{
  "SchemaVersion": 2,
  "Trivy": {
    "Version": "0.69.3"
  },
  "ReportID": "019d57b3-5538-7295-a429-ead34422f6ed",
  "CreatedAt": "2026-04-04T08:54:23.800171012Z",
  "ArtifactName": "sboms/ai-containers-qdrant-v1.16.3-unprivileged-cyclonedx.json",
  "ArtifactType": "cyclonedx",
  "Metadata": {
    "OS": {
      "Family": "debian",
      "Name": "13.2"
    },
    "ImageID": "sha256:b4f89a63e321252dc336d2870666d5f76ad93ae970d4483bb166797ca6abec65",
    "DiffIDs": [
      "sha256:0c5d78238295267e2257cf5f7d99d8c3ab1de94c80e5af16ad79258917dbfd2f",
      "sha256:2d5729726a7eaa1d7b2bf0ff971bd7bcf3af8d9a5eb63a203e00409a5ef75a42",
      "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa",
      "sha256:4af1afa2a89f92a5831308c5aa0777210e0495bba6eba118b6f7ca87d1179802",
      "sha256:5f70bf18a086007016e948b04aed3b82103a36bea41755b6cddfaf10ace3c6ef",
      "sha256:5f70bf18a086007016e948b04aed3b82103a36bea41755b6cddfaf10ace3c6ef",
      "sha256:5f70bf18a086007016e948b04aed3b82103a36bea41755b6cddfaf10ace3c6ef",
      "sha256:5f70bf18a086007016e948b04aed3b82103a36bea41755b6cddfaf10ace3c6ef",
      "sha256:5f70bf18a086007016e948b04aed3b82103a36bea41755b6cddfaf10ace3c6ef",
      "sha256:5f70bf18a086007016e948b04aed3b82103a36bea41755b6cddfaf10ace3c6ef",
      "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164",
      "sha256:967e8e80e6782cf6683295782448ddb51cd24f380360afa794df6a383a497538",
      "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc",
      "sha256:ef756e7576e832700f2a88bcd25408051d40bdd09cf65fdd134e1b06fa12ceef"
    ],
    "RepoDigests": [
      "registry.suse.com/ai/containers/qdrant@sha256:5c262bbaa8fc3a42047fb13f41e29efcd7ec30e8005f5c7fb2666193693645a6"
    ],
    "Reference": "registry.suse.com/ai/containers/qdrant@sha256:5c262bbaa8fc3a42047fb13f41e29efcd7ec30e8005f5c7fb2666193693645a6"
  },
  "Results": [
    {
      "Target": "sboms/ai-containers-qdrant-v1.16.3-unprivileged-cyclonedx.json (debian 13.2)",
      "Class": "os-pkgs",
      "Type": "debian",
      "Packages": [
        {
          "ID": "apt@3.0.3",
          "Name": "apt",
          "Identifier": {
            "PURL": "pkg:deb/debian/apt@3.0.3?arch=amd64\u0026distro=debian-13.2",
            "UID": "e05cf2016ca707ec",
            "BOMRef": "pkg:deb/debian/apt@3.0.3?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "3.0.3",
          "Arch": "amd64",
          "SrcName": "apt",
          "SrcVersion": "3.0.3",
          "Licenses": [
            "GPL-2.0-or-later",
            "curl",
            "BSD-3-Clause",
            "MIT",
            "GPL-2.0-only"
          ],
          "DependsOn": [
            "base-passwd@3.6.7",
            "debian-archive-keyring@2025.1",
            "libapt-pkg7.0@3.0.3",
            "libc6@2.41-12",
            "libgcc-s1@14.2.0-19",
            "libseccomp2@2.6.0-2",
            "libssl3t64@3.5.4-1~deb13u1",
            "libstdc++6@14.2.0-19",
            "libsystemd0@257.9-1~deb13u1",
            "sqv@1.3.0-3"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "base-files@13.8+deb13u2",
          "Name": "base-files",
          "Identifier": {
            "PURL": "pkg:deb/debian/base-files@13.8%2Bdeb13u2?arch=amd64\u0026distro=debian-13.2",
            "UID": "a7a8a22d382de1d1",
            "BOMRef": "pkg:deb/debian/base-files@13.8%2Bdeb13u2?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "13.8+deb13u2",
          "Arch": "amd64",
          "SrcName": "base-files",
          "SrcVersion": "13.8+deb13u2",
          "Licenses": [
            "GPL-2.0-or-later",
            "verbatim"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "base-passwd@3.6.7",
          "Name": "base-passwd",
          "Identifier": {
            "PURL": "pkg:deb/debian/base-passwd@3.6.7?arch=amd64\u0026distro=debian-13.2",
            "UID": "8db12abd2c4f64cd",
            "BOMRef": "pkg:deb/debian/base-passwd@3.6.7?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "3.6.7",
          "Arch": "amd64",
          "SrcName": "base-passwd",
          "SrcVersion": "3.6.7",
          "Licenses": [
            "GPL-2.0-only",
            "public-domain"
          ],
          "DependsOn": [
            "libc6@2.41-12",
            "libdebconfclient0@0.280",
            "libselinux1@3.8.1-1"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "bash@5.2.37-2+b5",
          "Name": "bash",
          "Identifier": {
            "PURL": "pkg:deb/debian/bash@5.2.37-2%2Bb5?arch=amd64\u0026distro=debian-13.2",
            "UID": "eea1f4c158cbe5ee",
            "BOMRef": "pkg:deb/debian/bash@5.2.37-2%2Bb5?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "5.2.37-2+b5",
          "Arch": "amd64",
          "SrcName": "bash",
          "SrcVersion": "5.2.37",
          "SrcRelease": "2",
          "Licenses": [
            "GPL-3.0-or-later",
            "GPL-3.0-only",
            "GPL-3.0-or-later WITH Bison-exception",
            "GPL-2.0-or-later",
            "GPL-2.0-only",
            "GFDL-1.3-no-invariants-only",
            "GFDL-1.3-only",
            "Latex2e",
            "BSD-4-Clause-UC",
            "MIT",
            "permissive"
          ],
          "DependsOn": [
            "base-files@13.8+deb13u2",
            "debianutils@5.23.2"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "bsdutils@1:2.41-5",
          "Name": "bsdutils",
          "Identifier": {
            "PURL": "pkg:deb/debian/bsdutils@2.41-5?arch=amd64\u0026distro=debian-13.2\u0026epoch=1",
            "UID": "4a0c956e67624446",
            "BOMRef": "pkg:deb/debian/bsdutils@2.41-5?arch=amd64\u0026distro=debian-13.2\u0026epoch=1"
          },
          "Version": "2.41-5",
          "Epoch": 1,
          "Arch": "amd64",
          "SrcName": "util-linux",
          "SrcVersion": "2.41",
          "SrcRelease": "5",
          "Licenses": [
            "GPL-2.0-or-later",
            "GPL-2.0-only",
            "GPL-3.0-or-later",
            "LGPL-2.1-or-later",
            "public-domain",
            "BSD-4-Clause",
            "MIT",
            "ISC",
            "BSD-3-Clause",
            "BSLA",
            "LGPL-2.0-or-later",
            "BSD-2-Clause",
            "LGPL-3.0-or-later",
            "GPL-3.0-only",
            "LGPL-2.0-only",
            "LGPL-2.1-only",
            "LGPL-3.0-only"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "ca-certificates@20250419",
          "Name": "ca-certificates",
          "Identifier": {
            "PURL": "pkg:deb/debian/ca-certificates@20250419?arch=all\u0026distro=debian-13.2",
            "UID": "9717cba9b9419b3d",
            "BOMRef": "pkg:deb/debian/ca-certificates@20250419?arch=all\u0026distro=debian-13.2"
          },
          "Version": "20250419",
          "Arch": "all",
          "SrcName": "ca-certificates",
          "SrcVersion": "20250419",
          "Licenses": [
            "GPL-2.0-or-later",
            "GPL-2.0-only",
            "MPL-2.0"
          ],
          "DependsOn": [
            "debconf@1.5.91",
            "openssl@3.5.4-1~deb13u1"
          ],
          "Layer": {
            "Digest": "sha256:d50154ffb0874576762deecffa701d98b9e17b03d34c5aa4a43b8b04bac58980",
            "DiffID": "sha256:0c5d78238295267e2257cf5f7d99d8c3ab1de94c80e5af16ad79258917dbfd2f"
          }
        },
        {
          "ID": "coreutils@9.7-3",
          "Name": "coreutils",
          "Identifier": {
            "PURL": "pkg:deb/debian/coreutils@9.7-3?arch=amd64\u0026distro=debian-13.2",
            "UID": "e616e4f5d9fe083d",
            "BOMRef": "pkg:deb/debian/coreutils@9.7-3?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "9.7-3",
          "Arch": "amd64",
          "SrcName": "coreutils",
          "SrcVersion": "9.7",
          "SrcRelease": "3",
          "Licenses": [
            "GPL-3.0-or-later",
            "BSD-4-Clause-UC",
            "GPL-3.0-only",
            "ISC",
            "FSFULLR",
            "GFDL-1.3-no-invariants-only",
            "GFDL-1.3-only"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "dash@0.5.12-12",
          "Name": "dash",
          "Identifier": {
            "PURL": "pkg:deb/debian/dash@0.5.12-12?arch=amd64\u0026distro=debian-13.2",
            "UID": "a53afdfdfadb8007",
            "BOMRef": "pkg:deb/debian/dash@0.5.12-12?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "0.5.12-12",
          "Arch": "amd64",
          "SrcName": "dash",
          "SrcVersion": "0.5.12",
          "SrcRelease": "12",
          "Licenses": [
            "BSD-3-Clause",
            "public-domain",
            "GPL-2.0-or-later",
            "GPL-2.0-only"
          ],
          "DependsOn": [
            "debianutils@5.23.2"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "debconf@1.5.91",
          "Name": "debconf",
          "Identifier": {
            "PURL": "pkg:deb/debian/debconf@1.5.91?arch=all\u0026distro=debian-13.2",
            "UID": "674b01c4a2d48724",
            "BOMRef": "pkg:deb/debian/debconf@1.5.91?arch=all\u0026distro=debian-13.2"
          },
          "Version": "1.5.91",
          "Arch": "all",
          "SrcName": "debconf",
          "SrcVersion": "1.5.91",
          "Licenses": [
            "BSD-2-Clause"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "debian-archive-keyring@2025.1",
          "Name": "debian-archive-keyring",
          "Identifier": {
            "PURL": "pkg:deb/debian/debian-archive-keyring@2025.1?arch=all\u0026distro=debian-13.2",
            "UID": "90f404e61093bf8",
            "BOMRef": "pkg:deb/debian/debian-archive-keyring@2025.1?arch=all\u0026distro=debian-13.2"
          },
          "Version": "2025.1",
          "Arch": "all",
          "SrcName": "debian-archive-keyring",
          "SrcVersion": "2025.1",
          "Licenses": [
            "GPL-2.0-or-later"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "debianutils@5.23.2",
          "Name": "debianutils",
          "Identifier": {
            "PURL": "pkg:deb/debian/debianutils@5.23.2?arch=amd64\u0026distro=debian-13.2",
            "UID": "e4fc0028f4f81b82",
            "BOMRef": "pkg:deb/debian/debianutils@5.23.2?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "5.23.2",
          "Arch": "amd64",
          "SrcName": "debianutils",
          "SrcVersion": "5.23.2",
          "Licenses": [
            "GPL-2.0-or-later",
            "GPL-2.0-only",
            "public-domain",
            "SMAIL-GPL"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "diffutils@1:3.10-4",
          "Name": "diffutils",
          "Identifier": {
            "PURL": "pkg:deb/debian/diffutils@3.10-4?arch=amd64\u0026distro=debian-13.2\u0026epoch=1",
            "UID": "43c6725610233e70",
            "BOMRef": "pkg:deb/debian/diffutils@3.10-4?arch=amd64\u0026distro=debian-13.2\u0026epoch=1"
          },
          "Version": "3.10-4",
          "Epoch": 1,
          "Arch": "amd64",
          "SrcName": "diffutils",
          "SrcVersion": "3.10",
          "SrcRelease": "4",
          "SrcEpoch": 1,
          "Licenses": [
            "GPL-3.0-or-later",
            "FSFULLR",
            "LGPL-2.1-or-later",
            "GPL-3.0-only WITH autoconf-exception+",
            "GPL-3.0-only",
            "GPL-3.0-or-later WITH texinfo-exception",
            "LGPL-2.0-or-later",
            "GPL-2.0-or-later",
            "X11",
            "FSFAP",
            "GFDL-1.3-no-invariants-only",
            "LGPL-3.0-or-later",
            "LGPL-3.0-only",
            "public-domain",
            "LGPL-2.0-only",
            "LGPL-2.1-only",
            "GPL-2.0-only",
            "GFDL-1.3-only"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "dpkg@1.22.21",
          "Name": "dpkg",
          "Identifier": {
            "PURL": "pkg:deb/debian/dpkg@1.22.21?arch=amd64\u0026distro=debian-13.2",
            "UID": "77960838a3bf2ca2",
            "BOMRef": "pkg:deb/debian/dpkg@1.22.21?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "1.22.21",
          "Arch": "amd64",
          "SrcName": "dpkg",
          "SrcVersion": "1.22.21",
          "Licenses": [
            "GPL-2.0-or-later",
            "public-domain-s-s-d",
            "GPL-2.0-only"
          ],
          "DependsOn": [
            "tar@1.35+dfsg-3.1"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "findutils@4.10.0-3",
          "Name": "findutils",
          "Identifier": {
            "PURL": "pkg:deb/debian/findutils@4.10.0-3?arch=amd64\u0026distro=debian-13.2",
            "UID": "b0f315cd09c5013",
            "BOMRef": "pkg:deb/debian/findutils@4.10.0-3?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "4.10.0-3",
          "Arch": "amd64",
          "SrcName": "findutils",
          "SrcVersion": "4.10.0",
          "SrcRelease": "3",
          "Licenses": [
            "GFDL-1.3-no-invariants-or-later",
            "GPL-3.0-or-later",
            "FSFAP",
            "GPL-2.0-or-later WITH Autoconf-data-exception",
            "GPL-3.0-or-later WITH Autoconf-data-exception",
            "FSFULLR",
            "GPL-2.0-or-later",
            "X11",
            "public-domain",
            "LGPL-2.1-or-later",
            "GPL-2.0-or-later WITH automake-exception",
            "LGPL-2.0-or-later",
            "LGPL-3.0-or-later",
            "BSD-3-Clause",
            "GPL-3.0-or-later WITH Bison-2.2-exception",
            "LGPL-3.0-only",
            "ISC",
            "GFDL-1.3-only",
            "GPL-2.0-only",
            "GPL-3.0-only",
            "LGPL-2.0-only",
            "LGPL-2.1-only"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "gcc-14-base@14.2.0-19",
          "Name": "gcc-14-base",
          "Identifier": {
            "PURL": "pkg:deb/debian/gcc-14-base@14.2.0-19?arch=amd64\u0026distro=debian-13.2",
            "UID": "15c80c6bd23e7261",
            "BOMRef": "pkg:deb/debian/gcc-14-base@14.2.0-19?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "14.2.0-19",
          "Arch": "amd64",
          "SrcName": "gcc-14",
          "SrcVersion": "14.2.0",
          "SrcRelease": "19",
          "Licenses": [
            "GPL-2.0-or-later",
            "GPL-3.0-only",
            "GFDL-1.2-only",
            "Artistic-2.0",
            "LGPL-2.0-or-later"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "grep@3.11-4",
          "Name": "grep",
          "Identifier": {
            "PURL": "pkg:deb/debian/grep@3.11-4?arch=amd64\u0026distro=debian-13.2",
            "UID": "1f2d00fd62f214f8",
            "BOMRef": "pkg:deb/debian/grep@3.11-4?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "3.11-4",
          "Arch": "amd64",
          "SrcName": "grep",
          "SrcVersion": "3.11",
          "SrcRelease": "4",
          "Licenses": [
            "GPL-3.0-or-later",
            "GPL-3.0-only"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "gzip@1.13-1",
          "Name": "gzip",
          "Identifier": {
            "PURL": "pkg:deb/debian/gzip@1.13-1?arch=amd64\u0026distro=debian-13.2",
            "UID": "6b55ac072c2facb6",
            "BOMRef": "pkg:deb/debian/gzip@1.13-1?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "1.13-1",
          "Arch": "amd64",
          "SrcName": "gzip",
          "SrcVersion": "1.13",
          "SrcRelease": "1",
          "Licenses": [
            "GPL-3.0-or-later",
            "GFDL-1.3--no-invariant",
            "FSF-manpages",
            "GPL-3.0-only",
            "GFDL-3"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "hostname@3.25",
          "Name": "hostname",
          "Identifier": {
            "PURL": "pkg:deb/debian/hostname@3.25?arch=amd64\u0026distro=debian-13.2",
            "UID": "e6777b5c6ff525ff",
            "BOMRef": "pkg:deb/debian/hostname@3.25?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "3.25",
          "Arch": "amd64",
          "SrcName": "hostname",
          "SrcVersion": "3.25",
          "Licenses": [
            "GPL-2.0-only"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "init-system-helpers@1.69~deb13u1",
          "Name": "init-system-helpers",
          "Identifier": {
            "PURL": "pkg:deb/debian/init-system-helpers@1.69~deb13u1?arch=all\u0026distro=debian-13.2",
            "UID": "301a4e72994747e0",
            "BOMRef": "pkg:deb/debian/init-system-helpers@1.69~deb13u1?arch=all\u0026distro=debian-13.2"
          },
          "Version": "1.69~deb13u1",
          "Arch": "all",
          "SrcName": "init-system-helpers",
          "SrcVersion": "1.69~deb13u1",
          "Licenses": [
            "BSD-3-Clause",
            "GPL-2.0-or-later",
            "GPL-2.0-only"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "libacl1@2.3.2-2+b1",
          "Name": "libacl1",
          "Identifier": {
            "PURL": "pkg:deb/debian/libacl1@2.3.2-2%2Bb1?arch=amd64\u0026distro=debian-13.2",
            "UID": "ea085402e72083ff",
            "BOMRef": "pkg:deb/debian/libacl1@2.3.2-2%2Bb1?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "2.3.2-2+b1",
          "Arch": "amd64",
          "SrcName": "acl",
          "SrcVersion": "2.3.2",
          "SrcRelease": "2",
          "Licenses": [
            "GPL-2.0-or-later",
            "GPL-2.0-only",
            "LGPL-2.0-or-later",
            "LGPL-2.1-only"
          ],
          "DependsOn": [
            "libc6@2.41-12"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "libapt-pkg7.0@3.0.3",
          "Name": "libapt-pkg7.0",
          "Identifier": {
            "PURL": "pkg:deb/debian/libapt-pkg7.0@3.0.3?arch=amd64\u0026distro=debian-13.2",
            "UID": "36135cf7f7ccbda9",
            "BOMRef": "pkg:deb/debian/libapt-pkg7.0@3.0.3?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "3.0.3",
          "Arch": "amd64",
          "SrcName": "apt",
          "SrcVersion": "3.0.3",
          "Licenses": [
            "GPL-2.0-or-later",
            "curl",
            "BSD-3-Clause",
            "MIT",
            "GPL-2.0-only"
          ],
          "DependsOn": [
            "libbz2-1.0@1.0.8-6",
            "libc6@2.41-12",
            "libgcc-s1@14.2.0-19",
            "liblz4-1@1.10.0-4",
            "liblzma5@5.8.1-1",
            "libssl3t64@3.5.4-1~deb13u1",
            "libstdc++6@14.2.0-19",
            "libsystemd0@257.9-1~deb13u1",
            "libudev1@257.9-1~deb13u1",
            "libxxhash0@0.8.3-2",
            "libzstd1@1.5.7+dfsg-1",
            "zlib1g@1:1.3.dfsg+really1.3.1-1+b1"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "libattr1@1:2.5.2-3",
          "Name": "libattr1",
          "Identifier": {
            "PURL": "pkg:deb/debian/libattr1@2.5.2-3?arch=amd64\u0026distro=debian-13.2\u0026epoch=1",
            "UID": "47fc270576e356e",
            "BOMRef": "pkg:deb/debian/libattr1@2.5.2-3?arch=amd64\u0026distro=debian-13.2\u0026epoch=1"
          },
          "Version": "2.5.2-3",
          "Epoch": 1,
          "Arch": "amd64",
          "SrcName": "attr",
          "SrcVersion": "2.5.2",
          "SrcRelease": "3",
          "SrcEpoch": 1,
          "Licenses": [
            "GPL-2.0-or-later",
            "GPL-2.0-only",
            "LGPL-2.0-or-later",
            "LGPL-2.1-only"
          ],
          "DependsOn": [
            "libc6@2.41-12"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "libaudit-common@1:4.0.2-2",
          "Name": "libaudit-common",
          "Identifier": {
            "PURL": "pkg:deb/debian/libaudit-common@4.0.2-2?arch=all\u0026distro=debian-13.2\u0026epoch=1",
            "UID": "2263bff7b31a9b5a",
            "BOMRef": "pkg:deb/debian/libaudit-common@4.0.2-2?arch=all\u0026distro=debian-13.2\u0026epoch=1"
          },
          "Version": "4.0.2-2",
          "Epoch": 1,
          "Arch": "all",
          "SrcName": "audit",
          "SrcVersion": "4.0.2",
          "SrcRelease": "2",
          "SrcEpoch": 1,
          "Licenses": [
            "GPL-2.0-only",
            "LGPL-2.1-only",
            "GPL-1.0-only"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "libaudit1@1:4.0.2-2+b2",
          "Name": "libaudit1",
          "Identifier": {
            "PURL": "pkg:deb/debian/libaudit1@4.0.2-2%2Bb2?arch=amd64\u0026distro=debian-13.2\u0026epoch=1",
            "UID": "e8184c78cb1d8845",
            "BOMRef": "pkg:deb/debian/libaudit1@4.0.2-2%2Bb2?arch=amd64\u0026distro=debian-13.2\u0026epoch=1"
          },
          "Version": "4.0.2-2+b2",
          "Epoch": 1,
          "Arch": "amd64",
          "SrcName": "audit",
          "SrcVersion": "4.0.2",
          "SrcRelease": "2",
          "SrcEpoch": 1,
          "Licenses": [
            "GPL-2.0-only",
            "LGPL-2.1-only",
            "GPL-1.0-only"
          ],
          "DependsOn": [
            "libaudit-common@1:4.0.2-2",
            "libc6@2.41-12",
            "libcap-ng0@0.8.5-4+b1"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "libblkid1@2.41-5",
          "Name": "libblkid1",
          "Identifier": {
            "PURL": "pkg:deb/debian/libblkid1@2.41-5?arch=amd64\u0026distro=debian-13.2",
            "UID": "c2e1632a97ba0561",
            "BOMRef": "pkg:deb/debian/libblkid1@2.41-5?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "2.41-5",
          "Arch": "amd64",
          "SrcName": "util-linux",
          "SrcVersion": "2.41",
          "SrcRelease": "5",
          "Licenses": [
            "GPL-2.0-or-later",
            "GPL-2.0-only",
            "GPL-3.0-or-later",
            "LGPL-2.1-or-later",
            "public-domain",
            "BSD-4-Clause",
            "MIT",
            "ISC",
            "BSD-3-Clause",
            "BSLA",
            "LGPL-2.0-or-later",
            "BSD-2-Clause",
            "LGPL-3.0-or-later",
            "GPL-3.0-only",
            "LGPL-2.0-only",
            "LGPL-2.1-only",
            "LGPL-3.0-only"
          ],
          "DependsOn": [
            "libc6@2.41-12"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "libbsd0@0.12.2-2",
          "Name": "libbsd0",
          "Identifier": {
            "PURL": "pkg:deb/debian/libbsd0@0.12.2-2?arch=amd64\u0026distro=debian-13.2",
            "UID": "615f237731f60516",
            "BOMRef": "pkg:deb/debian/libbsd0@0.12.2-2?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "0.12.2-2",
          "Arch": "amd64",
          "SrcName": "libbsd",
          "SrcVersion": "0.12.2",
          "SrcRelease": "2",
          "Licenses": [
            "BSD-3-Clause",
            "BSD-3-clause-Regents",
            "BSD-2-Clause-NetBSD",
            "BSD-3-clause-author",
            "BSD-3-clause-John-Birrell",
            "BSD-5-clause-Peter-Wemm",
            "BSD-2-Clause",
            "BSD-2-clause-verbatim",
            "BSD-2-clause-author",
            "ISC",
            "ISC-Original",
            "MIT",
            "public-domain",
            "Beerware"
          ],
          "DependsOn": [
            "libc6@2.41-12",
            "libmd0@1.1.0-2+b1"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "libbz2-1.0@1.0.8-6",
          "Name": "libbz2-1.0",
          "Identifier": {
            "PURL": "pkg:deb/debian/libbz2-1.0@1.0.8-6?arch=amd64\u0026distro=debian-13.2",
            "UID": "e1a3e34e1c696614",
            "BOMRef": "pkg:deb/debian/libbz2-1.0@1.0.8-6?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "1.0.8-6",
          "Arch": "amd64",
          "SrcName": "bzip2",
          "SrcVersion": "1.0.8",
          "SrcRelease": "6",
          "Licenses": [
            "BSD-3-Clause",
            "GPL-2.0-only"
          ],
          "DependsOn": [
            "libc6@2.41-12"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "libc-bin@2.41-12",
          "Name": "libc-bin",
          "Identifier": {
            "PURL": "pkg:deb/debian/libc-bin@2.41-12?arch=amd64\u0026distro=debian-13.2",
            "UID": "499d76d2b4d4a251",
            "BOMRef": "pkg:deb/debian/libc-bin@2.41-12?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "2.41-12",
          "Arch": "amd64",
          "SrcName": "glibc",
          "SrcVersion": "2.41",
          "SrcRelease": "12",
          "Licenses": [
            "LGPL-2.1-or-later",
            "LGPL-2.0-or-later",
            "LGPL-2.1-or-later WITH link-exception",
            "LGPL-3.0-or-later",
            "GPL-2.0-or-later",
            "GPL-2.0-or-later WITH link-exception",
            "GPL-2.0-only",
            "GPL-3.0-or-later",
            "FSFAP",
            "Carnegie",
            "Inner-Net",
            "MIT-like-Lord",
            "BSD-like-Spencer",
            "PCRE",
            "BSD-3-clause-Carnegie",
            "Unicode-DFS-2016",
            "BSL-1.0",
            "SunPro",
            "CORE-MATH",
            "BSD-3-clause-Berkeley",
            "BSD-3-clause-WIDE",
            "BSD-2-Clause",
            "BSD-3-clause-Oracle",
            "DEC",
            "IBM",
            "ISC",
            "Univ-Coimbra",
            "public-domain",
            "GPL-3.0-only",
            "LGPL-2.0-only",
            "LGPL-2.1-only",
            "LGPL-3.0-only"
          ],
          "DependsOn": [
            "libc6@2.41-12"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "libc6@2.41-12",
          "Name": "libc6",
          "Identifier": {
            "PURL": "pkg:deb/debian/libc6@2.41-12?arch=amd64\u0026distro=debian-13.2",
            "UID": "1cc2823c7614ba5c",
            "BOMRef": "pkg:deb/debian/libc6@2.41-12?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "2.41-12",
          "Arch": "amd64",
          "SrcName": "glibc",
          "SrcVersion": "2.41",
          "SrcRelease": "12",
          "Licenses": [
            "LGPL-2.1-or-later",
            "LGPL-2.0-or-later",
            "LGPL-2.1-or-later WITH link-exception",
            "LGPL-3.0-or-later",
            "GPL-2.0-or-later",
            "GPL-2.0-or-later WITH link-exception",
            "GPL-2.0-only",
            "GPL-3.0-or-later",
            "FSFAP",
            "Carnegie",
            "Inner-Net",
            "MIT-like-Lord",
            "BSD-like-Spencer",
            "PCRE",
            "BSD-3-clause-Carnegie",
            "Unicode-DFS-2016",
            "BSL-1.0",
            "SunPro",
            "CORE-MATH",
            "BSD-3-clause-Berkeley",
            "BSD-3-clause-WIDE",
            "BSD-2-Clause",
            "BSD-3-clause-Oracle",
            "DEC",
            "IBM",
            "ISC",
            "Univ-Coimbra",
            "public-domain",
            "GPL-3.0-only",
            "LGPL-2.0-only",
            "LGPL-2.1-only",
            "LGPL-3.0-only"
          ],
          "DependsOn": [
            "libgcc-s1@14.2.0-19"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "libcap-ng0@0.8.5-4+b1",
          "Name": "libcap-ng0",
          "Identifier": {
            "PURL": "pkg:deb/debian/libcap-ng0@0.8.5-4%2Bb1?arch=amd64\u0026distro=debian-13.2",
            "UID": "9c3e0ed01b8d971c",
            "BOMRef": "pkg:deb/debian/libcap-ng0@0.8.5-4%2Bb1?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "0.8.5-4+b1",
          "Arch": "amd64",
          "SrcName": "libcap-ng",
          "SrcVersion": "0.8.5",
          "SrcRelease": "4",
          "Licenses": [
            "LGPL-2.1-or-later",
            "GPL-2.0-or-later",
            "GPL-3.0-only",
            "LGPL-2.1-only",
            "GPL-2.0-only"
          ],
          "DependsOn": [
            "libc6@2.41-12"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "libcap2@1:2.75-10+b1",
          "Name": "libcap2",
          "Identifier": {
            "PURL": "pkg:deb/debian/libcap2@2.75-10%2Bb1?arch=amd64\u0026distro=debian-13.2\u0026epoch=1",
            "UID": "4febc22e5775f34d",
            "BOMRef": "pkg:deb/debian/libcap2@2.75-10%2Bb1?arch=amd64\u0026distro=debian-13.2\u0026epoch=1"
          },
          "Version": "2.75-10+b1",
          "Epoch": 1,
          "Arch": "amd64",
          "SrcName": "libcap2",
          "SrcVersion": "2.75",
          "SrcRelease": "10",
          "SrcEpoch": 1,
          "Licenses": [
            "BSD-3-Clause",
            "GPL-2.0-only",
            "GPL-2.0-or-later"
          ],
          "DependsOn": [
            "libc6@2.41-12"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "libcrypt1@1:4.4.38-1",
          "Name": "libcrypt1",
          "Identifier": {
            "PURL": "pkg:deb/debian/libcrypt1@4.4.38-1?arch=amd64\u0026distro=debian-13.2\u0026epoch=1",
            "UID": "ba4981344330e922",
            "BOMRef": "pkg:deb/debian/libcrypt1@4.4.38-1?arch=amd64\u0026distro=debian-13.2\u0026epoch=1"
          },
          "Version": "4.4.38-1",
          "Epoch": 1,
          "Arch": "amd64",
          "SrcName": "libxcrypt",
          "SrcVersion": "4.4.38",
          "SrcRelease": "1",
          "SrcEpoch": 1,
          "DependsOn": [
            "libc6@2.41-12"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "libdb5.3t64@5.3.28+dfsg2-9",
          "Name": "libdb5.3t64",
          "Identifier": {
            "PURL": "pkg:deb/debian/libdb5.3t64@5.3.28%2Bdfsg2-9?arch=amd64\u0026distro=debian-13.2",
            "UID": "c53ae7ba36ec8612",
            "BOMRef": "pkg:deb/debian/libdb5.3t64@5.3.28%2Bdfsg2-9?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "5.3.28+dfsg2-9",
          "Arch": "amd64",
          "SrcName": "db5.3",
          "SrcVersion": "5.3.28+dfsg2",
          "SrcRelease": "9",
          "Licenses": [
            "Sleepycat",
            "BSD-3-Clause",
            "MS-PL",
            "GPL-2.0-or-later",
            "Artistic-2.0",
            "X11",
            "MIT-old",
            "TCL-like",
            "BSD-3-clause-fjord",
            "GPL-3.0-only",
            "Zlib"
          ],
          "DependsOn": [
            "libc6@2.41-12"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "libdebconfclient0@0.280",
          "Name": "libdebconfclient0",
          "Identifier": {
            "PURL": "pkg:deb/debian/libdebconfclient0@0.280?arch=amd64\u0026distro=debian-13.2",
            "UID": "cd218428f1f89c1",
            "BOMRef": "pkg:deb/debian/libdebconfclient0@0.280?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "0.280",
          "Arch": "amd64",
          "SrcName": "cdebconf",
          "SrcVersion": "0.280",
          "Licenses": [
            "BSD-2-Clause",
            "GPL-2.0-or-later",
            "GPL-2.0-only"
          ],
          "DependsOn": [
            "libc6@2.41-12"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "libgcc-s1@14.2.0-19",
          "Name": "libgcc-s1",
          "Identifier": {
            "PURL": "pkg:deb/debian/libgcc-s1@14.2.0-19?arch=amd64\u0026distro=debian-13.2",
            "UID": "ab91e6bf1f421a26",
            "BOMRef": "pkg:deb/debian/libgcc-s1@14.2.0-19?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "14.2.0-19",
          "Arch": "amd64",
          "SrcName": "gcc-14",
          "SrcVersion": "14.2.0",
          "SrcRelease": "19",
          "DependsOn": [
            "gcc-14-base@14.2.0-19",
            "libc6@2.41-12"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "libgmp10@2:6.3.0+dfsg-3",
          "Name": "libgmp10",
          "Identifier": {
            "PURL": "pkg:deb/debian/libgmp10@6.3.0%2Bdfsg-3?arch=amd64\u0026distro=debian-13.2\u0026epoch=2",
            "UID": "602868a83d73429f",
            "BOMRef": "pkg:deb/debian/libgmp10@6.3.0%2Bdfsg-3?arch=amd64\u0026distro=debian-13.2\u0026epoch=2"
          },
          "Version": "6.3.0+dfsg-3",
          "Epoch": 2,
          "Arch": "amd64",
          "SrcName": "gmp",
          "SrcVersion": "6.3.0+dfsg",
          "SrcRelease": "3",
          "SrcEpoch": 2,
          "Licenses": [
            "GPL-2.0-or-later",
            "LGPL-3.0-or-later",
            "GPL-3.0-or-later",
            "GPL-3.0-or-later WITH Bison-exception",
            "GPL-2.0-only",
            "GPL-3.0-only",
            "LGPL-3.0-only"
          ],
          "DependsOn": [
            "libc6@2.41-12"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "libhogweed6t64@3.10.1-1",
          "Name": "libhogweed6t64",
          "Identifier": {
            "PURL": "pkg:deb/debian/libhogweed6t64@3.10.1-1?arch=amd64\u0026distro=debian-13.2",
            "UID": "2b7f91524fd20959",
            "BOMRef": "pkg:deb/debian/libhogweed6t64@3.10.1-1?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "3.10.1-1",
          "Arch": "amd64",
          "SrcName": "nettle",
          "SrcVersion": "3.10.1",
          "SrcRelease": "1",
          "Licenses": [
            "LGPL-3.0-or-later",
            "GPL-2.0-or-later",
            "LGPL-2.0-or-later",
            "LGPL-2.0-only",
            "MIT",
            "GPL-3.0-only WITH autoconf-exception+",
            "public-domain",
            "GPL-2.0-only",
            "GAP"
          ],
          "DependsOn": [
            "libc6@2.41-12",
            "libgmp10@2:6.3.0+dfsg-3",
            "libnettle8t64@3.10.1-1"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "liblastlog2-2@2.41-5",
          "Name": "liblastlog2-2",
          "Identifier": {
            "PURL": "pkg:deb/debian/liblastlog2-2@2.41-5?arch=amd64\u0026distro=debian-13.2",
            "UID": "cdbe621e50505f58",
            "BOMRef": "pkg:deb/debian/liblastlog2-2@2.41-5?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "2.41-5",
          "Arch": "amd64",
          "SrcName": "util-linux",
          "SrcVersion": "2.41",
          "SrcRelease": "5",
          "Licenses": [
            "GPL-2.0-or-later",
            "GPL-2.0-only",
            "GPL-3.0-or-later",
            "LGPL-2.1-or-later",
            "public-domain",
            "BSD-4-Clause",
            "MIT",
            "ISC",
            "BSD-3-Clause",
            "BSLA",
            "LGPL-2.0-or-later",
            "BSD-2-Clause",
            "LGPL-3.0-or-later",
            "GPL-3.0-only",
            "LGPL-2.0-only",
            "LGPL-2.1-only",
            "LGPL-3.0-only"
          ],
          "DependsOn": [
            "libc6@2.41-12",
            "libsqlite3-0@3.46.1-7"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "liblz4-1@1.10.0-4",
          "Name": "liblz4-1",
          "Identifier": {
            "PURL": "pkg:deb/debian/liblz4-1@1.10.0-4?arch=amd64\u0026distro=debian-13.2",
            "UID": "fb8644938b785d96",
            "BOMRef": "pkg:deb/debian/liblz4-1@1.10.0-4?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "1.10.0-4",
          "Arch": "amd64",
          "SrcName": "lz4",
          "SrcVersion": "1.10.0",
          "SrcRelease": "4",
          "Licenses": [
            "GPL-2.0-or-later",
            "BSD-2-Clause",
            "GPL-2.0-only"
          ],
          "DependsOn": [
            "libc6@2.41-12",
            "libxxhash0@0.8.3-2"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "liblzma5@5.8.1-1",
          "Name": "liblzma5",
          "Identifier": {
            "PURL": "pkg:deb/debian/liblzma5@5.8.1-1?arch=amd64\u0026distro=debian-13.2",
            "UID": "28863af774b7c754",
            "BOMRef": "pkg:deb/debian/liblzma5@5.8.1-1?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "5.8.1-1",
          "Arch": "amd64",
          "SrcName": "xz-utils",
          "SrcVersion": "5.8.1",
          "SrcRelease": "1",
          "Licenses": [
            "0BSD",
            "GPL-2.0-or-later",
            "LGPL-2.1-or-later",
            "FSFULLR",
            "GPL-3.0-or-later WITH Autoconf-exception-macro",
            "none",
            "PD",
            "permissive-nowarranty",
            "FSFUL",
            "noderivs",
            "PD-debian",
            "LGPL-2.1-only",
            "GPL-2.0-only",
            "GPL-3.0-only"
          ],
          "DependsOn": [
            "libc6@2.41-12"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "libmd0@1.1.0-2+b1",
          "Name": "libmd0",
          "Identifier": {
            "PURL": "pkg:deb/debian/libmd0@1.1.0-2%2Bb1?arch=amd64\u0026distro=debian-13.2",
            "UID": "df834b4b251bfc60",
            "BOMRef": "pkg:deb/debian/libmd0@1.1.0-2%2Bb1?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "1.1.0-2+b1",
          "Arch": "amd64",
          "SrcName": "libmd",
          "SrcVersion": "1.1.0",
          "SrcRelease": "2",
          "Licenses": [
            "BSD-3-Clause",
            "BSD-3-clause-Aaron-D-Gifford",
            "BSD-2-Clause",
            "BSD-2-Clause-NetBSD",
            "ISC",
            "Beerware",
            "public-domain-md4",
            "public-domain-md5",
            "public-domain-sha1"
          ],
          "DependsOn": [
            "libc6@2.41-12"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "libmount1@2.41-5",
          "Name": "libmount1",
          "Identifier": {
            "PURL": "pkg:deb/debian/libmount1@2.41-5?arch=amd64\u0026distro=debian-13.2",
            "UID": "49d83a41e06dbed6",
            "BOMRef": "pkg:deb/debian/libmount1@2.41-5?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "2.41-5",
          "Arch": "amd64",
          "SrcName": "util-linux",
          "SrcVersion": "2.41",
          "SrcRelease": "5",
          "Licenses": [
            "GPL-2.0-or-later",
            "GPL-2.0-only",
            "GPL-3.0-or-later",
            "LGPL-2.1-or-later",
            "public-domain",
            "BSD-4-Clause",
            "MIT",
            "ISC",
            "BSD-3-Clause",
            "BSLA",
            "LGPL-2.0-or-later",
            "BSD-2-Clause",
            "LGPL-3.0-or-later",
            "GPL-3.0-only",
            "LGPL-2.0-only",
            "LGPL-2.1-only",
            "LGPL-3.0-only"
          ],
          "DependsOn": [
            "libblkid1@2.41-5",
            "libc6@2.41-12",
            "libselinux1@3.8.1-1"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "libnettle8t64@3.10.1-1",
          "Name": "libnettle8t64",
          "Identifier": {
            "PURL": "pkg:deb/debian/libnettle8t64@3.10.1-1?arch=amd64\u0026distro=debian-13.2",
            "UID": "33b8c6d8546006f7",
            "BOMRef": "pkg:deb/debian/libnettle8t64@3.10.1-1?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "3.10.1-1",
          "Arch": "amd64",
          "SrcName": "nettle",
          "SrcVersion": "3.10.1",
          "SrcRelease": "1",
          "Licenses": [
            "LGPL-3.0-or-later",
            "GPL-2.0-or-later",
            "LGPL-2.0-or-later",
            "LGPL-2.0-only",
            "MIT",
            "GPL-3.0-only WITH autoconf-exception+",
            "public-domain",
            "GPL-2.0-only",
            "GAP"
          ],
          "DependsOn": [
            "libc6@2.41-12"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "libpam-modules@1.7.0-5",
          "Name": "libpam-modules",
          "Identifier": {
            "PURL": "pkg:deb/debian/libpam-modules@1.7.0-5?arch=amd64\u0026distro=debian-13.2",
            "UID": "813e0bc6a37dc715",
            "BOMRef": "pkg:deb/debian/libpam-modules@1.7.0-5?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "1.7.0-5",
          "Arch": "amd64",
          "SrcName": "pam",
          "SrcVersion": "1.7.0",
          "SrcRelease": "5",
          "Licenses": [
            "BSD-3-Clause",
            "GPL-2.0-or-later",
            "GPL-1.0-only",
            "GPL-2.0-only",
            "GPL-3.0-only",
            "GPL-3.0-or-later WITH Bison-exception",
            "BSD-tcp-wrappers",
            "LGPL-2.0-or-later",
            "LGPL-2.0-only",
            "public-domain",
            "Beerware"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "libpam-modules-bin@1.7.0-5",
          "Name": "libpam-modules-bin",
          "Identifier": {
            "PURL": "pkg:deb/debian/libpam-modules-bin@1.7.0-5?arch=amd64\u0026distro=debian-13.2",
            "UID": "827add8738187b8c",
            "BOMRef": "pkg:deb/debian/libpam-modules-bin@1.7.0-5?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "1.7.0-5",
          "Arch": "amd64",
          "SrcName": "pam",
          "SrcVersion": "1.7.0",
          "SrcRelease": "5",
          "Licenses": [
            "BSD-3-Clause",
            "GPL-2.0-or-later",
            "GPL-1.0-only",
            "GPL-2.0-only",
            "GPL-3.0-only",
            "GPL-3.0-or-later WITH Bison-exception",
            "BSD-tcp-wrappers",
            "LGPL-2.0-or-later",
            "LGPL-2.0-only",
            "public-domain",
            "Beerware"
          ],
          "DependsOn": [
            "libaudit1@1:4.0.2-2+b2",
            "libc6@2.41-12",
            "libcrypt1@1:4.4.38-1",
            "libpam0g@1.7.0-5",
            "libselinux1@3.8.1-1",
            "libsystemd0@257.9-1~deb13u1"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "libpam-runtime@1.7.0-5",
          "Name": "libpam-runtime",
          "Identifier": {
            "PURL": "pkg:deb/debian/libpam-runtime@1.7.0-5?arch=all\u0026distro=debian-13.2",
            "UID": "f36a45bee6522787",
            "BOMRef": "pkg:deb/debian/libpam-runtime@1.7.0-5?arch=all\u0026distro=debian-13.2"
          },
          "Version": "1.7.0-5",
          "Arch": "all",
          "SrcName": "pam",
          "SrcVersion": "1.7.0",
          "SrcRelease": "5",
          "Licenses": [
            "BSD-3-Clause",
            "GPL-2.0-or-later",
            "GPL-1.0-only",
            "GPL-2.0-only",
            "GPL-3.0-only",
            "GPL-3.0-or-later WITH Bison-exception",
            "BSD-tcp-wrappers",
            "LGPL-2.0-or-later",
            "LGPL-2.0-only",
            "public-domain",
            "Beerware"
          ],
          "DependsOn": [
            "debconf@1.5.91",
            "libpam-modules@1.7.0-5"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "libpam0g@1.7.0-5",
          "Name": "libpam0g",
          "Identifier": {
            "PURL": "pkg:deb/debian/libpam0g@1.7.0-5?arch=amd64\u0026distro=debian-13.2",
            "UID": "e1a0e42a703753e0",
            "BOMRef": "pkg:deb/debian/libpam0g@1.7.0-5?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "1.7.0-5",
          "Arch": "amd64",
          "SrcName": "pam",
          "SrcVersion": "1.7.0",
          "SrcRelease": "5",
          "Licenses": [
            "BSD-3-Clause",
            "GPL-2.0-or-later",
            "GPL-1.0-only",
            "GPL-2.0-only",
            "GPL-3.0-only",
            "GPL-3.0-or-later WITH Bison-exception",
            "BSD-tcp-wrappers",
            "LGPL-2.0-or-later",
            "LGPL-2.0-only",
            "public-domain",
            "Beerware"
          ],
          "DependsOn": [
            "debconf@1.5.91",
            "libaudit1@1:4.0.2-2+b2",
            "libc6@2.41-12"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "libpcre2-8-0@10.46-1~deb13u1",
          "Name": "libpcre2-8-0",
          "Identifier": {
            "PURL": "pkg:deb/debian/libpcre2-8-0@10.46-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "6e1510dfede20348",
            "BOMRef": "pkg:deb/debian/libpcre2-8-0@10.46-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "10.46-1~deb13u1",
          "Arch": "amd64",
          "SrcName": "pcre2",
          "SrcVersion": "10.46",
          "SrcRelease": "1~deb13u1",
          "Licenses": [
            "BSD-3-clause-Cambridge WITH BINARY-LIBRARY-LIKE-PACKAGES-exception",
            "BSD-3-Clause",
            "X11",
            "BSD-2-Clause",
            "public-domain"
          ],
          "DependsOn": [
            "libc6@2.41-12"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "libseccomp2@2.6.0-2",
          "Name": "libseccomp2",
          "Identifier": {
            "PURL": "pkg:deb/debian/libseccomp2@2.6.0-2?arch=amd64\u0026distro=debian-13.2",
            "UID": "78f8f8bb6bec0d5b",
            "BOMRef": "pkg:deb/debian/libseccomp2@2.6.0-2?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "2.6.0-2",
          "Arch": "amd64",
          "SrcName": "libseccomp",
          "SrcVersion": "2.6.0",
          "SrcRelease": "2",
          "Licenses": [
            "LGPL-2.1-only"
          ],
          "DependsOn": [
            "libc6@2.41-12"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "libselinux1@3.8.1-1",
          "Name": "libselinux1",
          "Identifier": {
            "PURL": "pkg:deb/debian/libselinux1@3.8.1-1?arch=amd64\u0026distro=debian-13.2",
            "UID": "41399c5d76114f6d",
            "BOMRef": "pkg:deb/debian/libselinux1@3.8.1-1?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "3.8.1-1",
          "Arch": "amd64",
          "SrcName": "libselinux",
          "SrcVersion": "3.8.1",
          "SrcRelease": "1",
          "Licenses": [
            "public-domain",
            "GPL-2.0-only"
          ],
          "DependsOn": [
            "libc6@2.41-12",
            "libpcre2-8-0@10.46-1~deb13u1"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "libsemanage-common@3.8.1-1",
          "Name": "libsemanage-common",
          "Identifier": {
            "PURL": "pkg:deb/debian/libsemanage-common@3.8.1-1?arch=all\u0026distro=debian-13.2",
            "UID": "afd13eb29f4ecfe9",
            "BOMRef": "pkg:deb/debian/libsemanage-common@3.8.1-1?arch=all\u0026distro=debian-13.2"
          },
          "Version": "3.8.1-1",
          "Arch": "all",
          "SrcName": "libsemanage",
          "SrcVersion": "3.8.1",
          "SrcRelease": "1",
          "Licenses": [
            "LGPL-2.1-or-later",
            "LGPL-2.1-only",
            "GPL-2.0-only"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "libsemanage2@3.8.1-1",
          "Name": "libsemanage2",
          "Identifier": {
            "PURL": "pkg:deb/debian/libsemanage2@3.8.1-1?arch=amd64\u0026distro=debian-13.2",
            "UID": "fdc617e8dade861a",
            "BOMRef": "pkg:deb/debian/libsemanage2@3.8.1-1?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "3.8.1-1",
          "Arch": "amd64",
          "SrcName": "libsemanage",
          "SrcVersion": "3.8.1",
          "SrcRelease": "1",
          "Licenses": [
            "LGPL-2.1-or-later",
            "LGPL-2.1-only",
            "GPL-2.0-only"
          ],
          "DependsOn": [
            "libaudit1@1:4.0.2-2+b2",
            "libbz2-1.0@1.0.8-6",
            "libc6@2.41-12",
            "libselinux1@3.8.1-1",
            "libsemanage-common@3.8.1-1",
            "libsepol2@3.8.1-1"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "libsepol2@3.8.1-1",
          "Name": "libsepol2",
          "Identifier": {
            "PURL": "pkg:deb/debian/libsepol2@3.8.1-1?arch=amd64\u0026distro=debian-13.2",
            "UID": "cb8c1468b635fe56",
            "BOMRef": "pkg:deb/debian/libsepol2@3.8.1-1?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "3.8.1-1",
          "Arch": "amd64",
          "SrcName": "libsepol",
          "SrcVersion": "3.8.1",
          "SrcRelease": "1",
          "Licenses": [
            "LGPL-2.1-or-later",
            "LGPL-2.1-only",
            "Zlib",
            "GPL-2.0-only",
            "GPL-2.0-or-later"
          ],
          "DependsOn": [
            "libc6@2.41-12"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "libsmartcols1@2.41-5",
          "Name": "libsmartcols1",
          "Identifier": {
            "PURL": "pkg:deb/debian/libsmartcols1@2.41-5?arch=amd64\u0026distro=debian-13.2",
            "UID": "17e521ebc5a4d0b7",
            "BOMRef": "pkg:deb/debian/libsmartcols1@2.41-5?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "2.41-5",
          "Arch": "amd64",
          "SrcName": "util-linux",
          "SrcVersion": "2.41",
          "SrcRelease": "5",
          "Licenses": [
            "GPL-2.0-or-later",
            "GPL-2.0-only",
            "GPL-3.0-or-later",
            "LGPL-2.1-or-later",
            "public-domain",
            "BSD-4-Clause",
            "MIT",
            "ISC",
            "BSD-3-Clause",
            "BSLA",
            "LGPL-2.0-or-later",
            "BSD-2-Clause",
            "LGPL-3.0-or-later",
            "GPL-3.0-only",
            "LGPL-2.0-only",
            "LGPL-2.1-only",
            "LGPL-3.0-only"
          ],
          "DependsOn": [
            "libc6@2.41-12"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "libsqlite3-0@3.46.1-7",
          "Name": "libsqlite3-0",
          "Identifier": {
            "PURL": "pkg:deb/debian/libsqlite3-0@3.46.1-7?arch=amd64\u0026distro=debian-13.2",
            "UID": "bd363bacbd9f68d2",
            "BOMRef": "pkg:deb/debian/libsqlite3-0@3.46.1-7?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "3.46.1-7",
          "Arch": "amd64",
          "SrcName": "sqlite3",
          "SrcVersion": "3.46.1",
          "SrcRelease": "7",
          "Licenses": [
            "public-domain",
            "GPL-2.0-or-later",
            "GPL-2.0-only"
          ],
          "DependsOn": [
            "libc6@2.41-12"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "libssl3t64@3.5.4-1~deb13u1",
          "Name": "libssl3t64",
          "Identifier": {
            "PURL": "pkg:deb/debian/libssl3t64@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "44907e46903e0fb5",
            "BOMRef": "pkg:deb/debian/libssl3t64@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "3.5.4-1~deb13u1",
          "Arch": "amd64",
          "SrcName": "openssl",
          "SrcVersion": "3.5.4",
          "SrcRelease": "1~deb13u1",
          "Licenses": [
            "Apache-2.0",
            "Artistic-2.0",
            "GPL-1.0-or-later",
            "GPL-1.0-only"
          ],
          "DependsOn": [
            "libc6@2.41-12",
            "libzstd1@1.5.7+dfsg-1",
            "openssl-provider-legacy@3.5.4-1~deb13u1",
            "zlib1g@1:1.3.dfsg+really1.3.1-1+b1"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "libstdc++6@14.2.0-19",
          "Name": "libstdc++6",
          "Identifier": {
            "PURL": "pkg:deb/debian/libstdc%2B%2B6@14.2.0-19?arch=amd64\u0026distro=debian-13.2",
            "UID": "7c13275e13accd64",
            "BOMRef": "pkg:deb/debian/libstdc%2B%2B6@14.2.0-19?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "14.2.0-19",
          "Arch": "amd64",
          "SrcName": "gcc-14",
          "SrcVersion": "14.2.0",
          "SrcRelease": "19",
          "DependsOn": [
            "gcc-14-base@14.2.0-19",
            "libc6@2.41-12",
            "libgcc-s1@14.2.0-19"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "libsystemd0@257.9-1~deb13u1",
          "Name": "libsystemd0",
          "Identifier": {
            "PURL": "pkg:deb/debian/libsystemd0@257.9-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "2a96d90cd8dcf3a",
            "BOMRef": "pkg:deb/debian/libsystemd0@257.9-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "257.9-1~deb13u1",
          "Arch": "amd64",
          "SrcName": "systemd",
          "SrcVersion": "257.9",
          "SrcRelease": "1~deb13u1",
          "Licenses": [
            "LGPL-2.1-or-later",
            "CC0-1.0",
            "GPL-2.0-only WITH Linux-syscall-note-exception",
            "MIT",
            "public-domain",
            "GPL-2.0-or-later",
            "GPL-2.0-only",
            "LGPL-2.1-only"
          ],
          "DependsOn": [
            "libc6@2.41-12",
            "libcap2@1:2.75-10+b1"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "libtinfo6@6.5+20250216-2",
          "Name": "libtinfo6",
          "Identifier": {
            "PURL": "pkg:deb/debian/libtinfo6@6.5%2B20250216-2?arch=amd64\u0026distro=debian-13.2",
            "UID": "cfb83c9dabd6a327",
            "BOMRef": "pkg:deb/debian/libtinfo6@6.5%2B20250216-2?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "6.5+20250216-2",
          "Arch": "amd64",
          "SrcName": "ncurses",
          "SrcVersion": "6.5+20250216",
          "SrcRelease": "2",
          "Licenses": [
            "MIT-X11",
            "X11",
            "BSD-3-Clause"
          ],
          "DependsOn": [
            "libc6@2.41-12"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "libudev1@257.9-1~deb13u1",
          "Name": "libudev1",
          "Identifier": {
            "PURL": "pkg:deb/debian/libudev1@257.9-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "167e119c22592154",
            "BOMRef": "pkg:deb/debian/libudev1@257.9-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "257.9-1~deb13u1",
          "Arch": "amd64",
          "SrcName": "systemd",
          "SrcVersion": "257.9",
          "SrcRelease": "1~deb13u1",
          "Licenses": [
            "LGPL-2.1-or-later",
            "CC0-1.0",
            "GPL-2.0-only WITH Linux-syscall-note-exception",
            "MIT",
            "public-domain",
            "GPL-2.0-or-later",
            "GPL-2.0-only",
            "LGPL-2.1-only"
          ],
          "DependsOn": [
            "libc6@2.41-12",
            "libcap2@1:2.75-10+b1"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "libunwind8@1.8.1-0.1",
          "Name": "libunwind8",
          "Identifier": {
            "PURL": "pkg:deb/debian/libunwind8@1.8.1-0.1?arch=amd64\u0026distro=debian-13.2",
            "UID": "1a764e7b5df57ec7",
            "BOMRef": "pkg:deb/debian/libunwind8@1.8.1-0.1?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "1.8.1-0.1",
          "Arch": "amd64",
          "SrcName": "libunwind",
          "SrcVersion": "1.8.1",
          "SrcRelease": "0.1",
          "Licenses": [
            "MIT",
            "GPL-2.0-or-later",
            "GPL-2.0-only"
          ],
          "DependsOn": [
            "libc6@2.41-12",
            "liblzma5@5.8.1-1"
          ],
          "Layer": {
            "Digest": "sha256:d50154ffb0874576762deecffa701d98b9e17b03d34c5aa4a43b8b04bac58980",
            "DiffID": "sha256:0c5d78238295267e2257cf5f7d99d8c3ab1de94c80e5af16ad79258917dbfd2f"
          }
        },
        {
          "ID": "libuuid1@2.41-5",
          "Name": "libuuid1",
          "Identifier": {
            "PURL": "pkg:deb/debian/libuuid1@2.41-5?arch=amd64\u0026distro=debian-13.2",
            "UID": "4001595c8c3fa4c7",
            "BOMRef": "pkg:deb/debian/libuuid1@2.41-5?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "2.41-5",
          "Arch": "amd64",
          "SrcName": "util-linux",
          "SrcVersion": "2.41",
          "SrcRelease": "5",
          "Licenses": [
            "GPL-2.0-or-later",
            "GPL-2.0-only",
            "GPL-3.0-or-later",
            "LGPL-2.1-or-later",
            "public-domain",
            "BSD-4-Clause",
            "MIT",
            "ISC",
            "BSD-3-Clause",
            "BSLA",
            "LGPL-2.0-or-later",
            "BSD-2-Clause",
            "LGPL-3.0-or-later",
            "GPL-3.0-only",
            "LGPL-2.0-only",
            "LGPL-2.1-only",
            "LGPL-3.0-only"
          ],
          "DependsOn": [
            "libc6@2.41-12"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "libxxhash0@0.8.3-2",
          "Name": "libxxhash0",
          "Identifier": {
            "PURL": "pkg:deb/debian/libxxhash0@0.8.3-2?arch=amd64\u0026distro=debian-13.2",
            "UID": "3aae1cbd2200bdc7",
            "BOMRef": "pkg:deb/debian/libxxhash0@0.8.3-2?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "0.8.3-2",
          "Arch": "amd64",
          "SrcName": "xxhash",
          "SrcVersion": "0.8.3",
          "SrcRelease": "2",
          "Licenses": [
            "BSD-2-Clause",
            "GPL-2.0-or-later",
            "GPL-2.0-only"
          ],
          "DependsOn": [
            "libc6@2.41-12"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "libzstd1@1.5.7+dfsg-1",
          "Name": "libzstd1",
          "Identifier": {
            "PURL": "pkg:deb/debian/libzstd1@1.5.7%2Bdfsg-1?arch=amd64\u0026distro=debian-13.2",
            "UID": "1c9bff20f0a8949a",
            "BOMRef": "pkg:deb/debian/libzstd1@1.5.7%2Bdfsg-1?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "1.5.7+dfsg-1",
          "Arch": "amd64",
          "SrcName": "libzstd",
          "SrcVersion": "1.5.7+dfsg",
          "SrcRelease": "1",
          "Licenses": [
            "BSD-3-Clause",
            "GPL-2.0-only",
            "Zlib",
            "MIT"
          ],
          "DependsOn": [
            "libc6@2.41-12"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "login@1:4.16.0-2+really2.41-5",
          "Name": "login",
          "Identifier": {
            "PURL": "pkg:deb/debian/login@4.16.0-2%2Breally2.41-5?arch=amd64\u0026distro=debian-13.2\u0026epoch=1",
            "UID": "ec61cb81420ba794",
            "BOMRef": "pkg:deb/debian/login@4.16.0-2%2Breally2.41-5?arch=amd64\u0026distro=debian-13.2\u0026epoch=1"
          },
          "Version": "4.16.0-2+really2.41-5",
          "Epoch": 1,
          "Arch": "amd64",
          "SrcName": "util-linux",
          "SrcVersion": "2.41",
          "SrcRelease": "5",
          "Licenses": [
            "GPL-2.0-or-later",
            "GPL-2.0-only",
            "GPL-3.0-or-later",
            "LGPL-2.1-or-later",
            "public-domain",
            "BSD-4-Clause",
            "MIT",
            "ISC",
            "BSD-3-Clause",
            "BSLA",
            "LGPL-2.0-or-later",
            "BSD-2-Clause",
            "LGPL-3.0-or-later",
            "GPL-3.0-only",
            "LGPL-2.0-only",
            "LGPL-2.1-only",
            "LGPL-3.0-only"
          ],
          "DependsOn": [
            "libaudit1@1:4.0.2-2+b2",
            "libc6@2.41-12",
            "libcrypt1@1:4.4.38-1",
            "libpam-modules@1.7.0-5",
            "libpam-runtime@1.7.0-5",
            "libpam0g@1.7.0-5"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "login.defs@1:4.17.4-2",
          "Name": "login.defs",
          "Identifier": {
            "PURL": "pkg:deb/debian/login.defs@4.17.4-2?arch=all\u0026distro=debian-13.2\u0026epoch=1",
            "UID": "b02b8945b496fc42",
            "BOMRef": "pkg:deb/debian/login.defs@4.17.4-2?arch=all\u0026distro=debian-13.2\u0026epoch=1"
          },
          "Version": "4.17.4-2",
          "Epoch": 1,
          "Arch": "all",
          "SrcName": "shadow",
          "SrcVersion": "4.17.4",
          "SrcRelease": "2",
          "SrcEpoch": 1,
          "Licenses": [
            "BSD-3-Clause",
            "GPL-1.0-only",
            "GPL-2.0-or-later",
            "GPL-2.0-only"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "mawk@1.3.4.20250131-1",
          "Name": "mawk",
          "Identifier": {
            "PURL": "pkg:deb/debian/mawk@1.3.4.20250131-1?arch=amd64\u0026distro=debian-13.2",
            "UID": "bcde2e4df5e00762",
            "BOMRef": "pkg:deb/debian/mawk@1.3.4.20250131-1?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "1.3.4.20250131-1",
          "Arch": "amd64",
          "SrcName": "mawk",
          "SrcVersion": "1.3.4.20250131",
          "SrcRelease": "1",
          "Licenses": [
            "GPL-2.0-only",
            "X11",
            "CC-BY-3.0"
          ],
          "DependsOn": [
            "libc6@2.41-12"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "mount@2.41-5",
          "Name": "mount",
          "Identifier": {
            "PURL": "pkg:deb/debian/mount@2.41-5?arch=amd64\u0026distro=debian-13.2",
            "UID": "cdd5d7f5b4368c01",
            "BOMRef": "pkg:deb/debian/mount@2.41-5?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "2.41-5",
          "Arch": "amd64",
          "SrcName": "util-linux",
          "SrcVersion": "2.41",
          "SrcRelease": "5",
          "Licenses": [
            "GPL-2.0-or-later",
            "GPL-2.0-only",
            "GPL-3.0-or-later",
            "LGPL-2.1-or-later",
            "public-domain",
            "BSD-4-Clause",
            "MIT",
            "ISC",
            "BSD-3-Clause",
            "BSLA",
            "LGPL-2.0-or-later",
            "BSD-2-Clause",
            "LGPL-3.0-or-later",
            "GPL-3.0-only",
            "LGPL-2.0-only",
            "LGPL-2.1-only",
            "LGPL-3.0-only"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "ncurses-base@6.5+20250216-2",
          "Name": "ncurses-base",
          "Identifier": {
            "PURL": "pkg:deb/debian/ncurses-base@6.5%2B20250216-2?arch=all\u0026distro=debian-13.2",
            "UID": "ef08d84b67908f5c",
            "BOMRef": "pkg:deb/debian/ncurses-base@6.5%2B20250216-2?arch=all\u0026distro=debian-13.2"
          },
          "Version": "6.5+20250216-2",
          "Arch": "all",
          "SrcName": "ncurses",
          "SrcVersion": "6.5+20250216",
          "SrcRelease": "2",
          "Licenses": [
            "MIT-X11",
            "X11",
            "BSD-3-Clause"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "ncurses-bin@6.5+20250216-2",
          "Name": "ncurses-bin",
          "Identifier": {
            "PURL": "pkg:deb/debian/ncurses-bin@6.5%2B20250216-2?arch=amd64\u0026distro=debian-13.2",
            "UID": "6f47f1c24ffc9912",
            "BOMRef": "pkg:deb/debian/ncurses-bin@6.5%2B20250216-2?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "6.5+20250216-2",
          "Arch": "amd64",
          "SrcName": "ncurses",
          "SrcVersion": "6.5+20250216",
          "SrcRelease": "2",
          "Licenses": [
            "MIT-X11",
            "X11",
            "BSD-3-Clause"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "openssl@3.5.4-1~deb13u1",
          "Name": "openssl",
          "Identifier": {
            "PURL": "pkg:deb/debian/openssl@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "99a982f9528e587f",
            "BOMRef": "pkg:deb/debian/openssl@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "3.5.4-1~deb13u1",
          "Arch": "amd64",
          "SrcName": "openssl",
          "SrcVersion": "3.5.4",
          "SrcRelease": "1~deb13u1",
          "Licenses": [
            "Apache-2.0",
            "Artistic-2.0",
            "GPL-1.0-or-later",
            "GPL-1.0-only"
          ],
          "DependsOn": [
            "libc6@2.41-12",
            "libssl3t64@3.5.4-1~deb13u1"
          ],
          "Layer": {
            "Digest": "sha256:d50154ffb0874576762deecffa701d98b9e17b03d34c5aa4a43b8b04bac58980",
            "DiffID": "sha256:0c5d78238295267e2257cf5f7d99d8c3ab1de94c80e5af16ad79258917dbfd2f"
          }
        },
        {
          "ID": "openssl-provider-legacy@3.5.4-1~deb13u1",
          "Name": "openssl-provider-legacy",
          "Identifier": {
            "PURL": "pkg:deb/debian/openssl-provider-legacy@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "4e98403ba60a7e46",
            "BOMRef": "pkg:deb/debian/openssl-provider-legacy@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "3.5.4-1~deb13u1",
          "Arch": "amd64",
          "SrcName": "openssl",
          "SrcVersion": "3.5.4",
          "SrcRelease": "1~deb13u1",
          "Licenses": [
            "Apache-2.0",
            "Artistic-2.0",
            "GPL-1.0-or-later",
            "GPL-1.0-only"
          ],
          "DependsOn": [
            "libc6@2.41-12",
            "libssl3t64@3.5.4-1~deb13u1"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "passwd@1:4.17.4-2",
          "Name": "passwd",
          "Identifier": {
            "PURL": "pkg:deb/debian/passwd@4.17.4-2?arch=amd64\u0026distro=debian-13.2\u0026epoch=1",
            "UID": "af684cf050aa87e6",
            "BOMRef": "pkg:deb/debian/passwd@4.17.4-2?arch=amd64\u0026distro=debian-13.2\u0026epoch=1"
          },
          "Version": "4.17.4-2",
          "Epoch": 1,
          "Arch": "amd64",
          "SrcName": "shadow",
          "SrcVersion": "4.17.4",
          "SrcRelease": "2",
          "SrcEpoch": 1,
          "Licenses": [
            "BSD-3-Clause",
            "GPL-1.0-only",
            "GPL-2.0-or-later",
            "GPL-2.0-only"
          ],
          "DependsOn": [
            "base-passwd@3.6.7",
            "libacl1@2.3.2-2+b1",
            "libattr1@1:2.5.2-3",
            "libaudit1@1:4.0.2-2+b2",
            "libbsd0@0.12.2-2",
            "libc6@2.41-12",
            "libcrypt1@1:4.4.38-1",
            "libpam-modules@1.7.0-5",
            "libpam0g@1.7.0-5",
            "libselinux1@3.8.1-1",
            "libsemanage2@3.8.1-1",
            "login.defs@1:4.17.4-2"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "perl-base@5.40.1-6",
          "Name": "perl-base",
          "Identifier": {
            "PURL": "pkg:deb/debian/perl-base@5.40.1-6?arch=amd64\u0026distro=debian-13.2",
            "UID": "f6edbba4f84ed3f3",
            "BOMRef": "pkg:deb/debian/perl-base@5.40.1-6?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "5.40.1-6",
          "Arch": "amd64",
          "SrcName": "perl",
          "SrcVersion": "5.40.1",
          "SrcRelease": "6",
          "Licenses": [
            "GPL-1.0-or-later",
            "Artistic-2.0",
            "MIT",
            "REGCOMP",
            "GPL-2.0-only WITH bison-exception+",
            "Unicode",
            "BZIP",
            "Zlib",
            "GPL-2.0-or-later",
            "FSFAP",
            "BSD-3-Clause WITH weird-numbering",
            "CC0-1.0",
            "TEXT-TABS",
            "BSD-4-clause-POWERDOG",
            "BSD-3-clause-GENERIC",
            "BSD-3-Clause",
            "SDBM-PUBLIC-DOMAIN",
            "DONT-CHANGE-THE-GPL",
            "Artistic-dist",
            "LGPL-2.1-only",
            "GPL-1.0-only",
            "GPL-2.0-only",
            "Artistic-2"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "sed@4.9-2",
          "Name": "sed",
          "Identifier": {
            "PURL": "pkg:deb/debian/sed@4.9-2?arch=amd64\u0026distro=debian-13.2",
            "UID": "7e7db39142fbad6",
            "BOMRef": "pkg:deb/debian/sed@4.9-2?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "4.9-2",
          "Arch": "amd64",
          "SrcName": "sed",
          "SrcVersion": "4.9",
          "SrcRelease": "2",
          "Licenses": [
            "GPL-3.0-or-later",
            "GPL-3.0-only",
            "X11",
            "GFDL-1.3-no-invariants-or-later",
            "GFDL-1.3-only",
            "ISC",
            "BSD-4-Clause-UC",
            "BSL-1",
            "pcre"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "sqv@1.3.0-3",
          "Name": "sqv",
          "Identifier": {
            "PURL": "pkg:deb/debian/sqv@1.3.0-3?arch=amd64\u0026distro=debian-13.2",
            "UID": "9b88ae2cc184be5d",
            "BOMRef": "pkg:deb/debian/sqv@1.3.0-3?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "1.3.0-3",
          "Arch": "amd64",
          "SrcName": "rust-sequoia-sqv",
          "SrcVersion": "1.3.0",
          "SrcRelease": "3",
          "Licenses": [
            "LGPL-2.0-or-later",
            "LGPL-2.0-only"
          ],
          "DependsOn": [
            "libc6@2.41-12",
            "libgcc-s1@14.2.0-19",
            "libgmp10@2:6.3.0+dfsg-3",
            "libhogweed6t64@3.10.1-1",
            "libnettle8t64@3.10.1-1"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "sysvinit-utils@3.14-4",
          "Name": "sysvinit-utils",
          "Identifier": {
            "PURL": "pkg:deb/debian/sysvinit-utils@3.14-4?arch=amd64\u0026distro=debian-13.2",
            "UID": "443dd7dd92b1e6a1",
            "BOMRef": "pkg:deb/debian/sysvinit-utils@3.14-4?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "3.14-4",
          "Arch": "amd64",
          "SrcName": "sysvinit",
          "SrcVersion": "3.14",
          "SrcRelease": "4",
          "Licenses": [
            "GPL-2.0-or-later",
            "LGPL-2.1-or-later",
            "GPL-3.0-only",
            "GPL-2.0-only",
            "LGPL-2.1-only"
          ],
          "DependsOn": [
            "libc6@2.41-12"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "tar@1.35+dfsg-3.1",
          "Name": "tar",
          "Identifier": {
            "PURL": "pkg:deb/debian/tar@1.35%2Bdfsg-3.1?arch=amd64\u0026distro=debian-13.2",
            "UID": "e50c71e5053b066",
            "BOMRef": "pkg:deb/debian/tar@1.35%2Bdfsg-3.1?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "1.35+dfsg-3.1",
          "Arch": "amd64",
          "SrcName": "tar",
          "SrcVersion": "1.35+dfsg",
          "SrcRelease": "3.1",
          "Licenses": [
            "GPL-3.0-or-later",
            "GPL-3.0-only",
            "GPL-3.0-or-later WITH Bison-exception",
            "LGPL-2.1-or-later",
            "LGPL-2.1-only",
            "LGPL-3.0-or-later",
            "LGPL-3.0-only",
            "GPL-2.0-or-later",
            "GPL-2.0-only"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "tzdata@2025b-4+deb13u1",
          "Name": "tzdata",
          "Identifier": {
            "PURL": "pkg:deb/debian/tzdata@2025b-4%2Bdeb13u1?arch=all\u0026distro=debian-13.2",
            "UID": "fc130e2cdcc1e90b",
            "BOMRef": "pkg:deb/debian/tzdata@2025b-4%2Bdeb13u1?arch=all\u0026distro=debian-13.2"
          },
          "Version": "2025b-4+deb13u1",
          "Arch": "all",
          "SrcName": "tzdata",
          "SrcVersion": "2025b",
          "SrcRelease": "4+deb13u1",
          "Licenses": [
            "public-domain"
          ],
          "DependsOn": [
            "debconf@1.5.91"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "util-linux@2.41-5",
          "Name": "util-linux",
          "Identifier": {
            "PURL": "pkg:deb/debian/util-linux@2.41-5?arch=amd64\u0026distro=debian-13.2",
            "UID": "36e8b75cc42ef04e",
            "BOMRef": "pkg:deb/debian/util-linux@2.41-5?arch=amd64\u0026distro=debian-13.2"
          },
          "Version": "2.41-5",
          "Arch": "amd64",
          "SrcName": "util-linux",
          "SrcVersion": "2.41",
          "SrcRelease": "5",
          "Licenses": [
            "GPL-2.0-or-later",
            "GPL-2.0-only",
            "GPL-3.0-or-later",
            "LGPL-2.1-or-later",
            "public-domain",
            "BSD-4-Clause",
            "MIT",
            "ISC",
            "BSD-3-Clause",
            "BSLA",
            "LGPL-2.0-or-later",
            "BSD-2-Clause",
            "LGPL-3.0-or-later",
            "GPL-3.0-only",
            "LGPL-2.0-only",
            "LGPL-2.1-only",
            "LGPL-3.0-only"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        },
        {
          "ID": "zlib1g@1:1.3.dfsg+really1.3.1-1+b1",
          "Name": "zlib1g",
          "Identifier": {
            "PURL": "pkg:deb/debian/zlib1g@1.3.dfsg%2Breally1.3.1-1%2Bb1?arch=amd64\u0026distro=debian-13.2\u0026epoch=1",
            "UID": "5575e2792666738b",
            "BOMRef": "pkg:deb/debian/zlib1g@1.3.dfsg%2Breally1.3.1-1%2Bb1?arch=amd64\u0026distro=debian-13.2\u0026epoch=1"
          },
          "Version": "1.3.dfsg+really1.3.1-1+b1",
          "Epoch": 1,
          "Arch": "amd64",
          "SrcName": "zlib",
          "SrcVersion": "1.3.dfsg+really1.3.1",
          "SrcRelease": "1",
          "SrcEpoch": 1,
          "Licenses": [
            "Zlib"
          ],
          "DependsOn": [
            "libc6@2.41-12"
          ],
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          }
        }
      ],
      "Vulnerabilities": [
        {
          "VulnerabilityID": "CVE-2011-3374",
          "PkgID": "apt@3.0.3",
          "PkgName": "apt",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/apt@3.0.3?arch=amd64\u0026distro=debian-13.2",
            "UID": "e05cf2016ca707ec",
            "BOMRef": "pkg:deb/debian/apt@3.0.3?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.0.3",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2011-3374",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:d920d2f0bbbb418bfa72b33c04ce8f3fdff27d08a1c38c46415ec9ee5dd8b271",
          "Title": "It was found that apt-key in apt, all versions, do not correctly valid ...",
          "Description": "It was found that apt-key in apt, all versions, do not correctly validate gpg keys with the master keyring, leading to a potential man-in-the-middle attack.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-347"
          ],
          "VendorSeverity": {
            "debian": 1,
            "nvd": 1
          },
          "CVSS": {
            "nvd": {
              "V2Vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
              "V2Score": 4.3,
              "V3Score": 3.7
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/cve-2011-3374",
            "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480",
            "https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html",
            "https://seclists.org/fulldisclosure/2011/Sep/221",
            "https://security-tracker.debian.org/tracker/CVE-2011-3374",
            "https://snyk.io/vuln/SNYK-LINUX-APT-116518",
            "https://ubuntu.com/security/CVE-2011-3374"
          ],
          "PublishedDate": "2019-11-26T00:15:11.03Z",
          "LastModifiedDate": "2024-11-21T01:30:22.61Z"
        },
        {
          "VulnerabilityID": "TEMP-0841856-B18BAF",
          "PkgID": "bash@5.2.37-2+b5",
          "PkgName": "bash",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/bash@5.2.37-2%2Bb5?arch=amd64\u0026distro=debian-13.2",
            "UID": "eea1f4c158cbe5ee",
            "BOMRef": "pkg:deb/debian/bash@5.2.37-2%2Bb5?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "5.2.37-2+b5",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://security-tracker.debian.org/tracker/TEMP-0841856-B18BAF",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:358ad5652f84386f7bc35de8a5ca09d92209c71bde830be048f8e8ae8e923370",
          "Title": "[Privilege escalation possible to other user than root]",
          "Severity": "LOW",
          "VendorSeverity": {
            "debian": 1
          }
        },
        {
          "VulnerabilityID": "CVE-2022-0563",
          "PkgID": "bsdutils@1:2.41-5",
          "PkgName": "bsdutils",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/bsdutils@2.41-5?arch=amd64\u0026distro=debian-13.2\u0026epoch=1",
            "UID": "4a0c956e67624446",
            "BOMRef": "pkg:deb/debian/bsdutils@2.41-5?arch=amd64\u0026distro=debian-13.2\u0026epoch=1"
          },
          "InstalledVersion": "1:2.41-5",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-0563",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:82d2ba7a483c23b961c7896b3d0ef138973c72ec045bfd3edc4a44b3fdc2a3d5",
          "Title": "util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline",
          "Description": "A flaw was found in the util-linux chfn and chsh utilities when compiled with Readline support. The Readline library uses an \"INPUTRC\" environment variable to get a path to the library config file. When the library cannot parse the specified file, it prints an error message containing data from the file. This flaw allows an unprivileged user to read root-owned files, potentially leading to privilege escalation. This flaw affects util-linux versions prior to 2.37.4.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-209"
          ],
          "VendorSeverity": {
            "amazon": 2,
            "cbl-mariner": 2,
            "debian": 1,
            "nvd": 2,
            "photon": 2,
            "redhat": 2
          },
          "CVSS": {
            "nvd": {
              "V2Vector": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
              "V2Score": 1.9,
              "V3Score": 5.5
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
              "V3Score": 5.5
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2022-0563",
            "https://blog.trailofbits.com/2023/02/16/suid-logic-bug-linux-readline/",
            "https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w%40ws.net.home/T/#u",
            "https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u",
            "https://nvd.nist.gov/vuln/detail/CVE-2022-0563",
            "https://security.gentoo.org/glsa/202401-08",
            "https://security.netapp.com/advisory/ntap-20220331-0002/",
            "https://www.cve.org/CVERecord?id=CVE-2022-0563"
          ],
          "PublishedDate": "2022-02-21T19:15:08.393Z",
          "LastModifiedDate": "2025-06-09T16:15:33.237Z"
        },
        {
          "VulnerabilityID": "CVE-2025-14104",
          "PkgID": "bsdutils@1:2.41-5",
          "PkgName": "bsdutils",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/bsdutils@2.41-5?arch=amd64\u0026distro=debian-13.2\u0026epoch=1",
            "UID": "4a0c956e67624446",
            "BOMRef": "pkg:deb/debian/bsdutils@2.41-5?arch=amd64\u0026distro=debian-13.2\u0026epoch=1"
          },
          "InstalledVersion": "1:2.41-5",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-14104",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:8a37b0321c5c66bbdff925a6966894bc20668ee6872c7f411b8e79a168e7111c",
          "Title": "util-linux: util-linux: Heap buffer overread in setpwnam() when processing 256-byte usernames",
          "Description": "A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-125"
          ],
          "VendorSeverity": {
            "alma": 2,
            "azure": 2,
            "cbl-mariner": 2,
            "debian": 1,
            "oracle-oval": 2,
            "photon": 2,
            "redhat": 2,
            "rocky": 2
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
              "V3Score": 6.1
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:1696",
            "https://access.redhat.com/errata/RHSA-2026:1852",
            "https://access.redhat.com/errata/RHSA-2026:1913",
            "https://access.redhat.com/errata/RHSA-2026:2485",
            "https://access.redhat.com/errata/RHSA-2026:2563",
            "https://access.redhat.com/errata/RHSA-2026:2737",
            "https://access.redhat.com/errata/RHSA-2026:2800",
            "https://access.redhat.com/errata/RHSA-2026:3406",
            "https://access.redhat.com/errata/RHSA-2026:4943",
            "https://access.redhat.com/security/cve/CVE-2025-14104",
            "https://bugzilla.redhat.com/2419369",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2419369",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14104",
            "https://errata.almalinux.org/9/ALSA-2026-1913.html",
            "https://errata.rockylinux.org/RLSA-2026:1913",
            "https://linux.oracle.com/cve/CVE-2025-14104.html",
            "https://linux.oracle.com/errata/ELSA-2026-1913.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-14104",
            "https://www.cve.org/CVERecord?id=CVE-2025-14104"
          ],
          "PublishedDate": "2025-12-05T17:16:03.117Z",
          "LastModifiedDate": "2026-03-18T17:16:03.817Z"
        },
        {
          "VulnerabilityID": "CVE-2026-3184",
          "PkgID": "bsdutils@1:2.41-5",
          "PkgName": "bsdutils",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/bsdutils@2.41-5?arch=amd64\u0026distro=debian-13.2\u0026epoch=1",
            "UID": "4a0c956e67624446",
            "BOMRef": "pkg:deb/debian/bsdutils@2.41-5?arch=amd64\u0026distro=debian-13.2\u0026epoch=1"
          },
          "InstalledVersion": "1:2.41-5",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-3184",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:27c44d57ab271d76114aea9d3775c3c5b092278be626b946d0b17ffaeabb08ed",
          "Title": "util-linux: util-linux: Access control bypass due to improper hostname canonicalization",
          "Description": "A flaw was found in util-linux. Improper hostname canonicalization in the `login(1)` utility, when invoked with the `-h` option, can modify the supplied remote hostname before setting `PAM_RHOST`. A remote attacker could exploit this by providing a specially crafted hostname, potentially bypassing host-based Pluggable Authentication Modules (PAM) access control rules that rely on fully qualified domain names. This could lead to unauthorized access.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-289"
          ],
          "VendorSeverity": {
            "redhat": 1,
            "ubuntu": 2
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
              "V3Score": 3.7
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-3184",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2442570",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-3184",
            "https://www.cve.org/CVERecord?id=CVE-2026-3184"
          ],
          "PublishedDate": "2026-04-03T19:17:23.377Z",
          "LastModifiedDate": "2026-04-03T19:17:23.377Z"
        },
        {
          "VulnerabilityID": "CVE-2026-27456",
          "PkgID": "bsdutils@1:2.41-5",
          "PkgName": "bsdutils",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/bsdutils@2.41-5?arch=amd64\u0026distro=debian-13.2\u0026epoch=1",
            "UID": "4a0c956e67624446",
            "BOMRef": "pkg:deb/debian/bsdutils@2.41-5?arch=amd64\u0026distro=debian-13.2\u0026epoch=1"
          },
          "InstalledVersion": "1:2.41-5",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-27456",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:1f8f4215e8299c3b16af207092e1c2cf9ac7053ad60d412e1d51687f9f751397",
          "Title": "[util-linux: mount(8) TOCTOU symlink attack via loop device]",
          "Description": "util-linux is a random collection of Linux utilities. Prior to version 2.41.4, a TOCTOU (Time-of-Check-Time-of-Use) vulnerability has been identified in the SUID binary /usr/bin/mount from util-linux. The mount binary, when setting up loop devices, validates the source file path with user privileges via fork() + setuid() + realpath(), but subsequently re-canonicalizes and opens it with root privileges (euid=0) without verifying that the path has not been replaced between both operations. Neither O_NOFOLLOW, nor inode comparison, nor post-open fstat() are employed. This allows a local unprivileged user to replace the source file with a symlink pointing to any root-owned file or device during the race window, causing the SUID binary to open and mount it as root. Exploitation requires an /etc/fstab entry with user,loop options whose path points to a directory where the attacker has write permission, and that /usr/bin/mount has the SUID bit set (the default configuration on virtually all Linux distributions). The impact is unauthorized read access to root-protected files and block devices, including backup images, disk volumes, and any file containing a valid filesystem. This issue has been patched in version 2.41.4.",
          "Severity": "UNKNOWN",
          "CweIDs": [
            "CWE-59",
            "CWE-269",
            "CWE-367"
          ],
          "References": [
            "https://github.com/util-linux/util-linux/commit/5e390467b26a3cf3fecc04e1a0d482dff3162fc4",
            "https://github.com/util-linux/util-linux/releases/tag/v2.41.4",
            "https://github.com/util-linux/util-linux/security/advisories/GHSA-qq4x-vfq4-9h9g"
          ],
          "PublishedDate": "2026-04-03T22:16:25.4Z",
          "LastModifiedDate": "2026-04-03T22:16:25.4Z"
        },
        {
          "VulnerabilityID": "CVE-2017-18018",
          "PkgID": "coreutils@9.7-3",
          "PkgName": "coreutils",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/coreutils@9.7-3?arch=amd64\u0026distro=debian-13.2",
            "UID": "e616e4f5d9fe083d",
            "BOMRef": "pkg:deb/debian/coreutils@9.7-3?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "9.7-3",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2017-18018",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:5b841c4feee2786c368c41ca71a9a61b4dff4828f8f781bb2246b62ddd772cae",
          "Title": "coreutils: race condition vulnerability in chown and chgrp",
          "Description": "In GNU Coreutils through 8.29, chown-core.c in chown and chgrp does not prevent replacement of a plain file with a symlink during use of the POSIX \"-R -L\" options, which allows local users to modify the ownership of arbitrary files by leveraging a race condition.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-362"
          ],
          "VendorSeverity": {
            "debian": 1,
            "nvd": 2,
            "redhat": 2
          },
          "CVSS": {
            "nvd": {
              "V2Vector": "AV:L/AC:M/Au:N/C:N/I:P/A:N",
              "V3Vector": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N",
              "V2Score": 1.9,
              "V3Score": 4.7
            },
            "redhat": {
              "V3Vector": "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L",
              "V3Score": 4.2
            }
          },
          "References": [
            "http://lists.gnu.org/archive/html/coreutils/2017-12/msg00045.html",
            "https://access.redhat.com/security/cve/CVE-2017-18018",
            "https://nvd.nist.gov/vuln/detail/CVE-2017-18018",
            "https://www.cve.org/CVERecord?id=CVE-2017-18018"
          ],
          "PublishedDate": "2018-01-04T04:29:00.19Z",
          "LastModifiedDate": "2025-06-09T16:15:27.25Z"
        },
        {
          "VulnerabilityID": "CVE-2025-5278",
          "PkgID": "coreutils@9.7-3",
          "PkgName": "coreutils",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/coreutils@9.7-3?arch=amd64\u0026distro=debian-13.2",
            "UID": "e616e4f5d9fe083d",
            "BOMRef": "pkg:deb/debian/coreutils@9.7-3?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "9.7-3",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-5278",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:42422b422c9c8e839722ac8e644d410aad67e08a3799e6d04a79ce2eff2583d3",
          "Title": "coreutils: Heap Buffer Under-Read in GNU Coreutils sort via Key Specification",
          "Description": "A flaw was found in GNU Coreutils. The sort utility's begfield() function is vulnerable to a heap buffer under-read. The program may access memory outside the allocated buffer if a user runs a crafted command using the traditional key format. A malicious input could lead to a crash or leak sensitive data.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-121"
          ],
          "VendorSeverity": {
            "amazon": 2,
            "debian": 1,
            "photon": 2,
            "redhat": 2
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L",
              "V3Score": 4.4
            }
          },
          "References": [
            "http://www.openwall.com/lists/oss-security/2025/05/27/2",
            "http://www.openwall.com/lists/oss-security/2025/05/29/1",
            "http://www.openwall.com/lists/oss-security/2025/05/29/2",
            "https://access.redhat.com/security/cve/CVE-2025-5278",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2368764",
            "https://cgit.git.savannah.gnu.org/cgit/coreutils.git/commit/?id=8c9602e3a145e9596dc1a63c6ed67865814b6633",
            "https://cgit.git.savannah.gnu.org/cgit/coreutils.git/tree/NEWS?id=8c9602e3a145e9596dc1a63c6ed67865814b6633#n14",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-5278",
            "https://security-tracker.debian.org/tracker/CVE-2025-5278",
            "https://www.cve.org/CVERecord?id=CVE-2025-5278"
          ],
          "PublishedDate": "2025-05-27T21:15:23.197Z",
          "LastModifiedDate": "2025-10-22T20:15:37.32Z"
        },
        {
          "VulnerabilityID": "CVE-2026-2219",
          "PkgID": "dpkg@1.22.21",
          "PkgName": "dpkg",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/dpkg@1.22.21?arch=amd64\u0026distro=debian-13.2",
            "UID": "77960838a3bf2ca2",
            "BOMRef": "pkg:deb/debian/dpkg@1.22.21?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "1.22.21",
          "FixedVersion": "1.22.22",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-2219",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:8163c5c9826dc178fa4294a2fa5f886f0784b2b3b9861d12820832efb91009ea",
          "Title": "It was discovered that dpkg-deb (a component of dpkg, the Debian packa ...",
          "Description": "It was discovered that dpkg-deb (a component of dpkg, the Debian package management system) does not properly validate the end of the data stream when uncompressing a zstd-compressed .deb archive, which may result in denial of service (infinite loop spinning the CPU).",
          "Severity": "UNKNOWN",
          "CweIDs": [
            "CWE-835"
          ],
          "References": [
            "https://bugs.debian.org/1129722",
            "https://git.dpkg.org/cgit/dpkg/dpkg.git/commit/?id=6610297a62c0780dd0e80b0e302ef64fdcc9d313"
          ],
          "PublishedDate": "2026-03-07T09:16:07.823Z",
          "LastModifiedDate": "2026-03-09T15:15:57.87Z"
        },
        {
          "VulnerabilityID": "CVE-2011-3374",
          "PkgID": "libapt-pkg7.0@3.0.3",
          "PkgName": "libapt-pkg7.0",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libapt-pkg7.0@3.0.3?arch=amd64\u0026distro=debian-13.2",
            "UID": "36135cf7f7ccbda9",
            "BOMRef": "pkg:deb/debian/libapt-pkg7.0@3.0.3?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.0.3",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2011-3374",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:7bed372e2f0df9759980366f1a05e56c6770e7d07d221791bea348272bb60072",
          "Title": "It was found that apt-key in apt, all versions, do not correctly valid ...",
          "Description": "It was found that apt-key in apt, all versions, do not correctly validate gpg keys with the master keyring, leading to a potential man-in-the-middle attack.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-347"
          ],
          "VendorSeverity": {
            "debian": 1,
            "nvd": 1
          },
          "CVSS": {
            "nvd": {
              "V2Vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
              "V2Score": 4.3,
              "V3Score": 3.7
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/cve-2011-3374",
            "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480",
            "https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html",
            "https://seclists.org/fulldisclosure/2011/Sep/221",
            "https://security-tracker.debian.org/tracker/CVE-2011-3374",
            "https://snyk.io/vuln/SNYK-LINUX-APT-116518",
            "https://ubuntu.com/security/CVE-2011-3374"
          ],
          "PublishedDate": "2019-11-26T00:15:11.03Z",
          "LastModifiedDate": "2024-11-21T01:30:22.61Z"
        },
        {
          "VulnerabilityID": "CVE-2022-0563",
          "PkgID": "libblkid1@2.41-5",
          "PkgName": "libblkid1",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libblkid1@2.41-5?arch=amd64\u0026distro=debian-13.2",
            "UID": "c2e1632a97ba0561",
            "BOMRef": "pkg:deb/debian/libblkid1@2.41-5?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-5",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-0563",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:ac47fdbe547c8a544b0ab6bd13e8a833888eea0051b0b4b473b3f1f28a8f3166",
          "Title": "util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline",
          "Description": "A flaw was found in the util-linux chfn and chsh utilities when compiled with Readline support. The Readline library uses an \"INPUTRC\" environment variable to get a path to the library config file. When the library cannot parse the specified file, it prints an error message containing data from the file. This flaw allows an unprivileged user to read root-owned files, potentially leading to privilege escalation. This flaw affects util-linux versions prior to 2.37.4.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-209"
          ],
          "VendorSeverity": {
            "amazon": 2,
            "cbl-mariner": 2,
            "debian": 1,
            "nvd": 2,
            "photon": 2,
            "redhat": 2
          },
          "CVSS": {
            "nvd": {
              "V2Vector": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
              "V2Score": 1.9,
              "V3Score": 5.5
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
              "V3Score": 5.5
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2022-0563",
            "https://blog.trailofbits.com/2023/02/16/suid-logic-bug-linux-readline/",
            "https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w%40ws.net.home/T/#u",
            "https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u",
            "https://nvd.nist.gov/vuln/detail/CVE-2022-0563",
            "https://security.gentoo.org/glsa/202401-08",
            "https://security.netapp.com/advisory/ntap-20220331-0002/",
            "https://www.cve.org/CVERecord?id=CVE-2022-0563"
          ],
          "PublishedDate": "2022-02-21T19:15:08.393Z",
          "LastModifiedDate": "2025-06-09T16:15:33.237Z"
        },
        {
          "VulnerabilityID": "CVE-2025-14104",
          "PkgID": "libblkid1@2.41-5",
          "PkgName": "libblkid1",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libblkid1@2.41-5?arch=amd64\u0026distro=debian-13.2",
            "UID": "c2e1632a97ba0561",
            "BOMRef": "pkg:deb/debian/libblkid1@2.41-5?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-5",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-14104",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:8b42743a3b0c153c2a3f0a4177288fda54a23edc2cac0f90cf319b2cb03bbfff",
          "Title": "util-linux: util-linux: Heap buffer overread in setpwnam() when processing 256-byte usernames",
          "Description": "A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-125"
          ],
          "VendorSeverity": {
            "alma": 2,
            "azure": 2,
            "cbl-mariner": 2,
            "debian": 1,
            "oracle-oval": 2,
            "photon": 2,
            "redhat": 2,
            "rocky": 2
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
              "V3Score": 6.1
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:1696",
            "https://access.redhat.com/errata/RHSA-2026:1852",
            "https://access.redhat.com/errata/RHSA-2026:1913",
            "https://access.redhat.com/errata/RHSA-2026:2485",
            "https://access.redhat.com/errata/RHSA-2026:2563",
            "https://access.redhat.com/errata/RHSA-2026:2737",
            "https://access.redhat.com/errata/RHSA-2026:2800",
            "https://access.redhat.com/errata/RHSA-2026:3406",
            "https://access.redhat.com/errata/RHSA-2026:4943",
            "https://access.redhat.com/security/cve/CVE-2025-14104",
            "https://bugzilla.redhat.com/2419369",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2419369",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14104",
            "https://errata.almalinux.org/9/ALSA-2026-1913.html",
            "https://errata.rockylinux.org/RLSA-2026:1913",
            "https://linux.oracle.com/cve/CVE-2025-14104.html",
            "https://linux.oracle.com/errata/ELSA-2026-1913.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-14104",
            "https://www.cve.org/CVERecord?id=CVE-2025-14104"
          ],
          "PublishedDate": "2025-12-05T17:16:03.117Z",
          "LastModifiedDate": "2026-03-18T17:16:03.817Z"
        },
        {
          "VulnerabilityID": "CVE-2026-3184",
          "PkgID": "libblkid1@2.41-5",
          "PkgName": "libblkid1",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libblkid1@2.41-5?arch=amd64\u0026distro=debian-13.2",
            "UID": "c2e1632a97ba0561",
            "BOMRef": "pkg:deb/debian/libblkid1@2.41-5?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-5",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-3184",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:d8e04021746dd2fb7346c317710379a0ed0a1b5e2d827651f1d16a2a79d7e297",
          "Title": "util-linux: util-linux: Access control bypass due to improper hostname canonicalization",
          "Description": "A flaw was found in util-linux. Improper hostname canonicalization in the `login(1)` utility, when invoked with the `-h` option, can modify the supplied remote hostname before setting `PAM_RHOST`. A remote attacker could exploit this by providing a specially crafted hostname, potentially bypassing host-based Pluggable Authentication Modules (PAM) access control rules that rely on fully qualified domain names. This could lead to unauthorized access.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-289"
          ],
          "VendorSeverity": {
            "redhat": 1,
            "ubuntu": 2
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
              "V3Score": 3.7
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-3184",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2442570",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-3184",
            "https://www.cve.org/CVERecord?id=CVE-2026-3184"
          ],
          "PublishedDate": "2026-04-03T19:17:23.377Z",
          "LastModifiedDate": "2026-04-03T19:17:23.377Z"
        },
        {
          "VulnerabilityID": "CVE-2026-27456",
          "PkgID": "libblkid1@2.41-5",
          "PkgName": "libblkid1",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libblkid1@2.41-5?arch=amd64\u0026distro=debian-13.2",
            "UID": "c2e1632a97ba0561",
            "BOMRef": "pkg:deb/debian/libblkid1@2.41-5?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-5",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-27456",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:92a00213abf3007bbaa3f470a8287e67c451499d89e24c5d4a94e99d72cb6388",
          "Title": "[util-linux: mount(8) TOCTOU symlink attack via loop device]",
          "Description": "util-linux is a random collection of Linux utilities. Prior to version 2.41.4, a TOCTOU (Time-of-Check-Time-of-Use) vulnerability has been identified in the SUID binary /usr/bin/mount from util-linux. The mount binary, when setting up loop devices, validates the source file path with user privileges via fork() + setuid() + realpath(), but subsequently re-canonicalizes and opens it with root privileges (euid=0) without verifying that the path has not been replaced between both operations. Neither O_NOFOLLOW, nor inode comparison, nor post-open fstat() are employed. This allows a local unprivileged user to replace the source file with a symlink pointing to any root-owned file or device during the race window, causing the SUID binary to open and mount it as root. Exploitation requires an /etc/fstab entry with user,loop options whose path points to a directory where the attacker has write permission, and that /usr/bin/mount has the SUID bit set (the default configuration on virtually all Linux distributions). The impact is unauthorized read access to root-protected files and block devices, including backup images, disk volumes, and any file containing a valid filesystem. This issue has been patched in version 2.41.4.",
          "Severity": "UNKNOWN",
          "CweIDs": [
            "CWE-59",
            "CWE-269",
            "CWE-367"
          ],
          "References": [
            "https://github.com/util-linux/util-linux/commit/5e390467b26a3cf3fecc04e1a0d482dff3162fc4",
            "https://github.com/util-linux/util-linux/releases/tag/v2.41.4",
            "https://github.com/util-linux/util-linux/security/advisories/GHSA-qq4x-vfq4-9h9g"
          ],
          "PublishedDate": "2026-04-03T22:16:25.4Z",
          "LastModifiedDate": "2026-04-03T22:16:25.4Z"
        },
        {
          "VulnerabilityID": "CVE-2026-0861",
          "PkgID": "libc-bin@2.41-12",
          "PkgName": "libc-bin",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libc-bin@2.41-12?arch=amd64\u0026distro=debian-13.2",
            "UID": "499d76d2b4d4a251",
            "BOMRef": "pkg:deb/debian/libc-bin@2.41-12?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-12",
          "FixedVersion": "2.41-12+deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-0861",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:6a02e39a8275955a8c8bf001aeca4911f34ef2b317e9f1e25d796d8814535741",
          "Title": "glibc: Integer overflow in memalign leads to heap corruption",
          "Description": "Passing too large an alignment to the memalign suite of functions (memalign, posix_memalign, aligned_alloc) in the GNU C Library version 2.30 to 2.42 may result in an integer overflow, which could consequently result in a heap corruption.\n\nNote that the attacker must have control over both, the size as well as the alignment arguments of the memalign function to be able to exploit this.  The size parameter must be close enough to PTRDIFF_MAX so as to overflow size_t along with the large alignment argument.  This limits the malicious inputs for the alignment for memalign to the range [1\u003c\u003c62+ 1, 1\u003c\u003c63] and exactly 1\u003c\u003c63 for posix_memalign and aligned_alloc.\n\nTypically the alignment argument passed to such functions is a known constrained quantity (e.g. page size, block size, struct sizes) and is not attacker controlled, because of which this may not be easily exploitable in practice.  An application bug could potentially result in the input alignment being too large, e.g. due to a different buffer overflow or integer overflow in the application or its dependent libraries, but that is again an uncommon usage pattern given typical sources of alignments.",
          "Severity": "HIGH",
          "CweIDs": [
            "CWE-190"
          ],
          "VendorSeverity": {
            "alma": 2,
            "azure": 2,
            "cbl-mariner": 2,
            "oracle-oval": 2,
            "photon": 3,
            "redhat": 1,
            "rocky": 2,
            "ubuntu": 2
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
              "V3Score": 8.1
            }
          },
          "References": [
            "http://www.openwall.com/lists/oss-security/2026/01/16/5",
            "https://access.redhat.com/errata/RHSA-2026:2786",
            "https://access.redhat.com/security/cve/CVE-2026-0861",
            "https://bugzilla.redhat.com/2429771",
            "https://bugzilla.redhat.com/2430201",
            "https://bugzilla.redhat.com/2431196",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2429771",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430201",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2431196",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15281",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0861",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0915",
            "https://errata.almalinux.org/9/ALSA-2026-2786.html",
            "https://errata.rockylinux.org/RLSA-2026:2786",
            "https://linux.oracle.com/cve/CVE-2026-0861.html",
            "https://linux.oracle.com/errata/ELSA-2026-50120.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-0861",
            "https://sourceware.org/bugzilla/show_bug.cgi?id=33796",
            "https://sourceware.org/git/?p=glibc.git;a=blob_plain;f=advisories/GLIBC-SA-2026-0001",
            "https://ubuntu.com/security/notices/USN-8005-1",
            "https://www.cve.org/CVERecord?id=CVE-2026-0861"
          ],
          "PublishedDate": "2026-01-14T21:15:52.617Z",
          "LastModifiedDate": "2026-02-03T18:26:25.39Z"
        },
        {
          "VulnerabilityID": "CVE-2025-15281",
          "PkgID": "libc-bin@2.41-12",
          "PkgName": "libc-bin",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libc-bin@2.41-12?arch=amd64\u0026distro=debian-13.2",
            "UID": "499d76d2b4d4a251",
            "BOMRef": "pkg:deb/debian/libc-bin@2.41-12?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-12",
          "FixedVersion": "2.41-12+deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-15281",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:5219dd1b4cec47f0cddc170154161e7665802a0d7552f49ef311aa4d2e7bfa74",
          "Title": "glibc: wordexp with WRDE_REUSE and WRDE_APPEND may return uninitialized memory",
          "Description": "Calling wordexp with WRDE_REUSE in conjunction with WRDE_APPEND in the GNU C Library version 2.0 to version 2.42 may cause the interface to return uninitialized memory in the we_wordv member, which on subsequent calls to wordfree may abort the process.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-908"
          ],
          "VendorSeverity": {
            "alma": 2,
            "azure": 2,
            "cbl-mariner": 2,
            "oracle-oval": 2,
            "photon": 3,
            "redhat": 1,
            "rocky": 2,
            "ubuntu": 2
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 5.9
            }
          },
          "References": [
            "http://www.openwall.com/lists/oss-security/2026/01/20/3",
            "https://access.redhat.com/errata/RHSA-2026:2786",
            "https://access.redhat.com/security/cve/CVE-2025-15281",
            "https://bugzilla.redhat.com/2429771",
            "https://bugzilla.redhat.com/2430201",
            "https://bugzilla.redhat.com/2431196",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2429771",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430201",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2431196",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15281",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0861",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0915",
            "https://errata.almalinux.org/9/ALSA-2026-2786.html",
            "https://errata.rockylinux.org/RLSA-2026:2786",
            "https://linux.oracle.com/cve/CVE-2025-15281.html",
            "https://linux.oracle.com/errata/ELSA-2026-50174.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-15281",
            "https://sourceware.org/bugzilla/show_bug.cgi?id=33814",
            "https://ubuntu.com/security/notices/USN-8005-1",
            "https://www.cve.org/CVERecord?id=CVE-2025-15281",
            "https://www.openwall.com/lists/oss-security/2026/01/20/3"
          ],
          "PublishedDate": "2026-01-20T14:16:07.843Z",
          "LastModifiedDate": "2026-02-05T17:43:18.63Z"
        },
        {
          "VulnerabilityID": "CVE-2026-0915",
          "PkgID": "libc-bin@2.41-12",
          "PkgName": "libc-bin",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libc-bin@2.41-12?arch=amd64\u0026distro=debian-13.2",
            "UID": "499d76d2b4d4a251",
            "BOMRef": "pkg:deb/debian/libc-bin@2.41-12?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-12",
          "FixedVersion": "2.41-12+deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-0915",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:e63dcee2733439a9ff144c9f8377210b92bb38e72fa7fb4c55a72a9222b2b6b2",
          "Title": "glibc: glibc: Information disclosure via zero-valued network query",
          "Description": "Calling getnetbyaddr or getnetbyaddr_r with a configured nsswitch.conf that specifies the library's DNS backend for networks and queries for a zero-valued network in the GNU C Library version 2.0 to version 2.42 can leak stack contents to the configured DNS resolver.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-908"
          ],
          "VendorSeverity": {
            "alma": 2,
            "azure": 1,
            "cbl-mariner": 2,
            "oracle-oval": 2,
            "photon": 3,
            "redhat": 2,
            "rocky": 2,
            "ubuntu": 2
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
              "V3Score": 5.3
            }
          },
          "References": [
            "http://www.openwall.com/lists/oss-security/2026/01/16/6",
            "https://access.redhat.com/errata/RHSA-2026:2786",
            "https://access.redhat.com/security/cve/CVE-2026-0915",
            "https://bugzilla.redhat.com/2429771",
            "https://bugzilla.redhat.com/2430201",
            "https://bugzilla.redhat.com/2431196",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2429771",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430201",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2431196",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15281",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0861",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0915",
            "https://errata.almalinux.org/9/ALSA-2026-2786.html",
            "https://errata.rockylinux.org/RLSA-2026:2786",
            "https://linux.oracle.com/cve/CVE-2026-0915.html",
            "https://linux.oracle.com/errata/ELSA-2026-50174.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-0915",
            "https://sourceware.org/bugzilla/show_bug.cgi?id=33802",
            "https://ubuntu.com/security/notices/USN-8005-1",
            "https://www.cve.org/CVERecord?id=CVE-2026-0915",
            "https://www.openwall.com/lists/oss-security/2026/01/16/6"
          ],
          "PublishedDate": "2026-01-15T22:16:12.457Z",
          "LastModifiedDate": "2026-01-23T19:36:50.73Z"
        },
        {
          "VulnerabilityID": "CVE-2026-4046",
          "PkgID": "libc-bin@2.41-12",
          "PkgName": "libc-bin",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libc-bin@2.41-12?arch=amd64\u0026distro=debian-13.2",
            "UID": "499d76d2b4d4a251",
            "BOMRef": "pkg:deb/debian/libc-bin@2.41-12?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-12",
          "Status": "fix_deferred",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-4046",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:dbb277f058dcc00388ca5f4c1815d262c68a4988695d82c002b36af0d96e3b79",
          "Title": "glibc: glibc: Denial of Service via iconv() function with specific character sets",
          "Description": "The iconv() function in the GNU C Library versions 2.43 and earlier may crash due to an assertion failure when converting inputs from the IBM1390 or IBM1399 character sets, which may be used to remotely crash an application.\n\n\n\nThis vulnerability can be trivially mitigated by removing the IBM1390 and IBM1399 character sets from systems that do not need them.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-617"
          ],
          "VendorSeverity": {
            "redhat": 2
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
              "V3Score": 5.3
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-4046",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-4046",
            "https://packages.fedoraproject.org/pkgs/glibc/glibc-gconv-extra/",
            "https://sourceware.org/bugzilla/show_bug.cgi?id=33980",
            "https://sourceware.org/git/?p=glibc.git;a=blob_plain;f=advisories/GLIBC-SA-2026-0007;hb=HEAD",
            "https://www.cve.org/CVERecord?id=CVE-2026-4046"
          ],
          "PublishedDate": "2026-03-30T18:16:19.573Z",
          "LastModifiedDate": "2026-04-01T14:24:21.833Z"
        },
        {
          "VulnerabilityID": "CVE-2026-4437",
          "PkgID": "libc-bin@2.41-12",
          "PkgName": "libc-bin",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libc-bin@2.41-12?arch=amd64\u0026distro=debian-13.2",
            "UID": "499d76d2b4d4a251",
            "BOMRef": "pkg:deb/debian/libc-bin@2.41-12?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-12",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-4437",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:f181dbaefe08a6ce82c75c21163cc917374e98bd090e711e040ad546827fdff1",
          "Title": "glibc: glibc: Incorrect DNS response parsing via crafted DNS server response",
          "Description": "Calling gethostbyaddr or gethostbyaddr_r with a configured nsswitch.conf that specifies the library's DNS backend in the GNU C Library version 2.34 to version 2.43 could, with a crafted response from the configured DNS server, result in a violation of the DNS specification that causes the application to treat a non-answer section of the DNS response as a valid answer.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-125"
          ],
          "VendorSeverity": {
            "redhat": 2
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
              "V3Score": 6.5
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-4437",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-4437",
            "https://sourceware.org/bugzilla/show_bug.cgi?id=34014",
            "https://www.cve.org/CVERecord?id=CVE-2026-4437"
          ],
          "PublishedDate": "2026-03-20T20:16:49.477Z",
          "LastModifiedDate": "2026-03-23T16:16:51.537Z"
        },
        {
          "VulnerabilityID": "CVE-2026-4438",
          "PkgID": "libc-bin@2.41-12",
          "PkgName": "libc-bin",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libc-bin@2.41-12?arch=amd64\u0026distro=debian-13.2",
            "UID": "499d76d2b4d4a251",
            "BOMRef": "pkg:deb/debian/libc-bin@2.41-12?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-12",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-4438",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:ae6534651d0d4d547c8b8ad207d638806b5b7a8e8c664954181d6ea99be81bb0",
          "Title": "glibc: glibc: Invalid DNS hostname returned via gethostbyaddr functions",
          "Description": "Calling gethostbyaddr or gethostbyaddr_r with a configured nsswitch.conf that specifies the library's DNS backend in the GNU C library version 2.34 to version 2.43 could result in an invalid DNS hostname being returned to the caller in violation of the DNS specification.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-20",
            "CWE-88"
          ],
          "VendorSeverity": {
            "redhat": 1
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
              "V3Score": 4
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-4438",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-4438",
            "https://sourceware.org/bugzilla/show_bug.cgi?id=34015",
            "https://www.cve.org/CVERecord?id=CVE-2026-4438"
          ],
          "PublishedDate": "2026-03-20T20:16:49.623Z",
          "LastModifiedDate": "2026-03-23T15:16:35.68Z"
        },
        {
          "VulnerabilityID": "CVE-2010-4756",
          "PkgID": "libc-bin@2.41-12",
          "PkgName": "libc-bin",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libc-bin@2.41-12?arch=amd64\u0026distro=debian-13.2",
            "UID": "499d76d2b4d4a251",
            "BOMRef": "pkg:deb/debian/libc-bin@2.41-12?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-12",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2010-4756",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:ec2dc72147c1b05d5eb4df07a35da68e159d9177fa982afde593439a203c9ed6",
          "Title": "glibc: glob implementation can cause excessive CPU and memory consumption due to crafted glob expressions",
          "Description": "The glob implementation in the GNU C Library (aka glibc or libc6) allows remote authenticated users to cause a denial of service (CPU and memory consumption) via crafted glob expressions that do not match any pathnames, as demonstrated by glob expressions in STAT commands to an FTP daemon, a different vulnerability than CVE-2010-2632.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-399"
          ],
          "VendorSeverity": {
            "debian": 1,
            "nvd": 2,
            "redhat": 1
          },
          "CVSS": {
            "nvd": {
              "V2Vector": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
              "V2Score": 4
            },
            "redhat": {
              "V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
              "V2Score": 5
            }
          },
          "References": [
            "http://cxib.net/stuff/glob-0day.c",
            "http://securityreason.com/achievement_securityalert/89",
            "http://securityreason.com/exploitalert/9223",
            "https://access.redhat.com/security/cve/CVE-2010-4756",
            "https://bugzilla.redhat.com/show_bug.cgi?id=681681",
            "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756",
            "https://nvd.nist.gov/vuln/detail/CVE-2010-4756",
            "https://security.netapp.com/advisory/ntap-20241108-0002/",
            "https://www.cve.org/CVERecord?id=CVE-2010-4756"
          ],
          "PublishedDate": "2011-03-02T20:00:01.037Z",
          "LastModifiedDate": "2025-11-03T22:15:41.51Z"
        },
        {
          "VulnerabilityID": "CVE-2018-20796",
          "PkgID": "libc-bin@2.41-12",
          "PkgName": "libc-bin",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libc-bin@2.41-12?arch=amd64\u0026distro=debian-13.2",
            "UID": "499d76d2b4d4a251",
            "BOMRef": "pkg:deb/debian/libc-bin@2.41-12?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-12",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2018-20796",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:d2862c9f2cd5c49d03e41e0d6b2b694e00fc3927a477231af858589d7be3990d",
          "Title": "glibc: uncontrolled recursion in function check_dst_limits_calc_pos_1 in posix/regexec.c",
          "Description": "In the GNU C Library (aka glibc or libc6) through 2.29, check_dst_limits_calc_pos_1 in posix/regexec.c has Uncontrolled Recursion, as demonstrated by '(\\227|)(\\\\1\\\\1|t1|\\\\\\2537)+' in grep.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-674"
          ],
          "VendorSeverity": {
            "cbl-mariner": 3,
            "debian": 1,
            "nvd": 3,
            "redhat": 2
          },
          "CVSS": {
            "nvd": {
              "V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
              "V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V2Score": 5,
              "V3Score": 7.5
            },
            "redhat": {
              "V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
              "V3Score": 5.3
            }
          },
          "References": [
            "http://www.securityfocus.com/bid/107160",
            "https://access.redhat.com/security/cve/CVE-2018-20796",
            "https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141",
            "https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2018-20796",
            "https://security.netapp.com/advisory/ntap-20190315-0002/",
            "https://support.f5.com/csp/article/K26346590?utm_source=f5support\u0026amp%3Butm_medium=RSS",
            "https://www.cve.org/CVERecord?id=CVE-2018-20796"
          ],
          "PublishedDate": "2019-02-26T02:29:00.45Z",
          "LastModifiedDate": "2024-11-21T04:02:11.827Z"
        },
        {
          "VulnerabilityID": "CVE-2019-1010022",
          "PkgID": "libc-bin@2.41-12",
          "PkgName": "libc-bin",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libc-bin@2.41-12?arch=amd64\u0026distro=debian-13.2",
            "UID": "499d76d2b4d4a251",
            "BOMRef": "pkg:deb/debian/libc-bin@2.41-12?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-12",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2019-1010022",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:e92d126d4323ae6e5af17f04c1f45efc68d06079a1a26bd83419d46b9d9f63a0",
          "Title": "glibc: stack guard protection bypass",
          "Description": "GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may bypass stack guard protection. The component is: nptl. The attack vector is: Exploit stack buffer overflow vulnerability and use this bypass vulnerability to bypass stack guard. NOTE: Upstream comments indicate \"this is being treated as a non-security bug and no real threat.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-119"
          ],
          "VendorSeverity": {
            "debian": 1,
            "nvd": 4
          },
          "CVSS": {
            "nvd": {
              "V2Vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
              "V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
              "V2Score": 7.5,
              "V3Score": 9.8
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2019-1010022",
            "https://nvd.nist.gov/vuln/detail/CVE-2019-1010022",
            "https://security-tracker.debian.org/tracker/CVE-2019-1010022",
            "https://sourceware.org/bugzilla/show_bug.cgi?id=22850",
            "https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3",
            "https://ubuntu.com/security/CVE-2019-1010022",
            "https://www.cve.org/CVERecord?id=CVE-2019-1010022"
          ],
          "PublishedDate": "2019-07-15T04:15:13.317Z",
          "LastModifiedDate": "2024-11-21T04:17:55.5Z"
        },
        {
          "VulnerabilityID": "CVE-2019-1010023",
          "PkgID": "libc-bin@2.41-12",
          "PkgName": "libc-bin",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libc-bin@2.41-12?arch=amd64\u0026distro=debian-13.2",
            "UID": "499d76d2b4d4a251",
            "BOMRef": "pkg:deb/debian/libc-bin@2.41-12?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-12",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2019-1010023",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:0fca4083e4360a00a36250f030bd1e8024f4348272f9ebd5fc6b129a41b6f4ea",
          "Title": "glibc: running ldd on malicious ELF leads to code execution because of wrong size computation",
          "Description": "GNU Libc current is affected by: Re-mapping current loaded library with malicious ELF file. The impact is: In worst case attacker may evaluate privileges. The component is: libld. The attack vector is: Attacker sends 2 ELF files to victim and asks to run ldd on it. ldd execute code. NOTE: Upstream comments indicate \"this is being treated as a non-security bug and no real threat.",
          "Severity": "LOW",
          "VendorSeverity": {
            "debian": 1,
            "nvd": 3,
            "redhat": 1
          },
          "CVSS": {
            "nvd": {
              "V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
              "V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
              "V2Score": 6.8,
              "V3Score": 8.8
            },
            "redhat": {
              "V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
              "V3Score": 7.8
            }
          },
          "References": [
            "http://www.securityfocus.com/bid/109167",
            "https://access.redhat.com/security/cve/CVE-2019-1010023",
            "https://nvd.nist.gov/vuln/detail/CVE-2019-1010023",
            "https://security-tracker.debian.org/tracker/CVE-2019-1010023",
            "https://sourceware.org/bugzilla/show_bug.cgi?id=22851",
            "https://support.f5.com/csp/article/K11932200?utm_source=f5support\u0026amp%3Butm_medium=RSS",
            "https://ubuntu.com/security/CVE-2019-1010023",
            "https://www.cve.org/CVERecord?id=CVE-2019-1010023"
          ],
          "PublishedDate": "2019-07-15T04:15:13.397Z",
          "LastModifiedDate": "2024-11-21T04:17:55.643Z"
        },
        {
          "VulnerabilityID": "CVE-2019-1010024",
          "PkgID": "libc-bin@2.41-12",
          "PkgName": "libc-bin",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libc-bin@2.41-12?arch=amd64\u0026distro=debian-13.2",
            "UID": "499d76d2b4d4a251",
            "BOMRef": "pkg:deb/debian/libc-bin@2.41-12?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-12",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2019-1010024",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:3923e81df473d7d8b76e6505052848c44fee5abb8cc90bfcbe3b9435244f36a6",
          "Title": "glibc: ASLR bypass using cache of thread stack and heap",
          "Description": "GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may bypass ASLR using cache of thread stack and heap. The component is: glibc. NOTE: Upstream comments indicate \"this is being treated as a non-security bug and no real threat.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-200"
          ],
          "VendorSeverity": {
            "debian": 1,
            "nvd": 2,
            "redhat": 2
          },
          "CVSS": {
            "nvd": {
              "V2Vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
              "V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
              "V2Score": 5,
              "V3Score": 5.3
            },
            "redhat": {
              "V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
              "V3Score": 5.3
            }
          },
          "References": [
            "http://www.securityfocus.com/bid/109162",
            "https://access.redhat.com/security/cve/CVE-2019-1010024",
            "https://nvd.nist.gov/vuln/detail/CVE-2019-1010024",
            "https://security-tracker.debian.org/tracker/CVE-2019-1010024",
            "https://sourceware.org/bugzilla/show_bug.cgi?id=22852",
            "https://support.f5.com/csp/article/K06046097",
            "https://support.f5.com/csp/article/K06046097?utm_source=f5support\u0026amp%3Butm_medium=RSS",
            "https://ubuntu.com/security/CVE-2019-1010024",
            "https://www.cve.org/CVERecord?id=CVE-2019-1010024"
          ],
          "PublishedDate": "2019-07-15T04:15:13.473Z",
          "LastModifiedDate": "2024-11-21T04:17:55.843Z"
        },
        {
          "VulnerabilityID": "CVE-2019-1010025",
          "PkgID": "libc-bin@2.41-12",
          "PkgName": "libc-bin",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libc-bin@2.41-12?arch=amd64\u0026distro=debian-13.2",
            "UID": "499d76d2b4d4a251",
            "BOMRef": "pkg:deb/debian/libc-bin@2.41-12?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-12",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2019-1010025",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:0ec9edad1a35ba078986b0ea4af61e9d3cf2684f3aa0a58013ccc850b69b89bb",
          "Title": "glibc: information disclosure of heap addresses of pthread_created thread",
          "Description": "GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may guess the heap addresses of pthread_created thread. The component is: glibc. NOTE: the vendor's position is \"ASLR bypass itself is not a vulnerability.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-330"
          ],
          "VendorSeverity": {
            "debian": 1,
            "nvd": 2,
            "redhat": 1
          },
          "CVSS": {
            "nvd": {
              "V2Vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
              "V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
              "V2Score": 5,
              "V3Score": 5.3
            },
            "redhat": {
              "V3Vector": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
              "V3Score": 2.9
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2019-1010025",
            "https://nvd.nist.gov/vuln/detail/CVE-2019-1010025",
            "https://security-tracker.debian.org/tracker/CVE-2019-1010025",
            "https://sourceware.org/bugzilla/show_bug.cgi?id=22853",
            "https://support.f5.com/csp/article/K06046097",
            "https://support.f5.com/csp/article/K06046097?utm_source=f5support\u0026amp%3Butm_medium=RSS",
            "https://ubuntu.com/security/CVE-2019-1010025",
            "https://www.cve.org/CVERecord?id=CVE-2019-1010025"
          ],
          "PublishedDate": "2019-07-15T04:15:13.537Z",
          "LastModifiedDate": "2024-11-21T04:17:55.96Z"
        },
        {
          "VulnerabilityID": "CVE-2019-9192",
          "PkgID": "libc-bin@2.41-12",
          "PkgName": "libc-bin",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libc-bin@2.41-12?arch=amd64\u0026distro=debian-13.2",
            "UID": "499d76d2b4d4a251",
            "BOMRef": "pkg:deb/debian/libc-bin@2.41-12?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-12",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2019-9192",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:17679e4630dd26f44a8824695525478e89a4ad7a8e8ce0c8c2e8dcb471057848",
          "Title": "glibc: uncontrolled recursion in function check_dst_limits_calc_pos_1 in posix/regexec.c",
          "Description": "In the GNU C Library (aka glibc or libc6) through 2.29, check_dst_limits_calc_pos_1 in posix/regexec.c has Uncontrolled Recursion, as demonstrated by '(|)(\\\\1\\\\1)*' in grep, a different issue than CVE-2018-20796. NOTE: the software maintainer disputes that this is a vulnerability because the behavior occurs only with a crafted pattern",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-674"
          ],
          "VendorSeverity": {
            "cbl-mariner": 3,
            "debian": 1,
            "nvd": 3,
            "redhat": 1
          },
          "CVSS": {
            "nvd": {
              "V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
              "V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V2Score": 5,
              "V3Score": 7.5
            },
            "redhat": {
              "V3Vector": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L",
              "V3Score": 2.8
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2019-9192",
            "https://nvd.nist.gov/vuln/detail/CVE-2019-9192",
            "https://sourceware.org/bugzilla/show_bug.cgi?id=24269",
            "https://support.f5.com/csp/article/K26346590?utm_source=f5support\u0026amp%3Butm_medium=RSS",
            "https://www.cve.org/CVERecord?id=CVE-2019-9192"
          ],
          "PublishedDate": "2019-02-26T18:29:00.34Z",
          "LastModifiedDate": "2024-11-21T04:51:10.53Z"
        },
        {
          "VulnerabilityID": "CVE-2026-0861",
          "PkgID": "libc6@2.41-12",
          "PkgName": "libc6",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libc6@2.41-12?arch=amd64\u0026distro=debian-13.2",
            "UID": "1cc2823c7614ba5c",
            "BOMRef": "pkg:deb/debian/libc6@2.41-12?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-12",
          "FixedVersion": "2.41-12+deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-0861",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:01c3b67d2da1da4ec3bb4b6fbc344530a458e9b6ec7994a9a2062e2ef3944aea",
          "Title": "glibc: Integer overflow in memalign leads to heap corruption",
          "Description": "Passing too large an alignment to the memalign suite of functions (memalign, posix_memalign, aligned_alloc) in the GNU C Library version 2.30 to 2.42 may result in an integer overflow, which could consequently result in a heap corruption.\n\nNote that the attacker must have control over both, the size as well as the alignment arguments of the memalign function to be able to exploit this.  The size parameter must be close enough to PTRDIFF_MAX so as to overflow size_t along with the large alignment argument.  This limits the malicious inputs for the alignment for memalign to the range [1\u003c\u003c62+ 1, 1\u003c\u003c63] and exactly 1\u003c\u003c63 for posix_memalign and aligned_alloc.\n\nTypically the alignment argument passed to such functions is a known constrained quantity (e.g. page size, block size, struct sizes) and is not attacker controlled, because of which this may not be easily exploitable in practice.  An application bug could potentially result in the input alignment being too large, e.g. due to a different buffer overflow or integer overflow in the application or its dependent libraries, but that is again an uncommon usage pattern given typical sources of alignments.",
          "Severity": "HIGH",
          "CweIDs": [
            "CWE-190"
          ],
          "VendorSeverity": {
            "alma": 2,
            "azure": 2,
            "cbl-mariner": 2,
            "oracle-oval": 2,
            "photon": 3,
            "redhat": 1,
            "rocky": 2,
            "ubuntu": 2
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
              "V3Score": 8.1
            }
          },
          "References": [
            "http://www.openwall.com/lists/oss-security/2026/01/16/5",
            "https://access.redhat.com/errata/RHSA-2026:2786",
            "https://access.redhat.com/security/cve/CVE-2026-0861",
            "https://bugzilla.redhat.com/2429771",
            "https://bugzilla.redhat.com/2430201",
            "https://bugzilla.redhat.com/2431196",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2429771",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430201",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2431196",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15281",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0861",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0915",
            "https://errata.almalinux.org/9/ALSA-2026-2786.html",
            "https://errata.rockylinux.org/RLSA-2026:2786",
            "https://linux.oracle.com/cve/CVE-2026-0861.html",
            "https://linux.oracle.com/errata/ELSA-2026-50120.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-0861",
            "https://sourceware.org/bugzilla/show_bug.cgi?id=33796",
            "https://sourceware.org/git/?p=glibc.git;a=blob_plain;f=advisories/GLIBC-SA-2026-0001",
            "https://ubuntu.com/security/notices/USN-8005-1",
            "https://www.cve.org/CVERecord?id=CVE-2026-0861"
          ],
          "PublishedDate": "2026-01-14T21:15:52.617Z",
          "LastModifiedDate": "2026-02-03T18:26:25.39Z"
        },
        {
          "VulnerabilityID": "CVE-2025-15281",
          "PkgID": "libc6@2.41-12",
          "PkgName": "libc6",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libc6@2.41-12?arch=amd64\u0026distro=debian-13.2",
            "UID": "1cc2823c7614ba5c",
            "BOMRef": "pkg:deb/debian/libc6@2.41-12?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-12",
          "FixedVersion": "2.41-12+deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-15281",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:89f9e17eeabdb8376c7005e5248a574d2275a8d5570fa94c87e54308d3f56e1b",
          "Title": "glibc: wordexp with WRDE_REUSE and WRDE_APPEND may return uninitialized memory",
          "Description": "Calling wordexp with WRDE_REUSE in conjunction with WRDE_APPEND in the GNU C Library version 2.0 to version 2.42 may cause the interface to return uninitialized memory in the we_wordv member, which on subsequent calls to wordfree may abort the process.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-908"
          ],
          "VendorSeverity": {
            "alma": 2,
            "azure": 2,
            "cbl-mariner": 2,
            "oracle-oval": 2,
            "photon": 3,
            "redhat": 1,
            "rocky": 2,
            "ubuntu": 2
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 5.9
            }
          },
          "References": [
            "http://www.openwall.com/lists/oss-security/2026/01/20/3",
            "https://access.redhat.com/errata/RHSA-2026:2786",
            "https://access.redhat.com/security/cve/CVE-2025-15281",
            "https://bugzilla.redhat.com/2429771",
            "https://bugzilla.redhat.com/2430201",
            "https://bugzilla.redhat.com/2431196",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2429771",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430201",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2431196",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15281",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0861",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0915",
            "https://errata.almalinux.org/9/ALSA-2026-2786.html",
            "https://errata.rockylinux.org/RLSA-2026:2786",
            "https://linux.oracle.com/cve/CVE-2025-15281.html",
            "https://linux.oracle.com/errata/ELSA-2026-50174.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-15281",
            "https://sourceware.org/bugzilla/show_bug.cgi?id=33814",
            "https://ubuntu.com/security/notices/USN-8005-1",
            "https://www.cve.org/CVERecord?id=CVE-2025-15281",
            "https://www.openwall.com/lists/oss-security/2026/01/20/3"
          ],
          "PublishedDate": "2026-01-20T14:16:07.843Z",
          "LastModifiedDate": "2026-02-05T17:43:18.63Z"
        },
        {
          "VulnerabilityID": "CVE-2026-0915",
          "PkgID": "libc6@2.41-12",
          "PkgName": "libc6",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libc6@2.41-12?arch=amd64\u0026distro=debian-13.2",
            "UID": "1cc2823c7614ba5c",
            "BOMRef": "pkg:deb/debian/libc6@2.41-12?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-12",
          "FixedVersion": "2.41-12+deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-0915",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:dcbba8a1c800fe1f11c3e88953d0d33de4d9ca434a6114176ddd510ac6b3b106",
          "Title": "glibc: glibc: Information disclosure via zero-valued network query",
          "Description": "Calling getnetbyaddr or getnetbyaddr_r with a configured nsswitch.conf that specifies the library's DNS backend for networks and queries for a zero-valued network in the GNU C Library version 2.0 to version 2.42 can leak stack contents to the configured DNS resolver.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-908"
          ],
          "VendorSeverity": {
            "alma": 2,
            "azure": 1,
            "cbl-mariner": 2,
            "oracle-oval": 2,
            "photon": 3,
            "redhat": 2,
            "rocky": 2,
            "ubuntu": 2
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
              "V3Score": 5.3
            }
          },
          "References": [
            "http://www.openwall.com/lists/oss-security/2026/01/16/6",
            "https://access.redhat.com/errata/RHSA-2026:2786",
            "https://access.redhat.com/security/cve/CVE-2026-0915",
            "https://bugzilla.redhat.com/2429771",
            "https://bugzilla.redhat.com/2430201",
            "https://bugzilla.redhat.com/2431196",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2429771",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430201",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2431196",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15281",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0861",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0915",
            "https://errata.almalinux.org/9/ALSA-2026-2786.html",
            "https://errata.rockylinux.org/RLSA-2026:2786",
            "https://linux.oracle.com/cve/CVE-2026-0915.html",
            "https://linux.oracle.com/errata/ELSA-2026-50174.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-0915",
            "https://sourceware.org/bugzilla/show_bug.cgi?id=33802",
            "https://ubuntu.com/security/notices/USN-8005-1",
            "https://www.cve.org/CVERecord?id=CVE-2026-0915",
            "https://www.openwall.com/lists/oss-security/2026/01/16/6"
          ],
          "PublishedDate": "2026-01-15T22:16:12.457Z",
          "LastModifiedDate": "2026-01-23T19:36:50.73Z"
        },
        {
          "VulnerabilityID": "CVE-2026-4046",
          "PkgID": "libc6@2.41-12",
          "PkgName": "libc6",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libc6@2.41-12?arch=amd64\u0026distro=debian-13.2",
            "UID": "1cc2823c7614ba5c",
            "BOMRef": "pkg:deb/debian/libc6@2.41-12?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-12",
          "Status": "fix_deferred",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-4046",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:43fe5c419e54416cc8d1e62f1dc2bd7a303f6178fcdc081fa89153c81dec3d56",
          "Title": "glibc: glibc: Denial of Service via iconv() function with specific character sets",
          "Description": "The iconv() function in the GNU C Library versions 2.43 and earlier may crash due to an assertion failure when converting inputs from the IBM1390 or IBM1399 character sets, which may be used to remotely crash an application.\n\n\n\nThis vulnerability can be trivially mitigated by removing the IBM1390 and IBM1399 character sets from systems that do not need them.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-617"
          ],
          "VendorSeverity": {
            "redhat": 2
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
              "V3Score": 5.3
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-4046",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-4046",
            "https://packages.fedoraproject.org/pkgs/glibc/glibc-gconv-extra/",
            "https://sourceware.org/bugzilla/show_bug.cgi?id=33980",
            "https://sourceware.org/git/?p=glibc.git;a=blob_plain;f=advisories/GLIBC-SA-2026-0007;hb=HEAD",
            "https://www.cve.org/CVERecord?id=CVE-2026-4046"
          ],
          "PublishedDate": "2026-03-30T18:16:19.573Z",
          "LastModifiedDate": "2026-04-01T14:24:21.833Z"
        },
        {
          "VulnerabilityID": "CVE-2026-4437",
          "PkgID": "libc6@2.41-12",
          "PkgName": "libc6",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libc6@2.41-12?arch=amd64\u0026distro=debian-13.2",
            "UID": "1cc2823c7614ba5c",
            "BOMRef": "pkg:deb/debian/libc6@2.41-12?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-12",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-4437",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:e3d5b797dff04dfd9a382be9888097e5bdc443b743e94f8a9160ee5c2c0a715f",
          "Title": "glibc: glibc: Incorrect DNS response parsing via crafted DNS server response",
          "Description": "Calling gethostbyaddr or gethostbyaddr_r with a configured nsswitch.conf that specifies the library's DNS backend in the GNU C Library version 2.34 to version 2.43 could, with a crafted response from the configured DNS server, result in a violation of the DNS specification that causes the application to treat a non-answer section of the DNS response as a valid answer.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-125"
          ],
          "VendorSeverity": {
            "redhat": 2
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
              "V3Score": 6.5
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-4437",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-4437",
            "https://sourceware.org/bugzilla/show_bug.cgi?id=34014",
            "https://www.cve.org/CVERecord?id=CVE-2026-4437"
          ],
          "PublishedDate": "2026-03-20T20:16:49.477Z",
          "LastModifiedDate": "2026-03-23T16:16:51.537Z"
        },
        {
          "VulnerabilityID": "CVE-2026-4438",
          "PkgID": "libc6@2.41-12",
          "PkgName": "libc6",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libc6@2.41-12?arch=amd64\u0026distro=debian-13.2",
            "UID": "1cc2823c7614ba5c",
            "BOMRef": "pkg:deb/debian/libc6@2.41-12?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-12",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-4438",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:778d75d9aea1c9b6b5144fd4c1fc09c6d9e1716b772da8c724d757e9d01f3c0b",
          "Title": "glibc: glibc: Invalid DNS hostname returned via gethostbyaddr functions",
          "Description": "Calling gethostbyaddr or gethostbyaddr_r with a configured nsswitch.conf that specifies the library's DNS backend in the GNU C library version 2.34 to version 2.43 could result in an invalid DNS hostname being returned to the caller in violation of the DNS specification.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-20",
            "CWE-88"
          ],
          "VendorSeverity": {
            "redhat": 1
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
              "V3Score": 4
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-4438",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-4438",
            "https://sourceware.org/bugzilla/show_bug.cgi?id=34015",
            "https://www.cve.org/CVERecord?id=CVE-2026-4438"
          ],
          "PublishedDate": "2026-03-20T20:16:49.623Z",
          "LastModifiedDate": "2026-03-23T15:16:35.68Z"
        },
        {
          "VulnerabilityID": "CVE-2010-4756",
          "PkgID": "libc6@2.41-12",
          "PkgName": "libc6",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libc6@2.41-12?arch=amd64\u0026distro=debian-13.2",
            "UID": "1cc2823c7614ba5c",
            "BOMRef": "pkg:deb/debian/libc6@2.41-12?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-12",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2010-4756",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:67b8000db409c77c02952a244966ecab544fff73377e3223958643b9a631bb76",
          "Title": "glibc: glob implementation can cause excessive CPU and memory consumption due to crafted glob expressions",
          "Description": "The glob implementation in the GNU C Library (aka glibc or libc6) allows remote authenticated users to cause a denial of service (CPU and memory consumption) via crafted glob expressions that do not match any pathnames, as demonstrated by glob expressions in STAT commands to an FTP daemon, a different vulnerability than CVE-2010-2632.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-399"
          ],
          "VendorSeverity": {
            "debian": 1,
            "nvd": 2,
            "redhat": 1
          },
          "CVSS": {
            "nvd": {
              "V2Vector": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
              "V2Score": 4
            },
            "redhat": {
              "V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
              "V2Score": 5
            }
          },
          "References": [
            "http://cxib.net/stuff/glob-0day.c",
            "http://securityreason.com/achievement_securityalert/89",
            "http://securityreason.com/exploitalert/9223",
            "https://access.redhat.com/security/cve/CVE-2010-4756",
            "https://bugzilla.redhat.com/show_bug.cgi?id=681681",
            "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756",
            "https://nvd.nist.gov/vuln/detail/CVE-2010-4756",
            "https://security.netapp.com/advisory/ntap-20241108-0002/",
            "https://www.cve.org/CVERecord?id=CVE-2010-4756"
          ],
          "PublishedDate": "2011-03-02T20:00:01.037Z",
          "LastModifiedDate": "2025-11-03T22:15:41.51Z"
        },
        {
          "VulnerabilityID": "CVE-2018-20796",
          "PkgID": "libc6@2.41-12",
          "PkgName": "libc6",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libc6@2.41-12?arch=amd64\u0026distro=debian-13.2",
            "UID": "1cc2823c7614ba5c",
            "BOMRef": "pkg:deb/debian/libc6@2.41-12?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-12",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2018-20796",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:34b88f193613faae15b915034eff0ca0829fa4ffc9acd779cc01be503cf0be11",
          "Title": "glibc: uncontrolled recursion in function check_dst_limits_calc_pos_1 in posix/regexec.c",
          "Description": "In the GNU C Library (aka glibc or libc6) through 2.29, check_dst_limits_calc_pos_1 in posix/regexec.c has Uncontrolled Recursion, as demonstrated by '(\\227|)(\\\\1\\\\1|t1|\\\\\\2537)+' in grep.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-674"
          ],
          "VendorSeverity": {
            "cbl-mariner": 3,
            "debian": 1,
            "nvd": 3,
            "redhat": 2
          },
          "CVSS": {
            "nvd": {
              "V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
              "V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V2Score": 5,
              "V3Score": 7.5
            },
            "redhat": {
              "V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
              "V3Score": 5.3
            }
          },
          "References": [
            "http://www.securityfocus.com/bid/107160",
            "https://access.redhat.com/security/cve/CVE-2018-20796",
            "https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141",
            "https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2018-20796",
            "https://security.netapp.com/advisory/ntap-20190315-0002/",
            "https://support.f5.com/csp/article/K26346590?utm_source=f5support\u0026amp%3Butm_medium=RSS",
            "https://www.cve.org/CVERecord?id=CVE-2018-20796"
          ],
          "PublishedDate": "2019-02-26T02:29:00.45Z",
          "LastModifiedDate": "2024-11-21T04:02:11.827Z"
        },
        {
          "VulnerabilityID": "CVE-2019-1010022",
          "PkgID": "libc6@2.41-12",
          "PkgName": "libc6",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libc6@2.41-12?arch=amd64\u0026distro=debian-13.2",
            "UID": "1cc2823c7614ba5c",
            "BOMRef": "pkg:deb/debian/libc6@2.41-12?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-12",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2019-1010022",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:79cd92389f3cfd9b7ff17435110e160e5780aac8171a2031a69836319c9af64e",
          "Title": "glibc: stack guard protection bypass",
          "Description": "GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may bypass stack guard protection. The component is: nptl. The attack vector is: Exploit stack buffer overflow vulnerability and use this bypass vulnerability to bypass stack guard. NOTE: Upstream comments indicate \"this is being treated as a non-security bug and no real threat.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-119"
          ],
          "VendorSeverity": {
            "debian": 1,
            "nvd": 4
          },
          "CVSS": {
            "nvd": {
              "V2Vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
              "V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
              "V2Score": 7.5,
              "V3Score": 9.8
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2019-1010022",
            "https://nvd.nist.gov/vuln/detail/CVE-2019-1010022",
            "https://security-tracker.debian.org/tracker/CVE-2019-1010022",
            "https://sourceware.org/bugzilla/show_bug.cgi?id=22850",
            "https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3",
            "https://ubuntu.com/security/CVE-2019-1010022",
            "https://www.cve.org/CVERecord?id=CVE-2019-1010022"
          ],
          "PublishedDate": "2019-07-15T04:15:13.317Z",
          "LastModifiedDate": "2024-11-21T04:17:55.5Z"
        },
        {
          "VulnerabilityID": "CVE-2019-1010023",
          "PkgID": "libc6@2.41-12",
          "PkgName": "libc6",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libc6@2.41-12?arch=amd64\u0026distro=debian-13.2",
            "UID": "1cc2823c7614ba5c",
            "BOMRef": "pkg:deb/debian/libc6@2.41-12?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-12",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2019-1010023",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:ea4a5eff05b7a270a637d4215dc19b547429dc9dd3b99c809fd6c574b62825c7",
          "Title": "glibc: running ldd on malicious ELF leads to code execution because of wrong size computation",
          "Description": "GNU Libc current is affected by: Re-mapping current loaded library with malicious ELF file. The impact is: In worst case attacker may evaluate privileges. The component is: libld. The attack vector is: Attacker sends 2 ELF files to victim and asks to run ldd on it. ldd execute code. NOTE: Upstream comments indicate \"this is being treated as a non-security bug and no real threat.",
          "Severity": "LOW",
          "VendorSeverity": {
            "debian": 1,
            "nvd": 3,
            "redhat": 1
          },
          "CVSS": {
            "nvd": {
              "V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
              "V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
              "V2Score": 6.8,
              "V3Score": 8.8
            },
            "redhat": {
              "V3Vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
              "V3Score": 7.8
            }
          },
          "References": [
            "http://www.securityfocus.com/bid/109167",
            "https://access.redhat.com/security/cve/CVE-2019-1010023",
            "https://nvd.nist.gov/vuln/detail/CVE-2019-1010023",
            "https://security-tracker.debian.org/tracker/CVE-2019-1010023",
            "https://sourceware.org/bugzilla/show_bug.cgi?id=22851",
            "https://support.f5.com/csp/article/K11932200?utm_source=f5support\u0026amp%3Butm_medium=RSS",
            "https://ubuntu.com/security/CVE-2019-1010023",
            "https://www.cve.org/CVERecord?id=CVE-2019-1010023"
          ],
          "PublishedDate": "2019-07-15T04:15:13.397Z",
          "LastModifiedDate": "2024-11-21T04:17:55.643Z"
        },
        {
          "VulnerabilityID": "CVE-2019-1010024",
          "PkgID": "libc6@2.41-12",
          "PkgName": "libc6",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libc6@2.41-12?arch=amd64\u0026distro=debian-13.2",
            "UID": "1cc2823c7614ba5c",
            "BOMRef": "pkg:deb/debian/libc6@2.41-12?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-12",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2019-1010024",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:fcd1d5f1fc8d89425dff9f68b1cc3a20176207c19a4b14202b2e87ce66affe9d",
          "Title": "glibc: ASLR bypass using cache of thread stack and heap",
          "Description": "GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may bypass ASLR using cache of thread stack and heap. The component is: glibc. NOTE: Upstream comments indicate \"this is being treated as a non-security bug and no real threat.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-200"
          ],
          "VendorSeverity": {
            "debian": 1,
            "nvd": 2,
            "redhat": 2
          },
          "CVSS": {
            "nvd": {
              "V2Vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
              "V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
              "V2Score": 5,
              "V3Score": 5.3
            },
            "redhat": {
              "V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
              "V3Score": 5.3
            }
          },
          "References": [
            "http://www.securityfocus.com/bid/109162",
            "https://access.redhat.com/security/cve/CVE-2019-1010024",
            "https://nvd.nist.gov/vuln/detail/CVE-2019-1010024",
            "https://security-tracker.debian.org/tracker/CVE-2019-1010024",
            "https://sourceware.org/bugzilla/show_bug.cgi?id=22852",
            "https://support.f5.com/csp/article/K06046097",
            "https://support.f5.com/csp/article/K06046097?utm_source=f5support\u0026amp%3Butm_medium=RSS",
            "https://ubuntu.com/security/CVE-2019-1010024",
            "https://www.cve.org/CVERecord?id=CVE-2019-1010024"
          ],
          "PublishedDate": "2019-07-15T04:15:13.473Z",
          "LastModifiedDate": "2024-11-21T04:17:55.843Z"
        },
        {
          "VulnerabilityID": "CVE-2019-1010025",
          "PkgID": "libc6@2.41-12",
          "PkgName": "libc6",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libc6@2.41-12?arch=amd64\u0026distro=debian-13.2",
            "UID": "1cc2823c7614ba5c",
            "BOMRef": "pkg:deb/debian/libc6@2.41-12?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-12",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2019-1010025",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:6e4a54e7ed630f5aeb54a47c60cd2bfd9ad6a18d82c1f23676f6547b85c595fc",
          "Title": "glibc: information disclosure of heap addresses of pthread_created thread",
          "Description": "GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may guess the heap addresses of pthread_created thread. The component is: glibc. NOTE: the vendor's position is \"ASLR bypass itself is not a vulnerability.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-330"
          ],
          "VendorSeverity": {
            "debian": 1,
            "nvd": 2,
            "redhat": 1
          },
          "CVSS": {
            "nvd": {
              "V2Vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
              "V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
              "V2Score": 5,
              "V3Score": 5.3
            },
            "redhat": {
              "V3Vector": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
              "V3Score": 2.9
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2019-1010025",
            "https://nvd.nist.gov/vuln/detail/CVE-2019-1010025",
            "https://security-tracker.debian.org/tracker/CVE-2019-1010025",
            "https://sourceware.org/bugzilla/show_bug.cgi?id=22853",
            "https://support.f5.com/csp/article/K06046097",
            "https://support.f5.com/csp/article/K06046097?utm_source=f5support\u0026amp%3Butm_medium=RSS",
            "https://ubuntu.com/security/CVE-2019-1010025",
            "https://www.cve.org/CVERecord?id=CVE-2019-1010025"
          ],
          "PublishedDate": "2019-07-15T04:15:13.537Z",
          "LastModifiedDate": "2024-11-21T04:17:55.96Z"
        },
        {
          "VulnerabilityID": "CVE-2019-9192",
          "PkgID": "libc6@2.41-12",
          "PkgName": "libc6",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libc6@2.41-12?arch=amd64\u0026distro=debian-13.2",
            "UID": "1cc2823c7614ba5c",
            "BOMRef": "pkg:deb/debian/libc6@2.41-12?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-12",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2019-9192",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:e15db95d1537f946f8b135d5d51a07b8925614546ad0f9745d1dede2d3c19e9e",
          "Title": "glibc: uncontrolled recursion in function check_dst_limits_calc_pos_1 in posix/regexec.c",
          "Description": "In the GNU C Library (aka glibc or libc6) through 2.29, check_dst_limits_calc_pos_1 in posix/regexec.c has Uncontrolled Recursion, as demonstrated by '(|)(\\\\1\\\\1)*' in grep, a different issue than CVE-2018-20796. NOTE: the software maintainer disputes that this is a vulnerability because the behavior occurs only with a crafted pattern",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-674"
          ],
          "VendorSeverity": {
            "cbl-mariner": 3,
            "debian": 1,
            "nvd": 3,
            "redhat": 1
          },
          "CVSS": {
            "nvd": {
              "V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
              "V3Vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V2Score": 5,
              "V3Score": 7.5
            },
            "redhat": {
              "V3Vector": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L",
              "V3Score": 2.8
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2019-9192",
            "https://nvd.nist.gov/vuln/detail/CVE-2019-9192",
            "https://sourceware.org/bugzilla/show_bug.cgi?id=24269",
            "https://support.f5.com/csp/article/K26346590?utm_source=f5support\u0026amp%3Butm_medium=RSS",
            "https://www.cve.org/CVERecord?id=CVE-2019-9192"
          ],
          "PublishedDate": "2019-02-26T18:29:00.34Z",
          "LastModifiedDate": "2024-11-21T04:51:10.53Z"
        },
        {
          "VulnerabilityID": "CVE-2022-0563",
          "PkgID": "liblastlog2-2@2.41-5",
          "PkgName": "liblastlog2-2",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/liblastlog2-2@2.41-5?arch=amd64\u0026distro=debian-13.2",
            "UID": "cdbe621e50505f58",
            "BOMRef": "pkg:deb/debian/liblastlog2-2@2.41-5?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-5",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-0563",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:d040e4cda668e6920dbcb98000d44c84886c266b052c078c9824adfc7ec1287d",
          "Title": "util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline",
          "Description": "A flaw was found in the util-linux chfn and chsh utilities when compiled with Readline support. The Readline library uses an \"INPUTRC\" environment variable to get a path to the library config file. When the library cannot parse the specified file, it prints an error message containing data from the file. This flaw allows an unprivileged user to read root-owned files, potentially leading to privilege escalation. This flaw affects util-linux versions prior to 2.37.4.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-209"
          ],
          "VendorSeverity": {
            "amazon": 2,
            "cbl-mariner": 2,
            "debian": 1,
            "nvd": 2,
            "photon": 2,
            "redhat": 2
          },
          "CVSS": {
            "nvd": {
              "V2Vector": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
              "V2Score": 1.9,
              "V3Score": 5.5
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
              "V3Score": 5.5
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2022-0563",
            "https://blog.trailofbits.com/2023/02/16/suid-logic-bug-linux-readline/",
            "https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w%40ws.net.home/T/#u",
            "https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u",
            "https://nvd.nist.gov/vuln/detail/CVE-2022-0563",
            "https://security.gentoo.org/glsa/202401-08",
            "https://security.netapp.com/advisory/ntap-20220331-0002/",
            "https://www.cve.org/CVERecord?id=CVE-2022-0563"
          ],
          "PublishedDate": "2022-02-21T19:15:08.393Z",
          "LastModifiedDate": "2025-06-09T16:15:33.237Z"
        },
        {
          "VulnerabilityID": "CVE-2025-14104",
          "PkgID": "liblastlog2-2@2.41-5",
          "PkgName": "liblastlog2-2",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/liblastlog2-2@2.41-5?arch=amd64\u0026distro=debian-13.2",
            "UID": "cdbe621e50505f58",
            "BOMRef": "pkg:deb/debian/liblastlog2-2@2.41-5?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-5",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-14104",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:12b0fbe8fec06a84dec3890041f75faa1a5d2b52a37c916692b7fdeb1079bc59",
          "Title": "util-linux: util-linux: Heap buffer overread in setpwnam() when processing 256-byte usernames",
          "Description": "A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-125"
