_distr@0.5.1",
            "UID": "e13e3df227d43986",
            "BOMRef": "pkg:cargo/rand_distr@0.5.1"
          },
          "Version": "0.5.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "num-traits@0.2.19",
            "rand@0.9.2"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "rand_hc@0.2.0",
          "Name": "rand_hc",
          "Identifier": {
            "PURL": "pkg:cargo/rand_hc@0.2.0",
            "UID": "f6fbebf6cda9f754",
            "BOMRef": "pkg:cargo/rand_hc@0.2.0"
          },
          "Version": "0.2.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "rand_core@0.5.1"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "rayon@1.11.0",
          "Name": "rayon",
          "Identifier": {
            "PURL": "pkg:cargo/rayon@1.11.0",
            "UID": "cbe783b602e83e3c",
            "BOMRef": "pkg:cargo/rayon@1.11.0"
          },
          "Version": "1.11.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "either@1.13.0",
            "rayon-core@1.13.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "rayon-core@1.13.0",
          "Name": "rayon-core",
          "Identifier": {
            "PURL": "pkg:cargo/rayon-core@1.13.0",
            "UID": "515f52c5a4f2ec99",
            "BOMRef": "pkg:cargo/rayon-core@1.13.0"
          },
          "Version": "1.13.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "crossbeam-deque@0.8.2",
            "crossbeam-utils@0.8.20"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "redox_syscall@0.2.16",
          "Name": "redox_syscall",
          "Identifier": {
            "PURL": "pkg:cargo/redox_syscall@0.2.16",
            "UID": "c0f62fd03488888c",
            "BOMRef": "pkg:cargo/redox_syscall@0.2.16"
          },
          "Version": "0.2.16",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "bitflags@1.3.2"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "redox_syscall@0.5.12",
          "Name": "redox_syscall",
          "Identifier": {
            "PURL": "pkg:cargo/redox_syscall@0.5.12",
            "UID": "98edcd371760fdba",
            "BOMRef": "pkg:cargo/redox_syscall@0.5.12"
          },
          "Version": "0.5.12",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "bitflags@2.9.1"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "regex@1.11.0",
          "Name": "regex",
          "Identifier": {
            "PURL": "pkg:cargo/regex@1.11.0",
            "UID": "b413e29d6a1e3b46",
            "BOMRef": "pkg:cargo/regex@1.11.0"
          },
          "Version": "1.11.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "aho-corasick@1.1.3",
            "memchr@2.7.4",
            "regex-automata@0.4.8",
            "regex-syntax@0.8.5"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "regex-automata@0.4.8",
          "Name": "regex-automata",
          "Identifier": {
            "PURL": "pkg:cargo/regex-automata@0.4.8",
            "UID": "2411e4f13b066ba2",
            "BOMRef": "pkg:cargo/regex-automata@0.4.8"
          },
          "Version": "0.4.8",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "aho-corasick@1.1.3",
            "memchr@2.7.4",
            "regex-syntax@0.8.5"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "regex-lite@0.1.5",
          "Name": "regex-lite",
          "Identifier": {
            "PURL": "pkg:cargo/regex-lite@0.1.5",
            "UID": "d720f018015c3aa9",
            "BOMRef": "pkg:cargo/regex-lite@0.1.5"
          },
          "Version": "0.1.5",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "regex-syntax@0.8.5",
          "Name": "regex-syntax",
          "Identifier": {
            "PURL": "pkg:cargo/regex-syntax@0.8.5",
            "UID": "f23f51121302ba36",
            "BOMRef": "pkg:cargo/regex-syntax@0.8.5"
          },
          "Version": "0.8.5",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "reqwest@0.12.24",
          "Name": "reqwest",
          "Identifier": {
            "PURL": "pkg:cargo/reqwest@0.12.24",
            "UID": "fa5d505341543548",
            "BOMRef": "pkg:cargo/reqwest@0.12.24"
          },
          "Version": "0.12.24",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "base64@0.22.0",
            "bytes@1.10.1",
            "futures-channel@0.3.31",
            "futures-core@0.3.31",
            "futures-util@0.3.31",
            "h2@0.4.4",
            "http-body-util@0.1.2",
            "http-body@1.0.0",
            "http@1.3.1",
            "hyper-rustls@0.27.2",
            "hyper-util@0.1.13",
            "hyper@1.6.0",
            "js-sys@0.3.77",
            "log@0.4.28",
            "percent-encoding@2.3.2",
            "pin-project-lite@0.2.12",
            "quinn@0.11.2",
            "rustls-native-certs@0.8.0",
            "rustls-pki-types@1.12.0",
            "rustls@0.23.35",
            "serde@1.0.226",
            "serde_json@1.0.145",
            "serde_urlencoded@0.7.1",
            "sync_wrapper@1.0.1",
            "tokio-rustls@0.26.0",
            "tokio-util@0.7.16",
            "tokio@1.48.0",
            "tower-http@0.6.6",
            "tower-service@0.3.3",
            "tower@0.5.2",
            "url@2.5.7",
            "wasm-bindgen-futures@0.4.42",
            "wasm-bindgen@0.2.100",
            "wasm-streams@0.4.0",
            "web-sys@0.3.69",
            "webpki-roots@1.0.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "rfc6979@0.4.0",
          "Name": "rfc6979",
          "Identifier": {
            "PURL": "pkg:cargo/rfc6979@0.4.0",
            "UID": "d73db270a826dd0e",
            "BOMRef": "pkg:cargo/rfc6979@0.4.0"
          },
          "Version": "0.4.0",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "hmac@0.12.1",
            "subtle@2.5.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "ring@0.17.13",
          "Name": "ring",
          "Identifier": {
            "PURL": "pkg:cargo/ring@0.17.13",
            "UID": "70a609034c8d5f6d",
            "BOMRef": "pkg:cargo/ring@0.17.13"
          },
          "Version": "0.17.13",
          "Licenses": [
            "Apache-2.0 AND ISC"
          ],
          "DependsOn": [
            "cfg-if@1.0.0",
            "getrandom@0.2.11",
            "libc@0.2.174",
            "untrusted@0.9.0",
            "windows-sys@0.52.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "ringbuffer@0.16.0",
          "Name": "ringbuffer",
          "Identifier": {
            "PURL": "pkg:cargo/ringbuffer@0.16.0",
            "UID": "41f68beafd12b7a4",
            "BOMRef": "pkg:cargo/ringbuffer@0.16.0"
          },
          "Version": "0.16.0",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "rle-decode-fast@1.0.3",
          "Name": "rle-decode-fast",
          "Identifier": {
            "PURL": "pkg:cargo/rle-decode-fast@1.0.3",
            "UID": "bea18872b0452ce",
            "BOMRef": "pkg:cargo/rle-decode-fast@1.0.3"
          },
          "Version": "1.0.3",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "rmp@0.8.14",
          "Name": "rmp",
          "Identifier": {
            "PURL": "pkg:cargo/rmp@0.8.14",
            "UID": "4daa97fbfc74ebc",
            "BOMRef": "pkg:cargo/rmp@0.8.14"
          },
          "Version": "0.8.14",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "byteorder@1.5.0",
            "num-traits@0.2.19",
            "paste@1.0.11"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "rmp-serde@1.3.0",
          "Name": "rmp-serde",
          "Identifier": {
            "PURL": "pkg:cargo/rmp-serde@1.3.0",
            "UID": "2d4d1a29003b241b",
            "BOMRef": "pkg:cargo/rmp-serde@1.3.0"
          },
          "Version": "1.3.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "byteorder@1.5.0",
            "rmp@0.8.14",
            "serde@1.0.226"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "roaring@0.11.2",
          "Name": "roaring",
          "Identifier": {
            "PURL": "pkg:cargo/roaring@0.11.2",
            "UID": "96399d62ed867ac6",
            "BOMRef": "pkg:cargo/roaring@0.11.2"
          },
          "Version": "0.11.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "bytemuck@1.24.0",
            "byteorder@1.5.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "robust@1.1.0",
          "Name": "robust",
          "Identifier": {
            "PURL": "pkg:cargo/robust@1.1.0",
            "UID": "15286fb5e971042a",
            "BOMRef": "pkg:cargo/robust@1.1.0"
          },
          "Version": "1.1.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "rocksdb@0.24.0",
          "Name": "rocksdb",
          "Identifier": {
            "PURL": "pkg:cargo/rocksdb@0.24.0",
            "UID": "74c76c04f375d72",
            "BOMRef": "pkg:cargo/rocksdb@0.24.0"
          },
          "Version": "0.24.0",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "libc@0.2.174",
            "librocksdb-sys@0.17.3+10.4.2"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "rsa@0.9.8",
          "Name": "rsa",
          "Identifier": {
            "PURL": "pkg:cargo/rsa@0.9.8",
            "UID": "aa5745dc9337cab0",
            "BOMRef": "pkg:cargo/rsa@0.9.8"
          },
          "Version": "0.9.8",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "const-oid@0.9.6",
            "digest@0.10.7",
            "num-bigint-dig@0.8.4",
            "num-integer@0.1.46",
            "num-traits@0.2.19",
            "pkcs1@0.7.5",
            "pkcs8@0.10.2",
            "rand_core@0.6.4",
            "signature@2.2.0",
            "spki@0.7.3",
            "subtle@2.5.0",
            "zeroize@1.8.1"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "rstack@0.3.3",
          "Name": "rstack",
          "Identifier": {
            "PURL": "pkg:cargo/rstack@0.3.3",
            "UID": "d1f8cb01cd82d22f",
            "BOMRef": "pkg:cargo/rstack@0.3.3"
          },
          "Version": "0.3.3",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "cfg-if@1.0.0",
            "libc@0.2.174",
            "log@0.4.28",
            "unwind@0.4.1"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "rstack-self@0.3.0",
          "Name": "rstack-self",
          "Identifier": {
            "PURL": "pkg:cargo/rstack-self@0.3.0",
            "UID": "fc9afe788d59acc8",
            "BOMRef": "pkg:cargo/rstack-self@0.3.0"
          },
          "Version": "0.3.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "antidote@1.0.0",
            "backtrace@0.3.67",
            "bincode@1.3.3",
            "lazy_static@1.5.0",
            "libc@0.2.174",
            "rstack@0.3.3",
            "serde@1.0.226"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "rstar@0.12.0",
          "Name": "rstar",
          "Identifier": {
            "PURL": "pkg:cargo/rstar@0.12.0",
            "UID": "2c927c6a419d77b1",
            "BOMRef": "pkg:cargo/rstar@0.12.0"
          },
          "Version": "0.12.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "heapless@0.8.0",
            "num-traits@0.2.19",
            "smallvec@1.15.1"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "rustc-demangle@0.1.21",
          "Name": "rustc-demangle",
          "Identifier": {
            "PURL": "pkg:cargo/rustc-demangle@0.1.21",
            "UID": "e19162278901d9a4",
            "BOMRef": "pkg:cargo/rustc-demangle@0.1.21"
          },
          "Version": "0.1.21",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "rustc-hash@1.1.0",
          "Name": "rustc-hash",
          "Identifier": {
            "PURL": "pkg:cargo/rustc-hash@1.1.0",
            "UID": "ff372eea57ee7259",
            "BOMRef": "pkg:cargo/rustc-hash@1.1.0"
          },
          "Version": "1.1.0",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "rustc-hash@2.1.1",
          "Name": "rustc-hash",
          "Identifier": {
            "PURL": "pkg:cargo/rustc-hash@2.1.1",
            "UID": "4b29a128715cdc1c",
            "BOMRef": "pkg:cargo/rustc-hash@2.1.1"
          },
          "Version": "2.1.1",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "rustix@0.38.40",
          "Name": "rustix",
          "Identifier": {
            "PURL": "pkg:cargo/rustix@0.38.40",
            "UID": "e20de6a2ca2cf64e",
            "BOMRef": "pkg:cargo/rustix@0.38.40"
          },
          "Version": "0.38.40",
          "Licenses": [
            "Apache-2.0 OR Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "bitflags@2.9.1",
            "errno@0.3.10",
            "libc@0.2.174",
            "linux-raw-sys@0.4.14",
            "windows-sys@0.52.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "rustix@1.0.2",
          "Name": "rustix",
          "Identifier": {
            "PURL": "pkg:cargo/rustix@1.0.2",
            "UID": "d0b32423e5ad838",
            "BOMRef": "pkg:cargo/rustix@1.0.2"
          },
          "Version": "1.0.2",
          "Licenses": [
            "Apache-2.0 OR Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "bitflags@2.9.1",
            "errno@0.3.10",
            "libc@0.2.174",
            "linux-raw-sys@0.9.2",
            "windows-sys@0.59.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "rustls@0.22.4",
          "Name": "rustls",
          "Identifier": {
            "PURL": "pkg:cargo/rustls@0.22.4",
            "UID": "efd0550d20c81853",
            "BOMRef": "pkg:cargo/rustls@0.22.4"
          },
          "Version": "0.22.4",
          "Licenses": [
            "Apache-2.0 OR ISC OR MIT"
          ],
          "DependsOn": [
            "log@0.4.28",
            "ring@0.17.13",
            "rustls-pki-types@1.12.0",
            "rustls-webpki@0.102.8",
            "subtle@2.5.0",
            "zeroize@1.8.1"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "rustls@0.23.35",
          "Name": "rustls",
          "Identifier": {
            "PURL": "pkg:cargo/rustls@0.23.35",
            "UID": "f52d9079e7c174fe",
            "BOMRef": "pkg:cargo/rustls@0.23.35"
          },
          "Version": "0.23.35",
          "Licenses": [
            "Apache-2.0 OR ISC OR MIT"
          ],
          "DependsOn": [
            "log@0.4.28",
            "once_cell@1.21.3",
            "ring@0.17.13",
            "rustls-pki-types@1.12.0",
            "rustls-webpki@0.103.6",
            "subtle@2.5.0",
            "zeroize@1.8.1"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "rustls-native-certs@0.7.0",
          "Name": "rustls-native-certs",
          "Identifier": {
            "PURL": "pkg:cargo/rustls-native-certs@0.7.0",
            "UID": "d0133b5c4ea59248",
            "BOMRef": "pkg:cargo/rustls-native-certs@0.7.0"
          },
          "Version": "0.7.0",
          "Licenses": [
            "Apache-2.0 OR ISC OR MIT"
          ],
          "DependsOn": [
            "openssl-probe@0.1.5",
            "rustls-pemfile@2.2.0",
            "rustls-pki-types@1.12.0",
            "schannel@0.1.23",
            "security-framework@2.10.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "rustls-native-certs@0.8.0",
          "Name": "rustls-native-certs",
          "Identifier": {
            "PURL": "pkg:cargo/rustls-native-certs@0.8.0",
            "UID": "c6f5264f19ea0399",
            "BOMRef": "pkg:cargo/rustls-native-certs@0.8.0"
          },
          "Version": "0.8.0",
          "Licenses": [
            "Apache-2.0 OR ISC OR MIT"
          ],
          "DependsOn": [
            "openssl-probe@0.1.5",
            "rustls-pemfile@2.2.0",
            "rustls-pki-types@1.12.0",
            "schannel@0.1.23",
            "security-framework@2.10.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "rustls-pemfile@2.2.0",
          "Name": "rustls-pemfile",
          "Identifier": {
            "PURL": "pkg:cargo/rustls-pemfile@2.2.0",
            "UID": "31ba56c35d6eb398",
            "BOMRef": "pkg:cargo/rustls-pemfile@2.2.0"
          },
          "Version": "2.2.0",
          "Licenses": [
            "Apache-2.0 OR ISC OR MIT"
          ],
          "DependsOn": [
            "rustls-pki-types@1.12.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "rustls-pki-types@1.12.0",
          "Name": "rustls-pki-types",
          "Identifier": {
            "PURL": "pkg:cargo/rustls-pki-types@1.12.0",
            "UID": "2cfd55eaf6e88daa",
            "BOMRef": "pkg:cargo/rustls-pki-types@1.12.0"
          },
          "Version": "1.12.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "zeroize@1.8.1"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "rustls-webpki@0.102.8",
          "Name": "rustls-webpki",
          "Identifier": {
            "PURL": "pkg:cargo/rustls-webpki@0.102.8",
            "UID": "51092cfb429c4117",
            "BOMRef": "pkg:cargo/rustls-webpki@0.102.8"
          },
          "Version": "0.102.8",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "ring@0.17.13",
            "rustls-pki-types@1.12.0",
            "untrusted@0.9.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "rustls-webpki@0.103.6",
          "Name": "rustls-webpki",
          "Identifier": {
            "PURL": "pkg:cargo/rustls-webpki@0.103.6",
            "UID": "1d7018aaee7dcb8c",
            "BOMRef": "pkg:cargo/rustls-webpki@0.103.6"
          },
          "Version": "0.103.6",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "ring@0.17.13",
            "rustls-pki-types@1.12.0",
            "untrusted@0.9.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "rustversion@1.0.11",
          "Name": "rustversion",
          "Identifier": {
            "PURL": "pkg:cargo/rustversion@1.0.11",
            "UID": "dcb9489dae88c6f2",
            "BOMRef": "pkg:cargo/rustversion@1.0.11"
          },
          "Version": "1.0.11",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "ryu@1.0.12",
          "Name": "ryu",
          "Identifier": {
            "PURL": "pkg:cargo/ryu@1.0.12",
            "UID": "75c3ef5fd0b877bd",
            "BOMRef": "pkg:cargo/ryu@1.0.12"
          },
          "Version": "1.0.12",
          "Licenses": [
            "Apache-2.0 OR BSL-1.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "same-file@1.0.6",
          "Name": "same-file",
          "Identifier": {
            "PURL": "pkg:cargo/same-file@1.0.6",
            "UID": "7fc683572420921f",
            "BOMRef": "pkg:cargo/same-file@1.0.6"
          },
          "Version": "1.0.6",
          "Licenses": [
            "Unlicense OR MIT"
          ],
          "DependsOn": [
            "winapi-util@0.1.5"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "scc@2.4.0",
          "Name": "scc",
          "Identifier": {
            "PURL": "pkg:cargo/scc@2.4.0",
            "UID": "269b2d40be6a8a08",
            "BOMRef": "pkg:cargo/scc@2.4.0"
          },