          ],
          "VendorSeverity": {
            "alma": 2,
            "azure": 2,
            "cbl-mariner": 2,
            "debian": 1,
            "oracle-oval": 2,
            "photon": 2,
            "redhat": 2,
            "rocky": 2
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
              "V3Score": 6.1
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:1696",
            "https://access.redhat.com/errata/RHSA-2026:1852",
            "https://access.redhat.com/errata/RHSA-2026:1913",
            "https://access.redhat.com/errata/RHSA-2026:2485",
            "https://access.redhat.com/errata/RHSA-2026:2563",
            "https://access.redhat.com/errata/RHSA-2026:2737",
            "https://access.redhat.com/errata/RHSA-2026:2800",
            "https://access.redhat.com/errata/RHSA-2026:3406",
            "https://access.redhat.com/errata/RHSA-2026:4943",
            "https://access.redhat.com/security/cve/CVE-2025-14104",
            "https://bugzilla.redhat.com/2419369",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2419369",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14104",
            "https://errata.almalinux.org/9/ALSA-2026-1913.html",
            "https://errata.rockylinux.org/RLSA-2026:1913",
            "https://linux.oracle.com/cve/CVE-2025-14104.html",
            "https://linux.oracle.com/errata/ELSA-2026-1913.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-14104",
            "https://www.cve.org/CVERecord?id=CVE-2025-14104"
          ],
          "PublishedDate": "2025-12-05T17:16:03.117Z",
          "LastModifiedDate": "2026-03-18T17:16:03.817Z"
        },
        {
          "VulnerabilityID": "CVE-2026-3184",
          "PkgID": "liblastlog2-2@2.41-5",
          "PkgName": "liblastlog2-2",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/liblastlog2-2@2.41-5?arch=amd64\u0026distro=debian-13.2",
            "UID": "cdbe621e50505f58",
            "BOMRef": "pkg:deb/debian/liblastlog2-2@2.41-5?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-5",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-3184",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:26c6ea8c22a3a00a90ae6d8a3d52c634cc0a9b5142a96aa630077f51a36a92e8",
          "Title": "util-linux: util-linux: Access control bypass due to improper hostname canonicalization",
          "Description": "A flaw was found in util-linux. Improper hostname canonicalization in the `login(1)` utility, when invoked with the `-h` option, can modify the supplied remote hostname before setting `PAM_RHOST`. A remote attacker could exploit this by providing a specially crafted hostname, potentially bypassing host-based Pluggable Authentication Modules (PAM) access control rules that rely on fully qualified domain names. This could lead to unauthorized access.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-289"
          ],
          "VendorSeverity": {
            "redhat": 1,
            "ubuntu": 2
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
              "V3Score": 3.7
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-3184",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2442570",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-3184",
            "https://www.cve.org/CVERecord?id=CVE-2026-3184"
          ],
          "PublishedDate": "2026-04-03T19:17:23.377Z",
          "LastModifiedDate": "2026-04-03T19:17:23.377Z"
        },
        {
          "VulnerabilityID": "CVE-2026-27456",
          "PkgID": "liblastlog2-2@2.41-5",
          "PkgName": "liblastlog2-2",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/liblastlog2-2@2.41-5?arch=amd64\u0026distro=debian-13.2",
            "UID": "cdbe621e50505f58",
            "BOMRef": "pkg:deb/debian/liblastlog2-2@2.41-5?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-5",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-27456",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:4340a646a8f878c926a016f90036cdde1f1a42981cfe4035feb72fc29f9959c9",
          "Title": "[util-linux: mount(8) TOCTOU symlink attack via loop device]",
          "Description": "util-linux is a random collection of Linux utilities. Prior to version 2.41.4, a TOCTOU (Time-of-Check-Time-of-Use) vulnerability has been identified in the SUID binary /usr/bin/mount from util-linux. The mount binary, when setting up loop devices, validates the source file path with user privileges via fork() + setuid() + realpath(), but subsequently re-canonicalizes and opens it with root privileges (euid=0) without verifying that the path has not been replaced between both operations. Neither O_NOFOLLOW, nor inode comparison, nor post-open fstat() are employed. This allows a local unprivileged user to replace the source file with a symlink pointing to any root-owned file or device during the race window, causing the SUID binary to open and mount it as root. Exploitation requires an /etc/fstab entry with user,loop options whose path points to a directory where the attacker has write permission, and that /usr/bin/mount has the SUID bit set (the default configuration on virtually all Linux distributions). The impact is unauthorized read access to root-protected files and block devices, including backup images, disk volumes, and any file containing a valid filesystem. This issue has been patched in version 2.41.4.",
          "Severity": "UNKNOWN",
          "CweIDs": [
            "CWE-59",
            "CWE-269",
            "CWE-367"
          ],
          "References": [
            "https://github.com/util-linux/util-linux/commit/5e390467b26a3cf3fecc04e1a0d482dff3162fc4",
            "https://github.com/util-linux/util-linux/releases/tag/v2.41.4",
            "https://github.com/util-linux/util-linux/security/advisories/GHSA-qq4x-vfq4-9h9g"
          ],
          "PublishedDate": "2026-04-03T22:16:25.4Z",
          "LastModifiedDate": "2026-04-03T22:16:25.4Z"
        },
        {
          "VulnerabilityID": "CVE-2026-34743",
          "PkgID": "liblzma5@5.8.1-1",
          "PkgName": "liblzma5",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/liblzma5@5.8.1-1?arch=amd64\u0026distro=debian-13.2",
            "UID": "28863af774b7c754",
            "BOMRef": "pkg:deb/debian/liblzma5@5.8.1-1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "5.8.1-1",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-34743",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:036999fb9b31ad0fb31be22e1ba6dcc1d9e910a1cae4bd69bcf3c0f9239dbd40",
          "Title": "xz: XZ Utils: Denial of Service via buffer overflow in index decoding",
          "Description": "XZ Utils provide a general-purpose data-compression library plus command-line tools. Prior to version 5.8.3, if lzma_index_decoder() was used to decode an Index that contained no Records, the resulting lzma_index was left in a state where where a subsequent lzma_index_append() would allocate too little memory, and a buffer overflow would occur. This issue has been patched in version 5.8.3.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-122"
          ],
          "VendorSeverity": {
            "redhat": 2
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
              "V3Score": 5.3
            }
          },
          "References": [
            "http://www.openwall.com/lists/oss-security/2026/03/31/13",
            "https://access.redhat.com/security/cve/CVE-2026-34743",
            "https://github.com/tukaani-project/xz/commit/c8c22869e780ff57c96b46939c3d79ff99395f87",
            "https://github.com/tukaani-project/xz/releases/tag/v5.8.3",
            "https://github.com/tukaani-project/xz/security/advisories/GHSA-x872-m794-cxhv",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-34743",
            "https://www.cve.org/CVERecord?id=CVE-2026-34743"
          ],
          "PublishedDate": "2026-04-02T19:21:33.187Z",
          "LastModifiedDate": "2026-04-03T16:10:23.73Z"
        },
        {
          "VulnerabilityID": "CVE-2022-0563",
          "PkgID": "libmount1@2.41-5",
          "PkgName": "libmount1",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libmount1@2.41-5?arch=amd64\u0026distro=debian-13.2",
            "UID": "49d83a41e06dbed6",
            "BOMRef": "pkg:deb/debian/libmount1@2.41-5?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-5",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-0563",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:0e28701d717312c3c589925ed6a29bbd6b02ab041cbb6fe05557f74b3005f6f0",
          "Title": "util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline",
          "Description": "A flaw was found in the util-linux chfn and chsh utilities when compiled with Readline support. The Readline library uses an \"INPUTRC\" environment variable to get a path to the library config file. When the library cannot parse the specified file, it prints an error message containing data from the file. This flaw allows an unprivileged user to read root-owned files, potentially leading to privilege escalation. This flaw affects util-linux versions prior to 2.37.4.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-209"
          ],
          "VendorSeverity": {
            "amazon": 2,
            "cbl-mariner": 2,
            "debian": 1,
            "nvd": 2,
            "photon": 2,
            "redhat": 2
          },
          "CVSS": {
            "nvd": {
              "V2Vector": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
              "V2Score": 1.9,
              "V3Score": 5.5
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
              "V3Score": 5.5
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2022-0563",
            "https://blog.trailofbits.com/2023/02/16/suid-logic-bug-linux-readline/",
            "https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w%40ws.net.home/T/#u",
            "https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u",
            "https://nvd.nist.gov/vuln/detail/CVE-2022-0563",
            "https://security.gentoo.org/glsa/202401-08",
            "https://security.netapp.com/advisory/ntap-20220331-0002/",
            "https://www.cve.org/CVERecord?id=CVE-2022-0563"
          ],
          "PublishedDate": "2022-02-21T19:15:08.393Z",
          "LastModifiedDate": "2025-06-09T16:15:33.237Z"
        },
        {
          "VulnerabilityID": "CVE-2025-14104",
          "PkgID": "libmount1@2.41-5",
          "PkgName": "libmount1",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libmount1@2.41-5?arch=amd64\u0026distro=debian-13.2",
            "UID": "49d83a41e06dbed6",
            "BOMRef": "pkg:deb/debian/libmount1@2.41-5?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-5",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-14104",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:04d3156e4144c6653031ae01d7dc16a0e1da9c434a65d80007b632bd1a9f7a06",
          "Title": "util-linux: util-linux: Heap buffer overread in setpwnam() when processing 256-byte usernames",
          "Description": "A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-125"
          ],
          "VendorSeverity": {
            "alma": 2,
            "azure": 2,
            "cbl-mariner": 2,
            "debian": 1,
            "oracle-oval": 2,
            "photon": 2,
            "redhat": 2,
            "rocky": 2
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
              "V3Score": 6.1
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:1696",
            "https://access.redhat.com/errata/RHSA-2026:1852",
            "https://access.redhat.com/errata/RHSA-2026:1913",
            "https://access.redhat.com/errata/RHSA-2026:2485",
            "https://access.redhat.com/errata/RHSA-2026:2563",
            "https://access.redhat.com/errata/RHSA-2026:2737",
            "https://access.redhat.com/errata/RHSA-2026:2800",
            "https://access.redhat.com/errata/RHSA-2026:3406",
            "https://access.redhat.com/errata/RHSA-2026:4943",
            "https://access.redhat.com/security/cve/CVE-2025-14104",
            "https://bugzilla.redhat.com/2419369",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2419369",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14104",
            "https://errata.almalinux.org/9/ALSA-2026-1913.html",
            "https://errata.rockylinux.org/RLSA-2026:1913",
            "https://linux.oracle.com/cve/CVE-2025-14104.html",
            "https://linux.oracle.com/errata/ELSA-2026-1913.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-14104",
            "https://www.cve.org/CVERecord?id=CVE-2025-14104"
          ],
          "PublishedDate": "2025-12-05T17:16:03.117Z",
          "LastModifiedDate": "2026-03-18T17:16:03.817Z"
        },
        {
          "VulnerabilityID": "CVE-2026-3184",
          "PkgID": "libmount1@2.41-5",
          "PkgName": "libmount1",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libmount1@2.41-5?arch=amd64\u0026distro=debian-13.2",
            "UID": "49d83a41e06dbed6",
            "BOMRef": "pkg:deb/debian/libmount1@2.41-5?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-5",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-3184",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:0b6817b023d8e78cebefc02db326321392fc17feb5d8e997d56cf74e5e6a3689",
          "Title": "util-linux: util-linux: Access control bypass due to improper hostname canonicalization",
          "Description": "A flaw was found in util-linux. Improper hostname canonicalization in the `login(1)` utility, when invoked with the `-h` option, can modify the supplied remote hostname before setting `PAM_RHOST`. A remote attacker could exploit this by providing a specially crafted hostname, potentially bypassing host-based Pluggable Authentication Modules (PAM) access control rules that rely on fully qualified domain names. This could lead to unauthorized access.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-289"
          ],
          "VendorSeverity": {
            "redhat": 1,
            "ubuntu": 2
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
              "V3Score": 3.7
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-3184",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2442570",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-3184",
            "https://www.cve.org/CVERecord?id=CVE-2026-3184"
          ],
          "PublishedDate": "2026-04-03T19:17:23.377Z",
          "LastModifiedDate": "2026-04-03T19:17:23.377Z"
        },
        {
          "VulnerabilityID": "CVE-2026-27456",
          "PkgID": "libmount1@2.41-5",
          "PkgName": "libmount1",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libmount1@2.41-5?arch=amd64\u0026distro=debian-13.2",
            "UID": "49d83a41e06dbed6",
            "BOMRef": "pkg:deb/debian/libmount1@2.41-5?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-5",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-27456",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:73d16936a0c9bc44114bbe9c565df46b31e2e2772d9ba59548309b0726af9a2c",
          "Title": "[util-linux: mount(8) TOCTOU symlink attack via loop device]",
          "Description": "util-linux is a random collection of Linux utilities. Prior to version 2.41.4, a TOCTOU (Time-of-Check-Time-of-Use) vulnerability has been identified in the SUID binary /usr/bin/mount from util-linux. The mount binary, when setting up loop devices, validates the source file path with user privileges via fork() + setuid() + realpath(), but subsequently re-canonicalizes and opens it with root privileges (euid=0) without verifying that the path has not been replaced between both operations. Neither O_NOFOLLOW, nor inode comparison, nor post-open fstat() are employed. This allows a local unprivileged user to replace the source file with a symlink pointing to any root-owned file or device during the race window, causing the SUID binary to open and mount it as root. Exploitation requires an /etc/fstab entry with user,loop options whose path points to a directory where the attacker has write permission, and that /usr/bin/mount has the SUID bit set (the default configuration on virtually all Linux distributions). The impact is unauthorized read access to root-protected files and block devices, including backup images, disk volumes, and any file containing a valid filesystem. This issue has been patched in version 2.41.4.",
          "Severity": "UNKNOWN",
          "CweIDs": [
            "CWE-59",
            "CWE-269",
            "CWE-367"
          ],
          "References": [
            "https://github.com/util-linux/util-linux/commit/5e390467b26a3cf3fecc04e1a0d482dff3162fc4",
            "https://github.com/util-linux/util-linux/releases/tag/v2.41.4",
            "https://github.com/util-linux/util-linux/security/advisories/GHSA-qq4x-vfq4-9h9g"
          ],
          "PublishedDate": "2026-04-03T22:16:25.4Z",
          "LastModifiedDate": "2026-04-03T22:16:25.4Z"
        },
        {
          "VulnerabilityID": "CVE-2022-0563",
          "PkgID": "libsmartcols1@2.41-5",
          "PkgName": "libsmartcols1",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libsmartcols1@2.41-5?arch=amd64\u0026distro=debian-13.2",
            "UID": "17e521ebc5a4d0b7",
            "BOMRef": "pkg:deb/debian/libsmartcols1@2.41-5?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-5",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-0563",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:d7ec69f468c90e9b2690d28082307ea76f049af6ec8bfc8a0807396a13f364b6",
          "Title": "util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline",
          "Description": "A flaw was found in the util-linux chfn and chsh utilities when compiled with Readline support. The Readline library uses an \"INPUTRC\" environment variable to get a path to the library config file. When the library cannot parse the specified file, it prints an error message containing data from the file. This flaw allows an unprivileged user to read root-owned files, potentially leading to privilege escalation. This flaw affects util-linux versions prior to 2.37.4.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-209"
          ],
          "VendorSeverity": {
            "amazon": 2,
            "cbl-mariner": 2,
            "debian": 1,
            "nvd": 2,
            "photon": 2,
            "redhat": 2
          },
          "CVSS": {
            "nvd": {
              "V2Vector": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
              "V2Score": 1.9,
              "V3Score": 5.5
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
              "V3Score": 5.5
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2022-0563",
            "https://blog.trailofbits.com/2023/02/16/suid-logic-bug-linux-readline/",
            "https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w%40ws.net.home/T/#u",
            "https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u",
            "https://nvd.nist.gov/vuln/detail/CVE-2022-0563",
            "https://security.gentoo.org/glsa/202401-08",
            "https://security.netapp.com/advisory/ntap-20220331-0002/",
            "https://www.cve.org/CVERecord?id=CVE-2022-0563"
          ],
          "PublishedDate": "2022-02-21T19:15:08.393Z",
          "LastModifiedDate": "2025-06-09T16:15:33.237Z"
        },
        {
          "VulnerabilityID": "CVE-2025-14104",
          "PkgID": "libsmartcols1@2.41-5",
          "PkgName": "libsmartcols1",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libsmartcols1@2.41-5?arch=amd64\u0026distro=debian-13.2",
            "UID": "17e521ebc5a4d0b7",
            "BOMRef": "pkg:deb/debian/libsmartcols1@2.41-5?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-5",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-14104",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:a2a3f24d9f1fb38f47b1e30e38e92ca2a7c3728d0ba4616f11e39efadadee033",
          "Title": "util-linux: util-linux: Heap buffer overread in setpwnam() when processing 256-byte usernames",
          "Description": "A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-125"
          ],
          "VendorSeverity": {
            "alma": 2,
            "azure": 2,
            "cbl-mariner": 2,
            "debian": 1,
            "oracle-oval": 2,
            "photon": 2,
            "redhat": 2,
            "rocky": 2
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
              "V3Score": 6.1
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:1696",
            "https://access.redhat.com/errata/RHSA-2026:1852",
            "https://access.redhat.com/errata/RHSA-2026:1913",
            "https://access.redhat.com/errata/RHSA-2026:2485",
            "https://access.redhat.com/errata/RHSA-2026:2563",
            "https://access.redhat.com/errata/RHSA-2026:2737",
            "https://access.redhat.com/errata/RHSA-2026:2800",
            "https://access.redhat.com/errata/RHSA-2026:3406",
            "https://access.redhat.com/errata/RHSA-2026:4943",
            "https://access.redhat.com/security/cve/CVE-2025-14104",
            "https://bugzilla.redhat.com/2419369",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2419369",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14104",
            "https://errata.almalinux.org/9/ALSA-2026-1913.html",
            "https://errata.rockylinux.org/RLSA-2026:1913",
            "https://linux.oracle.com/cve/CVE-2025-14104.html",
            "https://linux.oracle.com/errata/ELSA-2026-1913.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-14104",
            "https://www.cve.org/CVERecord?id=CVE-2025-14104"
          ],
          "PublishedDate": "2025-12-05T17:16:03.117Z",
          "LastModifiedDate": "2026-03-18T17:16:03.817Z"
        },
        {
          "VulnerabilityID": "CVE-2026-3184",
          "PkgID": "libsmartcols1@2.41-5",
          "PkgName": "libsmartcols1",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libsmartcols1@2.41-5?arch=amd64\u0026distro=debian-13.2",
            "UID": "17e521ebc5a4d0b7",
            "BOMRef": "pkg:deb/debian/libsmartcols1@2.41-5?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-5",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-3184",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:83283a1747e89d99bf35f85510eb1ff3c1dac2b68c0107d5025eab3d1b267683",
          "Title": "util-linux: util-linux: Access control bypass due to improper hostname canonicalization",
          "Description": "A flaw was found in util-linux. Improper hostname canonicalization in the `login(1)` utility, when invoked with the `-h` option, can modify the supplied remote hostname before setting `PAM_RHOST`. A remote attacker could exploit this by providing a specially crafted hostname, potentially bypassing host-based Pluggable Authentication Modules (PAM) access control rules that rely on fully qualified domain names. This could lead to unauthorized access.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-289"
          ],
          "VendorSeverity": {
            "redhat": 1,
            "ubuntu": 2
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
              "V3Score": 3.7
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-3184",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2442570",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-3184",
            "https://www.cve.org/CVERecord?id=CVE-2026-3184"
          ],
          "PublishedDate": "2026-04-03T19:17:23.377Z",
          "LastModifiedDate": "2026-04-03T19:17:23.377Z"
        },
        {
          "VulnerabilityID": "CVE-2026-27456",
          "PkgID": "libsmartcols1@2.41-5",
          "PkgName": "libsmartcols1",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libsmartcols1@2.41-5?arch=amd64\u0026distro=debian-13.2",
            "UID": "17e521ebc5a4d0b7",
            "BOMRef": "pkg:deb/debian/libsmartcols1@2.41-5?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-5",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-27456",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:c3b4b1c956e9410d6797f70ca8049847359f933a150b985a67b1273bc4bf50f7",
          "Title": "[util-linux: mount(8) TOCTOU symlink attack via loop device]",
          "Description": "util-linux is a random collection of Linux utilities. Prior to version 2.41.4, a TOCTOU (Time-of-Check-Time-of-Use) vulnerability has been identified in the SUID binary /usr/bin/mount from util-linux. The mount binary, when setting up loop devices, validates the source file path with user privileges via fork() + setuid() + realpath(), but subsequently re-canonicalizes and opens it with root privileges (euid=0) without verifying that the path has not been replaced between both operations. Neither O_NOFOLLOW, nor inode comparison, nor post-open fstat() are employed. This allows a local unprivileged user to replace the source file with a symlink pointing to any root-owned file or device during the race window, causing the SUID binary to open and mount it as root. Exploitation requires an /etc/fstab entry with user,loop options whose path points to a directory where the attacker has write permission, and that /usr/bin/mount has the SUID bit set (the default configuration on virtually all Linux distributions). The impact is unauthorized read access to root-protected files and block devices, including backup images, disk volumes, and any file containing a valid filesystem. This issue has been patched in version 2.41.4.",
          "Severity": "UNKNOWN",
          "CweIDs": [
            "CWE-59",
            "CWE-269",
            "CWE-367"
          ],
          "References": [
            "https://github.com/util-linux/util-linux/commit/5e390467b26a3cf3fecc04e1a0d482dff3162fc4",
            "https://github.com/util-linux/util-linux/releases/tag/v2.41.4",
            "https://github.com/util-linux/util-linux/security/advisories/GHSA-qq4x-vfq4-9h9g"
          ],
          "PublishedDate": "2026-04-03T22:16:25.4Z",
          "LastModifiedDate": "2026-04-03T22:16:25.4Z"
        },
        {
          "VulnerabilityID": "CVE-2025-7709",
          "PkgID": "libsqlite3-0@3.46.1-7",
          "PkgName": "libsqlite3-0",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libsqlite3-0@3.46.1-7?arch=amd64\u0026distro=debian-13.2",
            "UID": "bd363bacbd9f68d2",
            "BOMRef": "pkg:deb/debian/libsqlite3-0@3.46.1-7?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.46.1-7",
          "FixedVersion": "3.46.1-7+deb13u1",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-7709",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:876b81ea230e8e84fdfda7db3adbc3d71e25b7762334e0c40346c4481ebd796d",
          "Title": "An integer overflow exists in the  FTS5 https://sqlite.org/fts5.html e ...",
          "Description": "An integer overflow exists in the  FTS5 https://sqlite.org/fts5.html  extension. It occurs when the size of an array of tombstone pointers is calculated and truncated into a 32-bit integer. A pointer to partially controlled data can then be written out of bounds.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-190"
          ],
          "VendorSeverity": {
            "photon": 3,
            "ubuntu": 2
          },
          "References": [
            "http://www.openwall.com/lists/oss-security/2025/09/06/2",
            "http://www.openwall.com/lists/oss-security/2025/11/18/10",
            "https://github.com/google/security-research/security/advisories/GHSA-v2c8-vqqp-hv3g",
            "https://ubuntu.com/security/notices/USN-7751-1",
            "https://www.cve.org/CVERecord?id=CVE-2025-7709"
          ],
          "PublishedDate": "2025-09-08T15:15:38.18Z",
          "LastModifiedDate": "2025-11-18T23:15:58.5Z"
        },
        {
          "VulnerabilityID": "CVE-2021-45346",
          "PkgID": "libsqlite3-0@3.46.1-7",
          "PkgName": "libsqlite3-0",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libsqlite3-0@3.46.1-7?arch=amd64\u0026distro=debian-13.2",
            "UID": "bd363bacbd9f68d2",
            "BOMRef": "pkg:deb/debian/libsqlite3-0@3.46.1-7?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.46.1-7",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-45346",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:bd910fdd7c1b6e20fc519dcfb43e322bfa6d9a184a2d6538bd7e687425e7e421",
          "Title": "sqlite: crafted SQL query allows a malicious user to obtain sensitive information",
          "Description": "A Memory Leak vulnerability exists in SQLite Project SQLite3 3.35.1 and 3.37.0 via maliciously crafted SQL Queries (made via editing the Database File), it is possible to query a record, and leak subsequent bytes of memory that extend beyond the record, which could let a malicious user obtain sensitive information. NOTE: The developer disputes this as a vulnerability stating that If you give SQLite a corrupted database file and submit a query against the database, it might read parts of the database that you did not intend or expect.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-401"
          ],
          "VendorSeverity": {
            "bitnami": 2,
            "debian": 1,
            "nvd": 2,
            "redhat": 1
          },
          "CVSS": {
            "bitnami": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
              "V3Score": 4.3
            },
            "nvd": {
              "V2Vector": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
              "V2Score": 4,
              "V3Score": 4.3
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
              "V3Score": 4.3
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2021-45346",
            "https://github.com/guyinatuxedo/sqlite3_record_leaking",
            "https://nvd.nist.gov/vuln/detail/CVE-2021-45346",
            "https://security.netapp.com/advisory/ntap-20220303-0001/",
            "https://sqlite.org/forum/forumpost/056d557c2f8c452ed5",
            "https://sqlite.org/forum/forumpost/53de8864ba114bf6",
            "https://www.cve.org/CVERecord?id=CVE-2021-45346",
            "https://www.sqlite.org/cves.html#status_of_recent_sqlite_cves"
          ],
          "PublishedDate": "2022-02-14T19:15:07.793Z",
          "LastModifiedDate": "2024-11-21T06:32:07.577Z"
        },
        {
          "VulnerabilityID": "CVE-2025-70873",
          "PkgID": "libsqlite3-0@3.46.1-7",
          "PkgName": "libsqlite3-0",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libsqlite3-0@3.46.1-7?arch=amd64\u0026distro=debian-13.2",
            "UID": "bd363bacbd9f68d2",
            "BOMRef": "pkg:deb/debian/libsqlite3-0@3.46.1-7?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.46.1-7",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-70873",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:ffcbde2685f03e35f301bdc3c31bbd2fb17e4514d715284432f66e679b3cf376",
          "Title": "sqlite: SQLite: Information Disclosure via Crafted ZIP File",
          "Description": "An information disclosure issue in the zipfileInflate function in the zipfile extension in SQLite v3.51.1 and earlier allows attackers to obtain heap memory via supplying a crafted ZIP file.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-244"
          ],
          "VendorSeverity": {
            "debian": 1,
            "photon": 3,
            "redhat": 1
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
              "V3Score": 3.3
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2025-70873",
            "https://gist.github.com/cnwangjihe/f496393f30f5ecec5b18c8f5ab072054",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-70873",
            "https://sqlite.org/forum/forumpost/761eac3c82",
            "https://sqlite.org/src/info/3d459f1fb1bd1b5e",
            "https://www.cve.org/CVERecord?id=CVE-2025-70873"
          ],
          "PublishedDate": "2026-03-12T19:16:15.933Z",
          "LastModifiedDate": "2026-03-16T14:18:02.437Z"
        },
        {
          "VulnerabilityID": "CVE-2025-15467",
          "VendorIDs": [
            "DSA-6113-1"
          ],
          "PkgID": "libssl3t64@3.5.4-1~deb13u1",
          "PkgName": "libssl3t64",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libssl3t64@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "44907e46903e0fb5",
            "BOMRef": "pkg:deb/debian/libssl3t64@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.5.4-1~deb13u1",
          "FixedVersion": "3.5.4-1~deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-15467",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:f98d4c009585b44cac02b1dca7a9fff608faca388c4bd2219a35c4fba9cae539",
          "Title": "openssl: OpenSSL: Remote code execution or Denial of Service via oversized Initialization Vector in CMS parsing",
          "Description": "Issue summary: Parsing CMS AuthEnvelopedData or EnvelopedData message with\nmaliciously crafted AEAD parameters can trigger a stack buffer overflow.\n\nImpact summary: A stack buffer overflow may lead to a crash, causing Denial\nof Service, or potentially remote code execution.\n\nWhen parsing CMS (Auth)EnvelopedData structures that use AEAD ciphers such as\nAES-GCM, the IV (Initialization Vector) encoded in the ASN.1 parameters is\ncopied into a fixed-size stack buffer without verifying that its length fits\nthe destination. An attacker can supply a crafted CMS message with an\noversized IV, causing a stack-based out-of-bounds write before any\nauthentication or tag verification occurs.\n\nApplications and services that parse untrusted CMS or PKCS#7 content using\nAEAD ciphers (e.g., S/MIME (Auth)EnvelopedData with AES-GCM) are vulnerable.\nBecause the overflow occurs prior to authentication, no valid key material\nis required to trigger it. While exploitability to remote code execution\ndepends on platform and toolchain mitigations, the stack-based write\nprimitive represents a severe risk.\n\nThe FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this\nissue, as the CMS implementation is outside the OpenSSL FIPS module\nboundary.\n\nOpenSSL 3.6, 3.5, 3.4, 3.3 and 3.0 are vulnerable to this issue.\n\nOpenSSL 1.1.1 and 1.0.2 are not affected by this issue.",
          "Severity": "CRITICAL",
          "CweIDs": [
            "CWE-787"
          ],
          "VendorSeverity": {
            "alma": 3,
            "amazon": 3,
            "azure": 4,
            "oracle-oval": 3,
            "photon": 3,
            "redhat": 3,
            "rocky": 3,
            "ubuntu": 2
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
              "V3Score": 9.8
            }
          },
          "References": [
            "http://www.openwall.com/lists/oss-security/2026/01/27/10",
            "http://www.openwall.com/lists/oss-security/2026/02/25/6",
            "https://access.redhat.com/errata/RHSA-2026:1473",
            "https://access.redhat.com/security/cve/CVE-2025-15467",
            "https://bugzilla.redhat.com/2430375",
            "https://bugzilla.redhat.com/2430376",
            "https://bugzilla.redhat.com/2430377",
            "https://bugzilla.redhat.com/2430378",
            "https://bugzilla.redhat.com/2430379",
            "https://bugzilla.redhat.com/2430380",
            "https://bugzilla.redhat.com/2430381",
            "https://bugzilla.redhat.com/2430386",
            "https://bugzilla.redhat.com/2430387",
            "https://bugzilla.redhat.com/2430388",
            "https://bugzilla.redhat.com/2430389",
            "https://bugzilla.redhat.com/2430390",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430375",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430376",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430377",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430378",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430379",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430380",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430381",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430386",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430387",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430388",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430389",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430390",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11187",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15467",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15468",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15469",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66199",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68160",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69418",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69420",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69421",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22795",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22796",
            "https://errata.almalinux.org/9/ALSA-2026-1473.html",
            "https://errata.rockylinux.org/RLSA-2026:1473",
            "https://github.com/guiimoraes/CVE-2025-15467",
            "https://github.com/openssl/openssl/commit/2c8f0e5fa9b6ee5508a0349e4572ddb74db5a703",
            "https://github.com/openssl/openssl/commit/5f26d4202f5b89664c5c3f3c62086276026ba9a9",
            "https://github.com/openssl/openssl/commit/6ced0fe6b10faa560e410e3ee8d6c82f06c65ea3",
            "https://github.com/openssl/openssl/commit/ce39170276daec87f55c39dad1f629b56344429e",
            "https://github.com/openssl/openssl/commit/d0071a0799f20cc8101730145349ed4487c268dc",
            "https://linux.oracle.com/cve/CVE-2025-15467.html",
            "https://linux.oracle.com/errata/ELSA-2026-50081.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-15467",
            "https://openssl-library.org/news/secadv/20260127.txt",
            "https://ubuntu.com/security/notices/USN-7980-1",
            "https://www.cve.org/CVERecord?id=CVE-2025-15467"
          ],
          "PublishedDate": "2026-01-27T16:16:14.257Z",
          "LastModifiedDate": "2026-03-19T19:16:19.23Z"
        },
        {
          "VulnerabilityID": "CVE-2025-69419",
          "VendorIDs": [
            "DSA-6113-1"
          ],
          "PkgID": "libssl3t64@3.5.4-1~deb13u1",
          "PkgName": "libssl3t64",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libssl3t64@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "44907e46903e0fb5",
            "BOMRef": "pkg:deb/debian/libssl3t64@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.5.4-1~deb13u1",
          "FixedVersion": "3.5.4-1~deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-69419",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:83a72af3cc4e9185963494605ad86f0c302c07ad808275d8ab4e0f916f094bca",
          "Title": "openssl: OpenSSL: Arbitrary code execution due to out-of-bounds write in PKCS#12 processing",
          "Description": "Issue summary: Calling PKCS12_get_friendlyname() function on a maliciously\ncrafted PKCS#12 file with a BMPString (UTF-16BE) friendly name containing\nnon-ASCII BMP code point can trigger a one byte write before the allocated\nbuffer.\n\nImpact summary: The out-of-bounds write can cause a memory corruption\nwhich can have various consequences including a Denial of Service.\n\nThe OPENSSL_uni2utf8() function performs a two-pass conversion of a PKCS#12\nBMPString (UTF-16BE) to UTF-8. In the second pass, when emitting UTF-8 bytes,\nthe helper function bmp_to_utf8() incorrectly forwards the remaining UTF-16\nsource byte count as the destination buffer capacity to UTF8_putc(). For BMP\ncode points above U+07FF, UTF-8 requires three bytes, but the forwarded\ncapacity can be just two bytes. UTF8_putc() then returns -1, and this negative\nvalue is added to the output length without validation, causing the\nlength to become negative. The subsequent trailing NUL byte is then written\nat a negative offset, causing write outside of heap allocated buffer.\n\nThe vulnerability is reachable via the public PKCS12_get_friendlyname() API\nwhen parsing attacker-controlled PKCS#12 files. While PKCS12_parse() uses a\ndifferent code path that avoids this issue, PKCS12_get_friendlyname() directly\ninvokes the vulnerable function. Exploitation requires an attacker to provide\na malicious PKCS#12 file to be parsed by the application and the attacker\ncan just trigger a one zero byte write before the allocated buffer.\nFor that reason the issue was assessed as Low severity according to our\nSecurity Policy.\n\nThe FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue,\nas the PKCS#12 implementation is outside the OpenSSL FIPS module boundary.\n\nOpenSSL 3.6, 3.5, 3.4, 3.3, 3.0 and 1.1.1 are vulnerable to this issue.\n\nOpenSSL 1.0.2 is not affected by this issue.",
          "Severity": "HIGH",
          "CweIDs": [
            "CWE-787"
          ],
          "VendorSeverity": {
            "alma": 2,
            "amazon": 3,
            "azure": 3,
            "cbl-mariner": 3,
            "oracle-oval": 2,
            "photon": 3,
            "redhat": 2,
            "rocky": 3,
            "ubuntu": 1
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
              "V3Score": 7.4
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:4472",
            "https://access.redhat.com/security/cve/CVE-2025-69419",
            "https://bugzilla.redhat.com/2430386",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430375",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430376",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430377",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430378",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430379",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430380",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430381",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430386",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430387",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430388",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430389",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430390",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11187",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15467",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15468",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15469",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66199",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68160",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69418",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69420",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69421",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22795",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22796",
            "https://errata.almalinux.org/9/ALSA-2026-4472.html",
            "https://errata.rockylinux.org/RLSA-2026:1473",
            "https://github.com/openssl/openssl/commit/41be0f216404f14457bbf3b9cc488dba60b49296",
            "https://github.com/openssl/openssl/commit/7e9cac9832e4705b91987c2474ed06a37a93cecb",
            "https://github.com/openssl/openssl/commit/a26a90d38edec3748566129d824e664b54bee2e2",
            "https://github.com/openssl/openssl/commit/cda12de3bc0e333ea8d2c6fd15001dbdaf280015",
            "https://github.com/openssl/openssl/commit/ff628933755075446bca8307e8417c14d164b535",
            "https://linux.oracle.com/cve/CVE-2025-69419.html",
            "https://linux.oracle.com/errata/ELSA-2026-50131.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-69419",
            "https://openssl-library.org/news/secadv/20260127.txt",
            "https://ubuntu.com/security/notices/USN-7980-1",
            "https://ubuntu.com/security/notices/USN-7980-2",
            "https://www.cve.org/CVERecord?id=CVE-2025-69419"
          ],
          "PublishedDate": "2026-01-27T16:16:34.113Z",
          "LastModifiedDate": "2026-02-02T18:35:02.177Z"
        },
        {
          "VulnerabilityID": "CVE-2025-69421",
          "VendorIDs": [
            "DSA-6113-1"
          ],
          "PkgID": "libssl3t64@3.5.4-1~deb13u1",
          "PkgName": "libssl3t64",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libssl3t64@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "44907e46903e0fb5",
            "BOMRef": "pkg:deb/debian/libssl3t64@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.5.4-1~deb13u1",
          "FixedVersion": "3.5.4-1~deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "SeveritySource": "nvd",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-69421",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:25c7b86a6b573f10c230a77976d75f02b198e63e0521ec3ec977af502b8cccd1",
          "Title": "openssl: OpenSSL: Denial of Service via malformed PKCS#12 file processing",
          "Description": "Issue summary: Processing a malformed PKCS#12 file can trigger a NULL pointer\ndereference in the PKCS12_item_decrypt_d2i_ex() function.\n\nImpact summary: A NULL pointer dereference can trigger a crash which leads to\nDenial of Service for an application processing PKCS#12 files.\n\nThe PKCS12_item_decrypt_d2i_ex() function does not check whether the oct\nparameter is NULL before dereferencing it. When called from\nPKCS12_unpack_p7encdata() with a malformed PKCS#12 file, this parameter can\nbe NULL, causing a crash. The vulnerability is limited to Denial of Service\nand cannot be escalated to achieve code execution or memory disclosure.\n\nExploiting this issue requires an attacker to provide a malformed PKCS#12 file\nto an application that processes it. For that reason the issue was assessed as\nLow severity according to our Security Policy.\n\nThe FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue,\nas the PKCS#12 implementation is outside the OpenSSL FIPS module boundary.\n\nOpenSSL 3.6, 3.5, 3.4, 3.3, 3.0, 1.1.1 and 1.0.2 are vulnerable to this issue.",
          "Severity": "HIGH",
          "CweIDs": [
            "CWE-476"
          ],
          "VendorSeverity": {
            "alma": 3,
            "amazon": 3,
            "azure": 2,
            "cbl-mariner": 2,
            "nvd": 3,
            "oracle-oval": 3,
            "photon": 3,
            "redhat": 1,
            "rocky": 3,
            "ubuntu": 1
          },
          "CVSS": {
            "nvd": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 7.5
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
              "V3Score": 6.5
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:1473",
            "https://access.redhat.com/security/cve/CVE-2025-69421",
            "https://bugzilla.redhat.com/2430375",
            "https://bugzilla.redhat.com/2430376",
            "https://bugzilla.redhat.com/2430377",
            "https://bugzilla.redhat.com/2430378",
            "https://bugzilla.redhat.com/2430379",
            "https://bugzilla.redhat.com/2430380",
            "https://bugzilla.redhat.com/2430381",
            "https://bugzilla.redhat.com/2430386",
            "https://bugzilla.redhat.com/2430387",
            "https://bugzilla.redhat.com/2430388",
            "https://bugzilla.redhat.com/2430389",
            "https://bugzilla.redhat.com/2430390",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430375",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430376",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430377",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430378",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430379",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430380",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430381",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430386",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430387",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430388",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430389",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430390",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11187",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15467",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15468",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15469",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66199",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68160",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69418",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69420",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69421",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22795",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22796",
            "https://errata.almalinux.org/9/ALSA-2026-1473.html",
            "https://errata.rockylinux.org/RLSA-2026:1473",
            "https://github.com/openssl/openssl/commit/3524a29271f8191b8fd8a5257eb05173982a097b",
            "https://github.com/openssl/openssl/commit/36ecb4960872a4ce04bf6f1e1f4e78d75ec0c0c7",
            "https://github.com/openssl/openssl/commit/4bbc8d41a72c842ce4077a8a3eccd1109aaf74bd",
            "https://github.com/openssl/openssl/commit/643986985cd1c21221f941129d76fe0c2785aeb3",
            "https://github.com/openssl/openssl/commit/a2dbc539f0f9cc63832709fa5aa33ad9495eb19c",
            "https://linux.oracle.com/cve/CVE-2025-69421.html",
            "https://linux.oracle.com/errata/ELSA-2026-50081.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-69421",
            "https://openssl-library.org/news/secadv/20260127.txt",
            "https://ubuntu.com/security/notices/USN-7980-1",
            "https://ubuntu.com/security/notices/USN-7980-2",
            "https://www.cve.org/CVERecord?id=CVE-2025-69421"
          ],
          "PublishedDate": "2026-01-27T16:16:34.437Z",
          "LastModifiedDate": "2026-02-28T04:16:17.457Z"
        },
        {
          "VulnerabilityID": "CVE-2025-11187",
          "PkgID": "libssl3t64@3.5.4-1~deb13u1",
          "PkgName": "libssl3t64",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libssl3t64@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "44907e46903e0fb5",
            "BOMRef": "pkg:deb/debian/libssl3t64@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.5.4-1~deb13u1",
          "FixedVersion": "3.5.4-1~deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-11187",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:602d209b151278a20d136bd23f0ccc3b13678822d6d96329c1656d9bbcf73fe2",
          "Title": "openssl: OpenSSL: Arbitrary code execution or denial of service through crafted PKCS#12 file",
          "Description": "Issue summary: PBMAC1 parameters in PKCS#12 files are missing validation\nwhich can trigger a stack-based buffer overflow, invalid pointer or NULL\npointer dereference during MAC verification.\n\nImpact summary: The stack buffer overflow or NULL pointer dereference may\ncause a crash leading to Denial of Service for an application that parses\nuntrusted PKCS#12 files. The buffer overflow may also potentially enable\ncode execution depending on platform mitigations.\n\nWhen verifying a PKCS#12 file that uses PBMAC1 for the MAC, the PBKDF2\nsalt and keylength parameters from the file are used without validation.\nIf the value of keylength exceeds the size of the fixed stack buffer used\nfor the derived key (64 bytes), the key derivation will overflow the buffer.\nThe overflow length is attacker-controlled. Also, if the salt parameter is\nnot an OCTET STRING type this can lead to invalid or NULL pointer\ndereference.\n\nExploiting this issue requires a user or application to process\na maliciously crafted PKCS#12 file. It is uncommon to accept untrusted\nPKCS#12 files in applications as they are usually used to store private\nkeys which are trusted by definition. For this reason the issue was assessed\nas Moderate severity.\n\nThe FIPS modules in 3.6, 3.5 and 3.4 are not affected by this issue, as\nPKCS#12 processing is outside the OpenSSL FIPS module boundary.\n\nOpenSSL 3.6, 3.5 and 3.4 are vulnerable to this issue.\n\nOpenSSL 3.3, 3.0, 1.1.1 and 1.0.2 are not affected by this issue as they do\nnot support PBMAC1 in PKCS#12.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-476",
            "CWE-787"
          ],
          "VendorSeverity": {
            "alma": 3,
            "oracle-oval": 3,
            "redhat": 2,
            "rocky": 3,
            "ubuntu": 2
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H",
              "V3Score": 6.1
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:1473",
            "https://access.redhat.com/security/cve/CVE-2025-11187",
            "https://bugzilla.redhat.com/2430375",
            "https://bugzilla.redhat.com/2430376",
            "https://bugzilla.redhat.com/2430377",
            "https://bugzilla.redhat.com/2430378",
            "https://bugzilla.redhat.com/2430379",
            "https://bugzilla.redhat.com/2430380",
            "https://bugzilla.redhat.com/2430381",
            "https://bugzilla.redhat.com/2430386",
            "https://bugzilla.redhat.com/2430387",
            "https://bugzilla.redhat.com/2430388",
            "https://bugzilla.redhat.com/2430389",
            "https://bugzilla.redhat.com/2430390",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430375",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430376",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430377",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430378",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430379",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430380",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430381",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430386",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430387",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430388",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430389",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430390",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11187",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15467",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15468",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15469",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66199",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68160",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69418",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69420",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69421",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22795",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22796",
            "https://errata.almalinux.org/9/ALSA-2026-1473.html",
            "https://errata.rockylinux.org/RLSA-2026:1473",
            "https://github.com/metadust/CVE-2025-11187",
            "https://github.com/openssl/openssl/commit/205e3a55e16e4bd08c12fdbd3416ab829c0f6206",
            "https://github.com/openssl/openssl/commit/8caf359d6e46fb413e8f5f0df765d2e8a51df4e8",
            "https://github.com/openssl/openssl/commit/e1079bc17ed93ff16f6b86f33a2fe3336e78817e",
            "https://linux.oracle.com/cve/CVE-2025-11187.html",
            "https://linux.oracle.com/errata/ELSA-2026-50081.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-11187",
            "https://openssl-library.org/news/secadv/20260127.txt",
            "https://ubuntu.com/security/notices/USN-7980-1",
            "https://www.cve.org/CVERecord?id=CVE-2025-11187"
          ],
          "PublishedDate": "2026-01-27T16:16:14.093Z",
          "LastModifiedDate": "2026-03-20T14:16:13.89Z"
        },
        {
          "VulnerabilityID": "CVE-2025-15468",
          "PkgID": "libssl3t64@3.5.4-1~deb13u1",
          "PkgName": "libssl3t64",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libssl3t64@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "44907e46903e0fb5",
            "BOMRef": "pkg:deb/debian/libssl3t64@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.5.4-1~deb13u1",
          "FixedVersion": "3.5.4-1~deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-15468",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:691af0becff5c132072ea8ed22c4ca426304260a597746e1ce66843f280c6057",
          "Title": "openssl: OpenSSL: Denial of Service via NULL pointer dereference in QUIC protocol handling",
          "Description": "Issue summary: If an application using the SSL_CIPHER_find() function in\na QUIC protocol client or server receives an unknown cipher suite from\nthe peer, a NULL dereference occurs.\n\nImpact summary: A NULL pointer dereference leads to abnormal termination of\nthe running process causing Denial of Service.\n\nSome applications call SSL_CIPHER_find() from the client_hello_cb callback\non the cipher ID received from the peer. If this is done with an SSL object\nimplementing the QUIC protocol, NULL pointer dereference will happen if\nthe examined cipher ID is unknown or unsupported.\n\nAs it is not very common to call this function in applications using the QUIC \nprotocol and the worst outcome is Denial of Service, the issue was assessed\nas Low severity.\n\nThe vulnerable code was introduced in the 3.2 version with the addition\nof the QUIC protocol support.\n\nThe FIPS modules in 3.6, 3.5, 3.4 and 3.3 are not affected by this issue,\nas the QUIC implementation is outside the OpenSSL FIPS module boundary.\n\nOpenSSL 3.6, 3.5, 3.4 and 3.3 are vulnerable to this issue.\n\nOpenSSL 3.0, 1.1.1 and 1.0.2 are not affected by this issue.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-476"
          ],
          "VendorSeverity": {
            "alma": 3,
            "amazon": 3,
            "azure": 2,
            "oracle-oval": 3,
            "photon": 2,
            "redhat": 1,
            "rocky": 3,
            "ubuntu": 1
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 5.9
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:1473",
            "https://access.redhat.com/security/cve/CVE-2025-15468",
            "https://bugzilla.redhat.com/2430375",
            "https://bugzilla.redhat.com/2430376",
            "https://bugzilla.redhat.com/2430377",
            "https://bugzilla.redhat.com/2430378",
            "https://bugzilla.redhat.com/2430379",
            "https://bugzilla.redhat.com/2430380",
            "https://bugzilla.redhat.com/2430381",
            "https://bugzilla.redhat.com/2430386",
            "https://bugzilla.redhat.com/2430387",
            "https://bugzilla.redhat.com/2430388",
            "https://bugzilla.redhat.com/2430389",
            "https://bugzilla.redhat.com/2430390",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430375",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430376",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430377",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430378",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430379",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430380",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430381",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430386",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430387",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430388",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430389",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430390",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11187",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15467",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15468",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15469",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66199",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68160",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69418",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69420",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69421",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22795",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22796",
            "https://errata.almalinux.org/9/ALSA-2026-1473.html",
            "https://errata.rockylinux.org/RLSA-2026:1473",
            "https://github.com/openssl/openssl/commit/1f08e54bad32843044fe8a675948d65e3b4ece65",
            "https://github.com/openssl/openssl/commit/7c88376731c589ee5b36116c5a6e32d5ae5f7ae2",
            "https://github.com/openssl/openssl/commit/b2539639400288a4580fe2d76247541b976bade4",
            "https://github.com/openssl/openssl/commit/d75b309879631d45b972396ce4e5102559c64ac7",
            "https://linux.oracle.com/cve/CVE-2025-15468.html",
            "https://linux.oracle.com/errata/ELSA-2026-50081.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-15468",
            "https://openssl-library.org/news/secadv/20260127.txt",
            "https://ubuntu.com/security/notices/USN-7980-1",
            "https://www.cve.org/CVERecord?id=CVE-2025-15468"
          ],
          "PublishedDate": "2026-01-27T16:16:14.4Z",
          "LastModifiedDate": "2026-02-02T18:38:00.947Z"
        },
        {
          "VulnerabilityID": "CVE-2025-15469",
          "PkgID": "libssl3t64@3.5.4-1~deb13u1",
          "PkgName": "libssl3t64",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libssl3t64@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "44907e46903e0fb5",
            "BOMRef": "pkg:deb/debian/libssl3t64@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.5.4-1~deb13u1",
          "FixedVersion": "3.5.4-1~deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-15469",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:99c9f4a3b8981d6f5df1e8e5d7af1306202245620da989e2eb1d46fbaeb6f655",
          "Title": "openssl: OpenSSL: Data integrity bypass in `openssl dgst` command due to silent truncation",
          "Description": "Issue summary: The 'openssl dgst' command-line tool silently truncates input\ndata to 16MB when using one-shot signing algorithms and reports success instead\nof an error.\n\nImpact summary: A user signing or verifying files larger than 16MB with\none-shot algorithms (such as Ed25519, Ed448, or ML-DSA) may believe the entire\nfile is authenticated while trailing data beyond 16MB remains unauthenticated.\n\nWhen the 'openssl dgst' command is used with algorithms that only support\none-shot signing (Ed25519, Ed448, ML-DSA-44, ML-DSA-65, ML-DSA-87), the input\nis buffered with a 16MB limit. If the input exceeds this limit, the tool\nsilently truncates to the first 16MB and continues without signaling an error,\ncontrary to what the documentation states. This creates an integrity gap where\ntrailing bytes can be modified without detection if both signing and\nverification are performed using the same affected codepath.\n\nThe issue affects only the command-line tool behavior. Verifiers that process\nthe full message using library APIs will reject the signature, so the risk\nprimarily affects workflows that both sign and verify with the affected\n'openssl dgst' command. Streaming digest algorithms for 'openssl dgst' and\nlibrary users are unaffected.\n\nThe FIPS modules in 3.5 and 3.6 are not affected by this issue, as the\ncommand-line tools are outside the OpenSSL FIPS module boundary.\n\nOpenSSL 3.5 and 3.6 are vulnerable to this issue.\n\nOpenSSL 3.4, 3.3, 3.0, 1.1.1 and 1.0.2 are not affected by this issue.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-347"
          ],
          "VendorSeverity": {
            "alma": 3,
            "oracle-oval": 3,
            "photon": 2,
            "redhat": 1,
            "rocky": 3,
            "ubuntu": 1
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
              "V3Score": 5.5
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:1473",
            "https://access.redhat.com/security/cve/CVE-2025-15469",
            "https://bugzilla.redhat.com/2430375",
            "https://bugzilla.redhat.com/2430376",
            "https://bugzilla.redhat.com/2430377",
            "https://bugzilla.redhat.com/2430378",
            "https://bugzilla.redhat.com/2430379",
            "https://bugzilla.redhat.com/2430380",
            "https://bugzilla.redhat.com/2430381",
            "https://bugzilla.redhat.com/2430386",
            "https://bugzilla.redhat.com/2430387",
            "https://bugzilla.redhat.com/2430388",
            "https://bugzilla.redhat.com/2430389",
            "https://bugzilla.redhat.com/2430390",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430375",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430376",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430377",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430378",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430379",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430380",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430381",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430386",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430387",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430388",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430389",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430390",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11187",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15467",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15468",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15469",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66199",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68160",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69418",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69420",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69421",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22795",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22796",
            "https://errata.almalinux.org/9/ALSA-2026-1473.html",
            "https://errata.rockylinux.org/RLSA-2026:1473",
            "https://github.com/openssl/openssl/commit/310f305eb92ea8040d6b3cb75a5feeba8e6acf2f",
            "https://github.com/openssl/openssl/commit/a7936fa4bd23c906e1955a16a0a0ab39a4953a61",
            "https://linux.oracle.com/cve/CVE-2025-15469.html",
            "https://linux.oracle.com/errata/ELSA-2026-50081.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-15469",
            "https://openssl-library.org/news/secadv/20260127.txt",
            "https://ubuntu.com/security/notices/USN-7980-1",
            "https://www.cve.org/CVERecord?id=CVE-2025-15469"
          ],
          "PublishedDate": "2026-01-27T16:16:14.523Z",
          "LastModifiedDate": "2026-02-02T18:37:39.313Z"
        },
        {
          "VulnerabilityID": "CVE-2025-66199",
          "PkgID": "libssl3t64@3.5.4-1~deb13u1",
          "PkgName": "libssl3t64",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libssl3t64@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "44907e46903e0fb5",
            "BOMRef": "pkg:deb/debian/libssl3t64@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.5.4-1~deb13u1",
          "FixedVersion": "3.5.4-1~deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-66199",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:0c9aa7c47519975056bc9b11d5396f6e620e18809c267ce3a31d8e9022726cc6",
          "Title": "openssl: OpenSSL: Denial of Service due to excessive memory allocation in TLS 1.3 certificate compression",
          "Description": "Issue summary: A TLS 1.3 connection using certificate compression can be\nforced to allocate a large buffer before decompression without checking\nagainst the configured certificate size limit.\n\nImpact summary: An attacker can cause per-connection memory allocations of\nup to approximately 22 MiB and extra CPU work, potentially leading to\nservice degradation or resource exhaustion (Denial of Service).\n\nIn affected configurations, the peer-supplied uncompressed certificate\nlength from a CompressedCertificate message is used to grow a heap buffer\nprior to decompression. This length is not bounded by the max_cert_list\nsetting, which otherwise constrains certificate message sizes. An attacker\ncan exploit this to cause large per-connection allocations followed by\nhandshake failure. No memory corruption or information disclosure occurs.\n\nThis issue only affects builds where TLS 1.3 certificate compression is\ncompiled in (i.e., not OPENSSL_NO_COMP_ALG) and at least one compression\nalgorithm (brotli, zlib, or zstd) is available, and where the compression\nextension is negotiated. Both clients receiving a server CompressedCertificate\nand servers in mutual TLS scenarios receiving a client CompressedCertificate\nare affected. Servers that do not request client certificates are not\nvulnerable to client-initiated attacks.\n\nUsers can mitigate this issue by setting SSL_OP_NO_RX_CERTIFICATE_COMPRESSION\nto disable receiving compressed certificates.\n\nThe FIPS modules in 3.6, 3.5, 3.4 and 3.3 are not affected by this issue,\nas the TLS implementation is outside the OpenSSL FIPS module boundary.\n\nOpenSSL 3.6, 3.5, 3.4 and 3.3 are vulnerable to this issue.\n\nOpenSSL 3.0, 1.1.1 and 1.0.2 are not affected by this issue.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-789"
          ],
          "VendorSeverity": {
            "alma": 3,
            "amazon": 3,
            "azure": 2,
            "oracle-oval": 3,
            "photon": 2,
            "redhat": 1,
            "rocky": 3,
            "ubuntu": 1
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 5.9
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:1473",
            "https://access.redhat.com/security/cve/CVE-2025-66199",
            "https://bugzilla.redhat.com/2430375",
            "https://bugzilla.redhat.com/2430376",
            "https://bugzilla.redhat.com/2430377",
            "https://bugzilla.redhat.com/2430378",
            "https://bugzilla.redhat.com/2430379",
            "https://bugzilla.redhat.com/2430380",
            "https://bugzilla.redhat.com/2430381",
            "https://bugzilla.redhat.com/2430386",
            "https://bugzilla.redhat.com/2430387",
            "https://bugzilla.redhat.com/2430388",
            "https://bugzilla.redhat.com/2430389",
            "https://bugzilla.redhat.com/2430390",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430375",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430376",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430377",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430378",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430379",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430380",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430381",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430386",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430387",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430388",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430389",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430390",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11187",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15467",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15468",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15469",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66199",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68160",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69418",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69420",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69421",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22795",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22796",
            "https://errata.almalinux.org/9/ALSA-2026-1473.html",
            "https://errata.rockylinux.org/RLSA-2026:1473",
            "https://github.com/openssl/openssl/commit/3ed1f75249932b155eef993a8e66a99cb98bfef4",
            "https://github.com/openssl/openssl/commit/6184a4fb08ee6d7bca570d931a4e8bef40b64451",
            "https://github.com/openssl/openssl/commit/895150b5e021d16b52fb32b97e1dd12f20448be5",
            "https://github.com/openssl/openssl/commit/966a2478046c311ed7dae50c457d0db4cafbf7e4",
            "https://linux.oracle.com/cve/CVE-2025-66199.html",
            "https://linux.oracle.com/errata/ELSA-2026-50081.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-66199",
            "https://openssl-library.org/news/secadv/20260127.txt",
            "https://ubuntu.com/security/notices/USN-7980-1",
            "https://www.cve.org/CVERecord?id=CVE-2025-66199"
          ],
          "PublishedDate": "2026-01-27T16:16:15.777Z",
          "LastModifiedDate": "2026-02-02T18:37:19.613Z"
        },
        {
          "VulnerabilityID": "CVE-2025-68160",
          "VendorIDs": [
            "DSA-6113-1"
          ],
          "PkgID": "libssl3t64@3.5.4-1~deb13u1",
          "PkgName": "libssl3t64",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libssl3t64@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "44907e46903e0fb5",
            "BOMRef": "pkg:deb/debian/libssl3t64@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.5.4-1~deb13u1",
          "FixedVersion": "3.5.4-1~deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-68160",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:3841beee5d7270477c71008eb0e5e10025f919980e7acc61de5df41fd5ec9eb4",
          "Title": "openssl: OpenSSL: Denial of Service due to out-of-bounds write in BIO filter",
          "Description": "Issue summary: Writing large, newline-free data into a BIO chain using the\nline-buffering filter where the next BIO performs short writes can trigger\na heap-based out-of-bounds write.\n\nImpact summary: This out-of-bounds write can cause memory corruption which\ntypically results in a crash, leading to Denial of Service for an application.\n\nThe line-buffering BIO filter (BIO_f_linebuffer) is not used by default in\nTLS/SSL data paths. In OpenSSL command-line applications, it is typically\nonly pushed onto stdout/stderr on VMS systems. Third-party applications that\nexplicitly use this filter with a BIO chain that can short-write and that\nwrite large, newline-free data influenced by an attacker would be affected.\nHowever, the circumstances where this could happen are unlikely to be under\nattacker control, and BIO_f_linebuffer is unlikely to be handling non-curated\ndata controlled by an attacker. For that reason the issue was assessed as\nLow severity.\n\nThe FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue,\nas the BIO implementation is outside the OpenSSL FIPS module boundary.\n\nOpenSSL 3.6, 3.5, 3.4, 3.3, 3.0, 1.1.1 and 1.0.2 are vulnerable to this issue.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-787"
          ],
          "VendorSeverity": {
            "alma": 3,
            "amazon": 3,
            "azure": 2,
            "cbl-mariner": 2,
            "oracle-oval": 3,
            "photon": 2,
            "redhat": 1,
            "rocky": 3,
            "ubuntu": 1
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 4.7
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:1473",
            "https://access.redhat.com/security/cve/CVE-2025-68160",
            "https://bugzilla.redhat.com/2430375",
            "https://bugzilla.redhat.com/2430376",
            "https://bugzilla.redhat.com/2430377",
            "https://bugzilla.redhat.com/2430378",
            "https://bugzilla.redhat.com/2430379",
            "https://bugzilla.redhat.com/2430380",
            "https://bugzilla.redhat.com/2430381",
            "https://bugzilla.redhat.com/2430386",
            "https://bugzilla.redhat.com/2430387",
            "https://bugzilla.redhat.com/2430388",
            "https://bugzilla.redhat.com/2430389",
            "https://bugzilla.redhat.com/2430390",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430375",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430376",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430377",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430378",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430379",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430380",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430381",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430386",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430387",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430388",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430389",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430390",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11187",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15467",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15468",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15469",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66199",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68160",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69418",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69420",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69421",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22795",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22796",
            "https://errata.almalinux.org/9/ALSA-2026-1473.html",
            "https://errata.rockylinux.org/RLSA-2026:1473",
            "https://github.com/openssl/openssl/commit/384011202af92605d926fafe4a0bcd6b65d162ad",
            "https://github.com/openssl/openssl/commit/475c466ef2fbd8fc1df6fae1c3eed9c813fc8ff6",
            "https://github.com/openssl/openssl/commit/4c96fbba618e1940f038012506ee9e21d32ee12c",
            "https://github.com/openssl/openssl/commit/6845c3b6460a98b1ec4e463baa2ea1a63a32d7c0",
            "https://github.com/openssl/openssl/commit/68a7cd2e2816c3a02f4d45a2ce43fc04fac97096",
            "https://linux.oracle.com/cve/CVE-2025-68160.html",
            "https://linux.oracle.com/errata/ELSA-2026-50081.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-68160",
            "https://openssl-library.org/news/secadv/20260127.txt",
            "https://ubuntu.com/security/notices/USN-7980-1",
            "https://ubuntu.com/security/notices/USN-7980-2",
            "https://www.cve.org/CVERecord?id=CVE-2025-68160"
          ],
          "PublishedDate": "2026-01-27T16:16:15.9Z",
          "LastModifiedDate": "2026-02-02T18:36:57.727Z"
        },
        {
          "VulnerabilityID": "CVE-2025-69418",
          "VendorIDs": [
            "DSA-6113-1"
          ],
          "PkgID": "libssl3t64@3.5.4-1~deb13u1",
          "PkgName": "libssl3t64",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libssl3t64@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "44907e46903e0fb5",
            "BOMRef": "pkg:deb/debian/libssl3t64@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.5.4-1~deb13u1",
          "FixedVersion": "3.5.4-1~deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-69418",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:c09c339c0982539ba629eb910933acf9f30b93e35b8c045d76989c6fc3576288",
          "Title": "openssl: OpenSSL: Information disclosure and data tampering via specific low-level OCB encryption/decryption calls",
          "Description": "Issue summary: When using the low-level OCB API directly with AES-NI or\u003cbr\u003eother hardware-accelerated code paths, inputs whose length is not a multiple\u003cbr\u003eof 16 bytes can leave the final partial block unencrypted and unauthenticated.\u003cbr\u003e\u003cbr\u003eImpact summary: The trailing 1-15 bytes of a message may be exposed in\u003cbr\u003ecleartext on encryption and are not covered by the authentication tag,\u003cbr\u003eallowing an attacker to read or tamper with those bytes without detection.\u003cbr\u003e\u003cbr\u003eThe low-level OCB encrypt and decrypt routines in the hardware-accelerated\u003cbr\u003estream path process full 16-byte blocks but do not advance the input/output\u003cbr\u003epointers. The subsequent tail-handling code then operates on the original\u003cbr\u003ebase pointers, effectively reprocessing the beginning of the buffer while\u003cbr\u003eleaving the actual trailing bytes unprocessed. The authentication checksum\u003cbr\u003ealso excludes the true tail bytes.\u003cbr\u003e\u003cbr\u003eHowever, typical OpenSSL consumers using EVP are not affected because the\u003cbr\u003ehigher-level EVP and provider OCB implementations split inputs so that full\u003cbr\u003eblocks and trailing partial blocks are processed in separate calls, avoiding\u003cbr\u003ethe problematic code path. Additionally, TLS does not use OCB ciphersuites.\u003cbr\u003eThe vulnerability only affects applications that call the low-level\u003cbr\u003eCRYPTO_ocb128_encrypt() or CRYPTO_ocb128_decrypt() functions directly with\u003cbr\u003enon-block-aligned lengths in a single call on hardware-accelerated builds.\u003cbr\u003eFor these reasons the issue was assessed as Low severity.\u003cbr\u003e\u003cbr\u003eThe FIPS modules in 3.6, 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected\u003cbr\u003eby this issue, as OCB mode is not a FIPS-approved algorithm.\u003cbr\u003e\u003cbr\u003eOpenSSL 3.6, 3.5, 3.4, 3.3, 3.0 and 1.1.1 are vulnerable to this issue.\u003cbr\u003e\u003cbr\u003eOpenSSL 1.0.2 is not affected by this issue.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-325"
          ],
          "VendorSeverity": {
            "alma": 3,
            "amazon": 3,
            "azure": 2,
            "cbl-mariner": 2,
            "oracle-oval": 3,
            "photon": 2,
            "redhat": 1,
            "rocky": 3,
            "ubuntu": 1
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
              "V3Score": 4
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:1473",
            "https://access.redhat.com/security/cve/CVE-2025-69418",
            "https://bugzilla.redhat.com/2430375",
            "https://bugzilla.redhat.com/2430376",
            "https://bugzilla.redhat.com/2430377",
            "https://bugzilla.redhat.com/2430378",
            "https://bugzilla.redhat.com/2430379",
            "https://bugzilla.redhat.com/2430380",
            "https://bugzilla.redhat.com/2430381",
            "https://bugzilla.redhat.com/2430386",
            "https://bugzilla.redhat.com/2430387",
            "https://bugzilla.redhat.com/2430388",
            "https://bugzilla.redhat.com/2430389",
            "https://bugzilla.redhat.com/2430390",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430375",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430376",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430377",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430378",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430379",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430380",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430381",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430386",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430387",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430388",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430389",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430390",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11187",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15467",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15468",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15469",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66199",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68160",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69418",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69420",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69421",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22795",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22796",
            "https://errata.almalinux.org/9/ALSA-2026-1473.html",
            "https://errata.rockylinux.org/RLSA-2026:1473",
            "https://github.com/openssl/openssl/commit/372fc5c77529695b05b4f5b5187691a57ef5dffc",
            "https://github.com/openssl/openssl/commit/4016975d4469cd6b94927c607f7c511385f928d8",
            "https://github.com/openssl/openssl/commit/52d23c86a54adab5ee9f80e48b242b52c4cc2347",
            "https://github.com/openssl/openssl/commit/a7589230356d908c0eca4b969ec4f62106f4f5ae",
            "https://github.com/openssl/openssl/commit/ed40856d7d4ba6cb42779b6770666a65f19cb977",
            "https://linux.oracle.com/cve/CVE-2025-69418.html",
            "https://linux.oracle.com/errata/ELSA-2026-50081.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-69418",
            "https://openssl-library.org/news/secadv/20260127.txt",
            "https://ubuntu.com/security/notices/USN-7980-1",
            "https://ubuntu.com/security/notices/USN-7980-2",
            "https://www.cve.org/CVERecord?id=CVE-2025-69418"
          ],
          "PublishedDate": "2026-01-27T16:16:33.253Z",
          "LastModifiedDate": "2026-02-02T18:36:03.557Z"
        },
        {
          "VulnerabilityID": "CVE-2025-69420",
          "VendorIDs": [
            "DSA-6113-1"
          ],
          "PkgID": "libssl3t64@3.5.4-1~deb13u1",
          "PkgName": "libssl3t64",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libssl3t64@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "44907e46903e0fb5",
            "BOMRef": "pkg:deb/debian/libssl3t64@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.5.4-1~deb13u1",
          "FixedVersion": "3.5.4-1~deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-69420",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:423148fe5df317cf660e8c5912a611934c83937eae615a74565426e22a394f8d",
          "Title": "openssl: OpenSSL: Denial of Service via malformed TimeStamp Response",
          "Description": "Issue summary: A type confusion vulnerability exists in the TimeStamp Response\nverification code where an ASN1_TYPE union member is accessed without first\nvalidating the type, causing an invalid or NULL pointer dereference when\nprocessing a malformed TimeStamp Response file.\n\nImpact summary: An application calling TS_RESP_verify_response() with a\nmalformed TimeStamp Response can be caused to dereference an invalid or\nNULL pointer when reading, resulting in a Denial of Service.\n\nThe functions ossl_ess_get_signing_cert() and ossl_ess_get_signing_cert_v2()\naccess the signing cert attribute value without validating its type.\nWhen the type is not V_ASN1_SEQUENCE, this results in accessing invalid memory\nthrough the ASN1_TYPE union, causing a crash.\n\nExploiting this vulnerability requires an attacker to provide a malformed\nTimeStamp Response to an application that verifies timestamp responses. The\nTimeStamp protocol (RFC 3161) is not widely used and the impact of the\nexploit is just a Denial of Service. For these reasons the issue was\nassessed as Low severity.\n\nThe FIPS modules in 3.5, 3.4, 3.3 and 3.0 are not affected by this issue,\nas the TimeStamp Response implementation is outside the OpenSSL FIPS module\nboundary.\n\nOpenSSL 3.6, 3.5, 3.4, 3.3, 3.0 and 1.1.1 are vulnerable to this issue.\n\nOpenSSL 1.0.2 is not affected by this issue.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-754"
          ],
          "VendorSeverity": {
            "alma": 3,
            "amazon": 3,
            "azure": 3,
            "cbl-mariner": 3,
            "oracle-oval": 3,
            "photon": 3,
            "redhat": 1,
            "rocky": 3,
            "ubuntu": 1
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 5.9
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:1473",
            "https://access.redhat.com/security/cve/CVE-2025-69420",
            "https://bugzilla.redhat.com/2430375",
            "https://bugzilla.redhat.com/2430376",
            "https://bugzilla.redhat.com/2430377",
            "https://bugzilla.redhat.com/2430378",
            "https://bugzilla.redhat.com/2430379",
            "https://bugzilla.redhat.com/2430380",
            "https://bugzilla.redhat.com/2430381",
            "https://bugzilla.redhat.com/2430386",
            "https://bugzilla.redhat.com/2430387",
            "https://bugzilla.redhat.com/2430388",
            "https://bugzilla.redhat.com/2430389",
            "https://bugzilla.redhat.com/2430390",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430375",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430376",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430377",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430378",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430379",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430380",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430381",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430386",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430387",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430388",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430389",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430390",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11187",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15467",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15468",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15469",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66199",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68160",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69418",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69420",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69421",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22795",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22796",
            "https://errata.almalinux.org/9/ALSA-2026-1473.html",
            "https://errata.rockylinux.org/RLSA-2026:1473",
            "https://github.com/openssl/openssl/commit/27c7012c91cc986a598d7540f3079dfde2416eb9",
            "https://github.com/openssl/openssl/commit/4e254b48ad93cc092be3dd62d97015f33f73133a",
            "https://github.com/openssl/openssl/commit/564fd9c73787f25693bf9e75faf7bf6bb1305d4e",
            "https://github.com/openssl/openssl/commit/5eb0770ffcf11b785cf374ff3c19196245e54f1b",
            "https://github.com/openssl/openssl/commit/a99349ebfc519999edc50620abe24d599b9eb085",
            "https://linux.oracle.com/cve/CVE-2025-69420.html",
            "https://linux.oracle.com/errata/ELSA-2026-50081.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-69420",
            "https://openssl-library.org/news/secadv/20260127.txt",
            "https://ubuntu.com/security/notices/USN-7980-1",
            "https://ubuntu.com/security/notices/USN-7980-2",
            "https://www.cve.org/CVERecord?id=CVE-2025-69420"
          ],
          "PublishedDate": "2026-01-27T16:16:34.317Z",
          "LastModifiedDate": "2026-02-02T18:33:30.557Z"
        },
        {
          "VulnerabilityID": "CVE-2026-22795",
          "VendorIDs": [
            "DSA-6113-1"
          ],
          "PkgID": "libssl3t64@3.5.4-1~deb13u1",
          "PkgName": "libssl3t64",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libssl3t64@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "44907e46903e0fb5",
            "BOMRef": "pkg:deb/debian/libssl3t64@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.5.4-1~deb13u1",
          "FixedVersion": "3.5.4-1~deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-22795",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:4e49b95fb6a194b3ec817d0df95df3371a82cf5ab3332ac0a4c4cf3180ec3000",
          "Title": "openssl: OpenSSL: Denial of Service due to type confusion in PKCS#12 file processing",
          "Description": "Issue summary: An invalid or NULL pointer dereference can happen in\nan application processing a malformed PKCS#12 file.\n\nImpact summary: An application processing a malformed PKCS#12 file can be\ncaused to dereference an invalid or NULL pointer on memory read, resulting\nin a Denial of Service.\n\nA type confusion vulnerability exists in PKCS#12 parsing code where\nan ASN1_TYPE union member is accessed without first validating the type,\ncausing an invalid pointer read.\n\nThe location is constrained to a 1-byte address space, meaning any\nattempted pointer manipulation can only target addresses between 0x00 and 0xFF.\nThis range corresponds to the zero page, which is unmapped on most modern\noperating systems and will reliably result in a crash, leading only to a\nDenial of Service. Exploiting this issue also requires a user or application\nto process a maliciously crafted PKCS#12 file. It is uncommon to accept\nuntrusted PKCS#12 files in applications as they are usually used to store\nprivate keys which are trusted by definition. For these reasons, the issue\nwas assessed as Low severity.\n\nThe FIPS modules in 3.5, 3.4, 3.3 and 3.0 are not affected by this issue,\nas the PKCS12 implementation is outside the OpenSSL FIPS module boundary.\n\nOpenSSL 3.6, 3.5, 3.4, 3.3, 3.0 and 1.1.1 are vulnerable to this issue.\n\nOpenSSL 1.0.2 is not affected by this issue.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-754"
          ],
          "VendorSeverity": {
            "alma": 3,
            "amazon": 3,
            "azure": 2,
            "cbl-mariner": 2,
            "oracle-oval": 3,
            "photon": 2,
            "redhat": 1,
            "rocky": 3,
            "ubuntu": 1
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
              "V3Score": 5.5
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:1473",
            "https://access.redhat.com/security/cve/CVE-2026-22795",
            "https://bugzilla.redhat.com/2430375",
            "https://bugzilla.redhat.com/2430376",
            "https://bugzilla.redhat.com/2430377",
            "https://bugzilla.redhat.com/2430378",
            "https://bugzilla.redhat.com/2430379",
            "https://bugzilla.redhat.com/2430380",
            "https://bugzilla.redhat.com/2430381",
            "https://bugzilla.redhat.com/2430386",
            "https://bugzilla.redhat.com/2430387",
            "https://bugzilla.redhat.com/2430388",
            "https://bugzilla.redhat.com/2430389",
            "https://bugzilla.redhat.com/2430390",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430375",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430376",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430377",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430378",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430379",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430380",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430381",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430386",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430387",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430388",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430389",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430390",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11187",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15467",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15468",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15469",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66199",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68160",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69418",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69420",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69421",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22795",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22796",
            "https://errata.almalinux.org/9/ALSA-2026-1473.html",
            "https://errata.rockylinux.org/RLSA-2026:1473",
            "https://github.com/openssl/openssl/commit/2502e7b7d4c0cf4f972a881641fe09edc67aeec4",
            "https://github.com/openssl/openssl/commit/572844beca95068394c916626a6d3a490f831a49",
            "https://github.com/openssl/openssl/commit/7bbca05be55b129651d9df4bdb92becc45002c12",
            "https://github.com/openssl/openssl/commit/eeee3cbd4d682095ed431052f00403004596373e",
            "https://github.com/openssl/openssl/commit/ef2fb66ec571564d64d1c74a12e388a2a54d05d2",
            "https://linux.oracle.com/cve/CVE-2026-22795.html",
            "https://linux.oracle.com/errata/ELSA-2026-50081.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-22795",
            "https://openssl-library.org/news/secadv/20260127.txt",
            "https://ubuntu.com/security/notices/USN-7980-1",
            "https://ubuntu.com/security/notices/USN-7980-2",
            "https://www.cve.org/CVERecord?id=CVE-2026-22795"
          ],
          "PublishedDate": "2026-01-27T16:16:35.43Z",
          "LastModifiedDate": "2026-02-02T18:41:14.917Z"
        },
        {
          "VulnerabilityID": "CVE-2026-22796",
          "VendorIDs": [
            "DSA-6113-1"
          ],
          "PkgID": "libssl3t64@3.5.4-1~deb13u1",
          "PkgName": "libssl3t64",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libssl3t64@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "44907e46903e0fb5",
            "BOMRef": "pkg:deb/debian/libssl3t64@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.5.4-1~deb13u1",
          "FixedVersion": "3.5.4-1~deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-22796",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:34f37474d958fb0c59f463868b4ea860f19b361edc8521262005ad0a5d11b59c",
          "Title": "openssl: OpenSSL: Denial of Service via type confusion in PKCS#7 signature verification",
          "Description": "Issue summary: A type confusion vulnerability exists in the signature\nverification of signed PKCS#7 data where an ASN1_TYPE union member is\naccessed without first validating the type, causing an invalid or NULL\npointer dereference when processing malformed PKCS#7 data.\n\nImpact summary: An application performing signature verification of PKCS#7\ndata or calling directly the PKCS7_digest_from_attributes() function can be\ncaused to dereference an invalid or NULL pointer when reading, resulting in\na Denial of Service.\n\nThe function PKCS7_digest_from_attributes() accesses the message digest attribute\nvalue without validating its type. When the type is not V_ASN1_OCTET_STRING,\nthis results in accessing invalid memory through the ASN1_TYPE union, causing\na crash.\n\nExploiting this vulnerability requires an attacker to provide a malformed\nsigned PKCS#7 to an application that verifies it. The impact of the\nexploit is just a Denial of Service, the PKCS7 API is legacy and applications\nshould be using the CMS API instead. For these reasons the issue was\nassessed as Low severity.\n\nThe FIPS modules in 3.5, 3.4, 3.3 and 3.0 are not affected by this issue,\nas the PKCS#7 parsing implementation is outside the OpenSSL FIPS module\nboundary.\n\nOpenSSL 3.6, 3.5, 3.4, 3.3, 3.0, 1.1.1 and 1.0.2 are vulnerable to this issue.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-754"
          ],
          "VendorSeverity": {
            "alma": 3,
            "amazon": 3,
            "azure": 2,
            "cbl-mariner": 2,
            "oracle-oval": 3,
            "photon": 2,
            "redhat": 1,
            "rocky": 3,
            "ubuntu": 1
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 5.9
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:1473",
            "https://access.redhat.com/security/cve/CVE-2026-22796",
            "https://bugzilla.redhat.com/2430375",
            "https://bugzilla.redhat.com/2430376",
            "https://bugzilla.redhat.com/2430377",
            "https://bugzilla.redhat.com/2430378",
            "https://bugzilla.redhat.com/2430379",
            "https://bugzilla.redhat.com/2430380",
            "https://bugzilla.redhat.com/2430381",
            "https://bugzilla.redhat.com/2430386",
            "https://bugzilla.redhat.com/2430387",
            "https://bugzilla.redhat.com/2430388",
            "https://bugzilla.redhat.com/2430389",
            "https://bugzilla.redhat.com/2430390",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430375",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430376",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430377",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430378",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430379",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430380",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430381",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430386",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430387",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430388",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430389",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430390",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11187",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15467",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15468",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15469",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66199",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68160",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69418",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69420",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69421",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22795",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22796",
            "https://errata.almalinux.org/9/ALSA-2026-1473.html",
            "https://errata.rockylinux.org/RLSA-2026:1473",
            "https://github.com/openssl/openssl/commit/2502e7b7d4c0cf4f972a881641fe09edc67aeec4",
            "https://github.com/openssl/openssl/commit/572844beca95068394c916626a6d3a490f831a49",
            "https://github.com/openssl/openssl/commit/7bbca05be55b129651d9df4bdb92becc45002c12",
            "https://github.com/openssl/openssl/commit/eeee3cbd4d682095ed431052f00403004596373e",
            "https://github.com/openssl/openssl/commit/ef2fb66ec571564d64d1c74a12e388a2a54d05d2",
            "https://linux.oracle.com/cve/CVE-2026-22796.html",
            "https://linux.oracle.com/errata/ELSA-2026-50081.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-22796",
            "https://openssl-library.org/news/secadv/20260127.txt",
            "https://ubuntu.com/security/notices/USN-7980-1",
            "https://ubuntu.com/security/notices/USN-7980-2",
            "https://www.cve.org/CVERecord?id=CVE-2026-22796"
          ],
          "PublishedDate": "2026-01-27T16:16:35.543Z",
          "LastModifiedDate": "2026-02-02T18:40:27.467Z"
        },
        {
          "VulnerabilityID": "CVE-2026-2673",
          "PkgID": "libssl3t64@3.5.4-1~deb13u1",
          "PkgName": "libssl3t64",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libssl3t64@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "44907e46903e0fb5",
            "BOMRef": "pkg:deb/debian/libssl3t64@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.5.4-1~deb13u1",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-2673",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:c9ba6f886622600b96c69810b163e75afe0d98f9dd641b1dba13172dc628c47f",
          "Title": "openssl: OpenSSL TLS 1.3 server may choose unexpected key agreement group",
          "Description": "Issue summary: An OpenSSL TLS 1.3 server may fail to negotiate the expected\npreferred key exchange group when its key exchange group configuration includes\nthe default by using the 'DEFAULT' keyword.\n\nImpact summary: A less preferred key exchange may be used even when a more\npreferred group is supported by both client and server, if the group\nwas not included among the client's initial predicated keyshares.\nThis will sometimes be the case with the new hybrid post-quantum groups,\nif the client chooses to defer their use until specifically requested by\nthe server.\n\nIf an OpenSSL TLS 1.3 server's configuration uses the 'DEFAULT' keyword to\ninterpolate the built-in default group list into its own configuration, perhaps\nadding or removing specific elements, then an implementation defect causes the\n'DEFAULT' list to lose its 'tuple' structure, and all server-supported groups\nwere treated as a single sufficiently secure 'tuple', with the server not\nsending a Hello Retry Request (HRR) even when a group in a more preferred tuple\nwas mutually supported.\n\nAs a result, the client and server might fail to negotiate a mutually supported\npost-quantum key agreement group, such as 'X25519MLKEM768', if the client's\nconfiguration results in only 'classical' groups (such as 'X25519' being the\nonly ones in the client's initial keyshare prediction).\n\nOpenSSL 3.5 and later support a new syntax for selecting the most preferred TLS\n1.3 key agreement group on TLS servers.  The old syntax had a single 'flat'\nlist of groups, and treated all the supported groups as sufficiently secure.\nIf any of the keyshares predicted by the client were supported by the server\nthe most preferred among these was selected, even if other groups supported by\nthe client, but not included in the list of predicted keyshares would have been\nmore preferred, if included.\n\nThe new syntax partitions the groups into distinct 'tuples' of roughly\nequivalent security.  Within each tuple the most preferred group included among\nthe client's predicted keyshares is chosen, but if the client supports a group\nfrom a more preferred tuple, but did not predict any corresponding keyshares,\nthe server will ask the client to retry the ClientHello (by issuing a Hello\nRetry Request or HRR) with the most preferred mutually supported group.\n\nThe above works as expected when the server's configuration uses the built-in\ndefault group list, or explicitly defines its own list by directly defining the\nvarious desired groups and group 'tuples'.\n\nNo OpenSSL FIPS modules are affected by this issue, the code in question lies\noutside the FIPS boundary.\n\nOpenSSL 3.6 and 3.5 are vulnerable to this issue.\n\nOpenSSL 3.6 users should upgrade to OpenSSL 3.6.2 once it is released.\nOpenSSL 3.5 users should upgrade to OpenSSL 3.5.6 once it is released.\n\nOpenSSL 3.4, 3.3, 3.0, 1.0.2 and 1.1.1 are not affected by this issue.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-757"
          ],
          "VendorSeverity": {
            "amazon": 1,
            "redhat": 1,
            "ubuntu": 1
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N",
              "V3Score": 3.1
            }
          },
          "References": [
            "http://www.openwall.com/lists/oss-security/2026/03/13/3",
            "https://access.redhat.com/security/cve/CVE-2026-2673",
            "https://github.com/openssl/openssl/commit/2157c9d81f7b0bd7dfa25b960e928ec28e8dd63f",
            "https://github.com/openssl/openssl/commit/85977e013f32ceb96aa034c0e741adddc1a05e34",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-2673",
            "https://openssl-library.org/news/secadv/20260313.txt",
            "https://www.cve.org/CVERecord?id=CVE-2026-2673"
          ],
          "PublishedDate": "2026-03-13T19:54:34.033Z",
          "LastModifiedDate": "2026-03-17T18:16:15.6Z"
        },
        {
          "VulnerabilityID": "CVE-2026-29111",
          "PkgID": "libsystemd0@257.9-1~deb13u1",
          "PkgName": "libsystemd0",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libsystemd0@257.9-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "2a96d90cd8dcf3a",
            "BOMRef": "pkg:deb/debian/libsystemd0@257.9-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "257.9-1~deb13u1",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-29111",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:24ac634ba114d1007592094dca879a8f5f08b466510faddfadd25904b5a27a64",
          "Title": "systemd: systemd: Arbitrary code execution or Denial of Service via spurious IPC API call data",
          "Description": "systemd, a system and service manager, (as PID 1) hits an assert and freezes execution when an unprivileged IPC API call is made with spurious data. On version v249 and older the effect is not an assert, but stack overwriting, with the attacker controlled content. From version v250 and newer this is not possible as the safety check causes an assert instead. This IPC call was added in v239, so versions older than that are not affected. Versions 260-rc1, 259.2, 258.5, and 257.11 contain patches. No known workarounds are available.",
          "Severity": "HIGH",
          "CweIDs": [
            "CWE-269"
          ],
          "VendorSeverity": {
            "redhat": 2,
            "ubuntu": 2
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
              "V3Score": 7.8
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-29111",
            "https://github.com/systemd/systemd/commit/1d22f706bd04f45f8422e17fbde3f56ece17758a",
            "https://github.com/systemd/systemd/commit/20021e7686426052e3a7505425d7e12085feb2a6",
            "https://github.com/systemd/systemd/commit/21167006574d6b83813c7596759b474f56562412",
            "https://github.com/systemd/systemd/commit/3cee294fe8cf4fa0eff933ab21416d099942cabd",
            "https://github.com/systemd/systemd/commit/42aee39107fbdd7db1ccd402a2151822b2805e9f",
            "https://github.com/systemd/systemd/commit/54588d2dedff54bfb6036670820650e4ea74628f",
            "https://github.com/systemd/systemd/commit/7ac3220213690e8a8d6d2a6e81e43bd1dce01d69",
            "https://github.com/systemd/systemd/commit/80acea4ef80a4bb78560ed970c34952299b890d6",
            "https://github.com/systemd/systemd/commit/b5fd14693057e5f2c9b4a49603be64ec3608ff6c",
            "https://github.com/systemd/systemd/commit/efa6ba2ab625aaa160ac435a09e6482fc63bdbe8",
            "https://github.com/systemd/systemd/security/advisories/GHSA-gx6q-6f99-m764",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-29111",
            "https://ubuntu.com/security/notices/USN-8119-1",
            "https://ubuntu.com/security/notices/USN-8119-2",
            "https://www.cve.org/CVERecord?id=CVE-2026-29111"
          ],
          "PublishedDate": "2026-03-23T22:16:26.267Z",
          "LastModifiedDate": "2026-03-24T15:53:48.067Z"
        },
        {
          "VulnerabilityID": "CVE-2026-4105",
          "PkgID": "libsystemd0@257.9-1~deb13u1",
          "PkgName": "libsystemd0",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libsystemd0@257.9-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "2a96d90cd8dcf3a",
            "BOMRef": "pkg:deb/debian/libsystemd0@257.9-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "257.9-1~deb13u1",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-4105",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:63dd64ae89fe11def267a109d635b132bf6a953894ee493d972eabe0c018f53e",
          "Title": "systemd: systemd: Privilege escalation via improper access control in RegisterMachine D-Bus method",
          "Description": "A flaw was found in systemd. The systemd-machined service contains an Improper Access Control vulnerability due to insufficient validation of the class parameter in the RegisterMachine D-Bus (Desktop Bus) method. A local unprivileged user can exploit this by attempting to register a machine with a specific class value, which may leave behind a usable, attacker-controlled machine object. This allows the attacker to invoke methods on the privileged object, leading to the execution of arbitrary commands with root privileges on the host system.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-284"
          ],
          "VendorSeverity": {
            "redhat": 2
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
              "V3Score": 6.7
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-4105",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2447262",
            "https://github.com/systemd/systemd/security/advisories/GHSA-4h6x-r8vx-3862",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-4105",
            "https://www.cve.org/CVERecord?id=CVE-2026-4105"
          ],
          "PublishedDate": "2026-03-13T19:55:13.673Z",
          "LastModifiedDate": "2026-03-16T14:53:46.157Z"
        },
        {
          "VulnerabilityID": "CVE-2013-4392",
          "PkgID": "libsystemd0@257.9-1~deb13u1",
          "PkgName": "libsystemd0",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libsystemd0@257.9-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "2a96d90cd8dcf3a",
            "BOMRef": "pkg:deb/debian/libsystemd0@257.9-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "257.9-1~deb13u1",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2013-4392",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:b92f5451c51be3aeae43bea71f13a34f647aaa9970737c27346f8cb9eda85740",
          "Title": "systemd: TOCTOU race condition when updating file permissions and SELinux security contexts",
          "Description": "systemd, when updating file permissions, allows local users to change the permissions and SELinux security contexts for arbitrary files via a symlink attack on unspecified files.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-59"
          ],
          "VendorSeverity": {
            "debian": 1,
            "nvd": 1,
            "redhat": 2
          },
          "CVSS": {
            "nvd": {
              "V2Vector": "AV:L/AC:M/Au:N/C:P/I:P/A:N",
              "V2Score": 3.3
            },
            "redhat": {
              "V2Vector": "AV:L/AC:M/Au:N/C:P/I:P/A:N",
              "V2Score": 3.3
            }
          },
          "References": [
            "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357",
            "http://www.openwall.com/lists/oss-security/2013/10/01/9",
            "https://access.redhat.com/security/cve/CVE-2013-4392",
            "https://bugzilla.redhat.com/show_bug.cgi?id=859060",
            "https://nvd.nist.gov/vuln/detail/CVE-2013-4392",
            "https://www.cve.org/CVERecord?id=CVE-2013-4392"
          ],
          "PublishedDate": "2013-10-28T22:55:03.773Z",
          "LastModifiedDate": "2025-06-09T16:15:23.763Z"
        },
        {
          "VulnerabilityID": "CVE-2023-31437",
          "PkgID": "libsystemd0@257.9-1~deb13u1",
          "PkgName": "libsystemd0",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libsystemd0@257.9-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "2a96d90cd8dcf3a",
            "BOMRef": "pkg:deb/debian/libsystemd0@257.9-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "257.9-1~deb13u1",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2023-31437",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:d42b6a704a7224f1238f0c9787b57a76a5ea7517d4dc047576e728877d402feb",
          "Title": "An issue was discovered in systemd 253. An attacker can modify a seale ...",
          "Description": "An issue was discovered in systemd 253. An attacker can modify a sealed log file such that, in some views, not all existing and sealed log messages are displayed. NOTE: the vendor reportedly sent \"a reply denying that any of the finding was a security vulnerability.\"",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-354"
          ],
          "VendorSeverity": {
            "debian": 1,
            "nvd": 2
          },
          "CVSS": {
            "nvd": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
              "V3Score": 5.3
            }
          },
          "References": [
            "https://github.com/kastel-security/Journald",
            "https://github.com/kastel-security/Journald/blob/main/journald-publication.pdf",
            "https://github.com/systemd/systemd/releases"
          ],
          "PublishedDate": "2023-06-13T17:15:14.657Z",
          "LastModifiedDate": "2025-01-03T20:15:26.457Z"
        },
        {
          "VulnerabilityID": "CVE-2023-31438",
          "PkgID": "libsystemd0@257.9-1~deb13u1",
          "PkgName": "libsystemd0",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libsystemd0@257.9-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "2a96d90cd8dcf3a",
            "BOMRef": "pkg:deb/debian/libsystemd0@257.9-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "257.9-1~deb13u1",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2023-31438",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:efbb3d3d1bebe569fcdc25342309a3847e14f95be12b16bc300a5ea4a85ac48e",
          "Title": "An issue was discovered in systemd 253. An attacker can truncate a sea ...",
          "Description": "An issue was discovered in systemd 253. An attacker can truncate a sealed log file and then resume log sealing such that checking the integrity shows no error, despite modifications. NOTE: the vendor reportedly sent \"a reply denying that any of the finding was a security vulnerability.\"",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-354"
          ],
          "VendorSeverity": {
            "debian": 1,
            "nvd": 2
          },
          "CVSS": {
            "nvd": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
              "V3Score": 5.3
            }
          },
          "References": [
            "https://github.com/kastel-security/Journald",
            "https://github.com/kastel-security/Journald/blob/main/journald-publication.pdf",
            "https://github.com/systemd/systemd/pull/28886",
            "https://github.com/systemd/systemd/releases"
          ],
          "PublishedDate": "2023-06-13T17:15:14.707Z",
          "LastModifiedDate": "2024-11-21T08:01:51.953Z"
        },
        {
          "VulnerabilityID": "CVE-2023-31439",
          "PkgID": "libsystemd0@257.9-1~deb13u1",
          "PkgName": "libsystemd0",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libsystemd0@257.9-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "2a96d90cd8dcf3a",
            "BOMRef": "pkg:deb/debian/libsystemd0@257.9-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "257.9-1~deb13u1",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2023-31439",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:eaf65890d33a293bc2043eabae6bf51bb92774ce4936a8a2928f317cfb70c243",
          "Title": "An issue was discovered in systemd 253. An attacker can modify the con ...",
          "Description": "An issue was discovered in systemd 253. An attacker can modify the contents of past events in a sealed log file and then adjust the file such that checking the integrity shows no error, despite modifications. NOTE: the vendor reportedly sent \"a reply denying that any of the finding was a security vulnerability.\"",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-354"
          ],
          "VendorSeverity": {
            "amazon": 1,
            "debian": 1,
            "nvd": 2
          },
          "CVSS": {
            "nvd": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
              "V3Score": 5.3
            }
          },
          "References": [
            "https://github.com/kastel-security/Journald",
            "https://github.com/kastel-security/Journald/blob/main/journald-publication.pdf",
            "https://github.com/systemd/systemd/pull/28885",
            "https://github.com/systemd/systemd/releases"
          ],
          "PublishedDate": "2023-06-13T17:15:14.753Z",
          "LastModifiedDate": "2024-11-21T08:01:52.097Z"
        },
        {
          "VulnerabilityID": "CVE-2025-69720",
          "PkgID": "libtinfo6@6.5+20250216-2",
          "PkgName": "libtinfo6",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libtinfo6@6.5%2B20250216-2?arch=amd64\u0026distro=debian-13.2",
            "UID": "cfb83c9dabd6a327",
            "BOMRef": "pkg:deb/debian/libtinfo6@6.5%2B20250216-2?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "6.5+20250216-2",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "SeveritySource": "nvd",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-69720",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:ad0299b1206b6d1e960cd30f658c6c69496fdbb60e5e5c7ff06457dc9d9c4297",
          "Title": "ncurses: ncurses: Buffer overflow vulnerability may lead to arbitrary code execution.",
          "Description": "The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.",
          "Severity": "HIGH",
          "CweIDs": [
            "CWE-121",
            "CWE-120"
          ],
          "VendorSeverity": {
            "alma": 2,
            "cbl-mariner": 4,
            "nvd": 3,
            "oracle-oval": 2,
            "redhat": 2
          },
          "CVSS": {
            "nvd": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
              "V3Score": 7.8
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H",
              "V3Score": 7.3
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:5913",
            "https://access.redhat.com/security/cve/CVE-2025-69720",
            "https://bugzilla.redhat.com/2449037",
            "https://errata.almalinux.org/10/ALSA-2026-5913.html",
            "https://github.com/Cao-Wuhui/CVE-2025-69720",
            "https://invisible-island.net/archives/ncurses/6.5/",
            "https://invisible-island.net/ncurses/",
            "https://linux.oracle.com/cve/CVE-2025-69720.html",
            "https://linux.oracle.com/errata/ELSA-2026-5913.html",
            "https://marc.info/?l=ncurses-bug\u0026m=176539968328570\u0026w=2",
            "https://marc.info/?l=ncurses-bug\u0026m=176540731801330\u0026w=2",
            "https://marc.info/?l=ncurses-bug\u0026m=176545557728083\u0026w=2",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-69720",
            "https://www.cve.org/CVERecord?id=CVE-2025-69720"
          ],
          "PublishedDate": "2026-03-19T15:16:21.293Z",
          "LastModifiedDate": "2026-03-26T19:35:10.547Z"
        },
        {
          "VulnerabilityID": "CVE-2025-6141",
          "PkgID": "libtinfo6@6.5+20250216-2",
          "PkgName": "libtinfo6",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libtinfo6@6.5%2B20250216-2?arch=amd64\u0026distro=debian-13.2",
            "UID": "cfb83c9dabd6a327",
            "BOMRef": "pkg:deb/debian/libtinfo6@6.5%2B20250216-2?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "6.5+20250216-2",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-6141",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:490fe35cf5790a4142e937befc2d13eb171c6844e2767592e1435c3d6e1fcb52",
          "Title": "gnu-ncurses: ncurses Stack Buffer Overflow",
          "Description": "A vulnerability has been found in GNU ncurses up to 6.5-20250322 and classified as problematic. This vulnerability affects the function postprocess_termcap of the file tinfo/parse_entry.c. The manipulation leads to stack-based buffer overflow. The attack needs to be approached locally. Upgrading to version 6.5-20250329 is able to address this issue. It is recommended to upgrade the affected component.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-119",
            "CWE-121"
          ],
          "VendorSeverity": {
            "photon": 1,
            "redhat": 1
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
              "V3Score": 3.3
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2025-6141",
            "https://invisible-island.net/ncurses/NEWS.html#index-t20250329",
            "https://lists.gnu.org/archive/html/bug-ncurses/2025-03/msg00107.html",
            "https://lists.gnu.org/archive/html/bug-ncurses/2025-03/msg00109.html",
            "https://lists.gnu.org/archive/html/bug-ncurses/2025-03/msg00114.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-6141",
            "https://vuldb.com/?ctiid.312610",
            "https://vuldb.com/?id.312610",
            "https://vuldb.com/?submit.593000",
            "https://www.cve.org/CVERecord?id=CVE-2025-6141",
            "https://www.gnu.org/"
          ],
          "PublishedDate": "2025-06-16T22:16:41.527Z",
          "LastModifiedDate": "2025-06-17T20:50:23.507Z"
        },
        {
          "VulnerabilityID": "CVE-2026-29111",
          "PkgID": "libudev1@257.9-1~deb13u1",
          "PkgName": "libudev1",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libudev1@257.9-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "167e119c22592154",
            "BOMRef": "pkg:deb/debian/libudev1@257.9-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "257.9-1~deb13u1",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-29111",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:bf1b4777ae42dc09cf0a3ff46173786a35b85926a5c30b7821a8dbf456759cd1",
          "Title": "systemd: systemd: Arbitrary code execution or Denial of Service via spurious IPC API call data",
          "Description": "systemd, a system and service manager, (as PID 1) hits an assert and freezes execution when an unprivileged IPC API call is made with spurious data. On version v249 and older the effect is not an assert, but stack overwriting, with the attacker controlled content. From version v250 and newer this is not possible as the safety check causes an assert instead. This IPC call was added in v239, so versions older than that are not affected. Versions 260-rc1, 259.2, 258.5, and 257.11 contain patches. No known workarounds are available.",
          "Severity": "HIGH",
          "CweIDs": [
            "CWE-269"
          ],
          "VendorSeverity": {
            "redhat": 2,
            "ubuntu": 2
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
              "V3Score": 7.8
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-29111",
            "https://github.com/systemd/systemd/commit/1d22f706bd04f45f8422e17fbde3f56ece17758a",
            "https://github.com/systemd/systemd/commit/20021e7686426052e3a7505425d7e12085feb2a6",
            "https://github.com/systemd/systemd/commit/21167006574d6b83813c7596759b474f56562412",
            "https://github.com/systemd/systemd/commit/3cee294fe8cf4fa0eff933ab21416d099942cabd",
            "https://github.com/systemd/systemd/commit/42aee39107fbdd7db1ccd402a2151822b2805e9f",
            "https://github.com/systemd/systemd/commit/54588d2dedff54bfb6036670820650e4ea74628f",
            "https://github.com/systemd/systemd/commit/7ac3220213690e8a8d6d2a6e81e43bd1dce01d69",
            "https://github.com/systemd/systemd/commit/80acea4ef80a4bb78560ed970c34952299b890d6",
            "https://github.com/systemd/systemd/commit/b5fd14693057e5f2c9b4a49603be64ec3608ff6c",
            "https://github.com/systemd/systemd/commit/efa6ba2ab625aaa160ac435a09e6482fc63bdbe8",
            "https://github.com/systemd/systemd/security/advisories/GHSA-gx6q-6f99-m764",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-29111",
            "https://ubuntu.com/security/notices/USN-8119-1",
            "https://ubuntu.com/security/notices/USN-8119-2",
            "https://www.cve.org/CVERecord?id=CVE-2026-29111"
          ],
          "PublishedDate": "2026-03-23T22:16:26.267Z",
          "LastModifiedDate": "2026-03-24T15:53:48.067Z"
        },
        {
          "VulnerabilityID": "CVE-2026-4105",
          "PkgID": "libudev1@257.9-1~deb13u1",
          "PkgName": "libudev1",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libudev1@257.9-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "167e119c22592154",
            "BOMRef": "pkg:deb/debian/libudev1@257.9-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "257.9-1~deb13u1",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-4105",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:943f123c75065447b761acd0d057ef6df7d4af3ee69c5ff331a9de707717d75e",
          "Title": "systemd: systemd: Privilege escalation via improper access control in RegisterMachine D-Bus method",
          "Description": "A flaw was found in systemd. The systemd-machined service contains an Improper Access Control vulnerability due to insufficient validation of the class parameter in the RegisterMachine D-Bus (Desktop Bus) method. A local unprivileged user can exploit this by attempting to register a machine with a specific class value, which may leave behind a usable, attacker-controlled machine object. This allows the attacker to invoke methods on the privileged object, leading to the execution of arbitrary commands with root privileges on the host system.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-284"
          ],
          "VendorSeverity": {
            "redhat": 2
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
              "V3Score": 6.7
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-4105",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2447262",
            "https://github.com/systemd/systemd/security/advisories/GHSA-4h6x-r8vx-3862",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-4105",
            "https://www.cve.org/CVERecord?id=CVE-2026-4105"
          ],
          "PublishedDate": "2026-03-13T19:55:13.673Z",
          "LastModifiedDate": "2026-03-16T14:53:46.157Z"
        },
        {
          "VulnerabilityID": "CVE-2013-4392",
          "PkgID": "libudev1@257.9-1~deb13u1",
          "PkgName": "libudev1",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libudev1@257.9-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "167e119c22592154",
            "BOMRef": "pkg:deb/debian/libudev1@257.9-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "257.9-1~deb13u1",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2013-4392",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:c93ab143b352011ddce935fb57f1062036e6f6cb9f111fb633712474419ebecd",
          "Title": "systemd: TOCTOU race condition when updating file permissions and SELinux security contexts",
          "Description": "systemd, when updating file permissions, allows local users to change the permissions and SELinux security contexts for arbitrary files via a symlink attack on unspecified files.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-59"
          ],
          "VendorSeverity": {
            "debian": 1,
            "nvd": 1,
            "redhat": 2
          },
          "CVSS": {
            "nvd": {
              "V2Vector": "AV:L/AC:M/Au:N/C:P/I:P/A:N",
              "V2Score": 3.3
            },
            "redhat": {
              "V2Vector": "AV:L/AC:M/Au:N/C:P/I:P/A:N",
              "V2Score": 3.3
            }
          },
          "References": [
            "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357",
            "http://www.openwall.com/lists/oss-security/2013/10/01/9",
            "https://access.redhat.com/security/cve/CVE-2013-4392",
            "https://bugzilla.redhat.com/show_bug.cgi?id=859060",
            "https://nvd.nist.gov/vuln/detail/CVE-2013-4392",
            "https://www.cve.org/CVERecord?id=CVE-2013-4392"
          ],
          "PublishedDate": "2013-10-28T22:55:03.773Z",
          "LastModifiedDate": "2025-06-09T16:15:23.763Z"
        },
        {
          "VulnerabilityID": "CVE-2023-31437",
          "PkgID": "libudev1@257.9-1~deb13u1",
          "PkgName": "libudev1",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libudev1@257.9-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "167e119c22592154",
            "BOMRef": "pkg:deb/debian/libudev1@257.9-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "257.9-1~deb13u1",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2023-31437",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:896e330836c9275dc6d6b4cf407348ae1ceb3716232a42f3642dc067de492406",
          "Title": "An issue was discovered in systemd 253. An attacker can modify a seale ...",
          "Description": "An issue was discovered in systemd 253. An attacker can modify a sealed log file such that, in some views, not all existing and sealed log messages are displayed. NOTE: the vendor reportedly sent \"a reply denying that any of the finding was a security vulnerability.\"",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-354"
          ],
          "VendorSeverity": {
            "debian": 1,
            "nvd": 2
          },
          "CVSS": {
            "nvd": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
              "V3Score": 5.3
            }
          },
          "References": [
            "https://github.com/kastel-security/Journald",
            "https://github.com/kastel-security/Journald/blob/main/journald-publication.pdf",
            "https://github.com/systemd/systemd/releases"
          ],
          "PublishedDate": "2023-06-13T17:15:14.657Z",
          "LastModifiedDate": "2025-01-03T20:15:26.457Z"
        },
        {
          "VulnerabilityID": "CVE-2023-31438",
          "PkgID": "libudev1@257.9-1~deb13u1",
          "PkgName": "libudev1",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libudev1@257.9-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "167e119c22592154",
            "BOMRef": "pkg:deb/debian/libudev1@257.9-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "257.9-1~deb13u1",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2023-31438",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:cda963170aec24006c22dc0fae7d2c9cb13f92625cec3504e413f6f1e4a99a9e",
          "Title": "An issue was discovered in systemd 253. An attacker can truncate a sea ...",
          "Description": "An issue was discovered in systemd 253. An attacker can truncate a sealed log file and then resume log sealing such that checking the integrity shows no error, despite modifications. NOTE: the vendor reportedly sent \"a reply denying that any of the finding was a security vulnerability.\"",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-354"
          ],
          "VendorSeverity": {
            "debian": 1,
            "nvd": 2
          },
          "CVSS": {
            "nvd": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
              "V3Score": 5.3
            }
          },
          "References": [
            "https://github.com/kastel-security/Journald",
            "https://github.com/kastel-security/Journald/blob/main/journald-publication.pdf",
            "https://github.com/systemd/systemd/pull/28886",
            "https://github.com/systemd/systemd/releases"
          ],
          "PublishedDate": "2023-06-13T17:15:14.707Z",
          "LastModifiedDate": "2024-11-21T08:01:51.953Z"
        },
        {
          "VulnerabilityID": "CVE-2023-31439",
          "PkgID": "libudev1@257.9-1~deb13u1",
          "PkgName": "libudev1",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libudev1@257.9-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "167e119c22592154",
            "BOMRef": "pkg:deb/debian/libudev1@257.9-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "257.9-1~deb13u1",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2023-31439",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:4da02fcaf68752f29bc3b58a90e7ac4635d6a8ff03176dda16e069aa69a59ec7",
          "Title": "An issue was discovered in systemd 253. An attacker can modify the con ...",
          "Description": "An issue was discovered in systemd 253. An attacker can modify the contents of past events in a sealed log file and then adjust the file such that checking the integrity shows no error, despite modifications. NOTE: the vendor reportedly sent \"a reply denying that any of the finding was a security vulnerability.\"",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-354"
          ],
          "VendorSeverity": {
            "amazon": 1,
            "debian": 1,
            "nvd": 2
          },
          "CVSS": {
            "nvd": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
              "V3Score": 5.3
            }
          },
          "References": [
            "https://github.com/kastel-security/Journald",
            "https://github.com/kastel-security/Journald/blob/main/journald-publication.pdf",
            "https://github.com/systemd/systemd/pull/28885",
            "https://github.com/systemd/systemd/releases"
          ],
          "PublishedDate": "2023-06-13T17:15:14.753Z",
          "LastModifiedDate": "2024-11-21T08:01:52.097Z"
        },
        {
          "VulnerabilityID": "CVE-2022-0563",
          "PkgID": "libuuid1@2.41-5",
          "PkgName": "libuuid1",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libuuid1@2.41-5?arch=amd64\u0026distro=debian-13.2",
            "UID": "4001595c8c3fa4c7",
            "BOMRef": "pkg:deb/debian/libuuid1@2.41-5?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-5",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-0563",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:8b3c90275f1bf5cdc67c599544e3f2d5cfe319da2f284a1f835a2130e9de7fad",
          "Title": "util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline",
          "Description": "A flaw was found in the util-linux chfn and chsh utilities when compiled with Readline support. The Readline library uses an \"INPUTRC\" environment variable to get a path to the library config file. When the library cannot parse the specified file, it prints an error message containing data from the file. This flaw allows an unprivileged user to read root-owned files, potentially leading to privilege escalation. This flaw affects util-linux versions prior to 2.37.4.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-209"
          ],
          "VendorSeverity": {
            "amazon": 2,
            "cbl-mariner": 2,
            "debian": 1,
            "nvd": 2,
            "photon": 2,
            "redhat": 2
          },
          "CVSS": {
            "nvd": {
              "V2Vector": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
              "V2Score": 1.9,
              "V3Score": 5.5
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
              "V3Score": 5.5
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2022-0563",
            "https://blog.trailofbits.com/2023/02/16/suid-logic-bug-linux-readline/",
            "https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w%40ws.net.home/T/#u",
            "https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u",
            "https://nvd.nist.gov/vuln/detail/CVE-2022-0563",
            "https://security.gentoo.org/glsa/202401-08",
            "https://security.netapp.com/advisory/ntap-20220331-0002/",
            "https://www.cve.org/CVERecord?id=CVE-2022-0563"
          ],
          "PublishedDate": "2022-02-21T19:15:08.393Z",
          "LastModifiedDate": "2025-06-09T16:15:33.237Z"
        },
        {
          "VulnerabilityID": "CVE-2025-14104",
          "PkgID": "libuuid1@2.41-5",
          "PkgName": "libuuid1",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libuuid1@2.41-5?arch=amd64\u0026distro=debian-13.2",
            "UID": "4001595c8c3fa4c7",
            "BOMRef": "pkg:deb/debian/libuuid1@2.41-5?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-5",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-14104",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:09a610d40dffc9fd5879a3e987d8a99bd08bf783e5382aeb95ca3e387bd0d89b",
          "Title": "util-linux: util-linux: Heap buffer overread in setpwnam() when processing 256-byte usernames",
          "Description": "A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-125"
          ],
          "VendorSeverity": {
            "alma": 2,
            "azure": 2,
            "cbl-mariner": 2,
            "debian": 1,
            "oracle-oval": 2,
            "photon": 2,
            "redhat": 2,
            "rocky": 2
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
              "V3Score": 6.1
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:1696",
            "https://access.redhat.com/errata/RHSA-2026:1852",
            "https://access.redhat.com/errata/RHSA-2026:1913",
            "https://access.redhat.com/errata/RHSA-2026:2485",
            "https://access.redhat.com/errata/RHSA-2026:2563",
            "https://access.redhat.com/errata/RHSA-2026:2737",
            "https://access.redhat.com/errata/RHSA-2026:2800",
            "https://access.redhat.com/errata/RHSA-2026:3406",
            "https://access.redhat.com/errata/RHSA-2026:4943",
            "https://access.redhat.com/security/cve/CVE-2025-14104",
            "https://bugzilla.redhat.com/2419369",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2419369",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14104",
            "https://errata.almalinux.org/9/ALSA-2026-1913.html",
            "https://errata.rockylinux.org/RLSA-2026:1913",
            "https://linux.oracle.com/cve/CVE-2025-14104.html",
            "https://linux.oracle.com/errata/ELSA-2026-1913.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-14104",
            "https://www.cve.org/CVERecord?id=CVE-2025-14104"
          ],
          "PublishedDate": "2025-12-05T17:16:03.117Z",
          "LastModifiedDate": "2026-03-18T17:16:03.817Z"
        },
        {
          "VulnerabilityID": "CVE-2026-3184",
          "PkgID": "libuuid1@2.41-5",
          "PkgName": "libuuid1",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libuuid1@2.41-5?arch=amd64\u0026distro=debian-13.2",
            "UID": "4001595c8c3fa4c7",
            "BOMRef": "pkg:deb/debian/libuuid1@2.41-5?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-5",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-3184",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:c50c46258a54c9bcb2e518ac275882ce9c8f1ad965334d92140c002fdb958300",
          "Title": "util-linux: util-linux: Access control bypass due to improper hostname canonicalization",
          "Description": "A flaw was found in util-linux. Improper hostname canonicalization in the `login(1)` utility, when invoked with the `-h` option, can modify the supplied remote hostname before setting `PAM_RHOST`. A remote attacker could exploit this by providing a specially crafted hostname, potentially bypassing host-based Pluggable Authentication Modules (PAM) access control rules that rely on fully qualified domain names. This could lead to unauthorized access.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-289"
          ],
          "VendorSeverity": {
            "redhat": 1,
            "ubuntu": 2
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
              "V3Score": 3.7
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-3184",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2442570",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-3184",
            "https://www.cve.org/CVERecord?id=CVE-2026-3184"
          ],
          "PublishedDate": "2026-04-03T19:17:23.377Z",
          "LastModifiedDate": "2026-04-03T19:17:23.377Z"
        },
        {
          "VulnerabilityID": "CVE-2026-27456",
          "PkgID": "libuuid1@2.41-5",
          "PkgName": "libuuid1",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/libuuid1@2.41-5?arch=amd64\u0026distro=debian-13.2",
            "UID": "4001595c8c3fa4c7",
            "BOMRef": "pkg:deb/debian/libuuid1@2.41-5?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-5",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-27456",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:a16cc64e2dd9e8185a867fd4e784553900e9903a27734c925c60e0b92794fd59",
          "Title": "[util-linux: mount(8) TOCTOU symlink attack via loop device]",
          "Description": "util-linux is a random collection of Linux utilities. Prior to version 2.41.4, a TOCTOU (Time-of-Check-Time-of-Use) vulnerability has been identified in the SUID binary /usr/bin/mount from util-linux. The mount binary, when setting up loop devices, validates the source file path with user privileges via fork() + setuid() + realpath(), but subsequently re-canonicalizes and opens it with root privileges (euid=0) without verifying that the path has not been replaced between both operations. Neither O_NOFOLLOW, nor inode comparison, nor post-open fstat() are employed. This allows a local unprivileged user to replace the source file with a symlink pointing to any root-owned file or device during the race window, causing the SUID binary to open and mount it as root. Exploitation requires an /etc/fstab entry with user,loop options whose path points to a directory where the attacker has write permission, and that /usr/bin/mount has the SUID bit set (the default configuration on virtually all Linux distributions). The impact is unauthorized read access to root-protected files and block devices, including backup images, disk volumes, and any file containing a valid filesystem. This issue has been patched in version 2.41.4.",
          "Severity": "UNKNOWN",
          "CweIDs": [
            "CWE-59",
            "CWE-269",
            "CWE-367"
          ],
          "References": [
            "https://github.com/util-linux/util-linux/commit/5e390467b26a3cf3fecc04e1a0d482dff3162fc4",
            "https://github.com/util-linux/util-linux/releases/tag/v2.41.4",
            "https://github.com/util-linux/util-linux/security/advisories/GHSA-qq4x-vfq4-9h9g"
          ],
          "PublishedDate": "2026-04-03T22:16:25.4Z",
          "LastModifiedDate": "2026-04-03T22:16:25.4Z"
        },
        {
          "VulnerabilityID": "CVE-2022-0563",
          "PkgID": "login@1:4.16.0-2+really2.41-5",
          "PkgName": "login",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/login@4.16.0-2%2Breally2.41-5?arch=amd64\u0026distro=debian-13.2\u0026epoch=1",
            "UID": "ec61cb81420ba794",
            "BOMRef": "pkg:deb/debian/login@4.16.0-2%2Breally2.41-5?arch=amd64\u0026distro=debian-13.2\u0026epoch=1"
          },
          "InstalledVersion": "1:4.16.0-2+really2.41-5",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-0563",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:82a8a475abc396f8871a97494170acfa7bcb2744b0939b9a04414991c8aee5ea",
          "Title": "util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline",
          "Description": "A flaw was found in the util-linux chfn and chsh utilities when compiled with Readline support. The Readline library uses an \"INPUTRC\" environment variable to get a path to the library config file. When the library cannot parse the specified file, it prints an error message containing data from the file. This flaw allows an unprivileged user to read root-owned files, potentially leading to privilege escalation. This flaw affects util-linux versions prior to 2.37.4.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-209"
          ],
          "VendorSeverity": {
            "amazon": 2,
            "cbl-mariner": 2,
            "debian": 1,
            "nvd": 2,
            "photon": 2,
            "redhat": 2
          },
          "CVSS": {
            "nvd": {
              "V2Vector": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
              "V2Score": 1.9,
              "V3Score": 5.5
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
              "V3Score": 5.5
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2022-0563",
            "https://blog.trailofbits.com/2023/02/16/suid-logic-bug-linux-readline/",
            "https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w%40ws.net.home/T/#u",
            "https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u",
            "https://nvd.nist.gov/vuln/detail/CVE-2022-0563",
            "https://security.gentoo.org/glsa/202401-08",
            "https://security.netapp.com/advisory/ntap-20220331-0002/",
            "https://www.cve.org/CVERecord?id=CVE-2022-0563"
          ],
          "PublishedDate": "2022-02-21T19:15:08.393Z",
          "LastModifiedDate": "2025-06-09T16:15:33.237Z"
        },
        {
          "VulnerabilityID": "CVE-2025-14104",
          "PkgID": "login@1:4.16.0-2+really2.41-5",
          "PkgName": "login",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/login@4.16.0-2%2Breally2.41-5?arch=amd64\u0026distro=debian-13.2\u0026epoch=1",
            "UID": "ec61cb81420ba794",
            "BOMRef": "pkg:deb/debian/login@4.16.0-2%2Breally2.41-5?arch=amd64\u0026distro=debian-13.2\u0026epoch=1"
          },
          "InstalledVersion": "1:4.16.0-2+really2.41-5",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-14104",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:ff239a891d9a7691470ad9cd3bb7571b14f85eb3ac6512a7e3753f6dfb3d2220",
          "Title": "util-linux: util-linux: Heap buffer overread in setpwnam() when processing 256-byte usernames",
          "Description": "A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-125"
          ],
          "VendorSeverity": {
            "alma": 2,
            "azure": 2,
            "cbl-mariner": 2,
            "debian": 1,
            "oracle-oval": 2,
            "photon": 2,
            "redhat": 2,
            "rocky": 2
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
              "V3Score": 6.1
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:1696",
            "https://access.redhat.com/errata/RHSA-2026:1852",
            "https://access.redhat.com/errata/RHSA-2026:1913",
            "https://access.redhat.com/errata/RHSA-2026:2485",
            "https://access.redhat.com/errata/RHSA-2026:2563",
            "https://access.redhat.com/errata/RHSA-2026:2737",
            "https://access.redhat.com/errata/RHSA-2026:2800",
            "https://access.redhat.com/errata/RHSA-2026:3406",
            "https://access.redhat.com/errata/RHSA-2026:4943",
            "https://access.redhat.com/security/cve/CVE-2025-14104",
            "https://bugzilla.redhat.com/2419369",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2419369",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14104",
            "https://errata.almalinux.org/9/ALSA-2026-1913.html",
            "https://errata.rockylinux.org/RLSA-2026:1913",
            "https://linux.oracle.com/cve/CVE-2025-14104.html",
            "https://linux.oracle.com/errata/ELSA-2026-1913.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-14104",
            "https://www.cve.org/CVERecord?id=CVE-2025-14104"
          ],
          "PublishedDate": "2025-12-05T17:16:03.117Z",
          "LastModifiedDate": "2026-03-18T17:16:03.817Z"
        },
        {
          "VulnerabilityID": "CVE-2026-3184",
          "PkgID": "login@1:4.16.0-2+really2.41-5",
          "PkgName": "login",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/login@4.16.0-2%2Breally2.41-5?arch=amd64\u0026distro=debian-13.2\u0026epoch=1",
            "UID": "ec61cb81420ba794",
            "BOMRef": "pkg:deb/debian/login@4.16.0-2%2Breally2.41-5?arch=amd64\u0026distro=debian-13.2\u0026epoch=1"
          },
          "InstalledVersion": "1:4.16.0-2+really2.41-5",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-3184",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:9324d0f7c2814903ffcb1a2b42f97ce50efe73d82684166a33a5802503b4821f",
          "Title": "util-linux: util-linux: Access control bypass due to improper hostname canonicalization",
          "Description": "A flaw was found in util-linux. Improper hostname canonicalization in the `login(1)` utility, when invoked with the `-h` option, can modify the supplied remote hostname before setting `PAM_RHOST`. A remote attacker could exploit this by providing a specially crafted hostname, potentially bypassing host-based Pluggable Authentication Modules (PAM) access control rules that rely on fully qualified domain names. This could lead to unauthorized access.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-289"
          ],
          "VendorSeverity": {
            "redhat": 1,
            "ubuntu": 2
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
              "V3Score": 3.7
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-3184",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2442570",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-3184",
            "https://www.cve.org/CVERecord?id=CVE-2026-3184"
          ],
          "PublishedDate": "2026-04-03T19:17:23.377Z",
          "LastModifiedDate": "2026-04-03T19:17:23.377Z"
        },
        {
          "VulnerabilityID": "CVE-2026-27456",
          "PkgID": "login@1:4.16.0-2+really2.41-5",
          "PkgName": "login",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/login@4.16.0-2%2Breally2.41-5?arch=amd64\u0026distro=debian-13.2\u0026epoch=1",
            "UID": "ec61cb81420ba794",
            "BOMRef": "pkg:deb/debian/login@4.16.0-2%2Breally2.41-5?arch=amd64\u0026distro=debian-13.2\u0026epoch=1"
          },
          "InstalledVersion": "1:4.16.0-2+really2.41-5",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-27456",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:ce2c37a6fd738a479c00aecdc173b58e860e8edd277d070d3c0a24036b57dec9",
          "Title": "[util-linux: mount(8) TOCTOU symlink attack via loop device]",
          "Description": "util-linux is a random collection of Linux utilities. Prior to version 2.41.4, a TOCTOU (Time-of-Check-Time-of-Use) vulnerability has been identified in the SUID binary /usr/bin/mount from util-linux. The mount binary, when setting up loop devices, validates the source file path with user privileges via fork() + setuid() + realpath(), but subsequently re-canonicalizes and opens it with root privileges (euid=0) without verifying that the path has not been replaced between both operations. Neither O_NOFOLLOW, nor inode comparison, nor post-open fstat() are employed. This allows a local unprivileged user to replace the source file with a symlink pointing to any root-owned file or device during the race window, causing the SUID binary to open and mount it as root. Exploitation requires an /etc/fstab entry with user,loop options whose path points to a directory where the attacker has write permission, and that /usr/bin/mount has the SUID bit set (the default configuration on virtually all Linux distributions). The impact is unauthorized read access to root-protected files and block devices, including backup images, disk volumes, and any file containing a valid filesystem. This issue has been patched in version 2.41.4.",
          "Severity": "UNKNOWN",
          "CweIDs": [
            "CWE-59",
            "CWE-269",
            "CWE-367"
          ],
          "References": [
            "https://github.com/util-linux/util-linux/commit/5e390467b26a3cf3fecc04e1a0d482dff3162fc4",
            "https://github.com/util-linux/util-linux/releases/tag/v2.41.4",
            "https://github.com/util-linux/util-linux/security/advisories/GHSA-qq4x-vfq4-9h9g"
          ],
          "PublishedDate": "2026-04-03T22:16:25.4Z",
          "LastModifiedDate": "2026-04-03T22:16:25.4Z"
        },
        {
          "VulnerabilityID": "CVE-2007-5686",
          "PkgID": "login.defs@1:4.17.4-2",
          "PkgName": "login.defs",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/login.defs@4.17.4-2?arch=all\u0026distro=debian-13.2\u0026epoch=1",
            "UID": "b02b8945b496fc42",
            "BOMRef": "pkg:deb/debian/login.defs@4.17.4-2?arch=all\u0026distro=debian-13.2\u0026epoch=1"
          },
          "InstalledVersion": "1:4.17.4-2",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2007-5686",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:a169343ee607faa4b54173695bb5e9ddc27e93278b2b2b24b2c9bc3ded03b248",
          "Title": "initscripts in rPath Linux 1 sets insecure permissions for the /var/lo ...",
          "Description": "initscripts in rPath Linux 1 sets insecure permissions for the /var/log/btmp file, which allows local users to obtain sensitive information regarding authentication attempts.  NOTE: because sshd detects the insecure permissions and does not log certain events, this also prevents sshd from logging failed authentication attempts by remote attackers.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-264"
          ],
          "VendorSeverity": {
            "debian": 1,
            "nvd": 2
          },
          "CVSS": {
            "nvd": {
              "V2Vector": "AV:L/AC:L/Au:N/C:C/I:N/A:N",
              "V2Score": 4.9
            }
          },
          "References": [
            "http://secunia.com/advisories/27215",
            "http://www.securityfocus.com/archive/1/482129/100/100/threaded",
            "http://www.securityfocus.com/archive/1/482857/100/0/threaded",
            "http://www.securityfocus.com/bid/26048",
            "http://www.vupen.com/english/advisories/2007/3474",
            "https://issues.rpath.com/browse/RPL-1825"
          ],
          "PublishedDate": "2007-10-28T17:08:00Z",
          "LastModifiedDate": "2025-04-09T00:30:58.49Z"
        },
        {
          "VulnerabilityID": "CVE-2024-56433",
          "PkgID": "login.defs@1:4.17.4-2",
          "PkgName": "login.defs",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/login.defs@4.17.4-2?arch=all\u0026distro=debian-13.2\u0026epoch=1",
            "UID": "b02b8945b496fc42",
            "BOMRef": "pkg:deb/debian/login.defs@4.17.4-2?arch=all\u0026distro=debian-13.2\u0026epoch=1"
          },
          "InstalledVersion": "1:4.17.4-2",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2024-56433",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:e516f0b33d632416df29ffeecdc1336bcdc6286748d92002c57763fc8f322f7f",
          "Title": "shadow-utils: Default subordinate ID configuration in /etc/login.defs could lead to compromise",
          "Description": "shadow-utils (aka shadow) 4.4 through 4.17.0 establishes a default /etc/subuid behavior (e.g., uid 100000 through 165535 for the first user account) that can realistically conflict with the uids of users defined on locally administered networks, potentially leading to account takeover, e.g., by leveraging newuidmap for access to an NFS home directory (or same-host resources in the case of remote logins by these local network users). NOTE: it may also be argued that system administrators should not have assigned uids, within local networks, that are within the range that can occur in /etc/subuid.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-1188"
          ],
          "VendorSeverity": {
            "alma": 1,
            "azure": 1,
            "oracle-oval": 1,
            "redhat": 1,
            "rocky": 1,
            "ubuntu": 1
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N",
              "V3Score": 3.6
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2025:20559",
            "https://access.redhat.com/security/cve/CVE-2024-56433",
            "https://bugzilla.redhat.com/2334165",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2334165",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56433",
            "https://errata.almalinux.org/9/ALSA-2025-20559.html",
            "https://errata.rockylinux.org/RLSA-2025:20559",
            "https://github.com/shadow-maint/shadow/blob/e2512d5741d4a44bdd81a8c2d0029b6222728cf0/etc/login.defs#L238-L241",
            "https://github.com/shadow-maint/shadow/issues/1157",
            "https://github.com/shadow-maint/shadow/releases/tag/4.4",
            "https://linux.oracle.com/cve/CVE-2024-56433.html",
            "https://linux.oracle.com/errata/ELSA-2025-20559-0.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2024-56433",
            "https://www.cve.org/CVERecord?id=CVE-2024-56433"
          ],
          "PublishedDate": "2024-12-26T09:15:07.267Z",
          "LastModifiedDate": "2024-12-26T09:15:07.267Z"
        },
        {
          "VulnerabilityID": "TEMP-0628843-DBAD28",
          "PkgID": "login.defs@1:4.17.4-2",
          "PkgName": "login.defs",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/login.defs@4.17.4-2?arch=all\u0026distro=debian-13.2\u0026epoch=1",
            "UID": "b02b8945b496fc42",
            "BOMRef": "pkg:deb/debian/login.defs@4.17.4-2?arch=all\u0026distro=debian-13.2\u0026epoch=1"
          },
          "InstalledVersion": "1:4.17.4-2",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://security-tracker.debian.org/tracker/TEMP-0628843-DBAD28",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:d34515ca90de49f29e2fcec60bc7ec1711f1dd19ff0ecea3526f3efe73dd7fe0",
          "Title": "[more related to CVE-2005-4890]",
          "Severity": "LOW",
          "VendorSeverity": {
            "debian": 1
          }
        },
        {
          "VulnerabilityID": "CVE-2022-0563",
          "PkgID": "mount@2.41-5",
          "PkgName": "mount",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/mount@2.41-5?arch=amd64\u0026distro=debian-13.2",
            "UID": "cdd5d7f5b4368c01",
            "BOMRef": "pkg:deb/debian/mount@2.41-5?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-5",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-0563",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:2bb836b0eedcf72edc9c353f6da569f01d9ac56b3f97d37120c4d11f0f6ceb97",
          "Title": "util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline",
          "Description": "A flaw was found in the util-linux chfn and chsh utilities when compiled with Readline support. The Readline library uses an \"INPUTRC\" environment variable to get a path to the library config file. When the library cannot parse the specified file, it prints an error message containing data from the file. This flaw allows an unprivileged user to read root-owned files, potentially leading to privilege escalation. This flaw affects util-linux versions prior to 2.37.4.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-209"
          ],
          "VendorSeverity": {
            "amazon": 2,
            "cbl-mariner": 2,
            "debian": 1,
            "nvd": 2,
            "photon": 2,
            "redhat": 2
          },
          "CVSS": {
            "nvd": {
              "V2Vector": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
              "V2Score": 1.9,
              "V3Score": 5.5
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
              "V3Score": 5.5
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2022-0563",
            "https://blog.trailofbits.com/2023/02/16/suid-logic-bug-linux-readline/",
            "https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w%40ws.net.home/T/#u",
            "https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u",
            "https://nvd.nist.gov/vuln/detail/CVE-2022-0563",
            "https://security.gentoo.org/glsa/202401-08",
            "https://security.netapp.com/advisory/ntap-20220331-0002/",
            "https://www.cve.org/CVERecord?id=CVE-2022-0563"
          ],
          "PublishedDate": "2022-02-21T19:15:08.393Z",
          "LastModifiedDate": "2025-06-09T16:15:33.237Z"
        },
        {
          "VulnerabilityID": "CVE-2025-14104",
          "PkgID": "mount@2.41-5",
          "PkgName": "mount",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/mount@2.41-5?arch=amd64\u0026distro=debian-13.2",
            "UID": "cdd5d7f5b4368c01",
            "BOMRef": "pkg:deb/debian/mount@2.41-5?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-5",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-14104",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:ead90dad29bfe722ce01dbdb522a33a03f17c4f634963f3d4412295d631db689",
          "Title": "util-linux: util-linux: Heap buffer overread in setpwnam() when processing 256-byte usernames",
          "Description": "A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-125"
          ],
          "VendorSeverity": {
            "alma": 2,
            "azure": 2,
            "cbl-mariner": 2,
            "debian": 1,
            "oracle-oval": 2,
            "photon": 2,
            "redhat": 2,
            "rocky": 2
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
              "V3Score": 6.1
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:1696",
            "https://access.redhat.com/errata/RHSA-2026:1852",
            "https://access.redhat.com/errata/RHSA-2026:1913",
            "https://access.redhat.com/errata/RHSA-2026:2485",
            "https://access.redhat.com/errata/RHSA-2026:2563",
            "https://access.redhat.com/errata/RHSA-2026:2737",
            "https://access.redhat.com/errata/RHSA-2026:2800",
            "https://access.redhat.com/errata/RHSA-2026:3406",
            "https://access.redhat.com/errata/RHSA-2026:4943",
            "https://access.redhat.com/security/cve/CVE-2025-14104",
            "https://bugzilla.redhat.com/2419369",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2419369",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14104",
            "https://errata.almalinux.org/9/ALSA-2026-1913.html",
            "https://errata.rockylinux.org/RLSA-2026:1913",
            "https://linux.oracle.com/cve/CVE-2025-14104.html",
            "https://linux.oracle.com/errata/ELSA-2026-1913.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-14104",
            "https://www.cve.org/CVERecord?id=CVE-2025-14104"
          ],
          "PublishedDate": "2025-12-05T17:16:03.117Z",
          "LastModifiedDate": "2026-03-18T17:16:03.817Z"
        },
        {
          "VulnerabilityID": "CVE-2026-3184",
          "PkgID": "mount@2.41-5",
          "PkgName": "mount",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/mount@2.41-5?arch=amd64\u0026distro=debian-13.2",
            "UID": "cdd5d7f5b4368c01",
            "BOMRef": "pkg:deb/debian/mount@2.41-5?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-5",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-3184",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:a1ce27c45746e666087e19cf6e36c79d3909bf7c7dad4e854f2951c438758fae",
          "Title": "util-linux: util-linux: Access control bypass due to improper hostname canonicalization",
          "Description": "A flaw was found in util-linux. Improper hostname canonicalization in the `login(1)` utility, when invoked with the `-h` option, can modify the supplied remote hostname before setting `PAM_RHOST`. A remote attacker could exploit this by providing a specially crafted hostname, potentially bypassing host-based Pluggable Authentication Modules (PAM) access control rules that rely on fully qualified domain names. This could lead to unauthorized access.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-289"
          ],
          "VendorSeverity": {
            "redhat": 1,
            "ubuntu": 2
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
              "V3Score": 3.7
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-3184",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2442570",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-3184",
            "https://www.cve.org/CVERecord?id=CVE-2026-3184"
          ],
          "PublishedDate": "2026-04-03T19:17:23.377Z",
          "LastModifiedDate": "2026-04-03T19:17:23.377Z"
        },
        {
          "VulnerabilityID": "CVE-2026-27456",
          "PkgID": "mount@2.41-5",
          "PkgName": "mount",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/mount@2.41-5?arch=amd64\u0026distro=debian-13.2",
            "UID": "cdd5d7f5b4368c01",
            "BOMRef": "pkg:deb/debian/mount@2.41-5?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-5",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-27456",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:fb981450206d30611ca7a23cb36c10b6401e53ac496105fa96e0a886ab39d2f2",
          "Title": "[util-linux: mount(8) TOCTOU symlink attack via loop device]",
          "Description": "util-linux is a random collection of Linux utilities. Prior to version 2.41.4, a TOCTOU (Time-of-Check-Time-of-Use) vulnerability has been identified in the SUID binary /usr/bin/mount from util-linux. The mount binary, when setting up loop devices, validates the source file path with user privileges via fork() + setuid() + realpath(), but subsequently re-canonicalizes and opens it with root privileges (euid=0) without verifying that the path has not been replaced between both operations. Neither O_NOFOLLOW, nor inode comparison, nor post-open fstat() are employed. This allows a local unprivileged user to replace the source file with a symlink pointing to any root-owned file or device during the race window, causing the SUID binary to open and mount it as root. Exploitation requires an /etc/fstab entry with user,loop options whose path points to a directory where the attacker has write permission, and that /usr/bin/mount has the SUID bit set (the default configuration on virtually all Linux distributions). The impact is unauthorized read access to root-protected files and block devices, including backup images, disk volumes, and any file containing a valid filesystem. This issue has been patched in version 2.41.4.",
          "Severity": "UNKNOWN",
          "CweIDs": [
            "CWE-59",
            "CWE-269",
            "CWE-367"
          ],
          "References": [
            "https://github.com/util-linux/util-linux/commit/5e390467b26a3cf3fecc04e1a0d482dff3162fc4",
            "https://github.com/util-linux/util-linux/releases/tag/v2.41.4",
            "https://github.com/util-linux/util-linux/security/advisories/GHSA-qq4x-vfq4-9h9g"
          ],
          "PublishedDate": "2026-04-03T22:16:25.4Z",
          "LastModifiedDate": "2026-04-03T22:16:25.4Z"
        },
        {
          "VulnerabilityID": "CVE-2025-69720",
          "PkgID": "ncurses-base@6.5+20250216-2",
          "PkgName": "ncurses-base",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/ncurses-base@6.5%2B20250216-2?arch=all\u0026distro=debian-13.2",
            "UID": "ef08d84b67908f5c",
            "BOMRef": "pkg:deb/debian/ncurses-base@6.5%2B20250216-2?arch=all\u0026distro=debian-13.2"
          },
          "InstalledVersion": "6.5+20250216-2",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "SeveritySource": "nvd",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-69720",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:483b8dc583738962c7843665b9a0cae3748b9d0f77f0a9d3d0171c5022147e98",
          "Title": "ncurses: ncurses: Buffer overflow vulnerability may lead to arbitrary code execution.",
          "Description": "The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.",
          "Severity": "HIGH",
          "CweIDs": [
            "CWE-121",
            "CWE-120"
          ],
          "VendorSeverity": {
            "alma": 2,
            "cbl-mariner": 4,
            "nvd": 3,
            "oracle-oval": 2,
            "redhat": 2
          },
          "CVSS": {
            "nvd": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
              "V3Score": 7.8
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H",
              "V3Score": 7.3
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:5913",
            "https://access.redhat.com/security/cve/CVE-2025-69720",
            "https://bugzilla.redhat.com/2449037",
            "https://errata.almalinux.org/10/ALSA-2026-5913.html",
            "https://github.com/Cao-Wuhui/CVE-2025-69720",
            "https://invisible-island.net/archives/ncurses/6.5/",
            "https://invisible-island.net/ncurses/",
            "https://linux.oracle.com/cve/CVE-2025-69720.html",
            "https://linux.oracle.com/errata/ELSA-2026-5913.html",
            "https://marc.info/?l=ncurses-bug\u0026m=176539968328570\u0026w=2",
            "https://marc.info/?l=ncurses-bug\u0026m=176540731801330\u0026w=2",
            "https://marc.info/?l=ncurses-bug\u0026m=176545557728083\u0026w=2",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-69720",
            "https://www.cve.org/CVERecord?id=CVE-2025-69720"
          ],
          "PublishedDate": "2026-03-19T15:16:21.293Z",
          "LastModifiedDate": "2026-03-26T19:35:10.547Z"
        },
        {
          "VulnerabilityID": "CVE-2025-6141",
          "PkgID": "ncurses-base@6.5+20250216-2",
          "PkgName": "ncurses-base",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/ncurses-base@6.5%2B20250216-2?arch=all\u0026distro=debian-13.2",
            "UID": "ef08d84b67908f5c",
            "BOMRef": "pkg:deb/debian/ncurses-base@6.5%2B20250216-2?arch=all\u0026distro=debian-13.2"
          },
          "InstalledVersion": "6.5+20250216-2",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-6141",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:624de9e7ae2dd8aa3af10944319c82a730c21e776526c96060aa02ff3fc69ccc",
          "Title": "gnu-ncurses: ncurses Stack Buffer Overflow",
          "Description": "A vulnerability has been found in GNU ncurses up to 6.5-20250322 and classified as problematic. This vulnerability affects the function postprocess_termcap of the file tinfo/parse_entry.c. The manipulation leads to stack-based buffer overflow. The attack needs to be approached locally. Upgrading to version 6.5-20250329 is able to address this issue. It is recommended to upgrade the affected component.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-119",
            "CWE-121"
          ],
          "VendorSeverity": {
            "photon": 1,
            "redhat": 1
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
              "V3Score": 3.3
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2025-6141",
            "https://invisible-island.net/ncurses/NEWS.html#index-t20250329",
            "https://lists.gnu.org/archive/html/bug-ncurses/2025-03/msg00107.html",
            "https://lists.gnu.org/archive/html/bug-ncurses/2025-03/msg00109.html",
            "https://lists.gnu.org/archive/html/bug-ncurses/2025-03/msg00114.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-6141",
            "https://vuldb.com/?ctiid.312610",
            "https://vuldb.com/?id.312610",
            "https://vuldb.com/?submit.593000",
            "https://www.cve.org/CVERecord?id=CVE-2025-6141",
            "https://www.gnu.org/"
          ],
          "PublishedDate": "2025-06-16T22:16:41.527Z",
          "LastModifiedDate": "2025-06-17T20:50:23.507Z"
        },
        {
          "VulnerabilityID": "CVE-2025-69720",
          "PkgID": "ncurses-bin@6.5+20250216-2",
          "PkgName": "ncurses-bin",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/ncurses-bin@6.5%2B20250216-2?arch=amd64\u0026distro=debian-13.2",
            "UID": "6f47f1c24ffc9912",
            "BOMRef": "pkg:deb/debian/ncurses-bin@6.5%2B20250216-2?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "6.5+20250216-2",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "SeveritySource": "nvd",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-69720",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:4ccf1a91d4341cb71faa629bf083ae65a1074c538decc4d593c926b7d5ff6e28",
          "Title": "ncurses: ncurses: Buffer overflow vulnerability may lead to arbitrary code execution.",
          "Description": "The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.",
          "Severity": "HIGH",
          "CweIDs": [
            "CWE-121",
            "CWE-120"
          ],
          "VendorSeverity": {
            "alma": 2,
            "cbl-mariner": 4,
            "nvd": 3,
            "oracle-oval": 2,
            "redhat": 2
          },
          "CVSS": {
            "nvd": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
              "V3Score": 7.8
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H",
              "V3Score": 7.3
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:5913",
            "https://access.redhat.com/security/cve/CVE-2025-69720",
            "https://bugzilla.redhat.com/2449037",
            "https://errata.almalinux.org/10/ALSA-2026-5913.html",
            "https://github.com/Cao-Wuhui/CVE-2025-69720",
            "https://invisible-island.net/archives/ncurses/6.5/",
            "https://invisible-island.net/ncurses/",
            "https://linux.oracle.com/cve/CVE-2025-69720.html",
            "https://linux.oracle.com/errata/ELSA-2026-5913.html",
            "https://marc.info/?l=ncurses-bug\u0026m=176539968328570\u0026w=2",
            "https://marc.info/?l=ncurses-bug\u0026m=176540731801330\u0026w=2",
            "https://marc.info/?l=ncurses-bug\u0026m=176545557728083\u0026w=2",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-69720",
            "https://www.cve.org/CVERecord?id=CVE-2025-69720"
          ],
          "PublishedDate": "2026-03-19T15:16:21.293Z",
          "LastModifiedDate": "2026-03-26T19:35:10.547Z"
        },
        {
          "VulnerabilityID": "CVE-2025-6141",
          "PkgID": "ncurses-bin@6.5+20250216-2",
          "PkgName": "ncurses-bin",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/ncurses-bin@6.5%2B20250216-2?arch=amd64\u0026distro=debian-13.2",
            "UID": "6f47f1c24ffc9912",
            "BOMRef": "pkg:deb/debian/ncurses-bin@6.5%2B20250216-2?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "6.5+20250216-2",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-6141",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:9245af98f48a2af7071dc06457978a6a24af64697a88f0cadc40286077e04e17",
          "Title": "gnu-ncurses: ncurses Stack Buffer Overflow",
          "Description": "A vulnerability has been found in GNU ncurses up to 6.5-20250322 and classified as problematic. This vulnerability affects the function postprocess_termcap of the file tinfo/parse_entry.c. The manipulation leads to stack-based buffer overflow. The attack needs to be approached locally. Upgrading to version 6.5-20250329 is able to address this issue. It is recommended to upgrade the affected component.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-119",
            "CWE-121"
          ],
          "VendorSeverity": {
            "photon": 1,
            "redhat": 1
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
              "V3Score": 3.3
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2025-6141",
            "https://invisible-island.net/ncurses/NEWS.html#index-t20250329",
            "https://lists.gnu.org/archive/html/bug-ncurses/2025-03/msg00107.html",
            "https://lists.gnu.org/archive/html/bug-ncurses/2025-03/msg00109.html",
            "https://lists.gnu.org/archive/html/bug-ncurses/2025-03/msg00114.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-6141",
            "https://vuldb.com/?ctiid.312610",
            "https://vuldb.com/?id.312610",
            "https://vuldb.com/?submit.593000",
            "https://www.cve.org/CVERecord?id=CVE-2025-6141",
            "https://www.gnu.org/"
          ],
          "PublishedDate": "2025-06-16T22:16:41.527Z",
          "LastModifiedDate": "2025-06-17T20:50:23.507Z"
        },
        {
          "VulnerabilityID": "CVE-2025-15467",
          "VendorIDs": [
            "DSA-6113-1"
          ],
          "PkgID": "openssl@3.5.4-1~deb13u1",
          "PkgName": "openssl",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/openssl@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "99a982f9528e587f",
            "BOMRef": "pkg:deb/debian/openssl@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.5.4-1~deb13u1",
          "FixedVersion": "3.5.4-1~deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:d50154ffb0874576762deecffa701d98b9e17b03d34c5aa4a43b8b04bac58980",
            "DiffID": "sha256:0c5d78238295267e2257cf5f7d99d8c3ab1de94c80e5af16ad79258917dbfd2f"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-15467",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:982350b861c9ce646520c0c38aa7801c30c86ff1c767ed420ceb555838e4fe5e",
          "Title": "openssl: OpenSSL: Remote code execution or Denial of Service via oversized Initialization Vector in CMS parsing",
          "Description": "Issue summary: Parsing CMS AuthEnvelopedData or EnvelopedData message with\nmaliciously crafted AEAD parameters can trigger a stack buffer overflow.\n\nImpact summary: A stack buffer overflow may lead to a crash, causing Denial\nof Service, or potentially remote code execution.\n\nWhen parsing CMS (Auth)EnvelopedData structures that use AEAD ciphers such as\nAES-GCM, the IV (Initialization Vector) encoded in the ASN.1 parameters is\ncopied into a fixed-size stack buffer without verifying that its length fits\nthe destination. An attacker can supply a crafted CMS message with an\noversized IV, causing a stack-based out-of-bounds write before any\nauthentication or tag verification occurs.\n\nApplications and services that parse untrusted CMS or PKCS#7 content using\nAEAD ciphers (e.g., S/MIME (Auth)EnvelopedData with AES-GCM) are vulnerable.\nBecause the overflow occurs prior to authentication, no valid key material\nis required to trigger it. While exploitability to remote code execution\ndepends on platform and toolchain mitigations, the stack-based write\nprimitive represents a severe risk.\n\nThe FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this\nissue, as the CMS implementation is outside the OpenSSL FIPS module\nboundary.\n\nOpenSSL 3.6, 3.5, 3.4, 3.3 and 3.0 are vulnerable to this issue.\n\nOpenSSL 1.1.1 and 1.0.2 are not affected by this issue.",
          "Severity": "CRITICAL",
          "CweIDs": [
            "CWE-787"
          ],
          "VendorSeverity": {
            "alma": 3,
            "amazon": 3,
            "azure": 4,
            "oracle-oval": 3,
            "photon": 3,
            "redhat": 3,
            "rocky": 3,
            "ubuntu": 2
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
              "V3Score": 9.8
            }
          },
          "References": [
            "http://www.openwall.com/lists/oss-security/2026/01/27/10",
            "http://www.openwall.com/lists/oss-security/2026/02/25/6",
            "https://access.redhat.com/errata/RHSA-2026:1473",
            "https://access.redhat.com/security/cve/CVE-2025-15467",
            "https://bugzilla.redhat.com/2430375",
            "https://bugzilla.redhat.com/2430376",
            "https://bugzilla.redhat.com/2430377",
            "https://bugzilla.redhat.com/2430378",
            "https://bugzilla.redhat.com/2430379",
            "https://bugzilla.redhat.com/2430380",
            "https://bugzilla.redhat.com/2430381",
            "https://bugzilla.redhat.com/2430386",
            "https://bugzilla.redhat.com/2430387",
            "https://bugzilla.redhat.com/2430388",
            "https://bugzilla.redhat.com/2430389",
            "https://bugzilla.redhat.com/2430390",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430375",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430376",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430377",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430378",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430379",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430380",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430381",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430386",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430387",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430388",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430389",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430390",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11187",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15467",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15468",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15469",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66199",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68160",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69418",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69420",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69421",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22795",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22796",
            "https://errata.almalinux.org/9/ALSA-2026-1473.html",
            "https://errata.rockylinux.org/RLSA-2026:1473",
            "https://github.com/guiimoraes/CVE-2025-15467",
            "https://github.com/openssl/openssl/commit/2c8f0e5fa9b6ee5508a0349e4572ddb74db5a703",
            "https://github.com/openssl/openssl/commit/5f26d4202f5b89664c5c3f3c62086276026ba9a9",
            "https://github.com/openssl/openssl/commit/6ced0fe6b10faa560e410e3ee8d6c82f06c65ea3",
            "https://github.com/openssl/openssl/commit/ce39170276daec87f55c39dad1f629b56344429e",
            "https://github.com/openssl/openssl/commit/d0071a0799f20cc8101730145349ed4487c268dc",
            "https://linux.oracle.com/cve/CVE-2025-15467.html",
            "https://linux.oracle.com/errata/ELSA-2026-50081.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-15467",
            "https://openssl-library.org/news/secadv/20260127.txt",
            "https://ubuntu.com/security/notices/USN-7980-1",
            "https://www.cve.org/CVERecord?id=CVE-2025-15467"
          ],
          "PublishedDate": "2026-01-27T16:16:14.257Z",
          "LastModifiedDate": "2026-03-19T19:16:19.23Z"
        },
        {
          "VulnerabilityID": "CVE-2025-69419",
          "VendorIDs": [
            "DSA-6113-1"
          ],
          "PkgID": "openssl@3.5.4-1~deb13u1",
          "PkgName": "openssl",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/openssl@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "99a982f9528e587f",
            "BOMRef": "pkg:deb/debian/openssl@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.5.4-1~deb13u1",
          "FixedVersion": "3.5.4-1~deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:d50154ffb0874576762deecffa701d98b9e17b03d34c5aa4a43b8b04bac58980",
            "DiffID": "sha256:0c5d78238295267e2257cf5f7d99d8c3ab1de94c80e5af16ad79258917dbfd2f"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-69419",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:7a5f893b7fe3c0ff67da86ee574145b72b34228bab1a45cab46fcbbca77300af",
          "Title": "openssl: OpenSSL: Arbitrary code execution due to out-of-bounds write in PKCS#12 processing",
          "Description": "Issue summary: Calling PKCS12_get_friendlyname() function on a maliciously\ncrafted PKCS#12 file with a BMPString (UTF-16BE) friendly name containing\nnon-ASCII BMP code point can trigger a one byte write before the allocated\nbuffer.\n\nImpact summary: The out-of-bounds write can cause a memory corruption\nwhich can have various consequences including a Denial of Service.\n\nThe OPENSSL_uni2utf8() function performs a two-pass conversion of a PKCS#12\nBMPString (UTF-16BE) to UTF-8. In the second pass, when emitting UTF-8 bytes,\nthe helper function bmp_to_utf8() incorrectly forwards the remaining UTF-16\nsource byte count as the destination buffer capacity to UTF8_putc(). For BMP\ncode points above U+07FF, UTF-8 requires three bytes, but the forwarded\ncapacity can be just two bytes. UTF8_putc() then returns -1, and this negative\nvalue is added to the output length without validation, causing the\nlength to become negative. The subsequent trailing NUL byte is then written\nat a negative offset, causing write outside of heap allocated buffer.\n\nThe vulnerability is reachable via the public PKCS12_get_friendlyname() API\nwhen parsing attacker-controlled PKCS#12 files. While PKCS12_parse() uses a\ndifferent code path that avoids this issue, PKCS12_get_friendlyname() directly\ninvokes the vulnerable function. Exploitation requires an attacker to provide\na malicious PKCS#12 file to be parsed by the application and the attacker\ncan just trigger a one zero byte write before the allocated buffer.\nFor that reason the issue was assessed as Low severity according to our\nSecurity Policy.\n\nThe FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue,\nas the PKCS#12 implementation is outside the OpenSSL FIPS module boundary.\n\nOpenSSL 3.6, 3.5, 3.4, 3.3, 3.0 and 1.1.1 are vulnerable to this issue.\n\nOpenSSL 1.0.2 is not affected by this issue.",
          "Severity": "HIGH",
          "CweIDs": [
            "CWE-787"
          ],
          "VendorSeverity": {
            "alma": 2,
            "amazon": 3,
            "azure": 3,
            "cbl-mariner": 3,
            "oracle-oval": 2,
            "photon": 3,
            "redhat": 2,
            "rocky": 3,
            "ubuntu": 1
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
              "V3Score": 7.4
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:4472",
            "https://access.redhat.com/security/cve/CVE-2025-69419",
            "https://bugzilla.redhat.com/2430386",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430375",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430376",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430377",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430378",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430379",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430380",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430381",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430386",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430387",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430388",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430389",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430390",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11187",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15467",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15468",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15469",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66199",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68160",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69418",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69420",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69421",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22795",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22796",
            "https://errata.almalinux.org/9/ALSA-2026-4472.html",
            "https://errata.rockylinux.org/RLSA-2026:1473",
            "https://github.com/openssl/openssl/commit/41be0f216404f14457bbf3b9cc488dba60b49296",
            "https://github.com/openssl/openssl/commit/7e9cac9832e4705b91987c2474ed06a37a93cecb",
            "https://github.com/openssl/openssl/commit/a26a90d38edec3748566129d824e664b54bee2e2",
            "https://github.com/openssl/openssl/commit/cda12de3bc0e333ea8d2c6fd15001dbdaf280015",
            "https://github.com/openssl/openssl/commit/ff628933755075446bca8307e8417c14d164b535",
            "https://linux.oracle.com/cve/CVE-2025-69419.html",
            "https://linux.oracle.com/errata/ELSA-2026-50131.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-69419",
            "https://openssl-library.org/news/secadv/20260127.txt",
            "https://ubuntu.com/security/notices/USN-7980-1",
            "https://ubuntu.com/security/notices/USN-7980-2",
            "https://www.cve.org/CVERecord?id=CVE-2025-69419"
          ],
          "PublishedDate": "2026-01-27T16:16:34.113Z",
          "LastModifiedDate": "2026-02-02T18:35:02.177Z"
        },
        {
          "VulnerabilityID": "CVE-2025-69421",
          "VendorIDs": [
            "DSA-6113-1"
          ],
          "PkgID": "openssl@3.5.4-1~deb13u1",
          "PkgName": "openssl",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/openssl@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "99a982f9528e587f",
            "BOMRef": "pkg:deb/debian/openssl@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.5.4-1~deb13u1",
          "FixedVersion": "3.5.4-1~deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:d50154ffb0874576762deecffa701d98b9e17b03d34c5aa4a43b8b04bac58980",
            "DiffID": "sha256:0c5d78238295267e2257cf5f7d99d8c3ab1de94c80e5af16ad79258917dbfd2f"
          },
          "SeveritySource": "nvd",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-69421",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:de4dabeed67d99b5b7034c825a845825864e4d084533839b9493b016d913f9d0",
          "Title": "openssl: OpenSSL: Denial of Service via malformed PKCS#12 file processing",
          "Description": "Issue summary: Processing a malformed PKCS#12 file can trigger a NULL pointer\ndereference in the PKCS12_item_decrypt_d2i_ex() function.\n\nImpact summary: A NULL pointer dereference can trigger a crash which leads to\nDenial of Service for an application processing PKCS#12 files.\n\nThe PKCS12_item_decrypt_d2i_ex() function does not check whether the oct\nparameter is NULL before dereferencing it. When called from\nPKCS12_unpack_p7encdata() with a malformed PKCS#12 file, this parameter can\nbe NULL, causing a crash. The vulnerability is limited to Denial of Service\nand cannot be escalated to achieve code execution or memory disclosure.\n\nExploiting this issue requires an attacker to provide a malformed PKCS#12 file\nto an application that processes it. For that reason the issue was assessed as\nLow severity according to our Security Policy.\n\nThe FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue,\nas the PKCS#12 implementation is outside the OpenSSL FIPS module boundary.\n\nOpenSSL 3.6, 3.5, 3.4, 3.3, 3.0, 1.1.1 and 1.0.2 are vulnerable to this issue.",
          "Severity": "HIGH",
          "CweIDs": [
            "CWE-476"
          ],
          "VendorSeverity": {
            "alma": 3,
            "amazon": 3,
            "azure": 2,
            "cbl-mariner": 2,
            "nvd": 3,
            "oracle-oval": 3,
            "photon": 3,
            "redhat": 1,
            "rocky": 3,
            "ubuntu": 1
          },
          "CVSS": {
            "nvd": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 7.5
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
              "V3Score": 6.5
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:1473",
            "https://access.redhat.com/security/cve/CVE-2025-69421",
            "https://bugzilla.redhat.com/2430375",
            "https://bugzilla.redhat.com/2430376",
            "https://bugzilla.redhat.com/2430377",
            "https://bugzilla.redhat.com/2430378",
            "https://bugzilla.redhat.com/2430379",
            "https://bugzilla.redhat.com/2430380",
            "https://bugzilla.redhat.com/2430381",
            "https://bugzilla.redhat.com/2430386",
            "https://bugzilla.redhat.com/2430387",
            "https://bugzilla.redhat.com/2430388",
            "https://bugzilla.redhat.com/2430389",
            "https://bugzilla.redhat.com/2430390",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430375",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430376",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430377",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430378",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430379",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430380",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430381",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430386",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430387",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430388",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430389",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430390",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11187",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15467",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15468",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15469",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66199",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68160",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69418",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69420",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69421",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22795",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22796",
            "https://errata.almalinux.org/9/ALSA-2026-1473.html",
            "https://errata.rockylinux.org/RLSA-2026:1473",
            "https://github.com/openssl/openssl/commit/3524a29271f8191b8fd8a5257eb05173982a097b",
            "https://github.com/openssl/openssl/commit/36ecb4960872a4ce04bf6f1e1f4e78d75ec0c0c7",
            "https://github.com/openssl/openssl/commit/4bbc8d41a72c842ce4077a8a3eccd1109aaf74bd",
            "https://github.com/openssl/openssl/commit/643986985cd1c21221f941129d76fe0c2785aeb3",
            "https://github.com/openssl/openssl/commit/a2dbc539f0f9cc63832709fa5aa33ad9495eb19c",
            "https://linux.oracle.com/cve/CVE-2025-69421.html",
            "https://linux.oracle.com/errata/ELSA-2026-50081.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-69421",
            "https://openssl-library.org/news/secadv/20260127.txt",
            "https://ubuntu.com/security/notices/USN-7980-1",
            "https://ubuntu.com/security/notices/USN-7980-2",
            "https://www.cve.org/CVERecord?id=CVE-2025-69421"
          ],
          "PublishedDate": "2026-01-27T16:16:34.437Z",
          "LastModifiedDate": "2026-02-28T04:16:17.457Z"
        },
        {
          "VulnerabilityID": "CVE-2025-11187",
          "PkgID": "openssl@3.5.4-1~deb13u1",
          "PkgName": "openssl",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/openssl@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "99a982f9528e587f",
            "BOMRef": "pkg:deb/debian/openssl@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.5.4-1~deb13u1",
          "FixedVersion": "3.5.4-1~deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:d50154ffb0874576762deecffa701d98b9e17b03d34c5aa4a43b8b04bac58980",
            "DiffID": "sha256:0c5d78238295267e2257cf5f7d99d8c3ab1de94c80e5af16ad79258917dbfd2f"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-11187",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:b159eb1dde05825825fcec2781273b1cda668af7cf2b4406bb798a5812efdba3",
          "Title": "openssl: OpenSSL: Arbitrary code execution or denial of service through crafted PKCS#12 file",
          "Description": "Issue summary: PBMAC1 parameters in PKCS#12 files are missing validation\nwhich can trigger a stack-based buffer overflow, invalid pointer or NULL\npointer dereference during MAC verification.\n\nImpact summary: The stack buffer overflow or NULL pointer dereference may\ncause a crash leading to Denial of Service for an application that parses\nuntrusted PKCS#12 files. The buffer overflow may also potentially enable\ncode execution depending on platform mitigations.\n\nWhen verifying a PKCS#12 file that uses PBMAC1 for the MAC, the PBKDF2\nsalt and keylength parameters from the file are used without validation.\nIf the value of keylength exceeds the size of the fixed stack buffer used\nfor the derived key (64 bytes), the key derivation will overflow the buffer.\nThe overflow length is attacker-controlled. Also, if the salt parameter is\nnot an OCTET STRING type this can lead to invalid or NULL pointer\ndereference.\n\nExploiting this issue requires a user or application to process\na maliciously crafted PKCS#12 file. It is uncommon to accept untrusted\nPKCS#12 files in applications as they are usually used to store private\nkeys which are trusted by definition. For this reason the issue was assessed\nas Moderate severity.\n\nThe FIPS modules in 3.6, 3.5 and 3.4 are not affected by this issue, as\nPKCS#12 processing is outside the OpenSSL FIPS module boundary.\n\nOpenSSL 3.6, 3.5 and 3.4 are vulnerable to this issue.\n\nOpenSSL 3.3, 3.0, 1.1.1 and 1.0.2 are not affected by this issue as they do\nnot support PBMAC1 in PKCS#12.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-476",
            "CWE-787"
          ],
          "VendorSeverity": {
            "alma": 3,
            "oracle-oval": 3,
            "redhat": 2,
            "rocky": 3,
            "ubuntu": 2
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H",
              "V3Score": 6.1
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:1473",
            "https://access.redhat.com/security/cve/CVE-2025-11187",
            "https://bugzilla.redhat.com/2430375",
            "https://bugzilla.redhat.com/2430376",
            "https://bugzilla.redhat.com/2430377",
            "https://bugzilla.redhat.com/2430378",
            "https://bugzilla.redhat.com/2430379",
            "https://bugzilla.redhat.com/2430380",
            "https://bugzilla.redhat.com/2430381",
            "https://bugzilla.redhat.com/2430386",
            "https://bugzilla.redhat.com/2430387",
            "https://bugzilla.redhat.com/2430388",
            "https://bugzilla.redhat.com/2430389",
            "https://bugzilla.redhat.com/2430390",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430375",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430376",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430377",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430378",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430379",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430380",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430381",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430386",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430387",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430388",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430389",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430390",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11187",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15467",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15468",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15469",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66199",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68160",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69418",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69420",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69421",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22795",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22796",
            "https://errata.almalinux.org/9/ALSA-2026-1473.html",
            "https://errata.rockylinux.org/RLSA-2026:1473",
            "https://github.com/metadust/CVE-2025-11187",
            "https://github.com/openssl/openssl/commit/205e3a55e16e4bd08c12fdbd3416ab829c0f6206",
            "https://github.com/openssl/openssl/commit/8caf359d6e46fb413e8f5f0df765d2e8a51df4e8",
            "https://github.com/openssl/openssl/commit/e1079bc17ed93ff16f6b86f33a2fe3336e78817e",
            "https://linux.oracle.com/cve/CVE-2025-11187.html",
            "https://linux.oracle.com/errata/ELSA-2026-50081.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-11187",
            "https://openssl-library.org/news/secadv/20260127.txt",
            "https://ubuntu.com/security/notices/USN-7980-1",
            "https://www.cve.org/CVERecord?id=CVE-2025-11187"
          ],
          "PublishedDate": "2026-01-27T16:16:14.093Z",
          "LastModifiedDate": "2026-03-20T14:16:13.89Z"
        },
        {
          "VulnerabilityID": "CVE-2025-15468",
          "PkgID": "openssl@3.5.4-1~deb13u1",
          "PkgName": "openssl",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/openssl@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "99a982f9528e587f",
            "BOMRef": "pkg:deb/debian/openssl@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.5.4-1~deb13u1",
          "FixedVersion": "3.5.4-1~deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:d50154ffb0874576762deecffa701d98b9e17b03d34c5aa4a43b8b04bac58980",
            "DiffID": "sha256:0c5d78238295267e2257cf5f7d99d8c3ab1de94c80e5af16ad79258917dbfd2f"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-15468",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:6a933eef54420ada8d7a42539c69b24ab1ecb03b296d474ec52802f599a08210",
          "Title": "openssl: OpenSSL: Denial of Service via NULL pointer dereference in QUIC protocol handling",
          "Description": "Issue summary: If an application using the SSL_CIPHER_find() function in\na QUIC protocol client or server receives an unknown cipher suite from\nthe peer, a NULL dereference occurs.\n\nImpact summary: A NULL pointer dereference leads to abnormal termination of\nthe running process causing Denial of Service.\n\nSome applications call SSL_CIPHER_find() from the client_hello_cb callback\non the cipher ID received from the peer. If this is done with an SSL object\nimplementing the QUIC protocol, NULL pointer dereference will happen if\nthe examined cipher ID is unknown or unsupported.\n\nAs it is not very common to call this function in applications using the QUIC \nprotocol and the worst outcome is Denial of Service, the issue was assessed\nas Low severity.\n\nThe vulnerable code was introduced in the 3.2 version with the addition\nof the QUIC protocol support.\n\nThe FIPS modules in 3.6, 3.5, 3.4 and 3.3 are not affected by this issue,\nas the QUIC implementation is outside the OpenSSL FIPS module boundary.\n\nOpenSSL 3.6, 3.5, 3.4 and 3.3 are vulnerable to this issue.\n\nOpenSSL 3.0, 1.1.1 and 1.0.2 are not affected by this issue.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-476"
          ],
          "VendorSeverity": {
            "alma": 3,
            "amazon": 3,
            "azure": 2,
            "oracle-oval": 3,
            "photon": 2,
            "redhat": 1,
            "rocky": 3,
            "ubuntu": 1
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 5.9
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:1473",
            "https://access.redhat.com/security/cve/CVE-2025-15468",
            "https://bugzilla.redhat.com/2430375",
            "https://bugzilla.redhat.com/2430376",
            "https://bugzilla.redhat.com/2430377",
            "https://bugzilla.redhat.com/2430378",
            "https://bugzilla.redhat.com/2430379",
            "https://bugzilla.redhat.com/2430380",
            "https://bugzilla.redhat.com/2430381",
            "https://bugzilla.redhat.com/2430386",
            "https://bugzilla.redhat.com/2430387",
            "https://bugzilla.redhat.com/2430388",
            "https://bugzilla.redhat.com/2430389",
            "https://bugzilla.redhat.com/2430390",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430375",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430376",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430377",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430378",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430379",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430380",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430381",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430386",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430387",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430388",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430389",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430390",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11187",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15467",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15468",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15469",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66199",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68160",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69418",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69420",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69421",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22795",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22796",
            "https://errata.almalinux.org/9/ALSA-2026-1473.html",
            "https://errata.rockylinux.org/RLSA-2026:1473",
            "https://github.com/openssl/openssl/commit/1f08e54bad32843044fe8a675948d65e3b4ece65",
            "https://github.com/openssl/openssl/commit/7c88376731c589ee5b36116c5a6e32d5ae5f7ae2",
            "https://github.com/openssl/openssl/commit/b2539639400288a4580fe2d76247541b976bade4",
            "https://github.com/openssl/openssl/commit/d75b309879631d45b972396ce4e5102559c64ac7",
            "https://linux.oracle.com/cve/CVE-2025-15468.html",
            "https://linux.oracle.com/errata/ELSA-2026-50081.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-15468",
            "https://openssl-library.org/news/secadv/20260127.txt",
            "https://ubuntu.com/security/notices/USN-7980-1",
            "https://www.cve.org/CVERecord?id=CVE-2025-15468"
          ],
          "PublishedDate": "2026-01-27T16:16:14.4Z",
          "LastModifiedDate": "2026-02-02T18:38:00.947Z"
        },
        {
          "VulnerabilityID": "CVE-2025-15469",
          "PkgID": "openssl@3.5.4-1~deb13u1",
          "PkgName": "openssl",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/openssl@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "99a982f9528e587f",
            "BOMRef": "pkg:deb/debian/openssl@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.5.4-1~deb13u1",
          "FixedVersion": "3.5.4-1~deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:d50154ffb0874576762deecffa701d98b9e17b03d34c5aa4a43b8b04bac58980",
            "DiffID": "sha256:0c5d78238295267e2257cf5f7d99d8c3ab1de94c80e5af16ad79258917dbfd2f"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-15469",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:3cce08051ba2b3c3121fbe656801317afc476e48fcc0c29198717a8f5b149be5",
          "Title": "openssl: OpenSSL: Data integrity bypass in `openssl dgst` command due to silent truncation",
          "Description": "Issue summary: The 'openssl dgst' command-line tool silently truncates input\ndata to 16MB when using one-shot signing algorithms and reports success instead\nof an error.\n\nImpact summary: A user signing or verifying files larger than 16MB with\none-shot algorithms (such as Ed25519, Ed448, or ML-DSA) may believe the entire\nfile is authenticated while trailing data beyond 16MB remains unauthenticated.\n\nWhen the 'openssl dgst' command is used with algorithms that only support\none-shot signing (Ed25519, Ed448, ML-DSA-44, ML-DSA-65, ML-DSA-87), the input\nis buffered with a 16MB limit. If the input exceeds this limit, the tool\nsilently truncates to the first 16MB and continues without signaling an error,\ncontrary to what the documentation states. This creates an integrity gap where\ntrailing bytes can be modified without detection if both signing and\nverification are performed using the same affected codepath.\n\nThe issue affects only the command-line tool behavior. Verifiers that process\nthe full message using library APIs will reject the signature, so the risk\nprimarily affects workflows that both sign and verify with the affected\n'openssl dgst' command. Streaming digest algorithms for 'openssl dgst' and\nlibrary users are unaffected.\n\nThe FIPS modules in 3.5 and 3.6 are not affected by this issue, as the\ncommand-line tools are outside the OpenSSL FIPS module boundary.\n\nOpenSSL 3.5 and 3.6 are vulnerable to this issue.\n\nOpenSSL 3.4, 3.3, 3.0, 1.1.1 and 1.0.2 are not affected by this issue.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-347"
          ],
          "VendorSeverity": {
            "alma": 3,
            "oracle-oval": 3,
            "photon": 2,
            "redhat": 1,
            "rocky": 3,
            "ubuntu": 1
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
              "V3Score": 5.5
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:1473",
            "https://access.redhat.com/security/cve/CVE-2025-15469",
            "https://bugzilla.redhat.com/2430375",
            "https://bugzilla.redhat.com/2430376",
            "https://bugzilla.redhat.com/2430377",
            "https://bugzilla.redhat.com/2430378",
            "https://bugzilla.redhat.com/2430379",
            "https://bugzilla.redhat.com/2430380",
            "https://bugzilla.redhat.com/2430381",
            "https://bugzilla.redhat.com/2430386",
            "https://bugzilla.redhat.com/2430387",
            "https://bugzilla.redhat.com/2430388",
            "https://bugzilla.redhat.com/2430389",
            "https://bugzilla.redhat.com/2430390",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430375",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430376",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430377",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430378",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430379",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430380",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430381",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430386",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430387",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430388",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430389",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430390",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11187",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15467",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15468",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15469",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66199",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68160",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69418",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69420",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69421",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22795",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22796",
            "https://errata.almalinux.org/9/ALSA-2026-1473.html",
            "https://errata.rockylinux.org/RLSA-2026:1473",
            "https://github.com/openssl/openssl/commit/310f305eb92ea8040d6b3cb75a5feeba8e6acf2f",
            "https://github.com/openssl/openssl/commit/a7936fa4bd23c906e1955a16a0a0ab39a4953a61",
            "https://linux.oracle.com/cve/CVE-2025-15469.html",
            "https://linux.oracle.com/errata/ELSA-2026-50081.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-15469",
            "https://openssl-library.org/news/secadv/20260127.txt",
            "https://ubuntu.com/security/notices/USN-7980-1",
            "https://www.cve.org/CVERecord?id=CVE-2025-15469"
          ],
          "PublishedDate": "2026-01-27T16:16:14.523Z",
          "LastModifiedDate": "2026-02-02T18:37:39.313Z"
        },
        {
          "VulnerabilityID": "CVE-2025-66199",
          "PkgID": "openssl@3.5.4-1~deb13u1",
          "PkgName": "openssl",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/openssl@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "99a982f9528e587f",
            "BOMRef": "pkg:deb/debian/openssl@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.5.4-1~deb13u1",
          "FixedVersion": "3.5.4-1~deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:d50154ffb0874576762deecffa701d98b9e17b03d34c5aa4a43b8b04bac58980",
            "DiffID": "sha256:0c5d78238295267e2257cf5f7d99d8c3ab1de94c80e5af16ad79258917dbfd2f"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-66199",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:241c881e3426d5610e8219831e8da199d2c66557c8eb7acbd4696223e464cd98",
          "Title": "openssl: OpenSSL: Denial of Service due to excessive memory allocation in TLS 1.3 certificate compression",
          "Description": "Issue summary: A TLS 1.3 connection using certificate compression can be\nforced to allocate a large buffer before decompression without checking\nagainst the configured certificate size limit.\n\nImpact summary: An attacker can cause per-connection memory allocations of\nup to approximately 22 MiB and extra CPU work, potentially leading to\nservice degradation or resource exhaustion (Denial of Service).\n\nIn affected configurations, the peer-supplied uncompressed certificate\nlength from a CompressedCertificate message is used to grow a heap buffer\nprior to decompression. This length is not bounded by the max_cert_list\nsetting, which otherwise constrains certificate message sizes. An attacker\ncan exploit this to cause large per-connection allocations followed by\nhandshake failure. No memory corruption or information disclosure occurs.\n\nThis issue only affects builds where TLS 1.3 certificate compression is\ncompiled in (i.e., not OPENSSL_NO_COMP_ALG) and at least one compression\nalgorithm (brotli, zlib, or zstd) is available, and where the compression\nextension is negotiated. Both clients receiving a server CompressedCertificate\nand servers in mutual TLS scenarios receiving a client CompressedCertificate\nare affected. Servers that do not request client certificates are not\nvulnerable to client-initiated attacks.\n\nUsers can mitigate this issue by setting SSL_OP_NO_RX_CERTIFICATE_COMPRESSION\nto disable receiving compressed certificates.\n\nThe FIPS modules in 3.6, 3.5, 3.4 and 3.3 are not affected by this issue,\nas the TLS implementation is outside the OpenSSL FIPS module boundary.\n\nOpenSSL 3.6, 3.5, 3.4 and 3.3 are vulnerable to this issue.\n\nOpenSSL 3.0, 1.1.1 and 1.0.2 are not affected by this issue.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-789"
          ],
          "VendorSeverity": {
            "alma": 3,
            "amazon": 3,
            "azure": 2,
            "oracle-oval": 3,
            "photon": 2,
            "redhat": 1,
            "rocky": 3,
            "ubuntu": 1
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 5.9
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:1473",
            "https://access.redhat.com/security/cve/CVE-2025-66199",
            "https://bugzilla.redhat.com/2430375",
            "https://bugzilla.redhat.com/2430376",
            "https://bugzilla.redhat.com/2430377",
            "https://bugzilla.redhat.com/2430378",
            "https://bugzilla.redhat.com/2430379",
            "https://bugzilla.redhat.com/2430380",
            "https://bugzilla.redhat.com/2430381",
            "https://bugzilla.redhat.com/2430386",
            "https://bugzilla.redhat.com/2430387",
            "https://bugzilla.redhat.com/2430388",
            "https://bugzilla.redhat.com/2430389",
            "https://bugzilla.redhat.com/2430390",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430375",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430376",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430377",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430378",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430379",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430380",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430381",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430386",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430387",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430388",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430389",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430390",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11187",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15467",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15468",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15469",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66199",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68160",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69418",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69420",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69421",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22795",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22796",
            "https://errata.almalinux.org/9/ALSA-2026-1473.html",
            "https://errata.rockylinux.org/RLSA-2026:1473",
            "https://github.com/openssl/openssl/commit/3ed1f75249932b155eef993a8e66a99cb98bfef4",
            "https://github.com/openssl/openssl/commit/6184a4fb08ee6d7bca570d931a4e8bef40b64451",
            "https://github.com/openssl/openssl/commit/895150b5e021d16b52fb32b97e1dd12f20448be5",
            "https://github.com/openssl/openssl/commit/966a2478046c311ed7dae50c457d0db4cafbf7e4",
            "https://linux.oracle.com/cve/CVE-2025-66199.html",
            "https://linux.oracle.com/errata/ELSA-2026-50081.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-66199",
            "https://openssl-library.org/news/secadv/20260127.txt",
            "https://ubuntu.com/security/notices/USN-7980-1",
            "https://www.cve.org/CVERecord?id=CVE-2025-66199"
          ],
          "PublishedDate": "2026-01-27T16:16:15.777Z",
          "LastModifiedDate": "2026-02-02T18:37:19.613Z"
        },
        {
          "VulnerabilityID": "CVE-2025-68160",
          "VendorIDs": [
            "DSA-6113-1"
          ],
          "PkgID": "openssl@3.5.4-1~deb13u1",
          "PkgName": "openssl",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/openssl@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "99a982f9528e587f",
            "BOMRef": "pkg:deb/debian/openssl@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.5.4-1~deb13u1",
          "FixedVersion": "3.5.4-1~deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:d50154ffb0874576762deecffa701d98b9e17b03d34c5aa4a43b8b04bac58980",
            "DiffID": "sha256:0c5d78238295267e2257cf5f7d99d8c3ab1de94c80e5af16ad79258917dbfd2f"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-68160",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:9593ac8446758abe2cdbdc05f10d755006732998651ef16bb6c0b5e4fa8ef6b3",
          "Title": "openssl: OpenSSL: Denial of Service due to out-of-bounds write in BIO filter",
          "Description": "Issue summary: Writing large, newline-free data into a BIO chain using the\nline-buffering filter where the next BIO performs short writes can trigger\na heap-based out-of-bounds write.\n\nImpact summary: This out-of-bounds write can cause memory corruption which\ntypically results in a crash, leading to Denial of Service for an application.\n\nThe line-buffering BIO filter (BIO_f_linebuffer) is not used by default in\nTLS/SSL data paths. In OpenSSL command-line applications, it is typically\nonly pushed onto stdout/stderr on VMS systems. Third-party applications that\nexplicitly use this filter with a BIO chain that can short-write and that\nwrite large, newline-free data influenced by an attacker would be affected.\nHowever, the circumstances where this could happen are unlikely to be under\nattacker control, and BIO_f_linebuffer is unlikely to be handling non-curated\ndata controlled by an attacker. For that reason the issue was assessed as\nLow severity.\n\nThe FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue,\nas the BIO implementation is outside the OpenSSL FIPS module boundary.\n\nOpenSSL 3.6, 3.5, 3.4, 3.3, 3.0, 1.1.1 and 1.0.2 are vulnerable to this issue.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-787"
          ],
          "VendorSeverity": {
            "alma": 3,
            "amazon": 3,
            "azure": 2,
            "cbl-mariner": 2,
            "oracle-oval": 3,
            "photon": 2,
            "redhat": 1,
            "rocky": 3,
            "ubuntu": 1
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 4.7
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:1473",
            "https://access.redhat.com/security/cve/CVE-2025-68160",
            "https://bugzilla.redhat.com/2430375",
            "https://bugzilla.redhat.com/2430376",
            "https://bugzilla.redhat.com/2430377",
            "https://bugzilla.redhat.com/2430378",
            "https://bugzilla.redhat.com/2430379",
            "https://bugzilla.redhat.com/2430380",
            "https://bugzilla.redhat.com/2430381",
            "https://bugzilla.redhat.com/2430386",
            "https://bugzilla.redhat.com/2430387",
            "https://bugzilla.redhat.com/2430388",
            "https://bugzilla.redhat.com/2430389",
            "https://bugzilla.redhat.com/2430390",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430375",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430376",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430377",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430378",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430379",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430380",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430381",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430386",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430387",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430388",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430389",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430390",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11187",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15467",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15468",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15469",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66199",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68160",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69418",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69420",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69421",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22795",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22796",
            "https://errata.almalinux.org/9/ALSA-2026-1473.html",
            "https://errata.rockylinux.org/RLSA-2026:1473",
            "https://github.com/openssl/openssl/commit/384011202af92605d926fafe4a0bcd6b65d162ad",
            "https://github.com/openssl/openssl/commit/475c466ef2fbd8fc1df6fae1c3eed9c813fc8ff6",
            "https://github.com/openssl/openssl/commit/4c96fbba618e1940f038012506ee9e21d32ee12c",
            "https://github.com/openssl/openssl/commit/6845c3b6460a98b1ec4e463baa2ea1a63a32d7c0",
            "https://github.com/openssl/openssl/commit/68a7cd2e2816c3a02f4d45a2ce43fc04fac97096",
            "https://linux.oracle.com/cve/CVE-2025-68160.html",
            "https://linux.oracle.com/errata/ELSA-2026-50081.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-68160",
            "https://openssl-library.org/news/secadv/20260127.txt",
            "https://ubuntu.com/security/notices/USN-7980-1",
            "https://ubuntu.com/security/notices/USN-7980-2",
            "https://www.cve.org/CVERecord?id=CVE-2025-68160"
          ],
          "PublishedDate": "2026-01-27T16:16:15.9Z",
          "LastModifiedDate": "2026-02-02T18:36:57.727Z"
        },
        {
          "VulnerabilityID": "CVE-2025-69418",
          "VendorIDs": [
            "DSA-6113-1"
          ],
          "PkgID": "openssl@3.5.4-1~deb13u1",
          "PkgName": "openssl",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/openssl@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "99a982f9528e587f",
            "BOMRef": "pkg:deb/debian/openssl@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.5.4-1~deb13u1",
          "FixedVersion": "3.5.4-1~deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:d50154ffb0874576762deecffa701d98b9e17b03d34c5aa4a43b8b04bac58980",
            "DiffID": "sha256:0c5d78238295267e2257cf5f7d99d8c3ab1de94c80e5af16ad79258917dbfd2f"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-69418",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:ddf6dd89a4701ca0ab40fc04de5d4b64b6d9d758377d53fc64a16a3d5513b27c",
          "Title": "openssl: OpenSSL: Information disclosure and data tampering via specific low-level OCB encryption/decryption calls",
          "Description": "Issue summary: When using the low-level OCB API directly with AES-NI or\u003cbr\u003eother hardware-accelerated code paths, inputs whose length is not a multiple\u003cbr\u003eof 16 bytes can leave the final partial block unencrypted and unauthenticated.\u003cbr\u003e\u003cbr\u003eImpact summary: The trailing 1-15 bytes of a message may be exposed in\u003cbr\u003ecleartext on encryption and are not covered by the authentication tag,\u003cbr\u003eallowing an attacker to read or tamper with those bytes without detection.\u003cbr\u003e\u003cbr\u003eThe low-level OCB encrypt and decrypt routines in the hardware-accelerated\u003cbr\u003estream path process full 16-byte blocks but do not advance the input/output\u003cbr\u003epointers. The subsequent tail-handling code then operates on the original\u003cbr\u003ebase pointers, effectively reprocessing the beginning of the buffer while\u003cbr\u003eleaving the actual trailing bytes unprocessed. The authentication checksum\u003cbr\u003ealso excludes the true tail bytes.\u003cbr\u003e\u003cbr\u003eHowever, typical OpenSSL consumers using EVP are not affected because the\u003cbr\u003ehigher-level EVP and provider OCB implementations split inputs so that full\u003cbr\u003eblocks and trailing partial blocks are processed in separate calls, avoiding\u003cbr\u003ethe problematic code path. Additionally, TLS does not use OCB ciphersuites.\u003cbr\u003eThe vulnerability only affects applications that call the low-level\u003cbr\u003eCRYPTO_ocb128_encrypt() or CRYPTO_ocb128_decrypt() functions directly with\u003cbr\u003enon-block-aligned lengths in a single call on hardware-accelerated builds.\u003cbr\u003eFor these reasons the issue was assessed as Low severity.\u003cbr\u003e\u003cbr\u003eThe FIPS modules in 3.6, 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected\u003cbr\u003eby this issue, as OCB mode is not a FIPS-approved algorithm.\u003cbr\u003e\u003cbr\u003eOpenSSL 3.6, 3.5, 3.4, 3.3, 3.0 and 1.1.1 are vulnerable to this issue.\u003cbr\u003e\u003cbr\u003eOpenSSL 1.0.2 is not affected by this issue.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-325"
          ],
          "VendorSeverity": {
            "alma": 3,
            "amazon": 3,
            "azure": 2,
            "cbl-mariner": 2,
            "oracle-oval": 3,
            "photon": 2,
            "redhat": 1,
            "rocky": 3,
            "ubuntu": 1
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
              "V3Score": 4
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:1473",
            "https://access.redhat.com/security/cve/CVE-2025-69418",
            "https://bugzilla.redhat.com/2430375",
            "https://bugzilla.redhat.com/2430376",
            "https://bugzilla.redhat.com/2430377",
            "https://bugzilla.redhat.com/2430378",
            "https://bugzilla.redhat.com/2430379",
            "https://bugzilla.redhat.com/2430380",
            "https://bugzilla.redhat.com/2430381",
            "https://bugzilla.redhat.com/2430386",
            "https://bugzilla.redhat.com/2430387",
            "https://bugzilla.redhat.com/2430388",
            "https://bugzilla.redhat.com/2430389",
            "https://bugzilla.redhat.com/2430390",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430375",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430376",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430377",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430378",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430379",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430380",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430381",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430386",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430387",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430388",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430389",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430390",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11187",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15467",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15468",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15469",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66199",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68160",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69418",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69420",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69421",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22795",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22796",
            "https://errata.almalinux.org/9/ALSA-2026-1473.html",
            "https://errata.rockylinux.org/RLSA-2026:1473",
            "https://github.com/openssl/openssl/commit/372fc5c77529695b05b4f5b5187691a57ef5dffc",
            "https://github.com/openssl/openssl/commit/4016975d4469cd6b94927c607f7c511385f928d8",
            "https://github.com/openssl/openssl/commit/52d23c86a54adab5ee9f80e48b242b52c4cc2347",
            "https://github.com/openssl/openssl/commit/a7589230356d908c0eca4b969ec4f62106f4f5ae",
            "https://github.com/openssl/openssl/commit/ed40856d7d4ba6cb42779b6770666a65f19cb977",
            "https://linux.oracle.com/cve/CVE-2025-69418.html",
            "https://linux.oracle.com/errata/ELSA-2026-50081.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-69418",
            "https://openssl-library.org/news/secadv/20260127.txt",
            "https://ubuntu.com/security/notices/USN-7980-1",
            "https://ubuntu.com/security/notices/USN-7980-2",
            "https://www.cve.org/CVERecord?id=CVE-2025-69418"
          ],
          "PublishedDate": "2026-01-27T16:16:33.253Z",
          "LastModifiedDate": "2026-02-02T18:36:03.557Z"
        },
        {
          "VulnerabilityID": "CVE-2025-69420",
          "VendorIDs": [
            "DSA-6113-1"
          ],
          "PkgID": "openssl@3.5.4-1~deb13u1",
          "PkgName": "openssl",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/openssl@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "99a982f9528e587f",
            "BOMRef": "pkg:deb/debian/openssl@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.5.4-1~deb13u1",
          "FixedVersion": "3.5.4-1~deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:d50154ffb0874576762deecffa701d98b9e17b03d34c5aa4a43b8b04bac58980",
            "DiffID": "sha256:0c5d78238295267e2257cf5f7d99d8c3ab1de94c80e5af16ad79258917dbfd2f"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-69420",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:17dcf902d2abf37cd1aa7e30f48e1d01a422bb36f74326f47f4299fa19f8271d",
          "Title": "openssl: OpenSSL: Denial of Service via malformed TimeStamp Response",
          "Description": "Issue summary: A type confusion vulnerability exists in the TimeStamp Response\nverification code where an ASN1_TYPE union member is accessed without first\nvalidating the type, causing an invalid or NULL pointer dereference when\nprocessing a malformed TimeStamp Response file.\n\nImpact summary: An application calling TS_RESP_verify_response() with a\nmalformed TimeStamp Response can be caused to dereference an invalid or\nNULL pointer when reading, resulting in a Denial of Service.\n\nThe functions ossl_ess_get_signing_cert() and ossl_ess_get_signing_cert_v2()\naccess the signing cert attribute value without validating its type.\nWhen the type is not V_ASN1_SEQUENCE, this results in accessing invalid memory\nthrough the ASN1_TYPE union, causing a crash.\n\nExploiting this vulnerability requires an attacker to provide a malformed\nTimeStamp Response to an application that verifies timestamp responses. The\nTimeStamp protocol (RFC 3161) is not widely used and the impact of the\nexploit is just a Denial of Service. For these reasons the issue was\nassessed as Low severity.\n\nThe FIPS modules in 3.5, 3.4, 3.3 and 3.0 are not affected by this issue,\nas the TimeStamp Response implementation is outside the OpenSSL FIPS module\nboundary.\n\nOpenSSL 3.6, 3.5, 3.4, 3.3, 3.0 and 1.1.1 are vulnerable to this issue.\n\nOpenSSL 1.0.2 is not affected by this issue.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-754"
          ],
          "VendorSeverity": {
            "alma": 3,
            "amazon": 3,
            "azure": 3,
            "cbl-mariner": 3,
            "oracle-oval": 3,
            "photon": 3,
            "redhat": 1,
            "rocky": 3,
            "ubuntu": 1
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 5.9
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:1473",
            "https://access.redhat.com/security/cve/CVE-2025-69420",
            "https://bugzilla.redhat.com/2430375",
            "https://bugzilla.redhat.com/2430376",
            "https://bugzilla.redhat.com/2430377",
            "https://bugzilla.redhat.com/2430378",
            "https://bugzilla.redhat.com/2430379",
            "https://bugzilla.redhat.com/2430380",
            "https://bugzilla.redhat.com/2430381",
            "https://bugzilla.redhat.com/2430386",
            "https://bugzilla.redhat.com/2430387",
            "https://bugzilla.redhat.com/2430388",
            "https://bugzilla.redhat.com/2430389",
            "https://bugzilla.redhat.com/2430390",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430375",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430376",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430377",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430378",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430379",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430380",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430381",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430386",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430387",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430388",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430389",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430390",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11187",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15467",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15468",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15469",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66199",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68160",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69418",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69420",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69421",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22795",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22796",
            "https://errata.almalinux.org/9/ALSA-2026-1473.html",
            "https://errata.rockylinux.org/RLSA-2026:1473",
            "https://github.com/openssl/openssl/commit/27c7012c91cc986a598d7540f3079dfde2416eb9",
            "https://github.com/openssl/openssl/commit/4e254b48ad93cc092be3dd62d97015f33f73133a",
            "https://github.com/openssl/openssl/commit/564fd9c73787f25693bf9e75faf7bf6bb1305d4e",
            "https://github.com/openssl/openssl/commit/5eb0770ffcf11b785cf374ff3c19196245e54f1b",
            "https://github.com/openssl/openssl/commit/a99349ebfc519999edc50620abe24d599b9eb085",
            "https://linux.oracle.com/cve/CVE-2025-69420.html",
            "https://linux.oracle.com/errata/ELSA-2026-50081.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-69420",
            "https://openssl-library.org/news/secadv/20260127.txt",
            "https://ubuntu.com/security/notices/USN-7980-1",
            "https://ubuntu.com/security/notices/USN-7980-2",
            "https://www.cve.org/CVERecord?id=CVE-2025-69420"
          ],
          "PublishedDate": "2026-01-27T16:16:34.317Z",
          "LastModifiedDate": "2026-02-02T18:33:30.557Z"
        },
        {
          "VulnerabilityID": "CVE-2026-22795",
          "VendorIDs": [
            "DSA-6113-1"
          ],
          "PkgID": "openssl@3.5.4-1~deb13u1",
          "PkgName": "openssl",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/openssl@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "99a982f9528e587f",
            "BOMRef": "pkg:deb/debian/openssl@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.5.4-1~deb13u1",
          "FixedVersion": "3.5.4-1~deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:d50154ffb0874576762deecffa701d98b9e17b03d34c5aa4a43b8b04bac58980",
            "DiffID": "sha256:0c5d78238295267e2257cf5f7d99d8c3ab1de94c80e5af16ad79258917dbfd2f"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-22795",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:77a8d3d63ca0bed59d9ba293e35cc5ed48f75c739c5fe0df47c4a5c6c731b0b3",
          "Title": "openssl: OpenSSL: Denial of Service due to type confusion in PKCS#12 file processing",
          "Description": "Issue summary: An invalid or NULL pointer dereference can happen in\nan application processing a malformed PKCS#12 file.\n\nImpact summary: An application processing a malformed PKCS#12 file can be\ncaused to dereference an invalid or NULL pointer on memory read, resulting\nin a Denial of Service.\n\nA type confusion vulnerability exists in PKCS#12 parsing code where\nan ASN1_TYPE union member is accessed without first validating the type,\ncausing an invalid pointer read.\n\nThe location is constrained to a 1-byte address space, meaning any\nattempted pointer manipulation can only target addresses between 0x00 and 0xFF.\nThis range corresponds to the zero page, which is unmapped on most modern\noperating systems and will reliably result in a crash, leading only to a\nDenial of Service. Exploiting this issue also requires a user or application\nto process a maliciously crafted PKCS#12 file. It is uncommon to accept\nuntrusted PKCS#12 files in applications as they are usually used to store\nprivate keys which are trusted by definition. For these reasons, the issue\nwas assessed as Low severity.\n\nThe FIPS modules in 3.5, 3.4, 3.3 and 3.0 are not affected by this issue,\nas the PKCS12 implementation is outside the OpenSSL FIPS module boundary.\n\nOpenSSL 3.6, 3.5, 3.4, 3.3, 3.0 and 1.1.1 are vulnerable to this issue.\n\nOpenSSL 1.0.2 is not affected by this issue.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-754"
          ],
          "VendorSeverity": {
            "alma": 3,
            "amazon": 3,
            "azure": 2,
            "cbl-mariner": 2,
            "oracle-oval": 3,
            "photon": 2,
            "redhat": 1,
            "rocky": 3,
            "ubuntu": 1
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
              "V3Score": 5.5
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:1473",
            "https://access.redhat.com/security/cve/CVE-2026-22795",
            "https://bugzilla.redhat.com/2430375",
            "https://bugzilla.redhat.com/2430376",
            "https://bugzilla.redhat.com/2430377",
            "https://bugzilla.redhat.com/2430378",
            "https://bugzilla.redhat.com/2430379",
            "https://bugzilla.redhat.com/2430380",
            "https://bugzilla.redhat.com/2430381",
            "https://bugzilla.redhat.com/2430386",
            "https://bugzilla.redhat.com/2430387",
            "https://bugzilla.redhat.com/2430388",
            "https://bugzilla.redhat.com/2430389",
            "https://bugzilla.redhat.com/2430390",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430375",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430376",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430377",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430378",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430379",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430380",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430381",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430386",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430387",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430388",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430389",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430390",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11187",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15467",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15468",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15469",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66199",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68160",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69418",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69420",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69421",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22795",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22796",
            "https://errata.almalinux.org/9/ALSA-2026-1473.html",
            "https://errata.rockylinux.org/RLSA-2026:1473",
            "https://github.com/openssl/openssl/commit/2502e7b7d4c0cf4f972a881641fe09edc67aeec4",
            "https://github.com/openssl/openssl/commit/572844beca95068394c916626a6d3a490f831a49",
            "https://github.com/openssl/openssl/commit/7bbca05be55b129651d9df4bdb92becc45002c12",
            "https://github.com/openssl/openssl/commit/eeee3cbd4d682095ed431052f00403004596373e",
            "https://github.com/openssl/openssl/commit/ef2fb66ec571564d64d1c74a12e388a2a54d05d2",
            "https://linux.oracle.com/cve/CVE-2026-22795.html",
            "https://linux.oracle.com/errata/ELSA-2026-50081.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-22795",
            "https://openssl-library.org/news/secadv/20260127.txt",
            "https://ubuntu.com/security/notices/USN-7980-1",
            "https://ubuntu.com/security/notices/USN-7980-2",
            "https://www.cve.org/CVERecord?id=CVE-2026-22795"
          ],
          "PublishedDate": "2026-01-27T16:16:35.43Z",
          "LastModifiedDate": "2026-02-02T18:41:14.917Z"
        },
        {
          "VulnerabilityID": "CVE-2026-22796",
          "VendorIDs": [
            "DSA-6113-1"
          ],
          "PkgID": "openssl@3.5.4-1~deb13u1",
          "PkgName": "openssl",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/openssl@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "99a982f9528e587f",
            "BOMRef": "pkg:deb/debian/openssl@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.5.4-1~deb13u1",
          "FixedVersion": "3.5.4-1~deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:d50154ffb0874576762deecffa701d98b9e17b03d34c5aa4a43b8b04bac58980",
            "DiffID": "sha256:0c5d78238295267e2257cf5f7d99d8c3ab1de94c80e5af16ad79258917dbfd2f"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-22796",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:9417bcad1247ad55c2d626a5155a8bb93c20254025774e911abbc00e25e62a87",
          "Title": "openssl: OpenSSL: Denial of Service via type confusion in PKCS#7 signature verification",
          "Description": "Issue summary: A type confusion vulnerability exists in the signature\nverification of signed PKCS#7 data where an ASN1_TYPE union member is\naccessed without first validating the type, causing an invalid or NULL\npointer dereference when processing malformed PKCS#7 data.\n\nImpact summary: An application performing signature verification of PKCS#7\ndata or calling directly the PKCS7_digest_from_attributes() function can be\ncaused to dereference an invalid or NULL pointer when reading, resulting in\na Denial of Service.\n\nThe function PKCS7_digest_from_attributes() accesses the message digest attribute\nvalue without validating its type. When the type is not V_ASN1_OCTET_STRING,\nthis results in accessing invalid memory through the ASN1_TYPE union, causing\na crash.\n\nExploiting this vulnerability requires an attacker to provide a malformed\nsigned PKCS#7 to an application that verifies it. The impact of the\nexploit is just a Denial of Service, the PKCS7 API is legacy and applications\nshould be using the CMS API instead. For these reasons the issue was\nassessed as Low severity.\n\nThe FIPS modules in 3.5, 3.4, 3.3 and 3.0 are not affected by this issue,\nas the PKCS#7 parsing implementation is outside the OpenSSL FIPS module\nboundary.\n\nOpenSSL 3.6, 3.5, 3.4, 3.3, 3.0, 1.1.1 and 1.0.2 are vulnerable to this issue.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-754"
          ],
          "VendorSeverity": {
            "alma": 3,
            "amazon": 3,
            "azure": 2,
            "cbl-mariner": 2,
            "oracle-oval": 3,
            "photon": 2,
            "redhat": 1,
            "rocky": 3,
            "ubuntu": 1
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 5.9
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:1473",
            "https://access.redhat.com/security/cve/CVE-2026-22796",
            "https://bugzilla.redhat.com/2430375",
            "https://bugzilla.redhat.com/2430376",
            "https://bugzilla.redhat.com/2430377",
            "https://bugzilla.redhat.com/2430378",
            "https://bugzilla.redhat.com/2430379",
            "https://bugzilla.redhat.com/2430380",
            "https://bugzilla.redhat.com/2430381",
            "https://bugzilla.redhat.com/2430386",
            "https://bugzilla.redhat.com/2430387",
            "https://bugzilla.redhat.com/2430388",
            "https://bugzilla.redhat.com/2430389",
            "https://bugzilla.redhat.com/2430390",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430375",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430376",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430377",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430378",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430379",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430380",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430381",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430386",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430387",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430388",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430389",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430390",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11187",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15467",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15468",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15469",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66199",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68160",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69418",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69420",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69421",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22795",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22796",
            "https://errata.almalinux.org/9/ALSA-2026-1473.html",
            "https://errata.rockylinux.org/RLSA-2026:1473",
            "https://github.com/openssl/openssl/commit/2502e7b7d4c0cf4f972a881641fe09edc67aeec4",
            "https://github.com/openssl/openssl/commit/572844beca95068394c916626a6d3a490f831a49",
            "https://github.com/openssl/openssl/commit/7bbca05be55b129651d9df4bdb92becc45002c12",
            "https://github.com/openssl/openssl/commit/eeee3cbd4d682095ed431052f00403004596373e",
            "https://github.com/openssl/openssl/commit/ef2fb66ec571564d64d1c74a12e388a2a54d05d2",
            "https://linux.oracle.com/cve/CVE-2026-22796.html",
            "https://linux.oracle.com/errata/ELSA-2026-50081.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-22796",
            "https://openssl-library.org/news/secadv/20260127.txt",
            "https://ubuntu.com/security/notices/USN-7980-1",
            "https://ubuntu.com/security/notices/USN-7980-2",
            "https://www.cve.org/CVERecord?id=CVE-2026-22796"
          ],
          "PublishedDate": "2026-01-27T16:16:35.543Z",
          "LastModifiedDate": "2026-02-02T18:40:27.467Z"
        },
        {
          "VulnerabilityID": "CVE-2026-2673",
          "PkgID": "openssl@3.5.4-1~deb13u1",
          "PkgName": "openssl",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/openssl@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "99a982f9528e587f",
            "BOMRef": "pkg:deb/debian/openssl@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.5.4-1~deb13u1",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:d50154ffb0874576762deecffa701d98b9e17b03d34c5aa4a43b8b04bac58980",
            "DiffID": "sha256:0c5d78238295267e2257cf5f7d99d8c3ab1de94c80e5af16ad79258917dbfd2f"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-2673",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:c4bdb47c75519b21190b277fc4edae80cdd30089fc07f57f43a536cc582ba6f6",
          "Title": "openssl: OpenSSL TLS 1.3 server may choose unexpected key agreement group",
          "Description": "Issue summary: An OpenSSL TLS 1.3 server may fail to negotiate the expected\npreferred key exchange group when its key exchange group configuration includes\nthe default by using the 'DEFAULT' keyword.\n\nImpact summary: A less preferred key exchange may be used even when a more\npreferred group is supported by both client and server, if the group\nwas not included among the client's initial predicated keyshares.\nThis will sometimes be the case with the new hybrid post-quantum groups,\nif the client chooses to defer their use until specifically requested by\nthe server.\n\nIf an OpenSSL TLS 1.3 server's configuration uses the 'DEFAULT' keyword to\ninterpolate the built-in default group list into its own configuration, perhaps\nadding or removing specific elements, then an implementation defect causes the\n'DEFAULT' list to lose its 'tuple' structure, and all server-supported groups\nwere treated as a single sufficiently secure 'tuple', with the server not\nsending a Hello Retry Request (HRR) even when a group in a more preferred tuple\nwas mutually supported.\n\nAs a result, the client and server might fail to negotiate a mutually supported\npost-quantum key agreement group, such as 'X25519MLKEM768', if the client's\nconfiguration results in only 'classical' groups (such as 'X25519' being the\nonly ones in the client's initial keyshare prediction).\n\nOpenSSL 3.5 and later support a new syntax for selecting the most preferred TLS\n1.3 key agreement group on TLS servers.  The old syntax had a single 'flat'\nlist of groups, and treated all the supported groups as sufficiently secure.\nIf any of the keyshares predicted by the client were supported by the server\nthe most preferred among these was selected, even if other groups supported by\nthe client, but not included in the list of predicted keyshares would have been\nmore preferred, if included.\n\nThe new syntax partitions the groups into distinct 'tuples' of roughly\nequivalent security.  Within each tuple the most preferred group included among\nthe client's predicted keyshares is chosen, but if the client supports a group\nfrom a more preferred tuple, but did not predict any corresponding keyshares,\nthe server will ask the client to retry the ClientHello (by issuing a Hello\nRetry Request or HRR) with the most preferred mutually supported group.\n\nThe above works as expected when the server's configuration uses the built-in\ndefault group list, or explicitly defines its own list by directly defining the\nvarious desired groups and group 'tuples'.\n\nNo OpenSSL FIPS modules are affected by this issue, the code in question lies\noutside the FIPS boundary.\n\nOpenSSL 3.6 and 3.5 are vulnerable to this issue.\n\nOpenSSL 3.6 users should upgrade to OpenSSL 3.6.2 once it is released.\nOpenSSL 3.5 users should upgrade to OpenSSL 3.5.6 once it is released.\n\nOpenSSL 3.4, 3.3, 3.0, 1.0.2 and 1.1.1 are not affected by this issue.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-757"
          ],
          "VendorSeverity": {
            "amazon": 1,
            "redhat": 1,
            "ubuntu": 1
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N",
              "V3Score": 3.1
            }
          },
          "References": [
            "http://www.openwall.com/lists/oss-security/2026/03/13/3",
            "https://access.redhat.com/security/cve/CVE-2026-2673",
            "https://github.com/openssl/openssl/commit/2157c9d81f7b0bd7dfa25b960e928ec28e8dd63f",
            "https://github.com/openssl/openssl/commit/85977e013f32ceb96aa034c0e741adddc1a05e34",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-2673",
            "https://openssl-library.org/news/secadv/20260313.txt",
            "https://www.cve.org/CVERecord?id=CVE-2026-2673"
          ],
          "PublishedDate": "2026-03-13T19:54:34.033Z",
          "LastModifiedDate": "2026-03-17T18:16:15.6Z"
        },
        {
          "VulnerabilityID": "CVE-2025-15467",
          "VendorIDs": [
            "DSA-6113-1"
          ],
          "PkgID": "openssl-provider-legacy@3.5.4-1~deb13u1",
          "PkgName": "openssl-provider-legacy",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/openssl-provider-legacy@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "4e98403ba60a7e46",
            "BOMRef": "pkg:deb/debian/openssl-provider-legacy@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.5.4-1~deb13u1",
          "FixedVersion": "3.5.4-1~deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-15467",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:a269a6712116140380dc503c73be5672133c4ecf7bdddfdd6012f05fcf1c40d9",
          "Title": "openssl: OpenSSL: Remote code execution or Denial of Service via oversized Initialization Vector in CMS parsing",
          "Description": "Issue summary: Parsing CMS AuthEnvelopedData or EnvelopedData message with\nmaliciously crafted AEAD parameters can trigger a stack buffer overflow.\n\nImpact summary: A stack buffer overflow may lead to a crash, causing Denial\nof Service, or potentially remote code execution.\n\nWhen parsing CMS (Auth)EnvelopedData structures that use AEAD ciphers such as\nAES-GCM, the IV (Initialization Vector) encoded in the ASN.1 parameters is\ncopied into a fixed-size stack buffer without verifying that its length fits\nthe destination. An attacker can supply a crafted CMS message with an\noversized IV, causing a stack-based out-of-bounds write before any\nauthentication or tag verification occurs.\n\nApplications and services that parse untrusted CMS or PKCS#7 content using\nAEAD ciphers (e.g., S/MIME (Auth)EnvelopedData with AES-GCM) are vulnerable.\nBecause the overflow occurs prior to authentication, no valid key material\nis required to trigger it. While exploitability to remote code execution\ndepends on platform and toolchain mitigations, the stack-based write\nprimitive represents a severe risk.\n\nThe FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this\nissue, as the CMS implementation is outside the OpenSSL FIPS module\nboundary.\n\nOpenSSL 3.6, 3.5, 3.4, 3.3 and 3.0 are vulnerable to this issue.\n\nOpenSSL 1.1.1 and 1.0.2 are not affected by this issue.",
          "Severity": "CRITICAL",
          "CweIDs": [
            "CWE-787"
          ],
          "VendorSeverity": {
            "alma": 3,
            "amazon": 3,
            "azure": 4,
            "oracle-oval": 3,
            "photon": 3,
            "redhat": 3,
            "rocky": 3,
            "ubuntu": 2
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
              "V3Score": 9.8
            }
          },
          "References": [
            "http://www.openwall.com/lists/oss-security/2026/01/27/10",
            "http://www.openwall.com/lists/oss-security/2026/02/25/6",
            "https://access.redhat.com/errata/RHSA-2026:1473",
            "https://access.redhat.com/security/cve/CVE-2025-15467",
            "https://bugzilla.redhat.com/2430375",
            "https://bugzilla.redhat.com/2430376",
            "https://bugzilla.redhat.com/2430377",
            "https://bugzilla.redhat.com/2430378",
            "https://bugzilla.redhat.com/2430379",
            "https://bugzilla.redhat.com/2430380",
            "https://bugzilla.redhat.com/2430381",
            "https://bugzilla.redhat.com/2430386",
            "https://bugzilla.redhat.com/2430387",
            "https://bugzilla.redhat.com/2430388",
            "https://bugzilla.redhat.com/2430389",
            "https://bugzilla.redhat.com/2430390",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430375",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430376",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430377",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430378",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430379",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430380",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430381",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430386",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430387",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430388",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430389",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430390",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11187",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15467",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15468",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15469",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66199",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68160",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69418",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69420",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69421",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22795",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22796",
            "https://errata.almalinux.org/9/ALSA-2026-1473.html",
            "https://errata.rockylinux.org/RLSA-2026:1473",
            "https://github.com/guiimoraes/CVE-2025-15467",
            "https://github.com/openssl/openssl/commit/2c8f0e5fa9b6ee5508a0349e4572ddb74db5a703",
            "https://github.com/openssl/openssl/commit/5f26d4202f5b89664c5c3f3c62086276026ba9a9",
            "https://github.com/openssl/openssl/commit/6ced0fe6b10faa560e410e3ee8d6c82f06c65ea3",
            "https://github.com/openssl/openssl/commit/ce39170276daec87f55c39dad1f629b56344429e",
            "https://github.com/openssl/openssl/commit/d0071a0799f20cc8101730145349ed4487c268dc",
            "https://linux.oracle.com/cve/CVE-2025-15467.html",
            "https://linux.oracle.com/errata/ELSA-2026-50081.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-15467",
            "https://openssl-library.org/news/secadv/20260127.txt",
            "https://ubuntu.com/security/notices/USN-7980-1",
            "https://www.cve.org/CVERecord?id=CVE-2025-15467"
          ],
          "PublishedDate": "2026-01-27T16:16:14.257Z",
          "LastModifiedDate": "2026-03-19T19:16:19.23Z"
        },
        {
          "VulnerabilityID": "CVE-2025-69419",
          "VendorIDs": [
            "DSA-6113-1"
          ],
          "PkgID": "openssl-provider-legacy@3.5.4-1~deb13u1",
          "PkgName": "openssl-provider-legacy",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/openssl-provider-legacy@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "4e98403ba60a7e46",
            "BOMRef": "pkg:deb/debian/openssl-provider-legacy@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.5.4-1~deb13u1",
          "FixedVersion": "3.5.4-1~deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-69419",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:40a38e4117ac2aafb692f0495a221f145c9c60513f019b3b0ae0cc7eea5e79d8",
          "Title": "openssl: OpenSSL: Arbitrary code execution due to out-of-bounds write in PKCS#12 processing",
          "Description": "Issue summary: Calling PKCS12_get_friendlyname() function on a maliciously\ncrafted PKCS#12 file with a BMPString (UTF-16BE) friendly name containing\nnon-ASCII BMP code point can trigger a one byte write before the allocated\nbuffer.\n\nImpact summary: The out-of-bounds write can cause a memory corruption\nwhich can have various consequences including a Denial of Service.\n\nThe OPENSSL_uni2utf8() function performs a two-pass conversion of a PKCS#12\nBMPString (UTF-16BE) to UTF-8. In the second pass, when emitting UTF-8 bytes,\nthe helper function bmp_to_utf8() incorrectly forwards the remaining UTF-16\nsource byte count as the destination buffer capacity to UTF8_putc(). For BMP\ncode points above U+07FF, UTF-8 requires three bytes, but the forwarded\ncapacity can be just two bytes. UTF8_putc() then returns -1, and this negative\nvalue is added to the output length without validation, causing the\nlength to become negative. The subsequent trailing NUL byte is then written\nat a negative offset, causing write outside of heap allocated buffer.\n\nThe vulnerability is reachable via the public PKCS12_get_friendlyname() API\nwhen parsing attacker-controlled PKCS#12 files. While PKCS12_parse() uses a\ndifferent code path that avoids this issue, PKCS12_get_friendlyname() directly\ninvokes the vulnerable function. Exploitation requires an attacker to provide\na malicious PKCS#12 file to be parsed by the application and the attacker\ncan just trigger a one zero byte write before the allocated buffer.\nFor that reason the issue was assessed as Low severity according to our\nSecurity Policy.\n\nThe FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue,\nas the PKCS#12 implementation is outside the OpenSSL FIPS module boundary.\n\nOpenSSL 3.6, 3.5, 3.4, 3.3, 3.0 and 1.1.1 are vulnerable to this issue.\n\nOpenSSL 1.0.2 is not affected by this issue.",
          "Severity": "HIGH",
          "CweIDs": [
            "CWE-787"
          ],
          "VendorSeverity": {
            "alma": 2,
            "amazon": 3,
            "azure": 3,
            "cbl-mariner": 3,
            "oracle-oval": 2,
            "photon": 3,
            "redhat": 2,
            "rocky": 3,
            "ubuntu": 1
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
              "V3Score": 7.4
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:4472",
            "https://access.redhat.com/security/cve/CVE-2025-69419",
            "https://bugzilla.redhat.com/2430386",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430375",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430376",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430377",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430378",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430379",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430380",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430381",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430386",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430387",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430388",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430389",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430390",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11187",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15467",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15468",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15469",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66199",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68160",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69418",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69420",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69421",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22795",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22796",
            "https://errata.almalinux.org/9/ALSA-2026-4472.html",
            "https://errata.rockylinux.org/RLSA-2026:1473",
            "https://github.com/openssl/openssl/commit/41be0f216404f14457bbf3b9cc488dba60b49296",
            "https://github.com/openssl/openssl/commit/7e9cac9832e4705b91987c2474ed06a37a93cecb",
            "https://github.com/openssl/openssl/commit/a26a90d38edec3748566129d824e664b54bee2e2",
            "https://github.com/openssl/openssl/commit/cda12de3bc0e333ea8d2c6fd15001dbdaf280015",
            "https://github.com/openssl/openssl/commit/ff628933755075446bca8307e8417c14d164b535",
            "https://linux.oracle.com/cve/CVE-2025-69419.html",
            "https://linux.oracle.com/errata/ELSA-2026-50131.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-69419",
            "https://openssl-library.org/news/secadv/20260127.txt",
            "https://ubuntu.com/security/notices/USN-7980-1",
            "https://ubuntu.com/security/notices/USN-7980-2",
            "https://www.cve.org/CVERecord?id=CVE-2025-69419"
          ],
          "PublishedDate": "2026-01-27T16:16:34.113Z",
          "LastModifiedDate": "2026-02-02T18:35:02.177Z"
        },
        {
          "VulnerabilityID": "CVE-2025-69421",
          "VendorIDs": [
            "DSA-6113-1"
          ],
          "PkgID": "openssl-provider-legacy@3.5.4-1~deb13u1",
          "PkgName": "openssl-provider-legacy",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/openssl-provider-legacy@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "4e98403ba60a7e46",
            "BOMRef": "pkg:deb/debian/openssl-provider-legacy@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.5.4-1~deb13u1",
          "FixedVersion": "3.5.4-1~deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "SeveritySource": "nvd",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-69421",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:f35085363273f96706db697e5c265e5131b320cf90f577ebd7e8dfd21da6c5d5",
          "Title": "openssl: OpenSSL: Denial of Service via malformed PKCS#12 file processing",
          "Description": "Issue summary: Processing a malformed PKCS#12 file can trigger a NULL pointer\ndereference in the PKCS12_item_decrypt_d2i_ex() function.\n\nImpact summary: A NULL pointer dereference can trigger a crash which leads to\nDenial of Service for an application processing PKCS#12 files.\n\nThe PKCS12_item_decrypt_d2i_ex() function does not check whether the oct\nparameter is NULL before dereferencing it. When called from\nPKCS12_unpack_p7encdata() with a malformed PKCS#12 file, this parameter can\nbe NULL, causing a crash. The vulnerability is limited to Denial of Service\nand cannot be escalated to achieve code execution or memory disclosure.\n\nExploiting this issue requires an attacker to provide a malformed PKCS#12 file\nto an application that processes it. For that reason the issue was assessed as\nLow severity according to our Security Policy.\n\nThe FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue,\nas the PKCS#12 implementation is outside the OpenSSL FIPS module boundary.\n\nOpenSSL 3.6, 3.5, 3.4, 3.3, 3.0, 1.1.1 and 1.0.2 are vulnerable to this issue.",
          "Severity": "HIGH",
          "CweIDs": [
            "CWE-476"
          ],
          "VendorSeverity": {
            "alma": 3,
            "amazon": 3,
            "azure": 2,
            "cbl-mariner": 2,
            "nvd": 3,
            "oracle-oval": 3,
            "photon": 3,
            "redhat": 1,
            "rocky": 3,
            "ubuntu": 1
          },
          "CVSS": {
            "nvd": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 7.5
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
              "V3Score": 6.5
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:1473",
            "https://access.redhat.com/security/cve/CVE-2025-69421",
            "https://bugzilla.redhat.com/2430375",
            "https://bugzilla.redhat.com/2430376",
            "https://bugzilla.redhat.com/2430377",
            "https://bugzilla.redhat.com/2430378",
            "https://bugzilla.redhat.com/2430379",
            "https://bugzilla.redhat.com/2430380",
            "https://bugzilla.redhat.com/2430381",
            "https://bugzilla.redhat.com/2430386",
            "https://bugzilla.redhat.com/2430387",
            "https://bugzilla.redhat.com/2430388",
            "https://bugzilla.redhat.com/2430389",
            "https://bugzilla.redhat.com/2430390",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430375",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430376",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430377",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430378",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430379",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430380",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430381",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430386",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430387",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430388",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430389",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430390",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11187",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15467",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15468",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15469",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66199",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68160",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69418",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69420",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69421",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22795",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22796",
            "https://errata.almalinux.org/9/ALSA-2026-1473.html",
            "https://errata.rockylinux.org/RLSA-2026:1473",
            "https://github.com/openssl/openssl/commit/3524a29271f8191b8fd8a5257eb05173982a097b",
            "https://github.com/openssl/openssl/commit/36ecb4960872a4ce04bf6f1e1f4e78d75ec0c0c7",
            "https://github.com/openssl/openssl/commit/4bbc8d41a72c842ce4077a8a3eccd1109aaf74bd",
            "https://github.com/openssl/openssl/commit/643986985cd1c21221f941129d76fe0c2785aeb3",
            "https://github.com/openssl/openssl/commit/a2dbc539f0f9cc63832709fa5aa33ad9495eb19c",
            "https://linux.oracle.com/cve/CVE-2025-69421.html",
            "https://linux.oracle.com/errata/ELSA-2026-50081.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-69421",
            "https://openssl-library.org/news/secadv/20260127.txt",
            "https://ubuntu.com/security/notices/USN-7980-1",
            "https://ubuntu.com/security/notices/USN-7980-2",
            "https://www.cve.org/CVERecord?id=CVE-2025-69421"
          ],
          "PublishedDate": "2026-01-27T16:16:34.437Z",
          "LastModifiedDate": "2026-02-28T04:16:17.457Z"
        },
        {
          "VulnerabilityID": "CVE-2025-11187",
          "PkgID": "openssl-provider-legacy@3.5.4-1~deb13u1",
          "PkgName": "openssl-provider-legacy",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/openssl-provider-legacy@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "4e98403ba60a7e46",
            "BOMRef": "pkg:deb/debian/openssl-provider-legacy@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.5.4-1~deb13u1",
          "FixedVersion": "3.5.4-1~deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-11187",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:22e8a36a67c491c08dae4973b305c9c841626c9583fdbb3ad5abd58a33fa8c72",
          "Title": "openssl: OpenSSL: Arbitrary code execution or denial of service through crafted PKCS#12 file",
          "Description": "Issue summary: PBMAC1 parameters in PKCS#12 files are missing validation\nwhich can trigger a stack-based buffer overflow, invalid pointer or NULL\npointer dereference during MAC verification.\n\nImpact summary: The stack buffer overflow or NULL pointer dereference may\ncause a crash leading to Denial of Service for an application that parses\nuntrusted PKCS#12 files. The buffer overflow may also potentially enable\ncode execution depending on platform mitigations.\n\nWhen verifying a PKCS#12 file that uses PBMAC1 for the MAC, the PBKDF2\nsalt and keylength parameters from the file are used without validation.\nIf the value of keylength exceeds the size of the fixed stack buffer used\nfor the derived key (64 bytes), the key derivation will overflow the buffer.\nThe overflow length is attacker-controlled. Also, if the salt parameter is\nnot an OCTET STRING type this can lead to invalid or NULL pointer\ndereference.\n\nExploiting this issue requires a user or application to process\na maliciously crafted PKCS#12 file. It is uncommon to accept untrusted\nPKCS#12 files in applications as they are usually used to store private\nkeys which are trusted by definition. For this reason the issue was assessed\nas Moderate severity.\n\nThe FIPS modules in 3.6, 3.5 and 3.4 are not affected by this issue, as\nPKCS#12 processing is outside the OpenSSL FIPS module boundary.\n\nOpenSSL 3.6, 3.5 and 3.4 are vulnerable to this issue.\n\nOpenSSL 3.3, 3.0, 1.1.1 and 1.0.2 are not affected by this issue as they do\nnot support PBMAC1 in PKCS#12.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-476",
            "CWE-787"
          ],
          "VendorSeverity": {
            "alma": 3,
            "oracle-oval": 3,
            "redhat": 2,
            "rocky": 3,
            "ubuntu": 2
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H",
              "V3Score": 6.1
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:1473",
            "https://access.redhat.com/security/cve/CVE-2025-11187",
            "https://bugzilla.redhat.com/2430375",
            "https://bugzilla.redhat.com/2430376",
            "https://bugzilla.redhat.com/2430377",
            "https://bugzilla.redhat.com/2430378",
            "https://bugzilla.redhat.com/2430379",
            "https://bugzilla.redhat.com/2430380",
            "https://bugzilla.redhat.com/2430381",
            "https://bugzilla.redhat.com/2430386",
            "https://bugzilla.redhat.com/2430387",
            "https://bugzilla.redhat.com/2430388",
            "https://bugzilla.redhat.com/2430389",
            "https://bugzilla.redhat.com/2430390",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430375",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430376",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430377",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430378",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430379",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430380",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430381",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430386",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430387",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430388",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430389",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430390",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11187",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15467",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15468",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15469",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66199",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68160",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69418",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69420",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69421",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22795",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22796",
            "https://errata.almalinux.org/9/ALSA-2026-1473.html",
            "https://errata.rockylinux.org/RLSA-2026:1473",
            "https://github.com/metadust/CVE-2025-11187",
            "https://github.com/openssl/openssl/commit/205e3a55e16e4bd08c12fdbd3416ab829c0f6206",
            "https://github.com/openssl/openssl/commit/8caf359d6e46fb413e8f5f0df765d2e8a51df4e8",
            "https://github.com/openssl/openssl/commit/e1079bc17ed93ff16f6b86f33a2fe3336e78817e",
            "https://linux.oracle.com/cve/CVE-2025-11187.html",
            "https://linux.oracle.com/errata/ELSA-2026-50081.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-11187",
            "https://openssl-library.org/news/secadv/20260127.txt",
            "https://ubuntu.com/security/notices/USN-7980-1",
            "https://www.cve.org/CVERecord?id=CVE-2025-11187"
          ],
          "PublishedDate": "2026-01-27T16:16:14.093Z",
          "LastModifiedDate": "2026-03-20T14:16:13.89Z"
        },
        {
          "VulnerabilityID": "CVE-2025-15468",
          "PkgID": "openssl-provider-legacy@3.5.4-1~deb13u1",
          "PkgName": "openssl-provider-legacy",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/openssl-provider-legacy@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "4e98403ba60a7e46",
            "BOMRef": "pkg:deb/debian/openssl-provider-legacy@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.5.4-1~deb13u1",
          "FixedVersion": "3.5.4-1~deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-15468",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:7f0c61f33e50a510270426d2dd7b39bbd0bc00a0e6c072ed21fbf9e1c9592a36",
          "Title": "openssl: OpenSSL: Denial of Service via NULL pointer dereference in QUIC protocol handling",
          "Description": "Issue summary: If an application using the SSL_CIPHER_find() function in\na QUIC protocol client or server receives an unknown cipher suite from\nthe peer, a NULL dereference occurs.\n\nImpact summary: A NULL pointer dereference leads to abnormal termination of\nthe running process causing Denial of Service.\n\nSome applications call SSL_CIPHER_find() from the client_hello_cb callback\non the cipher ID received from the peer. If this is done with an SSL object\nimplementing the QUIC protocol, NULL pointer dereference will happen if\nthe examined cipher ID is unknown or unsupported.\n\nAs it is not very common to call this function in applications using the QUIC \nprotocol and the worst outcome is Denial of Service, the issue was assessed\nas Low severity.\n\nThe vulnerable code was introduced in the 3.2 version with the addition\nof the QUIC protocol support.\n\nThe FIPS modules in 3.6, 3.5, 3.4 and 3.3 are not affected by this issue,\nas the QUIC implementation is outside the OpenSSL FIPS module boundary.\n\nOpenSSL 3.6, 3.5, 3.4 and 3.3 are vulnerable to this issue.\n\nOpenSSL 3.0, 1.1.1 and 1.0.2 are not affected by this issue.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-476"
          ],
          "VendorSeverity": {
            "alma": 3,
            "amazon": 3,
            "azure": 2,
            "oracle-oval": 3,
            "photon": 2,
            "redhat": 1,
            "rocky": 3,
            "ubuntu": 1
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 5.9
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:1473",
            "https://access.redhat.com/security/cve/CVE-2025-15468",
            "https://bugzilla.redhat.com/2430375",
            "https://bugzilla.redhat.com/2430376",
            "https://bugzilla.redhat.com/2430377",
            "https://bugzilla.redhat.com/2430378",
            "https://bugzilla.redhat.com/2430379",
            "https://bugzilla.redhat.com/2430380",
            "https://bugzilla.redhat.com/2430381",
            "https://bugzilla.redhat.com/2430386",
            "https://bugzilla.redhat.com/2430387",
            "https://bugzilla.redhat.com/2430388",
            "https://bugzilla.redhat.com/2430389",
            "https://bugzilla.redhat.com/2430390",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430375",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430376",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430377",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430378",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430379",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430380",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430381",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430386",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430387",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430388",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430389",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430390",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11187",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15467",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15468",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15469",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66199",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68160",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69418",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69420",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69421",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22795",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22796",
            "https://errata.almalinux.org/9/ALSA-2026-1473.html",
            "https://errata.rockylinux.org/RLSA-2026:1473",
            "https://github.com/openssl/openssl/commit/1f08e54bad32843044fe8a675948d65e3b4ece65",
            "https://github.com/openssl/openssl/commit/7c88376731c589ee5b36116c5a6e32d5ae5f7ae2",
            "https://github.com/openssl/openssl/commit/b2539639400288a4580fe2d76247541b976bade4",
            "https://github.com/openssl/openssl/commit/d75b309879631d45b972396ce4e5102559c64ac7",
            "https://linux.oracle.com/cve/CVE-2025-15468.html",
            "https://linux.oracle.com/errata/ELSA-2026-50081.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-15468",
            "https://openssl-library.org/news/secadv/20260127.txt",
            "https://ubuntu.com/security/notices/USN-7980-1",
            "https://www.cve.org/CVERecord?id=CVE-2025-15468"
          ],
          "PublishedDate": "2026-01-27T16:16:14.4Z",
          "LastModifiedDate": "2026-02-02T18:38:00.947Z"
        },
        {
          "VulnerabilityID": "CVE-2025-15469",
          "PkgID": "openssl-provider-legacy@3.5.4-1~deb13u1",
          "PkgName": "openssl-provider-legacy",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/openssl-provider-legacy@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "4e98403ba60a7e46",
            "BOMRef": "pkg:deb/debian/openssl-provider-legacy@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.5.4-1~deb13u1",
          "FixedVersion": "3.5.4-1~deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-15469",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:d6e6a2c287fef4f3feab198e7ab11c780a9cef07ec24c8d3043d5615e2119e87",
          "Title": "openssl: OpenSSL: Data integrity bypass in `openssl dgst` command due to silent truncation",
          "Description": "Issue summary: The 'openssl dgst' command-line tool silently truncates input\ndata to 16MB when using one-shot signing algorithms and reports success instead\nof an error.\n\nImpact summary: A user signing or verifying files larger than 16MB with\none-shot algorithms (such as Ed25519, Ed448, or ML-DSA) may believe the entire\nfile is authenticated while trailing data beyond 16MB remains unauthenticated.\n\nWhen the 'openssl dgst' command is used with algorithms that only support\none-shot signing (Ed25519, Ed448, ML-DSA-44, ML-DSA-65, ML-DSA-87), the input\nis buffered with a 16MB limit. If the input exceeds this limit, the tool\nsilently truncates to the first 16MB and continues without signaling an error,\ncontrary to what the documentation states. This creates an integrity gap where\ntrailing bytes can be modified without detection if both signing and\nverification are performed using the same affected codepath.\n\nThe issue affects only the command-line tool behavior. Verifiers that process\nthe full message using library APIs will reject the signature, so the risk\nprimarily affects workflows that both sign and verify with the affected\n'openssl dgst' command. Streaming digest algorithms for 'openssl dgst' and\nlibrary users are unaffected.\n\nThe FIPS modules in 3.5 and 3.6 are not affected by this issue, as the\ncommand-line tools are outside the OpenSSL FIPS module boundary.\n\nOpenSSL 3.5 and 3.6 are vulnerable to this issue.\n\nOpenSSL 3.4, 3.3, 3.0, 1.1.1 and 1.0.2 are not affected by this issue.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-347"
          ],
          "VendorSeverity": {
            "alma": 3,
            "oracle-oval": 3,
            "photon": 2,
            "redhat": 1,
            "rocky": 3,
            "ubuntu": 1
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
              "V3Score": 5.5
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:1473",
            "https://access.redhat.com/security/cve/CVE-2025-15469",
            "https://bugzilla.redhat.com/2430375",
            "https://bugzilla.redhat.com/2430376",
            "https://bugzilla.redhat.com/2430377",
            "https://bugzilla.redhat.com/2430378",
            "https://bugzilla.redhat.com/2430379",
            "https://bugzilla.redhat.com/2430380",
            "https://bugzilla.redhat.com/2430381",
            "https://bugzilla.redhat.com/2430386",
            "https://bugzilla.redhat.com/2430387",
            "https://bugzilla.redhat.com/2430388",
            "https://bugzilla.redhat.com/2430389",
            "https://bugzilla.redhat.com/2430390",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430375",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430376",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430377",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430378",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430379",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430380",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430381",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430386",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430387",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430388",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430389",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430390",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11187",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15467",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15468",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15469",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66199",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68160",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69418",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69420",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69421",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22795",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22796",
            "https://errata.almalinux.org/9/ALSA-2026-1473.html",
            "https://errata.rockylinux.org/RLSA-2026:1473",
            "https://github.com/openssl/openssl/commit/310f305eb92ea8040d6b3cb75a5feeba8e6acf2f",
            "https://github.com/openssl/openssl/commit/a7936fa4bd23c906e1955a16a0a0ab39a4953a61",
            "https://linux.oracle.com/cve/CVE-2025-15469.html",
            "https://linux.oracle.com/errata/ELSA-2026-50081.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-15469",
            "https://openssl-library.org/news/secadv/20260127.txt",
            "https://ubuntu.com/security/notices/USN-7980-1",
            "https://www.cve.org/CVERecord?id=CVE-2025-15469"
          ],
          "PublishedDate": "2026-01-27T16:16:14.523Z",
          "LastModifiedDate": "2026-02-02T18:37:39.313Z"
        },
        {
          "VulnerabilityID": "CVE-2025-66199",
          "PkgID": "openssl-provider-legacy@3.5.4-1~deb13u1",
          "PkgName": "openssl-provider-legacy",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/openssl-provider-legacy@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "4e98403ba60a7e46",
            "BOMRef": "pkg:deb/debian/openssl-provider-legacy@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.5.4-1~deb13u1",
          "FixedVersion": "3.5.4-1~deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-66199",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:b74cb7f85121122cc7720e2dd0fc55d4878234036e0b60d26ec046184d689cf2",
          "Title": "openssl: OpenSSL: Denial of Service due to excessive memory allocation in TLS 1.3 certificate compression",
          "Description": "Issue summary: A TLS 1.3 connection using certificate compression can be\nforced to allocate a large buffer before decompression without checking\nagainst the configured certificate size limit.\n\nImpact summary: An attacker can cause per-connection memory allocations of\nup to approximately 22 MiB and extra CPU work, potentially leading to\nservice degradation or resource exhaustion (Denial of Service).\n\nIn affected configurations, the peer-supplied uncompressed certificate\nlength from a CompressedCertificate message is used to grow a heap buffer\nprior to decompression. This length is not bounded by the max_cert_list\nsetting, which otherwise constrains certificate message sizes. An attacker\ncan exploit this to cause large per-connection allocations followed by\nhandshake failure. No memory corruption or information disclosure occurs.\n\nThis issue only affects builds where TLS 1.3 certificate compression is\ncompiled in (i.e., not OPENSSL_NO_COMP_ALG) and at least one compression\nalgorithm (brotli, zlib, or zstd) is available, and where the compression\nextension is negotiated. Both clients receiving a server CompressedCertificate\nand servers in mutual TLS scenarios receiving a client CompressedCertificate\nare affected. Servers that do not request client certificates are not\nvulnerable to client-initiated attacks.\n\nUsers can mitigate this issue by setting SSL_OP_NO_RX_CERTIFICATE_COMPRESSION\nto disable receiving compressed certificates.\n\nThe FIPS modules in 3.6, 3.5, 3.4 and 3.3 are not affected by this issue,\nas the TLS implementation is outside the OpenSSL FIPS module boundary.\n\nOpenSSL 3.6, 3.5, 3.4 and 3.3 are vulnerable to this issue.\n\nOpenSSL 3.0, 1.1.1 and 1.0.2 are not affected by this issue.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-789"
          ],
          "VendorSeverity": {
            "alma": 3,
            "amazon": 3,
            "azure": 2,
            "oracle-oval": 3,
            "photon": 2,
            "redhat": 1,
            "rocky": 3,
            "ubuntu": 1
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 5.9
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:1473",
            "https://access.redhat.com/security/cve/CVE-2025-66199",
            "https://bugzilla.redhat.com/2430375",
            "https://bugzilla.redhat.com/2430376",
            "https://bugzilla.redhat.com/2430377",
            "https://bugzilla.redhat.com/2430378",
            "https://bugzilla.redhat.com/2430379",
            "https://bugzilla.redhat.com/2430380",
            "https://bugzilla.redhat.com/2430381",
            "https://bugzilla.redhat.com/2430386",
            "https://bugzilla.redhat.com/2430387",
            "https://bugzilla.redhat.com/2430388",
            "https://bugzilla.redhat.com/2430389",
            "https://bugzilla.redhat.com/2430390",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430375",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430376",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430377",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430378",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430379",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430380",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430381",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430386",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430387",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430388",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430389",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430390",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11187",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15467",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15468",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15469",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66199",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68160",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69418",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69420",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69421",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22795",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22796",
            "https://errata.almalinux.org/9/ALSA-2026-1473.html",
            "https://errata.rockylinux.org/RLSA-2026:1473",
            "https://github.com/openssl/openssl/commit/3ed1f75249932b155eef993a8e66a99cb98bfef4",
            "https://github.com/openssl/openssl/commit/6184a4fb08ee6d7bca570d931a4e8bef40b64451",
            "https://github.com/openssl/openssl/commit/895150b5e021d16b52fb32b97e1dd12f20448be5",
            "https://github.com/openssl/openssl/commit/966a2478046c311ed7dae50c457d0db4cafbf7e4",
            "https://linux.oracle.com/cve/CVE-2025-66199.html",
            "https://linux.oracle.com/errata/ELSA-2026-50081.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-66199",
            "https://openssl-library.org/news/secadv/20260127.txt",
            "https://ubuntu.com/security/notices/USN-7980-1",
            "https://www.cve.org/CVERecord?id=CVE-2025-66199"
          ],
          "PublishedDate": "2026-01-27T16:16:15.777Z",
          "LastModifiedDate": "2026-02-02T18:37:19.613Z"
        },
        {
          "VulnerabilityID": "CVE-2025-68160",
          "VendorIDs": [
            "DSA-6113-1"
          ],
          "PkgID": "openssl-provider-legacy@3.5.4-1~deb13u1",
          "PkgName": "openssl-provider-legacy",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/openssl-provider-legacy@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "4e98403ba60a7e46",
            "BOMRef": "pkg:deb/debian/openssl-provider-legacy@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.5.4-1~deb13u1",
          "FixedVersion": "3.5.4-1~deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-68160",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:de2b18ba8a805ad7d2f3fd46b60cf9356f9b7535332f868ca12080e5549507d1",
          "Title": "openssl: OpenSSL: Denial of Service due to out-of-bounds write in BIO filter",
          "Description": "Issue summary: Writing large, newline-free data into a BIO chain using the\nline-buffering filter where the next BIO performs short writes can trigger\na heap-based out-of-bounds write.\n\nImpact summary: This out-of-bounds write can cause memory corruption which\ntypically results in a crash, leading to Denial of Service for an application.\n\nThe line-buffering BIO filter (BIO_f_linebuffer) is not used by default in\nTLS/SSL data paths. In OpenSSL command-line applications, it is typically\nonly pushed onto stdout/stderr on VMS systems. Third-party applications that\nexplicitly use this filter with a BIO chain that can short-write and that\nwrite large, newline-free data influenced by an attacker would be affected.\nHowever, the circumstances where this could happen are unlikely to be under\nattacker control, and BIO_f_linebuffer is unlikely to be handling non-curated\ndata controlled by an attacker. For that reason the issue was assessed as\nLow severity.\n\nThe FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue,\nas the BIO implementation is outside the OpenSSL FIPS module boundary.\n\nOpenSSL 3.6, 3.5, 3.4, 3.3, 3.0, 1.1.1 and 1.0.2 are vulnerable to this issue.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-787"
          ],
          "VendorSeverity": {
            "alma": 3,
            "amazon": 3,
            "azure": 2,
            "cbl-mariner": 2,
            "oracle-oval": 3,
            "photon": 2,
            "redhat": 1,
            "rocky": 3,
            "ubuntu": 1
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 4.7
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:1473",
            "https://access.redhat.com/security/cve/CVE-2025-68160",
            "https://bugzilla.redhat.com/2430375",
            "https://bugzilla.redhat.com/2430376",
            "https://bugzilla.redhat.com/2430377",
            "https://bugzilla.redhat.com/2430378",
            "https://bugzilla.redhat.com/2430379",
            "https://bugzilla.redhat.com/2430380",
            "https://bugzilla.redhat.com/2430381",
            "https://bugzilla.redhat.com/2430386",
            "https://bugzilla.redhat.com/2430387",
            "https://bugzilla.redhat.com/2430388",
            "https://bugzilla.redhat.com/2430389",
            "https://bugzilla.redhat.com/2430390",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430375",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430376",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430377",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430378",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430379",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430380",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430381",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430386",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430387",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430388",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430389",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430390",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11187",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15467",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15468",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15469",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66199",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68160",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69418",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69420",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69421",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22795",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22796",
            "https://errata.almalinux.org/9/ALSA-2026-1473.html",
            "https://errata.rockylinux.org/RLSA-2026:1473",
            "https://github.com/openssl/openssl/commit/384011202af92605d926fafe4a0bcd6b65d162ad",
            "https://github.com/openssl/openssl/commit/475c466ef2fbd8fc1df6fae1c3eed9c813fc8ff6",
            "https://github.com/openssl/openssl/commit/4c96fbba618e1940f038012506ee9e21d32ee12c",
            "https://github.com/openssl/openssl/commit/6845c3b6460a98b1ec4e463baa2ea1a63a32d7c0",
            "https://github.com/openssl/openssl/commit/68a7cd2e2816c3a02f4d45a2ce43fc04fac97096",
            "https://linux.oracle.com/cve/CVE-2025-68160.html",
            "https://linux.oracle.com/errata/ELSA-2026-50081.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-68160",
            "https://openssl-library.org/news/secadv/20260127.txt",
            "https://ubuntu.com/security/notices/USN-7980-1",
            "https://ubuntu.com/security/notices/USN-7980-2",
            "https://www.cve.org/CVERecord?id=CVE-2025-68160"
          ],
          "PublishedDate": "2026-01-27T16:16:15.9Z",
          "LastModifiedDate": "2026-02-02T18:36:57.727Z"
        },
        {
          "VulnerabilityID": "CVE-2025-69418",
          "VendorIDs": [
            "DSA-6113-1"
          ],
          "PkgID": "openssl-provider-legacy@3.5.4-1~deb13u1",
          "PkgName": "openssl-provider-legacy",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/openssl-provider-legacy@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "4e98403ba60a7e46",
            "BOMRef": "pkg:deb/debian/openssl-provider-legacy@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.5.4-1~deb13u1",
          "FixedVersion": "3.5.4-1~deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-69418",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:19fed63f7a35a4a9d074a089dd0d35b0e7f75e0145e97377681d93f5db81725d",
          "Title": "openssl: OpenSSL: Information disclosure and data tampering via specific low-level OCB encryption/decryption calls",
          "Description": "Issue summary: When using the low-level OCB API directly with AES-NI or\u003cbr\u003eother hardware-accelerated code paths, inputs whose length is not a multiple\u003cbr\u003eof 16 bytes can leave the final partial block unencrypted and unauthenticated.\u003cbr\u003e\u003cbr\u003eImpact summary: The trailing 1-15 bytes of a message may be exposed in\u003cbr\u003ecleartext on encryption and are not covered by the authentication tag,\u003cbr\u003eallowing an attacker to read or tamper with those bytes without detection.\u003cbr\u003e\u003cbr\u003eThe low-level OCB encrypt and decrypt routines in the hardware-accelerated\u003cbr\u003estream path process full 16-byte blocks but do not advance the input/output\u003cbr\u003epointers. The subsequent tail-handling code then operates on the original\u003cbr\u003ebase pointers, effectively reprocessing the beginning of the buffer while\u003cbr\u003eleaving the actual trailing bytes unprocessed. The authentication checksum\u003cbr\u003ealso excludes the true tail bytes.\u003cbr\u003e\u003cbr\u003eHowever, typical OpenSSL consumers using EVP are not affected because the\u003cbr\u003ehigher-level EVP and provider OCB implementations split inputs so that full\u003cbr\u003eblocks and trailing partial blocks are processed in separate calls, avoiding\u003cbr\u003ethe problematic code path. Additionally, TLS does not use OCB ciphersuites.\u003cbr\u003eThe vulnerability only affects applications that call the low-level\u003cbr\u003eCRYPTO_ocb128_encrypt() or CRYPTO_ocb128_decrypt() functions directly with\u003cbr\u003enon-block-aligned lengths in a single call on hardware-accelerated builds.\u003cbr\u003eFor these reasons the issue was assessed as Low severity.\u003cbr\u003e\u003cbr\u003eThe FIPS modules in 3.6, 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected\u003cbr\u003eby this issue, as OCB mode is not a FIPS-approved algorithm.\u003cbr\u003e\u003cbr\u003eOpenSSL 3.6, 3.5, 3.4, 3.3, 3.0 and 1.1.1 are vulnerable to this issue.\u003cbr\u003e\u003cbr\u003eOpenSSL 1.0.2 is not affected by this issue.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-325"
          ],
          "VendorSeverity": {
            "alma": 3,
            "amazon": 3,
            "azure": 2,
            "cbl-mariner": 2,
            "oracle-oval": 3,
            "photon": 2,
            "redhat": 1,
            "rocky": 3,
            "ubuntu": 1
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
              "V3Score": 4
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:1473",
            "https://access.redhat.com/security/cve/CVE-2025-69418",
            "https://bugzilla.redhat.com/2430375",
            "https://bugzilla.redhat.com/2430376",
            "https://bugzilla.redhat.com/2430377",
            "https://bugzilla.redhat.com/2430378",
            "https://bugzilla.redhat.com/2430379",
            "https://bugzilla.redhat.com/2430380",
            "https://bugzilla.redhat.com/2430381",
            "https://bugzilla.redhat.com/2430386",
            "https://bugzilla.redhat.com/2430387",
            "https://bugzilla.redhat.com/2430388",
            "https://bugzilla.redhat.com/2430389",
            "https://bugzilla.redhat.com/2430390",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430375",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430376",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430377",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430378",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430379",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430380",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430381",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430386",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430387",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430388",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430389",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430390",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11187",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15467",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15468",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15469",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66199",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68160",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69418",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69420",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69421",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22795",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22796",
            "https://errata.almalinux.org/9/ALSA-2026-1473.html",
            "https://errata.rockylinux.org/RLSA-2026:1473",
            "https://github.com/openssl/openssl/commit/372fc5c77529695b05b4f5b5187691a57ef5dffc",
            "https://github.com/openssl/openssl/commit/4016975d4469cd6b94927c607f7c511385f928d8",
            "https://github.com/openssl/openssl/commit/52d23c86a54adab5ee9f80e48b242b52c4cc2347",
            "https://github.com/openssl/openssl/commit/a7589230356d908c0eca4b969ec4f62106f4f5ae",
            "https://github.com/openssl/openssl/commit/ed40856d7d4ba6cb42779b6770666a65f19cb977",
            "https://linux.oracle.com/cve/CVE-2025-69418.html",
            "https://linux.oracle.com/errata/ELSA-2026-50081.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-69418",
            "https://openssl-library.org/news/secadv/20260127.txt",
            "https://ubuntu.com/security/notices/USN-7980-1",
            "https://ubuntu.com/security/notices/USN-7980-2",
            "https://www.cve.org/CVERecord?id=CVE-2025-69418"
          ],
          "PublishedDate": "2026-01-27T16:16:33.253Z",
          "LastModifiedDate": "2026-02-02T18:36:03.557Z"
        },
        {
          "VulnerabilityID": "CVE-2025-69420",
          "VendorIDs": [
            "DSA-6113-1"
          ],
          "PkgID": "openssl-provider-legacy@3.5.4-1~deb13u1",
          "PkgName": "openssl-provider-legacy",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/openssl-provider-legacy@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "4e98403ba60a7e46",
            "BOMRef": "pkg:deb/debian/openssl-provider-legacy@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.5.4-1~deb13u1",
          "FixedVersion": "3.5.4-1~deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-69420",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:e7903d50cfe13980fd8879d446afbcbdc63ef5cdeae3bf9154fabc44177448b0",
          "Title": "openssl: OpenSSL: Denial of Service via malformed TimeStamp Response",
          "Description": "Issue summary: A type confusion vulnerability exists in the TimeStamp Response\nverification code where an ASN1_TYPE union member is accessed without first\nvalidating the type, causing an invalid or NULL pointer dereference when\nprocessing a malformed TimeStamp Response file.\n\nImpact summary: An application calling TS_RESP_verify_response() with a\nmalformed TimeStamp Response can be caused to dereference an invalid or\nNULL pointer when reading, resulting in a Denial of Service.\n\nThe functions ossl_ess_get_signing_cert() and ossl_ess_get_signing_cert_v2()\naccess the signing cert attribute value without validating its type.\nWhen the type is not V_ASN1_SEQUENCE, this results in accessing invalid memory\nthrough the ASN1_TYPE union, causing a crash.\n\nExploiting this vulnerability requires an attacker to provide a malformed\nTimeStamp Response to an application that verifies timestamp responses. The\nTimeStamp protocol (RFC 3161) is not widely used and the impact of the\nexploit is just a Denial of Service. For these reasons the issue was\nassessed as Low severity.\n\nThe FIPS modules in 3.5, 3.4, 3.3 and 3.0 are not affected by this issue,\nas the TimeStamp Response implementation is outside the OpenSSL FIPS module\nboundary.\n\nOpenSSL 3.6, 3.5, 3.4, 3.3, 3.0 and 1.1.1 are vulnerable to this issue.\n\nOpenSSL 1.0.2 is not affected by this issue.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-754"
          ],
          "VendorSeverity": {
            "alma": 3,
            "amazon": 3,
            "azure": 3,
            "cbl-mariner": 3,
            "oracle-oval": 3,
            "photon": 3,
            "redhat": 1,
            "rocky": 3,
            "ubuntu": 1
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 5.9
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:1473",
            "https://access.redhat.com/security/cve/CVE-2025-69420",
            "https://bugzilla.redhat.com/2430375",
            "https://bugzilla.redhat.com/2430376",
            "https://bugzilla.redhat.com/2430377",
            "https://bugzilla.redhat.com/2430378",
            "https://bugzilla.redhat.com/2430379",
            "https://bugzilla.redhat.com/2430380",
            "https://bugzilla.redhat.com/2430381",
            "https://bugzilla.redhat.com/2430386",
            "https://bugzilla.redhat.com/2430387",
            "https://bugzilla.redhat.com/2430388",
            "https://bugzilla.redhat.com/2430389",
            "https://bugzilla.redhat.com/2430390",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430375",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430376",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430377",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430378",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430379",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430380",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430381",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430386",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430387",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430388",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430389",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430390",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11187",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15467",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15468",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15469",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66199",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68160",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69418",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69420",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69421",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22795",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22796",
            "https://errata.almalinux.org/9/ALSA-2026-1473.html",
            "https://errata.rockylinux.org/RLSA-2026:1473",
            "https://github.com/openssl/openssl/commit/27c7012c91cc986a598d7540f3079dfde2416eb9",
            "https://github.com/openssl/openssl/commit/4e254b48ad93cc092be3dd62d97015f33f73133a",
            "https://github.com/openssl/openssl/commit/564fd9c73787f25693bf9e75faf7bf6bb1305d4e",
            "https://github.com/openssl/openssl/commit/5eb0770ffcf11b785cf374ff3c19196245e54f1b",
            "https://github.com/openssl/openssl/commit/a99349ebfc519999edc50620abe24d599b9eb085",
            "https://linux.oracle.com/cve/CVE-2025-69420.html",
            "https://linux.oracle.com/errata/ELSA-2026-50081.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-69420",
            "https://openssl-library.org/news/secadv/20260127.txt",
            "https://ubuntu.com/security/notices/USN-7980-1",
            "https://ubuntu.com/security/notices/USN-7980-2",
            "https://www.cve.org/CVERecord?id=CVE-2025-69420"
          ],
          "PublishedDate": "2026-01-27T16:16:34.317Z",
          "LastModifiedDate": "2026-02-02T18:33:30.557Z"
        },
        {
          "VulnerabilityID": "CVE-2026-22795",
          "VendorIDs": [
            "DSA-6113-1"
          ],
          "PkgID": "openssl-provider-legacy@3.5.4-1~deb13u1",
          "PkgName": "openssl-provider-legacy",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/openssl-provider-legacy@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "4e98403ba60a7e46",
            "BOMRef": "pkg:deb/debian/openssl-provider-legacy@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.5.4-1~deb13u1",
          "FixedVersion": "3.5.4-1~deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-22795",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:2c870e9ad6674315cdf19b890a74a88e3216cc4b0618db0050e06fa972fe64c7",
          "Title": "openssl: OpenSSL: Denial of Service due to type confusion in PKCS#12 file processing",
          "Description": "Issue summary: An invalid or NULL pointer dereference can happen in\nan application processing a malformed PKCS#12 file.\n\nImpact summary: An application processing a malformed PKCS#12 file can be\ncaused to dereference an invalid or NULL pointer on memory read, resulting\nin a Denial of Service.\n\nA type confusion vulnerability exists in PKCS#12 parsing code where\nan ASN1_TYPE union member is accessed without first validating the type,\ncausing an invalid pointer read.\n\nThe location is constrained to a 1-byte address space, meaning any\nattempted pointer manipulation can only target addresses between 0x00 and 0xFF.\nThis range corresponds to the zero page, which is unmapped on most modern\noperating systems and will reliably result in a crash, leading only to a\nDenial of Service. Exploiting this issue also requires a user or application\nto process a maliciously crafted PKCS#12 file. It is uncommon to accept\nuntrusted PKCS#12 files in applications as they are usually used to store\nprivate keys which are trusted by definition. For these reasons, the issue\nwas assessed as Low severity.\n\nThe FIPS modules in 3.5, 3.4, 3.3 and 3.0 are not affected by this issue,\nas the PKCS12 implementation is outside the OpenSSL FIPS module boundary.\n\nOpenSSL 3.6, 3.5, 3.4, 3.3, 3.0 and 1.1.1 are vulnerable to this issue.\n\nOpenSSL 1.0.2 is not affected by this issue.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-754"
          ],
          "VendorSeverity": {
            "alma": 3,
            "amazon": 3,
            "azure": 2,
            "cbl-mariner": 2,
            "oracle-oval": 3,
            "photon": 2,
            "redhat": 1,
            "rocky": 3,
            "ubuntu": 1
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
              "V3Score": 5.5
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:1473",
            "https://access.redhat.com/security/cve/CVE-2026-22795",
            "https://bugzilla.redhat.com/2430375",
            "https://bugzilla.redhat.com/2430376",
            "https://bugzilla.redhat.com/2430377",
            "https://bugzilla.redhat.com/2430378",
            "https://bugzilla.redhat.com/2430379",
            "https://bugzilla.redhat.com/2430380",
            "https://bugzilla.redhat.com/2430381",
            "https://bugzilla.redhat.com/2430386",
            "https://bugzilla.redhat.com/2430387",
            "https://bugzilla.redhat.com/2430388",
            "https://bugzilla.redhat.com/2430389",
            "https://bugzilla.redhat.com/2430390",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430375",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430376",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430377",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430378",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430379",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430380",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430381",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430386",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430387",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430388",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430389",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430390",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11187",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15467",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15468",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15469",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66199",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68160",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69418",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69420",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69421",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22795",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22796",
            "https://errata.almalinux.org/9/ALSA-2026-1473.html",
            "https://errata.rockylinux.org/RLSA-2026:1473",
            "https://github.com/openssl/openssl/commit/2502e7b7d4c0cf4f972a881641fe09edc67aeec4",
            "https://github.com/openssl/openssl/commit/572844beca95068394c916626a6d3a490f831a49",
            "https://github.com/openssl/openssl/commit/7bbca05be55b129651d9df4bdb92becc45002c12",
            "https://github.com/openssl/openssl/commit/eeee3cbd4d682095ed431052f00403004596373e",
            "https://github.com/openssl/openssl/commit/ef2fb66ec571564d64d1c74a12e388a2a54d05d2",
            "https://linux.oracle.com/cve/CVE-2026-22795.html",
            "https://linux.oracle.com/errata/ELSA-2026-50081.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-22795",
            "https://openssl-library.org/news/secadv/20260127.txt",
            "https://ubuntu.com/security/notices/USN-7980-1",
            "https://ubuntu.com/security/notices/USN-7980-2",
            "https://www.cve.org/CVERecord?id=CVE-2026-22795"
          ],
          "PublishedDate": "2026-01-27T16:16:35.43Z",
          "LastModifiedDate": "2026-02-02T18:41:14.917Z"
        },
        {
          "VulnerabilityID": "CVE-2026-22796",
          "VendorIDs": [
            "DSA-6113-1"
          ],
          "PkgID": "openssl-provider-legacy@3.5.4-1~deb13u1",
          "PkgName": "openssl-provider-legacy",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/openssl-provider-legacy@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "4e98403ba60a7e46",
            "BOMRef": "pkg:deb/debian/openssl-provider-legacy@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.5.4-1~deb13u1",
          "FixedVersion": "3.5.4-1~deb13u2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-22796",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:e80b9979fc36543e67396a9212ae34f141a3f3efe5d7bb6c89743e337073bb31",
          "Title": "openssl: OpenSSL: Denial of Service via type confusion in PKCS#7 signature verification",
          "Description": "Issue summary: A type confusion vulnerability exists in the signature\nverification of signed PKCS#7 data where an ASN1_TYPE union member is\naccessed without first validating the type, causing an invalid or NULL\npointer dereference when processing malformed PKCS#7 data.\n\nImpact summary: An application performing signature verification of PKCS#7\ndata or calling directly the PKCS7_digest_from_attributes() function can be\ncaused to dereference an invalid or NULL pointer when reading, resulting in\na Denial of Service.\n\nThe function PKCS7_digest_from_attributes() accesses the message digest attribute\nvalue without validating its type. When the type is not V_ASN1_OCTET_STRING,\nthis results in accessing invalid memory through the ASN1_TYPE union, causing\na crash.\n\nExploiting this vulnerability requires an attacker to provide a malformed\nsigned PKCS#7 to an application that verifies it. The impact of the\nexploit is just a Denial of Service, the PKCS7 API is legacy and applications\nshould be using the CMS API instead. For these reasons the issue was\nassessed as Low severity.\n\nThe FIPS modules in 3.5, 3.4, 3.3 and 3.0 are not affected by this issue,\nas the PKCS#7 parsing implementation is outside the OpenSSL FIPS module\nboundary.\n\nOpenSSL 3.6, 3.5, 3.4, 3.3, 3.0, 1.1.1 and 1.0.2 are vulnerable to this issue.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-754"
          ],
          "VendorSeverity": {
            "alma": 3,
            "amazon": 3,
            "azure": 2,
            "cbl-mariner": 2,
            "oracle-oval": 3,
            "photon": 2,
            "redhat": 1,
            "rocky": 3,
            "ubuntu": 1
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 5.9
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:1473",
            "https://access.redhat.com/security/cve/CVE-2026-22796",
            "https://bugzilla.redhat.com/2430375",
            "https://bugzilla.redhat.com/2430376",
            "https://bugzilla.redhat.com/2430377",
            "https://bugzilla.redhat.com/2430378",
            "https://bugzilla.redhat.com/2430379",
            "https://bugzilla.redhat.com/2430380",
            "https://bugzilla.redhat.com/2430381",
            "https://bugzilla.redhat.com/2430386",
            "https://bugzilla.redhat.com/2430387",
            "https://bugzilla.redhat.com/2430388",
            "https://bugzilla.redhat.com/2430389",