          "Version": "2.4.0",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "sdd@3.0.10"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "schannel@0.1.23",
          "Name": "schannel",
          "Identifier": {
            "PURL": "pkg:cargo/schannel@0.1.23",
            "UID": "38a7295b5c7d6ec0",
            "BOMRef": "pkg:cargo/schannel@0.1.23"
          },
          "Version": "0.1.23",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "windows-sys@0.52.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "schemars@0.8.22",
          "Name": "schemars",
          "Identifier": {
            "PURL": "pkg:cargo/schemars@0.8.22",
            "UID": "fdbba8ac215dc8de",
            "BOMRef": "pkg:cargo/schemars@0.8.22"
          },
          "Version": "0.8.22",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "chrono@0.4.42",
            "dyn-clone@1.0.10",
            "indexmap@1.9.2",
            "indexmap@2.11.4",
            "schemars_derive@0.8.22",
            "serde@1.0.226",
            "serde_json@1.0.145",
            "url@2.5.7",
            "uuid@1.18.1"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "schemars_derive@0.8.22",
          "Name": "schemars_derive",
          "Identifier": {
            "PURL": "pkg:cargo/schemars_derive@0.8.22",
            "UID": "e4daa9ab016a29ca",
            "BOMRef": "pkg:cargo/schemars_derive@0.8.22"
          },
          "Version": "0.8.22",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "serde_derive_internals@0.29.0",
            "syn@2.0.111"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "scoped-tls@1.0.1",
          "Name": "scoped-tls",
          "Identifier": {
            "PURL": "pkg:cargo/scoped-tls@1.0.1",
            "UID": "55990a97a0ba348f",
            "BOMRef": "pkg:cargo/scoped-tls@1.0.1"
          },
          "Version": "1.0.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "scopeguard@1.1.0",
          "Name": "scopeguard",
          "Identifier": {
            "PURL": "pkg:cargo/scopeguard@1.1.0",
            "UID": "c1d131df9a345297",
            "BOMRef": "pkg:cargo/scopeguard@1.1.0"
          },
          "Version": "1.1.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "sdd@3.0.10",
          "Name": "sdd",
          "Identifier": {
            "PURL": "pkg:cargo/sdd@3.0.10",
            "UID": "9615c557e0663b99",
            "BOMRef": "pkg:cargo/sdd@3.0.10"
          },
          "Version": "3.0.10",
          "Licenses": [
            "Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "seahash@4.1.0",
          "Name": "seahash",
          "Identifier": {
            "PURL": "pkg:cargo/seahash@4.1.0",
            "UID": "7b55ecd81f2536f8",
            "BOMRef": "pkg:cargo/seahash@4.1.0"
          },
          "Version": "4.1.0",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "sec1@0.7.3",
          "Name": "sec1",
          "Identifier": {
            "PURL": "pkg:cargo/sec1@0.7.3",
            "UID": "24dd97594b89bc1d",
            "BOMRef": "pkg:cargo/sec1@0.7.3"
          },
          "Version": "0.7.3",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "base16ct@0.2.0",
            "der@0.7.10",
            "generic-array@0.14.9",
            "pkcs8@0.10.2",
            "subtle@2.5.0",
            "zeroize@1.8.1"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "security-framework@2.10.0",
          "Name": "security-framework",
          "Identifier": {
            "PURL": "pkg:cargo/security-framework@2.10.0",
            "UID": "b6c61897c582cd62",
            "BOMRef": "pkg:cargo/security-framework@2.10.0"
          },
          "Version": "2.10.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "bitflags@1.3.2",
            "core-foundation-sys@0.8.7",
            "core-foundation@0.9.4",
            "libc@0.2.174",
            "security-framework-sys@2.11.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "security-framework-sys@2.11.0",
          "Name": "security-framework-sys",
          "Identifier": {
            "PURL": "pkg:cargo/security-framework-sys@2.11.0",
            "UID": "5de57fd312c590a3",
            "BOMRef": "pkg:cargo/security-framework-sys@2.11.0"
          },
          "Version": "2.11.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "core-foundation-sys@0.8.7",
            "libc@0.2.174"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "seedable_hash@0.1.1",
          "Name": "seedable_hash",
          "Identifier": {
            "PURL": "pkg:cargo/seedable_hash@0.1.1",
            "UID": "2ee298f1beaf8aac",
            "BOMRef": "pkg:cargo/seedable_hash@0.1.1"
          },
          "Version": "0.1.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "wyhash@0.5.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "self_cell@1.2.0",
          "Name": "self_cell",
          "Identifier": {
            "PURL": "pkg:cargo/self_cell@1.2.0",
            "UID": "6d680d45a70fce9",
            "BOMRef": "pkg:cargo/self_cell@1.2.0"
          },
          "Version": "1.2.0",
          "Licenses": [
            "Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "semver@1.0.27",
          "Name": "semver",
          "Identifier": {
            "PURL": "pkg:cargo/semver@1.0.27",
            "UID": "a63f77572c886f37",
            "BOMRef": "pkg:cargo/semver@1.0.27"
          },
          "Version": "1.0.27",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "serde@1.0.226",
            "serde_core@1.0.226"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "serde@1.0.226",
          "Name": "serde",
          "Identifier": {
            "PURL": "pkg:cargo/serde@1.0.226",
            "UID": "a93393a47ff9cc82",
            "BOMRef": "pkg:cargo/serde@1.0.226"
          },
          "Version": "1.0.226",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "serde_core@1.0.226",
            "serde_derive@1.0.226"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "serde-untagged@0.1.9",
          "Name": "serde-untagged",
          "Identifier": {
            "PURL": "pkg:cargo/serde-untagged@0.1.9",
            "UID": "4842a0e27097ec5a",
            "BOMRef": "pkg:cargo/serde-untagged@0.1.9"
          },
          "Version": "0.1.9",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "erased-serde@0.4.2",
            "serde@1.0.226",
            "serde_core@1.0.226",
            "typeid@1.0.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "serde-value@0.7.0",
          "Name": "serde-value",
          "Identifier": {
            "PURL": "pkg:cargo/serde-value@0.7.0",
            "UID": "5394207d7fa470f6",
            "BOMRef": "pkg:cargo/serde-value@0.7.0"
          },
          "Version": "0.7.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "ordered-float@2.10.1",
            "serde@1.0.226"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "serde_cbor@0.11.2",
          "Name": "serde_cbor",
          "Identifier": {
            "PURL": "pkg:cargo/serde_cbor@0.11.2",
            "UID": "5ee10e2d886861b7",
            "BOMRef": "pkg:cargo/serde_cbor@0.11.2"
          },
          "Version": "0.11.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "half@1.8.2",
            "serde@1.0.226"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "serde_core@1.0.226",
          "Name": "serde_core",
          "Identifier": {
            "PURL": "pkg:cargo/serde_core@1.0.226",
            "UID": "e89616763645d020",
            "BOMRef": "pkg:cargo/serde_core@1.0.226"
          },
          "Version": "1.0.226",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "serde_derive@1.0.226"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "serde_derive@1.0.226",
          "Name": "serde_derive",
          "Identifier": {
            "PURL": "pkg:cargo/serde_derive@1.0.226",
            "UID": "f959726eb0d4175",
            "BOMRef": "pkg:cargo/serde_derive@1.0.226"
          },
          "Version": "1.0.226",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@2.0.111"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "serde_derive_internals@0.29.0",
          "Name": "serde_derive_internals",
          "Identifier": {
            "PURL": "pkg:cargo/serde_derive_internals@0.29.0",
            "UID": "d5407de32b0a0e99",
            "BOMRef": "pkg:cargo/serde_derive_internals@0.29.0"
          },
          "Version": "0.29.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@2.0.111"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "serde_json@1.0.145",
          "Name": "serde_json",
          "Identifier": {
            "PURL": "pkg:cargo/serde_json@1.0.145",
            "UID": "c17cad388ff032a9",
            "BOMRef": "pkg:cargo/serde_json@1.0.145"
          },
          "Version": "1.0.145",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "indexmap@2.11.4",
            "itoa@1.0.5",
            "memchr@2.7.4",
            "ryu@1.0.12",
            "serde@1.0.226",
            "serde_core@1.0.226"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "serde_plain@1.0.1",
          "Name": "serde_plain",
          "Identifier": {
            "PURL": "pkg:cargo/serde_plain@1.0.1",
            "UID": "bfac2ea883a7231f",
            "BOMRef": "pkg:cargo/serde_plain@1.0.1"
          },
          "Version": "1.0.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "serde@1.0.226"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "serde_qs@0.13.0",
          "Name": "serde_qs",
          "Identifier": {
            "PURL": "pkg:cargo/serde_qs@0.13.0",
            "UID": "af83e3c169d581e3",
            "BOMRef": "pkg:cargo/serde_qs@0.13.0"
          },
          "Version": "0.13.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "actix-web@4.11.0",
            "futures@0.3.31",
            "percent-encoding@2.3.2",
            "serde@1.0.226",
            "thiserror@1.0.69"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "serde_urlencoded@0.7.1",
          "Name": "serde_urlencoded",
          "Identifier": {
            "PURL": "pkg:cargo/serde_urlencoded@0.7.1",
            "UID": "2af85fe60a77199a",
            "BOMRef": "pkg:cargo/serde_urlencoded@0.7.1"
          },
          "Version": "0.7.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "form_urlencoded@1.2.2",
            "itoa@1.0.5",
            "ryu@1.0.12",
            "serde@1.0.226"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "serde_variant@0.1.3",
          "Name": "serde_variant",
          "Identifier": {
            "PURL": "pkg:cargo/serde_variant@0.1.3",
            "UID": "932e03a019e4784f",
            "BOMRef": "pkg:cargo/serde_variant@0.1.3"
          },
          "Version": "0.1.3",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "serde@1.0.226"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "serial_test@3.2.0",
          "Name": "serial_test",
          "Identifier": {
            "PURL": "pkg:cargo/serial_test@3.2.0",
            "UID": "a815837e8c2ff6d3",
            "BOMRef": "pkg:cargo/serial_test@3.2.0"
          },
          "Version": "3.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "once_cell@1.21.3",
            "parking_lot@0.12.5",
            "scc@2.4.0",
            "serial_test_derive@3.2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "serial_test_derive@3.2.0",
          "Name": "serial_test_derive",
          "Identifier": {
            "PURL": "pkg:cargo/serial_test_derive@3.2.0",
            "UID": "20a1ca9ce39487e8",
            "BOMRef": "pkg:cargo/serial_test_derive@3.2.0"
          },
          "Version": "3.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@2.0.111"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "sha1@0.10.5",
          "Name": "sha1",
          "Identifier": {
            "PURL": "pkg:cargo/sha1@0.10.5",
            "UID": "20827f64f58ab48f",
            "BOMRef": "pkg:cargo/sha1@0.10.5"
          },
          "Version": "0.10.5",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "cfg-if@1.0.0",
            "cpufeatures@0.2.17",
            "digest@0.10.7"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "sha2@0.10.9",
          "Name": "sha2",
          "Identifier": {
            "PURL": "pkg:cargo/sha2@0.10.9",
            "UID": "1edc1319dc57d4fd",
            "BOMRef": "pkg:cargo/sha2@0.10.9"
          },
          "Version": "0.10.9",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "cfg-if@1.0.0",
            "cpufeatures@0.2.17",
            "digest@0.10.7"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "shaderc@0.10.1",
          "Name": "shaderc",
          "Identifier": {
            "PURL": "pkg:cargo/shaderc@0.10.1",
            "UID": "e2c72a1e40f9b42f",
            "BOMRef": "pkg:cargo/shaderc@0.10.1"
          },
          "Version": "0.10.1",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "libc@0.2.174",
            "shaderc-sys@0.10.1"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "shaderc-sys@0.10.1",
          "Name": "shaderc-sys",
          "Identifier": {
            "PURL": "pkg:cargo/shaderc-sys@0.10.1",
            "UID": "763c573c8292e5a9",
            "BOMRef": "pkg:cargo/shaderc-sys@0.10.1"
          },
          "Version": "0.10.1",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "libc@0.2.174",
            "link-cplusplus@1.0.8"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "sharded-slab@0.1.4",
          "Name": "sharded-slab",
          "Identifier": {
            "PURL": "pkg:cargo/sharded-slab@0.1.4",
            "UID": "6a29641808ad78f0",
            "BOMRef": "pkg:cargo/sharded-slab@0.1.4"
          },
          "Version": "0.1.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "lazy_static@1.5.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "signal-hook-registry@1.4.0",
          "Name": "signal-hook-registry",
          "Identifier": {
            "PURL": "pkg:cargo/signal-hook-registry@1.4.0",
            "UID": "1e4c434f7b3eebc1",
            "BOMRef": "pkg:cargo/signal-hook-registry@1.4.0"
          },
          "Version": "1.4.0",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "libc@0.2.174"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "signature@2.2.0",
          "Name": "signature",
          "Identifier": {
            "PURL": "pkg:cargo/signature@2.2.0",
            "UID": "ed92a27d0fe3a4d",
            "BOMRef": "pkg:cargo/signature@2.2.0"
          },
          "Version": "2.2.0",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "digest@0.10.7",
            "rand_core@0.6.4"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "simd-adler32@0.3.7",
          "Name": "simd-adler32",
          "Identifier": {
            "PURL": "pkg:cargo/simd-adler32@0.3.7",
            "UID": "48a2013347244ed7",
            "BOMRef": "pkg:cargo/simd-adler32@0.3.7"
          },
          "Version": "0.3.7",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "simple_asn1@0.6.2",
          "Name": "simple_asn1",
          "Identifier": {
            "PURL": "pkg:cargo/simple_asn1@0.6.2",
            "UID": "266a2e2862db5fdd",
            "BOMRef": "pkg:cargo/simple_asn1@0.6.2"
          },
          "Version": "0.6.2",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "num-bigint@0.4.4",
            "num-traits@0.2.19",
            "thiserror@1.0.69",
            "time@0.3.17"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "siphasher@0.3.10",
          "Name": "siphasher",
          "Identifier": {
            "PURL": "pkg:cargo/siphasher@0.3.10",
            "UID": "1be7289c672fef87",
            "BOMRef": "pkg:cargo/siphasher@0.3.10"
          },
          "Version": "0.3.10",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "siphasher@1.0.1",
          "Name": "siphasher",
          "Identifier": {
            "PURL": "pkg:cargo/siphasher@1.0.1",
            "UID": "a215a57579371c98",
            "BOMRef": "pkg:cargo/siphasher@1.0.1"
          },
          "Version": "1.0.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "slab@0.4.11",
          "Name": "slab",
          "Identifier": {
            "PURL": "pkg:cargo/slab@0.4.11",
            "UID": "17225fd3d2a0d6c9",
            "BOMRef": "pkg:cargo/slab@0.4.11"
          },
          "Version": "0.4.11",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "slice-group-by@0.3.1",
          "Name": "slice-group-by",
          "Identifier": {
            "PURL": "pkg:cargo/slice-group-by@0.3.1",
            "UID": "3cf4e44265ef8d2",
            "BOMRef": "pkg:cargo/slice-group-by@0.3.1"
          },
          "Version": "0.3.1",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "slog@2.8.2",
          "Name": "slog",
          "Identifier": {
            "PURL": "pkg:cargo/slog@2.8.2",
            "UID": "c5f87e66db9a4972",
            "BOMRef": "pkg:cargo/slog@2.8.2"
          },
          "Version": "2.8.2",
          "Licenses": [
            "MPL-2.0 OR MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "anyhow@1.0.100",
            "erased-serde@0.3.31",
            "serde_core@1.0.226"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "slog-scope@4.4.0",
          "Name": "slog-scope",
          "Identifier": {
            "PURL": "pkg:cargo/slog-scope@4.4.0",
            "UID": "3203b026f8d20708",
            "BOMRef": "pkg:cargo/slog-scope@4.4.0"
          },
          "Version": "4.4.0",
          "Licenses": [
            "MPL-2.0 OR MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "arc-swap@1.7.1",
            "lazy_static@1.5.0",
            "slog@2.8.2"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "slog-stdlog@4.1.1",
          "Name": "slog-stdlog",
          "Identifier": {
            "PURL": "pkg:cargo/slog-stdlog@4.1.1",
            "UID": "d38293ce3500a6a3",
            "BOMRef": "pkg:cargo/slog-stdlog@4.1.1"
          },
          "Version": "4.1.1",
          "Licenses": [
            "MPL-2.0 OR MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "log@0.4.28",
            "slog-scope@4.4.0",
            "slog@2.8.2"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "smallvec@1.15.1",
          "Name": "smallvec",
          "Identifier": {
            "PURL": "pkg:cargo/smallvec@1.15.1",
            "UID": "4a4dc74a97e5c6ed",
            "BOMRef": "pkg:cargo/smallvec@1.15.1"
          },
          "Version": "1.15.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "socket2@0.4.9",
          "Name": "socket2",
          "Identifier": {
            "PURL": "pkg:cargo/socket2@0.4.9",
            "UID": "d8206fdc8477bbb3",
            "BOMRef": "pkg:cargo/socket2@0.4.9"
          },
          "Version": "0.4.9",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "libc@0.2.174",
            "winapi@0.3.9"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "socket2@0.5.10",
          "Name": "socket2",