            "https://bugzilla.redhat.com/2430390",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430375",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430376",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430377",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430378",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430379",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430380",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430381",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430386",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430387",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430388",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430389",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2430390",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11187",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15467",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15468",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15469",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66199",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68160",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69418",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69420",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69421",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22795",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22796",
            "https://errata.almalinux.org/9/ALSA-2026-1473.html",
            "https://errata.rockylinux.org/RLSA-2026:1473",
            "https://github.com/openssl/openssl/commit/2502e7b7d4c0cf4f972a881641fe09edc67aeec4",
            "https://github.com/openssl/openssl/commit/572844beca95068394c916626a6d3a490f831a49",
            "https://github.com/openssl/openssl/commit/7bbca05be55b129651d9df4bdb92becc45002c12",
            "https://github.com/openssl/openssl/commit/eeee3cbd4d682095ed431052f00403004596373e",
            "https://github.com/openssl/openssl/commit/ef2fb66ec571564d64d1c74a12e388a2a54d05d2",
            "https://linux.oracle.com/cve/CVE-2026-22796.html",
            "https://linux.oracle.com/errata/ELSA-2026-50081.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-22796",
            "https://openssl-library.org/news/secadv/20260127.txt",
            "https://ubuntu.com/security/notices/USN-7980-1",
            "https://ubuntu.com/security/notices/USN-7980-2",
            "https://www.cve.org/CVERecord?id=CVE-2026-22796"
          ],
          "PublishedDate": "2026-01-27T16:16:35.543Z",
          "LastModifiedDate": "2026-02-02T18:40:27.467Z"
        },
        {
          "VulnerabilityID": "CVE-2026-2673",
          "PkgID": "openssl-provider-legacy@3.5.4-1~deb13u1",
          "PkgName": "openssl-provider-legacy",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/openssl-provider-legacy@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2",
            "UID": "4e98403ba60a7e46",
            "BOMRef": "pkg:deb/debian/openssl-provider-legacy@3.5.4-1~deb13u1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.5.4-1~deb13u1",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-2673",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:a43e09274ff890670cf9c11106ffc06c2dda890f220b0a42a25532d0911f446e",
          "Title": "openssl: OpenSSL TLS 1.3 server may choose unexpected key agreement group",
          "Description": "Issue summary: An OpenSSL TLS 1.3 server may fail to negotiate the expected\npreferred key exchange group when its key exchange group configuration includes\nthe default by using the 'DEFAULT' keyword.\n\nImpact summary: A less preferred key exchange may be used even when a more\npreferred group is supported by both client and server, if the group\nwas not included among the client's initial predicated keyshares.\nThis will sometimes be the case with the new hybrid post-quantum groups,\nif the client chooses to defer their use until specifically requested by\nthe server.\n\nIf an OpenSSL TLS 1.3 server's configuration uses the 'DEFAULT' keyword to\ninterpolate the built-in default group list into its own configuration, perhaps\nadding or removing specific elements, then an implementation defect causes the\n'DEFAULT' list to lose its 'tuple' structure, and all server-supported groups\nwere treated as a single sufficiently secure 'tuple', with the server not\nsending a Hello Retry Request (HRR) even when a group in a more preferred tuple\nwas mutually supported.\n\nAs a result, the client and server might fail to negotiate a mutually supported\npost-quantum key agreement group, such as 'X25519MLKEM768', if the client's\nconfiguration results in only 'classical' groups (such as 'X25519' being the\nonly ones in the client's initial keyshare prediction).\n\nOpenSSL 3.5 and later support a new syntax for selecting the most preferred TLS\n1.3 key agreement group on TLS servers.  The old syntax had a single 'flat'\nlist of groups, and treated all the supported groups as sufficiently secure.\nIf any of the keyshares predicted by the client were supported by the server\nthe most preferred among these was selected, even if other groups supported by\nthe client, but not included in the list of predicted keyshares would have been\nmore preferred, if included.\n\nThe new syntax partitions the groups into distinct 'tuples' of roughly\nequivalent security.  Within each tuple the most preferred group included among\nthe client's predicted keyshares is chosen, but if the client supports a group\nfrom a more preferred tuple, but did not predict any corresponding keyshares,\nthe server will ask the client to retry the ClientHello (by issuing a Hello\nRetry Request or HRR) with the most preferred mutually supported group.\n\nThe above works as expected when the server's configuration uses the built-in\ndefault group list, or explicitly defines its own list by directly defining the\nvarious desired groups and group 'tuples'.\n\nNo OpenSSL FIPS modules are affected by this issue, the code in question lies\noutside the FIPS boundary.\n\nOpenSSL 3.6 and 3.5 are vulnerable to this issue.\n\nOpenSSL 3.6 users should upgrade to OpenSSL 3.6.2 once it is released.\nOpenSSL 3.5 users should upgrade to OpenSSL 3.5.6 once it is released.\n\nOpenSSL 3.4, 3.3, 3.0, 1.0.2 and 1.1.1 are not affected by this issue.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-757"
          ],
          "VendorSeverity": {
            "amazon": 1,
            "redhat": 1,
            "ubuntu": 1
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N",
              "V3Score": 3.1
            }
          },
          "References": [
            "http://www.openwall.com/lists/oss-security/2026/03/13/3",
            "https://access.redhat.com/security/cve/CVE-2026-2673",
            "https://github.com/openssl/openssl/commit/2157c9d81f7b0bd7dfa25b960e928ec28e8dd63f",
            "https://github.com/openssl/openssl/commit/85977e013f32ceb96aa034c0e741adddc1a05e34",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-2673",
            "https://openssl-library.org/news/secadv/20260313.txt",
            "https://www.cve.org/CVERecord?id=CVE-2026-2673"
          ],
          "PublishedDate": "2026-03-13T19:54:34.033Z",
          "LastModifiedDate": "2026-03-17T18:16:15.6Z"
        },
        {
          "VulnerabilityID": "CVE-2007-5686",
          "PkgID": "passwd@1:4.17.4-2",
          "PkgName": "passwd",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/passwd@4.17.4-2?arch=amd64\u0026distro=debian-13.2\u0026epoch=1",
            "UID": "af684cf050aa87e6",
            "BOMRef": "pkg:deb/debian/passwd@4.17.4-2?arch=amd64\u0026distro=debian-13.2\u0026epoch=1"
          },
          "InstalledVersion": "1:4.17.4-2",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2007-5686",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:4083565672956fc4362d125ef3295d79ea535a432b2219124c4cec81cdad98aa",
          "Title": "initscripts in rPath Linux 1 sets insecure permissions for the /var/lo ...",
          "Description": "initscripts in rPath Linux 1 sets insecure permissions for the /var/log/btmp file, which allows local users to obtain sensitive information regarding authentication attempts.  NOTE: because sshd detects the insecure permissions and does not log certain events, this also prevents sshd from logging failed authentication attempts by remote attackers.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-264"
          ],
          "VendorSeverity": {
            "debian": 1,
            "nvd": 2
          },
          "CVSS": {
            "nvd": {
              "V2Vector": "AV:L/AC:L/Au:N/C:C/I:N/A:N",
              "V2Score": 4.9
            }
          },
          "References": [
            "http://secunia.com/advisories/27215",
            "http://www.securityfocus.com/archive/1/482129/100/100/threaded",
            "http://www.securityfocus.com/archive/1/482857/100/0/threaded",
            "http://www.securityfocus.com/bid/26048",
            "http://www.vupen.com/english/advisories/2007/3474",
            "https://issues.rpath.com/browse/RPL-1825"
          ],
          "PublishedDate": "2007-10-28T17:08:00Z",
          "LastModifiedDate": "2025-04-09T00:30:58.49Z"
        },
        {
          "VulnerabilityID": "CVE-2024-56433",
          "PkgID": "passwd@1:4.17.4-2",
          "PkgName": "passwd",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/passwd@4.17.4-2?arch=amd64\u0026distro=debian-13.2\u0026epoch=1",
            "UID": "af684cf050aa87e6",
            "BOMRef": "pkg:deb/debian/passwd@4.17.4-2?arch=amd64\u0026distro=debian-13.2\u0026epoch=1"
          },
          "InstalledVersion": "1:4.17.4-2",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2024-56433",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:879601783c5bcedd03916ac910e0581d9e74fb8663c74d641a3b3245a3c32474",
          "Title": "shadow-utils: Default subordinate ID configuration in /etc/login.defs could lead to compromise",
          "Description": "shadow-utils (aka shadow) 4.4 through 4.17.0 establishes a default /etc/subuid behavior (e.g., uid 100000 through 165535 for the first user account) that can realistically conflict with the uids of users defined on locally administered networks, potentially leading to account takeover, e.g., by leveraging newuidmap for access to an NFS home directory (or same-host resources in the case of remote logins by these local network users). NOTE: it may also be argued that system administrators should not have assigned uids, within local networks, that are within the range that can occur in /etc/subuid.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-1188"
          ],
          "VendorSeverity": {
            "alma": 1,
            "azure": 1,
            "oracle-oval": 1,
            "redhat": 1,
            "rocky": 1,
            "ubuntu": 1
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N",
              "V3Score": 3.6
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2025:20559",
            "https://access.redhat.com/security/cve/CVE-2024-56433",
            "https://bugzilla.redhat.com/2334165",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2334165",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56433",
            "https://errata.almalinux.org/9/ALSA-2025-20559.html",
            "https://errata.rockylinux.org/RLSA-2025:20559",
            "https://github.com/shadow-maint/shadow/blob/e2512d5741d4a44bdd81a8c2d0029b6222728cf0/etc/login.defs#L238-L241",
            "https://github.com/shadow-maint/shadow/issues/1157",
            "https://github.com/shadow-maint/shadow/releases/tag/4.4",
            "https://linux.oracle.com/cve/CVE-2024-56433.html",
            "https://linux.oracle.com/errata/ELSA-2025-20559-0.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2024-56433",
            "https://www.cve.org/CVERecord?id=CVE-2024-56433"
          ],
          "PublishedDate": "2024-12-26T09:15:07.267Z",
          "LastModifiedDate": "2024-12-26T09:15:07.267Z"
        },
        {
          "VulnerabilityID": "TEMP-0628843-DBAD28",
          "PkgID": "passwd@1:4.17.4-2",
          "PkgName": "passwd",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/passwd@4.17.4-2?arch=amd64\u0026distro=debian-13.2\u0026epoch=1",
            "UID": "af684cf050aa87e6",
            "BOMRef": "pkg:deb/debian/passwd@4.17.4-2?arch=amd64\u0026distro=debian-13.2\u0026epoch=1"
          },
          "InstalledVersion": "1:4.17.4-2",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://security-tracker.debian.org/tracker/TEMP-0628843-DBAD28",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:7ea83dca12294f9c9a7ae500311357340b5fb483fe42d2823ed2178eb404ca09",
          "Title": "[more related to CVE-2005-4890]",
          "Severity": "LOW",
          "VendorSeverity": {
            "debian": 1
          }
        },
        {
          "VulnerabilityID": "CVE-2011-4116",
          "PkgID": "perl-base@5.40.1-6",
          "PkgName": "perl-base",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/perl-base@5.40.1-6?arch=amd64\u0026distro=debian-13.2",
            "UID": "f6edbba4f84ed3f3",
            "BOMRef": "pkg:deb/debian/perl-base@5.40.1-6?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "5.40.1-6",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2011-4116",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:08ed0bc9f5b0f27e3c380dab51fa029a8c8cc7d15a1abb320cd902bd60af5820",
          "Title": "perl: File:: Temp insecure temporary file handling",
          "Description": "_is_safe in the File::Temp module for Perl does not properly handle symlinks.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-59"
          ],
          "VendorSeverity": {
            "debian": 1,
            "nvd": 1,
            "redhat": 1
          },
          "CVSS": {
            "nvd": {
              "V2Vector": "AV:L/AC:M/Au:S/C:N/I:P/A:N",
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
              "V2Score": 1.5,
              "V3Score": 3.3
            },
            "redhat": {
              "V2Vector": "AV:L/AC:M/Au:N/C:N/I:P/A:N",
              "V2Score": 1.9
            }
          },
          "References": [
            "http://www.openwall.com/lists/oss-security/2011/11/04/2",
            "http://www.openwall.com/lists/oss-security/2011/11/04/4",
            "https://access.redhat.com/security/cve/CVE-2011-4116",
            "https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14",
            "https://nvd.nist.gov/vuln/detail/CVE-2011-4116",
            "https://rt.cpan.org/Public/Bug/Display.html?id=69106",
            "https://seclists.org/oss-sec/2011/q4/238",
            "https://www.cve.org/CVERecord?id=CVE-2011-4116"
          ],
          "PublishedDate": "2020-01-31T18:15:11.343Z",
          "LastModifiedDate": "2025-08-04T19:04:38.29Z"
        },
        {
          "VulnerabilityID": "TEMP-0517018-A83CE6",
          "PkgID": "sysvinit-utils@3.14-4",
          "PkgName": "sysvinit-utils",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/sysvinit-utils@3.14-4?arch=amd64\u0026distro=debian-13.2",
            "UID": "443dd7dd92b1e6a1",
            "BOMRef": "pkg:deb/debian/sysvinit-utils@3.14-4?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "3.14-4",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://security-tracker.debian.org/tracker/TEMP-0517018-A83CE6",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:72c97a0428a4d9392f6ccbc0712059eed4a7fd617dc7c3d24d5e72fb03ebbf34",
          "Title": "[sysvinit: no-root option in expert installer exposes locally exploitable security flaw]",
          "Severity": "LOW",
          "VendorSeverity": {
            "debian": 1
          }
        },
        {
          "VulnerabilityID": "CVE-2005-2541",
          "PkgID": "tar@1.35+dfsg-3.1",
          "PkgName": "tar",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/tar@1.35%2Bdfsg-3.1?arch=amd64\u0026distro=debian-13.2",
            "UID": "e50c71e5053b066",
            "BOMRef": "pkg:deb/debian/tar@1.35%2Bdfsg-3.1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "1.35+dfsg-3.1",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2005-2541",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:e854fefd6fbadf5f96e5e019e73bbd4318493075da6473f97ac3d37428bb5733",
          "Title": "tar: does not properly warn the user when extracting setuid or setgid files",
          "Description": "Tar 1.15.1 does not properly warn the user when extracting setuid or setgid files, which may allow local users or remote attackers to gain privileges.",
          "Severity": "LOW",
          "VendorSeverity": {
            "debian": 1,
            "nvd": 3,
            "redhat": 2
          },
          "CVSS": {
            "nvd": {
              "V2Vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
              "V2Score": 10
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
              "V3Score": 7
            }
          },
          "References": [
            "http://marc.info/?l=bugtraq\u0026m=112327628230258\u0026w=2",
            "https://access.redhat.com/security/cve/CVE-2005-2541",
            "https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c%40%3Cissues.guacamole.apache.org%3E",
            "https://nvd.nist.gov/vuln/detail/CVE-2005-2541",
            "https://www.cve.org/CVERecord?id=CVE-2005-2541"
          ],
          "PublishedDate": "2005-08-10T04:00:00Z",
          "LastModifiedDate": "2025-04-03T01:03:51.193Z"
        },
        {
          "VulnerabilityID": "TEMP-0290435-0B57B5",
          "PkgID": "tar@1.35+dfsg-3.1",
          "PkgName": "tar",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/tar@1.35%2Bdfsg-3.1?arch=amd64\u0026distro=debian-13.2",
            "UID": "e50c71e5053b066",
            "BOMRef": "pkg:deb/debian/tar@1.35%2Bdfsg-3.1?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "1.35+dfsg-3.1",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://security-tracker.debian.org/tracker/TEMP-0290435-0B57B5",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:f0d09bfee4798c988ba18f9c37fa192935059aaa3629ae6ac71d11100af5ce49",
          "Title": "[tar's rmt command may have undesired side effects]",
          "Severity": "LOW",
          "VendorSeverity": {
            "debian": 1
          }
        },
        {
          "VulnerabilityID": "CVE-2022-0563",
          "PkgID": "util-linux@2.41-5",
          "PkgName": "util-linux",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/util-linux@2.41-5?arch=amd64\u0026distro=debian-13.2",
            "UID": "36e8b75cc42ef04e",
            "BOMRef": "pkg:deb/debian/util-linux@2.41-5?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-5",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-0563",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:75c22217dfa6569d002f8189447dd823436f8e4227431c602fbc38a4258efeae",
          "Title": "util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline",
          "Description": "A flaw was found in the util-linux chfn and chsh utilities when compiled with Readline support. The Readline library uses an \"INPUTRC\" environment variable to get a path to the library config file. When the library cannot parse the specified file, it prints an error message containing data from the file. This flaw allows an unprivileged user to read root-owned files, potentially leading to privilege escalation. This flaw affects util-linux versions prior to 2.37.4.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-209"
          ],
          "VendorSeverity": {
            "amazon": 2,
            "cbl-mariner": 2,
            "debian": 1,
            "nvd": 2,
            "photon": 2,
            "redhat": 2
          },
          "CVSS": {
            "nvd": {
              "V2Vector": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
              "V2Score": 1.9,
              "V3Score": 5.5
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
              "V3Score": 5.5
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2022-0563",
            "https://blog.trailofbits.com/2023/02/16/suid-logic-bug-linux-readline/",
            "https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w%40ws.net.home/T/#u",
            "https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u",
            "https://nvd.nist.gov/vuln/detail/CVE-2022-0563",
            "https://security.gentoo.org/glsa/202401-08",
            "https://security.netapp.com/advisory/ntap-20220331-0002/",
            "https://www.cve.org/CVERecord?id=CVE-2022-0563"
          ],
          "PublishedDate": "2022-02-21T19:15:08.393Z",
          "LastModifiedDate": "2025-06-09T16:15:33.237Z"
        },
        {
          "VulnerabilityID": "CVE-2025-14104",
          "PkgID": "util-linux@2.41-5",
          "PkgName": "util-linux",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/util-linux@2.41-5?arch=amd64\u0026distro=debian-13.2",
            "UID": "36e8b75cc42ef04e",
            "BOMRef": "pkg:deb/debian/util-linux@2.41-5?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-5",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "SeveritySource": "debian",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-14104",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:18caf0ada51b269fe8fe47dbd19a289edcfd9f967b991a04139e722d431c6e5c",
          "Title": "util-linux: util-linux: Heap buffer overread in setpwnam() when processing 256-byte usernames",
          "Description": "A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-125"
          ],
          "VendorSeverity": {
            "alma": 2,
            "azure": 2,
            "cbl-mariner": 2,
            "debian": 1,
            "oracle-oval": 2,
            "photon": 2,
            "redhat": 2,
            "rocky": 2
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
              "V3Score": 6.1
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:1696",
            "https://access.redhat.com/errata/RHSA-2026:1852",
            "https://access.redhat.com/errata/RHSA-2026:1913",
            "https://access.redhat.com/errata/RHSA-2026:2485",
            "https://access.redhat.com/errata/RHSA-2026:2563",
            "https://access.redhat.com/errata/RHSA-2026:2737",
            "https://access.redhat.com/errata/RHSA-2026:2800",
            "https://access.redhat.com/errata/RHSA-2026:3406",
            "https://access.redhat.com/errata/RHSA-2026:4943",
            "https://access.redhat.com/security/cve/CVE-2025-14104",
            "https://bugzilla.redhat.com/2419369",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2419369",
            "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14104",
            "https://errata.almalinux.org/9/ALSA-2026-1913.html",
            "https://errata.rockylinux.org/RLSA-2026:1913",
            "https://linux.oracle.com/cve/CVE-2025-14104.html",
            "https://linux.oracle.com/errata/ELSA-2026-1913.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-14104",
            "https://www.cve.org/CVERecord?id=CVE-2025-14104"
          ],
          "PublishedDate": "2025-12-05T17:16:03.117Z",
          "LastModifiedDate": "2026-03-18T17:16:03.817Z"
        },
        {
          "VulnerabilityID": "CVE-2026-3184",
          "PkgID": "util-linux@2.41-5",
          "PkgName": "util-linux",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/util-linux@2.41-5?arch=amd64\u0026distro=debian-13.2",
            "UID": "36e8b75cc42ef04e",
            "BOMRef": "pkg:deb/debian/util-linux@2.41-5?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-5",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-3184",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:f722e6b9fa4b48d7005d43861637d8271a526e1e9228d7bd108e5f46d8fefa3f",
          "Title": "util-linux: util-linux: Access control bypass due to improper hostname canonicalization",
          "Description": "A flaw was found in util-linux. Improper hostname canonicalization in the `login(1)` utility, when invoked with the `-h` option, can modify the supplied remote hostname before setting `PAM_RHOST`. A remote attacker could exploit this by providing a specially crafted hostname, potentially bypassing host-based Pluggable Authentication Modules (PAM) access control rules that rely on fully qualified domain names. This could lead to unauthorized access.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-289"
          ],
          "VendorSeverity": {
            "redhat": 1,
            "ubuntu": 2
          },
          "CVSS": {
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
              "V3Score": 3.7
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-3184",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2442570",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-3184",
            "https://www.cve.org/CVERecord?id=CVE-2026-3184"
          ],
          "PublishedDate": "2026-04-03T19:17:23.377Z",
          "LastModifiedDate": "2026-04-03T19:17:23.377Z"
        },
        {
          "VulnerabilityID": "CVE-2026-27456",
          "PkgID": "util-linux@2.41-5",
          "PkgName": "util-linux",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/util-linux@2.41-5?arch=amd64\u0026distro=debian-13.2",
            "UID": "36e8b75cc42ef04e",
            "BOMRef": "pkg:deb/debian/util-linux@2.41-5?arch=amd64\u0026distro=debian-13.2"
          },
          "InstalledVersion": "2.41-5",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-27456",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:f76eaa632d0a658cf7bc5ee5ab90effc08fb9f9fdd7763720fa3ea83bff137fa",
          "Title": "[util-linux: mount(8) TOCTOU symlink attack via loop device]",
          "Description": "util-linux is a random collection of Linux utilities. Prior to version 2.41.4, a TOCTOU (Time-of-Check-Time-of-Use) vulnerability has been identified in the SUID binary /usr/bin/mount from util-linux. The mount binary, when setting up loop devices, validates the source file path with user privileges via fork() + setuid() + realpath(), but subsequently re-canonicalizes and opens it with root privileges (euid=0) without verifying that the path has not been replaced between both operations. Neither O_NOFOLLOW, nor inode comparison, nor post-open fstat() are employed. This allows a local unprivileged user to replace the source file with a symlink pointing to any root-owned file or device during the race window, causing the SUID binary to open and mount it as root. Exploitation requires an /etc/fstab entry with user,loop options whose path points to a directory where the attacker has write permission, and that /usr/bin/mount has the SUID bit set (the default configuration on virtually all Linux distributions). The impact is unauthorized read access to root-protected files and block devices, including backup images, disk volumes, and any file containing a valid filesystem. This issue has been patched in version 2.41.4.",
          "Severity": "UNKNOWN",
          "CweIDs": [
            "CWE-59",
            "CWE-269",
            "CWE-367"
          ],
          "References": [
            "https://github.com/util-linux/util-linux/commit/5e390467b26a3cf3fecc04e1a0d482dff3162fc4",
            "https://github.com/util-linux/util-linux/releases/tag/v2.41.4",
            "https://github.com/util-linux/util-linux/security/advisories/GHSA-qq4x-vfq4-9h9g"
          ],
          "PublishedDate": "2026-04-03T22:16:25.4Z",
          "LastModifiedDate": "2026-04-03T22:16:25.4Z"
        },
        {
          "VulnerabilityID": "CVE-2026-27171",
          "PkgID": "zlib1g@1:1.3.dfsg+really1.3.1-1+b1",
          "PkgName": "zlib1g",
          "PkgIdentifier": {
            "PURL": "pkg:deb/debian/zlib1g@1.3.dfsg%2Breally1.3.1-1%2Bb1?arch=amd64\u0026distro=debian-13.2\u0026epoch=1",
            "UID": "5575e2792666738b",
            "BOMRef": "pkg:deb/debian/zlib1g@1.3.dfsg%2Breally1.3.1-1%2Bb1?arch=amd64\u0026distro=debian-13.2\u0026epoch=1"
          },
          "InstalledVersion": "1:1.3.dfsg+really1.3.1-1+b1",
          "Status": "affected",
          "Layer": {
            "Digest": "sha256:1733a4cd59540b3470ff7a90963bcdea5b543279dd6bdaf022d7883fdad221e5",
            "DiffID": "sha256:77a2b55fbe8b9984ce0af3ffc0b0ab62507668e63306ec161a585e587a3eb164"
          },
          "SeveritySource": "nvd",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-27171",
          "DataSource": {
            "ID": "debian",
            "Name": "Debian Security Tracker",
            "URL": "https://salsa.debian.org/security-tracker-team/security-tracker"
          },
          "Fingerprint": "sha256:1293f8e294898fd346c147bf7cdadf0830ad1623f1267ef1aaca7584dc3a0904",
          "Title": "zlib: zlib: Denial of Service via infinite loop in CRC32 combine functions",
          "Description": "zlib before 1.3.2 allows CPU consumption via crc32_combine64 and crc32_combine_gen64 because x2nmodp can do right shifts within a loop that has no termination condition.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-1284"
          ],
          "VendorSeverity": {
            "azure": 1,
            "nvd": 2,
            "redhat": 1,
            "ubuntu": 1
          },
          "CVSS": {
            "nvd": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 5.5
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
              "V3Score": 3.3
            }
          },
          "References": [
            "https://7asecurity.com/blog/2026/02/zlib-7asecurity-audit/",
            "https://7asecurity.com/reports/pentest-report-zlib-RC1.1.pdf",
            "https://access.redhat.com/security/cve/CVE-2026-27171",
            "https://github.com/madler/zlib/issues/904",
            "https://github.com/madler/zlib/releases/tag/v1.3.2",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-27171",
            "https://ostif.org/zlib-audit-complete/",
            "https://www.cve.org/CVERecord?id=CVE-2026-27171"
          ],
          "PublishedDate": "2026-02-18T04:16:01.263Z",
          "LastModifiedDate": "2026-03-25T21:27:04.603Z"
        }
      ]
    },
    {
      "Target": "Node.js",
      "Class": "lang-pkgs",
      "Type": "node-pkg",
      "Packages": [
        {
          "ID": "@adobe/css-tools@4.4.3",
          "Name": "@adobe/css-tools",
          "Identifier": {
            "PURL": "pkg:npm/%40adobe/css-tools@4.4.3",
            "UID": "540a7fa20eaa409d",
            "BOMRef": "pkg:npm/%40adobe/css-tools@4.4.3"
          },
          "Version": "4.4.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@testing-library/jest-dom@5.17.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@ampproject/remapping@2.3.0",
          "Name": "@ampproject/remapping",
          "Identifier": {
            "PURL": "pkg:npm/%40ampproject/remapping@2.3.0",
            "UID": "b424fbe630635576",
            "BOMRef": "pkg:npm/%40ampproject/remapping@2.3.0"
          },
          "Version": "2.3.0",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "@babel/core@7.28.0",
            "@tailwindcss/node@4.1.11"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@babel/code-frame@7.27.1",
          "Name": "@babel/code-frame",
          "Identifier": {
            "PURL": "pkg:npm/%40babel/code-frame@7.27.1",
            "UID": "6078e1b23ca8e64",
            "BOMRef": "pkg:npm/%40babel/code-frame@7.27.1"
          },
          "Version": "7.27.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@babel/core@7.28.0",
            "@babel/template@7.27.2",
            "@babel/traverse@7.28.0",
            "@testing-library/dom@10.4.0",
            "@testing-library/dom@8.20.1",
            "jest-message-util@30.0.2",
            "parse-json@5.2.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@babel/compat-data@7.28.0",
          "Name": "@babel/compat-data",
          "Identifier": {
            "PURL": "pkg:npm/%40babel/compat-data@7.28.0",
            "UID": "1a16432dd8f430ed",
            "BOMRef": "pkg:npm/%40babel/compat-data@7.28.0"
          },
          "Version": "7.28.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@babel/helper-compilation-targets@7.27.2"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@babel/core@7.28.0",
          "Name": "@babel/core",
          "Identifier": {
            "PURL": "pkg:npm/%40babel/core@7.28.0",
            "UID": "f43c4cb1582c7574",
            "BOMRef": "pkg:npm/%40babel/core@7.28.0"
          },
          "Version": "7.28.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@babel/helper-module-transforms@7.27.3",
            "@babel/plugin-transform-react-jsx-self@7.27.1",
            "@babel/plugin-transform-react-jsx-source@7.27.1",
            "@svgr/babel-plugin-add-jsx-attribute@8.0.0",
            "@svgr/babel-plugin-remove-jsx-attribute@8.0.0",
            "@svgr/babel-plugin-remove-jsx-empty-expression@8.0.0",
            "@svgr/babel-plugin-replace-jsx-attribute-value@8.0.0",
            "@svgr/babel-plugin-svg-dynamic-title@8.0.0",
            "@svgr/babel-plugin-svg-em-dimensions@8.0.0",
            "@svgr/babel-plugin-transform-react-native-svg@8.1.0",
            "@svgr/babel-plugin-transform-svg-component@8.0.0",
            "@svgr/babel-preset@8.1.0",
            "@svgr/core@8.1.0",
            "@svgr/plugin-jsx@8.1.0",
            "@vitejs/plugin-react@4.6.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@babel/generator@7.28.0",
          "Name": "@babel/generator",
          "Identifier": {
            "PURL": "pkg:npm/%40babel/generator@7.28.0",
            "UID": "89407720f3abed19",
            "BOMRef": "pkg:npm/%40babel/generator@7.28.0"
          },
          "Version": "7.28.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@babel/core@7.28.0",
            "@babel/traverse@7.28.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@babel/helper-compilation-targets@7.27.2",
          "Name": "@babel/helper-compilation-targets",
          "Identifier": {
            "PURL": "pkg:npm/%40babel/helper-compilation-targets@7.27.2",
            "UID": "86c3301e17b2519",
            "BOMRef": "pkg:npm/%40babel/helper-compilation-targets@7.27.2"
          },
          "Version": "7.27.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@babel/core@7.28.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@babel/helper-globals@7.28.0",
          "Name": "@babel/helper-globals",
          "Identifier": {
            "PURL": "pkg:npm/%40babel/helper-globals@7.28.0",
            "UID": "14283614a19bfb42",
            "BOMRef": "pkg:npm/%40babel/helper-globals@7.28.0"
          },
          "Version": "7.28.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@babel/traverse@7.28.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@babel/helper-module-imports@7.27.1",
          "Name": "@babel/helper-module-imports",
          "Identifier": {
            "PURL": "pkg:npm/%40babel/helper-module-imports@7.27.1",
            "UID": "383e306ccfad5ffa",
            "BOMRef": "pkg:npm/%40babel/helper-module-imports@7.27.1"
          },
          "Version": "7.27.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@babel/helper-module-transforms@7.27.3",
            "@emotion/babel-plugin@11.13.5"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@babel/helper-module-transforms@7.27.3",
          "Name": "@babel/helper-module-transforms",
          "Identifier": {
            "PURL": "pkg:npm/%40babel/helper-module-transforms@7.27.3",
            "UID": "85bec3cfe599e7fb",
            "BOMRef": "pkg:npm/%40babel/helper-module-transforms@7.27.3"
          },
          "Version": "7.27.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@babel/core@7.28.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@babel/helper-plugin-utils@7.27.1",
          "Name": "@babel/helper-plugin-utils",
          "Identifier": {
            "PURL": "pkg:npm/%40babel/helper-plugin-utils@7.27.1",
            "UID": "1fa02edaa1c0152f",
            "BOMRef": "pkg:npm/%40babel/helper-plugin-utils@7.27.1"
          },
          "Version": "7.27.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@babel/plugin-transform-react-jsx-self@7.27.1",
            "@babel/plugin-transform-react-jsx-source@7.27.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@babel/helper-string-parser@7.27.1",
          "Name": "@babel/helper-string-parser",
          "Identifier": {
            "PURL": "pkg:npm/%40babel/helper-string-parser@7.27.1",
            "UID": "5e64c272ea33a1cc",
            "BOMRef": "pkg:npm/%40babel/helper-string-parser@7.27.1"
          },
          "Version": "7.27.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@babel/types@7.28.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@babel/helper-validator-identifier@7.27.1",
          "Name": "@babel/helper-validator-identifier",
          "Identifier": {
            "PURL": "pkg:npm/%40babel/helper-validator-identifier@7.27.1",
            "UID": "d4cd80dcf4be0f03",
            "BOMRef": "pkg:npm/%40babel/helper-validator-identifier@7.27.1"
          },
          "Version": "7.27.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@babel/code-frame@7.27.1",
            "@babel/helper-module-transforms@7.27.3",
            "@babel/types@7.28.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@babel/helper-validator-option@7.27.1",
          "Name": "@babel/helper-validator-option",
          "Identifier": {
            "PURL": "pkg:npm/%40babel/helper-validator-option@7.27.1",
            "UID": "5d096e9dda45ffcf",
            "BOMRef": "pkg:npm/%40babel/helper-validator-option@7.27.1"
          },
          "Version": "7.27.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@babel/helper-compilation-targets@7.27.2"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@babel/helpers@7.27.6",
          "Name": "@babel/helpers",
          "Identifier": {
            "PURL": "pkg:npm/%40babel/helpers@7.27.6",
            "UID": "f0c7137c4fca39dd",
            "BOMRef": "pkg:npm/%40babel/helpers@7.27.6"
          },
          "Version": "7.27.6",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@babel/core@7.28.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@babel/parser@7.28.0",
          "Name": "@babel/parser",
          "Identifier": {
            "PURL": "pkg:npm/%40babel/parser@7.28.0",
            "UID": "27a2761db9ab8175",
            "BOMRef": "pkg:npm/%40babel/parser@7.28.0"
          },
          "Version": "7.28.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@babel/core@7.28.0",
            "@babel/generator@7.28.0",
            "@babel/template@7.27.2",
            "@babel/traverse@7.28.0",
            "@types/babel__core@7.20.5",
            "@types/babel__template@7.4.4"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@babel/plugin-transform-react-jsx-self@7.27.1",
          "Name": "@babel/plugin-transform-react-jsx-self",
          "Identifier": {
            "PURL": "pkg:npm/%40babel/plugin-transform-react-jsx-self@7.27.1",
            "UID": "37ffb82ff483f594",
            "BOMRef": "pkg:npm/%40babel/plugin-transform-react-jsx-self@7.27.1"
          },
          "Version": "7.27.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@vitejs/plugin-react@4.6.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@babel/plugin-transform-react-jsx-source@7.27.1",
          "Name": "@babel/plugin-transform-react-jsx-source",
          "Identifier": {
            "PURL": "pkg:npm/%40babel/plugin-transform-react-jsx-source@7.27.1",
            "UID": "9a03b2efb9aaef47",
            "BOMRef": "pkg:npm/%40babel/plugin-transform-react-jsx-source@7.27.1"
          },
          "Version": "7.27.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@vitejs/plugin-react@4.6.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@babel/runtime@7.27.6",
          "Name": "@babel/runtime",
          "Identifier": {
            "PURL": "pkg:npm/%40babel/runtime@7.27.6",
            "UID": "da9e1976048d909",
            "BOMRef": "pkg:npm/%40babel/runtime@7.27.6"
          },
          "Version": "7.27.6",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@emotion/babel-plugin@11.13.5",
            "@emotion/react@11.14.0",
            "@emotion/styled@11.14.1",
            "@mui/icons-material@7.2.0",
            "@mui/material@5.17.1",
            "@mui/material@7.2.0",
            "@mui/private-theming@5.17.1",
            "@mui/private-theming@7.2.0",
            "@mui/styled-engine@5.16.14",
            "@mui/styled-engine@7.2.0",
            "@mui/system@5.17.1",
            "@mui/system@7.2.0",
            "@mui/types@7.4.4",
            "@mui/utils@5.17.1",
            "@mui/utils@7.2.0",
            "@mui/x-data-grid@7.29.8",
            "@mui/x-internals@7.29.0",
            "@testing-library/dom@10.4.0",
            "@testing-library/dom@8.20.1",
            "@testing-library/jest-dom@5.17.0",
            "@testing-library/react@13.4.0",
            "@testing-library/user-event@13.5.0",
            "babel-plugin-macros@3.1.0",
            "dom-helpers@5.2.1",
            "react-transition-group@4.4.5"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@babel/template@7.27.2",
          "Name": "@babel/template",
          "Identifier": {
            "PURL": "pkg:npm/%40babel/template@7.27.2",
            "UID": "9391e581737c733a",
            "BOMRef": "pkg:npm/%40babel/template@7.27.2"
          },
          "Version": "7.27.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@babel/core@7.28.0",
            "@babel/helpers@7.27.6",
            "@babel/traverse@7.28.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@babel/traverse@7.28.0",
          "Name": "@babel/traverse",
          "Identifier": {
            "PURL": "pkg:npm/%40babel/traverse@7.28.0",
            "UID": "8087e11eb7b8e45",
            "BOMRef": "pkg:npm/%40babel/traverse@7.28.0"
          },
          "Version": "7.28.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@babel/core@7.28.0",
            "@babel/helper-module-imports@7.27.1",
            "@babel/helper-module-transforms@7.27.3"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@babel/types@7.28.0",
          "Name": "@babel/types",
          "Identifier": {
            "PURL": "pkg:npm/%40babel/types@7.28.0",
            "UID": "1e4da4cf8b5e5bb2",
            "BOMRef": "pkg:npm/%40babel/types@7.28.0"
          },
          "Version": "7.28.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@babel/core@7.28.0",
            "@babel/generator@7.28.0",
            "@babel/helper-module-imports@7.27.1",
            "@babel/helpers@7.27.6",
            "@babel/parser@7.28.0",
            "@babel/template@7.27.2",
            "@babel/traverse@7.28.0",
            "@svgr/hast-util-to-babel-ast@8.0.0",
            "@types/babel__core@7.20.5",
            "@types/babel__generator@7.27.0",
            "@types/babel__template@7.4.4",
            "@types/babel__traverse@7.20.7"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@emotion/babel-plugin@11.13.5",
          "Name": "@emotion/babel-plugin",
          "Identifier": {
            "PURL": "pkg:npm/%40emotion/babel-plugin@11.13.5",
            "UID": "81de581bf677c551",
            "BOMRef": "pkg:npm/%40emotion/babel-plugin@11.13.5"
          },
          "Version": "11.13.5",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@emotion/css@11.13.5",
            "@emotion/react@11.14.0",
            "@emotion/styled@11.14.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@emotion/cache@11.14.0",
          "Name": "@emotion/cache",
          "Identifier": {
            "PURL": "pkg:npm/%40emotion/cache@11.14.0",
            "UID": "99cf66dbee9ec143",
            "BOMRef": "pkg:npm/%40emotion/cache@11.14.0"
          },
          "Version": "11.14.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@emotion/css@11.13.5",
            "@emotion/react@11.14.0",
            "@mui/styled-engine@5.16.14",
            "@mui/styled-engine@7.2.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@emotion/css@11.13.5",
          "Name": "@emotion/css",
          "Identifier": {
            "PURL": "pkg:npm/%40emotion/css@11.13.5",
            "UID": "97e1b1b5f010862e",
            "BOMRef": "pkg:npm/%40emotion/css@11.13.5"
          },
          "Version": "11.13.5",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "react-diff-viewer-continued@3.4.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@emotion/hash@0.9.2",
          "Name": "@emotion/hash",
          "Identifier": {
            "PURL": "pkg:npm/%40emotion/hash@0.9.2",
            "UID": "8669753803a43a79",
            "BOMRef": "pkg:npm/%40emotion/hash@0.9.2"
          },
          "Version": "0.9.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@emotion/babel-plugin@11.13.5",
            "@emotion/serialize@1.3.3"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@emotion/is-prop-valid@1.3.1",
          "Name": "@emotion/is-prop-valid",
          "Identifier": {
            "PURL": "pkg:npm/%40emotion/is-prop-valid@1.3.1",
            "UID": "29d035d54d82ce80",
            "BOMRef": "pkg:npm/%40emotion/is-prop-valid@1.3.1"
          },
          "Version": "1.3.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@emotion/styled@11.14.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@emotion/memoize@0.9.0",
          "Name": "@emotion/memoize",
          "Identifier": {
            "PURL": "pkg:npm/%40emotion/memoize@0.9.0",
            "UID": "f7e25b2e3247f50",
            "BOMRef": "pkg:npm/%40emotion/memoize@0.9.0"
          },
          "Version": "0.9.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@emotion/babel-plugin@11.13.5",
            "@emotion/cache@11.14.0",
            "@emotion/is-prop-valid@1.3.1",
            "@emotion/serialize@1.3.3"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@emotion/react@11.14.0",
          "Name": "@emotion/react",
          "Identifier": {
            "PURL": "pkg:npm/%40emotion/react@11.14.0",
            "UID": "83a5a8b4a1d4c6",
            "BOMRef": "pkg:npm/%40emotion/react@11.14.0"
          },
          "Version": "11.14.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@emotion/styled@11.14.1",
            "@mui/material@5.17.1",
            "@mui/material@7.2.0",
            "@mui/styled-engine@5.16.14",
            "@mui/styled-engine@7.2.0",
            "@mui/system@5.17.1",
            "@mui/system@7.2.0",
            "@mui/x-data-grid@7.29.8",
            "@textea/json-viewer@2.17.2",
            "create-collection-form@0.0.0",
            "mui-chips-input@7.0.1",
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@emotion/serialize@1.3.3",
          "Name": "@emotion/serialize",
          "Identifier": {
            "PURL": "pkg:npm/%40emotion/serialize@1.3.3",
            "UID": "d619308dc3f46100",
            "BOMRef": "pkg:npm/%40emotion/serialize@1.3.3"
          },
          "Version": "1.3.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@emotion/babel-plugin@11.13.5",
            "@emotion/css@11.13.5",
            "@emotion/react@11.14.0",
            "@emotion/styled@11.14.1",
            "@mui/styled-engine@7.2.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@emotion/sheet@1.4.0",
          "Name": "@emotion/sheet",
          "Identifier": {
            "PURL": "pkg:npm/%40emotion/sheet@1.4.0",
            "UID": "5edd766745156cf7",
            "BOMRef": "pkg:npm/%40emotion/sheet@1.4.0"
          },
          "Version": "1.4.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@emotion/cache@11.14.0",
            "@emotion/css@11.13.5",
            "@mui/styled-engine@7.2.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@emotion/styled@11.14.1",
          "Name": "@emotion/styled",
          "Identifier": {
            "PURL": "pkg:npm/%40emotion/styled@11.14.1",
            "UID": "a0a4c4773ec4f71b",
            "BOMRef": "pkg:npm/%40emotion/styled@11.14.1"
          },
          "Version": "11.14.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mui/material@5.17.1",
            "@mui/material@7.2.0",
            "@mui/styled-engine@5.16.14",
            "@mui/styled-engine@7.2.0",
            "@mui/system@5.17.1",
            "@mui/system@7.2.0",
            "@mui/x-data-grid@7.29.8",
            "@textea/json-viewer@2.17.2",
            "create-collection-form@0.0.0",
            "mui-chips-input@7.0.1",
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@emotion/unitless@0.10.0",
          "Name": "@emotion/unitless",
          "Identifier": {
            "PURL": "pkg:npm/%40emotion/unitless@0.10.0",
            "UID": "2a0654721df93974",
            "BOMRef": "pkg:npm/%40emotion/unitless@0.10.0"
          },
          "Version": "0.10.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@emotion/serialize@1.3.3"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@emotion/use-insertion-effect-with-fallbacks@1.2.0",
          "Name": "@emotion/use-insertion-effect-with-fallbacks",
          "Identifier": {
            "PURL": "pkg:npm/%40emotion/use-insertion-effect-with-fallbacks@1.2.0",
            "UID": "385ad3769361a0e7",
            "BOMRef": "pkg:npm/%40emotion/use-insertion-effect-with-fallbacks@1.2.0"
          },
          "Version": "1.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@emotion/react@11.14.0",
            "@emotion/styled@11.14.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@emotion/utils@1.4.2",
          "Name": "@emotion/utils",
          "Identifier": {
            "PURL": "pkg:npm/%40emotion/utils@1.4.2",
            "UID": "f901550a6f36c570",
            "BOMRef": "pkg:npm/%40emotion/utils@1.4.2"
          },
          "Version": "1.4.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@emotion/cache@11.14.0",
            "@emotion/css@11.13.5",
            "@emotion/react@11.14.0",
            "@emotion/serialize@1.3.3",
            "@emotion/styled@11.14.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@emotion/weak-memoize@0.4.0",
          "Name": "@emotion/weak-memoize",
          "Identifier": {
            "PURL": "pkg:npm/%40emotion/weak-memoize@0.4.0",
            "UID": "3898e238b34b36d1",
            "BOMRef": "pkg:npm/%40emotion/weak-memoize@0.4.0"
          },
          "Version": "0.4.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@emotion/cache@11.14.0",
            "@emotion/react@11.14.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@eslint-community/eslint-utils@4.7.0",
          "Name": "@eslint-community/eslint-utils",
          "Identifier": {
            "PURL": "pkg:npm/%40eslint-community/eslint-utils@4.7.0",
            "UID": "570fcd8a4c483359",
            "BOMRef": "pkg:npm/%40eslint-community/eslint-utils@4.7.0"
          },
          "Version": "4.7.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "eslint@8.57.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@eslint-community/regexpp@4.12.1",
          "Name": "@eslint-community/regexpp",
          "Identifier": {
            "PURL": "pkg:npm/%40eslint-community/regexpp@4.12.1",
            "UID": "d4e92173a885bf28",
            "BOMRef": "pkg:npm/%40eslint-community/regexpp@4.12.1"
          },
          "Version": "4.12.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "eslint@8.57.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@eslint/eslintrc@2.1.4",
          "Name": "@eslint/eslintrc",
          "Identifier": {
            "PURL": "pkg:npm/%40eslint/eslintrc@2.1.4",
            "UID": "f6daefce4d858c76",
            "BOMRef": "pkg:npm/%40eslint/eslintrc@2.1.4"
          },
          "Version": "2.1.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "eslint@8.57.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@eslint/js@8.57.1",
          "Name": "@eslint/js",
          "Identifier": {
            "PURL": "pkg:npm/%40eslint/js@8.57.1",
            "UID": "42c1fdd4bb75136b",
            "BOMRef": "pkg:npm/%40eslint/js@8.57.1"
          },
          "Version": "8.57.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "eslint@8.57.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@humanwhocodes/config-array@0.13.0",
          "Name": "@humanwhocodes/config-array",
          "Identifier": {
            "PURL": "pkg:npm/%40humanwhocodes/config-array@0.13.0",
            "UID": "8e50700ac23b771b",
            "BOMRef": "pkg:npm/%40humanwhocodes/config-array@0.13.0"
          },
          "Version": "0.13.0",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "eslint@8.57.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@humanwhocodes/module-importer@1.0.1",
          "Name": "@humanwhocodes/module-importer",
          "Identifier": {
            "PURL": "pkg:npm/%40humanwhocodes/module-importer@1.0.1",
            "UID": "f346b394b91f6125",
            "BOMRef": "pkg:npm/%40humanwhocodes/module-importer@1.0.1"
          },
          "Version": "1.0.1",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "eslint@8.57.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@humanwhocodes/object-schema@2.0.3",
          "Name": "@humanwhocodes/object-schema",
          "Identifier": {
            "PURL": "pkg:npm/%40humanwhocodes/object-schema@2.0.3",
            "UID": "c0bf52eb5b4bacb0",
            "BOMRef": "pkg:npm/%40humanwhocodes/object-schema@2.0.3"
          },
          "Version": "2.0.3",
          "Licenses": [
            "BSD-3-Clause"
          ],
          "DependsOn": [
            "@humanwhocodes/config-array@0.13.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@isaacs/fs-minipass@4.0.1",
          "Name": "@isaacs/fs-minipass",
          "Identifier": {
            "PURL": "pkg:npm/%40isaacs/fs-minipass@4.0.1",
            "UID": "d6fff1b7fcdb7d2c",
            "BOMRef": "pkg:npm/%40isaacs/fs-minipass@4.0.1"
          },
          "Version": "4.0.1",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "tar@7.4.3"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@jest/diff-sequences@30.0.1",
          "Name": "@jest/diff-sequences",
          "Identifier": {
            "PURL": "pkg:npm/%40jest/diff-sequences@30.0.1",
            "UID": "482d685f7b367618",
            "BOMRef": "pkg:npm/%40jest/diff-sequences@30.0.1"
          },
          "Version": "30.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "jest-diff@30.0.4"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@jest/expect-utils@30.0.4",
          "Name": "@jest/expect-utils",
          "Identifier": {
            "PURL": "pkg:npm/%40jest/expect-utils@30.0.4",
            "UID": "ee93c615c8d0d688",
            "BOMRef": "pkg:npm/%40jest/expect-utils@30.0.4"
          },
          "Version": "30.0.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "expect@30.0.4"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@jest/get-type@30.0.1",
          "Name": "@jest/get-type",
          "Identifier": {
            "PURL": "pkg:npm/%40jest/get-type@30.0.1",
            "UID": "8f106ac9ceb93f31",
            "BOMRef": "pkg:npm/%40jest/get-type@30.0.1"
          },
          "Version": "30.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@jest/expect-utils@30.0.4",
            "expect@30.0.4",
            "jest-diff@30.0.4",
            "jest-matcher-utils@30.0.4"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@jest/pattern@30.0.1",
          "Name": "@jest/pattern",
          "Identifier": {
            "PURL": "pkg:npm/%40jest/pattern@30.0.1",
            "UID": "de60e2d25c25cf0a",
            "BOMRef": "pkg:npm/%40jest/pattern@30.0.1"
          },
          "Version": "30.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@jest/types@30.0.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@jest/schemas@30.0.1",
          "Name": "@jest/schemas",
          "Identifier": {
            "PURL": "pkg:npm/%40jest/schemas@30.0.1",
            "UID": "a064aa19c0b24519",
            "BOMRef": "pkg:npm/%40jest/schemas@30.0.1"
          },
          "Version": "30.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "pretty-format@30.0.2",
            "pretty-format@30.0.2",
            "pretty-format@30.0.2",
            "pretty-format@30.0.2",
            "@jest/types@30.0.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@jest/types@30.0.1",
          "Name": "@jest/types",
          "Identifier": {
            "PURL": "pkg:npm/%40jest/types@30.0.1",
            "UID": "c7f8b70c1ba8e089",
            "BOMRef": "pkg:npm/%40jest/types@30.0.1"
          },
          "Version": "30.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "jest-message-util@30.0.2",
            "jest-mock@30.0.2",
            "jest-util@30.0.2"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@jridgewell/gen-mapping@0.3.12",
          "Name": "@jridgewell/gen-mapping",
          "Identifier": {
            "PURL": "pkg:npm/%40jridgewell/gen-mapping@0.3.12",
            "UID": "8325880f40e95e26",
            "BOMRef": "pkg:npm/%40jridgewell/gen-mapping@0.3.12"
          },
          "Version": "0.3.12",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@ampproject/remapping@2.3.0",
            "@babel/generator@7.28.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@jridgewell/resolve-uri@3.1.2",
          "Name": "@jridgewell/resolve-uri",
          "Identifier": {
            "PURL": "pkg:npm/%40jridgewell/resolve-uri@3.1.2",
            "UID": "15e821ce1b619217",
            "BOMRef": "pkg:npm/%40jridgewell/resolve-uri@3.1.2"
          },
          "Version": "3.1.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@jridgewell/trace-mapping@0.3.29"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@jridgewell/sourcemap-codec@1.5.4",
          "Name": "@jridgewell/sourcemap-codec",
          "Identifier": {
            "PURL": "pkg:npm/%40jridgewell/sourcemap-codec@1.5.4",
            "UID": "b6c902b27b6265d3",
            "BOMRef": "pkg:npm/%40jridgewell/sourcemap-codec@1.5.4"
          },
          "Version": "1.5.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@jridgewell/gen-mapping@0.3.12",
            "@jridgewell/trace-mapping@0.3.29",
            "magic-string@0.30.17"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@jridgewell/trace-mapping@0.3.29",
          "Name": "@jridgewell/trace-mapping",
          "Identifier": {
            "PURL": "pkg:npm/%40jridgewell/trace-mapping@0.3.29",
            "UID": "5f7278725a25676c",
            "BOMRef": "pkg:npm/%40jridgewell/trace-mapping@0.3.29"
          },
          "Version": "0.3.29",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@ampproject/remapping@2.3.0",
            "@babel/generator@7.28.0",
            "@jridgewell/gen-mapping@0.3.12"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@kurkle/color@0.3.4",
          "Name": "@kurkle/color",
          "Identifier": {
            "PURL": "pkg:npm/%40kurkle/color@0.3.4",
            "UID": "ebde5a53461b0746",
            "BOMRef": "pkg:npm/%40kurkle/color@0.3.4"
          },
          "Version": "0.3.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "chart.js@4.5.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@mdx-js/mdx@2.3.0",
          "Name": "@mdx-js/mdx",
          "Identifier": {
            "PURL": "pkg:npm/%40mdx-js/mdx@2.3.0",
            "UID": "ee0835ffd41b4760",
            "BOMRef": "pkg:npm/%40mdx-js/mdx@2.3.0"
          },
          "Version": "2.3.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mdx-js/rollup@2.3.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@mdx-js/react@2.3.0",
          "Name": "@mdx-js/react",
          "Identifier": {
            "PURL": "pkg:npm/%40mdx-js/react@2.3.0",
            "UID": "aa96d542811290e",
            "BOMRef": "pkg:npm/%40mdx-js/react@2.3.0"
          },
          "Version": "2.3.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@mdx-js/rollup@2.3.0",
          "Name": "@mdx-js/rollup",
          "Identifier": {
            "PURL": "pkg:npm/%40mdx-js/rollup@2.3.0",
            "UID": "e68595ce14657e75",
            "BOMRef": "pkg:npm/%40mdx-js/rollup@2.3.0"
          },
          "Version": "2.3.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@monaco-editor/loader@1.5.0",
          "Name": "@monaco-editor/loader",
          "Identifier": {
            "PURL": "pkg:npm/%40monaco-editor/loader@1.5.0",
            "UID": "6d0710dcedaf1295",
            "BOMRef": "pkg:npm/%40monaco-editor/loader@1.5.0"
          },
          "Version": "1.5.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@monaco-editor/react@4.7.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@monaco-editor/react@4.7.0",
          "Name": "@monaco-editor/react",
          "Identifier": {
            "PURL": "pkg:npm/%40monaco-editor/react@4.7.0",
            "UID": "a67a49d77d4d4828",
            "BOMRef": "pkg:npm/%40monaco-editor/react@4.7.0"
          },
          "Version": "4.7.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@mui/core-downloads-tracker@5.17.1",
          "Name": "@mui/core-downloads-tracker",
          "Identifier": {
            "PURL": "pkg:npm/%40mui/core-downloads-tracker@5.17.1",
            "UID": "6d49e74bc953d23d",
            "BOMRef": "pkg:npm/%40mui/core-downloads-tracker@5.17.1"
          },
          "Version": "5.17.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mui/material@5.17.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@mui/core-downloads-tracker@7.2.0",
          "Name": "@mui/core-downloads-tracker",
          "Identifier": {
            "PURL": "pkg:npm/%40mui/core-downloads-tracker@7.2.0",
            "UID": "80f2866237a1757c",
            "BOMRef": "pkg:npm/%40mui/core-downloads-tracker@7.2.0"
          },
          "Version": "7.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mui/material@7.2.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@mui/icons-material@7.2.0",
          "Name": "@mui/icons-material",
          "Identifier": {
            "PURL": "pkg:npm/%40mui/icons-material@7.2.0",
            "UID": "75567e51a624fcba",
            "BOMRef": "pkg:npm/%40mui/icons-material@7.2.0"
          },
          "Version": "7.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "create-collection-form@0.0.0",
            "mui-chips-input@7.0.1",
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@mui/material@5.17.1",
          "Name": "@mui/material",
          "Identifier": {
            "PURL": "pkg:npm/%40mui/material@5.17.1",
            "UID": "6de4bca4fd28cb71",
            "BOMRef": "pkg:npm/%40mui/material@5.17.1"
          },
          "Version": "5.17.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@textea/json-viewer@2.17.2"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@mui/material@7.2.0",
          "Name": "@mui/material",
          "Identifier": {
            "PURL": "pkg:npm/%40mui/material@7.2.0",
            "UID": "f20f36400a9ecc4",
            "BOMRef": "pkg:npm/%40mui/material@7.2.0"
          },
          "Version": "7.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mui/icons-material@7.2.0",
            "@mui/x-data-grid@7.29.8",
            "create-collection-form@0.0.0",
            "mui-chips-input@7.0.1",
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@mui/private-theming@5.17.1",
          "Name": "@mui/private-theming",
          "Identifier": {
            "PURL": "pkg:npm/%40mui/private-theming@5.17.1",
            "UID": "7436f5af01855f27",
            "BOMRef": "pkg:npm/%40mui/private-theming@5.17.1"
          },
          "Version": "5.17.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mui/system@5.17.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@mui/private-theming@7.2.0",
          "Name": "@mui/private-theming",
          "Identifier": {
            "PURL": "pkg:npm/%40mui/private-theming@7.2.0",
            "UID": "4035566b00991204",
            "BOMRef": "pkg:npm/%40mui/private-theming@7.2.0"
          },
          "Version": "7.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mui/system@7.2.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@mui/styled-engine@5.16.14",
          "Name": "@mui/styled-engine",
          "Identifier": {
            "PURL": "pkg:npm/%40mui/styled-engine@5.16.14",
            "UID": "2231acaac1a6feeb",
            "BOMRef": "pkg:npm/%40mui/styled-engine@5.16.14"
          },
          "Version": "5.16.14",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mui/system@5.17.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@mui/styled-engine@7.2.0",
          "Name": "@mui/styled-engine",
          "Identifier": {
            "PURL": "pkg:npm/%40mui/styled-engine@7.2.0",
            "UID": "d79cc3e9430fdf6d",
            "BOMRef": "pkg:npm/%40mui/styled-engine@7.2.0"
          },
          "Version": "7.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mui/system@7.2.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@mui/system@5.17.1",
          "Name": "@mui/system",
          "Identifier": {
            "PURL": "pkg:npm/%40mui/system@5.17.1",
            "UID": "1540139bf4cc3daa",
            "BOMRef": "pkg:npm/%40mui/system@5.17.1"
          },
          "Version": "5.17.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mui/material@5.17.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@mui/system@7.2.0",
          "Name": "@mui/system",
          "Identifier": {
            "PURL": "pkg:npm/%40mui/system@7.2.0",
            "UID": "2daf33e85faa61fa",
            "BOMRef": "pkg:npm/%40mui/system@7.2.0"
          },
          "Version": "7.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mui/material@7.2.0",
            "@mui/x-data-grid@7.29.8"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@mui/types@7.2.24",
          "Name": "@mui/types",
          "Identifier": {
            "PURL": "pkg:npm/%40mui/types@7.2.24",
            "UID": "e9e477d763a31f3",
            "BOMRef": "pkg:npm/%40mui/types@7.2.24"
          },
          "Version": "7.2.24",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mui/material@5.17.1",
            "@mui/system@5.17.1",
            "@mui/utils@5.17.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@mui/types@7.4.4",
          "Name": "@mui/types",
          "Identifier": {
            "PURL": "pkg:npm/%40mui/types@7.4.4",
            "UID": "c3782f6e696832e6",
            "BOMRef": "pkg:npm/%40mui/types@7.4.4"
          },
          "Version": "7.4.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mui/material@7.2.0",
            "@mui/system@7.2.0",
            "@mui/utils@7.2.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@mui/utils@5.17.1",
          "Name": "@mui/utils",
          "Identifier": {
            "PURL": "pkg:npm/%40mui/utils@5.17.1",
            "UID": "74131d59231e809b",
            "BOMRef": "pkg:npm/%40mui/utils@5.17.1"
          },
          "Version": "5.17.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mui/material@5.17.1",
            "@mui/private-theming@5.17.1",
            "@mui/system@5.17.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@mui/utils@7.2.0",
          "Name": "@mui/utils",
          "Identifier": {
            "PURL": "pkg:npm/%40mui/utils@7.2.0",
            "UID": "efe5fda061e98275",
            "BOMRef": "pkg:npm/%40mui/utils@7.2.0"
          },
          "Version": "7.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mui/material@7.2.0",
            "@mui/private-theming@7.2.0",
            "@mui/system@7.2.0",
            "@mui/x-data-grid@7.29.8",
            "@mui/x-internals@7.29.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@mui/x-data-grid@7.29.8",
          "Name": "@mui/x-data-grid",
          "Identifier": {
            "PURL": "pkg:npm/%40mui/x-data-grid@7.29.8",
            "UID": "ebbc0e26c5e7e05c",
            "BOMRef": "pkg:npm/%40mui/x-data-grid@7.29.8"
          },
          "Version": "7.29.8",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@mui/x-internals@7.29.0",
          "Name": "@mui/x-internals",
          "Identifier": {
            "PURL": "pkg:npm/%40mui/x-internals@7.29.0",
            "UID": "314b2a000c3ec818",
            "BOMRef": "pkg:npm/%40mui/x-internals@7.29.0"
          },
          "Version": "7.29.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mui/x-data-grid@7.29.8"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@nodelib/fs.scandir@2.1.5",
          "Name": "@nodelib/fs.scandir",
          "Identifier": {
            "PURL": "pkg:npm/%40nodelib/fs.scandir@2.1.5",
            "UID": "d68c62d528a1b6aa",
            "BOMRef": "pkg:npm/%40nodelib/fs.scandir@2.1.5"
          },
          "Version": "2.1.5",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@nodelib/fs.walk@1.2.8"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@nodelib/fs.stat@2.0.5",
          "Name": "@nodelib/fs.stat",
          "Identifier": {
            "PURL": "pkg:npm/%40nodelib/fs.stat@2.0.5",
            "UID": "9b6cb647e4ad9713",
            "BOMRef": "pkg:npm/%40nodelib/fs.stat@2.0.5"
          },
          "Version": "2.0.5",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@nodelib/fs.scandir@2.1.5"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@nodelib/fs.walk@1.2.8",
          "Name": "@nodelib/fs.walk",
          "Identifier": {
            "PURL": "pkg:npm/%40nodelib/fs.walk@1.2.8",
            "UID": "deafa6f4c850f2d6",
            "BOMRef": "pkg:npm/%40nodelib/fs.walk@1.2.8"
          },
          "Version": "1.2.8",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "eslint@8.57.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@parcel/watcher@2.5.1",
          "Name": "@parcel/watcher",
          "Identifier": {
            "PURL": "pkg:npm/%40parcel/watcher@2.5.1",
            "UID": "3ff18b1320a42ae4",
            "BOMRef": "pkg:npm/%40parcel/watcher@2.5.1"
          },
          "Version": "2.5.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@tailwindcss/cli@4.1.11"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@popperjs/core@2.11.8",
          "Name": "@popperjs/core",
          "Identifier": {
            "PURL": "pkg:npm/%40popperjs/core@2.11.8",
            "UID": "834050be80813cea",
            "BOMRef": "pkg:npm/%40popperjs/core@2.11.8"
          },
          "Version": "2.11.8",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mui/material@5.17.1",
            "@mui/material@7.2.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@qdrant/js-client-rest@1.15.1",
          "Name": "@qdrant/js-client-rest",
          "Identifier": {
            "PURL": "pkg:npm/%40qdrant/js-client-rest@1.15.1",
            "UID": "55e15f7879be27b9",
            "BOMRef": "pkg:npm/%40qdrant/js-client-rest@1.15.1"
          },
          "Version": "1.15.1",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@qdrant/openapi-typescript-fetch@1.2.6",
          "Name": "@qdrant/openapi-typescript-fetch",
          "Identifier": {
            "PURL": "pkg:npm/%40qdrant/openapi-typescript-fetch@1.2.6",
            "UID": "744e5f732095bebb",
            "BOMRef": "pkg:npm/%40qdrant/openapi-typescript-fetch@1.2.6"
          },
          "Version": "1.2.6",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@qdrant/js-client-rest@1.15.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@remix-run/router@1.23.0",
          "Name": "@remix-run/router",
          "Identifier": {
            "PURL": "pkg:npm/%40remix-run/router@1.23.0",
            "UID": "5998a9fa5dc14ca5",
            "BOMRef": "pkg:npm/%40remix-run/router@1.23.0"
          },
          "Version": "1.23.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "react-router-dom@6.30.1",
            "react-router@6.30.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@rolldown/pluginutils@1.0.0-beta.19",
          "Name": "@rolldown/pluginutils",
          "Identifier": {
            "PURL": "pkg:npm/%40rolldown/pluginutils@1.0.0-beta.19",
            "UID": "ea2217234eaade0",
            "BOMRef": "pkg:npm/%40rolldown/pluginutils@1.0.0-beta.19"
          },
          "Version": "1.0.0-beta.19",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@vitejs/plugin-react@4.6.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@rollup/pluginutils@4.2.1",
          "Name": "@rollup/pluginutils",
          "Identifier": {
            "PURL": "pkg:npm/%40rollup/pluginutils@4.2.1",
            "UID": "2dc2ca326b91f953",
            "BOMRef": "pkg:npm/%40rollup/pluginutils@4.2.1"
          },
          "Version": "4.2.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "vite-plugin-eslint@1.8.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@rollup/pluginutils@5.2.0",
          "Name": "@rollup/pluginutils",
          "Identifier": {
            "PURL": "pkg:npm/%40rollup/pluginutils@5.2.0",
            "UID": "d4679af3da383f4c",
            "BOMRef": "pkg:npm/%40rollup/pluginutils@5.2.0"
          },
          "Version": "5.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mdx-js/rollup@2.3.0",
            "vite-plugin-svgr@4.3.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@rollup/rollup-linux-x64-gnu@4.44.2",
          "Name": "@rollup/rollup-linux-x64-gnu",
          "Identifier": {
            "PURL": "pkg:npm/%40rollup/rollup-linux-x64-gnu@4.44.2",
            "UID": "18540d5861d54e18",
            "BOMRef": "pkg:npm/%40rollup/rollup-linux-x64-gnu@4.44.2"
          },
          "Version": "4.44.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "rollup@4.44.2"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@rollup/rollup-linux-x64-gnu@4.52.4",
          "Name": "@rollup/rollup-linux-x64-gnu",
          "Identifier": {
            "PURL": "pkg:npm/%40rollup/rollup-linux-x64-gnu@4.52.4",
            "UID": "7dcaa3ee09606fd0",
            "BOMRef": "pkg:npm/%40rollup/rollup-linux-x64-gnu@4.52.4"
          },
          "Version": "4.52.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@rollup/rollup-linux-x64-musl@4.44.2",
          "Name": "@rollup/rollup-linux-x64-musl",
          "Identifier": {
            "PURL": "pkg:npm/%40rollup/rollup-linux-x64-musl@4.44.2",
            "UID": "36fa48bbb12914bf",
            "BOMRef": "pkg:npm/%40rollup/rollup-linux-x64-musl@4.44.2"
          },
          "Version": "4.44.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "rollup@4.44.2"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@saehrimnir/druidjs@0.6.3",
          "Name": "@saehrimnir/druidjs",
          "Identifier": {
            "PURL": "pkg:npm/%40saehrimnir/druidjs@0.6.3",
            "UID": "57475f63c130f8c5",
            "BOMRef": "pkg:npm/%40saehrimnir/druidjs@0.6.3"
          },
          "Version": "0.6.3",
          "Licenses": [
            "BSD-3-Clause"
          ],
          "DependsOn": [
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@sevinf/maybe@0.5.0",
          "Name": "@sevinf/maybe",
          "Identifier": {
            "PURL": "pkg:npm/%40sevinf/maybe@0.5.0",
            "UID": "a65e8f1929a48cb7",
            "BOMRef": "pkg:npm/%40sevinf/maybe@0.5.0"
          },
          "Version": "0.5.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@qdrant/js-client-rest@1.15.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@sinclair/typebox@0.34.37",
          "Name": "@sinclair/typebox",
          "Identifier": {
            "PURL": "pkg:npm/%40sinclair/typebox@0.34.37",
            "UID": "d1bb2f825995eab2",
            "BOMRef": "pkg:npm/%40sinclair/typebox@0.34.37"
          },
          "Version": "0.34.37",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@jest/schemas@30.0.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@svgr/babel-plugin-add-jsx-attribute@8.0.0",
          "Name": "@svgr/babel-plugin-add-jsx-attribute",
          "Identifier": {
            "PURL": "pkg:npm/%40svgr/babel-plugin-add-jsx-attribute@8.0.0",
            "UID": "33c853d060922540",
            "BOMRef": "pkg:npm/%40svgr/babel-plugin-add-jsx-attribute@8.0.0"
          },
          "Version": "8.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@svgr/babel-preset@8.1.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@svgr/babel-plugin-remove-jsx-attribute@8.0.0",
          "Name": "@svgr/babel-plugin-remove-jsx-attribute",
          "Identifier": {
            "PURL": "pkg:npm/%40svgr/babel-plugin-remove-jsx-attribute@8.0.0",
            "UID": "79499179602ce754",
            "BOMRef": "pkg:npm/%40svgr/babel-plugin-remove-jsx-attribute@8.0.0"
          },
          "Version": "8.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@svgr/babel-preset@8.1.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@svgr/babel-plugin-remove-jsx-empty-expression@8.0.0",
          "Name": "@svgr/babel-plugin-remove-jsx-empty-expression",
          "Identifier": {
            "PURL": "pkg:npm/%40svgr/babel-plugin-remove-jsx-empty-expression@8.0.0",
            "UID": "a71e50cb6dcf179",
            "BOMRef": "pkg:npm/%40svgr/babel-plugin-remove-jsx-empty-expression@8.0.0"
          },
          "Version": "8.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@svgr/babel-preset@8.1.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@svgr/babel-plugin-replace-jsx-attribute-value@8.0.0",
          "Name": "@svgr/babel-plugin-replace-jsx-attribute-value",
          "Identifier": {
            "PURL": "pkg:npm/%40svgr/babel-plugin-replace-jsx-attribute-value@8.0.0",
            "UID": "3eb3bed90c8794fe",
            "BOMRef": "pkg:npm/%40svgr/babel-plugin-replace-jsx-attribute-value@8.0.0"
          },
          "Version": "8.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@svgr/babel-preset@8.1.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@svgr/babel-plugin-svg-dynamic-title@8.0.0",
          "Name": "@svgr/babel-plugin-svg-dynamic-title",
          "Identifier": {
            "PURL": "pkg:npm/%40svgr/babel-plugin-svg-dynamic-title@8.0.0",
            "UID": "bd7447ed7e0630e0",
            "BOMRef": "pkg:npm/%40svgr/babel-plugin-svg-dynamic-title@8.0.0"
          },
          "Version": "8.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@svgr/babel-preset@8.1.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@svgr/babel-plugin-svg-em-dimensions@8.0.0",
          "Name": "@svgr/babel-plugin-svg-em-dimensions",
          "Identifier": {
            "PURL": "pkg:npm/%40svgr/babel-plugin-svg-em-dimensions@8.0.0",
            "UID": "8ab4a9977b881a5f",
            "BOMRef": "pkg:npm/%40svgr/babel-plugin-svg-em-dimensions@8.0.0"
          },
          "Version": "8.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@svgr/babel-preset@8.1.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@svgr/babel-plugin-transform-react-native-svg@8.1.0",
          "Name": "@svgr/babel-plugin-transform-react-native-svg",
          "Identifier": {
            "PURL": "pkg:npm/%40svgr/babel-plugin-transform-react-native-svg@8.1.0",
            "UID": "21d2fee54458beb7",
            "BOMRef": "pkg:npm/%40svgr/babel-plugin-transform-react-native-svg@8.1.0"
          },
          "Version": "8.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@svgr/babel-preset@8.1.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@svgr/babel-plugin-transform-svg-component@8.0.0",
          "Name": "@svgr/babel-plugin-transform-svg-component",
          "Identifier": {
            "PURL": "pkg:npm/%40svgr/babel-plugin-transform-svg-component@8.0.0",
            "UID": "d31c871329e2333d",
            "BOMRef": "pkg:npm/%40svgr/babel-plugin-transform-svg-component@8.0.0"
          },
          "Version": "8.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@svgr/babel-preset@8.1.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@svgr/babel-preset@8.1.0",
          "Name": "@svgr/babel-preset",
          "Identifier": {
            "PURL": "pkg:npm/%40svgr/babel-preset@8.1.0",
            "UID": "64cdcb162a5462d2",
            "BOMRef": "pkg:npm/%40svgr/babel-preset@8.1.0"
          },
          "Version": "8.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@svgr/core@8.1.0",
            "@svgr/plugin-jsx@8.1.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@svgr/core@8.1.0",
          "Name": "@svgr/core",
          "Identifier": {
            "PURL": "pkg:npm/%40svgr/core@8.1.0",
            "UID": "d497ae3b6726569",
            "BOMRef": "pkg:npm/%40svgr/core@8.1.0"
          },
          "Version": "8.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@svgr/plugin-jsx@8.1.0",
            "vite-plugin-svgr@4.3.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@svgr/hast-util-to-babel-ast@8.0.0",
          "Name": "@svgr/hast-util-to-babel-ast",
          "Identifier": {
            "PURL": "pkg:npm/%40svgr/hast-util-to-babel-ast@8.0.0",
            "UID": "529df551ee639b26",
            "BOMRef": "pkg:npm/%40svgr/hast-util-to-babel-ast@8.0.0"
          },
          "Version": "8.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@svgr/plugin-jsx@8.1.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@svgr/plugin-jsx@8.1.0",
          "Name": "@svgr/plugin-jsx",
          "Identifier": {
            "PURL": "pkg:npm/%40svgr/plugin-jsx@8.1.0",
            "UID": "d940bd91473ebc9c",
            "BOMRef": "pkg:npm/%40svgr/plugin-jsx@8.1.0"
          },
          "Version": "8.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "vite-plugin-svgr@4.3.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@tailwindcss/cli@4.1.11",
          "Name": "@tailwindcss/cli",
          "Identifier": {
            "PURL": "pkg:npm/%40tailwindcss/cli@4.1.11",
            "UID": "c73d5973e41a9017",
            "BOMRef": "pkg:npm/%40tailwindcss/cli@4.1.11"
          },
          "Version": "4.1.11",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@uppy/components@0.2.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@tailwindcss/node@4.1.11",
          "Name": "@tailwindcss/node",
          "Identifier": {
            "PURL": "pkg:npm/%40tailwindcss/node@4.1.11",
            "UID": "b625f4505fd87523",
            "BOMRef": "pkg:npm/%40tailwindcss/node@4.1.11"
          },
          "Version": "4.1.11",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@tailwindcss/cli@4.1.11"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@tailwindcss/oxide@4.1.11",
          "Name": "@tailwindcss/oxide",
          "Identifier": {
            "PURL": "pkg:npm/%40tailwindcss/oxide@4.1.11",
            "UID": "4947d1f03d0ec41a",
            "BOMRef": "pkg:npm/%40tailwindcss/oxide@4.1.11"
          },
          "Version": "4.1.11",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@tailwindcss/cli@4.1.11"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@tailwindcss/oxide-linux-x64-gnu@4.1.11",
          "Name": "@tailwindcss/oxide-linux-x64-gnu",
          "Identifier": {
            "PURL": "pkg:npm/%40tailwindcss/oxide-linux-x64-gnu@4.1.11",
            "UID": "5054d44435ea63ed",
            "BOMRef": "pkg:npm/%40tailwindcss/oxide-linux-x64-gnu@4.1.11"
          },
          "Version": "4.1.11",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@tailwindcss/oxide@4.1.11"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@testing-library/dom@10.4.0",
          "Name": "@testing-library/dom",
          "Identifier": {
            "PURL": "pkg:npm/%40testing-library/dom@10.4.0",
            "UID": "f40355548e57f6a0",
            "BOMRef": "pkg:npm/%40testing-library/dom@10.4.0"
          },
          "Version": "10.4.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@testing-library/user-event@13.5.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@testing-library/dom@8.20.1",
          "Name": "@testing-library/dom",
          "Identifier": {
            "PURL": "pkg:npm/%40testing-library/dom@8.20.1",
            "UID": "95f426cfd256996",
            "BOMRef": "pkg:npm/%40testing-library/dom@8.20.1"
          },
          "Version": "8.20.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@testing-library/react@13.4.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@testing-library/jest-dom@5.17.0",
          "Name": "@testing-library/jest-dom",
          "Identifier": {
            "PURL": "pkg:npm/%40testing-library/jest-dom@5.17.0",
            "UID": "7690d45ad709420",
            "BOMRef": "pkg:npm/%40testing-library/jest-dom@5.17.0"
          },
          "Version": "5.17.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@testing-library/react@13.4.0",
          "Name": "@testing-library/react",
          "Identifier": {
            "PURL": "pkg:npm/%40testing-library/react@13.4.0",
            "UID": "39aca6b58f3b8453",
            "BOMRef": "pkg:npm/%40testing-library/react@13.4.0"
          },
          "Version": "13.4.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@testing-library/user-event@13.5.0",
          "Name": "@testing-library/user-event",
          "Identifier": {
            "PURL": "pkg:npm/%40testing-library/user-event@13.5.0",
            "UID": "54d8ce235c5fca3",
            "BOMRef": "pkg:npm/%40testing-library/user-event@13.5.0"
          },
          "Version": "13.5.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@textea/json-viewer@2.17.2",
          "Name": "@textea/json-viewer",
          "Identifier": {
            "PURL": "pkg:npm/%40textea/json-viewer@2.17.2",
            "UID": "f8f938624c888736",
            "BOMRef": "pkg:npm/%40textea/json-viewer@2.17.2"
          },
          "Version": "2.17.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@tootallnate/once@2.0.0",
          "Name": "@tootallnate/once",
          "Identifier": {
            "PURL": "pkg:npm/%40tootallnate/once@2.0.0",
            "UID": "bbb7e2e23c74b5a2",
            "BOMRef": "pkg:npm/%40tootallnate/once@2.0.0"
          },
          "Version": "2.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "http-proxy-agent@5.0.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@transloadit/prettier-bytes@0.3.5",
          "Name": "@transloadit/prettier-bytes",
          "Identifier": {
            "PURL": "pkg:npm/%40transloadit/prettier-bytes@0.3.5",
            "UID": "36e7a91f94a6fed7",
            "BOMRef": "pkg:npm/%40transloadit/prettier-bytes@0.3.5"
          },
          "Version": "0.3.5",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@uppy/core@4.4.7",
            "@uppy/dashboard@4.3.4",
            "@uppy/status-bar@4.1.3"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@tweenjs/tween.js@25.0.0",
          "Name": "@tweenjs/tween.js",
          "Identifier": {
            "PURL": "pkg:npm/%40tweenjs/tween.js@25.0.0",
            "UID": "aca2234d99334c26",
            "BOMRef": "pkg:npm/%40tweenjs/tween.js@25.0.0"
          },
          "Version": "25.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "force-graph@1.50.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@types/acorn@4.0.6",
          "Name": "@types/acorn",
          "Identifier": {
            "PURL": "pkg:npm/%40types/acorn@4.0.6",
            "UID": "dff9022d537cf77b",
            "BOMRef": "pkg:npm/%40types/acorn@4.0.6"
          },
          "Version": "4.0.6",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "micromark-extension-mdx-jsx@1.0.5",
            "micromark-util-events-to-acorn@1.2.3"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@types/aria-query@5.0.4",
          "Name": "@types/aria-query",
          "Identifier": {
            "PURL": "pkg:npm/%40types/aria-query@5.0.4",
            "UID": "5aa37ea3a6a40b73",
            "BOMRef": "pkg:npm/%40types/aria-query@5.0.4"
          },
          "Version": "5.0.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@testing-library/dom@10.4.0",
            "@testing-library/dom@8.20.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@types/babel__core@7.20.5",
          "Name": "@types/babel__core",
          "Identifier": {
            "PURL": "pkg:npm/%40types/babel__core@7.20.5",
            "UID": "567c8bdb28346529",
            "BOMRef": "pkg:npm/%40types/babel__core@7.20.5"
          },
          "Version": "7.20.5",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@vitejs/plugin-react@4.6.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@types/babel__generator@7.27.0",
          "Name": "@types/babel__generator",
          "Identifier": {
            "PURL": "pkg:npm/%40types/babel__generator@7.27.0",
            "UID": "27c8a0203afe308f",
            "BOMRef": "pkg:npm/%40types/babel__generator@7.27.0"
          },
          "Version": "7.27.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@types/babel__core@7.20.5"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@types/babel__template@7.4.4",
          "Name": "@types/babel__template",
          "Identifier": {
            "PURL": "pkg:npm/%40types/babel__template@7.4.4",
            "UID": "7ebabcdd5119a521",
            "BOMRef": "pkg:npm/%40types/babel__template@7.4.4"
          },
          "Version": "7.4.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@types/babel__core@7.20.5"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@types/babel__traverse@7.20.7",
          "Name": "@types/babel__traverse",
          "Identifier": {
            "PURL": "pkg:npm/%40types/babel__traverse@7.20.7",
            "UID": "514f584b66e77032",
            "BOMRef": "pkg:npm/%40types/babel__traverse@7.20.7"
          },
          "Version": "7.20.7",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@types/babel__core@7.20.5"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@types/chai@5.2.2",
          "Name": "@types/chai",
          "Identifier": {
            "PURL": "pkg:npm/%40types/chai@5.2.2",
            "UID": "7a84dda728e2834",
            "BOMRef": "pkg:npm/%40types/chai@5.2.2"
          },
          "Version": "5.2.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@vitest/expect@3.2.4",
            "vitest@3.2.4"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@types/debug@4.1.12",
          "Name": "@types/debug",
          "Identifier": {
            "PURL": "pkg:npm/%40types/debug@4.1.12",
            "UID": "d030a6d6c57d29a3",
            "BOMRef": "pkg:npm/%40types/debug@4.1.12"
          },
          "Version": "4.1.12",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "micromark@3.2.0",
            "vitest@3.2.4"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@types/deep-eql@4.0.2",
          "Name": "@types/deep-eql",
          "Identifier": {
            "PURL": "pkg:npm/%40types/deep-eql@4.0.2",
            "UID": "6c9a7a5659a0a1a9",
            "BOMRef": "pkg:npm/%40types/deep-eql@4.0.2"
          },
          "Version": "4.0.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@types/chai@5.2.2"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@types/eslint@8.56.12",
          "Name": "@types/eslint",
          "Identifier": {
            "PURL": "pkg:npm/%40types/eslint@8.56.12",
            "UID": "601b583f9b593209",
            "BOMRef": "pkg:npm/%40types/eslint@8.56.12"
          },
          "Version": "8.56.12",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "vite-plugin-eslint@1.8.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@types/estree@1.0.8",
          "Name": "@types/estree",
          "Identifier": {
            "PURL": "pkg:npm/%40types/estree@1.0.8",
            "UID": "d3b717969d4e65fd",
            "BOMRef": "pkg:npm/%40types/estree@1.0.8"
          },
          "Version": "1.0.8",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@rollup/pluginutils@5.2.0",
            "@types/acorn@4.0.6",
            "@types/eslint@8.56.12",
            "@types/estree-jsx@1.0.5",
            "estree-util-attach-comments@2.1.1",
            "estree-walker@3.0.3",
            "hast-util-to-estree@2.3.3",
            "is-reference@3.0.3",
            "micromark-extension-mdx-expression@1.0.8",
            "micromark-extension-mdx-jsx@1.0.5",
            "micromark-extension-mdxjs-esm@1.0.5",
            "micromark-factory-mdx-expression@1.0.9",
            "micromark-util-events-to-acorn@1.2.3",
            "periscopic@3.1.0",
            "rollup@4.44.2"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@types/estree-jsx@1.0.5",
          "Name": "@types/estree-jsx",
          "Identifier": {
            "PURL": "pkg:npm/%40types/estree-jsx@1.0.5",
            "UID": "4ef72411eba2135",
            "BOMRef": "pkg:npm/%40types/estree-jsx@1.0.5"
          },
          "Version": "1.0.5",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mdx-js/mdx@2.3.0",
            "estree-util-build-jsx@2.2.2",
            "estree-util-to-js@1.2.0",
            "estree-util-visit@1.2.1",
            "hast-util-to-estree@2.3.3",
            "mdast-util-mdx-expression@1.3.2",
            "mdast-util-mdx-jsx@2.1.4",
            "mdast-util-mdxjs-esm@1.3.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@types/hast@2.3.10",
          "Name": "@types/hast",
          "Identifier": {
            "PURL": "pkg:npm/%40types/hast@2.3.10",
            "UID": "4c33c9fba6c6434b",
            "BOMRef": "pkg:npm/%40types/hast@2.3.10"
          },
          "Version": "2.3.10",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "hast-util-to-estree@2.3.3",
            "mdast-util-mdx-expression@1.3.2",
            "mdast-util-mdx-jsx@2.1.4",
            "mdast-util-mdxjs-esm@1.3.1",
            "mdast-util-to-hast@12.3.0",
            "remark-rehype@10.1.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@types/istanbul-lib-coverage@2.0.6",
          "Name": "@types/istanbul-lib-coverage",
          "Identifier": {
            "PURL": "pkg:npm/%40types/istanbul-lib-coverage@2.0.6",
            "UID": "e88eaf0c538a7c73",
            "BOMRef": "pkg:npm/%40types/istanbul-lib-coverage@2.0.6"
          },
          "Version": "2.0.6",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@jest/types@30.0.1",
            "@types/istanbul-lib-report@3.0.3"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@types/istanbul-lib-report@3.0.3",
          "Name": "@types/istanbul-lib-report",
          "Identifier": {
            "PURL": "pkg:npm/%40types/istanbul-lib-report@3.0.3",
            "UID": "f9aa701d353e14c7",
            "BOMRef": "pkg:npm/%40types/istanbul-lib-report@3.0.3"
          },
          "Version": "3.0.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@types/istanbul-reports@3.0.4"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@types/istanbul-reports@3.0.4",
          "Name": "@types/istanbul-reports",
          "Identifier": {
            "PURL": "pkg:npm/%40types/istanbul-reports@3.0.4",
            "UID": "3a5bb1a83c4bf772",
            "BOMRef": "pkg:npm/%40types/istanbul-reports@3.0.4"
          },
          "Version": "3.0.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@jest/types@30.0.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@types/jest@30.0.0",
          "Name": "@types/jest",
          "Identifier": {
            "PURL": "pkg:npm/%40types/jest@30.0.0",
            "UID": "e0a4c755a3f8cb91",
            "BOMRef": "pkg:npm/%40types/jest@30.0.0"
          },
          "Version": "30.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@types/testing-library__jest-dom@5.14.9"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@types/json-schema@7.0.15",
          "Name": "@types/json-schema",
          "Identifier": {
            "PURL": "pkg:npm/%40types/json-schema@7.0.15",
            "UID": "805637a5b665a680",
            "BOMRef": "pkg:npm/%40types/json-schema@7.0.15"
          },
          "Version": "7.0.15",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@types/eslint@8.56.12"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@types/mdast@3.0.15",
          "Name": "@types/mdast",
          "Identifier": {
            "PURL": "pkg:npm/%40types/mdast@3.0.15",
            "UID": "df72850003492b6d",
            "BOMRef": "pkg:npm/%40types/mdast@3.0.15"
          },
          "Version": "3.0.15",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "mdast-util-definitions@5.1.2",
            "mdast-util-from-markdown@1.3.1",
            "mdast-util-mdx-expression@1.3.2",
            "mdast-util-mdx-jsx@2.1.4",
            "mdast-util-mdxjs-esm@1.3.1",
            "mdast-util-phrasing@3.0.1",
            "mdast-util-to-hast@12.3.0",
            "mdast-util-to-markdown@1.5.0",
            "mdast-util-to-string@3.2.0",
            "remark-parse@10.0.2",
            "remark-rehype@10.1.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@types/mdx@2.0.13",
          "Name": "@types/mdx",
          "Identifier": {
            "PURL": "pkg:npm/%40types/mdx@2.0.13",
            "UID": "dfc2a7c5ed1ebf8a",
            "BOMRef": "pkg:npm/%40types/mdx@2.0.13"
          },
          "Version": "2.0.13",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mdx-js/mdx@2.3.0",
            "@mdx-js/react@2.3.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@types/ms@2.1.0",
          "Name": "@types/ms",
          "Identifier": {
            "PURL": "pkg:npm/%40types/ms@2.1.0",
            "UID": "37ccc9c10fc0e2a8",
            "BOMRef": "pkg:npm/%40types/ms@2.1.0"
          },
          "Version": "2.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@types/debug@4.1.12"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@types/node@24.0.10",
          "Name": "@types/node",
          "Identifier": {
            "PURL": "pkg:npm/%40types/node@24.0.10",
            "UID": "d9900bfa75d82905",
            "BOMRef": "pkg:npm/%40types/node@24.0.10"
          },
          "Version": "24.0.10",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@jest/pattern@30.0.1",
            "@jest/types@30.0.1",
            "jest-mock@30.0.2",
            "jest-util@30.0.2",
            "vite@6.4.1",
            "vitest@3.2.4"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@types/parse-json@4.0.2",
          "Name": "@types/parse-json",
          "Identifier": {
            "PURL": "pkg:npm/%40types/parse-json@4.0.2",
            "UID": "901baf5b1a8c54db",
            "BOMRef": "pkg:npm/%40types/parse-json@4.0.2"
          },
          "Version": "4.0.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "cosmiconfig@7.1.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@types/prismjs@1.26.5",
          "Name": "@types/prismjs",
          "Identifier": {
            "PURL": "pkg:npm/%40types/prismjs@1.26.5",
            "UID": "ff5775fc567c399b",
            "BOMRef": "pkg:npm/%40types/prismjs@1.26.5"
          },
          "Version": "1.26.5",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "prism-react-renderer@2.4.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@types/prop-types@15.7.15",
          "Name": "@types/prop-types",
          "Identifier": {
            "PURL": "pkg:npm/%40types/prop-types@15.7.15",
            "UID": "cff647bab3bb5220",
            "BOMRef": "pkg:npm/%40types/prop-types@15.7.15"
          },
          "Version": "15.7.15",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mui/utils@5.17.1",
            "@mui/utils@7.2.0",
            "@types/react@18.3.23"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@types/react@18.3.23",
          "Name": "@types/react",
          "Identifier": {
            "PURL": "pkg:npm/%40types/react@18.3.23",
            "UID": "f8b1703b9f4935a9",
            "BOMRef": "pkg:npm/%40types/react@18.3.23"
          },
          "Version": "18.3.23",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mdx-js/react@2.3.0",
            "@mui/icons-material@7.2.0",
            "@mui/material@5.17.1",
            "@mui/material@7.2.0",
            "@mui/private-theming@5.17.1",
            "@mui/private-theming@7.2.0",
            "@mui/system@5.17.1",
            "@mui/system@7.2.0",
            "@mui/types@7.2.24",
            "@mui/types@7.4.4",
            "@mui/utils@5.17.1",
            "@mui/utils@7.2.0",
            "@types/react-dom@18.3.7",
            "@types/react-transition-group@4.4.12",
            "mui-chips-input@7.0.1",
            "react-archer@4.4.0",
            "zustand@4.5.7"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@types/react-dom@18.3.7",
          "Name": "@types/react-dom",
          "Identifier": {
            "PURL": "pkg:npm/%40types/react-dom@18.3.7",
            "UID": "9d0ba0011d1fdfea",
            "BOMRef": "pkg:npm/%40types/react-dom@18.3.7"
          },
          "Version": "18.3.7",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@testing-library/react@13.4.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@types/react-transition-group@4.4.12",
          "Name": "@types/react-transition-group",
          "Identifier": {
            "PURL": "pkg:npm/%40types/react-transition-group@4.4.12",
            "UID": "df4f3bba5af01a09",
            "BOMRef": "pkg:npm/%40types/react-transition-group@4.4.12"
          },
          "Version": "4.4.12",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mui/material@5.17.1",
            "@mui/material@7.2.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@types/retry@0.12.2",
          "Name": "@types/retry",
          "Identifier": {
            "PURL": "pkg:npm/%40types/retry@0.12.2",
            "UID": "7c8d6eb22cdb6286",
            "BOMRef": "pkg:npm/%40types/retry@0.12.2"
          },
          "Version": "0.12.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "p-retry@6.2.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@types/stack-utils@2.0.3",
          "Name": "@types/stack-utils",
          "Identifier": {
            "PURL": "pkg:npm/%40types/stack-utils@2.0.3",
            "UID": "4a44ed17b0445195",
            "BOMRef": "pkg:npm/%40types/stack-utils@2.0.3"
          },
          "Version": "2.0.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "jest-message-util@30.0.2"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@types/testing-library__jest-dom@5.14.9",
          "Name": "@types/testing-library__jest-dom",
          "Identifier": {
            "PURL": "pkg:npm/%40types/testing-library__jest-dom@5.14.9",
            "UID": "ae913edca9e40ae1",
            "BOMRef": "pkg:npm/%40types/testing-library__jest-dom@5.14.9"
          },
          "Version": "5.14.9",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@testing-library/jest-dom@5.17.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@types/unist@2.0.11",
          "Name": "@types/unist",
          "Identifier": {
            "PURL": "pkg:npm/%40types/unist@2.0.11",
            "UID": "2f719cabbe09a9b2",
            "BOMRef": "pkg:npm/%40types/unist@2.0.11"
          },
          "Version": "2.0.11",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "unist-util-visit-parents@5.1.3",
            "unist-util-visit-parents@5.1.3",
            "unist-util-visit-parents@5.1.3",
            "unist-util-visit-parents@5.1.3",
            "unist-util-visit-parents@5.1.3",
            "unist-util-visit@4.1.2",
            "unist-util-visit@4.1.2",
            "unist-util-visit@4.1.2",
            "unist-util-visit@4.1.2",
            "unist-util-visit@4.1.2",
            "@types/hast@2.3.10",
            "@types/mdast@3.0.15",
            "estree-util-visit@1.2.1",
            "hast-util-to-estree@2.3.3",
            "mdast-util-definitions@5.1.2",
            "mdast-util-from-markdown@1.3.1",
            "mdast-util-mdx-jsx@2.1.4",
            "mdast-util-to-markdown@1.5.0",
            "micromark-util-events-to-acorn@1.2.3",
            "parse-entities@4.0.2",
            "unified@10.1.2",
            "unist-util-is@5.2.1",
            "unist-util-position-from-estree@1.1.2",
            "unist-util-position@4.0.4",
            "unist-util-remove-position@4.0.2",
            "unist-util-stringify-position@3.0.3",
            "vfile-message@3.1.4",
            "vfile@5.3.7"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@types/unist@3.0.3",
          "Name": "@types/unist",
          "Identifier": {
            "PURL": "pkg:npm/%40types/unist@3.0.3",
            "UID": "afd98b2691ef1646",
            "BOMRef": "23189418-6524-4218-811d-b914386712bc"
          },
          "Version": "3.0.3",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@types/unist@3.0.3",
          "Name": "@types/unist",
          "Identifier": {
            "PURL": "pkg:npm/%40types/unist@3.0.3",
            "UID": "7f0b36e7393fe979",
            "BOMRef": "4f484976-82ef-4b7e-a97d-8f76ff8d7cb3"
          },
          "Version": "3.0.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "unist-util-is@6.0.0",
            "unist-util-is@6.0.0",
            "unist-util-visit-parents@6.0.1",
            "unist-util-visit@5.0.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@types/yargs@17.0.33",
          "Name": "@types/yargs",
          "Identifier": {
            "PURL": "pkg:npm/%40types/yargs@17.0.33",
            "UID": "75032062a94e65a0",
            "BOMRef": "pkg:npm/%40types/yargs@17.0.33"
          },
          "Version": "17.0.33",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@jest/types@30.0.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@types/yargs-parser@21.0.3",
          "Name": "@types/yargs-parser",
          "Identifier": {
            "PURL": "pkg:npm/%40types/yargs-parser@21.0.3",
            "UID": "19dce795fb4e91ff",
            "BOMRef": "pkg:npm/%40types/yargs-parser@21.0.3"
          },
          "Version": "21.0.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@types/yargs@17.0.33"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@ungap/structured-clone@1.3.0",
          "Name": "@ungap/structured-clone",
          "Identifier": {
            "PURL": "pkg:npm/%40ungap/structured-clone@1.3.0",
            "UID": "9bc8b4ce6677cf72",
            "BOMRef": "pkg:npm/%40ungap/structured-clone@1.3.0"
          },
          "Version": "1.3.0",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "eslint@8.57.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@uppy/companion-client@4.4.2",
          "Name": "@uppy/companion-client",
          "Identifier": {
            "PURL": "pkg:npm/%40uppy/companion-client@4.4.2",
            "UID": "eb90404c82bfcbcb",
            "BOMRef": "pkg:npm/%40uppy/companion-client@4.4.2"
          },
          "Version": "4.4.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@uppy/xhr-upload@4.3.3"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@uppy/components@0.2.0",
          "Name": "@uppy/components",
          "Identifier": {
            "PURL": "pkg:npm/%40uppy/components@0.2.0",
            "UID": "997071539ad8f4e4",
            "BOMRef": "pkg:npm/%40uppy/components@0.2.0"
          },
          "Version": "0.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@uppy/react@4.4.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@uppy/core@4.4.7",
          "Name": "@uppy/core",
          "Identifier": {
            "PURL": "pkg:npm/%40uppy/core@4.4.7",
            "UID": "b57445530e9a824b",
            "BOMRef": "pkg:npm/%40uppy/core@4.4.7"
          },
          "Version": "4.4.7",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@uppy/companion-client@4.4.2",
            "@uppy/components@0.2.0",
            "@uppy/dashboard@4.3.4",
            "@uppy/drag-drop@4.1.3",
            "@uppy/informer@4.2.1",
            "@uppy/progress-bar@4.2.1",
            "@uppy/provider-views@4.4.5",
            "@uppy/react@4.4.0",
            "@uppy/status-bar@4.1.3",
            "@uppy/thumbnail-generator@4.1.1",
            "@uppy/xhr-upload@4.3.3",
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@uppy/dashboard@4.3.4",
          "Name": "@uppy/dashboard",
          "Identifier": {
            "PURL": "pkg:npm/%40uppy/dashboard@4.3.4",
            "UID": "b891e523a09b8961",
            "BOMRef": "pkg:npm/%40uppy/dashboard@4.3.4"
          },
          "Version": "4.3.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@uppy/react@4.4.0",
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@uppy/drag-drop@4.1.3",
          "Name": "@uppy/drag-drop",
          "Identifier": {
            "PURL": "pkg:npm/%40uppy/drag-drop@4.1.3",
            "UID": "7a4efb1eade447ea",
            "BOMRef": "pkg:npm/%40uppy/drag-drop@4.1.3"
          },
          "Version": "4.1.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@uppy/react@4.4.0",
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@uppy/informer@4.2.1",
          "Name": "@uppy/informer",
          "Identifier": {
            "PURL": "pkg:npm/%40uppy/informer@4.2.1",
            "UID": "f7fb36c8b339466a",
            "BOMRef": "pkg:npm/%40uppy/informer@4.2.1"
          },
          "Version": "4.2.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@uppy/dashboard@4.3.4"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@uppy/progress-bar@4.2.1",
          "Name": "@uppy/progress-bar",
          "Identifier": {
            "PURL": "pkg:npm/%40uppy/progress-bar@4.2.1",
            "UID": "5db3b167b7b2bb62",
            "BOMRef": "pkg:npm/%40uppy/progress-bar@4.2.1"
          },
          "Version": "4.2.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@uppy/react@4.4.0",
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@uppy/provider-views@4.4.5",
          "Name": "@uppy/provider-views",
          "Identifier": {
            "PURL": "pkg:npm/%40uppy/provider-views@4.4.5",
            "UID": "60378de9a08a13bf",
            "BOMRef": "pkg:npm/%40uppy/provider-views@4.4.5"
          },
          "Version": "4.4.5",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@uppy/dashboard@4.3.4"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@uppy/react@4.4.0",
          "Name": "@uppy/react",
          "Identifier": {
            "PURL": "pkg:npm/%40uppy/react@4.4.0",
            "UID": "191bc6c0cdace517",
            "BOMRef": "pkg:npm/%40uppy/react@4.4.0"
          },
          "Version": "4.4.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@uppy/status-bar@4.1.3",
          "Name": "@uppy/status-bar",
          "Identifier": {
            "PURL": "pkg:npm/%40uppy/status-bar@4.1.3",
            "UID": "c4aea3933588ed18",
            "BOMRef": "pkg:npm/%40uppy/status-bar@4.1.3"
          },
          "Version": "4.1.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@uppy/dashboard@4.3.4",
            "@uppy/react@4.4.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@uppy/store-default@4.2.0",
          "Name": "@uppy/store-default",
          "Identifier": {
            "PURL": "pkg:npm/%40uppy/store-default@4.2.0",
            "UID": "c1041fcdb563d5b5",
            "BOMRef": "pkg:npm/%40uppy/store-default@4.2.0"
          },
          "Version": "4.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@uppy/core@4.4.7"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@uppy/thumbnail-generator@4.1.1",
          "Name": "@uppy/thumbnail-generator",
          "Identifier": {
            "PURL": "pkg:npm/%40uppy/thumbnail-generator@4.1.1",
            "UID": "8b1c77920b6f3a7f",
            "BOMRef": "pkg:npm/%40uppy/thumbnail-generator@4.1.1"
          },
          "Version": "4.1.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@uppy/dashboard@4.3.4"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@uppy/utils@6.1.5",
          "Name": "@uppy/utils",
          "Identifier": {
            "PURL": "pkg:npm/%40uppy/utils@6.1.5",
            "UID": "ebcd7e48df894933",
            "BOMRef": "pkg:npm/%40uppy/utils@6.1.5"
          },
          "Version": "6.1.5",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@uppy/companion-client@4.4.2",
            "@uppy/core@4.4.7",
            "@uppy/dashboard@4.3.4",
            "@uppy/drag-drop@4.1.3",
            "@uppy/informer@4.2.1",
            "@uppy/progress-bar@4.2.1",
            "@uppy/provider-views@4.4.5",
            "@uppy/react@4.4.0",
            "@uppy/status-bar@4.1.3",
            "@uppy/thumbnail-generator@4.1.1",
            "@uppy/xhr-upload@4.3.3"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@uppy/xhr-upload@4.3.3",
          "Name": "@uppy/xhr-upload",
          "Identifier": {
            "PURL": "pkg:npm/%40uppy/xhr-upload@4.3.3",
            "UID": "325da0c3e20e5a82",
            "BOMRef": "pkg:npm/%40uppy/xhr-upload@4.3.3"
          },
          "Version": "4.3.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@vitejs/plugin-react@4.6.0",
          "Name": "@vitejs/plugin-react",
          "Identifier": {
            "PURL": "pkg:npm/%40vitejs/plugin-react@4.6.0",
            "UID": "911cef003dfb9885",
            "BOMRef": "pkg:npm/%40vitejs/plugin-react@4.6.0"
          },
          "Version": "4.6.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@vitest/expect@3.2.4",
          "Name": "@vitest/expect",
          "Identifier": {
            "PURL": "pkg:npm/%40vitest/expect@3.2.4",
            "UID": "86960f9284aa4e92",
            "BOMRef": "pkg:npm/%40vitest/expect@3.2.4"
          },
          "Version": "3.2.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "vitest@3.2.4"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@vitest/mocker@3.2.4",
          "Name": "@vitest/mocker",
          "Identifier": {
            "PURL": "pkg:npm/%40vitest/mocker@3.2.4",
            "UID": "944057b90587f801",
            "BOMRef": "pkg:npm/%40vitest/mocker@3.2.4"
          },
          "Version": "3.2.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "vitest@3.2.4"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@vitest/pretty-format@3.2.4",
          "Name": "@vitest/pretty-format",
          "Identifier": {
            "PURL": "pkg:npm/%40vitest/pretty-format@3.2.4",
            "UID": "1fb21a160132ead7",
            "BOMRef": "pkg:npm/%40vitest/pretty-format@3.2.4"
          },
          "Version": "3.2.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@vitest/snapshot@3.2.4",
            "@vitest/utils@3.2.4",
            "vitest@3.2.4"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@vitest/runner@3.2.4",
          "Name": "@vitest/runner",
          "Identifier": {
            "PURL": "pkg:npm/%40vitest/runner@3.2.4",
            "UID": "d15161f23c28e61a",
            "BOMRef": "pkg:npm/%40vitest/runner@3.2.4"
          },
          "Version": "3.2.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "vitest@3.2.4"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@vitest/snapshot@3.2.4",
          "Name": "@vitest/snapshot",
          "Identifier": {
            "PURL": "pkg:npm/%40vitest/snapshot@3.2.4",
            "UID": "40ff730ebf59c0a3",
            "BOMRef": "pkg:npm/%40vitest/snapshot@3.2.4"
          },
          "Version": "3.2.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "vitest@3.2.4"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@vitest/spy@3.2.4",
          "Name": "@vitest/spy",
          "Identifier": {
            "PURL": "pkg:npm/%40vitest/spy@3.2.4",
            "UID": "9bc8b223beaad4e7",
            "BOMRef": "pkg:npm/%40vitest/spy@3.2.4"
          },
          "Version": "3.2.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@vitest/expect@3.2.4",
            "@vitest/mocker@3.2.4",
            "vitest@3.2.4"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@vitest/utils@3.2.4",
          "Name": "@vitest/utils",
          "Identifier": {
            "PURL": "pkg:npm/%40vitest/utils@3.2.4",
            "UID": "c95309edbe4028cb",
            "BOMRef": "pkg:npm/%40vitest/utils@3.2.4"
          },
          "Version": "3.2.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@vitest/expect@3.2.4",
            "@vitest/runner@3.2.4",
            "vitest@3.2.4"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "@webcam/core@1.0.1",
          "Name": "@webcam/core",
          "Identifier": {
            "PURL": "pkg:npm/%40webcam/core@1.0.1",
            "UID": "584fadfb3184dd8b",
            "BOMRef": "pkg:npm/%40webcam/core@1.0.1"
          },
          "Version": "1.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@uppy/components@0.2.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "abab@2.0.6",
          "Name": "abab",
          "Identifier": {
            "PURL": "pkg:npm/abab@2.0.6",
            "UID": "e86b6531ed423546",
            "BOMRef": "pkg:npm/abab@2.0.6"
          },
          "Version": "2.0.6",
          "Licenses": [
            "BSD-3-Clause"
          ],
          "DependsOn": [
            "data-urls@4.0.0",
            "jsdom@22.1.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "accessor-fn@1.5.3",
          "Name": "accessor-fn",
          "Identifier": {
            "PURL": "pkg:npm/accessor-fn@1.5.3",
            "UID": "5a243569249e0aae",
            "BOMRef": "pkg:npm/accessor-fn@1.5.3"
          },
          "Version": "1.5.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "force-graph@1.50.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "acorn@8.15.0",
          "Name": "acorn",
          "Identifier": {
            "PURL": "pkg:npm/acorn@8.15.0",
            "UID": "ff4febca58852be9",
            "BOMRef": "pkg:npm/acorn@8.15.0"
          },
          "Version": "8.15.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "acorn-jsx@5.3.2",
            "espree@9.6.1",
            "micromark-extension-mdxjs@1.0.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "acorn-jsx@5.3.2",
          "Name": "acorn-jsx",
          "Identifier": {
            "PURL": "pkg:npm/acorn-jsx@5.3.2",
            "UID": "d0bf9c2a9359d917",
            "BOMRef": "pkg:npm/acorn-jsx@5.3.2"
          },
          "Version": "5.3.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "espree@9.6.1",
            "micromark-extension-mdxjs@1.0.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "agent-base@6.0.2",
          "Name": "agent-base",
          "Identifier": {
            "PURL": "pkg:npm/agent-base@6.0.2",
            "UID": "3664260331b48c15",
            "BOMRef": "pkg:npm/agent-base@6.0.2"
          },
          "Version": "6.0.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "http-proxy-agent@5.0.0",
            "https-proxy-agent@5.0.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "ajv@6.12.6",
          "Name": "ajv",
          "Identifier": {
            "PURL": "pkg:npm/ajv@6.12.6",
            "UID": "1b30ce404537b231",
            "BOMRef": "pkg:npm/ajv@6.12.6"
          },
          "Version": "6.12.6",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@eslint/eslintrc@2.1.4",
            "eslint@8.57.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "ansi-regex@5.0.1",
          "Name": "ansi-regex",
          "Identifier": {
            "PURL": "pkg:npm/ansi-regex@5.0.1",
            "UID": "17da09e5f22b45bc",
            "BOMRef": "pkg:npm/ansi-regex@5.0.1"
          },
          "Version": "5.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "pretty-format@27.5.1",
            "strip-ansi@6.0.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "ansi-styles@4.3.0",
          "Name": "ansi-styles",
          "Identifier": {
            "PURL": "pkg:npm/ansi-styles@4.3.0",
            "UID": "999945c8c288ae2a",
            "BOMRef": "pkg:npm/ansi-styles@4.3.0"
          },
          "Version": "4.3.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "chalk@3.0.0",
            "chalk@4.1.2"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "ansi-styles@5.2.0",
          "Name": "ansi-styles",
          "Identifier": {
            "PURL": "pkg:npm/ansi-styles@5.2.0",
            "UID": "54a13e53e8baa15d",
            "BOMRef": "48c4c541-63bc-4dee-a2cf-a4b7cabc555a"
          },
          "Version": "5.2.0",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "ansi-styles@5.2.0",
          "Name": "ansi-styles",
          "Identifier": {
            "PURL": "pkg:npm/ansi-styles@5.2.0",
            "UID": "d758b3e694c420b8",
            "BOMRef": "d43522c5-60f0-4068-8dc3-99017a319ec5"
          },
          "Version": "5.2.0",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "ansi-styles@5.2.0",
          "Name": "ansi-styles",
          "Identifier": {
            "PURL": "pkg:npm/ansi-styles@5.2.0",
            "UID": "c71f2de006383ebb",
            "BOMRef": "dba39e60-2493-4e70-9a21-b99937119756"
          },
          "Version": "5.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "pretty-format@30.0.2",
            "pretty-format@30.0.2",
            "pretty-format@30.0.2",
            "pretty-format@30.0.2",
            "pretty-format@27.5.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "ansi-styles@5.2.0",
          "Name": "ansi-styles",
          "Identifier": {
            "PURL": "pkg:npm/ansi-styles@5.2.0",
            "UID": "e0ed6a2ee6741a70",
            "BOMRef": "af33d012-1bbd-4e62-b434-14cfe2957f07"
          },
          "Version": "5.2.0",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "ansi-styles@5.2.0",
          "Name": "ansi-styles",
          "Identifier": {
            "PURL": "pkg:npm/ansi-styles@5.2.0",
            "UID": "1d7b40fae18ff0f7",
            "BOMRef": "bb5c44c7-a647-4b2c-8936-c6230390f59c"
          },
          "Version": "5.2.0",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "argparse@2.0.1",
          "Name": "argparse",
          "Identifier": {
            "PURL": "pkg:npm/argparse@2.0.1",
            "UID": "924c7cdc9e116ca1",
            "BOMRef": "pkg:npm/argparse@2.0.1"
          },
          "Version": "2.0.1",
          "Licenses": [
            "Python-2.0"
          ],
          "DependsOn": [
            "js-yaml@4.1.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "aria-query@5.1.3",
          "Name": "aria-query",
          "Identifier": {
            "PURL": "pkg:npm/aria-query@5.1.3",
            "UID": "82d583ff1e00d481",
            "BOMRef": "pkg:npm/aria-query@5.1.3"
          },
          "Version": "5.1.3",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "@testing-library/dom@8.20.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "aria-query@5.3.0",
          "Name": "aria-query",
          "Identifier": {
            "PURL": "pkg:npm/aria-query@5.3.0",
            "UID": "e0b0653a7b82a32a",
            "BOMRef": "pkg:npm/aria-query@5.3.0"
          },
          "Version": "5.3.0",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "@testing-library/dom@10.4.0",
            "@testing-library/jest-dom@5.17.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "array-buffer-byte-length@1.0.2",
          "Name": "array-buffer-byte-length",
          "Identifier": {
            "PURL": "pkg:npm/array-buffer-byte-length@1.0.2",
            "UID": "2f13da8f06fa55eb",
            "BOMRef": "pkg:npm/array-buffer-byte-length@1.0.2"
          },
          "Version": "1.0.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "arraybuffer.prototype.slice@1.0.4",
            "deep-equal@2.2.3",
            "es-abstract@1.24.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "array-includes@3.1.9",
          "Name": "array-includes",
          "Identifier": {
            "PURL": "pkg:npm/array-includes@3.1.9",
            "UID": "fbd541a8063ff3da",
            "BOMRef": "pkg:npm/array-includes@3.1.9"
          },
          "Version": "3.1.9",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "eslint-plugin-react@7.37.5",
            "jsx-ast-utils@3.3.5"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "array.prototype.findlast@1.2.5",
          "Name": "array.prototype.findlast",
          "Identifier": {
            "PURL": "pkg:npm/array.prototype.findlast@1.2.5",
            "UID": "25dbc496566eb0b2",
            "BOMRef": "pkg:npm/array.prototype.findlast@1.2.5"
          },
          "Version": "1.2.5",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "eslint-plugin-react@7.37.5"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "array.prototype.flat@1.3.3",
          "Name": "array.prototype.flat",
          "Identifier": {
            "PURL": "pkg:npm/array.prototype.flat@1.3.3",
            "UID": "826552f5a4349e74",
            "BOMRef": "pkg:npm/array.prototype.flat@1.3.3"
          },
          "Version": "1.3.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "jsx-ast-utils@3.3.5"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "array.prototype.flatmap@1.3.3",
          "Name": "array.prototype.flatmap",
          "Identifier": {
            "PURL": "pkg:npm/array.prototype.flatmap@1.3.3",
            "UID": "a6c4b3b093ad1792",
            "BOMRef": "pkg:npm/array.prototype.flatmap@1.3.3"
          },
          "Version": "1.3.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "eslint-plugin-react@7.37.5"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "array.prototype.tosorted@1.1.4",
          "Name": "array.prototype.tosorted",
          "Identifier": {
            "PURL": "pkg:npm/array.prototype.tosorted@1.1.4",
            "UID": "4bf22d5fac710c05",
            "BOMRef": "pkg:npm/array.prototype.tosorted@1.1.4"
          },
          "Version": "1.1.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "eslint-plugin-react@7.37.5"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "arraybuffer.prototype.slice@1.0.4",
          "Name": "arraybuffer.prototype.slice",
          "Identifier": {
            "PURL": "pkg:npm/arraybuffer.prototype.slice@1.0.4",
            "UID": "ebc11b1935e91b0b",
            "BOMRef": "pkg:npm/arraybuffer.prototype.slice@1.0.4"
          },
          "Version": "1.0.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "es-abstract@1.24.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "assertion-error@2.0.1",
          "Name": "assertion-error",
          "Identifier": {
            "PURL": "pkg:npm/assertion-error@2.0.1",
            "UID": "17cdfdcdc3cf66db",
            "BOMRef": "pkg:npm/assertion-error@2.0.1"
          },
          "Version": "2.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "chai@5.2.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "astring@1.9.0",
          "Name": "astring",
          "Identifier": {
            "PURL": "pkg:npm/astring@1.9.0",
            "UID": "58b909c23bc4d041",
            "BOMRef": "pkg:npm/astring@1.9.0"
          },
          "Version": "1.9.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "estree-util-to-js@1.2.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "async-function@1.0.0",
          "Name": "async-function",
          "Identifier": {
            "PURL": "pkg:npm/async-function@1.0.0",
            "UID": "dba68325224d04aa",
            "BOMRef": "pkg:npm/async-function@1.0.0"
          },
          "Version": "1.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "is-async-function@2.1.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "asynckit@0.4.0",
          "Name": "asynckit",
          "Identifier": {
            "PURL": "pkg:npm/asynckit@0.4.0",
            "UID": "86cd1e0bdec2fbb8",
            "BOMRef": "pkg:npm/asynckit@0.4.0"
          },
          "Version": "0.4.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "form-data@4.0.4"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "autocomplete-openapi@0.1.6",
          "Name": "autocomplete-openapi",
          "Identifier": {
            "PURL": "pkg:npm/autocomplete-openapi@0.1.6",
            "UID": "d4e864c95549ee09",
            "BOMRef": "pkg:npm/autocomplete-openapi@0.1.6"
          },
          "Version": "0.1.6",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "available-typed-arrays@1.0.7",
          "Name": "available-typed-arrays",
          "Identifier": {
            "PURL": "pkg:npm/available-typed-arrays@1.0.7",
            "UID": "7f88b6793f976dd8",
            "BOMRef": "pkg:npm/available-typed-arrays@1.0.7"
          },
          "Version": "1.0.7",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "es-abstract@1.24.0",
            "typed-array-byte-offset@1.0.4",
            "which-typed-array@1.1.19"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "axios@1.12.2",
          "Name": "axios",
          "Identifier": {
            "PURL": "pkg:npm/axios@1.12.2",
            "UID": "4891ad56a156bfbd",
            "BOMRef": "pkg:npm/axios@1.12.2"
          },
          "Version": "1.12.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "openapi-client-axios@7.6.0",
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "babel-plugin-macros@3.1.0",
          "Name": "babel-plugin-macros",
          "Identifier": {
            "PURL": "pkg:npm/babel-plugin-macros@3.1.0",
            "UID": "c9283f7276a06a13",
            "BOMRef": "pkg:npm/babel-plugin-macros@3.1.0"
          },
          "Version": "3.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@emotion/babel-plugin@11.13.5"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "bail@2.0.2",
          "Name": "bail",
          "Identifier": {
            "PURL": "pkg:npm/bail@2.0.2",
            "UID": "4ab9f12a8fc1ecbd",
            "BOMRef": "pkg:npm/bail@2.0.2"
          },
          "Version": "2.0.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "unified@10.1.2"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "balanced-match@1.0.2",
          "Name": "balanced-match",
          "Identifier": {
            "PURL": "pkg:npm/balanced-match@1.0.2",
            "UID": "872e4371d82108aa",
            "BOMRef": "pkg:npm/balanced-match@1.0.2"
          },
          "Version": "1.0.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "brace-expansion@1.1.12"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "bath-es5@3.0.3",
          "Name": "bath-es5",
          "Identifier": {
            "PURL": "pkg:npm/bath-es5@3.0.3",
            "UID": "b945e4aa2608250f",
            "BOMRef": "pkg:npm/bath-es5@3.0.3"
          },
          "Version": "3.0.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "openapi-client-axios@7.6.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "bezier-js@6.1.4",
          "Name": "bezier-js",
          "Identifier": {
            "PURL": "pkg:npm/bezier-js@6.1.4",
            "UID": "886b8ca3886ad76f",
            "BOMRef": "pkg:npm/bezier-js@6.1.4"
          },
          "Version": "6.1.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "force-graph@1.50.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "brace-expansion@1.1.12",
          "Name": "brace-expansion",
          "Identifier": {
            "PURL": "pkg:npm/brace-expansion@1.1.12",
            "UID": "f15e04daf6e9be30",
            "BOMRef": "pkg:npm/brace-expansion@1.1.12"
          },
          "Version": "1.1.12",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "minimatch@3.1.2"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "braces@3.0.3",
          "Name": "braces",
          "Identifier": {
            "PURL": "pkg:npm/braces@3.0.3",
            "UID": "c913ce459a788a13",
            "BOMRef": "pkg:npm/braces@3.0.3"
          },
          "Version": "3.0.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "micromatch@4.0.8"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "browserslist@4.25.1",
          "Name": "browserslist",
          "Identifier": {
            "PURL": "pkg:npm/browserslist@4.25.1",
            "UID": "2dbaafcb8b551773",
            "BOMRef": "pkg:npm/browserslist@4.25.1"
          },
          "Version": "4.25.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@babel/helper-compilation-targets@7.27.2",
            "update-browserslist-db@1.1.3"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "cac@6.7.14",
          "Name": "cac",
          "Identifier": {
            "PURL": "pkg:npm/cac@6.7.14",
            "UID": "fe76776f7cda7ff6",
            "BOMRef": "pkg:npm/cac@6.7.14"
          },
          "Version": "6.7.14",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "vite-node@3.2.4"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "call-bind@1.0.8",
          "Name": "call-bind",
          "Identifier": {
            "PURL": "pkg:npm/call-bind@1.0.8",
            "UID": "dd0fa1f81921ddaf",
            "BOMRef": "pkg:npm/call-bind@1.0.8"
          },
          "Version": "1.0.8",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "array-includes@3.1.9",
            "array.prototype.findlast@1.2.5",
            "array.prototype.flat@1.3.3",
            "array.prototype.flatmap@1.3.3",
            "array.prototype.tosorted@1.1.4",
            "arraybuffer.prototype.slice@1.0.4",
            "deep-equal@2.2.3",
            "es-abstract@1.24.0",
            "es-get-iterator@1.1.3",
            "es-iterator-helpers@1.2.1",
            "function.prototype.name@1.1.8",
            "is-array-buffer@3.0.5",
            "object-is@1.1.6",
            "object.assign@4.1.7",
            "object.entries@1.1.9",
            "object.fromentries@2.0.8",
            "object.values@1.2.1",
            "reflect.getprototypeof@1.0.10",
            "regexp.prototype.flags@1.5.4",
            "safe-array-concat@1.1.3",
            "string.prototype.matchall@4.0.12",
            "string.prototype.trim@1.2.10",
            "string.prototype.trimend@1.0.9",
            "string.prototype.trimstart@1.0.8",
            "typed-array-byte-length@1.0.3",
            "typed-array-byte-offset@1.0.4",
            "typed-array-length@1.0.7",
            "which-typed-array@1.1.19"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "call-bind-apply-helpers@1.0.2",
          "Name": "call-bind-apply-helpers",
          "Identifier": {
            "PURL": "pkg:npm/call-bind-apply-helpers@1.0.2",
            "UID": "fa9a29355c9bc527",
            "BOMRef": "pkg:npm/call-bind-apply-helpers@1.0.2"
          },
          "Version": "1.0.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "call-bind@1.0.8",
            "call-bound@1.0.4",
            "dunder-proto@1.0.1",
            "get-intrinsic@1.3.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "call-bound@1.0.4",
          "Name": "call-bound",
          "Identifier": {
            "PURL": "pkg:npm/call-bound@1.0.4",
            "UID": "30475f42d4aa9504",
            "BOMRef": "pkg:npm/call-bound@1.0.4"
          },
          "Version": "1.0.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "array-buffer-byte-length@1.0.2",
            "array-includes@3.1.9",
            "data-view-buffer@1.0.2",
            "data-view-byte-length@1.0.2",
            "data-view-byte-offset@1.0.1",
            "es-abstract@1.24.0",
            "es-iterator-helpers@1.2.1",
            "function.prototype.name@1.1.8",
            "get-symbol-description@1.1.0",
            "is-arguments@1.2.0",
            "is-array-buffer@3.0.5",
            "is-async-function@2.1.1",
            "is-boolean-object@1.2.2",
            "is-data-view@1.0.2",
            "is-date-object@1.1.0",
            "is-finalizationregistry@1.1.1",
            "is-generator-function@1.1.0",
            "is-number-object@1.1.1",
            "is-regex@1.2.1",
            "is-shared-array-buffer@1.0.4",
            "is-string@1.1.1",
            "is-symbol@1.1.1",
            "is-weakref@1.1.1",
            "is-weakset@2.0.4",
            "object.assign@4.1.7",
            "object.entries@1.1.9",
            "object.values@1.2.1",
            "safe-array-concat@1.1.3",
            "safe-regex-test@1.1.0",
            "side-channel-map@1.0.1",
            "side-channel-weakmap@1.0.2",
            "string.prototype.matchall@4.0.12",
            "string.prototype.trim@1.2.10",
            "string.prototype.trimend@1.0.9",
            "typed-array-buffer@1.0.3",
            "unbox-primitive@1.1.0",
            "which-builtin-type@1.2.1",
            "which-typed-array@1.1.19"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "callsites@3.1.0",
          "Name": "callsites",
          "Identifier": {
            "PURL": "pkg:npm/callsites@3.1.0",
            "UID": "750c2dea8f71f604",
            "BOMRef": "pkg:npm/callsites@3.1.0"
          },
          "Version": "3.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "parent-module@1.0.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "camelcase@6.3.0",
          "Name": "camelcase",
          "Identifier": {
            "PURL": "pkg:npm/camelcase@6.3.0",
            "UID": "2dc3aca59f4280aa",
            "BOMRef": "pkg:npm/camelcase@6.3.0"
          },
          "Version": "6.3.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@svgr/core@8.1.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "caniuse-lite@1.0.30001726",
          "Name": "caniuse-lite",
          "Identifier": {
            "PURL": "pkg:npm/caniuse-lite@1.0.30001726",
            "UID": "8885207797121bca",
            "BOMRef": "pkg:npm/caniuse-lite@1.0.30001726"
          },
          "Version": "1.0.30001726",
          "Licenses": [
            "CC-BY-4.0"
          ],
          "DependsOn": [
            "browserslist@4.25.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "canvas-color-tracker@1.3.2",
          "Name": "canvas-color-tracker",
          "Identifier": {
            "PURL": "pkg:npm/canvas-color-tracker@1.3.2",
            "UID": "650067a2ec5eb554",
            "BOMRef": "pkg:npm/canvas-color-tracker@1.3.2"
          },
          "Version": "1.3.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "force-graph@1.50.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "ccount@2.0.1",
          "Name": "ccount",
          "Identifier": {
            "PURL": "pkg:npm/ccount@2.0.1",
            "UID": "f8d06d4972e55aeb",
            "BOMRef": "pkg:npm/ccount@2.0.1"
          },
          "Version": "2.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "mdast-util-mdx-jsx@2.1.4"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "chai@5.2.0",
          "Name": "chai",
          "Identifier": {
            "PURL": "pkg:npm/chai@5.2.0",
            "UID": "14d8a5dc2a22b939",
            "BOMRef": "pkg:npm/chai@5.2.0"
          },
          "Version": "5.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@vitest/expect@3.2.4",
            "vitest@3.2.4"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "chalk@3.0.0",
          "Name": "chalk",
          "Identifier": {
            "PURL": "pkg:npm/chalk@3.0.0",
            "UID": "4396fe503ea5a81c",
            "BOMRef": "pkg:npm/chalk@3.0.0"
          },
          "Version": "3.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@testing-library/jest-dom@5.17.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "chalk@4.1.2",
          "Name": "chalk",
          "Identifier": {
            "PURL": "pkg:npm/chalk@4.1.2",
            "UID": "90c10d0384044743",
            "BOMRef": "pkg:npm/chalk@4.1.2"
          },
          "Version": "4.1.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@jest/types@30.0.1",
            "@testing-library/dom@10.4.0",
            "@testing-library/dom@8.20.1",
            "eslint@8.57.1",
            "jest-diff@30.0.4",
            "jest-matcher-utils@30.0.4",
            "jest-message-util@30.0.2",
            "jest-util@30.0.2"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "character-entities@2.0.2",
          "Name": "character-entities",
          "Identifier": {
            "PURL": "pkg:npm/character-entities@2.0.2",
            "UID": "28e0c686acd983c5",
            "BOMRef": "pkg:npm/character-entities@2.0.2"
          },
          "Version": "2.0.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "decode-named-character-reference@1.2.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "character-entities-html4@2.1.0",
          "Name": "character-entities-html4",
          "Identifier": {
            "PURL": "pkg:npm/character-entities-html4@2.1.0",
            "UID": "b79b02c9ae87d389",
            "BOMRef": "pkg:npm/character-entities-html4@2.1.0"
          },
          "Version": "2.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "stringify-entities@4.0.4"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "character-entities-legacy@3.0.0",
          "Name": "character-entities-legacy",
          "Identifier": {
            "PURL": "pkg:npm/character-entities-legacy@3.0.0",
            "UID": "6859f73108360f7c",
            "BOMRef": "pkg:npm/character-entities-legacy@3.0.0"
          },
          "Version": "3.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "parse-entities@4.0.2",
            "stringify-entities@4.0.4"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "character-reference-invalid@2.0.1",
          "Name": "character-reference-invalid",
          "Identifier": {
            "PURL": "pkg:npm/character-reference-invalid@2.0.1",
            "UID": "62bc4b27642a338f",
            "BOMRef": "pkg:npm/character-reference-invalid@2.0.1"
          },
          "Version": "2.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "parse-entities@4.0.2"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "chart.js@4.5.0",
          "Name": "chart.js",
          "Identifier": {
            "PURL": "pkg:npm/chart.js@4.5.0",
            "UID": "830a0523860bfae3",
            "BOMRef": "pkg:npm/chart.js@4.5.0"
          },
          "Version": "4.5.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "check-error@2.1.1",
          "Name": "check-error",
          "Identifier": {
            "PURL": "pkg:npm/check-error@2.1.1",
            "UID": "69e3cb193d048bbf",
            "BOMRef": "pkg:npm/check-error@2.1.1"
          },
          "Version": "2.1.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "chai@5.2.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "chownr@3.0.0",
          "Name": "chownr",
          "Identifier": {
            "PURL": "pkg:npm/chownr@3.0.0",
            "UID": "70d9055e2f6e6d53",
            "BOMRef": "pkg:npm/chownr@3.0.0"
          },
          "Version": "3.0.0",
          "Licenses": [
            "BlueOak-1.0.0"
          ],
          "DependsOn": [
            "tar@7.4.3"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "chroma-js@2.6.0",
          "Name": "chroma-js",
          "Identifier": {
            "PURL": "pkg:npm/chroma-js@2.6.0",
            "UID": "4aacceed88d6211e",
            "BOMRef": "pkg:npm/chroma-js@2.6.0"
          },
          "Version": "2.6.0",
          "Licenses": [
            "BSD-3-Clause AND Apache-2.0"
          ],
          "DependsOn": [
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "ci-info@4.2.0",
          "Name": "ci-info",
          "Identifier": {
            "PURL": "pkg:npm/ci-info@4.2.0",
            "UID": "c22ab122d2bf5562",
            "BOMRef": "pkg:npm/ci-info@4.2.0"
          },
          "Version": "4.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "jest-util@30.0.2"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "classnames@2.5.1",
          "Name": "classnames",
          "Identifier": {
            "PURL": "pkg:npm/classnames@2.5.1",
            "UID": "d71292e1338bd5eb",
            "BOMRef": "pkg:npm/classnames@2.5.1"
          },
          "Version": "2.5.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@uppy/dashboard@4.3.4",
            "@uppy/provider-views@4.4.5",
            "@uppy/status-bar@4.1.3",
            "react-diff-viewer-continued@3.4.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "clsx@1.2.1",
          "Name": "clsx",
          "Identifier": {
            "PURL": "pkg:npm/clsx@1.2.1",
            "UID": "bf42f9ee9de98818",
            "BOMRef": "88f262aa-67e1-4e78-9cab-b216a10312eb"
          },
          "Version": "1.2.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@textea/json-viewer@2.17.2",
            "notistack@3.0.2"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "clsx@1.2.1",
          "Name": "clsx",
          "Identifier": {
            "PURL": "pkg:npm/clsx@1.2.1",
            "UID": "be9de2e7e4a85ceb",
            "BOMRef": "df2a3889-567b-4c93-8d13-92dd899eda60"
          },
          "Version": "1.2.1",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "clsx@2.1.1",
          "Name": "clsx",
          "Identifier": {
            "PURL": "pkg:npm/clsx@2.1.1",
            "UID": "2d348c37be296ae2",
            "BOMRef": "33c751cd-2275-4ae3-b7eb-8f471fe5918b"
          },
          "Version": "2.1.1",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "clsx@2.1.1",
          "Name": "clsx",
          "Identifier": {
            "PURL": "pkg:npm/clsx@2.1.1",
            "UID": "755322f9ce7a37fa",
            "BOMRef": "b58d8af9-1607-4566-8181-4dec4317e9c5"
          },
          "Version": "2.1.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mui/material@5.17.1",
            "@mui/material@7.2.0",
            "@mui/system@5.17.1",
            "@mui/system@7.2.0",
            "@mui/utils@5.17.1",
            "@mui/utils@7.2.0",
            "@mui/x-data-grid@7.29.8",
            "@uppy/components@0.2.0",
            "prism-react-renderer@2.4.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "clsx@2.1.1",
          "Name": "clsx",
          "Identifier": {
            "PURL": "pkg:npm/clsx@2.1.1",
            "UID": "d52e3cbb88ed0f6d",
            "BOMRef": "00d5118c-b72b-47d3-84e6-7479bbc5bb56"
          },
          "Version": "2.1.1",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "clsx@2.1.1",
          "Name": "clsx",
          "Identifier": {
            "PURL": "pkg:npm/clsx@2.1.1",
            "UID": "86224b850a97f697",
            "BOMRef": "25b15f91-4086-461c-b0a3-02f711a850bc"
          },
          "Version": "2.1.1",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "color-convert@2.0.1",
          "Name": "color-convert",
          "Identifier": {
            "PURL": "pkg:npm/color-convert@2.0.1",
            "UID": "92f28c5b1921be2c",
            "BOMRef": "pkg:npm/color-convert@2.0.1"
          },
          "Version": "2.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "ansi-styles@4.3.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "color-name@1.1.4",
          "Name": "color-name",
          "Identifier": {
            "PURL": "pkg:npm/color-name@1.1.4",
            "UID": "c28bb6cacdb9d901",
            "BOMRef": "pkg:npm/color-name@1.1.4"
          },
          "Version": "1.1.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "color-convert@2.0.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "combined-stream@1.0.8",
          "Name": "combined-stream",
          "Identifier": {
            "PURL": "pkg:npm/combined-stream@1.0.8",
            "UID": "4b6dea4e44fd20e1",
            "BOMRef": "pkg:npm/combined-stream@1.0.8"
          },
          "Version": "1.0.8",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "form-data@4.0.4"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "comma-separated-tokens@2.0.3",
          "Name": "comma-separated-tokens",
          "Identifier": {
            "PURL": "pkg:npm/comma-separated-tokens@2.0.3",
            "UID": "d6255a0873f9c527",
            "BOMRef": "pkg:npm/comma-separated-tokens@2.0.3"
          },
          "Version": "2.0.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "hast-util-to-estree@2.3.3"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "concat-map@0.0.1",
          "Name": "concat-map",
          "Identifier": {
            "PURL": "pkg:npm/concat-map@0.0.1",
            "UID": "5c4b4bb8cd2a048b",
            "BOMRef": "pkg:npm/concat-map@0.0.1"
          },
          "Version": "0.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "brace-expansion@1.1.12"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "convert-source-map@1.9.0",
          "Name": "convert-source-map",
          "Identifier": {
            "PURL": "pkg:npm/convert-source-map@1.9.0",
            "UID": "9424c9abc14c1fbc",
            "BOMRef": "pkg:npm/convert-source-map@1.9.0"
          },
          "Version": "1.9.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@emotion/babel-plugin@11.13.5"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "convert-source-map@2.0.0",
          "Name": "convert-source-map",
          "Identifier": {
            "PURL": "pkg:npm/convert-source-map@2.0.0",
            "UID": "47b19966019c6d50",
            "BOMRef": "pkg:npm/convert-source-map@2.0.0"
          },
          "Version": "2.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@babel/core@7.28.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "copy-to-clipboard@3.3.3",
          "Name": "copy-to-clipboard",
          "Identifier": {
            "PURL": "pkg:npm/copy-to-clipboard@3.3.3",
            "UID": "b288fd7d6dc8b3a9",
            "BOMRef": "pkg:npm/copy-to-clipboard@3.3.3"
          },
          "Version": "3.3.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@textea/json-viewer@2.17.2"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "cosmiconfig@7.1.0",
          "Name": "cosmiconfig",
          "Identifier": {
            "PURL": "pkg:npm/cosmiconfig@7.1.0",
            "UID": "fe5f10d43637139",
            "BOMRef": "pkg:npm/cosmiconfig@7.1.0"
          },
          "Version": "7.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "babel-plugin-macros@3.1.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "cosmiconfig@8.3.6",
          "Name": "cosmiconfig",
          "Identifier": {
            "PURL": "pkg:npm/cosmiconfig@8.3.6",
            "UID": "97545f9e106af5dd",
            "BOMRef": "pkg:npm/cosmiconfig@8.3.6"
          },
          "Version": "8.3.6",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@svgr/core@8.1.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "create-collection-form@0.0.0",
          "Name": "create-collection-form",
          "Identifier": {
            "PURL": "pkg:npm/create-collection-form@0.0.0?vcs_url=git+ssh%3A%2F%2Fgit%40github.com%2Fqdrant%2Fcreate-collection-form.git#a3f1e13059f334bf0c9eb2514fcd26bd01cfc59b",
            "UID": "2049400f105ae72a",
            "BOMRef": "pkg:npm/create-collection-form@0.0.0?vcs_url=git+ssh%3A%2F%2Fgit%40github.com%2Fqdrant%2Fcreate-collection-form.git#a3f1e13059f334bf0c9eb2514fcd26bd01cfc59b"
          },
          "Version": "0.0.0",
          "Licenses": [
            "NOASSERTION"
          ],
          "DependsOn": [
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "cross-spawn@7.0.6",
          "Name": "cross-spawn",
          "Identifier": {
            "PURL": "pkg:npm/cross-spawn@7.0.6",
            "UID": "8953b36b49de246f",
            "BOMRef": "pkg:npm/cross-spawn@7.0.6"
          },
          "Version": "7.0.6",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "eslint@8.57.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "css.escape@1.5.1",
          "Name": "css.escape",
          "Identifier": {
            "PURL": "pkg:npm/css.escape@1.5.1",
            "UID": "603ead5528905357",
            "BOMRef": "pkg:npm/css.escape@1.5.1"
          },
          "Version": "1.5.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@testing-library/jest-dom@5.17.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "cssstyle@3.0.0",
          "Name": "cssstyle",
          "Identifier": {
            "PURL": "pkg:npm/cssstyle@3.0.0",
            "UID": "e6a9b7560158cc1c",
            "BOMRef": "pkg:npm/cssstyle@3.0.0"
          },
          "Version": "3.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "jsdom@22.1.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "csstype@3.1.3",
          "Name": "csstype",
          "Identifier": {
            "PURL": "pkg:npm/csstype@3.1.3",
            "UID": "bd412e8d3d7ddb1b",
            "BOMRef": "pkg:npm/csstype@3.1.3"
          },
          "Version": "3.1.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@emotion/serialize@1.3.3",
            "@mui/material@5.17.1",
            "@mui/material@7.2.0",
            "@mui/styled-engine@5.16.14",
            "@mui/styled-engine@7.2.0",
            "@mui/system@5.17.1",
            "@mui/system@7.2.0",
            "@types/react@18.3.23",
            "dom-helpers@5.2.1",
            "goober@2.1.16"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "d3-array@3.2.4",
          "Name": "d3-array",
          "Identifier": {
            "PURL": "pkg:npm/d3-array@3.2.4",
            "UID": "bb5b69d9620d7acc",
            "BOMRef": "pkg:npm/d3-array@3.2.4"
          },
          "Version": "3.2.4",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "d3-scale@4.0.2",
            "d3-time@3.1.0",
            "force-graph@1.50.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "d3-binarytree@1.0.2",
          "Name": "d3-binarytree",
          "Identifier": {
            "PURL": "pkg:npm/d3-binarytree@1.0.2",
            "UID": "91cb091a343848c6",
            "BOMRef": "pkg:npm/d3-binarytree@1.0.2"
          },
          "Version": "1.0.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "d3-force-3d@3.0.6"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "d3-color@3.1.0",
          "Name": "d3-color",
          "Identifier": {
            "PURL": "pkg:npm/d3-color@3.1.0",
            "UID": "3daabdc33ce7339f",
            "BOMRef": "pkg:npm/d3-color@3.1.0"
          },
          "Version": "3.1.0",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "d3-interpolate@3.0.1",
            "d3-scale-chromatic@3.1.0",
            "d3-transition@3.0.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "d3-dispatch@3.0.1",
          "Name": "d3-dispatch",
          "Identifier": {
            "PURL": "pkg:npm/d3-dispatch@3.0.1",
            "UID": "6ff92967de3877b5",
            "BOMRef": "pkg:npm/d3-dispatch@3.0.1"
          },
          "Version": "3.0.1",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "d3-drag@3.0.0",
            "d3-force-3d@3.0.6",
            "d3-transition@3.0.1",
            "d3-zoom@3.0.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "d3-drag@3.0.0",
          "Name": "d3-drag",
          "Identifier": {
            "PURL": "pkg:npm/d3-drag@3.0.0",
            "UID": "16d9a05da48d2a52",
            "BOMRef": "pkg:npm/d3-drag@3.0.0"
          },
          "Version": "3.0.0",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "d3-zoom@3.0.0",
            "force-graph@1.50.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "d3-ease@3.0.1",
          "Name": "d3-ease",
          "Identifier": {
            "PURL": "pkg:npm/d3-ease@3.0.1",
            "UID": "cb440a921bb6632f",
            "BOMRef": "pkg:npm/d3-ease@3.0.1"
          },
          "Version": "3.0.1",
          "Licenses": [
            "BSD-3-Clause"
          ],
          "DependsOn": [
            "d3-transition@3.0.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "d3-force-3d@3.0.6",
          "Name": "d3-force-3d",
          "Identifier": {
            "PURL": "pkg:npm/d3-force-3d@3.0.6",
            "UID": "d54b32993aa4acd0",
            "BOMRef": "pkg:npm/d3-force-3d@3.0.6"
          },
          "Version": "3.0.6",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "force-graph@1.50.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "d3-format@3.1.0",
          "Name": "d3-format",
          "Identifier": {
            "PURL": "pkg:npm/d3-format@3.1.0",
            "UID": "85fc67bac8af1852",
            "BOMRef": "pkg:npm/d3-format@3.1.0"
          },
          "Version": "3.1.0",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "d3-scale@4.0.2"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "d3-interpolate@3.0.1",
          "Name": "d3-interpolate",
          "Identifier": {
            "PURL": "pkg:npm/d3-interpolate@3.0.1",
            "UID": "483f27d637484648",
            "BOMRef": "pkg:npm/d3-interpolate@3.0.1"
          },
          "Version": "3.0.1",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "d3-scale-chromatic@3.1.0",
            "d3-scale@4.0.2",
            "d3-transition@3.0.1",
            "d3-zoom@3.0.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "d3-octree@1.1.0",
          "Name": "d3-octree",
          "Identifier": {
            "PURL": "pkg:npm/d3-octree@1.1.0",
            "UID": "b795142938a43281",
            "BOMRef": "pkg:npm/d3-octree@1.1.0"
          },
          "Version": "1.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "d3-force-3d@3.0.6"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "d3-quadtree@3.0.1",
          "Name": "d3-quadtree",
          "Identifier": {
            "PURL": "pkg:npm/d3-quadtree@3.0.1",
            "UID": "5eeb454d7d2519cc",
            "BOMRef": "pkg:npm/d3-quadtree@3.0.1"
          },
          "Version": "3.0.1",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "d3-force-3d@3.0.6"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "d3-scale@4.0.2",
          "Name": "d3-scale",
          "Identifier": {
            "PURL": "pkg:npm/d3-scale@4.0.2",
            "UID": "e4e79c7d8891d8e8",
            "BOMRef": "pkg:npm/d3-scale@4.0.2"
          },
          "Version": "4.0.2",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "force-graph@1.50.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "d3-scale-chromatic@3.1.0",
          "Name": "d3-scale-chromatic",
          "Identifier": {
            "PURL": "pkg:npm/d3-scale-chromatic@3.1.0",
            "UID": "78ba8d35a94a7ca9",
            "BOMRef": "pkg:npm/d3-scale-chromatic@3.1.0"
          },
          "Version": "3.1.0",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "force-graph@1.50.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "d3-selection@3.0.0",
          "Name": "d3-selection",
          "Identifier": {
            "PURL": "pkg:npm/d3-selection@3.0.0",
            "UID": "a696fb1ced936a17",
            "BOMRef": "pkg:npm/d3-selection@3.0.0"
          },
          "Version": "3.0.0",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "d3-drag@3.0.0",
            "d3-transition@3.0.1",
            "d3-zoom@3.0.0",
            "float-tooltip@1.7.5",
            "force-graph@1.50.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "d3-time@3.1.0",
          "Name": "d3-time",
          "Identifier": {
            "PURL": "pkg:npm/d3-time@3.1.0",
            "UID": "ef3be5a159069a6c",
            "BOMRef": "pkg:npm/d3-time@3.1.0"
          },
          "Version": "3.1.0",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "d3-scale@4.0.2",
            "d3-time-format@4.1.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "d3-time-format@4.1.0",
          "Name": "d3-time-format",
          "Identifier": {
            "PURL": "pkg:npm/d3-time-format@4.1.0",
            "UID": "f3f633ec112b2355",
            "BOMRef": "pkg:npm/d3-time-format@4.1.0"
          },
          "Version": "4.1.0",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "d3-scale@4.0.2"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "d3-timer@3.0.1",
          "Name": "d3-timer",
          "Identifier": {
            "PURL": "pkg:npm/d3-timer@3.0.1",
            "UID": "85d739d8f7221be9",
            "BOMRef": "pkg:npm/d3-timer@3.0.1"
          },
          "Version": "3.0.1",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "d3-force-3d@3.0.6",
            "d3-transition@3.0.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "d3-transition@3.0.1",
          "Name": "d3-transition",
          "Identifier": {
            "PURL": "pkg:npm/d3-transition@3.0.1",
            "UID": "c02fdeef8601b8e6",
            "BOMRef": "pkg:npm/d3-transition@3.0.1"
          },
          "Version": "3.0.1",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "d3-zoom@3.0.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "d3-zoom@3.0.0",
          "Name": "d3-zoom",
          "Identifier": {
            "PURL": "pkg:npm/d3-zoom@3.0.0",
            "UID": "7902377742809672",
            "BOMRef": "pkg:npm/d3-zoom@3.0.0"
          },
          "Version": "3.0.0",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "force-graph@1.50.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "data-urls@4.0.0",
          "Name": "data-urls",
          "Identifier": {
            "PURL": "pkg:npm/data-urls@4.0.0",
            "UID": "9d880a935680c262",
            "BOMRef": "pkg:npm/data-urls@4.0.0"
          },
          "Version": "4.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "jsdom@22.1.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "data-view-buffer@1.0.2",
          "Name": "data-view-buffer",
          "Identifier": {
            "PURL": "pkg:npm/data-view-buffer@1.0.2",
            "UID": "de4abee5953fe019",
            "BOMRef": "pkg:npm/data-view-buffer@1.0.2"
          },
          "Version": "1.0.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "es-abstract@1.24.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "data-view-byte-length@1.0.2",
          "Name": "data-view-byte-length",
          "Identifier": {
            "PURL": "pkg:npm/data-view-byte-length@1.0.2",
            "UID": "a1307a471799c2db",
            "BOMRef": "pkg:npm/data-view-byte-length@1.0.2"
          },
          "Version": "1.0.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "es-abstract@1.24.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "data-view-byte-offset@1.0.1",
          "Name": "data-view-byte-offset",
          "Identifier": {
            "PURL": "pkg:npm/data-view-byte-offset@1.0.1",
            "UID": "c95ae4f7c4c6ef31",
            "BOMRef": "pkg:npm/data-view-byte-offset@1.0.1"
          },
          "Version": "1.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "es-abstract@1.24.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "debug@4.4.1",
          "Name": "debug",
          "Identifier": {
            "PURL": "pkg:npm/debug@4.4.1",
            "UID": "d47a701ff7a390a6",
            "BOMRef": "pkg:npm/debug@4.4.1"
          },
          "Version": "4.4.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@babel/core@7.28.0",
            "@babel/traverse@7.28.0",
            "@eslint/eslintrc@2.1.4",
            "@humanwhocodes/config-array@0.13.0",
            "agent-base@6.0.2",
            "eslint@8.57.1",
            "http-proxy-agent@5.0.0",
            "https-proxy-agent@5.0.1",
            "micromark@3.2.0",
            "vite-node@3.2.4",
            "vitest@3.2.4"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "decimal.js@10.5.0",
          "Name": "decimal.js",
          "Identifier": {
            "PURL": "pkg:npm/decimal.js@10.5.0",
            "UID": "9839ac183e35a1ae",
            "BOMRef": "pkg:npm/decimal.js@10.5.0"
          },
          "Version": "10.5.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "jsdom@22.1.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "decode-named-character-reference@1.2.0",
          "Name": "decode-named-character-reference",
          "Identifier": {
            "PURL": "pkg:npm/decode-named-character-reference@1.2.0",
            "UID": "c6c6d9332684c2d1",
            "BOMRef": "pkg:npm/decode-named-character-reference@1.2.0"
          },
          "Version": "1.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "mdast-util-from-markdown@1.3.1",
            "micromark-core-commonmark@1.1.0",
            "micromark-util-decode-string@1.1.0",
            "micromark@3.2.0",
            "parse-entities@4.0.2"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "deep-eql@5.0.2",
          "Name": "deep-eql",
          "Identifier": {
            "PURL": "pkg:npm/deep-eql@5.0.2",
            "UID": "30412d41ec4714a",
            "BOMRef": "pkg:npm/deep-eql@5.0.2"
          },
          "Version": "5.0.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "chai@5.2.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "deep-equal@2.2.3",
          "Name": "deep-equal",
          "Identifier": {
            "PURL": "pkg:npm/deep-equal@2.2.3",
            "UID": "57987f411ae9d14f",
            "BOMRef": "pkg:npm/deep-equal@2.2.3"
          },
          "Version": "2.2.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "aria-query@5.1.3"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "deep-is@0.1.4",
          "Name": "deep-is",
          "Identifier": {
            "PURL": "pkg:npm/deep-is@0.1.4",
            "UID": "c3b64e18193f1da7",
            "BOMRef": "pkg:npm/deep-is@0.1.4"
          },
          "Version": "0.1.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "optionator@0.9.4"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "define-data-property@1.1.4",
          "Name": "define-data-property",
          "Identifier": {
            "PURL": "pkg:npm/define-data-property@1.1.4",
            "UID": "4b6b04e5e313a104",
            "BOMRef": "pkg:npm/define-data-property@1.1.4"
          },
          "Version": "1.1.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "define-properties@1.2.1",
            "iterator.prototype@1.1.5",
            "set-function-length@1.2.2",
            "set-function-name@2.0.2",
            "string.prototype.trim@1.2.10"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "define-properties@1.2.1",
          "Name": "define-properties",
          "Identifier": {
            "PURL": "pkg:npm/define-properties@1.2.1",
            "UID": "4acdd1b4b016d5ff",
            "BOMRef": "pkg:npm/define-properties@1.2.1"
          },
          "Version": "1.2.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "array-includes@3.1.9",
            "array.prototype.findlast@1.2.5",
            "array.prototype.flat@1.3.3",
            "array.prototype.flatmap@1.3.3",
            "array.prototype.tosorted@1.1.4",
            "arraybuffer.prototype.slice@1.0.4",
            "es-iterator-helpers@1.2.1",
            "function.prototype.name@1.1.8",
            "globalthis@1.0.4",
            "object-is@1.1.6",
            "object.assign@4.1.7",
            "object.entries@1.1.9",
            "object.fromentries@2.0.8",
            "object.values@1.2.1",
            "reflect.getprototypeof@1.0.10",
            "regexp.prototype.flags@1.5.4",
            "string.prototype.matchall@4.0.12",
            "string.prototype.repeat@1.0.0",
            "string.prototype.trim@1.2.10",
            "string.prototype.trimend@1.0.9",
            "string.prototype.trimstart@1.0.8"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "delayed-stream@1.0.0",
          "Name": "delayed-stream",
          "Identifier": {
            "PURL": "pkg:npm/delayed-stream@1.0.0",
            "UID": "d61494175dcf91ea",
            "BOMRef": "pkg:npm/delayed-stream@1.0.0"
          },
          "Version": "1.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "combined-stream@1.0.8"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "dequal@2.0.3",
          "Name": "dequal",
          "Identifier": {
            "PURL": "pkg:npm/dequal@2.0.3",
            "UID": "98c678d86e22242e",
            "BOMRef": "pkg:npm/dequal@2.0.3"
          },
          "Version": "2.0.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@uppy/components@0.2.0",
            "aria-query@5.3.0",
            "uvu@0.5.6"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "dereference-json-schema@0.2.1",
          "Name": "dereference-json-schema",
          "Identifier": {
            "PURL": "pkg:npm/dereference-json-schema@0.2.1",
            "UID": "f40d9a611d1b6236",
            "BOMRef": "pkg:npm/dereference-json-schema@0.2.1"
          },
          "Version": "0.2.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "openapi-client-axios@7.6.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "detect-libc@1.0.3",
          "Name": "detect-libc",
          "Identifier": {
            "PURL": "pkg:npm/detect-libc@1.0.3",
            "UID": "231ebc2e15f8c3f7",
            "BOMRef": "pkg:npm/detect-libc@1.0.3"
          },
          "Version": "1.0.3",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "@parcel/watcher@2.5.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "detect-libc@2.0.4",
          "Name": "detect-libc",
          "Identifier": {
            "PURL": "pkg:npm/detect-libc@2.0.4",
            "UID": "18458acbaac007a1",
            "BOMRef": "c2bf9bb5-103a-4296-bc9f-22a720ffbb6d"
          },
          "Version": "2.0.4",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "@tailwindcss/oxide@4.1.11",
            "lightningcss@1.30.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "detect-libc@2.0.4",
          "Name": "detect-libc",
          "Identifier": {
            "PURL": "pkg:npm/detect-libc@2.0.4",
            "UID": "1b76ea5a888768cf",
            "BOMRef": "32ff3b73-77c6-4580-ab38-5fbf4382654e"
          },
          "Version": "2.0.4",
          "Licenses": [
            "Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "diff@5.2.0",
          "Name": "diff",
          "Identifier": {
            "PURL": "pkg:npm/diff@5.2.0",
            "UID": "abab9a801902e6cd",
            "BOMRef": "pkg:npm/diff@5.2.0"
          },
          "Version": "5.2.0",
          "Licenses": [
            "BSD-3-Clause"
          ],
          "DependsOn": [
            "react-diff-viewer-continued@3.4.0",
            "uvu@0.5.6"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "doctrine@2.1.0",
          "Name": "doctrine",
          "Identifier": {
            "PURL": "pkg:npm/doctrine@2.1.0",
            "UID": "5b187440e89c98e9",
            "BOMRef": "pkg:npm/doctrine@2.1.0"
          },
          "Version": "2.1.0",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "eslint-plugin-react@7.37.5"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "doctrine@3.0.0",
          "Name": "doctrine",
          "Identifier": {
            "PURL": "pkg:npm/doctrine@3.0.0",
            "UID": "e02f6ff8c6801c81",
            "BOMRef": "pkg:npm/doctrine@3.0.0"
          },
          "Version": "3.0.0",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "eslint@8.57.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "dom-accessibility-api@0.5.16",
          "Name": "dom-accessibility-api",
          "Identifier": {
            "PURL": "pkg:npm/dom-accessibility-api@0.5.16",
            "UID": "cc3dec45d9fb05b3",
            "BOMRef": "pkg:npm/dom-accessibility-api@0.5.16"
          },
          "Version": "0.5.16",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@testing-library/dom@10.4.0",
            "@testing-library/dom@8.20.1",
            "@testing-library/jest-dom@5.17.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "dom-helpers@5.2.1",
          "Name": "dom-helpers",
          "Identifier": {
            "PURL": "pkg:npm/dom-helpers@5.2.1",
            "UID": "16ce0247de734a8a",
            "BOMRef": "pkg:npm/dom-helpers@5.2.1"
          },
          "Version": "5.2.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "react-transition-group@4.4.5"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "domexception@4.0.0",
          "Name": "domexception",
          "Identifier": {
            "PURL": "pkg:npm/domexception@4.0.0",
            "UID": "404920c470e2bba5",
            "BOMRef": "pkg:npm/domexception@4.0.0"
          },
          "Version": "4.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "jsdom@22.1.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "dot-case@3.0.4",
          "Name": "dot-case",
          "Identifier": {
            "PURL": "pkg:npm/dot-case@3.0.4",
            "UID": "4f17e7f9ad6a2d9f",
            "BOMRef": "pkg:npm/dot-case@3.0.4"
          },
          "Version": "3.0.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "snake-case@3.0.4"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "dunder-proto@1.0.1",
          "Name": "dunder-proto",
          "Identifier": {
            "PURL": "pkg:npm/dunder-proto@1.0.1",
            "UID": "2905683ee0a78a26",
            "BOMRef": "pkg:npm/dunder-proto@1.0.1"
          },
          "Version": "1.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "get-proto@1.0.1",
            "has-proto@1.2.0",
            "set-proto@1.0.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "electron-to-chromium@1.5.179",
          "Name": "electron-to-chromium",
          "Identifier": {
            "PURL": "pkg:npm/electron-to-chromium@1.5.179",
            "UID": "d62cd93d0c6f3314",
            "BOMRef": "pkg:npm/electron-to-chromium@1.5.179"
          },
          "Version": "1.5.179",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "browserslist@4.25.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "enhanced-resolve@5.18.2",
          "Name": "enhanced-resolve",
          "Identifier": {
            "PURL": "pkg:npm/enhanced-resolve@5.18.2",
            "UID": "85985112d63d48f6",
            "BOMRef": "pkg:npm/enhanced-resolve@5.18.2"
          },
          "Version": "5.18.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@tailwindcss/cli@4.1.11",
            "@tailwindcss/node@4.1.11"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "entities@4.5.0",
          "Name": "entities",
          "Identifier": {
            "PURL": "pkg:npm/entities@4.5.0",
            "UID": "bfc492fb97fd421f",
            "BOMRef": "pkg:npm/entities@4.5.0"
          },
          "Version": "4.5.0",
          "Licenses": [
            "BSD-2-Clause"
          ],
          "DependsOn": [
            "@svgr/hast-util-to-babel-ast@8.0.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "entities@6.0.1",
          "Name": "entities",
          "Identifier": {
            "PURL": "pkg:npm/entities@6.0.1",
            "UID": "60e3c88fb567516e",
            "BOMRef": "pkg:npm/entities@6.0.1"
          },
          "Version": "6.0.1",
          "Licenses": [
            "BSD-2-Clause"
          ],
          "DependsOn": [
            "parse5@7.3.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "error-ex@1.3.2",
          "Name": "error-ex",
          "Identifier": {
            "PURL": "pkg:npm/error-ex@1.3.2",
            "UID": "c6e95135fc9c7cd5",
            "BOMRef": "pkg:npm/error-ex@1.3.2"
          },
          "Version": "1.3.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "parse-json@5.2.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "es-abstract@1.24.0",
          "Name": "es-abstract",
          "Identifier": {
            "PURL": "pkg:npm/es-abstract@1.24.0",
            "UID": "5af068531b805b8",
            "BOMRef": "pkg:npm/es-abstract@1.24.0"
          },
          "Version": "1.24.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "array-includes@3.1.9",
            "array.prototype.findlast@1.2.5",
            "array.prototype.flat@1.3.3",
            "array.prototype.flatmap@1.3.3",
            "array.prototype.tosorted@1.1.4",
            "arraybuffer.prototype.slice@1.0.4",
            "es-iterator-helpers@1.2.1",
            "object.fromentries@2.0.8",
            "reflect.getprototypeof@1.0.10",
            "string.prototype.matchall@4.0.12",
            "string.prototype.repeat@1.0.0",
            "string.prototype.trim@1.2.10"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "es-define-property@1.0.1",
          "Name": "es-define-property",
          "Identifier": {
            "PURL": "pkg:npm/es-define-property@1.0.1",
            "UID": "b27ce67e444532e",
            "BOMRef": "pkg:npm/es-define-property@1.0.1"
          },
          "Version": "1.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "call-bind@1.0.8",
            "define-data-property@1.1.4",
            "es-abstract@1.24.0",
            "get-intrinsic@1.3.0",
            "has-property-descriptors@1.0.2"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "es-errors@1.3.0",
          "Name": "es-errors",
          "Identifier": {
            "PURL": "pkg:npm/es-errors@1.3.0",
            "UID": "f1a76594691d1866",
            "BOMRef": "pkg:npm/es-errors@1.3.0"
          },
          "Version": "1.3.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "array.prototype.findlast@1.2.5",
            "array.prototype.tosorted@1.1.4",
            "arraybuffer.prototype.slice@1.0.4",
            "call-bind-apply-helpers@1.0.2",
            "data-view-buffer@1.0.2",
            "data-view-byte-length@1.0.2",
            "data-view-byte-offset@1.0.1",
            "define-data-property@1.1.4",
            "dunder-proto@1.0.1",
            "es-abstract@1.24.0",
            "es-iterator-helpers@1.2.1",
            "es-object-atoms@1.1.1",
            "es-set-tostringtag@2.1.0",
            "get-intrinsic@1.3.0",
            "get-symbol-description@1.1.0",
            "internal-slot@1.1.0",
            "reflect.getprototypeof@1.0.10",
            "regexp.prototype.flags@1.5.4",
            "safe-push-apply@1.0.0",
            "safe-regex-test@1.1.0",
            "set-function-length@1.2.2",
            "set-function-name@2.0.2",
            "set-proto@1.0.0",
            "side-channel-list@1.0.0",
            "side-channel-map@1.0.1",
            "side-channel-weakmap@1.0.2",
            "side-channel@1.1.0",
            "stop-iteration-iterator@1.1.0",
            "string.prototype.matchall@4.0.12",
            "typed-array-buffer@1.0.3"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "es-get-iterator@1.1.3",
          "Name": "es-get-iterator",
          "Identifier": {
            "PURL": "pkg:npm/es-get-iterator@1.1.3",
            "UID": "84ae308906767599",
            "BOMRef": "pkg:npm/es-get-iterator@1.1.3"
          },
          "Version": "1.1.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "deep-equal@2.2.3"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "es-iterator-helpers@1.2.1",
          "Name": "es-iterator-helpers",
          "Identifier": {
            "PURL": "pkg:npm/es-iterator-helpers@1.2.1",
            "UID": "2426d729c6f43feb",
            "BOMRef": "pkg:npm/es-iterator-helpers@1.2.1"
          },
          "Version": "1.2.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "eslint-plugin-react@7.37.5"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "es-module-lexer@1.7.0",
          "Name": "es-module-lexer",
          "Identifier": {
            "PURL": "pkg:npm/es-module-lexer@1.7.0",
            "UID": "227d231b4f432bda",
            "BOMRef": "pkg:npm/es-module-lexer@1.7.0"
          },
          "Version": "1.7.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "vite-node@3.2.4"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "es-object-atoms@1.1.1",
          "Name": "es-object-atoms",
          "Identifier": {
            "PURL": "pkg:npm/es-object-atoms@1.1.1",
            "UID": "e1b1cf6150bcd039",
            "BOMRef": "pkg:npm/es-object-atoms@1.1.1"
          },
          "Version": "1.1.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "array-includes@3.1.9",
            "array.prototype.findlast@1.2.5",
            "es-abstract@1.24.0",
            "get-intrinsic@1.3.0",
            "get-proto@1.0.1",
            "iterator.prototype@1.1.5",
            "object.assign@4.1.7",
            "object.entries@1.1.9",
            "object.fromentries@2.0.8",
            "object.values@1.2.1",
            "reflect.getprototypeof@1.0.10",
            "set-proto@1.0.0",
            "string.prototype.matchall@4.0.12",
            "string.prototype.trim@1.2.10",
            "string.prototype.trimend@1.0.9",
            "string.prototype.trimstart@1.0.8"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "es-set-tostringtag@2.1.0",
          "Name": "es-set-tostringtag",
          "Identifier": {
            "PURL": "pkg:npm/es-set-tostringtag@2.1.0",
            "UID": "1c0d2659ab24ee74",
            "BOMRef": "pkg:npm/es-set-tostringtag@2.1.0"
          },
          "Version": "2.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "es-abstract@1.24.0",
            "es-iterator-helpers@1.2.1",
            "form-data@4.0.4"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "es-shim-unscopables@1.1.0",
          "Name": "es-shim-unscopables",
          "Identifier": {
            "PURL": "pkg:npm/es-shim-unscopables@1.1.0",
            "UID": "c02e2e6f2f8a6092",
            "BOMRef": "pkg:npm/es-shim-unscopables@1.1.0"
          },
          "Version": "1.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "array.prototype.findlast@1.2.5",
            "array.prototype.flat@1.3.3",
            "array.prototype.flatmap@1.3.3",
            "array.prototype.tosorted@1.1.4"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "es-to-primitive@1.3.0",
          "Name": "es-to-primitive",
          "Identifier": {
            "PURL": "pkg:npm/es-to-primitive@1.3.0",
            "UID": "31e294497492293",
            "BOMRef": "pkg:npm/es-to-primitive@1.3.0"
          },
          "Version": "1.3.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "es-abstract@1.24.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "esbuild@0.25.5",
          "Name": "esbuild",
          "Identifier": {
            "PURL": "pkg:npm/esbuild@0.25.5",
            "UID": "463a2b08566e2d1c",
            "BOMRef": "pkg:npm/esbuild@0.25.5"
          },
          "Version": "0.25.5",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "vite@6.4.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "escalade@3.2.0",
          "Name": "escalade",
          "Identifier": {
            "PURL": "pkg:npm/escalade@3.2.0",
            "UID": "633fcb5344624948",
            "BOMRef": "pkg:npm/escalade@3.2.0"
          },
          "Version": "3.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "update-browserslist-db@1.1.3"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "escape-string-regexp@2.0.0",
          "Name": "escape-string-regexp",
          "Identifier": {
            "PURL": "pkg:npm/escape-string-regexp@2.0.0",
            "UID": "30ad61d23079ba65",
            "BOMRef": "pkg:npm/escape-string-regexp@2.0.0"
          },
          "Version": "2.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "stack-utils@2.0.6"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "escape-string-regexp@4.0.0",
          "Name": "escape-string-regexp",
          "Identifier": {
            "PURL": "pkg:npm/escape-string-regexp@4.0.0",
            "UID": "b81c555e2b4a52a9",
            "BOMRef": "pkg:npm/escape-string-regexp@4.0.0"
          },
          "Version": "4.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@emotion/babel-plugin@11.13.5",
            "eslint@8.57.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "eslint@8.57.1",
          "Name": "eslint",
          "Identifier": {
            "PURL": "pkg:npm/eslint@8.57.1",
            "UID": "5de3324b02ca1422",
            "BOMRef": "pkg:npm/eslint@8.57.1"
          },
          "Version": "8.57.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@eslint-community/eslint-utils@4.7.0",
            "eslint-config-google@0.14.0",
            "eslint-config-prettier@8.10.0",
            "eslint-plugin-react@7.37.5",
            "qdrant-web-ui@0.2.5",
            "vite-plugin-eslint@1.8.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "eslint-config-google@0.14.0",
          "Name": "eslint-config-google",
          "Identifier": {
            "PURL": "pkg:npm/eslint-config-google@0.14.0",
            "UID": "bcf8aade2ba4a70a",
            "BOMRef": "pkg:npm/eslint-config-google@0.14.0"
          },
          "Version": "0.14.0",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "eslint-config-prettier@8.10.0",
          "Name": "eslint-config-prettier",
          "Identifier": {
            "PURL": "pkg:npm/eslint-config-prettier@8.10.0",
            "UID": "5ffd51c32ac44d3",
            "BOMRef": "pkg:npm/eslint-config-prettier@8.10.0"
          },
          "Version": "8.10.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "eslint-plugin-react@7.37.5",
          "Name": "eslint-plugin-react",
          "Identifier": {
            "PURL": "pkg:npm/eslint-plugin-react@7.37.5",
            "UID": "242c32e10df390a4",
            "BOMRef": "pkg:npm/eslint-plugin-react@7.37.5"
          },
          "Version": "7.37.5",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "eslint-scope@7.2.2",
          "Name": "eslint-scope",
          "Identifier": {
            "PURL": "pkg:npm/eslint-scope@7.2.2",
            "UID": "149876d78f7f8da7",
            "BOMRef": "pkg:npm/eslint-scope@7.2.2"
          },
          "Version": "7.2.2",
          "Licenses": [
            "BSD-2-Clause"
          ],
          "DependsOn": [
            "eslint@8.57.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "eslint-visitor-keys@3.4.3",
          "Name": "eslint-visitor-keys",
          "Identifier": {
            "PURL": "pkg:npm/eslint-visitor-keys@3.4.3",
            "UID": "5375066f063e3136",
            "BOMRef": "pkg:npm/eslint-visitor-keys@3.4.3"
          },
          "Version": "3.4.3",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "@eslint-community/eslint-utils@4.7.0",
            "eslint@8.57.1",
            "espree@9.6.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "espree@9.6.1",
          "Name": "espree",
          "Identifier": {
            "PURL": "pkg:npm/espree@9.6.1",
            "UID": "7c0bed4ce85fd6be",
            "BOMRef": "pkg:npm/espree@9.6.1"
          },
          "Version": "9.6.1",
          "Licenses": [
            "BSD-2-Clause"
          ],
          "DependsOn": [
            "@eslint/eslintrc@2.1.4",
            "eslint@8.57.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "esquery@1.6.0",
          "Name": "esquery",
          "Identifier": {
            "PURL": "pkg:npm/esquery@1.6.0",
            "UID": "f974c33317691e89",
            "BOMRef": "pkg:npm/esquery@1.6.0"
          },
          "Version": "1.6.0",
          "Licenses": [
            "BSD-3-Clause"
          ],
          "DependsOn": [
            "eslint@8.57.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "esrecurse@4.3.0",
          "Name": "esrecurse",
          "Identifier": {
            "PURL": "pkg:npm/esrecurse@4.3.0",
            "UID": "ad86f21dee2afbf0",
            "BOMRef": "pkg:npm/esrecurse@4.3.0"
          },
          "Version": "4.3.0",
          "Licenses": [
            "BSD-2-Clause"
          ],
          "DependsOn": [
            "eslint-scope@7.2.2"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "estraverse@5.3.0",
          "Name": "estraverse",
          "Identifier": {
            "PURL": "pkg:npm/estraverse@5.3.0",
            "UID": "a546bd3fe1025e5e",
            "BOMRef": "pkg:npm/estraverse@5.3.0"
          },
          "Version": "5.3.0",
          "Licenses": [
            "BSD-2-Clause"
          ],
          "DependsOn": [
            "eslint-plugin-react@7.37.5",
            "eslint-scope@7.2.2",
            "esquery@1.6.0",
            "esrecurse@4.3.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "estree-util-attach-comments@2.1.1",
          "Name": "estree-util-attach-comments",
          "Identifier": {
            "PURL": "pkg:npm/estree-util-attach-comments@2.1.1",
            "UID": "9a4e66f76a362d24",
            "BOMRef": "pkg:npm/estree-util-attach-comments@2.1.1"
          },
          "Version": "2.1.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "hast-util-to-estree@2.3.3"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "estree-util-build-jsx@2.2.2",
          "Name": "estree-util-build-jsx",
          "Identifier": {
            "PURL": "pkg:npm/estree-util-build-jsx@2.2.2",
            "UID": "516adad9a5ffb6f7",
            "BOMRef": "pkg:npm/estree-util-build-jsx@2.2.2"
          },
          "Version": "2.2.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mdx-js/mdx@2.3.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "estree-util-is-identifier-name@2.1.0",
          "Name": "estree-util-is-identifier-name",
          "Identifier": {
            "PURL": "pkg:npm/estree-util-is-identifier-name@2.1.0",
            "UID": "3a12a80b87bbe8bc",
            "BOMRef": "pkg:npm/estree-util-is-identifier-name@2.1.0"
          },
          "Version": "2.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mdx-js/mdx@2.3.0",
            "estree-util-build-jsx@2.2.2",
            "hast-util-to-estree@2.3.3",
            "micromark-extension-mdx-jsx@1.0.5"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "estree-util-to-js@1.2.0",
          "Name": "estree-util-to-js",
          "Identifier": {
            "PURL": "pkg:npm/estree-util-to-js@1.2.0",
            "UID": "bc7738bf1e5b284a",
            "BOMRef": "pkg:npm/estree-util-to-js@1.2.0"
          },
          "Version": "1.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mdx-js/mdx@2.3.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "estree-util-visit@1.2.1",
          "Name": "estree-util-visit",
          "Identifier": {
            "PURL": "pkg:npm/estree-util-visit@1.2.1",
            "UID": "b5cbb6d00f3789ec",
            "BOMRef": "pkg:npm/estree-util-visit@1.2.1"
          },
          "Version": "1.2.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "micromark-util-events-to-acorn@1.2.3"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "estree-walker@2.0.2",
          "Name": "estree-walker",
          "Identifier": {
            "PURL": "pkg:npm/estree-walker@2.0.2",
            "UID": "3c61c6b50d36b56c",
            "BOMRef": "3e57c2ac-20e4-4fe9-b35c-69ce6eaeffad"
          },
          "Version": "2.0.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@rollup/pluginutils@4.2.1",
            "@rollup/pluginutils@5.2.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "estree-walker@2.0.2",
          "Name": "estree-walker",
          "Identifier": {
            "PURL": "pkg:npm/estree-walker@2.0.2",
            "UID": "4f1ec61ead4b3d62",
            "BOMRef": "702a0651-0fce-4b9e-8284-0dc5198dec3a"
          },
          "Version": "2.0.2",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "estree-walker@3.0.3",
          "Name": "estree-walker",
          "Identifier": {
            "PURL": "pkg:npm/estree-walker@3.0.3",
            "UID": "2d6561be65caa662",
            "BOMRef": "pkg:npm/estree-walker@3.0.3"
          },
          "Version": "3.0.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mdx-js/mdx@2.3.0",
            "@vitest/mocker@3.2.4",
            "estree-util-build-jsx@2.2.2",
            "periscopic@3.1.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "esutils@2.0.3",
          "Name": "esutils",
          "Identifier": {
            "PURL": "pkg:npm/esutils@2.0.3",
            "UID": "97b7944d3d80063",
            "BOMRef": "pkg:npm/esutils@2.0.3"
          },
          "Version": "2.0.3",
          "Licenses": [
            "BSD-2-Clause"
          ],
          "DependsOn": [
            "doctrine@2.1.0",
            "doctrine@3.0.0",
            "eslint@8.57.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "eventemitter3@5.0.1",
          "Name": "eventemitter3",
          "Identifier": {
            "PURL": "pkg:npm/eventemitter3@5.0.1",
            "UID": "e54753d3a9543875",
            "BOMRef": "pkg:npm/eventemitter3@5.0.1"
          },
          "Version": "5.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "p-queue@8.1.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "exifr@7.1.3",
          "Name": "exifr",
          "Identifier": {
            "PURL": "pkg:npm/exifr@7.1.3",
            "UID": "663954a24823ab92",
            "BOMRef": "pkg:npm/exifr@7.1.3"
          },
          "Version": "7.1.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@uppy/thumbnail-generator@4.1.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "expect@30.0.4",
          "Name": "expect",
          "Identifier": {
            "PURL": "pkg:npm/expect@30.0.4",
            "UID": "6c0ebd6449de9577",
            "BOMRef": "pkg:npm/expect@30.0.4"
          },
          "Version": "30.0.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@types/jest@30.0.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "expect-type@1.2.1",
          "Name": "expect-type",
          "Identifier": {
            "PURL": "pkg:npm/expect-type@1.2.1",
            "UID": "bc07269ca9ebae5e",
            "BOMRef": "pkg:npm/expect-type@1.2.1"
          },
          "Version": "1.2.1",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "vitest@3.2.4"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "extend@3.0.2",
          "Name": "extend",
          "Identifier": {
            "PURL": "pkg:npm/extend@3.0.2",
            "UID": "ada30bd1494adb0a",
            "BOMRef": "pkg:npm/extend@3.0.2"
          },
          "Version": "3.0.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "unified@10.1.2"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "fast-deep-equal@3.1.3",
          "Name": "fast-deep-equal",
          "Identifier": {
            "PURL": "pkg:npm/fast-deep-equal@3.1.3",
            "UID": "c82d95ae4ba4f9e0",
            "BOMRef": "pkg:npm/fast-deep-equal@3.1.3"
          },
          "Version": "3.1.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "ajv@6.12.6",
            "eslint@8.57.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "fast-json-stable-stringify@2.1.0",
          "Name": "fast-json-stable-stringify",
          "Identifier": {
            "PURL": "pkg:npm/fast-json-stable-stringify@2.1.0",
            "UID": "365f8963c07de1e2",
            "BOMRef": "pkg:npm/fast-json-stable-stringify@2.1.0"
          },
          "Version": "2.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "ajv@6.12.6"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "fast-levenshtein@2.0.6",
          "Name": "fast-levenshtein",
          "Identifier": {
            "PURL": "pkg:npm/fast-levenshtein@2.0.6",
            "UID": "574cf77133b8417f",
            "BOMRef": "pkg:npm/fast-levenshtein@2.0.6"
          },
          "Version": "2.0.6",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "optionator@0.9.4"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "fastq@1.19.1",
          "Name": "fastq",
          "Identifier": {
            "PURL": "pkg:npm/fastq@1.19.1",
            "UID": "7fa1275eb84516e8",
            "BOMRef": "pkg:npm/fastq@1.19.1"
          },
          "Version": "1.19.1",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "@nodelib/fs.walk@1.2.8"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "fdir@6.4.6",
          "Name": "fdir",
          "Identifier": {
            "PURL": "pkg:npm/fdir@6.4.6",
            "UID": "3821c46ab2e64f0f",
            "BOMRef": "pkg:npm/fdir@6.4.6"
          },
          "Version": "6.4.6",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "tinyglobby@0.2.14",
            "vite@6.4.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "file-entry-cache@6.0.1",
          "Name": "file-entry-cache",
          "Identifier": {
            "PURL": "pkg:npm/file-entry-cache@6.0.1",
            "UID": "76a1414e18752a76",
            "BOMRef": "pkg:npm/file-entry-cache@6.0.1"
          },
          "Version": "6.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "eslint@8.57.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "fill-range@7.1.1",
          "Name": "fill-range",
          "Identifier": {
            "PURL": "pkg:npm/fill-range@7.1.1",
            "UID": "324261d8b9f13680",
            "BOMRef": "pkg:npm/fill-range@7.1.1"
          },
          "Version": "7.1.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "braces@3.0.3"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "find-root@1.1.0",
          "Name": "find-root",
          "Identifier": {
            "PURL": "pkg:npm/find-root@1.1.0",
            "UID": "809c2d1b0de73c77",
            "BOMRef": "pkg:npm/find-root@1.1.0"
          },
          "Version": "1.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@emotion/babel-plugin@11.13.5"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "find-up@5.0.0",
          "Name": "find-up",
          "Identifier": {
            "PURL": "pkg:npm/find-up@5.0.0",
            "UID": "6b062bf5fd67839a",
            "BOMRef": "pkg:npm/find-up@5.0.0"
          },
          "Version": "5.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "eslint@8.57.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "flat-cache@3.2.0",
          "Name": "flat-cache",
          "Identifier": {
            "PURL": "pkg:npm/flat-cache@3.2.0",
            "UID": "50d609ff364bf2af",
            "BOMRef": "pkg:npm/flat-cache@3.2.0"
          },
          "Version": "3.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "file-entry-cache@6.0.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "flatted@3.3.3",
          "Name": "flatted",
          "Identifier": {
            "PURL": "pkg:npm/flatted@3.3.3",
            "UID": "513fc9c3d5ab3f5d",
            "BOMRef": "pkg:npm/flatted@3.3.3"
          },
          "Version": "3.3.3",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "flat-cache@3.2.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "float-tooltip@1.7.5",
          "Name": "float-tooltip",
          "Identifier": {
            "PURL": "pkg:npm/float-tooltip@1.7.5",
            "UID": "3feed74aac7e5e4e",
            "BOMRef": "pkg:npm/float-tooltip@1.7.5"
          },
          "Version": "1.7.5",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "force-graph@1.50.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "follow-redirects@1.15.9",
          "Name": "follow-redirects",
          "Identifier": {
            "PURL": "pkg:npm/follow-redirects@1.15.9",
            "UID": "bb99d140142e2181",
            "BOMRef": "pkg:npm/follow-redirects@1.15.9"
          },
          "Version": "1.15.9",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "axios@1.12.2"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "for-each@0.3.5",
          "Name": "for-each",
          "Identifier": {
            "PURL": "pkg:npm/for-each@0.3.5",
            "UID": "22e953bd2a38203d",
            "BOMRef": "pkg:npm/for-each@0.3.5"
          },
          "Version": "0.3.5",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "typed-array-byte-length@1.0.3",
            "typed-array-byte-offset@1.0.4",
            "typed-array-length@1.0.7",
            "which-typed-array@1.1.19"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "force-graph@1.50.1",
          "Name": "force-graph",
          "Identifier": {
            "PURL": "pkg:npm/force-graph@1.50.1",
            "UID": "8c14bee489ff322f",
            "BOMRef": "pkg:npm/force-graph@1.50.1"
          },
          "Version": "1.50.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "form-data@4.0.4",
          "Name": "form-data",
          "Identifier": {
            "PURL": "pkg:npm/form-data@4.0.4",
            "UID": "7b4555b6e7b84f4b",
            "BOMRef": "pkg:npm/form-data@4.0.4"
          },
          "Version": "4.0.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "axios@1.12.2",
            "jsdom@22.1.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "fs.realpath@1.0.0",
          "Name": "fs.realpath",
          "Identifier": {
            "PURL": "pkg:npm/fs.realpath@1.0.0",
            "UID": "2e5664596428658b",
            "BOMRef": "pkg:npm/fs.realpath@1.0.0"
          },
          "Version": "1.0.0",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "glob@7.2.3"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "function-bind@1.1.2",
          "Name": "function-bind",
          "Identifier": {
            "PURL": "pkg:npm/function-bind@1.1.2",
            "UID": "1f26a353ef6d8b54",
            "BOMRef": "pkg:npm/function-bind@1.1.2"
          },
          "Version": "1.1.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "call-bind-apply-helpers@1.0.2",
            "es-iterator-helpers@1.2.1",
            "get-intrinsic@1.3.0",
            "hasown@2.0.2",
            "set-function-length@1.2.2"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "function.prototype.name@1.1.8",
          "Name": "function.prototype.name",
          "Identifier": {
            "PURL": "pkg:npm/function.prototype.name@1.1.8",
            "UID": "e0594979ae878cc9",
            "BOMRef": "pkg:npm/function.prototype.name@1.1.8"
          },
          "Version": "1.1.8",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "es-abstract@1.24.0",
            "which-builtin-type@1.2.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "functions-have-names@1.2.3",
          "Name": "functions-have-names",
          "Identifier": {
            "PURL": "pkg:npm/functions-have-names@1.2.3",
            "UID": "995e61044a8b6fdb",
            "BOMRef": "pkg:npm/functions-have-names@1.2.3"
          },
          "Version": "1.2.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "function.prototype.name@1.1.8",
            "set-function-name@2.0.2"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "gensync@1.0.0-beta.2",
          "Name": "gensync",
          "Identifier": {
            "PURL": "pkg:npm/gensync@1.0.0-beta.2",
            "UID": "9e71c578dbc5560a",
            "BOMRef": "pkg:npm/gensync@1.0.0-beta.2"
          },
          "Version": "1.0.0-beta.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@babel/core@7.28.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "get-intrinsic@1.3.0",
          "Name": "get-intrinsic",
          "Identifier": {
            "PURL": "pkg:npm/get-intrinsic@1.3.0",
            "UID": "4d59279ba1009f6d",
            "BOMRef": "pkg:npm/get-intrinsic@1.3.0"
          },
          "Version": "1.3.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "array-includes@3.1.9",
            "arraybuffer.prototype.slice@1.0.4",
            "call-bind@1.0.8",
            "call-bound@1.0.4",
            "deep-equal@2.2.3",
            "es-abstract@1.24.0",
            "es-get-iterator@1.1.3",
            "es-iterator-helpers@1.2.1",
            "es-set-tostringtag@2.1.0",
            "get-symbol-description@1.1.0",
            "is-array-buffer@3.0.5",
            "is-data-view@1.0.2",
            "is-weakset@2.0.4",
            "iterator.prototype@1.1.5",
            "own-keys@1.0.1",
            "reflect.getprototypeof@1.0.10",
            "safe-array-concat@1.1.3",
            "set-function-length@1.2.2",
            "side-channel-map@1.0.1",
            "side-channel-weakmap@1.0.2",
            "string.prototype.matchall@4.0.12"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "get-proto@1.0.1",
          "Name": "get-proto",
          "Identifier": {
            "PURL": "pkg:npm/get-proto@1.0.1",
            "UID": "34997714bec6af68",
            "BOMRef": "pkg:npm/get-proto@1.0.1"
          },
          "Version": "1.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "es-abstract@1.24.0",
            "get-intrinsic@1.3.0",
            "is-async-function@2.1.1",
            "is-generator-function@1.1.0",
            "iterator.prototype@1.1.5",
            "reflect.getprototypeof@1.0.10",
            "regexp.prototype.flags@1.5.4",
            "which-typed-array@1.1.19"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "get-symbol-description@1.1.0",
          "Name": "get-symbol-description",
          "Identifier": {
            "PURL": "pkg:npm/get-symbol-description@1.1.0",
            "UID": "210ef11974c543dc",
            "BOMRef": "pkg:npm/get-symbol-description@1.1.0"
          },
          "Version": "1.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "es-abstract@1.24.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "glob@7.2.3",
          "Name": "glob",
          "Identifier": {
            "PURL": "pkg:npm/glob@7.2.3",
            "UID": "4158697354ba679c",
            "BOMRef": "pkg:npm/glob@7.2.3"
          },
          "Version": "7.2.3",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "rimraf@3.0.2"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "glob-parent@6.0.2",
          "Name": "glob-parent",
          "Identifier": {
            "PURL": "pkg:npm/glob-parent@6.0.2",
            "UID": "84e734ee273f2898",
            "BOMRef": "pkg:npm/glob-parent@6.0.2"
          },
          "Version": "6.0.2",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "eslint@8.57.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "globals@13.24.0",
          "Name": "globals",
          "Identifier": {
            "PURL": "pkg:npm/globals@13.24.0",
            "UID": "c1e27e04f677088c",
            "BOMRef": "pkg:npm/globals@13.24.0"
          },
          "Version": "13.24.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@eslint/eslintrc@2.1.4",
            "eslint@8.57.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "globalthis@1.0.4",
          "Name": "globalthis",
          "Identifier": {
            "PURL": "pkg:npm/globalthis@1.0.4",
            "UID": "8ad744af8a603aed",
            "BOMRef": "pkg:npm/globalthis@1.0.4"
          },
          "Version": "1.0.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "es-abstract@1.24.0",
            "es-iterator-helpers@1.2.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "goober@2.1.16",
          "Name": "goober",
          "Identifier": {
            "PURL": "pkg:npm/goober@2.1.16",
            "UID": "50931dd6c1385763",
            "BOMRef": "pkg:npm/goober@2.1.16"
          },
          "Version": "2.1.16",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "notistack@3.0.2"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "gopd@1.2.0",
          "Name": "gopd",
          "Identifier": {
            "PURL": "pkg:npm/gopd@1.2.0",
            "UID": "871ab05a35ec03c4",
            "BOMRef": "pkg:npm/gopd@1.2.0"
          },
          "Version": "1.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "define-data-property@1.1.4",
            "dunder-proto@1.0.1",
            "es-abstract@1.24.0",
            "es-iterator-helpers@1.2.1",
            "get-intrinsic@1.3.0",
            "globalthis@1.0.4",
            "is-regex@1.2.1",
            "regexp.prototype.flags@1.5.4",
            "set-function-length@1.2.2",
            "string.prototype.matchall@4.0.12",
            "typed-array-byte-length@1.0.3",
            "typed-array-byte-offset@1.0.4",
            "typed-array-length@1.0.7",
            "which-typed-array@1.1.19"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "graceful-fs@4.2.11",
          "Name": "graceful-fs",
          "Identifier": {
            "PURL": "pkg:npm/graceful-fs@4.2.11",
            "UID": "b341e5de4e27218",
            "BOMRef": "pkg:npm/graceful-fs@4.2.11"
          },
          "Version": "4.2.11",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "enhanced-resolve@5.18.2",
            "jest-message-util@30.0.2",
            "jest-util@30.0.2"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "graphemer@1.4.0",
          "Name": "graphemer",
          "Identifier": {
            "PURL": "pkg:npm/graphemer@1.4.0",
            "UID": "d03275c2380251be",
            "BOMRef": "pkg:npm/graphemer@1.4.0"
          },
          "Version": "1.4.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "eslint@8.57.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "has-bigints@1.1.0",
          "Name": "has-bigints",
          "Identifier": {
            "PURL": "pkg:npm/has-bigints@1.1.0",
            "UID": "cd8313a33bd00898",
            "BOMRef": "pkg:npm/has-bigints@1.1.0"
          },
          "Version": "1.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "is-bigint@1.1.0",
            "unbox-primitive@1.1.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "has-flag@4.0.0",
          "Name": "has-flag",
          "Identifier": {
            "PURL": "pkg:npm/has-flag@4.0.0",
            "UID": "54cb70a53f30a541",
            "BOMRef": "pkg:npm/has-flag@4.0.0"
          },
          "Version": "4.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "supports-color@7.2.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "has-property-descriptors@1.0.2",
          "Name": "has-property-descriptors",
          "Identifier": {
            "PURL": "pkg:npm/has-property-descriptors@1.0.2",
            "UID": "2a6a272c05d16f4d",
            "BOMRef": "pkg:npm/has-property-descriptors@1.0.2"
          },
          "Version": "1.0.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "define-properties@1.2.1",
            "es-abstract@1.24.0",
            "es-iterator-helpers@1.2.1",
            "set-function-length@1.2.2",
            "set-function-name@2.0.2",
            "string.prototype.trim@1.2.10"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "has-proto@1.2.0",
          "Name": "has-proto",
          "Identifier": {
            "PURL": "pkg:npm/has-proto@1.2.0",
            "UID": "a181a74148f34200",
            "BOMRef": "pkg:npm/has-proto@1.2.0"
          },
          "Version": "1.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "es-abstract@1.24.0",
            "es-iterator-helpers@1.2.1",
            "typed-array-byte-length@1.0.3",
            "typed-array-byte-offset@1.0.4"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "has-symbols@1.1.0",
          "Name": "has-symbols",
          "Identifier": {
            "PURL": "pkg:npm/has-symbols@1.1.0",
            "UID": "259c16c17896094a",
            "BOMRef": "pkg:npm/has-symbols@1.1.0"
          },
          "Version": "1.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "es-abstract@1.24.0",
            "es-get-iterator@1.1.3",
            "es-iterator-helpers@1.2.1",
            "get-intrinsic@1.3.0",
            "has-tostringtag@1.0.2",
            "is-symbol@1.1.1",
            "iterator.prototype@1.1.5",
            "object.assign@4.1.7",
            "safe-array-concat@1.1.3",
            "string.prototype.matchall@4.0.12",
            "unbox-primitive@1.1.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "has-tostringtag@1.0.2",
          "Name": "has-tostringtag",
          "Identifier": {
            "PURL": "pkg:npm/has-tostringtag@1.0.2",
            "UID": "f349b5c8053de1f0",
            "BOMRef": "pkg:npm/has-tostringtag@1.0.2"
          },
          "Version": "1.0.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "es-set-tostringtag@2.1.0",
            "is-arguments@1.2.0",
            "is-async-function@2.1.1",
            "is-boolean-object@1.2.2",
            "is-date-object@1.1.0",
            "is-generator-function@1.1.0",
            "is-number-object@1.1.1",
            "is-regex@1.2.1",
            "is-string@1.1.1",
            "which-builtin-type@1.2.1",
            "which-typed-array@1.1.19"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "hasown@2.0.2",
          "Name": "hasown",
          "Identifier": {
            "PURL": "pkg:npm/hasown@2.0.2",
            "UID": "96c4955ea017bcd8",
            "BOMRef": "pkg:npm/hasown@2.0.2"
          },
          "Version": "2.0.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "es-abstract@1.24.0",
            "es-set-tostringtag@2.1.0",
            "es-shim-unscopables@1.1.0",
            "eslint-plugin-react@7.37.5",
            "form-data@4.0.4",
            "function.prototype.name@1.1.8",
            "get-intrinsic@1.3.0",
            "internal-slot@1.1.0",
            "is-core-module@2.16.1",
            "is-regex@1.2.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "hast-util-to-estree@2.3.3",
          "Name": "hast-util-to-estree",
          "Identifier": {
            "PURL": "pkg:npm/hast-util-to-estree@2.3.3",
            "UID": "9d9c513405ba9fce",
            "BOMRef": "pkg:npm/hast-util-to-estree@2.3.3"
          },
          "Version": "2.3.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mdx-js/mdx@2.3.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "hast-util-whitespace@2.0.1",
          "Name": "hast-util-whitespace",
          "Identifier": {
            "PURL": "pkg:npm/hast-util-whitespace@2.0.1",
            "UID": "57e15abf62856a12",
            "BOMRef": "pkg:npm/hast-util-whitespace@2.0.1"
          },
          "Version": "2.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "hast-util-to-estree@2.3.3"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "hoist-non-react-statics@3.3.2",
          "Name": "hoist-non-react-statics",
          "Identifier": {
            "PURL": "pkg:npm/hoist-non-react-statics@3.3.2",
            "UID": "124c72454448f207",
            "BOMRef": "pkg:npm/hoist-non-react-statics@3.3.2"
          },
          "Version": "3.3.2",
          "Licenses": [
            "BSD-3-Clause"
          ],
          "DependsOn": [
            "@emotion/react@11.14.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "html-encoding-sniffer@3.0.0",
          "Name": "html-encoding-sniffer",
          "Identifier": {
            "PURL": "pkg:npm/html-encoding-sniffer@3.0.0",
            "UID": "8a67ee9605772b63",
            "BOMRef": "pkg:npm/html-encoding-sniffer@3.0.0"
          },
          "Version": "3.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "jsdom@22.1.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "http-proxy-agent@5.0.0",
          "Name": "http-proxy-agent",
          "Identifier": {
            "PURL": "pkg:npm/http-proxy-agent@5.0.0",
            "UID": "a9e776fe03a20f3e",
            "BOMRef": "pkg:npm/http-proxy-agent@5.0.0"
          },
          "Version": "5.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "jsdom@22.1.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "https-proxy-agent@5.0.1",
          "Name": "https-proxy-agent",
          "Identifier": {
            "PURL": "pkg:npm/https-proxy-agent@5.0.1",
            "UID": "9c397487fab1bbd9",
            "BOMRef": "pkg:npm/https-proxy-agent@5.0.1"
          },
          "Version": "5.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "jsdom@22.1.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "iconv-lite@0.6.3",
          "Name": "iconv-lite",
          "Identifier": {
            "PURL": "pkg:npm/iconv-lite@0.6.3",
            "UID": "4197abe5f74cba4",
            "BOMRef": "pkg:npm/iconv-lite@0.6.3"
          },
          "Version": "0.6.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "whatwg-encoding@2.0.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "ignore@5.3.2",
          "Name": "ignore",
          "Identifier": {
            "PURL": "pkg:npm/ignore@5.3.2",
            "UID": "48c127904e3ac832",
            "BOMRef": "pkg:npm/ignore@5.3.2"
          },
          "Version": "5.3.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@eslint/eslintrc@2.1.4",
            "eslint@8.57.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "import-fresh@3.3.1",
          "Name": "import-fresh",
          "Identifier": {
            "PURL": "pkg:npm/import-fresh@3.3.1",
            "UID": "cb55164bd0fd628b",
            "BOMRef": "pkg:npm/import-fresh@3.3.1"
          },
          "Version": "3.3.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@eslint/eslintrc@2.1.4",
            "cosmiconfig@7.1.0",
            "cosmiconfig@8.3.6"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "imurmurhash@0.1.4",
          "Name": "imurmurhash",
          "Identifier": {
            "PURL": "pkg:npm/imurmurhash@0.1.4",
            "UID": "da8bd2d639ef5029",
            "BOMRef": "pkg:npm/imurmurhash@0.1.4"
          },
          "Version": "0.1.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "eslint@8.57.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "indent-string@4.0.0",
          "Name": "indent-string",
          "Identifier": {
            "PURL": "pkg:npm/indent-string@4.0.0",
            "UID": "a9f5117f79caa6e0",
            "BOMRef": "pkg:npm/indent-string@4.0.0"
          },
          "Version": "4.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "redent@3.0.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "index-array-by@1.4.2",
          "Name": "index-array-by",
          "Identifier": {
            "PURL": "pkg:npm/index-array-by@1.4.2",
            "UID": "2d73382c3237dfc4",
            "BOMRef": "pkg:npm/index-array-by@1.4.2"
          },
          "Version": "1.4.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "force-graph@1.50.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "inflight@1.0.6",
          "Name": "inflight",
          "Identifier": {
            "PURL": "pkg:npm/inflight@1.0.6",
            "UID": "f3fe427aceceeae3",
            "BOMRef": "pkg:npm/inflight@1.0.6"
          },
          "Version": "1.0.6",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "glob@7.2.3"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "inherits@2.0.4",
          "Name": "inherits",
          "Identifier": {
            "PURL": "pkg:npm/inherits@2.0.4",
            "UID": "6788aef4837b67f",
            "BOMRef": "pkg:npm/inherits@2.0.4"
          },
          "Version": "2.0.4",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "glob@7.2.3"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "inline-style-parser@0.1.1",
          "Name": "inline-style-parser",
          "Identifier": {
            "PURL": "pkg:npm/inline-style-parser@0.1.1",
            "UID": "2f1e5a19ff03063c",
            "BOMRef": "pkg:npm/inline-style-parser@0.1.1"
          },
          "Version": "0.1.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "style-to-object@0.4.4"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "internal-slot@1.1.0",
          "Name": "internal-slot",
          "Identifier": {
            "PURL": "pkg:npm/internal-slot@1.1.0",
            "UID": "ed3b061677ec2887",
            "BOMRef": "pkg:npm/internal-slot@1.1.0"
          },
          "Version": "1.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "es-abstract@1.24.0",
            "es-iterator-helpers@1.2.1",
            "stop-iteration-iterator@1.1.0",
            "string.prototype.matchall@4.0.12"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "internmap@2.0.3",
          "Name": "internmap",
          "Identifier": {
            "PURL": "pkg:npm/internmap@2.0.3",
            "UID": "da4e6bb8cdc8e17e",
            "BOMRef": "pkg:npm/internmap@2.0.3"
          },
          "Version": "2.0.3",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "d3-array@3.2.4"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "is-alphabetical@2.0.1",
          "Name": "is-alphabetical",
          "Identifier": {
            "PURL": "pkg:npm/is-alphabetical@2.0.1",
            "UID": "4bfc6ec76c7212bb",
            "BOMRef": "pkg:npm/is-alphabetical@2.0.1"
          },
          "Version": "2.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "is-alphanumerical@2.0.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "is-alphanumerical@2.0.1",
          "Name": "is-alphanumerical",
          "Identifier": {
            "PURL": "pkg:npm/is-alphanumerical@2.0.1",
            "UID": "99e7988608573381",
            "BOMRef": "pkg:npm/is-alphanumerical@2.0.1"
          },
          "Version": "2.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "parse-entities@4.0.2"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "is-arguments@1.2.0",
          "Name": "is-arguments",
          "Identifier": {
            "PURL": "pkg:npm/is-arguments@1.2.0",
            "UID": "7d0dac78bc4eff8e",
            "BOMRef": "pkg:npm/is-arguments@1.2.0"
          },
          "Version": "1.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "deep-equal@2.2.3",
            "es-get-iterator@1.1.3"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "is-array-buffer@3.0.5",
          "Name": "is-array-buffer",
          "Identifier": {
            "PURL": "pkg:npm/is-array-buffer@3.0.5",
            "UID": "1142ef6b143b310a",
            "BOMRef": "pkg:npm/is-array-buffer@3.0.5"
          },
          "Version": "3.0.5",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "array-buffer-byte-length@1.0.2",
            "arraybuffer.prototype.slice@1.0.4",
            "deep-equal@2.2.3",
            "es-abstract@1.24.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "is-arrayish@0.2.1",
          "Name": "is-arrayish",
          "Identifier": {
            "PURL": "pkg:npm/is-arrayish@0.2.1",
            "UID": "6c3938a952ed8469",
            "BOMRef": "pkg:npm/is-arrayish@0.2.1"
          },
          "Version": "0.2.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "error-ex@1.3.2"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "is-async-function@2.1.1",
          "Name": "is-async-function",
          "Identifier": {
            "PURL": "pkg:npm/is-async-function@2.1.1",
            "UID": "19cc027fdfafaaab",
            "BOMRef": "pkg:npm/is-async-function@2.1.1"
          },
          "Version": "2.1.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "which-builtin-type@1.2.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "is-bigint@1.1.0",
          "Name": "is-bigint",
          "Identifier": {
            "PURL": "pkg:npm/is-bigint@1.1.0",
            "UID": "be19b086136d5a40",
            "BOMRef": "pkg:npm/is-bigint@1.1.0"
          },
          "Version": "1.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "which-boxed-primitive@1.1.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "is-boolean-object@1.2.2",
          "Name": "is-boolean-object",
          "Identifier": {
            "PURL": "pkg:npm/is-boolean-object@1.2.2",
            "UID": "f6a29d8d1325c0b2",
            "BOMRef": "pkg:npm/is-boolean-object@1.2.2"
          },
          "Version": "1.2.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "which-boxed-primitive@1.1.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "is-buffer@2.0.5",
          "Name": "is-buffer",
          "Identifier": {
            "PURL": "pkg:npm/is-buffer@2.0.5",
            "UID": "14e755835577b127",
            "BOMRef": "pkg:npm/is-buffer@2.0.5"
          },
          "Version": "2.0.5",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "unified@10.1.2",
            "vfile@5.3.7"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "is-callable@1.2.7",
          "Name": "is-callable",
          "Identifier": {
            "PURL": "pkg:npm/is-callable@1.2.7",
            "UID": "827ccbd698ee137e",
            "BOMRef": "pkg:npm/is-callable@1.2.7"
          },
          "Version": "1.2.7",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "es-abstract@1.24.0",
            "es-to-primitive@1.3.0",
            "for-each@0.3.5",
            "function.prototype.name@1.1.8"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "is-core-module@2.16.1",
          "Name": "is-core-module",
          "Identifier": {
            "PURL": "pkg:npm/is-core-module@2.16.1",
            "UID": "3907d0d133f59fe1",
            "BOMRef": "pkg:npm/is-core-module@2.16.1"
          },
          "Version": "2.16.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "resolve@1.22.10",
            "resolve@2.0.0-next.5"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "is-data-view@1.0.2",
          "Name": "is-data-view",
          "Identifier": {
            "PURL": "pkg:npm/is-data-view@1.0.2",
            "UID": "983a7ec729fcc573",
            "BOMRef": "pkg:npm/is-data-view@1.0.2"
          },
          "Version": "1.0.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "data-view-buffer@1.0.2",
            "data-view-byte-length@1.0.2",
            "data-view-byte-offset@1.0.1",
            "es-abstract@1.24.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "is-date-object@1.1.0",
          "Name": "is-date-object",
          "Identifier": {
            "PURL": "pkg:npm/is-date-object@1.1.0",
            "UID": "5b11df62a6c9f7a9",
            "BOMRef": "pkg:npm/is-date-object@1.1.0"
          },
          "Version": "1.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "deep-equal@2.2.3",
            "es-to-primitive@1.3.0",
            "which-builtin-type@1.2.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "is-decimal@2.0.1",
          "Name": "is-decimal",
          "Identifier": {
            "PURL": "pkg:npm/is-decimal@2.0.1",
            "UID": "89119b8c2051a056",
            "BOMRef": "pkg:npm/is-decimal@2.0.1"
          },
          "Version": "2.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "is-alphanumerical@2.0.1",
            "parse-entities@4.0.2"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "is-extglob@2.1.1",
          "Name": "is-extglob",
          "Identifier": {
            "PURL": "pkg:npm/is-extglob@2.1.1",
            "UID": "132949abffe5c234",
            "BOMRef": "pkg:npm/is-extglob@2.1.1"
          },
          "Version": "2.1.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "is-glob@4.0.3"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "is-finalizationregistry@1.1.1",
          "Name": "is-finalizationregistry",
          "Identifier": {
            "PURL": "pkg:npm/is-finalizationregistry@1.1.1",
            "UID": "8147802c91204214",
            "BOMRef": "pkg:npm/is-finalizationregistry@1.1.1"
          },
          "Version": "1.1.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "which-builtin-type@1.2.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "is-generator-function@1.1.0",
          "Name": "is-generator-function",
          "Identifier": {
            "PURL": "pkg:npm/is-generator-function@1.1.0",
            "UID": "99e06205770ef016",
            "BOMRef": "pkg:npm/is-generator-function@1.1.0"
          },
          "Version": "1.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "which-builtin-type@1.2.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "is-glob@4.0.3",
          "Name": "is-glob",
          "Identifier": {
            "PURL": "pkg:npm/is-glob@4.0.3",
            "UID": "9812b008b3f99558",
            "BOMRef": "pkg:npm/is-glob@4.0.3"
          },
          "Version": "4.0.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@parcel/watcher@2.5.1",
            "eslint@8.57.1",
            "glob-parent@6.0.2"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "is-hexadecimal@2.0.1",
          "Name": "is-hexadecimal",
          "Identifier": {
            "PURL": "pkg:npm/is-hexadecimal@2.0.1",
            "UID": "d1364d2665f09c76",
            "BOMRef": "pkg:npm/is-hexadecimal@2.0.1"
          },
          "Version": "2.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "parse-entities@4.0.2"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "is-map@2.0.3",
          "Name": "is-map",
          "Identifier": {
            "PURL": "pkg:npm/is-map@2.0.3",
            "UID": "536c0fca85c903a5",
            "BOMRef": "pkg:npm/is-map@2.0.3"
          },
          "Version": "2.0.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "es-get-iterator@1.1.3",
            "which-collection@1.0.2"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "is-negative-zero@2.0.3",
          "Name": "is-negative-zero",
          "Identifier": {
            "PURL": "pkg:npm/is-negative-zero@2.0.3",
            "UID": "f4aee1f20780f347",
            "BOMRef": "pkg:npm/is-negative-zero@2.0.3"
          },
          "Version": "2.0.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "es-abstract@1.24.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "is-network-error@1.1.0",
          "Name": "is-network-error",
          "Identifier": {
            "PURL": "pkg:npm/is-network-error@1.1.0",
            "UID": "c91b175a6db710d6",
            "BOMRef": "pkg:npm/is-network-error@1.1.0"
          },
          "Version": "1.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "p-retry@6.2.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "is-number@7.0.0",
          "Name": "is-number",
          "Identifier": {
            "PURL": "pkg:npm/is-number@7.0.0",
            "UID": "e922ad88939fe07c",
            "BOMRef": "pkg:npm/is-number@7.0.0"
          },
          "Version": "7.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "to-regex-range@5.0.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "is-number-object@1.1.1",
          "Name": "is-number-object",
          "Identifier": {
            "PURL": "pkg:npm/is-number-object@1.1.1",
            "UID": "ebc345bf5832dcdb",
            "BOMRef": "pkg:npm/is-number-object@1.1.1"
          },
          "Version": "1.1.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "which-boxed-primitive@1.1.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "is-path-inside@3.0.3",
          "Name": "is-path-inside",
          "Identifier": {
            "PURL": "pkg:npm/is-path-inside@3.0.3",
            "UID": "95f9f257042b276f",
            "BOMRef": "pkg:npm/is-path-inside@3.0.3"
          },
          "Version": "3.0.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "eslint@8.57.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "is-plain-obj@4.1.0",
          "Name": "is-plain-obj",
          "Identifier": {
            "PURL": "pkg:npm/is-plain-obj@4.1.0",
            "UID": "129a6be13957a48e",
            "BOMRef": "pkg:npm/is-plain-obj@4.1.0"
          },
          "Version": "4.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "unified@10.1.2"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "is-potential-custom-element-name@1.0.1",
          "Name": "is-potential-custom-element-name",
          "Identifier": {
            "PURL": "pkg:npm/is-potential-custom-element-name@1.0.1",
            "UID": "4e01b202cda42546",
            "BOMRef": "pkg:npm/is-potential-custom-element-name@1.0.1"
          },
          "Version": "1.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "jsdom@22.1.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "is-reference@3.0.3",
          "Name": "is-reference",
          "Identifier": {
            "PURL": "pkg:npm/is-reference@3.0.3",
            "UID": "ce8c128920bdab05",
            "BOMRef": "pkg:npm/is-reference@3.0.3"
          },
          "Version": "3.0.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "periscopic@3.1.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "is-regex@1.2.1",
          "Name": "is-regex",
          "Identifier": {
            "PURL": "pkg:npm/is-regex@1.2.1",
            "UID": "208a7afac17f6c70",
            "BOMRef": "pkg:npm/is-regex@1.2.1"
          },
          "Version": "1.2.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "deep-equal@2.2.3",
            "es-abstract@1.24.0",
            "safe-regex-test@1.1.0",
            "which-builtin-type@1.2.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "is-set@2.0.3",
          "Name": "is-set",
          "Identifier": {
            "PURL": "pkg:npm/is-set@2.0.3",
            "UID": "7fd4cdc84e35bd6d",
            "BOMRef": "pkg:npm/is-set@2.0.3"
          },
          "Version": "2.0.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "es-abstract@1.24.0",
            "es-get-iterator@1.1.3",
            "which-collection@1.0.2"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "is-shared-array-buffer@1.0.4",
          "Name": "is-shared-array-buffer",
          "Identifier": {
            "PURL": "pkg:npm/is-shared-array-buffer@1.0.4",
            "UID": "8554abf09fbf99be",
            "BOMRef": "pkg:npm/is-shared-array-buffer@1.0.4"
          },
          "Version": "1.0.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "deep-equal@2.2.3",
            "es-abstract@1.24.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "is-string@1.1.1",
          "Name": "is-string",
          "Identifier": {
            "PURL": "pkg:npm/is-string@1.1.1",
            "UID": "551b384a80eab344",
            "BOMRef": "pkg:npm/is-string@1.1.1"
          },
          "Version": "1.1.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "array-includes@3.1.9",
            "es-abstract@1.24.0",
            "es-get-iterator@1.1.3",
            "which-boxed-primitive@1.1.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "is-symbol@1.1.1",
          "Name": "is-symbol",
          "Identifier": {
            "PURL": "pkg:npm/is-symbol@1.1.1",
            "UID": "5d3c852b0ba54e31",
            "BOMRef": "pkg:npm/is-symbol@1.1.1"
          },
          "Version": "1.1.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "es-to-primitive@1.3.0",
            "which-boxed-primitive@1.1.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "is-typed-array@1.1.15",
          "Name": "is-typed-array",
          "Identifier": {
            "PURL": "pkg:npm/is-typed-array@1.1.15",
            "UID": "c23a2b7ed481d244",
            "BOMRef": "pkg:npm/is-typed-array@1.1.15"
          },
          "Version": "1.1.15",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "es-abstract@1.24.0",
            "is-data-view@1.0.2",
            "typed-array-buffer@1.0.3",
            "typed-array-byte-length@1.0.3",
            "typed-array-byte-offset@1.0.4",
            "typed-array-length@1.0.7"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "is-weakmap@2.0.2",
          "Name": "is-weakmap",
          "Identifier": {
            "PURL": "pkg:npm/is-weakmap@2.0.2",
            "UID": "28aa8cba45f7d484",
            "BOMRef": "pkg:npm/is-weakmap@2.0.2"
          },
          "Version": "2.0.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "which-collection@1.0.2"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "is-weakref@1.1.1",
          "Name": "is-weakref",
          "Identifier": {
            "PURL": "pkg:npm/is-weakref@1.1.1",
            "UID": "912a8fc8edbb5b0",
            "BOMRef": "pkg:npm/is-weakref@1.1.1"
          },
          "Version": "1.1.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "es-abstract@1.24.0",
            "which-builtin-type@1.2.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "is-weakset@2.0.4",
          "Name": "is-weakset",
          "Identifier": {
            "PURL": "pkg:npm/is-weakset@2.0.4",
            "UID": "5fba607047d34bd2",
            "BOMRef": "pkg:npm/is-weakset@2.0.4"
          },
          "Version": "2.0.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "which-collection@1.0.2"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "isarray@2.0.5",
          "Name": "isarray",
          "Identifier": {
            "PURL": "pkg:npm/isarray@2.0.5",
            "UID": "c6f8d4c7afb405f0",
            "BOMRef": "pkg:npm/isarray@2.0.5"
          },
          "Version": "2.0.5",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "deep-equal@2.2.3",
            "es-get-iterator@1.1.3",
            "safe-array-concat@1.1.3",
            "safe-push-apply@1.0.0",
            "which-builtin-type@1.2.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "isexe@2.0.0",
          "Name": "isexe",
          "Identifier": {
            "PURL": "pkg:npm/isexe@2.0.0",
            "UID": "ceeca6c9f2ea1472",
            "BOMRef": "pkg:npm/isexe@2.0.0"
          },
          "Version": "2.0.0",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "which@2.0.2"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "iterator.prototype@1.1.5",
          "Name": "iterator.prototype",
          "Identifier": {
            "PURL": "pkg:npm/iterator.prototype@1.1.5",
            "UID": "5e01099a08d4b9b5",
            "BOMRef": "pkg:npm/iterator.prototype@1.1.5"
          },
          "Version": "1.1.5",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "es-iterator-helpers@1.2.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "jest-diff@30.0.4",
          "Name": "jest-diff",
          "Identifier": {
            "PURL": "pkg:npm/jest-diff@30.0.4",
            "UID": "38b5e99c1b555ff2",
            "BOMRef": "pkg:npm/jest-diff@30.0.4"
          },
          "Version": "30.0.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "jest-matcher-utils@30.0.4"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "jest-matcher-utils@30.0.4",
          "Name": "jest-matcher-utils",
          "Identifier": {
            "PURL": "pkg:npm/jest-matcher-utils@30.0.4",
            "UID": "b9d90786ae841e8",
            "BOMRef": "pkg:npm/jest-matcher-utils@30.0.4"
          },
          "Version": "30.0.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "expect@30.0.4"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "jest-message-util@30.0.2",
          "Name": "jest-message-util",
          "Identifier": {
            "PURL": "pkg:npm/jest-message-util@30.0.2",
            "UID": "fa3c078b308d6b43",
            "BOMRef": "pkg:npm/jest-message-util@30.0.2"
          },
          "Version": "30.0.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "expect@30.0.4"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "jest-mock@30.0.2",
          "Name": "jest-mock",
          "Identifier": {
            "PURL": "pkg:npm/jest-mock@30.0.2",
            "UID": "e7b2ac90d9657add",
            "BOMRef": "pkg:npm/jest-mock@30.0.2"
          },
          "Version": "30.0.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "expect@30.0.4"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "jest-regex-util@30.0.1",
          "Name": "jest-regex-util",
          "Identifier": {
            "PURL": "pkg:npm/jest-regex-util@30.0.1",
            "UID": "c759ee2d1d459383",
            "BOMRef": "pkg:npm/jest-regex-util@30.0.1"
          },
          "Version": "30.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@jest/pattern@30.0.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "jest-util@30.0.2",
          "Name": "jest-util",
          "Identifier": {
            "PURL": "pkg:npm/jest-util@30.0.2",
            "UID": "901424f1bbd73c0d",
            "BOMRef": "pkg:npm/jest-util@30.0.2"
          },
          "Version": "30.0.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "expect@30.0.4",
            "jest-mock@30.0.2"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "jiti@2.4.2",
          "Name": "jiti",
          "Identifier": {
            "PURL": "pkg:npm/jiti@2.4.2",
            "UID": "74acecde3f1a2576",
            "BOMRef": "pkg:npm/jiti@2.4.2"
          },
          "Version": "2.4.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@tailwindcss/node@4.1.11",
            "vite@6.4.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "jose@5.10.0",
          "Name": "jose",
          "Identifier": {
            "PURL": "pkg:npm/jose@5.10.0",
            "UID": "27823324dc667ae5",
            "BOMRef": "pkg:npm/jose@5.10.0"
          },
          "Version": "5.10.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "js-tokens@4.0.0",
          "Name": "js-tokens",
          "Identifier": {
            "PURL": "pkg:npm/js-tokens@4.0.0",
            "UID": "c7b3f5038d5853da",
            "BOMRef": "pkg:npm/js-tokens@4.0.0"
          },
          "Version": "4.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@babel/code-frame@7.27.1",
            "loose-envify@1.4.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "js-tokens@9.0.1",
          "Name": "js-tokens",
          "Identifier": {
            "PURL": "pkg:npm/js-tokens@9.0.1",
            "UID": "3e1b5aa1d10d20bd",
            "BOMRef": "pkg:npm/js-tokens@9.0.1"
          },
          "Version": "9.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "strip-literal@3.0.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "js-yaml@4.1.1",
          "Name": "js-yaml",
          "Identifier": {
            "PURL": "pkg:npm/js-yaml@4.1.1",
            "UID": "a162cc8f95c9a106",
            "BOMRef": "pkg:npm/js-yaml@4.1.1"
          },
          "Version": "4.1.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@eslint/eslintrc@2.1.4",
            "cosmiconfig@8.3.6",
            "eslint@8.57.1",
            "openapi-client-axios@7.6.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "jsdom@22.1.0",
          "Name": "jsdom",
          "Identifier": {
            "PURL": "pkg:npm/jsdom@22.1.0",
            "UID": "f3816dfeebb90095",
            "BOMRef": "pkg:npm/jsdom@22.1.0"
          },
          "Version": "22.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "qdrant-web-ui@0.2.5",
            "vitest@3.2.4"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "jsesc@3.1.0",
          "Name": "jsesc",
          "Identifier": {
            "PURL": "pkg:npm/jsesc@3.1.0",
            "UID": "5e9db0d811fae468",
            "BOMRef": "pkg:npm/jsesc@3.1.0"
          },
          "Version": "3.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@babel/generator@7.28.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "json-buffer@3.0.1",
          "Name": "json-buffer",
          "Identifier": {
            "PURL": "pkg:npm/json-buffer@3.0.1",
            "UID": "c2ec2db941ca6bec",
            "BOMRef": "pkg:npm/json-buffer@3.0.1"
          },
          "Version": "3.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "keyv@4.5.4"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "json-parse-even-better-errors@2.3.1",
          "Name": "json-parse-even-better-errors",
          "Identifier": {
            "PURL": "pkg:npm/json-parse-even-better-errors@2.3.1",
            "UID": "1808e933f266fb07",
            "BOMRef": "pkg:npm/json-parse-even-better-errors@2.3.1"
          },
          "Version": "2.3.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "parse-json@5.2.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "json-schema-traverse@0.4.1",
          "Name": "json-schema-traverse",
          "Identifier": {
            "PURL": "pkg:npm/json-schema-traverse@0.4.1",
            "UID": "96d870bc0ee7659e",
            "BOMRef": "pkg:npm/json-schema-traverse@0.4.1"
          },
          "Version": "0.4.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "ajv@6.12.6"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "json-stable-stringify-without-jsonify@1.0.1",
          "Name": "json-stable-stringify-without-jsonify",
          "Identifier": {
            "PURL": "pkg:npm/json-stable-stringify-without-jsonify@1.0.1",
            "UID": "a94efc4ab0792494",
            "BOMRef": "pkg:npm/json-stable-stringify-without-jsonify@1.0.1"
          },
          "Version": "1.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "eslint@8.57.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "json5@2.2.3",
          "Name": "json5",
          "Identifier": {
            "PURL": "pkg:npm/json5@2.2.3",
            "UID": "e6a1ddfd6b116348",
            "BOMRef": "pkg:npm/json5@2.2.3"
          },
          "Version": "2.2.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@babel/core@7.28.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "jsonc-parser@3.3.1",
          "Name": "jsonc-parser",
          "Identifier": {
            "PURL": "pkg:npm/jsonc-parser@3.3.1",
            "UID": "738bf10eea5de153",
            "BOMRef": "pkg:npm/jsonc-parser@3.3.1"
          },
          "Version": "3.3.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "jsx-ast-utils@3.3.5",
          "Name": "jsx-ast-utils",
          "Identifier": {
            "PURL": "pkg:npm/jsx-ast-utils@3.3.5",
            "UID": "ba15d29ded43dec8",
            "BOMRef": "pkg:npm/jsx-ast-utils@3.3.5"
          },
          "Version": "3.3.5",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "eslint-plugin-react@7.37.5"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "jtd@0.1.1",
          "Name": "jtd",
          "Identifier": {
            "PURL": "pkg:npm/jtd@0.1.1",
            "UID": "63673cd31076b116",
            "BOMRef": "pkg:npm/jtd@0.1.1"
          },
          "Version": "0.1.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "create-collection-form@0.0.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "kapsule@1.16.3",
          "Name": "kapsule",
          "Identifier": {
            "PURL": "pkg:npm/kapsule@1.16.3",
            "UID": "7f2a4dae3ac0e1b5",
            "BOMRef": "pkg:npm/kapsule@1.16.3"
          },
          "Version": "1.16.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "float-tooltip@1.7.5",
            "force-graph@1.50.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "keyv@4.5.4",
          "Name": "keyv",
          "Identifier": {
            "PURL": "pkg:npm/keyv@4.5.4",
            "UID": "10ea926cb62ef8b2",
            "BOMRef": "pkg:npm/keyv@4.5.4"
          },
          "Version": "4.5.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "flat-cache@3.2.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "kleur@4.1.5",
          "Name": "kleur",
          "Identifier": {
            "PURL": "pkg:npm/kleur@4.1.5",
            "UID": "54cfeafd3e318c8b",
            "BOMRef": "pkg:npm/kleur@4.1.5"
          },
          "Version": "4.1.5",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "uvu@0.5.6"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "levn@0.4.1",
          "Name": "levn",
          "Identifier": {
            "PURL": "pkg:npm/levn@0.4.1",
            "UID": "a39db3dd7f969545",
            "BOMRef": "pkg:npm/levn@0.4.1"
          },
          "Version": "0.4.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "eslint@8.57.1",
            "optionator@0.9.4"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "lightningcss@1.30.1",
          "Name": "lightningcss",
          "Identifier": {
            "PURL": "pkg:npm/lightningcss@1.30.1",
            "UID": "b880266c90b0f4d",
            "BOMRef": "pkg:npm/lightningcss@1.30.1"
          },
          "Version": "1.30.1",
          "Licenses": [
            "MPL-2.0"
          ],
          "DependsOn": [
            "@tailwindcss/node@4.1.11",
            "vite@6.4.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "lines-and-columns@1.2.4",
          "Name": "lines-and-columns",
          "Identifier": {
            "PURL": "pkg:npm/lines-and-columns@1.2.4",
            "UID": "cb78b5437d126844",
            "BOMRef": "pkg:npm/lines-and-columns@1.2.4"
          },
          "Version": "1.2.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "parse-json@5.2.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "locate-path@6.0.0",
          "Name": "locate-path",
          "Identifier": {
            "PURL": "pkg:npm/locate-path@6.0.0",
            "UID": "1058cd7e0c4cbee0",
            "BOMRef": "pkg:npm/locate-path@6.0.0"
          },
          "Version": "6.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "find-up@5.0.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "lodash@4.17.21",
          "Name": "lodash",
          "Identifier": {
            "PURL": "pkg:npm/lodash@4.17.21",
            "UID": "aa797d58a1ab2143",
            "BOMRef": "pkg:npm/lodash@4.17.21"
          },
          "Version": "4.17.21",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@testing-library/jest-dom@5.17.0",
            "@uppy/core@4.4.7",
            "@uppy/dashboard@4.3.4",
            "@uppy/utils@6.1.5",
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "lodash-es@4.17.21",
          "Name": "lodash-es",
          "Identifier": {
            "PURL": "pkg:npm/lodash-es@4.17.21",
            "UID": "26a945d215b3e07a",
            "BOMRef": "pkg:npm/lodash-es@4.17.21"
          },
          "Version": "4.17.21",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "force-graph@1.50.1",
            "kapsule@1.16.3"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "lodash.merge@4.6.2",
          "Name": "lodash.merge",
          "Identifier": {
            "PURL": "pkg:npm/lodash.merge@4.6.2",
            "UID": "53a5eb7dc0c3c6a7",
            "BOMRef": "pkg:npm/lodash.merge@4.6.2"
          },
          "Version": "4.6.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "eslint@8.57.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "longest-streak@3.1.0",
          "Name": "longest-streak",
          "Identifier": {
            "PURL": "pkg:npm/longest-streak@3.1.0",
            "UID": "a427010d60bc29ea",
            "BOMRef": "pkg:npm/longest-streak@3.1.0"
          },
          "Version": "3.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "mdast-util-to-markdown@1.5.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "loose-envify@1.4.0",
          "Name": "loose-envify",
          "Identifier": {
            "PURL": "pkg:npm/loose-envify@1.4.0",
            "UID": "f8f58635e34eb2a1",
            "BOMRef": "pkg:npm/loose-envify@1.4.0"
          },
          "Version": "1.4.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "prop-types@15.8.1",
            "react-dom@18.3.1",
            "react-transition-group@4.4.5",
            "react@18.3.1",
            "scheduler@0.23.2"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "loupe@3.1.4",
          "Name": "loupe",
          "Identifier": {
            "PURL": "pkg:npm/loupe@3.1.4",
            "UID": "aad936699ebaecf2",
            "BOMRef": "pkg:npm/loupe@3.1.4"
          },
          "Version": "3.1.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@vitest/utils@3.2.4",
            "chai@5.2.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "lower-case@2.0.2",
          "Name": "lower-case",
          "Identifier": {
            "PURL": "pkg:npm/lower-case@2.0.2",
            "UID": "7a205a27fe9002da",
            "BOMRef": "pkg:npm/lower-case@2.0.2"
          },
          "Version": "2.0.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "no-case@3.0.4"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "lru-cache@5.1.1",
          "Name": "lru-cache",
          "Identifier": {
            "PURL": "pkg:npm/lru-cache@5.1.1",
            "UID": "83b3aebce22b8072",
            "BOMRef": "pkg:npm/lru-cache@5.1.1"
          },
          "Version": "5.1.1",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "@babel/helper-compilation-targets@7.27.2"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "lucide-react@0.545.0",
          "Name": "lucide-react",
          "Identifier": {
            "PURL": "pkg:npm/lucide-react@0.545.0",
            "UID": "c315570d8429b740",
            "BOMRef": "pkg:npm/lucide-react@0.545.0"
          },
          "Version": "0.545.0",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "create-collection-form@0.0.0",
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "lz-string@1.5.0",
          "Name": "lz-string",
          "Identifier": {
            "PURL": "pkg:npm/lz-string@1.5.0",
            "UID": "37d847ecd91586f5",
            "BOMRef": "pkg:npm/lz-string@1.5.0"
          },
          "Version": "1.5.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@testing-library/dom@10.4.0",
            "@testing-library/dom@8.20.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "magic-string@0.30.17",
          "Name": "magic-string",
          "Identifier": {
            "PURL": "pkg:npm/magic-string@0.30.17",
            "UID": "8844707c701eb2cd",
            "BOMRef": "pkg:npm/magic-string@0.30.17"
          },
          "Version": "0.30.17",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@tailwindcss/node@4.1.11",
            "@vitest/mocker@3.2.4",
            "@vitest/snapshot@3.2.4",
            "vitest@3.2.4"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "markdown-extensions@1.1.1",
          "Name": "markdown-extensions",
          "Identifier": {
            "PURL": "pkg:npm/markdown-extensions@1.1.1",
            "UID": "cb15ac4f1d47e4",
            "BOMRef": "pkg:npm/markdown-extensions@1.1.1"
          },
          "Version": "1.1.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mdx-js/mdx@2.3.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "math-intrinsics@1.1.0",
          "Name": "math-intrinsics",
          "Identifier": {
            "PURL": "pkg:npm/math-intrinsics@1.1.0",
            "UID": "237dbcf04d552943",
            "BOMRef": "pkg:npm/math-intrinsics@1.1.0"
          },
          "Version": "1.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "array-includes@3.1.9",
            "es-abstract@1.24.0",
            "get-intrinsic@1.3.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "mdast-util-definitions@5.1.2",
          "Name": "mdast-util-definitions",
          "Identifier": {
            "PURL": "pkg:npm/mdast-util-definitions@5.1.2",
            "UID": "2c0d4e807f659491",
            "BOMRef": "pkg:npm/mdast-util-definitions@5.1.2"
          },
          "Version": "5.1.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "mdast-util-to-hast@12.3.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "mdast-util-from-markdown@1.3.1",
          "Name": "mdast-util-from-markdown",
          "Identifier": {
            "PURL": "pkg:npm/mdast-util-from-markdown@1.3.1",
            "UID": "d00e5a07720c51ad",
            "BOMRef": "pkg:npm/mdast-util-from-markdown@1.3.1"
          },
          "Version": "1.3.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "mdast-util-mdx-expression@1.3.2",
            "mdast-util-mdx-jsx@2.1.4",
            "mdast-util-mdx@2.0.1",
            "mdast-util-mdxjs-esm@1.3.1",
            "remark-parse@10.0.2"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "mdast-util-mdx@2.0.1",
          "Name": "mdast-util-mdx",
          "Identifier": {
            "PURL": "pkg:npm/mdast-util-mdx@2.0.1",
            "UID": "aa098f44f9ccb1dd",
            "BOMRef": "pkg:npm/mdast-util-mdx@2.0.1"
          },
          "Version": "2.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "remark-mdx@2.3.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "mdast-util-mdx-expression@1.3.2",
          "Name": "mdast-util-mdx-expression",
          "Identifier": {
            "PURL": "pkg:npm/mdast-util-mdx-expression@1.3.2",
            "UID": "1797f1ec1b945a9",
            "BOMRef": "pkg:npm/mdast-util-mdx-expression@1.3.2"
          },
          "Version": "1.3.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "hast-util-to-estree@2.3.3",
            "mdast-util-mdx@2.0.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "mdast-util-mdx-jsx@2.1.4",
          "Name": "mdast-util-mdx-jsx",
          "Identifier": {
            "PURL": "pkg:npm/mdast-util-mdx-jsx@2.1.4",
            "UID": "59d15252c2cf5b89",
            "BOMRef": "pkg:npm/mdast-util-mdx-jsx@2.1.4"
          },
          "Version": "2.1.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "mdast-util-mdx@2.0.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "mdast-util-mdxjs-esm@1.3.1",
          "Name": "mdast-util-mdxjs-esm",
          "Identifier": {
            "PURL": "pkg:npm/mdast-util-mdxjs-esm@1.3.1",
            "UID": "b0fcbf8929a086cf",
            "BOMRef": "pkg:npm/mdast-util-mdxjs-esm@1.3.1"
          },
          "Version": "1.3.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "hast-util-to-estree@2.3.3",
            "mdast-util-mdx@2.0.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "mdast-util-phrasing@3.0.1",
          "Name": "mdast-util-phrasing",
          "Identifier": {
            "PURL": "pkg:npm/mdast-util-phrasing@3.0.1",
            "UID": "b67342a9241050af",
            "BOMRef": "pkg:npm/mdast-util-phrasing@3.0.1"
          },
          "Version": "3.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "mdast-util-to-markdown@1.5.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "mdast-util-to-hast@12.3.0",
          "Name": "mdast-util-to-hast",
          "Identifier": {
            "PURL": "pkg:npm/mdast-util-to-hast@12.3.0",
            "UID": "e8f628eb89c0b373",
            "BOMRef": "pkg:npm/mdast-util-to-hast@12.3.0"
          },
          "Version": "12.3.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "remark-rehype@10.1.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "mdast-util-to-markdown@1.5.0",
          "Name": "mdast-util-to-markdown",
          "Identifier": {
            "PURL": "pkg:npm/mdast-util-to-markdown@1.5.0",
            "UID": "cc6272b8970f9b9d",
            "BOMRef": "pkg:npm/mdast-util-to-markdown@1.5.0"
          },
          "Version": "1.5.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "mdast-util-mdx-expression@1.3.2",
            "mdast-util-mdx-jsx@2.1.4",
            "mdast-util-mdx@2.0.1",
            "mdast-util-mdxjs-esm@1.3.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "mdast-util-to-string@3.2.0",
          "Name": "mdast-util-to-string",
          "Identifier": {
            "PURL": "pkg:npm/mdast-util-to-string@3.2.0",
            "UID": "afacaffa58714a94",
            "BOMRef": "pkg:npm/mdast-util-to-string@3.2.0"
          },
          "Version": "3.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "mdast-util-from-markdown@1.3.1",
            "mdast-util-to-markdown@1.5.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "memoize-one@6.0.0",
          "Name": "memoize-one",
          "Identifier": {
            "PURL": "pkg:npm/memoize-one@6.0.0",
            "UID": "ddf65f940c97ba45",
            "BOMRef": "pkg:npm/memoize-one@6.0.0"
          },
          "Version": "6.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@uppy/dashboard@4.3.4",
            "react-diff-viewer-continued@3.4.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "micromark@3.2.0",
          "Name": "micromark",
          "Identifier": {
            "PURL": "pkg:npm/micromark@3.2.0",
            "UID": "ba3774e6664610c3",
            "BOMRef": "pkg:npm/micromark@3.2.0"
          },
          "Version": "3.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "mdast-util-from-markdown@1.3.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "micromark-core-commonmark@1.1.0",
          "Name": "micromark-core-commonmark",
          "Identifier": {
            "PURL": "pkg:npm/micromark-core-commonmark@1.1.0",
            "UID": "eace6a177a96b526",
            "BOMRef": "pkg:npm/micromark-core-commonmark@1.1.0"
          },
          "Version": "1.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "micromark-extension-mdxjs-esm@1.0.5",
            "micromark@3.2.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "micromark-extension-mdx-expression@1.0.8",
          "Name": "micromark-extension-mdx-expression",
          "Identifier": {
            "PURL": "pkg:npm/micromark-extension-mdx-expression@1.0.8",
            "UID": "8298f32844afad74",
            "BOMRef": "pkg:npm/micromark-extension-mdx-expression@1.0.8"
          },
          "Version": "1.0.8",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "micromark-extension-mdxjs@1.0.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "micromark-extension-mdx-jsx@1.0.5",
          "Name": "micromark-extension-mdx-jsx",
          "Identifier": {
            "PURL": "pkg:npm/micromark-extension-mdx-jsx@1.0.5",
            "UID": "12271ee515d5bc0f",
            "BOMRef": "pkg:npm/micromark-extension-mdx-jsx@1.0.5"
          },
          "Version": "1.0.5",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "micromark-extension-mdxjs@1.0.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "micromark-extension-mdx-md@1.0.1",
          "Name": "micromark-extension-mdx-md",
          "Identifier": {
            "PURL": "pkg:npm/micromark-extension-mdx-md@1.0.1",
            "UID": "9c62ce0c97141da3",
            "BOMRef": "pkg:npm/micromark-extension-mdx-md@1.0.1"
          },
          "Version": "1.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "micromark-extension-mdxjs@1.0.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "micromark-extension-mdxjs@1.0.1",
          "Name": "micromark-extension-mdxjs",
          "Identifier": {
            "PURL": "pkg:npm/micromark-extension-mdxjs@1.0.1",
            "UID": "bbec7a1d852025bb",
            "BOMRef": "pkg:npm/micromark-extension-mdxjs@1.0.1"
          },
          "Version": "1.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "remark-mdx@2.3.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "micromark-extension-mdxjs-esm@1.0.5",
          "Name": "micromark-extension-mdxjs-esm",
          "Identifier": {
            "PURL": "pkg:npm/micromark-extension-mdxjs-esm@1.0.5",
            "UID": "b0271de276f39e8c",
            "BOMRef": "pkg:npm/micromark-extension-mdxjs-esm@1.0.5"
          },
          "Version": "1.0.5",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "micromark-extension-mdxjs@1.0.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "micromark-factory-destination@1.1.0",
          "Name": "micromark-factory-destination",
          "Identifier": {
            "PURL": "pkg:npm/micromark-factory-destination@1.1.0",
            "UID": "54a297d56cdff3af",
            "BOMRef": "pkg:npm/micromark-factory-destination@1.1.0"
          },
          "Version": "1.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "micromark-core-commonmark@1.1.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "micromark-factory-label@1.1.0",
          "Name": "micromark-factory-label",
          "Identifier": {
            "PURL": "pkg:npm/micromark-factory-label@1.1.0",
            "UID": "3527b58b158c84c2",
            "BOMRef": "pkg:npm/micromark-factory-label@1.1.0"
          },
          "Version": "1.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "micromark-core-commonmark@1.1.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "micromark-factory-mdx-expression@1.0.9",
          "Name": "micromark-factory-mdx-expression",
          "Identifier": {
            "PURL": "pkg:npm/micromark-factory-mdx-expression@1.0.9",
            "UID": "3bafaef71a6fc9cf",
            "BOMRef": "pkg:npm/micromark-factory-mdx-expression@1.0.9"
          },
          "Version": "1.0.9",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "micromark-extension-mdx-expression@1.0.8",
            "micromark-extension-mdx-jsx@1.0.5"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "micromark-factory-space@1.1.0",
          "Name": "micromark-factory-space",
          "Identifier": {
            "PURL": "pkg:npm/micromark-factory-space@1.1.0",
            "UID": "c2a54b90f26ca049",
            "BOMRef": "pkg:npm/micromark-factory-space@1.1.0"
          },
          "Version": "1.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "micromark-core-commonmark@1.1.0",
            "micromark-extension-mdx-expression@1.0.8",
            "micromark-extension-mdx-jsx@1.0.5",
            "micromark-factory-title@1.1.0",
            "micromark-factory-whitespace@1.1.0",
            "micromark@3.2.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "micromark-factory-title@1.1.0",
          "Name": "micromark-factory-title",
          "Identifier": {
            "PURL": "pkg:npm/micromark-factory-title@1.1.0",
            "UID": "a36adf18f0e77408",
            "BOMRef": "pkg:npm/micromark-factory-title@1.1.0"
          },
          "Version": "1.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "micromark-core-commonmark@1.1.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "micromark-factory-whitespace@1.1.0",
          "Name": "micromark-factory-whitespace",
          "Identifier": {
            "PURL": "pkg:npm/micromark-factory-whitespace@1.1.0",
            "UID": "ce8611b1900072bd",
            "BOMRef": "pkg:npm/micromark-factory-whitespace@1.1.0"
          },
          "Version": "1.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "micromark-core-commonmark@1.1.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "micromark-util-character@1.2.0",
          "Name": "micromark-util-character",
          "Identifier": {
            "PURL": "pkg:npm/micromark-util-character@1.2.0",
            "UID": "d7779e0cdda2276e",
            "BOMRef": "pkg:npm/micromark-util-character@1.2.0"
          },
          "Version": "1.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "micromark-core-commonmark@1.1.0",
            "micromark-extension-mdx-expression@1.0.8",
            "micromark-extension-mdx-jsx@1.0.5",
            "micromark-extension-mdxjs-esm@1.0.5",
            "micromark-factory-destination@1.1.0",
            "micromark-factory-label@1.1.0",
            "micromark-factory-mdx-expression@1.0.9",
            "micromark-factory-space@1.1.0",
            "micromark-factory-title@1.1.0",
            "micromark-factory-whitespace@1.1.0",
            "micromark-util-classify-character@1.1.0",
            "micromark-util-decode-string@1.1.0",
            "micromark-util-sanitize-uri@1.2.0",
            "micromark@3.2.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "micromark-util-chunked@1.1.0",
          "Name": "micromark-util-chunked",
          "Identifier": {
            "PURL": "pkg:npm/micromark-util-chunked@1.1.0",
            "UID": "1d5acf322303211c",
            "BOMRef": "pkg:npm/micromark-util-chunked@1.1.0"
          },
          "Version": "1.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "micromark-core-commonmark@1.1.0",
            "micromark-util-combine-extensions@1.1.0",
            "micromark-util-subtokenize@1.1.0",
            "micromark@3.2.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "micromark-util-classify-character@1.1.0",
          "Name": "micromark-util-classify-character",
          "Identifier": {
            "PURL": "pkg:npm/micromark-util-classify-character@1.1.0",
            "UID": "b7ffb60207142346",
            "BOMRef": "pkg:npm/micromark-util-classify-character@1.1.0"
          },
          "Version": "1.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "micromark-core-commonmark@1.1.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "micromark-util-combine-extensions@1.1.0",
          "Name": "micromark-util-combine-extensions",
          "Identifier": {
            "PURL": "pkg:npm/micromark-util-combine-extensions@1.1.0",
            "UID": "8414030d1f623201",
            "BOMRef": "pkg:npm/micromark-util-combine-extensions@1.1.0"
          },
          "Version": "1.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "micromark-extension-mdxjs@1.0.1",
            "micromark@3.2.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "micromark-util-decode-numeric-character-reference@1.1.0",
          "Name": "micromark-util-decode-numeric-character-reference",
          "Identifier": {
            "PURL": "pkg:npm/micromark-util-decode-numeric-character-reference@1.1.0",
            "UID": "39166e25243212ef",
            "BOMRef": "pkg:npm/micromark-util-decode-numeric-character-reference@1.1.0"
          },
          "Version": "1.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "mdast-util-from-markdown@1.3.1",
            "micromark-util-decode-string@1.1.0",
            "micromark@3.2.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "micromark-util-decode-string@1.1.0",
          "Name": "micromark-util-decode-string",
          "Identifier": {
            "PURL": "pkg:npm/micromark-util-decode-string@1.1.0",
            "UID": "2d42a33e069d843b",
            "BOMRef": "pkg:npm/micromark-util-decode-string@1.1.0"
          },
          "Version": "1.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "mdast-util-from-markdown@1.3.1",
            "mdast-util-to-markdown@1.5.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "micromark-util-encode@1.1.0",
          "Name": "micromark-util-encode",
          "Identifier": {
            "PURL": "pkg:npm/micromark-util-encode@1.1.0",
            "UID": "d3ad89a2fe797ab4",
            "BOMRef": "pkg:npm/micromark-util-encode@1.1.0"
          },
          "Version": "1.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "micromark-util-sanitize-uri@1.2.0",
            "micromark@3.2.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "micromark-util-events-to-acorn@1.2.3",
          "Name": "micromark-util-events-to-acorn",
          "Identifier": {
            "PURL": "pkg:npm/micromark-util-events-to-acorn@1.2.3",
            "UID": "2c4bdd50f94b6bb5",
            "BOMRef": "pkg:npm/micromark-util-events-to-acorn@1.2.3"
          },
          "Version": "1.2.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "micromark-extension-mdx-expression@1.0.8",
            "micromark-extension-mdxjs-esm@1.0.5",
            "micromark-factory-mdx-expression@1.0.9"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "micromark-util-html-tag-name@1.2.0",
          "Name": "micromark-util-html-tag-name",
          "Identifier": {
            "PURL": "pkg:npm/micromark-util-html-tag-name@1.2.0",
            "UID": "c5eb2fc29c6b684c",
            "BOMRef": "pkg:npm/micromark-util-html-tag-name@1.2.0"
          },
          "Version": "1.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "micromark-core-commonmark@1.1.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "micromark-util-normalize-identifier@1.1.0",
          "Name": "micromark-util-normalize-identifier",
          "Identifier": {
            "PURL": "pkg:npm/micromark-util-normalize-identifier@1.1.0",
            "UID": "85d8f2bdf56d19a4",
            "BOMRef": "pkg:npm/micromark-util-normalize-identifier@1.1.0"
          },
          "Version": "1.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "mdast-util-from-markdown@1.3.1",
            "micromark-core-commonmark@1.1.0",
            "micromark@3.2.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "micromark-util-resolve-all@1.1.0",
          "Name": "micromark-util-resolve-all",
          "Identifier": {
            "PURL": "pkg:npm/micromark-util-resolve-all@1.1.0",
            "UID": "5b9934f0a3390951",
            "BOMRef": "pkg:npm/micromark-util-resolve-all@1.1.0"
          },
          "Version": "1.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "micromark-core-commonmark@1.1.0",
            "micromark@3.2.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "micromark-util-sanitize-uri@1.2.0",
          "Name": "micromark-util-sanitize-uri",
          "Identifier": {
            "PURL": "pkg:npm/micromark-util-sanitize-uri@1.2.0",
            "UID": "ca673e4984c87ffb",
            "BOMRef": "pkg:npm/micromark-util-sanitize-uri@1.2.0"
          },
          "Version": "1.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "mdast-util-to-hast@12.3.0",
            "micromark@3.2.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "micromark-util-subtokenize@1.1.0",
          "Name": "micromark-util-subtokenize",
          "Identifier": {
            "PURL": "pkg:npm/micromark-util-subtokenize@1.1.0",
            "UID": "42b879a154aa5aea",
            "BOMRef": "pkg:npm/micromark-util-subtokenize@1.1.0"
          },
          "Version": "1.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "micromark-core-commonmark@1.1.0",
            "micromark@3.2.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "micromark-util-symbol@1.1.0",
          "Name": "micromark-util-symbol",
          "Identifier": {
            "PURL": "pkg:npm/micromark-util-symbol@1.1.0",
            "UID": "ab44e1a41e4e37c4",
            "BOMRef": "pkg:npm/micromark-util-symbol@1.1.0"
          },
          "Version": "1.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "mdast-util-from-markdown@1.3.1",
            "micromark-core-commonmark@1.1.0",
            "micromark-extension-mdx-expression@1.0.8",
            "micromark-extension-mdx-jsx@1.0.5",
            "micromark-extension-mdxjs-esm@1.0.5",
            "micromark-factory-destination@1.1.0",
            "micromark-factory-label@1.1.0",
            "micromark-factory-mdx-expression@1.0.9",
            "micromark-factory-title@1.1.0",
            "micromark-factory-whitespace@1.1.0",
            "micromark-util-character@1.2.0",
            "micromark-util-chunked@1.1.0",
            "micromark-util-classify-character@1.1.0",
            "micromark-util-decode-numeric-character-reference@1.1.0",
            "micromark-util-decode-string@1.1.0",
            "micromark-util-events-to-acorn@1.2.3",
            "micromark-util-normalize-identifier@1.1.0",
            "micromark-util-sanitize-uri@1.2.0",
            "micromark-util-subtokenize@1.1.0",
            "micromark@3.2.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "micromark-util-types@1.1.0",
          "Name": "micromark-util-types",
          "Identifier": {
            "PURL": "pkg:npm/micromark-util-types@1.1.0",
            "UID": "5c222451ccd11db6",
            "BOMRef": "pkg:npm/micromark-util-types@1.1.0"
          },
          "Version": "1.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "mdast-util-from-markdown@1.3.1",
            "micromark-core-commonmark@1.1.0",
            "micromark-extension-mdx-expression@1.0.8",
            "micromark-extension-mdx-jsx@1.0.5",
            "micromark-extension-mdx-md@1.0.1",
            "micromark-extension-mdxjs-esm@1.0.5",
            "micromark-extension-mdxjs@1.0.1",
            "micromark-factory-destination@1.1.0",
            "micromark-factory-label@1.1.0",
            "micromark-factory-mdx-expression@1.0.9",
            "micromark-factory-space@1.1.0",
            "micromark-factory-title@1.1.0",
            "micromark-factory-whitespace@1.1.0",
            "micromark-util-character@1.2.0",
            "micromark-util-classify-character@1.1.0",
            "micromark-util-combine-extensions@1.1.0",
            "micromark-util-events-to-acorn@1.2.3",
            "micromark-util-resolve-all@1.1.0",
            "micromark-util-subtokenize@1.1.0",
            "micromark@3.2.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "micromatch@4.0.8",
          "Name": "micromatch",
          "Identifier": {
            "PURL": "pkg:npm/micromatch@4.0.8",
            "UID": "38dfd701d2003b74",
            "BOMRef": "pkg:npm/micromatch@4.0.8"
          },
          "Version": "4.0.8",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@parcel/watcher@2.5.1",
            "jest-message-util@30.0.2"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "mime-db@1.52.0",
          "Name": "mime-db",
          "Identifier": {
            "PURL": "pkg:npm/mime-db@1.52.0",
            "UID": "bb52147bcb3667fe",
            "BOMRef": "pkg:npm/mime-db@1.52.0"
          },
          "Version": "1.52.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "mime-types@2.1.35"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "mime-match@1.0.2",
          "Name": "mime-match",
          "Identifier": {
            "PURL": "pkg:npm/mime-match@1.0.2",
            "UID": "ada06b1924e1d867",
            "BOMRef": "pkg:npm/mime-match@1.0.2"
          },
          "Version": "1.0.2",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "@uppy/core@4.4.7"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "mime-types@2.1.35",
          "Name": "mime-types",
          "Identifier": {
            "PURL": "pkg:npm/mime-types@2.1.35",
            "UID": "548ae6ad6f21b426",
            "BOMRef": "pkg:npm/mime-types@2.1.35"
          },
          "Version": "2.1.35",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "form-data@4.0.4"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "min-indent@1.0.1",
          "Name": "min-indent",
          "Identifier": {
            "PURL": "pkg:npm/min-indent@1.0.1",
            "UID": "aa993e2b017998dd",
            "BOMRef": "pkg:npm/min-indent@1.0.1"
          },
          "Version": "1.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "strip-indent@3.0.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "minimatch@3.1.2",
          "Name": "minimatch",
          "Identifier": {
            "PURL": "pkg:npm/minimatch@3.1.2",
            "UID": "7fde2789f7379188",
            "BOMRef": "pkg:npm/minimatch@3.1.2"
          },
          "Version": "3.1.2",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "@eslint/eslintrc@2.1.4",
            "@humanwhocodes/config-array@0.13.0",
            "eslint-plugin-react@7.37.5",
            "eslint@8.57.1",
            "glob@7.2.3"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "minipass@7.1.2",
          "Name": "minipass",
          "Identifier": {
            "PURL": "pkg:npm/minipass@7.1.2",
            "UID": "375f79a9dab331e0",
            "BOMRef": "pkg:npm/minipass@7.1.2"
          },
          "Version": "7.1.2",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "@isaacs/fs-minipass@4.0.1",
            "minizlib@3.0.2",
            "tar@7.4.3"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "minizlib@3.0.2",
          "Name": "minizlib",
          "Identifier": {
            "PURL": "pkg:npm/minizlib@3.0.2",
            "UID": "fcff29b174e3cccb",
            "BOMRef": "pkg:npm/minizlib@3.0.2"
          },
          "Version": "3.0.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "tar@7.4.3"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "mkdirp@3.0.1",
          "Name": "mkdirp",
          "Identifier": {
            "PURL": "pkg:npm/mkdirp@3.0.1",
            "UID": "4ce5f6d621c775aa",
            "BOMRef": "pkg:npm/mkdirp@3.0.1"
          },
          "Version": "3.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "tar@7.4.3"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "monaco-editor@0.44.0",
          "Name": "monaco-editor",
          "Identifier": {
            "PURL": "pkg:npm/monaco-editor@0.44.0",
            "UID": "33777934bbacfd45",
            "BOMRef": "pkg:npm/monaco-editor@0.44.0"
          },
          "Version": "0.44.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@monaco-editor/react@4.7.0",
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "mri@1.2.0",
          "Name": "mri",
          "Identifier": {
            "PURL": "pkg:npm/mri@1.2.0",
            "UID": "dfa2eebdc7dd72fc",
            "BOMRef": "pkg:npm/mri@1.2.0"
          },
          "Version": "1.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@tailwindcss/cli@4.1.11",
            "sade@1.8.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "ms@2.1.3",
          "Name": "ms",
          "Identifier": {
            "PURL": "pkg:npm/ms@2.1.3",
            "UID": "54e357c3a28b5131",
            "BOMRef": "pkg:npm/ms@2.1.3"
          },
          "Version": "2.1.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "debug@4.4.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "mui-chips-input@7.0.1",
          "Name": "mui-chips-input",
          "Identifier": {
            "PURL": "pkg:npm/mui-chips-input@7.0.1",
            "UID": "68a1eb6eb06427ee",
            "BOMRef": "pkg:npm/mui-chips-input@7.0.1"
          },
          "Version": "7.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "namespace-emitter@2.0.1",
          "Name": "namespace-emitter",
          "Identifier": {
            "PURL": "pkg:npm/namespace-emitter@2.0.1",
            "UID": "10da8585917795ba",
            "BOMRef": "pkg:npm/namespace-emitter@2.0.1"
          },
          "Version": "2.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@uppy/companion-client@4.4.2",
            "@uppy/core@4.4.7"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "nanoid@3.3.11",
          "Name": "nanoid",
          "Identifier": {
            "PURL": "pkg:npm/nanoid@3.3.11",
            "UID": "ae39a98071d8884a",
            "BOMRef": "pkg:npm/nanoid@3.3.11"
          },
          "Version": "3.3.11",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "postcss@8.5.6"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "nanoid@5.1.5",
          "Name": "nanoid",
          "Identifier": {
            "PURL": "pkg:npm/nanoid@5.1.5",
            "UID": "19567285e994811f",
            "BOMRef": "pkg:npm/nanoid@5.1.5"
          },
          "Version": "5.1.5",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@uppy/core@4.4.7",
            "@uppy/dashboard@4.3.4",
            "@uppy/provider-views@4.4.5"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "natural-compare@1.4.0",
          "Name": "natural-compare",
          "Identifier": {
            "PURL": "pkg:npm/natural-compare@1.4.0",
            "UID": "4e3ba061538c14ce",
            "BOMRef": "pkg:npm/natural-compare@1.4.0"
          },
          "Version": "1.4.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "eslint@8.57.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "no-case@3.0.4",
          "Name": "no-case",
          "Identifier": {
            "PURL": "pkg:npm/no-case@3.0.4",
            "UID": "b1a84bfd06c6b923",
            "BOMRef": "pkg:npm/no-case@3.0.4"
          },
          "Version": "3.0.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "dot-case@3.0.4"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "node-addon-api@7.1.1",
          "Name": "node-addon-api",
          "Identifier": {
            "PURL": "pkg:npm/node-addon-api@7.1.1",
            "UID": "b3a451811d66c548",
            "BOMRef": "pkg:npm/node-addon-api@7.1.1"
          },
          "Version": "7.1.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@parcel/watcher@2.5.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "node-releases@2.0.19",
          "Name": "node-releases",
          "Identifier": {
            "PURL": "pkg:npm/node-releases@2.0.19",
            "UID": "9136e83a02a0c838",
            "BOMRef": "pkg:npm/node-releases@2.0.19"
          },
          "Version": "2.0.19",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "browserslist@4.25.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "notistack@3.0.2",
          "Name": "notistack",
          "Identifier": {
            "PURL": "pkg:npm/notistack@3.0.2",
            "UID": "5f28c1fd1aba7879",
            "BOMRef": "pkg:npm/notistack@3.0.2"
          },
          "Version": "3.0.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "nwsapi@2.2.20",
          "Name": "nwsapi",
          "Identifier": {
            "PURL": "pkg:npm/nwsapi@2.2.20",
            "UID": "675b3109a957d560",
            "BOMRef": "pkg:npm/nwsapi@2.2.20"
          },
          "Version": "2.2.20",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "jsdom@22.1.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "object-assign@4.1.1",
          "Name": "object-assign",
          "Identifier": {
            "PURL": "pkg:npm/object-assign@4.1.1",
            "UID": "7daf9e3c181e9e3b",
            "BOMRef": "pkg:npm/object-assign@4.1.1"
          },
          "Version": "4.1.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "prop-types@15.8.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "object-inspect@1.13.4",
          "Name": "object-inspect",
          "Identifier": {
            "PURL": "pkg:npm/object-inspect@1.13.4",
            "UID": "ee361af3776b9f20",
            "BOMRef": "pkg:npm/object-inspect@1.13.4"
          },
          "Version": "1.13.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "es-abstract@1.24.0",
            "side-channel-list@1.0.0",
            "side-channel-map@1.0.1",
            "side-channel-weakmap@1.0.2",
            "side-channel@1.1.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "object-is@1.1.6",
          "Name": "object-is",
          "Identifier": {
            "PURL": "pkg:npm/object-is@1.1.6",
            "UID": "34a1843021fbfa08",
            "BOMRef": "pkg:npm/object-is@1.1.6"
          },
          "Version": "1.1.6",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "deep-equal@2.2.3"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "object-keys@1.1.1",
          "Name": "object-keys",
          "Identifier": {
            "PURL": "pkg:npm/object-keys@1.1.1",
            "UID": "6db68a4909958220",
            "BOMRef": "pkg:npm/object-keys@1.1.1"
          },
          "Version": "1.1.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "deep-equal@2.2.3",
            "define-properties@1.2.1",
            "es-abstract@1.24.0",
            "object.assign@4.1.7",
            "own-keys@1.0.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "object.assign@4.1.7",
          "Name": "object.assign",
          "Identifier": {
            "PURL": "pkg:npm/object.assign@4.1.7",
            "UID": "3d41062ace64a70c",
            "BOMRef": "pkg:npm/object.assign@4.1.7"
          },
          "Version": "4.1.7",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "deep-equal@2.2.3",
            "es-abstract@1.24.0",
            "jsx-ast-utils@3.3.5"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "object.entries@1.1.9",
          "Name": "object.entries",
          "Identifier": {
            "PURL": "pkg:npm/object.entries@1.1.9",
            "UID": "595cf5bac099f640",
            "BOMRef": "pkg:npm/object.entries@1.1.9"
          },
          "Version": "1.1.9",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "eslint-plugin-react@7.37.5"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "object.fromentries@2.0.8",
          "Name": "object.fromentries",
          "Identifier": {
            "PURL": "pkg:npm/object.fromentries@2.0.8",
            "UID": "1964eef6a4ebb407",
            "BOMRef": "pkg:npm/object.fromentries@2.0.8"
          },
          "Version": "2.0.8",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "eslint-plugin-react@7.37.5"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "object.values@1.2.1",
          "Name": "object.values",
          "Identifier": {
            "PURL": "pkg:npm/object.values@1.2.1",
            "UID": "a64d6934e421cbdf",
            "BOMRef": "pkg:npm/object.values@1.2.1"
          },
          "Version": "1.2.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "eslint-plugin-react@7.37.5",
            "jsx-ast-utils@3.3.5"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "once@1.4.0",
          "Name": "once",
          "Identifier": {
            "PURL": "pkg:npm/once@1.4.0",
            "UID": "debcd6541899c82f",
            "BOMRef": "pkg:npm/once@1.4.0"
          },
          "Version": "1.4.0",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "glob@7.2.3",
            "inflight@1.0.6"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "openapi-client-axios@7.6.0",
          "Name": "openapi-client-axios",
          "Identifier": {
            "PURL": "pkg:npm/openapi-client-axios@7.6.0",
            "UID": "cea4afdc39a15e80",
            "BOMRef": "pkg:npm/openapi-client-axios@7.6.0"
          },
          "Version": "7.6.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "openapi-types@12.1.3",
          "Name": "openapi-types",
          "Identifier": {
            "PURL": "pkg:npm/openapi-types@12.1.3",
            "UID": "7f882c39b4ebff0a",
            "BOMRef": "pkg:npm/openapi-types@12.1.3"
          },
          "Version": "12.1.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "openapi-client-axios@7.6.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "optionator@0.9.4",
          "Name": "optionator",
          "Identifier": {
            "PURL": "pkg:npm/optionator@0.9.4",
            "UID": "b0183a843f130bd9",
            "BOMRef": "pkg:npm/optionator@0.9.4"
          },
          "Version": "0.9.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "eslint@8.57.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "own-keys@1.0.1",
          "Name": "own-keys",
          "Identifier": {
            "PURL": "pkg:npm/own-keys@1.0.1",
            "UID": "63816c80b6e7a42e",
            "BOMRef": "pkg:npm/own-keys@1.0.1"
          },
          "Version": "1.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "es-abstract@1.24.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "p-limit@3.1.0",
          "Name": "p-limit",
          "Identifier": {
            "PURL": "pkg:npm/p-limit@3.1.0",
            "UID": "bc471c2507dfba5",
            "BOMRef": "pkg:npm/p-limit@3.1.0"
          },
          "Version": "3.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "p-locate@5.0.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "p-locate@5.0.0",
          "Name": "p-locate",
          "Identifier": {
            "PURL": "pkg:npm/p-locate@5.0.0",
            "UID": "3612f31ed5212a3f",
            "BOMRef": "pkg:npm/p-locate@5.0.0"
          },
          "Version": "5.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "locate-path@6.0.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "p-queue@8.1.0",
          "Name": "p-queue",
          "Identifier": {
            "PURL": "pkg:npm/p-queue@8.1.0",
            "UID": "a8d5666797493e94",
            "BOMRef": "pkg:npm/p-queue@8.1.0"
          },
          "Version": "8.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@uppy/provider-views@4.4.5"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "p-retry@6.2.1",
          "Name": "p-retry",
          "Identifier": {
            "PURL": "pkg:npm/p-retry@6.2.1",
            "UID": "84728bcf35c2a7ef",
            "BOMRef": "pkg:npm/p-retry@6.2.1"
          },
          "Version": "6.2.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@uppy/companion-client@4.4.2"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "p-timeout@6.1.4",
          "Name": "p-timeout",
          "Identifier": {
            "PURL": "pkg:npm/p-timeout@6.1.4",
            "UID": "4f3f6eecf60376a0",
            "BOMRef": "pkg:npm/p-timeout@6.1.4"
          },
          "Version": "6.1.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "p-queue@8.1.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "parent-module@1.0.1",
          "Name": "parent-module",
          "Identifier": {
            "PURL": "pkg:npm/parent-module@1.0.1",
            "UID": "e133f6fba415af16",
            "BOMRef": "pkg:npm/parent-module@1.0.1"
          },
          "Version": "1.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "import-fresh@3.3.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "parse-entities@4.0.2",
          "Name": "parse-entities",
          "Identifier": {
            "PURL": "pkg:npm/parse-entities@4.0.2",
            "UID": "6d33aaf16334f7e4",
            "BOMRef": "pkg:npm/parse-entities@4.0.2"
          },
          "Version": "4.0.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "mdast-util-mdx-jsx@2.1.4"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "parse-json@5.2.0",
          "Name": "parse-json",
          "Identifier": {
            "PURL": "pkg:npm/parse-json@5.2.0",
            "UID": "7c975c6a07586ba4",
            "BOMRef": "pkg:npm/parse-json@5.2.0"
          },
          "Version": "5.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "cosmiconfig@7.1.0",
            "cosmiconfig@8.3.6"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "parse5@7.3.0",
          "Name": "parse5",
          "Identifier": {
            "PURL": "pkg:npm/parse5@7.3.0",
            "UID": "1530350c885c5d12",
            "BOMRef": "pkg:npm/parse5@7.3.0"
          },
          "Version": "7.3.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "jsdom@22.1.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "path-exists@4.0.0",
          "Name": "path-exists",
          "Identifier": {
            "PURL": "pkg:npm/path-exists@4.0.0",
            "UID": "7d1fd6c24246aa76",
            "BOMRef": "pkg:npm/path-exists@4.0.0"
          },
          "Version": "4.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "find-up@5.0.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "path-is-absolute@1.0.1",
          "Name": "path-is-absolute",
          "Identifier": {
            "PURL": "pkg:npm/path-is-absolute@1.0.1",
            "UID": "7a978fa84b712622",
            "BOMRef": "pkg:npm/path-is-absolute@1.0.1"
          },
          "Version": "1.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "glob@7.2.3"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "path-key@3.1.1",
          "Name": "path-key",
          "Identifier": {
            "PURL": "pkg:npm/path-key@3.1.1",
            "UID": "a3ba304d9c64ef8a",
            "BOMRef": "pkg:npm/path-key@3.1.1"
          },
          "Version": "3.1.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "cross-spawn@7.0.6"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "path-parse@1.0.7",
          "Name": "path-parse",
          "Identifier": {
            "PURL": "pkg:npm/path-parse@1.0.7",
            "UID": "d4976ba85f544a5e",
            "BOMRef": "pkg:npm/path-parse@1.0.7"
          },
          "Version": "1.0.7",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "resolve@1.22.10",
            "resolve@2.0.0-next.5"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "path-type@4.0.0",
          "Name": "path-type",
          "Identifier": {
            "PURL": "pkg:npm/path-type@4.0.0",
            "UID": "a9f8a9ff90d78b03",
            "BOMRef": "pkg:npm/path-type@4.0.0"
          },
          "Version": "4.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "cosmiconfig@7.1.0",
            "cosmiconfig@8.3.6"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "pathe@2.0.3",
          "Name": "pathe",
          "Identifier": {
            "PURL": "pkg:npm/pathe@2.0.3",
            "UID": "4472560d7ba59f7f",
            "BOMRef": "pkg:npm/pathe@2.0.3"
          },
          "Version": "2.0.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@vitest/runner@3.2.4",
            "@vitest/snapshot@3.2.4",
            "vite-node@3.2.4",
            "vitest@3.2.4"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "pathval@2.0.1",
          "Name": "pathval",
          "Identifier": {
            "PURL": "pkg:npm/pathval@2.0.1",
            "UID": "797d07e75b6ecd97",
            "BOMRef": "pkg:npm/pathval@2.0.1"
          },
          "Version": "2.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "chai@5.2.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "periscopic@3.1.0",
          "Name": "periscopic",
          "Identifier": {
            "PURL": "pkg:npm/periscopic@3.1.0",
            "UID": "efdafa1bd88bcb27",
            "BOMRef": "pkg:npm/periscopic@3.1.0"
          },
          "Version": "3.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mdx-js/mdx@2.3.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "picocolors@1.1.1",
          "Name": "picocolors",
          "Identifier": {
            "PURL": "pkg:npm/picocolors@1.1.1",
            "UID": "a5362dcd5bdb9d41",
            "BOMRef": "pkg:npm/picocolors@1.1.1"
          },
          "Version": "1.1.1",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "@babel/code-frame@7.27.1",
            "@tailwindcss/cli@4.1.11",
            "postcss@8.5.6",
            "update-browserslist-db@1.1.3"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "picomatch@2.3.1",
          "Name": "picomatch",
          "Identifier": {
            "PURL": "pkg:npm/picomatch@2.3.1",
            "UID": "99e905a9b61e7d86",
            "BOMRef": "0c0b0539-db5b-4022-9b3a-64dff7b57abc"
          },
          "Version": "2.3.1",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "picomatch@2.3.1",
          "Name": "picomatch",
          "Identifier": {
            "PURL": "pkg:npm/picomatch@2.3.1",
            "UID": "4903fab2d52e1b99",
            "BOMRef": "f75230a5-f5b4-41c9-b133-e3292154fca4"
          },
          "Version": "2.3.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@rollup/pluginutils@4.2.1",
            "micromatch@4.0.8"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "picomatch@4.0.2",
          "Name": "picomatch",
          "Identifier": {
            "PURL": "pkg:npm/picomatch@4.0.2",
            "UID": "8feaeb3e801e5539",
            "BOMRef": "pkg:npm/picomatch@4.0.2"
          },
          "Version": "4.0.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@rollup/pluginutils@5.2.0",
            "fdir@6.4.6",
            "jest-util@30.0.2",
            "tinyglobby@0.2.14",
            "vite@6.4.1",
            "vitest@3.2.4"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "possible-typed-array-names@1.1.0",
          "Name": "possible-typed-array-names",
          "Identifier": {
            "PURL": "pkg:npm/possible-typed-array-names@1.1.0",
            "UID": "76be9aef52e3a935",
            "BOMRef": "pkg:npm/possible-typed-array-names@1.1.0"
          },
          "Version": "1.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "available-typed-arrays@1.0.7",
            "typed-array-length@1.0.7"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "postcss@8.5.6",
          "Name": "postcss",
          "Identifier": {
            "PURL": "pkg:npm/postcss@8.5.6",
            "UID": "d7d76f6c1fd9ce56",
            "BOMRef": "pkg:npm/postcss@8.5.6"
          },
          "Version": "8.5.6",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "vite@6.4.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "preact@10.26.9",
          "Name": "preact",
          "Identifier": {
            "PURL": "pkg:npm/preact@10.26.9",
            "UID": "41d467b119f9db88",
            "BOMRef": "pkg:npm/preact@10.26.9"
          },
          "Version": "10.26.9",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@uppy/components@0.2.0",
            "@uppy/core@4.4.7",
            "@uppy/dashboard@4.3.4",
            "@uppy/drag-drop@4.1.3",
            "@uppy/informer@4.2.1",
            "@uppy/progress-bar@4.2.1",
            "@uppy/provider-views@4.4.5",
            "@uppy/react@4.4.0",
            "@uppy/status-bar@4.1.3",
            "@uppy/utils@6.1.5",
            "float-tooltip@1.7.5"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "prelude-ls@1.2.1",
          "Name": "prelude-ls",
          "Identifier": {
            "PURL": "pkg:npm/prelude-ls@1.2.1",
            "UID": "3d718a3a26909e1c",
            "BOMRef": "pkg:npm/prelude-ls@1.2.1"
          },
          "Version": "1.2.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "levn@0.4.1",
            "optionator@0.9.4",
            "type-check@0.4.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "prettier@2.8.7",
          "Name": "prettier",
          "Identifier": {
            "PURL": "pkg:npm/prettier@2.8.7",
            "UID": "c34455035d3fb1a0",
            "BOMRef": "pkg:npm/prettier@2.8.7"
          },
          "Version": "2.8.7",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "pretty-bytes@6.1.1",
          "Name": "pretty-bytes",
          "Identifier": {
            "PURL": "pkg:npm/pretty-bytes@6.1.1",
            "UID": "c3dc150f984a5bee",
            "BOMRef": "pkg:npm/pretty-bytes@6.1.1"
          },
          "Version": "6.1.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@uppy/components@0.2.0",
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "pretty-format@27.5.1",
          "Name": "pretty-format",
          "Identifier": {
            "PURL": "pkg:npm/pretty-format@27.5.1",
            "UID": "5170ad99f22cd8e2",
            "BOMRef": "pkg:npm/pretty-format@27.5.1"
          },
          "Version": "27.5.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@testing-library/dom@10.4.0",
            "@testing-library/dom@8.20.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "pretty-format@30.0.2",
          "Name": "pretty-format",
          "Identifier": {
            "PURL": "pkg:npm/pretty-format@30.0.2",
            "UID": "f0b9480c3695e086",
            "BOMRef": "60bad8a4-7de2-45bf-8b78-6652e7c776e5"
          },
          "Version": "30.0.2",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "pretty-format@30.0.2",
          "Name": "pretty-format",
          "Identifier": {
            "PURL": "pkg:npm/pretty-format@30.0.2",
            "UID": "35ec37d9bc07bbe9",
            "BOMRef": "a6752893-1ca7-4e6e-a11f-b165d3e144bd"
          },
          "Version": "30.0.2",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "pretty-format@30.0.2",
          "Name": "pretty-format",
          "Identifier": {
            "PURL": "pkg:npm/pretty-format@30.0.2",
            "UID": "5cd45d0f37cd1542",
            "BOMRef": "acfbd30b-ede6-49bc-9f2d-07994096fa36"
          },
          "Version": "30.0.2",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "pretty-format@30.0.2",
          "Name": "pretty-format",
          "Identifier": {
            "PURL": "pkg:npm/pretty-format@30.0.2",
            "UID": "e6a32a77d408109f",
            "BOMRef": "8aabe890-5353-496b-8a79-f3abe92f820d"
          },
          "Version": "30.0.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@types/jest@30.0.0",
            "jest-diff@30.0.4",
            "jest-matcher-utils@30.0.4",
            "jest-message-util@30.0.2"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "prism-react-renderer@2.4.1",
          "Name": "prism-react-renderer",
          "Identifier": {
            "PURL": "pkg:npm/prism-react-renderer@2.4.1",
            "UID": "f3988b6a637028e0",
            "BOMRef": "pkg:npm/prism-react-renderer@2.4.1"
          },
          "Version": "2.4.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "prismjs@1.30.0",
          "Name": "prismjs",
          "Identifier": {
            "PURL": "pkg:npm/prismjs@1.30.0",
            "UID": "7fe697b78e618160",
            "BOMRef": "pkg:npm/prismjs@1.30.0"
          },
          "Version": "1.30.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "prop-types@15.8.1",
          "Name": "prop-types",
          "Identifier": {
            "PURL": "pkg:npm/prop-types@15.8.1",
            "UID": "48db0760c39b8c2",
            "BOMRef": "pkg:npm/prop-types@15.8.1"
          },
          "Version": "15.8.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mui/material@5.17.1",
            "@mui/material@7.2.0",
            "@mui/private-theming@5.17.1",
            "@mui/private-theming@7.2.0",
            "@mui/styled-engine@5.16.14",
            "@mui/styled-engine@7.2.0",
            "@mui/system@5.17.1",
            "@mui/system@7.2.0",
            "@mui/utils@5.17.1",
            "@mui/utils@7.2.0",
            "@mui/x-data-grid@7.29.8",
            "create-collection-form@0.0.0",
            "eslint-plugin-react@7.37.5",
            "qdrant-web-ui@0.2.5",
            "react-archer@4.4.0",
            "react-diff-viewer-continued@3.4.0",
            "react-transition-group@4.4.5"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "property-information@6.5.0",
          "Name": "property-information",
          "Identifier": {
            "PURL": "pkg:npm/property-information@6.5.0",
            "UID": "108c4796b04a464c",
            "BOMRef": "pkg:npm/property-information@6.5.0"
          },
          "Version": "6.5.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "hast-util-to-estree@2.3.3"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "proxy-from-env@1.1.0",
          "Name": "proxy-from-env",
          "Identifier": {
            "PURL": "pkg:npm/proxy-from-env@1.1.0",
            "UID": "2dbb0f81ac759be8",
            "BOMRef": "pkg:npm/proxy-from-env@1.1.0"
          },
          "Version": "1.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "axios@1.12.2"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "psl@1.15.0",
          "Name": "psl",
          "Identifier": {
            "PURL": "pkg:npm/psl@1.15.0",
            "UID": "96e50a5efc716818",
            "BOMRef": "pkg:npm/psl@1.15.0"
          },
          "Version": "1.15.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "tough-cookie@4.1.4"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "punycode@2.3.1",
          "Name": "punycode",
          "Identifier": {
            "PURL": "pkg:npm/punycode@2.3.1",
            "UID": "ef06d44cdbee1434",
            "BOMRef": "pkg:npm/punycode@2.3.1"
          },
          "Version": "2.3.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "psl@1.15.0",
            "tough-cookie@4.1.4",
            "tr46@4.1.1",
            "uri-js@4.4.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "qdrant-web-ui@0.2.5",
          "Name": "qdrant-web-ui",
          "Identifier": {
            "PURL": "pkg:npm/qdrant-web-ui@0.2.5",
            "UID": "9aa151c992f2cf55",
            "BOMRef": "pkg:npm/qdrant-web-ui@0.2.5"
          },
          "Version": "0.2.5",
          "Licenses": [
            "Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "querystringify@2.2.0",
          "Name": "querystringify",
          "Identifier": {
            "PURL": "pkg:npm/querystringify@2.2.0",
            "UID": "9c2234c15117972c",
            "BOMRef": "pkg:npm/querystringify@2.2.0"
          },
          "Version": "2.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "url-parse@1.5.10"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "queue-microtask@1.2.3",
          "Name": "queue-microtask",
          "Identifier": {
            "PURL": "pkg:npm/queue-microtask@1.2.3",
            "UID": "3d22a91e4a4c24b4",
            "BOMRef": "pkg:npm/queue-microtask@1.2.3"
          },
          "Version": "1.2.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "run-parallel@1.2.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "react@18.3.1",
          "Name": "react",
          "Identifier": {
            "PURL": "pkg:npm/react@18.3.1",
            "UID": "6b2f1f416de77a17",
            "BOMRef": "pkg:npm/react@18.3.1"
          },
          "Version": "18.3.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@emotion/react@11.14.0",
            "@emotion/styled@11.14.1",
            "@emotion/use-insertion-effect-with-fallbacks@1.2.0",
            "@mdx-js/react@2.3.0",
            "@monaco-editor/react@4.7.0",
            "@mui/icons-material@7.2.0",
            "@mui/material@5.17.1",
            "@mui/material@7.2.0",
            "@mui/private-theming@5.17.1",
            "@mui/private-theming@7.2.0",
            "@mui/styled-engine@5.16.14",
            "@mui/styled-engine@7.2.0",
            "@mui/system@5.17.1",
            "@mui/system@7.2.0",
            "@mui/utils@5.17.1",
            "@mui/utils@7.2.0",
            "@mui/x-data-grid@7.29.8",
            "@mui/x-internals@7.29.0",
            "@testing-library/react@13.4.0",
            "@textea/json-viewer@2.17.2",
            "@uppy/react@4.4.0",
            "lucide-react@0.545.0",
            "mui-chips-input@7.0.1",
            "notistack@3.0.2",
            "prism-react-renderer@2.4.1",
            "qdrant-web-ui@0.2.5",
            "react-archer@4.4.0",
            "react-diff-viewer-continued@3.4.0",
            "react-dom@18.3.1",
            "react-resizable-panels@0.0.51",
            "react-router-dom@6.30.1",
            "react-router@6.30.1",
            "react-simple-code-editor@0.13.1",
            "react-transition-group@4.4.5",
            "use-sync-external-store@1.5.0",
            "zustand@4.5.7"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "react-archer@4.4.0",
          "Name": "react-archer",
          "Identifier": {
            "PURL": "pkg:npm/react-archer@4.4.0",
            "UID": "482e319de893bef8",
            "BOMRef": "pkg:npm/react-archer@4.4.0"
          },
          "Version": "4.4.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "react-diff-viewer-continued@3.4.0",
          "Name": "react-diff-viewer-continued",
          "Identifier": {
            "PURL": "pkg:npm/react-diff-viewer-continued@3.4.0",
            "UID": "b35de19f875c9c3f",
            "BOMRef": "pkg:npm/react-diff-viewer-continued@3.4.0"
          },
          "Version": "3.4.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "react-dom@18.3.1",
          "Name": "react-dom",
          "Identifier": {
            "PURL": "pkg:npm/react-dom@18.3.1",
            "UID": "17f43269aea2faf9",
            "BOMRef": "pkg:npm/react-dom@18.3.1"
          },
          "Version": "18.3.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@monaco-editor/react@4.7.0",
            "@mui/material@5.17.1",
            "@mui/material@7.2.0",
            "@mui/x-data-grid@7.29.8",
            "@testing-library/react@13.4.0",
            "@textea/json-viewer@2.17.2",
            "@uppy/react@4.4.0",
            "mui-chips-input@7.0.1",
            "notistack@3.0.2",
            "qdrant-web-ui@0.2.5",
            "react-diff-viewer-continued@3.4.0",
            "react-resizable-panels@0.0.51",
            "react-router-dom@6.30.1",
            "react-simple-code-editor@0.13.1",
            "react-transition-group@4.4.5"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "react-fast-compare@2.0.4",
          "Name": "react-fast-compare",
          "Identifier": {
            "PURL": "pkg:npm/react-fast-compare@2.0.4",
            "UID": "50022e51673b3d49",
            "BOMRef": "pkg:npm/react-fast-compare@2.0.4"
          },
          "Version": "2.0.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "react-archer@4.4.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "react-is@16.13.1",
          "Name": "react-is",
          "Identifier": {
            "PURL": "pkg:npm/react-is@16.13.1",
            "UID": "e776ee6cce3d1f63",
            "BOMRef": "8580a813-d2d8-45a7-a709-390381823ede"
          },
          "Version": "16.13.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "hoist-non-react-statics@3.3.2",
            "prop-types@15.8.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "react-is@16.13.1",
          "Name": "react-is",
          "Identifier": {
            "PURL": "pkg:npm/react-is@16.13.1",
            "UID": "fb89be26517d17c",
            "BOMRef": "88edb347-17e7-4112-90bf-c58ffcf8c6c8"
          },
          "Version": "16.13.1",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "react-is@17.0.2",
          "Name": "react-is",
          "Identifier": {
            "PURL": "pkg:npm/react-is@17.0.2",
            "UID": "5ba28ab3e6c38e97",
            "BOMRef": "pkg:npm/react-is@17.0.2"
          },
          "Version": "17.0.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "pretty-format@27.5.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "react-is@18.3.1",
          "Name": "react-is",
          "Identifier": {
            "PURL": "pkg:npm/react-is@18.3.1",
            "UID": "15ddbcd2f83495b3",
            "BOMRef": "217eb4f4-faef-43c5-902f-8bae2ea51647"
          },
          "Version": "18.3.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "pretty-format@30.0.2",
            "pretty-format@30.0.2",
            "pretty-format@30.0.2",
            "pretty-format@30.0.2"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "react-is@18.3.1",
          "Name": "react-is",
          "Identifier": {
            "PURL": "pkg:npm/react-is@18.3.1",
            "UID": "3efc62ea97d874fa",
            "BOMRef": "15c8b96f-6e5b-457d-9e02-447081799d97"
          },
          "Version": "18.3.1",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "react-is@18.3.1",
          "Name": "react-is",
          "Identifier": {
            "PURL": "pkg:npm/react-is@18.3.1",
            "UID": "fa4f86f7b101b768",
            "BOMRef": "6e3e3138-bfc7-47d4-9e39-82cadc367baf"
          },
          "Version": "18.3.1",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "react-is@18.3.1",
          "Name": "react-is",
          "Identifier": {
            "PURL": "pkg:npm/react-is@18.3.1",
            "UID": "2934241c8c383bea",
            "BOMRef": "0c93506e-90e6-4612-b636-566c4dee25be"
          },
          "Version": "18.3.1",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "react-is@19.1.0",
          "Name": "react-is",
          "Identifier": {
            "PURL": "pkg:npm/react-is@19.1.0",
            "UID": "f84121fc42a87ad",
            "BOMRef": "pkg:npm/react-is@19.1.0"
          },
          "Version": "19.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mui/material@5.17.1",
            "@mui/material@7.2.0",
            "@mui/utils@5.17.1",
            "@mui/utils@7.2.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "react-refresh@0.17.0",
          "Name": "react-refresh",
          "Identifier": {
            "PURL": "pkg:npm/react-refresh@0.17.0",
            "UID": "6629121746106ccd",
            "BOMRef": "pkg:npm/react-refresh@0.17.0"
          },
          "Version": "0.17.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@vitejs/plugin-react@4.6.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "react-resizable-panels@0.0.51",
          "Name": "react-resizable-panels",
          "Identifier": {
            "PURL": "pkg:npm/react-resizable-panels@0.0.51",
            "UID": "d54db39eac944bc7",
            "BOMRef": "pkg:npm/react-resizable-panels@0.0.51"
          },
          "Version": "0.0.51",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "react-router@6.30.1",
          "Name": "react-router",
          "Identifier": {
            "PURL": "pkg:npm/react-router@6.30.1",
            "UID": "a174e4cd084f038e",
            "BOMRef": "pkg:npm/react-router@6.30.1"
          },
          "Version": "6.30.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "react-router-dom@6.30.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "react-router-dom@6.30.1",
          "Name": "react-router-dom",
          "Identifier": {
            "PURL": "pkg:npm/react-router-dom@6.30.1",
            "UID": "82c97f40410db647",
            "BOMRef": "pkg:npm/react-router-dom@6.30.1"
          },
          "Version": "6.30.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "react-simple-code-editor@0.13.1",
          "Name": "react-simple-code-editor",
          "Identifier": {
            "PURL": "pkg:npm/react-simple-code-editor@0.13.1",
            "UID": "1e24a8ff2b8f6dfa",
            "BOMRef": "pkg:npm/react-simple-code-editor@0.13.1"
          },
          "Version": "0.13.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "react-transition-group@4.4.5",
          "Name": "react-transition-group",
          "Identifier": {
            "PURL": "pkg:npm/react-transition-group@4.4.5",
            "UID": "929743570666f95c",
            "BOMRef": "pkg:npm/react-transition-group@4.4.5"
          },
          "Version": "4.4.5",
          "Licenses": [
            "BSD-3-Clause"
          ],
          "DependsOn": [
            "@mui/material@5.17.1",
            "@mui/material@7.2.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "redent@3.0.0",
          "Name": "redent",
          "Identifier": {
            "PURL": "pkg:npm/redent@3.0.0",
            "UID": "c0183f0e6100df89",
            "BOMRef": "pkg:npm/redent@3.0.0"
          },
          "Version": "3.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@testing-library/jest-dom@5.17.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "reflect.getprototypeof@1.0.10",
          "Name": "reflect.getprototypeof",
          "Identifier": {
            "PURL": "pkg:npm/reflect.getprototypeof@1.0.10",
            "UID": "9484ca9f8b88b072",
            "BOMRef": "pkg:npm/reflect.getprototypeof@1.0.10"
          },
          "Version": "1.0.10",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "typed-array-byte-offset@1.0.4",
            "typed-array-length@1.0.7"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "regexp.prototype.flags@1.5.4",
          "Name": "regexp.prototype.flags",
          "Identifier": {
            "PURL": "pkg:npm/regexp.prototype.flags@1.5.4",
            "UID": "cd6040fdf4346072",
            "BOMRef": "pkg:npm/regexp.prototype.flags@1.5.4"
          },
          "Version": "1.5.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "deep-equal@2.2.3",
            "es-abstract@1.24.0",
            "string.prototype.matchall@4.0.12"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "remark-mdx@2.3.0",
          "Name": "remark-mdx",
          "Identifier": {
            "PURL": "pkg:npm/remark-mdx@2.3.0",
            "UID": "29c195b46179734",
            "BOMRef": "pkg:npm/remark-mdx@2.3.0"
          },
          "Version": "2.3.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mdx-js/mdx@2.3.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "remark-parse@10.0.2",
          "Name": "remark-parse",
          "Identifier": {
            "PURL": "pkg:npm/remark-parse@10.0.2",
            "UID": "71711a3ca3851bfb",
            "BOMRef": "pkg:npm/remark-parse@10.0.2"
          },
          "Version": "10.0.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mdx-js/mdx@2.3.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "remark-rehype@10.1.0",
          "Name": "remark-rehype",
          "Identifier": {
            "PURL": "pkg:npm/remark-rehype@10.1.0",
            "UID": "d38c5240330729d1",
            "BOMRef": "pkg:npm/remark-rehype@10.1.0"
          },
          "Version": "10.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mdx-js/mdx@2.3.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "requires-port@1.0.0",
          "Name": "requires-port",
          "Identifier": {
            "PURL": "pkg:npm/requires-port@1.0.0",
            "UID": "f1cd7d2b4eabbfc3",
            "BOMRef": "pkg:npm/requires-port@1.0.0"
          },
          "Version": "1.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "url-parse@1.5.10"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "reselect@5.1.1",
          "Name": "reselect",
          "Identifier": {
            "PURL": "pkg:npm/reselect@5.1.1",
            "UID": "4eccb062cbc80db7",
            "BOMRef": "pkg:npm/reselect@5.1.1"
          },
          "Version": "5.1.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mui/x-data-grid@7.29.8"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "resize-observer-polyfill@1.5.0",
          "Name": "resize-observer-polyfill",
          "Identifier": {
            "PURL": "pkg:npm/resize-observer-polyfill@1.5.0",
            "UID": "1dd08a7f10dc645",
            "BOMRef": "pkg:npm/resize-observer-polyfill@1.5.0"
          },
          "Version": "1.5.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "react-archer@4.4.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "resolve@1.22.10",
          "Name": "resolve",
          "Identifier": {
            "PURL": "pkg:npm/resolve@1.22.10",
            "UID": "21e6467f2ce37558",
            "BOMRef": "pkg:npm/resolve@1.22.10"
          },
          "Version": "1.22.10",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "babel-plugin-macros@3.1.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "resolve@2.0.0-next.5",
          "Name": "resolve",
          "Identifier": {
            "PURL": "pkg:npm/resolve@2.0.0-next.5",
            "UID": "6a6981c569a29d94",
            "BOMRef": "pkg:npm/resolve@2.0.0-next.5"
          },
          "Version": "2.0.0-next.5",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "eslint-plugin-react@7.37.5"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "resolve-from@4.0.0",
          "Name": "resolve-from",
          "Identifier": {
            "PURL": "pkg:npm/resolve-from@4.0.0",
            "UID": "adaf35849b9fd5c3",
            "BOMRef": "pkg:npm/resolve-from@4.0.0"
          },
          "Version": "4.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "import-fresh@3.3.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "retry@0.13.1",
          "Name": "retry",
          "Identifier": {
            "PURL": "pkg:npm/retry@0.13.1",
            "UID": "54bf853862b6de4e",
            "BOMRef": "pkg:npm/retry@0.13.1"
          },
          "Version": "0.13.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "p-retry@6.2.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "reusify@1.1.0",
          "Name": "reusify",
          "Identifier": {
            "PURL": "pkg:npm/reusify@1.1.0",
            "UID": "35dd5db25853e7f3",
            "BOMRef": "pkg:npm/reusify@1.1.0"
          },
          "Version": "1.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "fastq@1.19.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "rimraf@3.0.2",
          "Name": "rimraf",
          "Identifier": {
            "PURL": "pkg:npm/rimraf@3.0.2",
            "UID": "472fb55a2a4ed9c7",
            "BOMRef": "pkg:npm/rimraf@3.0.2"
          },
          "Version": "3.0.2",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "flat-cache@3.2.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "rollup@2.79.2",
          "Name": "rollup",
          "Identifier": {
            "PURL": "pkg:npm/rollup@2.79.2",
            "UID": "5203f4d4caa45e4b",
            "BOMRef": "pkg:npm/rollup@2.79.2"
          },
          "Version": "2.79.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "vite-plugin-eslint@1.8.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "rollup@4.44.2",
          "Name": "rollup",
          "Identifier": {
            "PURL": "pkg:npm/rollup@4.44.2",
            "UID": "e9186aee28e4e2ba",
            "BOMRef": "pkg:npm/rollup@4.44.2"
          },
          "Version": "4.44.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mdx-js/rollup@2.3.0",
            "@rollup/pluginutils@5.2.0",
            "vite@6.4.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "rrweb-cssom@0.6.0",
          "Name": "rrweb-cssom",
          "Identifier": {
            "PURL": "pkg:npm/rrweb-cssom@0.6.0",
            "UID": "f7cb52eee9f10914",
            "BOMRef": "pkg:npm/rrweb-cssom@0.6.0"
          },
          "Version": "0.6.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "cssstyle@3.0.0",
            "jsdom@22.1.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "run-parallel@1.2.0",
          "Name": "run-parallel",
          "Identifier": {
            "PURL": "pkg:npm/run-parallel@1.2.0",
            "UID": "68e82d767e12b98",
            "BOMRef": "pkg:npm/run-parallel@1.2.0"
          },
          "Version": "1.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@nodelib/fs.scandir@2.1.5"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "sade@1.8.1",
          "Name": "sade",
          "Identifier": {
            "PURL": "pkg:npm/sade@1.8.1",
            "UID": "e664747d30d4580a",
            "BOMRef": "pkg:npm/sade@1.8.1"
          },
          "Version": "1.8.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "uvu@0.5.6"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "safe-array-concat@1.1.3",
          "Name": "safe-array-concat",
          "Identifier": {
            "PURL": "pkg:npm/safe-array-concat@1.1.3",
            "UID": "a6f7e4bfb849ec3c",
            "BOMRef": "pkg:npm/safe-array-concat@1.1.3"
          },
          "Version": "1.1.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "es-abstract@1.24.0",
            "es-iterator-helpers@1.2.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "safe-push-apply@1.0.0",
          "Name": "safe-push-apply",
          "Identifier": {
            "PURL": "pkg:npm/safe-push-apply@1.0.0",
            "UID": "75693e72b0e978f7",
            "BOMRef": "pkg:npm/safe-push-apply@1.0.0"
          },
          "Version": "1.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "es-abstract@1.24.0",
            "own-keys@1.0.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "safe-regex-test@1.1.0",
          "Name": "safe-regex-test",
          "Identifier": {
            "PURL": "pkg:npm/safe-regex-test@1.1.0",
            "UID": "caac3c6d3381fa86",
            "BOMRef": "pkg:npm/safe-regex-test@1.1.0"
          },
          "Version": "1.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "es-abstract@1.24.0",
            "is-async-function@2.1.1",
            "is-generator-function@1.1.0",
            "is-symbol@1.1.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "safer-buffer@2.1.2",
          "Name": "safer-buffer",
          "Identifier": {
            "PURL": "pkg:npm/safer-buffer@2.1.2",
            "UID": "f4c6f6b00dc7214a",
            "BOMRef": "pkg:npm/safer-buffer@2.1.2"
          },
          "Version": "2.1.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "iconv-lite@0.6.3"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "saxes@6.0.0",
          "Name": "saxes",
          "Identifier": {
            "PURL": "pkg:npm/saxes@6.0.0",
            "UID": "c8870dcf529cf17",
            "BOMRef": "pkg:npm/saxes@6.0.0"
          },
          "Version": "6.0.0",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "jsdom@22.1.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "scheduler@0.23.2",
          "Name": "scheduler",
          "Identifier": {
            "PURL": "pkg:npm/scheduler@0.23.2",
            "UID": "370f29c86c12fb9e",
            "BOMRef": "pkg:npm/scheduler@0.23.2"
          },
          "Version": "0.23.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "react-dom@18.3.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "semver@6.3.1",
          "Name": "semver",
          "Identifier": {
            "PURL": "pkg:npm/semver@6.3.1",
            "UID": "15dd43bed901986b",
            "BOMRef": "pkg:npm/semver@6.3.1"
          },
          "Version": "6.3.1",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "@babel/core@7.28.0",
            "@babel/helper-compilation-targets@7.27.2",
            "eslint-plugin-react@7.37.5"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "set-function-length@1.2.2",
          "Name": "set-function-length",
          "Identifier": {
            "PURL": "pkg:npm/set-function-length@1.2.2",
            "UID": "e71508cd79aba418",
            "BOMRef": "pkg:npm/set-function-length@1.2.2"
          },
          "Version": "1.2.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "call-bind@1.0.8"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "set-function-name@2.0.2",
          "Name": "set-function-name",
          "Identifier": {
            "PURL": "pkg:npm/set-function-name@2.0.2",
            "UID": "c2fdd4fa7b228b61",
            "BOMRef": "pkg:npm/set-function-name@2.0.2"
          },
          "Version": "2.0.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "iterator.prototype@1.1.5",
            "regexp.prototype.flags@1.5.4",
            "string.prototype.matchall@4.0.12"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "set-proto@1.0.0",
          "Name": "set-proto",
          "Identifier": {
            "PURL": "pkg:npm/set-proto@1.0.0",
            "UID": "7a8ad0e19f0b65de",
            "BOMRef": "pkg:npm/set-proto@1.0.0"
          },
          "Version": "1.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "es-abstract@1.24.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "shallow-equal@3.1.0",
          "Name": "shallow-equal",
          "Identifier": {
            "PURL": "pkg:npm/shallow-equal@3.1.0",