          "Identifier": {
            "PURL": "pkg:cargo/socket2@0.5.10",
            "UID": "76e28dba82feca34",
            "BOMRef": "pkg:cargo/socket2@0.5.10"
          },
          "Version": "0.5.10",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "libc@0.2.174",
            "windows-sys@0.52.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "socket2@0.6.0",
          "Name": "socket2",
          "Identifier": {
            "PURL": "pkg:cargo/socket2@0.6.0",
            "UID": "9660e20ffc39c628",
            "BOMRef": "pkg:cargo/socket2@0.6.0"
          },
          "Version": "0.6.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "libc@0.2.174",
            "windows-sys@0.59.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "spade@2.12.1",
          "Name": "spade",
          "Identifier": {
            "PURL": "pkg:cargo/spade@2.12.1",
            "UID": "e86e65d333d15eb4",
            "BOMRef": "pkg:cargo/spade@2.12.1"
          },
          "Version": "2.12.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "hashbrown@0.14.2",
            "num-traits@0.2.19",
            "robust@1.1.0",
            "smallvec@1.15.1"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "spin@0.9.8",
          "Name": "spin",
          "Identifier": {
            "PURL": "pkg:cargo/spin@0.9.8",
            "UID": "91c2cbecdb3b1dcd",
            "BOMRef": "pkg:cargo/spin@0.9.8"
          },
          "Version": "0.9.8",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "spki@0.7.3",
          "Name": "spki",
          "Identifier": {
            "PURL": "pkg:cargo/spki@0.7.3",
            "UID": "285b0495749d408b",
            "BOMRef": "pkg:cargo/spki@0.7.3"
          },
          "Version": "0.7.3",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "base64ct@1.8.0",
            "der@0.7.10"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "stable_deref_trait@1.2.0",
          "Name": "stable_deref_trait",
          "Identifier": {
            "PURL": "pkg:cargo/stable_deref_trait@1.2.0",
            "UID": "c236af5b85976b9e",
            "BOMRef": "pkg:cargo/stable_deref_trait@1.2.0"
          },
          "Version": "1.2.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "strsim@0.10.0",
          "Name": "strsim",
          "Identifier": {
            "PURL": "pkg:cargo/strsim@0.10.0",
            "UID": "d229a29307fb69b7",
            "BOMRef": "pkg:cargo/strsim@0.10.0"
          },
          "Version": "0.10.0",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "strsim@0.11.0",
          "Name": "strsim",
          "Identifier": {
            "PURL": "pkg:cargo/strsim@0.11.0",
            "UID": "528ef55e794d9f44",
            "BOMRef": "pkg:cargo/strsim@0.11.0"
          },
          "Version": "0.11.0",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "strum@0.27.2",
          "Name": "strum",
          "Identifier": {
            "PURL": "pkg:cargo/strum@0.27.2",
            "UID": "8b4e552edf35b123",
            "BOMRef": "pkg:cargo/strum@0.27.2"
          },
          "Version": "0.27.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "strum_macros@0.27.1"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "strum_macros@0.27.1",
          "Name": "strum_macros",
          "Identifier": {
            "PURL": "pkg:cargo/strum_macros@0.27.1",
            "UID": "53387bd3a5ff127e",
            "BOMRef": "pkg:cargo/strum_macros@0.27.1"
          },
          "Version": "0.27.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "heck@0.5.0",
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "rustversion@1.0.11",
            "syn@2.0.111"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "subtle@2.5.0",
          "Name": "subtle",
          "Identifier": {
            "PURL": "pkg:cargo/subtle@2.5.0",
            "UID": "7e430643a584b5e1",
            "BOMRef": "pkg:cargo/subtle@2.5.0"
          },
          "Version": "2.5.0",
          "Licenses": [
            "BSD-3-Clause"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "symbolic-common@12.12.3",
          "Name": "symbolic-common",
          "Identifier": {
            "PURL": "pkg:cargo/symbolic-common@12.12.3",
            "UID": "9d7e4a6e48b297a5",
            "BOMRef": "pkg:cargo/symbolic-common@12.12.3"
          },
          "Version": "12.12.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "debugid@0.8.0",
            "memmap2@0.9.8",
            "stable_deref_trait@1.2.0",
            "uuid@1.18.1"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "symbolic-demangle@12.12.3",
          "Name": "symbolic-demangle",
          "Identifier": {
            "PURL": "pkg:cargo/symbolic-demangle@12.12.3",
            "UID": "e224a8cf08fa4627",
            "BOMRef": "pkg:cargo/symbolic-demangle@12.12.3"
          },
          "Version": "12.12.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "cpp_demangle@0.4.2",
            "rustc-demangle@0.1.21",
            "symbolic-common@12.12.3"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "syn@1.0.107",
          "Name": "syn",
          "Identifier": {
            "PURL": "pkg:cargo/syn@1.0.107",
            "UID": "92410c7a023c6a41",
            "BOMRef": "pkg:cargo/syn@1.0.107"
          },
          "Version": "1.0.107",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "unicode-ident@1.0.13"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "syn@2.0.111",
          "Name": "syn",
          "Identifier": {
            "PURL": "pkg:cargo/syn@2.0.111",
            "UID": "14a3cd8c5c2051fc",
            "BOMRef": "pkg:cargo/syn@2.0.111"
          },
          "Version": "2.0.111",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "unicode-ident@1.0.13"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "sync_wrapper@0.1.2",
          "Name": "sync_wrapper",
          "Identifier": {
            "PURL": "pkg:cargo/sync_wrapper@0.1.2",
            "UID": "593d5084797dfcb9",
            "BOMRef": "pkg:cargo/sync_wrapper@0.1.2"
          },
          "Version": "0.1.2",
          "Licenses": [
            "Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "sync_wrapper@1.0.1",
          "Name": "sync_wrapper",
          "Identifier": {
            "PURL": "pkg:cargo/sync_wrapper@1.0.1",
            "UID": "b5cb11dc45413d83",
            "BOMRef": "pkg:cargo/sync_wrapper@1.0.1"
          },
          "Version": "1.0.1",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "futures-core@0.3.31"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "synstructure@0.13.1",
          "Name": "synstructure",
          "Identifier": {
            "PURL": "pkg:cargo/synstructure@0.13.1",
            "UID": "9c5a652f4a10190c",
            "BOMRef": "pkg:cargo/synstructure@0.13.1"
          },
          "Version": "0.13.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@2.0.111"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "sys-info@0.9.1",
          "Name": "sys-info",
          "Identifier": {
            "PURL": "pkg:cargo/sys-info@0.9.1",
            "UID": "97470081e5545f3f",
            "BOMRef": "pkg:cargo/sys-info@0.9.1"
          },
          "Version": "0.9.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "libc@0.2.174"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "sysinfo@0.37.2",
          "Name": "sysinfo",
          "Identifier": {
            "PURL": "pkg:cargo/sysinfo@0.37.2",
            "UID": "b283038600cb31c2",
            "BOMRef": "pkg:cargo/sysinfo@0.37.2"
          },
          "Version": "0.37.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "libc@0.2.174",
            "memchr@2.7.4",
            "ntapi@0.4.1",
            "objc2-core-foundation@0.3.1",
            "objc2-io-kit@0.3.1",
            "windows@0.61.3"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "tap@1.0.1",
          "Name": "tap",
          "Identifier": {
            "PURL": "pkg:cargo/tap@1.0.1",
            "UID": "d73eb4fc91dedb1",
            "BOMRef": "pkg:cargo/tap@1.0.1"
          },
          "Version": "1.0.1",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "target-lexicon@0.13.3",
          "Name": "target-lexicon",
          "Identifier": {
            "PURL": "pkg:cargo/target-lexicon@0.13.3",
            "UID": "99d7136185058ded",
            "BOMRef": "pkg:cargo/target-lexicon@0.13.3"
          },
          "Version": "0.13.3",
          "Licenses": [
            "Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "tempfile@3.23.0",
          "Name": "tempfile",
          "Identifier": {
            "PURL": "pkg:cargo/tempfile@3.23.0",
            "UID": "898c2346bc896e80",
            "BOMRef": "pkg:cargo/tempfile@3.23.0"
          },
          "Version": "3.23.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "fastrand@2.2.0",
            "getrandom@0.3.0",
            "once_cell@1.21.3",
            "rustix@1.0.2",
            "windows-sys@0.60.2"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "thiserror@1.0.69",
          "Name": "thiserror",
          "Identifier": {
            "PURL": "pkg:cargo/thiserror@1.0.69",
            "UID": "846e42652eb1be09",
            "BOMRef": "pkg:cargo/thiserror@1.0.69"
          },
          "Version": "1.0.69",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "thiserror-impl@1.0.69"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "thiserror@2.0.17",
          "Name": "thiserror",
          "Identifier": {
            "PURL": "pkg:cargo/thiserror@2.0.17",
            "UID": "875f71158b447e56",
            "BOMRef": "pkg:cargo/thiserror@2.0.17"
          },
          "Version": "2.0.17",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "thiserror-impl@2.0.17"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "thiserror-impl@1.0.69",
          "Name": "thiserror-impl",
          "Identifier": {
            "PURL": "pkg:cargo/thiserror-impl@1.0.69",
            "UID": "982d61d99ba8a438",
            "BOMRef": "pkg:cargo/thiserror-impl@1.0.69"
          },
          "Version": "1.0.69",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@2.0.111"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "thiserror-impl@2.0.17",
          "Name": "thiserror-impl",
          "Identifier": {
            "PURL": "pkg:cargo/thiserror-impl@2.0.17",
            "UID": "f89e3a7ce74776f9",
            "BOMRef": "pkg:cargo/thiserror-impl@2.0.17"
          },
          "Version": "2.0.17",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@2.0.111"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "thread-priority@3.0.0",
          "Name": "thread-priority",
          "Identifier": {
            "PURL": "pkg:cargo/thread-priority@3.0.0",
            "UID": "33337a1be1502c90",
            "BOMRef": "pkg:cargo/thread-priority@3.0.0"
          },
          "Version": "3.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "bitflags@2.9.1",
            "cfg-if@1.0.0",
            "libc@0.2.174",
            "log@0.4.28",
            "rustversion@1.0.11",
            "windows@0.61.3"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "thread_local@1.1.7",
          "Name": "thread_local",
          "Identifier": {
            "PURL": "pkg:cargo/thread_local@1.1.7",
            "UID": "c958eb2cc244004a",
            "BOMRef": "pkg:cargo/thread_local@1.1.7"
          },
          "Version": "1.1.7",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "cfg-if@1.0.0",
            "once_cell@1.21.3"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "tikv-jemalloc-ctl@0.6.0",
          "Name": "tikv-jemalloc-ctl",
          "Identifier": {
            "PURL": "pkg:cargo/tikv-jemalloc-ctl@0.6.0",
            "UID": "5dac7cf45e0990fb",
            "BOMRef": "pkg:cargo/tikv-jemalloc-ctl@0.6.0"
          },
          "Version": "0.6.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "libc@0.2.174",
            "paste@1.0.11",
            "tikv-jemalloc-sys@0.6.1+5.3.0-1-ge13ca993e8ccb9ba9847cc330696e02839f328f7"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "tikv-jemalloc-sys@0.6.1+5.3.0-1-ge13ca993e8ccb9ba9847cc330696e02839f328f7",
          "Name": "tikv-jemalloc-sys",
          "Identifier": {
            "PURL": "pkg:cargo/tikv-jemalloc-sys@0.6.1%2B5.3.0-1-ge13ca993e8ccb9ba9847cc330696e02839f328f7",
            "UID": "fb06cc2882bb21",
            "BOMRef": "pkg:cargo/tikv-jemalloc-sys@0.6.1%2B5.3.0-1-ge13ca993e8ccb9ba9847cc330696e02839f328f7"
          },
          "Version": "0.6.1+5.3.0-1-ge13ca993e8ccb9ba9847cc330696e02839f328f7",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "libc@0.2.174"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "tikv-jemallocator@0.6.1",
          "Name": "tikv-jemallocator",
          "Identifier": {
            "PURL": "pkg:cargo/tikv-jemallocator@0.6.1",
            "UID": "21320ec953059a28",
            "BOMRef": "pkg:cargo/tikv-jemallocator@0.6.1"
          },
          "Version": "0.6.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "libc@0.2.174",
            "tikv-jemalloc-sys@0.6.1+5.3.0-1-ge13ca993e8ccb9ba9847cc330696e02839f328f7"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "time@0.3.17",
          "Name": "time",
          "Identifier": {
            "PURL": "pkg:cargo/time@0.3.17",
            "UID": "2bf03074b40f7e37",
            "BOMRef": "pkg:cargo/time@0.3.17"
          },
          "Version": "0.3.17",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "itoa@1.0.5",
            "serde@1.0.226",
            "time-core@0.1.0",
            "time-macros@0.2.6"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "time-core@0.1.0",
          "Name": "time-core",
          "Identifier": {
            "PURL": "pkg:cargo/time-core@0.1.0",
            "UID": "63d7e653e58852f9",
            "BOMRef": "pkg:cargo/time-core@0.1.0"
          },
          "Version": "0.1.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "time-macros@0.2.6",
          "Name": "time-macros",
          "Identifier": {
            "PURL": "pkg:cargo/time-macros@0.2.6",
            "UID": "95ead2fd6a27f084",
            "BOMRef": "pkg:cargo/time-macros@0.2.6"
          },
          "Version": "0.2.6",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "time-core@0.1.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "tinystr@0.7.6",
          "Name": "tinystr",
          "Identifier": {
            "PURL": "pkg:cargo/tinystr@0.7.6",
            "UID": "20c4ca9dc67a4c9e",
            "BOMRef": "pkg:cargo/tinystr@0.7.6"
          },
          "Version": "0.7.6",
          "Licenses": [
            "Unicode-3.0"
          ],
          "DependsOn": [
            "displaydoc@0.2.5",
            "zerovec@0.10.4"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "tinyvec@1.10.0",
          "Name": "tinyvec",
          "Identifier": {
            "PURL": "pkg:cargo/tinyvec@1.10.0",
            "UID": "b9f0d469a6b2bf74",
            "BOMRef": "pkg:cargo/tinyvec@1.10.0"
          },
          "Version": "1.10.0",
          "Licenses": [
            "Zlib OR Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "tinyvec_macros@0.1.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "tinyvec_macros@0.1.0",
          "Name": "tinyvec_macros",
          "Identifier": {
            "PURL": "pkg:cargo/tinyvec_macros@0.1.0",
            "UID": "ca7bdbe97f883557",
            "BOMRef": "pkg:cargo/tinyvec_macros@0.1.0"
          },
          "Version": "0.1.0",
          "Licenses": [
            "MIT OR Apache-2.0 OR Zlib"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "tokio@1.48.0",
          "Name": "tokio",
          "Identifier": {
            "PURL": "pkg:cargo/tokio@1.48.0",
            "UID": "36b6e6e47ce21120",
            "BOMRef": "pkg:cargo/tokio@1.48.0"
          },
          "Version": "1.48.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "bytes@1.10.1",
            "libc@0.2.174",
            "mio@1.0.1",
            "parking_lot@0.12.5",
            "pin-project-lite@0.2.12",
            "signal-hook-registry@1.4.0",
            "socket2@0.6.0",
            "tokio-macros@2.6.0",
            "tracing@0.1.43",
            "windows-sys@0.61.1"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "tokio-io-timeout@1.2.0",
          "Name": "tokio-io-timeout",
          "Identifier": {
            "PURL": "pkg:cargo/tokio-io-timeout@1.2.0",
            "UID": "6b0b7d881a78eaff",
            "BOMRef": "pkg:cargo/tokio-io-timeout@1.2.0"
          },
          "Version": "1.2.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "pin-project-lite@0.2.12",
            "tokio@1.48.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "tokio-macros@2.6.0",
          "Name": "tokio-macros",
          "Identifier": {
            "PURL": "pkg:cargo/tokio-macros@2.6.0",
            "UID": "fb6701d260139330",
            "BOMRef": "pkg:cargo/tokio-macros@2.6.0"
          },
          "Version": "2.6.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@2.0.111"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "tokio-rustls@0.25.0",
          "Name": "tokio-rustls",
          "Identifier": {
            "PURL": "pkg:cargo/tokio-rustls@0.25.0",
            "UID": "d049ff78d646f9de",
            "BOMRef": "pkg:cargo/tokio-rustls@0.25.0"
          },
          "Version": "0.25.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "rustls-pki-types@1.12.0",
            "rustls@0.22.4",
            "tokio@1.48.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "tokio-rustls@0.26.0",
          "Name": "tokio-rustls",
          "Identifier": {
            "PURL": "pkg:cargo/tokio-rustls@0.26.0",
            "UID": "8bed31ca4cbcfd62",
            "BOMRef": "pkg:cargo/tokio-rustls@0.26.0"
          },
          "Version": "0.26.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "rustls-pki-types@1.12.0",
            "rustls@0.23.35",
            "tokio@1.48.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "tokio-stream@0.1.17",
          "Name": "tokio-stream",
          "Identifier": {
            "PURL": "pkg:cargo/tokio-stream@0.1.17",
            "UID": "e6e6eb1efaf652e",
            "BOMRef": "pkg:cargo/tokio-stream@0.1.17"
          },
          "Version": "0.1.17",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "futures-core@0.3.31",
            "pin-project-lite@0.2.12",
            "tokio@1.48.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "tokio-util@0.7.16",
          "Name": "tokio-util",
          "Identifier": {
            "PURL": "pkg:cargo/tokio-util@0.7.16",
            "UID": "5c751bca28b62157",
            "BOMRef": "pkg:cargo/tokio-util@0.7.16"
          },
          "Version": "0.7.16",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "bytes@1.10.1",