            "UID": "f761de1adb83c8ac",
            "BOMRef": "pkg:npm/shallow-equal@3.1.0"
          },
          "Version": "3.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@uppy/dashboard@4.3.4"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "shebang-command@2.0.0",
          "Name": "shebang-command",
          "Identifier": {
            "PURL": "pkg:npm/shebang-command@2.0.0",
            "UID": "78de0fa08e1f091c",
            "BOMRef": "pkg:npm/shebang-command@2.0.0"
          },
          "Version": "2.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "cross-spawn@7.0.6"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "shebang-regex@3.0.0",
          "Name": "shebang-regex",
          "Identifier": {
            "PURL": "pkg:npm/shebang-regex@3.0.0",
            "UID": "9e08314d80828e",
            "BOMRef": "pkg:npm/shebang-regex@3.0.0"
          },
          "Version": "3.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "shebang-command@2.0.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "side-channel@1.1.0",
          "Name": "side-channel",
          "Identifier": {
            "PURL": "pkg:npm/side-channel@1.1.0",
            "UID": "6469f08e31537d82",
            "BOMRef": "pkg:npm/side-channel@1.1.0"
          },
          "Version": "1.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "deep-equal@2.2.3",
            "internal-slot@1.1.0",
            "string.prototype.matchall@4.0.12"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "side-channel-list@1.0.0",
          "Name": "side-channel-list",
          "Identifier": {
            "PURL": "pkg:npm/side-channel-list@1.0.0",
            "UID": "4ab180326d0b72d2",
            "BOMRef": "pkg:npm/side-channel-list@1.0.0"
          },
          "Version": "1.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "side-channel@1.1.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "side-channel-map@1.0.1",
          "Name": "side-channel-map",
          "Identifier": {
            "PURL": "pkg:npm/side-channel-map@1.0.1",
            "UID": "a76024673b3d06fd",
            "BOMRef": "pkg:npm/side-channel-map@1.0.1"
          },
          "Version": "1.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "side-channel-weakmap@1.0.2",
            "side-channel@1.1.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "side-channel-weakmap@1.0.2",
          "Name": "side-channel-weakmap",
          "Identifier": {
            "PURL": "pkg:npm/side-channel-weakmap@1.0.2",
            "UID": "b08ff3cdb886b65f",
            "BOMRef": "pkg:npm/side-channel-weakmap@1.0.2"
          },
          "Version": "1.0.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "side-channel@1.1.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "siginfo@2.0.0",
          "Name": "siginfo",
          "Identifier": {
            "PURL": "pkg:npm/siginfo@2.0.0",
            "UID": "7fec1582906b3bc1",
            "BOMRef": "pkg:npm/siginfo@2.0.0"
          },
          "Version": "2.0.0",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "why-is-node-running@2.3.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "slash@3.0.0",
          "Name": "slash",
          "Identifier": {
            "PURL": "pkg:npm/slash@3.0.0",
            "UID": "4ce49c518ec859e3",
            "BOMRef": "pkg:npm/slash@3.0.0"
          },
          "Version": "3.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "jest-message-util@30.0.2"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "snake-case@3.0.4",
          "Name": "snake-case",
          "Identifier": {
            "PURL": "pkg:npm/snake-case@3.0.4",
            "UID": "5050b523b0fb1031",
            "BOMRef": "pkg:npm/snake-case@3.0.4"
          },
          "Version": "3.0.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@svgr/core@8.1.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "source-map@0.5.7",
          "Name": "source-map",
          "Identifier": {
            "PURL": "pkg:npm/source-map@0.5.7",
            "UID": "db46f2b84c872d74",
            "BOMRef": "pkg:npm/source-map@0.5.7"
          },
          "Version": "0.5.7",
          "Licenses": [
            "BSD-3-Clause"
          ],
          "DependsOn": [
            "@emotion/babel-plugin@11.13.5"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "source-map@0.7.4",
          "Name": "source-map",
          "Identifier": {
            "PURL": "pkg:npm/source-map@0.7.4",
            "UID": "a9538a03cf0ed2e3",
            "BOMRef": "4dbfd046-b0f7-429c-89e8-355c5b387eea"
          },
          "Version": "0.7.4",
          "Licenses": [
            "BSD-3-Clause"
          ],
          "DependsOn": [
            "@mdx-js/rollup@2.3.0",
            "estree-util-to-js@1.2.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "source-map@0.7.4",
          "Name": "source-map",
          "Identifier": {
            "PURL": "pkg:npm/source-map@0.7.4",
            "UID": "840afeaa06f2ae0a",
            "BOMRef": "2e3cecd9-665b-4a33-9193-b97bc2f766d5"
          },
          "Version": "0.7.4",
          "Licenses": [
            "BSD-3-Clause"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "source-map-js@1.2.1",
          "Name": "source-map-js",
          "Identifier": {
            "PURL": "pkg:npm/source-map-js@1.2.1",
            "UID": "83d2a0eddec01ff3",
            "BOMRef": "pkg:npm/source-map-js@1.2.1"
          },
          "Version": "1.2.1",
          "Licenses": [
            "BSD-3-Clause"
          ],
          "DependsOn": [
            "@tailwindcss/node@4.1.11",
            "postcss@8.5.6"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "space-separated-tokens@2.0.2",
          "Name": "space-separated-tokens",
          "Identifier": {
            "PURL": "pkg:npm/space-separated-tokens@2.0.2",
            "UID": "7c82ac3fd9da64d5",
            "BOMRef": "pkg:npm/space-separated-tokens@2.0.2"
          },
          "Version": "2.0.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "hast-util-to-estree@2.3.3"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "stack-utils@2.0.6",
          "Name": "stack-utils",
          "Identifier": {
            "PURL": "pkg:npm/stack-utils@2.0.6",
            "UID": "8549aef96e94d5e0",
            "BOMRef": "pkg:npm/stack-utils@2.0.6"
          },
          "Version": "2.0.6",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "jest-message-util@30.0.2"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "stackback@0.0.2",
          "Name": "stackback",
          "Identifier": {
            "PURL": "pkg:npm/stackback@0.0.2",
            "UID": "9917929f26ba4046",
            "BOMRef": "pkg:npm/stackback@0.0.2"
          },
          "Version": "0.0.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "why-is-node-running@2.3.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "state-local@1.0.7",
          "Name": "state-local",
          "Identifier": {
            "PURL": "pkg:npm/state-local@1.0.7",
            "UID": "50ca7848f6d83401",
            "BOMRef": "pkg:npm/state-local@1.0.7"
          },
          "Version": "1.0.7",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@monaco-editor/loader@1.5.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "std-env@3.9.0",
          "Name": "std-env",
          "Identifier": {
            "PURL": "pkg:npm/std-env@3.9.0",
            "UID": "6eddf25369b54b29",
            "BOMRef": "pkg:npm/std-env@3.9.0"
          },
          "Version": "3.9.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "vitest@3.2.4"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "stop-iteration-iterator@1.1.0",
          "Name": "stop-iteration-iterator",
          "Identifier": {
            "PURL": "pkg:npm/stop-iteration-iterator@1.1.0",
            "UID": "d800a3243f2fa89c",
            "BOMRef": "pkg:npm/stop-iteration-iterator@1.1.0"
          },
          "Version": "1.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "es-abstract@1.24.0",
            "es-get-iterator@1.1.3"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "string.prototype.matchall@4.0.12",
          "Name": "string.prototype.matchall",
          "Identifier": {
            "PURL": "pkg:npm/string.prototype.matchall@4.0.12",
            "UID": "3ced563f5f6c5226",
            "BOMRef": "pkg:npm/string.prototype.matchall@4.0.12"
          },
          "Version": "4.0.12",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "eslint-plugin-react@7.37.5"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "string.prototype.repeat@1.0.0",
          "Name": "string.prototype.repeat",
          "Identifier": {
            "PURL": "pkg:npm/string.prototype.repeat@1.0.0",
            "UID": "40cbb775c3cc1d0a",
            "BOMRef": "pkg:npm/string.prototype.repeat@1.0.0"
          },
          "Version": "1.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "eslint-plugin-react@7.37.5"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "string.prototype.trim@1.2.10",
          "Name": "string.prototype.trim",
          "Identifier": {
            "PURL": "pkg:npm/string.prototype.trim@1.2.10",
            "UID": "77f1739a0ac26af3",
            "BOMRef": "pkg:npm/string.prototype.trim@1.2.10"
          },
          "Version": "1.2.10",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "es-abstract@1.24.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "string.prototype.trimend@1.0.9",
          "Name": "string.prototype.trimend",
          "Identifier": {
            "PURL": "pkg:npm/string.prototype.trimend@1.0.9",
            "UID": "1d1b2d7fd522e7eb",
            "BOMRef": "pkg:npm/string.prototype.trimend@1.0.9"
          },
          "Version": "1.0.9",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "es-abstract@1.24.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "string.prototype.trimstart@1.0.8",
          "Name": "string.prototype.trimstart",
          "Identifier": {
            "PURL": "pkg:npm/string.prototype.trimstart@1.0.8",
            "UID": "d189d2eaeb609aa1",
            "BOMRef": "pkg:npm/string.prototype.trimstart@1.0.8"
          },
          "Version": "1.0.8",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "es-abstract@1.24.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "stringify-entities@4.0.4",
          "Name": "stringify-entities",
          "Identifier": {
            "PURL": "pkg:npm/stringify-entities@4.0.4",
            "UID": "d1e8d2306d4676d9",
            "BOMRef": "pkg:npm/stringify-entities@4.0.4"
          },
          "Version": "4.0.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "mdast-util-mdx-jsx@2.1.4"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "strip-ansi@6.0.1",
          "Name": "strip-ansi",
          "Identifier": {
            "PURL": "pkg:npm/strip-ansi@6.0.1",
            "UID": "85e915a3cbded6b9",
            "BOMRef": "pkg:npm/strip-ansi@6.0.1"
          },
          "Version": "6.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "eslint@8.57.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "strip-indent@3.0.0",
          "Name": "strip-indent",
          "Identifier": {
            "PURL": "pkg:npm/strip-indent@3.0.0",
            "UID": "15942e4b5549f3e5",
            "BOMRef": "pkg:npm/strip-indent@3.0.0"
          },
          "Version": "3.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "redent@3.0.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "strip-json-comments@3.1.1",
          "Name": "strip-json-comments",
          "Identifier": {
            "PURL": "pkg:npm/strip-json-comments@3.1.1",
            "UID": "c494f95661c9801c",
            "BOMRef": "pkg:npm/strip-json-comments@3.1.1"
          },
          "Version": "3.1.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@eslint/eslintrc@2.1.4"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "strip-literal@3.0.0",
          "Name": "strip-literal",
          "Identifier": {
            "PURL": "pkg:npm/strip-literal@3.0.0",
            "UID": "e6b16f218338de3b",
            "BOMRef": "pkg:npm/strip-literal@3.0.0"
          },
          "Version": "3.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@vitest/runner@3.2.4"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "style-to-object@0.4.4",
          "Name": "style-to-object",
          "Identifier": {
            "PURL": "pkg:npm/style-to-object@0.4.4",
            "UID": "1c2c66d429958f46",
            "BOMRef": "pkg:npm/style-to-object@0.4.4"
          },
          "Version": "0.4.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "hast-util-to-estree@2.3.3"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "stylis@4.2.0",
          "Name": "stylis",
          "Identifier": {
            "PURL": "pkg:npm/stylis@4.2.0",
            "UID": "9c0347a0d618bf5c",
            "BOMRef": "pkg:npm/stylis@4.2.0"
          },
          "Version": "4.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@emotion/babel-plugin@11.13.5",
            "@emotion/cache@11.14.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "supports-color@7.2.0",
          "Name": "supports-color",
          "Identifier": {
            "PURL": "pkg:npm/supports-color@7.2.0",
            "UID": "4a7abfd3fc3ead1",
            "BOMRef": "pkg:npm/supports-color@7.2.0"
          },
          "Version": "7.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "chalk@3.0.0",
            "chalk@4.1.2"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "supports-preserve-symlinks-flag@1.0.0",
          "Name": "supports-preserve-symlinks-flag",
          "Identifier": {
            "PURL": "pkg:npm/supports-preserve-symlinks-flag@1.0.0",
            "UID": "df07722da9cb172e",
            "BOMRef": "pkg:npm/supports-preserve-symlinks-flag@1.0.0"
          },
          "Version": "1.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "resolve@1.22.10",
            "resolve@2.0.0-next.5"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "svg-parser@2.0.4",
          "Name": "svg-parser",
          "Identifier": {
            "PURL": "pkg:npm/svg-parser@2.0.4",
            "UID": "1294cdf8422f25e0",
            "BOMRef": "pkg:npm/svg-parser@2.0.4"
          },
          "Version": "2.0.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@svgr/plugin-jsx@8.1.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "symbol-tree@3.2.4",
          "Name": "symbol-tree",
          "Identifier": {
            "PURL": "pkg:npm/symbol-tree@3.2.4",
            "UID": "259ed2161232687e",
            "BOMRef": "pkg:npm/symbol-tree@3.2.4"
          },
          "Version": "3.2.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "jsdom@22.1.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "tailwindcss@4.1.11",
          "Name": "tailwindcss",
          "Identifier": {
            "PURL": "pkg:npm/tailwindcss@4.1.11",
            "UID": "d22413c9bcb7d58a",
            "BOMRef": "pkg:npm/tailwindcss@4.1.11"
          },
          "Version": "4.1.11",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@tailwindcss/cli@4.1.11",
            "@tailwindcss/node@4.1.11",
            "@uppy/components@0.2.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "tapable@2.2.2",
          "Name": "tapable",
          "Identifier": {
            "PURL": "pkg:npm/tapable@2.2.2",
            "UID": "d7db2ab43675c31c",
            "BOMRef": "pkg:npm/tapable@2.2.2"
          },
          "Version": "2.2.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "enhanced-resolve@5.18.2"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "tar@7.4.3",
          "Name": "tar",
          "Identifier": {
            "PURL": "pkg:npm/tar@7.4.3",
            "UID": "9a9920914c4e634e",
            "BOMRef": "pkg:npm/tar@7.4.3"
          },
          "Version": "7.4.3",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "@tailwindcss/oxide@4.1.11"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "text-table@0.2.0",
          "Name": "text-table",
          "Identifier": {
            "PURL": "pkg:npm/text-table@0.2.0",
            "UID": "473d6fc0e2b3e466",
            "BOMRef": "pkg:npm/text-table@0.2.0"
          },
          "Version": "0.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "eslint@8.57.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "tinybench@2.9.0",
          "Name": "tinybench",
          "Identifier": {
            "PURL": "pkg:npm/tinybench@2.9.0",
            "UID": "5795922dea9d6cf8",
            "BOMRef": "pkg:npm/tinybench@2.9.0"
          },
          "Version": "2.9.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "vitest@3.2.4"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "tinycolor2@1.6.0",
          "Name": "tinycolor2",
          "Identifier": {
            "PURL": "pkg:npm/tinycolor2@1.6.0",
            "UID": "f2eccfea3893cde8",
            "BOMRef": "pkg:npm/tinycolor2@1.6.0"
          },
          "Version": "1.6.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "canvas-color-tracker@1.3.2"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "tinyexec@0.3.2",
          "Name": "tinyexec",
          "Identifier": {
            "PURL": "pkg:npm/tinyexec@0.3.2",
            "UID": "95d4e4bb675e0e67",
            "BOMRef": "pkg:npm/tinyexec@0.3.2"
          },
          "Version": "0.3.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "vitest@3.2.4"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "tinyglobby@0.2.14",
          "Name": "tinyglobby",
          "Identifier": {
            "PURL": "pkg:npm/tinyglobby@0.2.14",
            "UID": "7fd33fe5da9c99d6",
            "BOMRef": "pkg:npm/tinyglobby@0.2.14"
          },
          "Version": "0.2.14",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "vite@6.4.1",
            "vitest@3.2.4"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "tinypool@1.1.1",
          "Name": "tinypool",
          "Identifier": {
            "PURL": "pkg:npm/tinypool@1.1.1",
            "UID": "f27cd9aa38a75927",
            "BOMRef": "pkg:npm/tinypool@1.1.1"
          },
          "Version": "1.1.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "vitest@3.2.4"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "tinyrainbow@2.0.0",
          "Name": "tinyrainbow",
          "Identifier": {
            "PURL": "pkg:npm/tinyrainbow@2.0.0",
            "UID": "a3aef4d04ab45188",
            "BOMRef": "pkg:npm/tinyrainbow@2.0.0"
          },
          "Version": "2.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@vitest/expect@3.2.4",
            "@vitest/pretty-format@3.2.4",
            "@vitest/utils@3.2.4",
            "vitest@3.2.4"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "tinyspy@4.0.3",
          "Name": "tinyspy",
          "Identifier": {
            "PURL": "pkg:npm/tinyspy@4.0.3",
            "UID": "a12d4b675160eb9f",
            "BOMRef": "pkg:npm/tinyspy@4.0.3"
          },
          "Version": "4.0.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@vitest/spy@3.2.4"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "to-regex-range@5.0.1",
          "Name": "to-regex-range",
          "Identifier": {
            "PURL": "pkg:npm/to-regex-range@5.0.1",
            "UID": "341b0fe2aeecf3a1",
            "BOMRef": "pkg:npm/to-regex-range@5.0.1"
          },
          "Version": "5.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "fill-range@7.1.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "toggle-selection@1.0.6",
          "Name": "toggle-selection",
          "Identifier": {
            "PURL": "pkg:npm/toggle-selection@1.0.6",
            "UID": "dc32e671d02a966b",
            "BOMRef": "pkg:npm/toggle-selection@1.0.6"
          },
          "Version": "1.0.6",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "copy-to-clipboard@3.3.3"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "tough-cookie@4.1.4",
          "Name": "tough-cookie",
          "Identifier": {
            "PURL": "pkg:npm/tough-cookie@4.1.4",
            "UID": "a8aa685ad998e618",
            "BOMRef": "pkg:npm/tough-cookie@4.1.4"
          },
          "Version": "4.1.4",
          "Licenses": [
            "BSD-3-Clause"
          ],
          "DependsOn": [
            "jsdom@22.1.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "tr46@4.1.1",
          "Name": "tr46",
          "Identifier": {
            "PURL": "pkg:npm/tr46@4.1.1",
            "UID": "43ac2fdbc18c5c7a",
            "BOMRef": "pkg:npm/tr46@4.1.1"
          },
          "Version": "4.1.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "whatwg-url@12.0.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "trim-lines@3.0.1",
          "Name": "trim-lines",
          "Identifier": {
            "PURL": "pkg:npm/trim-lines@3.0.1",
            "UID": "1a9e18b240cc9b53",
            "BOMRef": "pkg:npm/trim-lines@3.0.1"
          },
          "Version": "3.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "mdast-util-to-hast@12.3.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "trough@2.2.0",
          "Name": "trough",
          "Identifier": {
            "PURL": "pkg:npm/trough@2.2.0",
            "UID": "3d07400e0ba2ebea",
            "BOMRef": "pkg:npm/trough@2.2.0"
          },
          "Version": "2.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "unified@10.1.2"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "tslib@2.8.1",
          "Name": "tslib",
          "Identifier": {
            "PURL": "pkg:npm/tslib@2.8.1",
            "UID": "c0fce8268f9b519a",
            "BOMRef": "pkg:npm/tslib@2.8.1"
          },
          "Version": "2.8.1",
          "Licenses": [
            "0BSD"
          ],
          "DependsOn": [
            "dot-case@3.0.4",
            "lower-case@2.0.2",
            "no-case@3.0.4",
            "snake-case@3.0.4"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "type-check@0.4.0",
          "Name": "type-check",
          "Identifier": {
            "PURL": "pkg:npm/type-check@0.4.0",
            "UID": "3bce6102ddb1b9d1",
            "BOMRef": "pkg:npm/type-check@0.4.0"
          },
          "Version": "0.4.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "levn@0.4.1",
            "optionator@0.9.4"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "type-fest@0.20.2",
          "Name": "type-fest",
          "Identifier": {
            "PURL": "pkg:npm/type-fest@0.20.2",
            "UID": "f298c5e3fa4ca5d9",
            "BOMRef": "pkg:npm/type-fest@0.20.2"
          },
          "Version": "0.20.2",
          "Licenses": [
            "MIT OR CC0-1.0"
          ],
          "DependsOn": [
            "globals@13.24.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "typed-array-buffer@1.0.3",
          "Name": "typed-array-buffer",
          "Identifier": {
            "PURL": "pkg:npm/typed-array-buffer@1.0.3",
            "UID": "6c472d79bfbcfd34",
            "BOMRef": "pkg:npm/typed-array-buffer@1.0.3"
          },
          "Version": "1.0.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "es-abstract@1.24.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "typed-array-byte-length@1.0.3",
          "Name": "typed-array-byte-length",
          "Identifier": {
            "PURL": "pkg:npm/typed-array-byte-length@1.0.3",
            "UID": "c493f767b399fe6c",
            "BOMRef": "pkg:npm/typed-array-byte-length@1.0.3"
          },
          "Version": "1.0.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "es-abstract@1.24.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "typed-array-byte-offset@1.0.4",
          "Name": "typed-array-byte-offset",
          "Identifier": {
            "PURL": "pkg:npm/typed-array-byte-offset@1.0.4",
            "UID": "8976ab3958eca9ac",
            "BOMRef": "pkg:npm/typed-array-byte-offset@1.0.4"
          },
          "Version": "1.0.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "es-abstract@1.24.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "typed-array-length@1.0.7",
          "Name": "typed-array-length",
          "Identifier": {
            "PURL": "pkg:npm/typed-array-length@1.0.7",
            "UID": "d405dffa142cedcd",
            "BOMRef": "pkg:npm/typed-array-length@1.0.7"
          },
          "Version": "1.0.7",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "es-abstract@1.24.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "typescript@5.8.3",
          "Name": "typescript",
          "Identifier": {
            "PURL": "pkg:npm/typescript@5.8.3",
            "UID": "c3846775d9323a78",
            "BOMRef": "pkg:npm/typescript@5.8.3"
          },
          "Version": "5.8.3",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "@qdrant/js-client-rest@1.15.1",
            "cosmiconfig@8.3.6"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "unbox-primitive@1.1.0",
          "Name": "unbox-primitive",
          "Identifier": {
            "PURL": "pkg:npm/unbox-primitive@1.1.0",
            "UID": "adf4b5759b6f0343",
            "BOMRef": "pkg:npm/unbox-primitive@1.1.0"
          },
          "Version": "1.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "es-abstract@1.24.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "undici@6.21.3",
          "Name": "undici",
          "Identifier": {
            "PURL": "pkg:npm/undici@6.21.3",
            "UID": "e18513a5f6e02345",
            "BOMRef": "pkg:npm/undici@6.21.3"
          },
          "Version": "6.21.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@qdrant/js-client-rest@1.15.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "undici-types@7.8.0",
          "Name": "undici-types",
          "Identifier": {
            "PURL": "pkg:npm/undici-types@7.8.0",
            "UID": "51a8f0fe48027a78",
            "BOMRef": "pkg:npm/undici-types@7.8.0"
          },
          "Version": "7.8.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@types/node@24.0.10"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "unified@10.1.2",
          "Name": "unified",
          "Identifier": {
            "PURL": "pkg:npm/unified@10.1.2",
            "UID": "60ee49642603d3bb",
            "BOMRef": "pkg:npm/unified@10.1.2"
          },
          "Version": "10.1.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mdx-js/mdx@2.3.0",
            "remark-parse@10.0.2",
            "remark-rehype@10.1.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "unist-util-generated@2.0.1",
          "Name": "unist-util-generated",
          "Identifier": {
            "PURL": "pkg:npm/unist-util-generated@2.0.1",
            "UID": "7e912ceff15622b7",
            "BOMRef": "pkg:npm/unist-util-generated@2.0.1"
          },
          "Version": "2.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "mdast-util-to-hast@12.3.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "unist-util-is@5.2.1",
          "Name": "unist-util-is",
          "Identifier": {
            "PURL": "pkg:npm/unist-util-is@5.2.1",
            "UID": "4ce78969cae7778c",
            "BOMRef": "pkg:npm/unist-util-is@5.2.1"
          },
          "Version": "5.2.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "unist-util-visit-parents@5.1.3",
            "unist-util-visit-parents@5.1.3",
            "unist-util-visit-parents@5.1.3",
            "unist-util-visit-parents@5.1.3",
            "unist-util-visit-parents@5.1.3",
            "unist-util-visit@4.1.2",
            "unist-util-visit@4.1.2",
            "unist-util-visit@4.1.2",
            "unist-util-visit@4.1.2",
            "unist-util-visit@4.1.2",
            "mdast-util-phrasing@3.0.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "unist-util-is@6.0.0",
          "Name": "unist-util-is",
          "Identifier": {
            "PURL": "pkg:npm/unist-util-is@6.0.0",
            "UID": "53390fee91c83fc7",
            "BOMRef": "8ec17036-c120-43f2-ba71-b82dc33da3a4"
          },
          "Version": "6.0.0",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "unist-util-is@6.0.0",
          "Name": "unist-util-is",
          "Identifier": {
            "PURL": "pkg:npm/unist-util-is@6.0.0",
            "UID": "6149aa12406650ab",
            "BOMRef": "c8724416-5a6f-491a-9573-4e9854cecb4c"
          },
          "Version": "6.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "unist-util-visit-parents@6.0.1",
            "unist-util-visit@5.0.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "unist-util-position@4.0.4",
          "Name": "unist-util-position",
          "Identifier": {
            "PURL": "pkg:npm/unist-util-position@4.0.4",
            "UID": "cdc0bc1ff1c1e82b",
            "BOMRef": "pkg:npm/unist-util-position@4.0.4"
          },
          "Version": "4.0.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "hast-util-to-estree@2.3.3",
            "mdast-util-to-hast@12.3.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "unist-util-position-from-estree@1.1.2",
          "Name": "unist-util-position-from-estree",
          "Identifier": {
            "PURL": "pkg:npm/unist-util-position-from-estree@1.1.2",
            "UID": "8d41af8bc91c7564",
            "BOMRef": "pkg:npm/unist-util-position-from-estree@1.1.2"
          },
          "Version": "1.1.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mdx-js/mdx@2.3.0",
            "micromark-extension-mdxjs-esm@1.0.5",
            "micromark-factory-mdx-expression@1.0.9"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "unist-util-remove-position@4.0.2",
          "Name": "unist-util-remove-position",
          "Identifier": {
            "PURL": "pkg:npm/unist-util-remove-position@4.0.2",
            "UID": "60013d53b648cfd1",
            "BOMRef": "pkg:npm/unist-util-remove-position@4.0.2"
          },
          "Version": "4.0.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "mdast-util-mdx-jsx@2.1.4"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "unist-util-stringify-position@3.0.3",
          "Name": "unist-util-stringify-position",
          "Identifier": {
            "PURL": "pkg:npm/unist-util-stringify-position@3.0.3",
            "UID": "9be368f2d2551fd5",
            "BOMRef": "pkg:npm/unist-util-stringify-position@3.0.3"
          },
          "Version": "3.0.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mdx-js/mdx@2.3.0",
            "mdast-util-from-markdown@1.3.1",
            "mdast-util-mdx-jsx@2.1.4",
            "vfile-message@3.1.4",
            "vfile@5.3.7"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "unist-util-visit@4.1.2",
          "Name": "unist-util-visit",
          "Identifier": {
            "PURL": "pkg:npm/unist-util-visit@4.1.2",
            "UID": "142e3ce4287ae5d7",
            "BOMRef": "b28f7967-2a35-4207-811f-fb97b6ac03af"
          },
          "Version": "4.1.2",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "unist-util-visit@4.1.2",
          "Name": "unist-util-visit",
          "Identifier": {
            "PURL": "pkg:npm/unist-util-visit@4.1.2",
            "UID": "11d6cb5f8e8b8375",
            "BOMRef": "c856ab5f-a0e4-457f-9280-bfa8e31135ee"
          },
          "Version": "4.1.2",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "unist-util-visit@4.1.2",
          "Name": "unist-util-visit",
          "Identifier": {
            "PURL": "pkg:npm/unist-util-visit@4.1.2",
            "UID": "80914bcd2117b4c8",
            "BOMRef": "f1576476-642a-4733-b50c-d3f86107aa92"
          },
          "Version": "4.1.2",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "unist-util-visit@4.1.2",
          "Name": "unist-util-visit",
          "Identifier": {
            "PURL": "pkg:npm/unist-util-visit@4.1.2",
            "UID": "a15432c87c29f715",
            "BOMRef": "529a462a-7f1e-481e-acd7-7d5784476589"
          },
          "Version": "4.1.2",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "unist-util-visit@4.1.2",
          "Name": "unist-util-visit",
          "Identifier": {
            "PURL": "pkg:npm/unist-util-visit@4.1.2",
            "UID": "a8924d72f78b8c64",
            "BOMRef": "0c589df8-4f1d-43f7-a5b1-26ed6ae68e7c"
          },
          "Version": "4.1.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mdx-js/mdx@2.3.0",
            "mdast-util-definitions@5.1.2",
            "mdast-util-to-hast@12.3.0",
            "mdast-util-to-markdown@1.5.0",
            "unist-util-remove-position@4.0.2"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "unist-util-visit@5.0.0",
          "Name": "unist-util-visit",
          "Identifier": {
            "PURL": "pkg:npm/unist-util-visit@5.0.0",
            "UID": "fa8b3082afea3018",
            "BOMRef": "pkg:npm/unist-util-visit@5.0.0"
          },
          "Version": "5.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "unist-util-visit-parents@5.1.3",
          "Name": "unist-util-visit-parents",
          "Identifier": {
            "PURL": "pkg:npm/unist-util-visit-parents@5.1.3",
            "UID": "14540f4c7b27345b",
            "BOMRef": "c07ebd19-79d5-48bb-bab8-0bd2febc28fd"
          },
          "Version": "5.1.3",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "unist-util-visit-parents@5.1.3",
          "Name": "unist-util-visit-parents",
          "Identifier": {
            "PURL": "pkg:npm/unist-util-visit-parents@5.1.3",
            "UID": "b7148f64316e3d24",
            "BOMRef": "23a40f8a-4e45-474f-aea7-dec1d43eeb85"
          },
          "Version": "5.1.3",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "unist-util-visit-parents@5.1.3",
          "Name": "unist-util-visit-parents",
          "Identifier": {
            "PURL": "pkg:npm/unist-util-visit-parents@5.1.3",
            "UID": "3205311d6aa7a56d",
            "BOMRef": "29922086-74dc-406f-9673-e9bbf4088a3d"
          },
          "Version": "5.1.3",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "unist-util-visit-parents@5.1.3",
          "Name": "unist-util-visit-parents",
          "Identifier": {
            "PURL": "pkg:npm/unist-util-visit-parents@5.1.3",
            "UID": "1d999e856f9780ea",
            "BOMRef": "acdbe130-bdd9-4b3f-bbf6-a6d3de254a6b"
          },
          "Version": "5.1.3",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "unist-util-visit-parents@5.1.3",
          "Name": "unist-util-visit-parents",
          "Identifier": {
            "PURL": "pkg:npm/unist-util-visit-parents@5.1.3",
            "UID": "b94f16313232d5a2",
            "BOMRef": "52615753-de75-4f33-961b-f81b7212f704"
          },
          "Version": "5.1.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "unist-util-visit@4.1.2",
            "unist-util-visit@4.1.2",
            "unist-util-visit@4.1.2",
            "unist-util-visit@4.1.2",
            "unist-util-visit@4.1.2"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "unist-util-visit-parents@6.0.1",
          "Name": "unist-util-visit-parents",
          "Identifier": {
            "PURL": "pkg:npm/unist-util-visit-parents@6.0.1",
            "UID": "adbdddb9c2f892b2",
            "BOMRef": "pkg:npm/unist-util-visit-parents@6.0.1"
          },
          "Version": "6.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "unist-util-visit@5.0.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "universalify@0.2.0",
          "Name": "universalify",
          "Identifier": {
            "PURL": "pkg:npm/universalify@0.2.0",
            "UID": "4625957d558304ee",
            "BOMRef": "pkg:npm/universalify@0.2.0"
          },
          "Version": "0.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "tough-cookie@4.1.4"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "update-browserslist-db@1.1.3",
          "Name": "update-browserslist-db",
          "Identifier": {
            "PURL": "pkg:npm/update-browserslist-db@1.1.3",
            "UID": "e4e7d49483a1e985",
            "BOMRef": "pkg:npm/update-browserslist-db@1.1.3"
          },
          "Version": "1.1.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "browserslist@4.25.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "uri-js@4.4.1",
          "Name": "uri-js",
          "Identifier": {
            "PURL": "pkg:npm/uri-js@4.4.1",
            "UID": "dc42405c82052a06",
            "BOMRef": "pkg:npm/uri-js@4.4.1"
          },
          "Version": "4.4.1",
          "Licenses": [
            "BSD-2-Clause"
          ],
          "DependsOn": [
            "ajv@6.12.6"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "url-parse@1.5.10",
          "Name": "url-parse",
          "Identifier": {
            "PURL": "pkg:npm/url-parse@1.5.10",
            "UID": "492be7d89af6228e",
            "BOMRef": "pkg:npm/url-parse@1.5.10"
          },
          "Version": "1.5.10",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "tough-cookie@4.1.4"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "use-sync-external-store@1.5.0",
          "Name": "use-sync-external-store",
          "Identifier": {
            "PURL": "pkg:npm/use-sync-external-store@1.5.0",
            "UID": "860f01a1d11d865d",
            "BOMRef": "pkg:npm/use-sync-external-store@1.5.0"
          },
          "Version": "1.5.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mui/x-data-grid@7.29.8",
            "@uppy/react@4.4.0",
            "zustand@4.5.7"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "uvu@0.5.6",
          "Name": "uvu",
          "Identifier": {
            "PURL": "pkg:npm/uvu@0.5.6",
            "UID": "9b4c7b34e6208d51",
            "BOMRef": "pkg:npm/uvu@0.5.6"
          },
          "Version": "0.5.6",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "mdast-util-from-markdown@1.3.1",
            "micromark-core-commonmark@1.1.0",
            "micromark-extension-mdx-expression@1.0.8",
            "micromark-extension-mdx-jsx@1.0.5",
            "micromark-extension-mdxjs-esm@1.0.5",
            "micromark-factory-label@1.1.0",
            "micromark-factory-mdx-expression@1.0.9",
            "micromark-util-events-to-acorn@1.2.3",
            "micromark-util-subtokenize@1.1.0",
            "micromark@3.2.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "vfile@5.3.7",
          "Name": "vfile",
          "Identifier": {
            "PURL": "pkg:npm/vfile@5.3.7",
            "UID": "60d18a4e9e422879",
            "BOMRef": "pkg:npm/vfile@5.3.7"
          },
          "Version": "5.3.7",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@mdx-js/mdx@2.3.0",
            "@mdx-js/rollup@2.3.0",
            "unified@10.1.2"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "vfile-message@3.1.4",
          "Name": "vfile-message",
          "Identifier": {
            "PURL": "pkg:npm/vfile-message@3.1.4",
            "UID": "3933d9ea194e645e",
            "BOMRef": "pkg:npm/vfile-message@3.1.4"
          },
          "Version": "3.1.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "mdast-util-mdx-jsx@2.1.4",
            "micromark-extension-mdx-jsx@1.0.5",
            "micromark-extension-mdxjs-esm@1.0.5",
            "micromark-factory-mdx-expression@1.0.9",
            "micromark-util-events-to-acorn@1.2.3",
            "vfile@5.3.7"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "vite@6.4.1",
          "Name": "vite",
          "Identifier": {
            "PURL": "pkg:npm/vite@6.4.1",
            "UID": "b330b40dd02b013c",
            "BOMRef": "pkg:npm/vite@6.4.1"
          },
          "Version": "6.4.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@vitejs/plugin-react@4.6.0",
            "@vitest/mocker@3.2.4",
            "qdrant-web-ui@0.2.5",
            "vite-node@3.2.4",
            "vite-plugin-eslint@1.8.1",
            "vite-plugin-svgr@4.3.0",
            "vitest@3.2.4"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "vite-node@3.2.4",
          "Name": "vite-node",
          "Identifier": {
            "PURL": "pkg:npm/vite-node@3.2.4",
            "UID": "b9b3498c146de64",
            "BOMRef": "pkg:npm/vite-node@3.2.4"
          },
          "Version": "3.2.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "vitest@3.2.4"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "vite-plugin-eslint@1.8.1",
          "Name": "vite-plugin-eslint",
          "Identifier": {
            "PURL": "pkg:npm/vite-plugin-eslint@1.8.1",
            "UID": "2a0c7784c06fc9e5",
            "BOMRef": "pkg:npm/vite-plugin-eslint@1.8.1"
          },
          "Version": "1.8.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "vite-plugin-svgr@4.3.0",
          "Name": "vite-plugin-svgr",
          "Identifier": {
            "PURL": "pkg:npm/vite-plugin-svgr@4.3.0",
            "UID": "84575dcafa35336a",
            "BOMRef": "pkg:npm/vite-plugin-svgr@4.3.0"
          },
          "Version": "4.3.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "vitest@3.2.4",
          "Name": "vitest",
          "Identifier": {
            "PURL": "pkg:npm/vitest@3.2.4",
            "UID": "c9ad06b8e771a8e9",
            "BOMRef": "pkg:npm/vitest@3.2.4"
          },
          "Version": "3.2.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "w3c-xmlserializer@4.0.0",
          "Name": "w3c-xmlserializer",
          "Identifier": {
            "PURL": "pkg:npm/w3c-xmlserializer@4.0.0",
            "UID": "702ebec68e3bb360",
            "BOMRef": "pkg:npm/w3c-xmlserializer@4.0.0"
          },
          "Version": "4.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "jsdom@22.1.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "web-vitals@2.1.4",
          "Name": "web-vitals",
          "Identifier": {
            "PURL": "pkg:npm/web-vitals@2.1.4",
            "UID": "38bea747499fe2d",
            "BOMRef": "pkg:npm/web-vitals@2.1.4"
          },
          "Version": "2.1.4",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "qdrant-web-ui@0.2.5"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "webidl-conversions@7.0.0",
          "Name": "webidl-conversions",
          "Identifier": {
            "PURL": "pkg:npm/webidl-conversions@7.0.0",
            "UID": "21e8c6413b23af67",
            "BOMRef": "pkg:npm/webidl-conversions@7.0.0"
          },
          "Version": "7.0.0",
          "Licenses": [
            "BSD-2-Clause"
          ],
          "DependsOn": [
            "domexception@4.0.0",
            "jsdom@22.1.0",
            "whatwg-url@12.0.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "whatwg-encoding@2.0.0",
          "Name": "whatwg-encoding",
          "Identifier": {
            "PURL": "pkg:npm/whatwg-encoding@2.0.0",
            "UID": "c05d46bb70c20528",
            "BOMRef": "pkg:npm/whatwg-encoding@2.0.0"
          },
          "Version": "2.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "html-encoding-sniffer@3.0.0",
            "jsdom@22.1.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "whatwg-mimetype@3.0.0",
          "Name": "whatwg-mimetype",
          "Identifier": {
            "PURL": "pkg:npm/whatwg-mimetype@3.0.0",
            "UID": "12ae5213406079c7",
            "BOMRef": "pkg:npm/whatwg-mimetype@3.0.0"
          },
          "Version": "3.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "data-urls@4.0.0",
            "jsdom@22.1.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "whatwg-url@12.0.1",
          "Name": "whatwg-url",
          "Identifier": {
            "PURL": "pkg:npm/whatwg-url@12.0.1",
            "UID": "ec0c634d3a037eb4",
            "BOMRef": "pkg:npm/whatwg-url@12.0.1"
          },
          "Version": "12.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "data-urls@4.0.0",
            "jsdom@22.1.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "which@2.0.2",
          "Name": "which",
          "Identifier": {
            "PURL": "pkg:npm/which@2.0.2",
            "UID": "215b86bec154b18e",
            "BOMRef": "pkg:npm/which@2.0.2"
          },
          "Version": "2.0.2",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "cross-spawn@7.0.6"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "which-boxed-primitive@1.1.1",
          "Name": "which-boxed-primitive",
          "Identifier": {
            "PURL": "pkg:npm/which-boxed-primitive@1.1.1",
            "UID": "e1532ea2f0af996c",
            "BOMRef": "pkg:npm/which-boxed-primitive@1.1.1"
          },
          "Version": "1.1.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "deep-equal@2.2.3",
            "unbox-primitive@1.1.0",
            "which-builtin-type@1.2.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "which-builtin-type@1.2.1",
          "Name": "which-builtin-type",
          "Identifier": {
            "PURL": "pkg:npm/which-builtin-type@1.2.1",
            "UID": "a978b1d80f2558fb",
            "BOMRef": "pkg:npm/which-builtin-type@1.2.1"
          },
          "Version": "1.2.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "reflect.getprototypeof@1.0.10"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "which-collection@1.0.2",
          "Name": "which-collection",
          "Identifier": {
            "PURL": "pkg:npm/which-collection@1.0.2",
            "UID": "2ef477b55e57de22",
            "BOMRef": "pkg:npm/which-collection@1.0.2"
          },
          "Version": "1.0.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "deep-equal@2.2.3",
            "which-builtin-type@1.2.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "which-typed-array@1.1.19",
          "Name": "which-typed-array",
          "Identifier": {
            "PURL": "pkg:npm/which-typed-array@1.1.19",
            "UID": "928be40dea1ff0b7",
            "BOMRef": "pkg:npm/which-typed-array@1.1.19"
          },
          "Version": "1.1.19",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "deep-equal@2.2.3",
            "es-abstract@1.24.0",
            "is-typed-array@1.1.15",
            "which-builtin-type@1.2.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "why-is-node-running@2.3.0",
          "Name": "why-is-node-running",
          "Identifier": {
            "PURL": "pkg:npm/why-is-node-running@2.3.0",
            "UID": "9516bdb149980fa",
            "BOMRef": "pkg:npm/why-is-node-running@2.3.0"
          },
          "Version": "2.3.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "vitest@3.2.4"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "wildcard@1.1.2",
          "Name": "wildcard",
          "Identifier": {
            "PURL": "pkg:npm/wildcard@1.1.2",
            "UID": "8c9ec7bbc5e7ab9d",
            "BOMRef": "pkg:npm/wildcard@1.1.2"
          },
          "Version": "1.1.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "mime-match@1.0.2"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "word-wrap@1.2.5",
          "Name": "word-wrap",
          "Identifier": {
            "PURL": "pkg:npm/word-wrap@1.2.5",
            "UID": "dce032e468cfc437",
            "BOMRef": "pkg:npm/word-wrap@1.2.5"
          },
          "Version": "1.2.5",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "optionator@0.9.4"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "wrappy@1.0.2",
          "Name": "wrappy",
          "Identifier": {
            "PURL": "pkg:npm/wrappy@1.0.2",
            "UID": "5af6a9c8d8d71447",
            "BOMRef": "pkg:npm/wrappy@1.0.2"
          },
          "Version": "1.0.2",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "inflight@1.0.6",
            "once@1.4.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "ws@8.18.3",
          "Name": "ws",
          "Identifier": {
            "PURL": "pkg:npm/ws@8.18.3",
            "UID": "60d9b9ec26967d36",
            "BOMRef": "pkg:npm/ws@8.18.3"
          },
          "Version": "8.18.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "jsdom@22.1.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "xml-name-validator@4.0.0",
          "Name": "xml-name-validator",
          "Identifier": {
            "PURL": "pkg:npm/xml-name-validator@4.0.0",
            "UID": "ba38ab1ba29313e9",
            "BOMRef": "pkg:npm/xml-name-validator@4.0.0"
          },
          "Version": "4.0.0",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "jsdom@22.1.0",
            "w3c-xmlserializer@4.0.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "xmlchars@2.2.0",
          "Name": "xmlchars",
          "Identifier": {
            "PURL": "pkg:npm/xmlchars@2.2.0",
            "UID": "185859e749a604f5",
            "BOMRef": "pkg:npm/xmlchars@2.2.0"
          },
          "Version": "2.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "saxes@6.0.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "yallist@3.1.1",
          "Name": "yallist",
          "Identifier": {
            "PURL": "pkg:npm/yallist@3.1.1",
            "UID": "453c02bea06bbd3b",
            "BOMRef": "pkg:npm/yallist@3.1.1"
          },
          "Version": "3.1.1",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "lru-cache@5.1.1"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "yallist@5.0.0",
          "Name": "yallist",
          "Identifier": {
            "PURL": "pkg:npm/yallist@5.0.0",
            "UID": "14b3fb9e84c91383",
            "BOMRef": "pkg:npm/yallist@5.0.0"
          },
          "Version": "5.0.0",
          "Licenses": [
            "BlueOak-1.0.0"
          ],
          "DependsOn": [
            "tar@7.4.3"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "yaml@1.10.2",
          "Name": "yaml",
          "Identifier": {
            "PURL": "pkg:npm/yaml@1.10.2",
            "UID": "a72b9c13809c7e6d",
            "BOMRef": "pkg:npm/yaml@1.10.2"
          },
          "Version": "1.10.2",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "cosmiconfig@7.1.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "yocto-queue@0.1.0",
          "Name": "yocto-queue",
          "Identifier": {
            "PURL": "pkg:npm/yocto-queue@0.1.0",
            "UID": "12349f02f6f1624c",
            "BOMRef": "pkg:npm/yocto-queue@0.1.0"
          },
          "Version": "0.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "p-limit@3.1.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "zustand@4.5.7",
          "Name": "zustand",
          "Identifier": {
            "PURL": "pkg:npm/zustand@4.5.7",
            "UID": "fc67f2de51052eef",
            "BOMRef": "pkg:npm/zustand@4.5.7"
          },
          "Version": "4.5.7",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "@textea/json-viewer@2.17.2"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        },
        {
          "ID": "zwitch@2.0.4",
          "Name": "zwitch",
          "Identifier": {
            "PURL": "pkg:npm/zwitch@2.0.4",
            "UID": "99e9d3ed79ce7187",
            "BOMRef": "pkg:npm/zwitch@2.0.4"
          },
          "Version": "2.0.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "hast-util-to-estree@2.3.3",
            "mdast-util-to-markdown@1.5.0"
          ],
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          }
        }
      ],
      "Vulnerabilities": [
        {
          "VulnerabilityID": "CVE-2026-22029",
          "VendorIDs": [
            "GHSA-2w69-qvjg-hvjx"
          ],
          "PkgID": "@remix-run/router@1.23.0",
          "PkgName": "@remix-run/router",
          "PkgIdentifier": {
            "PURL": "pkg:npm/%40remix-run/router@1.23.0",
            "UID": "5998a9fa5dc14ca5",
            "BOMRef": "pkg:npm/%40remix-run/router@1.23.0"
          },
          "InstalledVersion": "1.23.0",
          "FixedVersion": "1.23.2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-22029",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory npm",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Anpm"
          },
          "Fingerprint": "sha256:44a050cca15d427abe209d3516a947fd473f2e9fabfc9136b11cff0727cfc1cf",
          "Title": "@remix-run/router: react-router: React Router vulnerable to XSS via Open Redirects",
          "Description": "React Router is a router for React. In @remix-run/router version prior to 1.23.2. and react-router 7.0.0 through 7.11.0, React Router (and Remix v1/v2) SPA open navigation redirects originating from loaders or actions in Framework Mode, Data Mode, or the unstable RSC modes can result in unsafe URLs causing unintended javascript execution on the client. This is only an issue if you are creating redirect paths from untrusted content or via an open redirect. There is no impact if Declarative Mode (\u003cBrowserRouter\u003e) is being used. This issue has been patched in @remix-run/router version 1.23.2 and react-router version 7.12.0.",
          "Severity": "HIGH",
          "CweIDs": [
            "CWE-79"
          ],
          "VendorSeverity": {
            "ghsa": 3,
            "nvd": 2,
            "redhat": 3
          },
          "CVSS": {
            "ghsa": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N",
              "V3Score": 8
            },
            "nvd": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
              "V3Score": 6.1
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N",
              "V3Score": 8
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-22029",
            "https://github.com/remix-run/react-router",
            "https://github.com/remix-run/react-router/security/advisories/GHSA-2w69-qvjg-hvjx",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-22029",
            "https://www.cve.org/CVERecord?id=CVE-2026-22029"
          ],
          "PublishedDate": "2026-01-10T03:15:48.87Z",
          "LastModifiedDate": "2026-02-10T19:36:31.503Z"
        },
        {
          "VulnerabilityID": "CVE-2026-3449",
          "VendorIDs": [
            "GHSA-vpq2-c234-7xj6"
          ],
          "PkgID": "@tootallnate/once@2.0.0",
          "PkgName": "@tootallnate/once",
          "PkgIdentifier": {
            "PURL": "pkg:npm/%40tootallnate/once@2.0.0",
            "UID": "bbb7e2e23c74b5a2",
            "BOMRef": "pkg:npm/%40tootallnate/once@2.0.0"
          },
          "InstalledVersion": "2.0.0",
          "FixedVersion": "3.0.1",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-3449",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory npm",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Anpm"
          },
          "Fingerprint": "sha256:acab8c27ffa57c57a47500de1dd2599d4df4b543f4271f9225e132d6d7366a13",
          "Title": "@tootallnate/once: @tootallnate/once: Denial of Service due to incorrect control flow scoping with AbortSignal",
          "Description": "Versions of the package @tootallnate/once before 3.0.1 are vulnerable to Incorrect Control Flow Scoping in promise resolving when AbortSignal option is used. The Promise remains in a permanently pending state after the signal is aborted, causing any await or .then() usage to hang indefinitely. This can cause a control-flow leak that can lead to stalled requests, blocked workers, or degraded application availability.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-705"
          ],
          "VendorSeverity": {
            "ghsa": 1,
            "redhat": 2
          },
          "CVSS": {
            "ghsa": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
              "V40Vector": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P",
              "V3Score": 3.3,
              "V40Score": 1.9
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
              "V3Score": 4
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-3449",
            "https://github.com/TooTallNate/once",
            "https://github.com/TooTallNate/once/commit/b9f43cc5259bee2952d91ad3cdbd201a82df448a",
            "https://github.com/TooTallNate/once/issues/8",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-3449",
            "https://security.snyk.io/vuln/SNYK-JS-TOOTALLNATEONCE-15250612",
            "https://www.cve.org/CVERecord?id=CVE-2026-3449"
          ],
          "PublishedDate": "2026-03-03T05:17:25.017Z",
          "LastModifiedDate": "2026-03-03T21:52:29.877Z"
        },
        {
          "VulnerabilityID": "CVE-2025-69873",
          "VendorIDs": [
            "GHSA-2g4f-4pwh-qvx6"
          ],
          "PkgID": "ajv@6.12.6",
          "PkgName": "ajv",
          "PkgIdentifier": {
            "PURL": "pkg:npm/ajv@6.12.6",
            "UID": "1b30ce404537b231",
            "BOMRef": "pkg:npm/ajv@6.12.6"
          },
          "InstalledVersion": "6.12.6",
          "FixedVersion": "8.18.0, 6.14.0",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-69873",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory npm",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Anpm"
          },
          "Fingerprint": "sha256:e60019248483252c8fa38c4e881c8fef790df69427334906b2a7ffcd67000d8c",
          "Title": "ajv: ReDoS via $data reference",
          "Description": "ajv (Another JSON Schema Validator) before 8.18.0 is vulnerable to Regular Expression Denial of Service (ReDoS) when the $data option is enabled. The pattern keyword accepts runtime data via JSON Pointer syntax ($data reference), which is passed directly to the JavaScript RegExp() constructor without validation. An attacker can inject a malicious regex pattern (e.g., \"^(a|a)*$\") combined with crafted input to cause catastrophic backtracking. A 31-character payload causes approximately 44 seconds of CPU blocking, with each additional character doubling execution time. This enables complete denial of service with a single HTTP request against any API using ajv with $data: true for dynamic schema validation. This issue is also fixed in version 6.14.0.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-1333",
            "CWE-400"
          ],
          "VendorSeverity": {
            "ghsa": 2,
            "redhat": 3
          },
          "CVSS": {
            "ghsa": {
              "V40Vector": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P",
              "V40Score": 5.5
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 7.5
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2025-69873",
            "https://github.com/EthanKim88/ethan-cve-disclosures/blob/main/CVE-2025-69873-ajv-ReDoS.md",
            "https://github.com/advisories/GHSA-2g4f-4pwh-qvx6",
            "https://github.com/ajv-validator/ajv",
            "https://github.com/ajv-validator/ajv/commit/720a23fa453ffae8340e92c9b0fe886c54cfe0d5",
            "https://github.com/ajv-validator/ajv/pull/2586",
            "https://github.com/ajv-validator/ajv/pull/2588",
            "https://github.com/ajv-validator/ajv/pull/2590",
            "https://github.com/ajv-validator/ajv/releases/tag/v6.14.0",
            "https://github.com/ajv-validator/ajv/releases/tag/v8.18.0",
            "https://github.com/github/advisory-database/pull/6991",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-69873",
            "https://www.cve.org/CVERecord?id=CVE-2025-69873"
          ],
          "PublishedDate": "2026-02-11T19:15:50.467Z",
          "LastModifiedDate": "2026-03-02T21:16:24.213Z"
        },
        {
          "VulnerabilityID": "CVE-2026-25639",
          "VendorIDs": [
            "GHSA-43fc-jf86-j433"
          ],
          "PkgID": "axios@1.12.2",
          "PkgName": "axios",
          "PkgIdentifier": {
            "PURL": "pkg:npm/axios@1.12.2",
            "UID": "4891ad56a156bfbd",
            "BOMRef": "pkg:npm/axios@1.12.2"
          },
          "InstalledVersion": "1.12.2",
          "FixedVersion": "1.13.5, 0.30.3",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-25639",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory npm",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Anpm"
          },
          "Fingerprint": "sha256:185e4eadca40af1c96a07633e1714bdfd539d15e22be656cee267d012e0b11e1",
          "Title": "axios: Axios affected by Denial of Service via __proto__ Key in mergeConfig",
          "Description": "Axios is a promise based HTTP client for the browser and Node.js. Prior to versions 0.30.3 and 1.13.5, the mergeConfig function in axios crashes with a TypeError when processing configuration objects containing __proto__ as an own property. An attacker can trigger this by providing a malicious configuration object created via JSON.parse(), causing complete denial of service. This vulnerability is fixed in versions 0.30.3 and 1.13.5.",
          "Severity": "HIGH",
          "CweIDs": [
            "CWE-754"
          ],
          "VendorSeverity": {
            "ghsa": 3,
            "redhat": 3
          },
          "CVSS": {
            "ghsa": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 7.5
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 7.5
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-25639",
            "https://github.com/axios/axios",
            "https://github.com/axios/axios/commit/28c721588c7a77e7503d0a434e016f852c597b57",
            "https://github.com/axios/axios/commit/d7ff1409c68168d3057fc3891f911b2b92616f9e",
            "https://github.com/axios/axios/pull/7369",
            "https://github.com/axios/axios/pull/7388",
            "https://github.com/axios/axios/releases/tag/v0.30.3",
            "https://github.com/axios/axios/releases/tag/v1.13.5",
            "https://github.com/axios/axios/security/advisories/GHSA-43fc-jf86-j433",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-25639",
            "https://www.cve.org/CVERecord?id=CVE-2026-25639"
          ],
          "PublishedDate": "2026-02-09T21:15:49.01Z",
          "LastModifiedDate": "2026-02-18T18:24:34.12Z"
        },
        {
          "VulnerabilityID": "CVE-2026-33750",
          "VendorIDs": [
            "GHSA-f886-m6hf-6m8v"
          ],
          "PkgID": "brace-expansion@1.1.12",
          "PkgName": "brace-expansion",
          "PkgIdentifier": {
            "PURL": "pkg:npm/brace-expansion@1.1.12",
            "UID": "f15e04daf6e9be30",
            "BOMRef": "pkg:npm/brace-expansion@1.1.12"
          },
          "InstalledVersion": "1.1.12",
          "FixedVersion": "5.0.5, 3.0.2, 2.0.3, 1.1.13",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-33750",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory npm",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Anpm"
          },
          "Fingerprint": "sha256:394a3896a15db60c16b500cd0496318a9d7e9483acbff1c2c70676117951d5e8",
          "Title": "brace-expansion: brace-expansion: Denial of Service via zero step value in brace pattern",
          "Description": "The brace-expansion library generates arbitrary strings containing a common prefix and suffix. Prior to versions 5.0.5, 3.0.2, 2.0.3, and 1.1.13, a brace pattern with a zero step value (e.g., `{1..2..0}`) causes the sequence generation loop to run indefinitely, making the process hang for seconds and allocate heaps of memory. Versions 5.0.5, 3.0.2, 2.0.3, and 1.1.13 fix the issue. As a workaround, sanitize strings passed to `expand()` to ensure a step value of `0` is not used.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-400"
          ],
          "VendorSeverity": {
            "ghsa": 2,
            "redhat": 2
          },
          "CVSS": {
            "ghsa": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
              "V3Score": 6.5
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
              "V3Score": 6.5
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-33750",
            "https://github.com/juliangruber/brace-expansion",
            "https://github.com/juliangruber/brace-expansion/blob/daa71bcb4a30a2df9bcb7f7b8daaf2ab30e5794a/src/index.ts#L107-L113",
            "https://github.com/juliangruber/brace-expansion/blob/daa71bcb4a30a2df9bcb7f7b8daaf2ab30e5794a/src/index.ts#L184",
            "https://github.com/juliangruber/brace-expansion/commit/311ac0d54994158c0a384e286a7d6cbb17ee8ed5",
            "https://github.com/juliangruber/brace-expansion/commit/7fd684f89fdde3549563d0a6522226a9189472a2",
            "https://github.com/juliangruber/brace-expansion/commit/b9cacd9e55e7a1fa588fe4b7bb1159d52f1d902a",
            "https://github.com/juliangruber/brace-expansion/issues/98",
            "https://github.com/juliangruber/brace-expansion/pull/95",
            "https://github.com/juliangruber/brace-expansion/pull/96",
            "https://github.com/juliangruber/brace-expansion/pull/97",
            "https://github.com/juliangruber/brace-expansion/security/advisories/GHSA-f886-m6hf-6m8v",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-33750",
            "https://www.cve.org/CVERecord?id=CVE-2026-33750"
          ],
          "PublishedDate": "2026-03-27T15:16:57.297Z",
          "LastModifiedDate": "2026-03-30T13:26:29.793Z"
        },
        {
          "VulnerabilityID": "CVE-2026-24001",
          "VendorIDs": [
            "GHSA-73rr-hh4g-fpgx"
          ],
          "PkgID": "diff@5.2.0",
          "PkgName": "diff",
          "PkgIdentifier": {
            "PURL": "pkg:npm/diff@5.2.0",
            "UID": "abab9a801902e6cd",
            "BOMRef": "pkg:npm/diff@5.2.0"
          },
          "InstalledVersion": "5.2.0",
          "FixedVersion": "8.0.3, 5.2.2, 4.0.4, 3.5.1",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-24001",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory npm",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Anpm"
          },
          "Fingerprint": "sha256:0577606435d7fe1ef946c676fbe82c462ebb59d485a16daa96f31bb1a3b5f981",
          "Title": "jsdiff: denial of service vulnerability in parsePatch and applyPatch",
          "Description": "jsdiff is a JavaScript text differencing implementation. Prior to versions 8.0.3, 5.2.2, 4.0.4, and 3.5.1, attempting to parse a patch whose filename headers contain the line break characters `\\r`, `\\u2028`, or `\\u2029` can cause the `parsePatch` method to enter an infinite loop. It then consumes memory without limit until the process crashes due to running out of memory. Applications are therefore likely to be vulnerable to a denial-of-service attack if they call `parsePatch` with a user-provided patch as input. A large payload is not needed to trigger the vulnerability, so size limits on user input do not provide any protection. Furthermore, some applications may be vulnerable even when calling `parsePatch` on a patch generated by the application itself if the user is nonetheless able to control the filename headers (e.g. by directly providing the filenames of the files to be diffed). The `applyPatch` method is similarly affected if (and only if) called with a string representation of a patch as an argument, since under the hood it parses that string using `parsePatch`. Other methods of the library are unaffected. Finally, a second and lesser interdependent bug - a ReDOS - also exhibits when those same line break characters are present in a patch's *patch* header (also known as its \"leading garbage\"). A maliciously-crafted patch header of length *n* can take `parsePatch` O(*n*³) time to parse. Versions 8.0.3, 5.2.2, 4.0.4, and 3.5.1 contain a fix. As a workaround, do not attempt to parse patches that contain any of these characters: `\\r`, `\\u2028`, or `\\u2029`.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-400",
            "CWE-1333"
          ],
          "VendorSeverity": {
            "ghsa": 1,
            "nvd": 3,
            "redhat": 3
          },
          "CVSS": {
            "ghsa": {
              "V40Vector": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U",
              "V40Score": 2.7
            },
            "nvd": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 7.5
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 7.5
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-24001",
            "https://github.com/kpdecker/jsdiff",
            "https://github.com/kpdecker/jsdiff/commit/15a1585230748c8ae6f8274c202e0c87309142f5",
            "https://github.com/kpdecker/jsdiff/issues/653",
            "https://github.com/kpdecker/jsdiff/pull/649",
            "https://github.com/kpdecker/jsdiff/security/advisories/GHSA-73rr-hh4g-fpgx",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-24001",
            "https://www.cve.org/CVERecord?id=CVE-2026-24001"
          ],
          "PublishedDate": "2026-01-22T03:15:47.627Z",
          "LastModifiedDate": "2026-03-04T15:23:41.347Z"
        },
        {
          "VulnerabilityID": "CVE-2026-32141",
          "VendorIDs": [
            "GHSA-25h7-pfq9-p65f"
          ],
          "PkgID": "flatted@3.3.3",
          "PkgName": "flatted",
          "PkgIdentifier": {
            "PURL": "pkg:npm/flatted@3.3.3",
            "UID": "513fc9c3d5ab3f5d",
            "BOMRef": "pkg:npm/flatted@3.3.3"
          },
          "InstalledVersion": "3.3.3",
          "FixedVersion": "3.4.0",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-32141",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory npm",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Anpm"
          },
          "Fingerprint": "sha256:62c3e12dd8e11bbdbf17ba7b5a7d0ce88525de9dada4c0116ce2c4f8e730299d",
          "Title": "flatted: flatted: Unbounded recursion DoS in parse() revive phase",
          "Description": "flatted is a circular JSON parser. Prior to 3.4.0, flatted's parse() function uses a recursive revive() phase to resolve circular references in deserialized JSON. When given a crafted payload with deeply nested or self-referential $ indices, the recursion depth is unbounded, causing a stack overflow that crashes the Node.js process. This vulnerability is fixed in 3.4.0.",
          "Severity": "HIGH",
          "CweIDs": [
            "CWE-674"
          ],
          "VendorSeverity": {
            "ghsa": 3,
            "redhat": 3
          },
          "CVSS": {
            "ghsa": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 7.5
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 7.5
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-32141",
            "https://github.com/WebReflection/flatted",
            "https://github.com/WebReflection/flatted/commit/7eb65d857e1a40de11c47461cdbc8541449f0606",
            "https://github.com/WebReflection/flatted/pull/88",
            "https://github.com/WebReflection/flatted/security/advisories/GHSA-25h7-pfq9-p65f",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-32141",
            "https://www.cve.org/CVERecord?id=CVE-2026-32141"
          ],
          "PublishedDate": "2026-03-12T18:16:25.837Z",
          "LastModifiedDate": "2026-03-19T21:07:24.717Z"
        },
        {
          "VulnerabilityID": "CVE-2026-33228",
          "VendorIDs": [
            "GHSA-rf6f-7fwh-wjgh"
          ],
          "PkgID": "flatted@3.3.3",
          "PkgName": "flatted",
          "PkgIdentifier": {
            "PURL": "pkg:npm/flatted@3.3.3",
            "UID": "513fc9c3d5ab3f5d",
            "BOMRef": "pkg:npm/flatted@3.3.3"
          },
          "InstalledVersion": "3.3.3",
          "FixedVersion": "3.4.2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-33228",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory npm",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Anpm"
          },
          "Fingerprint": "sha256:823d0d140d8b884463cc30117479f55fe870b31b07835a9a91af8262c70816d4",
          "Title": "flatted: Flatted: Prototype pollution vulnerability allows arbitrary code execution via crafted JSON.",
          "Description": "flatted is a circular JSON parser. Prior to version 3.4.2, the parse() function in flatted can use attacker-controlled string values from the parsed JSON as direct array index keys, without validating that they are numeric. Since the internal input buffer is a JavaScript Array, accessing it with the key \"__proto__\" returns Array.prototype via the inherited getter. This object is then treated as a legitimate parsed value and assigned as a property of the output object, effectively leaking a live reference to Array.prototype to the consumer. Any code that subsequently writes to that property will pollute the global prototype. This issue has been patched in version 3.4.2.",
          "Severity": "HIGH",
          "CweIDs": [
            "CWE-1321"
          ],
          "VendorSeverity": {
            "ghsa": 3,
            "nvd": 4,
            "redhat": 4
          },
          "CVSS": {
            "ghsa": {
              "V40Vector": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P",
              "V40Score": 8.9
            },
            "nvd": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
              "V3Score": 9.8
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
              "V3Score": 9.8
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-33228",
            "https://github.com/WebReflection/flatted",
            "https://github.com/WebReflection/flatted/commit/885ddcc33cf9657caf38c57c7be45ae1c5272802",
            "https://github.com/WebReflection/flatted/releases/tag/v3.4.2",
            "https://github.com/WebReflection/flatted/security/advisories/GHSA-rf6f-7fwh-wjgh",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-33228",
            "https://www.cve.org/CVERecord?id=CVE-2026-33228"
          ],
          "PublishedDate": "2026-03-20T23:16:46.51Z",
          "LastModifiedDate": "2026-03-23T19:14:31.04Z"
        },
        {
          "VulnerabilityID": "CVE-2026-4800",
          "VendorIDs": [
            "GHSA-r5fr-rjxr-66jc"
          ],
          "PkgID": "lodash@4.17.21",
          "PkgName": "lodash",
          "PkgIdentifier": {
            "PURL": "pkg:npm/lodash@4.17.21",
            "UID": "aa797d58a1ab2143",
            "BOMRef": "pkg:npm/lodash@4.17.21"
          },
          "InstalledVersion": "4.17.21",
          "FixedVersion": "4.18.0",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-4800",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory npm",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Anpm"
          },
          "Fingerprint": "sha256:76703af5c40ea26eb6a807312fa41989bfbf01a94ac661b1d38af00b97203bff",
          "Title": "lodash: lodash: Arbitrary code execution via untrusted input in template imports",
          "Description": "Impact:\n\nThe fix for CVE-2021-23337 (https://github.com/advisories/GHSA-35jh-r3h4-6jhm) added validation for the variable option in _.template but did not apply the same validation to options.imports key names. Both paths flow into the same Function() constructor sink.\n\nWhen an application passes untrusted input as options.imports key names, an attacker can inject default-parameter expressions that execute arbitrary code at template compilation time.\n\nAdditionally, _.template uses assignInWith to merge imports, which enumerates inherited properties via for..in. If Object.prototype has been polluted by any other vector, the polluted keys are copied into the imports object and passed to Function().\n\nPatches:\n\nUsers should upgrade to version 4.18.0.\n\nWorkarounds:\n\nDo not pass untrusted input as key names in options.imports. Only use developer-controlled, static key names.",
          "Severity": "HIGH",
          "CweIDs": [
            "CWE-94"
          ],
          "VendorSeverity": {
            "ghsa": 3,
            "redhat": 3
          },
          "CVSS": {
            "ghsa": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
              "V3Score": 8.1
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
              "V3Score": 8.1
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-4800",
            "https://cna.openjsf.org/security-advisories.html",
            "https://github.com/advisories/GHSA-35jh-r3h4-6jhm",
            "https://github.com/lodash/lodash",
            "https://github.com/lodash/lodash/commit/3469357cff396a26c363f8c1b5a91dde28ba4b1c",
            "https://github.com/lodash/lodash/security/advisories/GHSA-r5fr-rjxr-66jc",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-4800",
            "https://www.cve.org/CVERecord?id=CVE-2026-4800"
          ],
          "PublishedDate": "2026-03-31T20:16:29.66Z",
          "LastModifiedDate": "2026-04-01T14:23:37.727Z"
        },
        {
          "VulnerabilityID": "CVE-2025-13465",
          "VendorIDs": [
            "GHSA-xxjr-mmjv-4gpg"
          ],
          "PkgID": "lodash@4.17.21",
          "PkgName": "lodash",
          "PkgIdentifier": {
            "PURL": "pkg:npm/lodash@4.17.21",
            "UID": "aa797d58a1ab2143",
            "BOMRef": "pkg:npm/lodash@4.17.21"
          },
          "InstalledVersion": "4.17.21",
          "FixedVersion": "4.17.23",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-13465",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory npm",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Anpm"
          },
          "Fingerprint": "sha256:ad15e270fc40b402e03c1888c2eb0a67e44dab4d4e014f6718c386cfb98744a8",
          "Title": "lodash: prototype pollution in _.unset and _.omit functions",
          "Description": "Lodash versions 4.0.0 through 4.17.22 are vulnerable to prototype pollution in the _.unset and _.omit functions. An attacker can pass crafted paths which cause Lodash to delete methods from global prototypes.\n\nThe issue permits deletion of properties but does not allow overwriting their original behavior.\n\nThis issue is patched on 4.17.23",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-1321"
          ],
          "VendorSeverity": {
            "alma": 3,
            "ghsa": 2,
            "nvd": 2,
            "oracle-oval": 3,
            "redhat": 3
          },
          "CVSS": {
            "ghsa": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
              "V40Vector": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:H/SI:H/SA:H/E:P",
              "V3Score": 6.5,
              "V40Score": 6.9
            },
            "nvd": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
              "V3Score": 5.3
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
              "V3Score": 8.2
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:2452",
            "https://access.redhat.com/security/cve/CVE-2025-13465",
            "https://bugzilla.redhat.com/2431740",
            "https://errata.almalinux.org/9/ALSA-2026-2452.html",
            "https://github.com/lodash/lodash",
            "https://github.com/lodash/lodash/commit/edadd452146f7e4bad4ea684e955708931d84d81",
            "https://github.com/lodash/lodash/security/advisories/GHSA-xxjr-mmjv-4gpg",
            "https://linux.oracle.com/cve/CVE-2025-13465.html",
            "https://linux.oracle.com/errata/ELSA-2026-2452.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-13465",
            "https://www.cve.org/CVERecord?id=CVE-2025-13465"
          ],
          "PublishedDate": "2026-01-21T20:16:05.25Z",
          "LastModifiedDate": "2026-02-17T17:10:07.52Z"
        },
        {
          "VulnerabilityID": "CVE-2026-2950",
          "VendorIDs": [
            "GHSA-f23m-r3pf-42rh"
          ],
          "PkgID": "lodash@4.17.21",
          "PkgName": "lodash",
          "PkgIdentifier": {
            "PURL": "pkg:npm/lodash@4.17.21",
            "UID": "aa797d58a1ab2143",
            "BOMRef": "pkg:npm/lodash@4.17.21"
          },
          "InstalledVersion": "4.17.21",
          "FixedVersion": "4.18.0",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-2950",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory npm",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Anpm"
          },
          "Fingerprint": "sha256:a5faf7fc43c1ae4c271c49693e56e6b40902104b09133773535b249fb8e9bad7",
          "Title": "Impact:  Lodash versions 4.17.23 and earlier are vulnerable to prototy ...",
          "Description": "Impact:\n\nLodash versions 4.17.23 and earlier are vulnerable to prototype pollution in the _.unset and _.omit functions. The fix for (CVE-2025-13465: https://github.com/lodash/lodash/security/advisories/GHSA-xxjr-mmjv-4gpg) only guards against string key members, so an attacker can bypass the check by passing array-wrapped path segments. This allows deletion of properties from built-in prototypes such as Object.prototype, Number.prototype, and String.prototype.\n\nThe issue permits deletion of prototype properties but does not allow overwriting their original behavior.\n\nPatches:\n\nThis issue is patched in 4.18.0.\n\nWorkarounds:\n\nNone. Upgrade to the patched version.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-1321"
          ],
          "VendorSeverity": {
            "ghsa": 2
          },
          "CVSS": {
            "ghsa": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
              "V3Score": 6.5
            }
          },
          "References": [
            "https://github.com/lodash/lodash",
            "https://github.com/lodash/lodash/security/advisories/GHSA-f23m-r3pf-42rh",
            "https://github.com/lodash/lodash/security/advisories/GHSA-xxjr-mmjv-4gpg",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-2950"
          ],
          "PublishedDate": "2026-03-31T20:16:26.207Z",
          "LastModifiedDate": "2026-04-01T14:23:37.727Z"
        },
        {
          "VulnerabilityID": "CVE-2026-4800",
          "VendorIDs": [
            "GHSA-r5fr-rjxr-66jc"
          ],
          "PkgID": "lodash-es@4.17.21",
          "PkgName": "lodash-es",
          "PkgIdentifier": {
            "PURL": "pkg:npm/lodash-es@4.17.21",
            "UID": "26a945d215b3e07a",
            "BOMRef": "pkg:npm/lodash-es@4.17.21"
          },
          "InstalledVersion": "4.17.21",
          "FixedVersion": "4.18.0",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-4800",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory npm",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Anpm"
          },
          "Fingerprint": "sha256:623635b41681043e00bcfb4205f2eebc762ee4bdcfd67e9875bea8dd3ae82296",
          "Title": "lodash: lodash: Arbitrary code execution via untrusted input in template imports",
          "Description": "Impact:\n\nThe fix for CVE-2021-23337 (https://github.com/advisories/GHSA-35jh-r3h4-6jhm) added validation for the variable option in _.template but did not apply the same validation to options.imports key names. Both paths flow into the same Function() constructor sink.\n\nWhen an application passes untrusted input as options.imports key names, an attacker can inject default-parameter expressions that execute arbitrary code at template compilation time.\n\nAdditionally, _.template uses assignInWith to merge imports, which enumerates inherited properties via for..in. If Object.prototype has been polluted by any other vector, the polluted keys are copied into the imports object and passed to Function().\n\nPatches:\n\nUsers should upgrade to version 4.18.0.\n\nWorkarounds:\n\nDo not pass untrusted input as key names in options.imports. Only use developer-controlled, static key names.",
          "Severity": "HIGH",
          "CweIDs": [
            "CWE-94"
          ],
          "VendorSeverity": {
            "ghsa": 3,
            "redhat": 3
          },
          "CVSS": {
            "ghsa": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
              "V3Score": 8.1
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
              "V3Score": 8.1
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-4800",
            "https://cna.openjsf.org/security-advisories.html",
            "https://github.com/advisories/GHSA-35jh-r3h4-6jhm",
            "https://github.com/lodash/lodash",
            "https://github.com/lodash/lodash/commit/3469357cff396a26c363f8c1b5a91dde28ba4b1c",
            "https://github.com/lodash/lodash/security/advisories/GHSA-r5fr-rjxr-66jc",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-4800",
            "https://www.cve.org/CVERecord?id=CVE-2026-4800"
          ],
          "PublishedDate": "2026-03-31T20:16:29.66Z",
          "LastModifiedDate": "2026-04-01T14:23:37.727Z"
        },
        {
          "VulnerabilityID": "CVE-2025-13465",
          "VendorIDs": [
            "GHSA-xxjr-mmjv-4gpg"
          ],
          "PkgID": "lodash-es@4.17.21",
          "PkgName": "lodash-es",
          "PkgIdentifier": {
            "PURL": "pkg:npm/lodash-es@4.17.21",
            "UID": "26a945d215b3e07a",
            "BOMRef": "pkg:npm/lodash-es@4.17.21"
          },
          "InstalledVersion": "4.17.21",
          "FixedVersion": "4.17.23",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-13465",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory npm",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Anpm"
          },
          "Fingerprint": "sha256:c346f338e703f2e58c3776398600f6fc207276fde19b4303cddd4b6498982a3d",
          "Title": "lodash: prototype pollution in _.unset and _.omit functions",
          "Description": "Lodash versions 4.0.0 through 4.17.22 are vulnerable to prototype pollution in the _.unset and _.omit functions. An attacker can pass crafted paths which cause Lodash to delete methods from global prototypes.\n\nThe issue permits deletion of properties but does not allow overwriting their original behavior.\n\nThis issue is patched on 4.17.23",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-1321"
          ],
          "VendorSeverity": {
            "alma": 3,
            "ghsa": 2,
            "nvd": 2,
            "oracle-oval": 3,
            "redhat": 3
          },
          "CVSS": {
            "ghsa": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
              "V40Vector": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:H/SI:H/SA:H/E:P",
              "V3Score": 6.5,
              "V40Score": 6.9
            },
            "nvd": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
              "V3Score": 5.3
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
              "V3Score": 8.2
            }
          },
          "References": [
            "https://access.redhat.com/errata/RHSA-2026:2452",
            "https://access.redhat.com/security/cve/CVE-2025-13465",
            "https://bugzilla.redhat.com/2431740",
            "https://errata.almalinux.org/9/ALSA-2026-2452.html",
            "https://github.com/lodash/lodash",
            "https://github.com/lodash/lodash/commit/edadd452146f7e4bad4ea684e955708931d84d81",
            "https://github.com/lodash/lodash/security/advisories/GHSA-xxjr-mmjv-4gpg",
            "https://linux.oracle.com/cve/CVE-2025-13465.html",
            "https://linux.oracle.com/errata/ELSA-2026-2452.html",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-13465",
            "https://www.cve.org/CVERecord?id=CVE-2025-13465"
          ],
          "PublishedDate": "2026-01-21T20:16:05.25Z",
          "LastModifiedDate": "2026-02-17T17:10:07.52Z"
        },
        {
          "VulnerabilityID": "CVE-2026-2950",
          "VendorIDs": [
            "GHSA-f23m-r3pf-42rh"
          ],
          "PkgID": "lodash-es@4.17.21",
          "PkgName": "lodash-es",
          "PkgIdentifier": {
            "PURL": "pkg:npm/lodash-es@4.17.21",
            "UID": "26a945d215b3e07a",
            "BOMRef": "pkg:npm/lodash-es@4.17.21"
          },
          "InstalledVersion": "4.17.21",
          "FixedVersion": "4.18.0",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-2950",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory npm",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Anpm"
          },
          "Fingerprint": "sha256:f4a9ec48ff3220094ce55ab67993f7215e46fde18298567b094eae37dd81b608",
          "Title": "Impact:  Lodash versions 4.17.23 and earlier are vulnerable to prototy ...",
          "Description": "Impact:\n\nLodash versions 4.17.23 and earlier are vulnerable to prototype pollution in the _.unset and _.omit functions. The fix for (CVE-2025-13465: https://github.com/lodash/lodash/security/advisories/GHSA-xxjr-mmjv-4gpg) only guards against string key members, so an attacker can bypass the check by passing array-wrapped path segments. This allows deletion of properties from built-in prototypes such as Object.prototype, Number.prototype, and String.prototype.\n\nThe issue permits deletion of prototype properties but does not allow overwriting their original behavior.\n\nPatches:\n\nThis issue is patched in 4.18.0.\n\nWorkarounds:\n\nNone. Upgrade to the patched version.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-1321"
          ],
          "VendorSeverity": {
            "ghsa": 2
          },
          "CVSS": {
            "ghsa": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
              "V3Score": 6.5
            }
          },
          "References": [
            "https://github.com/lodash/lodash",
            "https://github.com/lodash/lodash/security/advisories/GHSA-f23m-r3pf-42rh",
            "https://github.com/lodash/lodash/security/advisories/GHSA-xxjr-mmjv-4gpg",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-2950"
          ],
          "PublishedDate": "2026-03-31T20:16:26.207Z",
          "LastModifiedDate": "2026-04-01T14:23:37.727Z"
        },
        {
          "VulnerabilityID": "CVE-2026-26996",
          "VendorIDs": [
            "GHSA-3ppc-4f35-3m26"
          ],
          "PkgID": "minimatch@3.1.2",
          "PkgName": "minimatch",
          "PkgIdentifier": {
            "PURL": "pkg:npm/minimatch@3.1.2",
            "UID": "7fde2789f7379188",
            "BOMRef": "pkg:npm/minimatch@3.1.2"
          },
          "InstalledVersion": "3.1.2",
          "FixedVersion": "10.2.1, 9.0.6, 8.0.5, 7.4.7, 6.2.1, 5.1.7, 4.2.4, 3.1.3",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-26996",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory npm",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Anpm"
          },
          "Fingerprint": "sha256:f6d0828911f78c6328a53b27b810bcbcbb78dadf0d4842cc827bcf1bdf1202af",
          "Title": "minimatch: minimatch: Denial of Service via specially crafted glob patterns",
          "Description": "minimatch is a minimal matching utility for converting glob expressions into JavaScript RegExp objects. Versions 10.2.0 and below are vulnerable to Regular Expression Denial of Service (ReDoS) when a glob pattern contains many consecutive * wildcards followed by a literal character that doesn't appear in the test string. Each * compiles to a separate [^/]*? regex group, and when the match fails, V8's regex engine backtracks exponentially across all possible splits. The time complexity is O(4^N) where N is the number of * characters. With N=15, a single minimatch() call takes ~2 seconds. With N=34, it hangs effectively forever. Any application that passes user-controlled strings to minimatch() as the pattern argument is vulnerable to DoS. This issue has been fixed in version 10.2.1.",
          "Severity": "HIGH",
          "CweIDs": [
            "CWE-1333"
          ],
          "VendorSeverity": {
            "ghsa": 3,
            "nvd": 3,
            "redhat": 2
          },
          "CVSS": {
            "ghsa": {
              "V40Vector": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
              "V40Score": 8.7
            },
            "nvd": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 7.5
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
              "V3Score": 6.5
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-26996",
            "https://github.com/isaacs/minimatch",
            "https://github.com/isaacs/minimatch/commit/2e111f3a79abc00fa73110195de2c0f2351904f5",
            "https://github.com/isaacs/minimatch/security/advisories/GHSA-3ppc-4f35-3m26",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-26996",
            "https://www.cve.org/CVERecord?id=CVE-2026-26996"
          ],
          "PublishedDate": "2026-02-20T03:16:01.62Z",
          "LastModifiedDate": "2026-03-06T21:32:10.65Z"
        },
        {
          "VulnerabilityID": "CVE-2026-27903",
          "VendorIDs": [
            "GHSA-7r86-cg39-jmmj"
          ],
          "PkgID": "minimatch@3.1.2",
          "PkgName": "minimatch",
          "PkgIdentifier": {
            "PURL": "pkg:npm/minimatch@3.1.2",
            "UID": "7fde2789f7379188",
            "BOMRef": "pkg:npm/minimatch@3.1.2"
          },
          "InstalledVersion": "3.1.2",
          "FixedVersion": "10.2.3, 9.0.7, 8.0.6, 7.4.8, 6.2.2, 5.1.8, 4.2.5, 3.1.3",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-27903",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory npm",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Anpm"
          },
          "Fingerprint": "sha256:9cb4fe9ed317eb6e07b3184ecbc32e154ebc08a5a24460170fcfdf6627a7d9de",
          "Title": "minimatch: minimatch: Denial of Service due to unbounded recursive backtracking via crafted glob patterns",
          "Description": "minimatch is a minimal matching utility for converting glob expressions into JavaScript RegExp objects. Prior to version 10.2.3, 9.0.7, 8.0.6, 7.4.8, 6.2.2, 5.1.8, 4.2.5, and 3.1.3, `matchOne()` performs unbounded recursive backtracking when a glob pattern contains multiple non-adjacent `**` (GLOBSTAR) segments and the input path does not match. The time complexity is O(C(n, k)) -- binomial -- where `n` is the number of path segments and `k` is the number of globstars. With k=11 and n=30, a call to the default `minimatch()` API stalls for roughly 5 seconds. With k=13, it exceeds 15 seconds. No memoization or call budget exists to bound this behavior. Any application where an attacker can influence the glob pattern passed to `minimatch()` is vulnerable. The realistic attack surface includes build tools and task runners that accept user-supplied glob arguments (ESLint, Webpack, Rollup config), multi-tenant systems where one tenant configures glob-based rules that run in a shared process, admin or developer interfaces that accept ignore-rule or filter configuration as globs, and CI/CD pipelines that evaluate user-submitted config files containing glob patterns. An attacker who can place a crafted pattern into any of these paths can stall the Node.js event loop for tens of seconds per invocation. The pattern is 56 bytes for a 5-second stall and does not require authentication in contexts where pattern input is part of the feature. Versions 10.2.3, 9.0.7, 8.0.6, 7.4.8, 6.2.2, 5.1.8, 4.2.5, and 3.1.3 fix the issue.",
          "Severity": "HIGH",
          "CweIDs": [
            "CWE-407"
          ],
          "VendorSeverity": {
            "ghsa": 3,
            "redhat": 2
          },
          "CVSS": {
            "ghsa": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 7.5
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 5.9
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-27903",
            "https://github.com/isaacs/minimatch",
            "https://github.com/isaacs/minimatch/commit/0bf499aa45f5059b56809cc3b75ff3eafeb8d748",
            "https://github.com/isaacs/minimatch/security/advisories/GHSA-7r86-cg39-jmmj",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-27903",
            "https://www.cve.org/CVERecord?id=CVE-2026-27903"
          ],
          "PublishedDate": "2026-02-26T02:16:21.353Z",
          "LastModifiedDate": "2026-02-27T17:21:22.37Z"
        },
        {
          "VulnerabilityID": "CVE-2026-27904",
          "VendorIDs": [
            "GHSA-23c5-xmqv-rm74"
          ],
          "PkgID": "minimatch@3.1.2",
          "PkgName": "minimatch",
          "PkgIdentifier": {
            "PURL": "pkg:npm/minimatch@3.1.2",
            "UID": "7fde2789f7379188",
            "BOMRef": "pkg:npm/minimatch@3.1.2"
          },
          "InstalledVersion": "3.1.2",
          "FixedVersion": "10.2.3, 9.0.7, 8.0.6, 7.4.8, 6.2.2, 5.1.8, 4.2.5, 3.1.4",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-27904",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory npm",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Anpm"
          },
          "Fingerprint": "sha256:414cb9f02fe18fb23936419fb2e181eb42da3da0f291f016a97056426d32538d",
          "Title": "minimatch: Minimatch: Denial of Service via catastrophic backtracking in glob expressions",
          "Description": "minimatch is a minimal matching utility for converting glob expressions into JavaScript RegExp objects. Prior to version 10.2.3, 9.0.7, 8.0.6, 7.4.8, 6.2.2, 5.1.8, 4.2.5, and 3.1.4, nested `*()` extglobs produce regexps with nested unbounded quantifiers (e.g. `(?:(?:a|b)*)*`), which exhibit catastrophic backtracking in V8. With a 12-byte pattern `*(*(*(a|b)))` and an 18-byte non-matching input, `minimatch()` stalls for over 7 seconds. Adding a single nesting level or a few input characters pushes this to minutes. This is the most severe finding: it is triggered by the default `minimatch()` API with no special options, and the minimum viable pattern is only 12 bytes. The same issue affects `+()` extglobs equally. Versions 10.2.3, 9.0.7, 8.0.6, 7.4.8, 6.2.2, 5.1.8, 4.2.5, and 3.1.4 fix the issue.",
          "Severity": "HIGH",
          "CweIDs": [
            "CWE-1333"
          ],
          "VendorSeverity": {
            "ghsa": 3,
            "redhat": 2
          },
          "CVSS": {
            "ghsa": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 7.5
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
              "V3Score": 6.5
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-27904",
            "https://github.com/isaacs/minimatch",
            "https://github.com/isaacs/minimatch/commit/11d0df6165d15a955462316b26d52e5efae06fce",
            "https://github.com/isaacs/minimatch/security/advisories/GHSA-23c5-xmqv-rm74",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-27904",
            "https://www.cve.org/CVERecord?id=CVE-2026-27904"
          ],
          "PublishedDate": "2026-02-26T02:16:21.76Z",
          "LastModifiedDate": "2026-02-27T17:16:23.773Z"
        },
        {
          "VulnerabilityID": "CVE-2026-33671",
          "VendorIDs": [
            "GHSA-c2c7-rcm5-vvqj"
          ],
          "PkgID": "picomatch@2.3.1",
          "PkgName": "picomatch",
          "PkgIdentifier": {
            "PURL": "pkg:npm/picomatch@2.3.1",
            "UID": "99e905a9b61e7d86",
            "BOMRef": "0c0b0539-db5b-4022-9b3a-64dff7b57abc"
          },
          "InstalledVersion": "2.3.1",
          "FixedVersion": "4.0.4, 3.0.2, 2.3.2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-33671",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory npm",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Anpm"
          },
          "Fingerprint": "sha256:5f32ca997dc089571229582624a2b4c035b1e8bfe8267e0ed2e966def3ec67d9",
          "Title": "picomatch: Picomatch: Regular Expression Denial of Service via crafted extglob patterns",
          "Description": "Picomatch is a glob matcher written JavaScript. Versions prior to 4.0.4, 3.0.2, and 2.3.2 are vulnerable to Regular Expression Denial of Service (ReDoS) when processing crafted extglob patterns. Certain patterns using extglob quantifiers such as `+()` and `*()`, especially when combined with overlapping alternatives or nested extglobs, are compiled into regular expressions that can exhibit catastrophic backtracking on non-matching input. Applications are impacted when they allow untrusted users to supply glob patterns that are passed to `picomatch` for compilation or matching. In those cases, an attacker can cause excessive CPU consumption and block the Node.js event loop, resulting in a denial of service. Applications that only use trusted, developer-controlled glob patterns are much less likely to be exposed in a security-relevant way. This issue is fixed in picomatch 4.0.4, 3.0.2 and 2.3.2. Users should upgrade to one of these versions or later, depending on their supported release line. If upgrading is not immediately possible, avoid passing untrusted glob patterns to `picomatch`. Possible mitigations include disabling extglob support for untrusted patterns by using `noextglob: true`, rejecting or sanitizing patterns containing nested extglobs or extglob quantifiers such as `+()` and `*()`, enforcing strict allowlists for accepted pattern syntax, running matching in an isolated worker or separate process with time and resource limits, and applying application-level request throttling and input validation for any endpoint that accepts glob patterns.",
          "Severity": "HIGH",
          "CweIDs": [
            "CWE-1333"
          ],
          "VendorSeverity": {
            "ghsa": 3,
            "redhat": 2
          },
          "CVSS": {
            "ghsa": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 7.5
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 6.5
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-33671",
            "https://github.com/micromatch/picomatch",
            "https://github.com/micromatch/picomatch/commit/5eceecd27543b8e056b9307d69e105ea03618a7d",
            "https://github.com/micromatch/picomatch/security/advisories/GHSA-c2c7-rcm5-vvqj",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-33671",
            "https://www.cve.org/CVERecord?id=CVE-2026-33671"
          ],
          "PublishedDate": "2026-03-26T22:16:30.21Z",
          "LastModifiedDate": "2026-04-01T13:45:11.687Z"
        },
        {
          "VulnerabilityID": "CVE-2026-33672",
          "VendorIDs": [
            "GHSA-3v7f-55p6-f55p"
          ],
          "PkgID": "picomatch@2.3.1",
          "PkgName": "picomatch",
          "PkgIdentifier": {
            "PURL": "pkg:npm/picomatch@2.3.1",
            "UID": "99e905a9b61e7d86",
            "BOMRef": "0c0b0539-db5b-4022-9b3a-64dff7b57abc"
          },
          "InstalledVersion": "2.3.1",
          "FixedVersion": "4.0.4, 3.0.2, 2.3.2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-33672",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory npm",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Anpm"
          },
          "Fingerprint": "sha256:7de110acdc840aea538fe6155c80f530db0a1c9eb1e178236e2f172606c310b8",
          "Title": "picomatch: Picomatch: Data integrity compromised via method injection with crafted POSIX bracket expressions",
          "Description": "Picomatch is a glob matcher written JavaScript. Versions prior to 4.0.4, 3.0.2, and 2.3.2 are vulnerable to a method injection vulnerability affecting the `POSIX_REGEX_SOURCE` object. Because the object inherits from `Object.prototype`, specially crafted POSIX bracket expressions (e.g., `[[:constructor:]]`) can reference inherited method names. These methods are implicitly converted to strings and injected into the generated regular expression. This leads to incorrect glob matching behavior (integrity impact), where patterns may match unintended filenames. The issue does not enable remote code execution, but it can cause security-relevant logic errors in applications that rely on glob matching for filtering, validation, or access control. All users of affected `picomatch` versions that process untrusted or user-controlled glob patterns are potentially impacted. This issue is fixed in picomatch 4.0.4, 3.0.2 and 2.3.2. Users should upgrade to one of these versions or later, depending on their supported release line. If upgrading is not immediately possible, avoid passing untrusted glob patterns to picomatch. Possible mitigations include sanitizing or rejecting untrusted glob patterns, especially those containing POSIX character classes like `[[:...:]]`; avoiding the use of POSIX bracket expressions if user input is involved; and manually patching the library by modifying `POSIX_REGEX_SOURCE` to use a null prototype.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-1321"
          ],
          "VendorSeverity": {
            "ghsa": 2,
            "redhat": 2
          },
          "CVSS": {
            "ghsa": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
              "V3Score": 5.3
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
              "V3Score": 5.3
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-33672",
            "https://github.com/micromatch/picomatch",
            "https://github.com/micromatch/picomatch/commit/4516eb521f13a46b2fe1a1d2c9ef6b20ddc0e903",
            "https://github.com/micromatch/picomatch/security/advisories/GHSA-3v7f-55p6-f55p",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-33672",
            "https://www.cve.org/CVERecord?id=CVE-2026-33672"
          ],
          "PublishedDate": "2026-03-26T22:16:30.387Z",
          "LastModifiedDate": "2026-04-01T13:44:53.397Z"
        },
        {
          "VulnerabilityID": "CVE-2026-33671",
          "VendorIDs": [
            "GHSA-c2c7-rcm5-vvqj"
          ],
          "PkgID": "picomatch@4.0.2",
          "PkgName": "picomatch",
          "PkgIdentifier": {
            "PURL": "pkg:npm/picomatch@4.0.2",
            "UID": "8feaeb3e801e5539",
            "BOMRef": "pkg:npm/picomatch@4.0.2"
          },
          "InstalledVersion": "4.0.2",
          "FixedVersion": "4.0.4, 3.0.2, 2.3.2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-33671",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory npm",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Anpm"
          },
          "Fingerprint": "sha256:8b083fb1a0c84cf4604a0fd0758a1cd4815e276677288cc520e6ca9a10845fbe",
          "Title": "picomatch: Picomatch: Regular Expression Denial of Service via crafted extglob patterns",
          "Description": "Picomatch is a glob matcher written JavaScript. Versions prior to 4.0.4, 3.0.2, and 2.3.2 are vulnerable to Regular Expression Denial of Service (ReDoS) when processing crafted extglob patterns. Certain patterns using extglob quantifiers such as `+()` and `*()`, especially when combined with overlapping alternatives or nested extglobs, are compiled into regular expressions that can exhibit catastrophic backtracking on non-matching input. Applications are impacted when they allow untrusted users to supply glob patterns that are passed to `picomatch` for compilation or matching. In those cases, an attacker can cause excessive CPU consumption and block the Node.js event loop, resulting in a denial of service. Applications that only use trusted, developer-controlled glob patterns are much less likely to be exposed in a security-relevant way. This issue is fixed in picomatch 4.0.4, 3.0.2 and 2.3.2. Users should upgrade to one of these versions or later, depending on their supported release line. If upgrading is not immediately possible, avoid passing untrusted glob patterns to `picomatch`. Possible mitigations include disabling extglob support for untrusted patterns by using `noextglob: true`, rejecting or sanitizing patterns containing nested extglobs or extglob quantifiers such as `+()` and `*()`, enforcing strict allowlists for accepted pattern syntax, running matching in an isolated worker or separate process with time and resource limits, and applying application-level request throttling and input validation for any endpoint that accepts glob patterns.",
          "Severity": "HIGH",
          "CweIDs": [
            "CWE-1333"
          ],
          "VendorSeverity": {
            "ghsa": 3,
            "redhat": 2
          },
          "CVSS": {
            "ghsa": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 7.5
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 6.5
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-33671",
            "https://github.com/micromatch/picomatch",
            "https://github.com/micromatch/picomatch/commit/5eceecd27543b8e056b9307d69e105ea03618a7d",
            "https://github.com/micromatch/picomatch/security/advisories/GHSA-c2c7-rcm5-vvqj",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-33671",
            "https://www.cve.org/CVERecord?id=CVE-2026-33671"
          ],
          "PublishedDate": "2026-03-26T22:16:30.21Z",
          "LastModifiedDate": "2026-04-01T13:45:11.687Z"
        },
        {
          "VulnerabilityID": "CVE-2026-33672",
          "VendorIDs": [
            "GHSA-3v7f-55p6-f55p"
          ],
          "PkgID": "picomatch@4.0.2",
          "PkgName": "picomatch",
          "PkgIdentifier": {
            "PURL": "pkg:npm/picomatch@4.0.2",
            "UID": "8feaeb3e801e5539",
            "BOMRef": "pkg:npm/picomatch@4.0.2"
          },
          "InstalledVersion": "4.0.2",
          "FixedVersion": "4.0.4, 3.0.2, 2.3.2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-33672",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory npm",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Anpm"
          },
          "Fingerprint": "sha256:bfc39bce56c7be2c53abfbd483662a91e9f597802bda36194204fe465306a8ea",
          "Title": "picomatch: Picomatch: Data integrity compromised via method injection with crafted POSIX bracket expressions",
          "Description": "Picomatch is a glob matcher written JavaScript. Versions prior to 4.0.4, 3.0.2, and 2.3.2 are vulnerable to a method injection vulnerability affecting the `POSIX_REGEX_SOURCE` object. Because the object inherits from `Object.prototype`, specially crafted POSIX bracket expressions (e.g., `[[:constructor:]]`) can reference inherited method names. These methods are implicitly converted to strings and injected into the generated regular expression. This leads to incorrect glob matching behavior (integrity impact), where patterns may match unintended filenames. The issue does not enable remote code execution, but it can cause security-relevant logic errors in applications that rely on glob matching for filtering, validation, or access control. All users of affected `picomatch` versions that process untrusted or user-controlled glob patterns are potentially impacted. This issue is fixed in picomatch 4.0.4, 3.0.2 and 2.3.2. Users should upgrade to one of these versions or later, depending on their supported release line. If upgrading is not immediately possible, avoid passing untrusted glob patterns to picomatch. Possible mitigations include sanitizing or rejecting untrusted glob patterns, especially those containing POSIX character classes like `[[:...:]]`; avoiding the use of POSIX bracket expressions if user input is involved; and manually patching the library by modifying `POSIX_REGEX_SOURCE` to use a null prototype.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-1321"
          ],
          "VendorSeverity": {
            "ghsa": 2,
            "redhat": 2
          },
          "CVSS": {
            "ghsa": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
              "V3Score": 5.3
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
              "V3Score": 5.3
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-33672",
            "https://github.com/micromatch/picomatch",
            "https://github.com/micromatch/picomatch/commit/4516eb521f13a46b2fe1a1d2c9ef6b20ddc0e903",
            "https://github.com/micromatch/picomatch/security/advisories/GHSA-3v7f-55p6-f55p",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-33672",
            "https://www.cve.org/CVERecord?id=CVE-2026-33672"
          ],
          "PublishedDate": "2026-03-26T22:16:30.387Z",
          "LastModifiedDate": "2026-04-01T13:44:53.397Z"
        },
        {
          "VulnerabilityID": "CVE-2026-22028",
          "VendorIDs": [
            "GHSA-36hm-qxxp-pg3m"
          ],
          "PkgID": "preact@10.26.9",
          "PkgName": "preact",
          "PkgIdentifier": {
            "PURL": "pkg:npm/preact@10.26.9",
            "UID": "41d467b119f9db88",
            "BOMRef": "pkg:npm/preact@10.26.9"
          },
          "InstalledVersion": "10.26.9",
          "FixedVersion": "10.26.10, 10.27.3, 10.28.2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-22028",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory npm",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Anpm"
          },
          "Fingerprint": "sha256:936e2087d6644b543349047139e5971dba652555b895489031083f255ee7cd44",
          "Title": "preact: Preact: Arbitrary script execution via JSON serialization protection bypass",
          "Description": "Preact, a lightweight web development framework, JSON serialization protection to prevent Virtual DOM elements from being constructed from arbitrary JSON. A regression introduced in Preact 10.26.5 caused this protection to be softened. In applications where values from JSON payloads are assumed to be strings and passed unmodified to Preact as children, a specially-crafted JSON payload could be constructed that would be incorrectly treated as a valid VNode. When this chain of failures occurs it can result in HTML injection, which can allow arbitrary script execution if not mitigated by CSP or other means. Applications using affected Preact versions are vulnerable if they meet all of the following conditions: first, pass unmodified, unsanitized values from user-modifiable data sources (APIs, databases, local storage, etc.) directly into the render tree; second assume these values are strings but the data source could return actual JavaScript objects instead of JSON strings; and third, the data source either fails to perform type sanitization AND blindly stores/returns raw objects interchangeably with strings, OR is compromised (e.g., poisoned local storage, filesystem, or database). Versions 10.26.10, 10.27.3, and 10.28.2 patch the issue. The patch versions restore the previous strict equality checks that prevent JSON-parsed objects from being treated as valid VNodes. Other mitigations are available for those who cannot immediately upgrade. Validate input types, cast or validate network data, sanitize external data, and use Content Security Policy (CSP).",
          "Severity": "HIGH",
          "CweIDs": [
            "CWE-843"
          ],
          "VendorSeverity": {
            "ghsa": 3,
            "nvd": 2,
            "redhat": 2
          },
          "CVSS": {
            "ghsa": {
              "V40Vector": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U",
              "V40Score": 7.2
            },
            "nvd": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
              "V3Score": 6.1
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
              "V3Score": 6.1
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-22028",
            "https://github.com/preactjs/preact",
            "https://github.com/preactjs/preact/security/advisories/GHSA-36hm-qxxp-pg3m",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-22028",
            "https://www.cve.org/CVERecord?id=CVE-2026-22028"
          ],
          "PublishedDate": "2026-01-08T15:15:44.853Z",
          "LastModifiedDate": "2026-01-12T18:58:38.207Z"
        },
        {
          "VulnerabilityID": "CVE-2025-68470",
          "VendorIDs": [
            "GHSA-9jcx-v3wj-wh4m"
          ],
          "PkgID": "react-router@6.30.1",
          "PkgName": "react-router",
          "PkgIdentifier": {
            "PURL": "pkg:npm/react-router@6.30.1",
            "UID": "a174e4cd084f038e",
            "BOMRef": "pkg:npm/react-router@6.30.1"
          },
          "InstalledVersion": "6.30.1",
          "FixedVersion": "6.30.2, 7.9.6",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-68470",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory npm",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Anpm"
          },
          "Fingerprint": "sha256:1f584cae03602051f743ca5aa1e173f7cc510ce2be3dccb511cf85bbf21bf8cb",
          "Title": "react-router: React Router unexpected external redirect",
          "Description": "React Router is a router for React. In versions 6.0.0 through 6.30.1 and 7.0.0 through 7.9.5, an attacker-supplied path can be crafted so that when a React Router application navigates to it via navigate(), \u003cLink\u003e, or redirect(), the app performs a navigation/redirect to an external URL. This is only an issue if you are passing untrusted content into navigation paths in your application code. This issue has been patched in versions 6.30.2 and 7.9.6.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-601"
          ],
          "VendorSeverity": {
            "ghsa": 2,
            "redhat": 2
          },
          "CVSS": {
            "ghsa": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
              "V3Score": 6.5
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
              "V3Score": 6.5
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2025-68470",
            "https://github.com/remix-run/react-router",
            "https://github.com/remix-run/react-router/security/advisories/GHSA-9jcx-v3wj-wh4m",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-68470",
            "https://www.cve.org/CVERecord?id=CVE-2025-68470"
          ],
          "PublishedDate": "2026-01-10T03:15:48.477Z",
          "LastModifiedDate": "2026-01-30T18:20:54.873Z"
        },
        {
          "VulnerabilityID": "CVE-2026-27606",
          "VendorIDs": [
            "GHSA-mw96-cpmx-2vgc"
          ],
          "PkgID": "rollup@2.79.2",
          "PkgName": "rollup",
          "PkgIdentifier": {
            "PURL": "pkg:npm/rollup@2.79.2",
            "UID": "5203f4d4caa45e4b",
            "BOMRef": "pkg:npm/rollup@2.79.2"
          },
          "InstalledVersion": "2.79.2",
          "FixedVersion": "2.80.0, 3.30.0, 4.59.0",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-27606",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory npm",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Anpm"
          },
          "Fingerprint": "sha256:37679548e4c37b01e70516290b86a15ffd6e14403cfe0bdb7078ca4e40d70556",
          "Title": "rollup: Rollup: Remote Code Execution via Path Traversal Vulnerability",
          "Description": "Rollup is a module bundler for JavaScript. Versions prior to 2.80.0, 3.30.0, and 4.59.0 of the Rollup module bundler (specifically v4.x and present in current source) is vulnerable to an Arbitrary File Write via Path Traversal. Insecure file name sanitization in the core engine allows an attacker to control output filenames (e.g., via CLI named inputs, manual chunk aliases, or malicious plugins) and use traversal sequences (`../`) to overwrite files anywhere on the host filesystem that the build process has permissions for. This can lead to persistent Remote Code Execution (RCE) by overwriting critical system or user configuration files. Versions 2.80.0, 3.30.0, and 4.59.0 contain a patch for the issue.",
          "Severity": "HIGH",
          "CweIDs": [
            "CWE-22"
          ],
          "VendorSeverity": {
            "ghsa": 3,
            "nvd": 4,
            "redhat": 3
          },
          "CVSS": {
            "ghsa": {
              "V40Vector": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:P",
              "V40Score": 8.8
            },
            "nvd": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
              "V3Score": 9.8
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
              "V3Score": 9.1
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-27606",
            "https://github.com/rollup/rollup",
            "https://github.com/rollup/rollup/commit/c60770d7aaf750e512c1b2774989ea4596e660b2",
            "https://github.com/rollup/rollup/commit/c8cf1f9c48c516285758c1e11f08a54f304fd44e",
            "https://github.com/rollup/rollup/commit/d6dee5e99bb82aac0bee1df4ab9efbde455452c3",
            "https://github.com/rollup/rollup/releases/tag/v2.80.0",
            "https://github.com/rollup/rollup/releases/tag/v3.30.0",
            "https://github.com/rollup/rollup/releases/tag/v4.59.0",
            "https://github.com/rollup/rollup/security/advisories/GHSA-mw96-cpmx-2vgc",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-27606",
            "https://www.cve.org/CVERecord?id=CVE-2026-27606"
          ],
          "PublishedDate": "2026-02-25T03:16:04.603Z",
          "LastModifiedDate": "2026-02-25T16:05:11.063Z"
        },
        {
          "VulnerabilityID": "CVE-2026-27606",
          "VendorIDs": [
            "GHSA-mw96-cpmx-2vgc"
          ],
          "PkgID": "rollup@4.44.2",
          "PkgName": "rollup",
          "PkgIdentifier": {
            "PURL": "pkg:npm/rollup@4.44.2",
            "UID": "e9186aee28e4e2ba",
            "BOMRef": "pkg:npm/rollup@4.44.2"
          },
          "InstalledVersion": "4.44.2",
          "FixedVersion": "2.80.0, 3.30.0, 4.59.0",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-27606",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory npm",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Anpm"
          },
          "Fingerprint": "sha256:1826534c4058c9a037371f846f4d92ebe535a31bc461297a8d96f9142150e823",
          "Title": "rollup: Rollup: Remote Code Execution via Path Traversal Vulnerability",
          "Description": "Rollup is a module bundler for JavaScript. Versions prior to 2.80.0, 3.30.0, and 4.59.0 of the Rollup module bundler (specifically v4.x and present in current source) is vulnerable to an Arbitrary File Write via Path Traversal. Insecure file name sanitization in the core engine allows an attacker to control output filenames (e.g., via CLI named inputs, manual chunk aliases, or malicious plugins) and use traversal sequences (`../`) to overwrite files anywhere on the host filesystem that the build process has permissions for. This can lead to persistent Remote Code Execution (RCE) by overwriting critical system or user configuration files. Versions 2.80.0, 3.30.0, and 4.59.0 contain a patch for the issue.",
          "Severity": "HIGH",
          "CweIDs": [
            "CWE-22"
          ],
          "VendorSeverity": {
            "ghsa": 3,
            "nvd": 4,
            "redhat": 3
          },
          "CVSS": {
            "ghsa": {
              "V40Vector": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:P",
              "V40Score": 8.8
            },
            "nvd": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
              "V3Score": 9.8
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
              "V3Score": 9.1
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-27606",
            "https://github.com/rollup/rollup",
            "https://github.com/rollup/rollup/commit/c60770d7aaf750e512c1b2774989ea4596e660b2",
            "https://github.com/rollup/rollup/commit/c8cf1f9c48c516285758c1e11f08a54f304fd44e",
            "https://github.com/rollup/rollup/commit/d6dee5e99bb82aac0bee1df4ab9efbde455452c3",
            "https://github.com/rollup/rollup/releases/tag/v2.80.0",
            "https://github.com/rollup/rollup/releases/tag/v3.30.0",
            "https://github.com/rollup/rollup/releases/tag/v4.59.0",
            "https://github.com/rollup/rollup/security/advisories/GHSA-mw96-cpmx-2vgc",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-27606",
            "https://www.cve.org/CVERecord?id=CVE-2026-27606"
          ],
          "PublishedDate": "2026-02-25T03:16:04.603Z",
          "LastModifiedDate": "2026-02-25T16:05:11.063Z"
        },
        {
          "VulnerabilityID": "CVE-2026-23745",
          "VendorIDs": [
            "GHSA-8qq5-rm4j-mr97"
          ],
          "PkgID": "tar@7.4.3",
          "PkgName": "tar",
          "PkgIdentifier": {
            "PURL": "pkg:npm/tar@7.4.3",
            "UID": "9a9920914c4e634e",
            "BOMRef": "pkg:npm/tar@7.4.3"
          },
          "InstalledVersion": "7.4.3",
          "FixedVersion": "7.5.3",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-23745",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory npm",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Anpm"
          },
          "Fingerprint": "sha256:54e246eafd3a19461f8c7bff7d84dd18db3694ccc2b656243163e8a0a26bf55b",
          "Title": "node-tar: tar: node-tar: Arbitrary file overwrite and symlink poisoning via unsanitized linkpaths in archives",
          "Description": "node-tar is a Tar for Node.js. The node-tar library (\u003c= 7.5.2) fails to sanitize the linkpath of Link (hardlink) and SymbolicLink entries when preservePaths is false (the default secure behavior). This allows malicious archives to bypass the extraction root restriction, leading to Arbitrary File Overwrite via hardlinks and Symlink Poisoning via absolute symlink targets. This vulnerability is fixed in 7.5.3.",
          "Severity": "HIGH",
          "CweIDs": [
            "CWE-22"
          ],
          "VendorSeverity": {
            "amazon": 3,
            "ghsa": 3,
            "nvd": 2,
            "redhat": 3
          },
          "CVSS": {
            "ghsa": {
              "V40Vector": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:L/VA:N/SC:H/SI:L/SA:N",
              "V40Score": 8.2
            },
            "nvd": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N",
              "V3Score": 6.1
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
              "V3Score": 8.2
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-23745",
            "https://github.com/isaacs/node-tar",
            "https://github.com/isaacs/node-tar/commit/340eb285b6d986e91969a1170d7fe9b0face405e",
            "https://github.com/isaacs/node-tar/security/advisories/GHSA-8qq5-rm4j-mr97",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-23745",
            "https://www.cve.org/CVERecord?id=CVE-2026-23745"
          ],
          "PublishedDate": "2026-01-16T22:16:26.83Z",
          "LastModifiedDate": "2026-02-18T16:20:07.823Z"
        },
        {
          "VulnerabilityID": "CVE-2026-23950",
          "VendorIDs": [
            "GHSA-r6q2-hw4h-h46w"
          ],
          "PkgID": "tar@7.4.3",
          "PkgName": "tar",
          "PkgIdentifier": {
            "PURL": "pkg:npm/tar@7.4.3",
            "UID": "9a9920914c4e634e",
            "BOMRef": "pkg:npm/tar@7.4.3"
          },
          "InstalledVersion": "7.4.3",
          "FixedVersion": "7.5.4",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-23950",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory npm",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Anpm"
          },
          "Fingerprint": "sha256:b4abfc3829172450c256597b8c5ff5b1a420470b772ff307f623f0ebd2d17057",
          "Title": "node-tar: tar: node-tar: Arbitrary file overwrite via Unicode path collision race condition",
          "Description": "node-tar,a Tar for Node.js, has a race condition vulnerability in versions up to and including 7.5.3. This is due to an incomplete handling of Unicode path collisions in the `path-reservations` system. On case-insensitive or normalization-insensitive filesystems (such as macOS APFS, In which it has been tested), the library fails to lock colliding paths (e.g., `ß` and `ss`), allowing them to be processed in parallel. This bypasses the library's internal concurrency safeguards and permits Symlink Poisoning attacks via race conditions. The library uses a `PathReservations` system to ensure that metadata checks and file operations for the same path are serialized. This prevents race conditions where one entry might clobber another concurrently. This is a Race Condition which enables Arbitrary File Overwrite. This vulnerability affects users and systems using node-tar on macOS (APFS/HFS+). Because of using `NFD` Unicode normalization (in which `ß` and `ss` are different), conflicting paths do not have their order properly preserved under filesystems that ignore Unicode normalization (e.g., APFS (in which `ß` causes an inode collision with `ss`)). This enables an attacker to circumvent internal parallelization locks (`PathReservations`) using conflicting filenames within a malicious tar archive. The patch in version 7.5.4 updates `path-reservations.js` to use a normalization form that matches the target filesystem's behavior (e.g., `NFKD`), followed by first `toLocaleLowerCase('en')` and then `toLocaleUpperCase('en')`. As a workaround, users who cannot upgrade promptly, and who are programmatically using `node-tar` to extract arbitrary tarball data should filter out all `SymbolicLink` entries (as npm does) to defend against arbitrary file writes via this file system entry name collision issue.",
          "Severity": "HIGH",
          "CweIDs": [
            "CWE-176",
            "CWE-352",
            "CWE-367"
          ],
          "VendorSeverity": {
            "amazon": 3,
            "ghsa": 3,
            "nvd": 2,
            "redhat": 3
          },
          "CVSS": {
            "ghsa": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L",
              "V3Score": 8.8
            },
            "nvd": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
              "V3Score": 5.9
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L",
              "V3Score": 8.8
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-23950",
            "https://github.com/isaacs/node-tar",
            "https://github.com/isaacs/node-tar/commit/3b1abfae650056edfabcbe0a0df5954d390521e6",
            "https://github.com/isaacs/node-tar/security/advisories/GHSA-r6q2-hw4h-h46w",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-23950",
            "https://www.cve.org/CVERecord?id=CVE-2026-23950"
          ],
          "PublishedDate": "2026-01-20T01:15:57.87Z",
          "LastModifiedDate": "2026-02-18T15:50:29.91Z"
        },
        {
          "VulnerabilityID": "CVE-2026-24842",
          "VendorIDs": [
            "GHSA-34x7-hfp2-rc4v"
          ],
          "PkgID": "tar@7.4.3",
          "PkgName": "tar",
          "PkgIdentifier": {
            "PURL": "pkg:npm/tar@7.4.3",
            "UID": "9a9920914c4e634e",
            "BOMRef": "pkg:npm/tar@7.4.3"
          },
          "InstalledVersion": "7.4.3",
          "FixedVersion": "7.5.7",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-24842",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory npm",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Anpm"
          },
          "Fingerprint": "sha256:25f22c6eb657f3708958a40b6d41993023a9ef6e710b714256e5ca272632fbc7",
          "Title": "node-tar: tar: node-tar: Arbitrary file creation via path traversal bypass in hardlink security check",
          "Description": "node-tar,a Tar for Node.js, contains a vulnerability in versions prior to 7.5.7 where the security check for hardlink entries uses different path resolution semantics than the actual hardlink creation logic. This mismatch allows an attacker to craft a malicious TAR archive that bypasses path traversal protections and creates hardlinks to arbitrary files outside the extraction directory. Version 7.5.7 contains a fix for the issue.",
          "Severity": "HIGH",
          "CweIDs": [
            "CWE-22",
            "CWE-59"
          ],
          "VendorSeverity": {
            "amazon": 3,
            "ghsa": 3,
            "redhat": 3
          },
          "CVSS": {
            "ghsa": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N",
              "V3Score": 8.2
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N",
              "V3Score": 8.2
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-24842",
            "https://github.com/isaacs/node-tar",
            "https://github.com/isaacs/node-tar/commit/f4a7aa9bc3d717c987fdf1480ff7a64e87ffdb46",
            "https://github.com/isaacs/node-tar/security/advisories/GHSA-34x7-hfp2-rc4v",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-24842",
            "https://www.cve.org/CVERecord?id=CVE-2026-24842"
          ],
          "PublishedDate": "2026-01-28T01:16:14.947Z",
          "LastModifiedDate": "2026-02-02T14:30:10.89Z"
        },
        {
          "VulnerabilityID": "CVE-2026-26960",
          "VendorIDs": [
            "GHSA-83g3-92jg-28cx"
          ],
          "PkgID": "tar@7.4.3",
          "PkgName": "tar",
          "PkgIdentifier": {
            "PURL": "pkg:npm/tar@7.4.3",
            "UID": "9a9920914c4e634e",
            "BOMRef": "pkg:npm/tar@7.4.3"
          },
          "InstalledVersion": "7.4.3",
          "FixedVersion": "7.5.8",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-26960",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory npm",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Anpm"
          },
          "Fingerprint": "sha256:c319a059b780724d6f7019dff0df1ba6191903f27fea6a377249166cb813dd7e",
          "Title": "tar: node-tar: node-tar: Arbitrary file read/write via malicious archive hardlink creation",
          "Description": "node-tar is a full-featured Tar for Node.js. When using default options in versions 7.5.7 and below, an attacker-controlled archive can create a hardlink inside the extraction directory that points to a file outside the extraction root, enabling arbitrary file read and write as the extracting user. Severity is high because the primitive bypasses path protections and turns archive extraction into a direct filesystem access primitive. This issue has been fixed in version 7.5.8.",
          "Severity": "HIGH",
          "CweIDs": [
            "CWE-22"
          ],
          "VendorSeverity": {
            "amazon": 3,
            "ghsa": 3,
            "nvd": 3,
            "redhat": 2
          },
          "CVSS": {
            "ghsa": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
              "V3Score": 7.1
            },
            "nvd": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
              "V3Score": 7.1
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
              "V3Score": 7.1
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-26960",
            "https://github.com/isaacs/node-tar",
            "https://github.com/isaacs/node-tar/commit/2cb1120bcefe28d7ecc719b41441ade59c52e384",
            "https://github.com/isaacs/node-tar/commit/d18e4e1f846f4ddddc153b0f536a19c050e7499f",
            "https://github.com/isaacs/node-tar/security/advisories/GHSA-83g3-92jg-28cx",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-26960",
            "https://www.cve.org/CVERecord?id=CVE-2026-26960"
          ],
          "PublishedDate": "2026-02-20T02:16:53.883Z",
          "LastModifiedDate": "2026-02-20T19:24:16.537Z"
        },
        {
          "VulnerabilityID": "CVE-2026-29786",
          "VendorIDs": [
            "GHSA-qffp-2rhf-9h96"
          ],
          "PkgID": "tar@7.4.3",
          "PkgName": "tar",
          "PkgIdentifier": {
            "PURL": "pkg:npm/tar@7.4.3",
            "UID": "9a9920914c4e634e",
            "BOMRef": "pkg:npm/tar@7.4.3"
          },
          "InstalledVersion": "7.4.3",
          "FixedVersion": "7.5.10",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-29786",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory npm",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Anpm"
          },
          "Fingerprint": "sha256:0b2ce4e5b4b2c8e01e6262392e3c66ed1c149c21556d1d078d420fce857191d7",
          "Title": "node-tar: hardlink path traversal via drive-relative linkpath",
          "Description": "node-tar is a full-featured Tar for Node.js. Prior to version 7.5.10, tar can be tricked into creating a hardlink that points outside the extraction directory by using a drive-relative link target such as C:../target.txt, which enables file overwrite outside cwd during normal tar.x() extraction. This issue has been patched in version 7.5.10.",
          "Severity": "HIGH",
          "CweIDs": [
            "CWE-22",
            "CWE-59"
          ],
          "VendorSeverity": {
            "amazon": 3,
            "ghsa": 3,
            "nvd": 2,
            "redhat": 3
          },
          "CVSS": {
            "ghsa": {
              "V40Vector": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:H/VA:L/SC:N/SI:H/SA:L",
              "V40Score": 8.2
            },
            "nvd": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N",
              "V3Score": 6.3
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N",
              "V3Score": 8.6
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-29786",
            "https://github.com/isaacs/node-tar",
            "https://github.com/isaacs/node-tar/commit/7bc755dd85e623c0279e08eb3784909e6d7e4b9f",
            "https://github.com/isaacs/node-tar/security/advisories/GHSA-qffp-2rhf-9h96",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-29786",
            "https://www.cve.org/CVERecord?id=CVE-2026-29786"
          ],
          "PublishedDate": "2026-03-07T16:15:55.587Z",
          "LastModifiedDate": "2026-03-11T21:50:01.91Z"
        },
        {
          "VulnerabilityID": "CVE-2026-31802",
          "VendorIDs": [
            "GHSA-9ppj-qmqm-q256"
          ],
          "PkgID": "tar@7.4.3",
          "PkgName": "tar",
          "PkgIdentifier": {
            "PURL": "pkg:npm/tar@7.4.3",
            "UID": "9a9920914c4e634e",
            "BOMRef": "pkg:npm/tar@7.4.3"
          },
          "InstalledVersion": "7.4.3",
          "FixedVersion": "7.5.11",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-31802",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory npm",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Anpm"
          },
          "Fingerprint": "sha256:6e9eccfea9e7c52691eca667ec3de15ddbe4c5b0d3b34f96f327f9c8420425b9",
          "Title": "tar: tar: File overwrite via drive-relative symlink traversal",
          "Description": "node-tar is a full-featured Tar for Node.js. Prior to version 7.5.11, tar (npm) can be tricked into creating a symlink that points outside the extraction directory by using a drive-relative symlink target such as C:../../../target.txt, which enables file overwrite outside cwd during normal tar.x() extraction. This vulnerability is fixed in 7.5.11.",
          "Severity": "HIGH",
          "CweIDs": [
            "CWE-22"
          ],
          "VendorSeverity": {
            "ghsa": 3,
            "nvd": 2,
            "redhat": 2
          },
          "CVSS": {
            "ghsa": {
              "V40Vector": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:H/SA:N",
              "V40Score": 8.2
            },
            "nvd": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
              "V3Score": 5.5
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
              "V3Score": 6.2
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-31802",
            "https://github.com/isaacs/node-tar",
            "https://github.com/isaacs/node-tar/commit/f48b5fa3b7985ddab96dc0f2125a4ffc9911b6ad",
            "https://github.com/isaacs/node-tar/security/advisories/GHSA-9ppj-qmqm-q256",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-31802",
            "https://www.cve.org/CVERecord?id=CVE-2026-31802"
          ],
          "PublishedDate": "2026-03-10T07:44:58.02Z",
          "LastModifiedDate": "2026-03-18T18:13:34.703Z"
        },
        {
          "VulnerabilityID": "CVE-2026-1526",
          "VendorIDs": [
            "GHSA-vrm6-8vpv-qv8q"
          ],
          "PkgID": "undici@6.21.3",
          "PkgName": "undici",
          "PkgIdentifier": {
            "PURL": "pkg:npm/undici@6.21.3",
            "UID": "e18513a5f6e02345",
            "BOMRef": "pkg:npm/undici@6.21.3"
          },
          "InstalledVersion": "6.21.3",
          "FixedVersion": "6.24.0, 7.24.0",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-1526",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory npm",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Anpm"
          },
          "Fingerprint": "sha256:c62df4f6607d812c4af608d5f24b067224530958d5ae904654953b8c02955a3a",
          "Title": "undici: undici: Denial of Service via unbounded memory consumption during WebSocket permessage-deflate decompression",
          "Description": "The undici WebSocket client is vulnerable to a denial-of-service attack via unbounded memory consumption during permessage-deflate decompression. When a WebSocket connection negotiates the permessage-deflate extension, the client decompresses incoming compressed frames without enforcing any limit on the decompressed data size. A malicious WebSocket server can send a small compressed frame (a \"decompression bomb\") that expands to an extremely large size in memory, causing the Node.js process to exhaust available memory and crash or become unresponsive.\n\nThe vulnerability exists in the PerMessageDeflate.decompress() method, which accumulates all decompressed chunks in memory and concatenates them into a single Buffer without checking whether the total size exceeds a safe threshold.",
          "Severity": "HIGH",
          "CweIDs": [
            "CWE-409"
          ],
          "VendorSeverity": {
            "amazon": 3,
            "ghsa": 3,
            "redhat": 3
          },
          "CVSS": {
            "ghsa": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 7.5
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 7.5
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-1526",
            "https://cna.openjsf.org/security-advisories.html",
            "https://datatracker.ietf.org/doc/html/rfc7692",
            "https://github.com/nodejs/undici",
            "https://github.com/nodejs/undici/security/advisories/GHSA-vrm6-8vpv-qv8q",
            "https://hackerone.com/reports/3481206",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-1526",
            "https://owasp.org/www-community/attacks/Denial_of_Service",
            "https://www.cve.org/CVERecord?id=CVE-2026-1526"
          ],
          "PublishedDate": "2026-03-12T21:16:23.933Z",
          "LastModifiedDate": "2026-03-20T15:56:47.337Z"
        },
        {
          "VulnerabilityID": "CVE-2026-1528",
          "VendorIDs": [
            "GHSA-f269-vfmq-vjvj"
          ],
          "PkgID": "undici@6.21.3",
          "PkgName": "undici",
          "PkgIdentifier": {
            "PURL": "pkg:npm/undici@6.21.3",
            "UID": "e18513a5f6e02345",
            "BOMRef": "pkg:npm/undici@6.21.3"
          },
          "InstalledVersion": "6.21.3",
          "FixedVersion": "6.24.0, 7.24.0",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-1528",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory npm",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Anpm"
          },
          "Fingerprint": "sha256:df33ac7fd6c8caf2e8ae94dd5b72206744b0c78e1c3725155cf7bc21405ede2e",
          "Title": "undici: undici: Denial of Service via crafted WebSocket frame with large length",
          "Description": "ImpactA server can reply with a WebSocket frame using the 64-bit length form and an extremely large length. undici's ByteParser overflows internal math, ends up in an invalid state, and throws a fatal TypeError that terminates the process.\n\nPatches\n\nPatched in the undici version v7.24.0 and v6.24.0. Users should upgrade to this version or later.",
          "Severity": "HIGH",
          "CweIDs": [
            "CWE-248",
            "CWE-1284"
          ],
          "VendorSeverity": {
            "amazon": 3,
            "ghsa": 3,
            "redhat": 3
          },
          "CVSS": {
            "ghsa": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 7.5
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 7.5
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-1528",
            "https://cna.openjsf.org/security-advisories.html",
            "https://github.com/nodejs/undici",
            "https://github.com/nodejs/undici/security/advisories/GHSA-f269-vfmq-vjvj",
            "https://hackerone.com/reports/3537648",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-1528",
            "https://www.cve.org/CVERecord?id=CVE-2026-1528"
          ],
          "PublishedDate": "2026-03-12T21:16:25.33Z",
          "LastModifiedDate": "2026-03-20T15:41:40.11Z"
        },
        {
          "VulnerabilityID": "CVE-2026-2229",
          "VendorIDs": [
            "GHSA-v9p9-hfj2-hcw8"
          ],
          "PkgID": "undici@6.21.3",
          "PkgName": "undici",
          "PkgIdentifier": {
            "PURL": "pkg:npm/undici@6.21.3",
            "UID": "e18513a5f6e02345",
            "BOMRef": "pkg:npm/undici@6.21.3"
          },
          "InstalledVersion": "6.21.3",
          "FixedVersion": "6.24.0, 7.24.0",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-2229",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory npm",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Anpm"
          },
          "Fingerprint": "sha256:640e6f9dd640196c89af0a02ac87ddc0ccdac54d5d5295a62bbaadca9c8e0691",
          "Title": "undici: Undici: Denial of Service via invalid WebSocket permessage-deflate extension parameter",
          "Description": "ImpactThe undici WebSocket client is vulnerable to a denial-of-service attack due to improper validation of the server_max_window_bits parameter in the permessage-deflate extension. When a WebSocket client connects to a server, it automatically advertises support for permessage-deflate compression. A malicious server can respond with an out-of-range server_max_window_bits value (outside zlib's valid range of 8-15). When the server subsequently sends a compressed frame, the client attempts to create a zlib InflateRaw instance with the invalid windowBits value, causing a synchronous RangeError exception that is not caught, resulting in immediate process termination.\n\nThe vulnerability exists because:\n\n  *  The isValidClientWindowBits() function only validates that the value contains ASCII digits, not that it falls within the valid range 8-15\n  *  The createInflateRaw() call is not wrapped in a try-catch block\n  *  The resulting exception propagates up through the call stack and crashes the Node.js process",
          "Severity": "HIGH",
          "CweIDs": [
            "CWE-248",
            "CWE-1284"
          ],
          "VendorSeverity": {
            "amazon": 3,
            "ghsa": 3,
            "redhat": 3
          },
          "CVSS": {
            "ghsa": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 7.5
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 7.5
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-2229",
            "https://cna.openjsf.org/security-advisories.html",
            "https://datatracker.ietf.org/doc/html/rfc7692",
            "https://github.com/nodejs/undici",
            "https://github.com/nodejs/undici/security/advisories/GHSA-v9p9-hfj2-hcw8",
            "https://hackerone.com/reports/3487486",
            "https://nodejs.org/api/zlib.html#class-zlibinflateraw",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-2229",
            "https://www.cve.org/CVERecord?id=CVE-2026-2229"
          ],
          "PublishedDate": "2026-03-12T21:16:25.573Z",
          "LastModifiedDate": "2026-03-20T15:39:12.24Z"
        },
        {
          "VulnerabilityID": "CVE-2026-1525",
          "VendorIDs": [
            "GHSA-2mjp-6q6p-2qxm"
          ],
          "PkgID": "undici@6.21.3",
          "PkgName": "undici",
          "PkgIdentifier": {
            "PURL": "pkg:npm/undici@6.21.3",
            "UID": "e18513a5f6e02345",
            "BOMRef": "pkg:npm/undici@6.21.3"
          },
          "InstalledVersion": "6.21.3",
          "FixedVersion": "6.24.0, 7.24.0",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-1525",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory npm",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Anpm"
          },
          "Fingerprint": "sha256:86af27fe6cf2468a4ae3fe86eac1864fdd0c6546bf6859827e586ca41f3af5b7",
          "Title": "undici: Undici: HTTP Request Smuggling and Denial of Service due to duplicate Content-Length headers",
          "Description": "Undici allows duplicate HTTP Content-Length headers when they are provided in an array with case-variant names (e.g., Content-Length and content-length). This produces malformed HTTP/1.1 requests with multiple conflicting Content-Length values on the wire.\n\nWho is impacted:\n\n  *  Applications using undici.request(), undici.Client, or similar low-level APIs with headers passed as flat arrays\n  *  Applications that accept user-controlled header names without case-normalization\n\n\nPotential consequences:\n\n  *  Denial of Service: Strict HTTP parsers (proxies, servers) will reject requests with duplicate Content-Length headers (400 Bad Request)\n  *  HTTP Request Smuggling: In deployments where an intermediary and backend interpret duplicate headers inconsistently (e.g., one uses the first value, the other uses the last), this can enable request smuggling attacks leading to ACL bypass, cache poisoning, or credential hijacking",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-444"
          ],
          "VendorSeverity": {
            "amazon": 3,
            "ghsa": 2,
            "nvd": 4,
            "redhat": 2
          },
          "CVSS": {
            "ghsa": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
              "V3Score": 6.5
            },
            "nvd": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
              "V3Score": 9.8
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
              "V3Score": 7.3
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-1525",
            "https://cna.openjsf.org/security-advisories.html",
            "https://cwe.mitre.org/data/definitions/444.html",
            "https://github.com/nodejs/undici",
            "https://github.com/nodejs/undici/security/advisories/GHSA-2mjp-6q6p-2qxm",
            "https://hackerone.com/reports/3556037",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-1525",
            "https://www.cve.org/CVERecord?id=CVE-2026-1525",
            "https://www.rfc-editor.org/rfc/rfc9110.html#section-8.6"
          ],
          "PublishedDate": "2026-03-12T20:16:02.67Z",
          "LastModifiedDate": "2026-03-19T17:29:34.053Z"
        },
        {
          "VulnerabilityID": "CVE-2026-1527",
          "VendorIDs": [
            "GHSA-4992-7rv2-5pvq"
          ],
          "PkgID": "undici@6.21.3",
          "PkgName": "undici",
          "PkgIdentifier": {
            "PURL": "pkg:npm/undici@6.21.3",
            "UID": "e18513a5f6e02345",
            "BOMRef": "pkg:npm/undici@6.21.3"
          },
          "InstalledVersion": "6.21.3",
          "FixedVersion": "6.24.0, 7.24.0",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-1527",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory npm",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Anpm"
          },
          "Fingerprint": "sha256:1419d070c27321c779730c7c3d4b0803e40f859d08764b3ecb5fb39a279ee634",
          "Title": "undici: Undici: HTTP header injection and request smuggling vulnerability",
          "Description": "ImpactWhen an application passes user-controlled input to the upgrade option of client.request(), an attacker can inject CRLF sequences (\\r\\n) to:\n\n  *  Inject arbitrary HTTP headers\n  *  Terminate the HTTP request prematurely and smuggle raw data to non-HTTP services (Redis, Memcached, Elasticsearch)\nThe vulnerability exists because undici writes the upgrade value directly to the socket without validating for invalid header characters:\n\n// lib/dispatcher/client-h1.js:1121\nif (upgrade) {\n  header += `connection: upgrade\\r\\nupgrade: ${upgrade}\\r\\n`\n}",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-93"
          ],
          "VendorSeverity": {
            "amazon": 3,
            "ghsa": 2,
            "redhat": 2
          },
          "CVSS": {
            "ghsa": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N",
              "V3Score": 4.6
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
              "V3Score": 6.5
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-1527",
            "https://cna.openjsf.org/security-advisories.html",
            "https://github.com/nodejs/undici",
            "https://github.com/nodejs/undici/security/advisories/GHSA-4992-7rv2-5pvq",
            "https://hackerone.com/reports/3487198",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-1527",
            "https://www.cve.org/CVERecord?id=CVE-2026-1527"
          ],
          "PublishedDate": "2026-03-12T21:16:25.137Z",
          "LastModifiedDate": "2026-03-20T15:49:31.37Z"
        },
        {
          "VulnerabilityID": "CVE-2026-22036",
          "VendorIDs": [
            "GHSA-g9mf-h72j-4rw9"
          ],
          "PkgID": "undici@6.21.3",
          "PkgName": "undici",
          "PkgIdentifier": {
            "PURL": "pkg:npm/undici@6.21.3",
            "UID": "e18513a5f6e02345",
            "BOMRef": "pkg:npm/undici@6.21.3"
          },
          "InstalledVersion": "6.21.3",
          "FixedVersion": "7.18.2, 6.23.0",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-22036",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory npm",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Anpm"
          },
          "Fingerprint": "sha256:f9ba4bac4f1b37b9f6e17094d8da9b6d79677891efa3ee4a16ff73aa713651fa",
          "Title": "undici: Undici: Denial of Service via excessive decompression steps",
          "Description": "Undici is an HTTP/1.1 client for Node.js. Prior to 7.18.0 and 6.23.0, the number of links in the decompression chain is unbounded and the default maxHeaderSize allows a malicious server to insert thousands compression steps leading to high CPU usage and excessive memory allocation. This vulnerability is fixed in 7.18.0 and 6.23.0.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-770"
          ],
          "VendorSeverity": {
            "amazon": 3,
            "ghsa": 2,
            "nvd": 3,
            "redhat": 1
          },
          "CVSS": {
            "ghsa": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 5.9
            },
            "nvd": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 7.5
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
              "V3Score": 3.7
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-22036",
            "https://github.com/nodejs/undici",
            "https://github.com/nodejs/undici/commit/b04e3cbb569c1596f86c108e9b52c79d8475dcb3",
            "https://github.com/nodejs/undici/security/advisories/GHSA-g9mf-h72j-4rw9",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-22036",
            "https://www.cve.org/CVERecord?id=CVE-2026-22036"
          ],
          "PublishedDate": "2026-01-14T19:16:47.833Z",
          "LastModifiedDate": "2026-01-22T21:15:50.07Z"
        },
        {
          "VulnerabilityID": "CVE-2026-33532",
          "VendorIDs": [
            "GHSA-48c2-rrv3-qjmp"
          ],
          "PkgID": "yaml@1.10.2",
          "PkgName": "yaml",
          "PkgIdentifier": {
            "PURL": "pkg:npm/yaml@1.10.2",
            "UID": "a72b9c13809c7e6d",
            "BOMRef": "pkg:npm/yaml@1.10.2"
          },
          "InstalledVersion": "1.10.2",
          "FixedVersion": "2.8.3, 1.10.3",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:e5825bd8080ca7d6f5760d5bc14568c7de4004254c002aff5cf8b4b942caae37",
            "DiffID": "sha256:e01fd4cb63a465758c927be61d829b44b2437e8dd2322448ceabcc15c44299dc"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-33532",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory npm",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Anpm"
          },
          "Fingerprint": "sha256:ea5ff7f0bd377620ee8af63b26165c9bbcf783f2de087e53ee89a6ad56d3fcbd",
          "Title": "yaml: yaml: Denial of Service via deeply nested YAML document parsing",
          "Description": "`yaml` is a YAML parser and serialiser for JavaScript. Parsing a YAML document with a version of `yaml` on the 1.x branch prior to 1.10.3 or on the 2.x branch prior to 2.8.3 may throw a RangeError due to a stack overflow. The node resolution/composition phase uses recursive function calls without a depth bound. An attacker who can supply YAML for parsing can trigger a `RangeError: Maximum call stack size exceeded` with a small payload (~2–10 KB). The `RangeError` is not a `YAMLParseError`, so applications that only catch YAML-specific errors will encounter an unexpected exception type. Depending on the host application's exception handling, this can fail requests or terminate the Node.js process. Flow sequences allow deep nesting with minimal bytes (2 bytes per level: one `[` and one `]`). On the default Node.js stack, approximately 1,000–5,000 levels of nesting (2–10 KB input) exhaust the call stack. The exact threshold is environment-dependent (Node.js version, stack size, call stack depth at invocation). Note: the library's `Parser` (CST phase) uses a stack-based iterative approach and is not affected. Only the compose/resolve phase uses actual call-stack recursion. All three public parsing APIs are affected: `YAML.parse()`, `YAML.parseDocument()`, and `YAML.parseAllDocuments()`. Versions 1.10.3 and 2.8.3 contain a patch.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-674"
          ],
          "VendorSeverity": {
            "ghsa": 2,
            "redhat": 2
          },
          "CVSS": {
            "ghsa": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
              "V3Score": 4.3
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 6.5
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-33532",
            "https://github.com/eemeli/yaml",
            "https://github.com/eemeli/yaml/commit/1e84ebbea7ec35011a4c61bbb820a529ee4f359b",
            "https://github.com/eemeli/yaml/releases/tag/v1.10.3",
            "https://github.com/eemeli/yaml/releases/tag/v2.8.3",
            "https://github.com/eemeli/yaml/security/advisories/GHSA-48c2-rrv3-qjmp",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-33532",
            "https://www.cve.org/CVERecord?id=CVE-2026-33532"
          ],
          "PublishedDate": "2026-03-26T20:16:15.543Z",
          "LastModifiedDate": "2026-04-02T18:11:37.49Z"
        }
      ]
    },
    {
      "Target": "qdrant/qdrant.spdx.json",
      "Class": "lang-pkgs",
      "Type": "cargo",
      "Packages": [
        {
          "ID": "actix-codec@0.5.0",
          "Name": "actix-codec",
          "Identifier": {
            "PURL": "pkg:cargo/actix-codec@0.5.0",
            "UID": "7533f69a47f289b7",
            "BOMRef": "pkg:cargo/actix-codec@0.5.0"
          },
          "Version": "0.5.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "bitflags@1.3.2",
            "bytes@1.10.1",
            "futures-core@0.3.31",
            "futures-sink@0.3.31",
            "log@0.4.29",
            "memchr@2.7.4",
            "pin-project-lite@0.2.12",
            "tokio-util@0.7.17",
            "tokio@1.48.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "actix-cors@0.7.1",
          "Name": "actix-cors",
          "Identifier": {
            "PURL": "pkg:cargo/actix-cors@0.7.1",
            "UID": "e8d86733f3beb9a8",
            "BOMRef": "pkg:cargo/actix-cors@0.7.1"
          },
          "Version": "0.7.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "actix-utils@3.0.1",
            "actix-web@4.12.1",
            "derive_more@2.1.0",
            "futures-util@0.3.31",
            "log@0.4.29",
            "once_cell@1.21.3",
            "smallvec@1.15.1"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "actix-files@0.6.9",
          "Name": "actix-files",
          "Identifier": {
            "PURL": "pkg:cargo/actix-files@0.6.9",
            "UID": "7c608aba6e36d80a",
            "BOMRef": "pkg:cargo/actix-files@0.6.9"
          },
          "Version": "0.6.9",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "actix-http@3.11.2",
            "actix-service@2.0.2",
            "actix-utils@3.0.1",
            "actix-web@4.12.1",
            "bitflags@2.9.1",
            "bytes@1.10.1",
            "derive_more@2.1.0",
            "futures-core@0.3.31",
            "http-range@0.1.5",
            "log@0.4.29",
            "mime@0.3.16",
            "mime_guess@2.0.4",
            "percent-encoding@2.3.2",
            "pin-project-lite@0.2.12",
            "v_htmlescape@0.15.8"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "actix-http@3.11.2",
          "Name": "actix-http",
          "Identifier": {
            "PURL": "pkg:cargo/actix-http@3.11.2",
            "UID": "5f0cb517f6e2e2fa",
            "BOMRef": "pkg:cargo/actix-http@3.11.2"
          },
          "Version": "3.11.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "actix-codec@0.5.0",
            "actix-rt@2.10.0",
            "actix-service@2.0.2",
            "actix-tls@3.4.0",
            "actix-utils@3.0.1",
            "base64@0.22.0",
            "bitflags@2.9.1",
            "brotli@8.0.1",
            "bytes@1.10.1",
            "bytestring@1.2.0",
            "derive_more@2.1.0",
            "encoding_rs@0.8.33",
            "flate2@1.1.5",
            "foldhash@0.1.4",
            "futures-core@0.3.31",
            "h2@0.3.27",
            "http@0.2.12",
            "httparse@1.10.1",
            "httpdate@1.0.2",
            "itoa@1.0.5",
            "language-tags@0.3.2",
            "local-channel@0.1.3",
            "mime@0.3.16",
            "percent-encoding@2.3.2",
            "pin-project-lite@0.2.12",
            "rand@0.9.2",
            "sha1@0.10.5",
            "smallvec@1.15.1",
            "tokio-util@0.7.17",
            "tokio@1.48.0",
            "tracing@0.1.43",
            "zstd@0.13.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "actix-macros@0.2.3",
          "Name": "actix-macros",
          "Identifier": {
            "PURL": "pkg:cargo/actix-macros@0.2.3",
            "UID": "26cca05a2bb7f9f0",
            "BOMRef": "pkg:cargo/actix-macros@0.2.3"
          },
          "Version": "0.2.3",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "quote@1.0.42",
            "syn@1.0.107"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "actix-multipart@0.7.2",
          "Name": "actix-multipart",
          "Identifier": {
            "PURL": "pkg:cargo/actix-multipart@0.7.2",
            "UID": "32a40c1e29037b56",
            "BOMRef": "pkg:cargo/actix-multipart@0.7.2"
          },
          "Version": "0.7.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "actix-multipart-derive@0.7.0",
            "actix-utils@3.0.1",
            "actix-web@4.12.1",
            "derive_more@0.99.17",
            "futures-core@0.3.31",
            "futures-util@0.3.31",
            "httparse@1.10.1",
            "local-waker@0.1.3",
            "log@0.4.29",
            "memchr@2.7.4",
            "mime@0.3.16",
            "rand@0.8.5",
            "serde@1.0.226",
            "serde_json@1.0.145",
            "serde_plain@1.0.1",
            "tempfile@3.23.0",