            "futures-core@0.3.31",
            "futures-sink@0.3.31",
            "futures-util@0.3.31",
            "pin-project-lite@0.2.12",
            "tokio@1.48.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "tonic@0.11.0",
          "Name": "tonic",
          "Identifier": {
            "PURL": "pkg:cargo/tonic@0.11.0",
            "UID": "281383557847b3fb",
            "BOMRef": "pkg:cargo/tonic@0.11.0"
          },
          "Version": "0.11.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "async-stream@0.3.3",
            "async-trait@0.1.89",
            "axum@0.6.12",
            "base64@0.21.0",
            "bytes@1.10.1",
            "flate2@1.1.4",
            "h2@0.3.26",
            "http-body@0.4.5",
            "http@0.2.12",
            "hyper-timeout@0.4.1",
            "hyper@0.14.26",
            "percent-encoding@2.3.2",
            "pin-project@1.0.12",
            "prost@0.12.6",
            "rustls-pemfile@2.2.0",
            "rustls-pki-types@1.12.0",
            "tokio-rustls@0.25.0",
            "tokio-stream@0.1.17",
            "tokio@1.48.0",
            "tower-layer@0.3.3",
            "tower-service@0.3.3",
            "tower@0.4.13",
            "tracing@0.1.43"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "tonic@0.12.3",
          "Name": "tonic",
          "Identifier": {
            "PURL": "pkg:cargo/tonic@0.12.3",
            "UID": "79f27aa4af57fbb1",
            "BOMRef": "pkg:cargo/tonic@0.12.3"
          },
          "Version": "0.12.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "async-stream@0.3.3",
            "async-trait@0.1.89",
            "axum@0.7.5",
            "base64@0.22.0",
            "bytes@1.10.1",
            "h2@0.4.4",
            "http-body-util@0.1.2",
            "http-body@1.0.0",
            "http@1.3.1",
            "hyper-timeout@0.5.1",
            "hyper-util@0.1.13",
            "hyper@1.6.0",
            "percent-encoding@2.3.2",
            "pin-project@1.0.12",
            "prost@0.13.1",
            "socket2@0.5.10",
            "tokio-stream@0.1.17",
            "tokio@1.48.0",
            "tower-layer@0.3.3",
            "tower-service@0.3.3",
            "tower@0.4.13",
            "tracing@0.1.43"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "tonic-reflection@0.11.0",
          "Name": "tonic-reflection",
          "Identifier": {
            "PURL": "pkg:cargo/tonic-reflection@0.11.0",
            "UID": "866ae556db7ff4e8",
            "BOMRef": "pkg:cargo/tonic-reflection@0.11.0"
          },
          "Version": "0.11.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "prost-types@0.12.6",
            "prost@0.12.6",
            "tokio-stream@0.1.17",
            "tokio@1.48.0",
            "tonic@0.11.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "tower@0.4.13",
          "Name": "tower",
          "Identifier": {
            "PURL": "pkg:cargo/tower@0.4.13",
            "UID": "7cdd70c197c575e3",
            "BOMRef": "pkg:cargo/tower@0.4.13"
          },
          "Version": "0.4.13",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "futures-core@0.3.31",
            "futures-util@0.3.31",
            "indexmap@1.9.2",
            "pin-project-lite@0.2.12",
            "pin-project@1.0.12",
            "rand@0.8.5",
            "slab@0.4.11",
            "tokio-util@0.7.16",
            "tokio@1.48.0",
            "tower-layer@0.3.3",
            "tower-service@0.3.3",
            "tracing@0.1.43"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "tower@0.5.2",
          "Name": "tower",
          "Identifier": {
            "PURL": "pkg:cargo/tower@0.5.2",
            "UID": "8ad4fabffad96708",
            "BOMRef": "pkg:cargo/tower@0.5.2"
          },
          "Version": "0.5.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "futures-core@0.3.31",
            "futures-util@0.3.31",
            "pin-project-lite@0.2.12",
            "sync_wrapper@1.0.1",
            "tokio@1.48.0",
            "tower-layer@0.3.3",
            "tower-service@0.3.3"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "tower-http@0.6.6",
          "Name": "tower-http",
          "Identifier": {
            "PURL": "pkg:cargo/tower-http@0.6.6",
            "UID": "848e9bc6bf52e335",
            "BOMRef": "pkg:cargo/tower-http@0.6.6"
          },
          "Version": "0.6.6",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "bitflags@2.9.1",
            "bytes@1.10.1",
            "futures-util@0.3.31",
            "http-body@1.0.0",
            "http@1.3.1",
            "iri-string@0.7.8",
            "pin-project-lite@0.2.12",
            "tower-layer@0.3.3",
            "tower-service@0.3.3",
            "tower@0.5.2"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "tower-layer@0.3.3",
          "Name": "tower-layer",
          "Identifier": {
            "PURL": "pkg:cargo/tower-layer@0.3.3",
            "UID": "63597d747f2cbe58",
            "BOMRef": "pkg:cargo/tower-layer@0.3.3"
          },
          "Version": "0.3.3",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "tower-service@0.3.3",
          "Name": "tower-service",
          "Identifier": {
            "PURL": "pkg:cargo/tower-service@0.3.3",
            "UID": "e7823416676bcaf6",
            "BOMRef": "pkg:cargo/tower-service@0.3.3"
          },
          "Version": "0.3.3",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "tracing@0.1.43",
          "Name": "tracing",
          "Identifier": {
            "PURL": "pkg:cargo/tracing@0.1.43",
            "UID": "5fbd96cf2fd1cdad",
            "BOMRef": "pkg:cargo/tracing@0.1.43"
          },
          "Version": "0.1.43",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "log@0.4.28",
            "pin-project-lite@0.2.12",
            "tracing-attributes@0.1.31",
            "tracing-core@0.1.35"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "tracing-attributes@0.1.31",
          "Name": "tracing-attributes",
          "Identifier": {
            "PURL": "pkg:cargo/tracing-attributes@0.1.31",
            "UID": "3d673b1ae3f69131",
            "BOMRef": "pkg:cargo/tracing-attributes@0.1.31"
          },
          "Version": "0.1.31",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@2.0.111"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "tracing-core@0.1.35",
          "Name": "tracing-core",
          "Identifier": {
            "PURL": "pkg:cargo/tracing-core@0.1.35",
            "UID": "59e02ef69d272c09",
            "BOMRef": "pkg:cargo/tracing-core@0.1.35"
          },
          "Version": "0.1.35",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "once_cell@1.21.3",
            "valuable@0.1.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "tracing-log@0.2.0",
          "Name": "tracing-log",
          "Identifier": {
            "PURL": "pkg:cargo/tracing-log@0.2.0",
            "UID": "bb5393cd696fdfb7",
            "BOMRef": "pkg:cargo/tracing-log@0.2.0"
          },
          "Version": "0.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "log@0.4.28",
            "once_cell@1.21.3",
            "tracing-core@0.1.35"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "tracing-serde@0.2.0",
          "Name": "tracing-serde",
          "Identifier": {
            "PURL": "pkg:cargo/tracing-serde@0.2.0",
            "UID": "301b507b486fcdda",
            "BOMRef": "pkg:cargo/tracing-serde@0.2.0"
          },
          "Version": "0.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "serde@1.0.226",
            "tracing-core@0.1.35"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "tracing-subscriber@0.3.22",
          "Name": "tracing-subscriber",
          "Identifier": {
            "PURL": "pkg:cargo/tracing-subscriber@0.3.22",
            "UID": "c7ca42516e4592ec",
            "BOMRef": "pkg:cargo/tracing-subscriber@0.3.22"
          },
          "Version": "0.3.22",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "matchers@0.2.0",
            "nu-ansi-term@0.50.1",
            "once_cell@1.21.3",
            "parking_lot@0.12.5",
            "regex-automata@0.4.8",
            "serde@1.0.226",
            "serde_json@1.0.145",
            "sharded-slab@0.1.4",
            "smallvec@1.15.1",
            "thread_local@1.1.7",
            "tracing-core@0.1.35",
            "tracing-log@0.2.0",
            "tracing-serde@0.2.0",
            "tracing@0.1.43"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "tracing-tracy@0.11.4",
          "Name": "tracing-tracy",
          "Identifier": {
            "PURL": "pkg:cargo/tracing-tracy@0.11.4",
            "UID": "f53c3b0e8f5606b1",
            "BOMRef": "pkg:cargo/tracing-tracy@0.11.4"
          },
          "Version": "0.11.4",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "tracing-core@0.1.35",
            "tracing-subscriber@0.3.22",
            "tracy-client@0.17.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "tracy-client@0.17.0",
          "Name": "tracy-client",
          "Identifier": {
            "PURL": "pkg:cargo/tracy-client@0.17.0",
            "UID": "4c6910302f6eb884",
            "BOMRef": "pkg:cargo/tracy-client@0.17.0"
          },
          "Version": "0.17.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "loom@0.7.1",
            "once_cell@1.21.3",
            "tracy-client-sys@0.21.2"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "tracy-client-sys@0.21.2",
          "Name": "tracy-client-sys",
          "Identifier": {
            "PURL": "pkg:cargo/tracy-client-sys@0.21.2",
            "UID": "256ec65ea8101e57",
            "BOMRef": "pkg:cargo/tracy-client-sys@0.21.2"
          },
          "Version": "0.21.2",
          "Licenses": [
            "(MIT OR Apache-2.0) AND BSD-3-Clause"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "try-lock@0.2.3",
          "Name": "try-lock",
          "Identifier": {
            "PURL": "pkg:cargo/try-lock@0.2.3",
            "UID": "9288c22f1ab51c12",
            "BOMRef": "pkg:cargo/try-lock@0.2.3"
          },
          "Version": "0.2.3",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "typeid@1.0.0",
          "Name": "typeid",
          "Identifier": {
            "PURL": "pkg:cargo/typeid@1.0.0",
            "UID": "f8afcecea0d507b4",
            "BOMRef": "pkg:cargo/typeid@1.0.0"
          },
          "Version": "1.0.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "typenum@1.16.0",
          "Name": "typenum",
          "Identifier": {
            "PURL": "pkg:cargo/typenum@1.16.0",
            "UID": "322ac1fcf26473cd",
            "BOMRef": "pkg:cargo/typenum@1.16.0"
          },
          "Version": "1.16.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "typetag@0.2.15",
          "Name": "typetag",
          "Identifier": {
            "PURL": "pkg:cargo/typetag@0.2.15",
            "UID": "2f110576b64b55c1",
            "BOMRef": "pkg:cargo/typetag@0.2.15"
          },
          "Version": "0.2.15",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "erased-serde@0.4.2",
            "inventory@0.3.14",
            "once_cell@1.21.3",
            "serde@1.0.226",
            "typetag-impl@0.2.15"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "typetag-impl@0.2.15",
          "Name": "typetag-impl",
          "Identifier": {
            "PURL": "pkg:cargo/typetag-impl@0.2.15",
            "UID": "9f38335c551cd209",
            "BOMRef": "pkg:cargo/typetag-impl@0.2.15"
          },
          "Version": "0.2.15",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@2.0.111"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "unicase@2.6.0",
          "Name": "unicase",
          "Identifier": {
            "PURL": "pkg:cargo/unicase@2.6.0",
            "UID": "b2cfab077bd39d21",
            "BOMRef": "pkg:cargo/unicase@2.6.0"
          },
          "Version": "2.6.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "unicode-ident@1.0.13",
          "Name": "unicode-ident",
          "Identifier": {
            "PURL": "pkg:cargo/unicode-ident@1.0.13",
            "UID": "1972648042470b18",
            "BOMRef": "pkg:cargo/unicode-ident@1.0.13"
          },
          "Version": "1.0.13",
          "Licenses": [
            "(MIT OR Apache-2.0) AND Unicode-DFS-2016"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "unicode-normalization@0.1.24",
          "Name": "unicode-normalization",
          "Identifier": {
            "PURL": "pkg:cargo/unicode-normalization@0.1.24",
            "UID": "f0d4857a1f028139",
            "BOMRef": "pkg:cargo/unicode-normalization@0.1.24"
          },
          "Version": "0.1.24",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "tinyvec@1.10.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "unicode-width@0.2.0",
          "Name": "unicode-width",
          "Identifier": {
            "PURL": "pkg:cargo/unicode-width@0.2.0",
            "UID": "e04553af4f046abb",
            "BOMRef": "pkg:cargo/unicode-width@0.2.0"
          },
          "Version": "0.2.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "unicode-xid@0.2.6",
          "Name": "unicode-xid",
          "Identifier": {
            "PURL": "pkg:cargo/unicode-xid@0.2.6",
            "UID": "408814e085c6d442",
            "BOMRef": "pkg:cargo/unicode-xid@0.2.6"
          },
          "Version": "0.2.6",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "unindent@0.2.4",
          "Name": "unindent",
          "Identifier": {
            "PURL": "pkg:cargo/unindent@0.2.4",
            "UID": "de2ffa6bf9b7297",
            "BOMRef": "pkg:cargo/unindent@0.2.4"
          },
          "Version": "0.2.4",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "unit-prefix@0.5.1",
          "Name": "unit-prefix",
          "Identifier": {
            "PURL": "pkg:cargo/unit-prefix@0.5.1",
            "UID": "73ee855a09c65563",
            "BOMRef": "pkg:cargo/unit-prefix@0.5.1"
          },
          "Version": "0.5.1",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "untrusted@0.9.0",
          "Name": "untrusted",
          "Identifier": {
            "PURL": "pkg:cargo/untrusted@0.9.0",
            "UID": "57b13c4cd7eaf0d1",
            "BOMRef": "pkg:cargo/untrusted@0.9.0"
          },
          "Version": "0.9.0",
          "Licenses": [
            "ISC"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "unty@0.0.4",
          "Name": "unty",
          "Identifier": {
            "PURL": "pkg:cargo/unty@0.0.4",
            "UID": "3c93350bc7186a46",
            "BOMRef": "pkg:cargo/unty@0.0.4"
          },
          "Version": "0.0.4",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "unwind@0.4.1",
          "Name": "unwind",
          "Identifier": {
            "PURL": "pkg:cargo/unwind@0.4.1",
            "UID": "ba65350406f89f5",
            "BOMRef": "pkg:cargo/unwind@0.4.1"
          },
          "Version": "0.4.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "foreign-types@0.5.0",
            "libc@0.2.174",
            "unwind-sys@0.1.3"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "unwind-sys@0.1.3",
          "Name": "unwind-sys",
          "Identifier": {
            "PURL": "pkg:cargo/unwind-sys@0.1.3",
            "UID": "526e37ad91ecb533",
            "BOMRef": "pkg:cargo/unwind-sys@0.1.3"
          },
          "Version": "0.1.3",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "libc@0.2.174"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "url@2.5.7",
          "Name": "url",
          "Identifier": {
            "PURL": "pkg:cargo/url@2.5.7",
            "UID": "f230cb38af53eb1a",
            "BOMRef": "pkg:cargo/url@2.5.7"
          },
          "Version": "2.5.7",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "form_urlencoded@1.2.2",
            "idna@1.1.0",
            "percent-encoding@2.3.2",
            "serde@1.0.226"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "utf16_iter@1.0.5",
          "Name": "utf16_iter",
          "Identifier": {
            "PURL": "pkg:cargo/utf16_iter@1.0.5",
            "UID": "4383da8797285762",
            "BOMRef": "pkg:cargo/utf16_iter@1.0.5"
          },
          "Version": "1.0.5",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "utf8_iter@1.0.4",
          "Name": "utf8_iter",
          "Identifier": {
            "PURL": "pkg:cargo/utf8_iter@1.0.4",
            "UID": "9a5f230dfd85f003",
            "BOMRef": "pkg:cargo/utf8_iter@1.0.4"
          },
          "Version": "1.0.4",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "utf8parse@0.2.1",
          "Name": "utf8parse",
          "Identifier": {
            "PURL": "pkg:cargo/utf8parse@0.2.1",
            "UID": "d4ef4090ec081e72",
            "BOMRef": "pkg:cargo/utf8parse@0.2.1"
          },
          "Version": "0.2.1",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "uuid@1.18.1",
          "Name": "uuid",
          "Identifier": {
            "PURL": "pkg:cargo/uuid@1.18.1",
            "UID": "acb4999c9d2589d6",
            "BOMRef": "pkg:cargo/uuid@1.18.1"
          },
          "Version": "1.18.1",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "getrandom@0.3.0",
            "js-sys@0.3.77",
            "serde@1.0.226",
            "wasm-bindgen@0.2.100"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "v_htmlescape@0.15.8",
          "Name": "v_htmlescape",
          "Identifier": {
            "PURL": "pkg:cargo/v_htmlescape@0.15.8",
            "UID": "44ff75497c0065c9",
            "BOMRef": "pkg:cargo/v_htmlescape@0.15.8"
          },
          "Version": "0.15.8",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "validator@0.20.0",
          "Name": "validator",
          "Identifier": {
            "PURL": "pkg:cargo/validator@0.20.0",
            "UID": "949063187764d408",
            "BOMRef": "pkg:cargo/validator@0.20.0"
          },
          "Version": "0.20.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "idna@1.1.0",
            "once_cell@1.21.3",
            "regex@1.11.0",
            "serde@1.0.226",
            "serde_derive@1.0.226",
            "serde_json@1.0.145",
            "url@2.5.7",
            "validator_derive@0.20.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "validator_derive@0.20.0",
          "Name": "validator_derive",
          "Identifier": {
            "PURL": "pkg:cargo/validator_derive@0.20.0",
            "UID": "7088d55c41c49cb9",
            "BOMRef": "pkg:cargo/validator_derive@0.20.0"
          },
          "Version": "0.20.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "darling@0.20.8",
            "once_cell@1.21.3",
            "proc-macro-error2@2.0.1",
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@2.0.111"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "valuable@0.1.0",