            "tokio@1.48.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "actix-multipart-derive@0.7.0",
          "Name": "actix-multipart-derive",
          "Identifier": {
            "PURL": "pkg:cargo/actix-multipart-derive@0.7.0",
            "UID": "fb4b8d2eeacc4333",
            "BOMRef": "pkg:cargo/actix-multipart-derive@0.7.0"
          },
          "Version": "0.7.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "darling@0.20.8",
            "parse-size@1.0.0",
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@2.0.111"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "actix-router@0.5.3",
          "Name": "actix-router",
          "Identifier": {
            "PURL": "pkg:cargo/actix-router@0.5.3",
            "UID": "d60e9a4ed2c2f253",
            "BOMRef": "pkg:cargo/actix-router@0.5.3"
          },
          "Version": "0.5.3",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "bytestring@1.2.0",
            "cfg-if@1.0.0",
            "http@0.2.12",
            "regex-lite@0.1.5",
            "regex@1.11.0",
            "serde@1.0.226",
            "tracing@0.1.43"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "actix-rt@2.10.0",
          "Name": "actix-rt",
          "Identifier": {
            "PURL": "pkg:cargo/actix-rt@2.10.0",
            "UID": "aa6805ac6ae6f0b6",
            "BOMRef": "pkg:cargo/actix-rt@2.10.0"
          },
          "Version": "2.10.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "futures-core@0.3.31",
            "tokio@1.48.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "actix-server@2.6.0",
          "Name": "actix-server",
          "Identifier": {
            "PURL": "pkg:cargo/actix-server@2.6.0",
            "UID": "190e28890a40b12d",
            "BOMRef": "pkg:cargo/actix-server@2.6.0"
          },
          "Version": "2.6.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "actix-rt@2.10.0",
            "actix-service@2.0.2",
            "actix-utils@3.0.1",
            "futures-core@0.3.31",
            "futures-util@0.3.31",
            "mio@1.0.1",
            "socket2@0.5.10",
            "tokio@1.48.0",
            "tracing@0.1.43"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "actix-service@2.0.2",
          "Name": "actix-service",
          "Identifier": {
            "PURL": "pkg:cargo/actix-service@2.0.2",
            "UID": "a24443513495c679",
            "BOMRef": "pkg:cargo/actix-service@2.0.2"
          },
          "Version": "2.0.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "futures-core@0.3.31",
            "paste@1.0.11",
            "pin-project-lite@0.2.12"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "actix-tls@3.4.0",
          "Name": "actix-tls",
          "Identifier": {
            "PURL": "pkg:cargo/actix-tls@3.4.0",
            "UID": "5cf17387a4bcd25d",
            "BOMRef": "pkg:cargo/actix-tls@3.4.0"
          },
          "Version": "3.4.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "actix-rt@2.10.0",
            "actix-service@2.0.2",
            "actix-utils@3.0.1",
            "futures-core@0.3.31",
            "impl-more@0.1.6",
            "pin-project-lite@0.2.12",
            "rustls-pki-types@1.13.1",
            "tokio-rustls@0.26.0",
            "tokio-util@0.7.17",
            "tokio@1.48.0",
            "tracing@0.1.43"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "actix-utils@3.0.1",
          "Name": "actix-utils",
          "Identifier": {
            "PURL": "pkg:cargo/actix-utils@3.0.1",
            "UID": "d26746fcef20a6fe",
            "BOMRef": "pkg:cargo/actix-utils@3.0.1"
          },
          "Version": "3.0.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "local-waker@0.1.3",
            "pin-project-lite@0.2.12"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "actix-web@4.12.1",
          "Name": "actix-web",
          "Identifier": {
            "PURL": "pkg:cargo/actix-web@4.12.1",
            "UID": "90e5b8524d1cc055",
            "BOMRef": "pkg:cargo/actix-web@4.12.1"
          },
          "Version": "4.12.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "actix-codec@0.5.0",
            "actix-http@3.11.2",
            "actix-macros@0.2.3",
            "actix-router@0.5.3",
            "actix-rt@2.10.0",
            "actix-server@2.6.0",
            "actix-service@2.0.2",
            "actix-tls@3.4.0",
            "actix-utils@3.0.1",
            "actix-web-codegen@4.3.0",
            "bytes@1.10.1",
            "bytestring@1.2.0",
            "cfg-if@1.0.0",
            "cookie@0.16.2",
            "derive_more@2.1.0",
            "encoding_rs@0.8.33",
            "foldhash@0.1.4",
            "futures-core@0.3.31",
            "futures-util@0.3.31",
            "impl-more@0.1.6",
            "itoa@1.0.5",
            "language-tags@0.3.2",
            "log@0.4.29",
            "mime@0.3.16",
            "once_cell@1.21.3",
            "pin-project-lite@0.2.12",
            "regex-lite@0.1.5",
            "regex@1.11.0",
            "serde@1.0.226",
            "serde_json@1.0.145",
            "serde_urlencoded@0.7.1",
            "smallvec@1.15.1",
            "socket2@0.6.0",
            "time@0.3.17",
            "tracing@0.1.43",
            "url@2.5.7"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "actix-web-codegen@4.3.0",
          "Name": "actix-web-codegen",
          "Identifier": {
            "PURL": "pkg:cargo/actix-web-codegen@4.3.0",
            "UID": "7233e3a274ff860d",
            "BOMRef": "pkg:cargo/actix-web-codegen@4.3.0"
          },
          "Version": "4.3.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "actix-router@0.5.3",
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@2.0.111"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "actix-web-extras@0.1.0",
          "Name": "actix-web-extras",
          "Identifier": {
            "PURL": "pkg:cargo/actix-web-extras@0.1.0",
            "UID": "56b213d22fec58c5",
            "BOMRef": "pkg:cargo/actix-web-extras@0.1.0"
          },
          "Version": "0.1.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "actix-web@4.12.1",
            "futures-core@0.3.31",
            "futures-util@0.3.31",
            "pin-project-lite@0.2.12"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "actix-web-validator@7.0.0",
          "Name": "actix-web-validator",
          "Identifier": {
            "PURL": "pkg:cargo/actix-web-validator@7.0.0",
            "UID": "a0b5cf33f2505920",
            "BOMRef": "pkg:cargo/actix-web-validator@7.0.0"
          },
          "Version": "7.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "actix-http@3.11.2",
            "actix-router@0.5.3",
            "actix-web@4.12.1",
            "bytes@1.10.1",
            "futures-util@0.3.31",
            "futures@0.3.31",
            "log@0.4.29",
            "mime@0.3.16",
            "serde@1.0.226",
            "serde_json@1.0.145",
            "serde_qs@0.13.0",
            "serde_urlencoded@0.7.1",
            "thiserror@2.0.17",
            "validator@0.20.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "addr2line@0.19.0",
          "Name": "addr2line",
          "Identifier": {
            "PURL": "pkg:cargo/addr2line@0.19.0",
            "UID": "61637ba726fac1ed",
            "BOMRef": "pkg:cargo/addr2line@0.19.0"
          },
          "Version": "0.19.0",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "gimli@0.27.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "adler@1.0.2",
          "Name": "adler",
          "Identifier": {
            "PURL": "pkg:cargo/adler@1.0.2",
            "UID": "8ea5154b77d756ef",
            "BOMRef": "pkg:cargo/adler@1.0.2"
          },
          "Version": "1.0.2",
          "Licenses": [
            "0BSD OR MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "adler2@2.0.0",
          "Name": "adler2",
          "Identifier": {
            "PURL": "pkg:cargo/adler2@2.0.0",
            "UID": "14befe7bdaa5ca45",
            "BOMRef": "pkg:cargo/adler2@2.0.0"
          },
          "Version": "2.0.0",
          "Licenses": [
            "0BSD OR MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "adler32@1.2.0",
          "Name": "adler32",
          "Identifier": {
            "PURL": "pkg:cargo/adler32@1.2.0",
            "UID": "bd06bad264315c7f",
            "BOMRef": "pkg:cargo/adler32@1.2.0"
          },
          "Version": "1.2.0",
          "Licenses": [
            "Zlib"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "ahash@0.8.11",
          "Name": "ahash",
          "Identifier": {
            "PURL": "pkg:cargo/ahash@0.8.11",
            "UID": "4447dbaf88c52095",
            "BOMRef": "pkg:cargo/ahash@0.8.11"
          },
          "Version": "0.8.11",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "cfg-if@1.0.0",
            "getrandom@0.2.11",
            "once_cell@1.21.3",
            "serde@1.0.226",
            "zerocopy@0.7.35"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "aho-corasick@1.1.3",
          "Name": "aho-corasick",
          "Identifier": {
            "PURL": "pkg:cargo/aho-corasick@1.1.3",
            "UID": "76060395a816b087",
            "BOMRef": "pkg:cargo/aho-corasick@1.1.3"
          },
          "Version": "1.1.3",
          "Licenses": [
            "Unlicense OR MIT"
          ],
          "DependsOn": [
            "memchr@2.7.4"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "aligned-vec@0.6.1",
          "Name": "aligned-vec",
          "Identifier": {
            "PURL": "pkg:cargo/aligned-vec@0.6.1",
            "UID": "e75f3d23dd29592a",
            "BOMRef": "pkg:cargo/aligned-vec@0.6.1"
          },
          "Version": "0.6.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "equator@0.2.2"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "alloc-no-stdlib@2.0.4",
          "Name": "alloc-no-stdlib",
          "Identifier": {
            "PURL": "pkg:cargo/alloc-no-stdlib@2.0.4",
            "UID": "7600473426198c99",
            "BOMRef": "pkg:cargo/alloc-no-stdlib@2.0.4"
          },
          "Version": "2.0.4",
          "Licenses": [
            "BSD-3-Clause"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "alloc-stdlib@0.2.2",
          "Name": "alloc-stdlib",
          "Identifier": {
            "PURL": "pkg:cargo/alloc-stdlib@0.2.2",
            "UID": "e73076c4518f7fbe",
            "BOMRef": "pkg:cargo/alloc-stdlib@0.2.2"
          },
          "Version": "0.2.2",
          "Licenses": [
            "BSD-3-Clause"
          ],
          "DependsOn": [
            "alloc-no-stdlib@2.0.4"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "allocator-api2@0.2.16",
          "Name": "allocator-api2",
          "Identifier": {
            "PURL": "pkg:cargo/allocator-api2@0.2.16",
            "UID": "9d5bbe3d919e4f53",
            "BOMRef": "pkg:cargo/allocator-api2@0.2.16"
          },
          "Version": "0.2.16",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "android_system_properties@0.1.5",
          "Name": "android_system_properties",
          "Identifier": {
            "PURL": "pkg:cargo/android_system_properties@0.1.5",
            "UID": "21ed64fb11e0d485",
            "BOMRef": "pkg:cargo/android_system_properties@0.1.5"
          },
          "Version": "0.1.5",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "libc@0.2.174"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "anstream@0.6.11",
          "Name": "anstream",
          "Identifier": {
            "PURL": "pkg:cargo/anstream@0.6.11",
            "UID": "26f8b49cb5075b95",
            "BOMRef": "pkg:cargo/anstream@0.6.11"
          },
          "Version": "0.6.11",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "anstyle-parse@0.2.0",
            "anstyle-query@1.0.0",
            "anstyle-wincon@3.0.1",
            "anstyle@1.0.8",
            "colorchoice@1.0.0",
            "utf8parse@0.2.1"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "anstyle@1.0.8",
          "Name": "anstyle",
          "Identifier": {
            "PURL": "pkg:cargo/anstyle@1.0.8",
            "UID": "70ce230f9c936059",
            "BOMRef": "pkg:cargo/anstyle@1.0.8"
          },
          "Version": "1.0.8",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "anstyle-parse@0.2.0",
          "Name": "anstyle-parse",
          "Identifier": {
            "PURL": "pkg:cargo/anstyle-parse@0.2.0",
            "UID": "cfa53e9b4eb55777",
            "BOMRef": "pkg:cargo/anstyle-parse@0.2.0"
          },
          "Version": "0.2.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "utf8parse@0.2.1"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "anstyle-query@1.0.0",
          "Name": "anstyle-query",
          "Identifier": {
            "PURL": "pkg:cargo/anstyle-query@1.0.0",
            "UID": "9474a2ff86ef5584",
            "BOMRef": "pkg:cargo/anstyle-query@1.0.0"
          },
          "Version": "1.0.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "windows-sys@0.48.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "anstyle-wincon@3.0.1",
          "Name": "anstyle-wincon",
          "Identifier": {
            "PURL": "pkg:cargo/anstyle-wincon@3.0.1",
            "UID": "67ee10636c26c538",
            "BOMRef": "pkg:cargo/anstyle-wincon@3.0.1"
          },
          "Version": "3.0.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "anstyle@1.0.8",
            "windows-sys@0.48.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "antidote@1.0.0",
          "Name": "antidote",
          "Identifier": {
            "PURL": "pkg:cargo/antidote@1.0.0",
            "UID": "84bf7f3b57df6403",
            "BOMRef": "pkg:cargo/antidote@1.0.0"
          },
          "Version": "1.0.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "anyhow@1.0.100",
          "Name": "anyhow",
          "Identifier": {
            "PURL": "pkg:cargo/anyhow@1.0.100",
            "UID": "db58a502dc484420",
            "BOMRef": "pkg:cargo/anyhow@1.0.100"
          },
          "Version": "1.0.100",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "approx@0.5.1",
          "Name": "approx",
          "Identifier": {
            "PURL": "pkg:cargo/approx@0.5.1",
            "UID": "ccaf20a38a3dd7b5",
            "BOMRef": "pkg:cargo/approx@0.5.1"
          },
          "Version": "0.5.1",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "num-traits@0.2.19"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "arc-swap@1.7.1",
          "Name": "arc-swap",
          "Identifier": {
            "PURL": "pkg:cargo/arc-swap@1.7.1",
            "UID": "4469abee9ee696d9",
            "BOMRef": "pkg:cargo/arc-swap@1.7.1"
          },
          "Version": "1.7.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "arraydeque@0.5.1",
          "Name": "arraydeque",
          "Identifier": {
            "PURL": "pkg:cargo/arraydeque@0.5.1",
            "UID": "766876a2922008da",
            "BOMRef": "pkg:cargo/arraydeque@0.5.1"
          },
          "Version": "0.5.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "arrayvec@0.4.12",
          "Name": "arrayvec",
          "Identifier": {
            "PURL": "pkg:cargo/arrayvec@0.4.12",
            "UID": "fe978abc54b35676",
            "BOMRef": "pkg:cargo/arrayvec@0.4.12"
          },
          "Version": "0.4.12",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "nodrop@0.1.14"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "arrayvec@0.7.6",
          "Name": "arrayvec",
          "Identifier": {
            "PURL": "pkg:cargo/arrayvec@0.7.6",
            "UID": "257e16976c67c8bb",
            "BOMRef": "pkg:cargo/arrayvec@0.7.6"
          },
          "Version": "0.7.6",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "ash@0.38.0+1.3.281",
          "Name": "ash",
          "Identifier": {
            "PURL": "pkg:cargo/ash@0.38.0%2B1.3.281",
            "UID": "fdbb5ca3d0694f96",
            "BOMRef": "pkg:cargo/ash@0.38.0%2B1.3.281"
          },
          "Version": "0.38.0+1.3.281",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "libloading@0.8.5"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "async-stream@0.3.3",
          "Name": "async-stream",
          "Identifier": {
            "PURL": "pkg:cargo/async-stream@0.3.3",
            "UID": "d23ba08b881caac",
            "BOMRef": "pkg:cargo/async-stream@0.3.3"
          },
          "Version": "0.3.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "async-stream-impl@0.3.3",
            "futures-core@0.3.31"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "async-stream-impl@0.3.3",
          "Name": "async-stream-impl",
          "Identifier": {
            "PURL": "pkg:cargo/async-stream-impl@0.3.3",
            "UID": "68e42099681fd9b",
            "BOMRef": "pkg:cargo/async-stream-impl@0.3.3"
          },
          "Version": "0.3.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@1.0.107"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "async-trait@0.1.89",
          "Name": "async-trait",
          "Identifier": {
            "PURL": "pkg:cargo/async-trait@0.1.89",
            "UID": "4fc17ec3691d0767",
            "BOMRef": "pkg:cargo/async-trait@0.1.89"
          },
          "Version": "0.1.89",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@2.0.111"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "atomic_refcell@0.1.13",
          "Name": "atomic_refcell",
          "Identifier": {
            "PURL": "pkg:cargo/atomic_refcell@0.1.13",
            "UID": "cbdadc0014f17dab",
            "BOMRef": "pkg:cargo/atomic_refcell@0.1.13"
          },
          "Version": "0.1.13",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "atomicwrites@0.4.4",
          "Name": "atomicwrites",
          "Identifier": {
            "PURL": "pkg:cargo/atomicwrites@0.4.4",
            "UID": "2b425cc4902849e5",
            "BOMRef": "pkg:cargo/atomicwrites@0.4.4"
          },
          "Version": "0.4.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "rustix@0.38.40",
            "tempfile@3.23.0",
            "windows-sys@0.52.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "axum@0.6.12",
          "Name": "axum",
          "Identifier": {
            "PURL": "pkg:cargo/axum@0.6.12",
            "UID": "a5fcddf99094a61a",
            "BOMRef": "pkg:cargo/axum@0.6.12"
          },
          "Version": "0.6.12",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "async-trait@0.1.89",
            "axum-core@0.3.3",
            "bitflags@1.3.2",
            "bytes@1.10.1",
            "futures-util@0.3.31",
            "http-body@0.4.5",
            "http@0.2.12",
            "hyper@0.14.26",
            "itoa@1.0.5",
            "matchit@0.7.0",
            "memchr@2.7.4",
            "mime@0.3.16",
            "percent-encoding@2.3.2",
            "pin-project-lite@0.2.12",
            "serde@1.0.226",
            "sync_wrapper@0.1.2",
            "tower-layer@0.3.3",
            "tower-service@0.3.3",
            "tower@0.4.13"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "axum@0.7.5",
          "Name": "axum",
          "Identifier": {
            "PURL": "pkg:cargo/axum@0.7.5",
            "UID": "27f73c322f350629",
            "BOMRef": "pkg:cargo/axum@0.7.5"
          },
          "Version": "0.7.5",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "async-trait@0.1.89",
            "axum-core@0.4.3",
            "bytes@1.10.1",
            "futures-util@0.3.31",
            "http-body-util@0.1.2",
            "http-body@1.0.0",
            "http@1.3.1",
            "itoa@1.0.5",
            "matchit@0.7.0",
            "memchr@2.7.4",
            "mime@0.3.16",
            "percent-encoding@2.3.2",
            "pin-project-lite@0.2.12",
            "serde@1.0.226",
            "sync_wrapper@1.0.1",
            "tower-layer@0.3.3",
            "tower-service@0.3.3",
            "tower@0.4.13"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "axum-core@0.3.3",
          "Name": "axum-core",
          "Identifier": {
            "PURL": "pkg:cargo/axum-core@0.3.3",
            "UID": "a369216501cac2f1",
            "BOMRef": "pkg:cargo/axum-core@0.3.3"
          },
          "Version": "0.3.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "async-trait@0.1.89",
            "bytes@1.10.1",
            "futures-util@0.3.31",
            "http-body@0.4.5",
            "http@0.2.12",
            "mime@0.3.16",
            "tower-layer@0.3.3",
            "tower-service@0.3.3"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "axum-core@0.4.3",
          "Name": "axum-core",
          "Identifier": {
            "PURL": "pkg:cargo/axum-core@0.4.3",
            "UID": "948e035021e26613",
            "BOMRef": "pkg:cargo/axum-core@0.4.3"
          },
          "Version": "0.4.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "async-trait@0.1.89",
            "bytes@1.10.1",
            "futures-util@0.3.31",
            "http-body-util@0.1.2",
            "http-body@1.0.0",
            "http@1.3.1",
            "mime@0.3.16",
            "pin-project-lite@0.2.12",
            "sync_wrapper@0.1.2",
            "tower-layer@0.3.3",
            "tower-service@0.3.3"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "backtrace@0.3.67",
          "Name": "backtrace",
          "Identifier": {
            "PURL": "pkg:cargo/backtrace@0.3.67",
            "UID": "64f8ba52ab7685ad",
            "BOMRef": "pkg:cargo/backtrace@0.3.67"
          },
          "Version": "0.3.67",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "addr2line@0.19.0",
            "cfg-if@1.0.0",
            "libc@0.2.174",
            "miniz_oxide@0.6.2",
            "object@0.30.0",
            "rustc-demangle@0.1.21"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "base16ct@0.2.0",
          "Name": "base16ct",
          "Identifier": {
            "PURL": "pkg:cargo/base16ct@0.2.0",
            "UID": "2599668c76e752d0",
            "BOMRef": "pkg:cargo/base16ct@0.2.0"
          },
          "Version": "0.2.0",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "base64@0.13.1",
          "Name": "base64",
          "Identifier": {
            "PURL": "pkg:cargo/base64@0.13.1",
            "UID": "f25fbcf91bb959ef",
            "BOMRef": "pkg:cargo/base64@0.13.1"
          },
          "Version": "0.13.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "base64@0.21.0",
          "Name": "base64",
          "Identifier": {
            "PURL": "pkg:cargo/base64@0.21.0",
            "UID": "9ed334cc2581c9d1",
            "BOMRef": "pkg:cargo/base64@0.21.0"
          },
          "Version": "0.21.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "base64@0.22.0",
          "Name": "base64",
          "Identifier": {
            "PURL": "pkg:cargo/base64@0.22.0",
            "UID": "61a8f79a0fae923d",
            "BOMRef": "pkg:cargo/base64@0.22.0"
          },
          "Version": "0.22.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "base64ct@1.8.0",
          "Name": "base64ct",
          "Identifier": {
            "PURL": "pkg:cargo/base64ct@1.8.0",
            "UID": "b26754ba5e2a61b",
            "BOMRef": "pkg:cargo/base64ct@1.8.0"
          },
          "Version": "1.8.0",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "bincode@1.3.3",
          "Name": "bincode",
          "Identifier": {
            "PURL": "pkg:cargo/bincode@1.3.3",
            "UID": "cf861d0a87b51825",
            "BOMRef": "pkg:cargo/bincode@1.3.3"
          },
          "Version": "1.3.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "serde@1.0.226"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "bincode@2.0.1",
          "Name": "bincode",
          "Identifier": {
            "PURL": "pkg:cargo/bincode@2.0.1",
            "UID": "f246e638c043f0cd",
            "BOMRef": "pkg:cargo/bincode@2.0.1"
          },
          "Version": "2.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "bincode_derive@2.0.1",
            "serde@1.0.226",
            "unty@0.0.4"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "bincode_derive@2.0.1",
          "Name": "bincode_derive",
          "Identifier": {
            "PURL": "pkg:cargo/bincode_derive@2.0.1",
            "UID": "4bad5de6b1fddcd",
            "BOMRef": "pkg:cargo/bincode_derive@2.0.1"
          },
          "Version": "2.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "virtue@0.0.18"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "binout@0.2.1",
          "Name": "binout",
          "Identifier": {
            "PURL": "pkg:cargo/binout@0.2.1",
            "UID": "4f8ef1b43ba54a5b",
            "BOMRef": "pkg:cargo/binout@0.2.1"
          },
          "Version": "0.2.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "bitflags@1.3.2",
          "Name": "bitflags",
          "Identifier": {
            "PURL": "pkg:cargo/bitflags@1.3.2",
            "UID": "b6f0b44b16d1e933",
            "BOMRef": "pkg:cargo/bitflags@1.3.2"
          },
          "Version": "1.3.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "bitflags@2.9.1",
          "Name": "bitflags",
          "Identifier": {
            "PURL": "pkg:cargo/bitflags@2.9.1",
            "UID": "8d99d415150bc15b",
            "BOMRef": "pkg:cargo/bitflags@2.9.1"
          },
          "Version": "2.9.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "bitm@0.4.2",
          "Name": "bitm",
          "Identifier": {
            "PURL": "pkg:cargo/bitm@0.4.2",
            "UID": "a9be64b00bf1e0c",
            "BOMRef": "pkg:cargo/bitm@0.4.2"
          },
          "Version": "0.4.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "dyn_size_of@0.4.2"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "bitpacking@0.9.2",
          "Name": "bitpacking",
          "Identifier": {
            "PURL": "pkg:cargo/bitpacking@0.9.2",
            "UID": "2dc57988e153f424",
            "BOMRef": "pkg:cargo/bitpacking@0.9.2"
          },
          "Version": "0.9.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "crunchy@0.2.2"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "bitvec@1.0.1",
          "Name": "bitvec",
          "Identifier": {
            "PURL": "pkg:cargo/bitvec@1.0.1",
            "UID": "290a5ddfa7919504",
            "BOMRef": "pkg:cargo/bitvec@1.0.1"
          },
          "Version": "1.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "funty@2.0.0",
            "radium@0.7.0",
            "tap@1.0.1",
            "wyz@0.5.1"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "blake2-rfc@0.2.18",
          "Name": "blake2-rfc",
          "Identifier": {
            "PURL": "pkg:cargo/blake2-rfc@0.2.18",
            "UID": "163a3946b4b903c8",
            "BOMRef": "pkg:cargo/blake2-rfc@0.2.18"
          },
          "Version": "0.2.18",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "arrayvec@0.4.12",
            "constant_time_eq@0.1.5"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "block-buffer@0.10.3",
          "Name": "block-buffer",
          "Identifier": {
            "PURL": "pkg:cargo/block-buffer@0.10.3",
            "UID": "d25645a1167acf0c",
            "BOMRef": "pkg:cargo/block-buffer@0.10.3"
          },
          "Version": "0.10.3",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "generic-array@0.14.9"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "brotli@8.0.1",
          "Name": "brotli",
          "Identifier": {
            "PURL": "pkg:cargo/brotli@8.0.1",
            "UID": "d7efb528b9c3be27",
            "BOMRef": "pkg:cargo/brotli@8.0.1"
          },
          "Version": "8.0.1",
          "Licenses": [
            "BSD-3-Clause AND MIT"
          ],
          "DependsOn": [
            "alloc-no-stdlib@2.0.4",
            "alloc-stdlib@0.2.2",
            "brotli-decompressor@5.0.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "brotli-decompressor@5.0.0",
          "Name": "brotli-decompressor",
          "Identifier": {
            "PURL": "pkg:cargo/brotli-decompressor@5.0.0",
            "UID": "1f7d385981cc38f9",
            "BOMRef": "pkg:cargo/brotli-decompressor@5.0.0"
          },
          "Version": "5.0.0",
          "Licenses": [
            "BSD-3-Clause OR MIT"
          ],
          "DependsOn": [
            "alloc-no-stdlib@2.0.4",
            "alloc-stdlib@0.2.2"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "bumpalo@3.11.1",
          "Name": "bumpalo",
          "Identifier": {
            "PURL": "pkg:cargo/bumpalo@3.11.1",
            "UID": "6abadc2d74b6ddb",
            "BOMRef": "pkg:cargo/bumpalo@3.11.1"
          },
          "Version": "3.11.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "bytemuck@1.24.0",
          "Name": "bytemuck",
          "Identifier": {
            "PURL": "pkg:cargo/bytemuck@1.24.0",
            "UID": "e83e9d03a6ef20e0",
            "BOMRef": "pkg:cargo/bytemuck@1.24.0"
          },
          "Version": "1.24.0",
          "Licenses": [
            "Zlib OR Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "bytemuck_derive@1.10.2"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "bytemuck_derive@1.10.2",
          "Name": "bytemuck_derive",
          "Identifier": {
            "PURL": "pkg:cargo/bytemuck_derive@1.10.2",
            "UID": "d439e94a170ea8fb",
            "BOMRef": "pkg:cargo/bytemuck_derive@1.10.2"
          },
          "Version": "1.10.2",
          "Licenses": [
            "Zlib OR Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@2.0.111"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "byteorder@1.5.0",
          "Name": "byteorder",
          "Identifier": {
            "PURL": "pkg:cargo/byteorder@1.5.0",
            "UID": "b9408f2dd1dd95d1",
            "BOMRef": "pkg:cargo/byteorder@1.5.0"
          },
          "Version": "1.5.0",
          "Licenses": [
            "Unlicense OR MIT"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "bytes@1.10.1",
          "Name": "bytes",
          "Identifier": {
            "PURL": "pkg:cargo/bytes@1.10.1",
            "UID": "a2a08c96cd9b1a48",
            "BOMRef": "pkg:cargo/bytes@1.10.1"
          },
          "Version": "1.10.1",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "bytestring@1.2.0",
          "Name": "bytestring",
          "Identifier": {
            "PURL": "pkg:cargo/bytestring@1.2.0",
            "UID": "2868311482212d61",
            "BOMRef": "pkg:cargo/bytestring@1.2.0"
          },
          "Version": "1.2.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "bytes@1.10.1"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "bzip2-sys@0.1.11+1.0.8",
          "Name": "bzip2-sys",
          "Identifier": {
            "PURL": "pkg:cargo/bzip2-sys@0.1.11%2B1.0.8",
            "UID": "49e31cd441d1fbad",
            "BOMRef": "pkg:cargo/bzip2-sys@0.1.11%2B1.0.8"
          },
          "Version": "0.1.11+1.0.8",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "libc@0.2.174"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "cedarwood@0.4.6",
          "Name": "cedarwood",
          "Identifier": {
            "PURL": "pkg:cargo/cedarwood@0.4.6",
            "UID": "e13411671cdc73d9",
            "BOMRef": "pkg:cargo/cedarwood@0.4.6"
          },
          "Version": "0.4.6",
          "Licenses": [
            "BSD-2-Clause"
          ],
          "DependsOn": [
            "smallvec@1.15.1"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "cfg-if@1.0.0",
          "Name": "cfg-if",
          "Identifier": {
            "PURL": "pkg:cargo/cfg-if@1.0.0",
            "UID": "c9661a297fc0e1f5",
            "BOMRef": "pkg:cargo/cfg-if@1.0.0"
          },
          "Version": "1.0.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "cgroups-rs@0.3.4",
          "Name": "cgroups-rs",
          "Identifier": {
            "PURL": "pkg:cargo/cgroups-rs@0.3.4",
            "UID": "979f284afbb90dbf",
            "BOMRef": "pkg:cargo/cgroups-rs@0.3.4"
          },
          "Version": "0.3.4",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "libc@0.2.174",
            "log@0.4.29",
            "nix@0.25.1",
            "regex@1.11.0",
            "thiserror@1.0.69"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "charabia@0.9.7",
          "Name": "charabia",
          "Identifier": {
            "PURL": "pkg:cargo/charabia@0.9.7",
            "UID": "6d71d20239fc001f",
            "BOMRef": "pkg:cargo/charabia@0.9.7"
          },
          "Version": "0.9.7",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "aho-corasick@1.1.3",
            "csv@1.4.0",
            "either@1.13.0",
            "fst@0.4.7",
            "irg-kvariants@0.1.1",
            "jieba-rs@0.7.3",
            "once_cell@1.21.3",
            "serde@1.0.226",
            "slice-group-by@0.3.1",
            "unicode-normalization@0.1.24",
            "whatlang@0.16.4"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "chrono@0.4.42",
          "Name": "chrono",
          "Identifier": {
            "PURL": "pkg:cargo/chrono@0.4.42",
            "UID": "d84761a4ea60b87e",
            "BOMRef": "pkg:cargo/chrono@0.4.42"
          },
          "Version": "0.4.42",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "iana-time-zone@0.1.53",
            "js-sys@0.3.77",
            "num-traits@0.2.19",
            "serde@1.0.226",
            "wasm-bindgen@0.2.100",
            "windows-link@0.2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "clap@4.5.53",
          "Name": "clap",
          "Identifier": {
            "PURL": "pkg:cargo/clap@4.5.53",
            "UID": "b659c0ed7a371a4",
            "BOMRef": "pkg:cargo/clap@4.5.53"
          },
          "Version": "4.5.53",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "clap_builder@4.5.53",
            "clap_derive@4.5.49"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "clap_builder@4.5.53",
          "Name": "clap_builder",
          "Identifier": {
            "PURL": "pkg:cargo/clap_builder@4.5.53",
            "UID": "45e18677c3c24472",
            "BOMRef": "pkg:cargo/clap_builder@4.5.53"
          },
          "Version": "4.5.53",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "anstream@0.6.11",
            "anstyle@1.0.8",
            "clap_lex@0.7.4",
            "strsim@0.11.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "clap_derive@4.5.49",
          "Name": "clap_derive",
          "Identifier": {
            "PURL": "pkg:cargo/clap_derive@4.5.49",
            "UID": "30379bd9bdd675e8",
            "BOMRef": "pkg:cargo/clap_derive@4.5.49"
          },
          "Version": "4.5.49",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "heck@0.5.0",
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@2.0.111"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "clap_lex@0.7.4",
          "Name": "clap_lex",
          "Identifier": {
            "PURL": "pkg:cargo/clap_lex@0.7.4",
            "UID": "1701f2aca330452d",
            "BOMRef": "pkg:cargo/clap_lex@0.7.4"
          },
          "Version": "0.7.4",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "colorchoice@1.0.0",
          "Name": "colorchoice",
          "Identifier": {
            "PURL": "pkg:cargo/colorchoice@1.0.0",
            "UID": "d15e3d476d28847d",
            "BOMRef": "pkg:cargo/colorchoice@1.0.0"
          },
          "Version": "1.0.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "colored@3.0.0",
          "Name": "colored",
          "Identifier": {
            "PURL": "pkg:cargo/colored@3.0.0",
            "UID": "ad4f02330f73cc28",
            "BOMRef": "pkg:cargo/colored@3.0.0"
          },
          "Version": "3.0.0",
          "Licenses": [
            "MPL-2.0"
          ],
          "DependsOn": [
            "windows-sys@0.48.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "config@0.15.18",
          "Name": "config",
          "Identifier": {
            "PURL": "pkg:cargo/config@0.15.18",
            "UID": "7e4cd1f393d0a6b7",
            "BOMRef": "pkg:cargo/config@0.15.18"
          },
          "Version": "0.15.18",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "pathdiff@0.2.3",
            "serde_core@1.0.226",
            "winnow@0.7.13",
            "yaml-rust2@0.10.4"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "console@0.16.0",
          "Name": "console",
          "Identifier": {
            "PURL": "pkg:cargo/console@0.16.0",
            "UID": "e1caacf0d9248670",
            "BOMRef": "pkg:cargo/console@0.16.0"
          },
          "Version": "0.16.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "encode_unicode@1.0.0",
            "libc@0.2.174",
            "once_cell@1.21.3",
            "unicode-width@0.2.0",
            "windows-sys@0.60.2"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "console-api@0.8.1",
          "Name": "console-api",
          "Identifier": {
            "PURL": "pkg:cargo/console-api@0.8.1",
            "UID": "f63832adefa272f9",
            "BOMRef": "pkg:cargo/console-api@0.8.1"
          },
          "Version": "0.8.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "futures-core@0.3.31",
            "prost-types@0.13.1",
            "prost@0.13.1",
            "tonic@0.12.3",
            "tracing-core@0.1.35"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "console-subscriber@0.4.1",
          "Name": "console-subscriber",
          "Identifier": {
            "PURL": "pkg:cargo/console-subscriber@0.4.1",
            "UID": "abcdb14c738c9927",
            "BOMRef": "pkg:cargo/console-subscriber@0.4.1"
          },
          "Version": "0.4.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "console-api@0.8.1",
            "crossbeam-channel@0.5.15",
            "crossbeam-utils@0.8.20",
            "futures-task@0.3.31",
            "hdrhistogram@7.5.2",
            "humantime@2.3.0",
            "hyper-util@0.1.13",
            "parking_lot@0.12.5",
            "prost-types@0.13.1",
            "prost@0.13.1",
            "serde@1.0.226",
            "serde_json@1.0.145",
            "thread_local@1.1.7",
            "tokio-stream@0.1.17",
            "tokio@1.48.0",
            "tonic@0.12.3",
            "tracing-core@0.1.35",
            "tracing-subscriber@0.3.22",
            "tracing@0.1.43"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "const-oid@0.9.6",
          "Name": "const-oid",
          "Identifier": {
            "PURL": "pkg:cargo/const-oid@0.9.6",
            "UID": "dae225f8cbf3783b",
            "BOMRef": "pkg:cargo/const-oid@0.9.6"
          },
          "Version": "0.9.6",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "constant_time_eq@0.1.5",
          "Name": "constant_time_eq",
          "Identifier": {
            "PURL": "pkg:cargo/constant_time_eq@0.1.5",
            "UID": "d3a15dca3c91af11",
            "BOMRef": "pkg:cargo/constant_time_eq@0.1.5"
          },
          "Version": "0.1.5",
          "Licenses": [
            "CC0-1.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "constant_time_eq@0.4.2",
          "Name": "constant_time_eq",
          "Identifier": {
            "PURL": "pkg:cargo/constant_time_eq@0.4.2",
            "UID": "360b9f891d3f6993",
            "BOMRef": "pkg:cargo/constant_time_eq@0.4.2"
          },
          "Version": "0.4.2",
          "Licenses": [
            "CC0-1.0 OR MIT-0 OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "convert_case@0.10.0",
          "Name": "convert_case",
          "Identifier": {
            "PURL": "pkg:cargo/convert_case@0.10.0",
            "UID": "1624b4f929e78ef5",
            "BOMRef": "pkg:cargo/convert_case@0.10.0"
          },
          "Version": "0.10.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "unicode-segmentation@1.12.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "convert_case@0.4.0",
          "Name": "convert_case",
          "Identifier": {
            "PURL": "pkg:cargo/convert_case@0.4.0",
            "UID": "f04c344974bd888f",
            "BOMRef": "pkg:cargo/convert_case@0.4.0"
          },
          "Version": "0.4.0",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "cookie@0.16.2",
          "Name": "cookie",
          "Identifier": {
            "PURL": "pkg:cargo/cookie@0.16.2",
            "UID": "881aa55fa15f2f9b",
            "BOMRef": "pkg:cargo/cookie@0.16.2"
          },
          "Version": "0.16.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "percent-encoding@2.3.2",
            "time@0.3.17"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "core-foundation@0.9.4",
          "Name": "core-foundation",
          "Identifier": {
            "PURL": "pkg:cargo/core-foundation@0.9.4",
            "UID": "a175fbde9c1c5089",
            "BOMRef": "pkg:cargo/core-foundation@0.9.4"
          },
          "Version": "0.9.4",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "core-foundation-sys@0.8.7",
            "libc@0.2.174"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "core-foundation-sys@0.8.7",
          "Name": "core-foundation-sys",
          "Identifier": {
            "PURL": "pkg:cargo/core-foundation-sys@0.8.7",
            "UID": "5d709f7ae7a5970a",
            "BOMRef": "pkg:cargo/core-foundation-sys@0.8.7"
          },
          "Version": "0.8.7",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "core2@0.4.0",
          "Name": "core2",
          "Identifier": {
            "PURL": "pkg:cargo/core2@0.4.0",
            "UID": "25ced825ce9240cb",
            "BOMRef": "pkg:cargo/core2@0.4.0"
          },
          "Version": "0.4.0",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "memchr@2.7.4"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "count-min-sketch@0.1.8",
          "Name": "count-min-sketch",
          "Identifier": {
            "PURL": "pkg:cargo/count-min-sketch@0.1.8",
            "UID": "706b89e1b5b78fda",
            "BOMRef": "pkg:cargo/count-min-sketch@0.1.8"
          },
          "Version": "0.1.8",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "rand@0.8.5",
            "siphasher@1.0.1"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "cpp_demangle@0.4.2",
          "Name": "cpp_demangle",
          "Identifier": {
            "PURL": "pkg:cargo/cpp_demangle@0.4.2",
            "UID": "50f5b85453c0d8b3",
            "BOMRef": "pkg:cargo/cpp_demangle@0.4.2"
          },
          "Version": "0.4.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "cfg-if@1.0.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "cpufeatures@0.2.17",
          "Name": "cpufeatures",
          "Identifier": {
            "PURL": "pkg:cargo/cpufeatures@0.2.17",
            "UID": "f04eda62c310417e",
            "BOMRef": "pkg:cargo/cpufeatures@0.2.17"
          },
          "Version": "0.2.17",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "libc@0.2.174"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "crc32c@0.6.8",
          "Name": "crc32c",
          "Identifier": {
            "PURL": "pkg:cargo/crc32c@0.6.8",
            "UID": "dd5650a6dca801e6",
            "BOMRef": "pkg:cargo/crc32c@0.6.8"
          },
          "Version": "0.6.8",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "crc32fast@1.3.2",
          "Name": "crc32fast",
          "Identifier": {
            "PURL": "pkg:cargo/crc32fast@1.3.2",
            "UID": "579d65762069b4e3",
            "BOMRef": "pkg:cargo/crc32fast@1.3.2"
          },
          "Version": "1.3.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "cfg-if@1.0.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "crossbeam-channel@0.5.15",
          "Name": "crossbeam-channel",
          "Identifier": {
            "PURL": "pkg:cargo/crossbeam-channel@0.5.15",
            "UID": "fe8b016548719e74",
            "BOMRef": "pkg:cargo/crossbeam-channel@0.5.15"
          },
          "Version": "0.5.15",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "crossbeam-utils@0.8.20"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "crossbeam-deque@0.8.2",
          "Name": "crossbeam-deque",
          "Identifier": {
            "PURL": "pkg:cargo/crossbeam-deque@0.8.2",
            "UID": "4b1060f262af9bf5",
            "BOMRef": "pkg:cargo/crossbeam-deque@0.8.2"
          },
          "Version": "0.8.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "cfg-if@1.0.0",
            "crossbeam-epoch@0.9.13",
            "crossbeam-utils@0.8.20"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "crossbeam-epoch@0.9.13",
          "Name": "crossbeam-epoch",
          "Identifier": {
            "PURL": "pkg:cargo/crossbeam-epoch@0.9.13",
            "UID": "3e86fb07c4a54f77",
            "BOMRef": "pkg:cargo/crossbeam-epoch@0.9.13"
          },
          "Version": "0.9.13",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "cfg-if@1.0.0",
            "crossbeam-utils@0.8.20",
            "memoffset@0.7.1",
            "scopeguard@1.1.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "crossbeam-utils@0.8.20",
          "Name": "crossbeam-utils",
          "Identifier": {
            "PURL": "pkg:cargo/crossbeam-utils@0.8.20",
            "UID": "8ebd2ec2b04e58d1",
            "BOMRef": "pkg:cargo/crossbeam-utils@0.8.20"
          },
          "Version": "0.8.20",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "crunchy@0.2.2",
          "Name": "crunchy",
          "Identifier": {
            "PURL": "pkg:cargo/crunchy@0.2.2",
            "UID": "e84796f3d7bd2810",
            "BOMRef": "pkg:cargo/crunchy@0.2.2"
          },
          "Version": "0.2.2",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "crypto-bigint@0.5.5",
          "Name": "crypto-bigint",
          "Identifier": {
            "PURL": "pkg:cargo/crypto-bigint@0.5.5",
            "UID": "90b4ddc01f064ed7",
            "BOMRef": "pkg:cargo/crypto-bigint@0.5.5"
          },
          "Version": "0.5.5",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "generic-array@0.14.9",
            "rand_core@0.6.4",
            "subtle@2.5.0",
            "zeroize@1.8.1"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "crypto-common@0.1.6",
          "Name": "crypto-common",
          "Identifier": {
            "PURL": "pkg:cargo/crypto-common@0.1.6",
            "UID": "743650e950b8b5b6",
            "BOMRef": "pkg:cargo/crypto-common@0.1.6"
          },
          "Version": "0.1.6",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "generic-array@0.14.9",
            "typenum@1.16.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "csv@1.4.0",
          "Name": "csv",
          "Identifier": {
            "PURL": "pkg:cargo/csv@1.4.0",
            "UID": "4dad055a859a8f05",
            "BOMRef": "pkg:cargo/csv@1.4.0"
          },
          "Version": "1.4.0",
          "Licenses": [
            "Unlicense OR MIT"
          ],
          "DependsOn": [
            "csv-core@0.1.11",
            "itoa@1.0.5",
            "ryu@1.0.12",
            "serde_core@1.0.226"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "csv-core@0.1.11",
          "Name": "csv-core",
          "Identifier": {
            "PURL": "pkg:cargo/csv-core@0.1.11",
            "UID": "1d4eb5aaeed42d9b",
            "BOMRef": "pkg:cargo/csv-core@0.1.11"
          },
          "Version": "0.1.11",
          "Licenses": [
            "Unlicense OR MIT"
          ],
          "DependsOn": [
            "memchr@2.7.4"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "curve25519-dalek@4.1.3",
          "Name": "curve25519-dalek",
          "Identifier": {
            "PURL": "pkg:cargo/curve25519-dalek@4.1.3",
            "UID": "5a753e8fef005700",
            "BOMRef": "pkg:cargo/curve25519-dalek@4.1.3"
          },
          "Version": "4.1.3",
          "Licenses": [
            "BSD-3-Clause"
          ],
          "DependsOn": [
            "cfg-if@1.0.0",
            "cpufeatures@0.2.17",
            "curve25519-dalek-derive@0.1.1",
            "digest@0.10.7",
            "fiat-crypto@0.2.9",
            "subtle@2.5.0",
            "zeroize@1.8.1"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "curve25519-dalek-derive@0.1.1",
          "Name": "curve25519-dalek-derive",
          "Identifier": {
            "PURL": "pkg:cargo/curve25519-dalek-derive@0.1.1",
            "UID": "d4413800cd8fc9b8",
            "BOMRef": "pkg:cargo/curve25519-dalek-derive@0.1.1"
          },
          "Version": "0.1.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@2.0.111"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "cxx@1.0.85",
          "Name": "cxx",
          "Identifier": {
            "PURL": "pkg:cargo/cxx@1.0.85",
            "UID": "e68b8057fbb62906",
            "BOMRef": "pkg:cargo/cxx@1.0.85"
          },
          "Version": "1.0.85",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "cxxbridge-macro@1.0.85",
            "link-cplusplus@1.0.8"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "cxxbridge-macro@1.0.85",
          "Name": "cxxbridge-macro",
          "Identifier": {
            "PURL": "pkg:cargo/cxxbridge-macro@1.0.85",
            "UID": "5b8e4aa316c15cd5",
            "BOMRef": "pkg:cargo/cxxbridge-macro@1.0.85"
          },
          "Version": "1.0.85",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@1.0.107"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "daachorse@1.0.0",
          "Name": "daachorse",
          "Identifier": {
            "PURL": "pkg:cargo/daachorse@1.0.0",
            "UID": "53901be2e04bfd6f",
            "BOMRef": "pkg:cargo/daachorse@1.0.0"
          },
          "Version": "1.0.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "darling@0.20.8",
          "Name": "darling",
          "Identifier": {
            "PURL": "pkg:cargo/darling@0.20.8",
            "UID": "5b9aa27730dd4637",
            "BOMRef": "pkg:cargo/darling@0.20.8"
          },
          "Version": "0.20.8",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "darling_core@0.20.8",
            "darling_macro@0.20.8"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "darling_core@0.20.8",
          "Name": "darling_core",
          "Identifier": {
            "PURL": "pkg:cargo/darling_core@0.20.8",
            "UID": "a0f8ec6b790884dc",
            "BOMRef": "pkg:cargo/darling_core@0.20.8"
          },
          "Version": "0.20.8",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "fnv@1.0.7",
            "ident_case@1.0.1",
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "strsim@0.10.0",
            "syn@2.0.111"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "darling_macro@0.20.8",
          "Name": "darling_macro",
          "Identifier": {
            "PURL": "pkg:cargo/darling_macro@0.20.8",
            "UID": "f9f930eb614288d7",
            "BOMRef": "pkg:cargo/darling_macro@0.20.8"
          },
          "Version": "0.20.8",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "darling_core@0.20.8",
            "quote@1.0.42",
            "syn@2.0.111"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "dary_heap@0.3.7",
          "Name": "dary_heap",
          "Identifier": {
            "PURL": "pkg:cargo/dary_heap@0.3.7",
            "UID": "6caa21188eeb5ac4",
            "BOMRef": "pkg:cargo/dary_heap@0.3.7"
          },
          "Version": "0.3.7",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "dashmap@6.1.0",
          "Name": "dashmap",
          "Identifier": {
            "PURL": "pkg:cargo/dashmap@6.1.0",
            "UID": "5718f2a7bf959f8",
            "BOMRef": "pkg:cargo/dashmap@6.1.0"
          },
          "Version": "6.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "cfg-if@1.0.0",
            "crossbeam-utils@0.8.20",
            "hashbrown@0.14.2",
            "lock_api@0.4.14",
            "once_cell@1.21.3",
            "parking_lot_core@0.9.12"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "data-encoding@2.9.0",
          "Name": "data-encoding",
          "Identifier": {
            "PURL": "pkg:cargo/data-encoding@2.9.0",
            "UID": "9315ec61ad6735e4",
            "BOMRef": "pkg:cargo/data-encoding@2.9.0"
          },
          "Version": "2.9.0",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "debugid@0.8.0",
          "Name": "debugid",
          "Identifier": {
            "PURL": "pkg:cargo/debugid@0.8.0",
            "UID": "b4184acfa3a6776b",
            "BOMRef": "pkg:cargo/debugid@0.8.0"
          },
          "Version": "0.8.0",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "uuid@1.19.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "delegate@0.13.4",
          "Name": "delegate",
          "Identifier": {
            "PURL": "pkg:cargo/delegate@0.13.4",
            "UID": "aeb9e2a9b38d6d00",
            "BOMRef": "pkg:cargo/delegate@0.13.4"
          },
          "Version": "0.13.4",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@2.0.111"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "der@0.7.10",
          "Name": "der",
          "Identifier": {
            "PURL": "pkg:cargo/der@0.7.10",
            "UID": "b565282f27988249",
            "BOMRef": "pkg:cargo/der@0.7.10"
          },
          "Version": "0.7.10",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "const-oid@0.9.6",
            "pem-rfc7468@0.7.0",
            "zeroize@1.8.1"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "derive_more@0.99.17",
          "Name": "derive_more",
          "Identifier": {
            "PURL": "pkg:cargo/derive_more@0.99.17",
            "UID": "ca10f0459ac4d624",
            "BOMRef": "pkg:cargo/derive_more@0.99.17"
          },
          "Version": "0.99.17",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "convert_case@0.4.0",
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@1.0.107"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "derive_more@2.1.0",
          "Name": "derive_more",
          "Identifier": {
            "PURL": "pkg:cargo/derive_more@2.1.0",
            "UID": "90305b94ee75ddac",
            "BOMRef": "pkg:cargo/derive_more@2.1.0"
          },
          "Version": "2.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "derive_more-impl@2.1.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "derive_more-impl@2.1.0",
          "Name": "derive_more-impl",
          "Identifier": {
            "PURL": "pkg:cargo/derive_more-impl@2.1.0",
            "UID": "d99eb219ef82432b",
            "BOMRef": "pkg:cargo/derive_more-impl@2.1.0"
          },
          "Version": "2.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "convert_case@0.10.0",
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@2.0.111",
            "unicode-xid@0.2.6"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "digest@0.10.7",
          "Name": "digest",
          "Identifier": {
            "PURL": "pkg:cargo/digest@0.10.7",
            "UID": "7dcdaffcf115c9c4",
            "BOMRef": "pkg:cargo/digest@0.10.7"
          },
          "Version": "0.10.7",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "block-buffer@0.10.3",
            "const-oid@0.9.6",
            "crypto-common@0.1.6",
            "subtle@2.5.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "displaydoc@0.2.5",
          "Name": "displaydoc",
          "Identifier": {
            "PURL": "pkg:cargo/displaydoc@0.2.5",
            "UID": "54b827e850940d21",
            "BOMRef": "pkg:cargo/displaydoc@0.2.5"
          },
          "Version": "0.2.5",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@2.0.111"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "docopt@1.1.1",
          "Name": "docopt",
          "Identifier": {
            "PURL": "pkg:cargo/docopt@1.1.1",
            "UID": "ee6767ef79654813",
            "BOMRef": "pkg:cargo/docopt@1.1.1"
          },
          "Version": "1.1.1",
          "Licenses": [
            "Unlicense OR MIT"
          ],
          "DependsOn": [
            "lazy_static@1.5.0",
            "regex@1.11.0",
            "serde@1.0.226",
            "strsim@0.10.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "dyn-clone@1.0.10",
          "Name": "dyn-clone",
          "Identifier": {
            "PURL": "pkg:cargo/dyn-clone@1.0.10",
            "UID": "88bdadf788d3760a",
            "BOMRef": "pkg:cargo/dyn-clone@1.0.10"
          },
          "Version": "1.0.10",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "dyn_size_of@0.4.2",
          "Name": "dyn_size_of",
          "Identifier": {
            "PURL": "pkg:cargo/dyn_size_of@0.4.2",
            "UID": "c7abd86d6360253",
            "BOMRef": "pkg:cargo/dyn_size_of@0.4.2"
          },
          "Version": "0.4.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "earcutr@0.4.2",
          "Name": "earcutr",
          "Identifier": {
            "PURL": "pkg:cargo/earcutr@0.4.2",
            "UID": "837fae8627a30e1a",
            "BOMRef": "pkg:cargo/earcutr@0.4.2"
          },
          "Version": "0.4.2",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "itertools@0.10.5",
            "num-traits@0.2.19"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "ecdsa@0.16.9",
          "Name": "ecdsa",
          "Identifier": {
            "PURL": "pkg:cargo/ecdsa@0.16.9",
            "UID": "265c1578a45ce558",
            "BOMRef": "pkg:cargo/ecdsa@0.16.9"
          },
          "Version": "0.16.9",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "der@0.7.10",
            "digest@0.10.7",
            "elliptic-curve@0.13.8",
            "rfc6979@0.4.0",
            "signature@2.2.0",
            "spki@0.7.3"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "ecow@0.2.6",
          "Name": "ecow",
          "Identifier": {
            "PURL": "pkg:cargo/ecow@0.2.6",
            "UID": "e263ab9153b8a38a",
            "BOMRef": "pkg:cargo/ecow@0.2.6"
          },
          "Version": "0.2.6",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "serde@1.0.226"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "ed25519@2.2.3",
          "Name": "ed25519",
          "Identifier": {
            "PURL": "pkg:cargo/ed25519@2.2.3",
            "UID": "19cf8e4434f2ddde",
            "BOMRef": "pkg:cargo/ed25519@2.2.3"
          },
          "Version": "2.2.3",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "pkcs8@0.10.2",
            "signature@2.2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "ed25519-dalek@2.2.0",
          "Name": "ed25519-dalek",
          "Identifier": {
            "PURL": "pkg:cargo/ed25519-dalek@2.2.0",
            "UID": "b9f28964bf096b4f",
            "BOMRef": "pkg:cargo/ed25519-dalek@2.2.0"
          },
          "Version": "2.2.0",
          "Licenses": [
            "BSD-3-Clause"
          ],
          "DependsOn": [
            "curve25519-dalek@4.1.3",
            "ed25519@2.2.3",
            "serde@1.0.226",
            "sha2@0.10.9",
            "subtle@2.5.0",
            "zeroize@1.8.1"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "either@1.13.0",
          "Name": "either",
          "Identifier": {
            "PURL": "pkg:cargo/either@1.13.0",
            "UID": "75e3484d69e700f0",
            "BOMRef": "pkg:cargo/either@1.13.0"
          },
          "Version": "1.13.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "elliptic-curve@0.13.8",
          "Name": "elliptic-curve",
          "Identifier": {
            "PURL": "pkg:cargo/elliptic-curve@0.13.8",
            "UID": "1f7ee49d6198b287",
            "BOMRef": "pkg:cargo/elliptic-curve@0.13.8"
          },
          "Version": "0.13.8",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "base16ct@0.2.0",
            "crypto-bigint@0.5.5",
            "digest@0.10.7",
            "ff@0.13.1",
            "generic-array@0.14.9",
            "group@0.13.0",
            "hkdf@0.12.4",
            "pem-rfc7468@0.7.0",
            "pkcs8@0.10.2",
            "rand_core@0.6.4",
            "sec1@0.7.3",
            "subtle@2.5.0",
            "zeroize@1.8.1"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "encode_unicode@1.0.0",
          "Name": "encode_unicode",
          "Identifier": {
            "PURL": "pkg:cargo/encode_unicode@1.0.0",
            "UID": "67c0be1d029fd691",
            "BOMRef": "pkg:cargo/encode_unicode@1.0.0"
          },
          "Version": "1.0.0",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "encoding_rs@0.8.33",
          "Name": "encoding_rs",
          "Identifier": {
            "PURL": "pkg:cargo/encoding_rs@0.8.33",
            "UID": "eb702fd2b756e972",
            "BOMRef": "pkg:cargo/encoding_rs@0.8.33"
          },
          "Version": "0.8.33",
          "Licenses": [
            "(Apache-2.0 OR MIT) AND BSD-3-Clause"
          ],
          "DependsOn": [
            "cfg-if@1.0.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "env_filter@0.1.0",
          "Name": "env_filter",
          "Identifier": {
            "PURL": "pkg:cargo/env_filter@0.1.0",
            "UID": "3248f1a7ee2a91e7",
            "BOMRef": "pkg:cargo/env_filter@0.1.0"
          },
          "Version": "0.1.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "log@0.4.29",
            "regex@1.11.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "env_logger@0.11.8",
          "Name": "env_logger",
          "Identifier": {
            "PURL": "pkg:cargo/env_logger@0.11.8",
            "UID": "8cef6243ce80c030",
            "BOMRef": "pkg:cargo/env_logger@0.11.8"
          },
          "Version": "0.11.8",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "anstream@0.6.11",
            "anstyle@1.0.8",
            "env_filter@0.1.0",
            "jiff@0.2.15",
            "log@0.4.29"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "equator@0.2.2",
          "Name": "equator",
          "Identifier": {
            "PURL": "pkg:cargo/equator@0.2.2",
            "UID": "cbf8cc6361e254e5",
            "BOMRef": "pkg:cargo/equator@0.2.2"
          },
          "Version": "0.2.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "equator-macro@0.2.1"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "equator-macro@0.2.1",
          "Name": "equator-macro",
          "Identifier": {
            "PURL": "pkg:cargo/equator-macro@0.2.1",
            "UID": "8df41b98039b7b50",
            "BOMRef": "pkg:cargo/equator-macro@0.2.1"
          },
          "Version": "0.2.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@2.0.111"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "equivalent@1.0.1",
          "Name": "equivalent",
          "Identifier": {
            "PURL": "pkg:cargo/equivalent@1.0.1",
            "UID": "8e62faad81468f6a",
            "BOMRef": "pkg:cargo/equivalent@1.0.1"
          },
          "Version": "1.0.1",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "erased-serde@0.3.31",
          "Name": "erased-serde",
          "Identifier": {
            "PURL": "pkg:cargo/erased-serde@0.3.31",
            "UID": "cbedcbb1704e5c14",
            "BOMRef": "pkg:cargo/erased-serde@0.3.31"
          },
          "Version": "0.3.31",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "serde@1.0.226"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "erased-serde@0.4.2",
          "Name": "erased-serde",
          "Identifier": {
            "PURL": "pkg:cargo/erased-serde@0.4.2",
            "UID": "c717b5474ee736cb",
            "BOMRef": "pkg:cargo/erased-serde@0.4.2"
          },
          "Version": "0.4.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "serde@1.0.226"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "errno@0.3.10",
          "Name": "errno",
          "Identifier": {
            "PURL": "pkg:cargo/errno@0.3.10",
            "UID": "3b546cc2425b57dc",
            "BOMRef": "pkg:cargo/errno@0.3.10"
          },
          "Version": "0.3.10",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "libc@0.2.174",
            "windows-sys@0.59.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "faccess@0.2.4",
          "Name": "faccess",
          "Identifier": {
            "PURL": "pkg:cargo/faccess@0.2.4",
            "UID": "38efa4285fd57038",
            "BOMRef": "pkg:cargo/faccess@0.2.4"
          },
          "Version": "0.2.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "bitflags@1.3.2",
            "libc@0.2.174",
            "winapi@0.3.9"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "fastrand@2.2.0",
          "Name": "fastrand",
          "Identifier": {
            "PURL": "pkg:cargo/fastrand@2.2.0",
            "UID": "c705dd2ecc146bdf",
            "BOMRef": "pkg:cargo/fastrand@2.2.0"
          },
          "Version": "2.2.0",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "ff@0.13.1",
          "Name": "ff",
          "Identifier": {
            "PURL": "pkg:cargo/ff@0.13.1",
            "UID": "3af79e251b504690",
            "BOMRef": "pkg:cargo/ff@0.13.1"
          },
          "Version": "0.13.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "rand_core@0.6.4",
            "subtle@2.5.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "fiat-crypto@0.2.9",
          "Name": "fiat-crypto",
          "Identifier": {
            "PURL": "pkg:cargo/fiat-crypto@0.2.9",
            "UID": "c65f5aae88a63fb",
            "BOMRef": "pkg:cargo/fiat-crypto@0.2.9"
          },
          "Version": "0.2.9",
          "Licenses": [
            "MIT OR Apache-2.0 OR BSD-1-Clause"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "filetime@0.2.19",
          "Name": "filetime",
          "Identifier": {
            "PURL": "pkg:cargo/filetime@0.2.19",
            "UID": "df0c72250135effe",
            "BOMRef": "pkg:cargo/filetime@0.2.19"
          },
          "Version": "0.2.19",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "cfg-if@1.0.0",
            "libc@0.2.174",
            "redox_syscall@0.2.16",
            "windows-sys@0.42.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "findshlibs@0.10.2",
          "Name": "findshlibs",
          "Identifier": {
            "PURL": "pkg:cargo/findshlibs@0.10.2",
            "UID": "b5e5cb7b4c263c8c",
            "BOMRef": "pkg:cargo/findshlibs@0.10.2"
          },
          "Version": "0.10.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "lazy_static@1.5.0",
            "libc@0.2.174",
            "winapi@0.3.9"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "fixedbitset@0.4.2",
          "Name": "fixedbitset",
          "Identifier": {
            "PURL": "pkg:cargo/fixedbitset@0.4.2",
            "UID": "baeaee41bdca94a4",
            "BOMRef": "pkg:cargo/fixedbitset@0.4.2"
          },
          "Version": "0.4.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "flate2@1.1.5",
          "Name": "flate2",
          "Identifier": {
            "PURL": "pkg:cargo/flate2@1.1.5",
            "UID": "ea48faa574ac12cd",
            "BOMRef": "pkg:cargo/flate2@1.1.5"
          },
          "Version": "1.1.5",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "crc32fast@1.3.2",
            "miniz_oxide@0.8.5"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "float_next_after@1.0.0",
          "Name": "float_next_after",
          "Identifier": {
            "PURL": "pkg:cargo/float_next_after@1.0.0",
            "UID": "250a42d158c13ec9",
            "BOMRef": "pkg:cargo/float_next_after@1.0.0"
          },
          "Version": "1.0.0",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "fnv@1.0.7",
          "Name": "fnv",
          "Identifier": {
            "PURL": "pkg:cargo/fnv@1.0.7",
            "UID": "aa65d9869acc23a4",
            "BOMRef": "pkg:cargo/fnv@1.0.7"
          },
          "Version": "1.0.7",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "foldhash@0.1.4",
          "Name": "foldhash",
          "Identifier": {
            "PURL": "pkg:cargo/foldhash@0.1.4",
            "UID": "b51970349dd373d",
            "BOMRef": "pkg:cargo/foldhash@0.1.4"
          },
          "Version": "0.1.4",
          "Licenses": [
            "Zlib"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "foreign-types@0.5.0",
          "Name": "foreign-types",
          "Identifier": {
            "PURL": "pkg:cargo/foreign-types@0.5.0",
            "UID": "eb76f682317edb67",
            "BOMRef": "pkg:cargo/foreign-types@0.5.0"
          },
          "Version": "0.5.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "foreign-types-macros@0.2.3",
            "foreign-types-shared@0.3.1"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "foreign-types-macros@0.2.3",
          "Name": "foreign-types-macros",
          "Identifier": {
            "PURL": "pkg:cargo/foreign-types-macros@0.2.3",
            "UID": "c629900639446597",
            "BOMRef": "pkg:cargo/foreign-types-macros@0.2.3"
          },
          "Version": "0.2.3",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@2.0.111"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "foreign-types-shared@0.3.1",
          "Name": "foreign-types-shared",
          "Identifier": {
            "PURL": "pkg:cargo/foreign-types-shared@0.3.1",
            "UID": "ac4564efd48fd2",
            "BOMRef": "pkg:cargo/foreign-types-shared@0.3.1"
          },
          "Version": "0.3.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "form_urlencoded@1.2.2",
          "Name": "form_urlencoded",
          "Identifier": {
            "PURL": "pkg:cargo/form_urlencoded@1.2.2",
            "UID": "fecd96e04e55eda4",
            "BOMRef": "pkg:cargo/form_urlencoded@1.2.2"
          },
          "Version": "1.2.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "percent-encoding@2.3.2"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "fs-err@3.2.0",
          "Name": "fs-err",
          "Identifier": {
            "PURL": "pkg:cargo/fs-err@3.2.0",
            "UID": "3c559562a6d3c39b",
            "BOMRef": "pkg:cargo/fs-err@3.2.0"
          },
          "Version": "3.2.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "path_facts@0.2.1",
            "tokio@1.48.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "fs4@0.13.1",
          "Name": "fs4",
          "Identifier": {
            "PURL": "pkg:cargo/fs4@0.13.1",
            "UID": "12d4aa45b3151ba3",
            "BOMRef": "pkg:cargo/fs4@0.13.1"
          },
          "Version": "0.13.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "rustix@1.0.2",
            "windows-sys@0.59.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "fs_extra@1.3.0",
          "Name": "fs_extra",
          "Identifier": {
            "PURL": "pkg:cargo/fs_extra@1.3.0",
            "UID": "37dd3f15924b523",
            "BOMRef": "pkg:cargo/fs_extra@1.3.0"
          },
          "Version": "1.3.0",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "fst@0.4.7",
          "Name": "fst",
          "Identifier": {
            "PURL": "pkg:cargo/fst@0.4.7",
            "UID": "5105d955d86392c7",
            "BOMRef": "pkg:cargo/fst@0.4.7"
          },
          "Version": "0.4.7",
          "Licenses": [
            "Unlicense OR MIT"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "funty@2.0.0",
          "Name": "funty",
          "Identifier": {
            "PURL": "pkg:cargo/funty@2.0.0",
            "UID": "ef827dcda428b03",
            "BOMRef": "pkg:cargo/funty@2.0.0"
          },
          "Version": "2.0.0",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "futures@0.3.31",
          "Name": "futures",
          "Identifier": {
            "PURL": "pkg:cargo/futures@0.3.31",
            "UID": "3abc1f7fba1d8610",
            "BOMRef": "pkg:cargo/futures@0.3.31"
          },
          "Version": "0.3.31",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "futures-channel@0.3.31",
            "futures-core@0.3.31",
            "futures-executor@0.3.31",
            "futures-io@0.3.31",
            "futures-sink@0.3.31",
            "futures-task@0.3.31",
            "futures-util@0.3.31"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "futures-channel@0.3.31",
          "Name": "futures-channel",
          "Identifier": {
            "PURL": "pkg:cargo/futures-channel@0.3.31",
            "UID": "da8fc90c8eabd4c2",
            "BOMRef": "pkg:cargo/futures-channel@0.3.31"
          },
          "Version": "0.3.31",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "futures-core@0.3.31",
            "futures-sink@0.3.31"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "futures-core@0.3.31",
          "Name": "futures-core",
          "Identifier": {
            "PURL": "pkg:cargo/futures-core@0.3.31",
            "UID": "34fcdca99ed0afec",
            "BOMRef": "pkg:cargo/futures-core@0.3.31"
          },
          "Version": "0.3.31",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "futures-executor@0.3.31",
          "Name": "futures-executor",
          "Identifier": {
            "PURL": "pkg:cargo/futures-executor@0.3.31",
            "UID": "4c0193b9cebb1062",
            "BOMRef": "pkg:cargo/futures-executor@0.3.31"
          },
          "Version": "0.3.31",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "futures-core@0.3.31",
            "futures-task@0.3.31",
            "futures-util@0.3.31"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "futures-io@0.3.31",
          "Name": "futures-io",
          "Identifier": {
            "PURL": "pkg:cargo/futures-io@0.3.31",
            "UID": "814ceb98e2836b27",
            "BOMRef": "pkg:cargo/futures-io@0.3.31"
          },
          "Version": "0.3.31",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "futures-macro@0.3.31",
          "Name": "futures-macro",
          "Identifier": {
            "PURL": "pkg:cargo/futures-macro@0.3.31",
            "UID": "ade9a3b5aa78ebaa",
            "BOMRef": "pkg:cargo/futures-macro@0.3.31"
          },
          "Version": "0.3.31",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@2.0.111"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "futures-sink@0.3.31",
          "Name": "futures-sink",
          "Identifier": {
            "PURL": "pkg:cargo/futures-sink@0.3.31",
            "UID": "65cc9c5bc800c988",
            "BOMRef": "pkg:cargo/futures-sink@0.3.31"
          },
          "Version": "0.3.31",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "futures-task@0.3.31",
          "Name": "futures-task",
          "Identifier": {
            "PURL": "pkg:cargo/futures-task@0.3.31",
            "UID": "9ef23832d4f8085c",
            "BOMRef": "pkg:cargo/futures-task@0.3.31"
          },
          "Version": "0.3.31",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "futures-util@0.3.31",
          "Name": "futures-util",
          "Identifier": {
            "PURL": "pkg:cargo/futures-util@0.3.31",
            "UID": "b5dc79c94979c95c",
            "BOMRef": "pkg:cargo/futures-util@0.3.31"
          },
          "Version": "0.3.31",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "futures-channel@0.3.31",
            "futures-core@0.3.31",
            "futures-io@0.3.31",
            "futures-macro@0.3.31",
            "futures-sink@0.3.31",
            "futures-task@0.3.31",
            "memchr@2.7.4",
            "pin-project-lite@0.2.12",
            "pin-utils@0.1.0",
            "slab@0.4.11"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "fxhash@0.2.1",
          "Name": "fxhash",
          "Identifier": {
            "PURL": "pkg:cargo/fxhash@0.2.1",
            "UID": "f48f6bf449329e86",
            "BOMRef": "pkg:cargo/fxhash@0.2.1"
          },
          "Version": "0.2.1",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "byteorder@1.5.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "generator@0.7.4",
          "Name": "generator",
          "Identifier": {
            "PURL": "pkg:cargo/generator@0.7.4",
            "UID": "2521d2f8f4b93ac7",
            "BOMRef": "pkg:cargo/generator@0.7.4"
          },
          "Version": "0.7.4",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "libc@0.2.174",
            "log@0.4.29",
            "windows@0.48.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "generic-array@0.14.9",
          "Name": "generic-array",
          "Identifier": {
            "PURL": "pkg:cargo/generic-array@0.14.9",
            "UID": "fe735d13b83778f",
            "BOMRef": "pkg:cargo/generic-array@0.14.9"
          },
          "Version": "0.14.9",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "typenum@1.16.0",
            "zeroize@1.8.1"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "geo@0.32.0",
          "Name": "geo",
          "Identifier": {
            "PURL": "pkg:cargo/geo@0.32.0",
            "UID": "a9852d96f9e433e8",
            "BOMRef": "pkg:cargo/geo@0.32.0"
          },
          "Version": "0.32.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "earcutr@0.4.2",
            "float_next_after@1.0.0",
            "geo-types@0.7.18",
            "geographiclib-rs@0.2.3",
            "i_overlay@4.0.2",
            "log@0.4.29",
            "num-traits@0.2.19",
            "rand@0.8.5",
            "robust@1.1.0",
            "rstar@0.12.0",
            "sif-itree@0.4.0",
            "spade@2.12.1"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "geo-types@0.7.18",
          "Name": "geo-types",
          "Identifier": {
            "PURL": "pkg:cargo/geo-types@0.7.18",
            "UID": "593888d022518a36",
            "BOMRef": "pkg:cargo/geo-types@0.7.18"
          },
          "Version": "0.7.18",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "approx@0.5.1",
            "num-traits@0.2.19",
            "rayon@1.11.0",
            "rstar@0.12.0",
            "serde@1.0.226"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "geographiclib-rs@0.2.3",
          "Name": "geographiclib-rs",
          "Identifier": {
            "PURL": "pkg:cargo/geographiclib-rs@0.2.3",
            "UID": "52a75139479183fd",
            "BOMRef": "pkg:cargo/geographiclib-rs@0.2.3"
          },
          "Version": "0.2.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "lazy_static@1.5.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "geohash@0.13.1",
          "Name": "geohash",
          "Identifier": {
            "PURL": "pkg:cargo/geohash@0.13.1",
            "UID": "4a2b9892b081aa50",
            "BOMRef": "pkg:cargo/geohash@0.13.1"
          },
          "Version": "0.13.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "geo-types@0.7.18",
            "libm@0.2.6"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "getrandom@0.1.16",
          "Name": "getrandom",
          "Identifier": {
            "PURL": "pkg:cargo/getrandom@0.1.16",
            "UID": "bf781858a59833d2",
            "BOMRef": "pkg:cargo/getrandom@0.1.16"
          },
          "Version": "0.1.16",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "cfg-if@1.0.0",
            "libc@0.2.174",
            "wasi@0.9.0+wasi-snapshot-preview1"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "getrandom@0.2.11",
          "Name": "getrandom",
          "Identifier": {
            "PURL": "pkg:cargo/getrandom@0.2.11",
            "UID": "2501f426b400c7e7",
            "BOMRef": "pkg:cargo/getrandom@0.2.11"
          },
          "Version": "0.2.11",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "cfg-if@1.0.0",
            "libc@0.2.174",
            "wasi@0.11.0+wasi-snapshot-preview1"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "getrandom@0.3.0",
          "Name": "getrandom",
          "Identifier": {
            "PURL": "pkg:cargo/getrandom@0.3.0",
            "UID": "9daee5e8824d45c7",
            "BOMRef": "pkg:cargo/getrandom@0.3.0"
          },
          "Version": "0.3.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "cfg-if@1.0.0",
            "libc@0.2.174",
            "wasi@0.13.3+wasi-0.2.2",
            "windows-targets@0.52.6"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "getset@0.1.2",
          "Name": "getset",
          "Identifier": {
            "PURL": "pkg:cargo/getset@0.1.2",
            "UID": "bd3cddd071bfc8ef",
            "BOMRef": "pkg:cargo/getset@0.1.2"
          },
          "Version": "0.1.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "proc-macro-error@1.0.4",
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@1.0.107"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "gimli@0.27.0",
          "Name": "gimli",
          "Identifier": {
            "PURL": "pkg:cargo/gimli@0.27.0",
            "UID": "90bcd5a204bec483",
            "BOMRef": "pkg:cargo/gimli@0.27.0"
          },
          "Version": "0.27.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "gpu-allocator@0.27.0",
          "Name": "gpu-allocator",
          "Identifier": {
            "PURL": "pkg:cargo/gpu-allocator@0.27.0",
            "UID": "5f0727d8cb4149a3",
            "BOMRef": "pkg:cargo/gpu-allocator@0.27.0"
          },
          "Version": "0.27.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "ash@0.38.0+1.3.281",
            "log@0.4.29",
            "presser@0.3.1",
            "thiserror@1.0.69",
            "windows@0.57.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "group@0.13.0",
          "Name": "group",
          "Identifier": {
            "PURL": "pkg:cargo/group@0.13.0",
            "UID": "b2a9aaa48815433e",
            "BOMRef": "pkg:cargo/group@0.13.0"
          },
          "Version": "0.13.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "ff@0.13.1",
            "rand_core@0.6.4",
            "subtle@2.5.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "h2@0.3.27",
          "Name": "h2",
          "Identifier": {
            "PURL": "pkg:cargo/h2@0.3.27",
            "UID": "5ecf750d2aa1b7d0",
            "BOMRef": "pkg:cargo/h2@0.3.27"
          },
          "Version": "0.3.27",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "bytes@1.10.1",
            "fnv@1.0.7",
            "futures-core@0.3.31",
            "futures-sink@0.3.31",
            "futures-util@0.3.31",
            "http@0.2.12",
            "indexmap@2.12.1",
            "slab@0.4.11",
            "tokio-util@0.7.17",
            "tokio@1.48.0",
            "tracing@0.1.43"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "h2@0.4.4",
          "Name": "h2",
          "Identifier": {
            "PURL": "pkg:cargo/h2@0.4.4",
            "UID": "5e68414f19e8e3f1",
            "BOMRef": "pkg:cargo/h2@0.4.4"
          },
          "Version": "0.4.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "bytes@1.10.1",
            "fnv@1.0.7",
            "futures-core@0.3.31",
            "futures-sink@0.3.31",
            "futures-util@0.3.31",
            "http@1.3.1",
            "indexmap@2.12.1",
            "slab@0.4.11",
            "tokio-util@0.7.17",
            "tokio@1.48.0",
            "tracing@0.1.43"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "half@1.8.2",
          "Name": "half",
          "Identifier": {
            "PURL": "pkg:cargo/half@1.8.2",
            "UID": "634ecf69bfd41a4b",
            "BOMRef": "pkg:cargo/half@1.8.2"
          },
          "Version": "1.8.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "half@2.7.1",
          "Name": "half",
          "Identifier": {
            "PURL": "pkg:cargo/half@2.7.1",
            "UID": "af6dac50fc5235bd",
            "BOMRef": "pkg:cargo/half@2.7.1"
          },
          "Version": "2.7.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "cfg-if@1.0.0",
            "crunchy@0.2.2",
            "num-traits@0.2.19",
            "serde@1.0.226",
            "zerocopy@0.8.31"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "hash32@0.3.1",
          "Name": "hash32",
          "Identifier": {
            "PURL": "pkg:cargo/hash32@0.3.1",
            "UID": "d28ab59164f98734",
            "BOMRef": "pkg:cargo/hash32@0.3.1"
          },
          "Version": "0.3.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "byteorder@1.5.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "hashbrown@0.12.3",
          "Name": "hashbrown",
          "Identifier": {
            "PURL": "pkg:cargo/hashbrown@0.12.3",
            "UID": "1ea3d497910a87f5",
            "BOMRef": "pkg:cargo/hashbrown@0.12.3"
          },
          "Version": "0.12.3",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "hashbrown@0.14.2",
          "Name": "hashbrown",
          "Identifier": {
            "PURL": "pkg:cargo/hashbrown@0.14.2",
            "UID": "626623badbfd7733",
            "BOMRef": "pkg:cargo/hashbrown@0.14.2"
          },
          "Version": "0.14.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "ahash@0.8.11",
            "allocator-api2@0.2.16"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "hashbrown@0.15.2",
          "Name": "hashbrown",
          "Identifier": {
            "PURL": "pkg:cargo/hashbrown@0.15.2",
            "UID": "b8ca5abe2b092a08",
            "BOMRef": "pkg:cargo/hashbrown@0.15.2"
          },
          "Version": "0.15.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "allocator-api2@0.2.16",
            "equivalent@1.0.1",
            "foldhash@0.1.4"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "hashbrown@0.16.1",
          "Name": "hashbrown",
          "Identifier": {
            "PURL": "pkg:cargo/hashbrown@0.16.1",
            "UID": "84196f1c94f99198",
            "BOMRef": "pkg:cargo/hashbrown@0.16.1"
          },
          "Version": "0.16.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "hashlink@0.10.0",
          "Name": "hashlink",
          "Identifier": {
            "PURL": "pkg:cargo/hashlink@0.10.0",
            "UID": "17ee0396a8ff1183",
            "BOMRef": "pkg:cargo/hashlink@0.10.0"
          },
          "Version": "0.10.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "hashbrown@0.15.2"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "hashring@0.3.6",
          "Name": "hashring",
          "Identifier": {
            "PURL": "pkg:cargo/hashring@0.3.6",
            "UID": "796a91713ca4df21",
            "BOMRef": "pkg:cargo/hashring@0.3.6"
          },
          "Version": "0.3.6",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "siphasher@0.3.10"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "hdrhistogram@7.5.2",
          "Name": "hdrhistogram",
          "Identifier": {
            "PURL": "pkg:cargo/hdrhistogram@7.5.2",
            "UID": "9b4f875aec7093bc",
            "BOMRef": "pkg:cargo/hdrhistogram@7.5.2"
          },
          "Version": "7.5.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "base64@0.13.1",
            "byteorder@1.5.0",
            "flate2@1.1.5",
            "nom@7.1.3",
            "num-traits@0.2.19"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "heapless@0.8.0",
          "Name": "heapless",
          "Identifier": {
            "PURL": "pkg:cargo/heapless@0.8.0",
            "UID": "2a3bf87376aab466",
            "BOMRef": "pkg:cargo/heapless@0.8.0"
          },
          "Version": "0.8.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "hash32@0.3.1",
            "stable_deref_trait@1.2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "heck@0.5.0",
          "Name": "heck",
          "Identifier": {
            "PURL": "pkg:cargo/heck@0.5.0",
            "UID": "1ed7bd48fada300d",
            "BOMRef": "pkg:cargo/heck@0.5.0"
          },
          "Version": "0.5.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "hermit-abi@0.3.9",
          "Name": "hermit-abi",
          "Identifier": {
            "PURL": "pkg:cargo/hermit-abi@0.3.9",
            "UID": "232dc4cf258c30b9",
            "BOMRef": "pkg:cargo/hermit-abi@0.3.9"
          },
          "Version": "0.3.9",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "hermit-abi@0.5.1",
          "Name": "hermit-abi",
          "Identifier": {
            "PURL": "pkg:cargo/hermit-abi@0.5.1",
            "UID": "93edae6c07f5d264",
            "BOMRef": "pkg:cargo/hermit-abi@0.5.1"
          },
          "Version": "0.5.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "hex@0.4.3",
          "Name": "hex",
          "Identifier": {
            "PURL": "pkg:cargo/hex@0.4.3",
            "UID": "1fc538b32be53706",
            "BOMRef": "pkg:cargo/hex@0.4.3"
          },
          "Version": "0.4.3",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "hkdf@0.12.4",
          "Name": "hkdf",
          "Identifier": {
            "PURL": "pkg:cargo/hkdf@0.12.4",
            "UID": "95c4bc90bbec1e83",
            "BOMRef": "pkg:cargo/hkdf@0.12.4"
          },
          "Version": "0.12.4",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "hmac@0.12.1"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "hmac@0.12.1",
          "Name": "hmac",
          "Identifier": {
            "PURL": "pkg:cargo/hmac@0.12.1",
            "UID": "d860830c92ca5f77",
            "BOMRef": "pkg:cargo/hmac@0.12.1"
          },
          "Version": "0.12.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "digest@0.10.7"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "http@0.2.12",
          "Name": "http",
          "Identifier": {
            "PURL": "pkg:cargo/http@0.2.12",
            "UID": "acdb69c122543fe4",
            "BOMRef": "pkg:cargo/http@0.2.12"
          },
          "Version": "0.2.12",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "bytes@1.10.1",
            "fnv@1.0.7",
            "itoa@1.0.5"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "http@1.3.1",
          "Name": "http",
          "Identifier": {
            "PURL": "pkg:cargo/http@1.3.1",
            "UID": "2c19b1c411f83603",
            "BOMRef": "pkg:cargo/http@1.3.1"
          },
          "Version": "1.3.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "bytes@1.10.1",
            "fnv@1.0.7",
            "itoa@1.0.5"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "http-body@0.4.5",
          "Name": "http-body",
          "Identifier": {
            "PURL": "pkg:cargo/http-body@0.4.5",
            "UID": "e367f78b6fd0d7c1",
            "BOMRef": "pkg:cargo/http-body@0.4.5"
          },
          "Version": "0.4.5",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "bytes@1.10.1",
            "http@0.2.12",
            "pin-project-lite@0.2.12"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "http-body@1.0.0",
          "Name": "http-body",
          "Identifier": {
            "PURL": "pkg:cargo/http-body@1.0.0",
            "UID": "6e96a16cac510ea8",
            "BOMRef": "pkg:cargo/http-body@1.0.0"
          },
          "Version": "1.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "bytes@1.10.1",
            "http@1.3.1"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "http-body-util@0.1.2",
          "Name": "http-body-util",
          "Identifier": {
            "PURL": "pkg:cargo/http-body-util@0.1.2",
            "UID": "5ac776736bf9d440",
            "BOMRef": "pkg:cargo/http-body-util@0.1.2"
          },
          "Version": "0.1.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "bytes@1.10.1",
            "futures-util@0.3.31",
            "http-body@1.0.0",
            "http@1.3.1",
            "pin-project-lite@0.2.12"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "http-range@0.1.5",
          "Name": "http-range",
          "Identifier": {
            "PURL": "pkg:cargo/http-range@0.1.5",
            "UID": "6ed422aacf35167a",
            "BOMRef": "pkg:cargo/http-range@0.1.5"
          },
          "Version": "0.1.5",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "http-serde@2.1.1",
          "Name": "http-serde",
          "Identifier": {
            "PURL": "pkg:cargo/http-serde@2.1.1",
            "UID": "b6ad19e08f34c9df",
            "BOMRef": "pkg:cargo/http-serde@2.1.1"
          },
          "Version": "2.1.1",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "http@1.3.1",
            "serde@1.0.226"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "httparse@1.10.1",
          "Name": "httparse",
          "Identifier": {
            "PURL": "pkg:cargo/httparse@1.10.1",
            "UID": "c5c32698a44c4830",
            "BOMRef": "pkg:cargo/httparse@1.10.1"
          },
          "Version": "1.10.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "httpdate@1.0.2",
          "Name": "httpdate",
          "Identifier": {
            "PURL": "pkg:cargo/httpdate@1.0.2",
            "UID": "56fd6ce87dbb3f1c",
            "BOMRef": "pkg:cargo/httpdate@1.0.2"
          },
          "Version": "1.0.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "humantime@2.3.0",
          "Name": "humantime",
          "Identifier": {
            "PURL": "pkg:cargo/humantime@2.3.0",
            "UID": "1ab9d496248c9855",
            "BOMRef": "pkg:cargo/humantime@2.3.0"
          },
          "Version": "2.3.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "hyper@0.14.26",
          "Name": "hyper",
          "Identifier": {
            "PURL": "pkg:cargo/hyper@0.14.26",
            "UID": "4e5f98ff8deaa3c0",
            "BOMRef": "pkg:cargo/hyper@0.14.26"
          },
          "Version": "0.14.26",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "bytes@1.10.1",
            "futures-channel@0.3.31",
            "futures-core@0.3.31",
            "futures-util@0.3.31",
            "h2@0.3.27",
            "http-body@0.4.5",
            "http@0.2.12",
            "httparse@1.10.1",
            "httpdate@1.0.2",
            "itoa@1.0.5",
            "pin-project-lite@0.2.12",
            "socket2@0.4.9",
            "tokio@1.48.0",
            "tower-service@0.3.3",
            "tracing@0.1.43",
            "want@0.3.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "hyper@1.6.0",
          "Name": "hyper",
          "Identifier": {
            "PURL": "pkg:cargo/hyper@1.6.0",
            "UID": "e8acfe00bde610ea",
            "BOMRef": "pkg:cargo/hyper@1.6.0"
          },
          "Version": "1.6.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "bytes@1.10.1",
            "futures-channel@0.3.31",
            "futures-util@0.3.31",
            "h2@0.4.4",
            "http-body@1.0.0",
            "http@1.3.1",
            "httparse@1.10.1",
            "httpdate@1.0.2",
            "itoa@1.0.5",
            "pin-project-lite@0.2.12",
            "smallvec@1.15.1",
            "tokio@1.48.0",
            "want@0.3.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "hyper-rustls@0.27.2",
          "Name": "hyper-rustls",
          "Identifier": {
            "PURL": "pkg:cargo/hyper-rustls@0.27.2",
            "UID": "7c6ae8e411b0eacb",
            "BOMRef": "pkg:cargo/hyper-rustls@0.27.2"
          },
          "Version": "0.27.2",
          "Licenses": [
            "Apache-2.0 OR ISC OR MIT"
          ],
          "DependsOn": [
            "futures-util@0.3.31",
            "http@1.3.1",
            "hyper-util@0.1.13",
            "hyper@1.6.0",
            "rustls-native-certs@0.7.0",
            "rustls-pki-types@1.13.1",
            "rustls@0.23.35",
            "tokio-rustls@0.26.0",
            "tokio@1.48.0",
            "tower-service@0.3.3",
            "webpki-roots@0.26.1"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "hyper-timeout@0.4.1",
          "Name": "hyper-timeout",
          "Identifier": {
            "PURL": "pkg:cargo/hyper-timeout@0.4.1",
            "UID": "93bbf563ad64f196",
            "BOMRef": "pkg:cargo/hyper-timeout@0.4.1"
          },
          "Version": "0.4.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "hyper@0.14.26",
            "pin-project-lite@0.2.12",
            "tokio-io-timeout@1.2.0",
            "tokio@1.48.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "hyper-timeout@0.5.1",
          "Name": "hyper-timeout",
          "Identifier": {
            "PURL": "pkg:cargo/hyper-timeout@0.5.1",
            "UID": "77685734d9785b0e",
            "BOMRef": "pkg:cargo/hyper-timeout@0.5.1"
          },
          "Version": "0.5.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "hyper-util@0.1.13",
            "hyper@1.6.0",
            "pin-project-lite@0.2.12",
            "tokio@1.48.0",
            "tower-service@0.3.3"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "hyper-util@0.1.13",
          "Name": "hyper-util",
          "Identifier": {
            "PURL": "pkg:cargo/hyper-util@0.1.13",
            "UID": "4803cf97741c21d4",
            "BOMRef": "pkg:cargo/hyper-util@0.1.13"
          },
          "Version": "0.1.13",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "base64@0.22.0",
            "bytes@1.10.1",
            "futures-channel@0.3.31",
            "futures-core@0.3.31",
            "futures-util@0.3.31",
            "http-body@1.0.0",
            "http@1.3.1",
            "hyper@1.6.0",
            "ipnet@2.11.0",
            "libc@0.2.174",
            "percent-encoding@2.3.2",
            "pin-project-lite@0.2.12",
            "socket2@0.5.10",
            "tokio@1.48.0",
            "tower-service@0.3.3",
            "tracing@0.1.43"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "i_float@1.15.0",
          "Name": "i_float",
          "Identifier": {
            "PURL": "pkg:cargo/i_float@1.15.0",
            "UID": "211b99c9ed3aef3b",
            "BOMRef": "pkg:cargo/i_float@1.15.0"
          },
          "Version": "1.15.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "libm@0.2.6"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "i_key_sort@0.6.0",
          "Name": "i_key_sort",
          "Identifier": {
            "PURL": "pkg:cargo/i_key_sort@0.6.0",
            "UID": "6a6d266639a76025",
            "BOMRef": "pkg:cargo/i_key_sort@0.6.0"
          },
          "Version": "0.6.0",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "i_overlay@4.0.2",
          "Name": "i_overlay",
          "Identifier": {
            "PURL": "pkg:cargo/i_overlay@4.0.2",
            "UID": "f504951b9a7ac635",
            "BOMRef": "pkg:cargo/i_overlay@4.0.2"
          },
          "Version": "4.0.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "i_float@1.15.0",
            "i_key_sort@0.6.0",
            "i_shape@1.14.0",
            "i_tree@0.16.0",
            "rayon@1.11.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "i_shape@1.14.0",
          "Name": "i_shape",
          "Identifier": {
            "PURL": "pkg:cargo/i_shape@1.14.0",
            "UID": "6f6be05bee3186ce",
            "BOMRef": "pkg:cargo/i_shape@1.14.0"
          },
          "Version": "1.14.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "i_float@1.15.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "i_tree@0.16.0",
          "Name": "i_tree",
          "Identifier": {
            "PURL": "pkg:cargo/i_tree@0.16.0",
            "UID": "50bf7d79f07b86c1",
            "BOMRef": "pkg:cargo/i_tree@0.16.0"
          },
          "Version": "0.16.0",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "iana-time-zone@0.1.53",
          "Name": "iana-time-zone",
          "Identifier": {
            "PURL": "pkg:cargo/iana-time-zone@0.1.53",
            "UID": "12969e7753f70a1e",
            "BOMRef": "pkg:cargo/iana-time-zone@0.1.53"
          },
          "Version": "0.1.53",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "android_system_properties@0.1.5",
            "core-foundation-sys@0.8.7",
            "iana-time-zone-haiku@0.1.1",
            "js-sys@0.3.77",
            "wasm-bindgen@0.2.100",
            "winapi@0.3.9"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "iana-time-zone-haiku@0.1.1",
          "Name": "iana-time-zone-haiku",
          "Identifier": {
            "PURL": "pkg:cargo/iana-time-zone-haiku@0.1.1",
            "UID": "b546674d4d88e46a",
            "BOMRef": "pkg:cargo/iana-time-zone-haiku@0.1.1"
          },
          "Version": "0.1.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "cxx@1.0.85"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "icu_collections@1.5.0",
          "Name": "icu_collections",
          "Identifier": {
            "PURL": "pkg:cargo/icu_collections@1.5.0",
            "UID": "f6029b29d24bfc36",
            "BOMRef": "pkg:cargo/icu_collections@1.5.0"
          },
          "Version": "1.5.0",
          "Licenses": [
            "Unicode-3.0"
          ],
          "DependsOn": [
            "displaydoc@0.2.5",
            "yoke@0.7.4",
            "zerofrom@0.1.4",
            "zerovec@0.10.4"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "icu_locid@1.5.0",
          "Name": "icu_locid",
          "Identifier": {
            "PURL": "pkg:cargo/icu_locid@1.5.0",
            "UID": "1a401bf07f88e9cc",
            "BOMRef": "pkg:cargo/icu_locid@1.5.0"
          },
          "Version": "1.5.0",
          "Licenses": [
            "Unicode-3.0"
          ],
          "DependsOn": [
            "displaydoc@0.2.5",
            "litemap@0.7.3",
            "tinystr@0.7.6",
            "writeable@0.5.5",
            "zerovec@0.10.4"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "icu_locid_transform@1.5.0",
          "Name": "icu_locid_transform",
          "Identifier": {
            "PURL": "pkg:cargo/icu_locid_transform@1.5.0",
            "UID": "31d8ed80e9eee0ee",
            "BOMRef": "pkg:cargo/icu_locid_transform@1.5.0"
          },
          "Version": "1.5.0",
          "Licenses": [
            "Unicode-3.0"
          ],
          "DependsOn": [
            "displaydoc@0.2.5",
            "icu_locid@1.5.0",
            "icu_locid_transform_data@1.5.0",
            "icu_provider@1.5.0",
            "tinystr@0.7.6",
            "zerovec@0.10.4"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "icu_locid_transform_data@1.5.0",
          "Name": "icu_locid_transform_data",
          "Identifier": {
            "PURL": "pkg:cargo/icu_locid_transform_data@1.5.0",
            "UID": "456075cdbf1d313c",
            "BOMRef": "pkg:cargo/icu_locid_transform_data@1.5.0"
          },
          "Version": "1.5.0",
          "Licenses": [
            "Unicode-3.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "icu_normalizer@1.5.0",
          "Name": "icu_normalizer",
          "Identifier": {
            "PURL": "pkg:cargo/icu_normalizer@1.5.0",
            "UID": "ecaedfb5ddf6bd82",
            "BOMRef": "pkg:cargo/icu_normalizer@1.5.0"
          },
          "Version": "1.5.0",
          "Licenses": [
            "Unicode-3.0"
          ],
          "DependsOn": [
            "displaydoc@0.2.5",
            "icu_collections@1.5.0",
            "icu_normalizer_data@1.5.0",
            "icu_properties@1.5.1",
            "icu_provider@1.5.0",
            "smallvec@1.15.1",
            "utf16_iter@1.0.5",
            "utf8_iter@1.0.4",
            "write16@1.0.0",
            "zerovec@0.10.4"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "icu_normalizer_data@1.5.0",
          "Name": "icu_normalizer_data",
          "Identifier": {
            "PURL": "pkg:cargo/icu_normalizer_data@1.5.0",
            "UID": "8b084012f3ab8dbd",
            "BOMRef": "pkg:cargo/icu_normalizer_data@1.5.0"
          },
          "Version": "1.5.0",
          "Licenses": [
            "Unicode-3.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "icu_properties@1.5.1",
          "Name": "icu_properties",
          "Identifier": {
            "PURL": "pkg:cargo/icu_properties@1.5.1",
            "UID": "3ffb302b49b034c0",
            "BOMRef": "pkg:cargo/icu_properties@1.5.1"
          },
          "Version": "1.5.1",
          "Licenses": [
            "Unicode-3.0"
          ],
          "DependsOn": [
            "displaydoc@0.2.5",
            "icu_collections@1.5.0",
            "icu_locid_transform@1.5.0",
            "icu_properties_data@1.5.0",
            "icu_provider@1.5.0",
            "tinystr@0.7.6",
            "zerovec@0.10.4"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "icu_properties_data@1.5.0",
          "Name": "icu_properties_data",
          "Identifier": {
            "PURL": "pkg:cargo/icu_properties_data@1.5.0",
            "UID": "bc94c6294c1c7345",
            "BOMRef": "pkg:cargo/icu_properties_data@1.5.0"
          },
          "Version": "1.5.0",
          "Licenses": [
            "Unicode-3.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "icu_provider@1.5.0",
          "Name": "icu_provider",
          "Identifier": {
            "PURL": "pkg:cargo/icu_provider@1.5.0",
            "UID": "f6a4e8f38d28490e",
            "BOMRef": "pkg:cargo/icu_provider@1.5.0"
          },
          "Version": "1.5.0",
          "Licenses": [
            "Unicode-3.0"
          ],
          "DependsOn": [
            "displaydoc@0.2.5",
            "icu_locid@1.5.0",
            "icu_provider_macros@1.5.0",
            "stable_deref_trait@1.2.0",
            "tinystr@0.7.6",
            "writeable@0.5.5",
            "yoke@0.7.4",
            "zerofrom@0.1.4",
            "zerovec@0.10.4"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "icu_provider_macros@1.5.0",
          "Name": "icu_provider_macros",
          "Identifier": {
            "PURL": "pkg:cargo/icu_provider_macros@1.5.0",
            "UID": "f2372dd3e89e4e40",
            "BOMRef": "pkg:cargo/icu_provider_macros@1.5.0"
          },
          "Version": "1.5.0",
          "Licenses": [
            "Unicode-3.0"
          ],
          "DependsOn": [
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@2.0.111"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "ident_case@1.0.1",
          "Name": "ident_case",
          "Identifier": {
            "PURL": "pkg:cargo/ident_case@1.0.1",
            "UID": "3d4fff9ef1289846",
            "BOMRef": "pkg:cargo/ident_case@1.0.1"
          },
          "Version": "1.0.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "idna@1.1.0",
          "Name": "idna",
          "Identifier": {
            "PURL": "pkg:cargo/idna@1.1.0",
            "UID": "2f4498bee37fad14",
            "BOMRef": "pkg:cargo/idna@1.1.0"
          },
          "Version": "1.1.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "idna_adapter@1.2.0",
            "smallvec@1.15.1",
            "utf8_iter@1.0.4"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "idna_adapter@1.2.0",
          "Name": "idna_adapter",
          "Identifier": {
            "PURL": "pkg:cargo/idna_adapter@1.2.0",
            "UID": "494b6a7ecc56ab7b",
            "BOMRef": "pkg:cargo/idna_adapter@1.2.0"
          },
          "Version": "1.2.0",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "icu_normalizer@1.5.0",
            "icu_properties@1.5.1"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "impl-more@0.1.6",
          "Name": "impl-more",
          "Identifier": {
            "PURL": "pkg:cargo/impl-more@0.1.6",
            "UID": "f05492eaae9848ba",
            "BOMRef": "pkg:cargo/impl-more@0.1.6"
          },
          "Version": "0.1.6",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "include-flate@0.3.0",
          "Name": "include-flate",
          "Identifier": {
            "PURL": "pkg:cargo/include-flate@0.3.0",
            "UID": "c651d1fc745884b0",
            "BOMRef": "pkg:cargo/include-flate@0.3.0"
          },
          "Version": "0.3.0",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "include-flate-codegen@0.2.0",
            "lazy_static@1.5.0",
            "libflate@2.1.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "include-flate-codegen@0.2.0",
          "Name": "include-flate-codegen",
          "Identifier": {
            "PURL": "pkg:cargo/include-flate-codegen@0.2.0",
            "UID": "d93aa83d72e9444e",
            "BOMRef": "pkg:cargo/include-flate-codegen@0.2.0"
          },
          "Version": "0.2.0",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "libflate@2.1.0",
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@2.0.111"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "indexmap@1.9.2",
          "Name": "indexmap",
          "Identifier": {
            "PURL": "pkg:cargo/indexmap@1.9.2",
            "UID": "b159b4670582897a",
            "BOMRef": "pkg:cargo/indexmap@1.9.2"
          },
          "Version": "1.9.2",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "hashbrown@0.12.3",
            "serde@1.0.226"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "indexmap@2.12.1",
          "Name": "indexmap",
          "Identifier": {
            "PURL": "pkg:cargo/indexmap@2.12.1",
            "UID": "37fa2b17f4dc9473",
            "BOMRef": "pkg:cargo/indexmap@2.12.1"
          },
          "Version": "2.12.1",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "equivalent@1.0.1",
            "hashbrown@0.16.1",
            "serde@1.0.226",
            "serde_core@1.0.226"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "indicatif@0.18.3",
          "Name": "indicatif",
          "Identifier": {
            "PURL": "pkg:cargo/indicatif@0.18.3",
            "UID": "477dc4bd15d1c6a6",
            "BOMRef": "pkg:cargo/indicatif@0.18.3"
          },
          "Version": "0.18.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "console@0.16.0",
            "portable-atomic@1.11.1",
            "rayon@1.11.0",
            "unicode-width@0.2.0",
            "unit-prefix@0.5.1",
            "web-time@1.1.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "indoc@2.0.6",
          "Name": "indoc",
          "Identifier": {
            "PURL": "pkg:cargo/indoc@2.0.6",
            "UID": "4a07a243bc2b13a8",
            "BOMRef": "pkg:cargo/indoc@2.0.6"
          },
          "Version": "2.0.6",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "integer-encoding@4.1.0",
          "Name": "integer-encoding",
          "Identifier": {
            "PURL": "pkg:cargo/integer-encoding@4.1.0",
            "UID": "cba9ff7c04207dc3",
            "BOMRef": "pkg:cargo/integer-encoding@4.1.0"
          },
          "Version": "4.1.0",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "inventory@0.3.14",
          "Name": "inventory",
          "Identifier": {
            "PURL": "pkg:cargo/inventory@0.3.14",
            "UID": "d2cf476aaab81b99",
            "BOMRef": "pkg:cargo/inventory@0.3.14"
          },
          "Version": "0.3.14",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "io-uring@0.7.11",
          "Name": "io-uring",
          "Identifier": {
            "PURL": "pkg:cargo/io-uring@0.7.11",
            "UID": "aaf45f1b3acf07c8",
            "BOMRef": "pkg:cargo/io-uring@0.7.11"
          },
          "Version": "0.7.11",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "bitflags@2.9.1",
            "cfg-if@1.0.0",
            "libc@0.2.174"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "ipnet@2.11.0",
          "Name": "ipnet",
          "Identifier": {
            "PURL": "pkg:cargo/ipnet@2.11.0",
            "UID": "541370fb3484f4e8",
            "BOMRef": "pkg:cargo/ipnet@2.11.0"
          },
          "Version": "2.11.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "irg-kvariants@0.1.1",
          "Name": "irg-kvariants",
          "Identifier": {
            "PURL": "pkg:cargo/irg-kvariants@0.1.1",
            "UID": "43920e16159c311f",
            "BOMRef": "pkg:cargo/irg-kvariants@0.1.1"
          },
          "Version": "0.1.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "csv@1.4.0",
            "once_cell@1.21.3",
            "serde@1.0.226"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "iri-string@0.7.8",
          "Name": "iri-string",
          "Identifier": {
            "PURL": "pkg:cargo/iri-string@0.7.8",
            "UID": "e960af8209ce1254",
            "BOMRef": "pkg:cargo/iri-string@0.7.8"
          },
          "Version": "0.7.8",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "memchr@2.7.4",
            "serde@1.0.226"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "is_sorted@0.1.1",
          "Name": "is_sorted",
          "Identifier": {
            "PURL": "pkg:cargo/is_sorted@0.1.1",
            "UID": "53dde11d12b79e1e",
            "BOMRef": "pkg:cargo/is_sorted@0.1.1"
          },
          "Version": "0.1.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "itertools@0.10.5",
          "Name": "itertools",
          "Identifier": {
            "PURL": "pkg:cargo/itertools@0.10.5",
            "UID": "e8161c9af2b33b32",
            "BOMRef": "pkg:cargo/itertools@0.10.5"
          },
          "Version": "0.10.5",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "either@1.13.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "itertools@0.12.1",
          "Name": "itertools",
          "Identifier": {
            "PURL": "pkg:cargo/itertools@0.12.1",
            "UID": "ed760f4676d2f8aa",
            "BOMRef": "pkg:cargo/itertools@0.12.1"
          },
          "Version": "0.12.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "either@1.13.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "itertools@0.13.0",
          "Name": "itertools",
          "Identifier": {
            "PURL": "pkg:cargo/itertools@0.13.0",
            "UID": "7f5e0ab363c12997",
            "BOMRef": "pkg:cargo/itertools@0.13.0"
          },
          "Version": "0.13.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "either@1.13.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "itertools@0.14.0",
          "Name": "itertools",
          "Identifier": {
            "PURL": "pkg:cargo/itertools@0.14.0",
            "UID": "45264786e6305c93",
            "BOMRef": "pkg:cargo/itertools@0.14.0"
          },
          "Version": "0.14.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "either@1.13.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "itoa@1.0.5",
          "Name": "itoa",
          "Identifier": {
            "PURL": "pkg:cargo/itoa@1.0.5",
            "UID": "d9d3efd8932ea8a1",
            "BOMRef": "pkg:cargo/itoa@1.0.5"
          },
          "Version": "1.0.5",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "jieba-macros@0.7.1",
          "Name": "jieba-macros",
          "Identifier": {
            "PURL": "pkg:cargo/jieba-macros@0.7.1",
            "UID": "f62e6ac4c4ae1384",
            "BOMRef": "pkg:cargo/jieba-macros@0.7.1"
          },
          "Version": "0.7.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "phf_codegen@0.11.2"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "jieba-rs@0.7.3",
          "Name": "jieba-rs",
          "Identifier": {
            "PURL": "pkg:cargo/jieba-rs@0.7.3",
            "UID": "5880a7e89f0caf0f",
            "BOMRef": "pkg:cargo/jieba-rs@0.7.3"
          },
          "Version": "0.7.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "cedarwood@0.4.6",
            "fxhash@0.2.1",
            "include-flate@0.3.0",
            "jieba-macros@0.7.1",
            "lazy_static@1.5.0",
            "phf@0.11.2",
            "regex@1.11.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "jiff@0.2.15",
          "Name": "jiff",
          "Identifier": {
            "PURL": "pkg:cargo/jiff@0.2.15",
            "UID": "409d45a244550c24",
            "BOMRef": "pkg:cargo/jiff@0.2.15"
          },
          "Version": "0.2.15",
          "Licenses": [
            "Unlicense OR MIT"
          ],
          "DependsOn": [
            "jiff-static@0.2.15",
            "log@0.4.29",
            "portable-atomic-util@0.2.4",
            "portable-atomic@1.11.1",
            "serde@1.0.226"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "jiff-static@0.2.15",
          "Name": "jiff-static",
          "Identifier": {
            "PURL": "pkg:cargo/jiff-static@0.2.15",
            "UID": "19008013abac43e1",
            "BOMRef": "pkg:cargo/jiff-static@0.2.15"
          },
          "Version": "0.2.15",
          "Licenses": [
            "Unlicense OR MIT"
          ],
          "DependsOn": [
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@2.0.111"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "js-sys@0.3.77",
          "Name": "js-sys",
          "Identifier": {
            "PURL": "pkg:cargo/js-sys@0.3.77",
            "UID": "cd1fa207593ae992",
            "BOMRef": "pkg:cargo/js-sys@0.3.77"
          },
          "Version": "0.3.77",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "once_cell@1.21.3",
            "wasm-bindgen@0.2.100"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "jsonwebtoken@10.0.0",
          "Name": "jsonwebtoken",
          "Identifier": {
            "PURL": "pkg:cargo/jsonwebtoken@10.0.0",
            "UID": "c3a410ec83257324",
            "BOMRef": "pkg:cargo/jsonwebtoken@10.0.0"
          },
          "Version": "10.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "base64@0.22.0",
            "ed25519-dalek@2.2.0",
            "getrandom@0.2.11",
            "hmac@0.12.1",
            "js-sys@0.3.77",
            "p256@0.13.2",
            "p384@0.13.1",
            "pem@3.0.3",
            "rand@0.8.5",
            "rsa@0.9.8",
            "serde@1.0.226",
            "serde_json@1.0.145",
            "sha2@0.10.9",
            "signature@2.2.0",
            "simple_asn1@0.6.2"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "language-tags@0.3.2",
          "Name": "language-tags",
          "Identifier": {
            "PURL": "pkg:cargo/language-tags@0.3.2",
            "UID": "52cd6d60d5c7918f",
            "BOMRef": "pkg:cargo/language-tags@0.3.2"
          },
          "Version": "0.3.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "lazy_static@1.5.0",
          "Name": "lazy_static",
          "Identifier": {
            "PURL": "pkg:cargo/lazy_static@1.5.0",
            "UID": "c8ed31076f199129",
            "BOMRef": "pkg:cargo/lazy_static@1.5.0"
          },
          "Version": "1.5.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "spin@0.9.8"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "libc@0.2.174",
          "Name": "libc",
          "Identifier": {
            "PURL": "pkg:cargo/libc@0.2.174",
            "UID": "af245e07aafedb66",
            "BOMRef": "pkg:cargo/libc@0.2.174"
          },
          "Version": "0.2.174",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "libflate@1.4.0",
          "Name": "libflate",
          "Identifier": {
            "PURL": "pkg:cargo/libflate@1.4.0",
            "UID": "aa4a723ff2d2934d",
            "BOMRef": "pkg:cargo/libflate@1.4.0"
          },
          "Version": "1.4.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "adler32@1.2.0",
            "crc32fast@1.3.2",
            "libflate_lz77@1.2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "libflate@2.1.0",
          "Name": "libflate",
          "Identifier": {
            "PURL": "pkg:cargo/libflate@2.1.0",
            "UID": "defd4d422aca1a5",
            "BOMRef": "pkg:cargo/libflate@2.1.0"
          },
          "Version": "2.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "adler32@1.2.0",
            "core2@0.4.0",
            "crc32fast@1.3.2",
            "dary_heap@0.3.7",
            "libflate_lz77@2.1.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "libflate_lz77@1.2.0",
          "Name": "libflate_lz77",
          "Identifier": {
            "PURL": "pkg:cargo/libflate_lz77@1.2.0",
            "UID": "5da1cbcf367b60e1",
            "BOMRef": "pkg:cargo/libflate_lz77@1.2.0"
          },
          "Version": "1.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "rle-decode-fast@1.0.3"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "libflate_lz77@2.1.0",
          "Name": "libflate_lz77",
          "Identifier": {
            "PURL": "pkg:cargo/libflate_lz77@2.1.0",
            "UID": "9935b82ddc403564",
            "BOMRef": "pkg:cargo/libflate_lz77@2.1.0"
          },
          "Version": "2.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "core2@0.4.0",
            "hashbrown@0.14.2",
            "rle-decode-fast@1.0.3"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "libloading@0.8.5",
          "Name": "libloading",
          "Identifier": {
            "PURL": "pkg:cargo/libloading@0.8.5",
            "UID": "598c52c43aac0c8a",
            "BOMRef": "pkg:cargo/libloading@0.8.5"
          },
          "Version": "0.8.5",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "cfg-if@1.0.0",
            "windows-targets@0.48.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "libm@0.2.6",
          "Name": "libm",
          "Identifier": {
            "PURL": "pkg:cargo/libm@0.2.6",
            "UID": "bc2bd984f3d69160",
            "BOMRef": "pkg:cargo/libm@0.2.6"
          },
          "Version": "0.2.6",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "librocksdb-sys@0.17.3+10.4.2",
          "Name": "librocksdb-sys",
          "Identifier": {
            "PURL": "pkg:cargo/librocksdb-sys@0.17.3%2B10.4.2",
            "UID": "2183ef20d241c1d3",
            "BOMRef": "pkg:cargo/librocksdb-sys@0.17.3%2B10.4.2"
          },
          "Version": "0.17.3+10.4.2",
          "Licenses": [
            "MIT OR Apache-2.0 OR BSD-3-Clause"
          ],
          "DependsOn": [
            "bzip2-sys@0.1.11+1.0.8",
            "libc@0.2.174",
            "libz-sys@1.1.8",
            "lz4-sys@1.11.1+lz4-1.10.0",
            "zstd-sys@2.0.9+zstd.1.5.5"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "libz-sys@1.1.8",
          "Name": "libz-sys",
          "Identifier": {
            "PURL": "pkg:cargo/libz-sys@1.1.8",
            "UID": "107b6bcb5ed384f",
            "BOMRef": "pkg:cargo/libz-sys@1.1.8"
          },
          "Version": "1.1.8",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "link-cplusplus@1.0.8",
          "Name": "link-cplusplus",
          "Identifier": {
            "PURL": "pkg:cargo/link-cplusplus@1.0.8",
            "UID": "647308325039f00f",
            "BOMRef": "pkg:cargo/link-cplusplus@1.0.8"
          },
          "Version": "1.0.8",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "linux-raw-sys@0.4.14",
          "Name": "linux-raw-sys",
          "Identifier": {
            "PURL": "pkg:cargo/linux-raw-sys@0.4.14",
            "UID": "8dcba1fa8e5a9b28",
            "BOMRef": "pkg:cargo/linux-raw-sys@0.4.14"
          },
          "Version": "0.4.14",
          "Licenses": [
            "Apache-2.0 OR Apache-2.0 OR MIT"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "linux-raw-sys@0.9.2",
          "Name": "linux-raw-sys",
          "Identifier": {
            "PURL": "pkg:cargo/linux-raw-sys@0.9.2",
            "UID": "d095a0b90ed936c8",
            "BOMRef": "pkg:cargo/linux-raw-sys@0.9.2"
          },
          "Version": "0.9.2",
          "Licenses": [
            "Apache-2.0 OR Apache-2.0 OR MIT"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "litemap@0.7.3",
          "Name": "litemap",
          "Identifier": {
            "PURL": "pkg:cargo/litemap@0.7.3",
            "UID": "1c6f5d97ec5398e8",
            "BOMRef": "pkg:cargo/litemap@0.7.3"
          },
          "Version": "0.7.3",
          "Licenses": [
            "Unicode-3.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "local-channel@0.1.3",
          "Name": "local-channel",
          "Identifier": {
            "PURL": "pkg:cargo/local-channel@0.1.3",
            "UID": "321961e39feac3bd",
            "BOMRef": "pkg:cargo/local-channel@0.1.3"
          },
          "Version": "0.1.3",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "futures-core@0.3.31",
            "futures-sink@0.3.31",
            "futures-util@0.3.31",
            "local-waker@0.1.3"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "local-waker@0.1.3",
          "Name": "local-waker",
          "Identifier": {
            "PURL": "pkg:cargo/local-waker@0.1.3",
            "UID": "d78df3b9824dea8f",
            "BOMRef": "pkg:cargo/local-waker@0.1.3"
          },
          "Version": "0.1.3",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "lock_api@0.4.14",
          "Name": "lock_api",
          "Identifier": {
            "PURL": "pkg:cargo/lock_api@0.4.14",
            "UID": "c3e6eba8a2686897",
            "BOMRef": "pkg:cargo/lock_api@0.4.14"
          },
          "Version": "0.4.14",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "scopeguard@1.1.0",
            "serde@1.0.226"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "log@0.4.29",
          "Name": "log",
          "Identifier": {
            "PURL": "pkg:cargo/log@0.4.29",
            "UID": "434aac9fdd785811",
            "BOMRef": "pkg:cargo/log@0.4.29"
          },
          "Version": "0.4.29",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "loom@0.7.1",
          "Name": "loom",
          "Identifier": {
            "PURL": "pkg:cargo/loom@0.7.1",
            "UID": "a0c13744e9e7f9a2",
            "BOMRef": "pkg:cargo/loom@0.7.1"
          },
          "Version": "0.7.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "cfg-if@1.0.0",
            "generator@0.7.4",
            "scoped-tls@1.0.1",
            "tracing-subscriber@0.3.22",
            "tracing@0.1.43"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "lz4-sys@1.11.1+lz4-1.10.0",
          "Name": "lz4-sys",
          "Identifier": {
            "PURL": "pkg:cargo/lz4-sys@1.11.1%2Blz4-1.10.0",
            "UID": "69b5a4ee853db88d",
            "BOMRef": "pkg:cargo/lz4-sys@1.11.1%2Blz4-1.10.0"
          },
          "Version": "1.11.1+lz4-1.10.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "libc@0.2.174"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "lz4_flex@0.12.0",
          "Name": "lz4_flex",
          "Identifier": {
            "PURL": "pkg:cargo/lz4_flex@0.12.0",
            "UID": "c10ae92bf73e1f68",
            "BOMRef": "pkg:cargo/lz4_flex@0.12.0"
          },
          "Version": "0.12.0",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "macro_rules_attribute@0.2.2",
          "Name": "macro_rules_attribute",
          "Identifier": {
            "PURL": "pkg:cargo/macro_rules_attribute@0.2.2",
            "UID": "c9e10c76cfb12e0a",
            "BOMRef": "pkg:cargo/macro_rules_attribute@0.2.2"
          },
          "Version": "0.2.2",
          "Licenses": [
            "Apache-2.0 OR MIT OR Zlib"
          ],
          "DependsOn": [
            "macro_rules_attribute-proc_macro@0.2.2",
            "paste@1.0.11"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "macro_rules_attribute-proc_macro@0.2.2",
          "Name": "macro_rules_attribute-proc_macro",
          "Identifier": {
            "PURL": "pkg:cargo/macro_rules_attribute-proc_macro@0.2.2",
            "UID": "9f69821e750dc71e",
            "BOMRef": "pkg:cargo/macro_rules_attribute-proc_macro@0.2.2"
          },
          "Version": "0.2.2",
          "Licenses": [
            "Apache-2.0 OR MIT OR Zlib"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "matchers@0.2.0",
          "Name": "matchers",
          "Identifier": {
            "PURL": "pkg:cargo/matchers@0.2.0",
            "UID": "bffe3ba06f8889b0",
            "BOMRef": "pkg:cargo/matchers@0.2.0"
          },
          "Version": "0.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "regex-automata@0.4.8"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "matchit@0.7.0",
          "Name": "matchit",
          "Identifier": {
            "PURL": "pkg:cargo/matchit@0.7.0",
            "UID": "40575a60cca35870",
            "BOMRef": "pkg:cargo/matchit@0.7.0"
          },
          "Version": "0.7.0",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "md-5@0.10.6",
          "Name": "md-5",
          "Identifier": {
            "PURL": "pkg:cargo/md-5@0.10.6",
            "UID": "74752cbea35ae4c6",
            "BOMRef": "pkg:cargo/md-5@0.10.6"
          },
          "Version": "0.10.6",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "cfg-if@1.0.0",
            "digest@0.10.7"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "memchr@2.7.4",
          "Name": "memchr",
          "Identifier": {
            "PURL": "pkg:cargo/memchr@2.7.4",
            "UID": "adfc4152fd04e285",
            "BOMRef": "pkg:cargo/memchr@2.7.4"
          },
          "Version": "2.7.4",
          "Licenses": [
            "Unlicense OR MIT"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "memmap2@0.9.9",
          "Name": "memmap2",
          "Identifier": {
            "PURL": "pkg:cargo/memmap2@0.9.9",
            "UID": "2b0d81bc721e846f",
            "BOMRef": "pkg:cargo/memmap2@0.9.9"
          },
          "Version": "0.9.9",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "libc@0.2.174"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "memoffset@0.7.1",
          "Name": "memoffset",
          "Identifier": {
            "PURL": "pkg:cargo/memoffset@0.7.1",
            "UID": "58baaa328ef3446c",
            "BOMRef": "pkg:cargo/memoffset@0.7.1"
          },
          "Version": "0.7.1",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "memoffset@0.9.1",
          "Name": "memoffset",
          "Identifier": {
            "PURL": "pkg:cargo/memoffset@0.9.1",
            "UID": "f4e383328e6478a1",
            "BOMRef": "pkg:cargo/memoffset@0.9.1"
          },
          "Version": "0.9.1",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "mime@0.3.16",
          "Name": "mime",
          "Identifier": {
            "PURL": "pkg:cargo/mime@0.3.16",
            "UID": "12c230243f412d59",
            "BOMRef": "pkg:cargo/mime@0.3.16"
          },
          "Version": "0.3.16",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "mime_guess@2.0.4",
          "Name": "mime_guess",
          "Identifier": {
            "PURL": "pkg:cargo/mime_guess@2.0.4",
            "UID": "cc1e0be73a75d825",
            "BOMRef": "pkg:cargo/mime_guess@2.0.4"
          },
          "Version": "2.0.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "mime@0.3.16",
            "unicase@2.6.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "minimal-lexical@0.2.1",
          "Name": "minimal-lexical",
          "Identifier": {
            "PURL": "pkg:cargo/minimal-lexical@0.2.1",
            "UID": "59cb0e2f1ce44af4",
            "BOMRef": "pkg:cargo/minimal-lexical@0.2.1"
          },
          "Version": "0.2.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "miniz_oxide@0.6.2",
          "Name": "miniz_oxide",
          "Identifier": {
            "PURL": "pkg:cargo/miniz_oxide@0.6.2",
            "UID": "e0fcc5bb5aab9984",
            "BOMRef": "pkg:cargo/miniz_oxide@0.6.2"
          },
          "Version": "0.6.2",
          "Licenses": [
            "MIT OR Zlib OR Apache-2.0"
          ],
          "DependsOn": [
            "adler@1.0.2"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "miniz_oxide@0.8.5",
          "Name": "miniz_oxide",
          "Identifier": {
            "PURL": "pkg:cargo/miniz_oxide@0.8.5",
            "UID": "6475c6e8d916af53",
            "BOMRef": "pkg:cargo/miniz_oxide@0.8.5"
          },
          "Version": "0.8.5",
          "Licenses": [
            "MIT OR Zlib OR Apache-2.0"
          ],
          "DependsOn": [
            "adler2@2.0.0",
            "simd-adler32@0.3.7"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "mio@1.0.1",
          "Name": "mio",
          "Identifier": {
            "PURL": "pkg:cargo/mio@1.0.1",
            "UID": "e93058a91b7364c5",
            "BOMRef": "pkg:cargo/mio@1.0.1"
          },
          "Version": "1.0.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "hermit-abi@0.3.9",
            "libc@0.2.174",
            "log@0.4.29",
            "wasi@0.11.0+wasi-snapshot-preview1",
            "windows-sys@0.52.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "names@0.14.0",
          "Name": "names",
          "Identifier": {
            "PURL": "pkg:cargo/names@0.14.0",
            "UID": "3a64198c9d532933",
            "BOMRef": "pkg:cargo/names@0.14.0"
          },
          "Version": "0.14.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "rand@0.8.5"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "nix@0.25.1",
          "Name": "nix",
          "Identifier": {
            "PURL": "pkg:cargo/nix@0.25.1",
            "UID": "63e7bb0dfcb422f4",
            "BOMRef": "pkg:cargo/nix@0.25.1"
          },
          "Version": "0.25.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "bitflags@1.3.2",
            "cfg-if@1.0.0",
            "libc@0.2.174"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "nix@0.27.1",
          "Name": "nix",
          "Identifier": {
            "PURL": "pkg:cargo/nix@0.27.1",
            "UID": "373cbb553a8fe410",
            "BOMRef": "pkg:cargo/nix@0.27.1"
          },
          "Version": "0.27.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "bitflags@2.9.1",
            "cfg-if@1.0.0",
            "libc@0.2.174"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "nix@0.30.1",
          "Name": "nix",
          "Identifier": {
            "PURL": "pkg:cargo/nix@0.30.1",
            "UID": "253380d5d6052367",
            "BOMRef": "pkg:cargo/nix@0.30.1"
          },
          "Version": "0.30.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "bitflags@2.9.1",
            "cfg-if@1.0.0",
            "libc@0.2.174"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "nodrop@0.1.14",
          "Name": "nodrop",
          "Identifier": {
            "PURL": "pkg:cargo/nodrop@0.1.14",
            "UID": "25bf3490309f2fef",
            "BOMRef": "pkg:cargo/nodrop@0.1.14"
          },
          "Version": "0.1.14",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "nom@7.1.3",
          "Name": "nom",
          "Identifier": {
            "PURL": "pkg:cargo/nom@7.1.3",
            "UID": "b5cf539760f05366",
            "BOMRef": "pkg:cargo/nom@7.1.3"
          },
          "Version": "7.1.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "memchr@2.7.4",
            "minimal-lexical@0.2.1"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "nom@8.0.0",
          "Name": "nom",
          "Identifier": {
            "PURL": "pkg:cargo/nom@8.0.0",
            "UID": "c6fd5de95489d113",
            "BOMRef": "pkg:cargo/nom@8.0.0"
          },
          "Version": "8.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "memchr@2.7.4"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "ntapi@0.4.1",
          "Name": "ntapi",
          "Identifier": {
            "PURL": "pkg:cargo/ntapi@0.4.1",
            "UID": "d87be952ca9324f7",
            "BOMRef": "pkg:cargo/ntapi@0.4.1"
          },
          "Version": "0.4.1",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "winapi@0.3.9"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "nu-ansi-term@0.50.1",
          "Name": "nu-ansi-term",
          "Identifier": {
            "PURL": "pkg:cargo/nu-ansi-term@0.50.1",
            "UID": "6e2061e422f1f8b5",
            "BOMRef": "pkg:cargo/nu-ansi-term@0.50.1"
          },
          "Version": "0.50.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "windows-sys@0.52.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "num-bigint@0.4.4",
          "Name": "num-bigint",
          "Identifier": {
            "PURL": "pkg:cargo/num-bigint@0.4.4",
            "UID": "d5652ea687fa60e5",
            "BOMRef": "pkg:cargo/num-bigint@0.4.4"
          },
          "Version": "0.4.4",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "num-integer@0.1.46",
            "num-traits@0.2.19"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "num-bigint-dig@0.8.4",
          "Name": "num-bigint-dig",
          "Identifier": {
            "PURL": "pkg:cargo/num-bigint-dig@0.8.4",
            "UID": "1b7b839b59365eb6",
            "BOMRef": "pkg:cargo/num-bigint-dig@0.8.4"
          },
          "Version": "0.8.4",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "byteorder@1.5.0",
            "lazy_static@1.5.0",
            "libm@0.2.6",
            "num-integer@0.1.46",
            "num-iter@0.1.45",
            "num-traits@0.2.19",
            "rand@0.8.5",
            "smallvec@1.15.1",
            "zeroize@1.8.1"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "num-cmp@0.1.0",
          "Name": "num-cmp",
          "Identifier": {
            "PURL": "pkg:cargo/num-cmp@0.1.0",
            "UID": "5874cd7650ba73d7",
            "BOMRef": "pkg:cargo/num-cmp@0.1.0"
          },
          "Version": "0.1.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "num-derive@0.4.2",
          "Name": "num-derive",
          "Identifier": {
            "PURL": "pkg:cargo/num-derive@0.4.2",
            "UID": "1191be192edf563c",
            "BOMRef": "pkg:cargo/num-derive@0.4.2"
          },
          "Version": "0.4.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@2.0.111"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "num-integer@0.1.46",
          "Name": "num-integer",
          "Identifier": {
            "PURL": "pkg:cargo/num-integer@0.1.46",
            "UID": "38183d78c5d4291c",
            "BOMRef": "pkg:cargo/num-integer@0.1.46"
          },
          "Version": "0.1.46",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "num-traits@0.2.19"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "num-iter@0.1.45",
          "Name": "num-iter",
          "Identifier": {
            "PURL": "pkg:cargo/num-iter@0.1.45",
            "UID": "9c46c5a71960b206",
            "BOMRef": "pkg:cargo/num-iter@0.1.45"
          },
          "Version": "0.1.45",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "num-integer@0.1.46",
            "num-traits@0.2.19"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "num-traits@0.2.19",
          "Name": "num-traits",
          "Identifier": {
            "PURL": "pkg:cargo/num-traits@0.2.19",
            "UID": "105072645b41d035",
            "BOMRef": "pkg:cargo/num-traits@0.2.19"
          },
          "Version": "0.2.19",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "libm@0.2.6"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "num_cpus@1.17.0",
          "Name": "num_cpus",
          "Identifier": {
            "PURL": "pkg:cargo/num_cpus@1.17.0",
            "UID": "287b0b8f3d84a3e7",
            "BOMRef": "pkg:cargo/num_cpus@1.17.0"
          },
          "Version": "1.17.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "hermit-abi@0.5.1",
            "libc@0.2.174"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "objc2-core-foundation@0.3.1",
          "Name": "objc2-core-foundation",
          "Identifier": {
            "PURL": "pkg:cargo/objc2-core-foundation@0.3.1",
            "UID": "a6cade44e194727d",
            "BOMRef": "pkg:cargo/objc2-core-foundation@0.3.1"
          },
          "Version": "0.3.1",
          "Licenses": [
            "Zlib OR Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "bitflags@2.9.1"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "objc2-io-kit@0.3.1",
          "Name": "objc2-io-kit",
          "Identifier": {
            "PURL": "pkg:cargo/objc2-io-kit@0.3.1",
            "UID": "8d2fb813f275b662",
            "BOMRef": "pkg:cargo/objc2-io-kit@0.3.1"
          },
          "Version": "0.3.1",
          "Licenses": [
            "Zlib OR Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "libc@0.2.174",
            "objc2-core-foundation@0.3.1"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "object@0.30.0",
          "Name": "object",
          "Identifier": {
            "PURL": "pkg:cargo/object@0.30.0",
            "UID": "c13d367012b286bd",
            "BOMRef": "pkg:cargo/object@0.30.0"
          },
          "Version": "0.30.0",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "memchr@2.7.4"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "object_store@0.12.4",
          "Name": "object_store",
          "Identifier": {
            "PURL": "pkg:cargo/object_store@0.12.4",
            "UID": "eba2b61aa4feff2d",
            "BOMRef": "pkg:cargo/object_store@0.12.4"
          },
          "Version": "0.12.4",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "async-trait@0.1.89",
            "base64@0.22.0",
            "bytes@1.10.1",
            "chrono@0.4.42",
            "form_urlencoded@1.2.2",
            "futures@0.3.31",
            "http-body-util@0.1.2",
            "http@1.3.1",
            "humantime@2.3.0",
            "hyper@1.6.0",
            "itertools@0.14.0",
            "md-5@0.10.6",
            "parking_lot@0.12.5",
            "percent-encoding@2.3.2",
            "quick-xml@0.38.0",
            "rand@0.9.2",
            "reqwest@0.12.26",
            "ring@0.17.13",
            "serde@1.0.226",
            "serde_json@1.0.145",
            "serde_urlencoded@0.7.1",
            "thiserror@2.0.17",
            "tokio@1.48.0",
            "tracing@0.1.43",
            "url@2.5.7",
            "walkdir@2.5.0",
            "wasm-bindgen-futures@0.4.42",
            "web-time@1.1.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "once_cell@1.21.3",
          "Name": "once_cell",
          "Identifier": {
            "PURL": "pkg:cargo/once_cell@1.21.3",
            "UID": "8917954c9b070c6f",
            "BOMRef": "pkg:cargo/once_cell@1.21.3"
          },
          "Version": "1.21.3",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "openssl-probe@0.1.5",
          "Name": "openssl-probe",
          "Identifier": {
            "PURL": "pkg:cargo/openssl-probe@0.1.5",
            "UID": "666757693d82dbe0",
            "BOMRef": "pkg:cargo/openssl-probe@0.1.5"
          },
          "Version": "0.1.5",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "ordered-float@2.10.1",
          "Name": "ordered-float",
          "Identifier": {
            "PURL": "pkg:cargo/ordered-float@2.10.1",
            "UID": "38b318b2f27fd367",
            "BOMRef": "pkg:cargo/ordered-float@2.10.1"
          },
          "Version": "2.10.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "num-traits@0.2.19"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "ordered-float@5.1.0",
          "Name": "ordered-float",
          "Identifier": {
            "PURL": "pkg:cargo/ordered-float@5.1.0",
            "UID": "6c413cf82059505a",
            "BOMRef": "pkg:cargo/ordered-float@5.1.0"
          },
          "Version": "5.1.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "num-traits@0.2.19",
            "rand@0.8.5",
            "schemars@0.8.22",
            "serde@1.0.226"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "p256@0.13.2",
          "Name": "p256",
          "Identifier": {
            "PURL": "pkg:cargo/p256@0.13.2",
            "UID": "61e15e717704edc",
            "BOMRef": "pkg:cargo/p256@0.13.2"
          },
          "Version": "0.13.2",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "ecdsa@0.16.9",
            "elliptic-curve@0.13.8",
            "primeorder@0.13.6",
            "sha2@0.10.9"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "p384@0.13.1",
          "Name": "p384",
          "Identifier": {
            "PURL": "pkg:cargo/p384@0.13.1",
            "UID": "1cb845482e49553e",
            "BOMRef": "pkg:cargo/p384@0.13.1"
          },
          "Version": "0.13.1",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "ecdsa@0.16.9",
            "elliptic-curve@0.13.8",
            "primeorder@0.13.6",
            "sha2@0.10.9"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "parking_lot@0.12.5",
          "Name": "parking_lot",
          "Identifier": {
            "PURL": "pkg:cargo/parking_lot@0.12.5",
            "UID": "ec688b0c04a24deb",
            "BOMRef": "pkg:cargo/parking_lot@0.12.5"
          },
          "Version": "0.12.5",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "lock_api@0.4.14",
            "parking_lot_core@0.9.12"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "parking_lot_core@0.9.12",
          "Name": "parking_lot_core",
          "Identifier": {
            "PURL": "pkg:cargo/parking_lot_core@0.9.12",
            "UID": "83da6ce7e0cb4c1a",
            "BOMRef": "pkg:cargo/parking_lot_core@0.9.12"
          },
          "Version": "0.9.12",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "backtrace@0.3.67",
            "cfg-if@1.0.0",
            "libc@0.2.174",
            "petgraph@0.6.2",
            "redox_syscall@0.5.12",
            "smallvec@1.15.1",
            "windows-link@0.2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "parse-size@1.0.0",
          "Name": "parse-size",
          "Identifier": {
            "PURL": "pkg:cargo/parse-size@1.0.0",
            "UID": "c9354c0c272088dc",
            "BOMRef": "pkg:cargo/parse-size@1.0.0"
          },
          "Version": "1.0.0",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "paste@1.0.11",
          "Name": "paste",
          "Identifier": {
            "PURL": "pkg:cargo/paste@1.0.11",
            "UID": "4347df50792b5e32",
            "BOMRef": "pkg:cargo/paste@1.0.11"
          },
          "Version": "1.0.11",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "path_facts@0.2.1",
          "Name": "path_facts",
          "Identifier": {
            "PURL": "pkg:cargo/path_facts@0.2.1",
            "UID": "c2efc0c887588b6b",
            "BOMRef": "pkg:cargo/path_facts@0.2.1"
          },
          "Version": "0.2.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "faccess@0.2.4"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "pathdiff@0.2.3",
          "Name": "pathdiff",
          "Identifier": {
            "PURL": "pkg:cargo/pathdiff@0.2.3",
            "UID": "4e698207565b8b87",
            "BOMRef": "pkg:cargo/pathdiff@0.2.3"
          },
          "Version": "0.2.3",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "pem@3.0.3",
          "Name": "pem",
          "Identifier": {
            "PURL": "pkg:cargo/pem@3.0.3",
            "UID": "ed443466d7620be4",
            "BOMRef": "pkg:cargo/pem@3.0.3"
          },
          "Version": "3.0.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "base64@0.21.0",
            "serde@1.0.226"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "pem-rfc7468@0.7.0",
          "Name": "pem-rfc7468",
          "Identifier": {
            "PURL": "pkg:cargo/pem-rfc7468@0.7.0",
            "UID": "f4fb92c989592696",
            "BOMRef": "pkg:cargo/pem-rfc7468@0.7.0"
          },
          "Version": "0.7.0",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "base64ct@1.8.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "percent-encoding@2.3.2",
          "Name": "percent-encoding",
          "Identifier": {
            "PURL": "pkg:cargo/percent-encoding@2.3.2",
            "UID": "e8110624fe1a5381",
            "BOMRef": "pkg:cargo/percent-encoding@2.3.2"
          },
          "Version": "2.3.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "permutation_iterator@0.1.2",
          "Name": "permutation_iterator",
          "Identifier": {
            "PURL": "pkg:cargo/permutation_iterator@0.1.2",
            "UID": "23808c9906c373fa",
            "BOMRef": "pkg:cargo/permutation_iterator@0.1.2"
          },
          "Version": "0.1.2",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "blake2-rfc@0.2.18",
            "rand@0.7.3"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "petgraph@0.6.2",
          "Name": "petgraph",
          "Identifier": {
            "PURL": "pkg:cargo/petgraph@0.6.2",
            "UID": "e90a15838a06730d",
            "BOMRef": "pkg:cargo/petgraph@0.6.2"
          },
          "Version": "0.6.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "fixedbitset@0.4.2",
            "indexmap@1.9.2"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "ph@0.8.5",
          "Name": "ph",
          "Identifier": {
            "PURL": "pkg:cargo/ph@0.8.5",
            "UID": "aba9f2c7d05aac90",
            "BOMRef": "pkg:cargo/ph@0.8.5"
          },
          "Version": "0.8.5",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "aligned-vec@0.6.1",
            "binout@0.2.1",
            "bitm@0.4.2",
            "dyn_size_of@0.4.2",
            "rayon@1.11.0",
            "seedable_hash@0.1.1"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "phf@0.11.2",
          "Name": "phf",
          "Identifier": {
            "PURL": "pkg:cargo/phf@0.11.2",
            "UID": "2de00b70f815aa6c",
            "BOMRef": "pkg:cargo/phf@0.11.2"
          },
          "Version": "0.11.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "phf_shared@0.11.2"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "phf_codegen@0.11.2",
          "Name": "phf_codegen",
          "Identifier": {
            "PURL": "pkg:cargo/phf_codegen@0.11.2",
            "UID": "b475fe414b03c918",
            "BOMRef": "pkg:cargo/phf_codegen@0.11.2"
          },
          "Version": "0.11.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "phf_generator@0.11.2",
            "phf_shared@0.11.2"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "phf_generator@0.11.2",
          "Name": "phf_generator",
          "Identifier": {
            "PURL": "pkg:cargo/phf_generator@0.11.2",
            "UID": "fe126da55c1f3bc9",
            "BOMRef": "pkg:cargo/phf_generator@0.11.2"
          },
          "Version": "0.11.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "phf_shared@0.11.2",
            "rand@0.8.5"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "phf_shared@0.11.2",
          "Name": "phf_shared",
          "Identifier": {
            "PURL": "pkg:cargo/phf_shared@0.11.2",
            "UID": "2f90e93d27587c",
            "BOMRef": "pkg:cargo/phf_shared@0.11.2"
          },
          "Version": "0.11.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "siphasher@0.3.10"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "pin-project@1.0.12",
          "Name": "pin-project",
          "Identifier": {
            "PURL": "pkg:cargo/pin-project@1.0.12",
            "UID": "984af43d9d514425",
            "BOMRef": "pkg:cargo/pin-project@1.0.12"
          },
          "Version": "1.0.12",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "pin-project-internal@1.0.12"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "pin-project-internal@1.0.12",
          "Name": "pin-project-internal",
          "Identifier": {
            "PURL": "pkg:cargo/pin-project-internal@1.0.12",
            "UID": "96bd3f91d85a315e",
            "BOMRef": "pkg:cargo/pin-project-internal@1.0.12"
          },
          "Version": "1.0.12",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@1.0.107"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "pin-project-lite@0.2.12",
          "Name": "pin-project-lite",
          "Identifier": {
            "PURL": "pkg:cargo/pin-project-lite@0.2.12",
            "UID": "f47f96fa66ea8183",
            "BOMRef": "pkg:cargo/pin-project-lite@0.2.12"
          },
          "Version": "0.2.12",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "pin-utils@0.1.0",
          "Name": "pin-utils",
          "Identifier": {
            "PURL": "pkg:cargo/pin-utils@0.1.0",
            "UID": "4bddfff7dc09068b",
            "BOMRef": "pkg:cargo/pin-utils@0.1.0"
          },
          "Version": "0.1.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "pkcs1@0.7.5",
          "Name": "pkcs1",
          "Identifier": {
            "PURL": "pkg:cargo/pkcs1@0.7.5",
            "UID": "a348334f6835f509",
            "BOMRef": "pkg:cargo/pkcs1@0.7.5"
          },
          "Version": "0.7.5",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "der@0.7.10",
            "pkcs8@0.10.2",
            "spki@0.7.3"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "pkcs8@0.10.2",
          "Name": "pkcs8",
          "Identifier": {
            "PURL": "pkg:cargo/pkcs8@0.10.2",
            "UID": "7bea45402f3f0fe5",
            "BOMRef": "pkg:cargo/pkcs8@0.10.2"
          },
          "Version": "0.10.2",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "der@0.7.10",
            "spki@0.7.3"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "portable-atomic@1.11.1",
          "Name": "portable-atomic",
          "Identifier": {
            "PURL": "pkg:cargo/portable-atomic@1.11.1",
            "UID": "55f90002e72993d2",
            "BOMRef": "pkg:cargo/portable-atomic@1.11.1"
          },
          "Version": "1.11.1",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "portable-atomic-util@0.2.4",
          "Name": "portable-atomic-util",
          "Identifier": {
            "PURL": "pkg:cargo/portable-atomic-util@0.2.4",
            "UID": "290f4a42e3b4854f",
            "BOMRef": "pkg:cargo/portable-atomic-util@0.2.4"
          },
          "Version": "0.2.4",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "portable-atomic@1.11.1"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "pprof2@0.13.1",
          "Name": "pprof2",
          "Identifier": {
            "PURL": "pkg:cargo/pprof2@0.13.1",
            "UID": "291b35fc894f948a",
            "BOMRef": "pkg:cargo/pprof2@0.13.1"
          },
          "Version": "0.13.1",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "backtrace@0.3.67",
            "cfg-if@1.0.0",
            "findshlibs@0.10.2",
            "libc@0.2.174",
            "log@0.4.29",
            "nix@0.27.1",
            "once_cell@1.21.3",
            "parking_lot@0.12.5",
            "smallvec@1.15.1",
            "symbolic-demangle@12.12.3",
            "tempfile@3.23.0",
            "thiserror@2.0.17"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "ppv-lite86@0.2.17",
          "Name": "ppv-lite86",
          "Identifier": {
            "PURL": "pkg:cargo/ppv-lite86@0.2.17",
            "UID": "b4f386b583b2c6c0",
            "BOMRef": "pkg:cargo/ppv-lite86@0.2.17"
          },
          "Version": "0.2.17",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "presser@0.3.1",
          "Name": "presser",
          "Identifier": {
            "PURL": "pkg:cargo/presser@0.3.1",
            "UID": "cdc18f807d5f4d77",
            "BOMRef": "pkg:cargo/presser@0.3.1"
          },
          "Version": "0.3.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "primeorder@0.13.6",
          "Name": "primeorder",
          "Identifier": {
            "PURL": "pkg:cargo/primeorder@0.13.6",
            "UID": "b8894ede26a88c1b",
            "BOMRef": "pkg:cargo/primeorder@0.13.6"
          },
          "Version": "0.13.6",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "elliptic-curve@0.13.8"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "proc-macro-error@1.0.4",
          "Name": "proc-macro-error",
          "Identifier": {
            "PURL": "pkg:cargo/proc-macro-error@1.0.4",
            "UID": "9bf958c463191461",
            "BOMRef": "pkg:cargo/proc-macro-error@1.0.4"
          },
          "Version": "1.0.4",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "proc-macro-error-attr@1.0.4",
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@1.0.107"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "proc-macro-error-attr@1.0.4",
          "Name": "proc-macro-error-attr",
          "Identifier": {
            "PURL": "pkg:cargo/proc-macro-error-attr@1.0.4",
            "UID": "76579a7f09fd55c6",
            "BOMRef": "pkg:cargo/proc-macro-error-attr@1.0.4"
          },
          "Version": "1.0.4",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "proc-macro2@1.0.101",
            "quote@1.0.42"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "proc-macro-error-attr2@2.0.0",
          "Name": "proc-macro-error-attr2",
          "Identifier": {
            "PURL": "pkg:cargo/proc-macro-error-attr2@2.0.0",
            "UID": "8be972f9b8aee86e",
            "BOMRef": "pkg:cargo/proc-macro-error-attr2@2.0.0"
          },
          "Version": "2.0.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "proc-macro2@1.0.101",
            "quote@1.0.42"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "proc-macro-error2@2.0.1",
          "Name": "proc-macro-error2",
          "Identifier": {
            "PURL": "pkg:cargo/proc-macro-error2@2.0.1",
            "UID": "54014fc1be42c12f",
            "BOMRef": "pkg:cargo/proc-macro-error2@2.0.1"
          },
          "Version": "2.0.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "proc-macro-error-attr2@2.0.0",
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@2.0.111"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "proc-macro2@1.0.101",
          "Name": "proc-macro2",
          "Identifier": {
            "PURL": "pkg:cargo/proc-macro2@1.0.101",
            "UID": "9fb0dc165f013c0e",
            "BOMRef": "pkg:cargo/proc-macro2@1.0.101"
          },
          "Version": "1.0.101",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "unicode-ident@1.0.13"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "procfs@0.18.0",
          "Name": "procfs",
          "Identifier": {
            "PURL": "pkg:cargo/procfs@0.18.0",
            "UID": "ce746d198fe8e5ae",
            "BOMRef": "pkg:cargo/procfs@0.18.0"
          },
          "Version": "0.18.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "bitflags@2.9.1",
            "procfs-core@0.18.0",
            "rustix@1.0.2"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "procfs-core@0.18.0",
          "Name": "procfs-core",
          "Identifier": {
            "PURL": "pkg:cargo/procfs-core@0.18.0",
            "UID": "89ca15cf055ba6f5",
            "BOMRef": "pkg:cargo/procfs-core@0.18.0"
          },
          "Version": "0.18.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "bitflags@2.9.1",
            "hex@0.4.3"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "prometheus@0.14.0",
          "Name": "prometheus",
          "Identifier": {
            "PURL": "pkg:cargo/prometheus@0.14.0",
            "UID": "df3bff4c5174d0fd",
            "BOMRef": "pkg:cargo/prometheus@0.14.0"
          },
          "Version": "0.14.0",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "cfg-if@1.0.0",
            "fnv@1.0.7",
            "lazy_static@1.5.0",
            "memchr@2.7.4",
            "parking_lot@0.12.5",
            "thiserror@2.0.17"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "prost@0.11.9",
          "Name": "prost",
          "Identifier": {
            "PURL": "pkg:cargo/prost@0.11.9",
            "UID": "439cff1a626d787f",
            "BOMRef": "pkg:cargo/prost@0.11.9"
          },
          "Version": "0.11.9",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "bytes@1.10.1",
            "prost-derive@0.11.9"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "prost@0.12.6",
          "Name": "prost",
          "Identifier": {
            "PURL": "pkg:cargo/prost@0.12.6",
            "UID": "455e2a3d169afc3",
            "BOMRef": "pkg:cargo/prost@0.12.6"
          },
          "Version": "0.12.6",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "bytes@1.10.1",
            "prost-derive@0.12.6"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "prost@0.13.1",
          "Name": "prost",
          "Identifier": {
            "PURL": "pkg:cargo/prost@0.13.1",
            "UID": "3bc0c4a4d6a978a0",
            "BOMRef": "pkg:cargo/prost@0.13.1"
          },
          "Version": "0.13.1",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "bytes@1.10.1",
            "prost-derive@0.13.1"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "prost-derive@0.11.9",
          "Name": "prost-derive",
          "Identifier": {
            "PURL": "pkg:cargo/prost-derive@0.11.9",
            "UID": "f3fc137cf62facda",
            "BOMRef": "pkg:cargo/prost-derive@0.11.9"
          },
          "Version": "0.11.9",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "anyhow@1.0.100",
            "itertools@0.10.5",
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@1.0.107"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "prost-derive@0.12.6",
          "Name": "prost-derive",
          "Identifier": {
            "PURL": "pkg:cargo/prost-derive@0.12.6",
            "UID": "d1c5afd0ac1bf7be",
            "BOMRef": "pkg:cargo/prost-derive@0.12.6"
          },
          "Version": "0.12.6",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "anyhow@1.0.100",
            "itertools@0.12.1",
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@2.0.111"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "prost-derive@0.13.1",
          "Name": "prost-derive",
          "Identifier": {
            "PURL": "pkg:cargo/prost-derive@0.13.1",
            "UID": "4abad6a2141fb856",
            "BOMRef": "pkg:cargo/prost-derive@0.13.1"
          },
          "Version": "0.13.1",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "anyhow@1.0.100",
            "itertools@0.13.0",
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@2.0.111"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "prost-types@0.12.6",
          "Name": "prost-types",
          "Identifier": {
            "PURL": "pkg:cargo/prost-types@0.12.6",
            "UID": "6b8ef26d533c6edb",
            "BOMRef": "pkg:cargo/prost-types@0.12.6"
          },
          "Version": "0.12.6",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "prost@0.12.6"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "prost-types@0.13.1",
          "Name": "prost-types",
          "Identifier": {
            "PURL": "pkg:cargo/prost-types@0.13.1",
            "UID": "2066134654ef0863",
            "BOMRef": "pkg:cargo/prost-types@0.13.1"
          },
          "Version": "0.13.1",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "prost@0.13.1"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "prost-wkt@0.5.1",
          "Name": "prost-wkt",
          "Identifier": {
            "PURL": "pkg:cargo/prost-wkt@0.5.1",
            "UID": "64233bfb50554f5b",
            "BOMRef": "pkg:cargo/prost-wkt@0.5.1"
          },
          "Version": "0.5.1",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "chrono@0.4.42",
            "inventory@0.3.14",
            "prost@0.12.6",
            "serde@1.0.226",
            "serde_derive@1.0.226",
            "serde_json@1.0.145",
            "typetag@0.2.15"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "prost-wkt-types@0.5.1",
          "Name": "prost-wkt-types",
          "Identifier": {
            "PURL": "pkg:cargo/prost-wkt-types@0.5.1",
            "UID": "904eea37fba55e2d",
            "BOMRef": "pkg:cargo/prost-wkt-types@0.5.1"
          },
          "Version": "0.5.1",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "chrono@0.4.42",
            "prost-wkt@0.5.1",
            "prost@0.12.6",
            "serde@1.0.226",
            "serde_derive@1.0.226",
            "serde_json@1.0.145"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "protobuf@2.28.0",
          "Name": "protobuf",
          "Identifier": {
            "PURL": "pkg:cargo/protobuf@2.28.0",
            "UID": "3890a57fc13724cc",
            "BOMRef": "pkg:cargo/protobuf@2.28.0"