          "Name": "valuable",
          "Identifier": {
            "PURL": "pkg:cargo/valuable@0.1.0",
            "UID": "4307ca046382c840",
            "BOMRef": "pkg:cargo/valuable@0.1.0"
          },
          "Version": "0.1.0",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "vaporetto@0.6.5",
          "Name": "vaporetto",
          "Identifier": {
            "PURL": "pkg:cargo/vaporetto@0.6.5",
            "UID": "17396127d5f6afb5",
            "BOMRef": "pkg:cargo/vaporetto@0.6.5"
          },
          "Version": "0.6.5",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "bincode@2.0.1",
            "daachorse@1.0.0",
            "hashbrown@0.15.2"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "virtue@0.0.18",
          "Name": "virtue",
          "Identifier": {
            "PURL": "pkg:cargo/virtue@0.0.18",
            "UID": "b9c63c0c7ebb6b7f",
            "BOMRef": "pkg:cargo/virtue@0.0.18"
          },
          "Version": "0.0.18",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "walkdir@2.5.0",
          "Name": "walkdir",
          "Identifier": {
            "PURL": "pkg:cargo/walkdir@2.5.0",
            "UID": "25cb6b7caa914e75",
            "BOMRef": "pkg:cargo/walkdir@2.5.0"
          },
          "Version": "2.5.0",
          "Licenses": [
            "Unlicense OR MIT"
          ],
          "DependsOn": [
            "same-file@1.0.6",
            "winapi-util@0.1.5"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "want@0.3.0",
          "Name": "want",
          "Identifier": {
            "PURL": "pkg:cargo/want@0.3.0",
            "UID": "5c69e9728377dcd",
            "BOMRef": "pkg:cargo/want@0.3.0"
          },
          "Version": "0.3.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "log@0.4.28",
            "try-lock@0.2.3"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "wasi@0.11.0+wasi-snapshot-preview1",
          "Name": "wasi",
          "Identifier": {
            "PURL": "pkg:cargo/wasi@0.11.0%2Bwasi-snapshot-preview1",
            "UID": "ea94184be9224b50",
            "BOMRef": "pkg:cargo/wasi@0.11.0%2Bwasi-snapshot-preview1"
          },
          "Version": "0.11.0+wasi-snapshot-preview1",
          "Licenses": [
            "Apache-2.0 OR Apache-2.0 OR MIT"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "wasi@0.13.3+wasi-0.2.2",
          "Name": "wasi",
          "Identifier": {
            "PURL": "pkg:cargo/wasi@0.13.3%2Bwasi-0.2.2",
            "UID": "8dfa66c21b001780",
            "BOMRef": "pkg:cargo/wasi@0.13.3%2Bwasi-0.2.2"
          },
          "Version": "0.13.3+wasi-0.2.2",
          "Licenses": [
            "Apache-2.0 OR Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "wit-bindgen-rt@0.33.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "wasi@0.9.0+wasi-snapshot-preview1",
          "Name": "wasi",
          "Identifier": {
            "PURL": "pkg:cargo/wasi@0.9.0%2Bwasi-snapshot-preview1",
            "UID": "92b67686a8648de5",
            "BOMRef": "pkg:cargo/wasi@0.9.0%2Bwasi-snapshot-preview1"
          },
          "Version": "0.9.0+wasi-snapshot-preview1",
          "Licenses": [
            "Apache-2.0 OR Apache-2.0 OR MIT"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "wasm-bindgen@0.2.100",
          "Name": "wasm-bindgen",
          "Identifier": {
            "PURL": "pkg:cargo/wasm-bindgen@0.2.100",
            "UID": "7e6dc912a0ba2ef5",
            "BOMRef": "pkg:cargo/wasm-bindgen@0.2.100"
          },
          "Version": "0.2.100",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "cfg-if@1.0.0",
            "once_cell@1.21.3",
            "rustversion@1.0.11",
            "wasm-bindgen-macro@0.2.100"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "wasm-bindgen-backend@0.2.100",
          "Name": "wasm-bindgen-backend",
          "Identifier": {
            "PURL": "pkg:cargo/wasm-bindgen-backend@0.2.100",
            "UID": "1b2182697e850306",
            "BOMRef": "pkg:cargo/wasm-bindgen-backend@0.2.100"
          },
          "Version": "0.2.100",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "bumpalo@3.11.1",
            "log@0.4.28",
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@2.0.111",
            "wasm-bindgen-shared@0.2.100"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "wasm-bindgen-futures@0.4.42",
          "Name": "wasm-bindgen-futures",
          "Identifier": {
            "PURL": "pkg:cargo/wasm-bindgen-futures@0.4.42",
            "UID": "2644689b56822b77",
            "BOMRef": "pkg:cargo/wasm-bindgen-futures@0.4.42"
          },
          "Version": "0.4.42",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "cfg-if@1.0.0",
            "js-sys@0.3.77",
            "wasm-bindgen@0.2.100",
            "web-sys@0.3.69"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "wasm-bindgen-macro@0.2.100",
          "Name": "wasm-bindgen-macro",
          "Identifier": {
            "PURL": "pkg:cargo/wasm-bindgen-macro@0.2.100",
            "UID": "a493bdfb68422e8",
            "BOMRef": "pkg:cargo/wasm-bindgen-macro@0.2.100"
          },
          "Version": "0.2.100",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "quote@1.0.42",
            "wasm-bindgen-macro-support@0.2.100"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "wasm-bindgen-macro-support@0.2.100",
          "Name": "wasm-bindgen-macro-support",
          "Identifier": {
            "PURL": "pkg:cargo/wasm-bindgen-macro-support@0.2.100",
            "UID": "ad31528e9b4429ae",
            "BOMRef": "pkg:cargo/wasm-bindgen-macro-support@0.2.100"
          },
          "Version": "0.2.100",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@2.0.111",
            "wasm-bindgen-backend@0.2.100",
            "wasm-bindgen-shared@0.2.100"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "wasm-bindgen-shared@0.2.100",
          "Name": "wasm-bindgen-shared",
          "Identifier": {
            "PURL": "pkg:cargo/wasm-bindgen-shared@0.2.100",
            "UID": "e27a45ff1e26348d",
            "BOMRef": "pkg:cargo/wasm-bindgen-shared@0.2.100"
          },
          "Version": "0.2.100",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "unicode-ident@1.0.13"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "wasm-streams@0.4.0",
          "Name": "wasm-streams",
          "Identifier": {
            "PURL": "pkg:cargo/wasm-streams@0.4.0",
            "UID": "8f1cc04f79155b48",
            "BOMRef": "pkg:cargo/wasm-streams@0.4.0"
          },
          "Version": "0.4.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "futures-util@0.3.31",
            "js-sys@0.3.77",
            "wasm-bindgen-futures@0.4.42",
            "wasm-bindgen@0.2.100",
            "web-sys@0.3.69"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "web-sys@0.3.69",
          "Name": "web-sys",
          "Identifier": {
            "PURL": "pkg:cargo/web-sys@0.3.69",
            "UID": "394336444b0bf738",
            "BOMRef": "pkg:cargo/web-sys@0.3.69"
          },
          "Version": "0.3.69",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "js-sys@0.3.77",
            "wasm-bindgen@0.2.100"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "web-time@1.1.0",
          "Name": "web-time",
          "Identifier": {
            "PURL": "pkg:cargo/web-time@1.1.0",
            "UID": "a1c50eedfea1416",
            "BOMRef": "pkg:cargo/web-time@1.1.0"
          },
          "Version": "1.1.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "js-sys@0.3.77",
            "wasm-bindgen@0.2.100"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "webpki-roots@0.26.1",
          "Name": "webpki-roots",
          "Identifier": {
            "PURL": "pkg:cargo/webpki-roots@0.26.1",
            "UID": "6093e34c1f1dd102",
            "BOMRef": "pkg:cargo/webpki-roots@0.26.1"
          },
          "Version": "0.26.1",
          "Licenses": [
            "MPL-2.0"
          ],
          "DependsOn": [
            "rustls-pki-types@1.12.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "webpki-roots@1.0.0",
          "Name": "webpki-roots",
          "Identifier": {
            "PURL": "pkg:cargo/webpki-roots@1.0.0",
            "UID": "c0038d8ca073748e",
            "BOMRef": "pkg:cargo/webpki-roots@1.0.0"
          },
          "Version": "1.0.0",
          "Licenses": [
            "CDLA-Permissive-2.0"
          ],
          "DependsOn": [
            "rustls-pki-types@1.12.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "whatlang@0.16.4",
          "Name": "whatlang",
          "Identifier": {
            "PURL": "pkg:cargo/whatlang@0.16.4",
            "UID": "b8166f752805d5b2",
            "BOMRef": "pkg:cargo/whatlang@0.16.4"
          },
          "Version": "0.16.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "hashbrown@0.14.2",
            "once_cell@1.21.3"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "winapi@0.3.9",
          "Name": "winapi",
          "Identifier": {
            "PURL": "pkg:cargo/winapi@0.3.9",
            "UID": "50c3c0f86b4c9ad7",
            "BOMRef": "pkg:cargo/winapi@0.3.9"
          },
          "Version": "0.3.9",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "winapi-i686-pc-windows-gnu@0.4.0",
            "winapi-x86_64-pc-windows-gnu@0.4.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "winapi-i686-pc-windows-gnu@0.4.0",
          "Name": "winapi-i686-pc-windows-gnu",
          "Identifier": {
            "PURL": "pkg:cargo/winapi-i686-pc-windows-gnu@0.4.0",
            "UID": "4138803399a51b03",
            "BOMRef": "pkg:cargo/winapi-i686-pc-windows-gnu@0.4.0"
          },
          "Version": "0.4.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "winapi-util@0.1.5",
          "Name": "winapi-util",
          "Identifier": {
            "PURL": "pkg:cargo/winapi-util@0.1.5",
            "UID": "6d3436de9737f61",
            "BOMRef": "pkg:cargo/winapi-util@0.1.5"
          },
          "Version": "0.1.5",
          "Licenses": [
            "Unlicense OR MIT"
          ],
          "DependsOn": [
            "winapi@0.3.9"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "winapi-x86_64-pc-windows-gnu@0.4.0",
          "Name": "winapi-x86_64-pc-windows-gnu",
          "Identifier": {
            "PURL": "pkg:cargo/winapi-x86_64-pc-windows-gnu@0.4.0",
            "UID": "7d6d843d1d29b42f",
            "BOMRef": "pkg:cargo/winapi-x86_64-pc-windows-gnu@0.4.0"
          },
          "Version": "0.4.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "windows@0.48.0",
          "Name": "windows",
          "Identifier": {
            "PURL": "pkg:cargo/windows@0.48.0",
            "UID": "47abe4c09d41aaf1",
            "BOMRef": "pkg:cargo/windows@0.48.0"
          },
          "Version": "0.48.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "windows-targets@0.48.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "windows@0.57.0",
          "Name": "windows",
          "Identifier": {
            "PURL": "pkg:cargo/windows@0.57.0",
            "UID": "45701083d6dd83e6",
            "BOMRef": "pkg:cargo/windows@0.57.0"
          },
          "Version": "0.57.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "windows-core@0.57.0",
            "windows-targets@0.52.6"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "windows@0.61.3",
          "Name": "windows",
          "Identifier": {
            "PURL": "pkg:cargo/windows@0.61.3",
            "UID": "9712f12453c8fe0b",
            "BOMRef": "pkg:cargo/windows@0.61.3"
          },
          "Version": "0.61.3",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "windows-collections@0.2.0",
            "windows-core@0.61.2",
            "windows-future@0.2.1",
            "windows-link@0.1.3",
            "windows-numerics@0.2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "windows-collections@0.2.0",
          "Name": "windows-collections",
          "Identifier": {
            "PURL": "pkg:cargo/windows-collections@0.2.0",
            "UID": "47e06e9080e18ebf",
            "BOMRef": "pkg:cargo/windows-collections@0.2.0"
          },
          "Version": "0.2.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "windows-core@0.61.2"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "windows-core@0.57.0",
          "Name": "windows-core",
          "Identifier": {
            "PURL": "pkg:cargo/windows-core@0.57.0",
            "UID": "3d106f4e71e720d0",
            "BOMRef": "pkg:cargo/windows-core@0.57.0"
          },
          "Version": "0.57.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "windows-implement@0.57.0",
            "windows-interface@0.57.0",
            "windows-result@0.1.2",
            "windows-targets@0.52.6"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "windows-core@0.61.2",
          "Name": "windows-core",
          "Identifier": {
            "PURL": "pkg:cargo/windows-core@0.61.2",
            "UID": "1c15c341435b3510",
            "BOMRef": "pkg:cargo/windows-core@0.61.2"
          },
          "Version": "0.61.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "windows-implement@0.60.0",
            "windows-interface@0.59.1",
            "windows-link@0.1.3",
            "windows-result@0.3.4",
            "windows-strings@0.4.2"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "windows-future@0.2.1",
          "Name": "windows-future",
          "Identifier": {
            "PURL": "pkg:cargo/windows-future@0.2.1",
            "UID": "43929b9c005b8921",
            "BOMRef": "pkg:cargo/windows-future@0.2.1"
          },
          "Version": "0.2.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "windows-core@0.61.2",
            "windows-link@0.1.3",
            "windows-threading@0.1.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "windows-implement@0.57.0",
          "Name": "windows-implement",
          "Identifier": {
            "PURL": "pkg:cargo/windows-implement@0.57.0",
            "UID": "be742d84cf86cd2",
            "BOMRef": "pkg:cargo/windows-implement@0.57.0"
          },
          "Version": "0.57.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@2.0.111"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "windows-implement@0.60.0",
          "Name": "windows-implement",
          "Identifier": {
            "PURL": "pkg:cargo/windows-implement@0.60.0",
            "UID": "e93aaef288bc9232",
            "BOMRef": "pkg:cargo/windows-implement@0.60.0"
          },
          "Version": "0.60.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@2.0.111"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "windows-interface@0.57.0",
          "Name": "windows-interface",
          "Identifier": {
            "PURL": "pkg:cargo/windows-interface@0.57.0",
            "UID": "81825b5197d4d747",
            "BOMRef": "pkg:cargo/windows-interface@0.57.0"
          },
          "Version": "0.57.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@2.0.111"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "windows-interface@0.59.1",
          "Name": "windows-interface",
          "Identifier": {
            "PURL": "pkg:cargo/windows-interface@0.59.1",
            "UID": "1c1a062fe6c5d1f3",
            "BOMRef": "pkg:cargo/windows-interface@0.59.1"
          },
          "Version": "0.59.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@2.0.111"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "windows-link@0.1.3",
          "Name": "windows-link",
          "Identifier": {
            "PURL": "pkg:cargo/windows-link@0.1.3",
            "UID": "a998c0866c882429",
            "BOMRef": "pkg:cargo/windows-link@0.1.3"
          },
          "Version": "0.1.3",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "windows-link@0.2.0",
          "Name": "windows-link",
          "Identifier": {
            "PURL": "pkg:cargo/windows-link@0.2.0",
            "UID": "8a34c0263a7c46d2",
            "BOMRef": "pkg:cargo/windows-link@0.2.0"
          },
          "Version": "0.2.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "windows-numerics@0.2.0",
          "Name": "windows-numerics",
          "Identifier": {
            "PURL": "pkg:cargo/windows-numerics@0.2.0",
            "UID": "aea1d71e678fee1d",
            "BOMRef": "pkg:cargo/windows-numerics@0.2.0"
          },
          "Version": "0.2.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "windows-core@0.61.2",
            "windows-link@0.1.3"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "windows-result@0.1.2",
          "Name": "windows-result",
          "Identifier": {
            "PURL": "pkg:cargo/windows-result@0.1.2",
            "UID": "f050c129405bf231",
            "BOMRef": "pkg:cargo/windows-result@0.1.2"
          },
          "Version": "0.1.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "windows-targets@0.52.6"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "windows-result@0.3.4",
          "Name": "windows-result",
          "Identifier": {
            "PURL": "pkg:cargo/windows-result@0.3.4",
            "UID": "ea46b3d5d5adc0d6",
            "BOMRef": "pkg:cargo/windows-result@0.3.4"
          },
          "Version": "0.3.4",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "windows-link@0.1.3"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "windows-strings@0.4.2",
          "Name": "windows-strings",
          "Identifier": {
            "PURL": "pkg:cargo/windows-strings@0.4.2",
            "UID": "1acecea48f5c06",
            "BOMRef": "pkg:cargo/windows-strings@0.4.2"
          },
          "Version": "0.4.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "windows-link@0.1.3"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "windows-sys@0.42.0",
          "Name": "windows-sys",
          "Identifier": {
            "PURL": "pkg:cargo/windows-sys@0.42.0",
            "UID": "b4f82c7963be24be",
            "BOMRef": "pkg:cargo/windows-sys@0.42.0"
          },
          "Version": "0.42.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "windows_aarch64_gnullvm@0.42.2",
            "windows_aarch64_msvc@0.42.2",
            "windows_i686_gnu@0.42.2",
            "windows_i686_msvc@0.42.2",
            "windows_x86_64_gnu@0.42.2",
            "windows_x86_64_gnullvm@0.42.2",
            "windows_x86_64_msvc@0.42.2"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "windows-sys@0.48.0",
          "Name": "windows-sys",
          "Identifier": {
            "PURL": "pkg:cargo/windows-sys@0.48.0",
            "UID": "4e54d35cacabdd39",
            "BOMRef": "pkg:cargo/windows-sys@0.48.0"
          },
          "Version": "0.48.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "windows-targets@0.48.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "windows-sys@0.52.0",
          "Name": "windows-sys",
          "Identifier": {
            "PURL": "pkg:cargo/windows-sys@0.52.0",
            "UID": "9e339923ab29fb0a",
            "BOMRef": "pkg:cargo/windows-sys@0.52.0"
          },
          "Version": "0.52.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "windows-targets@0.52.6"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "windows-sys@0.59.0",
          "Name": "windows-sys",
          "Identifier": {
            "PURL": "pkg:cargo/windows-sys@0.59.0",
            "UID": "171f637ad565997f",
            "BOMRef": "pkg:cargo/windows-sys@0.59.0"
          },
          "Version": "0.59.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "windows-targets@0.52.6"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "windows-sys@0.60.2",
          "Name": "windows-sys",
          "Identifier": {
            "PURL": "pkg:cargo/windows-sys@0.60.2",
            "UID": "877b7a4688da9ce1",
            "BOMRef": "pkg:cargo/windows-sys@0.60.2"
          },
          "Version": "0.60.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "windows-targets@0.53.2"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "windows-sys@0.61.1",
          "Name": "windows-sys",
          "Identifier": {
            "PURL": "pkg:cargo/windows-sys@0.61.1",
            "UID": "ec7585f2752b59c3",
            "BOMRef": "pkg:cargo/windows-sys@0.61.1"
          },
          "Version": "0.61.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "windows-link@0.2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "windows-targets@0.48.0",
          "Name": "windows-targets",
          "Identifier": {
            "PURL": "pkg:cargo/windows-targets@0.48.0",
            "UID": "bb59a83dfba2e2e9",
            "BOMRef": "pkg:cargo/windows-targets@0.48.0"
          },
          "Version": "0.48.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "windows_aarch64_gnullvm@0.48.0",
            "windows_aarch64_msvc@0.48.0",
            "windows_i686_gnu@0.48.0",
            "windows_i686_msvc@0.48.0",
            "windows_x86_64_gnu@0.48.0",
            "windows_x86_64_gnullvm@0.48.0",
            "windows_x86_64_msvc@0.48.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "windows-targets@0.52.6",
          "Name": "windows-targets",
          "Identifier": {
            "PURL": "pkg:cargo/windows-targets@0.52.6",
            "UID": "187506b02fc404ef",
            "BOMRef": "pkg:cargo/windows-targets@0.52.6"
          },
          "Version": "0.52.6",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "windows_aarch64_gnullvm@0.52.6",
            "windows_aarch64_msvc@0.52.6",
            "windows_i686_gnu@0.52.6",
            "windows_i686_gnullvm@0.52.6",
            "windows_i686_msvc@0.52.6",
            "windows_x86_64_gnu@0.52.6",
            "windows_x86_64_gnullvm@0.52.6",
            "windows_x86_64_msvc@0.52.6"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "windows-targets@0.53.2",
          "Name": "windows-targets",
          "Identifier": {
            "PURL": "pkg:cargo/windows-targets@0.53.2",
            "UID": "fcc575227472d54e",
            "BOMRef": "pkg:cargo/windows-targets@0.53.2"
          },
          "Version": "0.53.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "windows_aarch64_gnullvm@0.53.0",
            "windows_aarch64_msvc@0.53.0",
            "windows_i686_gnu@0.53.0",
            "windows_i686_gnullvm@0.53.0",
            "windows_i686_msvc@0.53.0",
            "windows_x86_64_gnu@0.53.0",
            "windows_x86_64_gnullvm@0.53.0",
            "windows_x86_64_msvc@0.53.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "windows-threading@0.1.0",
          "Name": "windows-threading",
          "Identifier": {
            "PURL": "pkg:cargo/windows-threading@0.1.0",
            "UID": "19eff4b821ec4b58",
            "BOMRef": "pkg:cargo/windows-threading@0.1.0"
          },
          "Version": "0.1.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "windows-link@0.1.3"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "windows_aarch64_gnullvm@0.42.2",
          "Name": "windows_aarch64_gnullvm",
          "Identifier": {
            "PURL": "pkg:cargo/windows_aarch64_gnullvm@0.42.2",
            "UID": "cb79fcbf57d0f133",
            "BOMRef": "pkg:cargo/windows_aarch64_gnullvm@0.42.2"
          },
          "Version": "0.42.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "windows_aarch64_gnullvm@0.48.0",
          "Name": "windows_aarch64_gnullvm",
          "Identifier": {
            "PURL": "pkg:cargo/windows_aarch64_gnullvm@0.48.0",
            "UID": "10484179d72cc882",
            "BOMRef": "pkg:cargo/windows_aarch64_gnullvm@0.48.0"
          },
          "Version": "0.48.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "windows_aarch64_gnullvm@0.52.6",
          "Name": "windows_aarch64_gnullvm",
          "Identifier": {
            "PURL": "pkg:cargo/windows_aarch64_gnullvm@0.52.6",
            "UID": "e09dac53cc59d67",
            "BOMRef": "pkg:cargo/windows_aarch64_gnullvm@0.52.6"
          },
          "Version": "0.52.6",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "windows_aarch64_gnullvm@0.53.0",
          "Name": "windows_aarch64_gnullvm",
          "Identifier": {
            "PURL": "pkg:cargo/windows_aarch64_gnullvm@0.53.0",
            "UID": "a1bee09eb500b36",
            "BOMRef": "pkg:cargo/windows_aarch64_gnullvm@0.53.0"
          },
          "Version": "0.53.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "windows_aarch64_msvc@0.42.2",
          "Name": "windows_aarch64_msvc",
          "Identifier": {
            "PURL": "pkg:cargo/windows_aarch64_msvc@0.42.2",
            "UID": "3cf81a0f9101b747",
            "BOMRef": "pkg:cargo/windows_aarch64_msvc@0.42.2"
          },
          "Version": "0.42.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "windows_aarch64_msvc@0.48.0",
          "Name": "windows_aarch64_msvc",
          "Identifier": {
            "PURL": "pkg:cargo/windows_aarch64_msvc@0.48.0",
            "UID": "3db96f702f83fca",
            "BOMRef": "pkg:cargo/windows_aarch64_msvc@0.48.0"
          },
          "Version": "0.48.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "windows_aarch64_msvc@0.52.6",
          "Name": "windows_aarch64_msvc",
          "Identifier": {
            "PURL": "pkg:cargo/windows_aarch64_msvc@0.52.6",
            "UID": "37744bd5fa9ff501",
            "BOMRef": "pkg:cargo/windows_aarch64_msvc@0.52.6"
          },
          "Version": "0.52.6",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "windows_aarch64_msvc@0.53.0",
          "Name": "windows_aarch64_msvc",
          "Identifier": {
            "PURL": "pkg:cargo/windows_aarch64_msvc@0.53.0",
            "UID": "52fd72b14e6a8f7a",
            "BOMRef": "pkg:cargo/windows_aarch64_msvc@0.53.0"
          },
          "Version": "0.53.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "windows_i686_gnu@0.42.2",
          "Name": "windows_i686_gnu",
          "Identifier": {
            "PURL": "pkg:cargo/windows_i686_gnu@0.42.2",
            "UID": "40b89371b1c0368f",
            "BOMRef": "pkg:cargo/windows_i686_gnu@0.42.2"
          },
          "Version": "0.42.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "windows_i686_gnu@0.48.0",
          "Name": "windows_i686_gnu",
          "Identifier": {
            "PURL": "pkg:cargo/windows_i686_gnu@0.48.0",
            "UID": "27864f4d1a92393a",
            "BOMRef": "pkg:cargo/windows_i686_gnu@0.48.0"
          },
          "Version": "0.48.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "windows_i686_gnu@0.52.6",
          "Name": "windows_i686_gnu",
          "Identifier": {
            "PURL": "pkg:cargo/windows_i686_gnu@0.52.6",
            "UID": "2aa4363b751380ca",
            "BOMRef": "pkg:cargo/windows_i686_gnu@0.52.6"
          },
          "Version": "0.52.6",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "windows_i686_gnu@0.53.0",
          "Name": "windows_i686_gnu",
          "Identifier": {
            "PURL": "pkg:cargo/windows_i686_gnu@0.53.0",
            "UID": "a71763562e024110",
            "BOMRef": "pkg:cargo/windows_i686_gnu@0.53.0"
          },
          "Version": "0.53.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "windows_i686_gnullvm@0.52.6",
          "Name": "windows_i686_gnullvm",
          "Identifier": {
            "PURL": "pkg:cargo/windows_i686_gnullvm@0.52.6",
            "UID": "f2b0bbed9a03af0e",
            "BOMRef": "pkg:cargo/windows_i686_gnullvm@0.52.6"
          },
          "Version": "0.52.6",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "windows_i686_gnullvm@0.53.0",
          "Name": "windows_i686_gnullvm",
          "Identifier": {
            "PURL": "pkg:cargo/windows_i686_gnullvm@0.53.0",
            "UID": "56257c074f02337a",
            "BOMRef": "pkg:cargo/windows_i686_gnullvm@0.53.0"
          },
          "Version": "0.53.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "windows_i686_msvc@0.42.2",
          "Name": "windows_i686_msvc",
          "Identifier": {
            "PURL": "pkg:cargo/windows_i686_msvc@0.42.2",
            "UID": "bb02a41b6ca63aea",
            "BOMRef": "pkg:cargo/windows_i686_msvc@0.42.2"
          },
          "Version": "0.42.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "windows_i686_msvc@0.48.0",
          "Name": "windows_i686_msvc",
          "Identifier": {
            "PURL": "pkg:cargo/windows_i686_msvc@0.48.0",
            "UID": "dd2decfa75bc8946",
            "BOMRef": "pkg:cargo/windows_i686_msvc@0.48.0"
          },
          "Version": "0.48.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "windows_i686_msvc@0.52.6",
          "Name": "windows_i686_msvc",
          "Identifier": {
            "PURL": "pkg:cargo/windows_i686_msvc@0.52.6",
            "UID": "6d979ef4b88b9e1e",
            "BOMRef": "pkg:cargo/windows_i686_msvc@0.52.6"
          },
          "Version": "0.52.6",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "windows_i686_msvc@0.53.0",
          "Name": "windows_i686_msvc",
          "Identifier": {
            "PURL": "pkg:cargo/windows_i686_msvc@0.53.0",
            "UID": "96d60e3b75bdbfd4",
            "BOMRef": "pkg:cargo/windows_i686_msvc@0.53.0"
          },
          "Version": "0.53.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "windows_x86_64_gnu@0.42.2",
          "Name": "windows_x86_64_gnu",
          "Identifier": {
            "PURL": "pkg:cargo/windows_x86_64_gnu@0.42.2",
            "UID": "10e033ae825cd73f",
            "BOMRef": "pkg:cargo/windows_x86_64_gnu@0.42.2"
          },
          "Version": "0.42.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "windows_x86_64_gnu@0.48.0",
          "Name": "windows_x86_64_gnu",
          "Identifier": {
            "PURL": "pkg:cargo/windows_x86_64_gnu@0.48.0",
            "UID": "282c24ebdb33c64a",
            "BOMRef": "pkg:cargo/windows_x86_64_gnu@0.48.0"
          },
          "Version": "0.48.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "windows_x86_64_gnu@0.52.6",
          "Name": "windows_x86_64_gnu",
          "Identifier": {
            "PURL": "pkg:cargo/windows_x86_64_gnu@0.52.6",
            "UID": "d1ef573d966df8f1",
            "BOMRef": "pkg:cargo/windows_x86_64_gnu@0.52.6"
          },
          "Version": "0.52.6",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "windows_x86_64_gnu@0.53.0",
          "Name": "windows_x86_64_gnu",
          "Identifier": {
            "PURL": "pkg:cargo/windows_x86_64_gnu@0.53.0",
            "UID": "b4805f120925a1ac",
            "BOMRef": "pkg:cargo/windows_x86_64_gnu@0.53.0"
          },
          "Version": "0.53.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "windows_x86_64_gnullvm@0.42.2",
          "Name": "windows_x86_64_gnullvm",
          "Identifier": {
            "PURL": "pkg:cargo/windows_x86_64_gnullvm@0.42.2",
            "UID": "7a10c9e639456fad",
            "BOMRef": "pkg:cargo/windows_x86_64_gnullvm@0.42.2"
          },
          "Version": "0.42.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "windows_x86_64_gnullvm@0.48.0",
          "Name": "windows_x86_64_gnullvm",
          "Identifier": {
            "PURL": "pkg:cargo/windows_x86_64_gnullvm@0.48.0",
            "UID": "a7fe6c694608724b",
            "BOMRef": "pkg:cargo/windows_x86_64_gnullvm@0.48.0"
          },
          "Version": "0.48.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "windows_x86_64_gnullvm@0.52.6",
          "Name": "windows_x86_64_gnullvm",
          "Identifier": {
            "PURL": "pkg:cargo/windows_x86_64_gnullvm@0.52.6",
            "UID": "f3ff88aa5e7647af",
            "BOMRef": "pkg:cargo/windows_x86_64_gnullvm@0.52.6"
          },
          "Version": "0.52.6",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "windows_x86_64_gnullvm@0.53.0",
          "Name": "windows_x86_64_gnullvm",
          "Identifier": {
            "PURL": "pkg:cargo/windows_x86_64_gnullvm@0.53.0",
            "UID": "f47a79df7ba7af79",
            "BOMRef": "pkg:cargo/windows_x86_64_gnullvm@0.53.0"
          },
          "Version": "0.53.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "windows_x86_64_msvc@0.42.2",
          "Name": "windows_x86_64_msvc",
          "Identifier": {
            "PURL": "pkg:cargo/windows_x86_64_msvc@0.42.2",
            "UID": "b626929e762fe91b",
            "BOMRef": "pkg:cargo/windows_x86_64_msvc@0.42.2"
          },
          "Version": "0.42.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "windows_x86_64_msvc@0.48.0",
          "Name": "windows_x86_64_msvc",
          "Identifier": {
            "PURL": "pkg:cargo/windows_x86_64_msvc@0.48.0",
            "UID": "cbe113154117eaa3",
            "BOMRef": "pkg:cargo/windows_x86_64_msvc@0.48.0"
          },
          "Version": "0.48.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "windows_x86_64_msvc@0.52.6",
          "Name": "windows_x86_64_msvc",
          "Identifier": {
            "PURL": "pkg:cargo/windows_x86_64_msvc@0.52.6",
            "UID": "8021a7846771f6d4",
            "BOMRef": "pkg:cargo/windows_x86_64_msvc@0.52.6"
          },
          "Version": "0.52.6",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "windows_x86_64_msvc@0.53.0",
          "Name": "windows_x86_64_msvc",
          "Identifier": {
            "PURL": "pkg:cargo/windows_x86_64_msvc@0.53.0",
            "UID": "fdfbc3aa64dfa3ff",
            "BOMRef": "pkg:cargo/windows_x86_64_msvc@0.53.0"
          },
          "Version": "0.53.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "winnow@0.7.13",
          "Name": "winnow",
          "Identifier": {
            "PURL": "pkg:cargo/winnow@0.7.13",
            "UID": "753e268067f8b4cb",
            "BOMRef": "pkg:cargo/winnow@0.7.13"
          },
          "Version": "0.7.13",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "memchr@2.7.4"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "wit-bindgen-rt@0.33.0",
          "Name": "wit-bindgen-rt",
          "Identifier": {
            "PURL": "pkg:cargo/wit-bindgen-rt@0.33.0",
            "UID": "5a8cab06f583d51b",
            "BOMRef": "pkg:cargo/wit-bindgen-rt@0.33.0"
          },
          "Version": "0.33.0",
          "Licenses": [
            "Apache-2.0 OR Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "bitflags@2.9.1"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "write16@1.0.0",
          "Name": "write16",
          "Identifier": {
            "PURL": "pkg:cargo/write16@1.0.0",
            "UID": "c718b1ce839f990f",
            "BOMRef": "pkg:cargo/write16@1.0.0"
          },
          "Version": "1.0.0",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "writeable@0.5.5",
          "Name": "writeable",
          "Identifier": {
            "PURL": "pkg:cargo/writeable@0.5.5",
            "UID": "346e8c501618b4dd",
            "BOMRef": "pkg:cargo/writeable@0.5.5"
          },
          "Version": "0.5.5",
          "Licenses": [
            "Unicode-3.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "wyhash@0.5.0",
          "Name": "wyhash",
          "Identifier": {
            "PURL": "pkg:cargo/wyhash@0.5.0",
            "UID": "12d2df04a78c1bb4",
            "BOMRef": "pkg:cargo/wyhash@0.5.0"
          },
          "Version": "0.5.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "rand_core@0.6.4"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "wyz@0.5.1",
          "Name": "wyz",
          "Identifier": {
            "PURL": "pkg:cargo/wyz@0.5.1",
            "UID": "b8113cc0ce94f567",
            "BOMRef": "pkg:cargo/wyz@0.5.1"
          },
          "Version": "0.5.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "tap@1.0.1"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "xattr@1.3.1",
          "Name": "xattr",
          "Identifier": {
            "PURL": "pkg:cargo/xattr@1.3.1",
            "UID": "8ddf309f3c04c6dc",
            "BOMRef": "pkg:cargo/xattr@1.3.1"
          },
          "Version": "1.3.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "libc@0.2.174",
            "linux-raw-sys@0.4.14",
            "rustix@0.38.40"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "yaml-rust2@0.10.4",
          "Name": "yaml-rust2",
          "Identifier": {
            "PURL": "pkg:cargo/yaml-rust2@0.10.4",
            "UID": "8703213d81680319",
            "BOMRef": "pkg:cargo/yaml-rust2@0.10.4"
          },
          "Version": "0.10.4",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "arraydeque@0.5.1",
            "encoding_rs@0.8.33",
            "hashlink@0.10.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "yoke@0.7.4",
          "Name": "yoke",
          "Identifier": {
            "PURL": "pkg:cargo/yoke@0.7.4",
            "UID": "4de9926f57f1a1ef",
            "BOMRef": "pkg:cargo/yoke@0.7.4"
          },
          "Version": "0.7.4",
          "Licenses": [
            "Unicode-3.0"
          ],
          "DependsOn": [
            "serde@1.0.226",
            "stable_deref_trait@1.2.0",
            "yoke-derive@0.7.4",
            "zerofrom@0.1.4"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "yoke-derive@0.7.4",
          "Name": "yoke-derive",
          "Identifier": {
            "PURL": "pkg:cargo/yoke-derive@0.7.4",
            "UID": "80838b3c92851e9e",
            "BOMRef": "pkg:cargo/yoke-derive@0.7.4"
          },
          "Version": "0.7.4",
          "Licenses": [
            "Unicode-3.0"
          ],
          "DependsOn": [
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@2.0.111",