          },
          "Version": "2.28.0",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "pyo3@0.27.2",
          "Name": "pyo3",
          "Identifier": {
            "PURL": "pkg:cargo/pyo3@0.27.2",
            "UID": "955017282fcbe5b2",
            "BOMRef": "pkg:cargo/pyo3@0.27.2"
          },
          "Version": "0.27.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "indoc@2.0.6",
            "libc@0.2.174",
            "memoffset@0.9.1",
            "once_cell@1.21.3",
            "portable-atomic@1.11.1",
            "pyo3-ffi@0.27.2",
            "pyo3-macros@0.27.2",
            "unindent@0.2.4",
            "uuid@1.19.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "pyo3-build-config@0.27.2",
          "Name": "pyo3-build-config",
          "Identifier": {
            "PURL": "pkg:cargo/pyo3-build-config@0.27.2",
            "UID": "cf7b7ecdada1eb74",
            "BOMRef": "pkg:cargo/pyo3-build-config@0.27.2"
          },
          "Version": "0.27.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "target-lexicon@0.13.3"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "pyo3-ffi@0.27.2",
          "Name": "pyo3-ffi",
          "Identifier": {
            "PURL": "pkg:cargo/pyo3-ffi@0.27.2",
            "UID": "8ea3781bd52dbf35",
            "BOMRef": "pkg:cargo/pyo3-ffi@0.27.2"
          },
          "Version": "0.27.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "libc@0.2.174"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "pyo3-macros@0.27.2",
          "Name": "pyo3-macros",
          "Identifier": {
            "PURL": "pkg:cargo/pyo3-macros@0.27.2",
            "UID": "14cc7cad8b1c437e",
            "BOMRef": "pkg:cargo/pyo3-macros@0.27.2"
          },
          "Version": "0.27.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "proc-macro2@1.0.101",
            "pyo3-macros-backend@0.27.2",
            "quote@1.0.42",
            "syn@2.0.111"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "pyo3-macros-backend@0.27.2",
          "Name": "pyo3-macros-backend",
          "Identifier": {
            "PURL": "pkg:cargo/pyo3-macros-backend@0.27.2",
            "UID": "df043ede8f0ec711",
            "BOMRef": "pkg:cargo/pyo3-macros-backend@0.27.2"
          },
          "Version": "0.27.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "heck@0.5.0",
            "proc-macro2@1.0.101",
            "pyo3-build-config@0.27.2",
            "quote@1.0.42",
            "syn@2.0.111"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "pyroscope@0.5.8",
          "Name": "pyroscope",
          "Identifier": {
            "PURL": "pkg:cargo/pyroscope@0.5.8",
            "UID": "d3c0c0cc17fcef68",
            "BOMRef": "pkg:cargo/pyroscope@0.5.8"
          },
          "Version": "0.5.8",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "libc@0.2.174",
            "libflate@1.4.0",
            "log@0.4.29",
            "names@0.14.0",
            "prost@0.11.9",
            "reqwest@0.12.26",
            "serde_json@1.0.145",
            "thiserror@1.0.69",
            "url@2.5.7",
            "winapi@0.3.9"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "pyroscope_pprofrs@0.2.10",
          "Name": "pyroscope_pprofrs",
          "Identifier": {
            "PURL": "pkg:cargo/pyroscope_pprofrs@0.2.10",
            "UID": "ce89378b7e463fbc",
            "BOMRef": "pkg:cargo/pyroscope_pprofrs@0.2.10"
          },
          "Version": "0.2.10",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "log@0.4.29",
            "pprof2@0.13.1",
            "pyroscope@0.5.8"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "quick-xml@0.38.0",
          "Name": "quick-xml",
          "Identifier": {
            "PURL": "pkg:cargo/quick-xml@0.38.0",
            "UID": "f67a69f033d7a38e",
            "BOMRef": "pkg:cargo/quick-xml@0.38.0"
          },
          "Version": "0.38.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "memchr@2.7.4",
            "serde@1.0.226"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "quinn@0.11.2",
          "Name": "quinn",
          "Identifier": {
            "PURL": "pkg:cargo/quinn@0.11.2",
            "UID": "73eb81b1cf88507d",
            "BOMRef": "pkg:cargo/quinn@0.11.2"
          },
          "Version": "0.11.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "bytes@1.10.1",
            "pin-project-lite@0.2.12",
            "quinn-proto@0.11.8",
            "quinn-udp@0.5.2",
            "rustc-hash@1.1.0",
            "rustls@0.23.35",
            "thiserror@1.0.69",
            "tokio@1.48.0",
            "tracing@0.1.43"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "quinn-proto@0.11.8",
          "Name": "quinn-proto",
          "Identifier": {
            "PURL": "pkg:cargo/quinn-proto@0.11.8",
            "UID": "6399d8c373a4cbf7",
            "BOMRef": "pkg:cargo/quinn-proto@0.11.8"
          },
          "Version": "0.11.8",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "bytes@1.10.1",
            "rand@0.8.5",
            "ring@0.17.13",
            "rustc-hash@2.1.1",
            "rustls@0.23.35",
            "slab@0.4.11",
            "thiserror@1.0.69",
            "tinyvec@1.10.0",
            "tracing@0.1.43"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "quinn-udp@0.5.2",
          "Name": "quinn-udp",
          "Identifier": {
            "PURL": "pkg:cargo/quinn-udp@0.5.2",
            "UID": "d46e0885af8b699e",
            "BOMRef": "pkg:cargo/quinn-udp@0.5.2"
          },
          "Version": "0.5.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "libc@0.2.174",
            "once_cell@1.21.3",
            "socket2@0.5.10",
            "tracing@0.1.43",
            "windows-sys@0.52.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "quote@1.0.42",
          "Name": "quote",
          "Identifier": {
            "PURL": "pkg:cargo/quote@1.0.42",
            "UID": "46b8c61408fa0d5e",
            "BOMRef": "pkg:cargo/quote@1.0.42"
          },
          "Version": "1.0.42",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "proc-macro2@1.0.101"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "radium@0.7.0",
          "Name": "radium",
          "Identifier": {
            "PURL": "pkg:cargo/radium@0.7.0",
            "UID": "66a5057174f80bf4",
            "BOMRef": "pkg:cargo/radium@0.7.0"
          },
          "Version": "0.7.0",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "raft@0.7.0",
          "Name": "raft",
          "Identifier": {
            "PURL": "pkg:cargo/raft@0.7.0",
            "UID": "32d456ee342de59a",
            "BOMRef": "pkg:cargo/raft@0.7.0"
          },
          "Version": "0.7.0",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "fxhash@0.2.1",
            "getset@0.1.2",
            "protobuf@2.28.0",
            "raft-proto@0.7.0",
            "rand@0.8.5",
            "slog@2.8.2",
            "thiserror@1.0.69"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "raft-proto@0.7.0",
          "Name": "raft-proto",
          "Identifier": {
            "PURL": "pkg:cargo/raft-proto@0.7.0",
            "UID": "808b93481a91f4e1",
            "BOMRef": "pkg:cargo/raft-proto@0.7.0"
          },
          "Version": "0.7.0",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "lazy_static@1.5.0",
            "prost@0.11.9",
            "protobuf@2.28.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "rand@0.7.3",
          "Name": "rand",
          "Identifier": {
            "PURL": "pkg:cargo/rand@0.7.3",
            "UID": "5a563e715070e7f3",
            "BOMRef": "pkg:cargo/rand@0.7.3"
          },
          "Version": "0.7.3",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "getrandom@0.1.16",
            "libc@0.2.174",
            "rand_chacha@0.2.2",
            "rand_core@0.5.1",
            "rand_hc@0.2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "rand@0.8.5",
          "Name": "rand",
          "Identifier": {
            "PURL": "pkg:cargo/rand@0.8.5",
            "UID": "2ee90ef54060f0f4",
            "BOMRef": "pkg:cargo/rand@0.8.5"
          },
          "Version": "0.8.5",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "libc@0.2.174",
            "rand_chacha@0.3.1",
            "rand_core@0.6.4",
            "serde@1.0.226"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "rand@0.9.2",
          "Name": "rand",
          "Identifier": {
            "PURL": "pkg:cargo/rand@0.9.2",
            "UID": "7cd95341bca89128",
            "BOMRef": "pkg:cargo/rand@0.9.2"
          },
          "Version": "0.9.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "rand_chacha@0.9.0",
            "rand_core@0.9.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "rand_chacha@0.2.2",
          "Name": "rand_chacha",
          "Identifier": {
            "PURL": "pkg:cargo/rand_chacha@0.2.2",
            "UID": "cf1b78816c6fed59",
            "BOMRef": "pkg:cargo/rand_chacha@0.2.2"
          },
          "Version": "0.2.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "ppv-lite86@0.2.17",
            "rand_core@0.5.1"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "rand_chacha@0.3.1",
          "Name": "rand_chacha",
          "Identifier": {
            "PURL": "pkg:cargo/rand_chacha@0.3.1",
            "UID": "c1f490eeb4d78a54",
            "BOMRef": "pkg:cargo/rand_chacha@0.3.1"
          },
          "Version": "0.3.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "ppv-lite86@0.2.17",
            "rand_core@0.6.4"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "rand_chacha@0.9.0",
          "Name": "rand_chacha",
          "Identifier": {
            "PURL": "pkg:cargo/rand_chacha@0.9.0",
            "UID": "93cc94c524d8edb5",
            "BOMRef": "pkg:cargo/rand_chacha@0.9.0"
          },
          "Version": "0.9.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "ppv-lite86@0.2.17",
            "rand_core@0.9.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "rand_core@0.5.1",
          "Name": "rand_core",
          "Identifier": {
            "PURL": "pkg:cargo/rand_core@0.5.1",
            "UID": "5f92d294ce606f09",
            "BOMRef": "pkg:cargo/rand_core@0.5.1"
          },
          "Version": "0.5.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "getrandom@0.1.16"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "rand_core@0.6.4",
          "Name": "rand_core",
          "Identifier": {
            "PURL": "pkg:cargo/rand_core@0.6.4",
            "UID": "9d339fec14d32c7b",
            "BOMRef": "pkg:cargo/rand_core@0.6.4"
          },
          "Version": "0.6.4",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "getrandom@0.2.11",
            "serde@1.0.226"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "rand_core@0.9.0",
          "Name": "rand_core",
          "Identifier": {
            "PURL": "pkg:cargo/rand_core@0.9.0",
            "UID": "243d9420303ac09f",
            "BOMRef": "pkg:cargo/rand_core@0.9.0"
          },
          "Version": "0.9.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "getrandom@0.3.0",
            "zerocopy@0.8.31"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "rand_distr@0.5.1",
          "Name": "rand_distr",
          "Identifier": {
            "PURL": "pkg:cargo/rand_distr@0.5.1",
            "UID": "2f6f0e5477c1c6fb",
            "BOMRef": "pkg:cargo/rand_distr@0.5.1"
          },
          "Version": "0.5.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "num-traits@0.2.19",
            "rand@0.9.2"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "rand_hc@0.2.0",
          "Name": "rand_hc",
          "Identifier": {
            "PURL": "pkg:cargo/rand_hc@0.2.0",
            "UID": "27855fb0b2411921",
            "BOMRef": "pkg:cargo/rand_hc@0.2.0"
          },
          "Version": "0.2.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "rand_core@0.5.1"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "rayon@1.11.0",
          "Name": "rayon",
          "Identifier": {
            "PURL": "pkg:cargo/rayon@1.11.0",
            "UID": "6e76cf1e9ba81b86",
            "BOMRef": "pkg:cargo/rayon@1.11.0"
          },
          "Version": "1.11.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "either@1.13.0",
            "rayon-core@1.13.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "rayon-core@1.13.0",
          "Name": "rayon-core",
          "Identifier": {
            "PURL": "pkg:cargo/rayon-core@1.13.0",
            "UID": "d6b8dbbf707d740b",
            "BOMRef": "pkg:cargo/rayon-core@1.13.0"
          },
          "Version": "1.13.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "crossbeam-deque@0.8.2",
            "crossbeam-utils@0.8.20"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "redox_syscall@0.2.16",
          "Name": "redox_syscall",
          "Identifier": {
            "PURL": "pkg:cargo/redox_syscall@0.2.16",
            "UID": "f20784d06d03609d",
            "BOMRef": "pkg:cargo/redox_syscall@0.2.16"
          },
          "Version": "0.2.16",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "bitflags@1.3.2"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "redox_syscall@0.5.12",
          "Name": "redox_syscall",
          "Identifier": {
            "PURL": "pkg:cargo/redox_syscall@0.5.12",
            "UID": "5e9235fa3d5d099b",
            "BOMRef": "pkg:cargo/redox_syscall@0.5.12"
          },
          "Version": "0.5.12",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "bitflags@2.9.1"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "regex@1.11.0",
          "Name": "regex",
          "Identifier": {
            "PURL": "pkg:cargo/regex@1.11.0",
            "UID": "cc9f73a5575c9a48",
            "BOMRef": "pkg:cargo/regex@1.11.0"
          },
          "Version": "1.11.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "aho-corasick@1.1.3",
            "memchr@2.7.4",
            "regex-automata@0.4.8",
            "regex-syntax@0.8.5"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "regex-automata@0.4.8",
          "Name": "regex-automata",
          "Identifier": {
            "PURL": "pkg:cargo/regex-automata@0.4.8",
            "UID": "fe11beabcbe24cf6",
            "BOMRef": "pkg:cargo/regex-automata@0.4.8"
          },
          "Version": "0.4.8",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "aho-corasick@1.1.3",
            "memchr@2.7.4",
            "regex-syntax@0.8.5"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "regex-lite@0.1.5",
          "Name": "regex-lite",
          "Identifier": {
            "PURL": "pkg:cargo/regex-lite@0.1.5",
            "UID": "f5639fef18f6296a",
            "BOMRef": "pkg:cargo/regex-lite@0.1.5"
          },
          "Version": "0.1.5",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "regex-syntax@0.8.5",
          "Name": "regex-syntax",
          "Identifier": {
            "PURL": "pkg:cargo/regex-syntax@0.8.5",
            "UID": "77060942273dd135",
            "BOMRef": "pkg:cargo/regex-syntax@0.8.5"
          },
          "Version": "0.8.5",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "reqwest@0.12.26",
          "Name": "reqwest",
          "Identifier": {
            "PURL": "pkg:cargo/reqwest@0.12.26",
            "UID": "27261c2a213b1138",
            "BOMRef": "pkg:cargo/reqwest@0.12.26"
          },
          "Version": "0.12.26",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "base64@0.22.0",
            "bytes@1.10.1",
            "futures-channel@0.3.31",
            "futures-core@0.3.31",
            "futures-util@0.3.31",
            "h2@0.4.4",
            "http-body-util@0.1.2",
            "http-body@1.0.0",
            "http@1.3.1",
            "hyper-rustls@0.27.2",
            "hyper-util@0.1.13",
            "hyper@1.6.0",
            "js-sys@0.3.77",
            "log@0.4.29",
            "percent-encoding@2.3.2",
            "pin-project-lite@0.2.12",
            "quinn@0.11.2",
            "rustls-native-certs@0.8.0",
            "rustls-pki-types@1.13.1",
            "rustls@0.23.35",
            "serde@1.0.226",
            "serde_json@1.0.145",
            "serde_urlencoded@0.7.1",
            "sync_wrapper@1.0.1",
            "tokio-rustls@0.26.0",
            "tokio-util@0.7.17",
            "tokio@1.48.0",
            "tower-http@0.6.8",
            "tower-service@0.3.3",
            "tower@0.5.2",
            "url@2.5.7",
            "wasm-bindgen-futures@0.4.42",
            "wasm-bindgen@0.2.100",
            "wasm-streams@0.4.0",
            "web-sys@0.3.69",
            "webpki-roots@1.0.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "rfc6979@0.4.0",
          "Name": "rfc6979",
          "Identifier": {
            "PURL": "pkg:cargo/rfc6979@0.4.0",
            "UID": "edc534da09606307",
            "BOMRef": "pkg:cargo/rfc6979@0.4.0"
          },
          "Version": "0.4.0",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "hmac@0.12.1",
            "subtle@2.5.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "ring@0.17.13",
          "Name": "ring",
          "Identifier": {
            "PURL": "pkg:cargo/ring@0.17.13",
            "UID": "ff9d605cff511f97",
            "BOMRef": "pkg:cargo/ring@0.17.13"
          },
          "Version": "0.17.13",
          "Licenses": [
            "Apache-2.0 AND ISC"
          ],
          "DependsOn": [
            "cfg-if@1.0.0",
            "getrandom@0.2.11",
            "libc@0.2.174",
            "untrusted@0.9.0",
            "windows-sys@0.52.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "ringbuffer@0.16.0",
          "Name": "ringbuffer",
          "Identifier": {
            "PURL": "pkg:cargo/ringbuffer@0.16.0",
            "UID": "533618392e036a50",
            "BOMRef": "pkg:cargo/ringbuffer@0.16.0"
          },
          "Version": "0.16.0",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "rle-decode-fast@1.0.3",
          "Name": "rle-decode-fast",
          "Identifier": {
            "PURL": "pkg:cargo/rle-decode-fast@1.0.3",
            "UID": "a6c3429ea2db48e1",
            "BOMRef": "pkg:cargo/rle-decode-fast@1.0.3"
          },
          "Version": "1.0.3",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "rmp@0.8.14",
          "Name": "rmp",
          "Identifier": {
            "PURL": "pkg:cargo/rmp@0.8.14",
            "UID": "91a962a42522ea9d",
            "BOMRef": "pkg:cargo/rmp@0.8.14"
          },
          "Version": "0.8.14",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "byteorder@1.5.0",
            "num-traits@0.2.19",
            "paste@1.0.11"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "rmp-serde@1.3.0",
          "Name": "rmp-serde",
          "Identifier": {
            "PURL": "pkg:cargo/rmp-serde@1.3.0",
            "UID": "3648f623a20cf4e8",
            "BOMRef": "pkg:cargo/rmp-serde@1.3.0"
          },
          "Version": "1.3.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "byteorder@1.5.0",
            "rmp@0.8.14",
            "serde@1.0.226"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "roaring@0.11.2",
          "Name": "roaring",
          "Identifier": {
            "PURL": "pkg:cargo/roaring@0.11.2",
            "UID": "b1bcd375ab7c5208",
            "BOMRef": "pkg:cargo/roaring@0.11.2"
          },
          "Version": "0.11.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "bytemuck@1.24.0",
            "byteorder@1.5.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "robust@1.1.0",
          "Name": "robust",
          "Identifier": {
            "PURL": "pkg:cargo/robust@1.1.0",
            "UID": "c2600632e4c53a3a",
            "BOMRef": "pkg:cargo/robust@1.1.0"
          },
          "Version": "1.1.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "rocksdb@0.24.0",
          "Name": "rocksdb",
          "Identifier": {
            "PURL": "pkg:cargo/rocksdb@0.24.0",
            "UID": "3d778973ea112530",
            "BOMRef": "pkg:cargo/rocksdb@0.24.0"
          },
          "Version": "0.24.0",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "libc@0.2.174",
            "librocksdb-sys@0.17.3+10.4.2"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "rsa@0.9.8",
          "Name": "rsa",
          "Identifier": {
            "PURL": "pkg:cargo/rsa@0.9.8",
            "UID": "9fea08abc75131d5",
            "BOMRef": "pkg:cargo/rsa@0.9.8"
          },
          "Version": "0.9.8",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "const-oid@0.9.6",
            "digest@0.10.7",
            "num-bigint-dig@0.8.4",
            "num-integer@0.1.46",
            "num-traits@0.2.19",
            "pkcs1@0.7.5",
            "pkcs8@0.10.2",
            "rand_core@0.6.4",
            "signature@2.2.0",
            "spki@0.7.3",
            "subtle@2.5.0",
            "zeroize@1.8.1"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "rstack@0.3.3",
          "Name": "rstack",
          "Identifier": {
            "PURL": "pkg:cargo/rstack@0.3.3",
            "UID": "1d9c36eea72e16af",
            "BOMRef": "pkg:cargo/rstack@0.3.3"
          },
          "Version": "0.3.3",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "cfg-if@1.0.0",
            "libc@0.2.174",
            "log@0.4.29",
            "unwind@0.4.1"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "rstack-self@0.3.0",
          "Name": "rstack-self",
          "Identifier": {
            "PURL": "pkg:cargo/rstack-self@0.3.0",
            "UID": "c741a7e55931991f",
            "BOMRef": "pkg:cargo/rstack-self@0.3.0"
          },
          "Version": "0.3.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "antidote@1.0.0",
            "backtrace@0.3.67",
            "bincode@1.3.3",
            "lazy_static@1.5.0",
            "libc@0.2.174",
            "rstack@0.3.3",
            "serde@1.0.226"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "rstar@0.12.0",
          "Name": "rstar",
          "Identifier": {
            "PURL": "pkg:cargo/rstar@0.12.0",
            "UID": "81ab361c5293c680",
            "BOMRef": "pkg:cargo/rstar@0.12.0"
          },
          "Version": "0.12.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "heapless@0.8.0",
            "num-traits@0.2.19",
            "smallvec@1.15.1"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "rustc-demangle@0.1.21",
          "Name": "rustc-demangle",
          "Identifier": {
            "PURL": "pkg:cargo/rustc-demangle@0.1.21",
            "UID": "cab0621d02997e92",
            "BOMRef": "pkg:cargo/rustc-demangle@0.1.21"
          },
          "Version": "0.1.21",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "rustc-hash@1.1.0",
          "Name": "rustc-hash",
          "Identifier": {
            "PURL": "pkg:cargo/rustc-hash@1.1.0",
            "UID": "dc335a0dbf4bd3af",
            "BOMRef": "pkg:cargo/rustc-hash@1.1.0"
          },
          "Version": "1.1.0",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "rustc-hash@2.1.1",
          "Name": "rustc-hash",
          "Identifier": {
            "PURL": "pkg:cargo/rustc-hash@2.1.1",
            "UID": "c9f61492b942c893",
            "BOMRef": "pkg:cargo/rustc-hash@2.1.1"
          },
          "Version": "2.1.1",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "rustix@0.38.40",
          "Name": "rustix",
          "Identifier": {
            "PURL": "pkg:cargo/rustix@0.38.40",
            "UID": "e6447c29deddb73e",
            "BOMRef": "pkg:cargo/rustix@0.38.40"
          },
          "Version": "0.38.40",
          "Licenses": [
            "Apache-2.0 OR Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "bitflags@2.9.1",
            "errno@0.3.10",
            "libc@0.2.174",
            "linux-raw-sys@0.4.14",
            "windows-sys@0.52.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "rustix@1.0.2",
          "Name": "rustix",
          "Identifier": {
            "PURL": "pkg:cargo/rustix@1.0.2",
            "UID": "59d25cfc6a6dd098",
            "BOMRef": "pkg:cargo/rustix@1.0.2"
          },
          "Version": "1.0.2",
          "Licenses": [
            "Apache-2.0 OR Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "bitflags@2.9.1",
            "errno@0.3.10",
            "libc@0.2.174",
            "linux-raw-sys@0.9.2",
            "windows-sys@0.59.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "rustls@0.22.4",
          "Name": "rustls",
          "Identifier": {
            "PURL": "pkg:cargo/rustls@0.22.4",
            "UID": "7c1e4cda2791ae2c",
            "BOMRef": "pkg:cargo/rustls@0.22.4"
          },
          "Version": "0.22.4",
          "Licenses": [
            "Apache-2.0 OR ISC OR MIT"
          ],
          "DependsOn": [
            "log@0.4.29",
            "ring@0.17.13",
            "rustls-pki-types@1.13.1",
            "rustls-webpki@0.102.8",
            "subtle@2.5.0",
            "zeroize@1.8.1"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "rustls@0.23.35",
          "Name": "rustls",
          "Identifier": {
            "PURL": "pkg:cargo/rustls@0.23.35",
            "UID": "7f633967216396f8",
            "BOMRef": "pkg:cargo/rustls@0.23.35"
          },
          "Version": "0.23.35",
          "Licenses": [
            "Apache-2.0 OR ISC OR MIT"
          ],
          "DependsOn": [
            "log@0.4.29",
            "once_cell@1.21.3",
            "ring@0.17.13",
            "rustls-pki-types@1.13.1",
            "rustls-webpki@0.103.6",
            "subtle@2.5.0",
            "zeroize@1.8.1"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "rustls-native-certs@0.7.0",
          "Name": "rustls-native-certs",
          "Identifier": {
            "PURL": "pkg:cargo/rustls-native-certs@0.7.0",
            "UID": "e8c3a86cbae1daa7",
            "BOMRef": "pkg:cargo/rustls-native-certs@0.7.0"
          },
          "Version": "0.7.0",
          "Licenses": [
            "Apache-2.0 OR ISC OR MIT"
          ],
          "DependsOn": [
            "openssl-probe@0.1.5",
            "rustls-pemfile@2.2.0",
            "rustls-pki-types@1.13.1",
            "schannel@0.1.23",
            "security-framework@2.10.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "rustls-native-certs@0.8.0",
          "Name": "rustls-native-certs",
          "Identifier": {
            "PURL": "pkg:cargo/rustls-native-certs@0.8.0",
            "UID": "18a9743e57aa3a8e",
            "BOMRef": "pkg:cargo/rustls-native-certs@0.8.0"
          },
          "Version": "0.8.0",
          "Licenses": [
            "Apache-2.0 OR ISC OR MIT"
          ],
          "DependsOn": [
            "openssl-probe@0.1.5",
            "rustls-pemfile@2.2.0",
            "rustls-pki-types@1.13.1",
            "schannel@0.1.23",
            "security-framework@2.10.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "rustls-pemfile@2.2.0",
          "Name": "rustls-pemfile",
          "Identifier": {
            "PURL": "pkg:cargo/rustls-pemfile@2.2.0",
            "UID": "b90eb61c7171fe4",
            "BOMRef": "pkg:cargo/rustls-pemfile@2.2.0"
          },
          "Version": "2.2.0",
          "Licenses": [
            "Apache-2.0 OR ISC OR MIT"
          ],
          "DependsOn": [
            "rustls-pki-types@1.13.1"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "rustls-pki-types@1.13.1",
          "Name": "rustls-pki-types",
          "Identifier": {
            "PURL": "pkg:cargo/rustls-pki-types@1.13.1",
            "UID": "6fd0649b649b5117",
            "BOMRef": "pkg:cargo/rustls-pki-types@1.13.1"
          },
          "Version": "1.13.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "zeroize@1.8.1"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "rustls-webpki@0.102.8",
          "Name": "rustls-webpki",
          "Identifier": {
            "PURL": "pkg:cargo/rustls-webpki@0.102.8",
            "UID": "746b8fb9b2f81a04",
            "BOMRef": "pkg:cargo/rustls-webpki@0.102.8"
          },
          "Version": "0.102.8",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "ring@0.17.13",
            "rustls-pki-types@1.13.1",
            "untrusted@0.9.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "rustls-webpki@0.103.6",
          "Name": "rustls-webpki",
          "Identifier": {
            "PURL": "pkg:cargo/rustls-webpki@0.103.6",
            "UID": "26d77022fc642503",
            "BOMRef": "pkg:cargo/rustls-webpki@0.103.6"
          },
          "Version": "0.103.6",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "ring@0.17.13",
            "rustls-pki-types@1.13.1",
            "untrusted@0.9.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "rustversion@1.0.11",
          "Name": "rustversion",
          "Identifier": {
            "PURL": "pkg:cargo/rustversion@1.0.11",
            "UID": "73251815f6cc9f0d",
            "BOMRef": "pkg:cargo/rustversion@1.0.11"
          },
          "Version": "1.0.11",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "ryu@1.0.12",
          "Name": "ryu",
          "Identifier": {
            "PURL": "pkg:cargo/ryu@1.0.12",
            "UID": "28cf5212e90afd60",
            "BOMRef": "pkg:cargo/ryu@1.0.12"
          },
          "Version": "1.0.12",
          "Licenses": [
            "Apache-2.0 OR BSL-1.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "same-file@1.0.6",
          "Name": "same-file",
          "Identifier": {
            "PURL": "pkg:cargo/same-file@1.0.6",
            "UID": "e86ad24f3868971b",
            "BOMRef": "pkg:cargo/same-file@1.0.6"
          },
          "Version": "1.0.6",
          "Licenses": [
            "Unlicense OR MIT"
          ],
          "DependsOn": [
            "winapi-util@0.1.5"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "scc@2.4.0",
          "Name": "scc",
          "Identifier": {
            "PURL": "pkg:cargo/scc@2.4.0",
            "UID": "d4fa0f465531fd4",
            "BOMRef": "pkg:cargo/scc@2.4.0"
          },
          "Version": "2.4.0",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "sdd@3.0.10"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "schannel@0.1.23",
          "Name": "schannel",
          "Identifier": {
            "PURL": "pkg:cargo/schannel@0.1.23",
            "UID": "a067700306505e7c",
            "BOMRef": "pkg:cargo/schannel@0.1.23"
          },
          "Version": "0.1.23",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "windows-sys@0.52.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "schemars@0.8.22",
          "Name": "schemars",
          "Identifier": {
            "PURL": "pkg:cargo/schemars@0.8.22",
            "UID": "2240f7b87ed8e6ee",
            "BOMRef": "pkg:cargo/schemars@0.8.22"
          },
          "Version": "0.8.22",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "chrono@0.4.42",
            "dyn-clone@1.0.10",
            "indexmap@1.9.2",
            "indexmap@2.12.1",
            "schemars_derive@0.8.22",
            "serde@1.0.226",
            "serde_json@1.0.145",
            "url@2.5.7",
            "uuid@1.19.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "schemars_derive@0.8.22",
          "Name": "schemars_derive",
          "Identifier": {
            "PURL": "pkg:cargo/schemars_derive@0.8.22",
            "UID": "8d5a58dcebc369e9",
            "BOMRef": "pkg:cargo/schemars_derive@0.8.22"
          },
          "Version": "0.8.22",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "serde_derive_internals@0.29.0",
            "syn@2.0.111"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "scoped-tls@1.0.1",
          "Name": "scoped-tls",
          "Identifier": {
            "PURL": "pkg:cargo/scoped-tls@1.0.1",
            "UID": "a5eb22df201bb9a",
            "BOMRef": "pkg:cargo/scoped-tls@1.0.1"
          },
          "Version": "1.0.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "scopeguard@1.1.0",
          "Name": "scopeguard",
          "Identifier": {
            "PURL": "pkg:cargo/scopeguard@1.1.0",
            "UID": "5352d6a6d8bdf8dc",
            "BOMRef": "pkg:cargo/scopeguard@1.1.0"
          },
          "Version": "1.1.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "sdd@3.0.10",
          "Name": "sdd",
          "Identifier": {
            "PURL": "pkg:cargo/sdd@3.0.10",
            "UID": "28fd90fded8ade7b",
            "BOMRef": "pkg:cargo/sdd@3.0.10"
          },
          "Version": "3.0.10",
          "Licenses": [
            "Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "seahash@4.1.0",
          "Name": "seahash",
          "Identifier": {
            "PURL": "pkg:cargo/seahash@4.1.0",
            "UID": "2fdece5959d18182",
            "BOMRef": "pkg:cargo/seahash@4.1.0"
          },
          "Version": "4.1.0",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "sec1@0.7.3",
          "Name": "sec1",
          "Identifier": {
            "PURL": "pkg:cargo/sec1@0.7.3",
            "UID": "bab4f3006faa05d2",
            "BOMRef": "pkg:cargo/sec1@0.7.3"
          },
          "Version": "0.7.3",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "base16ct@0.2.0",
            "der@0.7.10",
            "generic-array@0.14.9",
            "pkcs8@0.10.2",
            "subtle@2.5.0",
            "zeroize@1.8.1"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "security-framework@2.10.0",
          "Name": "security-framework",
          "Identifier": {
            "PURL": "pkg:cargo/security-framework@2.10.0",
            "UID": "2543e589743fbba9",
            "BOMRef": "pkg:cargo/security-framework@2.10.0"
          },
          "Version": "2.10.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "bitflags@1.3.2",
            "core-foundation-sys@0.8.7",
            "core-foundation@0.9.4",
            "libc@0.2.174",
            "security-framework-sys@2.11.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "security-framework-sys@2.11.0",
          "Name": "security-framework-sys",
          "Identifier": {
            "PURL": "pkg:cargo/security-framework-sys@2.11.0",
            "UID": "c888f4b18dddc9e8",
            "BOMRef": "pkg:cargo/security-framework-sys@2.11.0"
          },
          "Version": "2.11.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "core-foundation-sys@0.8.7",
            "libc@0.2.174"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "seedable_hash@0.1.1",
          "Name": "seedable_hash",
          "Identifier": {
            "PURL": "pkg:cargo/seedable_hash@0.1.1",
            "UID": "62b52ae83838cc78",
            "BOMRef": "pkg:cargo/seedable_hash@0.1.1"
          },
          "Version": "0.1.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "wyhash@0.5.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "self_cell@1.2.1",
          "Name": "self_cell",
          "Identifier": {
            "PURL": "pkg:cargo/self_cell@1.2.1",
            "UID": "d97ccae62ca71d73",
            "BOMRef": "pkg:cargo/self_cell@1.2.1"
          },
          "Version": "1.2.1",
          "Licenses": [
            "Apache-2.0 OR GPL-2.0-only"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "semver@1.0.27",
          "Name": "semver",
          "Identifier": {
            "PURL": "pkg:cargo/semver@1.0.27",
            "UID": "e15cc166d97972ce",
            "BOMRef": "pkg:cargo/semver@1.0.27"
          },
          "Version": "1.0.27",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "serde@1.0.226",
            "serde_core@1.0.226"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "serde@1.0.226",
          "Name": "serde",
          "Identifier": {
            "PURL": "pkg:cargo/serde@1.0.226",
            "UID": "e094a39ed6a3ed67",
            "BOMRef": "pkg:cargo/serde@1.0.226"
          },
          "Version": "1.0.226",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "serde_core@1.0.226",
            "serde_derive@1.0.226"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "serde-untagged@0.1.9",
          "Name": "serde-untagged",
          "Identifier": {
            "PURL": "pkg:cargo/serde-untagged@0.1.9",
            "UID": "b4e7020f9bb79ede",
            "BOMRef": "pkg:cargo/serde-untagged@0.1.9"
          },
          "Version": "0.1.9",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "erased-serde@0.4.2",
            "serde@1.0.226",
            "serde_core@1.0.226",
            "typeid@1.0.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "serde-value@0.7.0",
          "Name": "serde-value",
          "Identifier": {
            "PURL": "pkg:cargo/serde-value@0.7.0",
            "UID": "e21d0413a2ce19f3",
            "BOMRef": "pkg:cargo/serde-value@0.7.0"
          },
          "Version": "0.7.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "ordered-float@2.10.1",
            "serde@1.0.226"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "serde_cbor@0.11.2",
          "Name": "serde_cbor",
          "Identifier": {
            "PURL": "pkg:cargo/serde_cbor@0.11.2",
            "UID": "d470caf0a3fe2751",
            "BOMRef": "pkg:cargo/serde_cbor@0.11.2"
          },
          "Version": "0.11.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "half@1.8.2",
            "serde@1.0.226"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "serde_core@1.0.226",
          "Name": "serde_core",
          "Identifier": {
            "PURL": "pkg:cargo/serde_core@1.0.226",
            "UID": "99036c099fc479a2",
            "BOMRef": "pkg:cargo/serde_core@1.0.226"
          },
          "Version": "1.0.226",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "serde_derive@1.0.226"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "serde_derive@1.0.226",
          "Name": "serde_derive",
          "Identifier": {
            "PURL": "pkg:cargo/serde_derive@1.0.226",
            "UID": "baff5d150f3d4a41",
            "BOMRef": "pkg:cargo/serde_derive@1.0.226"
          },
          "Version": "1.0.226",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@2.0.111"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "serde_derive_internals@0.29.0",
          "Name": "serde_derive_internals",
          "Identifier": {
            "PURL": "pkg:cargo/serde_derive_internals@0.29.0",
            "UID": "52829b3a5d49bce0",
            "BOMRef": "pkg:cargo/serde_derive_internals@0.29.0"
          },
          "Version": "0.29.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@2.0.111"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "serde_json@1.0.145",
          "Name": "serde_json",
          "Identifier": {
            "PURL": "pkg:cargo/serde_json@1.0.145",
            "UID": "afd39815377016e0",
            "BOMRef": "pkg:cargo/serde_json@1.0.145"
          },
          "Version": "1.0.145",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "indexmap@2.12.1",
            "itoa@1.0.5",
            "memchr@2.7.4",
            "ryu@1.0.12",
            "serde@1.0.226",
            "serde_core@1.0.226"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "serde_plain@1.0.1",
          "Name": "serde_plain",
          "Identifier": {
            "PURL": "pkg:cargo/serde_plain@1.0.1",
            "UID": "d55c915daf76560f",
            "BOMRef": "pkg:cargo/serde_plain@1.0.1"
          },
          "Version": "1.0.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "serde@1.0.226"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "serde_qs@0.13.0",
          "Name": "serde_qs",
          "Identifier": {
            "PURL": "pkg:cargo/serde_qs@0.13.0",
            "UID": "7f13f260c0cc92c8",
            "BOMRef": "pkg:cargo/serde_qs@0.13.0"
          },
          "Version": "0.13.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "actix-web@4.12.1",
            "futures@0.3.31",
            "percent-encoding@2.3.2",
            "serde@1.0.226",
            "thiserror@1.0.69"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "serde_urlencoded@0.7.1",
          "Name": "serde_urlencoded",
          "Identifier": {
            "PURL": "pkg:cargo/serde_urlencoded@0.7.1",
            "UID": "8d65c0e341d3d0a4",
            "BOMRef": "pkg:cargo/serde_urlencoded@0.7.1"
          },
          "Version": "0.7.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "form_urlencoded@1.2.2",
            "itoa@1.0.5",
            "ryu@1.0.12",
            "serde@1.0.226"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "serde_variant@0.1.3",
          "Name": "serde_variant",
          "Identifier": {
            "PURL": "pkg:cargo/serde_variant@0.1.3",
            "UID": "63ac6b5a1ee6de9e",
            "BOMRef": "pkg:cargo/serde_variant@0.1.3"
          },
          "Version": "0.1.3",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "serde@1.0.226"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "serial_test@3.2.0",
          "Name": "serial_test",
          "Identifier": {
            "PURL": "pkg:cargo/serial_test@3.2.0",
            "UID": "200892018f388531",
            "BOMRef": "pkg:cargo/serial_test@3.2.0"
          },
          "Version": "3.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "once_cell@1.21.3",
            "parking_lot@0.12.5",
            "scc@2.4.0",
            "serial_test_derive@3.2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "serial_test_derive@3.2.0",
          "Name": "serial_test_derive",
          "Identifier": {
            "PURL": "pkg:cargo/serial_test_derive@3.2.0",
            "UID": "3d0654013ff96c54",
            "BOMRef": "pkg:cargo/serial_test_derive@3.2.0"
          },
          "Version": "3.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@2.0.111"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "sha1@0.10.5",
          "Name": "sha1",
          "Identifier": {
            "PURL": "pkg:cargo/sha1@0.10.5",
            "UID": "eed8aa4313862ce7",
            "BOMRef": "pkg:cargo/sha1@0.10.5"
          },
          "Version": "0.10.5",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "cfg-if@1.0.0",
            "cpufeatures@0.2.17",
            "digest@0.10.7"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "sha2@0.10.9",
          "Name": "sha2",
          "Identifier": {
            "PURL": "pkg:cargo/sha2@0.10.9",
            "UID": "d42f966b20ad21c9",
            "BOMRef": "pkg:cargo/sha2@0.10.9"
          },
          "Version": "0.10.9",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "cfg-if@1.0.0",
            "cpufeatures@0.2.17",
            "digest@0.10.7"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "shaderc@0.10.1",
          "Name": "shaderc",
          "Identifier": {
            "PURL": "pkg:cargo/shaderc@0.10.1",
            "UID": "182c9a2b72c0f3de",
            "BOMRef": "pkg:cargo/shaderc@0.10.1"
          },
          "Version": "0.10.1",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "libc@0.2.174",
            "shaderc-sys@0.10.1"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "shaderc-sys@0.10.1",
          "Name": "shaderc-sys",
          "Identifier": {
            "PURL": "pkg:cargo/shaderc-sys@0.10.1",
            "UID": "df28f84784f6c436",
            "BOMRef": "pkg:cargo/shaderc-sys@0.10.1"
          },
          "Version": "0.10.1",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "libc@0.2.174",
            "link-cplusplus@1.0.8"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "sharded-slab@0.1.4",
          "Name": "sharded-slab",
          "Identifier": {
            "PURL": "pkg:cargo/sharded-slab@0.1.4",
            "UID": "79cf6d232d68b125",
            "BOMRef": "pkg:cargo/sharded-slab@0.1.4"
          },
          "Version": "0.1.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "lazy_static@1.5.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "sif-itree@0.4.0",
          "Name": "sif-itree",
          "Identifier": {
            "PURL": "pkg:cargo/sif-itree@0.4.0",
            "UID": "b5f09a959fa6dee",
            "BOMRef": "pkg:cargo/sif-itree@0.4.0"
          },
          "Version": "0.4.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "signal-hook-registry@1.4.0",
          "Name": "signal-hook-registry",
          "Identifier": {
            "PURL": "pkg:cargo/signal-hook-registry@1.4.0",
            "UID": "dad042b405494d0c",
            "BOMRef": "pkg:cargo/signal-hook-registry@1.4.0"
          },
          "Version": "1.4.0",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "libc@0.2.174"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "signature@2.2.0",
          "Name": "signature",
          "Identifier": {
            "PURL": "pkg:cargo/signature@2.2.0",
            "UID": "541ea76132956e7d",
            "BOMRef": "pkg:cargo/signature@2.2.0"
          },
          "Version": "2.2.0",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "digest@0.10.7",
            "rand_core@0.6.4"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "simd-adler32@0.3.7",
          "Name": "simd-adler32",
          "Identifier": {
            "PURL": "pkg:cargo/simd-adler32@0.3.7",
            "UID": "2dfe380f1e2cf169",
            "BOMRef": "pkg:cargo/simd-adler32@0.3.7"
          },
          "Version": "0.3.7",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "simple_asn1@0.6.2",
          "Name": "simple_asn1",
          "Identifier": {
            "PURL": "pkg:cargo/simple_asn1@0.6.2",
            "UID": "c0719d1b6ad39130",
            "BOMRef": "pkg:cargo/simple_asn1@0.6.2"
          },
          "Version": "0.6.2",
          "Licenses": [
            "ISC"
          ],
          "DependsOn": [
            "num-bigint@0.4.4",
            "num-traits@0.2.19",
            "thiserror@1.0.69",
            "time@0.3.17"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "siphasher@0.3.10",
          "Name": "siphasher",
          "Identifier": {
            "PURL": "pkg:cargo/siphasher@0.3.10",
            "UID": "7031bacdc003a309",
            "BOMRef": "pkg:cargo/siphasher@0.3.10"
          },
          "Version": "0.3.10",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "siphasher@1.0.1",
          "Name": "siphasher",
          "Identifier": {
            "PURL": "pkg:cargo/siphasher@1.0.1",
            "UID": "58a03ae443f378a9",
            "BOMRef": "pkg:cargo/siphasher@1.0.1"
          },
          "Version": "1.0.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "slab@0.4.11",
          "Name": "slab",
          "Identifier": {
            "PURL": "pkg:cargo/slab@0.4.11",
            "UID": "d34455491b8fa88d",
            "BOMRef": "pkg:cargo/slab@0.4.11"
          },
          "Version": "0.4.11",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "slice-group-by@0.3.1",
          "Name": "slice-group-by",
          "Identifier": {
            "PURL": "pkg:cargo/slice-group-by@0.3.1",
            "UID": "1cbc79e4c8e548da",
            "BOMRef": "pkg:cargo/slice-group-by@0.3.1"
          },
          "Version": "0.3.1",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "slog@2.8.2",
          "Name": "slog",
          "Identifier": {
            "PURL": "pkg:cargo/slog@2.8.2",
            "UID": "a7da4781e86b17a7",
            "BOMRef": "pkg:cargo/slog@2.8.2"
          },
          "Version": "2.8.2",
          "Licenses": [
            "MPL-2.0 OR MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "anyhow@1.0.100",
            "erased-serde@0.3.31",
            "serde_core@1.0.226"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "slog-scope@4.4.0",
          "Name": "slog-scope",
          "Identifier": {
            "PURL": "pkg:cargo/slog-scope@4.4.0",
            "UID": "115a537b67487929",
            "BOMRef": "pkg:cargo/slog-scope@4.4.0"
          },
          "Version": "4.4.0",
          "Licenses": [
            "MPL-2.0 OR MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "arc-swap@1.7.1",
            "lazy_static@1.5.0",
            "slog@2.8.2"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "slog-stdlog@4.1.1",
          "Name": "slog-stdlog",
          "Identifier": {
            "PURL": "pkg:cargo/slog-stdlog@4.1.1",
            "UID": "16053fd4eac23406",
            "BOMRef": "pkg:cargo/slog-stdlog@4.1.1"
          },
          "Version": "4.1.1",
          "Licenses": [
            "MPL-2.0 OR MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "log@0.4.29",
            "slog-scope@4.4.0",
            "slog@2.8.2"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "smallvec@1.15.1",
          "Name": "smallvec",
          "Identifier": {
            "PURL": "pkg:cargo/smallvec@1.15.1",
            "UID": "b732d4d51faddc1e",
            "BOMRef": "pkg:cargo/smallvec@1.15.1"
          },
          "Version": "1.15.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "socket2@0.4.9",
          "Name": "socket2",
          "Identifier": {
            "PURL": "pkg:cargo/socket2@0.4.9",
            "UID": "567359e242eaeeb0",
            "BOMRef": "pkg:cargo/socket2@0.4.9"
          },
          "Version": "0.4.9",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "libc@0.2.174",
            "winapi@0.3.9"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "socket2@0.5.10",
          "Name": "socket2",
          "Identifier": {
            "PURL": "pkg:cargo/socket2@0.5.10",
            "UID": "e3e072f65d791583",
            "BOMRef": "pkg:cargo/socket2@0.5.10"
          },
          "Version": "0.5.10",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "libc@0.2.174",
            "windows-sys@0.52.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "socket2@0.6.0",
          "Name": "socket2",
          "Identifier": {
            "PURL": "pkg:cargo/socket2@0.6.0",
            "UID": "1efa63d84c3ae72",
            "BOMRef": "pkg:cargo/socket2@0.6.0"
          },
          "Version": "0.6.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "libc@0.2.174",
            "windows-sys@0.59.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "spade@2.12.1",
          "Name": "spade",
          "Identifier": {
            "PURL": "pkg:cargo/spade@2.12.1",
            "UID": "1ad12de5bbfc4a17",
            "BOMRef": "pkg:cargo/spade@2.12.1"
          },
          "Version": "2.12.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "hashbrown@0.14.2",
            "num-traits@0.2.19",
            "robust@1.1.0",
            "smallvec@1.15.1"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "spin@0.9.8",
          "Name": "spin",
          "Identifier": {
            "PURL": "pkg:cargo/spin@0.9.8",
            "UID": "9bd3398486fdbbca",
            "BOMRef": "pkg:cargo/spin@0.9.8"
          },
          "Version": "0.9.8",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "spki@0.7.3",
          "Name": "spki",
          "Identifier": {
            "PURL": "pkg:cargo/spki@0.7.3",
            "UID": "19391c877a55f055",
            "BOMRef": "pkg:cargo/spki@0.7.3"
          },
          "Version": "0.7.3",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "base64ct@1.8.0",
            "der@0.7.10"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "stable_deref_trait@1.2.0",
          "Name": "stable_deref_trait",
          "Identifier": {
            "PURL": "pkg:cargo/stable_deref_trait@1.2.0",
            "UID": "7ec3043a8a344388",
            "BOMRef": "pkg:cargo/stable_deref_trait@1.2.0"
          },
          "Version": "1.2.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "strsim@0.10.0",
          "Name": "strsim",
          "Identifier": {
            "PURL": "pkg:cargo/strsim@0.10.0",
            "UID": "6a6c3bfa963601",
            "BOMRef": "pkg:cargo/strsim@0.10.0"
          },
          "Version": "0.10.0",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "strsim@0.11.0",
          "Name": "strsim",
          "Identifier": {
            "PURL": "pkg:cargo/strsim@0.11.0",
            "UID": "ec65dc4014c39cc7",
            "BOMRef": "pkg:cargo/strsim@0.11.0"
          },
          "Version": "0.11.0",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "strum@0.27.2",
          "Name": "strum",
          "Identifier": {
            "PURL": "pkg:cargo/strum@0.27.2",
            "UID": "1697fdde58e8756e",
            "BOMRef": "pkg:cargo/strum@0.27.2"
          },
          "Version": "0.27.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "strum_macros@0.27.1"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "strum_macros@0.27.1",
          "Name": "strum_macros",
          "Identifier": {
            "PURL": "pkg:cargo/strum_macros@0.27.1",
            "UID": "bec091d28bf95604",
            "BOMRef": "pkg:cargo/strum_macros@0.27.1"
          },
          "Version": "0.27.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "heck@0.5.0",
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "rustversion@1.0.11",
            "syn@2.0.111"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "subtle@2.5.0",
          "Name": "subtle",
          "Identifier": {
            "PURL": "pkg:cargo/subtle@2.5.0",
            "UID": "ea2dd0f587b266ed",
            "BOMRef": "pkg:cargo/subtle@2.5.0"
          },
          "Version": "2.5.0",
          "Licenses": [
            "BSD-3-Clause"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "symbolic-common@12.12.3",
          "Name": "symbolic-common",
          "Identifier": {
            "PURL": "pkg:cargo/symbolic-common@12.12.3",
            "UID": "53fad7ce22ad71e6",
            "BOMRef": "pkg:cargo/symbolic-common@12.12.3"
          },
          "Version": "12.12.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "debugid@0.8.0",
            "memmap2@0.9.9",
            "stable_deref_trait@1.2.0",
            "uuid@1.19.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "symbolic-demangle@12.12.3",
          "Name": "symbolic-demangle",
          "Identifier": {
            "PURL": "pkg:cargo/symbolic-demangle@12.12.3",
            "UID": "ebc7308eb98e9cae",
            "BOMRef": "pkg:cargo/symbolic-demangle@12.12.3"
          },
          "Version": "12.12.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "cpp_demangle@0.4.2",
            "rustc-demangle@0.1.21",
            "symbolic-common@12.12.3"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "syn@1.0.107",
          "Name": "syn",
          "Identifier": {
            "PURL": "pkg:cargo/syn@1.0.107",
            "UID": "c2cbf989a02cf4bb",
            "BOMRef": "pkg:cargo/syn@1.0.107"
          },
          "Version": "1.0.107",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "unicode-ident@1.0.13"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "syn@2.0.111",
          "Name": "syn",
          "Identifier": {
            "PURL": "pkg:cargo/syn@2.0.111",
            "UID": "e19f280c87d283f3",
            "BOMRef": "pkg:cargo/syn@2.0.111"
          },
          "Version": "2.0.111",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "unicode-ident@1.0.13"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "sync_wrapper@0.1.2",
          "Name": "sync_wrapper",
          "Identifier": {
            "PURL": "pkg:cargo/sync_wrapper@0.1.2",
            "UID": "b6a0b53a361b0043",
            "BOMRef": "pkg:cargo/sync_wrapper@0.1.2"
          },
          "Version": "0.1.2",
          "Licenses": [
            "Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "sync_wrapper@1.0.1",
          "Name": "sync_wrapper",
          "Identifier": {
            "PURL": "pkg:cargo/sync_wrapper@1.0.1",
            "UID": "4cc1d8984f57fe5f",
            "BOMRef": "pkg:cargo/sync_wrapper@1.0.1"
          },
          "Version": "1.0.1",
          "Licenses": [
            "Apache-2.0"
          ],
          "DependsOn": [
            "futures-core@0.3.31"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "synstructure@0.13.1",
          "Name": "synstructure",
          "Identifier": {
            "PURL": "pkg:cargo/synstructure@0.13.1",
            "UID": "e7cc92e1351d8a79",
            "BOMRef": "pkg:cargo/synstructure@0.13.1"
          },
          "Version": "0.13.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@2.0.111"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "sys-info@0.9.1",
          "Name": "sys-info",
          "Identifier": {
            "PURL": "pkg:cargo/sys-info@0.9.1",
            "UID": "7ad3f28b68442e2f",
            "BOMRef": "pkg:cargo/sys-info@0.9.1"
          },
          "Version": "0.9.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "libc@0.2.174"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "sysinfo@0.37.2",
          "Name": "sysinfo",
          "Identifier": {
            "PURL": "pkg:cargo/sysinfo@0.37.2",
            "UID": "8ae9c5199a7073d7",
            "BOMRef": "pkg:cargo/sysinfo@0.37.2"
          },
          "Version": "0.37.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "libc@0.2.174",
            "memchr@2.7.4",
            "ntapi@0.4.1",
            "objc2-core-foundation@0.3.1",
            "objc2-io-kit@0.3.1",
            "windows@0.61.3"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "tap@1.0.1",
          "Name": "tap",
          "Identifier": {
            "PURL": "pkg:cargo/tap@1.0.1",
            "UID": "34e7b9971eb2be8f",
            "BOMRef": "pkg:cargo/tap@1.0.1"
          },
          "Version": "1.0.1",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "target-lexicon@0.13.3",
          "Name": "target-lexicon",
          "Identifier": {
            "PURL": "pkg:cargo/target-lexicon@0.13.3",
            "UID": "fe8ba5fa5f09cd4b",
            "BOMRef": "pkg:cargo/target-lexicon@0.13.3"
          },
          "Version": "0.13.3",
          "Licenses": [
            "Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "tempfile@3.23.0",
          "Name": "tempfile",
          "Identifier": {
            "PURL": "pkg:cargo/tempfile@3.23.0",
            "UID": "c7ba4df92736971b",
            "BOMRef": "pkg:cargo/tempfile@3.23.0"
          },
          "Version": "3.23.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "fastrand@2.2.0",
            "getrandom@0.3.0",
            "once_cell@1.21.3",
            "rustix@1.0.2",
            "windows-sys@0.60.2"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "thiserror@1.0.69",
          "Name": "thiserror",
          "Identifier": {
            "PURL": "pkg:cargo/thiserror@1.0.69",
            "UID": "284c47104e92ad71",
            "BOMRef": "pkg:cargo/thiserror@1.0.69"
          },
          "Version": "1.0.69",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "thiserror-impl@1.0.69"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "thiserror@2.0.17",
          "Name": "thiserror",
          "Identifier": {
            "PURL": "pkg:cargo/thiserror@2.0.17",
            "UID": "2edb5e3cb0cca701",
            "BOMRef": "pkg:cargo/thiserror@2.0.17"
          },
          "Version": "2.0.17",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "thiserror-impl@2.0.17"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "thiserror-impl@1.0.69",
          "Name": "thiserror-impl",
          "Identifier": {
            "PURL": "pkg:cargo/thiserror-impl@1.0.69",
            "UID": "410c9eb588afc250",
            "BOMRef": "pkg:cargo/thiserror-impl@1.0.69"
          },
          "Version": "1.0.69",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@2.0.111"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "thiserror-impl@2.0.17",
          "Name": "thiserror-impl",
          "Identifier": {
            "PURL": "pkg:cargo/thiserror-impl@2.0.17",
            "UID": "14b346fbc4fd5469",
            "BOMRef": "pkg:cargo/thiserror-impl@2.0.17"
          },
          "Version": "2.0.17",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@2.0.111"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "thread-priority@3.0.0",
          "Name": "thread-priority",
          "Identifier": {
            "PURL": "pkg:cargo/thread-priority@3.0.0",
            "UID": "68497715fa67a7d",
            "BOMRef": "pkg:cargo/thread-priority@3.0.0"
          },
          "Version": "3.0.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "bitflags@2.9.1",
            "cfg-if@1.0.0",
            "libc@0.2.174",
            "log@0.4.29",
            "rustversion@1.0.11",
            "windows@0.61.3"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "thread_local@1.1.7",
          "Name": "thread_local",
          "Identifier": {
            "PURL": "pkg:cargo/thread_local@1.1.7",
            "UID": "eec61d525cf65fab",
            "BOMRef": "pkg:cargo/thread_local@1.1.7"
          },
          "Version": "1.1.7",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "cfg-if@1.0.0",
            "once_cell@1.21.3"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "tikv-jemalloc-ctl@0.6.1",
          "Name": "tikv-jemalloc-ctl",
          "Identifier": {
            "PURL": "pkg:cargo/tikv-jemalloc-ctl@0.6.1",
            "UID": "f8a609e944fbdbf",
            "BOMRef": "pkg:cargo/tikv-jemalloc-ctl@0.6.1"
          },
          "Version": "0.6.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "libc@0.2.174",
            "paste@1.0.11",
            "tikv-jemalloc-sys@0.6.1+5.3.0-1-ge13ca993e8ccb9ba9847cc330696e02839f328f7"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "tikv-jemalloc-sys@0.6.1+5.3.0-1-ge13ca993e8ccb9ba9847cc330696e02839f328f7",
          "Name": "tikv-jemalloc-sys",
          "Identifier": {
            "PURL": "pkg:cargo/tikv-jemalloc-sys@0.6.1%2B5.3.0-1-ge13ca993e8ccb9ba9847cc330696e02839f328f7",
            "UID": "5dce3a6a0e79bc34",
            "BOMRef": "pkg:cargo/tikv-jemalloc-sys@0.6.1%2B5.3.0-1-ge13ca993e8ccb9ba9847cc330696e02839f328f7"
          },
          "Version": "0.6.1+5.3.0-1-ge13ca993e8ccb9ba9847cc330696e02839f328f7",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "libc@0.2.174"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "tikv-jemallocator@0.6.1",
          "Name": "tikv-jemallocator",
          "Identifier": {
            "PURL": "pkg:cargo/tikv-jemallocator@0.6.1",
            "UID": "65afd2d52f93fd1e",
            "BOMRef": "pkg:cargo/tikv-jemallocator@0.6.1"
          },
          "Version": "0.6.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "libc@0.2.174",
            "tikv-jemalloc-sys@0.6.1+5.3.0-1-ge13ca993e8ccb9ba9847cc330696e02839f328f7"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "time@0.3.17",
          "Name": "time",
          "Identifier": {
            "PURL": "pkg:cargo/time@0.3.17",
            "UID": "cf99bc9a95681b61",
            "BOMRef": "pkg:cargo/time@0.3.17"
          },
          "Version": "0.3.17",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "itoa@1.0.5",
            "serde@1.0.226",
            "time-core@0.1.0",
            "time-macros@0.2.6"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "time-core@0.1.0",
          "Name": "time-core",
          "Identifier": {
            "PURL": "pkg:cargo/time-core@0.1.0",
            "UID": "13e47807580e30b7",
            "BOMRef": "pkg:cargo/time-core@0.1.0"
          },
          "Version": "0.1.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "time-macros@0.2.6",
          "Name": "time-macros",
          "Identifier": {
            "PURL": "pkg:cargo/time-macros@0.2.6",
            "UID": "e86f27d8ddfbb311",
            "BOMRef": "pkg:cargo/time-macros@0.2.6"
          },
          "Version": "0.2.6",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "time-core@0.1.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "tinystr@0.7.6",
          "Name": "tinystr",
          "Identifier": {
            "PURL": "pkg:cargo/tinystr@0.7.6",
            "UID": "9757fe086190bdc3",
            "BOMRef": "pkg:cargo/tinystr@0.7.6"
          },
          "Version": "0.7.6",
          "Licenses": [
            "Unicode-3.0"
          ],
          "DependsOn": [
            "displaydoc@0.2.5",
            "zerovec@0.10.4"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "tinyvec@1.10.0",
          "Name": "tinyvec",
          "Identifier": {
            "PURL": "pkg:cargo/tinyvec@1.10.0",
            "UID": "10ef972421ee86fe",
            "BOMRef": "pkg:cargo/tinyvec@1.10.0"
          },
          "Version": "1.10.0",
          "Licenses": [
            "Zlib OR Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "tinyvec_macros@0.1.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "tinyvec_macros@0.1.0",
          "Name": "tinyvec_macros",
          "Identifier": {
            "PURL": "pkg:cargo/tinyvec_macros@0.1.0",
            "UID": "f5551ffa98edbe2c",
            "BOMRef": "pkg:cargo/tinyvec_macros@0.1.0"
          },
          "Version": "0.1.0",
          "Licenses": [
            "MIT OR Apache-2.0 OR Zlib"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "tokio@1.48.0",
          "Name": "tokio",
          "Identifier": {
            "PURL": "pkg:cargo/tokio@1.48.0",
            "UID": "3c5428b19a5b74dd",
            "BOMRef": "pkg:cargo/tokio@1.48.0"
          },
          "Version": "1.48.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "bytes@1.10.1",
            "libc@0.2.174",
            "mio@1.0.1",
            "parking_lot@0.12.5",
            "pin-project-lite@0.2.12",
            "signal-hook-registry@1.4.0",
            "socket2@0.6.0",
            "tokio-macros@2.6.0",
            "tracing@0.1.43",
            "windows-sys@0.61.1"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "tokio-io-timeout@1.2.0",
          "Name": "tokio-io-timeout",
          "Identifier": {
            "PURL": "pkg:cargo/tokio-io-timeout@1.2.0",
            "UID": "106e1b10ba4036c9",
            "BOMRef": "pkg:cargo/tokio-io-timeout@1.2.0"
          },
          "Version": "1.2.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "pin-project-lite@0.2.12",
            "tokio@1.48.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "tokio-macros@2.6.0",
          "Name": "tokio-macros",
          "Identifier": {
            "PURL": "pkg:cargo/tokio-macros@2.6.0",
            "UID": "691402e6d892349f",
            "BOMRef": "pkg:cargo/tokio-macros@2.6.0"
          },
          "Version": "2.6.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@2.0.111"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "tokio-rustls@0.25.0",
          "Name": "tokio-rustls",
          "Identifier": {
            "PURL": "pkg:cargo/tokio-rustls@0.25.0",
            "UID": "ec92e18ca7916bf",
            "BOMRef": "pkg:cargo/tokio-rustls@0.25.0"
          },
          "Version": "0.25.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "rustls-pki-types@1.13.1",
            "rustls@0.22.4",
            "tokio@1.48.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "tokio-rustls@0.26.0",
          "Name": "tokio-rustls",
          "Identifier": {
            "PURL": "pkg:cargo/tokio-rustls@0.26.0",
            "UID": "b95f0a4bd46888c1",
            "BOMRef": "pkg:cargo/tokio-rustls@0.26.0"
          },
          "Version": "0.26.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "rustls-pki-types@1.13.1",
            "rustls@0.23.35",
            "tokio@1.48.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "tokio-stream@0.1.17",
          "Name": "tokio-stream",
          "Identifier": {
            "PURL": "pkg:cargo/tokio-stream@0.1.17",
            "UID": "e1630f2b53809bcf",
            "BOMRef": "pkg:cargo/tokio-stream@0.1.17"
          },
          "Version": "0.1.17",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "futures-core@0.3.31",
            "pin-project-lite@0.2.12",
            "tokio@1.48.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "tokio-util@0.7.17",
          "Name": "tokio-util",
          "Identifier": {
            "PURL": "pkg:cargo/tokio-util@0.7.17",
            "UID": "9af16a53d6844510",
            "BOMRef": "pkg:cargo/tokio-util@0.7.17"
          },
          "Version": "0.7.17",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "bytes@1.10.1",
            "futures-core@0.3.31",
            "futures-sink@0.3.31",
            "futures-util@0.3.31",
            "pin-project-lite@0.2.12",
            "tokio@1.48.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "tonic@0.11.0",
          "Name": "tonic",
          "Identifier": {
            "PURL": "pkg:cargo/tonic@0.11.0",
            "UID": "da85fa612d0029b8",
            "BOMRef": "pkg:cargo/tonic@0.11.0"
          },
          "Version": "0.11.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "async-stream@0.3.3",
            "async-trait@0.1.89",
            "axum@0.6.12",
            "base64@0.21.0",
            "bytes@1.10.1",
            "flate2@1.1.5",
            "h2@0.3.27",
            "http-body@0.4.5",
            "http@0.2.12",
            "hyper-timeout@0.4.1",
            "hyper@0.14.26",
            "percent-encoding@2.3.2",
            "pin-project@1.0.12",
            "prost@0.12.6",
            "rustls-pemfile@2.2.0",
            "rustls-pki-types@1.13.1",
            "tokio-rustls@0.25.0",
            "tokio-stream@0.1.17",
            "tokio@1.48.0",
            "tower-layer@0.3.3",
            "tower-service@0.3.3",
            "tower@0.4.13",
            "tracing@0.1.43"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "tonic@0.12.3",
          "Name": "tonic",
          "Identifier": {
            "PURL": "pkg:cargo/tonic@0.12.3",
            "UID": "f94ffc11536c2ba2",
            "BOMRef": "pkg:cargo/tonic@0.12.3"
          },
          "Version": "0.12.3",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "async-stream@0.3.3",
            "async-trait@0.1.89",
            "axum@0.7.5",
            "base64@0.22.0",
            "bytes@1.10.1",
            "h2@0.4.4",
            "http-body-util@0.1.2",
            "http-body@1.0.0",
            "http@1.3.1",
            "hyper-timeout@0.5.1",
            "hyper-util@0.1.13",
            "hyper@1.6.0",
            "percent-encoding@2.3.2",
            "pin-project@1.0.12",
            "prost@0.13.1",
            "socket2@0.5.10",
            "tokio-stream@0.1.17",
            "tokio@1.48.0",
            "tower-layer@0.3.3",
            "tower-service@0.3.3",
            "tower@0.4.13",
            "tracing@0.1.43"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "tonic-reflection@0.11.0",
          "Name": "tonic-reflection",
          "Identifier": {
            "PURL": "pkg:cargo/tonic-reflection@0.11.0",
            "UID": "1152974d7fd48589",
            "BOMRef": "pkg:cargo/tonic-reflection@0.11.0"
          },
          "Version": "0.11.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "prost-types@0.12.6",
            "prost@0.12.6",
            "tokio-stream@0.1.17",
            "tokio@1.48.0",
            "tonic@0.11.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "tower@0.4.13",
          "Name": "tower",
          "Identifier": {
            "PURL": "pkg:cargo/tower@0.4.13",
            "UID": "6d2991050c6223f7",
            "BOMRef": "pkg:cargo/tower@0.4.13"
          },
          "Version": "0.4.13",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "futures-core@0.3.31",
            "futures-util@0.3.31",
            "indexmap@1.9.2",
            "pin-project-lite@0.2.12",
            "pin-project@1.0.12",
            "rand@0.8.5",
            "slab@0.4.11",
            "tokio-util@0.7.17",
            "tokio@1.48.0",
            "tower-layer@0.3.3",
            "tower-service@0.3.3",
            "tracing@0.1.43"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "tower@0.5.2",
          "Name": "tower",
          "Identifier": {
            "PURL": "pkg:cargo/tower@0.5.2",
            "UID": "6a44cca184761a04",
            "BOMRef": "pkg:cargo/tower@0.5.2"
          },
          "Version": "0.5.2",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "futures-core@0.3.31",
            "futures-util@0.3.31",
            "pin-project-lite@0.2.12",
            "sync_wrapper@1.0.1",
            "tokio@1.48.0",
            "tower-layer@0.3.3",
            "tower-service@0.3.3"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "tower-http@0.6.8",
          "Name": "tower-http",
          "Identifier": {
            "PURL": "pkg:cargo/tower-http@0.6.8",
            "UID": "a8a87e43cdba7ce3",
            "BOMRef": "pkg:cargo/tower-http@0.6.8"
          },
          "Version": "0.6.8",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "bitflags@2.9.1",
            "bytes@1.10.1",
            "futures-util@0.3.31",
            "http-body@1.0.0",
            "http@1.3.1",
            "iri-string@0.7.8",
            "pin-project-lite@0.2.12",
            "tower-layer@0.3.3",
            "tower-service@0.3.3",
            "tower@0.5.2"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "tower-layer@0.3.3",
          "Name": "tower-layer",
          "Identifier": {
            "PURL": "pkg:cargo/tower-layer@0.3.3",
            "UID": "9451119abc4feb34",
            "BOMRef": "pkg:cargo/tower-layer@0.3.3"
          },
          "Version": "0.3.3",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "tower-service@0.3.3",
          "Name": "tower-service",
          "Identifier": {
            "PURL": "pkg:cargo/tower-service@0.3.3",
            "UID": "bd1130bda7813960",
            "BOMRef": "pkg:cargo/tower-service@0.3.3"
          },
          "Version": "0.3.3",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "tracing@0.1.43",
          "Name": "tracing",
          "Identifier": {
            "PURL": "pkg:cargo/tracing@0.1.43",
            "UID": "ccc1986eebbf2aa",
            "BOMRef": "pkg:cargo/tracing@0.1.43"
          },
          "Version": "0.1.43",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "log@0.4.29",
            "pin-project-lite@0.2.12",
            "tracing-attributes@0.1.31",
            "tracing-core@0.1.35"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "tracing-attributes@0.1.31",
          "Name": "tracing-attributes",
          "Identifier": {
            "PURL": "pkg:cargo/tracing-attributes@0.1.31",
            "UID": "cc33f1d8408bdfb5",
            "BOMRef": "pkg:cargo/tracing-attributes@0.1.31"
          },
          "Version": "0.1.31",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@2.0.111"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "tracing-core@0.1.35",
          "Name": "tracing-core",
          "Identifier": {
            "PURL": "pkg:cargo/tracing-core@0.1.35",
            "UID": "98bb3de60730aa81",
            "BOMRef": "pkg:cargo/tracing-core@0.1.35"
          },
          "Version": "0.1.35",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "once_cell@1.21.3",
            "valuable@0.1.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "tracing-log@0.2.0",
          "Name": "tracing-log",
          "Identifier": {
            "PURL": "pkg:cargo/tracing-log@0.2.0",
            "UID": "8f5046b729c9c69",
            "BOMRef": "pkg:cargo/tracing-log@0.2.0"
          },
          "Version": "0.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "log@0.4.29",
            "once_cell@1.21.3",
            "tracing-core@0.1.35"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "tracing-serde@0.2.0",
          "Name": "tracing-serde",
          "Identifier": {
            "PURL": "pkg:cargo/tracing-serde@0.2.0",
            "UID": "8b4153d81fc4dcc1",
            "BOMRef": "pkg:cargo/tracing-serde@0.2.0"
          },
          "Version": "0.2.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "serde@1.0.226",
            "tracing-core@0.1.35"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "tracing-subscriber@0.3.22",
          "Name": "tracing-subscriber",
          "Identifier": {
            "PURL": "pkg:cargo/tracing-subscriber@0.3.22",
            "UID": "29b031f243bd4bb8",
            "BOMRef": "pkg:cargo/tracing-subscriber@0.3.22"
          },
          "Version": "0.3.22",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "matchers@0.2.0",
            "nu-ansi-term@0.50.1",
            "once_cell@1.21.3",
            "parking_lot@0.12.5",
            "regex-automata@0.4.8",
            "serde@1.0.226",
            "serde_json@1.0.145",
            "sharded-slab@0.1.4",
            "smallvec@1.15.1",
            "thread_local@1.1.7",
            "tracing-core@0.1.35",
            "tracing-log@0.2.0",
            "tracing-serde@0.2.0",
            "tracing@0.1.43"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "tracing-tracy@0.11.4",
          "Name": "tracing-tracy",
          "Identifier": {
            "PURL": "pkg:cargo/tracing-tracy@0.11.4",
            "UID": "ed8bd8cede1c10a8",
            "BOMRef": "pkg:cargo/tracing-tracy@0.11.4"
          },
          "Version": "0.11.4",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "tracing-core@0.1.35",
            "tracing-subscriber@0.3.22",
            "tracy-client@0.17.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "tracy-client@0.17.0",
          "Name": "tracy-client",
          "Identifier": {
            "PURL": "pkg:cargo/tracy-client@0.17.0",
            "UID": "baeeab041cc6b6e7",
            "BOMRef": "pkg:cargo/tracy-client@0.17.0"
          },
          "Version": "0.17.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "loom@0.7.1",
            "once_cell@1.21.3",
            "tracy-client-sys@0.21.2"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "tracy-client-sys@0.21.2",
          "Name": "tracy-client-sys",
          "Identifier": {
            "PURL": "pkg:cargo/tracy-client-sys@0.21.2",
            "UID": "d10c8e0f7268c283",
            "BOMRef": "pkg:cargo/tracy-client-sys@0.21.2"
          },
          "Version": "0.21.2",
          "Licenses": [
            "(MIT OR Apache-2.0) AND BSD-3-Clause"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "try-lock@0.2.3",
          "Name": "try-lock",
          "Identifier": {
            "PURL": "pkg:cargo/try-lock@0.2.3",
            "UID": "fa6e6c970d469317",
            "BOMRef": "pkg:cargo/try-lock@0.2.3"
          },
          "Version": "0.2.3",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "typeid@1.0.0",
          "Name": "typeid",
          "Identifier": {
            "PURL": "pkg:cargo/typeid@1.0.0",
            "UID": "9671ef8c7234e63e",
            "BOMRef": "pkg:cargo/typeid@1.0.0"
          },
          "Version": "1.0.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "typenum@1.16.0",
          "Name": "typenum",
          "Identifier": {
            "PURL": "pkg:cargo/typenum@1.16.0",
            "UID": "77421b043c7b1e6f",
            "BOMRef": "pkg:cargo/typenum@1.16.0"
          },
          "Version": "1.16.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "typetag@0.2.15",
          "Name": "typetag",
          "Identifier": {
            "PURL": "pkg:cargo/typetag@0.2.15",
            "UID": "4dd96f0ad4523b24",
            "BOMRef": "pkg:cargo/typetag@0.2.15"
          },
          "Version": "0.2.15",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "erased-serde@0.4.2",
            "inventory@0.3.14",
            "once_cell@1.21.3",
            "serde@1.0.226",
            "typetag-impl@0.2.15"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "typetag-impl@0.2.15",
          "Name": "typetag-impl",
          "Identifier": {
            "PURL": "pkg:cargo/typetag-impl@0.2.15",
            "UID": "9165c57e131adca6",
            "BOMRef": "pkg:cargo/typetag-impl@0.2.15"
          },
          "Version": "0.2.15",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@2.0.111"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "unicase@2.6.0",
          "Name": "unicase",
          "Identifier": {
            "PURL": "pkg:cargo/unicase@2.6.0",
            "UID": "e90e38bf54822781",
            "BOMRef": "pkg:cargo/unicase@2.6.0"
          },
          "Version": "2.6.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "unicode-ident@1.0.13",
          "Name": "unicode-ident",
          "Identifier": {
            "PURL": "pkg:cargo/unicode-ident@1.0.13",
            "UID": "65d1b1f1273c8e3",
            "BOMRef": "pkg:cargo/unicode-ident@1.0.13"
          },
          "Version": "1.0.13",
          "Licenses": [
            "(MIT OR Apache-2.0) AND Unicode-DFS-2016"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "unicode-normalization@0.1.24",
          "Name": "unicode-normalization",
          "Identifier": {
            "PURL": "pkg:cargo/unicode-normalization@0.1.24",
            "UID": "787d19859c28f9b6",
            "BOMRef": "pkg:cargo/unicode-normalization@0.1.24"
          },
          "Version": "0.1.24",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "tinyvec@1.10.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "unicode-segmentation@1.12.0",
          "Name": "unicode-segmentation",
          "Identifier": {
            "PURL": "pkg:cargo/unicode-segmentation@1.12.0",
            "UID": "d05974564aaf1b93",
            "BOMRef": "pkg:cargo/unicode-segmentation@1.12.0"
          },
          "Version": "1.12.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "unicode-width@0.2.0",
          "Name": "unicode-width",
          "Identifier": {
            "PURL": "pkg:cargo/unicode-width@0.2.0",
            "UID": "2aac31f168480cfb",
            "BOMRef": "pkg:cargo/unicode-width@0.2.0"
          },
          "Version": "0.2.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "unicode-xid@0.2.6",
          "Name": "unicode-xid",
          "Identifier": {
            "PURL": "pkg:cargo/unicode-xid@0.2.6",
            "UID": "9ad61d1960d4d1a4",
            "BOMRef": "pkg:cargo/unicode-xid@0.2.6"
          },
          "Version": "0.2.6",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "unindent@0.2.4",
          "Name": "unindent",
          "Identifier": {
            "PURL": "pkg:cargo/unindent@0.2.4",
            "UID": "3f9475ac2077e85d",
            "BOMRef": "pkg:cargo/unindent@0.2.4"
          },
          "Version": "0.2.4",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "unit-prefix@0.5.1",
          "Name": "unit-prefix",
          "Identifier": {
            "PURL": "pkg:cargo/unit-prefix@0.5.1",
            "UID": "72b5783ea68d563c",
            "BOMRef": "pkg:cargo/unit-prefix@0.5.1"
          },
          "Version": "0.5.1",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "untrusted@0.9.0",
          "Name": "untrusted",
          "Identifier": {
            "PURL": "pkg:cargo/untrusted@0.9.0",
            "UID": "f214dbb6dded3a75",
            "BOMRef": "pkg:cargo/untrusted@0.9.0"
          },
          "Version": "0.9.0",
          "Licenses": [
            "ISC"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "unty@0.0.4",
          "Name": "unty",
          "Identifier": {
            "PURL": "pkg:cargo/unty@0.0.4",
            "UID": "f6e2d46e53700eea",
            "BOMRef": "pkg:cargo/unty@0.0.4"
          },
          "Version": "0.0.4",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "unwind@0.4.1",
          "Name": "unwind",
          "Identifier": {
            "PURL": "pkg:cargo/unwind@0.4.1",
            "UID": "b8e6df580d9b97a0",
            "BOMRef": "pkg:cargo/unwind@0.4.1"
          },
          "Version": "0.4.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "foreign-types@0.5.0",
            "libc@0.2.174",
            "unwind-sys@0.1.3"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "unwind-sys@0.1.3",
          "Name": "unwind-sys",
          "Identifier": {
            "PURL": "pkg:cargo/unwind-sys@0.1.3",
            "UID": "dfe338a3a155a37",
            "BOMRef": "pkg:cargo/unwind-sys@0.1.3"
          },
          "Version": "0.1.3",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "libc@0.2.174"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "url@2.5.7",
          "Name": "url",
          "Identifier": {
            "PURL": "pkg:cargo/url@2.5.7",
            "UID": "cab639537b39e4d2",
            "BOMRef": "pkg:cargo/url@2.5.7"
          },
          "Version": "2.5.7",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "form_urlencoded@1.2.2",
            "idna@1.1.0",
            "percent-encoding@2.3.2",
            "serde@1.0.226"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "urlencoding@2.1.3",
          "Name": "urlencoding",
          "Identifier": {
            "PURL": "pkg:cargo/urlencoding@2.1.3",
            "UID": "1d19a0dbcce915a9",
            "BOMRef": "pkg:cargo/urlencoding@2.1.3"
          },
          "Version": "2.1.3",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "utf16_iter@1.0.5",
          "Name": "utf16_iter",
          "Identifier": {
            "PURL": "pkg:cargo/utf16_iter@1.0.5",
            "UID": "46f457117065c7c6",
            "BOMRef": "pkg:cargo/utf16_iter@1.0.5"
          },
          "Version": "1.0.5",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "utf8_iter@1.0.4",
          "Name": "utf8_iter",
          "Identifier": {
            "PURL": "pkg:cargo/utf8_iter@1.0.4",
            "UID": "e61784be726a2a9",
            "BOMRef": "pkg:cargo/utf8_iter@1.0.4"
          },
          "Version": "1.0.4",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "utf8parse@0.2.1",
          "Name": "utf8parse",
          "Identifier": {
            "PURL": "pkg:cargo/utf8parse@0.2.1",
            "UID": "e52af9d9a149336f",
            "BOMRef": "pkg:cargo/utf8parse@0.2.1"
          },
          "Version": "0.2.1",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "uuid@1.19.0",
          "Name": "uuid",
          "Identifier": {
            "PURL": "pkg:cargo/uuid@1.19.0",
            "UID": "fe3e0ef90649f825",
            "BOMRef": "pkg:cargo/uuid@1.19.0"
          },
          "Version": "1.19.0",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "getrandom@0.3.0",
            "js-sys@0.3.77",
            "serde_core@1.0.226",
            "wasm-bindgen@0.2.100"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "v_htmlescape@0.15.8",
          "Name": "v_htmlescape",
          "Identifier": {
            "PURL": "pkg:cargo/v_htmlescape@0.15.8",
            "UID": "6a0b976e1012c839",
            "BOMRef": "pkg:cargo/v_htmlescape@0.15.8"
          },
          "Version": "0.15.8",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "validator@0.20.0",
          "Name": "validator",
          "Identifier": {
            "PURL": "pkg:cargo/validator@0.20.0",
            "UID": "e52690befedfc6b4",
            "BOMRef": "pkg:cargo/validator@0.20.0"
          },
          "Version": "0.20.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "idna@1.1.0",
            "once_cell@1.21.3",
            "regex@1.11.0",
            "serde@1.0.226",
            "serde_derive@1.0.226",
            "serde_json@1.0.145",
            "url@2.5.7",
            "validator_derive@0.20.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "validator_derive@0.20.0",
          "Name": "validator_derive",
          "Identifier": {
            "PURL": "pkg:cargo/validator_derive@0.20.0",
            "UID": "1ba5fd997c2fb203",
            "BOMRef": "pkg:cargo/validator_derive@0.20.0"
          },
          "Version": "0.20.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "darling@0.20.8",
            "once_cell@1.21.3",
            "proc-macro-error2@2.0.1",
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@2.0.111"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "valuable@0.1.0",
          "Name": "valuable",
          "Identifier": {
            "PURL": "pkg:cargo/valuable@0.1.0",
            "UID": "ceabb47a82131997",
            "BOMRef": "pkg:cargo/valuable@0.1.0"
          },
          "Version": "0.1.0",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "vaporetto@0.6.5",
          "Name": "vaporetto",
          "Identifier": {
            "PURL": "pkg:cargo/vaporetto@0.6.5",
            "UID": "21b5b2a2962c529",
            "BOMRef": "pkg:cargo/vaporetto@0.6.5"
          },
          "Version": "0.6.5",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "bincode@2.0.1",
            "daachorse@1.0.0",
            "hashbrown@0.15.2"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "virtue@0.0.18",
          "Name": "virtue",
          "Identifier": {
            "PURL": "pkg:cargo/virtue@0.0.18",
            "UID": "a8abfe469626abc7",
            "BOMRef": "pkg:cargo/virtue@0.0.18"
          },
          "Version": "0.0.18",
          "Licenses": [
            "MIT"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "walkdir@2.5.0",
          "Name": "walkdir",
          "Identifier": {
            "PURL": "pkg:cargo/walkdir@2.5.0",
            "UID": "8b889350be719153",
            "BOMRef": "pkg:cargo/walkdir@2.5.0"
          },
          "Version": "2.5.0",
          "Licenses": [
            "Unlicense OR MIT"
          ],
          "DependsOn": [
            "same-file@1.0.6",
            "winapi-util@0.1.5"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "want@0.3.0",
          "Name": "want",
          "Identifier": {
            "PURL": "pkg:cargo/want@0.3.0",
            "UID": "d9db4b3817023355",
            "BOMRef": "pkg:cargo/want@0.3.0"
          },
          "Version": "0.3.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "log@0.4.29",
            "try-lock@0.2.3"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "wasi@0.11.0+wasi-snapshot-preview1",
          "Name": "wasi",
          "Identifier": {
            "PURL": "pkg:cargo/wasi@0.11.0%2Bwasi-snapshot-preview1",
            "UID": "6c2209f41abe6941",
            "BOMRef": "pkg:cargo/wasi@0.11.0%2Bwasi-snapshot-preview1"
          },
          "Version": "0.11.0+wasi-snapshot-preview1",
          "Licenses": [
            "Apache-2.0 OR Apache-2.0 OR MIT"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "wasi@0.13.3+wasi-0.2.2",
          "Name": "wasi",
          "Identifier": {
            "PURL": "pkg:cargo/wasi@0.13.3%2Bwasi-0.2.2",
            "UID": "cb9d49265fae0653",
            "BOMRef": "pkg:cargo/wasi@0.13.3%2Bwasi-0.2.2"
          },
          "Version": "0.13.3+wasi-0.2.2",
          "Licenses": [
            "Apache-2.0 OR Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "wit-bindgen-rt@0.33.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "wasi@0.9.0+wasi-snapshot-preview1",
          "Name": "wasi",
          "Identifier": {
            "PURL": "pkg:cargo/wasi@0.9.0%2Bwasi-snapshot-preview1",
            "UID": "4d4bb7739ff0e905",
            "BOMRef": "pkg:cargo/wasi@0.9.0%2Bwasi-snapshot-preview1"
          },
          "Version": "0.9.0+wasi-snapshot-preview1",
          "Licenses": [
            "Apache-2.0 OR Apache-2.0 OR MIT"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "wasm-bindgen@0.2.100",
          "Name": "wasm-bindgen",
          "Identifier": {
            "PURL": "pkg:cargo/wasm-bindgen@0.2.100",
            "UID": "50dce4cfc890f745",
            "BOMRef": "pkg:cargo/wasm-bindgen@0.2.100"
          },
          "Version": "0.2.100",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "cfg-if@1.0.0",
            "once_cell@1.21.3",
            "rustversion@1.0.11",
            "wasm-bindgen-macro@0.2.100"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "wasm-bindgen-backend@0.2.100",
          "Name": "wasm-bindgen-backend",
          "Identifier": {
            "PURL": "pkg:cargo/wasm-bindgen-backend@0.2.100",
            "UID": "716baae5a7e26e42",
            "BOMRef": "pkg:cargo/wasm-bindgen-backend@0.2.100"
          },
          "Version": "0.2.100",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "bumpalo@3.11.1",
            "log@0.4.29",
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@2.0.111",
            "wasm-bindgen-shared@0.2.100"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "wasm-bindgen-futures@0.4.42",
          "Name": "wasm-bindgen-futures",
          "Identifier": {
            "PURL": "pkg:cargo/wasm-bindgen-futures@0.4.42",
            "UID": "1a3b7b10f5513bb3",
            "BOMRef": "pkg:cargo/wasm-bindgen-futures@0.4.42"
          },
          "Version": "0.4.42",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "cfg-if@1.0.0",
            "js-sys@0.3.77",
            "wasm-bindgen@0.2.100",
            "web-sys@0.3.69"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "wasm-bindgen-macro@0.2.100",
          "Name": "wasm-bindgen-macro",
          "Identifier": {
            "PURL": "pkg:cargo/wasm-bindgen-macro@0.2.100",
            "UID": "466573cbcc9d4558",
            "BOMRef": "pkg:cargo/wasm-bindgen-macro@0.2.100"
          },
          "Version": "0.2.100",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "quote@1.0.42",
            "wasm-bindgen-macro-support@0.2.100"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "wasm-bindgen-macro-support@0.2.100",
          "Name": "wasm-bindgen-macro-support",
          "Identifier": {
            "PURL": "pkg:cargo/wasm-bindgen-macro-support@0.2.100",
            "UID": "548742cddca8e8ea",
            "BOMRef": "pkg:cargo/wasm-bindgen-macro-support@0.2.100"
          },
          "Version": "0.2.100",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@2.0.111",
            "wasm-bindgen-backend@0.2.100",
            "wasm-bindgen-shared@0.2.100"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "wasm-bindgen-shared@0.2.100",
          "Name": "wasm-bindgen-shared",
          "Identifier": {
            "PURL": "pkg:cargo/wasm-bindgen-shared@0.2.100",
            "UID": "c158c19444ee91f",
            "BOMRef": "pkg:cargo/wasm-bindgen-shared@0.2.100"
          },
          "Version": "0.2.100",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "unicode-ident@1.0.13"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "wasm-streams@0.4.0",
          "Name": "wasm-streams",
          "Identifier": {
            "PURL": "pkg:cargo/wasm-streams@0.4.0",
            "UID": "b07c06ab801187a3",
            "BOMRef": "pkg:cargo/wasm-streams@0.4.0"
          },
          "Version": "0.4.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "futures-util@0.3.31",
            "js-sys@0.3.77",
            "wasm-bindgen-futures@0.4.42",
            "wasm-bindgen@0.2.100",
            "web-sys@0.3.69"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "web-sys@0.3.69",
          "Name": "web-sys",
          "Identifier": {
            "PURL": "pkg:cargo/web-sys@0.3.69",
            "UID": "d924515c4efe67ff",
            "BOMRef": "pkg:cargo/web-sys@0.3.69"
          },
          "Version": "0.3.69",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "js-sys@0.3.77",
            "wasm-bindgen@0.2.100"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "web-time@1.1.0",
          "Name": "web-time",
          "Identifier": {
            "PURL": "pkg:cargo/web-time@1.1.0",
            "UID": "773051efe9f375ef",
            "BOMRef": "pkg:cargo/web-time@1.1.0"
          },
          "Version": "1.1.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "js-sys@0.3.77",
            "wasm-bindgen@0.2.100"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "webpki-roots@0.26.1",
          "Name": "webpki-roots",
          "Identifier": {
            "PURL": "pkg:cargo/webpki-roots@0.26.1",
            "UID": "ef50544f76d423d1",
            "BOMRef": "pkg:cargo/webpki-roots@0.26.1"
          },
          "Version": "0.26.1",
          "Licenses": [
            "MPL-2.0"
          ],
          "DependsOn": [
            "rustls-pki-types@1.13.1"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "webpki-roots@1.0.0",
          "Name": "webpki-roots",
          "Identifier": {
            "PURL": "pkg:cargo/webpki-roots@1.0.0",
            "UID": "3b8d2c483eb610d4",
            "BOMRef": "pkg:cargo/webpki-roots@1.0.0"
          },
          "Version": "1.0.0",
          "Licenses": [
            "CDLA-Permissive-2.0"
          ],
          "DependsOn": [
            "rustls-pki-types@1.13.1"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "whatlang@0.16.4",
          "Name": "whatlang",
          "Identifier": {
            "PURL": "pkg:cargo/whatlang@0.16.4",
            "UID": "62dea91526e017f",
            "BOMRef": "pkg:cargo/whatlang@0.16.4"
          },
          "Version": "0.16.4",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "hashbrown@0.14.2",
            "once_cell@1.21.3"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "winapi@0.3.9",
          "Name": "winapi",
          "Identifier": {
            "PURL": "pkg:cargo/winapi@0.3.9",
            "UID": "570a5584f57d1993",
            "BOMRef": "pkg:cargo/winapi@0.3.9"
          },
          "Version": "0.3.9",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "winapi-i686-pc-windows-gnu@0.4.0",
            "winapi-x86_64-pc-windows-gnu@0.4.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "winapi-i686-pc-windows-gnu@0.4.0",
          "Name": "winapi-i686-pc-windows-gnu",
          "Identifier": {
            "PURL": "pkg:cargo/winapi-i686-pc-windows-gnu@0.4.0",
            "UID": "3915fcdefe48e657",
            "BOMRef": "pkg:cargo/winapi-i686-pc-windows-gnu@0.4.0"
          },
          "Version": "0.4.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "winapi-util@0.1.5",
          "Name": "winapi-util",
          "Identifier": {
            "PURL": "pkg:cargo/winapi-util@0.1.5",
            "UID": "6d636d3d6727b5c6",
            "BOMRef": "pkg:cargo/winapi-util@0.1.5"
          },
          "Version": "0.1.5",
          "Licenses": [
            "Unlicense OR MIT"
          ],
          "DependsOn": [
            "winapi@0.3.9"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "winapi-x86_64-pc-windows-gnu@0.4.0",
          "Name": "winapi-x86_64-pc-windows-gnu",
          "Identifier": {
            "PURL": "pkg:cargo/winapi-x86_64-pc-windows-gnu@0.4.0",
            "UID": "354275a441b0e90a",
            "BOMRef": "pkg:cargo/winapi-x86_64-pc-windows-gnu@0.4.0"
          },
          "Version": "0.4.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "windows@0.48.0",
          "Name": "windows",
          "Identifier": {
            "PURL": "pkg:cargo/windows@0.48.0",
            "UID": "21edd542790e6c6e",
            "BOMRef": "pkg:cargo/windows@0.48.0"
          },
          "Version": "0.48.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "windows-targets@0.48.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "windows@0.57.0",
          "Name": "windows",
          "Identifier": {
            "PURL": "pkg:cargo/windows@0.57.0",
            "UID": "29eba01c90902ef6",
            "BOMRef": "pkg:cargo/windows@0.57.0"
          },
          "Version": "0.57.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "windows-core@0.57.0",
            "windows-targets@0.52.6"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "windows@0.61.3",
          "Name": "windows",
          "Identifier": {
            "PURL": "pkg:cargo/windows@0.61.3",
            "UID": "acb6b2a174157536",
            "BOMRef": "pkg:cargo/windows@0.61.3"
          },
          "Version": "0.61.3",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "windows-collections@0.2.0",
            "windows-core@0.61.2",
            "windows-future@0.2.1",
            "windows-link@0.1.3",
            "windows-numerics@0.2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "windows-collections@0.2.0",
          "Name": "windows-collections",
          "Identifier": {
            "PURL": "pkg:cargo/windows-collections@0.2.0",
            "UID": "b472c22f96532c84",
            "BOMRef": "pkg:cargo/windows-collections@0.2.0"
          },
          "Version": "0.2.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "windows-core@0.61.2"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "windows-core@0.57.0",
          "Name": "windows-core",
          "Identifier": {
            "PURL": "pkg:cargo/windows-core@0.57.0",
            "UID": "d022b88b3909ed78",
            "BOMRef": "pkg:cargo/windows-core@0.57.0"
          },
          "Version": "0.57.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "windows-implement@0.57.0",
            "windows-interface@0.57.0",
            "windows-result@0.1.2",
            "windows-targets@0.52.6"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "windows-core@0.61.2",
          "Name": "windows-core",
          "Identifier": {
            "PURL": "pkg:cargo/windows-core@0.61.2",
            "UID": "5dc923dbc0c11494",
            "BOMRef": "pkg:cargo/windows-core@0.61.2"
          },
          "Version": "0.61.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "windows-implement@0.60.0",
            "windows-interface@0.59.1",
            "windows-link@0.1.3",
            "windows-result@0.3.4",
            "windows-strings@0.4.2"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "windows-future@0.2.1",
          "Name": "windows-future",
          "Identifier": {
            "PURL": "pkg:cargo/windows-future@0.2.1",
            "UID": "c1317e0ece3fba34",
            "BOMRef": "pkg:cargo/windows-future@0.2.1"
          },
          "Version": "0.2.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "windows-core@0.61.2",
            "windows-link@0.1.3",
            "windows-threading@0.1.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "windows-implement@0.57.0",
          "Name": "windows-implement",
          "Identifier": {
            "PURL": "pkg:cargo/windows-implement@0.57.0",
            "UID": "2798f52ae2605505",
            "BOMRef": "pkg:cargo/windows-implement@0.57.0"
          },
          "Version": "0.57.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@2.0.111"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "windows-implement@0.60.0",
          "Name": "windows-implement",
          "Identifier": {
            "PURL": "pkg:cargo/windows-implement@0.60.0",
            "UID": "9dd08e31c38a9673",
            "BOMRef": "pkg:cargo/windows-implement@0.60.0"
          },
          "Version": "0.60.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@2.0.111"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "windows-interface@0.57.0",
          "Name": "windows-interface",
          "Identifier": {
            "PURL": "pkg:cargo/windows-interface@0.57.0",
            "UID": "1faec51cf7177d18",
            "BOMRef": "pkg:cargo/windows-interface@0.57.0"
          },
          "Version": "0.57.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@2.0.111"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "windows-interface@0.59.1",
          "Name": "windows-interface",
          "Identifier": {
            "PURL": "pkg:cargo/windows-interface@0.59.1",
            "UID": "77853bc98a455a9e",
            "BOMRef": "pkg:cargo/windows-interface@0.59.1"
          },
          "Version": "0.59.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@2.0.111"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "windows-link@0.1.3",
          "Name": "windows-link",
          "Identifier": {
            "PURL": "pkg:cargo/windows-link@0.1.3",
            "UID": "f344e88240e53008",
            "BOMRef": "pkg:cargo/windows-link@0.1.3"
          },
          "Version": "0.1.3",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "windows-link@0.2.0",
          "Name": "windows-link",
          "Identifier": {
            "PURL": "pkg:cargo/windows-link@0.2.0",
            "UID": "c5e96be5e2b24e5b",
            "BOMRef": "pkg:cargo/windows-link@0.2.0"
          },
          "Version": "0.2.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "windows-numerics@0.2.0",
          "Name": "windows-numerics",
          "Identifier": {
            "PURL": "pkg:cargo/windows-numerics@0.2.0",
            "UID": "b4b66cd72847aaab",
            "BOMRef": "pkg:cargo/windows-numerics@0.2.0"
          },
          "Version": "0.2.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "windows-core@0.61.2",
            "windows-link@0.1.3"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "windows-result@0.1.2",
          "Name": "windows-result",
          "Identifier": {
            "PURL": "pkg:cargo/windows-result@0.1.2",
            "UID": "83a1093f405cc37e",
            "BOMRef": "pkg:cargo/windows-result@0.1.2"
          },
          "Version": "0.1.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "windows-targets@0.52.6"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "windows-result@0.3.4",
          "Name": "windows-result",
          "Identifier": {
            "PURL": "pkg:cargo/windows-result@0.3.4",
            "UID": "b3e04e8398ec19ac",
            "BOMRef": "pkg:cargo/windows-result@0.3.4"
          },
          "Version": "0.3.4",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "windows-link@0.1.3"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "windows-strings@0.4.2",
          "Name": "windows-strings",
          "Identifier": {
            "PURL": "pkg:cargo/windows-strings@0.4.2",
            "UID": "2bc32d868979eee0",
            "BOMRef": "pkg:cargo/windows-strings@0.4.2"
          },
          "Version": "0.4.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "windows-link@0.1.3"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "windows-sys@0.42.0",
          "Name": "windows-sys",
          "Identifier": {
            "PURL": "pkg:cargo/windows-sys@0.42.0",
            "UID": "82948a76edf275bf",
            "BOMRef": "pkg:cargo/windows-sys@0.42.0"
          },
          "Version": "0.42.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "windows_aarch64_gnullvm@0.42.2",
            "windows_aarch64_msvc@0.42.2",
            "windows_i686_gnu@0.42.2",
            "windows_i686_msvc@0.42.2",
            "windows_x86_64_gnu@0.42.2",
            "windows_x86_64_gnullvm@0.42.2",
            "windows_x86_64_msvc@0.42.2"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "windows-sys@0.48.0",
          "Name": "windows-sys",
          "Identifier": {
            "PURL": "pkg:cargo/windows-sys@0.48.0",
            "UID": "788a0cedad765818",
            "BOMRef": "pkg:cargo/windows-sys@0.48.0"
          },
          "Version": "0.48.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "windows-targets@0.48.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "windows-sys@0.52.0",
          "Name": "windows-sys",
          "Identifier": {
            "PURL": "pkg:cargo/windows-sys@0.52.0",
            "UID": "848ec54340700caa",
            "BOMRef": "pkg:cargo/windows-sys@0.52.0"
          },
          "Version": "0.52.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "windows-targets@0.52.6"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "windows-sys@0.59.0",
          "Name": "windows-sys",
          "Identifier": {
            "PURL": "pkg:cargo/windows-sys@0.59.0",
            "UID": "fbfd402c68c51f30",
            "BOMRef": "pkg:cargo/windows-sys@0.59.0"
          },
          "Version": "0.59.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "windows-targets@0.52.6"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "windows-sys@0.60.2",
          "Name": "windows-sys",
          "Identifier": {
            "PURL": "pkg:cargo/windows-sys@0.60.2",
            "UID": "9be69188a1632e4d",
            "BOMRef": "pkg:cargo/windows-sys@0.60.2"
          },
          "Version": "0.60.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "windows-targets@0.53.2"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "windows-sys@0.61.1",
          "Name": "windows-sys",
          "Identifier": {
            "PURL": "pkg:cargo/windows-sys@0.61.1",
            "UID": "19ce6c6b327cb4cf",
            "BOMRef": "pkg:cargo/windows-sys@0.61.1"
          },
          "Version": "0.61.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "windows-link@0.2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "windows-targets@0.48.0",
          "Name": "windows-targets",
          "Identifier": {
            "PURL": "pkg:cargo/windows-targets@0.48.0",
            "UID": "5f69112bb35b9a1e",
            "BOMRef": "pkg:cargo/windows-targets@0.48.0"
          },
          "Version": "0.48.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "windows_aarch64_gnullvm@0.48.0",
            "windows_aarch64_msvc@0.48.0",
            "windows_i686_gnu@0.48.0",
            "windows_i686_msvc@0.48.0",
            "windows_x86_64_gnu@0.48.0",
            "windows_x86_64_gnullvm@0.48.0",
            "windows_x86_64_msvc@0.48.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "windows-targets@0.52.6",
          "Name": "windows-targets",
          "Identifier": {
            "PURL": "pkg:cargo/windows-targets@0.52.6",
            "UID": "3a55af32d652dc0b",
            "BOMRef": "pkg:cargo/windows-targets@0.52.6"
          },
          "Version": "0.52.6",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "windows_aarch64_gnullvm@0.52.6",
            "windows_aarch64_msvc@0.52.6",
            "windows_i686_gnu@0.52.6",
            "windows_i686_gnullvm@0.52.6",
            "windows_i686_msvc@0.52.6",
            "windows_x86_64_gnu@0.52.6",
            "windows_x86_64_gnullvm@0.52.6",
            "windows_x86_64_msvc@0.52.6"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "windows-targets@0.53.2",
          "Name": "windows-targets",
          "Identifier": {
            "PURL": "pkg:cargo/windows-targets@0.53.2",
            "UID": "da703e959a5cc340",
            "BOMRef": "pkg:cargo/windows-targets@0.53.2"
          },
          "Version": "0.53.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "windows_aarch64_gnullvm@0.53.0",
            "windows_aarch64_msvc@0.53.0",
            "windows_i686_gnu@0.53.0",
            "windows_i686_gnullvm@0.53.0",
            "windows_i686_msvc@0.53.0",
            "windows_x86_64_gnu@0.53.0",
            "windows_x86_64_gnullvm@0.53.0",
            "windows_x86_64_msvc@0.53.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "windows-threading@0.1.0",
          "Name": "windows-threading",
          "Identifier": {
            "PURL": "pkg:cargo/windows-threading@0.1.0",
            "UID": "e7836d3b74abc96b",
            "BOMRef": "pkg:cargo/windows-threading@0.1.0"
          },
          "Version": "0.1.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "windows-link@0.1.3"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "windows_aarch64_gnullvm@0.42.2",
          "Name": "windows_aarch64_gnullvm",
          "Identifier": {
            "PURL": "pkg:cargo/windows_aarch64_gnullvm@0.42.2",
            "UID": "9510fec9eb21e391",
            "BOMRef": "pkg:cargo/windows_aarch64_gnullvm@0.42.2"
          },
          "Version": "0.42.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "windows_aarch64_gnullvm@0.48.0",
          "Name": "windows_aarch64_gnullvm",
          "Identifier": {
            "PURL": "pkg:cargo/windows_aarch64_gnullvm@0.48.0",
            "UID": "41ced29e4ee4d004",
            "BOMRef": "pkg:cargo/windows_aarch64_gnullvm@0.48.0"
          },
          "Version": "0.48.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "windows_aarch64_gnullvm@0.52.6",
          "Name": "windows_aarch64_gnullvm",
          "Identifier": {
            "PURL": "pkg:cargo/windows_aarch64_gnullvm@0.52.6",
            "UID": "c5ffc9cc2e8056aa",
            "BOMRef": "pkg:cargo/windows_aarch64_gnullvm@0.52.6"
          },
          "Version": "0.52.6",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "windows_aarch64_gnullvm@0.53.0",
          "Name": "windows_aarch64_gnullvm",
          "Identifier": {
            "PURL": "pkg:cargo/windows_aarch64_gnullvm@0.53.0",
            "UID": "d5683c35dad1885a",
            "BOMRef": "pkg:cargo/windows_aarch64_gnullvm@0.53.0"
          },
          "Version": "0.53.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "windows_aarch64_msvc@0.42.2",
          "Name": "windows_aarch64_msvc",
          "Identifier": {
            "PURL": "pkg:cargo/windows_aarch64_msvc@0.42.2",
            "UID": "8c08bda9a9daa3c3",
            "BOMRef": "pkg:cargo/windows_aarch64_msvc@0.42.2"
          },
          "Version": "0.42.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "windows_aarch64_msvc@0.48.0",
          "Name": "windows_aarch64_msvc",
          "Identifier": {
            "PURL": "pkg:cargo/windows_aarch64_msvc@0.48.0",
            "UID": "ba33e6200221bd22",
            "BOMRef": "pkg:cargo/windows_aarch64_msvc@0.48.0"
          },
          "Version": "0.48.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "windows_aarch64_msvc@0.52.6",
          "Name": "windows_aarch64_msvc",
          "Identifier": {
            "PURL": "pkg:cargo/windows_aarch64_msvc@0.52.6",
            "UID": "ff36c0f0aae06814",
            "BOMRef": "pkg:cargo/windows_aarch64_msvc@0.52.6"
          },
          "Version": "0.52.6",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "windows_aarch64_msvc@0.53.0",
          "Name": "windows_aarch64_msvc",
          "Identifier": {
            "PURL": "pkg:cargo/windows_aarch64_msvc@0.53.0",
            "UID": "3a135725d8910f4b",
            "BOMRef": "pkg:cargo/windows_aarch64_msvc@0.53.0"
          },
          "Version": "0.53.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "windows_i686_gnu@0.42.2",
          "Name": "windows_i686_gnu",
          "Identifier": {
            "PURL": "pkg:cargo/windows_i686_gnu@0.42.2",
            "UID": "aa5be50cf996b0bb",
            "BOMRef": "pkg:cargo/windows_i686_gnu@0.42.2"
          },
          "Version": "0.42.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "windows_i686_gnu@0.48.0",
          "Name": "windows_i686_gnu",
          "Identifier": {
            "PURL": "pkg:cargo/windows_i686_gnu@0.48.0",
            "UID": "42f98fab7d7b5f86",
            "BOMRef": "pkg:cargo/windows_i686_gnu@0.48.0"
          },
          "Version": "0.48.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "windows_i686_gnu@0.52.6",
          "Name": "windows_i686_gnu",
          "Identifier": {
            "PURL": "pkg:cargo/windows_i686_gnu@0.52.6",
            "UID": "e16e4b9432884d05",
            "BOMRef": "pkg:cargo/windows_i686_gnu@0.52.6"
          },
          "Version": "0.52.6",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "windows_i686_gnu@0.53.0",
          "Name": "windows_i686_gnu",
          "Identifier": {
            "PURL": "pkg:cargo/windows_i686_gnu@0.53.0",
            "UID": "ec2c186311906429",
            "BOMRef": "pkg:cargo/windows_i686_gnu@0.53.0"
          },
          "Version": "0.53.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "windows_i686_gnullvm@0.52.6",
          "Name": "windows_i686_gnullvm",
          "Identifier": {
            "PURL": "pkg:cargo/windows_i686_gnullvm@0.52.6",
            "UID": "1e8d3ed08fce4326",
            "BOMRef": "pkg:cargo/windows_i686_gnullvm@0.52.6"
          },
          "Version": "0.52.6",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "windows_i686_gnullvm@0.53.0",
          "Name": "windows_i686_gnullvm",
          "Identifier": {
            "PURL": "pkg:cargo/windows_i686_gnullvm@0.53.0",
            "UID": "5c20b497f6630cdf",
            "BOMRef": "pkg:cargo/windows_i686_gnullvm@0.53.0"
          },
          "Version": "0.53.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "windows_i686_msvc@0.42.2",
          "Name": "windows_i686_msvc",
          "Identifier": {
            "PURL": "pkg:cargo/windows_i686_msvc@0.42.2",
            "UID": "2878f6dc5da0aab",
            "BOMRef": "pkg:cargo/windows_i686_msvc@0.42.2"
          },
          "Version": "0.42.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "windows_i686_msvc@0.48.0",
          "Name": "windows_i686_msvc",
          "Identifier": {
            "PURL": "pkg:cargo/windows_i686_msvc@0.48.0",
            "UID": "e9125f14e1a580f3",
            "BOMRef": "pkg:cargo/windows_i686_msvc@0.48.0"
          },
          "Version": "0.48.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "windows_i686_msvc@0.52.6",
          "Name": "windows_i686_msvc",
          "Identifier": {
            "PURL": "pkg:cargo/windows_i686_msvc@0.52.6",
            "UID": "f25c372af4559a3a",
            "BOMRef": "pkg:cargo/windows_i686_msvc@0.52.6"
          },
          "Version": "0.52.6",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "windows_i686_msvc@0.53.0",
          "Name": "windows_i686_msvc",
          "Identifier": {
            "PURL": "pkg:cargo/windows_i686_msvc@0.53.0",
            "UID": "f2dfa4165cb1543c",
            "BOMRef": "pkg:cargo/windows_i686_msvc@0.53.0"
          },
          "Version": "0.53.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "windows_x86_64_gnu@0.42.2",
          "Name": "windows_x86_64_gnu",
          "Identifier": {
            "PURL": "pkg:cargo/windows_x86_64_gnu@0.42.2",
            "UID": "c57164c14c806e5a",
            "BOMRef": "pkg:cargo/windows_x86_64_gnu@0.42.2"
          },
          "Version": "0.42.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "windows_x86_64_gnu@0.48.0",
          "Name": "windows_x86_64_gnu",
          "Identifier": {
            "PURL": "pkg:cargo/windows_x86_64_gnu@0.48.0",
            "UID": "eabfd9f1a97f888b",
            "BOMRef": "pkg:cargo/windows_x86_64_gnu@0.48.0"
          },
          "Version": "0.48.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "windows_x86_64_gnu@0.52.6",
          "Name": "windows_x86_64_gnu",
          "Identifier": {
            "PURL": "pkg:cargo/windows_x86_64_gnu@0.52.6",
            "UID": "b955da826c462d3e",
            "BOMRef": "pkg:cargo/windows_x86_64_gnu@0.52.6"
          },
          "Version": "0.52.6",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "windows_x86_64_gnu@0.53.0",
          "Name": "windows_x86_64_gnu",
          "Identifier": {
            "PURL": "pkg:cargo/windows_x86_64_gnu@0.53.0",
            "UID": "ce30acca128b3c55",
            "BOMRef": "pkg:cargo/windows_x86_64_gnu@0.53.0"
          },
          "Version": "0.53.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "windows_x86_64_gnullvm@0.42.2",
          "Name": "windows_x86_64_gnullvm",
          "Identifier": {
            "PURL": "pkg:cargo/windows_x86_64_gnullvm@0.42.2",
            "UID": "a723623879add351",
            "BOMRef": "pkg:cargo/windows_x86_64_gnullvm@0.42.2"
          },
          "Version": "0.42.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "windows_x86_64_gnullvm@0.48.0",
          "Name": "windows_x86_64_gnullvm",
          "Identifier": {
            "PURL": "pkg:cargo/windows_x86_64_gnullvm@0.48.0",
            "UID": "2538edfda8c22d57",
            "BOMRef": "pkg:cargo/windows_x86_64_gnullvm@0.48.0"
          },
          "Version": "0.48.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "windows_x86_64_gnullvm@0.52.6",
          "Name": "windows_x86_64_gnullvm",
          "Identifier": {
            "PURL": "pkg:cargo/windows_x86_64_gnullvm@0.52.6",
            "UID": "6d28f7b44af746b4",
            "BOMRef": "pkg:cargo/windows_x86_64_gnullvm@0.52.6"
          },
          "Version": "0.52.6",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "windows_x86_64_gnullvm@0.53.0",
          "Name": "windows_x86_64_gnullvm",
          "Identifier": {
            "PURL": "pkg:cargo/windows_x86_64_gnullvm@0.53.0",
            "UID": "e1a112206eda78b3",
            "BOMRef": "pkg:cargo/windows_x86_64_gnullvm@0.53.0"
          },
          "Version": "0.53.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "windows_x86_64_msvc@0.42.2",
          "Name": "windows_x86_64_msvc",
          "Identifier": {
            "PURL": "pkg:cargo/windows_x86_64_msvc@0.42.2",
            "UID": "d62a3f2667280a77",
            "BOMRef": "pkg:cargo/windows_x86_64_msvc@0.42.2"
          },
          "Version": "0.42.2",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "windows_x86_64_msvc@0.48.0",
          "Name": "windows_x86_64_msvc",
          "Identifier": {
            "PURL": "pkg:cargo/windows_x86_64_msvc@0.48.0",
            "UID": "7e08768a05c81ce",
            "BOMRef": "pkg:cargo/windows_x86_64_msvc@0.48.0"
          },
          "Version": "0.48.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "windows_x86_64_msvc@0.52.6",
          "Name": "windows_x86_64_msvc",
          "Identifier": {
            "PURL": "pkg:cargo/windows_x86_64_msvc@0.52.6",
            "UID": "d2af2890f5f1c104",
            "BOMRef": "pkg:cargo/windows_x86_64_msvc@0.52.6"
          },
          "Version": "0.52.6",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "windows_x86_64_msvc@0.53.0",
          "Name": "windows_x86_64_msvc",
          "Identifier": {
            "PURL": "pkg:cargo/windows_x86_64_msvc@0.53.0",
            "UID": "2f41b55832b81021",
            "BOMRef": "pkg:cargo/windows_x86_64_msvc@0.53.0"
          },
          "Version": "0.53.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "winnow@0.7.13",
          "Name": "winnow",
          "Identifier": {
            "PURL": "pkg:cargo/winnow@0.7.13",
            "UID": "31157f30236ed83f",
            "BOMRef": "pkg:cargo/winnow@0.7.13"
          },
          "Version": "0.7.13",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "memchr@2.7.4"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "wit-bindgen-rt@0.33.0",
          "Name": "wit-bindgen-rt",
          "Identifier": {
            "PURL": "pkg:cargo/wit-bindgen-rt@0.33.0",
            "UID": "d11d30689f10ef64",
            "BOMRef": "pkg:cargo/wit-bindgen-rt@0.33.0"
          },
          "Version": "0.33.0",
          "Licenses": [
            "Apache-2.0 OR Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "bitflags@2.9.1"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "write16@1.0.0",
          "Name": "write16",
          "Identifier": {
            "PURL": "pkg:cargo/write16@1.0.0",
            "UID": "46397d792d0dcd5f",
            "BOMRef": "pkg:cargo/write16@1.0.0"
          },
          "Version": "1.0.0",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "writeable@0.5.5",
          "Name": "writeable",
          "Identifier": {
            "PURL": "pkg:cargo/writeable@0.5.5",
            "UID": "7092e6450552c3b3",
            "BOMRef": "pkg:cargo/writeable@0.5.5"
          },
          "Version": "0.5.5",
          "Licenses": [
            "Unicode-3.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "wyhash@0.5.0",
          "Name": "wyhash",
          "Identifier": {
            "PURL": "pkg:cargo/wyhash@0.5.0",
            "UID": "b4a98e7e5b171f02",
            "BOMRef": "pkg:cargo/wyhash@0.5.0"
          },
          "Version": "0.5.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "rand_core@0.6.4"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "wyz@0.5.1",
          "Name": "wyz",
          "Identifier": {
            "PURL": "pkg:cargo/wyz@0.5.1",
            "UID": "8ee3f76d6ad61ed1",
            "BOMRef": "pkg:cargo/wyz@0.5.1"
          },
          "Version": "0.5.1",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "tap@1.0.1"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "xattr@1.3.1",
          "Name": "xattr",
          "Identifier": {
            "PURL": "pkg:cargo/xattr@1.3.1",
            "UID": "445105e87128076b",
            "BOMRef": "pkg:cargo/xattr@1.3.1"
          },
          "Version": "1.3.1",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "libc@0.2.174",
            "linux-raw-sys@0.4.14",
            "rustix@0.38.40"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "yaml-rust2@0.10.4",
          "Name": "yaml-rust2",
          "Identifier": {
            "PURL": "pkg:cargo/yaml-rust2@0.10.4",
            "UID": "c57e03cb34dcdb83",
            "BOMRef": "pkg:cargo/yaml-rust2@0.10.4"
          },
          "Version": "0.10.4",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "arraydeque@0.5.1",
            "encoding_rs@0.8.33",
            "hashlink@0.10.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "yoke@0.7.4",
          "Name": "yoke",
          "Identifier": {
            "PURL": "pkg:cargo/yoke@0.7.4",
            "UID": "e421bdae502a7cb6",
            "BOMRef": "pkg:cargo/yoke@0.7.4"
          },
          "Version": "0.7.4",
          "Licenses": [
            "Unicode-3.0"
          ],
          "DependsOn": [
            "serde@1.0.226",
            "stable_deref_trait@1.2.0",
            "yoke-derive@0.7.4",
            "zerofrom@0.1.4"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "yoke-derive@0.7.4",
          "Name": "yoke-derive",
          "Identifier": {
            "PURL": "pkg:cargo/yoke-derive@0.7.4",
            "UID": "de888e88d7c5e23d",
            "BOMRef": "pkg:cargo/yoke-derive@0.7.4"
          },
          "Version": "0.7.4",
          "Licenses": [
            "Unicode-3.0"
          ],
          "DependsOn": [
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@2.0.111",
            "synstructure@0.13.1"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "zerocopy@0.7.35",
          "Name": "zerocopy",
          "Identifier": {
            "PURL": "pkg:cargo/zerocopy@0.7.35",
            "UID": "2d2ade333ffb902e",
            "BOMRef": "pkg:cargo/zerocopy@0.7.35"
          },
          "Version": "0.7.35",
          "Licenses": [
            "BSD-2-Clause OR Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "zerocopy-derive@0.7.35"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "zerocopy@0.8.31",
          "Name": "zerocopy",
          "Identifier": {
            "PURL": "pkg:cargo/zerocopy@0.8.31",
            "UID": "e5833711e10ff325",
            "BOMRef": "pkg:cargo/zerocopy@0.8.31"
          },
          "Version": "0.8.31",
          "Licenses": [
            "BSD-2-Clause OR Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "zerocopy-derive@0.8.31"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "zerocopy-derive@0.7.35",
          "Name": "zerocopy-derive",
          "Identifier": {
            "PURL": "pkg:cargo/zerocopy-derive@0.7.35",
            "UID": "8f7997379ba5c296",
            "BOMRef": "pkg:cargo/zerocopy-derive@0.7.35"
          },
          "Version": "0.7.35",
          "Licenses": [
            "BSD-2-Clause OR Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@2.0.111"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "zerocopy-derive@0.8.31",
          "Name": "zerocopy-derive",
          "Identifier": {
            "PURL": "pkg:cargo/zerocopy-derive@0.8.31",
            "UID": "cff8aeb79ce080c2",
            "BOMRef": "pkg:cargo/zerocopy-derive@0.8.31"
          },
          "Version": "0.8.31",
          "Licenses": [
            "BSD-2-Clause OR Apache-2.0 OR MIT"
          ],
          "DependsOn": [
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@2.0.111"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "zerofrom@0.1.4",
          "Name": "zerofrom",
          "Identifier": {
            "PURL": "pkg:cargo/zerofrom@0.1.4",
            "UID": "d0295977af3bc599",
            "BOMRef": "pkg:cargo/zerofrom@0.1.4"
          },
          "Version": "0.1.4",
          "Licenses": [
            "Unicode-3.0"
          ],
          "DependsOn": [
            "zerofrom-derive@0.1.4"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "zerofrom-derive@0.1.4",
          "Name": "zerofrom-derive",
          "Identifier": {
            "PURL": "pkg:cargo/zerofrom-derive@0.1.4",
            "UID": "9f5f0aad8baac3e",
            "BOMRef": "pkg:cargo/zerofrom-derive@0.1.4"
          },
          "Version": "0.1.4",
          "Licenses": [
            "Unicode-3.0"
          ],
          "DependsOn": [
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@2.0.111",
            "synstructure@0.13.1"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "zeroize@1.8.1",
          "Name": "zeroize",
          "Identifier": {
            "PURL": "pkg:cargo/zeroize@1.8.1",
            "UID": "aa55516be565beb5",
            "BOMRef": "pkg:cargo/zeroize@1.8.1"
          },
          "Version": "1.8.1",
          "Licenses": [
            "Apache-2.0 OR MIT"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "zerovec@0.10.4",
          "Name": "zerovec",
          "Identifier": {
            "PURL": "pkg:cargo/zerovec@0.10.4",
            "UID": "880c983cd0550cc5",
            "BOMRef": "pkg:cargo/zerovec@0.10.4"
          },
          "Version": "0.10.4",
          "Licenses": [
            "Unicode-3.0"
          ],
          "DependsOn": [
            "yoke@0.7.4",
            "zerofrom@0.1.4",
            "zerovec-derive@0.10.3"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "zerovec-derive@0.10.3",
          "Name": "zerovec-derive",
          "Identifier": {
            "PURL": "pkg:cargo/zerovec-derive@0.10.3",
            "UID": "ec2d8f0a01d27344",
            "BOMRef": "pkg:cargo/zerovec-derive@0.10.3"
          },
          "Version": "0.10.3",
          "Licenses": [
            "Unicode-3.0"
          ],
          "DependsOn": [
            "proc-macro2@1.0.101",
            "quote@1.0.42",
            "syn@2.0.111"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "zstd@0.13.0",
          "Name": "zstd",
          "Identifier": {
            "PURL": "pkg:cargo/zstd@0.13.0",
            "UID": "58046cdb09d7c7bb",
            "BOMRef": "pkg:cargo/zstd@0.13.0"
          },
          "Version": "0.13.0",
          "Licenses": [
            "MIT"
          ],
          "DependsOn": [
            "zstd-safe@7.0.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "zstd-safe@7.0.0",
          "Name": "zstd-safe",
          "Identifier": {
            "PURL": "pkg:cargo/zstd-safe@7.0.0",
            "UID": "25ebdc6ccd34e58d",
            "BOMRef": "pkg:cargo/zstd-safe@7.0.0"
          },
          "Version": "7.0.0",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "DependsOn": [
            "zstd-sys@2.0.9+zstd.1.5.5"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        },
        {
          "ID": "zstd-sys@2.0.9+zstd.1.5.5",
          "Name": "zstd-sys",
          "Identifier": {
            "PURL": "pkg:cargo/zstd-sys@2.0.9%2Bzstd.1.5.5",
            "UID": "619b4edffb8c99e2",
            "BOMRef": "pkg:cargo/zstd-sys@2.0.9%2Bzstd.1.5.5"
          },
          "Version": "2.0.9+zstd.1.5.5",
          "Licenses": [
            "MIT OR Apache-2.0"
          ],
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          }
        }
      ],
      "Vulnerabilities": [
        {
          "VulnerabilityID": "GHSA-8v2v-wjwg-vx6r",
          "PkgID": "actix-files@0.6.9",
          "PkgName": "actix-files",
          "PkgIdentifier": {
            "PURL": "pkg:cargo/actix-files@0.6.9",
            "UID": "7c608aba6e36d80a",
            "BOMRef": "pkg:cargo/actix-files@0.6.9"
          },
          "InstalledVersion": "0.6.9",
          "FixedVersion": "0.6.10",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://github.com/advisories/GHSA-8v2v-wjwg-vx6r",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory Rust",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Arust"
          },
          "Fingerprint": "sha256:9506914f0833b882dca93da782e9d78e5c49e82a6bd458b82eaf040da9124682",
          "Title": "actix-files has a possible exposure of information vulnerability",
          "Description": "### Summary\n\nWhen passing a non-existing folder to the `actix_files::Files::new()` method causes the actix server to expose unexpected files.\n\n### Details\n\nThe `actix-files` library exposes a [`Files` struct](https://github.com/actix/actix-web/blob/fba766b4beb92278665d58815c94d336015225c5/actix-files/src/files.rs#L38) that configures an actix `service` to serve the files in a folder as static assets. Below you can find the [signature of the `Files::new` method](https://github.com/actix/actix-web/blob/fba766b4beb92278665d58815c94d336015225c5/actix-files/src/files.rs#L98):\n\n```rust\npub fn new\u003cT: Into\u003cPathBuf\u003e\u003e(mount_path: \u0026str, serve_from: T) -\u003e Files\n```\n\nWhen the `mount_path` you pass to `Files` doesn't exist, [it defaults to an empty path](https://github.com/actix/actix-web/blob/fba766b4beb92278665d58815c94d336015225c5/actix-files/src/files.rs#L104) (`Path::new()`). When the service receives a HTTP request, it [joins the request information with the empty path](https://github.com/actix/actix-web/blob/fba766b4beb92278665d58815c94d336015225c5/actix-files/src/service.rs#L136) and calls `canonicalize`. Rust resolves this path as relative and returns any file that matches it.\n\nThis behavior causes the library to expose unexpected files when the folder is not present.\n\n### PoC\n\n_There is a working PoC on https://github.com/Angelmmiguel/actix-files-vuln, although the next steps can be followed to reproduce the issue_\n\n1. Clone the https://github.com/actix/examples repository.\n2. Change your directory to the `basics/static-files` folder.\n3. Edit the `src/main.rs` file and change the line 13 to mount a non-existing folder:\n\n    ```diff\n    -        .service(Files::new(\"/images\", \"static/images/\").show_files_listing())\n    +        .service(Files::new(\"/images\", \"static/missing/\").show_files_listing())\n    ```\n    \n4. Run the project with `cargo run`.\n5. Access the \u003chttp://localhost:8080/images/Cargo.toml\u003e URL.\n\n### Impact\n\nThis is an exposure of information vulnerability. It affects anyone using the `actix-files::Files` library that mounts a non-existing folder for any reason.",
          "Severity": "MEDIUM",
          "VendorSeverity": {
            "ghsa": 2
          },
          "CVSS": {
            "ghsa": {
              "V40Vector": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
              "V40Score": 6.3
            }
          },
          "References": [
            "https://github.com/actix/actix-web",
            "https://github.com/actix/actix-web/blob/fba766b4beb92278665d58815c94d336015225c5/actix-files/src/files.rs#L104",
            "https://github.com/actix/actix-web/blob/fba766b4beb92278665d58815c94d336015225c5/actix-files/src/files.rs#L38",
            "https://github.com/actix/actix-web/blob/fba766b4beb92278665d58815c94d336015225c5/actix-files/src/files.rs#L98",
            "https://github.com/actix/actix-web/blob/fba766b4beb92278665d58815c94d336015225c5/actix-files/src/service.rs#L136",
            "https://github.com/actix/actix-web/security/advisories/GHSA-8v2v-wjwg-vx6r"
          ],
          "PublishedDate": "2026-02-06T18:56:20Z",
          "LastModifiedDate": "2026-02-06T18:56:20Z"
        },
        {
          "VulnerabilityID": "GHSA-gcqf-3g44-vc9p",
          "PkgID": "actix-files@0.6.9",
          "PkgName": "actix-files",
          "PkgIdentifier": {
            "PURL": "pkg:cargo/actix-files@0.6.9",
            "UID": "7c608aba6e36d80a",
            "BOMRef": "pkg:cargo/actix-files@0.6.9"
          },
          "InstalledVersion": "0.6.9",
          "FixedVersion": "0.6.10",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://github.com/advisories/GHSA-gcqf-3g44-vc9p",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory Rust",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Arust"
          },
          "Fingerprint": "sha256:b2ebced5bf592869b78d3df47128f3e8ae84c553bceb3b84f1803bd01d24655d",
          "Title": "[actix-files] Panic triggered by empty Range header in GET request for static file",
          "Description": "### Summary\nA GET request for a static file served by `actix-files` with an empty `Range` header triggers a panic. With `panic = \"abort\"`, a remote user may crash the process on-demand.\n\n### Details\n`actix-files` assumes that `HttpRange::parse()`, when `Ok`, always returns a vector with at least one element. When `parse()` is called on an empty string, it returns `Ok(vec![])`. This can cause a panic at named.rs:534 when handling an HTTP request with an empty `Range:` header. This shouldn't significantly impact programs built with the default `panic = \"unwind\"`, as the only effect is that the connection is closed when the worker thread panics and new threads are spooled up on demand. Programs built with `panic = \"abort\"` are vulnerable to being crashed on-demand by any user with permissions to perform a `GET` request for a static file served by `actix-files`.\nhttps://github.com/actix/actix-web/blob/0383f4bdd1210e726143ca1ebcf01169b67a4b6c/actix-files/src/named.rs#L530-L535\n\n### PoC\n\u003cdetails\u003e\n\u003csummary\u003eMinimal reproduction\u003c/summary\u003e\n\n`Cargo.toml`:\n```toml\n[package]\nname = \"example\"\nversion = \"0.1.0\"\nedition = \"2021\"\n\n[dependencies]\nactix-web = \"=4.5.1\"\nactix-files = \"=0.6.5\"\n\n[profile.dev]\npanic = \"abort\"\n```\n`src/main.rs`:\n```rust\nuse actix_files::NamedFile;\nuse actix_web::{get, Responder};\n\n#[get(\"/\")]\nasync fn index() -\u003e impl Responder {\n    NamedFile::open(\"test_file\")\n}\n\n#[actix_web::main]\nasync fn main() -\u003e std::io::Result\u003c()\u003e {\n    use actix_web::{App, HttpServer};\n\n    HttpServer::new(|| App::new().service(index))\n        .bind((\"127.0.0.1\", 8080))?\n        .run()\n        .await\n}\n```\n`test.sh`:\n```sh\n#!/bin/bash\n\necho foo \u003e test_file\ncargo b\ncargo r\u0026\nsleep 1\nnc 127.0.0.1 8080 \u003c\u003c EOF\nGET / HTTP/1.1\nRange:\n\nEOF\nkill %1\n```\n\nCreate these files, then run `chmod +x test.sh \u0026\u0026 ./test.sh`. The server should start, then crash upon receiving the `GET` request from `netcat`.\n\nThis assumes a reasonably UNIX-like system with Rust, `bash` and `netcat` installed.\n\u003c/details\u003e\n\n### Impact\nIt is believed that only programs compiled with panic = \"abort\" are affected significantly. The only potential impact that can be seen is Denial of Service, though an attacker able to repeatedly send GET requests without those requests getting blocked by rate limiting, DDoS protection, etc. would be able to keep a server down indefinitely. As only a single unblocked request is needed to trigger the panic, merely having a rate limiter may not be enough to prevent this.\n\nThough the impact in the worst case is significant, the real-world risk of this vulnerability appears to be limited, as it would be expected that anyone for whom uptime is a significant concern would not compile their program with panic = \"abort\".",
          "Severity": "MEDIUM",
          "VendorSeverity": {
            "ghsa": 2
          },
          "CVSS": {
            "ghsa": {
              "V40Vector": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
              "V40Score": 6.9
            }
          },
          "References": [
            "https://github.com/actix/actix-web",
            "https://github.com/actix/actix-web/blob/0383f4bdd1210e726143ca1ebcf01169b67a4b6c/actix-files/src/named.rs#L530-L535",
            "https://github.com/actix/actix-web/security/advisories/GHSA-gcqf-3g44-vc9p"
          ],
          "PublishedDate": "2026-02-06T19:00:12Z",
          "LastModifiedDate": "2026-02-06T19:00:13Z"
        },
        {
          "VulnerabilityID": "CVE-2026-25541",
          "VendorIDs": [
            "GHSA-434x-w66g-qw3r"
          ],
          "PkgID": "bytes@1.10.1",
          "PkgName": "bytes",
          "PkgIdentifier": {
            "PURL": "pkg:cargo/bytes@1.10.1",
            "UID": "a2a08c96cd9b1a48",
            "BOMRef": "pkg:cargo/bytes@1.10.1"
          },
          "InstalledVersion": "1.10.1",
          "FixedVersion": "1.11.1",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-25541",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory Rust",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Arust"
          },
          "Fingerprint": "sha256:581822a40bffb16ff638fe13466c6fb04f63eec0f62b7e9ed1947a02ab4a2802",
          "Title": "Bytes is a utility library for working with bytes. From version 1.2.1  ...",
          "Description": "Bytes is a utility library for working with bytes. From version 1.2.1 to before 1.11.1, Bytes is vulnerable to integer overflow in BytesMut::reserve. In the unique reclaim path of BytesMut::reserve, if the condition \"v_capacity \u003e= new_cap + offset\" uses an unchecked addition. When new_cap + offset overflows usize in release builds, this condition may incorrectly pass, causing self.cap to be set to a value that exceeds the actual allocated capacity. Subsequent APIs such as spare_capacity_mut() then trust this corrupted cap value and may create out-of-bounds slices, leading to UB. This behavior is observable in release builds (integer overflow wraps), whereas debug builds panic due to overflow checks. This issue has been patched in version 1.11.1.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-680"
          ],
          "VendorSeverity": {
            "azure": 2,
            "cbl-mariner": 2,
            "ghsa": 2,
            "nvd": 3
          },
          "CVSS": {
            "ghsa": {
              "V40Vector": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P",
              "V40Score": 5.5
            },
            "nvd": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 7.5
            }
          },
          "References": [
            "https://github.com/tokio-rs/bytes",
            "https://github.com/tokio-rs/bytes/commit/d0293b0e35838123c51ca5dfdf468ecafee4398f",
            "https://github.com/tokio-rs/bytes/releases/tag/v1.11.1",
            "https://github.com/tokio-rs/bytes/security/advisories/GHSA-434x-w66g-qw3r",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-25541",
            "https://rustsec.org/advisories/RUSTSEC-2026-0007.html"
          ],
          "PublishedDate": "2026-02-04T22:16:00.383Z",
          "LastModifiedDate": "2026-02-27T20:13:28.537Z"
        },
        {
          "VulnerabilityID": "CVE-2026-25537",
          "VendorIDs": [
            "GHSA-h395-gr6q-cpjc"
          ],
          "PkgID": "jsonwebtoken@10.0.0",
          "PkgName": "jsonwebtoken",
          "PkgIdentifier": {
            "PURL": "pkg:cargo/jsonwebtoken@10.0.0",
            "UID": "c3a410ec83257324",
            "BOMRef": "pkg:cargo/jsonwebtoken@10.0.0"
          },
          "InstalledVersion": "10.0.0",
          "FixedVersion": "10.3.0",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-25537",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory Rust",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Arust"
          },
          "Fingerprint": "sha256:8847295f41cbb82146b440f12ab512ed5262c6d396a2bc6df04b24908abef73b",
          "Title": "jsonwebtoken: jsonwebtoken has Type Confusion that leads to potential authorization bypass",
          "Description": "jsonwebtoken is a JWT lib in rust. Prior to version 10.3.0, there is a Type Confusion vulnerability in jsonwebtoken, specifically, in its claim validation logic. When a standard claim (such as nbf or exp) is provided with an incorrect JSON type (Like a String instead of a Number), the library’s internal parsing mechanism marks the claim as “FailedToParse”. Crucially, the validation logic treats this “FailedToParse” state identically to “NotPresent”. This means that if a check is enabled (like: validate_nbf = true), but the claim is not explicitly marked as required in required_spec_claims, the library will skip the validation check entirely for the malformed claim, treating it as if it were not there. This allows attackers to bypass critical time-based security restrictions (like “Not Before” checks) and commit potential authentication and authorization bypasses. This issue has been patched in version 10.3.0.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-843"
          ],
          "VendorSeverity": {
            "ghsa": 2,
            "nvd": 3,
            "redhat": 2
          },
          "CVSS": {
            "ghsa": {
              "V40Vector": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P",
              "V40Score": 5.5
            },
            "nvd": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
              "V3Score": 7.5
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
              "V3Score": 7.5
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-25537",
            "https://github.com/Keats/jsonwebtoken",
            "https://github.com/Keats/jsonwebtoken/commit/abbc3076742c4161347bc6b8bf4aa5eb86e1dc01",
            "https://github.com/Keats/jsonwebtoken/security/advisories/GHSA-h395-gr6q-cpjc",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-25537",
            "https://www.cve.org/CVERecord?id=CVE-2026-25537"
          ],
          "PublishedDate": "2026-02-04T22:15:59.807Z",
          "LastModifiedDate": "2026-02-11T19:13:47.607Z"
        },
        {
          "VulnerabilityID": "CVE-2026-32829",
          "VendorIDs": [
            "GHSA-vvp9-7p8x-rfvv"
          ],
          "PkgID": "lz4_flex@0.12.0",
          "PkgName": "lz4_flex",
          "PkgIdentifier": {
            "PURL": "pkg:cargo/lz4_flex@0.12.0",
            "UID": "c10ae92bf73e1f68",
            "BOMRef": "pkg:cargo/lz4_flex@0.12.0"
          },
          "InstalledVersion": "0.12.0",
          "FixedVersion": "0.11.6, 0.12.1",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-32829",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory Rust",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Arust"
          },
          "Fingerprint": "sha256:b5509bb457423a5bd9e5b0e8a92d1d8d577660d7d72fb4a6d3d8fc72854801c9",
          "Title": "lz4_flex: lz4_flex's decompression can leak information from uninitialized memory or reused output buffer",
          "Description": "lz4_flex is a pure Rust implementation of LZ4 compression/decompression. In versions 0.11.5 and below, and 0.12.0,  decompressing invalid LZ4 data can leak sensitive information from uninitialized memory or from previous decompression operations. The library fails to properly validate offset values during LZ4 \"match copy operations,\" allowing out-of-bounds reads from the output buffer. The block-based API functions (`decompress_into`, `decompress_into_with_dict`, and others when `safe-decode` is disabled) are affected, while all frame APIs are unaffected. The impact is potential exposure of sensitive data and secrets through crafted or malformed LZ4 input. This issue has been fixed in versions 0.11.6 and 0.12.1.",
          "Severity": "HIGH",
          "CweIDs": [
            "CWE-201",
            "CWE-823"
          ],
          "VendorSeverity": {
            "amazon": 2,
            "ghsa": 3,
            "nvd": 3,
            "redhat": 3
          },
          "CVSS": {
            "ghsa": {
              "V40Vector": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N",
              "V40Score": 8.2
            },
            "nvd": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
              "V3Score": 7.5
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
              "V3Score": 7.5
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-32829",
            "https://github.com/PSeitz/lz4_flex",
            "https://github.com/PSeitz/lz4_flex/commit/055502ee5d297ecd6bf448ac91c055c7f6df9b6d",
            "https://github.com/PSeitz/lz4_flex/security/advisories/GHSA-vvp9-7p8x-rfvv",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-32829",
            "https://rustsec.org/advisories/RUSTSEC-2026-0041.html",
            "https://www.cve.org/CVERecord?id=CVE-2026-32829"
          ],
          "PublishedDate": "2026-03-20T01:15:56.277Z",
          "LastModifiedDate": "2026-03-30T15:05:23.41Z"
        },
        {
          "VulnerabilityID": "CVE-2025-53605",
          "VendorIDs": [
            "GHSA-2gh3-rmm4-6rq5"
          ],
          "PkgID": "protobuf@2.28.0",
          "PkgName": "protobuf",
          "PkgIdentifier": {
            "PURL": "pkg:cargo/protobuf@2.28.0",
            "UID": "3890a57fc13724cc",
            "BOMRef": "pkg:cargo/protobuf@2.28.0"
          },
          "InstalledVersion": "2.28.0",
          "FixedVersion": "3.7.2",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-53605",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory Rust",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Arust"
          },
          "Fingerprint": "sha256:ae182f1145da1bd8287ea39ac3595421359c1be6a82c768630bfa2e84ef0b3ac",
          "Title": "protobuf: Protobuf: Uncontrolled Recursion Vulnerability",
          "Description": "The protobuf crate before 3.7.2 for Rust allows uncontrolled recursion in the protobuf::coded_input_stream::CodedInputStream::skip_group parsing of unknown fields in untrusted input.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-674"
          ],
          "VendorSeverity": {
            "amazon": 2,
            "azure": 2,
            "cbl-mariner": 2,
            "ghsa": 2,
            "redhat": 2
          },
          "CVSS": {
            "ghsa": {
              "V40Vector": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U",
              "V40Score": 6.6
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 5.9
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2025-53605",
            "https://crates.io/crates/protobuf",
            "https://github.com/stepancheg/rust-protobuf",
            "https://github.com/stepancheg/rust-protobuf/commit/f06992f46771c0a092593b9ebf7afd48740b3ed6",
            "https://github.com/stepancheg/rust-protobuf/issues/749",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-53605",
            "https://rustsec.org/advisories/RUSTSEC-2024-0437",
            "https://rustsec.org/advisories/RUSTSEC-2024-0437.html",
            "https://www.cve.org/CVERecord?id=CVE-2025-53605"
          ],
          "PublishedDate": "2025-07-05T01:15:28.523Z",
          "LastModifiedDate": "2025-07-08T16:18:53.607Z"
        },
        {
          "VulnerabilityID": "CVE-2026-31812",
          "VendorIDs": [
            "GHSA-6xvm-j4wr-6v98"
          ],
          "PkgID": "quinn-proto@0.11.8",
          "PkgName": "quinn-proto",
          "PkgIdentifier": {
            "PURL": "pkg:cargo/quinn-proto@0.11.8",
            "UID": "6399d8c373a4cbf7",
            "BOMRef": "pkg:cargo/quinn-proto@0.11.8"
          },
          "InstalledVersion": "0.11.8",
          "FixedVersion": "0.11.14",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-31812",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory Rust",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Arust"
          },
          "Fingerprint": "sha256:e8785f33dd33c76160bfe2b8fa551a93fc44575215040a613b5aaddb939c886c",
          "Title": "quinn-proto: quinn-proto: Denial of Service via crafted QUIC Initial packet",
          "Description": "Quinn is a pure-Rust, async-compatible implementation of the IETF QUIC transport protocol. Prior to 0.11.14, a remote, unauthenticated attacker can trigger a denial of service in applications using vulnerable quinn versions by sending a crafted QUIC Initial packet containing malformed quic_transport_parameters. In quinn-proto parsing logic, attacker-controlled varints are decoded with unwrap(), so truncated encodings cause Err(UnexpectedEnd) and panic. This is reachable over the network with a single packet and no prior trust or authentication. This vulnerability is fixed in 0.11.14.",
          "Severity": "HIGH",
          "CweIDs": [
            "CWE-248"
          ],
          "VendorSeverity": {
            "ghsa": 3,
            "redhat": 3
          },
          "CVSS": {
            "ghsa": {
              "V40Vector": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
              "V40Score": 8.7
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
              "V3Score": 5.3
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-31812",
            "https://github.com/quinn-rs/quinn",
            "https://github.com/quinn-rs/quinn/pull/2559",
            "https://github.com/quinn-rs/quinn/security/advisories/GHSA-6xvm-j4wr-6v98",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-31812",
            "https://rustsec.org/advisories/RUSTSEC-2026-0037.html",
            "https://www.cve.org/CVERecord?id=CVE-2026-31812"
          ],
          "PublishedDate": "2026-03-10T22:16:18.84Z",
          "LastModifiedDate": "2026-03-11T13:52:47.683Z"
        },
        {
          "VulnerabilityID": "CVE-2026-21895",
          "VendorIDs": [
            "GHSA-9c48-w39g-hm26"
          ],
          "PkgID": "rsa@0.9.8",
          "PkgName": "rsa",
          "PkgIdentifier": {
            "PURL": "pkg:cargo/rsa@0.9.8",
            "UID": "9fea08abc75131d5",
            "BOMRef": "pkg:cargo/rsa@0.9.8"
          },
          "InstalledVersion": "0.9.8",
          "FixedVersion": "0.9.10",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-21895",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory Rust",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Arust"
          },
          "Fingerprint": "sha256:ed579d81013200818fdd5307a15573a31da19e46bf60ddc511ea686c48d85d28",
          "Title": "RSA: RSA crate: Denial of Service due to malformed prime in private key generation",
          "Description": "The `rsa` crate is an RSA implementation written in rust. Prior to version 0.9.10, when creating a RSA private key from its components, the construction panics instead of returning an error when one of the primes is `1`. Version 0.9.10 fixes the issue.",
          "Severity": "LOW",
          "CweIDs": [
            "CWE-703"
          ],
          "VendorSeverity": {
            "ghsa": 1,
            "nvd": 2,
            "redhat": 1
          },
          "CVSS": {
            "ghsa": {
              "V40Vector": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U",
              "V40Score": 2.7
            },
            "nvd": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
              "V3Score": 5.3
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 5.5
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-21895",
            "https://github.com/RustCrypto/RSA",
            "https://github.com/RustCrypto/RSA/commit/2926c91bef7cb14a7ccd42220a698cf4b1b692f7",
            "https://github.com/RustCrypto/RSA/security/advisories/GHSA-9c48-w39g-hm26",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-21895",
            "https://www.cve.org/CVERecord?id=CVE-2026-21895"
          ],
          "PublishedDate": "2026-01-08T14:15:57.72Z",
          "LastModifiedDate": "2026-03-12T19:27:31.327Z"
        },
        {
          "VulnerabilityID": "GHSA-pwjx-qhcg-rvj4",
          "PkgID": "rustls-webpki@0.102.8",
          "PkgName": "rustls-webpki",
          "PkgIdentifier": {
            "PURL": "pkg:cargo/rustls-webpki@0.102.8",
            "UID": "746b8fb9b2f81a04",
            "BOMRef": "pkg:cargo/rustls-webpki@0.102.8"
          },
          "InstalledVersion": "0.102.8",
          "FixedVersion": "0.103.10, 0.104.0-alpha.5",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://github.com/advisories/GHSA-pwjx-qhcg-rvj4",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory Rust",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Arust"
          },
          "Fingerprint": "sha256:06fd67f61f08b6f2230c517054a0bd28df1dc90adbddf30a08f369d33a353a23",
          "Title": "webpki: CRLs not considered authoritative by Distribution Point due to faulty matching logic",
          "Description": "If a certificate had more than one `distributionPoint`, then only the first `distributionPoint` would be considered against each CRL's `IssuingDistributionPoint` `distributionPoint`, and then the certificate's subsequent `distributionPoint`s would be ignored.\n\nThe impact was that correct provided CRLs would not be consulted to check revocation. With `UnknownStatusPolicy::Deny` (the default) this would lead to incorrect but safe `Error::UnknownRevocationStatus`. With `UnknownStatusPolicy::Allow` this would lead to inappropriate acceptance of revoked certificates.\n\nThis vulnerability is thought to be of limited impact. This is because both the certificate and CRL are signed -- an attacker would need to compromise a trusted issuing authority to trigger this bug.  An attacker with such capabilities could likely bypass revocation checking through other more impactful means (such as publishing a valid, empty CRL.)\n\nMore likely, this bug would be latent in normal use, and an attacker could leverage faulty revocation checking to continue using a revoked credential.",
          "Severity": "MEDIUM",
          "VendorSeverity": {
            "ghsa": 2
          },
          "CVSS": {
            "ghsa": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:N",
              "V3Score": 4.4
            }
          },
          "References": [
            "https://github.com/rustls/webpki",
            "https://github.com/rustls/webpki/security/advisories/GHSA-pwjx-qhcg-rvj4",
            "https://rustsec.org/advisories/RUSTSEC-2026-0049.html"
          ],
          "PublishedDate": "2026-03-20T21:51:17Z",
          "LastModifiedDate": "2026-03-25T19:56:38Z"
        },
        {
          "VulnerabilityID": "GHSA-pwjx-qhcg-rvj4",
          "PkgID": "rustls-webpki@0.103.6",
          "PkgName": "rustls-webpki",
          "PkgIdentifier": {
            "PURL": "pkg:cargo/rustls-webpki@0.103.6",
            "UID": "26d77022fc642503",
            "BOMRef": "pkg:cargo/rustls-webpki@0.103.6"
          },
          "InstalledVersion": "0.103.6",
          "FixedVersion": "0.103.10, 0.104.0-alpha.5",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://github.com/advisories/GHSA-pwjx-qhcg-rvj4",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory Rust",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Arust"
          },
          "Fingerprint": "sha256:078af7bd94abeb1c92dcdf858fcfba7f732935c410febe6b51951650c9f2ae64",
          "Title": "webpki: CRLs not considered authoritative by Distribution Point due to faulty matching logic",
          "Description": "If a certificate had more than one `distributionPoint`, then only the first `distributionPoint` would be considered against each CRL's `IssuingDistributionPoint` `distributionPoint`, and then the certificate's subsequent `distributionPoint`s would be ignored.\n\nThe impact was that correct provided CRLs would not be consulted to check revocation. With `UnknownStatusPolicy::Deny` (the default) this would lead to incorrect but safe `Error::UnknownRevocationStatus`. With `UnknownStatusPolicy::Allow` this would lead to inappropriate acceptance of revoked certificates.\n\nThis vulnerability is thought to be of limited impact. This is because both the certificate and CRL are signed -- an attacker would need to compromise a trusted issuing authority to trigger this bug.  An attacker with such capabilities could likely bypass revocation checking through other more impactful means (such as publishing a valid, empty CRL.)\n\nMore likely, this bug would be latent in normal use, and an attacker could leverage faulty revocation checking to continue using a revoked credential.",
          "Severity": "MEDIUM",
          "VendorSeverity": {
            "ghsa": 2
          },
          "CVSS": {
            "ghsa": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:N",
              "V3Score": 4.4
            }
          },
          "References": [
            "https://github.com/rustls/webpki",
            "https://github.com/rustls/webpki/security/advisories/GHSA-pwjx-qhcg-rvj4",
            "https://rustsec.org/advisories/RUSTSEC-2026-0049.html"
          ],
          "PublishedDate": "2026-03-20T21:51:17Z",
          "LastModifiedDate": "2026-03-25T19:56:38Z"
        },
        {
          "VulnerabilityID": "CVE-2026-25727",
          "VendorIDs": [
            "GHSA-r6v5-fh4h-64xc"
          ],
          "PkgID": "time@0.3.17",
          "PkgName": "time",
          "PkgIdentifier": {
            "PURL": "pkg:cargo/time@0.3.17",
            "UID": "cf99bc9a95681b61",
            "BOMRef": "pkg:cargo/time@0.3.17"
          },
          "InstalledVersion": "0.3.17",
          "FixedVersion": "0.3.47",
          "Status": "fixed",
          "Layer": {
            "Digest": "sha256:d68a47ce125003429598d957c567121cc9c6114e1dbd49ca281bd3324d280c3b",
            "DiffID": "sha256:43d1068bbb2f192e68db6c68ca29daf0a2c8b948d5c66ae8510d6c2e870c3caa"
          },
          "SeveritySource": "ghsa",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2026-25727",
          "DataSource": {
            "ID": "ghsa",
            "Name": "GitHub Security Advisory Rust",
            "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Arust"
          },
          "Fingerprint": "sha256:6dd1ba774744967c470eec79e6164b39e15a10825e3b4025108075030b25029d",
          "Title": "time: time affected by a stack exhaustion denial of service attack",
          "Description": "time provides date and time handling in Rust. From 0.3.6 to before 0.3.47, when user-provided input is provided to any type that parses with the RFC 2822 format, a denial of service attack via stack exhaustion is possible. The attack relies on formally deprecated and rarely-used features that are part of the RFC 2822 format used in a malicious manner. Ordinary, non-malicious input will never encounter this scenario. A limit to the depth of recursion was added in v0.3.47. From this version, an error will be returned rather than exhausting the stack.",
          "Severity": "MEDIUM",
          "CweIDs": [
            "CWE-121"
          ],
          "VendorSeverity": {
            "amazon": 2,
            "azure": 2,
            "cbl-mariner": 2,
            "ghsa": 2,
            "nvd": 2,
            "redhat": 2
          },
          "CVSS": {
            "ghsa": {
              "V40Vector": "CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H",
              "V40Score": 6.8
            },
            "nvd": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
              "V3Score": 6.5
            },
            "redhat": {
              "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "V3Score": 5.9
            }
          },
          "References": [
            "https://access.redhat.com/security/cve/CVE-2026-25727",
            "https://github.com/time-rs/time",
            "https://github.com/time-rs/time/blob/main/CHANGELOG.md#0347-2026-02-05",
            "https://github.com/time-rs/time/commit/1c63dc7985b8fa26bd8c689423cc56b7a03841ee",
            "https://github.com/time-rs/time/releases/tag/v0.3.47",
            "https://github.com/time-rs/time/security/advisories/GHSA-r6v5-fh4h-64xc",
            "https://nvd.nist.gov/vuln/detail/CVE-2026-25727",
            "https://rustsec.org/advisories/RUSTSEC-2026-0009.html",
            "https://www.cve.org/CVERecord?id=CVE-2026-25727"
          ],
          "PublishedDate": "2026-02-06T20:16:11.86Z",
          "LastModifiedDate": "2026-02-24T15:23:35.563Z"
        }
      ]
    }
  ]
}