            "synstructure@0.13.1"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "zerocopy@0.7.35",
          "Name": "zerocopy",
          "Identifier": {
            "PURL": "pkg:cargo/zerocopy@0.7.35",
            "UID": "fae7ac03df81b5b7",
            "BOMRef": "pkg:cargo/zerocopy@0.7.35"
          },
          "Version": "0.7.35",
          "Licenses": [
            "BSD-2-Clause OR Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "zerocopy-derive@0.7.35"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "zerocopy@0.8.31",
          "Name": "zerocopy",
          "Identifier": {
            "PURL": "pkg:cargo/zerocopy@0.8.31",
            "UID": "882efc2103f094ed",
            "BOMRef": "pkg:cargo/zerocopy@0.8.31"
          },
          "Version": "0.8.31",
          "Licenses": [
            "BSD-2-Clause OR Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "zerocopy-derive@0.8.31"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "zerocopy-derive@0.7.35",
          "Name": "zerocopy-derive",
          "Identifier": {
            "PURL": "pkg:cargo/zerocopy-derive@0.7.35",
            "UID": "29ec8c781431ce0",
            "BOMRef": "pkg:cargo/zerocopy-derive@0.7.35"
          },
          "Version": "0.7.35",
          "Licenses": [
            "BSD-2-Clause OR Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@2.0.111"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "zerocopy-derive@0.8.31",
          "Name": "zerocopy-derive",
          "Identifier": {
            "PURL": "pkg:cargo/zerocopy-derive@0.8.31",
            "UID": "1145d8193478ece",
            "BOMRef": "pkg:cargo/zerocopy-derive@0.8.31"
          },
          "Version": "0.8.31",
          "Licenses": [
            "BSD-2-Clause OR Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@2.0.111"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "zerofrom@0.1.4",
          "Name": "zerofrom",
          "Identifier": {
            "PURL": "pkg:cargo/zerofrom@0.1.4",
            "UID": "a6ce6d33ba0e5bac",
            "BOMRef": "pkg:cargo/zerofrom@0.1.4"
          },
          "Version": "0.1.4",
          "Licenses": [
            "Unicode-3.0"
          ],
          "DependsOn": [
            "zerofrom-derive@0.1.4"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "zerofrom-derive@0.1.4",
          "Name": "zerofrom-derive",
          "Identifier": {
            "PURL": "pkg:cargo/zerofrom-derive@0.1.4",
            "UID": "6d06f049654220ad",
            "BOMRef": "pkg:cargo/zerofrom-derive@0.1.4"
          },
          "Version": "0.1.4",
          "Licenses": [
            "Unicode-3.0"
          ],
          "DependsOn": [
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@2.0.111",
            "synstructure@0.13.1"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "zeroize@1.8.1",
          "Name": "zeroize",
          "Identifier": {
            "PURL": "pkg:cargo/zeroize@1.8.1",
            "UID": "e19c643b9b4782b2",
            "BOMRef": "pkg:cargo/zeroize@1.8.1"
          },
          "Version": "1.8.1",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "zerovec@0.10.4",
          "Name": "zerovec",
          "Identifier": {
            "PURL": "pkg:cargo/zerovec@0.10.4",
            "UID": "ab762dd9186b1fc8",
            "BOMRef": "pkg:cargo/zerovec@0.10.4"
          },
          "Version": "0.10.4",
          "Licenses": [
            "Unicode-3.0"
          ],
          "DependsOn": [
            "yoke@0.7.4",
            "zerofrom@0.1.4",
            "zerovec-derive@0.10.3"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "zerovec-derive@0.10.3",
          "Name": "zerovec-derive",
          "Identifier": {
            "PURL": "pkg:cargo/zerovec-derive@0.10.3",
            "UID": "d5bd49d13136f8fc",
            "BOMRef": "pkg:cargo/zerovec-derive@0.10.3"
          },
          "Version": "0.10.3",
          "Licenses": [
            "Unicode-3.0"
          ],
          "DependsOn": [
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@2.0.111"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "zstd@0.13.0",
          "Name": "zstd",
          "Identifier": {
            "PURL": "pkg:cargo/zstd@0.13.0",
            "UID": "1b4bf9664c57060a",
            "BOMRef": "pkg:cargo/zstd@0.13.0"
          },
          "Version": "0.13.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "zstd-safe@7.0.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "zstd-safe@7.0.0",
          "Name": "zstd-safe",
          "Identifier": {
            "PURL": "pkg:cargo/zstd-safe@7.0.0",
            "UID": "c02e622c154d116b",
            "BOMRef": "pkg:cargo/zstd-safe@7.0.0"
          },
          "Version": "7.0.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "zstd-sys@2.0.9+zstd.1.5.5"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        },
        {
          "ID": "zstd-sys@2.0.9+zstd.1.5.5",
          "Name": "zstd-sys",
          "Identifier": {
            "PURL": "pkg:cargo/zstd-sys@2.0.9%2Bzstd.1.5.5",
            "UID": "e74170eb22c7dc86",
            "BOMRef": "pkg:cargo/zstd-sys@2.0.9%2Bzstd.1.5.5"
          },
          "Version": "2.0.9+zstd.1.5.5",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          }
        }
      ],
      "Vulnerabilities": [
        {
          "VulnerabilityID": "GHSA-8v2v-wjwg-vx6r",
          "PkgID": "actix-files@0.6.8",
          "PkgName": "actix-files",
          "PkgIdentifier": {
            "PURL": "pkg:cargo/actix-files@0.6.8",
            "UID": "88f8eb11ba924c2d",
            "BOMRef": "pkg:cargo/actix-files@0.6.8"
          },
          "InstalledVersion": "0.6.8",
          "FixedVersion": "0.6.10",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://github.com/advisories/GHSA-8v2v-wjwg-vx6r",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory Rust",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Arust"
          },
          "Fingerprint": "sha256:2e4cae43379c0a0c500f5be52152a2d14f5f13740ae2f4420fbc501e129fd40e",
          "Title": "actix-files has a possible exposure of information vulnerability",
          "Description": "### Summary\n\nWhen passing a non-existing folder to the `actix_files::Files::new()` method causes the actix server to expose unexpected files.\n\n### Details\n\nThe `actix-files` library exposes a [`Files` struct](https://github.com/actix/actix-web/blob/fba766b4beb92278665d58815c94d336015225c5/actix-files/src/files.rs#L38) that configures an actix `service` to serve the files in a folder as static assets. Below you can find the [signature of the `Files::new` method](https://github.com/actix/actix-web/blob/fba766b4beb92278665d58815c94d336015225c5/actix-files/src/files.rs#L98):\n\n```rust\npub fn new\u003cT: Into\u003cPathBuf\u003e\u003e(mount_path: \u0026str, serve_from: T) -\u003e Files\n```\n\nWhen the `mount_path` you pass to `Files` doesn't exist, [it defaults to an empty path](https://github.com/actix/actix-web/blob/fba766b4beb92278665d58815c94d336015225c5/actix-files/src/files.rs#L104) (`Path::new()`). When the service receives a HTTP request, it [joins the request information with the empty path](https://github.com/actix/actix-web/blob/fba766b4beb92278665d58815c94d336015225c5/actix-files/src/service.rs#L136) and calls `canonicalize`. Rust resolves this path as relative and returns any file that matches it.\n\nThis behavior causes the library to expose unexpected files when the folder is not present.\n\n### PoC\n\n_There is a working PoC on https://github.com/Angelmmiguel/actix-files-vuln, although the next steps can be followed to reproduce the issue_\n\n1. Clone the https://github.com/actix/examples repository.\n2. Change your directory to the `basics/static-files` folder.\n3. Edit the `src/main.rs` file and change the line 13 to mount a non-existing folder:\n\n    ```diff\n    -        .service(Files::new(\"/images\", \"static/images/\").show_files_listing())\n    +        .service(Files::new(\"/images\", \"static/missing/\").show_files_listing())\n    ```\n    \n4. Run the project with `cargo run`.\n5. Access the \u003chttp://localhost:8080/images/Cargo.toml\u003e URL.\n\n### Impact\n\nThis is an exposure of information vulnerability. It affects anyone using the `actix-files::Files` library that mounts a non-existing folder for any reason.",
          "Severity": "MEDIUM",
          "VendorSeverity": {
            "ghsa": 2
          },
          "CVSS": {
            "ghsa": {
              "V40Vector": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
              "V40Score": 6.3
            }
          },
          "References": [
            "https://github.com/actix/actix-web",
            "https://github.com/actix/actix-web/blob/fba766b4beb92278665d58815c94d336015225c5/actix-files/src/files.rs#L104",
            "https://github.com/actix/actix-web/blob/fba766b4beb92278665d58815c94d336015225c5/actix-files/src/files.rs#L38",
            "https://github.com/actix/actix-web/blob/fba766b4beb92278665d58815c94d336015225c5/actix-files/src/files.rs#L98",
            "https://github.com/actix/actix-web/blob/fba766b4beb92278665d58815c94d336015225c5/actix-files/src/service.rs#L136",
            "https://github.com/actix/actix-web/security/advisories/GHSA-8v2v-wjwg-vx6r"
          ],
          "PublishedDate": "2026-02-06T18:56:20Z",
          "LastModifiedDate": "2026-02-06T18:56:20Z"
        },
        {
          "VulnerabilityID": "GHSA-gcqf-3g44-vc9p",
          "PkgID": "actix-files@0.6.8",
          "PkgName": "actix-files",
          "PkgIdentifier": {
            "PURL": "pkg:cargo/actix-files@0.6.8",
            "UID": "88f8eb11ba924c2d",
            "BOMRef": "pkg:cargo/actix-files@0.6.8"
          },
          "InstalledVersion": "0.6.8",
          "FixedVersion": "0.6.10",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://github.com/advisories/GHSA-gcqf-3g44-vc9p",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory Rust",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Arust"
          },
          "Fingerprint": "sha256:14a4949902f24653b044bda71a9a0906f0dc920ead90276d8ddc94721cb7003b",
          "Title": "[actix-files] Panic triggered by empty Range header in GET request for static file",
          "Description": "### Summary\nA GET request for a static file served by `actix-files` with an empty `Range` header triggers a panic. With `panic = \"abort\"`, a remote user may crash the process on-demand.\n\n### Details\n`actix-files` assumes that `HttpRange::parse()`, when `Ok`, always returns a vector with at least one element. When `parse()` is called on an empty string, it returns `Ok(vec![])`. This can cause a panic at named.rs:534 when handling an HTTP request with an empty `Range:` header. This shouldn't significantly impact programs built with the default `panic = \"unwind\"`, as the only effect is that the connection is closed when the worker thread panics and new threads are spooled up on demand. Programs built with `panic = \"abort\"` are vulnerable to being crashed on-demand by any user with permissions to perform a `GET` request for a static file served by `actix-files`.\nhttps://github.com/actix/actix-web/blob/0383f4bdd1210e726143ca1ebcf01169b67a4b6c/actix-files/src/named.rs#L530-L535\n\n### PoC\n\u003cdetails\u003e\n\u003csummary\u003eMinimal reproduction\u003c/summary\u003e\n\n`Cargo.toml`:\n```toml\n[package]\nname = \"example\"\nversion = \"0.1.0\"\nedition = \"2021\"\n\n[dependencies]\nactix-web = \"=4.5.1\"\nactix-files = \"=0.6.5\"\n\n[profile.dev]\npanic = \"abort\"\n```\n`src/main.rs`:\n```rust\nuse actix_files::NamedFile;\nuse actix_web::{get, Responder};\n\n#[get(\"/\")]\nasync fn index() -\u003e impl Responder {\n    NamedFile::open(\"test_file\")\n}\n\n#[actix_web::main]\nasync fn main() -\u003e std::io::Result\u003c()\u003e {\n    use actix_web::{App, HttpServer};\n\n    HttpServer::new(|| App::new().service(index))\n        .bind((\"127.0.0.1\", 8080))?\n        .run()\n        .await\n}\n```\n`test.sh`:\n```sh\n#!/bin/bash\n\necho foo \u003e test_file\ncargo b\ncargo r\u0026\nsleep 1\nnc 127.0.0.1 8080 \u003c\u003c EOF\nGET / HTTP/1.1\nRange:\n\nEOF\nkill %1\n```\n\nCreate these files, then run `chmod +x test.sh \u0026\u0026 ./test.sh`. The server should start, then crash upon receiving the `GET` request from `netcat`.\n\nThis assumes a reasonably UNIX-like system with Rust, `bash` and `netcat` installed.\n\u003c/details\u003e\n\n### Impact\nIt is believed that only programs compiled with panic = \"abort\" are affected significantly. The only potential impact that can be seen is Denial of Service, though an attacker able to repeatedly send GET requests without those requests getting blocked by rate limiting, DDoS protection, etc. would be able to keep a server down indefinitely. As only a single unblocked request is needed to trigger the panic, merely having a rate limiter may not be enough to prevent this.\n\nThough the impact in the worst case is significant, the real-world risk of this vulnerability appears to be limited, as it would be expected that anyone for whom uptime is a significant concern would not compile their program with panic = \"abort\".",
          "Severity": "MEDIUM",
          "VendorSeverity": {
            "ghsa": 2
          },
          "CVSS": {
            "ghsa": {
              "V40Vector": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
              "V40Score": 6.9
            }
          },
          "References": [
            "https://github.com/actix/actix-web",
            "https://github.com/actix/actix-web/blob/0383f4bdd1210e726143ca1ebcf01169b67a4b6c/actix-files/src/named.rs#L530-L535",
            "https://github.com/actix/actix-web/security/advisories/GHSA-gcqf-3g44-vc9p"
          ],
          "PublishedDate": "2026-02-06T19:00:12Z",
          "LastModifiedDate": "2026-02-06T19:00:13Z"
        },
        {
          "VulnerabilityID": "CVE-2026-25541",
          "VendorIDs": [
            "GHSA-434x-w66g-qw3r"
          ],
          "PkgID": "bytes@1.10.1",
          "PkgName": "bytes",
          "PkgIdentifier": {
            "PURL": "pkg:cargo/bytes@1.10.1",
            "UID": "be1a9cf70bd80ac1",
            "BOMRef": "pkg:cargo/bytes@1.10.1"
          },
          "InstalledVersion": "1.10.1",
          "FixedVersion": "1.11.1",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-25541",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory Rust",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Arust"
          },
          "Fingerprint": "sha256:581822a40bffb16ff638fe13466c6fb04f63eec0f62b7e9ed1947a02ab4a2802",
          "Title": "Bytes is a utility library for working with bytes. From version 1.2.1  ...",
          "Description": "Bytes is a utility library for working with bytes. From version 1.2.1 to before 1.11.1, Bytes is vulnerable to integer overflow in BytesMut::reserve. In the unique reclaim path of BytesMut::reserve, if the condition \"v_capacity \u003e= new_cap + offset\" uses an unchecked addition. When new_cap + offset overflows usize in release builds, this condition may incorrectly pass, causing self.cap to be set to a value that exceeds the actual allocated capacity. Subsequent APIs such as spare_capacity_mut() then trust this corrupted cap value and may create out-of-bounds slices, leading to UB. This behavior is observable in release builds (integer overflow wraps), whereas debug builds panic due to overflow checks. This issue has been patched in version 1.11.1.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-680"
          ],
          "VendorSeverity": {
            "azure": 2,
            "cbl-mariner": 2,
            "ghsa": 2,
            "nvd": 3
          },
          "CVSS": {
            "ghsa": {
              "V40Vector": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P",
              "V40Score": 5.5
            },
            "nvd": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 7.5
            }
          },
          "References": [
            "https://github.com/tokio-rs/bytes",
            "https://github.com/tokio-rs/bytes/commit/d0293b0e35838123c51ca5dfdf468ecafee4398f",
            "https://github.com/tokio-rs/bytes/releases/tag/v1.11.1",
            "https://github.com/tokio-rs/bytes/security/advisories/GHSA-434x-w66g-qw3r",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-25541",
            "https://rustsec.org/advisories/RUSTSEC-2026-0007.html"
          ],
          "PublishedDate": "2026-02-04T22:16:00.383Z",
          "LastModifiedDate": "2026-02-27T20:13:28.537Z"
        },
        {
          "VulnerabilityID": "CVE-2026-25537",
          "VendorIDs": [
            "GHSA-h395-gr6q-cpjc"
          ],
          "PkgID": "jsonwebtoken@10.0.0",
          "PkgName": "jsonwebtoken",
          "PkgIdentifier": {
            "PURL": "pkg:cargo/jsonwebtoken@10.0.0",
            "UID": "252ad445a82df3e0",
            "BOMRef": "pkg:cargo/jsonwebtoken@10.0.0"
          },
          "InstalledVersion": "10.0.0",
          "FixedVersion": "10.3.0",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-25537",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory Rust",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Arust"
          },
          "Fingerprint": "sha256:8847295f41cbb82146b440f12ab512ed5262c6d396a2bc6df04b24908abef73b",
          "Title": "jsonwebtoken: jsonwebtoken has Type Confusion that leads to potential authorization bypass",
          "Description": "jsonwebtoken is a JWT lib in rust. Prior to version 10.3.0, there is a Type Confusion vulnerability in jsonwebtoken, specifically, in its claim validation logic. When a standard claim (such as nbf or exp) is provided with an incorrect JSON type (Like a String instead of a Number), the library’s internal parsing mechanism marks the claim as “FailedToParse”. Crucially, the validation logic treats this “FailedToParse” state identically to “NotPresent”. This means that if a check is enabled (like: validate_nbf = true), but the claim is not explicitly marked as required in required_spec_claims, the library will skip the validation check entirely for the malformed claim, treating it as if it were not there. This allows attackers to bypass critical time-based security restrictions (like “Not Before” checks) and commit potential authentication and authorization bypasses. This issue has been patched in version 10.3.0.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-843"
          ],
          "VendorSeverity": {
            "ghsa": 2,
            "nvd": 3,
            "redhat": 2
          },
          "CVSS": {
            "ghsa": {
              "V40Vector": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P",
              "V40Score": 5.5
            },
            "nvd": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
              "V3Score": 7.5
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
              "V3Score": 7.5
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-25537",
            "https://github.com/Keats/jsonwebtoken",
            "https://github.com/Keats/jsonwebtoken/commit/abbc3076742c4161347bc6b8bf4aa5eb86e1dc01",
            "https://github.com/Keats/jsonwebtoken/security/advisories/GHSA-h395-gr6q-cpjc",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-25537",
            "https://www.cve.org/CVERecord?id=CVE-2026-25537"
          ],
          "PublishedDate": "2026-02-04T22:15:59.807Z",
          "LastModifiedDate": "2026-02-11T19:13:47.607Z"
        },
        {
          "VulnerabilityID": "CVE-2026-32829",
          "VendorIDs": [
            "GHSA-vvp9-7p8x-rfvv"
          ],
          "PkgID": "lz4_flex@0.12.0",
          "PkgName": "lz4_flex",
          "PkgIdentifier": {
            "PURL": "pkg:cargo/lz4_flex@0.12.0",
            "UID": "be3bb31e0c7c42a2",
            "BOMRef": "pkg:cargo/lz4_flex@0.12.0"
          },
          "InstalledVersion": "0.12.0",
          "FixedVersion": "0.11.6, 0.12.1",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-32829",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory Rust",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Arust"
          },
          "Fingerprint": "sha256:b5509bb457423a5bd9e5b0e8a92d1d8d577660d7d72fb4a6d3d8fc72854801c9",
          "Title": "lz4_flex: lz4_flex's decompression can leak information from uninitialized memory or reused output buffer",
          "Description": "lz4_flex is a pure Rust implementation of LZ4 compression/decompression. In versions 0.11.5 and below, and 0.12.0,  decompressing invalid LZ4 data can leak sensitive information from uninitialized memory or from previous decompression operations. The library fails to properly validate offset values during LZ4 \"match copy operations,\" allowing out-of-bounds reads from the output buffer. The block-based API functions (`decompress_into`, `decompress_into_with_dict`, and others when `safe-decode` is disabled) are affected, while all frame APIs are unaffected. The impact is potential exposure of sensitive data and secrets through crafted or malformed LZ4 input. This issue has been fixed in versions 0.11.6 and 0.12.1.",
          "Severity": "HIGH",
          "CweIDs": [
            "CWE-201",
            "CWE-823"
          ],
          "VendorSeverity": {
            "amazon": 2,
            "ghsa": 3,
            "nvd": 3,
            "redhat": 3
          },
          "CVSS": {
            "ghsa": {
              "V40Vector": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N",
              "V40Score": 8.2
            },
            "nvd": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
              "V3Score": 7.5
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
              "V3Score": 7.5
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-32829",
            "https://github.com/PSeitz/lz4_flex",
            "https://github.com/PSeitz/lz4_flex/commit/055502ee5d297ecd6bf448ac91c055c7f6df9b6d",
            "https://github.com/PSeitz/lz4_flex/security/advisories/GHSA-vvp9-7p8x-rfvv",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-32829",
            "https://rustsec.org/advisories/RUSTSEC-2026-0041.html",
            "https://www.cve.org/CVERecord?id=CVE-2026-32829"
          ],
          "PublishedDate": "2026-03-20T01:15:56.277Z",
          "LastModifiedDate": "2026-03-30T15:05:23.41Z"
        },
        {
          "VulnerabilityID": "CVE-2025-53605",
          "VendorIDs": [
            "GHSA-2gh3-rmm4-6rq5"
          ],
          "PkgID": "protobuf@2.28.0",
          "PkgName": "protobuf",
          "PkgIdentifier": {
            "PURL": "pkg:cargo/protobuf@2.28.0",
            "UID": "fb1913fe9331cca1",
            "BOMRef": "pkg:cargo/protobuf@2.28.0"
          },
          "InstalledVersion": "2.28.0",
          "FixedVersion": "3.7.2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-53605",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory Rust",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Arust"
          },
          "Fingerprint": "sha256:ae182f1145da1bd8287ea39ac3595421359c1be6a82c768630bfa2e84ef0b3ac",
          "Title": "protobuf: Protobuf: Uncontrolled Recursion Vulnerability",
          "Description": "The protobuf crate before 3.7.2 for Rust allows uncontrolled recursion in the protobuf::coded_input_stream::CodedInputStream::skip_group parsing of unknown fields in untrusted input.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-674"
          ],
          "VendorSeverity": {
            "amazon": 2,
            "azure": 2,
            "cbl-mariner": 2,
            "ghsa": 2,
            "redhat": 2
          },
          "CVSS": {
            "ghsa": {
              "V40Vector": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U",
              "V40Score": 6.6
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 5.9
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2025-53605",
            "https://crates.io/crates/protobuf",
            "https://github.com/stepancheg/rust-protobuf",
            "https://github.com/stepancheg/rust-protobuf/commit/f06992f46771c0a092593b9ebf7afd48740b3ed6",
            "https://github.com/stepancheg/rust-protobuf/issues/749",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-53605",
            "https://rustsec.org/advisories/RUSTSEC-2024-0437",
            "https://rustsec.org/advisories/RUSTSEC-2024-0437.html",
            "https://www.cve.org/CVERecord?id=CVE-2025-53605"
          ],
          "PublishedDate": "2025-07-05T01:15:28.523Z",
          "LastModifiedDate": "2025-07-08T16:18:53.607Z"
        },
        {
          "VulnerabilityID": "CVE-2026-31812",
          "VendorIDs": [
            "GHSA-6xvm-j4wr-6v98"
          ],
          "PkgID": "quinn-proto@0.11.8",
          "PkgName": "quinn-proto",
          "PkgIdentifier": {
            "PURL": "pkg:cargo/quinn-proto@0.11.8",
            "UID": "8bef8c2a3458ebd2",
            "BOMRef": "pkg:cargo/quinn-proto@0.11.8"
          },
          "InstalledVersion": "0.11.8",
          "FixedVersion": "0.11.14",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-31812",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory Rust",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Arust"
          },
          "Fingerprint": "sha256:e8785f33dd33c76160bfe2b8fa551a93fc44575215040a613b5aaddb939c886c",
          "Title": "quinn-proto: quinn-proto: Denial of Service via crafted QUIC Initial packet",
          "Description": "Quinn is a pure-Rust, async-compatible implementation of the IETF QUIC transport protocol. Prior to 0.11.14, a remote, unauthenticated attacker can trigger a denial of service in applications using vulnerable quinn versions by sending a crafted QUIC Initial packet containing malformed quic_transport_parameters. In quinn-proto parsing logic, attacker-controlled varints are decoded with unwrap(), so truncated encodings cause Err(UnexpectedEnd) and panic. This is reachable over the network with a single packet and no prior trust or authentication. This vulnerability is fixed in 0.11.14.",
          "Severity": "HIGH",
          "CweIDs": [
            "CWE-248"
          ],
          "VendorSeverity": {
            "ghsa": 3,
            "redhat": 3
          },
          "CVSS": {
            "ghsa": {
              "V40Vector": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
              "V40Score": 8.7
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
              "V3Score": 5.3
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-31812",
            "https://github.com/quinn-rs/quinn",
            "https://github.com/quinn-rs/quinn/pull/2559",
            "https://github.com/quinn-rs/quinn/security/advisories/GHSA-6xvm-j4wr-6v98",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-31812",
            "https://rustsec.org/advisories/RUSTSEC-2026-0037.html",
            "https://www.cve.org/CVERecord?id=CVE-2026-31812"
          ],
          "PublishedDate": "2026-03-10T22:16:18.84Z",
          "LastModifiedDate": "2026-03-11T13:52:47.683Z"
        },
        {
          "VulnerabilityID": "CVE-2026-21895",
          "VendorIDs": [
            "GHSA-9c48-w39g-hm26"
          ],
          "PkgID": "rsa@0.9.8",
          "PkgName": "rsa",
          "PkgIdentifier": {
            "PURL": "pkg:cargo/rsa@0.9.8",
            "UID": "aa5745dc9337cab0",
            "BOMRef": "pkg:cargo/rsa@0.9.8"
          },
          "InstalledVersion": "0.9.8",
          "FixedVersion": "0.9.10",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-21895",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory Rust",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Arust"
          },
          "Fingerprint": "sha256:ed579d81013200818fdd5307a15573a31da19e46bf60ddc511ea686c48d85d28",
          "Title": "RSA: RSA crate: Denial of Service due to malformed prime in private key generation",
          "Description": "The `rsa` crate is an RSA implementation written in rust. Prior to version 0.9.10, when creating a RSA private key from its components, the construction panics instead of returning an error when one of the primes is `1`. Version 0.9.10 fixes the issue.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-703"
          ],
          "VendorSeverity": {
            "ghsa": 1,
            "nvd": 2,
            "redhat": 1
          },
          "CVSS": {
            "ghsa": {
              "V40Vector": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U",
              "V40Score": 2.7
            },
            "nvd": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
              "V3Score": 5.3
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 5.5
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-21895",
            "https://github.com/RustCrypto/RSA",
            "https://github.com/RustCrypto/RSA/commit/2926c91bef7cb14a7ccd42220a698cf4b1b692f7",
            "https://github.com/RustCrypto/RSA/security/advisories/GHSA-9c48-w39g-hm26",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-21895",
            "https://www.cve.org/CVERecord?id=CVE-2026-21895"
          ],
          "PublishedDate": "2026-01-08T14:15:57.72Z",
          "LastModifiedDate": "2026-03-12T19:27:31.327Z"
        },
        {
          "VulnerabilityID": "GHSA-pwjx-qhcg-rvj4",
          "PkgID": "rustls-webpki@0.102.8",
          "PkgName": "rustls-webpki",
          "PkgIdentifier": {
            "PURL": "pkg:cargo/rustls-webpki@0.102.8",
            "UID": "51092cfb429c4117",
            "BOMRef": "pkg:cargo/rustls-webpki@0.102.8"
          },
          "InstalledVersion": "0.102.8",
          "FixedVersion": "0.103.10, 0.104.0-alpha.5",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://github.com/advisories/GHSA-pwjx-qhcg-rvj4",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory Rust",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Arust"
          },
          "Fingerprint": "sha256:06fd67f61f08b6f2230c517054a0bd28df1dc90adbddf30a08f369d33a353a23",
          "Title": "webpki: CRLs not considered authoritative by Distribution Point due to faulty matching logic",
          "Description": "If a certificate had more than one `distributionPoint`, then only the first `distributionPoint` would be considered against each CRL's `IssuingDistributionPoint` `distributionPoint`, and then the certificate's subsequent `distributionPoint`s would be ignored.\n\nThe impact was that correct provided CRLs would not be consulted to check revocation. With `UnknownStatusPolicy::Deny` (the default) this would lead to incorrect but safe `Error::UnknownRevocationStatus`. With `UnknownStatusPolicy::Allow` this would lead to inappropriate acceptance of revoked certificates.\n\nThis vulnerability is thought to be of limited impact. This is because both the certificate and CRL are signed -- an attacker would need to compromise a trusted issuing authority to trigger this bug.  An attacker with such capabilities could likely bypass revocation checking through other more impactful means (such as publishing a valid, empty CRL.)\n\nMore likely, this bug would be latent in normal use, and an attacker could leverage faulty revocation checking to continue using a revoked credential.",
          "Severity": "MEDIUM",
          "VendorSeverity": {
            "ghsa": 2
          },
          "CVSS": {
            "ghsa": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:N",
              "V3Score": 4.4
            }
          },
          "References": [
            "https://github.com/rustls/webpki",
            "https://github.com/rustls/webpki/security/advisories/GHSA-pwjx-qhcg-rvj4",
            "https://rustsec.org/advisories/RUSTSEC-2026-0049.html"
          ],
          "PublishedDate": "2026-03-20T21:51:17Z",
          "LastModifiedDate": "2026-03-25T19:56:38Z"
        },
        {
          "VulnerabilityID": "GHSA-pwjx-qhcg-rvj4",
          "PkgID": "rustls-webpki@0.103.6",
          "PkgName": "rustls-webpki",
          "PkgIdentifier": {
            "PURL": "pkg:cargo/rustls-webpki@0.103.6",
            "UID": "1d7018aaee7dcb8c",
            "BOMRef": "pkg:cargo/rustls-webpki@0.103.6"
          },
          "InstalledVersion": "0.103.6",
          "FixedVersion": "0.103.10, 0.104.0-alpha.5",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://github.com/advisories/GHSA-pwjx-qhcg-rvj4",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory Rust",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Arust"
          },
          "Fingerprint": "sha256:078af7bd94abeb1c92dcdf858fcfba7f732935c410febe6b51951650c9f2ae64",
          "Title": "webpki: CRLs not considered authoritative by Distribution Point due to faulty matching logic",
          "Description": "If a certificate had more than one `distributionPoint`, then only the first `distributionPoint` would be considered against each CRL's `IssuingDistributionPoint` `distributionPoint`, and then the certificate's subsequent `distributionPoint`s would be ignored.\n\nThe impact was that correct provided CRLs would not be consulted to check revocation. With `UnknownStatusPolicy::Deny` (the default) this would lead to incorrect but safe `Error::UnknownRevocationStatus`. With `UnknownStatusPolicy::Allow` this would lead to inappropriate acceptance of revoked certificates.\n\nThis vulnerability is thought to be of limited impact. This is because both the certificate and CRL are signed -- an attacker would need to compromise a trusted issuing authority to trigger this bug.  An attacker with such capabilities could likely bypass revocation checking through other more impactful means (such as publishing a valid, empty CRL.)\n\nMore likely, this bug would be latent in normal use, and an attacker could leverage faulty revocation checking to continue using a revoked credential.",
          "Severity": "MEDIUM",
          "VendorSeverity": {
            "ghsa": 2
          },
          "CVSS": {
            "ghsa": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:N",
              "V3Score": 4.4
            }
          },
          "References": [
            "https://github.com/rustls/webpki",
            "https://github.com/rustls/webpki/security/advisories/GHSA-pwjx-qhcg-rvj4",
            "https://rustsec.org/advisories/RUSTSEC-2026-0049.html"
          ],
          "PublishedDate": "2026-03-20T21:51:17Z",
          "LastModifiedDate": "2026-03-25T19:56:38Z"
        },
        {
          "VulnerabilityID": "CVE-2026-25727",
          "VendorIDs": [
            "GHSA-r6v5-fh4h-64xc"
          ],
          "PkgID": "time@0.3.17",
          "PkgName": "time",
          "PkgIdentifier": {
            "PURL": "pkg:cargo/time@0.3.17",
            "UID": "2bf03074b40f7e37",
            "BOMRef": "pkg:cargo/time@0.3.17"
          },
          "InstalledVersion": "0.3.17",
          "FixedVersion": "0.3.47",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:fb1c2b57d62c6f015f5de6f88dba6cbf66afef92330adf83eca64a2563b189af",
            "DiffID": "sha256:a9db423852adc33512b62b02d99395beed0c1f502288eff61913fdc52fd5ce36"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-25727",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory Rust",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Arust"
          },
          "Fingerprint": "sha256:6dd1ba774744967c470eec79e6164b39e15a10825e3b4025108075030b25029d",
          "Title": "time: time affected by a stack exhaustion denial of service attack",
          "Description": "time provides date and time handling in Rust. From 0.3.6 to before 0.3.47, when user-provided input is provided to any type that parses with the RFC 2822 format, a denial of service attack via stack exhaustion is possible. The attack relies on formally deprecated and rarely-used features that are part of the RFC 2822 format used in a malicious manner. Ordinary, non-malicious input will never encounter this scenario. A limit to the depth of recursion was added in v0.3.47. From this version, an error will be returned rather than exhausting the stack.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-121"
          ],
          "VendorSeverity": {
            "amazon": 2,
            "azure": 2,
            "cbl-mariner": 2,
            "ghsa": 2,
            "nvd": 2,
            "redhat": 2
          },
          "CVSS": {
            "ghsa": {
              "V40Vector": "CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H",
              "V40Score": 6.8
            },
            "nvd": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
              "V3Score": 6.5
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 5.9
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-25727",
            "https://github.com/time-rs/time",
            "https://github.com/time-rs/time/blob/main/CHANGELOG.md#0347-2026-02-05",
            "https://github.com/time-rs/time/commit/1c63dc7985b8fa26bd8c689423cc56b7a03841ee",
            "https://github.com/time-rs/time/releases/tag/v0.3.47",
            "https://github.com/time-rs/time/security/advisories/GHSA-r6v5-fh4h-64xc",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-25727",
            "https://rustsec.org/advisories/RUSTSEC-2026-0009.html",
            "https://www.cve.org/CVERecord?id=CVE-2026-25727"
          ],
          "PublishedDate": "2026-02-06T20:16:11.86Z",
          "LastModifiedDate": "2026-02-24T15:23:35.563Z"
        }
      ]
    }
  ]
}
